Your search for 40737 returns 206 document(s) |
A Gradual approach to a more trustworthy, yet scalable, proof-carrying code, Hal. 47-62 |
Author: Robert R. Schneck; George C. Necula; | Call Number: SEM-281 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The parallel performance of groundwater flow code on the cray T3D, Hal. 131-136 |
Author: S.F. Ashby; R.D. Falgout; S.G. Smith; A.F.B. Tompson; | Call Number: SEM-229 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Integrating the QMR method with first principles material science application code, Hal. 213-218 |
Author: N.M. Nachtigal; W.A. Shilton; G.M. Stocks; D.M.C. Nicholson; Y. Wang; | Call Number: SEM-229 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A method of detecting stack overflow vulnerability of binary code of a component, 212-216 |
Author: Hang Zhengbo, Yang Hebiao, Da Wei; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A memory improvement on decoding of the (41, 21, 9) quadratic residue code, 361-365 |
Author: Hung-Peng Lee, Hsin-Chiu Chang; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Development of a reliable GUI for DiaHDL: A Web-Based VHDL Code Generator |
Author: Anita Ratna Dewi Susanti, Wildan Thoyib, Thomas Schumann; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Deteksi code smell kode progam dalam representasi ast dengan pendekatan by rules ( hal. E-23/E-28 ) |
Author: Hanson Prpihantoro Putro,Inggriani Liem; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Steal this code: create reusable software component for windows 95 and windows NT |
Author: Williams, Al; | Call Number: 005.265 Wil s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trojans, Worms, and spyware: a computer security professional's guide to malicious code |
Author: Erbschloe, Michael; | Call Number: 005.84 Erb t | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Practical Algorithms for Image Analysis: Description, Examples, and Code + 1Cd |
Author: Seul, Michael; | Call Number: 621.367 Seu p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|