BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
code (5)
memori (5)
embed (3)
tera (2)
rule (2)

Stem byte$ (all stems)

20 papers:

SIGMODSIGMOD-2015-FengLKX #in memory #layout #memory management #named
ByteSlice: Pushing the Envelop of Main Memory Data Processing with a New Storage Layout (ZF, EL, BK, WX), pp. 31–46.
CHICHI-2014-TaylorKHIH
Type-hover-swipe in 96 bytes: a motion sensing mechanical keyboard (ST, CK, OH, SI, JH), pp. 1695–1704.
DACDAC-2013-Ghosh #memory management
Path to a TeraByte of on-chip memory for petabit per second bandwidth with < 5watts of power (SG), p. 2.
SASSAS-2013-DudkaPV #low level #verification
Byte-Precise Verification of Low-Level List Manipulation (KD, PP, TV), pp. 215–237.
DocEngDocEng-2012-WongSL #documentation #multi
Full-text search on multi-byte encoded documents (RKW, FS, NL), pp. 227–236.
ICPCICPC-2012-KeivanlooRR #clone detection #detection #named #semantics
SeByte: A semantic clone detection tool for intermediate languages (IK, CKR, JR), pp. 247–249.
FSEFSE-2012-XuCBB #design #video
From pixels to bytes: evolutionary scenario based design with video (HX, OC, NB, BB), p. 31.
SOSPSOSP-2009-CastroCMPADBB #fault #performance
Fast byte-granularity software fault isolation (MC, MC, JPM, MP, PA, AD, PB, RB), pp. 45–58.
SOSPSOSP-2009-ConditNFILBC #memory management #persistent
Better I/O through byte-addressable, persistent memory (JC, EBN, CF, EI, BCL, DB, DC), pp. 133–146.
POPLPOPL-2007-TuchKN #logic
Types, bytes, and separation logic (HT, GK, MN), pp. 97–108.
ICSEICSE-2006-FrantzeskouSGK #effectiveness #identification #source code #using
Effective identification of source code authors using byte-level information (GF, ES, SG, SKK), pp. 893–896.
CIKMCIKM-2005-Hofmann
From bits and bytes to information and knowledge (TH), p. 3.
DATEDATE-2003-LangeK #configuration management #design #embedded #framework #hardware
Virtual Hardware Byte Code as a Design Platform for Reconfigurable Embedded Systems (SL, UK), pp. 10302–10309.
SACSAC-2003-Mahoney #detection #network
Network Traffic Anomaly Detection Based on Packet Bytes (MVM), pp. 346–350.
FMFME-2002-Casset #development #embedded #formal method #java #using #verification
Development of an Embedded Verifier for Java Card Byte Code Using Formal Methods (LC), pp. 290–309.
PADLPADL-2002-Rhiger #compilation #embedded #source code
Compiling Embedded Programs to Byte Code (MR), pp. 120–136.
VLDBVLDB-2001-GarofalakisG #approximate #query
Approximate Query Processing: Taming the TeraBytes (MNG, PBG).
AdaTRI-Ada-1997-Balfour #ada #distributed #java
Combining Ada 95, Java Byte Code, and the Distributed Systems Annex (BB), pp. 247–260.
SIGMODSIGMOD-1987-GrayP #cpu #memory management
The 5 Minute Rule for Trading Memory for Disk Accesses and The 10 Byte Rule for Trading Memory for CPU Time (JG, GRP), pp. 395–398.
LISPLISP-1980-Deutsch #implementation
ByteLisp and its Alto Implementation (LPD), pp. 231–242.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.