id
stringlengths
40
40
text
stringlengths
9
86.7k
metadata
stringlengths
3k
16.2k
source
stringclasses
1 value
added
stringdate
2024-11-21 00:00:00
2024-12-12 00:00:00
created
stringdate
2024-11-21 00:00:00
2024-12-12 00:00:00
f1701079ed26fba17e13db08da45e0f89f0f35bb
Study on Visual Knowledge Structure Reasoning Huimin Lu 1College of Software Engineering, Changchun University of Technology, Changchun, China 2College of Computer Science and Technology, Jilin University, Changchun, China Email: luhm.cc@gmail.com 2Liang Hu and Gang Liu1 Email: hul@jlu.edu.cn, liug8818@mail.ccut.edu...
{"Source-Url": "http://ojs.academypublisher.com/index.php/jsw/article/viewFile/0605783/3032", "len_cl100k_base": 6560, "olmocr-version": "0.1.49", "pdf-total-pages": 8, "total-fallback-pages": 0, "total-input-tokens": 27844, "total-output-tokens": 8199, "length": "2e12", "weborganizer": {"__label__adult": 0.00035476684...
olmocr_science_pdfs
2024-11-27
2024-11-27
49d36f0903458cf5d9033350bb13edcc8517a334
[REMOVED]
{"Source-Url": "http://ftp10.us.freebsd.org/users/azhang/disc/springer/0558/papers/2453/24530524.pdf", "len_cl100k_base": 4110, "olmocr-version": "0.1.50", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 20424, "total-output-tokens": 5286, "length": "2e12", "weborganizer": {"__label__adult": 0.0...
olmocr_science_pdfs
2024-11-30
2024-11-30
00ac46a9b5e9a4644467609c8f6ad5b3fb068c21
SOA Governance from an Enterprise Architecture Viewpoint Thaíssa Diírr, Leonardo Guerreiro Azevedo, Flávia Maria Santoro 1Post-Graduation Program in Informatics Federal University of the State of Rio de Janeiro (UNIRIO), Brazil 2IBM Research - Brazil {thaissa.medeiros, azevedo, flavia.santoro}@uniriotec.br; lga@br.ib...
{"Source-Url": "http://www.lbd.dcc.ufmg.br/colecoes/sbsi/2014/0042.pdf", "len_cl100k_base": 6324, "olmocr-version": "0.1.49", "pdf-total-pages": 12, "total-fallback-pages": 0, "total-input-tokens": 27556, "total-output-tokens": 8700, "length": "2e12", "weborganizer": {"__label__adult": 0.0005064010620117188, "__label__...
olmocr_science_pdfs
2024-11-27
2024-11-27
794faa85ef1e8e27769c2fb1890685f540888234
Comparing and Contrasting Adaptive Middleware Support in Wide-Area and Embedded Distributed Object Applications Joseph Loyall, Richard Schantz, John Zinky, Partha Pal, Richard Shapiro, Craig Rodrigues, Michael Atighetchi, David Karr BBN Technologies jloyall@bbn.com Jeanna M. Gossett The Boeing Company Jeanna.Gossett@...
{"Source-Url": "https://www.cse.wustl.edu/~cdgill/publications/ICDCS2001AdaptiveMiddleware.pdf", "len_cl100k_base": 7486, "olmocr-version": "0.1.53", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 31022, "total-output-tokens": 9189, "length": "2e12", "weborganizer": {"__label__adult": 0.0003485...
olmocr_science_pdfs
2024-12-09
2024-12-09
9b07fe94e43f97c7a91bf09de2f138ac05b94f65
Florian Matthes, Christian Neubert, Alexander W. Schneider Fostering Collaborative and Integrated Enterprise Architecture Modelling Enterprise Architecture Management (EAM) is a challenging task in modern enterprises. Tools supporting EA management activities are based on extensive models either created by enterprise...
{"Source-Url": "https://www.emisa-journal.org/emisa/article/download/100/75", "len_cl100k_base": 7837, "olmocr-version": "0.1.53", "pdf-total-pages": 14, "total-fallback-pages": 0, "total-input-tokens": 37906, "total-output-tokens": 9952, "length": "2e12", "weborganizer": {"__label__adult": 0.0004837512969970703, "__la...
olmocr_science_pdfs
2024-12-10
2024-12-10
0056b66a9db5bcef4c5fdbf50311477c8629f83e
mlogit postestimation — Postestimation tools for mlogit Postestimation commands predict margins Remarks and examples Reference Also see ## Postestimation commands The following postestimation commands are available after `mlogit`: <table> <thead> <tr> <th>Command</th> <th>Description</th> </tr> </thead> <tbody> <tr...
{"Source-Url": "https://www.stata.com/manuals/rmlogitpostestimation.pdf", "len_cl100k_base": 7054, "olmocr-version": "0.1.50", "pdf-total-pages": 11, "total-fallback-pages": 0, "total-input-tokens": 25537, "total-output-tokens": 7643, "length": "2e12", "weborganizer": {"__label__adult": 0.0003995895385742187, "__label_...
olmocr_science_pdfs
2024-12-03
2024-12-03
f4041e19d4e783ed448e89140d4aab9802e431d1
Introduction to Caché Version 2018.1 2019-09-20 # Table of Contents ## About This Book <table> <thead> <tr> <th>Section</th> <th>Page</th> </tr> </thead> <tbody> <tr> <td>About This Book</td> <td>1</td> </tr> </tbody> </table> ## 1 What Is Caché? <table> <thead> <tr> <th>Section</th> <th>Page</th> </tr> </thead> <...
{"Source-Url": "https://cedocs.intersystems.com/latest/csp/docbook/pdfs/pdfs/GIC.pdf", "len_cl100k_base": 7791, "olmocr-version": "0.1.50", "pdf-total-pages": 24, "total-fallback-pages": 0, "total-input-tokens": 43749, "total-output-tokens": 8394, "length": "2e12", "weborganizer": {"__label__adult": 0.00023376941680908...
olmocr_science_pdfs
2024-12-02
2024-12-02
d5b98dd56119111c83db0de833604b7d996ba80d
Let See Pettitt (1983) for details. An observation is said to be right-censored if we can only observe \( Y_j \) for \( j = n+1, n+2, \ldots, q \); \( n \leq q \), are censored on the right. We define the rank \( r_j \) of \( Y_j \), for \( j = 1, 2, \ldots, n \), in the usual way; \( r_j \) equals \( i \) if and only...
{"Source-Url": "http://wwwuser.gwdg.de/~nag/NAGdoc/cl/pdf/G08/g08rbc.pdf", "len_cl100k_base": 6339, "olmocr-version": "0.1.50", "pdf-total-pages": 9, "total-fallback-pages": 0, "total-input-tokens": 31138, "total-output-tokens": 7495, "length": "2e12", "weborganizer": {"__label__adult": 0.0003299713134765625, "__label_...
olmocr_science_pdfs
2024-12-02
2024-12-02
1178d57aca7c9ef5edeb7a9f105898cd448dc666
Awesome-META+: Meta-Learning Research and Learning Platform Jingyao Wang $^{1}$, Chuyuan Zhang $^{1}$, Ye Ding $^{1}$, and Yuxuan Yang $^{1}$ $^{1}$Affiliation not available October 30, 2023 Abstract Artificial intelligence technology has already had a profound impact in various fields such as economy, industry, a...
{"Source-Url": "https://d197for5662m48.cloudfront.net/documents/publicationstatus/169530/preprint_pdf/ee6b709b10cd4fae97f1c192719596fd.pdf", "len_cl100k_base": 7959, "olmocr-version": "0.1.53", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 44943, "total-output-tokens": 10086, "length": "2e12",...
olmocr_science_pdfs
2024-12-06
2024-12-06
77a0d909055a3e86b10ce8114ac4320d9f4713f5
[REMOVED]
{"Source-Url": "http://se.kaist.ac.kr/ekjee/paper/SAFECOMP2005-ekjee.pdf", "len_cl100k_base": 6964, "olmocr-version": "0.1.53", "pdf-total-pages": 14, "total-fallback-pages": 0, "total-input-tokens": 32303, "total-output-tokens": 7898, "length": "2e12", "weborganizer": {"__label__adult": 0.0004150867462158203, "__label...
olmocr_science_pdfs
2024-12-06
2024-12-06
2c2876c87ec66f81c6dc2db33544379be9cdf7dc
4.3 Minimum Spanning Trees - edge-weighted graph API - greedy algorithm - Kruskal’s algorithm - Prim’s algorithm - advanced topics Minimum spanning tree Given. Undirected graph $G$ with positive edge weights (connected). Def. A spanning tree of $G$ is a subgraph $T$ that is connected and acyclic. Goal. Find a min w...
{"Source-Url": "http://www.cs.princeton.edu/courses/archive/spring11/cos226/lectures/14-43MinimumSpanningTrees.pdf", "len_cl100k_base": 6387, "olmocr-version": "0.1.50", "pdf-total-pages": 64, "total-fallback-pages": 0, "total-input-tokens": 102956, "total-output-tokens": 8758, "length": "2e12", "weborganizer": {"__lab...
olmocr_science_pdfs
2024-11-30
2024-11-30
7e7c522624d1c9451e3acaf50eb857daf9f39cc0
Chapter 8 Basic Synchronization Principles Need for Synchronization - Multiprogramming - Multiple concurrent, independent processes - Those processes might want to coordinate activities \[ \text{shared } x, y \] Proc A { while (true) { <compute A1> write(x) <compute A2> read(y) } } Proc B {...
{"Source-Url": "http://courses.cs.vt.edu:80/~cs3204/fall2003/ali/notes/chapter8/chapter8.pdf", "len_cl100k_base": 5396, "olmocr-version": "0.1.53", "pdf-total-pages": 46, "total-fallback-pages": 0, "total-input-tokens": 65774, "total-output-tokens": 7549, "length": "2e12", "weborganizer": {"__label__adult": 0.000247240...
olmocr_science_pdfs
2024-12-09
2024-12-09
1be07e04ec58b47fca84ee58ca46ba0cc4b0f4e8
Consider the following queries. - Who was the president of China in 1998? - How old is the universe? The answer to the first query is definite. The answer to the second query is provisional at any given time. Search engines can assist in answering queries of the first kind. However, queries of the second kind are ...
