Information Technology Reference
In-Depth Information
Greenhouse, A. (2003).
A programmer-oriented
approach to safe concurrency
. Unpublished doc-
toral dissertation, Carnegie Mellon University
School of Computer Science.
ware.ibm.com/software/rational/web/whitepa-
pers/2003/PurifyPlusPDF.pdf
IEEE. (2001).
IEEE standard test access port
and boundary-scan architecture
. IEEE Std.
1149.1-20 01.
Grehan, R. (1995).
BYTEmark Native Mode
Benchmark
, Release 2.0, [Computer software].
BYTE Magazine.
IEEE-ISTO. (2003).
The Nexus 5001 forum stan-
dard for global embedded processor debug inter-
face, version 2.0
[Electronic media]. Retrieved
March 11, 2008, from http://www.ieee-isto.org
Hollingsworth, J. K., Miller, B. P., & Cargille,
J. (1994). Dynamic program instrumentation for
scalable performance tools. In
Proceedings of the
Scalable High-Performance Computing Confer-
ence, Knoxville, TN
, (pp. 841-850).
Intel Corporation. (2006a).
Intel 64 and IA-32 ar-
chitectures software developer's manual (Vol. 3B,
System Programming Guide, Part 2)
. Retrieved
March 11, 2008, from www.intel.com/design/
processor/manuals/253669.pdf
Hill, J., Schmidt, D.C., & Slaby, J. (2007).
Sys-
tem execution modeling tools for evaluating the
quality of service of enterprise distributed real-
time and embedded systems
. In P. F. Tiako (Ed.).
Designing software-intensive systems: Methods
and principles
. Langston University, OK.
Intel Corporation. (2006b). Intel's tera-scale
research prepares for tens, hundreds of cores.
Technology@Intel Magazine
. Retrieved March
11, 2008, from http://www.intel.com/technology/
magazine/computing/tera-scale-0606.htm
Hilyard, J. (2005, January). No code can hide from
the profiling API in the .NET framework 2.0.
MSDN
Magazine
. Retrieved March 11, 2008, from http://
msdn.microsoft.com/msdnmag/issues/05/01/
CLRProfiler/
Jackson, D., & Rinard, M. (2000). Software
analysis: A roadmap. In
Proceedings of the IEEE
International Conference on Software Engineer-
ing
, (pp. 133-145).
Hunt, G., & Brubacher, D. (1999). Detours: Binary
interception of Win32 functions. In
Proceedings
of the 3
rd
USENIX Windows NT Symposium
, (pp.
135-14 4).
Kiczale, G., Hilsdale, E., Hugunin, J., Kersten, M.,
Palm, J., & Griswold, W. G. (2001).
An overview
of AspectJ
. (LNCS, 2072, pp. 327-355).
Larus, J., & Schnarr, E. (1995). EEL: Machine-
independent executable editing. In
Proceedings
of the ACM SIGPLAN Conference on Program-
ming Language Designes and Implementation
,
(pp. 291-300).
IBM Corporation. (1998).
PowerPC 604e RISC
microprocessor user's manual with supplement
for PowerPC 604 microprocessor
(Publication
No. G522-0330-00) [Electronic media]. Retrieved
March 11, 2008, from http://www-3.ibm.com/
chips/techlib/
Lee, H. B. (1997, July).
BIT: Bytecode instrument-
ing tool
. Unpublished master's thesis, University
of Colorado, Boulder, CO.
IBM Corporation. (2000).
Jikes Bytecode toolkit
[Computer Software]. Retrieved March 11, 2008,
from http://www-128.ibm.com/developerworks/
opensource/
Lee, E. A. (2006). The problem with threads.
IEEE Computer
,
39
(11), 33-42.
IBM Corporation. (2003).
Develop fast, reliable
code with IBM rational PurifyPlus
. Whitepaper.
Retrieved March 11, 2008, from ftp://ftp.soft-
Li, J. (2002).
Monitoring of component-based
systems
(Tech. Rep. No. HPL-2002-25R1. HP).
Laboratories, Palo Alto, CA, USA.
Search WWH ::
Custom Search