id
stringlengths
40
40
text
stringlengths
0
36.9M
n_tokens
int64
1
7.72M
9feef32cb86b011964f66a5428f55cd79bd456e9
IX.6.2-SYSTEM EXTENDED STREAMFLOW PREDICTION (ESP) SYSTEM SUBROUTINE DESCRIPTIONS This Section describes system level Extended Streamflow Prediction (ESP) routines. The following information is included for each subroutine: - Description - Calling sequence - Argument list - Argument name - Input or Output - Type ...
120
c7e3a82c8d19368883a56aaa5cd7d7a35846bb0f
Automated Reasoning for Web Page Layout Pavel Panchekha A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Washington 2019 Reading Committee: Zachary Tatlock, Chair Michael D. Ernst, Chair Shoaib Kamil Program Authorized to Offer Degree: Compu...
57,488
424abd75f86f0bcedd38ad2fd6611a6fa1d5df93
As I've done in the previous lectures, let me set the stage for what we've been doing, so we can use that to talk about what we're going to do today. So far, we have the following in our language. Right, we have assignment. We have conditionals. We have input/output. And we have looping constructs. These are things li...
11,377
818a2303ea8bb5a336d99981e3ccb750b492ab3f
TESTING AND INTEGRATION Chris Riesbeck Electrical Engineering and Computer Science Learning Sciences Northwestern University READINGS - These slides - **The Agile Samurai**: Chapters 12, 14, 15 - [http://dannorth.net/introducing-bdd/](http://dannorth.net/introducing-bdd/) - [http://martinfowler.com/articles/mocksAren...
4,549
eb9531962af6af89a623b30e2957feeef3af1946
NAG C Library Function Document nag_mesh2d_renum (d06ccc) 1 Purpose nag_mesh2d_renum (d06ccc) renumbers the vertices of a given mesh using a Gibbs method, in order to reduce the bandwidth of Finite Element matrices associated with that mesh. 2 Specification ```c void nag_mesh2d_renum (Integer nv, Integer nelt, Int...
4,465
fbf89efe08702fd79050dee476633481d2274b97
Top-down parsing Last time CYK - Step 1: get a grammar in Chomsky Normal Form - Step 2: Build all possible parse trees bottom-up - Start with runs of 1 terminal - Connect 1-terminal runs into 2-terminal runs - Connect 1- and 2- terminal runs into 3-terminal runs - Connect 1- and 3- or 2- and 2- terminal runs ...
1,865
0adfed8ebc5f3bd6cd16fa7815e0f981fa665326
Optimal Speedup on a Low-Degree Multi-Core Parallel Architecture (LoPRAM) Reza Dorrigiv, Alejandro López-Ortiz, Alejandro Salinger David R. Cheriton School of Computer Science, University of Waterloo Over the last five years, microprocessor manufacturers have released plans for a rapidly increasing number of cores pe...
1,885
69d596dd49921147aea9de612b6d03f93572471b
Visual Basic - Arrays An array is a named collection of variables of the same data type. Each element of the array is labelled by one or more indices, e.g. ``` candNames(1) = "Smith" candNames(2) = "Patel" candNames(3) = "Oddbins" ``` Arrays allow you to group related variables and to manipulate them all at once whi...
1,149
14c489f6a9b9c2bf7f5e7f9693784ba6de82d1e3
Key Concepts Interactors! Main Idea: Let user interact with application by giving them choices What does it look like in code? /* JButton constructor takes String to display on button */ JButton button = new JButton("Add"); add(button, NORTH); // Add to top of screen // JTextField constructor takes length of text JTe...
2,210
0d4557311cfa196d44c05a58505b57fc16550baa
Proxy Sniffer V4.5 Release Notes English Edition # Table of Contents 1 V4.5 Release Notes ........................................................................................................... 5 1.1 New Functions and Features .........................................................................................
23,476
e335c8ec2f98681b68c903818bd138b0330fbf80
EE 1301: Introduction to Computing Systems IoT Laboratory #3 Flying (not so) High in the Cloud Created by: David Orser, Kia Bazargan, and John Sartori Many thanks to the students, teaching assistants, and faculty that work to continually improve this document. Together we make better labs! Please send comments and...
7,127
8072736bb8eb4aa83c3aea997ac7bc6f5d14b437
<table> <thead> <tr> <th>NUMBER</th> <th>DATE</th> <th>DESCRIPTION</th> <th>NAME</th> </tr> </thead> <tbody> <tr> <td></td> <td></td> <td></td> <td></td> </tr> </tbody> </table> Contents 1 Preparing for GHI Install .......................................................... 1 1.1 Prerequisites .........................
15,479
5e18b79c876dd873bb35885ce8ef8b40cce0896b
Infosys TFINCTAPLIXM2001 Exam Volume: 155 Questions Question No : 1 Which among the following statements is/are true about Business Process Management? A. BPM is systematic way of defining, automating, analyzing and improving business processes within and across enterprise B. BPM does not encompass management pract...
