Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2648)
Editorial
(401)
by Journal
by Funding Agency
Clear filters
Powered by
634 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: Topic D - Software
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
21
22
23
24
25
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
VIMM: Runtime Integrity Measurement of a Virtualized Operating System
Chun Suen
10.3217/jucs-016-04-0554
28-02-2010
Unique: 369 | Total: 458
| Access Period:
554-576
HTML
XML
PDF
Research Article
Static Analysis of the XEN Kernel using Frama-C
Armand Puccetti
10.3217/jucs-016-04-0543
28-02-2010
Unique: 365 | Total: 427
| Access Period:
543-553
HTML
XML
PDF
Research Article
Towards a Virtual Trusted Platform
Martin Pirker
,
Ronald Toegl
10.3217/jucs-016-04-0531
28-02-2010
Unique: 422 | Total: 753
| Access Period:
531-542
HTML
XML
PDF
Research Article
Situational Method Engineering: State-of-the-Art Review
Brian Henderson-Sellers
,
Jolita Ralyté
10.3217/jucs-016-03-0424
01-02-2010
Unique: 453 | Total: 566
| Access Period:
424-478
HTML
XML
PDF
Research Article
Enabling Personal Privacy for Pervasive Computing Environments
Susana Bagüés
,
Andreas Zeidler
,
Cornel Klein
,
Carlos Valdivielso
,
Ignacio Matias
10.3217/jucs-016-03-0341
01-02-2010
Unique: 435 | Total: 508
| Access Period:
341-371
HTML
XML
PDF
Research Article
Using Lisp Implementation Internals Unportable but Fun
Christophe Rhodes
10.3217/jucs-016-02-0315
28-01-2010
Unique: 398 | Total: 469
| Access Period:
315-339
HTML
XML
PDF
Research Article
Systematic Unit Testing in a Read-eval-print Loop
Kurt Nørmark
10.3217/jucs-016-02-0296
28-01-2010
Unique: 474 | Total: 575
| Access Period:
296-314
HTML
XML
PDF
Research Article
Embedding Hygiene-Compatible Macros in an Unhygienic Macro System
Pascal Costanza
,
Theo Hondt
10.3217/jucs-016-02-0271
28-01-2010
Unique: 669 | Total: 865
| Access Period:
271-295
HTML
XML
PDF
Research Article
Revisiting the Visitor: the "Just Do It" Pattern
Didier Verna
10.3217/jucs-016-02-0246
28-01-2010
Unique: 402 | Total: 497
| Access Period:
246-270
HTML
XML
PDF
Research Article
An Extensible Interpreter Framework for Software Transactional Memory
Charlotte Herzeel
,
Pascal Costanza
,
Theo Hondt
10.3217/jucs-016-02-0221
28-01-2010
Unique: 381 | Total: 444
| Access Period:
221-245
HTML
XML
PDF
Research Article
Parametric Model-Checking of Stopwatch Petri Nets
Louis-Marie Traonouez
,
Didier Lime
,
Olivier Roux
10.3217/jucs-015-17-3273
01-11-2009
Unique: 358 | Total: 412
| Access Period:
3273-3304
HTML
XML
PDF
Research Article
Modeling of Robustness Margins of the Control of a Predictive Control-Supervisory Architecture
Achraf Telmoudi
,
Lotfi Nabli
,
Radhi Hiri
10.3217/jucs-015-17-3231
01-11-2009
Unique: 430 | Total: 544
| Access Period:
3231-3245
HTML
XML
PDF
21
22
23
24
25
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK