• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 119
Next 10 →

Efficient implementation of a BDD package

by Karl S. Brace, Richard L. Rudell, Randal E. Bryant - In Proceedings of the 27th ACM/IEEE conference on Design autamation , 1991
"... Efficient manipulation of Boolean functions is an important component of many computer-aided design tasks. This paper describes a package for manipulating Boolean functions based on the reduced, ordered, binary decision diagram (ROBDD) representation. The package is based on an efficient implementat ..."
Abstract - Cited by 500 (9 self) - Add to MetaCart
implementation of the if-then-else (ITE) operator. A hash table is used to maintain a strong carwnical form in the ROBDD, and memory use is improved by merging the hash table and the ROBDD into a hybrid data structure. A memory funcfion for the recursive ITE algorithm is implemented using a hash-based cache

Constructive Incremental Learning from Only Local Information

by Stefan Schaal, Christopher G. Atkeson , 1998
"... ... This article illustrates the potential learning capabilities of purely local learning and offers an interesting and powerful approach to learning with receptive fields. ..."
Abstract - Cited by 206 (39 self) - Add to MetaCart
... This article illustrates the potential learning capabilities of purely local learning and offers an interesting and powerful approach to learning with receptive fields.

Chapter 9 Memory

by unknown authors
"... Memory and its management affect the performance of computer systems in &o major ways. First, almost every system h.as a memory constraint: a limit on the number of “threads of control ” that can be active simultaneously, imposed by the availability of memory. A memory constraint ..."
Abstract - Add to MetaCart
Memory and its management affect the performance of computer systems in &o major ways. First, almost every system h.as a memory constraint: a limit on the number of “threads of control ” that can be active simultaneously, imposed by the availability of memory. A memory constraint

1 " A BRIEF m5TORY OF INTERLISP

by unknown authors
"... Interlisp began with an implementation of the Lisp programming language for the PDP-l at Bolt. Beranek and Newman in 1966. It was followed in 1967 by 940 lisp. an upward compatible implementation for the SDS-940 computer. 940 Lisp was the first Lisp system to demonstrate the feasibility of using sof ..."
Abstract - Add to MetaCart
software paging techniques and a large vinual memory in conjunction with a list-processing system [Bobrow & (-----\) Murphy. 1967]. 940 Lisp was patterned after the Lisp 1.5 ~plementation for crss at MIT. with several ")!lew facilities added to take advantage of its timeshared. on

Reverse Engineering of Software Threads: A Design Recovery Technique for Large Multi-Process Systems

by Norman Wilde, Christopher Casey, Joe Vandeville, Gary Trio, Dick Hotz , 1997
"... This paper presents a relatively simple method for using traces of inter-process messages to recover functional software design threads from a large, multi-process system. The method is illustrated with a case study of the JSTARS battle management system. The method seems to be effective in providin ..."
Abstract - Cited by 8 (5 self) - Add to MetaCart
This paper presents a relatively simple method for using traces of inter-process messages to recover functional software design threads from a large, multi-process system. The method is illustrated with a case study of the JSTARS battle management system. The method seems to be effective in providing useful insights even to Software Engineers who are relatively familiar with the system. Design thread recovery for JSTARS is feasible because instrumentation to capture interprocess messages was designed into the original system. Our results suggest that the designers of new systems should give thought to including such instrumentation since the cost is small and the future economic benefits in easier evolution could be very large. Reverse Engineering of Software ThreadsJan/97 11 Introduction The large multi-process software systems often found in major aerospace systems are very costly to develop and so must be designed for long useful lives. Such systems cannot

STA ARCHIVE

by As To Tk, Geraldine Naughton, Naughton Geraldine , 1
"... Assessing the anaerobic characteristics of children page a DEDICATION This thesis is dedicated to a very supportive and caring family. Specifically I dedicate it as a symbol of thanks to my mother and father for the love, devotion, and respect that they have given to me. I extend my gratitude to my ..."
Abstract - Add to MetaCart
sisters and their beautiful families for providing much encouragement and enjoyment in my life. I also dedicate this thesis to the memory of a grandfather whose sense of family love, justice and commitment remain a most powerful inspiration in my life. page id ACKNOWLEDGEMENTS / wish to acknowledge Dr

Signed U ~ 0 ^ ^ Date Z'^/^/OS

by Simone Bassi, Bassi Simone, Simone Bassi
"... Pragmatic communication following traumatic brain injury in early childhood 11 '' % T^tk-'^^^t '̂- '̂ ̂ ^iSti^ment of Authorship This thesis is my own work containing, to the best of my knowledge and belief, no material published or written by another person except where ref ..."
Abstract - Add to MetaCart
Pragmatic communication following traumatic brain injury in early childhood 11 '' % T^tk-'^^^t '̂- '̂ ̂ ^iSti^ment of Authorship This thesis is my own work containing, to the best of my knowledge and belief, no material published or written by another person except where referred to in the text.

Higher-Order Persistent Polymorphic Programming in Tycoon

by Florian Matthes, In Tycoon , 2000
"... Data Types An abstract data type (ADT) consists of a data type and a set of operations defined over this data type. Only the name of the type and the names and signatures of the operations are visible to programs that use the ADT. The implementation of the type and of the operations are hidden by t ..."
Abstract - Cited by 6 (1 self) - Add to MetaCart
Data Types An abstract data type (ADT) consists of a data type and a set of operations defined over this data type. Only the name of the type and the names and signatures of the operations are visible to programs that use the ADT. The implementation of the type and of the operations are hidden by the ADT. The operations provided by the ADT are the only possible and legal ones on the ADT. This protects the values of the ADT against undesired manipulations.

Adaptive Control Utilising Neural Swarming

by Alex V. E. Conradie, Risto Miikkulainen, Christiaan Aldrich , 2002
"... Process changes, such as flow disturbances and sensor noise, are common in the chemical and metallurgical industries. To maintain optimal performance, the controlling system has to adapt continuously to these changes. ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
Process changes, such as flow disturbances and sensor noise, are common in the chemical and metallurgical industries. To maintain optimal performance, the controlling system has to adapt continuously to these changes.

unknown title

by Chan Pui Shan , 1998
"... Support for an integrated approach to program understanding: an application of software visualisation ..."
Abstract - Add to MetaCart
Support for an integrated approach to program understanding: an application of software visualisation
Next 10 →
Results 1 - 10 of 119
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University