Search dblp for Publications

export results for "toc:db/journals/csur/csur15.bht:"

 download as .bib file

@article{DBLP:journals/csur/AbadirR83,
  author       = {Magdy S. Abadir and
                  Hassan K. Reghbati},
  title        = {Functional Testing of Semiconductor Random Access Memories},
  journal      = {{ACM} Comput. Surv.},
  volume       = {15},
  number       = {3},
  pages        = {175--198},
  year         = {1983},
  url          = {https://doi.org/10.1145/356914.356916},
  doi          = {10.1145/356914.356916},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/AbadirR83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/AndrewsS83,
  author       = {Gregory R. Andrews and
                  Fred B. Schneider},
  title        = {Concepts and Notations for Concurrent Programming},
  journal      = {{ACM} Comput. Surv.},
  volume       = {15},
  number       = {1},
  pages        = {3--43},
  year         = {1983},
  url          = {https://doi.org/10.1145/356901.356903},
  doi          = {10.1145/356901.356903},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/AndrewsS83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/AngliunS83,
  author       = {Dana Angluin and
                  Carl H. Smith},
  title        = {Inductive Inference: Theory and Methods},
  journal      = {{ACM} Comput. Surv.},
  volume       = {15},
  number       = {3},
  pages        = {237--269},
  year         = {1983},
  url          = {https://doi.org/10.1145/356914.356918},
  doi          = {10.1145/356914.356918},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/AngliunS83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/BroomellH83,
  author       = {George Broomell and
                  J. Robert Heath},
  title        = {Classification Categories and Historical Development of Circuit Switching
                  Topologies},
  journal      = {{ACM} Comput. Surv.},
  volume       = {15},
  number       = {2},
  pages        = {95--133},
  year         = {1983},
  url          = {https://doi.org/10.1145/356909.356912},
  doi          = {10.1145/356909.356912},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/BroomellH83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/Corrigenda83,
  title        = {"Concepts and Notations for Concurrent Programming"},
  journal      = {{ACM} Comput. Surv.},
  volume       = {15},
  number       = {4},
  pages        = {377},
  year         = {1983},
  url          = {https://doi.org/10.1145/289.357845},
  doi          = {10.1145/289.357845},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/Corrigenda83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/Forum83,
  author       = {Surveyors' Forum},
  title        = {comments on "Comparative Models of the File Assignment Problem"},
  journal      = {{ACM} Comput. Surv.},
  volume       = {15},
  number       = {1},
  pages        = {81--82},
  year         = {1983},
  url          = {https://doi.org/10.1145/356901.356905},
  doi          = {10.1145/356901.356905},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/Forum83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/Forum83a,
  author       = {Surveyors' Forum},
  title        = {comments on "Image Models"},
  journal      = {{ACM} Comput. Surv.},
  volume       = {15},
  number       = {1},
  pages        = {83--84},
  year         = {1983},
  url          = {https://doi.org/10.1145/356901.356907},
  doi          = {10.1145/356901.356907},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/Forum83a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/Forum83b,
  author       = {Surveyors' Forum},
  title        = {comments on "Retargetable Compiler Code Generation"},
  journal      = {{ACM} Comput. Surv.},
  volume       = {15},
  number       = {3},
  pages        = {279--284},
  year         = {1983},
  timestamp    = {Mon, 29 Oct 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/Forum83b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/Forum83c,
  author       = {Surveyors' Forum},
  title        = {comments on "Concepts and Notations for Concurrent Programming"},
  journal      = {{ACM} Comput. Surv.},
  volume       = {15},
  number       = {4},
  pages        = {375--377},
  year         = {1983},
  timestamp    = {Mon, 29 Oct 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/Forum83c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/HarderR83,
  author       = {Theo H{\"{a}}rder and
                  Andreas Reuter},
  title        = {Principles of Transaction-Oriented Database Recovery},
  journal      = {{ACM} Comput. Surv.},
  volume       = {15},
  number       = {4},
  pages        = {287--317},
  year         = {1983},
  url          = {https://doi.org/10.1145/289.291},
  doi          = {10.1145/289.291},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/HarderR83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/King83,
  author       = {John Leslie King},
  title        = {Centralized versus Decentralized Computing: Organizational Considerations
                  and Management Options},
  journal      = {{ACM} Comput. Surv.},
  volume       = {15},
  number       = {4},
  pages        = {319--349},
  year         = {1983},
  url          = {https://doi.org/10.1145/289.290},
  doi          = {10.1145/289.290},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/King83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/LeeL83,
  author       = {Dik Lun Lee and
                  Frederick H. Lochovsky},
  title        = {Voice Response Systems},
  journal      = {{ACM} Comput. Surv.},
  volume       = {15},
  number       = {4},
  pages        = {351--374},
  year         = {1983},
  url          = {https://doi.org/10.1145/289.292},
  doi          = {10.1145/289.292},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/LeeL83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/Lientz83,
  author       = {Bennet P. Lientz},
  title        = {Issues in Software Maintenance},
  journal      = {{ACM} Comput. Surv.},
  volume       = {15},
  number       = {3},
  pages        = {271--278},
  year         = {1983},
  url          = {https://doi.org/10.1145/356914.356919},
  doi          = {10.1145/356914.356919},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/Lientz83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/March83,
  author       = {Salvatore T. March},
  title        = {Techniques for Structuring Database Records},
  journal      = {{ACM} Comput. Surv.},
  volume       = {15},
  number       = {1},
  pages        = {45--79},
  year         = {1983},
  url          = {https://doi.org/10.1145/356901.356904},
  doi          = {10.1145/356901.356904},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/March83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/PartschS83,
  author       = {Helmuth Partsch and
                  Ralf Steinbr{\"{u}}ggen},
  title        = {Program Transformation Systems},
  journal      = {{ACM} Comput. Surv.},
  volume       = {15},
  number       = {3},
  pages        = {199--236},
  year         = {1983},
  url          = {https://doi.org/10.1145/356914.356917},
  doi          = {10.1145/356914.356917},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/PartschS83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/VoydockK83,
  author       = {Victor L. Voydock and
                  Stephen T. Kent},
  title        = {Security Mechanisms in High-Level Network Protocols},
  journal      = {{ACM} Comput. Surv.},
  volume       = {15},
  number       = {2},
  pages        = {135--171},
  year         = {1983},
  url          = {https://doi.org/10.1145/356909.356913},
  doi          = {10.1145/356909.356913},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/VoydockK83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics