Programming language implementation

Results: 1978



#Item
9812012 LLVM Euro - Michael Spencer  lld Friday, April 13, 2012

2012 LLVM Euro - Michael Spencer lld Friday, April 13, 2012

Add to Reading List

Source URL: llvm.org

Language: English - Date: 2012-04-17 03:27:52
982HARNESS: Heterogeneous Adaptable Reconfigurable NEtworked SystemS  Jack Dongarra – Oak Ridge National Laboratory and University of Tennessee, Knoxville Graham Fagg – University of Tennessee, Knoxville Al Geist – O

HARNESS: Heterogeneous Adaptable Reconfigurable NEtworked SystemS  Jack Dongarra – Oak Ridge National Laboratory and University of Tennessee, Knoxville Graham Fagg – University of Tennessee, Knoxville Al Geist – O

Add to Reading List

Source URL: www.csm.ornl.gov

Language: English - Date: 2009-07-03 20:22:57
983aiT for Am486 aiT WCET Analyzers statically compute tight bounds for the worst-case execution time (WCET) of tasks in real-time systems. They directly analyze binary executables and take the intrinsic cache and pipeline

aiT for Am486 aiT WCET Analyzers statically compute tight bounds for the worst-case execution time (WCET) of tasks in real-time systems. They directly analyze binary executables and take the intrinsic cache and pipeline

Add to Reading List

Source URL: www.absint.com

Language: English - Date: 2015-01-19 06:15:30
984Stage Once – a Visual Novel hacking tutorial This is a PDF version of my tutorial located at my blog (http://proger.i-forge.net). It might be slightly outdated than the original article (http://proger.i-forge.net/Stage

Stage Once – a Visual Novel hacking tutorial This is a PDF version of my tutorial located at my blog (http://proger.i-forge.net). It might be slightly outdated than the original article (http://proger.i-forge.net/Stage

Add to Reading List

Source URL: proger.i-forge.net

Language: English - Date: 2011-07-04 11:06:28
985VIRUS BULLETIN www.virusbtn.com  MALWARE ANALYSIS 1 NOTEVEN CLOSE Peter Ferrie Microsoft, USA

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 1 NOTEVEN CLOSE Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2012-08-01 22:35:23
986For information  FCRI[removed]NOTE FOR FINANCE COMMITTEE Annual Report on the Implementation

For information FCRI[removed]NOTE FOR FINANCE COMMITTEE Annual Report on the Implementation

Add to Reading List

Source URL: www.legco.gov.hk

Language: English - Date: 2012-05-17 05:01:11
987How to miscompile programs with “benign” data races Hans-J. Boehm HP Laboratories Abstract Several prior research contributions [15, 9] have explored

How to miscompile programs with “benign” data races Hans-J. Boehm HP Laboratories Abstract Several prior research contributions [15, 9] have explored

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2011-04-22 17:11:31
988Microsoft PowerPoint - 06_UIUC

Microsoft PowerPoint - 06_UIUC

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2014-03-06 18:49:04
989Compiling and Job Submission Turning your source code into an executable code, then running it in batch mode. April 23, 2002

Compiling and Job Submission Turning your source code into an executable code, then running it in batch mode. April 23, 2002

Add to Reading List

Source URL: www.cs.unc.edu

Language: English - Date: 2004-07-07 15:56:22
990A Differential Approach to Undefined Behavior Detection by Xi Wang B.E., Computer Science (2005); M.E., Computer Science[removed]Tsinghua University

A Differential Approach to Undefined Behavior Detection by Xi Wang B.E., Computer Science (2005); M.E., Computer Science[removed]Tsinghua University

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-12 14:06:01