Information Technology Reference
In-Depth Information
Greenhouse, A. (2003). A programmer-oriented
approach to safe concurrency . Unpublished doc-
toral dissertation, Carnegie Mellon University
School of Computer Science.
ware.ibm.com/software/rational/web/whitepa-
pers/2003/PurifyPlusPDF.pdf
IEEE. (2001). IEEE standard test access port
and boundary-scan architecture . IEEE Std.
1149.1-20 01.
Grehan, R. (1995). BYTEmark Native Mode
Benchmark , Release 2.0, [Computer software].
BYTE Magazine.
IEEE-ISTO. (2003). The Nexus 5001 forum stan-
dard for global embedded processor debug inter-
face, version 2.0 [Electronic media]. Retrieved
March 11, 2008, from http://www.ieee-isto.org
Hollingsworth, J. K., Miller, B. P., & Cargille,
J. (1994). Dynamic program instrumentation for
scalable performance tools. In Proceedings of the
Scalable High-Performance Computing Confer-
ence, Knoxville, TN , (pp. 841-850).
Intel Corporation. (2006a). Intel 64 and IA-32 ar-
chitectures software developer's manual (Vol. 3B,
System Programming Guide, Part 2) . Retrieved
March 11, 2008, from www.intel.com/design/
processor/manuals/253669.pdf
Hill, J., Schmidt, D.C., & Slaby, J. (2007). Sys-
tem execution modeling tools for evaluating the
quality of service of enterprise distributed real-
time and embedded systems . In P. F. Tiako (Ed.).
Designing software-intensive systems: Methods
and principles . Langston University, OK.
Intel Corporation. (2006b). Intel's tera-scale
research prepares for tens, hundreds of cores.
Technology@Intel Magazine . Retrieved March
11, 2008, from http://www.intel.com/technology/
magazine/computing/tera-scale-0606.htm
Hilyard, J. (2005, January). No code can hide from
the profiling API in the .NET framework 2.0. MSDN
Magazine . Retrieved March 11, 2008, from http://
msdn.microsoft.com/msdnmag/issues/05/01/
CLRProfiler/
Jackson, D., & Rinard, M. (2000). Software
analysis: A roadmap. In Proceedings of the IEEE
International Conference on Software Engineer-
ing , (pp. 133-145).
Hunt, G., & Brubacher, D. (1999). Detours: Binary
interception of Win32 functions. In Proceedings
of the 3 rd USENIX Windows NT Symposium , (pp.
135-14 4).
Kiczale, G., Hilsdale, E., Hugunin, J., Kersten, M.,
Palm, J., & Griswold, W. G. (2001). An overview
of AspectJ . (LNCS, 2072, pp. 327-355).
Larus, J., & Schnarr, E. (1995). EEL: Machine-
independent executable editing. In Proceedings
of the ACM SIGPLAN Conference on Program-
ming Language Designes and Implementation ,
(pp. 291-300).
IBM Corporation. (1998). PowerPC 604e RISC
microprocessor user's manual with supplement
for PowerPC 604 microprocessor (Publication
No. G522-0330-00) [Electronic media]. Retrieved
March 11, 2008, from http://www-3.ibm.com/
chips/techlib/
Lee, H. B. (1997, July). BIT: Bytecode instrument-
ing tool . Unpublished master's thesis, University
of Colorado, Boulder, CO.
IBM Corporation. (2000). Jikes Bytecode toolkit
[Computer Software]. Retrieved March 11, 2008,
from http://www-128.ibm.com/developerworks/
opensource/
Lee, E. A. (2006). The problem with threads.
IEEE Computer , 39 (11), 33-42.
IBM Corporation. (2003). Develop fast, reliable
code with IBM rational PurifyPlus . Whitepaper.
Retrieved March 11, 2008, from ftp://ftp.soft-
Li, J. (2002). Monitoring of component-based
systems (Tech. Rep. No. HPL-2002-25R1. HP).
Laboratories, Palo Alto, CA, USA.
Search WWH ::




Custom Search