Results 1 - 10
of
119
Efficient implementation of a BDD package
- In Proceedings of the 27th ACM/IEEE conference on Design autamation
, 1991
"... Efficient manipulation of Boolean functions is an important component of many computer-aided design tasks. This paper describes a package for manipulating Boolean functions based on the reduced, ordered, binary decision diagram (ROBDD) representation. The package is based on an efficient implementat ..."
Abstract
-
Cited by 500 (9 self)
- Add to MetaCart
implementation of the if-then-else (ITE) operator. A hash table is used to maintain a strong carwnical form in the ROBDD, and memory use is improved by merging the hash table and the ROBDD into a hybrid data structure. A memory funcfion for the recursive ITE algorithm is implemented using a hash-based cache
Constructive Incremental Learning from Only Local Information
, 1998
"... ... This article illustrates the potential learning capabilities of purely local learning and offers an interesting and powerful approach to learning with receptive fields. ..."
Abstract
-
Cited by 206 (39 self)
- Add to MetaCart
... This article illustrates the potential learning capabilities of purely local learning and offers an interesting and powerful approach to learning with receptive fields.
Chapter 9 Memory
"... Memory and its management affect the performance of computer systems in &o major ways. First, almost every system h.as a memory constraint: a limit on the number of “threads of control ” that can be active simultaneously, imposed by the availability of memory. A memory constraint ..."
Abstract
- Add to MetaCart
Memory and its management affect the performance of computer systems in &o major ways. First, almost every system h.as a memory constraint: a limit on the number of “threads of control ” that can be active simultaneously, imposed by the availability of memory. A memory constraint
1 " A BRIEF m5TORY OF INTERLISP
"... Interlisp began with an implementation of the Lisp programming language for the PDP-l at Bolt. Beranek and Newman in 1966. It was followed in 1967 by 940 lisp. an upward compatible implementation for the SDS-940 computer. 940 Lisp was the first Lisp system to demonstrate the feasibility of using sof ..."
Abstract
- Add to MetaCart
software paging techniques and a large vinual memory in conjunction with a list-processing system [Bobrow & (-----\) Murphy. 1967]. 940 Lisp was patterned after the Lisp 1.5 ~plementation for crss at MIT. with several ")!lew facilities added to take advantage of its timeshared. on
Reverse Engineering of Software Threads: A Design Recovery Technique for Large Multi-Process Systems
, 1997
"... This paper presents a relatively simple method for using traces of inter-process messages to recover functional software design threads from a large, multi-process system. The method is illustrated with a case study of the JSTARS battle management system. The method seems to be effective in providin ..."
Abstract
-
Cited by 8 (5 self)
- Add to MetaCart
This paper presents a relatively simple method for using traces of inter-process messages to recover functional software design threads from a large, multi-process system. The method is illustrated with a case study of the JSTARS battle management system. The method seems to be effective in providing useful insights even to Software Engineers who are relatively familiar with the system. Design thread recovery for JSTARS is feasible because instrumentation to capture interprocess messages was designed into the original system. Our results suggest that the designers of new systems should give thought to including such instrumentation since the cost is small and the future economic benefits in easier evolution could be very large. Reverse Engineering of Software ThreadsJan/97 11 Introduction The large multi-process software systems often found in major aerospace systems are very costly to develop and so must be designed for long useful lives. Such systems cannot
STA ARCHIVE
, 1
"... Assessing the anaerobic characteristics of children page a DEDICATION This thesis is dedicated to a very supportive and caring family. Specifically I dedicate it as a symbol of thanks to my mother and father for the love, devotion, and respect that they have given to me. I extend my gratitude to my ..."
Abstract
- Add to MetaCart
sisters and their beautiful families for providing much encouragement and enjoyment in my life. I also dedicate this thesis to the memory of a grandfather whose sense of family love, justice and commitment remain a most powerful inspiration in my life. page id ACKNOWLEDGEMENTS / wish to acknowledge Dr
Signed U ~ 0 ^ ^ Date Z'^/^/OS
"... Pragmatic communication following traumatic brain injury in early childhood 11 '' % T^tk-'^^^t '̂- '̂ ̂ ^iSti^ment of Authorship This thesis is my own work containing, to the best of my knowledge and belief, no material published or written by another person except where ref ..."
Abstract
- Add to MetaCart
Pragmatic communication following traumatic brain injury in early childhood 11 '' % T^tk-'^^^t '̂- '̂ ̂ ^iSti^ment of Authorship This thesis is my own work containing, to the best of my knowledge and belief, no material published or written by another person except where referred to in the text.
Higher-Order Persistent Polymorphic Programming in Tycoon
, 2000
"... Data Types An abstract data type (ADT) consists of a data type and a set of operations defined over this data type. Only the name of the type and the names and signatures of the operations are visible to programs that use the ADT. The implementation of the type and of the operations are hidden by t ..."
Abstract
-
Cited by 6 (1 self)
- Add to MetaCart
Data Types An abstract data type (ADT) consists of a data type and a set of operations defined over this data type. Only the name of the type and the names and signatures of the operations are visible to programs that use the ADT. The implementation of the type and of the operations are hidden by the ADT. The operations provided by the ADT are the only possible and legal ones on the ADT. This protects the values of the ADT against undesired manipulations.
Adaptive Control Utilising Neural Swarming
, 2002
"... Process changes, such as flow disturbances and sensor noise, are common in the chemical and metallurgical industries. To maintain optimal performance, the controlling system has to adapt continuously to these changes. ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
Process changes, such as flow disturbances and sensor noise, are common in the chemical and metallurgical industries. To maintain optimal performance, the controlling system has to adapt continuously to these changes.
unknown title
, 1998
"... Support for an integrated approach to program understanding: an application of software visualisation ..."
Abstract
- Add to MetaCart
Support for an integrated approach to program understanding: an application of software visualisation
Results 1 - 10
of
119