1,011
8a9c7b048a364e1ac5e45478c0d1392352b381d8
WIN: A Persistent Window Management System Q I Cutts*, A Dearle*, G N C Kirby* and C D Marlin† *University of St Andrews, North Haugh, St Andrews, Scotland KY16 9SS. †University of Adelaide, GPO Box 498, Adelaide, South Australia 5001, Australia. Abstract WIN is a persistent window management system written in Napi...
10,099
a207435dafbaab84659744dd6e8f9b7f24e9e58b
Overview - System architecture - Rendering performance - GPU architecture - Unified shader - Memory Export - Texture/Vertex Fetch - HDR rendering - Displaced subdivision surfaces System architecture CPU 2x 10.8 GB/s 2x PCIE 500MB/s GDDR3 UNIFIED MEMORY 32GB/s 700MHz 128bit GPU Northbridge 22.4GB/s 2x 10...
921
a13764aaf4dc29876de43904f258a6902308ad48
Horizontal axis: Time (cycles) to generate a public key (crypto_kem_keypair). Vertical axis: Space (bytes) for a public key (crypto_kem_PUBLICKEYBYTES). *C:* means that the SUPERCOP database does not list IND-CCA2 security as a goal for this primitive. *C:* means that the SUPERCOP database does not list constant tim...
85
e6e20018436c73bfe4bdac1ad102e5f804100add
Abstract In this paper, our android application aims at helping visually challenged people who want to use the android based smart phones. The GUI of the application is designed such a way that anywhere they touch on the android smart phone; they can do the task they want to. The application inputs would adjust themse...
206
2d84d83769dd3dec962fbf76b766d017316aaeb7
Electromechanical Transient Simulator of Electric Power System Based on Object-oriented Design Patterns Yanwei Xiao¹, Juan Wu² and Bingquan Zhu¹ ABSTRACT Studying the electromechanical transient of electric power system is very necessary for dispatchers to understand the electromechanical transient process and remov...
2,311
2fac80a86da4c21d9f8526d130f51d97a412399f
Audio/Video Transport Working Group Colin Perkins Tom Taylor Roni Even http://www.ietf.org/html.charters/avt-charter.html Agenda - Thursday 15:10 DTLS-SRTP status (Chairs) 15:15 DTLS-SRTP Key Transport (Wing) 15:30 Why SRTP not mandatory - Security consideration (Westerlund) 15:40 Guidelines for Extending RTC...
518
38cf1210766bcec688084e75ddb0b166922d4bd8
Side Talk: Implementation of The Linked List Yufei Tao Department of Computer Science and Engineering Chinese University of Hong Kong In this side talk, we discuss one possible way of implementing the linked list. We will strive not to constrain our description to any particular programming languages. For this reaso...
484
2eb96ab970731c1cb7ac1fd4f566882c133611d1
Modular Transformations of CLP Programs. Sandro Etalle\textsuperscript{1,2}, Maurizio Gabbrielli\textsuperscript{1} \textsuperscript{1}CWI P.O. Box 94079, 1090 GB Amsterdam, The Netherlands. \textsuperscript{2}Dipartimento di Matematica Pura ed Applicata, Università di Padova, Via Belzoni 7, 35131 Padova, Italy. email:...
21,573
f5f8343746e49f9304f7fc47f0544e4b080080e1
Computer Reliability Introduction • Computer systems are sometimes unreliable – Erroneous information in databases – Misinterpretation of database information – Malfunction of embedded systems • Effects of computer errors – Inconvenience – Bad business decisions – Fatalities Data-Entry or Data-Retrieval ...
2,242
c7baee72751ed2832b0d245c67e1ffcd00437494
Tutorial – Chapter 7 1) Use the LTSA to obtain an action trace that violates the following safety property: property PS = (a -> (b-> PS | a -> PS) | b -> a -> PS). Can you think of a different trace that also violates the property? 2) A lift has a maximum capacity of ten people. In the model of the lift control sys...
334
f2f9eba0c58e294d61eb2d7a0500787e45fd2fec
GUROBI OPTIMIZATION, LLC END-USER LICENSE AGREEMENT ("Agreement") Please read the terms and conditions of this license agreement carefully. By installing and enabling the Product(s) you are accepting the terms of this agreement. (The Product(s) will be enabled when you have installed the License Key(s) that is supplie...
9,730
5b7c142479b66380952d893ceba0a2b132c5fc70
Abstract Multimedia presentation has been popular by used in the field of education, especially in online learning. The most common practice is to conduct a presentation by utilizing media player on web or native applications. However, this mode of operation belongs to a heavyweight practice which incurs poor performa...
