Skip to main content

John Mark Spratt Favorites

John Mark Spratt Favorites


Show sorted alphabetically
Show sorted alphabetically
SHOW DETAILS
up-solid down-solid
eye
Title
Date Favorited
Creator
Fringe and Off-Center
texts
eye 24,845
favorite 26
comment 0
The Manufacture and Sale of Saint Einstein - The Propaganda of Supremacy Here is the unknown and twisted story of how an obscure mathematician came to become one of the most famous and recognizable people in human history. But, was there an ulterior purpose to all of this? Perhaps you have had the experience of sitting in on a physics class, watching Einstein's equations explained. As you watch, something odd enters into your mind. Is all this really original? It seems the equations were all...
Topics: Einstein, Albert Einstein, genius, mathematics, relativity, GPR, forensic, study, general...
Cornell University Library
by Dearborn, George Van Ness, 1869-
texts
eye 704
favorite 4
comment 0
The metadata below describe the original scanning. Follow the "All Files: HTTP" link in the "View the book" box to the left to find XML files that contain more metadata about the original images and the derived formats (OCR results, PDF etc.). See also the What is the directory structure for the texts? FAQ for information about file content and naming conventions.
Topics: Study skills, Psychophysiology
NASA Network Resource and Training Site
texts
eye 19
favorite 1
comment 0
This paper describes a rational reconstruction of Einstein's discovery of special relativity, validated through an implementation: the Erlanger program. Einstein's discovery of special relativity revolutionized both the content of physics and the research strategy used by theoretical physicists. This research strategy entails a mutual bootstrapping process between a hypothesis space for biases, defined through different postulated symmetries of the universe, and a hypothesis space for physical...
Topics: NASA Technical Reports Server (NTRS), RELATIVITY, INVARIANCE, GROUP THEORY, EINSTEIN EQUATIONS,...
Spy Files
by eng; WikiLeaks
texts
eye 183
favorite 1
comment 0
Melanie-VIDA
Topics: WikiLeaks, Spy Files
Three computer programs were written with the objective of predicting the structural weight of aircraft through analytical methods. The first program, the structural weight estimation program (SWEEP), is a completely integrated program including routines for airloads, loads spectra, skin temperatures, material properties, flutter stiffness requirements, fatigue life, structural sizing, and for weight estimation of each of the major aircraft structural components. This volume (volume 6) contains...
Topics: DTIC Archive, Hayase, G, ROCKWELL INTERNATIONAL LOS ANGELES CA LOS ANGELES AIRCRAFT DIV, *AIRCRAFT,...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 59
favorite 1
comment 0
The National Society of Black Physicists (NSBP) was founded in 1977 by a group of physicists, primarily at Historically Black Colleges and Universities. During the late 1960s and early 1970s, this group became increasingly interested in enhancing and enriching teaching and research activities at those institutions. The group felt that a central organization concerned with the continued presence of black physicists in society would be the best vehicle for accomplishing their goals. The NSBP has...
Topics: DTIC Archive, Mickens, Ronald E., NATIONAL SOCIETY OF BLACK PHYSICISTS GREENSBORO NC, *PHYSICISTS,...
FBI Files
by Federal Bureau of Investigation
texts
eye 926
favorite 1
comment 0
FBI file
Topics: FBI, FBI file, Federal Bureau of Investigation
Community Texts
texts
eye 1,186
favorite 1
comment 0
n/a
Topics: A300, ПЕ
Community Texts
texts
eye 286
favorite 4
comment 0
The MIT Press additional PDF file: https://libres.uncg.edu/ir/uncg/f/K_Caneva_Review_1984.pdf Review of Enrico Bellone, A World on Paper: Studies on the Second Scientific Revolution, translated by Mirella and Riccardo Giacconi (Cambridge: The MIT Press, 1980)
Topics: A300, ПЕ, PDF
Naval Postgraduate School
by Naval Postgraduate School (U.S.)
texts
eye 246
favorite 1
comment 0
Academic year catalog. NAVPERS 15779
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 24
favorite 1
comment 0
We report progress in calculations of spin coherence and spin transport properties in nanoscale geometries, including calculations of g-factors in quantum dots, exchange interactions in Si/Ge quantum dots, tuning of spin coherence times for electron spin, tuning of dipolar magnetic fields for nuclear spin, spontaneous spin polarization generation and new designs for spin-based teleportation and spin transistors. Our new proposal for electron-spin based teleportation is mediated by single...
