Execution

Results: 6779



#Item
501Real-time computing / Safety engineering / Systems engineering / Scheduling / Mixed criticality / Worst-case execution time / Time management / Criticality / Task / Deadline-monotonic scheduling / Rate-monotonic scheduling

Response-Time Analysis for Mixed Criticality Systems S.K. Baruah A. Burns

Add to Reading List

Source URL: www-users.cs.york.ac.uk

Language: English - Date: 2011-08-23 09:03:48
502Repurchase agreement / Systemic risk / MTS / Franchising

Factsheet MidPrice for cash dealers. Orderly price discovery and execution with pre-trade anonymity. MidPrice on the MTS Cash interdealer platform offers an orderly method of price discovery, based on real executable mar

Add to Reading List

Source URL: www.mtsmarkets.com

Language: English - Date: 2015-09-29 12:42:59
503United Nations

EIF – NPI EQUITY PLATFORM CHARTER Pre-Execution Version EIF – NPI EQUITY PLATFORM CHARTER

Add to Reading List

Source URL: www.eif.europa.eu

Language: English - Date: 2016-07-29 11:19:33
    504Real-time computing / Worst-case execution time / Honda P series / Binary multiplier / Module:Footnotes/testcases

    Performance evaluation of a distributed IMA architecture Emilie Deroche1,2 , Jean-Luc Scharbarg1 , Christian Fraboul1 1 INP-ENSEEIHT IRIT, Universit´ e de Toulouse, Toulouse, France

    Add to Reading List

    Source URL: www.control.lth.se

    Language: English - Date: 2015-07-09 03:36:07
    505Legal terms / Contract law / Guarantee / Surety / Security

    EXECUTION VERSION This Combined Replacement Covenant Amendment, dated as of August 10, 2015 (the “Combined Replacement Covenant Amendment”), by General Electric Capital Corporation, a Delaware corporation (together

    Add to Reading List

    Source URL: www.ge.com

    Language: English - Date: 2015-08-10 11:20:26
    506Software testing / Computer security / Program analysis / Static / Application security / FxCop / FindBugs / Worst-case execution time

    Microsoft PowerPoint - DenimGroup_StaticAnalysisTechniquesForTestingApplicationSecurity_Content.pptx

    Add to Reading List

    Source URL: denimgroup.com

    Language: English - Date: 2014-01-13 18:18:27
    507Computability theory / Vulnerability / Public-key cryptography / Theoretical computer science / Models of computation / Buffer overflow / Social vulnerability / Zero-day / Ring signature / Symbolic execution / Turing machine / Halting problem

    Towards Automatic Generation of Vulnerability-Based Signatures David Brumley, James Newsome, and Dawn Song Carnegie Mellon University Pittsburgh, PA, USA {dbrumley,jnewsome,dawnsong}@cmu.edu

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-05-29 15:38:01
    508Transaction processing / Concurrency control / Data management / Databases / Unix signal / Lock / Linearizability / Hash table / File locking / Serializability / Monitor / Two-phase commit protocol

    SPECIAL SECTION DISTRIBUTED PROGRAMMING IN ARGU!S Argus-a programming language and system developed to support the implementation and execution of distributed programs-provides mechanisms that help programmers cope with

    Add to Reading List

    Source URL: css.csail.mit.edu

    Language: English - Date: 2014-12-08 14:33:01
    509Domain registrars / Corporate finance / Web hosting / Human resource management / Mergers and acquisitions / Melbourne IT / ING Group / Domain registration

    2014 Full Year Results Melbourne, Australia 27 February 2014 M&A Strategy Execution

    Add to Reading List

    Source URL: www.melbourneit.info

    Language: English - Date: 2016-04-11 00:02:58
    510Internet Explorer / Web browsers / Ajax / JavaScript libraries / JavaScript / Document Object Model / Cross-browser / Internet Explorer 8 / JQuery / XUL / Web storage / Cascading Style Sheets

    Atlantis: Robust, Extensible Execution Environments for Web Applications James Mickens Mohan Dhawan

    Add to Reading List

    Source URL: www.sigops.org

    Language: English - Date: 2011-09-11 16:39:23
    UPDATE