Works matching Device drivers (Computer programs)


Results: 72
    1
    2
    3

    Symbolic object code analysis.

    Published in:
    International Journal on Software Tools for Technology Transfer, 2014, v. 16, n. 1, p. 81, doi. 10.1007/s10009-012-0256-8
    By:
    • Mühlberg, Jan;
    • Lüttgen, Gerald
    Publication type:
    Article
    4

    Phyx: phylogenetic tools for unix.

    Published in:
    Bioinformatics, 2017, v. 33, n. 12, p. 1886, doi. 10.1093/bioinformatics/btx063
    By:
    • Brown, Joseph W.;
    • Walker, Joseph F.;
    • Smith, Stephen A.
    Publication type:
    Article
    5
    6
    7

    Una visita a la red.

    Published in:
    Revista Española de Pedagogía, 2007, n. 238, p. 596
    By:
    • García, David Reyero
    Publication type:
    Article
    8
    9
    10
    11
    12

    USING SIMICS IN EDUCATION.

    Published in:
    Intel Technology Journal, 2013, v. 17, n. 2, p. 158
    By:
    • Guenzel, Robert
    Publication type:
    Article
    13

    DEVICE DRIVER SYNTHESIS.

    Published in:
    Intel Technology Journal, 2013, v. 17, n. 2, p. 136
    By:
    • Vij, Mona;
    • Keys, John;
    • Raghunath, Arun;
    • Hahn, Scott;
    • Zimmer, Vincent;
    • Ryzhyk, Leonid;
    • Walker, Adam;
    • Legg, Alexander
    Publication type:
    Article
    14
    15

    Adobe and Linux.

    Published in:
    Metro, 2005, n. 143, p. 149
    By:
    • Jones, Mike
    Publication type:
    Article
    16
    17
    18
    19

    Ada Gems.

    Published in:
    Ada User Journal, 2013, v. 34, n. 1, p. 57
    Publication type:
    Article
    20

    Type-safe concurrent resource sharing.

    Published in:
    Concurrency & Computation: Practice & Experience, 2011, v. 23, n. 8, p. 767, doi. 10.1002/cpe.1642
    By:
    • Wittie, Lea;
    • Lockhart, Jonathan
    Publication type:
    Article
    21
    22
    23

    Fault localization using a model checker.

    Published in:
    Software Testing: Verification & Reliability, 2010, v. 20, n. 2, p. 149, doi. 10.1002/stvr.421
    By:
    • Griesmayer, Andreas;
    • Staber, Stefan;
    • Bloem, Roderick
    Publication type:
    Article
    24
    25
    26
    27

    Security.

    Published in:
    IEEE Internet Computing, 2007, v. 11, n. 1, p. 16
    By:
    • Skratt, Alison
    Publication type:
    Article
    28
    29

    A COMPOSITION ENVIRONMENT FOR MPI PROGRAMS.

    Published in:
    International Journal of High Performance Computing Applications, 2007, v. 21, n. 2, p. 166, doi. 10.1177/1094342007077858
    By:
    • Desai, Narayan;
    • Lusk, Ewing;
    • Bradshaw, Rick
    Publication type:
    Article
    30
    31
    32
    33

    CDS/ISIS information.

    Published in:
    Information Development, 2010, v. 26, n. 1, p. 11, doi. 10.1177/0266666909358297
    By:
    • Hopkinson, Alan
    Publication type:
    Article
    34
    35
    36
    37
    38
    39
    40
    41

    Reviews.

    Published in:
    EMedia Professional, 1999, v. 12, n. 1, p. 65
    By:
    • Starrett, Robert A.
    Publication type:
    Article
    42
    43
    44
    45
    46
    47
    48
    49
    50