Active
Recent
Comments
Search
Login
Login
citeseerx.ist.psu.edu: 25 stories from 21 submitters
3
Predicting Prime Numbers Using Cartesian Genetic Programming
pdf
math
citeseerx.ist.psu.edu
via
calvin
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Querypoint Debugging: Semi-Automated Inspection of Buggy Execution (2012)
☶
pdf
debugging
javascript
citeseerx.ist.psu.edu
via
pushcx
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
16
Less Hashing, Same Performance: Building a Better Bloom Filter
☶
pdf
performance
programming
citeseerx.ist.psu.edu
via
dbremner
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
3
Generation Scavenging: A Non-Disruptive High Performance Storage Reclamation Algorithm (1984)
☶
pdf
programming
citeseerx.ist.psu.edu
via
dbremner
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Efficient Implementation of Java Interfaces: Invokeinterface Considered Harmless (2001)
☶
pdf
compilers
citeseerx.ist.psu.edu
via
dbremner
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
5
Microprocessor Simulation and Program Assembling Using Spreadsheets (2000)
pdf
assembly
citeseerx.ist.psu.edu
via
breck
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Classes vs. Prototypes: Some Philosophical and Historical Observations
pdf
historical
philosophy
plt
citeseerx.ist.psu.edu
via
cript0nauta
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Graphical Techniques in a Spreadsheet for Specifying User Interfaces (1991)
pdf
graphics
lisp
programming
citeseerx.ist.psu.edu
via
dbremner
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Software and Hardware Techniques for Efficient Polymorphic Calls (1999)
pdf
compilers
citeseerx.ist.psu.edu
via
dbremner
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Tales of Debugging from The Front Lines (1993)
pdf
debugging
citeseerx.ist.psu.edu
via
GeoffWozniak
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Optimization by direct search: New perspectives on some classical and modern methods (2003)
ai
compsci
citeseerx.ist.psu.edu
via
Corbin
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
3
Inside the Transputer (1990)
pdf
assembly
distributed
hardware
citeseerx.ist.psu.edu
via
calvin
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Formal Requirements for Virtualizable Third Generation Architectures (1974)
pdf
compsci
osdev
citeseerx.ist.psu.edu
via
lorddimwit
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Tombstone Transformation Functions for Ensuring Consistency in Collaborative Editing Systems
pdf
compsci
citeseerx.ist.psu.edu
via
355E3B
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
An Integrating, Transformation-Oriented Approach to Concurrency Control and Undo in Group Editors
pdf
compsci
citeseerx.ist.psu.edu
via
355E3B
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
The Cartesian Product Algorithm (Type Inference) (1995)
pdf
plt
citeseerx.ist.psu.edu
via
cadit_in_piscinam
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
16
Notes on the Plan 9 3rd Edition Kernel Source
pdf
osdev
programming
citeseerx.ist.psu.edu
via
orib
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
4
The 12 Commandments of Synchronization [2011]
pdf
programming
citeseerx.ist.psu.edu
via
GeoffWozniak
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Language as an intellectual tool: From hieroglyphics to APL (1991)
pdf
plt
citeseerx.ist.psu.edu
via
breck
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Automatic review of abstract state machines by meta property verification (2010)
☶
pdf
formalmethods
programming
security
citeseerx.ist.psu.edu
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Evaluating Combinatorial vs Exhaustive Testing of DOM Events (2013)
☶
pdf
javascript
testing
web
citeseerx.ist.psu.edu
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Implementing the Reliable Data Protocol (RDP) (1987)
pdf
historical
networking
citeseerx.ist.psu.edu
via
calvin
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Closing the Gap Between Specification and Programming: VDM++ and Scala
☶
pdf
formalmethods
scala
citeseerx.ist.psu.edu
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Reverse-Engineering and Implementation of the RDP 5 Protocol (2004)
pdf
reversing
citeseerx.ist.psu.edu
via
calvin
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Interpreting Programs in Static Single Assignment Form (2004)
☶
pdf
compsci
plt
citeseerx.ist.psu.edu
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
Page 2 >>