id stringlengths 40 40 | text stringlengths 0 36.9M | n_tokens int64 1 7.72M |
|---|---|---|
9feef32cb86b011964f66a5428f55cd79bd456e9 | IX.6.2-SYSTEM EXTENDED STREAMFLOW PREDICTION (ESP) SYSTEM SUBROUTINE DESCRIPTIONS
This Section describes system level Extended Streamflow Prediction (ESP) routines.
The following information is included for each subroutine:
- Description
- Calling sequence
- Argument list
- Argument name
- Input or Output
- Type
... | 120 |
c7e3a82c8d19368883a56aaa5cd7d7a35846bb0f | Automated Reasoning for Web Page Layout
Pavel Panchekha
A dissertation
submitted in partial fulfillment of the
requirements for the degree of
Doctor of Philosophy
University of Washington
2019
Reading Committee:
Zachary Tatlock, Chair
Michael D. Ernst, Chair
Shoaib Kamil
Program Authorized to Offer Degree:
Compu... | 57,488 |
424abd75f86f0bcedd38ad2fd6611a6fa1d5df93 | As I've done in the previous lectures, let me set the stage for what we've been doing, so we can use that to talk about what we're going to do today.
So far, we have the following in our language. Right, we have assignment. We have conditionals. We have input/output. And we have looping constructs. These are things li... | 11,377 |
818a2303ea8bb5a336d99981e3ccb750b492ab3f | TESTING AND INTEGRATION
Chris Riesbeck
Electrical Engineering and Computer Science
Learning Sciences
Northwestern University
READINGS
- These slides
- **The Agile Samurai**: Chapters 12, 14, 15
- [http://dannorth.net/introducing-bdd/](http://dannorth.net/introducing-bdd/)
- [http://martinfowler.com/articles/mocksAren... | 4,549 |
eb9531962af6af89a623b30e2957feeef3af1946 | NAG C Library Function Document
nag_mesh2d_renum (d06ccc)
1 Purpose
nag_mesh2d_renum (d06ccc) renumbers the vertices of a given mesh using a Gibbs method, in order to reduce the bandwidth of Finite Element matrices associated with that mesh.
2 Specification
```c
void nag_mesh2d_renum (Integer nv, Integer nelt, Int... | 4,465 |
fbf89efe08702fd79050dee476633481d2274b97 | Top-down parsing
Last time
CYK
- Step 1: get a grammar in Chomsky Normal Form
- Step 2: Build all possible parse trees bottom-up
- Start with runs of 1 terminal
- Connect 1-terminal runs into 2-terminal runs
- Connect 1- and 2- terminal runs into 3-terminal runs
- Connect 1- and 3- or 2- and 2- terminal runs ... | 1,865 |
0adfed8ebc5f3bd6cd16fa7815e0f981fa665326 | Optimal Speedup on a Low-Degree Multi-Core Parallel Architecture (LoPRAM)
Reza Dorrigiv, Alejandro López-Ortiz, Alejandro Salinger
David R. Cheriton School of Computer Science, University of Waterloo
Over the last five years, microprocessor manufacturers have released plans for a rapidly increasing number of cores pe... | 1,885 |
69d596dd49921147aea9de612b6d03f93572471b | Visual Basic - Arrays
An array is a named collection of variables of the same data type. Each element of the array is labelled by one or more indices, e.g.
```
candNames(1) = "Smith"
candNames(2) = "Patel"
candNames(3) = "Oddbins"
```
Arrays allow you to group related variables and to manipulate them all at once whi... | 1,149 |
14c489f6a9b9c2bf7f5e7f9693784ba6de82d1e3 | Key Concepts
Interactors!
Main Idea: Let user interact with application by giving them choices
What does it look like in code?
/* JButton constructor takes String to display on button */
JButton button = new JButton("Add");
add(button, NORTH); // Add to top of screen
// JTextField constructor takes length of text
JTe... | 2,210 |
0d4557311cfa196d44c05a58505b57fc16550baa | Proxy Sniffer V4.5
Release Notes
English Edition
# Table of Contents
1 V4.5 Release Notes ........................................................................................................... 5
1.1 New Functions and Features ......................................................................................... | 23,476 |
e335c8ec2f98681b68c903818bd138b0330fbf80 | EE 1301: Introduction to Computing Systems
IoT Laboratory #3
Flying (not so) High in the Cloud
Created by: David Orser, Kia Bazargan, and John Sartori
Many thanks to the students, teaching assistants, and faculty that work to continually improve this document. Together we make better labs!
Please send comments and... | 7,127 |
8072736bb8eb4aa83c3aea997ac7bc6f5d14b437 | <table>
<thead>
<tr>
<th>NUMBER</th>
<th>DATE</th>
<th>DESCRIPTION</th>
<th>NAME</th>
</tr>
</thead>
<tbody>
<tr>
<td></td>
<td></td>
<td></td>
<td></td>
</tr>
</tbody>
</table>
Contents
1 Preparing for GHI Install .......................................................... 1
1.1 Prerequisites ......................... | 15,479 |
5e18b79c876dd873bb35885ce8ef8b40cce0896b | Infosys TFINCTAPLIXM2001 Exam
Volume: 155 Questions
Question No : 1
Which among the following statements is/are true about Business Process Management?
