Incremental computing

Results: 268



#Item
81C Standard Library / C file input/output / Input/output / Monad / Io / Haskell / Generator / Lexical analysis / C / Computing / Software engineering / Computer programming

Iteratees Oleg Kiselyov Abstract. Iteratee IO is a style of incremental input processing with precise resource control. The style encourages building input processors

Add to Reading List

Source URL: okmij.org

Language: English - Date: 2013-03-27 01:37:19
82Parallel computing / OpenMP / Automatic parallelization / Task parallelism / Cilk / Barrier / Thread / Unified Parallel C / Parallel programming model / Computing / Concurrent computing / Computer programming

The Incremental Design of Parallel Compiler Intermediate Representations using SPIRE Dounia Khaldi‡ , Pierre Jouvelot¶ , Franc¸ois Irigoin¶ , Corinne Ancourt¶ and Barbara Chapman‡ ‡ Department of Computer Scie

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2014-11-13 08:49:36
83Subroutines / Programming language implementation / Procedural programming languages / X86 architecture / Compiler construction / Scheme / Closure / Pointer / Calling convention / Software engineering / Computing / Computer programming

An Incremental Approach to Compiler Construction Abdulaziz Ghuloum Department of Computer Science, Indiana University, Bloomington, INAbstract

Add to Reading List

Source URL: www.schemeworkshop.org

Language: English - Date: 2011-08-12 16:48:43
84Data security / RMAN / Oracle Database / Backup / Oracle RAC / Oracle Corporation / Incremental backup / IBM Tivoli Storage Manager / NetBackup / Software / Backup software / Computing

Backup and Recovery Best Practices for the Oracle Database Appliance An Oracle White Paper AprilBackup and Recovery Best Practices for

Add to Reading List

Source URL: www.oracle.com

Language: English
85Backup software / Acronis Secure Zone / Backup / VMware / Virtual machine / Remote backup service / Acronis / RMAN / Incremental backup / Software / System software / Computing

User Guide Copyright Statement Copyright © Acronis International GmbH, All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis International GmbH. "Acronis Comp

Add to Reading List

Source URL: www.acronis.cz

Language: English - Date: 2014-09-26 07:27:25
86Data management / Enterprise application integration / Service-oriented architecture / Data integration / Data model / Component Object Model / Wrapper / Computing / Software engineering / Computer programming

Software and Systems Modeling manuscript No. (will be inserted by the editor) Model-Based A-Posteriori Integration of Engineering Tools for Incremental Development Processes Simon M. Becker, Thomas Haase, Bernhard Westfe

Add to Reading List

Source URL: www-i3.informatik.rwth-aachen.de

Language: English - Date: 2009-05-27 10:53:21
87Computing / Wireless / IEEE 802.11 / Sensor node / Throughput / Packet loss / Power control / PowWow / Backpressure Routing / Wireless sensor network / Technology / Wireless networking

Incremental Network Programming for Wireless Sensors

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2007-12-13 19:54:53
88Backup / Computing / RMAN / Incremental backup / Comparison of online backup services / Backup software / Data security / Software

Whitepaper,  April  2012        

Add to Reading List

Source URL: www.virtualtothecore.com

Language: English - Date: 2014-03-03 17:11:00
89Text editors / Cross-platform software / Procedural programming languages / User interface techniques / Incremental search / C / Lisp / X Window System / Software / Computing / Emacs

GNU Emacs Reference Card (for version 21) Starting Emacs To enter GNU Emacs 21, just type its name: emacs To read in a file to edit, see Files, below.

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2007-07-29 09:37:33
90Software AG / Incremental computing / Data management / Database management systems / Backup / Information technology management / MVS / Incremental backup / Database / Data security / Computing / ADABAS

ADASTRIP Data Extraction Utility for ADABAS Backups ADABAS DBAs must have exclusive control of the files they wish to unload. This renders applications which access those files unavailable to users. To avoid this loss o

Add to Reading List

Source URL: treehouse.com

Language: English - Date: 2014-01-03 15:33:29
UPDATE