{"Source-Url": "http://www1.se.cuhk.edu.hk/~apweb04/arun-4.pdf", "len_cl100k_base": 4715, "olmocr-version": "0.1.53", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 33251, "total-output-tokens": 5390, "length": "2e12", "weborganizer": {"__label__adult": 0.0006070137023925781, "__label__art_desi...
olmocr_science_pdfs
2024-12-09
2024-12-09
1634e2d7afd19db09e0d178bf00f27a50521e5b0
Smart Grid Serialization Comparison Petersen, Bo Søborg; Bindner, Henrik W.; You, Shi; Poulsen, Bjarne Published in: Computing Conference 2017 Link to article, DOI: 10.1109/SAI.2017.8252264 Publication date: 2017 Document Version Peer reviewed version Link back to DTU Orbit Citation (APA): General rights Copyri...
{"Source-Url": "https://backend.orbit.dtu.dk/ws/portalfiles/portal/127962965/Smart_Grid_Serialization_Comparision.pdf", "len_cl100k_base": 5223, "olmocr-version": "0.1.53", "pdf-total-pages": 9, "total-fallback-pages": 0, "total-input-tokens": 30287, "total-output-tokens": 6683, "length": "2e12", "weborganizer": {"__la...
olmocr_science_pdfs
2024-12-06
2024-12-06
c857c297f846e42787cf6cca15b94e63bc91208f
Chapter 2 Data and Expressions Chapter Scope • Character strings and concatenation • Escape sequences • Declaring and using variables • Java primitive types • Expressions • Data conversions • The Scanner class for interactive programs Character Strings • A string of characters can be represented as a *string literal*...
{"Source-Url": "http://cs.boisestate.edu/~amit/teaching/125/handouts/book-slides/slides02.pdf", "len_cl100k_base": 5707, "olmocr-version": "0.1.50", "pdf-total-pages": 56, "total-fallback-pages": 0, "total-input-tokens": 78360, "total-output-tokens": 7473, "length": "2e12", "weborganizer": {"__label__adult": 0.00035667...
olmocr_science_pdfs
2024-11-29
2024-11-29
fbc340bc62088e96105ac61c13020811a35d192d
Chapter - 5 DYNAMIC LEARNING CLASSIFIER FRAMEWORK (DLCF) FOR IDS Chapter 5 DYNAMIC LEARNING CLASSIFIER FRAMEWORK (DLCF) FOR IDS In this chapter we investigate the task of classification performed by intrusion detection expert and present a novel concept of building a Dynamic Learning Classifier Framework (DLCF) usin...
{"Source-Url": "http://shodhganga.inflibnet.ac.in/bitstream/10603/38969/14/15_chapter%205.pdf", "len_cl100k_base": 5443, "olmocr-version": "0.1.53", "pdf-total-pages": 21, "total-fallback-pages": 0, "total-input-tokens": 34530, "total-output-tokens": 6298, "length": "2e12", "weborganizer": {"__label__adult": 0.00054836...
olmocr_science_pdfs
2024-12-11
2024-12-11
f19e9766fa0f92ca85930c7fb827eed1054c91b1
[REMOVED]
{"Source-Url": "http://dl.ifip.org/db/conf/ifip8-1/poem2011/ZikraSZ11.pdf", "len_cl100k_base": 6097, "olmocr-version": "0.1.50", "pdf-total-pages": 15, "total-fallback-pages": 0, "total-input-tokens": 30143, "total-output-tokens": 8014, "length": "2e12", "weborganizer": {"__label__adult": 0.00030803680419921875, "__lab...
olmocr_science_pdfs
2024-12-01
2024-12-01
931f05d0a030ba32290445f7349a205bd1c72138
Trademarks Linux is a registered trademark of Linus Torvalds. PathScale is a registered trademark of Cray, Inc. Red Hat and all Red Hat-based trademarks are trademarks or registered trademarks of Red Hat, Inc. SUSE is a registered trademark of Novell, Inc. PGI is a registered trademark of NVIDIA Corporation. FLEXlm is ...
{"Source-Url": "https://support.brightcomputing.com/manuals/9.0/edge-manual.pdf", "len_cl100k_base": 5073, "olmocr-version": "0.1.53", "pdf-total-pages": 23, "total-fallback-pages": 0, "total-input-tokens": 35787, "total-output-tokens": 6070, "length": "2e12", "weborganizer": {"__label__adult": 0.00030040740966796875, ...
olmocr_science_pdfs
2024-12-12
2024-12-12
dec05c31794cf27bbdd860684078d4169587cdf6
A Java implementation of the RS1 algorithm using SQL Robert H. Warren Julia A. Johnson warren@cs.uregina.ca julia@cs.laurentian.ca Department of Computer Science University of Regina Regina, Saskatchewan Canada S4S 0A2 Technical Report TR-2000-03 ISBN 0-7731-0399-6 Abstract This paper describes a Java ...
{"Source-Url": "http://www.cs.uregina.ca/Research/Techreports/2000-03.pdf", "len_cl100k_base": 4755, "olmocr-version": "0.1.53", "pdf-total-pages": 11, "total-fallback-pages": 0, "total-input-tokens": 49770, "total-output-tokens": 5820, "length": "2e12", "weborganizer": {"__label__adult": 0.0002961158752441406, "__labe...
olmocr_science_pdfs
2024-12-08
2024-12-08
9c93f054b52aec54201f534d7d4788d057d99c9d
Mitigating the obsolescence of quality-specification models in service-based systems Romina Torres Universidad Tecnica Federico Santa Maria Chile romina@inf.utfsm.cl Nelly Bencomo INRIA Paris-Rocquencourt France nelly@acm.org Hernan Astudillo Universidad Tecnica Federico Santa Maria Chile hernan@ac...
{"Source-Url": "https://research.aston.ac.uk/portal/files/4871719/obsolescence_of_quality_specifications_models.pdf", "len_cl100k_base": 8061, "olmocr-version": "0.1.53", "pdf-total-pages": 9, "total-fallback-pages": 0, "total-input-tokens": 32531, "total-output-tokens": 10315, "length": "2e12", "weborganizer": {"__lab...
olmocr_science_pdfs
2024-12-07
2024-12-07
c948d64c4bd3518072a68a3ed0e2f4372fcd9a9a
Enhancing attendance tracking using animated QR codes: a case study Mustafa Saad Mohammed, Khamis A. Zidan Department of Computer Engineering, College of Engineering, Al-Iraqia University, Baghdad, Iraq ABSTRACT This research paper explores the effectiveness of quick response (QR) code-based attendance systems with t...
{"Source-Url": "https://ijeecs.iaescore.com/index.php/IJEECS/article/viewFile/32572/17583", "len_cl100k_base": 4711, "olmocr-version": "0.1.53", "pdf-total-pages": 8, "total-fallback-pages": 0, "total-input-tokens": 24722, "total-output-tokens": 5750, "length": "2e12", "weborganizer": {"__label__adult": 0.0006666183471...
olmocr_science_pdfs
2024-12-04
2024-12-04
2e37c47d42a45139326ddc74bd36c09e5b746cb7
Generating Fuzzy Term Sets for Software Project Attributes using Fuzzy C-Means and Real Coded Genetic Algorithms Ali Idri\textsuperscript{1}, Azeddine Zahi\textsuperscript{2} and Alain Abran\textsuperscript{3} \textsuperscript{1} Department of Software Engineering ENSIAS, Mohamed V University Rabat, Morocco, E-mail :...
{"Source-Url": "http://s3.amazonaws.com/publicationslist.org/data/a.abran/ref-1935/1044.pdf", "len_cl100k_base": 6778, "olmocr-version": "0.1.53", "pdf-total-pages": 8, "total-fallback-pages": 0, "total-input-tokens": 30084, "total-output-tokens": 7266, "length": "2e12", "weborganizer": {"__label__adult": 0.00031399726...
olmocr_science_pdfs
2024-12-08
2024-12-08
f8bc16a0dad2dc3df85f8c7fa7c1053be4061464
3.6 The Cocke-Younger-Kasami parsing algorithm Recursive descent parsing is a clear and effective method for parsing LL(1)-grammars; a string of \( n \) symbols can be parsed in \( O(n) \) time. However, LL(1)-grammars are a fairly limited class; solving the general parsing problem is not as easy. In principle the pr...
{"Source-Url": "http://www.tcs.hut.fi/Studies/T-79.148/2004S/slides/lecture08.pdf", "len_cl100k_base": 4568, "olmocr-version": "0.1.53", "pdf-total-pages": 7, "total-fallback-pages": 0, "total-input-tokens": 7371, "total-output-tokens": 5074, "length": "2e12", "weborganizer": {"__label__adult": 0.00043892860412597656, ...
olmocr_science_pdfs
2024-12-09
2024-12-09
135a4b9e52b32657944a12c2bf8fb14da150b3d5
Utah Preschool Outcomes Data System Sandeep Venigalla Utah State University Follow this and additional works at: https://digitalcommons.usu.edu/gradreports Part of the Computer Sciences Commons Recommended Citation Venigalla, Sandeep, "Utah Preschool Outcomes Data System" (2011). All Graduate Plan B and other Rep...
{"Source-Url": "https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=1086&context=gradreports", "len_cl100k_base": 8033, "olmocr-version": "0.1.53", "pdf-total-pages": 38, "total-fallback-pages": 0, "total-input-tokens": 81622, "total-output-tokens": 10175, "length": "2e12", "weborganizer": {"__label__adult": 0.0...
olmocr_science_pdfs
2024-12-07
2024-12-07
c2be514d866a7a9a8cf74f82df5d27d36e61f34e
On the duality of fault tolerant system structures. S.K. Shrivastava, L.V. Mancini, B. Randell An examination of the structure of fault tolerant systems incorporating error recovery, and in particular backward error recovery, indicates a partitioning into two broad classes. Two canonical models, each representing a p...
{"Source-Url": "http://www.cs.ncl.ac.uk/publications/trs/papers/248.pdf", "len_cl100k_base": 7799, "olmocr-version": "0.1.53", "pdf-total-pages": 40, "total-fallback-pages": 0, "total-input-tokens": 42760, "total-output-tokens": 10712, "length": "2e12", "weborganizer": {"__label__adult": 0.00037550926208496094, "__labe...
olmocr_science_pdfs
2024-12-07
2024-12-07
266efd1aef016cb944071f4284092bff14e57931
16. Review 2 Exercises Problem: Table: R(A,B,C,D,E) F= \{ \{A\} \rightarrow \{B, C\}, \{B\} \rightarrow \{A, C\}, \{A, D\} \rightarrow \{E\}, \{E\} \rightarrow \{D\}\} 1] Which of the following sets of functional dependencies is a canonical cover of F? a) \{\{A\} \rightarrow \{B, C\}, \{B\} \rightarrow \{A,C\}, \{A,D...
{"Source-Url": "http://www.cse.ust.hk/~dimitris/5311/E16.pdf", "len_cl100k_base": 5073, "olmocr-version": "0.1.50", "pdf-total-pages": 21, "total-fallback-pages": 0, "total-input-tokens": 35139, "total-output-tokens": 5807, "length": "2e12", "weborganizer": {"__label__adult": 0.0004405975341796875, "__label__art_design...
olmocr_science_pdfs
2024-11-30
2024-11-30
47725f541e2da1e2555a0fa5b8e75ae19677a587
COGNITIVE COMPLEXITY A new way of measuring understandability By G. Ann Campbell, Product Owner - SonarSource SA Abstract Cyclomatic Complexity was initially formulated as a measurement of the “testability and maintainability” of the control flow of a module. While it excels at measuring the former, its underlying m...
{"Source-Url": "https://www.sonarsource.com/docs/CognitiveComplexity.pdf", "len_cl100k_base": 5906, "olmocr-version": "0.1.53", "pdf-total-pages": 20, "total-fallback-pages": 0, "total-input-tokens": 37274, "total-output-tokens": 6980, "length": "2e12", "weborganizer": {"__label__adult": 0.0003437995910644531, "__label...
olmocr_science_pdfs
2024-12-06
2024-12-06
f8ed2a09cd3d5c5645611ddc4eb099ec347acd56
ABSTRACT Expressing program correctness often requires relating program data throughout (different branches of) an execution. Such properties can be represented using CTL+FO, a logic that allows mixing temporal and first-order quantification. Verifying that a program satisfies a CTL+FO property is a challenging problem...
{"Source-Url": "http://spinroot.com/spin/symposia/ws14/spin20140_submission_31.pdf", "len_cl100k_base": 7516, "olmocr-version": "0.1.50", "pdf-total-pages": 5, "total-fallback-pages": 0, "total-input-tokens": 25428, "total-output-tokens": 8598, "length": "2e12", "weborganizer": {"__label__adult": 0.00038814544677734375...
olmocr_science_pdfs
2024-12-01
2024-12-01
37a432545d341c7229a53b573c7ea64039d5aac5
An Automatic System Partitioning Algorithm for Mixed-Criticality Systems Emilio Salazar¹ and Alejandro Alonso¹ ¹Universidad Politécnica de Madrid ¹{esalazar, aalonso}@dit.upm.es Abstract The continuous improvement of processors computational power and the requirements on additional functionality is changing the way...
{"Source-Url": "https://ehu.eus/documents/3444171/4484751/123.pdf", "len_cl100k_base": 6446, "olmocr-version": "0.1.46", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 32909, "total-output-tokens": 8820, "length": "2e12", "weborganizer": {"__label__adult": 0.00045680999755859375, "__label__art_...
olmocr_science_pdfs
2024-11-23
2024-11-23
16acfdde7561fcc748cdecdc56819a7d6bb7127d
qCrypt Key Management Server and qClient KMIP C SDK Performance Measurement and Optimisation Tips Disclaimer QuintessenceLabs makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. QuintessenceLabs shal...
{"Source-Url": "https://www.quintessencelabs.com/wp-content/uploads/2018/04/AppNote_Performance-Measurement-Tips.pdf", "len_cl100k_base": 6179, "olmocr-version": "0.1.50", "pdf-total-pages": 13, "total-fallback-pages": 0, "total-input-tokens": 25768, "total-output-tokens": 6499, "length": "2e12", "weborganizer": {"__la...
olmocr_science_pdfs
2024-11-29
2024-11-29
e1f6650404fc132145e73c413f6fecce32d872a8
Strings **Problem:** A direct-mail advertising agency has decided to personalize its sweepstakes offers. It has prepared a basic letter with a particular customer's name, address, spouse's name, and other personal information. The company would like a computer program to make the appropriate changes to address each cu...
{"Source-Url": "http://www.sci.brooklyn.cuny.edu:80/~ziegler/Cis1_5old/CIS1_5_PT9.pdf", "len_cl100k_base": 6160, "olmocr-version": "0.1.50", "pdf-total-pages": 27, "total-fallback-pages": 0, "total-input-tokens": 45914, "total-output-tokens": 7952, "length": "2e12", "weborganizer": {"__label__adult": 0.0005731582641601...
olmocr_science_pdfs
2024-11-28
2024-11-28
d11efbdda14aa09a0e796347dbe903d52a2640b3
Variability-Resistant Software Through Improved Sensing & Modeling: Compiler Directed Strategies Rajesh K. Gupta Outline • Why variability? • Expedition’s view of UNO Machines – Sensors, Circuits, Instructions, Procedures, Tasks – Error rates, vulnerabilities, classifications • Between sense & adapt and model & ...
{"Source-Url": "http://mesl.ucsd.edu/site/talks/DATECompiler13.pdf", "len_cl100k_base": 7818, "olmocr-version": "0.1.53", "pdf-total-pages": 35, "total-fallback-pages": 0, "total-input-tokens": 77867, "total-output-tokens": 9710, "length": "2e12", "weborganizer": {"__label__adult": 0.0006341934204101562, "__label__art_...
olmocr_science_pdfs
2024-12-07
2024-12-07
20d5326ee986490deea3b410e6d6a628bfdf997a
Architecture Level Prediction of Software Maintenance PerOlof Bengtsson & Jan Bosch Department of Computer Science and Business Administration University of Karlskrona/Ronneby S-372 25 Ronneby, Sweden +46 457 787 41 [ PerOlof.Bengtsson | Jan.Bosch ] @ide.hk-r.se Abstract A method for the prediction of software mainta...
{"Source-Url": "http://www.geocities.ws/docubase/csmr_bengtsson.pdf", "len_cl100k_base": 7177, "olmocr-version": "0.1.53", "pdf-total-pages": 9, "total-fallback-pages": 0, "total-input-tokens": 27247, "total-output-tokens": 8221, "length": "2e12", "weborganizer": {"__label__adult": 0.00039768218994140625, "__label__art...
olmocr_science_pdfs
2024-12-09
2024-12-09
f56415b5ce28d7c05c0ae322aff497d8918eeffc
Service-Oriented Security An Oracle White Paper July 2010 Service-Oriented Security EXECUTIVE OVERVIEW Service-Oriented Architecture (SOA) has become an integral part of enterprise software by providing a framework to efficiently develop software as services that is easily sharable, reusable, and integrated. Nowhere...
{"Source-Url": "http://www.oracle.com/us/products/middleware/identity-management/service-oriented-security-wp-176637.pdf", "len_cl100k_base": 7306, "olmocr-version": "0.1.53", "pdf-total-pages": 20, "total-fallback-pages": 0, "total-input-tokens": 91108, "total-output-tokens": 8109, "length": "2e12", "weborganizer": {"...
olmocr_science_pdfs
2024-12-12
2024-12-12
bcfcdbbf07aa02a651d70d60a70c64e2eed4cd54
SOFTWARE MAINTENANCE & EVOLUTION LINGI2252 – PROF. KIM MENS LINGI2252 – PROF. KIM MENS CODE REFACTORING Refactoring: Improving the Design of Existing Code One of the best references on software refactoring, with illustrative examples in Java: *Refactoring: Improving the Design of Existing Code.* See also [www.ref...
{"Source-Url": "https://oer.uclouvain.be/jspui/bitstream/20.500.12279/617/5/LINGI2252-04-CodeRefactoring.pdf", "len_cl100k_base": 7196, "olmocr-version": "0.1.51", "pdf-total-pages": 83, "total-fallback-pages": 0, "total-input-tokens": 110797, "total-output-tokens": 10192, "length": "2e12", "weborganizer": {"__label__a...
olmocr_science_pdfs
2024-12-04
2024-12-04
6382930bd2a82bf8a7ba224a4ccd19a5e2e30295
Mining Sequential Patterns Jilles Vreeken How can we discover the key patterns from an event sequence? abc, da + noise (Tatti & Vreeken, KDD 2012) First things first What’s my signature? data analysis ↔ communication transfer the data to the analyst in as few as possible bits ‘induction by compression’ What does t...
{"Source-Url": "http://www.sfb1102.uni-saarland.de/wp/wp-content/uploads/2015/03/sfb-b1-coll-JillesVreeken-March2015.pdf", "len_cl100k_base": 4635, "olmocr-version": "0.1.50", "pdf-total-pages": 58, "total-fallback-pages": 0, "total-input-tokens": 83325, "total-output-tokens": 6926, "length": "2e12", "weborganizer": {"...
olmocr_science_pdfs
2024-11-29
2024-11-29
c6564484844be154df848ad728fdb117be0c07fb
WEAK MEASUREMENT THEORY AND MODIFIED COGNITIVE COMPLEXITY MEASURE Sanjay Misra, Hürevren Kılıç Department of Computer Engineering, Atılım University, Kızıldağ Köyü, İncek, Gölbasta, 06836, Ankara, Turkey {smisra, hurevren}@atilim.edu.tr Keywords: Validation criteria, weak measurement theory, software complexity measu...