A. BPM is systematic way of defining, automating, analyzing and improving business processes within and across enterprise
B. BPM does not encompass management pract... | 1,011 |
8a9c7b048a364e1ac5e45478c0d1392352b381d8 | WIN: A Persistent Window Management System
Q I Cutts*, A Dearle*, G N C Kirby* and C D Marlin†
*University of St Andrews, North Haugh, St Andrews, Scotland KY16 9SS.
†University of Adelaide, GPO Box 498, Adelaide, South Australia 5001, Australia.
Abstract
WIN is a persistent window management system written in Napi... | 10,099 |
a207435dafbaab84659744dd6e8f9b7f24e9e58b | Overview
- System architecture
- Rendering performance
- GPU architecture
- Unified shader
- Memory Export
- Texture/Vertex Fetch
- HDR rendering
- Displaced subdivision surfaces
System architecture
CPU
2x 10.8 GB/s
2x PCIE
500MB/s
GDDR3
UNIFIED MEMORY
32GB/s
700MHz
128bit
GPU
Northbridge
22.4GB/s
2x 10... | 921 |
a13764aaf4dc29876de43904f258a6902308ad48 | Horizontal axis: Time (cycles) to generate a public key (crypto_kem_keypair).
Vertical axis: Space (bytes) for a public key (crypto_kem_PUBLICKEYBYTES).
*C:* means that the SUPERCOP database does not list IND-CCA2 security as a goal for this primitive.
*C:* means that the SUPERCOP database does not list constant tim... | 85 |
e6e20018436c73bfe4bdac1ad102e5f804100add | Abstract
In this paper, our android application aims at helping visually challenged people who want to use the android based smart phones. The GUI of the application is designed such a way that anywhere they touch on the android smart phone; they can do the task they want to. The application inputs would adjust themse... | 206 |
2d84d83769dd3dec962fbf76b766d017316aaeb7 | Electromechanical Transient Simulator of Electric Power System Based on Object-oriented Design Patterns
Yanwei Xiao¹, Juan Wu² and Bingquan Zhu¹
ABSTRACT
Studying the electromechanical transient of electric power system is very necessary for dispatchers to understand the electromechanical transient process and remov... | 2,311 |
2fac80a86da4c21d9f8526d130f51d97a412399f | Audio/Video Transport Working Group
Colin Perkins
Tom Taylor
Roni Even
http://www.ietf.org/html.charters/avt-charter.html
Agenda - Thursday
15:10 DTLS-SRTP status (Chairs)
15:15 DTLS-SRTP Key Transport (Wing)
15:30 Why SRTP not mandatory - Security consideration (Westerlund)
15:40 Guidelines for Extending RTC... | 518 |
38cf1210766bcec688084e75ddb0b166922d4bd8 | Side Talk: Implementation of The Linked List
Yufei Tao
Department of Computer Science and Engineering
Chinese University of Hong Kong
In this side talk, we discuss one possible way of implementing the linked list.
We will strive not to constrain our description to any particular programming languages. For this reaso... | 484 |
2eb96ab970731c1cb7ac1fd4f566882c133611d1 | Modular Transformations of CLP Programs.
Sandro Etalle\textsuperscript{1,2}, Maurizio Gabbrielli\textsuperscript{1}
\textsuperscript{1}CWI
P.O. Box 94079, 1090 GB Amsterdam, The Netherlands.
\textsuperscript{2}Dipartimento di Matematica Pura ed Applicata,
Università di Padova,
Via Belzoni 7, 35131 Padova, Italy.
email:... | 21,573 |
f5f8343746e49f9304f7fc47f0544e4b080080e1 | Computer Reliability
Introduction
• Computer systems are sometimes unreliable
– Erroneous information in databases
– Misinterpretation of database information
– Malfunction of embedded systems
• Effects of computer errors
– Inconvenience
– Bad business decisions
– Fatalities
Data-Entry or Data-Retrieval ... | 2,242 |
c7baee72751ed2832b0d245c67e1ffcd00437494 | Tutorial – Chapter 7
1) Use the LTSA to obtain an action trace that violates the following safety property:
property PS = (a -> (b-> PS | a -> PS) | b -> a -> PS).
Can you think of a different trace that also violates the property?
2) A lift has a maximum capacity of ten people. In the model of the lift control sys... | 334 |
f2f9eba0c58e294d61eb2d7a0500787e45fd2fec | GUROBI OPTIMIZATION, LLC
END-USER LICENSE AGREEMENT
("Agreement")
Please read the terms and conditions of this license agreement carefully. By installing and enabling the Product(s) you are accepting the terms of this agreement. (The Product(s) will be enabled when you have installed the License Key(s) that is supplie... | 9,730 |
5b7c142479b66380952d893ceba0a2b132c5fc70 | Abstract
Multimedia presentation has been popular by used in the field of education, especially in online learning. The most common practice is to conduct a presentation by utilizing media player on web or native applications. However, this mode of operation belongs to a heavyweight practice which incurs poor performa... | 235 |
b92a0f0ff638b5c9dc521762bc132920b246d0a2 | tsline — Plot time-series data
Syntax
Time-series line plot
[ twoway ] tsline varlist [ if ] [ in ] [ , tsline_options ]
Time-series range plot with lines
[ twoway ] tsrline y1 y2 [ if ] [ in ] [ , tsrline_options ]
where the time variable is assumed set by tsset (see [TS] tsset), varlist has the interpretation $... | 1,333 |
74dab2794ae0155269bf3ab269a53eac91b336d0 | Optimized Resource Access Control in Shared Sensor Networks
Christophe Huygens, Nelson Matthys and Wouter Joosen
christophe.huygens@cs.kuleuven.be
Mobisec 2010
Quick overview
- Intro
- Problem domain: long-lived WSN settings
- Problem analysis
- Contribution
- Results and Q&A
Monolithic – security problem
Real-worl... | 1,125 |
6b062810b85eebf26654ce9c2c3270117b0c4c79 | Welcome to the SCITAS documentation space!
This is the home page for SCITAS public documentation and How-To articles.
You can browse this space using the page tree on the left, search it, or start at the most popular topics just below.
Where to start
- Connecting to the clusters
- First steps on the clusters
- FAQ
-... | 248 |
34dfeacfdb9f8f17ac264b44c3f6224f9a3a608c | We are given a CBit module shown here.
This module takes corresponding bits of two unsigned binary numbers, A and B, along with two Cin bits from higher-order CBit modules.
Its output bit R, is the appropriate bit of the larger among A and B.
It also has two additional output bits Cout which indicate respectively if... | 1,405 |
af3b9baaeb16fd62b177fb87d040620e571e9923 | A Metamodel for Component-Based Service Modeling
Michael Becker, University of Leipzig, Leipzig, Germany
Stephan Klingner, University of Leipzig, Leipzig, Germany
ABSTRACT
Due to industrialization of services, organizations need to establish new approaches for tackling challenges like increased competition, complexi... | 1,226 |
86b0497777c4945b5c51a7d9f32700cfc089d35c | SPRING 2017: COT 5407 Intro. to Algorithms
[Homework 1; Due Jan 19 at start of class]
General submission guidelines and policies: Add the following signed statement. Without this statement, your homework will not be graded.
I have adhered to the collaboration policy for this class. In other words, everything written ... | 466 |
20162e8b4143972f27c3d737c7f31d8f491602d6 | A Seminar report
On
Poka-Yoke
Submitted in partial fulfillment of the requirement for the award of degree of Electronics
Acknowledgement
I would like to thank respected Mr.…….. and Mr. …….. for giving me such a wonderful opportunity to expand my knowledge for my own branch and giving me guidelines to present a semina... | 3,488 |
ed4479f5e4b60a0f98f10fa425b934820d615031 | PSTricks is distributed with a much more general loop macro, called \multido. You must input the file multido.tex or multido.sty. See the documentation multido.doc for details. Here is a sample of what you can do:
```
\begin{pspicture}(-3.4,-3.4)(3.4,3.4)
\newgray{mygray}{0} % Initialize 'mygray' for benefit
\... | 10,329 |
aa4a3dfde07a337cad56424ba7e25bd85aa4dc28 | Model driven security for process-oriented systems
Conference Paper
Author(s):
Basin, David A.; Doser, Jürgen; Lodderstedt, Torsten
Publication date:
2012
Permanent link:
https://doi.org/10.3929/ethz-a-007329377
Rights / license:
In Copyright - Non-Commercial Use Permitted
Model Driven Security for Process-Oriente... | 7,711 |
7598644c13c4af457cc2e701ed6053cd6073c511 | ChapelCon 2024: State of the Chapel Project
Brad Chamberlain
June 7, 2024
What is Chapel?
**Chapel:** A modern parallel programming language
- Portable & scalable
- Open-source & collaborative
**Goals:**
- Support general parallel programming
- Make parallel programming at scale far more productive
Chapel 2.0
**Chap... | 8,906 |
35ae2a4f823d4a09f5133f97b8b95310a951a6af | ControVol: A Framework for Controlled Schema Evolution in NoSQL Application Development
Stefanie Scherzinger, Thomas Cerqueus, Eduardo Cunha de Almeida
To cite this version:
Stefanie Scherzinger, Thomas Cerqueus, Eduardo Cunha de Almeida. ControVol: A Framework for Controlled Schema Evolution in NoSQL Application Deve... | 3,904 |
48f775756052496d575e8eada6d2bb9179a1a352 | Abstract interpretation for the heap
Computer Science and Artificial Intelligence Laboratory
MIT
Nov 18, 2011
Consider the following program
```c
struct Node{
int v;
Node * nxt;
}
void foo(){
head = new Node();
n = head;
i=0;
while(i<10){
n->nxt = new Node();
n = n->nxt;
... | 1,957 |
81fedeece49e88e49b22cff82c5c889e33bb3495 | MySQL NDB Cluster 7.5, MySQL NDB Cluster 7.6
Abstract
This is the MySQL NDB Cluster 7.5 and MySQL NDB Cluster 7.6 extract from the MySQL 8.0 Reference Manual.
For legal information, see the Legal Notices.
For help with using MySQL, please visit the MySQL Forums, where you can discuss your issues with other MySQL use... | 435,318 |
e481e1de90bc16fd445fd56310460ec9cb5b3d21 | CS4491-02 Fog Computing
IoT Architecture
Guiding questions
• What are relevant architecture concerns for IoT systems?
• What are different architectural options?
• What are typical architecture styles?
• What is (software, system) architecture anyway, and can we make sure we understand what is meant with all these... | 4,390 |
300c63bc1990df2015c80fbd9fad8c811a218e27 | PyCantonese: Cantonese Linguistics and NLP in Python
Jackson L. Lee, Litong Chen¹, Charles Lam², Chaak Ming Lau³, Tsz-Him Tsui
¹Wheaton College, ²Hang Seng University of Hong Kong, ³Education University of Hong Kong
Abstract
This paper introduces PyCantonese, an open-source Python library for Cantonese linguistics a... | 3,316 |
11917b330becabb819773132d77f2fbaf980ac24 | Disclaimer
- The information in this presentation represents a snapshot of work in progress within the DMTF.
- This information is subject to change without notice. The standard specifications remain the normative reference for all information.
- For additional information, see the Distributed Management Task Force (D... | 500 |
39fba52df7d436a4b3b4b0d1ab057e63f19155cd | Particle Systems according to Reeves
Particle Systems
- An object is represented as a cloud of particles that defines its volume.
- They are not static, the particle system evolves.
- Non-deterministic.
Properties of Particle Systems
- Particles are simple (computationally efficient)
- Procedural
- LOD is easy.
- Go... | 2,103 |
2d56893ae5f8c41c494f0bf7329683b368aafc12 | Abstract
In a restaurant recommender system the main focus is on the user rating or perhaps the customer satisfaction that is significant of all. The contextual features are closely studied which aids as the precipitate for the study. In order to identify relevant contextual information for the study, only those cardi... | 247 |
dba36b5ce0f798cb9f1db899b95341c33dc3f3d5 | MySQL NDB Cluster 8.0 Release Notes
Abstract
This document contains release notes for the changes in each release of MySQL NDB Cluster that uses version 8.0 of the NDB (NDBCLUSTER) storage engine.
Each NDB Cluster 8.0 release is based on a mainline MySQL Server release and a particular version of the NDB storage eng... | 156,028 |
e842644949c3c3331be9bd3593662098412f95a7 | DCAT Meeting August 2018
Date & Time
- August 14th 15:00 UTC/GMT - 11:00 EDT
Zoom meeting:
We will be using the DSpace Zoom Meeting Room for our meeting.
Meeting location: https://duraspace.zoom.us/my/dspace
Enter Meeting ID: 502 527 3040, followed by #
Zoom information: DSpace Meeting Room
Agenda:
- Community... | 781 |
2892532070cc194fa3532948e160f7f1c7631fcd | ## Description
r4050
If I try to create a new bug and use the "Create and continue" button, the bug is actually created, but routing is incorrect (returning me to /issue/new?issue[tracker_id]=(int value here)). To "fix", either move
```ruby
map.resources :issues, :member => { :edit => :post }, :collection => {} afte... | 782 |
07f389f20d9e29d60ae7c108381a2a9fe21cb9b0 | Plain English: Risks of Java Applets and Microsoft ActiveX Controls
Jennifer Marek
PLAIN ENGLISH: RISKS OF JAVA APPLETS AND MICROSOFT ACTIVEX CONTROLS
JENNIFER M. MAREK
GIAC SECURITY ESSENTIALS CERTIFICATION (VER 1.3)
4 MARCH 2002
EXECUTIVE SUMMARY
Although the technologies change, the same old issues seem to stay ... | 5,817 |
901e94cfc64b7837150959c7a00b502d711cefd0 | Visual Information Solutions
IDL Discover What’s In Your Data.
IDL is the trusted scientific programming language used across disciplines to create meaningful visualizations out of complex numerical data. From small scale analysis programs to widely deployed applications, IDL provides the comprehensive computing envir... | 1,837 |
6567dead5e37b8ef6adbadd9580094b462f20b85 | Instructions: You have eighty minutes to complete this open-book, open-note, closed-interpreter exam. Please write all answers in the provided space, plus the back of the exam if necessary.
Note on actual exam: The exam may refer to the env.rkt, lambda.rkt, and store-with.rkt interpreters. If you need the interpreters... | 1,620 |
051770ead4312cf03a86c77228cb4360ab9b9a78 | Programming In PROLOG Using The Iso Standard, 5TH EDITION
DOWNLOAD EBOOK
Synopsis
Book Information
Paperback
Publisher: Springer; 5th edition (July 25, 2002)
ASIN: B0042NJZWA
Average Customer Review: Be the first to review this item
Best Sellers Rank: #2,437,496 in Books (See Top 100 in Books) #19 in Books > Compu... | 114 |
a39382f9c9b5799f2001b366c0304978c00a8c6a | Exception Examples:
**ArrayIndexOutOfBoundsException example:**
class Example {
public static void main(String args[])
{
int arr[] = {1,2,3,4,5};
System.out.println(arr[7]);
}
}
*Note:* array has only 5 elements but we are trying to display the value of 8th element. It will throw **ArrayIn... | 634 |
e56743b2885e28f157331140fb73966053e5467d | 4 They Delved Too Greedily and Too Deep
There’s a new Lord of the Rings show out, have you watched it? It may not surprise you to
learn that I started the first episode the day I wrote this problem.
You and your party of dwarves are exploring a new mountain to share. You find a complex
cave system, with many walled o... | 607 |
789331e71b91cca2afd952f2e16a10ccb720c3d0 | STATS 507
Data Analysis in Python
Lecture 16: UNIX/Linux command line
UNIX/Linux: a (very) brief history
1960s: Multics (Bell Labs, MIT, GE), a time-sharing operating system
1970s: UNIX developed at Bell Labs
1990s: GNU/Linux emerges
2000s: MacOS developed based on UNIX
The Unix philosophy: do one thing well
1.... | 3,799 |
dfbf462adfad96d4470d1fac43577057e467b3c7 | Hidden Surface Removal/ visual surface Detection
When you draw a scene composed of three-dimensional objects, some of them might obscure all or parts of others. Changing your viewpoint can change the obscuring relationship. For example, if you view the scene from the opposite direction, any object that was previously ... | 4,558 |
fc7f16668af48ce8c35991c4eb88d26239796785 | Mandriva Community Case Study
First Prototype of
A Social Semantic Help Desk
Deliverable D11.2
Version 1.0
15.10.2007
Dissemination level: PU
Nature: P
Due date: 30.09.2007
Lead contractor: EDGE-IT S.A.R.L
Start date of project: 01.01.2006
Duration: 36 months
Authors
David Barth, EDGE-IT S.A.R.L
Arnaud Laprévote, E... | 12,891 |
9c222e80e3bf9ad40903c18350e935f112abf3fd | Postman Pro is the contract between operations and engineering at Coursera
Coursera is an education platform that pioneered the concept of MOOCs (massive open online courses) in early 2012 with the mission to provide universal access to the world’s best education.
Massive proliferation of APIs
Coursera’s education p... | 534 |
7dfa2ab2ff164a5ef93efed01d8456ab8202b63c | Mass Virtual Hosting with Apache 2.0
Paul Querna
chip@OutOfOrder.cc
Virtual Hosts
- IP Address
- Required for HTTPS
- The 'Host' Header
- Mass Virtual Hosting?
- HTTPD's Default configuration doesn't deal well with thousands of Virtual Hosts!
Considerations
- **Security**
- Suexec?
- PHP?
- Perchild?
- R... | 1,025 |
d09aab95046b1ee0e89d73634101ab5804cb0bbb | # Management and Strategy
<table>
<thead>
<tr>
<th>Section</th>
<th>Title</th>
<th>Page</th>
</tr>
</thead>
<tbody>
<tr>
<td>16.0</td>
<td>INTRODUCTION</td>
<td>540</td>
</tr>
<tr>
<td>16.1</td>
<td>ORGANIZATIONAL MATURITY</td>
<td>542</td>
</tr>
<tr>
<td>16.2</td>
<td>BUSINESS OBJECTIVES</td>
<td>554</td>
</tr>
<tr>
... | 11,571 |
da4335ef81efbfd98ce4288264fcd9740d96753e | RP-DeLP: A weighted defeasible argumentation framework based on a recursive semantics
<table>
<thead>
<tr>
<th>Títol</th>
<th>RP-DeLP: A weighted defeasible argumentation framework based on a recursive semantics</th>
</tr>
</thead>
<tbody>
<tr>
<td>Publication Type</td>
<td>Journal Article</td>
</tr>
<tr>
<td>Year of ... | 625 |
c75ed74f43e0bf64d6602f4639560f4871823027 | Should Ruby core implement String#blank?
04/03/2013 09:32 AM - sam.saffron (Sam Saffron)
Status: Open
Priority: Normal
Assignee:
Target version:
Description
There has been some discussion about porting the #blank? protocol over to Ruby in the past that has been rejected by Matz.
This proposal is only about String h... | 3,478 |
34ec16fc0eb6cf68bdd09a51c5dff9350525b238 | Problem 1: Strings, Arrays, and Disguised Algorithms
a) Suppose the `perplexity` function is defined as follows:
```javascript
function perplexity(array) {
let befuddled = array[0];
let baffled = [befuddled];
for (let i = 1; i < array.length; i++) {
befuddled = Math.max(array[i], befuddled + array... | 2,090 |
ef9c10e80172972e2cd8a642c589b4c97228a9d1 | Interaction with mobile devices and embedded systems has become a part of everyday life. As these devices and systems get more sophisticated and increasingly interconnected, the creation of usable interactive software poses many new challenges. In facing these challenges, emerging user interface paradigms offer potenti... | 676 |
704e6eb5b89b553edfc55dd56c61d7ab6c1a013d | Jakarta Struts
Course Summary
Description
Struts is an open source, Model-View-Controller (MVC) framework developed by The Apache Software Foundation as part of its Jakarta project. Struts is built on top of JSP, Servlets, and custom tag libraries.