Topics: DTIC Archive, Flatte, Michael E, IOWA UNIV IOWA CITY, *QUANTUM THEORY, *SEMICONDUCTORS, *SPIN...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 32
favorite 1
comment 0
This multidisciplinary research project was concerned with the development, understanding and application of powerful techniques for the manipulation and study of spin systems, the fabrication and study of interacting spin assemblies, and the study, characterization and application of spin transfer effects and of nanomagnet dynamics excited by spin polarized currents. Major accomplishments achieved during this project include the development and application of new tools and innovative...
Topics: DTIC Archive, Buhrman, Robert A, CORNELL UNIV ITHACA NY, *SEMICONDUCTORS, *SPIN STATES,...
Computer Game Manuals
texts
eye 826
favorite 1
comment 0
Outpost Manual
Topics: colony, tile, morale, monorail, robot, robots, outpost, seed, colonists, planet, seed factory, tile...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 63
favorite 1
comment 0
This report consists of complete translations of the Russian-language abstracts of articles, which were originally published in the Sino-Soviet bloc and in Yugoslavia, excluding the USSR. The Soviet subject classification system used in the original Russian language abstracts has been followed in this publication.
Topics: DTIC Archive, JOINT PUBLICATIONS RESEARCH SERVICE ARLINGTON VA, *QUANTUM THEORY, *ABSTRACTS,...
Community Texts
texts
eye 1,952
favorite 1
comment 0
X7887SQ87
Topic: X877SQ8787
JSTOR Early Journal Content, The Monist
by Boltzmann, Ludwig
texts
eye 222
favorite 2
comment 0
"THE RECENT DEVELOPMENT OF METHOD IN THEORETICAL PHYSICS" is an article from The Monist, Volume 11 . View more articles from The Monist . View this article on JSTOR . View this article's JSTOR metadata . You may also retrieve all of this items metadata in JSON at the following URL: https://archive.org/metadata/jstor-27899220
Source: http://www.jstor.org/stable/10.2307/27899220
Community Texts
texts
eye 588
favorite 5
comment 0
science
Topic: a-to-z-of-physicists
Institute for Advanced Study
by Institute for Advanced Study (Princeton, N.J.)
texts
eye 3,192
favorite 1
comment 0
Institute for Advanced Study
by Institute for Advanced Study (Princeton, N.J.)
texts
eye 1,414
favorite 1
comment 0
Institute for Advanced Study
by Institute for Advanced Study (Princeton, N.J.)
texts
eye 2,277
favorite 1
comment 0
Institute for Advanced Study
by Institute for Advanced Study (Princeton, N.J.)
texts
eye 2,026
favorite 1
comment 0
Institute for Advanced Study
by Institute for Advanced Study (Princeton, N.J.)
texts
eye 3,342
favorite 1
comment 0
The Fifth International Conference on Squeezed States and Uncertainty Relations was held at Balatonfured, Hungary, on 27-31 May 1997. This series was initiated in 1991 at the College Park Campus of the University of Maryland as the Workshop on Squeezed States and Uncertainty Relations. The scientific purpose of this series was to discuss squeezed states of light, but in recent years the scope is becoming broad enough to include studies of uncertainty relations and squeeze transformations in all...
Topics: NASA Technical Reports Server (NTRS), CONFERENCES, SQUEEZED STATES (QUANTUM THEORY), QUANTUM...
