Definitions

Sorry, no definitions found. You may find more data at run-time.

Etymologies

Sorry, no etymologies found.

Support

Help support Wordnik (and make this page ad-free) by adopting the word Run-time.

Examples

  • Run-time performance is also an important criterion.

    Reflective Surface - On GUI Development 2004

  • Run-time is only a tiny fraction of the real time-cost associated with any particular language.

    Team Euro Code « Climate Audit 2006

  • Errors: Runtime Errors ● Run-time Errors - errors that will not display until you run or execute your program - Even programs that compile successfully may display wrong answers if the programmer has not thought through the logical processes and structures of the program.

    Recently Uploaded Slideshows Dmtech 2010

  • Errors: Runtime Errors ● Run-time Errors - errors that will not display until you run or execute your program - Even programs that compile successfully may display wrong answers if the programmer has not thought through the logical processes and structures of the program.

    Recently Uploaded Slideshows Dmtech 2010

  • (Oliver) Video Duration/Run-time: 9 min. 53 sec. Video Music length: 9 min. 53 sec. Video

    WN.com - Articles related to USA 3 Australia 1: Beckham employed as Capello's secret agent 2010

  • Run-time load a class the first time you call a method in it.

    search.cpan.org Anthony Brummett 2010

  • However, all recent update attempts have failed, every time, with this "Run-time error 97".

    Wilders Security Forums 2010

  • Run-time control and execution enforcement means ensuring that the right work gets done at the right time with the right resources.

    Latest News from Open Source Magazine 2010

  • "Run-time error '97': Can not call friend function on object which is not an instance of defining class"

    Wilders Security Forums 2010

  • The Client/Server Run-time Subsystem (CSRSS) in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly kill processes after a logout, which allows local users to obtain sensitive information or gain privileges via a crafted application that continues to execute throughout the logout of one user and the login session of the next user, aka "CSRSS Local Privilege Elevation Vulnerability."

    National Vulnerability Database nvd@nist.gov 2010

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.