Processing Instruction

Results: 1077



#Item
41XQuery 1.0: Primer by Juliane Harbarth, Technical Consultant R&D Technology, Software AG Abstract This document is intended to provide an easily readable description of the XQuery XML Query language, and is oriented towa

XQuery 1.0: Primer by Juliane Harbarth, Technical Consultant R&D Technology, Software AG Abstract This document is intended to provide an easily readable description of the XQuery XML Query language, and is oriented towa

Add to Reading List

Source URL: web.archive.org

Language: English
42BOOKS ABOUT PAINSTRUCTIONS  Cityhalllosangeles.com PAINSTRUCTIONS

BOOKS ABOUT PAINSTRUCTIONS Cityhalllosangeles.com PAINSTRUCTIONS

Add to Reading List

Source URL: p.cityhalllosangeles.com

Language: English - Date: 2015-03-05 01:51:59
43This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and shar

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and shar

Add to Reading List

Source URL: ccn.upenn.edu

Language: English - Date: 2012-05-25 17:21:27
44MIPS Assembly Language Programmer’s Guide ASM-01-DOC  Your comments on our products and publications

MIPS Assembly Language Programmer’s Guide ASM-01-DOC Your comments on our products and publications

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2009-09-02 12:08:50
45Secure AES Implementation on a 32-bit RISC-V Processor Advisor(s): Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Secure AES Implementation on a 32-bit RISC-V Processor Advisor(s): Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2016-02-24 05:00:01
46Analysis of Cross-layer Vulnerability to Variations: An Adaptive Instruction-level to Task-level Approach 1 Abbas Rahimi CSE, UC San Diego La Jolla, CA 92093, USA

Analysis of Cross-layer Vulnerability to Variations: An Adaptive Instruction-level to Task-level Approach 1 Abbas Rahimi CSE, UC San Diego La Jolla, CA 92093, USA

Add to Reading List

Source URL: mesl.ucsd.edu

Language: English - Date: 2014-02-11 01:12:49
47CS:APP2e Guide to Y86 Processor Simulators∗  Write back  Stat

CS:APP2e Guide to Y86 Processor Simulators∗ Write back Stat

Add to Reading List

Source URL: csapp.cs.cmu.edu

Language: English - Date: 2013-07-29 12:14:16
48PLACES 22nd March 2009 Programming Language Approaches to Concurrency and Communication-cEntric Software is a workshop at ETAPS 2009, York, England

PLACES 22nd March 2009 Programming Language Approaches to Concurrency and Communication-cEntric Software is a workshop at ETAPS 2009, York, England

Add to Reading List

Source URL: places09.di.fc.ul.pt

Language: English - Date: 2009-03-12 05:21:57
49Godson-2E software manual  Contents 1 Godson-2E Micro Architecture...................................................................................1 1.1 Godson Series Processors ........................................

Godson-2E software manual Contents 1 Godson-2E Micro Architecture...................................................................................1 1.1 Godson Series Processors ........................................

Add to Reading List

Source URL: dev.lemote.com

Language: English - Date: 2011-05-04 12:04:52
50Using Cortex-M3 and Cortex-M4 Fault Exception Application Note 209 Abstract The Cortex-M processors implement an efficient exception model that also traps illegal memory accesses and several incorrect program conditions.

Using Cortex-M3 and Cortex-M4 Fault Exception Application Note 209 Abstract The Cortex-M processors implement an efficient exception model that also traps illegal memory accesses and several incorrect program conditions.

Add to Reading List

Source URL: www.keil.com

Language: English - Date: 2016-03-11 03:37:29