Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Peters, James
University of Manitobe
Winnipeg, Canada
  Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 8 of 8 reviews

   
  Embedded real-time systems
Calvez J., Wyche A. (trans.), Edmundson C. (trans.), John Wiley & Sons, Inc., New York, NY, 1993.  Type: Book (9780471935636)

The title of this translation of Calvez’s French original [1] is misleading. Rather than giving a specification and design methodology for embedded real-time systems, this book gives a somewhat tangled presentation of a metho...

Mar 1 1995  
  Semantics of type theory
Streicher T., Birkhäuser Boston Inc., Cambridge, MA, 1991.  Type: Book (9780817635947)

From the point of view of its mathematics, logic, and type theory, this book is convincing. It is written with great intensity. Its central topic is the extraction of programs from constructive proofs. It does this by developing a cate...

Aug 1 1994  
  Linking programs incrementally
Quong R., Linton M. ACM Transactions on Programming Languages and Systems 13(1): 1-20, 1991.  Type: Article

The incremental linker called Inclink processes only changed modules. By an experiment, it has been estimated that  Inclink  generates a new executable in time proportional to the size of a change. This contrasts favo...

Aug 1 1992  
  Parameter transmission abstractions
Jokinen M. The Computer Journal 33(2): 133-139, 1990.  Type: Article

Jokinen refers to the technique described here as a linguistic mechanism; it is used to define hidden actions like copying, type conversions, or assigning default values to optional parameters as part of parameter transmissions resulti...

Jun 1 1991  
  Large-scale randomization techniques
Wagner N., Putter P., Cain M.  Advances in cryptology--CRYPTO ’86 (, Santa Barbara, CA, Aug 11-15, 1987) 4041987.  Type: Proceedings

The authors provide generalizations of Massey’s ‘Rip van Winkle’ cipher [1], which is notable because of a provable lower bound on the average number of computations needed to break it. The authors prove t...

Oct 1 1989  
  Lazy memo-functions
Hughes J. (ed)  Functional programming languages and computer architecture (, Nancy, France, 1461985.  Type: Proceedings

This paper presents a variation of an ordinary memo function, which keeps track of all its past argument(s) and corresponding result(s). Instead of recomputing an old result, a memo function identifies reused arguments and reuses them....

Feb 1 1987  
  Introduction to machine and assembly language programming
Gust P., Prentice-Hall, Inc., Upper Saddle River, NJ, 1986.  Type: Book (9789780134864167)

Gust presents machine and assembly language programming on two different hypothetical computers. The first half of this book deals with a 16-bit machine with six registers (just one accumulator and one index register), four addressing ...

Jun 1 1986  
  System software: an introduction to systems programming
Beck L., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 1985.  Type: Book (9789780201109504)

This text is built around a SIC (Simplified Instruction Computer) with five 24-bit registers (one accumulator, one index register, a PC, status register, and linkage register), three addressing types (simple, indirect, immediate), and ...

Feb 1 1986  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy