Austin et al, “Efficient detection of all pointers and arrays access errors”, SIGPLAN ACM, pp. 290-301.* |
Edelson, “A mark and sweep collector for C + +”, ACM pp. 51-58.* |
Hayes, “Using key object opportunism to collect old objects”, ACM OOPSLA, pp. 33-46.* |
Jarvinen et al, “Object oriented specification of reactive systems”, IEEE, pp. 63-71.* |
Austin et al. “Efficient detection of all pointers and arrays access errors”, SIGPLAN ACM, pp. 290-301; 1994. |
Edelson, “A mark and sweep collector for C + +”, ACM pp. 51-58, Aug. 1992. |
Hayes, Using key object opportunism to collect old objects, ACM OOPSLA, pp. 33-46, May 1991. |
Bensley et al., “An execution model for distributed object oriented comutation”, ACM OOPSLA pp. 316-322, Oct. 1987. |
Jarvinen et al., “Object oriented specification of reactive systems”, IEEE, pp. 63-71, 1990. |
Jacobson, “Object oriented development in an industrial environment”, ACM OOPSLA, pp. 183-191; Oct., 1987. |
Taylor et al., “An object message model for the development of integrated workstation software”, ACM pp. 43-52, Jul. 1990. |
Durham et al., “A framework for run-time systems and its visual programming language”, OOPSLA '96, ACM. pp. 406-420. |
Ellis et al., The Annotated C + + Reference Manual, pp. 176-178 and 239-260, Jun. 1990. |
D. A. Taylor, Object Oriented Information Systems Planning and Implementation, Apr. 10, 1992. |
G. Booch, Object Oriented Analysis and Design, pp. 473-476, 1994. |
J. Martin, Principles of Object Oriented Analysis and Design, p. 14, Oct. 1992. |
Booch et al., Software Engineering with ADA pp. 242-252 and 520, Aug. 13, 1993. |
Orafali et al. “The Essential Distributed Object Survival Guide” pp. 429-452, Sep. 14, 1995. |
G. L. Moore, “The G2 Development and Deployment Environment”, 1992. |
G. L. Kovacs, “Simulation-Scheduling System Using Hybrid Software Technology”, 1994. |