235
b92a0f0ff638b5c9dc521762bc132920b246d0a2
tsline — Plot time-series data Syntax Time-series line plot [ twoway ] tsline varlist [ if ] [ in ] [ , tsline_options ] Time-series range plot with lines [ twoway ] tsrline y1 y2 [ if ] [ in ] [ , tsrline_options ] where the time variable is assumed set by tsset (see [TS] tsset), varlist has the interpretation $...
1,333
74dab2794ae0155269bf3ab269a53eac91b336d0
Optimized Resource Access Control in Shared Sensor Networks Christophe Huygens, Nelson Matthys and Wouter Joosen christophe.huygens@cs.kuleuven.be Mobisec 2010 Quick overview - Intro - Problem domain: long-lived WSN settings - Problem analysis - Contribution - Results and Q&A Monolithic – security problem Real-worl...
1,125
6b062810b85eebf26654ce9c2c3270117b0c4c79
Welcome to the SCITAS documentation space! This is the home page for SCITAS public documentation and How-To articles. You can browse this space using the page tree on the left, search it, or start at the most popular topics just below. Where to start - Connecting to the clusters - First steps on the clusters - FAQ -...
248
34dfeacfdb9f8f17ac264b44c3f6224f9a3a608c
We are given a CBit module shown here. This module takes corresponding bits of two unsigned binary numbers, A and B, along with two Cin bits from higher-order CBit modules. Its output bit R, is the appropriate bit of the larger among A and B. It also has two additional output bits Cout which indicate respectively if...
1,405
af3b9baaeb16fd62b177fb87d040620e571e9923
A Metamodel for Component-Based Service Modeling Michael Becker, University of Leipzig, Leipzig, Germany Stephan Klingner, University of Leipzig, Leipzig, Germany ABSTRACT Due to industrialization of services, organizations need to establish new approaches for tackling challenges like increased competition, complexi...
1,226
86b0497777c4945b5c51a7d9f32700cfc089d35c
SPRING 2017: COT 5407 Intro. to Algorithms [Homework 1; Due Jan 19 at start of class] General submission guidelines and policies: Add the following signed statement. Without this statement, your homework will not be graded. I have adhered to the collaboration policy for this class. In other words, everything written ...
466
20162e8b4143972f27c3d737c7f31d8f491602d6
A Seminar report On Poka-Yoke Submitted in partial fulfillment of the requirement for the award of degree of Electronics Acknowledgement I would like to thank respected Mr.…….. and Mr. …….. for giving me such a wonderful opportunity to expand my knowledge for my own branch and giving me guidelines to present a semina...
3,488
ed4479f5e4b60a0f98f10fa425b934820d615031
PSTricks is distributed with a much more general loop macro, called \multido. You must input the file multido.tex or multido.sty. See the documentation multido.doc for details. Here is a sample of what you can do: ``` \begin{pspicture}(-3.4,-3.4)(3.4,3.4) \newgray{mygray}{0} % Initialize 'mygray' for benefit \...
10,329
aa4a3dfde07a337cad56424ba7e25bd85aa4dc28
Model driven security for process-oriented systems Conference Paper Author(s): Basin, David A.; Doser, Jürgen; Lodderstedt, Torsten Publication date: 2012 Permanent link: https://doi.org/10.3929/ethz-a-007329377 Rights / license: In Copyright - Non-Commercial Use Permitted Model Driven Security for Process-Oriente...
7,711
7598644c13c4af457cc2e701ed6053cd6073c511
ChapelCon 2024: State of the Chapel Project Brad Chamberlain June 7, 2024 What is Chapel? **Chapel:** A modern parallel programming language - Portable & scalable - Open-source & collaborative **Goals:** - Support general parallel programming - Make parallel programming at scale far more productive Chapel 2.0 **Chap...
8,906
35ae2a4f823d4a09f5133f97b8b95310a951a6af
ControVol: A Framework for Controlled Schema Evolution in NoSQL Application Development Stefanie Scherzinger, Thomas Cerqueus, Eduardo Cunha de Almeida To cite this version: Stefanie Scherzinger, Thomas Cerqueus, Eduardo Cunha de Almeida. ControVol: A Framework for Controlled Schema Evolution in NoSQL Application Deve...
3,904
48f775756052496d575e8eada6d2bb9179a1a352
Abstract interpretation for the heap Computer Science and Artificial Intelligence Laboratory MIT Nov 18, 2011 Consider the following program ```c struct Node{ int v; Node * nxt; } void foo(){ head = new Node(); n = head; i=0; while(i<10){ n->nxt = new Node(); n = n->nxt; ...
1,957
81fedeece49e88e49b22cff82c5c889e33bb3495
MySQL NDB Cluster 7.5, MySQL NDB Cluster 7.6 Abstract This is the MySQL NDB Cluster 7.5 and MySQL NDB Cluster 7.6 extract from the MySQL 8.0 Reference Manual. For legal information, see the Legal Notices. For help with using MySQL, please visit the MySQL Forums, where you can discuss your issues with other MySQL use...
