Search dblp for Publications

export results for "toc:db/journals/queue/queue12.bht:"

 download as .bib file

@article{DBLP:journals/queue/Bland14,
  author       = {Mike Bland},
  title        = {Finding More Than One Worm in the Apple},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {5},
  pages        = {10--21},
  year         = {2014},
  url          = {https://doi.org/10.1145/2620660.2620662},
  doi          = {10.1145/2620660.2620662},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/queue/Bland14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/Bueso14,
  author       = {Davidlohr Bueso},
  title        = {Scalability Techniques for Practical Synchronization Primitives},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {11},
  pages        = {40--53},
  year         = {2014},
  url          = {https://doi.org/10.1145/2693193.2698990},
  doi          = {10.1145/2693193.2698990},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/queue/Bueso14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/CarataABBSSH14,
  author       = {Lucian Carata and
                  Sherif Akoush and
                  Nikilesh Balakrishnan and
                  Thomas Bytheway and
                  Ripduman Sohan and
                  Margo I. Seltzer and
                  Andy Hopper},
  title        = {A Primer on Provenance},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {3},
  pages        = {10--23},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602649.2602651},
  doi          = {10.1145/2602649.2602651},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/queue/CarataABBSSH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/Cerf14,
  author       = {Vinton G. Cerf},
  title        = {{ACM} and the Professional Programmer},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {7},
  pages        = {10},
  year         = {2014},
  url          = {https://doi.org/10.1145/2639988.2639990},
  doi          = {10.1145/2639988.2639990},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/queue/Cerf14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/Chisnall14,
  author       = {David Chisnall},
  title        = {There's No Such Thing as a General-purpose Processor},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {10},
  pages        = {20--25},
  year         = {2014},
  url          = {https://doi.org/10.1145/2685690.2687011},
  doi          = {10.1145/2685690.2687011},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/queue/Chisnall14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/CoattaDH14,
  author       = {Terry Coatta and
                  Michael Donat and
                  Jafar Husain},
  title        = {Automated {QA} Testing at {EA:} Driven by Events},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {5},
  pages        = {20--10},
  year         = {2014},
  url          = {https://doi.org/10.1145/2620660.2627372},
  doi          = {10.1145/2620660.2627372},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/queue/CoattaDH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/Gill14,
  author       = {Andy Gill},
  title        = {Domain-specific Languages and Code Synthesis Using Haskell},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {4},
  pages        = {30--43},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611429.2617811},
  doi          = {10.1145/2611429.2617811},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/queue/Gill14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/JacobsonS14,
  author       = {Ivar Jacobson and
                  Ed Seidewitz},
  title        = {A New Software Engineering},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {10},
  pages        = {30--38},
  year         = {2014},
  url          = {https://doi.org/10.1145/2685690.2693160},
  doi          = {10.1145/2685690.2693160},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/queue/JacobsonS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/Kamp14,
  author       = {Poul{-}Henning Kamp},
  title        = {Please Put OpenSSL Out of Its Misery},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {3},
  pages        = {20--23},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602649.2602816},
  doi          = {10.1145/2602649.2602816},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/queue/Kamp14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/Kamp14a,
  author       = {Poul{-}Henning Kamp},
  title        = {Quality Software Costs Money - Heartbleed Was Free},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {6},
  pages        = {10},
  year         = {2014},
  url          = {https://doi.org/10.1145/2636163.2636165},
  doi          = {10.1145/2636163.2636165},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/queue/Kamp14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/Kleen14,
  author       = {Andi Kleen},
  title        = {Scaling Existing Lock-based Applications with Lock Elision},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {1},
  pages        = {20},
  year         = {2014},
  url          = {https://doi.org/10.1145/2576966.2579227},
  doi          = {10.1145/2576966.2579227},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/queue/Kleen14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/Laurie14,
  author       = {Ben Laurie},
  title        = {Certificate Transparency},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {8},
  pages        = {10--19},
  year         = {2014},
  url          = {https://doi.org/10.1145/2668152.2668154},
