Futures and promises

Results: 282



#Item
31BDIM  1 Business Alignment Viewed Through the Eyeglass of Promises

BDIM 1 Business Alignment Viewed Through the Eyeglass of Promises

Add to Reading List

Source URL: markburgess.org

Language: English - Date: 2016-03-24 13:28:29
32Verifying Read-Copy-Update in a Logic for Weak Memory Joseph Tassarotti Derek Dreyer  Viktor Vafeiadis

Verifying Read-Copy-Update in a Logic for Weak Memory Joseph Tassarotti Derek Dreyer Viktor Vafeiadis

Add to Reading List

Source URL: plv.mpi-sws.org

Language: English - Date: 2015-04-27 14:17:24
33Can Asynchronous Exceptions Expire? Benjamin Morandi, Sebastian Nanz, Bertrand Meyer Chair of Software Engineering, ETH Zurich, Switzerland  http://se.inf.ethz.ch/

Can Asynchronous Exceptions Expire? Benjamin Morandi, Sebastian Nanz, Bertrand Meyer Chair of Software Engineering, ETH Zurich, Switzerland http://se.inf.ethz.ch/

Add to Reading List

Source URL: se.inf.ethz.ch

Language: English - Date: 2013-09-06 13:17:31
34Work Stealing for Interactive Services to Meet Target Latency ∗ Jing Li∗ Kunal Agrawal∗ Sameh Elnikety† Yuxiong He† I-Ting Angelina Lee∗ Chenyang Lu∗

Work Stealing for Interactive Services to Meet Target Latency ∗ Jing Li∗ Kunal Agrawal∗ Sameh Elnikety† Yuxiong He† I-Ting Angelina Lee∗ Chenyang Lu∗

Add to Reading List

Source URL: www.cse.wustl.edu

Language: English - Date: 2016-02-16 11:37:39
35Verifying Read-Copy-Update in a Logic for Weak Memory Joseph Tassarotti Derek Dreyer  Viktor Vafeiadis

Verifying Read-Copy-Update in a Logic for Weak Memory Joseph Tassarotti Derek Dreyer Viktor Vafeiadis

Add to Reading List

Source URL: plv.mpi-sws.org

Language: English - Date: 2015-04-27 14:19:25
36Testing in Future Space Why you needn’t Await for the Future[ScalaTest] Bill Venners Artima, Inc.

Testing in Future Space Why you needn’t Await for the Future[ScalaTest] Bill Venners Artima, Inc.

Add to Reading List

Source URL: www.nescala.org

Language: English
37Towards Timed Models for Cyber-Physical Security Protocols Max Kanovich∗ , Tajana Ban Kirigin† , Vivek Nigam‡ , Andre Scedrov§ and Carolyn Talcott¶ ∗  ∗

Towards Timed Models for Cyber-Physical Security Protocols Max Kanovich∗ , Tajana Ban Kirigin† , Vivek Nigam‡ , Andre Scedrov§ and Carolyn Talcott¶ ∗ ∗

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2014-07-17 09:25:54
38The OpenACC
 Application Programming Interface R 1

The OpenACC Application Programming Interface R 1

Add to Reading List

Source URL: www.openacc.org

Language: English - Date: 2016-02-12 11:39:31
39PROMISE YOU A ROSE GARDEN An essay about system management Mark Burgess 1 January

PROMISE YOU A ROSE GARDEN An essay about system management Mark Burgess 1 January

Add to Reading List

Source URL: markburgess.org

Language: English - Date: 2015-12-29 06:43:20
40DOI: CSIS120712021M  EasyFJP: Providing Hybrid Parallelism as a Concern for Divide and Conquer Java Applications Cristian Mateos1 , Alejandro Zunino1 , and Mat´ıas Hirsch2 1

DOI: CSIS120712021M EasyFJP: Providing Hybrid Parallelism as a Concern for Divide and Conquer Java Applications Cristian Mateos1 , Alejandro Zunino1 , and Mat´ıas Hirsch2 1

Add to Reading List

Source URL: www.doiserbia.nb.rs

Language: English - Date: 2013-07-08 04:57:56