Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,258,724 papers from all fields of science
Search
Sign In
Create Free Account
Storage violation
Known as:
STORAGE VIOLATIONS
, Violation
In computing a storage violation is a hardware or software fault that occurs when a task attempts to access an area of computer storage which it is…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Bounds checking
Call stack
Customer Information Control System (CICS)
Debugger
Expand
Broader (2)
Computer memory
Memory management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Grammatical understanding, literacy and text messaging in school children and undergraduate students: A concurrent analysis
C. Wood
,
Nenagh Kemp
,
S. Waldron
,
L. Hart
Comput. Educ.
2014
Corpus ID: 7569861
Highly Cited
2012
Highly Cited
2012
Missing verbal inflections as a representational problem: Evidence from self-paced reading
B. Vanpatten
,
Gregory D. Keating
,
Michael J. Leeser
2012
Corpus ID: 62564773
A continuing concern in second language acquisition (SLA) research is whether problems with inflectional morphology are…
Expand
2012
2012
Self-Adaptive and Resource-Efficient SLA Enactment for Cloud Computing Infrastructures
M. Maurer
,
I. Brandić
,
R. Sakellariou
IEEE Fifth International Conference on Cloud…
2012
Corpus ID: 7805020
Cloud providers aim at guaranteeing Service Level Agreements (SLAs) in a resource-efficient way. This, amongst others, means that…
Expand
2007
2007
Aspect-Oriented Design Principles : Lessons from Object-Oriented Design
D. Wampler
2007
Corpus ID: 17321981
class Polygon implements Shape { Point getVertex(index i) {...} void draw() {...} String toString() {...} } class Triangle…
Expand
Highly Cited
2004
Highly Cited
2004
Trade Disputes and the Implementation of Protection under the GATT: An Empirical Assessment
C. Bown
2004
Corpus ID: 28488571
Highly Cited
2001
Highly Cited
2001
Endogeneity and Heterogeneity in a Probit Demand Model: Estimation Using Aggregate Data
Pradeep Chintagunta
2001
Corpus ID: 14834286
Two issues that have become increasingly important while estimating the parameters of aggregate demand functions to study firm…
Expand
Highly Cited
1999
Highly Cited
1999
Sympathy and phonological opacity
J. McCarthy
Phonology
1999
Corpus ID: 53666164
A central idea in rule-based phonology is the serial derivation (Chomsky & Halle 1968). In a serial derivation, an underlying…
Expand
Highly Cited
1997
Highly Cited
1997
Quality-of-service-oriented medium access control for wireless ATM networks
N. Passas
,
S. Paskalis
,
D. Vali
,
L. Merakos
IEEE Communications Magazine
1997
Corpus ID: 2200121
The medium access control (MAC) protocol and the underlying traffic scheduling algorithm developed within project Magic WAND…
Expand
1992
1992
Subjacency Violations and Empty Categories in Second Language Acquisition
Lydia White
1992
Corpus ID: 61912973
Research on first language (L1) acquisition or on language processing that is conducted within the framework of Government…
Expand
Highly Cited
1992
Highly Cited
1992
Island constraints : theory, acquisition and processing
H. Goodluck
,
M. Rochemont
1992
Corpus ID: 60367237
Island Constraints: An Introduction H. Goodluck, M. Rochemont. No Variable is an Island: Complexity and Island Constraints R…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE