Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/queue/queue12.bht:"
@article{DBLP:journals/queue/Bland14, author = {Mike Bland}, title = {Finding More Than One Worm in the Apple}, journal = {{ACM} Queue}, volume = {12}, number = {5}, pages = {10--21}, year = {2014}, url = {https://doi.org/10.1145/2620660.2620662}, doi = {10.1145/2620660.2620662}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/queue/Bland14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Bueso14, author = {Davidlohr Bueso}, title = {Scalability Techniques for Practical Synchronization Primitives}, journal = {{ACM} Queue}, volume = {12}, number = {11}, pages = {40--53}, year = {2014}, url = {https://doi.org/10.1145/2693193.2698990}, doi = {10.1145/2693193.2698990}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/queue/Bueso14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/CarataABBSSH14, author = {Lucian Carata and Sherif Akoush and Nikilesh Balakrishnan and Thomas Bytheway and Ripduman Sohan and Margo I. Seltzer and Andy Hopper}, title = {A Primer on Provenance}, journal = {{ACM} Queue}, volume = {12}, number = {3}, pages = {10--23}, year = {2014}, url = {https://doi.org/10.1145/2602649.2602651}, doi = {10.1145/2602649.2602651}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/queue/CarataABBSSH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Cerf14, author = {Vinton G. Cerf}, title = {{ACM} and the Professional Programmer}, journal = {{ACM} Queue}, volume = {12}, number = {7}, pages = {10}, year = {2014}, url = {https://doi.org/10.1145/2639988.2639990}, doi = {10.1145/2639988.2639990}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/queue/Cerf14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Chisnall14, author = {David Chisnall}, title = {There's No Such Thing as a General-purpose Processor}, journal = {{ACM} Queue}, volume = {12}, number = {10}, pages = {20--25}, year = {2014}, url = {https://doi.org/10.1145/2685690.2687011}, doi = {10.1145/2685690.2687011}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/queue/Chisnall14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/CoattaDH14, author = {Terry Coatta and Michael Donat and Jafar Husain}, title = {Automated {QA} Testing at {EA:} Driven by Events}, journal = {{ACM} Queue}, volume = {12}, number = {5}, pages = {20--10}, year = {2014}, url = {https://doi.org/10.1145/2620660.2627372}, doi = {10.1145/2620660.2627372}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/queue/CoattaDH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Gill14, author = {Andy Gill}, title = {Domain-specific Languages and Code Synthesis Using Haskell}, journal = {{ACM} Queue}, volume = {12}, number = {4}, pages = {30--43}, year = {2014}, url = {https://doi.org/10.1145/2611429.2617811}, doi = {10.1145/2611429.2617811}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/queue/Gill14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/JacobsonS14, author = {Ivar Jacobson and Ed Seidewitz}, title = {A New Software Engineering}, journal = {{ACM} Queue}, volume = {12}, number = {10}, pages = {30--38}, year = {2014}, url = {https://doi.org/10.1145/2685690.2693160}, doi = {10.1145/2685690.2693160}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/queue/JacobsonS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Kamp14, author = {Poul{-}Henning Kamp}, title = {Please Put OpenSSL Out of Its Misery}, journal = {{ACM} Queue}, volume = {12}, number = {3}, pages = {20--23}, year = {2014}, url = {https://doi.org/10.1145/2602649.2602816}, doi = {10.1145/2602649.2602816}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/queue/Kamp14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Kamp14a, author = {Poul{-}Henning Kamp}, title = {Quality Software Costs Money - Heartbleed Was Free}, journal = {{ACM} Queue}, volume = {12}, number = {6}, pages = {10}, year = {2014}, url = {https://doi.org/10.1145/2636163.2636165}, doi = {10.1145/2636163.2636165}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/queue/Kamp14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Kleen14, author = {Andi Kleen}, title = {Scaling Existing Lock-based Applications with Lock Elision}, journal = {{ACM} Queue}, volume = {12}, number = {1}, pages = {20}, year = {2014}, url = {https://doi.org/10.1145/2576966.2579227}, doi = {10.1145/2576966.2579227}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/queue/Kleen14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Laurie14, author = {Ben Laurie}, title = {Certificate Transparency}, journal = {{ACM} Queue}, volume = {12}, number = {8}, pages = {10--19}, year = {2014}, url = {https://doi.org/10.1145/2668152.2668154}, doi = {10.1145/2668152.2668154}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/queue/Laurie14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Meijer14, author = {Erik Meijer}, title = {The Curse of the Excluded Middle}, journal = {{ACM} Queue}, volume = {12}, number = {4}, pages = {20--29}, year = {2014}, url = {https://doi.org/10.1145/2611429.2611829}, doi = {10.1145/2611429.2611829}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/queue/Meijer14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/MeijerK14, author = {Erik Meijer and Vikram Kapoor}, title = {The Responsive Enterprise: Embracing the Hacker Way}, journal = {{ACM} Queue}, volume = {12}, number = {10}, pages = {10--18}, year = {2014}, url = {https://doi.org/10.1145/2685690.2685692}, doi = {10.1145/2685690.2685692}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/queue/MeijerK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Neville-Neil14, author = {George V. Neville{-}Neil}, title = {Forked Over}, journal = {{ACM} Queue}, volume = {12}, number = {4}, pages = {10--12}, year = {2014}, url = {https://doi.org/10.1145/2611429.2611431}, doi = {10.1145/2611429.2611431}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/queue/Neville-Neil14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Neville-Neil14a, author = {George V. Neville{-}Neil}, title = {Outsourcing Responsibility}, journal = {{ACM} Queue}, volume = {12}, number = {6}, pages = {20}, year = {2014}, url = {https://doi.org/10.1145/2636163.2639483}, doi = {10.1145/2636163.2639483}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/queue/Neville-Neil14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Neville-Neil14b, author = {George V. Neville{-}Neil}, title = {Port Squatting}, journal = {{ACM} Queue}, volume = {12}, number = {9}, pages = {10--12}, year = {2014}, url = {https://doi.org/10.1145/2674600.2674602}, doi = {10.1145/2674600.2674602}, timestamp = {Tue, 03 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/queue/Neville-Neil14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Neville-Neil14c, author = {George V. Neville{-}Neil}, title = {Too Big to Fail}, journal = {{ACM} Queue}, volume = {12}, number = {11}, pages = {10--12}, year = {2014}, url = {https://doi.org/10.1145/2693193.2693195}, doi = {10.1145/2693193.2693195}, timestamp = {Tue, 03 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/queue/Neville-Neil14c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Richardson14, author = {Rick Richardson}, title = {Disambiguating Databases}, journal = {{ACM} Queue}, volume = {12}, number = {11}, pages = {20--31}, year = {2014}, url = {https://doi.org/10.1145/2693193.2696453}, doi = {10.1145/2693193.2696453}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/queue/Richardson14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Sampemane14, author = {Geetanjali Sampemane}, title = {Internal Access Controls}, journal = {{ACM} Queue}, volume = {12}, number = {11}, pages = {30--34}, year = {2014}, url = {https://doi.org/10.1145/2693193.2697395}, doi = {10.1145/2693193.2697395}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/queue/Sampemane14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/SproullW14, author = {Robert F. Sproull and Jim Waldo}, title = {The {API} Performance Contract}, journal = {{ACM} Queue}, volume = {12}, number = {1}, pages = {10}, year = {2014}, url = {https://doi.org/10.1145/2576966.2576968}, doi = {10.1145/2576966.2576968}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/queue/SproullW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/SvenssonSN14, author = {Bo Joel Svensson and Mary Sheeran and Ryan R. Newton}, title = {Design Exploration through Code-generating DSLs}, journal = {{ACM} Queue}, volume = {12}, number = {4}, pages = {40--52}, year = {2014}, url = {https://doi.org/10.1145/2611429.2626374}, doi = {10.1145/2611429.2626374}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/queue/SvenssonSN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Vixie14, author = {Paul Vixie}, title = {Rate-limiting State: The edge of the Internet is an unruly place}, journal = {{ACM} Queue}, volume = {12}, number = {2}, pages = {10--15}, year = {2014}, url = {https://doi.org/10.1145/2578508.2578510}, doi = {10.1145/2578508.2578510}, timestamp = {Tue, 13 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/queue/Vixie14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Wadlow14, author = {Thomas Wadlow}, title = {Who Must You Trust?}, journal = {{ACM} Queue}, volume = {12}, number = {5}, pages = {30--43}, year = {2014}, url = {https://doi.org/10.1145/2620660.2630691}, doi = {10.1145/2620660.2630691}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/queue/Wadlow14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.