• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 9,615
Next 10 →

Global Storing Mechanisms for Tabled Evaluation

by Jorge Costa , Ricardo Rocha - In International Conference on Logic Programming, number 5366 in LNCS , 2008
"... Abstract. Arguably, the most successful data structure for tabling is tries. However, while tries are very efficient for variant based tabled evaluation, they are limited in their ability to recognize and represent repeated terms in different tabled calls or/and answers. In this paper, we propose a ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
a new design for the table space where tabled terms are stored in a common global trie instead of being spread over several different tries.

Coda: A Highly Available File System for a Distributed Workstation Environment

by Mahadev Satyanarayanan, James J. Kistler, Puneet Kumar, Maria E. Okasaki, Ellen H. Siegel, David C. Steere - IN IEEE TRANSACTIONS ON COMPUTERS , 1990
"... Coda is a file system for a large-scale distributed computing environment composed of Unix workstations. It provides resiliency to server and network failures through the use of two distinct but complementary mechanisms. One mechanism, server replication,stores copies of a file at multiple servers ..."
Abstract - Cited by 530 (45 self) - Add to MetaCart
Coda is a file system for a large-scale distributed computing environment composed of Unix workstations. It provides resiliency to server and network failures through the use of two distinct but complementary mechanisms. One mechanism, server replication,stores copies of a file at multiple

The protection of information in computer systems

by Jerome H. Saltzer, Michael D. Schroeder
"... This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main sectio ..."
Abstract - Cited by 824 (2 self) - Add to MetaCart
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main

RCS -- a system for version control

by Walter F. Tichy , 1991
"... An important problem in program development and maintenance is version control, i.e., the task of keeping a software system consisting of many versions and configurations well organized. The Revision Control System (RCS) is a software tool that assists with that task. RCS manages revisions of text d ..."
Abstract - Cited by 456 (7 self) - Add to MetaCart
documents, in particular source programs, documentation, and test data. It automates the storing, retrieval, logging and identification of revisions, and it provides selection mechanisms for composing configurations. This paper introduces basic version control concepts and discusses the practice of version

Open Access Position Accuracy Analysis on Disc Storing Mechanism for Benthic Drill

by Y. Guo, Y. P. Jin, M. Jiang, B. W. Luo
"... Abstract: The positional accuracy of disc storing mechanism for benthic drill is the guarantee of long hole coring in deep sea. Aiming the lack of positional accuracy analysis on disc storing mechanism, the mathematic model of the positional accuracy for disc storing mechanism is presented by using ..."
Abstract - Add to MetaCart
Abstract: The positional accuracy of disc storing mechanism for benthic drill is the guarantee of long hole coring in deep sea. Aiming the lack of positional accuracy analysis on disc storing mechanism, the mathematic model of the positional accuracy for disc storing mechanism is presented by using

The Constitution of

by Presbyterian Church (u. S. A, Presbyterian Church (u. S. A , 1960
"... Copyright 2013 by the Office of the General Assembly Presbyterian Church (U.S.A.) No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronically, mechanically, photocopying, recording, or otherwise (brief quotations used in mag ..."
Abstract - Cited by 411 (2 self) - Add to MetaCart
Copyright 2013 by the Office of the General Assembly Presbyterian Church (U.S.A.) No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronically, mechanically, photocopying, recording, or otherwise (brief quotations used

MPI: A Message-Passing Interface Standard

by Message Passing Interface Forum , 1994
"... process naming to allow libraries to describe their communication in terms suitable to their own data structures and algorithms, ffl The ability to "adorn" a set of communicating processes with additional user-defined attributes, such as extra collective operations. This mechanism should ..."
Abstract - Cited by 410 (0 self) - Add to MetaCart
provide a means for the user or library writer effectively to extend a message-passing notation. In addition, a unified mechanism or object is needed for conveniently denoting communication context, the group of communicating processes, to house abstract process naming, and to store adornments. 1 2 3 4 5

Using Prototypical Objects to Implement Shared Behavior in Object Oriented Systems

by Henry Lieberman , 1986
"... A traditional philosophical controversy between representing general concepts as abstract sets or classes and representing concepts as concrete prototypes is reflected in a controversy between two mechanisms for sharing behavior between objects in object oriented programming languages. Inheritance s ..."
Abstract - Cited by 402 (2 self) - Add to MetaCart
, and new objects can re-use part of the knowledge stored in the prototype by saying how the new object differs from the prototype. The prototype approach seems to hold some advantages for representing default knowledge, and incrementally and dynamically modifying concepts. Delegation is the mechanism

Corporate Yield Spreads: Default Risk or Liquidity? New Evidence from the Credit Default Swap Market

by Sanjay Mithal, Francis A. Longstaff, Eric Neis, Sanjay Mithal, Alan White, Ryoichi Yamabe, Francis A. Longstaff Sanjay Mithal, Eric Neis - Journal of Finance , 2005
"... Copyright c○2004 by the authors. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. ..."
Abstract - Cited by 359 (8 self) - Add to MetaCart
Copyright c○2004 by the authors. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher.

A New Approach to Manipulator Control: The Cerebellar Model Articulation Controller

by J. S. Albus - (CMAC), TRANS. ASME, SERIES G. JOURNAL OF DYNAMIC SYSTEMS, MEASUREMENT AND CONTROL , 1975
"... (CMAC) [1, 2] is a neural network that models the structure and function of the part of the brain known as the cerebellum. The cerebellum provides precise coordination of motor control for such body parts as the eyes, arms, fingers, legs, and wings. It stores and retrieves information required to co ..."
Abstract - Cited by 366 (5 self) - Add to MetaCart
(CMAC) [1, 2] is a neural network that models the structure and function of the part of the brain known as the cerebellum. The cerebellum provides precise coordination of motor control for such body parts as the eyes, arms, fingers, legs, and wings. It stores and retrieves information required
Next 10 →
Results 1 - 10 of 9,615
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University