435,318
e481e1de90bc16fd445fd56310460ec9cb5b3d21
CS4491-02 Fog Computing IoT Architecture Guiding questions • What are relevant architecture concerns for IoT systems? • What are different architectural options? • What are typical architecture styles? • What is (software, system) architecture anyway, and can we make sure we understand what is meant with all these...
4,390
300c63bc1990df2015c80fbd9fad8c811a218e27
PyCantonese: Cantonese Linguistics and NLP in Python Jackson L. Lee, Litong Chen¹, Charles Lam², Chaak Ming Lau³, Tsz-Him Tsui ¹Wheaton College, ²Hang Seng University of Hong Kong, ³Education University of Hong Kong Abstract This paper introduces PyCantonese, an open-source Python library for Cantonese linguistics a...
3,316
11917b330becabb819773132d77f2fbaf980ac24
Disclaimer - The information in this presentation represents a snapshot of work in progress within the DMTF. - This information is subject to change without notice. The standard specifications remain the normative reference for all information. - For additional information, see the Distributed Management Task Force (D...
500
39fba52df7d436a4b3b4b0d1ab057e63f19155cd
Particle Systems according to Reeves Particle Systems - An object is represented as a cloud of particles that defines its volume. - They are not static, the particle system evolves. - Non-deterministic. Properties of Particle Systems - Particles are simple (computationally efficient) - Procedural - LOD is easy. - Go...
2,103
2d56893ae5f8c41c494f0bf7329683b368aafc12
Abstract In a restaurant recommender system the main focus is on the user rating or perhaps the customer satisfaction that is significant of all. The contextual features are closely studied which aids as the precipitate for the study. In order to identify relevant contextual information for the study, only those cardi...
247
dba36b5ce0f798cb9f1db899b95341c33dc3f3d5
MySQL NDB Cluster 8.0 Release Notes Abstract This document contains release notes for the changes in each release of MySQL NDB Cluster that uses version 8.0 of the NDB (NDBCLUSTER) storage engine. Each NDB Cluster 8.0 release is based on a mainline MySQL Server release and a particular version of the NDB storage eng...
156,028
e842644949c3c3331be9bd3593662098412f95a7
DCAT Meeting August 2018 Date & Time - August 14th 15:00 UTC/GMT - 11:00 EDT Zoom meeting: We will be using the DSpace Zoom Meeting Room for our meeting. Meeting location: https://duraspace.zoom.us/my/dspace Enter Meeting ID: 502 527 3040, followed by # Zoom information: DSpace Meeting Room Agenda: - Community...
781
2892532070cc194fa3532948e160f7f1c7631fcd
## Description r4050 If I try to create a new bug and use the "Create and continue" button, the bug is actually created, but routing is incorrect (returning me to /issue/new?issue[tracker_id]=(int value here)). To "fix", either move ```ruby map.resources :issues, :member => { :edit => :post }, :collection => {} afte...
782
07f389f20d9e29d60ae7c108381a2a9fe21cb9b0
Plain English: Risks of Java Applets and Microsoft ActiveX Controls Jennifer Marek PLAIN ENGLISH: RISKS OF JAVA APPLETS AND MICROSOFT ACTIVEX CONTROLS JENNIFER M. MAREK GIAC SECURITY ESSENTIALS CERTIFICATION (VER 1.3) 4 MARCH 2002 EXECUTIVE SUMMARY Although the technologies change, the same old issues seem to stay ...
5,817
901e94cfc64b7837150959c7a00b502d711cefd0
Visual Information Solutions IDL Discover What’s In Your Data. IDL is the trusted scientific programming language used across disciplines to create meaningful visualizations out of complex numerical data. From small scale analysis programs to widely deployed applications, IDL provides the comprehensive computing envir...
1,837
6567dead5e37b8ef6adbadd9580094b462f20b85
Instructions: You have eighty minutes to complete this open-book, open-note, closed-interpreter exam. Please write all answers in the provided space, plus the back of the exam if necessary. Note on actual exam: The exam may refer to the env.rkt, lambda.rkt, and store-with.rkt interpreters. If you need the interpreters...
1,620
051770ead4312cf03a86c77228cb4360ab9b9a78
Programming In PROLOG Using The Iso Standard, 5TH EDITION DOWNLOAD EBOOK Synopsis Book Information Paperback Publisher: Springer; 5th edition (July 25, 2002) ASIN: B0042NJZWA Average Customer Review: Be the first to review this item Best Sellers Rank: #2,437,496 in Books (See Top 100 in Books) #19 in Books > Compu...
114
a39382f9c9b5799f2001b366c0304978c00a8c6a
Exception Examples: **ArrayIndexOutOfBoundsException example:** class Example { public static void main(String args[]) { int arr[] = {1,2,3,4,5}; System.out.println(arr[7]); } } *Note:* array has only 5 elements but we are trying to display the value of 8th element. It will throw **ArrayIn...
634
e56743b2885e28f157331140fb73966053e5467d
4 They Delved Too Greedily and Too Deep There’s a new Lord of the Rings show out, have you watched it? It may not surprise you to learn that I started the first episode the day I wrote this problem. You and your party of dwarves are exploring a new mountain to share. You find a complex cave system, with many walled o...
607
789331e71b91cca2afd952f2e16a10ccb720c3d0
STATS 507 Data Analysis in Python Lecture 16: UNIX/Linux command line UNIX/Linux: a (very) brief history 1960s: Multics (Bell Labs, MIT, GE), a time-sharing operating system 1970s: UNIX developed at Bell Labs 1990s: GNU/Linux emerges 2000s: MacOS developed based on UNIX The Unix philosophy: do one thing well 1....
3,799
dfbf462adfad96d4470d1fac43577057e467b3c7
Hidden Surface Removal/ visual surface Detection When you draw a scene composed of three-dimensional objects, some of them might obscure all or parts of others. Changing your viewpoint can change the obscuring relationship. For example, if you view the scene from the opposite direction, any object that was previously ...
4,558
fc7f16668af48ce8c35991c4eb88d26239796785
Mandriva Community Case Study First Prototype of A Social Semantic Help Desk Deliverable D11.2 Version 1.0 15.10.2007 Dissemination level: PU Nature: P Due date: 30.09.2007 Lead contractor: EDGE-IT S.A.R.L Start date of project: 01.01.2006 Duration: 36 months Authors David Barth, EDGE-IT S.A.R.L Arnaud Laprévote, E...
12,891
9c222e80e3bf9ad40903c18350e935f112abf3fd
Postman Pro is the contract between operations and engineering at Coursera Coursera is an education platform that pioneered the concept of MOOCs (massive open online courses) in early 2012 with the mission to provide universal access to the world’s best education. Massive proliferation of APIs Coursera’s education p...
534
7dfa2ab2ff164a5ef93efed01d8456ab8202b63c
Mass Virtual Hosting with Apache 2.0 Paul Querna chip@OutOfOrder.cc Virtual Hosts - IP Address - Required for HTTPS - The 'Host' Header - Mass Virtual Hosting? - HTTPD's Default configuration doesn't deal well with thousands of Virtual Hosts! Considerations - **Security** - Suexec? - PHP? - Perchild? - R...
1,025
d09aab95046b1ee0e89d73634101ab5804cb0bbb
# Management and Strategy <table> <thead> <tr> <th>Section</th> <th>Title</th> <th>Page</th> </tr> </thead> <tbody> <tr> <td>16.0</td> <td>INTRODUCTION</td> <td>540</td> </tr> <tr> <td>16.1</td> <td>ORGANIZATIONAL MATURITY</td> <td>542</td> </tr> <tr> <td>16.2</td> <td>BUSINESS OBJECTIVES</td> <td>554</td> </tr> <tr> ...
11,571
da4335ef81efbfd98ce4288264fcd9740d96753e
RP-DeLP: A weighted defeasible argumentation framework based on a recursive semantics <table> <thead> <tr> <th>Títol</th> <th>RP-DeLP: A weighted defeasible argumentation framework based on a recursive semantics</th> </tr> </thead> <tbody> <tr> <td>Publication Type</td> <td>Journal Article</td> </tr> <tr> <td>Year of ...
625
c75ed74f43e0bf64d6602f4639560f4871823027
Should Ruby core implement String#blank? 04/03/2013 09:32 AM - sam.saffron (Sam Saffron) Status: Open Priority: Normal Assignee: Target version: Description There has been some discussion about porting the #blank? protocol over to Ruby in the past that has been rejected by Matz. This proposal is only about String h...
3,478
34ec16fc0eb6cf68bdd09a51c5dff9350525b238
Problem 1: Strings, Arrays, and Disguised Algorithms a) Suppose the `perplexity` function is defined as follows: ```javascript function perplexity(array) { let befuddled = array[0]; let baffled = [befuddled]; for (let i = 1; i < array.length; i++) { befuddled = Math.max(array[i], befuddled + array...
2,090
ef9c10e80172972e2cd8a642c589b4c97228a9d1
Interaction with mobile devices and embedded systems has become a part of everyday life. As these devices and systems get more sophisticated and increasingly interconnected, the creation of usable interactive software poses many new challenges. In facing these challenges, emerging user interface paradigms offer potenti...
676
704e6eb5b89b553edfc55dd56c61d7ab6c1a013d
Jakarta Struts Course Summary Description Struts is an open source, Model-View-Controller (MVC) framework developed by The Apache Software Foundation as part of its Jakarta project. Struts is built on top of JSP, Servlets, and custom tag libraries. After reading the first J2EE Blueprints from Sun with their explana...
1,243
48917cd3a8049abff187f221c9db79ff823215e4
GSI Online Credential Retrieval Requirements Jim Basney jbasney@ncsa.uiuc.edu http://www.ncsa.uiuc.edu/~jbasney/ Online Credential Retrieval Defined Client Authenticate Request Credential Server Verify Authorization Retrieve Credential Motivation for OCR • **Credential management** – Securely manage credentia...
860
05364ec13a27534720dd45eea4c9345e1f2bc5d4
# Contents 1 The Glasgow Haskell Compiler License ................................................................. 3 2 Introduction to GHC ................................................................................................. 5 2.1 Obtaining GHC ............................................................
338,137
d6fdd8b751677f8c9f2d5edabf4f70b8440f04f3
M.E.T.U Computer Engineering Department CENG 492 TEAM BABYLON: M. Tuğberk İŞYAPAR - 1502996 Arif S. ÖZÇELİK - 1428044 Okan T. TURSUN - 1445550 Ö. Aml TÜRKKAN - 1449750 ASİSTANT: Fatih Gökçe CONTENTS Introduction .........................................................................................................
1,737
46ceec06b4ba43402d5893cfc4a93d1b7cd95307
Static Analysis with Demand-Driven Value Refinement BENNO STEIN, University of Colorado Boulder, USA BENJAMIN BARSLEV NIELSEN, Aarhus University, Denmark BOR-YUH EVAN CHANG, University of Colorado Boulder, USA ANDERS MØLLER, Aarhus University, Denmark Static analysis tools for JavaScript must strike a delicate balanc...
27,763
0d90e9f63d979ac80b127ab636d140aca04d51fb
Making components contract aware Antoine Beugnard, Jean-Marc Jézéquel, Noël Plouzeau, Damien Watkins To cite this version: HAL Id: hal-01794333 https://hal-imt-atlantique.archives-ouvertes.fr/hal-01794333 Submitted on 30 Aug 2019 HAL is a multi-disciplinary open access archive for the deposit and dissemination of sc...
4,846
c4c9e0f6f56b977e8551f3bed995cfc270a7746b
HAPPY INNERSOURCE DAY! WHERE WE CAME FROM InnerSource is Apache Inside Brazil submits a pull request to Core Core sits on it ... It's eventually re-written What was learned? Trusted Committers - Leads - Trusted Committers - Contributors - Users Code Mentorship Rewards Patch gets merged But what about the TC? Refactori...
370
6552c60ed85dd369740bf7371bc1783f50e4e441
HTTP/QUIC Cross-Pollination HTTP/QUIC Charter QUIC WG is chartered to ...describe mappings between... HTTP/2 semantics using QUIC, specifically with the goal of minimizing web latency using QUIC. This mapping will accommodate the extension mechanisms defined in the HTTP/2 specification. Along the way, HTTP/QUIC has:...
623
0a46fcfbee655af79fcd8175ff9b3f459e236179
Reinforcement Learning COMP3431 Robot Software Architectures A Simple Learning Robot Reinforcement Learning • “Stumpy” receives a \textit{reward} after each action • Did it move forward or not? • After each move, updates its \textit{policy} • Continues trying to maximise its reward Pole Balancing - Pole balanc...
1,330
d99492dad1045e7e9b06fc2376b48669a974be60
Package ‘TT’ October 12, 2022 Title Display Tree Structured Data using Datatable Widget (DT) Version 0.98 Description Wrapper of datatable widget, allowing display of data.tree objects. All arguments of the data.tree become columns and each node is a row. Adds column with buttons allowing folding and unfoldin...
1,800
b452013aff874373590c538ab0f1f5b6d9bdf8da
AUTOMATIC CONVERSION TOOL FOR ACCESSIBLE WEB Juan Manuel Fernández, Vicenç Soler Dept. Microeletrònica i Sistemes Electrònics, Universitat Autònoma de Barcelona, Cerdanyola del Vallès, Spain Jordi Roig Dept. Microeletrònica i Sistemes Electrònics, Universitat Autònoma de Barccelona, Cerdanyola del Vallès, Spain Keyw...
3,176
749a15828b07ba2aaa00a72bbc2faf908a44b7cf
Introducing a Stream Processing Framework for Assessing Parallel Programming Interfaces This is a pre print version of the following article: Original Citation: Availability: This version is available http://hdl.handle.net/2318/1949991 since 2024-01-02T02:12:10Z Publisher: Institute of Electrical and Electronics En...
4,050
3aabbefeb0bf2ec779981b82109d506b6b0e1935
Abstract This specification documents an extension to the Diameter Overload Indication Conveyance (DOIC) base solution, which is defined in RFC 7683. This extension adds a new overload-control abatement algorithm. This abatement algorithm allows for a DOIC reporting node to specify a maximum rate at which a DOIC react...