FBI Files
by Federal Bureau of Investigation
texts
eye 175
favorite 2
comment 0
FBI file originally requested by Robert Hovden. Partial release; FBI indicated it had located 1266 pages related to Bethe.
Topics: FBI, FBI file, Federal Bureau of Investigation, Rosenberg Case, Alfred Sarant, William Perl, David...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 22
favorite 1
comment 0
We explored ultracold gases with seven projects during grant support. The supported research has resulted in 18 published articles, two of which are in Nature Physics, and 25 invited talks by the PI and postdocs. One of notable successes is the project of optical lattice p-orbital bands, which has gained considerable attention in recent years. Orbital physics of cold atoms is an emerging new topic in which, unlike most other topics, the theoretical development was earlier than the experiments....
Topics: DTIC Archive, PITTSBURGH UNIVERSITY PA OFFICE OF RESEARCH, *ATOMS, *COLD GASES, LOW TEMPERATURE,...
Community Texts
by Nicholas Maxwell, UCL Press
texts
eye 1,089
favorite 13
comment 0
Here is an idea that just might save the world. It is that science, properly understood, provides us with the methodological key to the salvation of humanity. A version of this idea can be found in the works of Karl Popper. Famously, Popper argued that science cannot verify theories but can only refute them, and this is how science makes progress. Scientists are forced to think up something better, and it is this, according to Popper, that drives science forward. But Nicholas Maxwell finds a...
Topics: Karl Popper, Science, Civilization, Intellectual Revolution, Reason, The Enlightenment, Education,...
The Final Proceedings for Multiscale Phenomena, Modeling and Computation, 2 March 1997 - 7 March 1997, the topics covered include: methodology, derivation, exploitation, and philosophical implications of multiscale interactions.
Topics: DTIC Archive, WEIZMANN INST OF SCIENCE REHOVOT (ISRAEL) DEPT OF APPLIED MATHEMATICS AND CO MPUTER...
Arxiv.org
by Nikolay A. Tyurin
texts
eye 33
favorite 1
comment 0
We present a new approach to special lagrangian geometry which works for Bohr - Sommerfeld lagrangian submanifolds of symplectic manifolds with integer symplectic forms. This leads to construction of finite dimensional moduli spaces of SBS lagrangian cycles over algebraic varieties.
Topics: Mathematical Physics, Mathematics, Symplectic Geometry, Algebraic Geometry
Source: http://arxiv.org/abs/1508.06804
Community Texts
by Michael Eckert
texts
eye 2,082
favorite 2
comment 0
Arnold Sommerfeld - Science, Life and Turbulent Times - 1868 - 1951 Author: Michael Eckert
Topics: Arnold Sommerfeld - Mathematics, Life and Turbulent Times, 1868 - 1951, Author: Michael Eckert
Mir Titles
by L. G. Grechko; V. I. Sugakov; O. F. Tomasevich; A. M. Fedorchenko
texts
eye 5,104
favorite 17
comment 0
About the book: From the Front Jacket This book is a collection of problems covering mechanics, electrodynamics, nonrelativistic quantum mechanics, !statistical physics and thermodynamics. Each Section opens with a brief outline of the main laws and relationships used to solve the problems. Also information about the needed mathematical apparatus is included. Along with answers there are guides to solving the more complicated problems. SI units are used throughout the book. Problems in...
Topics: mir publishers, problem books, theoretical physics, classical mechanics, theory of fields,...
Open Source Text Books
by J.H. Fremlin
texts
eye 1,593
favorite 4
comment 0
Topics: nuclear physics, radioactivity, tracers, detectors, atomic physics, nucleus, atom, radiochemical,...
