• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 93,069
Next 10 →

Table 3. Inference Rules of the Closure Operation.

in Object-Oriented Nets with Algebraic Specifications: The CO-OPN/2 Formalism
by Olivier Biberstein, Didier Buchs, Nicolas Guelfi 1997
"... In PAGE 34: ... The closure operation consists of the function Closure : TSSpec;A ! TSSpec;A such that Closure(TS) is the least xed point which results from the application on TS of the inference rules Seq, Sim, Alt-1, Alt-2, and Sync given in Table 3. The inference rules of Table3 can be informally formulated as follows: The Seq rule infers the sequence of two transitions provided that the mark- ings shared between m0 1 and m2 are equal. The double arrow under the e1 event forces that e1 leads to a stable state.... ..."
Cited by 18

Table 2: Four kinds of DNA code operators.

in Molecular Immunocomputing with Application to Alphabetical Pattern Recognition Mimics the Characterization of ABO Blood Type
by Su Dong Kim, Biointelligence Lab
"... In PAGE 4: ..., 1991). After overlapping the 2-D pixel image coded by DNA bases with the standard operating template, each pixel undergoes a kind of DNA code mutation ( Table2 ). We select one-dimensional (1-D) DNA string from this mutation result.... ..."

Table 2. Sub{Word Operations.

in Single Chip Dual-Issue RISC Processor for Real-Time MPEG-2 Software Decoding
by Edgar Holmann, Toyohiko Yoshida, Akira Yamada, Shin--ichi Uramoto, P. Burleson, Konstantinos Konstantinides 1997

Table 4: Converting a Horn Clause to a Closure Operator ^ .

in The Common Order-Theoretic Structure of Version Spaces and ATMS's
by Carl A. Gunter, Teow-hin Ngair, Devika Subramanian 1991
"... In PAGE 41: ... We can convert this math- ematics for ATMS computation into pseudo-code in the way Tables 1 and 2 did for version spaces. Pseudo-code for the operation 7! ^ , which takes a Horn clause to the corresponding closure operator on la- bel functions, is given in Table4 . In the program there, the following functions are taken from the anti-chains interface: upper_union upper_homogeneous_intersection singleton empty The rst two of these we have encountered before.... In PAGE 42: ... The Common Lisp function apply is similar but does not use the `end value apos; x. In Table4 , the end value used is f;g (which is not to be confused with the empty set itself). In particular, note the case in which has the form ) a so that S is the emptyset.... ..."
Cited by 6

Table I: Execution Times and Code Size creation of closure objects. The semantics of AspectJ dictate that in a cyclical graph, the order of the execution of advice methods is determined by the dynamic residues before any advice is executed. Because those residues and the resulting execution order can be arbitrarily complex, we decided that closures offer a clean, general solution. As observed previously, cycles in the advice-on-advice application graph are very rare and usually pathological. It therefore seems unnecessary to try to avoid closures under these circumstances. We have, however, strived to minimise the cost of closures; we create specialised closure classes with fields matching the types of context values, whereas ajc uses an expensive object array to store context values (requiring boxing of primitive types).

in Optimising AspectJ
by Optimising Aspectj, Pavel Avgustinov, Aske Simon Christensen, Laurie Hendren, Sascha Kuzins, Ondřej Lhoták, Jennifer Lhoták, Oege De Moor, Damien Sereni, Ganesh Sittampalam, Julian Tibble 2004

Table I: Execution Times and Code Size creation of closure objects. The semantics of AspectJ dictate that in a cyclical graph, the order of the execution of advice methods is determined by the dynamic residues before any advice is executed. Because those residues and the resulting execution order can be arbitrarily complex, we decided that closures offer a clean, general solution. As observed previously, cycles in the advice-on-advice application graph are very rare and usually pathological. It therefore seems unnecessary to try to avoid closures under these circumstances. We have, however, strived to minimise the cost of closures; we create specialised closure classes with fields matching the types of context values, whereas ajc uses an expensive object array to store context values (requiring boxing of primitive types).

in The abc Group
by Optimising Aspectj, Pavel Avgustinov, Aske Simon Christensen, Laurie Hendren, Sascha Kuzins, Jennifer Lhoták, Oege De Moor, Damien Sereni, Ganesh Sittampalam, Julian Tibble 2004

Table 1: Application of the operators

in unknown title
by unknown authors
"... In PAGE 4: ... It can be shown that the sequential execution of these three operators results in a perfect unshu e over the initial index. Table1 shows an example of the application of the previous methodology for mapping a trellis with 16 states onto an architecture composed of two PE (four ACS units) with two I/O paths each. Therefore, the index of each state has three bits (8 states), with 1 PE bit (2 PEs), 1 CYCLE bit and 1 PATH bit (2 paths).... ..."

Table 2: Sub{Word Operations. Opcode Operation

in unknown title
by unknown authors 1996
Cited by 1

Table 1. Complexity of sample applications

in FlexCup: A Flexible and Efficient Code Update Mechanism for Sensor Networks
by Pedro José Marrón, Matthias Gauger, Andreas Lachenmann, Daniel Minder, Olga Saukh, Kurt Rothermel 2006
"... In PAGE 10: ... Finally, AcousticLocalization is able to determine the distance of neighboring sensor nodes by taking advantage of the difference in speed of radio waves and sound. Table1 gives details about the complexity of the three applications showing the respective code size, the number of nesC components and the number of binary components. Table 1.... ..."
Cited by 17

Table 1. Comparison of DNA computers with conventional computers

in § Corresponding authors:
by Ji Youn Lee, Soo-yong Shin, Tai Hyun Park, Byoung-tak Zhang
"... In PAGE 3: ... Computing with DNA molecules has many advantages over conventional computing methods that utilize solid-state semiconductors. The properties of DNA computing compared with conventional computers are summarized in Table1 . Though DNA computing performs individual operations slowly, it can execute billions of operations simultaneously.... ..."
Next 10 →
Results 1 - 10 of 93,069
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University