id stringlengths 40 40 | text stringlengths 9 86.7k | metadata stringlengths 3k 16.2k | source stringclasses 1
value | added stringdate 2024-11-21 00:00:00 2024-12-12 00:00:00 | created stringdate 2024-11-21 00:00:00 2024-12-12 00:00:00 |
|---|---|---|---|---|---|
f1701079ed26fba17e13db08da45e0f89f0f35bb | Study on Visual Knowledge Structure Reasoning
Huimin Lu
1College of Software Engineering, Changchun University of Technology, Changchun, China
2College of Computer Science and Technology, Jilin University, Changchun, China
Email: luhm.cc@gmail.com
2Liang Hu and Gang Liu1
Email: hul@jlu.edu.cn, liug8818@mail.ccut.edu... | {"Source-Url": "http://ojs.academypublisher.com/index.php/jsw/article/viewFile/0605783/3032", "len_cl100k_base": 6560, "olmocr-version": "0.1.49", "pdf-total-pages": 8, "total-fallback-pages": 0, "total-input-tokens": 27844, "total-output-tokens": 8199, "length": "2e12", "weborganizer": {"__label__adult": 0.00035476684... | olmocr_science_pdfs | 2024-11-27 | 2024-11-27 |
49d36f0903458cf5d9033350bb13edcc8517a334 | [REMOVED] | {"Source-Url": "http://ftp10.us.freebsd.org/users/azhang/disc/springer/0558/papers/2453/24530524.pdf", "len_cl100k_base": 4110, "olmocr-version": "0.1.50", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 20424, "total-output-tokens": 5286, "length": "2e12", "weborganizer": {"__label__adult": 0.0... | olmocr_science_pdfs | 2024-11-30 | 2024-11-30 |
00ac46a9b5e9a4644467609c8f6ad5b3fb068c21 | SOA Governance from an Enterprise Architecture Viewpoint
Thaíssa Diírr, Leonardo Guerreiro Azevedo, Flávia Maria Santoro
1Post-Graduation Program in Informatics
Federal University of the State of Rio de Janeiro (UNIRIO), Brazil
2IBM Research - Brazil
{thaissa.medeiros, azevedo, flavia.santoro}@uniriotec.br; lga@br.ib... | {"Source-Url": "http://www.lbd.dcc.ufmg.br/colecoes/sbsi/2014/0042.pdf", "len_cl100k_base": 6324, "olmocr-version": "0.1.49", "pdf-total-pages": 12, "total-fallback-pages": 0, "total-input-tokens": 27556, "total-output-tokens": 8700, "length": "2e12", "weborganizer": {"__label__adult": 0.0005064010620117188, "__label__... | olmocr_science_pdfs | 2024-11-27 | 2024-11-27 |
794faa85ef1e8e27769c2fb1890685f540888234 | Comparing and Contrasting Adaptive Middleware Support in Wide-Area and Embedded Distributed Object Applications
Joseph Loyall, Richard Schantz, John Zinky, Partha Pal, Richard Shapiro, Craig Rodrigues, Michael Atighetchi, David Karr BBN Technologies jloyall@bbn.com
Jeanna M. Gossett The Boeing Company Jeanna.Gossett@... | {"Source-Url": "https://www.cse.wustl.edu/~cdgill/publications/ICDCS2001AdaptiveMiddleware.pdf", "len_cl100k_base": 7486, "olmocr-version": "0.1.53", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 31022, "total-output-tokens": 9189, "length": "2e12", "weborganizer": {"__label__adult": 0.0003485... | olmocr_science_pdfs | 2024-12-09 | 2024-12-09 |
9b07fe94e43f97c7a91bf09de2f138ac05b94f65 | Florian Matthes, Christian Neubert, Alexander W. Schneider
Fostering Collaborative and Integrated Enterprise Architecture Modelling
Enterprise Architecture Management (EAM) is a challenging task in modern enterprises. Tools supporting EA management activities are based on extensive models either created by enterprise... | {"Source-Url": "https://www.emisa-journal.org/emisa/article/download/100/75", "len_cl100k_base": 7837, "olmocr-version": "0.1.53", "pdf-total-pages": 14, "total-fallback-pages": 0, "total-input-tokens": 37906, "total-output-tokens": 9952, "length": "2e12", "weborganizer": {"__label__adult": 0.0004837512969970703, "__la... | olmocr_science_pdfs | 2024-12-10 | 2024-12-10 |
0056b66a9db5bcef4c5fdbf50311477c8629f83e | mlogit postestimation — Postestimation tools for mlogit
Postestimation commands predict margins Remarks and examples
Reference Also see
## Postestimation commands
The following postestimation commands are available after `mlogit`:
<table>
<thead>
<tr>
<th>Command</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr... | {"Source-Url": "https://www.stata.com/manuals/rmlogitpostestimation.pdf", "len_cl100k_base": 7054, "olmocr-version": "0.1.50", "pdf-total-pages": 11, "total-fallback-pages": 0, "total-input-tokens": 25537, "total-output-tokens": 7643, "length": "2e12", "weborganizer": {"__label__adult": 0.0003995895385742187, "__label_... | olmocr_science_pdfs | 2024-12-03 | 2024-12-03 |
f4041e19d4e783ed448e89140d4aab9802e431d1 | Introduction to Caché
Version 2018.1
2019-09-20
# Table of Contents
## About This Book
<table>
<thead>
<tr>
<th>Section</th>
<th>Page</th>
</tr>
</thead>
<tbody>
<tr>
<td>About This Book</td>
<td>1</td>
</tr>
</tbody>
</table>
## 1 What Is Caché?
<table>
<thead>
<tr>
<th>Section</th>
<th>Page</th>
</tr>
</thead>
<... | {"Source-Url": "https://cedocs.intersystems.com/latest/csp/docbook/pdfs/pdfs/GIC.pdf", "len_cl100k_base": 7791, "olmocr-version": "0.1.50", "pdf-total-pages": 24, "total-fallback-pages": 0, "total-input-tokens": 43749, "total-output-tokens": 8394, "length": "2e12", "weborganizer": {"__label__adult": 0.00023376941680908... | olmocr_science_pdfs | 2024-12-02 | 2024-12-02 |
d5b98dd56119111c83db0de833604b7d996ba80d | Let See Pettitt (1983) for details.
An observation is said to be right-censored if we can only observe \( Y_j \) for \( j = n+1, n+2, \ldots, q \); \( n \leq q \), are censored on the right. We define the rank \( r_j \) of \( Y_j \), for \( j = 1, 2, \ldots, n \), in the usual way; \( r_j \) equals \( i \) if and only... | {"Source-Url": "http://wwwuser.gwdg.de/~nag/NAGdoc/cl/pdf/G08/g08rbc.pdf", "len_cl100k_base": 6339, "olmocr-version": "0.1.50", "pdf-total-pages": 9, "total-fallback-pages": 0, "total-input-tokens": 31138, "total-output-tokens": 7495, "length": "2e12", "weborganizer": {"__label__adult": 0.0003299713134765625, "__label_... | olmocr_science_pdfs | 2024-12-02 | 2024-12-02 |
1178d57aca7c9ef5edeb7a9f105898cd448dc666 | Awesome-META+: Meta-Learning Research and Learning Platform
Jingyao Wang $^{1}$, Chuyuan Zhang $^{1}$, Ye Ding $^{1}$, and Yuxuan Yang $^{1}$
$^{1}$Affiliation not available
October 30, 2023
Abstract
Artificial intelligence technology has already had a profound impact in various fields such as economy, industry, a... | {"Source-Url": "https://d197for5662m48.cloudfront.net/documents/publicationstatus/169530/preprint_pdf/ee6b709b10cd4fae97f1c192719596fd.pdf", "len_cl100k_base": 7959, "olmocr-version": "0.1.53", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 44943, "total-output-tokens": 10086, "length": "2e12",... | olmocr_science_pdfs | 2024-12-06 | 2024-12-06 |
77a0d909055a3e86b10ce8114ac4320d9f4713f5 | [REMOVED] | {"Source-Url": "http://se.kaist.ac.kr/ekjee/paper/SAFECOMP2005-ekjee.pdf", "len_cl100k_base": 6964, "olmocr-version": "0.1.53", "pdf-total-pages": 14, "total-fallback-pages": 0, "total-input-tokens": 32303, "total-output-tokens": 7898, "length": "2e12", "weborganizer": {"__label__adult": 0.0004150867462158203, "__label... | olmocr_science_pdfs | 2024-12-06 | 2024-12-06 |
2c2876c87ec66f81c6dc2db33544379be9cdf7dc | 4.3 Minimum Spanning Trees
- edge-weighted graph API
- greedy algorithm
- Kruskal’s algorithm
- Prim’s algorithm
- advanced topics
Minimum spanning tree
Given. Undirected graph $G$ with positive edge weights (connected).
Def. A spanning tree of $G$ is a subgraph $T$ that is connected and acyclic.
Goal. Find a min w... | {"Source-Url": "http://www.cs.princeton.edu/courses/archive/spring11/cos226/lectures/14-43MinimumSpanningTrees.pdf", "len_cl100k_base": 6387, "olmocr-version": "0.1.50", "pdf-total-pages": 64, "total-fallback-pages": 0, "total-input-tokens": 102956, "total-output-tokens": 8758, "length": "2e12", "weborganizer": {"__lab... | olmocr_science_pdfs | 2024-11-30 | 2024-11-30 |
7e7c522624d1c9451e3acaf50eb857daf9f39cc0 | Chapter 8
Basic Synchronization Principles
Need for Synchronization
- Multiprogramming
- Multiple concurrent, independent processes
- Those processes might want to coordinate activities
\[
\text{shared } x, y
\]
Proc A {
while (true) {
<compute A1>
write(x)
<compute A2>
read(y)
}
}
Proc B {... | {"Source-Url": "http://courses.cs.vt.edu:80/~cs3204/fall2003/ali/notes/chapter8/chapter8.pdf", "len_cl100k_base": 5396, "olmocr-version": "0.1.53", "pdf-total-pages": 46, "total-fallback-pages": 0, "total-input-tokens": 65774, "total-output-tokens": 7549, "length": "2e12", "weborganizer": {"__label__adult": 0.000247240... | olmocr_science_pdfs | 2024-12-09 | 2024-12-09 |
1be07e04ec58b47fca84ee58ca46ba0cc4b0f4e8 | Consider the following queries.
