Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,065,862 papers from all fields of science
Search
Sign In
Create Free Account
Executable
Known as:
Executable files
, Object program
, Executable code
Expand
In computing, executable code or an executable file or executable program, sometimes simply an executable, causes a computer "to perform indicated…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Artifact (software development)
Backward compatibility
Behavior tree
Binary file
Expand
Broader (1)
Programming language implementation
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Towards Modeling Web Service Composition in UML
Roy Grønmo
,
I. Solheim
WSMAI
2016
Corpus ID: 4596015
This paper focuses on how to model and build composite web ser- vices from already existing services. We build on the experience…
Expand
2012
2012
Event-based parareal: A data-flow based implementation of parareal
L. Berry
,
W. Elwasif
,
J. Reynolds-Barredo
,
D. Samaddar
,
R. Sánchez
,
D. Newman
Journal of Computational Physics
2012
Corpus ID: 17837300
2009
2009
New Technique of Hidden Data in PE-File with in Unused Area One
A. Zaidan
,
B. Zaidan
,
Fazidah Othman
2009
Corpus ID: 62538048
The strength of the combination between hiding and encryption science is due to the non-existence of standard algorithms to be…
Expand
2008
2008
Managing the Life-cycle of Industrial Automation Systems with Product Line Variability Models
R. Froschauer
,
Deepak Dhungana
,
P. Grünbacher
34th Euromicro Conference Software Engineering…
2008
Corpus ID: 18142636
The current trend towards component-based software architectures has also influenced the development of industrial automation…
Expand
Highly Cited
2005
Highly Cited
2005
Model-driven semantic Web service composition
Roy Grønmo
,
M. Jäger
Asia-Pacific Software Engineering Conference
2005
Corpus ID: 17077241
As the number of available Web services increases there is a growing demand to realise complex business processes by combining…
Expand
2005
2005
From RosettaNet PIPs to BPEL processes: A three level approach for business protocols
Rania Y. Khalaf
Data & Knowledge Engineering
2005
Corpus ID: 29461485
2004
2004
Business Rule Verbalization
T. Halpin
Information Systems Technology and its…
2004
Corpus ID: 17178683
Business rules should first be specified at the conceptual level, using concepts and languages easily understood by the business…
Expand
2003
2003
A Benchmarking Methodology for Network Processors
Mel Tsai
,
C. Kulkarni
,
Niraj Shah
,
K. Keutzer
,
C. Sauer
2003
Corpus ID: 1688504
Highly Cited
1992
Highly Cited
1992
Monitoring timing constraints in distributed real-time systems
S. Raju
,
R. Rajkumar
,
F. Jahanian
[] Proceedings Real-Time Systems Symposium
1992
Corpus ID: 15534474
A run-time environment for monitoring distributed real-time systems is described. In particular, the authors focus on the problem…
Expand
1989
1989
Modelling sensors: Toward automatic generation of object recognition program
K. Ikeuchi
,
T. Kanade
Computer Vision Graphics and Image Processing
1989
Corpus ID: 3446077
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE