Dependable and Historic Computing最新文献

筛选
英文 中文
On Building a Referee's Avatar 关于创建裁判的化身
Dependable and Historic Computing Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-24541-1_3
A. Avizienis
{"title":"On Building a Referee's Avatar","authors":"A. Avizienis","doi":"10.1007/978-3-642-24541-1_3","DOIUrl":"https://doi.org/10.1007/978-3-642-24541-1_3","url":null,"abstract":"","PeriodicalId":169361,"journal":{"name":"Dependable and Historic Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133046811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Brian Randell: A Biographical Note 布莱恩·兰德尔:传记笔记
Dependable and Historic Computing Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-24541-1_2
John L. Lloyd, T. Anderson
{"title":"Brian Randell: A Biographical Note","authors":"John L. Lloyd, T. Anderson","doi":"10.1007/978-3-642-24541-1_2","DOIUrl":"https://doi.org/10.1007/978-3-642-24541-1_2","url":null,"abstract":"","PeriodicalId":169361,"journal":{"name":"Dependable and Historic Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133331798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual Fault Tolerance 虚拟容错
Dependable and Historic Computing Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-24541-1_18
P. Denning
{"title":"Virtual Fault Tolerance","authors":"P. Denning","doi":"10.1007/978-3-642-24541-1_18","DOIUrl":"https://doi.org/10.1007/978-3-642-24541-1_18","url":null,"abstract":"","PeriodicalId":169361,"journal":{"name":"Dependable and Historic Computing","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115902693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IBM-ACS: Reminiscences and Lessons Learned from a 1960's Supercomputer Project IBM-ACS: 20世纪60年代超级计算机项目的回忆和教训
Dependable and Historic Computing Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-24541-1_15
L. Conway
{"title":"IBM-ACS: Reminiscences and Lessons Learned from a 1960's Supercomputer Project","authors":"L. Conway","doi":"10.1007/978-3-642-24541-1_15","DOIUrl":"https://doi.org/10.1007/978-3-642-24541-1_15","url":null,"abstract":"","PeriodicalId":169361,"journal":{"name":"Dependable and Historic Computing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122953968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
From Theory to Practice: The Invention of Programming, 1947-51 从理论到实践:程序设计的发明,1947-51
Dependable and Historic Computing Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-24541-1_4
M. Campbell-Kelly
{"title":"From Theory to Practice: The Invention of Programming, 1947-51","authors":"M. Campbell-Kelly","doi":"10.1007/978-3-642-24541-1_4","DOIUrl":"https://doi.org/10.1007/978-3-642-24541-1_4","url":null,"abstract":"","PeriodicalId":169361,"journal":{"name":"Dependable and Historic Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115291815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Incremental Design: Programming with Holes and Evolvers 渐进式设计:带有漏洞和进化者的编程
Dependable and Historic Computing Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-24541-1_28
R. Morrison, D. Balasubramaniam, B. Warboys
{"title":"Incremental Design: Programming with Holes and Evolvers","authors":"R. Morrison, D. Balasubramaniam, B. Warboys","doi":"10.1007/978-3-642-24541-1_28","DOIUrl":"https://doi.org/10.1007/978-3-642-24541-1_28","url":null,"abstract":"","PeriodicalId":169361,"journal":{"name":"Dependable and Historic Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131768483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Swords and Ploughshares: Connections between Computer Projects for War and Peace, 1945 - 55 《刀剑与犁头:战争与和平计算机项目之间的联系,1945 - 55》
Dependable and Historic Computing Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-24541-1_24
S. Lavington
{"title":"Swords and Ploughshares: Connections between Computer Projects for War and Peace, 1945 - 55","authors":"S. Lavington","doi":"10.1007/978-3-642-24541-1_24","DOIUrl":"https://doi.org/10.1007/978-3-642-24541-1_24","url":null,"abstract":"","PeriodicalId":169361,"journal":{"name":"Dependable and Historic Computing","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125392903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wallpaper Maps 壁纸的地图
Dependable and Historic Computing Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-24541-1_27
M. D. Mcilroy, D. McIlroy
{"title":"Wallpaper Maps","authors":"M. D. Mcilroy, D. McIlroy","doi":"10.1007/978-3-642-24541-1_27","DOIUrl":"https://doi.org/10.1007/978-3-642-24541-1_27","url":null,"abstract":"","PeriodicalId":169361,"journal":{"name":"Dependable and Historic Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129837195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Making Experiments Dependable 使实验可靠
Dependable and Historic Computing Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-24541-1_26
R. Maxion
{"title":"Making Experiments Dependable","authors":"R. Maxion","doi":"10.1007/978-3-642-24541-1_26","DOIUrl":"https://doi.org/10.1007/978-3-642-24541-1_26","url":null,"abstract":"","PeriodicalId":169361,"journal":{"name":"Dependable and Historic Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124488247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Causality in Structured Occurrence Nets 结构化事件网中的因果关系
Dependable and Historic Computing Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-24541-1_22
J. Kleijn, M. Koutny
{"title":"Causality in Structured Occurrence Nets","authors":"J. Kleijn, M. Koutny","doi":"10.1007/978-3-642-24541-1_22","DOIUrl":"https://doi.org/10.1007/978-3-642-24541-1_22","url":null,"abstract":"","PeriodicalId":169361,"journal":{"name":"Dependable and Historic Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130033657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信