- Who was the president of China in 1998?
- How old is the universe?
The answer to the first query is definite.
The answer to the second query is provisional at any given time.
Search engines can assist in answering queries of the first kind.
However, queries of the second kind are ... | {"Source-Url": "http://www1.se.cuhk.edu.hk/~apweb04/arun-4.pdf", "len_cl100k_base": 4715, "olmocr-version": "0.1.53", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 33251, "total-output-tokens": 5390, "length": "2e12", "weborganizer": {"__label__adult": 0.0006070137023925781, "__label__art_desi... | olmocr_science_pdfs | 2024-12-09 | 2024-12-09 |
1634e2d7afd19db09e0d178bf00f27a50521e5b0 | Smart Grid Serialization Comparison
Petersen, Bo Søborg; Bindner, Henrik W.; You, Shi; Poulsen, Bjarne
Published in:
Computing Conference 2017
Link to article, DOI:
10.1109/SAI.2017.8252264
Publication date:
2017
Document Version
Peer reviewed version
Link back to DTU Orbit
Citation (APA):
General rights
Copyri... | {"Source-Url": "https://backend.orbit.dtu.dk/ws/portalfiles/portal/127962965/Smart_Grid_Serialization_Comparision.pdf", "len_cl100k_base": 5223, "olmocr-version": "0.1.53", "pdf-total-pages": 9, "total-fallback-pages": 0, "total-input-tokens": 30287, "total-output-tokens": 6683, "length": "2e12", "weborganizer": {"__la... | olmocr_science_pdfs | 2024-12-06 | 2024-12-06 |
c857c297f846e42787cf6cca15b94e63bc91208f | Chapter 2
Data and Expressions
Chapter Scope
• Character strings and concatenation
• Escape sequences
• Declaring and using variables
• Java primitive types
• Expressions
• Data conversions
• The Scanner class for interactive programs
Character Strings
• A string of characters can be represented as a *string literal*... | {"Source-Url": "http://cs.boisestate.edu/~amit/teaching/125/handouts/book-slides/slides02.pdf", "len_cl100k_base": 5707, "olmocr-version": "0.1.50", "pdf-total-pages": 56, "total-fallback-pages": 0, "total-input-tokens": 78360, "total-output-tokens": 7473, "length": "2e12", "weborganizer": {"__label__adult": 0.00035667... | olmocr_science_pdfs | 2024-11-29 | 2024-11-29 |
fbc340bc62088e96105ac61c13020811a35d192d | Chapter - 5
DYNAMIC LEARNING CLASSIFIER FRAMEWORK (DLCF) FOR IDS
Chapter 5
DYNAMIC LEARNING CLASSIFIER FRAMEWORK (DLCF) FOR IDS
In this chapter we investigate the task of classification performed by intrusion detection expert and present a novel concept of building a Dynamic Learning Classifier Framework (DLCF) usin... | {"Source-Url": "http://shodhganga.inflibnet.ac.in/bitstream/10603/38969/14/15_chapter%205.pdf", "len_cl100k_base": 5443, "olmocr-version": "0.1.53", "pdf-total-pages": 21, "total-fallback-pages": 0, "total-input-tokens": 34530, "total-output-tokens": 6298, "length": "2e12", "weborganizer": {"__label__adult": 0.00054836... | olmocr_science_pdfs | 2024-12-11 | 2024-12-11 |
f19e9766fa0f92ca85930c7fb827eed1054c91b1 | [REMOVED] | {"Source-Url": "http://dl.ifip.org/db/conf/ifip8-1/poem2011/ZikraSZ11.pdf", "len_cl100k_base": 6097, "olmocr-version": "0.1.50", "pdf-total-pages": 15, "total-fallback-pages": 0, "total-input-tokens": 30143, "total-output-tokens": 8014, "length": "2e12", "weborganizer": {"__label__adult": 0.00030803680419921875, "__lab... | olmocr_science_pdfs | 2024-12-01 | 2024-12-01 |
931f05d0a030ba32290445f7349a205bd1c72138 | Trademarks
Linux is a registered trademark of Linus Torvalds. PathScale is a registered trademark of Cray, Inc. Red Hat and all Red Hat-based trademarks are trademarks or registered trademarks of Red Hat, Inc. SUSE is a registered trademark of Novell, Inc. PGI is a registered trademark of NVIDIA Corporation. FLEXlm is ... | {"Source-Url": "https://support.brightcomputing.com/manuals/9.0/edge-manual.pdf", "len_cl100k_base": 5073, "olmocr-version": "0.1.53", "pdf-total-pages": 23, "total-fallback-pages": 0, "total-input-tokens": 35787, "total-output-tokens": 6070, "length": "2e12", "weborganizer": {"__label__adult": 0.00030040740966796875, ... | olmocr_science_pdfs | 2024-12-12 | 2024-12-12 |
dec05c31794cf27bbdd860684078d4169587cdf6 | A Java implementation
of the RS1 algorithm using SQL
Robert H. Warren Julia A. Johnson
warren@cs.uregina.ca julia@cs.laurentian.ca
Department of Computer Science
University of Regina
Regina, Saskatchewan
Canada S4S 0A2
Technical Report TR-2000-03
ISBN 0-7731-0399-6
Abstract
This paper describes a Java ... | {"Source-Url": "http://www.cs.uregina.ca/Research/Techreports/2000-03.pdf", "len_cl100k_base": 4755, "olmocr-version": "0.1.53", "pdf-total-pages": 11, "total-fallback-pages": 0, "total-input-tokens": 49770, "total-output-tokens": 5820, "length": "2e12", "weborganizer": {"__label__adult": 0.0002961158752441406, "__labe... | olmocr_science_pdfs | 2024-12-08 | 2024-12-08 |
9c93f054b52aec54201f534d7d4788d057d99c9d | Mitigating the obsolescence of quality-specification models in service-based systems
Romina Torres
Universidad Tecnica Federico Santa Maria
Chile
romina@inf.utfsm.cl
Nelly Bencomo
INRIA Paris-Rocquencourt
France
nelly@acm.org
Hernan Astudillo
Universidad Tecnica Federico Santa Maria
Chile
hernan@ac... | {"Source-Url": "https://research.aston.ac.uk/portal/files/4871719/obsolescence_of_quality_specifications_models.pdf", "len_cl100k_base": 8061, "olmocr-version": "0.1.53", "pdf-total-pages": 9, "total-fallback-pages": 0, "total-input-tokens": 32531, "total-output-tokens": 10315, "length": "2e12", "weborganizer": {"__lab... | olmocr_science_pdfs | 2024-12-07 | 2024-12-07 |
c948d64c4bd3518072a68a3ed0e2f4372fcd9a9a | Enhancing attendance tracking using animated QR codes: a case study
Mustafa Saad Mohammed, Khamis A. Zidan
Department of Computer Engineering, College of Engineering, Al-Iraqia University, Baghdad, Iraq
ABSTRACT
This research paper explores the effectiveness of quick response (QR) code-based attendance systems with t... | {"Source-Url": "https://ijeecs.iaescore.com/index.php/IJEECS/article/viewFile/32572/17583", "len_cl100k_base": 4711, "olmocr-version": "0.1.53", "pdf-total-pages": 8, "total-fallback-pages": 0, "total-input-tokens": 24722, "total-output-tokens": 5750, "length": "2e12", "weborganizer": {"__label__adult": 0.0006666183471... | olmocr_science_pdfs | 2024-12-04 | 2024-12-04 |
2e37c47d42a45139326ddc74bd36c09e5b746cb7 | Generating Fuzzy Term Sets for Software Project Attributes using Fuzzy C-Means and Real Coded Genetic Algorithms
Ali Idri\textsuperscript{1}, Azeddine Zahi\textsuperscript{2} and Alain Abran\textsuperscript{3}
\textsuperscript{1} Department of Software Engineering
ENSIAS, Mohamed V University
Rabat, Morocco, E-mail :... | {"Source-Url": "http://s3.amazonaws.com/publicationslist.org/data/a.abran/ref-1935/1044.pdf", "len_cl100k_base": 6778, "olmocr-version": "0.1.53", "pdf-total-pages": 8, "total-fallback-pages": 0, "total-input-tokens": 30084, "total-output-tokens": 7266, "length": "2e12", "weborganizer": {"__label__adult": 0.00031399726... | olmocr_science_pdfs | 2024-12-08 | 2024-12-08 |
f8bc16a0dad2dc3df85f8c7fa7c1053be4061464 | 3.6 The Cocke-Younger-Kasami parsing algorithm
Recursive descent parsing is a clear and effective method for parsing
LL(1)-grammars; a string of \( n \) symbols can be parsed in \( O(n) \) time.
However, LL(1)-grammars are a fairly limited class; solving the
general parsing problem is not as easy.
In principle the pr... | {"Source-Url": "http://www.tcs.hut.fi/Studies/T-79.148/2004S/slides/lecture08.pdf", "len_cl100k_base": 4568, "olmocr-version": "0.1.53", "pdf-total-pages": 7, "total-fallback-pages": 0, "total-input-tokens": 7371, "total-output-tokens": 5074, "length": "2e12", "weborganizer": {"__label__adult": 0.00043892860412597656, ... | olmocr_science_pdfs | 2024-12-09 | 2024-12-09 |
135a4b9e52b32657944a12c2bf8fb14da150b3d5 | Utah Preschool Outcomes Data System
Sandeep Venigalla
Utah State University
Follow this and additional works at: https://digitalcommons.usu.edu/gradreports
Part of the Computer Sciences Commons
Recommended Citation
Venigalla, Sandeep, "Utah Preschool Outcomes Data System" (2011). All Graduate Plan B and other Rep... | {"Source-Url": "https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=1086&context=gradreports", "len_cl100k_base": 8033, "olmocr-version": "0.1.53", "pdf-total-pages": 38, "total-fallback-pages": 0, "total-input-tokens": 81622, "total-output-tokens": 10175, "length": "2e12", "weborganizer": {"__label__adult": 0.0... | olmocr_science_pdfs | 2024-12-07 | 2024-12-07 |
c2be514d866a7a9a8cf74f82df5d27d36e61f34e | On the duality of fault tolerant system structures.
S.K. Shrivastava, L.V. Mancini, B. Randell
An examination of the structure of fault tolerant systems incorporating error recovery, and in particular backward error recovery, indicates a partitioning into two broad classes. Two canonical models, each representing a p... | {"Source-Url": "http://www.cs.ncl.ac.uk/publications/trs/papers/248.pdf", "len_cl100k_base": 7799, "olmocr-version": "0.1.53", "pdf-total-pages": 40, "total-fallback-pages": 0, "total-input-tokens": 42760, "total-output-tokens": 10712, "length": "2e12", "weborganizer": {"__label__adult": 0.00037550926208496094, "__labe... | olmocr_science_pdfs | 2024-12-07 | 2024-12-07 |
266efd1aef016cb944071f4284092bff14e57931 | 16. Review 2 Exercises
Problem: Table: R(A,B,C,D,E)
F= \{ \{A\} \rightarrow \{B, C\}, \{B\} \rightarrow \{A, C\}, \{A, D\} \rightarrow \{E\}, \{E\} \rightarrow \{D\}\}
1] Which of the following sets of functional dependencies is a canonical cover of F?
a) \{\{A\} \rightarrow \{B, C\}, \{B\} \rightarrow \{A,C\}, \{A,D... | {"Source-Url": "http://www.cse.ust.hk/~dimitris/5311/E16.pdf", "len_cl100k_base": 5073, "olmocr-version": "0.1.50", "pdf-total-pages": 21, "total-fallback-pages": 0, "total-input-tokens": 35139, "total-output-tokens": 5807, "length": "2e12", "weborganizer": {"__label__adult": 0.0004405975341796875, "__label__art_design... | olmocr_science_pdfs | 2024-11-30 | 2024-11-30 |
47725f541e2da1e2555a0fa5b8e75ae19677a587 | COGNITIVE COMPLEXITY
A new way of measuring understandability
By G. Ann Campbell,
Product Owner - SonarSource SA
Abstract
Cyclomatic Complexity was initially formulated as a measurement of the “testability and maintainability” of the control flow of a module. While it excels at measuring the former, its underlying m... | {"Source-Url": "https://www.sonarsource.com/docs/CognitiveComplexity.pdf", "len_cl100k_base": 5906, "olmocr-version": "0.1.53", "pdf-total-pages": 20, "total-fallback-pages": 0, "total-input-tokens": 37274, "total-output-tokens": 6980, "length": "2e12", "weborganizer": {"__label__adult": 0.0003437995910644531, "__label... | olmocr_science_pdfs | 2024-12-06 | 2024-12-06 |
f8ed2a09cd3d5c5645611ddc4eb099ec347acd56 | ABSTRACT
Expressing program correctness often requires relating program data throughout (different branches of) an execution. Such properties can be represented using CTL+FO, a logic that allows mixing temporal and first-order quantification. Verifying that a program satisfies a CTL+FO property is a challenging problem... | {"Source-Url": "http://spinroot.com/spin/symposia/ws14/spin20140_submission_31.pdf", "len_cl100k_base": 7516, "olmocr-version": "0.1.50", "pdf-total-pages": 5, "total-fallback-pages": 0, "total-input-tokens": 25428, "total-output-tokens": 8598, "length": "2e12", "weborganizer": {"__label__adult": 0.00038814544677734375... | olmocr_science_pdfs | 2024-12-01 | 2024-12-01 |
37a432545d341c7229a53b573c7ea64039d5aac5 | An Automatic System Partitioning Algorithm for Mixed-Criticality Systems
Emilio Salazar¹ and Alejandro Alonso¹
¹Universidad Politécnica de Madrid
¹{esalazar, aalonso}@dit.upm.es
Abstract
The continuous improvement of processors computational power and the requirements on additional functionality is changing the way... | {"Source-Url": "https://ehu.eus/documents/3444171/4484751/123.pdf", "len_cl100k_base": 6446, "olmocr-version": "0.1.46", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 32909, "total-output-tokens": 8820, "length": "2e12", "weborganizer": {"__label__adult": 0.00045680999755859375, "__label__art_... | olmocr_science_pdfs | 2024-11-23 | 2024-11-23 |
16acfdde7561fcc748cdecdc56819a7d6bb7127d | qCrypt Key Management Server and qClient KMIP C SDK
Performance Measurement and Optimisation Tips
Disclaimer
QuintessenceLabs makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. QuintessenceLabs shal... | {"Source-Url": "https://www.quintessencelabs.com/wp-content/uploads/2018/04/AppNote_Performance-Measurement-Tips.pdf", "len_cl100k_base": 6179, "olmocr-version": "0.1.50", "pdf-total-pages": 13, "total-fallback-pages": 0, "total-input-tokens": 25768, "total-output-tokens": 6499, "length": "2e12", "weborganizer": {"__la... | olmocr_science_pdfs | 2024-11-29 | 2024-11-29 |
e1f6650404fc132145e73c413f6fecce32d872a8 | Strings
**Problem:**
A direct-mail advertising agency has decided to personalize its sweepstakes offers. It has prepared a basic letter with a particular customer's name, address, spouse's name, and other personal information. The company would like a computer program to make the appropriate changes to address each cu... | {"Source-Url": "http://www.sci.brooklyn.cuny.edu:80/~ziegler/Cis1_5old/CIS1_5_PT9.pdf", "len_cl100k_base": 6160, "olmocr-version": "0.1.50", "pdf-total-pages": 27, "total-fallback-pages": 0, "total-input-tokens": 45914, "total-output-tokens": 7952, "length": "2e12", "weborganizer": {"__label__adult": 0.0005731582641601... | olmocr_science_pdfs | 2024-11-28 | 2024-11-28 |
d11efbdda14aa09a0e796347dbe903d52a2640b3 | Variability-Resistant Software Through Improved Sensing & Modeling:
Compiler Directed Strategies
Rajesh K. Gupta
Outline
• Why variability?
• Expedition’s view of UNO Machines
– Sensors, Circuits, Instructions, Procedures, Tasks
– Error rates, vulnerabilities, classifications
• Between sense & adapt and model & ... | {"Source-Url": "http://mesl.ucsd.edu/site/talks/DATECompiler13.pdf", "len_cl100k_base": 7818, "olmocr-version": "0.1.53", "pdf-total-pages": 35, "total-fallback-pages": 0, "total-input-tokens": 77867, "total-output-tokens": 9710, "length": "2e12", "weborganizer": {"__label__adult": 0.0006341934204101562, "__label__art_... | olmocr_science_pdfs | 2024-12-07 | 2024-12-07 |
20d5326ee986490deea3b410e6d6a628bfdf997a | Architecture Level Prediction of Software Maintenance
PerOlof Bengtsson & Jan Bosch
Department of Computer Science and Business Administration
University of Karlskrona/Ronneby
S-372 25 Ronneby, Sweden
+46 457 787 41
[ PerOlof.Bengtsson | Jan.Bosch ] @ide.hk-r.se
Abstract
A method for the prediction of software mainta... | {"Source-Url": "http://www.geocities.ws/docubase/csmr_bengtsson.pdf", "len_cl100k_base": 7177, "olmocr-version": "0.1.53", "pdf-total-pages": 9, "total-fallback-pages": 0, "total-input-tokens": 27247, "total-output-tokens": 8221, "length": "2e12", "weborganizer": {"__label__adult": 0.00039768218994140625, "__label__art... | olmocr_science_pdfs | 2024-12-09 | 2024-12-09 |
f56415b5ce28d7c05c0ae322aff497d8918eeffc | Service-Oriented Security
An Oracle White Paper
July 2010
Service-Oriented Security
EXECUTIVE OVERVIEW
Service-Oriented Architecture (SOA) has become an integral part of enterprise software by providing a framework to efficiently develop software as services that is easily sharable, reusable, and integrated. Nowhere... | {"Source-Url": "http://www.oracle.com/us/products/middleware/identity-management/service-oriented-security-wp-176637.pdf", "len_cl100k_base": 7306, "olmocr-version": "0.1.53", "pdf-total-pages": 20, "total-fallback-pages": 0, "total-input-tokens": 91108, "total-output-tokens": 8109, "length": "2e12", "weborganizer": {"... | olmocr_science_pdfs | 2024-12-12 | 2024-12-12 |
bcfcdbbf07aa02a651d70d60a70c64e2eed4cd54 | SOFTWARE MAINTENANCE & EVOLUTION
LINGI2252 – PROF. KIM MENS
LINGI2252 – PROF. KIM MENS
CODE REFACTORING
Refactoring: Improving the Design of Existing Code
One of the best references on software refactoring, with illustrative examples in Java:
*Refactoring: Improving the Design of Existing Code.*
See also [www.ref... | {"Source-Url": "https://oer.uclouvain.be/jspui/bitstream/20.500.12279/617/5/LINGI2252-04-CodeRefactoring.pdf", "len_cl100k_base": 7196, "olmocr-version": "0.1.51", "pdf-total-pages": 83, "total-fallback-pages": 0, "total-input-tokens": 110797, "total-output-tokens": 10192, "length": "2e12", "weborganizer": {"__label__a... | olmocr_science_pdfs | 2024-12-04 | 2024-12-04 |
6382930bd2a82bf8a7ba224a4ccd19a5e2e30295 | Mining Sequential Patterns
Jilles Vreeken
How can we discover the key patterns from an event sequence?
abc, da + noise
(Tatti & Vreeken, KDD 2012)
First things first
What’s my signature?
data analysis ↔ communication
transfer the data to the analyst in as few as possible bits
‘induction by compression’
What does t... | {"Source-Url": "http://www.sfb1102.uni-saarland.de/wp/wp-content/uploads/2015/03/sfb-b1-coll-JillesVreeken-March2015.pdf", "len_cl100k_base": 4635, "olmocr-version": "0.1.50", "pdf-total-pages": 58, "total-fallback-pages": 0, "total-input-tokens": 83325, "total-output-tokens": 6926, "length": "2e12", "weborganizer": {"... | olmocr_science_pdfs | 2024-11-29 | 2024-11-29 |
c6564484844be154df848ad728fdb117be0c07fb | WEAK MEASUREMENT THEORY AND MODIFIED COGNITIVE COMPLEXITY MEASURE
Sanjay Misra, Hürevren Kılıç
Department of Computer Engineering, Atılım University,
Kızıldağ Köyü, İncek, Gölbasta, 06836, Ankara, Turkey
{smisra, hurevren}@atilim.edu.tr
Keywords: Validation criteria, weak measurement theory, software complexity measu... | {"Source-Url": "http://eprints.covenantuniversity.edu.ng/1484/1/ENASE.pdf", "len_cl100k_base": 5866, "olmocr-version": "0.1.50", "pdf-total-pages": 6, "total-fallback-pages": 0, "total-input-tokens": 21528, "total-output-tokens": 7218, "length": "2e12", "weborganizer": {"__label__adult": 0.0003311634063720703, "__label... | olmocr_science_pdfs | 2024-11-30 | 2024-11-30 |
49f71e1dd869bbc2f508c798b677c0519fd7d246 | Predictive Parsing
The Front End
- Perform a membership test: code ∈ source language?