  doi          = {10.1145/2668152.2668154},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/queue/Laurie14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/Meijer14,
  author       = {Erik Meijer},
  title        = {The Curse of the Excluded Middle},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {4},
  pages        = {20--29},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611429.2611829},
  doi          = {10.1145/2611429.2611829},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/queue/Meijer14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/MeijerK14,
  author       = {Erik Meijer and
                  Vikram Kapoor},
  title        = {The Responsive Enterprise: Embracing the Hacker Way},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {10},
  pages        = {10--18},
  year         = {2014},
  url          = {https://doi.org/10.1145/2685690.2685692},
  doi          = {10.1145/2685690.2685692},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/queue/MeijerK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/Neville-Neil14,
  author       = {George V. Neville{-}Neil},
  title        = {Forked Over},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {4},
  pages        = {10--12},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611429.2611431},
  doi          = {10.1145/2611429.2611431},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/queue/Neville-Neil14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/Neville-Neil14a,
  author       = {George V. Neville{-}Neil},
  title        = {Outsourcing Responsibility},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {6},
  pages        = {20},
  year         = {2014},
  url          = {https://doi.org/10.1145/2636163.2639483},
  doi          = {10.1145/2636163.2639483},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/queue/Neville-Neil14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/Neville-Neil14b,
  author       = {George V. Neville{-}Neil},
  title        = {Port Squatting},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {9},
  pages        = {10--12},
  year         = {2014},
  url          = {https://doi.org/10.1145/2674600.2674602},
  doi          = {10.1145/2674600.2674602},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/queue/Neville-Neil14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/Neville-Neil14c,
  author       = {George V. Neville{-}Neil},
  title        = {Too Big to Fail},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {11},
  pages        = {10--12},
  year         = {2014},
  url          = {https://doi.org/10.1145/2693193.2693195},
  doi          = {10.1145/2693193.2693195},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/queue/Neville-Neil14c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/Richardson14,
  author       = {Rick Richardson},
  title        = {Disambiguating Databases},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {11},
  pages        = {20--31},
  year         = {2014},
  url          = {https://doi.org/10.1145/2693193.2696453},
  doi          = {10.1145/2693193.2696453},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/queue/Richardson14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/Sampemane14,
  author       = {Geetanjali Sampemane},
  title        = {Internal Access Controls},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {11},
  pages        = {30--34},
  year         = {2014},
  url          = {https://doi.org/10.1145/2693193.2697395},
  doi          = {10.1145/2693193.2697395},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/queue/Sampemane14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/SproullW14,
  author       = {Robert F. Sproull and
                  Jim Waldo},
  title        = {The {API} Performance Contract},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {1},
  pages        = {10},
  year         = {2014},
  url          = {https://doi.org/10.1145/2576966.2576968},
  doi          = {10.1145/2576966.2576968},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/queue/SproullW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/SvenssonSN14,
  author       = {Bo Joel Svensson and
                  Mary Sheeran and
                  Ryan R. Newton},
  title        = {Design Exploration through Code-generating DSLs},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {4},
  pages        = {40--52},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611429.2626374},
  doi          = {10.1145/2611429.2626374},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/queue/SvenssonSN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/Vixie14,
  author       = {Paul Vixie},
  title        = {Rate-limiting State: The edge of the Internet is an unruly place},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {2},
  pages        = {10--15},
  year         = {2014},
  url          = {https://doi.org/10.1145/2578508.2578510},
  doi          = {10.1145/2578508.2578510},
  timestamp    = {Tue, 13 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/queue/Vixie14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/Wadlow14,
  author       = {Thomas Wadlow},
  title        = {Who Must You Trust?},
  journal      = {{ACM} Queue},
  volume       = {12},
  number       = {5},
  pages        = {30--43},
  year         = {2014},
  url          = {https://doi.org/10.1145/2620660.2630691},
  doi          = {10.1145/2620660.2630691},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/queue/Wadlow14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics