Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Ballance, Robert
The University of New Mexico
Albuquerque, New Mexico
  Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 13 reviews

   
  Pro Apache Log4j (2nd ed.)
Gupta S., APress, LP, Berkeley, CA, 2005. 224 pp.  Type: Book (9781590594995)

This solid introduction to using, configuring, and extending the popular Log4j logging framework for Java applications quietly leads the reader through a forest of options and alternatives, explains the key choices, and provides small ...

Jun 27 2006  
  Maximizing performance and scalability with IBM Websphere
Neat A., APress, LP, 2003. 552 pp.  Type: Book (9781590591307)

WebSphere is IBM’s entry into the application server market. It is a collection of tools that adapt, integrate, or provide an environment for serving Java Java 2 Platform, Enterprise Edition (J2EE) applications. Beneath t...

Mar 30 2004  
  Taming the IXP network processor
George L., Blume M. ACM SIGPLAN Notices 38(5): 26-37, 2003.  Type: Article

George and Blume introduce the problems in compiling Nova, a language for network processing, to the IXP1200 network processor. The difficulty is in generating code that uses specialized hardware while meeting both size and speed const...

Jan 19 2004  
  P: a code and design conventions preprocessor for Java
Depradine C., Chaudhuri P. Software--Practice & Experience 33(1): 61-76, 2003.  Type: Article

Programming conventions are pattern languages: they add readability, predictability, and coherence to program text by imposing patterns of usage. Like pattern languages, programming conventions establish a set of norms drawn from a wid...

Jul 21 2003  
  Object-oriented programming featuring graphical applications in Java
Laszlo M., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2001. 468 pp.  Type: Book (9780201726275)

Laszlo has attempted to give a broad overview of programming techniques, illustrated with examples drawn from the Java 2D graphics package. ...

May 14 2003  
  Java precisely
Sestoft P., MIT Press, Cambridge, MA, 2002. 100 pp.  Type: Book (9780262692762)

Sestoft provides a concise reference to the Java 2 programming language (versions 1.3 and 1.4). The stated audience for the book is people learning or using Java who need more details about the language than are usually provided in a ...

Mar 14 2003  
  Optimizing compilers for modern architectures: a dependence-based approach
Allen R., Kennedy K., Morgan Kaufmann Publishers Inc., San Francisco, CA, 2002. 816 pp.  Type: Book (9781558602861), Reviews: (1 of 2)

Data and control dependencies are the constraints among program statements that influence or dictate execution order. Dependence analysis extracts dependence information from a program in order to guide optimization and to expose pote...

Aug 29 2002  
  Extending Graham-Glanville techniques for optimal code generation
 ACM Transactions on Programming Languages and Systems 22(6): 973-1001, 2000.  Type: Article

Code generation is the phase in a compiler when the compiler translates from an internal, high-level representation of the program into actual machine instructions. Often, the high-level representation is a tree. Fundamentally, instruc...

Jan 1 2002  
  Compiler techniques for code compaction
Debray S., Evans W., Muth R., De Sutter B. ACM Transactions on Programming Languages and Systems 22(2): 378-415, 2000.  Type: Article

Cell phones, vehicles, appliances--all use embedded microcontrollers. Manufacturers need to fit increasingly sophisticated programs into small amounts of memory. Code compaction techniques are needed to meet these size ...

Jan 1 2001  
  Constraint-based array dependence analysis
Pugh W., Wonnacott D. ACM Transactions on Programming Languages and Systems 20(3): 635-678, 1998.  Type: Article

Array dependence analysis first detects aliases among arrayelements inside a nest of loops. If aliased elements are found, theymust be characterized by their data dependence relationships. If noinhibiting dependences are detected, the ...

May 1 1999  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy