613 results on '"McKinley, Kathryn"'
Search Results
152. Why nothing matters
153. Sydit
154. Deferred gratification
155. A security policy oracle
156. Systematic editing
157. Looking back on the language and hardware revolutions
158. How's the parallel computing revolution going?
159. The Good Block: Hardware/Software Design for Composable, Block-Atomic Processors
160. Keynote address II: How's the parallel computing revolution going?
161. A shape analysis for optimizing parallel graph programs
162. Ulterior Reference Counting: Fast Garbage Collection without a Long Wait
163. A garbage collection design and bakeoff in JMTk: An efficient extensible Java memory management toolkit
164. Fast garbage collection without a long wait
165. Edward I. Condren, Chaucer from Prentice to Poet: The Metaphor of Love in Dream Visions and “Troilus and Criseyde.” Gainesville, Fla.: University Press of Florida, 2008. Pp. xiv, 240; black-and-white figures and tables. $59.95.
166. La prossima vita at TOPLAS
167. Evolving Compiler Heuristics to Manage Communication and Contention
168. Efficient, context-sensitive detection of real-world semantic attacks
169. Jinn
170. Z-rays
171. PACER
172. La dolce vita at TOPLAS
173. Older-first garbage collection in practice: evaluation in a Java Virtual Machine
174. Beltway: Getting around Garbage Collection Gridlock
175. In or out?: putting write barriers in their place
176. Beltway: Getting Around Garbage Collection Gridlock
177. Detecting memory leaks in managed languages with Cork
178. A concurrent dynamic analysis framework for multicore hardware
179. Debug all your code
180. Finding the Bloom of the Cactus Generation: Improving the Quality of Life for Seniorsby Maggie Walters
181. Dynamic shape analysis via degree metrics
182. Laminar
183. Dynamic software updates
184. Leak pruning
185. An evaluation of the TRIPS computer system
186. Pretenuring For Java
187. The End-of-Life Namaste Care Program for People with Dementia, by Joyce Simard
188. Strategies for mapping dataflow blocks to distributed hardware
189. Feature selection and policy optimization for distributed instruction placement using reinforcement learning
190. Tolerating memory leaks
191. Improving publication quality by reducing bias with double-blind reviewing and author response
192. Paper and proposal reviews
193. Session details: Heap measurement and analysis II
194. No bit left behind
195. Immix
196. Probabilistic calling context
197. Tracking bad apples
198. Starc
199. Recovering and using use-case-diagram-to-source-code traceability links
200. Cork
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.