7,313
26f2dfee87ff306f7a966a60fd2a150f2e7757b6
ARMv8-A Foundation Platform User Guide Copyright © 2012–2017 ARM Limited or its affiliates. All rights reserved. Release Information <table> <thead> <tr> <th>Issue</th> <th>Date</th> <th>Confidentiality</th> <th>Change</th> </tr> </thead> <tbody> <tr> <td>A</td> <td>10 October 2012</td> <td>Non-Confidential</td> <t...
14,256
0e0aa2dbe97d8c11d3aa06e7071050f32a535c8d
Activity Report 2019 Project-Team STAMP Safety Techniques based on Formalized Mathematical Proofs RESEARCH CENTER Sophia Antipolis - Méditerranée THEME Proofs and Verification Table of contents 1. Team, Visitors, External Collaborators .................................................... 1 2. Overall Objectives .....
13,325
18ba241a5be35684b6cd4a5dea8a424e299db79d
A method for probabilistic record linkage includes providing a record pair comprising a plurality of fields, providing a plurality of scenarios, each scenario relating to a distribution of patterns among a plurality of attribute statuses, and comparing the record pair to determine a record difference. The method includ...
5,509
a535b5caa2f0a02ddacef22810daf2ff52657450
Directions: You may collaborate but write up solutions yourself. No late HW. 1. **Converting a bridge into a monitor**: Alyssa P. Hacker is working for DEC and has learnt of the spiffy bridge invented at DEC. Alyssa decides to convert the bridge into a LAN traffic monitor that will passively listen to a LAN and produc...
1,042
a8d00e6242b5e5339dce41a64ff380ee81773ffc
Oracle XML DB © Leonidas Fegaras University of Texas at Arlington Oracle XML DB - Native support for storage and processing of XML documents - Using XMLType - Unstructured CLOBs - Structured table objects derived from XML Schema - Access to XML data from SQL - Special XML indexing - Supports most W3C standar...
692
07c84d7187ea0ee7263f84237bba4fc1dacf7022
SUBRECURSIVE PROGRAMMING LANGUAGES II On Program Size Robert L Constable Cornell University 71 - 96 Technical Report Robert L Constable Department of Computer Science Cornell University Ithaca, New York 14850 March, 1971 ABSTRACT § Introduction ................................................. 1 § 2 Programming ...
15,934
9462c6073821647caaa8ffc0b25afbcea5abd77f
CONTENTS Part I - Introduction Chapter 1. Overview ................................................................................................................. 1 1.1 Product Components ................................................................................................. 1 1.2 Software Requirements ...
231,936
b39757c40e362ef697b130b453fb4966fe60657d
BETA CAE Systems is pleased to announce the 7th BEFORE REALITY CONFERENCE. Over the past 12 years, our conference has become a premium gathering for the CAE Professionals owing its success to the contributors, the participants, and the CAE community that has embraced the event. We are, once again, delighted to invite y...
1,688
267623e7942b580e371394cd819ff47464bc4a5f
## Contents ### I Kivy Project 1 Philosophy 5 2 Contributing 7 3 FAQ 23 4 Contact Us 29 ### II Programming Guide 5 Kivy Basics 33 6 Controlling the environment 39 7 Configure Kivy 43 8 Architectural Overview 45 9 Events and Properties 51 10 Input management 61 11 Widgets 69 12 Graphics 89 13 Kv language 93 14 Integra...
315,142
79d30acd118c6b5aabe3f6688a2e5e4a554dfb7b
Conjectures, Tests and Proofs: An Overview of Theory Exploration Moa Johansson and Nicholas Smallbone Chalmers University of Technology, Gothenburg, Sweden moa.johansson@chalmers.se, nicsma@chalmers.se A key component of mathematical reasoning is the ability to formulate interesting conjectures about a problem domain...
11,158
39488ab507069dc443d217bad7c509a4c115aab5
Agenda for today Review definition of *implements* as subset of traces, with cache example Too much spec state → history variables, with StatDB example Abstraction relations ↔ history variables Premature choice → prophecy variables Correctness Definition: External code traces \( \subseteq \) external spec traces ...
4,848
c254b06534c9223c55d8d3610ac1f3705a95f256
OpenID + FAPI Introduction 2021-05-17 OpenID Foundation FAPI WG: OpenID Foundation Specialized in the standardization of internet identity layer and API access management. OpenID Foundation Members Members spread over 36 countries. OpenID Standards are used everywhere Sign in with Apple, Google Sign-in, Microsoft ...
1,417
c1ca71fc2524029e78c1192765f3ea083d09670a
Composing, installing, and managing RHEL for Edge images Composing, installing, and managing RHEL for Edge Images on Red Hat Enterprise Linux 9 Composing, installing, and managing RHEL for Edge Images on Red Hat Enterprise Linux 9 Legal Notice Copyright © 2022 Red Hat, Inc. The text of and illustrations in this docu...
