Identification of redundancies and omissions among...
Identification of vacuous predicates in computer programs
Identifier implementation mapping and methods of using...
Identifier implementation mapping and methods of using...
Identifying a kernel structure using an element and a...
Identifying date fields for runtime year 2000 system...
Identifying memory leaks in computer systems
Identifying non-externalized text strings that are not...
Identifying pure pointers to disambiguate memory references
Identifying references to objects during bytecode verification
Identifying use of a restricted term in a source file
IF statement having an expression setup clause to be...
Implementation for an object oriented run-time extensible item
Implementation for an object oriented run-time extensible item
Implementation of distributed and asynchronous processing in...
Implementation of distributed and asynchronous processing in...
Implementing a design flow for a programmable hardware...
Implementing a design flow for a programmable hardware...
Implementing a technical software application in a mobile...
Implementing enhanced compiled breakpoint analysis