After reading the first J2EE Blueprints from Sun with their explana... | 1,243 |
48917cd3a8049abff187f221c9db79ff823215e4 | GSI Online Credential Retrieval Requirements
Jim Basney
jbasney@ncsa.uiuc.edu
http://www.ncsa.uiuc.edu/~jbasney/
Online Credential Retrieval Defined
Client
Authenticate
Request Credential
Server
Verify Authorization
Retrieve Credential
Motivation for OCR
• **Credential management**
– Securely manage credentia... | 860 |
05364ec13a27534720dd45eea4c9345e1f2bc5d4 | # Contents
1 The Glasgow Haskell Compiler License ................................................................. 3
2 Introduction to GHC ................................................................................................. 5
2.1 Obtaining GHC ............................................................ | 338,137 |
d6fdd8b751677f8c9f2d5edabf4f70b8440f04f3 | M.E.T.U
Computer Engineering Department
CENG 492
TEAM BABYLON:
M. Tuğberk İŞYAPAR - 1502996
Arif S. ÖZÇELİK - 1428044
Okan T. TURSUN - 1445550
Ö. Aml TÜRKKAN - 1449750
ASİSTANT:
Fatih Gökçe
CONTENTS
Introduction ......................................................................................................... | 1,737 |
46ceec06b4ba43402d5893cfc4a93d1b7cd95307 | Static Analysis with Demand-Driven Value Refinement
BENNO STEIN, University of Colorado Boulder, USA
BENJAMIN BARSLEV NIELSEN, Aarhus University, Denmark
BOR-YUH EVAN CHANG, University of Colorado Boulder, USA
ANDERS MØLLER, Aarhus University, Denmark
Static analysis tools for JavaScript must strike a delicate balanc... | 27,763 |
0d90e9f63d979ac80b127ab636d140aca04d51fb | Making components contract aware
Antoine Beugnard, Jean-Marc Jézéquel, Noël Plouzeau, Damien Watkins
To cite this version:
HAL Id: hal-01794333
https://hal-imt-atlantique.archives-ouvertes.fr/hal-01794333
Submitted on 30 Aug 2019
HAL is a multi-disciplinary open access archive for the deposit and dissemination of sc... | 4,846 |
c4c9e0f6f56b977e8551f3bed995cfc270a7746b | HAPPY INNERSOURCE DAY!
WHERE WE CAME FROM
InnerSource is Apache Inside
Brazil submits a pull request to Core
Core sits on it ...
It's eventually re-written
What was learned?
Trusted Committers
- Leads
- Trusted Committers
- Contributors
- Users
Code Mentorship
Rewards
Patch gets merged
But what about the TC?
Refactori... | 370 |
6552c60ed85dd369740bf7371bc1783f50e4e441 | HTTP/QUIC
Cross-Pollination
HTTP/QUIC Charter
QUIC WG is chartered to
...describe mappings between... HTTP/2 semantics using QUIC, specifically with the goal of minimizing web latency using QUIC. This mapping will accommodate the extension mechanisms defined in the HTTP/2 specification.
Along the way, HTTP/QUIC has:... | 623 |
0a46fcfbee655af79fcd8175ff9b3f459e236179 | Reinforcement Learning
COMP3431 Robot Software Architectures
A Simple Learning Robot
Reinforcement Learning
• “Stumpy” receives a \textit{reward} after each action
• Did it move forward or not?
• After each move, updates its \textit{policy}
• Continues trying to maximise its reward
Pole Balancing
- Pole balanc... | 1,330 |
d99492dad1045e7e9b06fc2376b48669a974be60 | Package ‘TT’
October 12, 2022
Title Display Tree Structured Data using Datatable Widget (DT)
Version 0.98
Description Wrapper of datatable widget, allowing display of data.tree objects.
All arguments of the data.tree become columns and each node is a row.
Adds column with buttons allowing folding and unfoldin... | 1,800 |
b452013aff874373590c538ab0f1f5b6d9bdf8da | AUTOMATIC CONVERSION TOOL FOR ACCESSIBLE WEB
Juan Manuel Fernández, Vicenç Soler
Dept. Microeletrònica i Sistemes Electrònics, Universitat Autònoma de Barcelona, Cerdanyola del Vallès, Spain
Jordi Roig
Dept. Microeletrònica i Sistemes Electrònics, Universitat Autònoma de Barccelona, Cerdanyola del Vallès, Spain
Keyw... | 3,176 |
749a15828b07ba2aaa00a72bbc2faf908a44b7cf | Introducing a Stream Processing Framework for Assessing Parallel Programming Interfaces
This is a pre print version of the following article:
Original Citation:
Availability:
This version is available http://hdl.handle.net/2318/1949991 since 2024-01-02T02:12:10Z
Publisher:
Institute of Electrical and Electronics En... | 4,050 |
3aabbefeb0bf2ec779981b82109d506b6b0e1935 | Abstract
This specification documents an extension to the Diameter Overload Indication Conveyance (DOIC) base solution, which is defined in RFC 7683. This extension adds a new overload-control abatement algorithm. This abatement algorithm allows for a DOIC reporting node to specify a maximum rate at which a DOIC react... | 7,313 |
26f2dfee87ff306f7a966a60fd2a150f2e7757b6 | ARMv8-A Foundation Platform
User Guide
Copyright © 2012–2017 ARM Limited or its affiliates. All rights reserved.