{"Source-Url": "http://eprints.covenantuniversity.edu.ng/1484/1/ENASE.pdf", "len_cl100k_base": 5866, "olmocr-version": "0.1.50", "pdf-total-pages": 6, "total-fallback-pages": 0, "total-input-tokens": 21528, "total-output-tokens": 7218, "length": "2e12", "weborganizer": {"__label__adult": 0.0003311634063720703, "__label...
olmocr_science_pdfs
2024-11-30
2024-11-30
49f71e1dd869bbc2f508c798b677c0519fd7d246
Predictive Parsing The Front End - Perform a membership test: code ∈ source language? - Is the program well-formed (semantically)? - Build an IR version of the code for the rest of the compiler The front end is not monolithic The Front End - Scanner **Scanner** - Maps stream of characters into words - Basic unit ...
{"Source-Url": "http://www.cs.umd.edu/class/spring2011/cmsc430/lectures/lec05.pdf", "len_cl100k_base": 4650, "olmocr-version": "0.1.53", "pdf-total-pages": 15, "total-fallback-pages": 0, "total-input-tokens": 31427, "total-output-tokens": 5020, "length": "2e12", "weborganizer": {"__label__adult": 0.0003819465637207031,...
olmocr_science_pdfs
2024-12-07
2024-12-07
ad85dd2515ae0d353ac7073cf8b179d52a0597c4
[REMOVED]
{"len_cl100k_base": 7911, "olmocr-version": "0.1.50", "pdf-total-pages": 18, "total-fallback-pages": 0, "total-input-tokens": 36711, "total-output-tokens": 10098, "length": "2e12", "weborganizer": {"__label__adult": 0.0003886222839355469, "__label__art_design": 0.0004744529724121094, "__label__crime_law": 0.00041961669...
olmocr_science_pdfs
2024-11-30
2024-11-30
b8d211ae7e04dab3cd2247eaba7a2921a3e13b4e
ON THE DISTRIBUTION OF SOURCE CODE FILE SIZES Israel Herraiz Technical University of Madrid, Madrid, Spain Daniel M. German University of Victoria, Victoria, Canada Ahmed E. Hassan Queen’s University, Kingston, Canada Keywords: Mining software repositories, Software size estimation, Open source. Abstract: Source c...
{"Source-Url": "http://www.scitepress.org/Papers/2011/34262/34262.pdf", "len_cl100k_base": 7664, "olmocr-version": "0.1.50", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 32768, "total-output-tokens": 9048, "length": "2e12", "weborganizer": {"__label__adult": 0.0003216266632080078, "__label__a...
olmocr_science_pdfs
2024-11-27
2024-11-27
626e6c4983fb4d4534e2249720771c5b1c33d2c7
Getting Started with React Native Web developers who want to develop native mobile applications face a high barrier to entry because they are forced to learn platform-specific languages and frameworks. Numerous hybrid technologies have tried to simplify this process, but have failed to achieve the performance and appe...
{"Source-Url": "http://cdn.oreillystatic.com/oreilly/booksamplers/packt/9781785885181_Sample.pdf", "len_cl100k_base": 6975, "olmocr-version": "0.1.50", "pdf-total-pages": 32, "total-fallback-pages": 0, "total-input-tokens": 55160, "total-output-tokens": 8667, "length": "2e12", "weborganizer": {"__label__adult": 0.00044...
olmocr_science_pdfs
2024-12-02
2024-12-02
64b029bfe2396861ddd265744d7b4d6dc2826051
SLA Management in Federated Environments P. Bhoj, S. Singhal Hewlett Packard Laboratories, 1501 Page Mill Road Palo Alto, CA 94304 USA {preeti sharad}@hpl.hp.com S. Chutani * Oracle Corporation 600 Oracle Parkway Redwood Shores, CA 94065 USA schutani@us.oracle.com Abstract Increasingly, services such as E-commerce, ...
{"Source-Url": "http://dl.ifip.org/db/conf/im/im1999/BhojSC99.pdf", "len_cl100k_base": 7090, "olmocr-version": "0.1.50", "pdf-total-pages": 16, "total-fallback-pages": 0, "total-input-tokens": 35766, "total-output-tokens": 8080, "length": "2e12", "weborganizer": {"__label__adult": 0.00038313865661621094, "__label__art_...
olmocr_science_pdfs
2024-11-28
2024-11-28
57a9f8230186fda2d40ae612c47e2497f2f79679
Regular Paper Verification of Concurrent Programs Using the Coq Proof Assistant: A Case Study (Preprint) REYNALD AFFELDT,† NAOKI KOBAYASHI †† and AKINORI YONEZAWA† We show how to model and verify a concurrent program using the Coq proof assistant. The program in question is an existing mail server written in Java. T...
{"Source-Url": "https://staff.aist.go.jp/reynald.affeldt/documents/swopp04.pdf", "len_cl100k_base": 7843, "olmocr-version": "0.1.53", "pdf-total-pages": 12, "total-fallback-pages": 0, "total-input-tokens": 40851, "total-output-tokens": 10109, "length": "2e12", "weborganizer": {"__label__adult": 0.0003771781921386719, "...
olmocr_science_pdfs
2024-12-08
2024-12-08
3663bbd0684d9fe8fbb60e8f2ca15a568a02266c
Query processing • Understanding query processing helps producing better applications • SQL is a declarative language: it describes the query result, but not how to get it. • Query processing: – Query analysis → logical query plan – Query transformation – Physical plan generation and optimization – Query exe...
{"Source-Url": "http://pages.di.unipi.it/ghelli/bd2/8.queryoptimization.pdf", "len_cl100k_base": 7941, "olmocr-version": "0.1.53", "pdf-total-pages": 67, "total-fallback-pages": 0, "total-input-tokens": 93902, "total-output-tokens": 10236, "length": "2e12", "weborganizer": {"__label__adult": 0.0004010200500488281, "__l...
olmocr_science_pdfs
2024-12-06
2024-12-06
bfd52c0ace9a82f5de253c599146d9e952930f19
Towards Assisted Remediation of Security Vulnerabilities Gabriel Serme, Anderson Santana De Oliveira, Marco Guarnieri and Paul El Khoury Abstract—Security vulnerabilities are still prevalent in systems despite the existence of their countermeasures for several decades. In order to detect the security vulnerabilities ...
{"Source-Url": "http://www.eurecom.fr/en/publication/3805/download/rs-publi-3805.pdf", "len_cl100k_base": 6598, "olmocr-version": "0.1.50", "pdf-total-pages": 8, "total-fallback-pages": 0, "total-input-tokens": 24387, "total-output-tokens": 8586, "length": "2e12", "weborganizer": {"__label__adult": 0.000412702560424804...
olmocr_science_pdfs
2024-12-02
2024-12-02
cdadb9177f0f810b671cf64a66c99600dc8c42ee
[REMOVED]
{"len_cl100k_base": 6288, "olmocr-version": "0.1.53", "pdf-total-pages": 9, "total-fallback-pages": 0, "total-input-tokens": 23589, "total-output-tokens": 7978, "length": "2e12", "weborganizer": {"__label__adult": 0.0012664794921875, "__label__art_design": 0.0007829666137695312, "__label__crime_law": 0.0014705657958984...
olmocr_science_pdfs
2024-12-11
2024-12-11
02cb385e5b9f6e42731dfae90432f542539aecc6
Internet Nomenclator Project Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (1998). All Rights Reserved. Abstract The goal of the Intern...
{"Source-Url": "https://tools.ietf.org/pdf/rfc2258.pdf", "len_cl100k_base": 5407, "olmocr-version": "0.1.53", "pdf-total-pages": 15, "total-fallback-pages": 0, "total-input-tokens": 28064, "total-output-tokens": 6439, "length": "2e12", "weborganizer": {"__label__adult": 0.0003712177276611328, "__label__art_design": 0.0...
olmocr_science_pdfs
2024-12-07
2024-12-07
d6670f4895a4c643692ecab4e68b6012da8628d9
Chapter 11 Locality Lower Bounds In Chapter 1, we looked at distributed algorithms for coloring. In particular, we saw that rings and rooted trees can be colored with 3 colors in $\log^* n + O(1)$ rounds. In this chapter, we will reconsider the distributed coloring problem. We will look at a classic lower bound by Na...
{"Source-Url": "https://disco.ethz.ch/courses/fs08/distcomp/lecture/chapter11.pdf", "len_cl100k_base": 4687, "olmocr-version": "0.1.53", "pdf-total-pages": 6, "total-fallback-pages": 0, "total-input-tokens": 23009, "total-output-tokens": 5307, "length": "2e12", "weborganizer": {"__label__adult": 0.0006213188171386719, ...
olmocr_science_pdfs
2024-12-10
2024-12-10
664c79636fe761f994401fded38efb9b56398d50
Technical Note Software Device Drivers for M28W640C Parallel NOR Flash Memory Introduction This technical note describes the library source code in C for M28W640CT and M28W640CB parallel NOR Flash memory devices, which are referred to as M28W640C throughout this document unless otherwise specified. The source code i...
{"Source-Url": "https://www.micron.com/-/media/client/global/documents/products/technical-note/solid-state-storage/tn1318_m28w640c_drivers.pdf", "len_cl100k_base": 5427, "olmocr-version": "0.1.50", "pdf-total-pages": 12, "total-fallback-pages": 0, "total-input-tokens": 24822, "total-output-tokens": 5814, "length": "2e1...
olmocr_science_pdfs
2024-11-28
2024-11-28
98cba6707917484e46cf315b511c58d6c38b15f3
GENERATING SIMULINK AND STATEFLOW MODELS FROM SOFTWARE SPECIFICATIONS Keywords: Mechatronic Systems Engineering, Software Engineering, MechatronicUML 1. Introduction Innovation in today's technical systems is largely driven by embedded software. Such systems are known as mechatronic systems. For example, it has bee...
