Works matching DE "COMPUTER memory management"
1
- Journal of Information Science & Engineering, 2011, v. 27, n. 5, p. 1713
- CHIN-HSIEN WU;
- CHEN-KAI JAN;
- TEI-WEI KUO
- Article
2
- Journal of Information Science & Engineering, 2010, v. 26, n. 2, p. 409
- JING-XIN WANG;
- YUNG-CHANG CHIU;
- SU, ALVIN W. Y.;
- CE-KUEN SHIEH
- Article
3
- International Journal on Software Tools for Technology Transfer, 2006, v. 8, n. 3, p. 180, doi. 10.1007/s10009-005-0191-z
- Article
4
- Bioinformatics, 2012, v. 28, n. 24, p. 3326, doi. 10.1093/bioinformatics/bts606
- Zheng, Xiuwen;
- Levine, David;
- Shen, Jess;
- Gogarten, Stephanie M.;
- Laurie, Cathy;
- Weir, Bruce S.
- Article
5
- Intel Technology Journal, 2009, v. 13, n. 4, p. 80
- Dunning, Dave;
- Mooney, Randy;
- Stolt, Pat;
- Casper, Bryan
- Article
6
- Traitement du Signal, 2025, v. 42, n. 2, p. 719, doi. 10.18280/ts.420210
- Hamadi, Fatma Z.;
- Hamidatou, Mohamed L.;
- Hamami-Mitiche, Latifa;
- Belkacem, Sabrina Ait;
- Bouzid, Bouchra
- Article
7
- Theory & Practice of Logic Programming, 2013, v. 13, n. 6, p. 959, doi. 10.1017/S1471068412000075
- PHAN, QUAN;
- JANSSENS, GERDA;
- SOMOGYI, ZOLTAN
- Article
8
- Theory & Practice of Logic Programming, 2013, v. 13, n. 1, p. 71, doi. 10.1017/S1471068411000421
- NGUYEN, PHUONG-LAN;
- DEMOEN, BART
- Article
9
- Theory & Practice of Logic Programming, 2012, v. 12, n. 1/2, p. 35, doi. 10.1017/S1471068411000482
- CARLSSON, MATS;
- MILDNER, PER
- Article
10
- Computing, 2012, v. 94, n. 1, p. 69, doi. 10.1007/s00607-011-0167-7
- Deng, Yuhui;
- Li, Kai;
- Zhang, Lingwei;
- Fang, Ming;
- Huang, Xinyu
- Article
11
- International Journal of Network Management, 2014, v. 24, n. 4, p. 304, doi. 10.1002/nem.1866
- Article
12
- Banat's Journal of Biotechnology, 2011, v. 2, n. 4, p. 93
- Article
13
- International Journal of Distributed Sensor Networks, 2018, v. 14, n. 11, p. 1, doi. 10.1177/1550147718806480
- Shen, Jing;
- Wan, Jian;
- Lim, Se-Jung;
- Yu, Lifeng
- Article
14
- EE: Evaluation Engineering, 2004, v. 43, n. 10, p. 42
- Article
15
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 3, p. 305, doi. 10.1109/TDSC.2012.10
- Bishop, Matt;
- Engle, Sophie;
- Howard, Damien;
- Whalen, Sean
- Article
16
- Psychonomic Bulletin & Review, 2018, v. 25, n. 2, p. 636, doi. 10.3758/s13423-018-1450-9
- Tempel, Tobias;
- Frings, Christian
- Article
17
- Asia-Pacific Journal of Operational Research, 2012, v. 29, n. 3, p. 1240018-1, doi. 10.1142/S0217595912400180
- ZHAO, XUFENG;
- NAKAMURA, SYOUJI;
- NAKAGAWA, TOSHIO
- Article
18
- Logical Methods in Computer Science (LMCS), 2014, v. 10, n. 2, p. 1, doi. 10.2168/LMCS-10(2:15)2014
- FRANCALANZA, ADRIAN;
- DEVRIES, EDSKO;
- HENNESSY, MATTHEW
- Article
19
- New Generation Computing, 2018, v. 36, n. 3, p. 203, doi. 10.1007/s00354-018-0037-3
- Article
20
- Angewandte Chemie, 2025, v. 137, n. 4, p. 1, doi. 10.1002/ange.202416041
- Wu, Zitong;
- Liang, Xinchao;
- Liu, Yi;
- Xu, Maoping;
- Zhu, Rui;
- Tai, Guoan
- Article
21
- Multimedia Tools & Applications, 2018, v. 77, n. 9, p. 11137, doi. 10.1007/s11042-017-5363-9
- Zhang, Xiaosong;
- Tan, Yu-An;
- Zhang, Changyou;
- Xue, Yuan;
- Li, Yuanzhang;
- Zheng, Jun
- Article
22
- International Journal for Numerical Methods in Fluids, 2013, v. 73, n. 10, p. 869, doi. 10.1002/fld.3827
- Kannan, R.;
- Harrand, V.;
- Lee, M.;
- Przekwas, A. J.