Open Source Text Books
by David Halliday
texts
eye 2,472
favorite 2
comment 0
Topics: nuclear physics, decay, atomic physics, quantum mechanics, neutrons, beta, alpha, physics, gamma
Open Source Text Books
by W. Wilson
texts
eye 1,840
favorite 2
comment 0
Topics: physics, theoretical physics, quantum mechanics
The importance of Bioinformatics tools and methodology in modern biological research underscores the need for robust and effective courses at the college level. This paper describes such a course designed on the principles of cooperative learning based on a computer software industry production model called "Extreme Programming" (EP). The classroom version of EP included: working in pairs, switching roles between labs, partner interdependence and individual accountability. New...
Topics: ERIC Archive, Biology, Information Science, Science Instruction, College Science, Cooperative...
Department of Defense
texts
eye 85
favorite 1
comment 0
ADA151313
Topic: Computer science
Folkscanomy: Tandy and Radio Shack Books
by Aho, Alfred V; Kernighan, Brian W; Weinberger, Peter J
texts
eye 720
favorite 2
comment 0
Tandy/Radio Shack Book: Using AWK with OS-9 (1993)(ColorSystems)
Topics: awk, program, copyright, colorsystems, variable, field, gawk, pattern, programming, input, builtin...
The BITSAVERS.ORG Documents Library
texts
eye 328
favorite 1
comment 0
From the bitsavers.org collection, a scanned-in computer-related document. manx :: Aztec C II Z80 User Manual 1.05 Sep83
Topics: file, aztec, manx, library, returns, libutil, software, copyright, function, device, manx software,...
ULTRIX Software Development Volume 2 Guide to VAX C for ULTRIX
Community Texts
texts
eye 4,078
favorite 1
comment 0
You can easily understand the concepts of programming
Topics: c++, c, plus, plus plus, complete, reference, programming
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 43
favorite 1
comment 0
Cloud computing portrays a new model for providing IT services over the Internet. In cloud computing, resources are accessed from the Internet through web-based tools. Although cloud computing offers reduced cost, increased storage, high automation, flexibility, mobility, and the ability of IT to shift focus, there are other concerns--such as the management, organization and structure of content on the cloud--that large organizations should consider before migrating to the cloud. This thesis...
Topics: DTIC Archive, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *CLOUD COMPUTING, *DOCUMENTS, ARCHITECTURE,...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 20
favorite 1
comment 0
Source code must be readable and understandable in order to be debugged, used, and maintained efficiently and effectively. Creating programs that are easily read and understood is important, but not as simple as one might think. This thesis surveys the ways in which programming style, programming language design and program presentation influence a person's ability to read and understand program text. It is concerned with solving small scale problems associated with individual functions or...
Topics: DTIC Archive, Schorsch, Thomas M, AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH, *COMPUTER...
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 39
favorite 1
comment 0
This paper describes a language independent linearization engine, oxyGen. This system compiles target language grammars into programs that take feature graphs as inputs and generate word lattices that can be passed along to the statistical extraction module of the generation system Nitrogen. The grammars are written using a flexible and powerful language, oxyL, that has the power of a programming language but focuses on natural language realization. This engine have been used successfully in...
Topics: DTIC Archive, Habash, Nizar, MARYLAND UNIV COLLEGE PARK INST FOR ADVANCED COMPUTER STUDIES,...
Folkscanomy: A Library of Books
by AOSE 2003 (2003 : Melbourne, Vic.); Giorgini, Paolo; Müller, J. P. (Jörg P.), 1965-; Odell, James J; International Joint Conference on Autonomous Agents and Multiagent Systems (2nd : 2003 : Melbourne, Vic.)
texts
eye 376
favorite 1
comment 0
Agent-Oriented Software Engineering IV: 4th InternationalWorkshop, AOSE 2003, Melbourne, Australia, July 15, 2003. Revised Papers Author: Paolo Giorgini, Jörg P. Müller, James Odell Published by Springer Berlin Heidelberg ISBN: 978-3-540-20826-6 DOI: 10.1007/b95187 Table of Contents: Using UML in the Context of Agent-Oriented Software Engineering: State of the Art Towards a Recursive Agent Oriented Methodology for Large-Scale MAS Agent-Oriented Modeling by Interleaving Formal and Informal...