{"Source-Url": "https://www.tichy.de/publications/2012/DESIGN2012.pdf", "len_cl100k_base": 7209, "olmocr-version": "0.1.48", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 34711, "total-output-tokens": 8284, "length": "2e12", "weborganizer": {"__label__adult": 0.00047707557678222656, "__label__...
olmocr_science_pdfs
2024-11-25
2024-11-25
07a15c3251884f4b617f1378ce5ead4b9c6e3cb5
McAfee Product Security Practices 14 March 2022 # Table of Contents Importance of Security .......................................................................................................................... 3 Software Development Lifecycle (SDLC) at McAfee .........................................................
{"Source-Url": "https://www.mcafee.com/enterprise/en-us/assets/misc/ms-product-software-security-practices.pdf", "len_cl100k_base": 4905, "olmocr-version": "0.1.49", "pdf-total-pages": 12, "total-fallback-pages": 0, "total-input-tokens": 31527, "total-output-tokens": 5132, "length": "2e12", "weborganizer": {"__label__a...
olmocr_science_pdfs
2024-11-26
2024-11-26
fe4b24a77a52dce92975d36a3581465edade825c
[REMOVED]
{"Source-Url": "https://hal.archives-ouvertes.fr/hal-00956442/file/hal-00956442.pdf", "len_cl100k_base": 6373, "olmocr-version": "0.1.53", "pdf-total-pages": 11, "total-fallback-pages": 0, "total-input-tokens": 31538, "total-output-tokens": 7663, "length": "2e12", "weborganizer": {"__label__adult": 0.000441312789916992...
olmocr_science_pdfs
2024-12-09
2024-12-09
93ac12e17eb771141dee0ad67d3ee02bf8c4c5dc
A Environment Details Here we provide detailed descriptions of each of experiment environments. See (§6) for high-level descriptions and the accompanying code for implementations. A.1 Cover Environment Details - **Types:** - The block type has features height, width, x, y, grasp. - The target type has features w...
{"Source-Url": "https://proceedings.mlr.press/v205/silver23a/silver23a-supp.pdf", "len_cl100k_base": 6843, "olmocr-version": "0.1.50", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 26482, "total-output-tokens": 7319, "length": "2e12", "weborganizer": {"__label__adult": 0.0006275177001953125, "...
olmocr_science_pdfs
2024-11-28
2024-11-28
392bbc700cda4301f89b5bccc28108569013cdbd
2009 IEEE International Conference on Web Services (ICWS 2009) Los Angeles, California, USA 6-10 July 2009 Pages 1-526 Editors: E. Damiani J. Zhang R. Chang Regular Research Papers The SCIFC Model for Information Flow Control in Web Service Composition ..............................................1 Wei She, ...
{"Source-Url": "http://toc.proceedings.com/05905webtoc.pdf", "len_cl100k_base": 5310, "olmocr-version": "0.1.49", "pdf-total-pages": 12, "total-fallback-pages": 0, "total-input-tokens": 24324, "total-output-tokens": 6183, "length": "2e12", "weborganizer": {"__label__adult": 0.0003740787506103515, "__label__art_design":...
olmocr_science_pdfs
2024-11-27
2024-11-27
0d4297148848e7b53a89dce7933d97604870f6e5
BGP Link-State BGP Link-State (LS) is an Address Family Identifier (AFI) and Sub-address Family Identifier (SAFI) defined to carry interior gateway protocol (IGP) link-state database through BGP. BGP-LS delivers network topology information to topology servers and Application Layer Traffic Optimization (ALTO) servers....
{"Source-Url": "https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/configuration/xe-16/irg-xe-16-book/irg-xe-16-book_chapter_01010101.pdf", "len_cl100k_base": 6315, "olmocr-version": "0.1.48", "pdf-total-pages": 12, "total-fallback-pages": 0, "total-input-tokens": 27298, "total-output-tokens": 6946, "length"...
olmocr_science_pdfs
2024-11-25
2024-11-25
d13dc0c8143f185664648b4965b63dc4c837649f
This specification defines a way for an XMPP servers to deliver information for use in push notifications to mobile and other devices. Legal Copyright This XMPP Extension Protocol is copyright © 1999 – 2020 by the XMPP Standards Foundation (XSF). Permissions Permission is hereby granted, free of charge, to any pers...
{"Source-Url": "https://xmpp.org/extensions/xep-0357.pdf", "len_cl100k_base": 5863, "olmocr-version": "0.1.50", "pdf-total-pages": 18, "total-fallback-pages": 0, "total-input-tokens": 43703, "total-output-tokens": 7079, "length": "2e12", "weborganizer": {"__label__adult": 0.00031757354736328125, "__label__art_design": ...
olmocr_science_pdfs
2024-12-03
2024-12-03
8da5fce5e06cad17fc3fc5b36cac1ed937697856
18-447 Lecture 8: Data Hazard and Resolution James C. Hoe Department of ECE Carnegie Mellon University Housekeeping - Your goal today - detect and resolve data hazards in in-order pipelines - control flow will come next lecture - Notices - Lab 2, status check next week, due wk of 2/27 - Midterm 2/27 in class...
{"Source-Url": "https://users.ece.cmu.edu/~jhoe/course/ece447/S17handouts/L08.pdf", "len_cl100k_base": 4674, "olmocr-version": "0.1.53", "pdf-total-pages": 15, "total-fallback-pages": 0, "total-input-tokens": 47805, "total-output-tokens": 4508, "length": "2e12", "weborganizer": {"__label__adult": 0.0005393028259277344,...
olmocr_science_pdfs
2024-12-06
2024-12-06
0da3fb81b0f5468dba7d72dccf38f6676e9070d8
TUTORIAL TRACK II ADVANCED ADA TOPICS By Major Patricia Lawlis, Air Force Institute of Technology and Captain Dean Gonzalez, U.S. Air Force Academy and Lieutenant David Cook, U.S. Air Force Academy Tutorial Track II. Advanced Ada Topics MAJ Patricia Lawlis, CAPT Dean Gonzalez, and LT David Cook Ada Software Educat...
{"Source-Url": "https://apps.dtic.mil/dtic/tr/fulltext/u2/a190366.pdf", "len_cl100k_base": 7806, "olmocr-version": "0.1.53", "pdf-total-pages": 104, "total-fallback-pages": 0, "total-input-tokens": 163981, "total-output-tokens": 12275, "length": "2e12", "weborganizer": {"__label__adult": 0.00029349327087402344, "__labe...
olmocr_science_pdfs
2024-12-09
2024-12-09
8d9952104241a56a478f259e701f26f8e7ceb742
Trusted Execution Environment Provisioning (TEEP) Protocol draft-ietf-teep-protocol-00 Abstract This document specifies a protocol that installs, updates, and deletes Trusted Applications (TAs) in a device with a Trusted Execution Environment (TEE). This specification defines an interoperable protocol for managing th...
{"Source-Url": "https://tools.ietf.org/pdf/draft-ietf-teep-protocol-00.pdf", "len_cl100k_base": 5646, "olmocr-version": "0.1.53", "pdf-total-pages": 20, "total-fallback-pages": 0, "total-input-tokens": 37327, "total-output-tokens": 7163, "length": "2e12", "weborganizer": {"__label__adult": 0.0003306865692138672, "__lab...
olmocr_science_pdfs
2024-12-07
2024-12-07
4dc22a2cba89a40a2c5df646199d06ad4b32e50a
Inheritance of Interface Specifications Gary T. Leavens Iowa State University Inheritance of Interface Specifications Abstract Four alternatives for the semantics of inheritance of specifications are discussed. The information loss and frame axiom problems for inherited specifications are also considered. Keywords ...
{"Source-Url": "http://lib.dr.iastate.edu/cgi/viewcontent.cgi?article=1097&context=cs_techreports", "len_cl100k_base": 4907, "olmocr-version": "0.1.53", "pdf-total-pages": 17, "total-fallback-pages": 0, "total-input-tokens": 40393, "total-output-tokens": 7874, "length": "2e12", "weborganizer": {"__label__adult": 0.0003...
olmocr_science_pdfs
2024-12-06
2024-12-06
8f0837e39ea45d193099f2f586e08fb24a673a13
Multi-tier agent architecture for open service ecosystems Kutvonen, Lea CEUR Workshop Proceedings 2012-10-15 http://hdl.handle.net/10138/37520 Downloaded from Helda, University of Helsinki institutional repository. This is an electronic reprint of the original article. This reprint may differ from the original i...
{"Source-Url": "https://helda.helsinki.fi/bitstream/handle/10138/37520/kutvonen12multitier.pdf;jsessionid=DECB305599399810A5C2AE37ED6FA447?sequence=2", "len_cl100k_base": 7165, "olmocr-version": "0.1.49", "pdf-total-pages": 16, "total-fallback-pages": 0, "total-input-tokens": 35670, "total-output-tokens": 10054, "lengt...
olmocr_science_pdfs
2024-11-24
2024-11-24
a469edac240bc6361ef182814e4930d5f2d1986a
A survey of view selection methods Imene Mami, Zohra Bellahsene To cite this version: HAL Id: lirmm-00720157 https://hal-lirmm.ccsd.cnrs.fr/lirmm-00720157 Submitted on 23 Jul 2012 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are publ...
{"Source-Url": "https://hal-lirmm.ccsd.cnrs.fr/lirmm-00720157/file/surveyV5.pdf", "len_cl100k_base": 7297, "olmocr-version": "0.1.49", "pdf-total-pages": 11, "total-fallback-pages": 0, "total-input-tokens": 34771, "total-output-tokens": 9498, "length": "2e12", "weborganizer": {"__label__adult": 0.00040221214294433594, ...
olmocr_science_pdfs
2024-11-27
2024-11-27
6796ddb1aab630ad7f66cb2aaa3b3678fbd8af1c
1 Branch Prediction Overview 2 Software-Based Branch Prediction 2.1 Static Software Hints 2.2 Branch Delay Slots 2.3 Predication 3 Hardware-Based Branch Prediction 3.1 Fixed Branch Predictor 3.2 Branch History Table (BHT) Predictor 3.3 Two-Level Predictor For Temporal Correlation 3.4 Two-Level Pr...
