default search action
Search dblp for Publications
export results for "toc:db/journals/csur/csur15.bht:"
@article{DBLP:journals/csur/AbadirR83, author = {Magdy S. Abadir and Hassan K. Reghbati}, title = {Functional Testing of Semiconductor Random Access Memories}, journal = {{ACM} Comput. Surv.}, volume = {15}, number = {3}, pages = {175--198}, year = {1983}, url = {https://doi.org/10.1145/356914.356916}, doi = {10.1145/356914.356916}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/AbadirR83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/AndrewsS83, author = {Gregory R. Andrews and Fred B. Schneider}, title = {Concepts and Notations for Concurrent Programming}, journal = {{ACM} Comput. Surv.}, volume = {15}, number = {1}, pages = {3--43}, year = {1983}, url = {https://doi.org/10.1145/356901.356903}, doi = {10.1145/356901.356903}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/AndrewsS83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/AngliunS83, author = {Dana Angluin and Carl H. Smith}, title = {Inductive Inference: Theory and Methods}, journal = {{ACM} Comput. Surv.}, volume = {15}, number = {3}, pages = {237--269}, year = {1983}, url = {https://doi.org/10.1145/356914.356918}, doi = {10.1145/356914.356918}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/AngliunS83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/BroomellH83, author = {George Broomell and J. Robert Heath}, title = {Classification Categories and Historical Development of Circuit Switching Topologies}, journal = {{ACM} Comput. Surv.}, volume = {15}, number = {2}, pages = {95--133}, year = {1983}, url = {https://doi.org/10.1145/356909.356912}, doi = {10.1145/356909.356912}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/BroomellH83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Corrigenda83, title = {"Concepts and Notations for Concurrent Programming"}, journal = {{ACM} Comput. Surv.}, volume = {15}, number = {4}, pages = {377}, year = {1983}, url = {https://doi.org/10.1145/289.357845}, doi = {10.1145/289.357845}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/Corrigenda83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Forum83, author = {Surveyors' Forum}, title = {comments on "Comparative Models of the File Assignment Problem"}, journal = {{ACM} Comput. Surv.}, volume = {15}, number = {1}, pages = {81--82}, year = {1983}, url = {https://doi.org/10.1145/356901.356905}, doi = {10.1145/356901.356905}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/Forum83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Forum83a, author = {Surveyors' Forum}, title = {comments on "Image Models"}, journal = {{ACM} Comput. Surv.}, volume = {15}, number = {1}, pages = {83--84}, year = {1983}, url = {https://doi.org/10.1145/356901.356907}, doi = {10.1145/356901.356907}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/Forum83a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Forum83b, author = {Surveyors' Forum}, title = {comments on "Retargetable Compiler Code Generation"}, journal = {{ACM} Comput. Surv.}, volume = {15}, number = {3}, pages = {279--284}, year = {1983}, timestamp = {Mon, 29 Oct 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/Forum83b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Forum83c, author = {Surveyors' Forum}, title = {comments on "Concepts and Notations for Concurrent Programming"}, journal = {{ACM} Comput. Surv.}, volume = {15}, number = {4}, pages = {375--377}, year = {1983}, timestamp = {Mon, 29 Oct 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/Forum83c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/HarderR83, author = {Theo H{\"{a}}rder and Andreas Reuter}, title = {Principles of Transaction-Oriented Database Recovery}, journal = {{ACM} Comput. Surv.}, volume = {15}, number = {4}, pages = {287--317}, year = {1983}, url = {https://doi.org/10.1145/289.291}, doi = {10.1145/289.291}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/HarderR83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/King83, author = {John Leslie King}, title = {Centralized versus Decentralized Computing: Organizational Considerations and Management Options}, journal = {{ACM} Comput. Surv.}, volume = {15}, number = {4}, pages = {319--349}, year = {1983}, url = {https://doi.org/10.1145/289.290}, doi = {10.1145/289.290}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/King83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/LeeL83, author = {Dik Lun Lee and Frederick H. Lochovsky}, title = {Voice Response Systems}, journal = {{ACM} Comput. Surv.}, volume = {15}, number = {4}, pages = {351--374}, year = {1983}, url = {https://doi.org/10.1145/289.292}, doi = {10.1145/289.292}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/LeeL83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Lientz83, author = {Bennet P. Lientz}, title = {Issues in Software Maintenance}, journal = {{ACM} Comput. Surv.}, volume = {15}, number = {3}, pages = {271--278}, year = {1983}, url = {https://doi.org/10.1145/356914.356919}, doi = {10.1145/356914.356919}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/Lientz83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/March83, author = {Salvatore T. March}, title = {Techniques for Structuring Database Records}, journal = {{ACM} Comput. Surv.}, volume = {15}, number = {1}, pages = {45--79}, year = {1983}, url = {https://doi.org/10.1145/356901.356904}, doi = {10.1145/356901.356904}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/March83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/PartschS83, author = {Helmuth Partsch and Ralf Steinbr{\"{u}}ggen}, title = {Program Transformation Systems}, journal = {{ACM} Comput. Surv.}, volume = {15}, number = {3}, pages = {199--236}, year = {1983}, url = {https://doi.org/10.1145/356914.356917}, doi = {10.1145/356914.356917}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/PartschS83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/VoydockK83, author = {Victor L. Voydock and Stephen T. Kent}, title = {Security Mechanisms in High-Level Network Protocols}, journal = {{ACM} Comput. Surv.}, volume = {15}, number = {2}, pages = {135--171}, year = {1983}, url = {https://doi.org/10.1145/356909.356913}, doi = {10.1145/356909.356913}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/VoydockK83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.