- Is the program well-formed (semantically)?
- Build an IR version of the code for the rest of the compiler
The front end is not monolithic
The Front End - Scanner
**Scanner**
- Maps stream of characters into words
- Basic unit ... | {"Source-Url": "http://www.cs.umd.edu/class/spring2011/cmsc430/lectures/lec05.pdf", "len_cl100k_base": 4650, "olmocr-version": "0.1.53", "pdf-total-pages": 15, "total-fallback-pages": 0, "total-input-tokens": 31427, "total-output-tokens": 5020, "length": "2e12", "weborganizer": {"__label__adult": 0.0003819465637207031,... | olmocr_science_pdfs | 2024-12-07 | 2024-12-07 |
ad85dd2515ae0d353ac7073cf8b179d52a0597c4 | [REMOVED] | {"len_cl100k_base": 7911, "olmocr-version": "0.1.50", "pdf-total-pages": 18, "total-fallback-pages": 0, "total-input-tokens": 36711, "total-output-tokens": 10098, "length": "2e12", "weborganizer": {"__label__adult": 0.0003886222839355469, "__label__art_design": 0.0004744529724121094, "__label__crime_law": 0.00041961669... | olmocr_science_pdfs | 2024-11-30 | 2024-11-30 |
b8d211ae7e04dab3cd2247eaba7a2921a3e13b4e | ON THE DISTRIBUTION OF SOURCE CODE FILE SIZES
Israel Herraiz
Technical University of Madrid, Madrid, Spain
Daniel M. German
University of Victoria, Victoria, Canada
Ahmed E. Hassan
Queen’s University, Kingston, Canada
Keywords: Mining software repositories, Software size estimation, Open source.
Abstract: Source c... | {"Source-Url": "http://www.scitepress.org/Papers/2011/34262/34262.pdf", "len_cl100k_base": 7664, "olmocr-version": "0.1.50", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 32768, "total-output-tokens": 9048, "length": "2e12", "weborganizer": {"__label__adult": 0.0003216266632080078, "__label__a... | olmocr_science_pdfs | 2024-11-27 | 2024-11-27 |
626e6c4983fb4d4534e2249720771c5b1c33d2c7 | Getting Started with React Native
Web developers who want to develop native mobile applications face a high barrier to entry because they are forced to learn platform-specific languages and frameworks. Numerous hybrid technologies have tried to simplify this process, but have failed to achieve the performance and appe... | {"Source-Url": "http://cdn.oreillystatic.com/oreilly/booksamplers/packt/9781785885181_Sample.pdf", "len_cl100k_base": 6975, "olmocr-version": "0.1.50", "pdf-total-pages": 32, "total-fallback-pages": 0, "total-input-tokens": 55160, "total-output-tokens": 8667, "length": "2e12", "weborganizer": {"__label__adult": 0.00044... | olmocr_science_pdfs | 2024-12-02 | 2024-12-02 |
64b029bfe2396861ddd265744d7b4d6dc2826051 | SLA Management in Federated Environments
P. Bhoj, S. Singhal
Hewlett Packard Laboratories, 1501 Page Mill Road
Palo Alto, CA 94304
USA
{preeti sharad}@hpl.hp.com
S. Chutani *
Oracle Corporation
600 Oracle Parkway
Redwood Shores, CA 94065
USA
schutani@us.oracle.com
Abstract
Increasingly, services such as E-commerce, ... | {"Source-Url": "http://dl.ifip.org/db/conf/im/im1999/BhojSC99.pdf", "len_cl100k_base": 7090, "olmocr-version": "0.1.50", "pdf-total-pages": 16, "total-fallback-pages": 0, "total-input-tokens": 35766, "total-output-tokens": 8080, "length": "2e12", "weborganizer": {"__label__adult": 0.00038313865661621094, "__label__art_... | olmocr_science_pdfs | 2024-11-28 | 2024-11-28 |
57a9f8230186fda2d40ae612c47e2497f2f79679 | Regular Paper
Verification of Concurrent Programs
Using the Coq Proof Assistant: A Case Study (Preprint)
REYNALD AFFELDT,† NAOKI KOBAYASHI †† and AKINORI YONEZAWA†
We show how to model and verify a concurrent program using the Coq proof assistant. The program in question is an existing mail server written in Java. T... | {"Source-Url": "https://staff.aist.go.jp/reynald.affeldt/documents/swopp04.pdf", "len_cl100k_base": 7843, "olmocr-version": "0.1.53", "pdf-total-pages": 12, "total-fallback-pages": 0, "total-input-tokens": 40851, "total-output-tokens": 10109, "length": "2e12", "weborganizer": {"__label__adult": 0.0003771781921386719, "... | olmocr_science_pdfs | 2024-12-08 | 2024-12-08 |
3663bbd0684d9fe8fbb60e8f2ca15a568a02266c | Query processing
• Understanding query processing helps producing better applications
• SQL is a declarative language: it describes the query result, but not how to get it.
• Query processing:
– Query analysis → logical query plan
– Query transformation
– Physical plan generation and optimization
– Query exe... | {"Source-Url": "http://pages.di.unipi.it/ghelli/bd2/8.queryoptimization.pdf", "len_cl100k_base": 7941, "olmocr-version": "0.1.53", "pdf-total-pages": 67, "total-fallback-pages": 0, "total-input-tokens": 93902, "total-output-tokens": 10236, "length": "2e12", "weborganizer": {"__label__adult": 0.0004010200500488281, "__l... | olmocr_science_pdfs | 2024-12-06 | 2024-12-06 |
bfd52c0ace9a82f5de253c599146d9e952930f19 | Towards Assisted Remediation of Security Vulnerabilities
Gabriel Serme, Anderson Santana De Oliveira, Marco Guarnieri and Paul El Khoury
Abstract—Security vulnerabilities are still prevalent in systems despite the existence of their countermeasures for several decades. In order to detect the security vulnerabilities ... | {"Source-Url": "http://www.eurecom.fr/en/publication/3805/download/rs-publi-3805.pdf", "len_cl100k_base": 6598, "olmocr-version": "0.1.50", "pdf-total-pages": 8, "total-fallback-pages": 0, "total-input-tokens": 24387, "total-output-tokens": 8586, "length": "2e12", "weborganizer": {"__label__adult": 0.000412702560424804... | olmocr_science_pdfs | 2024-12-02 | 2024-12-02 |
cdadb9177f0f810b671cf64a66c99600dc8c42ee | [REMOVED] | {"len_cl100k_base": 6288, "olmocr-version": "0.1.53", "pdf-total-pages": 9, "total-fallback-pages": 0, "total-input-tokens": 23589, "total-output-tokens": 7978, "length": "2e12", "weborganizer": {"__label__adult": 0.0012664794921875, "__label__art_design": 0.0007829666137695312, "__label__crime_law": 0.0014705657958984... | olmocr_science_pdfs | 2024-12-11 | 2024-12-11 |
02cb385e5b9f6e42731dfae90432f542539aecc6 | Internet Nomenclator Project
Status of this Memo
This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (1998). All Rights Reserved.
Abstract
The goal of the Intern... | {"Source-Url": "https://tools.ietf.org/pdf/rfc2258.pdf", "len_cl100k_base": 5407, "olmocr-version": "0.1.53", "pdf-total-pages": 15, "total-fallback-pages": 0, "total-input-tokens": 28064, "total-output-tokens": 6439, "length": "2e12", "weborganizer": {"__label__adult": 0.0003712177276611328, "__label__art_design": 0.0... | olmocr_science_pdfs | 2024-12-07 | 2024-12-07 |
d6670f4895a4c643692ecab4e68b6012da8628d9 | Chapter 11
Locality Lower Bounds
In Chapter 1, we looked at distributed algorithms for coloring. In particular, we saw that rings and rooted trees can be colored with 3 colors in $\log^* n + O(1)$ rounds. In this chapter, we will reconsider the distributed coloring problem. We will look at a classic lower bound by Na... | {"Source-Url": "https://disco.ethz.ch/courses/fs08/distcomp/lecture/chapter11.pdf", "len_cl100k_base": 4687, "olmocr-version": "0.1.53", "pdf-total-pages": 6, "total-fallback-pages": 0, "total-input-tokens": 23009, "total-output-tokens": 5307, "length": "2e12", "weborganizer": {"__label__adult": 0.0006213188171386719, ... | olmocr_science_pdfs | 2024-12-10 | 2024-12-10 |
664c79636fe761f994401fded38efb9b56398d50 | Technical Note
Software Device Drivers for M28W640C Parallel NOR Flash Memory
Introduction
This technical note describes the library source code in C for M28W640CT and M28W640CB parallel NOR Flash memory devices, which are referred to as M28W640C throughout this document unless otherwise specified.
The source code i... | {"Source-Url": "https://www.micron.com/-/media/client/global/documents/products/technical-note/solid-state-storage/tn1318_m28w640c_drivers.pdf", "len_cl100k_base": 5427, "olmocr-version": "0.1.50", "pdf-total-pages": 12, "total-fallback-pages": 0, "total-input-tokens": 24822, "total-output-tokens": 5814, "length": "2e1... | olmocr_science_pdfs | 2024-11-28 | 2024-11-28 |
98cba6707917484e46cf315b511c58d6c38b15f3 | GENERATING SIMULINK AND STATEFLOW MODELS FROM SOFTWARE SPECIFICATIONS
Keywords: Mechatronic Systems Engineering, Software Engineering, MechatronicUML
1. Introduction
Innovation in today's technical systems is largely driven by embedded software. Such systems are known as mechatronic systems. For example, it has bee... | {"Source-Url": "https://www.tichy.de/publications/2012/DESIGN2012.pdf", "len_cl100k_base": 7209, "olmocr-version": "0.1.48", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 34711, "total-output-tokens": 8284, "length": "2e12", "weborganizer": {"__label__adult": 0.00047707557678222656, "__label__... | olmocr_science_pdfs | 2024-11-25 | 2024-11-25 |
07a15c3251884f4b617f1378ce5ead4b9c6e3cb5 | McAfee Product Security Practices
14 March 2022
# Table of Contents
Importance of Security .......................................................................................................................... 3
Software Development Lifecycle (SDLC) at McAfee ......................................................... | {"Source-Url": "https://www.mcafee.com/enterprise/en-us/assets/misc/ms-product-software-security-practices.pdf", "len_cl100k_base": 4905, "olmocr-version": "0.1.49", "pdf-total-pages": 12, "total-fallback-pages": 0, "total-input-tokens": 31527, "total-output-tokens": 5132, "length": "2e12", "weborganizer": {"__label__a... | olmocr_science_pdfs | 2024-11-26 | 2024-11-26 |
fe4b24a77a52dce92975d36a3581465edade825c | [REMOVED] | {"Source-Url": "https://hal.archives-ouvertes.fr/hal-00956442/file/hal-00956442.pdf", "len_cl100k_base": 6373, "olmocr-version": "0.1.53", "pdf-total-pages": 11, "total-fallback-pages": 0, "total-input-tokens": 31538, "total-output-tokens": 7663, "length": "2e12", "weborganizer": {"__label__adult": 0.000441312789916992... | olmocr_science_pdfs | 2024-12-09 | 2024-12-09 |
93ac12e17eb771141dee0ad67d3ee02bf8c4c5dc | A Environment Details
Here we provide detailed descriptions of each of experiment environments. See (§6) for high-level descriptions and the accompanying code for implementations.
A.1 Cover Environment Details
- **Types:**
- The block type has features height, width, x, y, grasp.
- The target type has features w... | {"Source-Url": "https://proceedings.mlr.press/v205/silver23a/silver23a-supp.pdf", "len_cl100k_base": 6843, "olmocr-version": "0.1.50", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 26482, "total-output-tokens": 7319, "length": "2e12", "weborganizer": {"__label__adult": 0.0006275177001953125, "... | olmocr_science_pdfs | 2024-11-28 | 2024-11-28 |
392bbc700cda4301f89b5bccc28108569013cdbd | 2009 IEEE International Conference on Web Services
(ICWS 2009)
Los Angeles, California, USA
6-10 July 2009
Pages 1-526
Editors:
E. Damiani
J. Zhang
R. Chang
Regular Research Papers
The SCIFC Model for Information Flow Control in Web Service Composition ..............................................1
Wei She, ... | {"Source-Url": "http://toc.proceedings.com/05905webtoc.pdf", "len_cl100k_base": 5310, "olmocr-version": "0.1.49", "pdf-total-pages": 12, "total-fallback-pages": 0, "total-input-tokens": 24324, "total-output-tokens": 6183, "length": "2e12", "weborganizer": {"__label__adult": 0.0003740787506103515, "__label__art_design":... | olmocr_science_pdfs | 2024-11-27 | 2024-11-27 |
0d4297148848e7b53a89dce7933d97604870f6e5 | BGP Link-State
BGP Link-State (LS) is an Address Family Identifier (AFI) and Sub-address Family Identifier (SAFI) defined to carry interior gateway protocol (IGP) link-state database through BGP. BGP-LS delivers network topology information to topology servers and Application Layer Traffic Optimization (ALTO) servers.... | {"Source-Url": "https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/configuration/xe-16/irg-xe-16-book/irg-xe-16-book_chapter_01010101.pdf", "len_cl100k_base": 6315, "olmocr-version": "0.1.48", "pdf-total-pages": 12, "total-fallback-pages": 0, "total-input-tokens": 27298, "total-output-tokens": 6946, "length"... | olmocr_science_pdfs | 2024-11-25 | 2024-11-25 |
d13dc0c8143f185664648b4965b63dc4c837649f | This specification defines a way for an XMPP servers to deliver information for use in push notifications to mobile and other devices.
Legal
Copyright
This XMPP Extension Protocol is copyright © 1999 – 2020 by the XMPP Standards Foundation (XSF).
Permissions
Permission is hereby granted, free of charge, to any pers... | {"Source-Url": "https://xmpp.org/extensions/xep-0357.pdf", "len_cl100k_base": 5863, "olmocr-version": "0.1.50", "pdf-total-pages": 18, "total-fallback-pages": 0, "total-input-tokens": 43703, "total-output-tokens": 7079, "length": "2e12", "weborganizer": {"__label__adult": 0.00031757354736328125, "__label__art_design": ... | olmocr_science_pdfs | 2024-12-03 | 2024-12-03 |
8da5fce5e06cad17fc3fc5b36cac1ed937697856 | 18-447 Lecture 8: Data Hazard and Resolution
James C. Hoe
Department of ECE
Carnegie Mellon University
Housekeeping
- Your goal today
- detect and resolve data hazards in in-order pipelines
- control flow will come next lecture
- Notices
- Lab 2, status check next week, due wk of 2/27
- Midterm 2/27 in class... | {"Source-Url": "https://users.ece.cmu.edu/~jhoe/course/ece447/S17handouts/L08.pdf", "len_cl100k_base": 4674, "olmocr-version": "0.1.53", "pdf-total-pages": 15, "total-fallback-pages": 0, "total-input-tokens": 47805, "total-output-tokens": 4508, "length": "2e12", "weborganizer": {"__label__adult": 0.0005393028259277344,... | olmocr_science_pdfs | 2024-12-06 | 2024-12-06 |
0da3fb81b0f5468dba7d72dccf38f6676e9070d8 | TUTORIAL
TRACK II
ADVANCED ADA TOPICS
By
Major Patricia Lawlis, Air Force Institute of Technology
and
Captain Dean Gonzalez, U.S. Air Force Academy
and
Lieutenant David Cook, U.S. Air Force Academy
Tutorial Track II. Advanced Ada Topics
MAJ Patricia Lawlis, CAPT Dean Gonzalez, and LT David Cook
Ada Software Educat... | {"Source-Url": "https://apps.dtic.mil/dtic/tr/fulltext/u2/a190366.pdf", "len_cl100k_base": 7806, "olmocr-version": "0.1.53", "pdf-total-pages": 104, "total-fallback-pages": 0, "total-input-tokens": 163981, "total-output-tokens": 12275, "length": "2e12", "weborganizer": {"__label__adult": 0.00029349327087402344, "__labe... | olmocr_science_pdfs | 2024-12-09 | 2024-12-09 |
8d9952104241a56a478f259e701f26f8e7ceb742 | Trusted Execution Environment Provisioning (TEEP) Protocol
draft-ietf-teep-protocol-00
Abstract
This document specifies a protocol that installs, updates, and deletes Trusted Applications (TAs) in a device with a Trusted Execution Environment (TEE). This specification defines an interoperable protocol for managing th... | {"Source-Url": "https://tools.ietf.org/pdf/draft-ietf-teep-protocol-00.pdf", "len_cl100k_base": 5646, "olmocr-version": "0.1.53", "pdf-total-pages": 20, "total-fallback-pages": 0, "total-input-tokens": 37327, "total-output-tokens": 7163, "length": "2e12", "weborganizer": {"__label__adult": 0.0003306865692138672, "__lab... | olmocr_science_pdfs | 2024-12-07 | 2024-12-07 |
4dc22a2cba89a40a2c5df646199d06ad4b32e50a | Inheritance of Interface Specifications
Gary T. Leavens
Iowa State University
Inheritance of Interface Specifications
Abstract
Four alternatives for the semantics of inheritance of specifications are discussed. The information loss and frame axiom problems for inherited specifications are also considered.
Keywords
... | {"Source-Url": "http://lib.dr.iastate.edu/cgi/viewcontent.cgi?article=1097&context=cs_techreports", "len_cl100k_base": 4907, "olmocr-version": "0.1.53", "pdf-total-pages": 17, "total-fallback-pages": 0, "total-input-tokens": 40393, "total-output-tokens": 7874, "length": "2e12", "weborganizer": {"__label__adult": 0.0003... | olmocr_science_pdfs | 2024-12-06 | 2024-12-06 |
8f0837e39ea45d193099f2f586e08fb24a673a13 | Multi-tier agent architecture for open service ecosystems
Kutvonen, Lea
CEUR Workshop Proceedings
2012-10-15
http://hdl.handle.net/10138/37520
Downloaded from Helda, University of Helsinki institutional repository.
This is an electronic reprint of the original article.