{"Source-Url": "https://www.csl.cornell.edu/courses/ece4750/handouts/ece4750-T10-ap-branchpred.pdf", "len_cl100k_base": 4925, "olmocr-version": "0.1.50", "pdf-total-pages": 22, "total-fallback-pages": 0, "total-input-tokens": 31763, "total-output-tokens": 4950, "length": "2e12", "weborganizer": {"__label__adult": 0.000...
olmocr_science_pdfs
2024-11-27
2024-11-27
44b1ce92f2ca7f61d3f7f43c8b4845d773b0604f
A Meta-Framework for Generating Ontologies from Legacy Schemas Manuel Wimmer Vienna University of Technology Austria wimmer@big.tuwien.ac.at Abstract—A huge amount of schemas are expressed within outdated schema languages which are restricted concerning expressiveness, extensibility, readability, and understandabilit...
{"Source-Url": "https://publik.tuwien.ac.at/files/PubDat_177494.pdf", "len_cl100k_base": 4358, "olmocr-version": "0.1.50", "pdf-total-pages": 6, "total-fallback-pages": 0, "total-input-tokens": 20052, "total-output-tokens": 6346, "length": "2e12", "weborganizer": {"__label__adult": 0.00034880638122558594, "__label__art...
olmocr_science_pdfs
2024-11-29
2024-11-29
e5b8f9aa4ffa2cfda8eb51c25764dd034167a12a
<table> <thead> <tr> <th><strong>Title</strong></th> <th>Integrating Developer-related information across Open Source Repositories</th> </tr> </thead> <tbody> <tr> <td><strong>Author(s)</strong></td> <td>Iqbal, Aftab; Hausenblas, Michael</td> </tr> <tr> <td><strong>Publication Date</strong></td> <td>2012</td> </tr> <tr...
{"Source-Url": "https://aran.library.nuigalway.ie/bitstream/handle/10379/4510/iqbal_a_et_al_aug_2012.pdf?isAllowed=y&sequence=1", "len_cl100k_base": 6749, "olmocr-version": "0.1.53", "pdf-total-pages": 9, "total-fallback-pages": 0, "total-input-tokens": 29156, "total-output-tokens": 7833, "length": "2e12", "weborganize...
olmocr_science_pdfs
2024-12-07
2024-12-07
43d33b5d6140224be46d643b000658bd106955ea
Designing E-Banking Cardless Transaction Services Framework for Banking Sectors in Ethiopia Abebaw Teshome Temtim Assefa Follow this and additional works at: https://aisel.aisnet.org/menacis2021 This material is brought to you by the MENA at AIS Electronic Library (AISeL). It has been accepted for inclusion in MENAC...
{"Source-Url": "https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1021&context=menacis2021", "len_cl100k_base": 5875, "olmocr-version": "0.1.53", "pdf-total-pages": 13, "total-fallback-pages": 0, "total-input-tokens": 29194, "total-output-tokens": 7093, "length": "2e12", "weborganizer": {"__label__adult": 0.00133228...
olmocr_science_pdfs
2024-12-06
2024-12-06
f9a52eeead0641eaa10043e87a2d26169ca08085
[REMOVED]
{"len_cl100k_base": 6825, "olmocr-version": "0.1.53", "pdf-total-pages": 11, "total-fallback-pages": 0, "total-input-tokens": 33600, "total-output-tokens": 9477, "length": "2e12", "weborganizer": {"__label__adult": 0.00040078163146972656, "__label__art_design": 0.0002841949462890625, "__label__crime_law": 0.00025224685...
olmocr_science_pdfs
2024-12-08
2024-12-08
3a1984c9d553b52045f5eb4d3ccb5ef9771e5646
MAP decoding: The BCJR algorithm - Maximum a posteriori probability (MAP) decoding - Baum-Welch algorithm (1963?)* Decoder inputs: - Received sequence $r$ (soft or hard) - A priori $L$-values $L_a(u_l) = \ln(P(u_l = 1)/P(u_l = -1))$ Decoder outputs: - A posteriori probability (APP) $L$-values $L(u_l) = \ln(P(u_l =...
{"Source-Url": "http://www.ii.uib.no/~eirik/INF244/Lectures/Lecture11.pdf", "len_cl100k_base": 4888, "olmocr-version": "0.1.53", "pdf-total-pages": 25, "total-fallback-pages": 0, "total-input-tokens": 35544, "total-output-tokens": 6155, "length": "2e12", "weborganizer": {"__label__adult": 0.0006837844848632812, "__labe...
olmocr_science_pdfs
2024-12-07
2024-12-07
1e9ebda0f79ae7c95631724700970f6693339485
1. Status of this memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Int...
{"Source-Url": "https://tools.ietf.org/pdf/draft-ietf-ccamp-rsvp-te-exclude-route-00.pdf", "len_cl100k_base": 5815, "olmocr-version": "0.1.53", "pdf-total-pages": 26, "total-fallback-pages": 0, "total-input-tokens": 39821, "total-output-tokens": 6976, "length": "2e12", "weborganizer": {"__label__adult": 0.0004382133483...
olmocr_science_pdfs
2024-12-07
2024-12-07
4786758ed0fb56da94ac26d89d5afb4dcc2511b3
A-level COMPUTER SCIENCE (7517/1A/1B/1C/1D/1E) Paper 1 Specimen 2015 am/pm Time allowed: 2 hours 30 minutes Materials • For this paper you must have access to: • a computer • a printer • appropriate software. • An electronic version of the Skeleton Program and Data File. • A hard copy of the Preliminary Materia...
{"Source-Url": "https://filestore.aqa.org.uk/resources/computing/AQA-75171-SQP.PDF", "len_cl100k_base": 6478, "olmocr-version": "0.1.53", "pdf-total-pages": 24, "total-fallback-pages": 0, "total-input-tokens": 42747, "total-output-tokens": 7272, "length": "2e12", "weborganizer": {"__label__adult": 0.000843048095703125,...
olmocr_science_pdfs
2024-12-10
2024-12-10
8d534e898030b937f090d357c1c29757e383720e
This specification defines semantics for using the XMPP publish-subscribe protocol to broadcast state change events associated with an instant messaging and presence account. This profile of pubsub therefore enables a standard XMPP user account to function as a virtual pubsub service, easing the discovery of syndicated...
{"Source-Url": "https://xmpp.org/extensions/xep-0163.pdf", "len_cl100k_base": 6904, "olmocr-version": "0.1.53", "pdf-total-pages": 19, "total-fallback-pages": 0, "total-input-tokens": 49908, "total-output-tokens": 8466, "length": "2e12", "weborganizer": {"__label__adult": 0.0003802776336669922, "__label__art_design": 0...
olmocr_science_pdfs
2024-12-07
2024-12-07
1d078e58772c07d5c37de51f85fb31dfff0c3c1f
Package ‘DMRMark’ April 21, 2017 Type Package Title DMR Detection by Non-Homogeneous Hidden Markov Model from Methylation Array Data Version 1.1.1 Date 2017-02-25 Author Linghao SHEN <sl013@ie.cuhk.edu.hk> Depends MCMCpack, mvtnorm, ellipse Maintainer Linghao SHEN <sl013@ie.cuhk.edu.hk> Description Perform di...
{"Source-Url": "https://cran.r-project.org/web/packages/DMRMark/DMRMark.pdf", "len_cl100k_base": 4917, "olmocr-version": "0.1.53", "pdf-total-pages": 13, "total-fallback-pages": 0, "total-input-tokens": 24785, "total-output-tokens": 5715, "length": "2e12", "weborganizer": {"__label__adult": 0.0005049705505371094, "__la...
olmocr_science_pdfs
2024-12-10
2024-12-10
4d128761e501671ab5bfdc7cf9ea8f9f1efa7e40
Configuration Management with Windows PowerShell Desired State Configuration (DSC) Keeping information system baselines consistent with a formal configuration management plan can be a very difficult task. Changes to server based systems and networking must be monitored in order to provide some measure of compliance. A...
{"Source-Url": "https://www.sans.org/reading-room/whitepapers/bestprac/configuration-management-windows-powershell-desired-state-configuration-dsc-36167", "len_cl100k_base": 7904, "olmocr-version": "0.1.49", "pdf-total-pages": 26, "total-fallback-pages": 0, "total-input-tokens": 46344, "total-output-tokens": 9636, "len...
olmocr_science_pdfs
2024-11-25
2024-11-25
5933ff8f4544d293730dd65e385d0a2eddc67c45
Copyright Notice Copyright © 2019 Imperas Software Limited All rights reserved. This software and documentation contain information that is the property of Imperas Software Limited. The software and documentation are furnished under a license agreement and may be used or copied only in accordance with the terms of the ...
{"Source-Url": "http://www.ovpworld.org/documents/OVPsim_Debugging_Applications_with_GDB_User_Guide.pdf", "len_cl100k_base": 5417, "olmocr-version": "0.1.49", "pdf-total-pages": 17, "total-fallback-pages": 0, "total-input-tokens": 30322, "total-output-tokens": 6232, "length": "2e12", "weborganizer": {"__label__adult": ...
olmocr_science_pdfs
2024-11-24
2024-11-24
574841ad9cb91498211e45bbeac8fb37c49efc5a
POSIX threads parallelization for example of Particle-In-Cell density calculations in plasma computer simulations Anna Sasak*, Marcin Brzuszek Institute of Computer Science, Maria Curie Skłodowska University, pl. M. Curie-Sklodowskiej 1, 20-031 Lublin, Poland. Abstract – The TRQR program [1–4] simulates trajectories...
