Safe Software

Results: 789



#Item
71

SafeCer Safety Certification of Software-Intensive Systems with Reusable Components Testing Safe Software with QuickCheck Benjamin Vedder, Thomas Arts and Jonny Vinter

Add to Reading List

Source URL: www.safecer.eu

- Date: 2013-09-24 09:27:43
    72Software engineering / Computing / Computer programming / Concurrency control / Transaction processing / Complexity classes / Java / Functional languages / Deterministic Parallel Java / Determinism / Deterministic algorithm / Linearizability

    Safe Nondeterminism in a Deterministic-by-Default Parallel Language Robert L. Bocchino Jr.1 Stephen Heumann2 Nima Honarmand2 Sarita V. Adve2

    Add to Reading List

    Source URL: www.adamwelc.org

    Language: English - Date: 2011-01-04 17:23:47
    73Computing / Software engineering / Computer programming / Concurrent computing / Concurrency control / Control flow / Java / Concurrency / Futures and promises / Monitor / Synchronization / Java concurrency

    Safe Futures for Java Adam Welc Suresh Jagannathan

    Add to Reading List

    Source URL: www.adamwelc.org

    Language: English - Date: 2007-08-01 17:06:34
    74

    Synthesizing Safe Bit-Precise Invariants? Arie Gurfinkel, Anton Belov and Joao Marques-Silva Abstract. Bit-precise software verification is an important and difficult problem. While there has been an amazing progress in

    Add to Reading List

    Source URL: arieg.bitbucket.org

    Language: English - Date: 2016-02-12 11:17:00
      75

      Safe-Commit Analysis to Facilitate Team Software Development Jan Wloka∗, Barbara Ryder†, Frank Tip‡ and Xiaoxia Ren∗ ∗ Dept. of Computer Science, Rutgers University, Piscataway, NJ 08854, USA {jwloka, xren}@cs.

      Add to Reading List

      Source URL: www.franktip.org

      Language: English - Date: 2016-01-22 11:53:09
        76Accounting software / Application software / ERP software / Sage Group / MAS 90 / Business / Business software / SAFE X3

        Sage ERP X3 for Service Industries Project and Job Costing In today’s challenging environment, companies are recognising a need to refocus on their core business and expertise. As a result, many are outsourcing a growi

        Add to Reading List

        Source URL: www.rklesolutions.com

        Language: English - Date: 2014-10-01 12:26:08
        77Software engineering / Software design patterns / Double-checked locking / Singleton pattern / Lock / Singleton / Readers–writer lock / Critical section / Thread / Concurrency control / Computing / Computer programming

        Double-Checked Locking An Optimization Pattern for Efficiently Initializing and Accessing Thread-safe Objects Douglas C. Schmidt Tim Harrison

        Add to Reading List

        Source URL: www.cs.wustl.edu

        Language: English - Date: 1998-11-19 15:45:36
        78Software / Kaspersky Lab / Kaspersky Anti-Virus / Kaspersky Internet Security / Microsoft Windows / Computer virus / Kaspersky Mobile Security / NProtect GameGuard Personal / Antivirus software / System software / Computer security

        How to Scan Computer in Safe Mode ? Immediately after you installed and updated Kaspersky Anti-Virus or Internet Security, if you feel your computer became slower than before, then it is due to the resident virus/malware

        Add to Reading List

        Source URL: www.cca.gov.np

        Language: English - Date: 2014-06-01 07:04:18
        79Geology / Oilfield terminology / Petroleum engineering / Oil wells / Petroleum reservoir / Fracture / Permeability / Extraction of petroleum / Viscosity / Petroleum / Petroleum production / Materials science

        Diverting Acid Fracturing for Carbonate Reservoirs Fiber concentration, % 4. Design optimization software and matching equipment and tools for diverting acid fracturing: ensure safe operation at high temperature and und

        Add to Reading List

        Source URL: www.cnpc.com.cn

        Language: English - Date: 2014-10-25 05:39:18
        80Cryptographic software / Email authentication / Email encryption / Encryption / Key disclosure law / Tor / Data security / Telecommunications data retention / Secure communication / Cryptography / Internet privacy / Public-key cryptography

        Securing Safe Spaces Online Encryption, online anonymity, and human rights Contents

        Add to Reading List

        Source URL: hrp.law.harvard.edu

        Language: English - Date: 2015-06-16 21:46:00
        UPDATE