This reprint may differ from the original i... | {"Source-Url": "https://helda.helsinki.fi/bitstream/handle/10138/37520/kutvonen12multitier.pdf;jsessionid=DECB305599399810A5C2AE37ED6FA447?sequence=2", "len_cl100k_base": 7165, "olmocr-version": "0.1.49", "pdf-total-pages": 16, "total-fallback-pages": 0, "total-input-tokens": 35670, "total-output-tokens": 10054, "lengt... | olmocr_science_pdfs | 2024-11-24 | 2024-11-24 |
a469edac240bc6361ef182814e4930d5f2d1986a | A survey of view selection methods
Imene Mami, Zohra Bellahsene
To cite this version:
HAL Id: lirmm-00720157
https://hal-lirmm.ccsd.cnrs.fr/lirmm-00720157
Submitted on 23 Jul 2012
HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are publ... | {"Source-Url": "https://hal-lirmm.ccsd.cnrs.fr/lirmm-00720157/file/surveyV5.pdf", "len_cl100k_base": 7297, "olmocr-version": "0.1.49", "pdf-total-pages": 11, "total-fallback-pages": 0, "total-input-tokens": 34771, "total-output-tokens": 9498, "length": "2e12", "weborganizer": {"__label__adult": 0.00040221214294433594, ... | olmocr_science_pdfs | 2024-11-27 | 2024-11-27 |
6796ddb1aab630ad7f66cb2aaa3b3678fbd8af1c | 1 Branch Prediction Overview
2 Software-Based Branch Prediction
2.1 Static Software Hints
2.2 Branch Delay Slots
2.3 Predication
3 Hardware-Based Branch Prediction
3.1 Fixed Branch Predictor
3.2 Branch History Table (BHT) Predictor
3.3 Two-Level Predictor For Temporal Correlation
3.4 Two-Level Pr... | {"Source-Url": "https://www.csl.cornell.edu/courses/ece4750/handouts/ece4750-T10-ap-branchpred.pdf", "len_cl100k_base": 4925, "olmocr-version": "0.1.50", "pdf-total-pages": 22, "total-fallback-pages": 0, "total-input-tokens": 31763, "total-output-tokens": 4950, "length": "2e12", "weborganizer": {"__label__adult": 0.000... | olmocr_science_pdfs | 2024-11-27 | 2024-11-27 |
44b1ce92f2ca7f61d3f7f43c8b4845d773b0604f | A Meta-Framework for Generating Ontologies from Legacy Schemas
Manuel Wimmer
Vienna University of Technology
Austria
wimmer@big.tuwien.ac.at
Abstract—A huge amount of schemas are expressed within outdated schema languages which are restricted concerning expressiveness, extensibility, readability, and understandabilit... | {"Source-Url": "https://publik.tuwien.ac.at/files/PubDat_177494.pdf", "len_cl100k_base": 4358, "olmocr-version": "0.1.50", "pdf-total-pages": 6, "total-fallback-pages": 0, "total-input-tokens": 20052, "total-output-tokens": 6346, "length": "2e12", "weborganizer": {"__label__adult": 0.00034880638122558594, "__label__art... | olmocr_science_pdfs | 2024-11-29 | 2024-11-29 |
e5b8f9aa4ffa2cfda8eb51c25764dd034167a12a | <table>
<thead>
<tr>
<th><strong>Title</strong></th>
<th>Integrating Developer-related information across Open Source Repositories</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Author(s)</strong></td>
<td>Iqbal, Aftab; Hausenblas, Michael</td>
</tr>
<tr>
<td><strong>Publication Date</strong></td>
<td>2012</td>
</tr>
<tr... | {"Source-Url": "https://aran.library.nuigalway.ie/bitstream/handle/10379/4510/iqbal_a_et_al_aug_2012.pdf?isAllowed=y&sequence=1", "len_cl100k_base": 6749, "olmocr-version": "0.1.53", "pdf-total-pages": 9, "total-fallback-pages": 0, "total-input-tokens": 29156, "total-output-tokens": 7833, "length": "2e12", "weborganize... | olmocr_science_pdfs | 2024-12-07 | 2024-12-07 |
43d33b5d6140224be46d643b000658bd106955ea | Designing E-Banking Cardless Transaction Services Framework for Banking Sectors in Ethiopia
Abebaw Teshome
Temtim Assefa
Follow this and additional works at: https://aisel.aisnet.org/menacis2021
This material is brought to you by the MENA at AIS Electronic Library (AISeL). It has been accepted for inclusion in MENAC... | {"Source-Url": "https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1021&context=menacis2021", "len_cl100k_base": 5875, "olmocr-version": "0.1.53", "pdf-total-pages": 13, "total-fallback-pages": 0, "total-input-tokens": 29194, "total-output-tokens": 7093, "length": "2e12", "weborganizer": {"__label__adult": 0.00133228... | olmocr_science_pdfs | 2024-12-06 | 2024-12-06 |
f9a52eeead0641eaa10043e87a2d26169ca08085 | [REMOVED] | {"len_cl100k_base": 6825, "olmocr-version": "0.1.53", "pdf-total-pages": 11, "total-fallback-pages": 0, "total-input-tokens": 33600, "total-output-tokens": 9477, "length": "2e12", "weborganizer": {"__label__adult": 0.00040078163146972656, "__label__art_design": 0.0002841949462890625, "__label__crime_law": 0.00025224685... | olmocr_science_pdfs | 2024-12-08 | 2024-12-08 |
3a1984c9d553b52045f5eb4d3ccb5ef9771e5646 | MAP decoding: The BCJR algorithm
- Maximum a posteriori probability (MAP) decoding
- Baum-Welch algorithm (1963?)*
Decoder inputs:
- Received sequence $r$ (soft or hard)
- A priori $L$-values $L_a(u_l) = \ln(P(u_l = 1)/P(u_l = -1))$
Decoder outputs:
- A posteriori probability (APP) $L$-values $L(u_l) = \ln(P(u_l =... | {"Source-Url": "http://www.ii.uib.no/~eirik/INF244/Lectures/Lecture11.pdf", "len_cl100k_base": 4888, "olmocr-version": "0.1.53", "pdf-total-pages": 25, "total-fallback-pages": 0, "total-input-tokens": 35544, "total-output-tokens": 6155, "length": "2e12", "weborganizer": {"__label__adult": 0.0006837844848632812, "__labe... | olmocr_science_pdfs | 2024-12-07 | 2024-12-07 |
1e9ebda0f79ae7c95631724700970f6693339485 | 1. Status of this memo
This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Int... | {"Source-Url": "https://tools.ietf.org/pdf/draft-ietf-ccamp-rsvp-te-exclude-route-00.pdf", "len_cl100k_base": 5815, "olmocr-version": "0.1.53", "pdf-total-pages": 26, "total-fallback-pages": 0, "total-input-tokens": 39821, "total-output-tokens": 6976, "length": "2e12", "weborganizer": {"__label__adult": 0.0004382133483... | olmocr_science_pdfs | 2024-12-07 | 2024-12-07 |
4786758ed0fb56da94ac26d89d5afb4dcc2511b3 | A-level
COMPUTER SCIENCE
(7517/1A/1B/1C/1D/1E)
Paper 1
Specimen 2015 am/pm Time allowed: 2 hours 30 minutes
Materials
• For this paper you must have access to:
• a computer
• a printer
• appropriate software.
• An electronic version of the Skeleton Program and Data File.
• A hard copy of the Preliminary Materia... | {"Source-Url": "https://filestore.aqa.org.uk/resources/computing/AQA-75171-SQP.PDF", "len_cl100k_base": 6478, "olmocr-version": "0.1.53", "pdf-total-pages": 24, "total-fallback-pages": 0, "total-input-tokens": 42747, "total-output-tokens": 7272, "length": "2e12", "weborganizer": {"__label__adult": 0.000843048095703125,... | olmocr_science_pdfs | 2024-12-10 | 2024-12-10 |
8d534e898030b937f090d357c1c29757e383720e | This specification defines semantics for using the XMPP publish-subscribe protocol to broadcast state change events associated with an instant messaging and presence account. This profile of pubsub therefore enables a standard XMPP user account to function as a virtual pubsub service, easing the discovery of syndicated... | {"Source-Url": "https://xmpp.org/extensions/xep-0163.pdf", "len_cl100k_base": 6904, "olmocr-version": "0.1.53", "pdf-total-pages": 19, "total-fallback-pages": 0, "total-input-tokens": 49908, "total-output-tokens": 8466, "length": "2e12", "weborganizer": {"__label__adult": 0.0003802776336669922, "__label__art_design": 0... | olmocr_science_pdfs | 2024-12-07 | 2024-12-07 |
1d078e58772c07d5c37de51f85fb31dfff0c3c1f | Package ‘DMRMark’
April 21, 2017
Type Package
Title DMR Detection by Non-Homogeneous Hidden Markov Model from Methylation Array Data
Version 1.1.1
Date 2017-02-25
Author Linghao SHEN <sl013@ie.cuhk.edu.hk>
Depends MCMCpack, mvtnorm, ellipse
Maintainer Linghao SHEN <sl013@ie.cuhk.edu.hk>
Description Perform di... | {"Source-Url": "https://cran.r-project.org/web/packages/DMRMark/DMRMark.pdf", "len_cl100k_base": 4917, "olmocr-version": "0.1.53", "pdf-total-pages": 13, "total-fallback-pages": 0, "total-input-tokens": 24785, "total-output-tokens": 5715, "length": "2e12", "weborganizer": {"__label__adult": 0.0005049705505371094, "__la... | olmocr_science_pdfs | 2024-12-10 | 2024-12-10 |
4d128761e501671ab5bfdc7cf9ea8f9f1efa7e40 | Configuration Management with Windows PowerShell
Desired State Configuration (DSC)
Keeping information system baselines consistent with a formal configuration management plan can be a very difficult task. Changes to server based systems and networking must be monitored in order to provide some measure of compliance. A... | {"Source-Url": "https://www.sans.org/reading-room/whitepapers/bestprac/configuration-management-windows-powershell-desired-state-configuration-dsc-36167", "len_cl100k_base": 7904, "olmocr-version": "0.1.49", "pdf-total-pages": 26, "total-fallback-pages": 0, "total-input-tokens": 46344, "total-output-tokens": 9636, "len... | olmocr_science_pdfs | 2024-11-25 | 2024-11-25 |
5933ff8f4544d293730dd65e385d0a2eddc67c45 | Copyright Notice
Copyright © 2019 Imperas Software Limited All rights reserved. This software and documentation contain information that is the property of Imperas Software Limited. The software and documentation are furnished under a license agreement and may be used or copied only in accordance with the terms of the ... | {"Source-Url": "http://www.ovpworld.org/documents/OVPsim_Debugging_Applications_with_GDB_User_Guide.pdf", "len_cl100k_base": 5417, "olmocr-version": "0.1.49", "pdf-total-pages": 17, "total-fallback-pages": 0, "total-input-tokens": 30322, "total-output-tokens": 6232, "length": "2e12", "weborganizer": {"__label__adult": ... | olmocr_science_pdfs | 2024-11-24 | 2024-11-24 |
574841ad9cb91498211e45bbeac8fb37c49efc5a | POSIX threads parallelization for example of Particle-In-Cell density calculations in plasma computer simulations
Anna Sasak*, Marcin Brzuszek
Institute of Computer Science, Maria Curie Skłodowska University, pl. M. Curie-Sklodowskiej 1, 20-031 Lublin, Poland.