{"Source-Url": "https://journals.umcs.pl/ai/article/download/3282/2476", "len_cl100k_base": 4857, "olmocr-version": "0.1.53", "pdf-total-pages": 12, "total-fallback-pages": 0, "total-input-tokens": 24365, "total-output-tokens": 5670, "length": "2e12", "weborganizer": {"__label__adult": 0.00041556358337402344, "__label_...
olmocr_science_pdfs
2024-12-11
2024-12-11
5da65c4e32723af91cee38b06bf8aad70c932948
Reinforcement Learning In the previous note, we discussed Markov decision processes, which we solved using techniques such as value iteration and policy iteration to compute the optimal values of states and extract optimal policies. Solving Markov decision processes is an example of offline planning, where agents have...
{"Source-Url": "https://inst.eecs.berkeley.edu/~cs188/su20/assets/notes/n4.pdf", "len_cl100k_base": 6084, "olmocr-version": "0.1.50", "pdf-total-pages": 9, "total-fallback-pages": 0, "total-input-tokens": 30888, "total-output-tokens": 6454, "length": "2e12", "weborganizer": {"__label__adult": 0.0005397796630859375, "__...
olmocr_science_pdfs
2024-12-03
2024-12-03
2a2ffc8a4b915b937c1afa747796736cab941f2c
Lean & Agile Project Management for Large Programs & Projects Dr. David F. Rico, PMP, CSM Website: http://davidfrico.com LinkedIn: http://www.linkedin.com/in/davidfrico Facebook: http://www.facebook.com/profile.php?id=1540017424 Agenda 🌟 Overview of Agile Project Mgt. - Intro to Agile Project Mgt. - Types of Agile...
{"Source-Url": "https://www.pmiwdc.org/sites/default/files/presentations/201011/PMIW_Chantilly_presentation_101410.pdf", "len_cl100k_base": 7133, "olmocr-version": "0.1.50", "pdf-total-pages": 50, "total-fallback-pages": 0, "total-input-tokens": 97049, "total-output-tokens": 10024, "length": "2e12", "weborganizer": {"_...
olmocr_science_pdfs
2024-11-30
2024-11-30
a9cf2c605212c52e381178553ea077157f6bdff1
A hamming distance based VLIW/EPIC code compression technique Montserrat Ros University of Queensland, montse@uow.edu.au Peter Sutton University Of Queensland Follow this and additional works at: https://ro.uow.edu.au/eispapers Part of the Engineering Commons, and the Science and Technology Studies Commons Recomme...
{"Source-Url": "https://ro.uow.edu.au/cgi/viewcontent.cgi?referer=&httpsredir=1&article=1443&context=eispapers", "len_cl100k_base": 7282, "olmocr-version": "0.1.53", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 29211, "total-output-tokens": 9482, "length": "2e12", "weborganizer": {"__label__a...
olmocr_science_pdfs
2024-12-07
2024-12-07
15436fe17ccfe063cd3b9039edc17c04e2ea0f8f
Stepwise Construction and Refinement of Dependability Models Cláudia Betous-Almeida and Karama Kanoun LAAS-CNRS 7, Avenue du Colonel Roche 31077 Toulouse Cedex 4 - France E-mail: {almeida,kanoun}@laas.fr Abstract This paper presents a stepwise approach for dependability modeling, based on Generalized Stochastic Petr...
{"Source-Url": "https://hal.laas.fr/hal-01976600/document", "len_cl100k_base": 6620, "olmocr-version": "0.1.53", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 40106, "total-output-tokens": 7930, "length": "2e12", "weborganizer": {"__label__adult": 0.0003273487091064453, "__label__art_design": ...
olmocr_science_pdfs
2024-12-08
2024-12-08
065eeab935999ed65ffd8ecb1d729ef9d7c05d13
Semantic-element-based Defining Approach for Model Transformation Rules Lei Wang and Yuyan Zhang School of Computer Engineering, Weifang University, Weifang, China Abstract In model-driven software development, it is a key technology that transform from platform independent models at higher abstract level to platfor...
{"Source-Url": "http://www.sersc.org/journals/IJSH/vol8_no3_2014/8.pdf", "len_cl100k_base": 5736, "olmocr-version": "0.1.53", "pdf-total-pages": 12, "total-fallback-pages": 0, "total-input-tokens": 30439, "total-output-tokens": 7637, "length": "2e12", "weborganizer": {"__label__adult": 0.00032806396484375, "__label__ar...
olmocr_science_pdfs
2024-12-09
2024-12-09
35485dcc233b598da4e76cb6afbe140e7962b569
Master Guide SAP NetWeaver Composition Environment 7.1 Target Audience - System administrators - Technology consultants PUBLIC Document version: 1.10 – 02/17/2009 Material number: 50084393 ## Document History <table> <thead> <tr> <th>Version</th> <th>Date</th> <th>Description</th> </tr> </thead> <tbody> <tr> <td>1.1...
{"Source-Url": "https://archive.sap.com/kmuuid2/90e6feb4-c41c-2b10-9888-c43d49f47f12/upload_2_.pdf", "len_cl100k_base": 5225, "olmocr-version": "0.1.50", "pdf-total-pages": 20, "total-fallback-pages": 0, "total-input-tokens": 78501, "total-output-tokens": 6313, "length": "2e12", "weborganizer": {"__label__adult": 0.000...
olmocr_science_pdfs
2024-11-29
2024-11-29
15e5393e9adf9d4601970764e61325be07f83781
Abstract. Real Time Systems (RTS) interact with their environments using time constrained input/output signals. A functional misbehavior or a deviation from the specified time constraints may have catastrophic consequences. Hence, ensuring the correctness of such systems is extremely important and necessary. The increa...
{"Source-Url": "http://www.dcc.ufla.br/infocomp/images/artigos/v12.1/art04.pdf", "len_cl100k_base": 7031, "olmocr-version": "0.1.46", "pdf-total-pages": 13, "total-fallback-pages": 0, "total-input-tokens": 32122, "total-output-tokens": 8804, "length": "2e12", "weborganizer": {"__label__adult": 0.00028324127197265625, "...
olmocr_science_pdfs
2024-11-23
2024-11-23
7731ca4ec463dcb682fd7dc6a908e9db6e0b5402
Assembly Language: Part 1 Context of this Lecture First half of the semester: “Programming in the large” Second half: “Under the hood” Starting Now Afterward C Language Assembly Language Machine Language Application Program Operating System Hardware Von Neumann Architecture Instructions are fetched from RAM - (...
{"Source-Url": "https://www.cs.princeton.edu/courses/archive/fall17/cos217/lectures/14_Assembly1-6up.pdf", "len_cl100k_base": 4822, "olmocr-version": "0.1.53", "pdf-total-pages": 8, "total-fallback-pages": 0, "total-input-tokens": 25630, "total-output-tokens": 5075, "length": "2e12", "weborganizer": {"__label__adult": ...
olmocr_science_pdfs
2024-12-11
2024-12-11
7a69dbdf60c6fd83bf98a853159cf28536048af5
Investigating the Adoption of Agile Practices in Mobile Application Development Alan Santos¹, Josiane Kroll¹, Afonso Sales¹, Paulo Fernandes¹ and Daniel Wildt² ¹Computer Science Department, Pontifical University Catholic of Rio Grande do Sul (PUCRS), Porto Alegre, RS, Brazil ²WildTech, Porto Alegre, RS, Brazil Keywo...
{"Source-Url": "http://www.scitepress.org/Papers/2016/58354/58354.pdf", "len_cl100k_base": 6423, "olmocr-version": "0.1.53", "pdf-total-pages": 8, "total-fallback-pages": 0, "total-input-tokens": 25198, "total-output-tokens": 7641, "length": "2e12", "weborganizer": {"__label__adult": 0.000507354736328125, "__label__art...
olmocr_science_pdfs
2024-12-08
2024-12-08
de049c5a0473e7a5cde9e84c62c7dea0cae44ba0
1 Introduction Computers can be programmed to perform an impressive variety of tasks, ranging from numerical computations to natural language processing. The computer is surely one of the most versatile tools ever devised, playing a critical role in solving all manner of “real world” problems. Some would argue that co...
{"Source-Url": "http://www.cs.cmu.edu:80/~me/courses/212/handouts/computability.pdf", "len_cl100k_base": 7056, "olmocr-version": "0.1.53", "pdf-total-pages": 8, "total-fallback-pages": 0, "total-input-tokens": 27312, "total-output-tokens": 7641, "length": "2e12", "weborganizer": {"__label__adult": 0.0004343986511230469...
olmocr_science_pdfs
2024-12-10
2024-12-10
1b7d91428f91ca2759dfc340576e8d14fbdb4b4a
[REMOVED]
{"Source-Url": "https://rd.springer.com/content/pdf/10.1007/11688839_14.pdf", "len_cl100k_base": 6967, "olmocr-version": "0.1.50", "pdf-total-pages": 15, "total-fallback-pages": 0, "total-input-tokens": 34486, "total-output-tokens": 9175, "length": "2e12", "weborganizer": {"__label__adult": 0.0006318092346191406, "__la...
olmocr_science_pdfs
2024-11-28
2024-11-28
5753143fcc9085fd21e2d9b8cefa65cabb030216
[REMOVED]
{"Source-Url": "https://idus.us.es/xmlui/bitstream/handle/11441/65240/Analyzing%20Strategic.pdf?isAllowed=y&sequence=1", "len_cl100k_base": 5514, "olmocr-version": "0.1.49", "pdf-total-pages": 12, "total-fallback-pages": 0, "total-input-tokens": 23683, "total-output-tokens": 6248, "length": "2e12", "weborganizer": {"__...
olmocr_science_pdfs
2024-11-25
2024-11-25
a5af76ca77a64b63317c5a23939481ec2d7afdcf
12-15-2012 Risk Mitigation in Corporate Participation with Open Source Communities: Protection and Compliance in an Open Source Supply Chain Matt Germonprez Brett Young Lars Mathiassen Julie E. Kendall Ken E. Kendall See next page for additional authors Follow this and additional works at: http://aisel.aisnet.org/i...
