• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 10,457
Next 10 →

Table 5-8 The Dictionary Type Functionalities

in CORBA Scripting Language
by Corbascript August Copyright, Commissariat À L’energie Atomique, Silicomp Ingenierie, Université De Nantes Lrsg
"... In PAGE 34: ...The description of CorbaScript grammar uses a syntax notation that is similar to Extended Backus-Naur Format (EBNF). Table5 -1 lists the symbols used in this format and their meaning. 5.... In PAGE 35: ...2.4 Keywords The identifiers listed in Table5 -3 are reserved for use as keywords and may not be used otherwise. Keywords obey the rules for identifiers (see quot;Identifiers quot; on page 5-27) and must be written exactly as shown in the above list.... In PAGE 35: ... For example, quot;class quot; is correct ; quot;Class quot; refers to an identifier and can produce an interpretation error. CorbaScript scripts use the characters shown in Table5 -3 as punctuation. 5.... In PAGE 36: ...able 3-5 on page 3-6 in the CORBA 2.3 specification). The meaning of all other characters is implementation-dependent. Nongraphic characters must be represented using escape sequences as defined below in Table5 -4. Note that escape sequences must be used to represent single quote and backslash characters in character literals.... In PAGE 47: ... It allows programmers to check typing information for instance to check argument types of a procedure. Table5 -5 enumerates the set of functionalities which are supported by all CorbaScript objects and types. 5.... In PAGE 49: ... Strings support a set of attributes, methods and operators. All these functionalities are enumerated in Table5 -6 and they never modify the target string. When indexes are out of the string bounds, an exception BadIndex is raised (see Section 5.... In PAGE 51: ... Moreover, array objects provide a set of operators, attributes and methods. All these functionalities are enumerated in Table5 -7. When indexes are out of the array bounds, a CorbaScript internal exception BadIndex is raised.... In PAGE 53: ... Dictionary objects provide a set of operators, attributes and methods. All these functionalities are enumerated in Table5 -7. Searching a key that is not contained by a dictionary raises a CorbaScript internal NotFound exception.... In PAGE 54: ...7.6 Predefined Internal Procedures CorbaScript provides some predefined internal procedures, see Table5 -9, respectively named by the following identifiers: eval, exec, getline, print, and println. The eval function provides the classical powerful evaluation function: it takes a stringified script, executes it, and returns the result of this evaluation.... ..."

Table 5.8: Task and subtasks at Frankfurt International Airport.

in unknown title
by unknown authors

Table 1. A comparison of Enterprise Grid and Web 2.0 aproaches.

in Introduction Cyberinfrastructure and Web 2.0
by Marlon E. Pierce, Geoffrey Fox A, Huapeng Yuan A, Yu Deng A
"... In PAGE 1: ... We compare Web 2.0 with Enterprise-style cyberinfrastructure aplications in the Table1 . This table wil also ... In PAGE 2: ...As sumarized in Table1 , there is a paralel betwen conventional cyberinfrastructure (Web Services, science portals, virtual organizations), and Web 2.0 (REST services, rich internet aplications, online comunities).... In PAGE 16: ...0 technologies with an atempt to show how they can be used and combined with Cyberinfrastructure and e-Science. As the term e-Science implies, much work on cyberinfrastructure has focused on Enterprise-style aplications that we surveyed in column 2 of Table1 . The Enterprise aproach may be roughly characterized as requiring specialized programing and development expertise with particular tols (such as the Globus tolkit or the OGSA-DAI database services) and places an emphasis on sophistication (such as complicated ... ..."

Table 1. Primitive BinX data types.

in Binx - a tool for retrieving, searching and transforming structured binary files
by Rob Baxter, Robert Carroll, Denise J. Ecklund, Bob Gibbins, Davy Virdee, Ted Wen 2003
"... In PAGE 3: ...1 Data Types BinX supports a broad range of primitive data types, particularly those that are important for e- Science applications. Table1 summarises currently supported BinX data types. The underlying physical representation of each primitive data type must be described.... ..."
Cited by 3

Table 2. Experiment results

in Service Provisioning for HLA-based Distributed Simulation on the Grid
by Yong Xie Yong, Yong Meng Teo, Wentong Cai, Stephen John Turner
"... In PAGE 7: ... For example, in the e-Science cluster at Birming- ham University, each node has 2 GBytes of memory and 2 Intel Xeon 3GHz processors, with Red Hat Enterprise Linux (RHEL) system version AS 3 as the operating system. The experimental results are shown in Table2 . The clus- ter version of the latency benchmark shows that our pro- totype incurs about 40 millisecond of overhead in a clus- ter, and this is mainly due to the use of Globus, the encod- ing/decoding of parameters/result, and the communication cost.... ..."

Table 3: Similar Challenges Between Data Provenance and Software Traceability.................................................19

in Establishing the Connection Between Software Traceability and Data Provenance
by Hazeline Asuncion, Richard N. Taylor 2007
"... In PAGE 19: ...2 Similar Challenges Many of the manifestations of the software traceability problem parallel the problems in e- Science. In fact, the problems in e-Science can also be classified into the three perspectives we mentioned: economic, technical, and social (see Table3 ). ... In PAGE 20: ... 19 of 51 Table3 : Similar Challenges Between Data Provenance and Software Traceability 5.3 Similar Requirements Although there are different uses for provenance across the different fields in science, the basic requirements of recording, querying, and processing provenance information are applicable across science [84].... ..."

Table 5 . 8 Table 5 - International Amateur Radio Bands 9

in unknown title
by unknown authors

Table 5.8: Best

in Towards a Versatile System for the Visual Recognition of Surface Defects
by Miroslav Koprnicky 2005

Table 5.8. (continued)

in
by unknown authors

Table 5: Test pattern generation IDDQ statistics (standard cell) VLSI. In Proceedings of International Test Conference, pages 938{947. IEEE, 1990. [SM90] Thomas Storey and Wojciech Maly. CMOS bridging fault detection. In Proceedings of International Test Conference, pages 842{ 851. IEEE, 1990.

in Test Pattern Generation for Realistic Bridge Faults in CMOS ICs
by Joel Ferguson, Tracy Larrabee 1991
"... In PAGE 6: ... Possible solutions are to em- ploy IDDQ testing [Ack83], apply more accurate circuit simulation of faults, detect the bridge as a delay fault, or redesign the cells so that a discrepancy is guaran- teed for at least one input combination for each cell. In Table5 we show the results of our system generating IDDQ test patterns for same set of bridging faults that produced the results in Table 4. We also plan on integrating the testing for breaks on the interconnection lines, and the testing for defects within the cells to Carafe and Nemesis.... ..."
Cited by 41
Next 10 →
Results 11 - 20 of 10,457
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University