Language software

Results: 21611



#Item
961Microsoft Word - OCL2011-2.doc

Microsoft Word - OCL2011-2.doc

Add to Reading List

Source URL: www.db.informatik.uni-bremen.de

Language: English - Date: 2011-11-11 09:24:18
962Chapter 18 Sentence Processing  Jesse Snedeker and Yi Ting Huang 18.1 Introduction Human language comprehension is so effortless that it often appears instantaneous.

Chapter 18 Sentence Processing Jesse Snedeker and Yi Ting Huang 18.1 Introduction Human language comprehension is so effortless that it often appears instantaneous.

Add to Reading List

Source URL: software.rc.fas.harvard.edu

Language: English - Date: 2015-07-02 10:46:16
963Database Queries that Explain their Work James Cheney Amal Ahmed  Umut A. Acar

Database Queries that Explain their Work James Cheney Amal Ahmed Umut A. Acar

Add to Reading List

Source URL: www.ccs.neu.edu

Language: English - Date: 2014-10-03 11:09:09
964Declare Your Language Language Definition with the Spoofax Language Workbench Eelco Visser DSLDI Summer School, Lausanne July 13, 2015

Declare Your Language Language Definition with the Spoofax Language Workbench Eelco Visser DSLDI Summer School, Lausanne July 13, 2015

Add to Reading List

Source URL: vjovanov.github.io

Language: English - Date: 2016-01-20 12:01:38
965bookConceptualModelling.dvi

bookConceptualModelling.dvi

Add to Reading List

Source URL: www.db.informatik.uni-bremen.de

Language: English - Date: 2015-05-28 09:48:56
966Clean Mapping: A sketchy story about how conceptual structure could shape language acquisition and some evidence suggesting that it just might be true Jesse Snedeker

Clean Mapping: A sketchy story about how conceptual structure could shape language acquisition and some evidence suggesting that it just might be true Jesse Snedeker

Add to Reading List

Source URL: software.rc.fas.harvard.edu

Language: English - Date: 2015-07-01 13:32:13
967A Theorem Proving Approach to Secure Information Flow in Concurrent Programs (Extended Abstract) Daniel Bruns, Karlsruhe Institute of Technology We present an approach to formally prove secure information flow in multi-t

A Theorem Proving Approach to Secure Information Flow in Concurrent Programs (Extended Abstract) Daniel Bruns, Karlsruhe Institute of Technology We present an approach to formally prove secure information flow in multi-t

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2015-07-09 06:40:16
968JDK 8: Stream Style  Сергей Куксенко , @kuksenk0  The following is intended to outline our general

JDK 8: Stream Style Сергей Куксенко , @kuksenk0 The following is intended to outline our general

Add to Reading List

Source URL: 2013.jokerconf.com

Language: English - Date: 2015-02-28 17:19:49
969Employing Classifying Terms for Testing Model Transformations

Employing Classifying Terms for Testing Model Transformations

Add to Reading List

Source URL: www.db.informatik.uni-bremen.de

Language: English - Date: 2015-09-17 08:36:58
970On recovering multi-dimensional arrays in Polly Tobias Grosser, Sebastian Pop, J. Ramanujam, P. Sadayappan ETH Z¨ urich, Samsung R&D Center Austin, Louisiana State University, Ohio State University  19. January 2015

On recovering multi-dimensional arrays in Polly Tobias Grosser, Sebastian Pop, J. Ramanujam, P. Sadayappan ETH Z¨ urich, Samsung R&D Center Austin, Louisiana State University, Ohio State University 19. January 2015

Add to Reading List

Source URL: www.grosser.es

Language: English - Date: 2015-08-09 09:14:53