32,754
5974923781d5e9ec3b61eedc87ac04a1217f2db6
Automated Verification of Infinite-State Systems with Certifiable Algorithms Abstract: In formal verification, one uses mathematical tools in order to prove that a system satisfies a given specification. In this talk I consider three limitations of traditional formal verification: 1. The first is the fact that trea...
177
88eb15a1ef5f6e4db3314d837024dcbcbc35f985
HDL basic training: top-down chip design using Verilog and VHDL Douglas J Smith, VeriBest Increasingly complex ASIC and FPGA chips require you to shift from schematic-based design to design based on Verilog or VHDL. Understanding the basics of these languages and how you use them for designing ASICs and FPGAs will he...
3,929
4199ad4b1e0e8a4511ed8e0120cee7c0e75e7229
A Metaobject Protocol for Optimizing Application-Specific Run-Time Variability Position Paper Guido Chari UBA, FCEN, Departamento de Computación, ICC-CONICET, Argentina gchari@dc.uba.ar Diego Garbervetsky UBA, FCEN, Departamento de Computación, ICC-CONICET, Argentina diegog@dc.uba.ar Stefan Marr Johannes Kepler Uni...
5,382
9a829cc0b28d99a48e8a3a4093a3a7dfe8be3e48
Flexible and Fast IP Lookup Algorithm Wooguil Pak Secni.com Corporation Yeoksam-dong, Kangnam-gu Seoul, Korea 135-080 TEL:+82-2-3458-1972 FAX:+82-2-3458-1999 wgpak@secni.com Saewoong Bahk School of Electrical Engineering Seoul National University Seoul, Korea 151-742 TEL:+82-2-880-8434 FAX:+82-2-880-8198 ssbahk@netla...
4,317
2bcdf89d833058fa93729626493b82137db2a843
5-2010 An Exploratory Study on Issues and Challenges of Agile Software Development with Scrum Juyun Joey Cho Utah State University Follow this and additional works at: https://digitalcommons.usu.edu/etd Part of the Computer Sciences Commons Recommended Citation https://digitalcommons.usu.edu/etd/599 AN EXPLORATO...
72,259
1d63bffd347d1d5a33228d78f0b3e73b734be667
Deadline Due by the end of lab today. (Submit whatever you have by the end of lab, even if incomplete.) How to submit Submit your files for this lab using ~st10/328submit on nrs-labs, with a homework number of 86. Requirements • You are required to work in pairs for this lab exercise. • Make sure BOTH of your names a...
1,029
f19b98612cfbb6a43e627ecec06dec275f9c4cb2
When Testing Meets Code Review Why and How Developers Review Tests Spadini, Davide; Aniche, Maurício; Storey, Margaret-Anne; Bruntink, Magiel; Bacchelli, Alberto DOI 10.1145/3180155.3180192 Publication date 2018 Document Version Peer reviewed version Published in Proceedings of the 40th International Conference on ...
13,674
a393102967fea19d8514ff012b664e20f147cbdb
Agile Methods Selection Model: A Grounded Theory Study Mashal Kasem Alqudah¹, Rozilawati Razali², Musab Kasim Alqudah³ Research Center for Software Technology and Management, FTSM University Kebangsaan Malaysia Bangi, Selangor, Malaysia¹² Department of Computer Sciences, College of Computer Sciences and Engineering-Ya...
9,818
2f35a26723ca6088e2b66e01589c44213d2d96c5
Lab 6 Each lab will begin with a brief demonstration by the TAs for the core concepts examined in this lab. As such, this document will not serve to tell you everything the TAs will in the demo. It is highly encouraged that you ask questions and take notes. In order to get credit for the lab, you need to be checked o...
1,348
d8fb273946fcec234e079e7e1a0b31755fbca7a3
Author Guidelines for Software Submissions Content - Mission and Scope of Software Submissions - Types of Software Submissions - Requirements for Software Submissions - Preparing your Software submission - Reviewing and selection criteria - Sample Research Object Mission and Scope of Software Submissions Aperture r...
3,151
a13bb97c777b16a57a9918c5cea74a4679b1d8c8
Package ‘BigVAR’ March 22, 2022 Type Package Title Dimension Reduction Methods for Multivariate Time Series Version 1.1.0 Maintainer Will Nicholson <wbn8@cornell.edu> Date 2022-03-15 Depends R (>= 3.5.0), methods, lattice Imports MASS, zoo, Rcpp, stats, utils, grDevices, graphics, abind License GPL (>= 2) Lazy...
7,558
6a1edd701b70b1586a6a1dda62647ea1b663de3c
Package ‘affy’ May 29, 2024 Version 1.82.0 Title Methods for Affymetrix Oligonucleotide Arrays Author Rafael A. Irizarry <rafa@ds.dfci.harvard.edu>, Laurent Gautier <lgautier@gmail.com>, Benjamin Milo Bolstad <bmb@bmbolstad.com>, and Crispin Miller <cmiller@picr.man.ac.uk> with contributions from Magnus Astrand <Ma...
23,896