Abstract – The TRQR program [1–4] simulates trajectories... | {"Source-Url": "https://journals.umcs.pl/ai/article/download/3282/2476", "len_cl100k_base": 4857, "olmocr-version": "0.1.53", "pdf-total-pages": 12, "total-fallback-pages": 0, "total-input-tokens": 24365, "total-output-tokens": 5670, "length": "2e12", "weborganizer": {"__label__adult": 0.00041556358337402344, "__label_... | olmocr_science_pdfs | 2024-12-11 | 2024-12-11 |
5da65c4e32723af91cee38b06bf8aad70c932948 | Reinforcement Learning
In the previous note, we discussed Markov decision processes, which we solved using techniques such as value iteration and policy iteration to compute the optimal values of states and extract optimal policies. Solving Markov decision processes is an example of offline planning, where agents have... | {"Source-Url": "https://inst.eecs.berkeley.edu/~cs188/su20/assets/notes/n4.pdf", "len_cl100k_base": 6084, "olmocr-version": "0.1.50", "pdf-total-pages": 9, "total-fallback-pages": 0, "total-input-tokens": 30888, "total-output-tokens": 6454, "length": "2e12", "weborganizer": {"__label__adult": 0.0005397796630859375, "__... | olmocr_science_pdfs | 2024-12-03 | 2024-12-03 |
2a2ffc8a4b915b937c1afa747796736cab941f2c | Lean & Agile Project Management for Large Programs & Projects
Dr. David F. Rico, PMP, CSM
Website: http://davidfrico.com
LinkedIn: http://www.linkedin.com/in/davidfrico
Facebook: http://www.facebook.com/profile.php?id=1540017424
Agenda
🌟 Overview of Agile Project Mgt.
- Intro to Agile Project Mgt.
- Types of Agile... | {"Source-Url": "https://www.pmiwdc.org/sites/default/files/presentations/201011/PMIW_Chantilly_presentation_101410.pdf", "len_cl100k_base": 7133, "olmocr-version": "0.1.50", "pdf-total-pages": 50, "total-fallback-pages": 0, "total-input-tokens": 97049, "total-output-tokens": 10024, "length": "2e12", "weborganizer": {"_... | olmocr_science_pdfs | 2024-11-30 | 2024-11-30 |
a9cf2c605212c52e381178553ea077157f6bdff1 | A hamming distance based VLIW/EPIC code compression technique
Montserrat Ros
University of Queensland, montse@uow.edu.au
Peter Sutton
University Of Queensland
Follow this and additional works at: https://ro.uow.edu.au/eispapers
Part of the Engineering Commons, and the Science and Technology Studies Commons
Recomme... | {"Source-Url": "https://ro.uow.edu.au/cgi/viewcontent.cgi?referer=&httpsredir=1&article=1443&context=eispapers", "len_cl100k_base": 7282, "olmocr-version": "0.1.53", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 29211, "total-output-tokens": 9482, "length": "2e12", "weborganizer": {"__label__a... | olmocr_science_pdfs | 2024-12-07 | 2024-12-07 |
15436fe17ccfe063cd3b9039edc17c04e2ea0f8f | Stepwise Construction and Refinement of Dependability Models
Cláudia Betous-Almeida and Karama Kanoun
LAAS-CNRS
7, Avenue du Colonel Roche
31077 Toulouse Cedex 4 - France
E-mail: {almeida,kanoun}@laas.fr
Abstract
This paper presents a stepwise approach for dependability modeling, based on Generalized Stochastic Petr... | {"Source-Url": "https://hal.laas.fr/hal-01976600/document", "len_cl100k_base": 6620, "olmocr-version": "0.1.53", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 40106, "total-output-tokens": 7930, "length": "2e12", "weborganizer": {"__label__adult": 0.0003273487091064453, "__label__art_design": ... | olmocr_science_pdfs | 2024-12-08 | 2024-12-08 |
065eeab935999ed65ffd8ecb1d729ef9d7c05d13 | Semantic-element-based Defining Approach for Model Transformation Rules
Lei Wang and Yuyan Zhang
School of Computer Engineering, Weifang University, Weifang, China
Abstract
In model-driven software development, it is a key technology that transform from platform independent models at higher abstract level to platfor... | {"Source-Url": "http://www.sersc.org/journals/IJSH/vol8_no3_2014/8.pdf", "len_cl100k_base": 5736, "olmocr-version": "0.1.53", "pdf-total-pages": 12, "total-fallback-pages": 0, "total-input-tokens": 30439, "total-output-tokens": 7637, "length": "2e12", "weborganizer": {"__label__adult": 0.00032806396484375, "__label__ar... | olmocr_science_pdfs | 2024-12-09 | 2024-12-09 |
35485dcc233b598da4e76cb6afbe140e7962b569 | Master Guide
SAP NetWeaver Composition Environment 7.1
Target Audience
- System administrators
- Technology consultants
PUBLIC
Document version: 1.10 – 02/17/2009
Material number: 50084393
## Document History
<table>
<thead>
<tr>
<th>Version</th>
<th>Date</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>1.1... | {"Source-Url": "https://archive.sap.com/kmuuid2/90e6feb4-c41c-2b10-9888-c43d49f47f12/upload_2_.pdf", "len_cl100k_base": 5225, "olmocr-version": "0.1.50", "pdf-total-pages": 20, "total-fallback-pages": 0, "total-input-tokens": 78501, "total-output-tokens": 6313, "length": "2e12", "weborganizer": {"__label__adult": 0.000... | olmocr_science_pdfs | 2024-11-29 | 2024-11-29 |
15e5393e9adf9d4601970764e61325be07f83781 | Abstract. Real Time Systems (RTS) interact with their environments using time constrained input/output signals. A functional misbehavior or a deviation from the specified time constraints may have catastrophic consequences. Hence, ensuring the correctness of such systems is extremely important and necessary. The increa... | {"Source-Url": "http://www.dcc.ufla.br/infocomp/images/artigos/v12.1/art04.pdf", "len_cl100k_base": 7031, "olmocr-version": "0.1.46", "pdf-total-pages": 13, "total-fallback-pages": 0, "total-input-tokens": 32122, "total-output-tokens": 8804, "length": "2e12", "weborganizer": {"__label__adult": 0.00028324127197265625, "... | olmocr_science_pdfs | 2024-11-23 | 2024-11-23 |
7731ca4ec463dcb682fd7dc6a908e9db6e0b5402 | Assembly Language: Part 1
Context of this Lecture
First half of the semester: “Programming in the large”
Second half: “Under the hood”
Starting Now
Afterward
C Language
Assembly Language
Machine Language
Application Program
Operating System
Hardware
Von Neumann Architecture
Instructions are fetched from RAM
- (... | {"Source-Url": "https://www.cs.princeton.edu/courses/archive/fall17/cos217/lectures/14_Assembly1-6up.pdf", "len_cl100k_base": 4822, "olmocr-version": "0.1.53", "pdf-total-pages": 8, "total-fallback-pages": 0, "total-input-tokens": 25630, "total-output-tokens": 5075, "length": "2e12", "weborganizer": {"__label__adult": ... | olmocr_science_pdfs | 2024-12-11 | 2024-12-11 |
7a69dbdf60c6fd83bf98a853159cf28536048af5 | Investigating the Adoption of Agile Practices in Mobile Application Development
Alan Santos¹, Josiane Kroll¹, Afonso Sales¹, Paulo Fernandes¹ and Daniel Wildt²
¹Computer Science Department, Pontifical University Catholic of Rio Grande do Sul (PUCRS), Porto Alegre, RS, Brazil
²WildTech, Porto Alegre, RS, Brazil
Keywo... | {"Source-Url": "http://www.scitepress.org/Papers/2016/58354/58354.pdf", "len_cl100k_base": 6423, "olmocr-version": "0.1.53", "pdf-total-pages": 8, "total-fallback-pages": 0, "total-input-tokens": 25198, "total-output-tokens": 7641, "length": "2e12", "weborganizer": {"__label__adult": 0.000507354736328125, "__label__art... | olmocr_science_pdfs | 2024-12-08 | 2024-12-08 |
de049c5a0473e7a5cde9e84c62c7dea0cae44ba0 | 1 Introduction
Computers can be programmed to perform an impressive variety of tasks, ranging from numerical computations to natural language processing. The computer is surely one of the most versatile tools ever devised, playing a critical role in solving all manner of “real world” problems. Some would argue that co... | {"Source-Url": "http://www.cs.cmu.edu:80/~me/courses/212/handouts/computability.pdf", "len_cl100k_base": 7056, "olmocr-version": "0.1.53", "pdf-total-pages": 8, "total-fallback-pages": 0, "total-input-tokens": 27312, "total-output-tokens": 7641, "length": "2e12", "weborganizer": {"__label__adult": 0.0004343986511230469... | olmocr_science_pdfs | 2024-12-10 | 2024-12-10 |
1b7d91428f91ca2759dfc340576e8d14fbdb4b4a | [REMOVED] | {"Source-Url": "https://rd.springer.com/content/pdf/10.1007/11688839_14.pdf", "len_cl100k_base": 6967, "olmocr-version": "0.1.50", "pdf-total-pages": 15, "total-fallback-pages": 0, "total-input-tokens": 34486, "total-output-tokens": 9175, "length": "2e12", "weborganizer": {"__label__adult": 0.0006318092346191406, "__la... | olmocr_science_pdfs | 2024-11-28 | 2024-11-28 |
5753143fcc9085fd21e2d9b8cefa65cabb030216 | [REMOVED] | {"Source-Url": "https://idus.us.es/xmlui/bitstream/handle/11441/65240/Analyzing%20Strategic.pdf?isAllowed=y&sequence=1", "len_cl100k_base": 5514, "olmocr-version": "0.1.49", "pdf-total-pages": 12, "total-fallback-pages": 0, "total-input-tokens": 23683, "total-output-tokens": 6248, "length": "2e12", "weborganizer": {"__... | olmocr_science_pdfs | 2024-11-25 | 2024-11-25 |
a5af76ca77a64b63317c5a23939481ec2d7afdcf | 12-15-2012
Risk Mitigation in Corporate Participation with Open Source Communities: Protection and Compliance in an Open Source Supply Chain
Matt Germonprez
Brett Young
Lars Mathiassen
Julie E. Kendall
Ken E. Kendall
See next page for additional authors
Follow this and additional works at: http://aisel.aisnet.org/i... | {"Source-Url": "https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1012&context=irwitpm2012", "len_cl100k_base": 5543, "olmocr-version": "0.1.53", "pdf-total-pages": 14, "total-fallback-pages": 0, "total-input-tokens": 32100, "total-output-tokens": 7110, "length": "2e12", "weborganizer": {"__label__adult": 0.00071620... | olmocr_science_pdfs | 2024-12-07 | 2024-12-07 |
9b41361d48ea3b183f54404f761c0e7a297a0a5e | Abstract
Change impact analysis is generally regarded as a very difficult program comprehension problem. One of the reasons for this is that there is no universal definition for dependency between software artifacts, only algorithms that approximate the dependencies.
In the past two decades, different kinds of algorit... | {"Source-Url": "https://pp.bme.hu/ee/article/download/827/446", "len_cl100k_base": 7476, "olmocr-version": "0.1.49", "pdf-total-pages": 11, "total-fallback-pages": 0, "total-input-tokens": 37401, "total-output-tokens": 10918, "length": "2e12", "weborganizer": {"__label__adult": 0.00035834312438964844, "__label__art_des... | olmocr_science_pdfs | 2024-11-26 | 2024-11-26 |
a6009b99ae0670a1ff2e1091844ceec4a4c214eb | WEB LOG MINING USING MULTI ITEM SEQUENTIAL PATTERN BASED ON PLWAP
Jaymin Desai¹, Mrs. Risha Tiwari²
¹Post Graduate Student, ²Professor,
Dept. of Computer Engg., Hasmukh Goswami Collage of Engineering, Ahmedabad, Gujarat, India.
Abstract: Web Log Mining (WLM) is the process to extract information from the Web Log data... | {"Source-Url": "https://ijtre.com/wp-content/uploads/2021/10/2017040868.pdf", "len_cl100k_base": 4314, "olmocr-version": "0.1.53", "pdf-total-pages": 5, "total-fallback-pages": 0, "total-input-tokens": 15871, "total-output-tokens": 4960, "length": "2e12", "weborganizer": {"__label__adult": 0.0003192424774169922, "__lab... | olmocr_science_pdfs | 2024-12-07 | 2024-12-07 |
27e6df15f83a25effa9ab6f05b610417b16b2a2f | [REMOVED] | {"Source-Url": "https://rd.springer.com/content/pdf/10.1007/978-3-642-38709-8_37.pdf", "len_cl100k_base": 7148, "olmocr-version": "0.1.53", "pdf-total-pages": 16, "total-fallback-pages": 0, "total-input-tokens": 34669, "total-output-tokens": 9712, "length": "2e12", "weborganizer": {"__label__adult": 0.00037336349487304... | olmocr_science_pdfs | 2024-12-06 | 2024-12-06 |
71bb8db602cc2951583c27bbddb88ada8b11d78a | Generating of Business Database Application Elements
Artur Kornatka\textsuperscript{1,2}\textasteriskaccent
\textsuperscript{1}Institute of Computer Science, Maria Curie-Sklodowska University,
pl. M. Curie-Sklodowskiej 5, 20-031 Lublin, Poland.
\textsuperscript{2}Department of Computer Science, Nowy Sącz School of Bu... | {"Source-Url": "https://journals.umcs.pl/ai/article/download/3343/2537", "len_cl100k_base": 4268, "olmocr-version": "0.1.53", "pdf-total-pages": 9, "total-fallback-pages": 0, "total-input-tokens": 19063, "total-output-tokens": 4964, "length": "2e12", "weborganizer": {"__label__adult": 0.0003371238708496094, "__label__a... | olmocr_science_pdfs | 2024-12-07 | 2024-12-07 |
2dcc2ee7ef623d657a4743f653b9f1f982fbacaa | A Transformer-based Approach for Source Code Summarization
Wasi Uddin Ahmad
University of California, Los Angeles
wasiahmad@cs.ucla.edu
Saikat Chakraborty
Columbia University
saikatc@cs.columbia.edu
Baishakhi Ray
Columbia University
rayb@cs.columbia.edu
Kai-Wei Chang
University of California, Los Ange... | {"Source-Url": "https://wasiahmad.github.io/files/publications/2020/transformer_for_code_summ.pdf", "len_cl100k_base": 7827, "olmocr-version": "0.1.50", "pdf-total-pages": 10, "total-fallback-pages": 0, "total-input-tokens": 32545, "total-output-tokens": 10622, "length": "2e12", "weborganizer": {"__label__adult": 0.000... | olmocr_science_pdfs | 2024-11-28 | 2024-11-28 |
7d7e64786d0e2b5b6aaff875cb237f826747f0c1 | [REMOVED] | {"Source-Url": "https://www.nics.uma.es/sites/default/files/papers/Agudo2008d.pdf", "len_cl100k_base": 7031, "olmocr-version": "0.1.53", "pdf-total-pages": 13, "total-fallback-pages": 0, "total-input-tokens": 37790, "total-output-tokens": 8774, "length": "2e12", "weborganizer": {"__label__adult": 0.0003445148468017578,... | olmocr_science_pdfs | 2024-12-10 | 2024-12-10 |
014adb8d3bc11bb484a2b53e9347cdf30e90d6cb | Decentralized Data Flows in Algebraic Service Compositions for the Scalability of IoT Systems
Damian Arellanes and Kung-Kiu Lau
School of Computer Science
The University of Manchester
Manchester M13 9PL, United Kingdom
{damian.arellanesmolina, kung-kiu.lau}@manchester.ac.uk
Abstract—With the advent of the Internet of... | {"Source-Url": "https://www.research.manchester.ac.uk/portal/files/85913574/1570514450.pdf", "len_cl100k_base": 6342, "olmocr-version": "0.1.49", "pdf-total-pages": 7, "total-fallback-pages": 0, "total-input-tokens": 25106, "total-output-tokens": 7431, "length": "2e12", "weborganizer": {"__label__adult": 0.000355720520... | olmocr_science_pdfs | 2024-11-25 | 2024-11-25 |
28a8f67d463f62c158972c7a9bcae2c6a6280f6f | This specification defines an XMPP protocol extension for data forms that can be used in workflows such as service configuration as well as for application-specific data description and reporting. The protocol includes lightweight semantics for forms processing (such as request, response, submit, and cancel), defines s... | {"Source-Url": "https://xmpp.org/extensions/xep-0004.pdf", "len_cl100k_base": 8076, "olmocr-version": "0.1.53", "pdf-total-pages": 22, "total-fallback-pages": 0, "total-input-tokens": 62102, "total-output-tokens": 9435, "length": "2e12", "weborganizer": {"__label__adult": 0.0002491474151611328, "__label__art_design": 0... | olmocr_science_pdfs | 2024-12-07 | 2024-12-07 |
d6750204c61a4ef44801839a777cc20c610545aa | Writing a CSPICE (C) Based Program
January 2020
Undefined variables are displayed in red
Results are displayed in blue
First, let's go over the important steps in the process of writing a CSPICE-based program and putting it to work:
• Understand the geometry problem.
• Identify the set of SPICE kernels that contain t... | {"Source-Url": "https://naif.jpl.nasa.gov/pub/naif/toolkit_docs/Tutorials/pdf/individual_docs/40_program_c.pdf", "len_cl100k_base": 4900, "olmocr-version": "0.1.53", "pdf-total-pages": 26, "total-fallback-pages": 0, "total-input-tokens": 47031, "total-output-tokens": 6206, "length": "2e12", "weborganizer": {"__label__a... | olmocr_science_pdfs | 2024-12-11 | 2024-12-11 |
c449ce7e53bf60c0b8c4799616c3c5fc338d7100 | Online Map Application Development Using Google Maps API, SQL Database, and ASP.NET
Shunfu Hu, Ting Dai
1 Department of Geography, Southern Illinois University Edwardsville, Edwardsville, IL 62026, USA
2 Farm Service Agency, United States Department of Agriculture, Washington, DC 20250, USA
ABSTRACT
Recently, there... | {"Source-Url": "http://www.siue.edu/~shu/vol3no3_1.pdf", "len_cl100k_base": 6064, "olmocr-version": "0.1.51", "pdf-total-pages": 9, "total-fallback-pages": 0, "total-input-tokens": 26949, "total-output-tokens": 7664, "length": "2e12", "weborganizer": {"__label__adult": 0.00032591819763183594, "__label__art_design": 0.0... | olmocr_science_pdfs | 2024-12-04 | 2024-12-04 |
25502f9818d9327b20fe6dbd91771b76dbc4adc9 | Dynamic Load Balancing Based on Applications Global States Monitoring
Eryk Laskowski, Marek Tudruj, Richard Olejnik, Damian Kopanski
To cite this version:
HAL Id: hal-00833477
https://hal.archives-ouvertes.fr/hal-00833477
Submitted on 12 Jun 2013
HAL is a multi-disciplinary open access archive for the deposit and di... | {"Source-Url": "https://hal.archives-ouvertes.fr/hal-00833477/document", "len_cl100k_base": 7851, "olmocr-version": "0.1.53", "pdf-total-pages": 9, "total-fallback-pages": 0, "total-input-tokens": 28755, "total-output-tokens": 9603, "length": "2e12", "weborganizer": {"__label__adult": 0.00034308433532714844, "__label__... | olmocr_science_pdfs | 2024-12-07 | 2024-12-07 |
54b0b78f0b40a5d45592733ceceaf63d24a49973 | Oracle® Call Interface
Getting Started
Release 9.0.1 for Windows
June 2001
Part No. A90166-01
### Contents
<table>
<thead>
<tr>
<th>Section</th>
<th>Page</th>
</tr>
</thead>
<tbody>
<tr>
<td>Send Us Your Comments</td>
<td>v</td>
</tr>
<tr>
<td>Preface</td>
<td>vii</td>
</tr>
<tr>
<td>Audience</td>
<td>viii</td>
</t... | {"Source-Url": "https://docs.oracle.com/cd/A91202_01/901_doc/win.901/a90166.pdf", "len_cl100k_base": 7660, "olmocr-version": "0.1.53", "pdf-total-pages": 30, "total-fallback-pages": 0, "total-input-tokens": 52072, "total-output-tokens": 8328, "length": "2e12", "weborganizer": {"__label__adult": 0.00022709369659423828, ... | olmocr_science_pdfs | 2024-12-07 | 2024-12-07 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.