Gotowa bibliografia na temat „Computer program theory”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Computer program theory”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Computer program theory"
Middelburg, Cornelis. "Program Algebra for Random Access Machine Programs". Scientific Annals of Computer Science XXXII, nr 2 (7.12.2022): 285–319. http://dx.doi.org/10.7561/sacs.2022.2.285.
Pełny tekst źródłaGerkushenko, Svetlana, i Georgy Gerkushenko. "The Play Theory and Computer Games Using in Early Childhood Education". International Journal of Game-Based Learning 4, nr 3 (lipiec 2014): 47–60. http://dx.doi.org/10.4018/ijgbl.2014070105.
Pełny tekst źródłaHENRY, SHAWN R., i JEFFREY R. WEEKS. "SYMMETRY GROUPS OF HYPERBOLIC KNOTS AND LINKS". Journal of Knot Theory and Its Ramifications 01, nr 02 (czerwiec 1992): 185–201. http://dx.doi.org/10.1142/s0218216592000100.
Pełny tekst źródłaZhu, Ming-Yuan. "Program transformation in constructive type theory". ACM SIGPLAN Notices 30, nr 1 (3.01.1995): 11–19. http://dx.doi.org/10.1145/199818.199833.
Pełny tekst źródłaPittenger, David J. "Perception Laboratory: A Computer Program to Demonstrate Perceptual Phenomena". Teaching of Psychology 23, nr 1 (luty 1996): 46–48. http://dx.doi.org/10.1207/s15328023top2301_12.
Pełny tekst źródłaBurnett, R. B., i A. P. Schwab. "A computer program to aid in teaching diffuse layer theory". Journal of Agronomic Education 16, nr 1 (marzec 1987): 30–33. http://dx.doi.org/10.2134/jae1987.0030.
Pełny tekst źródłaPavelcik, Frantisek. "Phased rotation, conformation and translation function: theory and computer program". Journal of Applied Crystallography 39, nr 4 (15.07.2006): 483–86. http://dx.doi.org/10.1107/s0021889806013008.
Pełny tekst źródłaVessey, Iris. "Toward a theory of computer program bugs: an empirical test". International Journal of Man-Machine Studies 30, nr 1 (styczeń 1989): 23–46. http://dx.doi.org/10.1016/s0020-7373(89)80019-7.
Pełny tekst źródłaLuo, Zhaohui. "Program specification and data refinement in type theory". Mathematical Structures in Computer Science 3, nr 3 (wrzesień 1993): 333–63. http://dx.doi.org/10.1017/s0960129500000256.
Pełny tekst źródłaShange, Thembeka. "The Possible Role of the English Word Power (EWP) Program in Motivating ICT Foundation Students to Learn English at a University of Technology in South Africa". International Journal of Applied Linguistics and English Literature 10, nr 5 (30.09.2021): 28. http://dx.doi.org/10.7575/aiac.ijalel.v.10n.5p.28.
Pełny tekst źródłaRozprawy doktorskie na temat "Computer program theory"
Khamiss, A.-A. M. "Program construction in Martin-Lof's theory of types". Thesis, University of Essex, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.373210.
Pełny tekst źródłaJervis, Clive Andrew. "A theory of program correctness with three valued logic". Thesis, University of Leeds, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.277297.
Pełny tekst źródłaIreland, Andrew. "Mechanization of program construction in Martin-Loef's theory of types". Thesis, University of Stirling, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.236080.
Pełny tekst źródłaDuong, Chay N. "A study of new-wave theory and an implementation of the new wave theory into GTSELOS computer program". Thesis, Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/21492.
Pełny tekst źródłaNewlands, D. A., i mikewood@deakin edu au. "Structured development of an asynchronous forth processor using trace theory". Deakin University. School of Sciences, 1989. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20050915.140144.
Pełny tekst źródłaDoshi, Vishal D. (Vishal Devendra). "Functional compression : theory and application". Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/43038.
Pełny tekst źródłaIncludes bibliographical references (p. 75-77).
We consider the problem of functional compression. The objective is to separately compress possibly correlated discrete sources such that an arbitrary deterministic function of those sources can be computed given the compressed data from each source. This is motivated by problems in sensor networks and database privacy. Our architecture gives a quantitative definition of privacy for database statistics. Further, we show that it can provide significant coding gains in sensor networks. We consider both the lossless and lossy computation of a function. Specifically, we present results of the rate regions for three instances of the problem where there are two sources: 1) lossless computation where one source is available at the decoder, 2) under a special condition, lossless computation where both sources are separately encoded, and 3) lossy computation where one source is available at the decoder. Wyner and Ziv (1976) considered the third problem for the special case f(X, Y) = X and derived a rate distortion function. Yamamoto (1982) extended this result to a general function. Both of these results are in terms of an auxiliary random variable. Orlitsky and Roche (2001), for the zero distortion case, gave this variable a precise interpretation in terms of the properties of the characteristic graph; this led to a particular coding scheme. We extend that result by providing an achievability scheme that is based on the coloring of the characteristic graph. This suggests a layered architecture where the functional layer controls the coloring scheme, and the data layer uses existing distributed source coding schemes. We extend this graph coloring method to provide algorithms and rates for all three problems.
by Vishal D. Doshi.
S.M.
Lee, Kathryn Green Melville Joel G. "Comparison of the theory, application, and results of one- and two- dimensional flow models". Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Summer/Theses/LEE_KATHRYN_42.pdf.
Pełny tekst źródłaGhica, Dan R. "A games-based foundation for compositional software model checking /". Oxford : Oxford University Computing Laboratory, 2002. http://web.comlab.ox.ac.uk/oucl/publications/tr/rr-02-13.html.
Pełny tekst źródłaHeyer, Tim. "Semantic Inspection of Software Artifacts From Theory to Practice". Doctoral thesis, Linköping : Univ, 2001. http://www.ep.liu.se/diss/science_technology/07/25/index.html.
Pełny tekst źródłaRushton, Matthew V. "Static and dynamic type systems". Diss., Connect to the thesis Connect to the thesis, 2004. http://hdl.handle.net/10066/1483.
Pełny tekst źródłaKsiążki na temat "Computer program theory"
BASIC theory of structures. London: Butterworths, 1985.
Znajdź pełny tekst źródłaLogo: Theory & practice. Pacific Grove, Calif: Brooks/Cole Pub. Co., 1989.
Znajdź pełny tekst źródła1956-, McShane Marilyn D., red. Criminological theory. Wyd. 3. Upper Saddle River, N.J: Prentice Hall, 1999.
Znajdź pełny tekst źródłaWilliams, Franklin P. Criminological theory. Wyd. 5. Upper Saddle River, N.J: Pearson Education, Inc., 2010.
Znajdź pełny tekst źródłaWilliams, Franklin P. Criminological theory. Englewood Cliffs, N.J: Prentice Hall, 1988.
Znajdź pełny tekst źródłaWilliams, Franklin P. Criminological theory. Wyd. 2. Englewood Cliffs, N.J: Prentice Hall, 1994.
Znajdź pełny tekst źródłaA Small C compiler: Language, usage, theory, and design. Redwood City, Calif: M&T Pub., 1988.
Znajdź pełny tekst źródłaRafiquzzaman, Mohamed. Microcontroller theory and applications with the PIC18F. Hoboken, N.J: John Wiley & Sons Inc., 2011.
Znajdź pełny tekst źródłaRoyer, James S. A connotational theory of program structure. Berlin: Springer-Verlag, 1987.
Znajdź pełny tekst źródłaThe theory of thermodynamics. Cambridge [Cambridgeshire]: Cambridge University Press, 1985.
Znajdź pełny tekst źródłaCzęści książek na temat "Computer program theory"
Reichel, Horst. "Behavioural program specification". W Category Theory and Computer Programming, 390–411. Berlin, Heidelberg: Springer Berlin Heidelberg, 1986. http://dx.doi.org/10.1007/3-540-17162-2_134.
Pełny tekst źródłaCoquand, Thierry. "Program construction in intuitionistic Type Theory". W Lecture Notes in Computer Science, 49. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60117-1_4.
Pełny tekst źródłaWuwongse, Vilas, i Ekawit Nantajeewarawat. "Declarative program theory with implicit implication". W Lecture Notes in Computer Science, 97–108. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-61532-6_9.
Pełny tekst źródłaLewin, Douglas, i David Noaks. "The stored program principle". W Theory and Design of Digital Computer Systems, 1–15. Dordrecht: Springer Netherlands, 1992. http://dx.doi.org/10.1007/978-94-011-1576-6_1.
Pełny tekst źródłaEusterbrock, Jutta. "Program synthesis from examples by theory formation". W Lecture Notes in Computer Science, 370–80. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63614-5_36.
Pełny tekst źródłaHenson, Martin C., i Raymond Turner. "A constructive set theory for program development". W Lecture Notes in Computer Science, 329–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 1988. http://dx.doi.org/10.1007/3-540-50517-2_89.
Pełny tekst źródłaPrunescu, Mihai. "About a Surprising Computer Program of Matthias Müller". W Convexity and Discrete Geometry Including Graph Theory, 97–108. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-28186-5_9.
Pełny tekst źródłaSannella, Donald, i Andrzej Tarlecki. "Extended ML: An institution-independent framework for formal program development". W Category Theory and Computer Programming, 364–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 1986. http://dx.doi.org/10.1007/3-540-17162-2_133.
Pełny tekst źródłaMilanés, Vicente, Enrique Onieva, Joshué Pérez, Jorge Villagrá, Jorge Godoy, Javier Alonso, Carlos González, Teresa de Pedro i Ricardo García. "AUTOPIA Program Advances: How to Automate the Traffic?" W Computer Aided Systems Theory – EUROCAST 2011, 374–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27579-1_48.
Pełny tekst źródłaDybjer, Peter. "Program verification in a logical theory of constructions". W Functional Programming Languages and Computer Architecture, 334–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 1985. http://dx.doi.org/10.1007/3-540-15975-4_46.