- Article
23
- Requirements Engineering, 2005, v. 10, n. 4, p. 247, doi. 10.1007/s00766-005-0009-2
- Lauesen, Søren;
- Vium, Jens Peder
- Article
24
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2014, v. 18, n. 3, p. 469, doi. 10.1007/s00500-013-1069-8
- Xie, Xiao-Feng;
- Liu, Jiming;
- Wang, Zun-Jing
- Article
25
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2011, v. 15, n. 2, p. 311, doi. 10.1007/s00500-010-0547-5
- Xingguang Peng;
- Xiaoguang Gao;
- Shengxiang Yang
- Article
26
- Journal of Electronic Imaging, 2014, v. 23, n. 5, p. 1, doi. 10.1117/1.JEI.23.5.053012
- Butt, Shahzad Ahmad;
- Mancini, Stéphane;
- Rousseau, Frédéric;
- Lavagno, Luciano
- Article
27
- Journal of Cryptology, 1996, v. 9, n. 2, p. 111, doi. 10.1007/BF00190805
- Article
28
- Mehran University Research Journal of Engineering & Technology, 2019, v. 38, n. 2, p. 305, doi. 10.22581/muet1982.1902.05
- TABBASSUM, KAVITA;
- TALPUR, SHAHNAWAZ;
- NAREJO, SANAM;
- LAGHARI, NOOR-U.-ZAMAN
- Article
29
- Annals of Operations Research, 2011, v. 183, n. 1, p. 95, doi. 10.1007/s10479-009-0596-2
- Duarte, Abraham;
- Martí, Rafael;
- Glover, Fred;
- Gortazar, Francisco
- Article
30
- Annals of Operations Research, 2011, v. 183, n. 1, p. 7, doi. 10.1007/s10479-009-0573-9
- Campos, Vicente;
- Piñana, Estefanía;
- Martí, Rafael
- Article
31
- Annals of Operations Research, 1994, v. 53, n. 1-4, p. 249, doi. 10.1007/BF02136831
- Nicol, David;
- Fujimoto, Richard
- Article
32
- ISeCure, 2020, v. 12, n. 2, p. 113
- Nooribakhsh, Mahsa;
- Mollamotalebi, Mahdi
- Article
33
- Informatica Economica, 2010, v. 14, n. 4, p. 30
- Article
34
- Journal of Classification, 2025, v. 42, n. 2, p. 414, doi. 10.1007/s00357-024-09499-7
- Mei, Ying;
- Lu, Chengbo;
- Tang, Chenghao;
- Wu, Yonghua;
- Meng, Guoqing
- Article
35
- International Journal of Performability Engineering, 2018, v. 14, n. 11, p. 2683, doi. 10.23940/ijpe.18.11.p14.26832691
- Yang Zhang;
- Yanan Liang;
- Dongwen Zhang
- Article
36
- Advances in Human-Computer Interaction, 2009, v. 2009, p. 2, doi. 10.1155/2009/121494
- Schmutz, Peter;
- Heinz, Silvia;
- Métrailler, Yolanda;
- Opwis, Klaus
- Article
37
- Software: Practice & Experience, 2017, v. 47, n. 1, p. 97, doi. 10.1002/spe.2406
- Rudafshani, Masoomeh;
- Ward, Paul A. S.
- Article
38
- Software: Practice & Experience, 2015, v. 45, n. 10, p. 1307, doi. 10.1002/spe.2275
- Šor, Vladimir;
- Srirama, Satish Narayana;
- Salnikov‐Tarnovski, Nikita
- Article
39
- Software: Practice & Experience, 2014, v. 44, n. 8, p. 973, doi. 10.1002/spe.2184
- Allevato, Anthony;
- Edwards, Stephen H.
- Article
40
- Sensors (14248220), 2017, v. 17, n. 5, p. 994, doi. 10.3390/s17050994
- Yang Liu;
- Picard, Sean;
- Williamson, Carey
- Article
41
- Sensors (14248220), 2010, v. 10, n. 1, p. 292, doi. 10.3390/s100100292
- Rizvi, Sanam Shahla;
- Tae-Sun Chung
- Article
42
- Informatica (03505596), 2007, v. 31, n. 1, p. 105
- Khan, Samee Ullah;
- Ahmad, Ishfaq
- Article
43
- Informatica (03505596), 2005, v. 29, n. 2, p. 233
- Baskiyar, S.;
- Meghanathan, N.
- Article
44
- Journal of Computer-Aided Molecular Design, 2004, v. 18, n. 6, p. 401, doi. 10.1007/s10822-004-3752-4
- Lehtonen, Jukka;
- Still, Dan-Johan;
- Rantanen, Ville-v.;
- Ekholm, Jan;
- Björklund, Dag;
- Iftikhar, Zuhair;
- Huhtala, Mikko;
- Repo, Susanna;
- Jussila, Antti;
- Jaakkola, Jussi;
- Pentikäinen, Olli;
- Nyrönen, Tommi;
- Salminen, Tiina;
- Gyllenberg, Mats;
- Johnson, Mark
- Article
45
- International Journal for Numerical Methods in Fluids, 2025, v. 97, n. 3, p. 283, doi. 10.1002/fld.5344
- Flint, Clément;
- Huppé, Atoli;
- Helluy, Philippe;
- Bramas, Bérenger;
- Genaud, Stéphane
- Article
46
- Microwave & Optical Technology Letters, 2003, v. 37, n. 3, p. 203, doi. 10.1002/mop.10869
- Article
47
- International Archives of the Photogrammetry, Remote Sensing & Spatial Information Sciences, 2018, v. 42, n. 2, p. 1207, doi. 10.5194/isprs-archives-XLII-2-1207-2018
- Wujanz, D.;
- Schaller, S.;
- Gielsdorf, F.;
- Gründig, L.
- Article
48
- International Journal of Information Security, 2009, v. 8, n. 3, p. 211, doi. 10.1007/s10207-008-0075-9
- Cook, Debra;
- Yung, Moti;
- Keromytis, Angelos
- Article
49
- International Journal of Information Security, 2005, v. 4, n. 3, p. 155, doi. 10.1007/s10207-004-0057-5
- von Oheimb, David;
- Lotz, Volkmar;
- Walter, Georg
- Article
50
- Computer Journal, 2014, v. 57, n. 6, p. 906, doi. 10.1093/comjnl/bxt088
- Bessiere, Christian;
- Brito, Ismel;
- Gutierrez, Patricia;
- Meseguer, Pedro
- Article