Release Information
<table>
<thead>
<tr>
<th>Issue</th>
<th>Date</th>
<th>Confidentiality</th>
<th>Change</th>
</tr>
</thead>
<tbody>
<tr>
<td>A</td>
<td>10 October 2012</td>
<td>Non-Confidential</td>
<t... | 14,256 |
0e0aa2dbe97d8c11d3aa06e7071050f32a535c8d | Activity Report 2019
Project-Team STAMP
Safety Techniques based on Formalized Mathematical Proofs
RESEARCH CENTER
Sophia Antipolis - Méditerranée
THEME
Proofs and Verification
Table of contents
1. Team, Visitors, External Collaborators .................................................... 1
2. Overall Objectives ..... | 13,325 |
18ba241a5be35684b6cd4a5dea8a424e299db79d | A method for probabilistic record linkage includes providing a record pair comprising a plurality of fields, providing a plurality of scenarios, each scenario relating to a distribution of patterns among a plurality of attribute statuses, and comparing the record pair to determine a record difference. The method includ... | 5,509 |
a535b5caa2f0a02ddacef22810daf2ff52657450 | Directions: You may collaborate but write up solutions yourself. No late HW.
1. **Converting a bridge into a monitor**: Alyssa P. Hacker is working for DEC and has learnt of the spiffy bridge invented at DEC. Alyssa decides to convert the bridge into a LAN traffic monitor that will passively listen to a LAN and produc... | 1,042 |
a8d00e6242b5e5339dce41a64ff380ee81773ffc | Oracle XML DB
© Leonidas Fegaras
University of Texas at Arlington
Oracle XML DB
- Native support for storage and processing of XML documents
- Using XMLType
- Unstructured CLOBs
- Structured table objects derived from XML Schema
- Access to XML data from SQL
- Special XML indexing
- Supports most W3C standar... | 692 |
07c84d7187ea0ee7263f84237bba4fc1dacf7022 | SUBRECURSIVE PROGRAMMING LANGUAGES II
On Program Size
Robert L Constable
Cornell University
71 - 96
Technical Report
Robert L Constable
Department of Computer Science
Cornell University
Ithaca, New York 14850
March, 1971
ABSTRACT
§ Introduction ................................................. 1
§ 2 Programming ... | 15,934 |
9462c6073821647caaa8ffc0b25afbcea5abd77f | CONTENTS
Part I - Introduction
Chapter 1. Overview ................................................................................................................. 1
1.1 Product Components ................................................................................................. 1
1.2 Software Requirements ... | 231,936 |
b39757c40e362ef697b130b453fb4966fe60657d | BETA CAE Systems is pleased to announce the 7th BEFORE REALITY CONFERENCE. Over the past 12 years, our conference has become a premium gathering for the CAE Professionals owing its success to the contributors, the participants, and the CAE community that has embraced the event. We are, once again, delighted to invite y... | 1,688 |
267623e7942b580e371394cd819ff47464bc4a5f | ## Contents
### I Kivy Project
1 Philosophy 5
2 Contributing 7
3 FAQ 23
4 Contact Us 29
### II Programming Guide
5 Kivy Basics 33
6 Controlling the environment 39
7 Configure Kivy 43
8 Architectural Overview 45
9 Events and Properties 51
10 Input management 61
11 Widgets 69
12 Graphics 89
13 Kv language 93
14 Integra... | 315,142 |
79d30acd118c6b5aabe3f6688a2e5e4a554dfb7b | Conjectures, Tests and Proofs: An Overview of Theory Exploration
Moa Johansson and Nicholas Smallbone
Chalmers University of Technology, Gothenburg, Sweden
moa.johansson@chalmers.se, nicsma@chalmers.se
A key component of mathematical reasoning is the ability to formulate interesting conjectures about a problem domain... | 11,158 |
39488ab507069dc443d217bad7c509a4c115aab5 | Agenda for today
Review definition of *implements* as subset of traces, with cache example
Too much spec state → history variables, with StatDB example
Abstraction relations ↔ history variables
Premature choice → prophecy variables
Correctness
Definition: External code traces \( \subseteq \) external spec traces
... | 4,848 |
c254b06534c9223c55d8d3610ac1f3705a95f256 | OpenID + FAPI
Introduction
2021-05-17
OpenID Foundation FAPI WG:
OpenID Foundation
Specialized in the standardization of internet identity layer and API access management.
OpenID Foundation Members
Members spread over 36 countries.
OpenID Standards are used everywhere
Sign in with Apple, Google Sign-in, Microsoft ... | 1,417 |
c1ca71fc2524029e78c1192765f3ea083d09670a | Composing, installing, and managing RHEL for Edge images
Composing, installing, and managing RHEL for Edge Images on Red Hat Enterprise Linux 9
Composing, installing, and managing RHEL for Edge Images on Red Hat Enterprise Linux 9
Legal Notice
Copyright © 2022 Red Hat, Inc.
The text of and illustrations in this docu... | 32,754 |
5974923781d5e9ec3b61eedc87ac04a1217f2db6 | Automated Verification of Infinite-State Systems with Certifiable Algorithms
Abstract:
In formal verification, one uses mathematical tools in order to prove that a system satisfies a given specification.
In this talk I consider three limitations of traditional formal verification:
1. The first is the fact that trea... | 177 |
88eb15a1ef5f6e4db3314d837024dcbcbc35f985 | HDL basic training: top-down chip design using Verilog and VHDL
Douglas J Smith, VeriBest
Increasingly complex ASIC and FPGA chips require you to shift from schematic-based design to design based on Verilog or VHDL. Understanding the basics of these languages and how you use them for designing ASICs and FPGAs will he... | 3,929 |
4199ad4b1e0e8a4511ed8e0120cee7c0e75e7229 | A Metaobject Protocol for Optimizing Application-Specific Run-Time Variability
Position Paper
Guido Chari
UBA, FCEN, Departamento de Computación, ICC-CONICET, Argentina
gchari@dc.uba.ar
Diego Garbervetsky
UBA, FCEN, Departamento de Computación, ICC-CONICET, Argentina
diegog@dc.uba.ar
Stefan Marr
Johannes Kepler Uni... | 5,382 |
9a829cc0b28d99a48e8a3a4093a3a7dfe8be3e48 | Flexible and Fast IP Lookup Algorithm
Wooguil Pak
Secni.com Corporation
Yeoksam-dong, Kangnam-gu
Seoul, Korea 135-080
TEL:+82-2-3458-1972
FAX:+82-2-3458-1999
wgpak@secni.com
Saewoong Bahk
School of Electrical Engineering
Seoul National University
Seoul, Korea 151-742
TEL:+82-2-880-8434
FAX:+82-2-880-8198
ssbahk@netla... | 4,317 |
2bcdf89d833058fa93729626493b82137db2a843 | 5-2010
An Exploratory Study on Issues and Challenges of Agile Software Development with Scrum
Juyun Joey Cho
Utah State University
Follow this and additional works at: https://digitalcommons.usu.edu/etd
Part of the Computer Sciences Commons
Recommended Citation
https://digitalcommons.usu.edu/etd/599
AN EXPLORATO... | 72,259 |
1d63bffd347d1d5a33228d78f0b3e73b734be667 | Deadline
Due by the end of lab today. (Submit whatever you have by the end of lab, even if incomplete.)
How to submit
Submit your files for this lab using ~st10/328submit on nrs-labs, with a homework number of 86.
Requirements
• You are required to work in pairs for this lab exercise.
• Make sure BOTH of your names a... | 1,029 |
f19b98612cfbb6a43e627ecec06dec275f9c4cb2 | When Testing Meets Code Review
Why and How Developers Review Tests
Spadini, Davide; Aniche, Maurício; Storey, Margaret-Anne; Bruntink, Magiel; Bacchelli, Alberto
DOI
10.1145/3180155.3180192
Publication date
2018
Document Version
Peer reviewed version
Published in
Proceedings of the 40th International Conference on ... | 13,674 |
a393102967fea19d8514ff012b664e20f147cbdb | Agile Methods Selection Model: A Grounded Theory Study
Mashal Kasem Alqudah¹, Rozilawati Razali², Musab Kasim Alqudah³
Research Center for Software Technology and Management, FTSM
University Kebangsaan Malaysia Bangi, Selangor, Malaysia¹²
Department of Computer Sciences, College of Computer Sciences and Engineering-Ya... | 9,818 |
2f35a26723ca6088e2b66e01589c44213d2d96c5 | Lab 6
Each lab will begin with a brief demonstration by the TAs for the core concepts examined in this lab. As such, this document will not serve to tell you everything the TAs will in the demo. It is highly encouraged that you ask questions and take notes.
In order to get credit for the lab, you need to be checked o... | 1,348 |
d8fb273946fcec234e079e7e1a0b31755fbca7a3 | Author Guidelines for Software Submissions
Content
- Mission and Scope of Software Submissions
- Types of Software Submissions
- Requirements for Software Submissions
- Preparing your Software submission
- Reviewing and selection criteria
- Sample Research Object
Mission and Scope of Software Submissions
Aperture r... | 3,151 |
a13bb97c777b16a57a9918c5cea74a4679b1d8c8 | Package ‘BigVAR’
March 22, 2022
Type Package
Title Dimension Reduction Methods for Multivariate Time Series
Version 1.1.0
Maintainer Will Nicholson <wbn8@cornell.edu>
Date 2022-03-15
Depends R (>= 3.5.0), methods, lattice
Imports MASS, zoo, Rcpp, stats, utils, grDevices, graphics, abind
License GPL (>= 2)
Lazy... | 7,558 |
6a1edd701b70b1586a6a1dda62647ea1b663de3c | Package ‘affy’
May 29, 2024
Version 1.82.0
Title Methods for Affymetrix Oligonucleotide Arrays
Author Rafael A. Irizarry <rafa@ds.dfci.harvard.edu>, Laurent Gautier
<lgautier@gmail.com>, Benjamin Milo Bolstad
<bmb@bmbolstad.com>, and Crispin Miller
<cmiller@picr.man.ac.uk> with contributions from Magnus
Astrand <Ma... | 23,896 |