Pełny tekst źródłaStreszczenia konferencji na temat "Computer program theory"
"Program". W 2020 30th International Conference on Computer Theory and Applications (ICCTA). IEEE, 2020. http://dx.doi.org/10.1109/iccta52020.2020.9477692.
Pełny tekst źródła"Program". W 2017 27th International Conference on Computer Theory and Applications (ICCTA). IEEE, 2017. http://dx.doi.org/10.1109/iccta43079.2017.9497197.
Pełny tekst źródła"Program". W 2019 29th International Conference on Computer Theory and Applications (ICCTA). IEEE, 2019. http://dx.doi.org/10.1109/iccta48790.2019.9478827.
Pełny tekst źródła"Conference Program". W 2016 26th International Conference on Computer Theory and Applications (ICCTA). IEEE, 2016. http://dx.doi.org/10.1109/iccta40200.2016.9512939.
Pełny tekst źródła"Conference Program". W 2015 25th International Conference on Computer Theory and Applications (ICCTA). IEEE, 2015. http://dx.doi.org/10.1109/iccta37466.2015.9513429.
Pełny tekst źródła"Conference Program". W 2014 24th International Conference on Computer Theory and Applications (ICCTA). IEEE, 2014. http://dx.doi.org/10.1109/iccta35431.2014.9521615.
Pełny tekst źródła"Conference Program". W 2013 23rd International Conference on Computer Theory and Applications (ICCTA). IEEE, 2013. http://dx.doi.org/10.1109/iccta32607.2013.9529803.
Pełny tekst źródła"Final Program". W 2021 31st International Conference on Computer Theory and Applications (ICCTA). IEEE, 2021. http://dx.doi.org/10.1109/iccta54562.2021.9916628.
Pełny tekst źródła"Conference Program". W 2022 32nd International Conference on Computer Theory and Applications (ICCTA). IEEE, 2022. http://dx.doi.org/10.1109/iccta58027.2022.10206221.
Pełny tekst źródła"Audio/Visual Recurrences and Decision Trees for Unsupervised TV Program Structuring". W International Conference on Computer Vision Theory and Applications. SciTePress - Science and and Technology Publications, 2013. http://dx.doi.org/10.5220/0004300307010708.
Pełny tekst źródłaRaporty organizacyjne na temat "Computer program theory"
Libura, Marek. Multidimensional Item Response Theory Estimation: A computer program. Fort Belvoir, VA: Defense Technical Information Center, październik 1987. http://dx.doi.org/10.21236/ada197160.
Pełny tekst źródłaBaladi, George Y., Donald E. Barnes i Rebecca P. Berger. Steerability Analysis of Tracked Vehicles: Theory and User's Guide for Computer Program TVSTEER. Fort Belvoir, VA: Defense Technical Information Center, sierpień 1986. http://dx.doi.org/10.21236/ada172008.
Pełny tekst źródłaDobranich, D. SAFSIM theory manual: A computer program for the engineering simulation of flow systems. Office of Scientific and Technical Information (OSTI), grudzień 1993. http://dx.doi.org/10.2172/10115531.
Pełny tekst źródłaMichalopoulos, C. D. PR-175-420-R01 Submarine Pipeline Analysis - Theoretical Manual. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), grudzień 1985. http://dx.doi.org/10.55274/r0012171.
Pełny tekst źródłaKeith, Jr., T., A. Afjeh, D. Jeng i J. White. Aerodynamic analysis of a horizontal axis wind turbine by use of helical vortex theory. Volume II. Computer program users manual. (Final report). [VORTEX]. Office of Scientific and Technical Information (OSTI), kwiecień 1985. http://dx.doi.org/10.2172/5243095.
Pełny tekst źródłaIsmailova, L. Yu, S. V. Kosikov, V. S. Zaytsev i I. O. Sleptsov. educational computer game THE ADVENTURES OF THE GUSARIK" OR THE BASIS OF THE THEORY OF THE STATE AND LAW (version 1.0). SIB-Expertise, lipiec 2022. http://dx.doi.org/10.12731/er0577.04072022.
Pełny tekst źródłaCook, W. A. THERM: A three-dimensional transient heat conduction computer program. Office of Scientific and Technical Information (OSTI), październik 1991. http://dx.doi.org/10.2172/5015011.
Pełny tekst źródłaMaxey. L51537 Power Line Fault Current Coupling to Nearby Natural Gas Pipelines. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), listopad 1988. http://dx.doi.org/10.55274/r0010412.
Pełny tekst źródłaMcGee, Steven, Randi McGee-Tekula, Jennifer Duck, Lucia Dettori, Don Yanek, Andrew M. Rasmussen, Ronald I. Greenberg i Dale F, Reed. Does Exploring Computer Science Increase Computer Science Enrollment? The Learning Partnership, kwiecień 2018. http://dx.doi.org/10.51420/conf.2018.1.
Pełny tekst źródłaWachen, John, Mark Johnson, Steven McGee, Faythe Brannon i Dennis Brylow. Computer Science Teachers as Change Agents for Broadening Participation: Exploring Perceptions of Equity. The Learning Partnership, kwiecień 2021. http://dx.doi.org/10.51420/conf.2021.2.
Pełny tekst źródła