Sciweavers

INTERNET
2002
145views more  INTERNET 2002»
13 years 11 months ago
Where is Middleware?
stract level, remote procedure calls enable programmers to invoke (possibly remote) services as if they were intra-application procedure calls. Much like function or procedure call...
Steve Vinoski
ENTCS
2007
126views more  ENTCS 2007»
13 years 12 months ago
Context Dependent Procedures and Computed Types in -eriFun
We present two enhancements of the functional language L which is used in the eriFun system to write programs and formulate statements about them. Context dependent procedures all...
Andreas Schlosser, Christoph Walther, Michael Gond...
DATAMINE
2002
83views more  DATAMINE 2002»
13 years 12 months ago
Automated Remote Sensing with Near Infrared Reflectance Spectra: Carbonate Recognition
Reflectance spectroscopy is a standard tool for studying the mineral composition of rock and soil samples and for remote sensing of terrestrial and extraterrestrial surfaces. We de...
Joseph Ramsey, Paul Gazis, Ted Roush, Peter Spirte...
CORR
2004
Springer
107views Education» more  CORR 2004»
13 years 12 months ago
Encapsulation for Practical Simplification Procedures
ACL2 was used to prove properties of two simplification procedures. The procedures differ in complexity but solve the same programming problem that arises in the context of a reso...
Olga Shumsky Matlin, William McCune
JSYML
2007
57views more  JSYML 2007»
13 years 12 months ago
Red fields
We apply Hrushovski-Fra¨ıss´e’s amalgamation procedure to obtain a theory of fields of prime characteristic of Morley rank 2 equipped with a
Andreas Baudisch, A. Martin-Pizarro, M. Ziegler
AIR
2004
91views more  AIR 2004»
13 years 12 months ago
A Personalized Defection Detection and Prevention Procedure based on the Self-Organizing Map and Association Rule Mining: Applie
Abstract. Customer retention is an increasingly pressing issue in today's competitive environment. This paper proposes a personalized defection detection and prevention proced...
Hee Seok Song, Jae Kyeong Kim, Yeong Bin Cho, Soun...
IIE
2007
56views more  IIE 2007»
14 years 18 hour ago
Recursion Versus Iteration with the List as a Data Structure
Abstract. A reversible sequence of steps from the specification of the algorithm and the mathematical definition of the recurrent solution through the recursive procedure, the ta...
Izabella Foltynowicz
ET
2007
84views more  ET 2007»
14 years 1 days ago
Built-in Self-test and Defect Tolerance in Molecular Electronics-based Nanofabrics
We propose a built-in self-test (BIST) procedure for nanofabrics implemented using chemically assembled electronic nanotechnology. Several fault detection configurations are prese...
Zhanglei Wang, Krishnendu Chakrabarty
JMLR
2006
113views more  JMLR 2006»
14 years 1 days ago
Learning the Structure of Linear Latent Variable Models
We describe anytime search procedures that (1) find disjoint subsets of recorded variables for which the members of each subset are d-separated by a single common unrecorded cause...
Ricardo Silva, Richard Scheines, Clark Glymour, Pe...
JCC
2006
42views more  JCC 2006»
14 years 2 days ago
Starting SCF calculations by superposition of atomic densities
: We describe the procedure to start an SCF calculation of the general type from a sum of atomic electron densities, as implemented in GAMESS-UK. Although the procedure is well kno...
J. H. Van Lenthe, R. Zwaans, Huub J. J. Van Dam, M...