{"Source-Url": "https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1012&context=irwitpm2012", "len_cl100k_base": 5543, "olmocr-version": "0.1.53", "pdf-total-pages": 14, "total-fallback-pages": 0, "total-input-tokens": 32100, "total-output-tokens": 7110, "length": "2e12", "weborganizer": {"__label__adult": 0.00071620...
olmocr_science_pdfs
2024-12-07
2024-12-07
9b41361d48ea3b183f54404f761c0e7a297a0a5e
Abstract Change impact analysis is generally regarded as a very difficult program comprehension problem. One of the reasons for this is that there is no universal definition for dependency between software artifacts, only algorithms that approximate the dependencies. In the past two decades, different kinds of algorit...
{"Source-Url": "https://pp.bme.hu/ee/article/download/827/446", "len_cl100k_base": 7476, "olmocr-version": "0.1.49", "pdf-total-pages": 11, "total-fallback-pages": 0, "total-input-tokens": 37401, "total-output-tokens": 10918, "length": "2e12", "weborganizer": {"__label__adult": 0.00035834312438964844, "__label__art_des...
olmocr_science_pdfs
2024-11-26
2024-11-26
a6009b99ae0670a1ff2e1091844ceec4a4c214eb
WEB LOG MINING USING MULTI ITEM SEQUENTIAL PATTERN BASED ON PLWAP Jaymin Desai¹, Mrs. Risha Tiwari² ¹Post Graduate Student, ²Professor, Dept. of Computer Engg., Hasmukh Goswami Collage of Engineering, Ahmedabad, Gujarat, India. Abstract: Web Log Mining (WLM) is the process to extract information from the Web Log data...
{"Source-Url": "https://ijtre.com/wp-content/uploads/2021/10/2017040868.pdf", "len_cl100k_base": 4314, "olmocr-version": "0.1.53", "pdf-total-pages": 5, "total-fallback-pages": 0, "total-input-tokens": 15871, "total-output-tokens": 4960, "length": "2e12", "weborganizer": {"__label__adult": 0.0003192424774169922, "__lab...
olmocr_science_pdfs
2024-12-07
2024-12-07
27e6df15f83a25effa9ab6f05b610417b16b2a2f
[REMOVED]
{"Source-Url": "https://rd.springer.com/content/pdf/10.1007/978-3-642-38709-8_37.pdf", "len_cl100k_base": 7148, "olmocr-version": "0.1.53", "pdf-total-pages": 16, "total-fallback-pages": 0, "total-input-tokens": 34669, "total-output-tokens": 9712, "length": "2e12", "weborganizer": {"__label__adult": 0.00037336349487304...
olmocr_science_pdfs
2024-12-06
2024-12-06
71bb8db602cc2951583c27bbddb88ada8b11d78a
Generating of Business Database Application Elements Artur Kornatka\textsuperscript{1,2}\textasteriskaccent \textsuperscript{1}Institute of Computer Science, Maria Curie-Sklodowska University, pl. M. Curie-Sklodowskiej 5, 20-031 Lublin, Poland. \textsuperscript{2}Department of Computer Science, Nowy Sącz School of Bu...
{"Source-Url": "https://journals.umcs.pl/ai/article/download/3343/2537", "len_cl100k_base": 4268, "olmocr-version": "0.1.53", "pdf-total-pages": 9, "total-fallback-pages": 0, "total-input-tokens": 19063, "total-output-tokens": 4964, "length": "2e12", "weborganizer": {"__label__adult": 0.0003371238708496094, "__label__a...
olmocr_science_pdfs
2024-12-07
2024-12-07
2dcc2ee7ef623d657a4743f653b9f1f982fbacaa
A Transformer-based Approach for Source Code Summarization Wasi Uddin Ahmad University of California, Los Angeles wasiahmad@cs.ucla.edu Saikat Chakraborty Columbia University saikatc@cs.columbia.edu Baishakhi Ray Columbia University rayb@cs.columbia.edu Kai-Wei Chang University of California, Los Ange...
{"Source-Url": "https://wasiahmad.github.io/files/publications/2020/transformer_for_code_summ.pdf", "len_cl100k_base": 7827, "olmocr-version": "0.1.50", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 32545, "total-output-tokens": 10622, "length": "2e12", "weborganizer": {"__label__adult": 0.000...
olmocr_science_pdfs
2024-11-28
2024-11-28
7d7e64786d0e2b5b6aaff875cb237f826747f0c1
[REMOVED]
{"Source-Url": "https://www.nics.uma.es/sites/default/files/papers/Agudo2008d.pdf", "len_cl100k_base": 7031, "olmocr-version": "0.1.53", "pdf-total-pages": 13, "total-fallback-pages": 0, "total-input-tokens": 37790, "total-output-tokens": 8774, "length": "2e12", "weborganizer": {"__label__adult": 0.0003445148468017578,...
olmocr_science_pdfs
2024-12-10
2024-12-10
014adb8d3bc11bb484a2b53e9347cdf30e90d6cb
Decentralized Data Flows in Algebraic Service Compositions for the Scalability of IoT Systems Damian Arellanes and Kung-Kiu Lau School of Computer Science The University of Manchester Manchester M13 9PL, United Kingdom {damian.arellanesmolina, kung-kiu.lau}@manchester.ac.uk Abstract—With the advent of the Internet of...
{"Source-Url": "https://www.research.manchester.ac.uk/portal/files/85913574/1570514450.pdf", "len_cl100k_base": 6342, "olmocr-version": "0.1.49", "pdf-total-pages": 7, "total-fallback-pages": 0, "total-input-tokens": 25106, "total-output-tokens": 7431, "length": "2e12", "weborganizer": {"__label__adult": 0.000355720520...
olmocr_science_pdfs
2024-11-25
2024-11-25
28a8f67d463f62c158972c7a9bcae2c6a6280f6f
This specification defines an XMPP protocol extension for data forms that can be used in workflows such as service configuration as well as for application-specific data description and reporting. The protocol includes lightweight semantics for forms processing (such as request, response, submit, and cancel), defines s...
{"Source-Url": "https://xmpp.org/extensions/xep-0004.pdf", "len_cl100k_base": 8076, "olmocr-version": "0.1.53", "pdf-total-pages": 22, "total-fallback-pages": 0, "total-input-tokens": 62102, "total-output-tokens": 9435, "length": "2e12", "weborganizer": {"__label__adult": 0.0002491474151611328, "__label__art_design": 0...
olmocr_science_pdfs
2024-12-07
2024-12-07
d6750204c61a4ef44801839a777cc20c610545aa
Writing a CSPICE (C) Based Program January 2020 Undefined variables are displayed in red Results are displayed in blue First, let's go over the important steps in the process of writing a CSPICE-based program and putting it to work: • Understand the geometry problem. • Identify the set of SPICE kernels that contain t...
{"Source-Url": "https://naif.jpl.nasa.gov/pub/naif/toolkit_docs/Tutorials/pdf/individual_docs/40_program_c.pdf", "len_cl100k_base": 4900, "olmocr-version": "0.1.53", "pdf-total-pages": 26, "total-fallback-pages": 0, "total-input-tokens": 47031, "total-output-tokens": 6206, "length": "2e12", "weborganizer": {"__label__a...
olmocr_science_pdfs
2024-12-11
2024-12-11
c449ce7e53bf60c0b8c4799616c3c5fc338d7100
Online Map Application Development Using Google Maps API, SQL Database, and ASP.NET Shunfu Hu, Ting Dai 1 Department of Geography, Southern Illinois University Edwardsville, Edwardsville, IL 62026, USA 2 Farm Service Agency, United States Department of Agriculture, Washington, DC 20250, USA ABSTRACT Recently, there...
{"Source-Url": "http://www.siue.edu/~shu/vol3no3_1.pdf", "len_cl100k_base": 6064, "olmocr-version": "0.1.51", "pdf-total-pages": 9, "total-fallback-pages": 0, "total-input-tokens": 26949, "total-output-tokens": 7664, "length": "2e12", "weborganizer": {"__label__adult": 0.00032591819763183594, "__label__art_design": 0.0...
olmocr_science_pdfs
2024-12-04
2024-12-04
25502f9818d9327b20fe6dbd91771b76dbc4adc9
Dynamic Load Balancing Based on Applications Global States Monitoring Eryk Laskowski, Marek Tudruj, Richard Olejnik, Damian Kopanski To cite this version: HAL Id: hal-00833477 https://hal.archives-ouvertes.fr/hal-00833477 Submitted on 12 Jun 2013 HAL is a multi-disciplinary open access archive for the deposit and di...
{"Source-Url": "https://hal.archives-ouvertes.fr/hal-00833477/document", "len_cl100k_base": 7851, "olmocr-version": "0.1.53", "pdf-total-pages": 9, "total-fallback-pages": 0, "total-input-tokens": 28755, "total-output-tokens": 9603, "length": "2e12", "weborganizer": {"__label__adult": 0.00034308433532714844, "__label__...
olmocr_science_pdfs
2024-12-07
2024-12-07
54b0b78f0b40a5d45592733ceceaf63d24a49973
Oracle® Call Interface Getting Started Release 9.0.1 for Windows June 2001 Part No. A90166-01 ### Contents <table> <thead> <tr> <th>Section</th> <th>Page</th> </tr> </thead> <tbody> <tr> <td>Send Us Your Comments</td> <td>v</td> </tr> <tr> <td>Preface</td> <td>vii</td> </tr> <tr> <td>Audience</td> <td>viii</td> </t...
{"Source-Url": "https://docs.oracle.com/cd/A91202_01/901_doc/win.901/a90166.pdf", "len_cl100k_base": 7660, "olmocr-version": "0.1.53", "pdf-total-pages": 30, "total-fallback-pages": 0, "total-input-tokens": 52072, "total-output-tokens": 8328, "length": "2e12", "weborganizer": {"__label__adult": 0.00022709369659423828, ...
olmocr_science_pdfs
2024-12-07
2024-12-07