Topics: Software engineering, Intelligent agents (Computer software)
Folkscanomy: A Library of Books
by International Workshop on Agent Communication Languages (2003 : Melbourne, Vic.); Dignum, Frank, 1961-
texts
eye 333
favorite 1
comment 0
Advances in Agent Communication: International Workshop on Agent Communication Languages, ACL 2003, Melbourne, Australia, July 14, 2003. Revised and Invited Papers Author: Frank Dignum Published by Springer Berlin Heidelberg ISBN: 978-3-540-20769-6 DOI: 10.1007/b94813 Table of Contents: Conventional Signalling Acts and Conversation An Empirical Model of Communication in Multiagent Systems An Exploration in Using Cognitive Coherence Theory to Automate BDI Agents’ Communicational Behavior A...
Topic: Intelligent agents (Computer software)
Folkscanomy: A Library of Books
by ProMAS (Conference) (1st : 2003 : Melbourne, Vic.); Dastani, Mehdi; Dix, J. (Jürgen), 1961-; El Fallah Seghrouchni, Amal
texts
eye 648
favorite 1
comment 0
Programming Multi-Agent Systems: First International Workshop, PROMAS 2003, Melbourne, Australia, July 15, 2003, Selected Revised and Invited papers Author: Mehdi M. Dastani, Jürgen Dix, Amal El Fallah-Seghrouchni Published by Springer Berlin Heidelberg ISBN: 978-3-540-22180-7 DOI: 10.1007/b98149 Table of Contents: A Vision for Multi-agent Systems Programming Implementing Industrial Multi-agent Systems Using JACKTM Programming Software Agents as Designing Executable Business Processes: A...
Topics: Intelligent agents (Computer software), Computer programming
34
Topic: Electronic data processing
Naval Postgraduate School
texts
eye 195
favorite 1
comment 0
Available from National Technical Information Service, Springfield, Va
Topic: Computer Science
newyorkuniversity
texts
eye 571
favorite 1
comment 0
Arxiv.org
texts
eye 59
favorite 1
comment 0
Arxiv.org
by Krzysztof R. Apt
texts
eye 193
favorite 1
comment 0
This is a tutorial on logic programming and Prolog appropriate for a course on programming languages for students familiar with imperative programming.
Source: http://arxiv.org/abs/cs/0107013v2
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 39
favorite 1
comment 0
As understanding of the role of abstraction in programming has improved, programming languages have evolved in their use and support of abstraction. This paper defines abstraction and discusses how the use of abstraction in programming languages assists the programmer. It traces in depth the development of support for the abstraction of objects and for the abstraction of control constructs in programming languages.
Topics: DTIC Archive, Guarino, Loretta Rose, CARNEGIE-MELLON UNIV PITTSBURGH PA DEPT OF COMPUTER SCIENCE,...
Folkscanomy Computer: Books on Computers and Programming
texts
eye 2,263
favorite 1
comment 0
Programing Social Applications
Topics: Social Network, Programming
Atari 8-bit Computer Manuals
by John M. Reisinger
texts
eye 858
favorite 5
comment 0
A+ Programming in Atari BASIC by John M. Reisinger
Topics: Atari, Basic, Programming, 8-bit, 800, XE, XL, Computer
Folkscanomy Computer: Books on Computers and Programming
texts
eye 5,563
favorite 30
comment 0
Masterminds of Programming features exclusive interviews with the creators of several historic and highly influential programming languages. In this unique collection, you'll learn about the processes that led to specific design decisions, including the goals they had in mind, the trade-offs they had to make, and how their experiences have left an impact on programming today. Masterminds of Programming includes individual interviews with: Adin D. Falkoff: APL Thomas E. Kurtz: BASIC Charles H....
Topics: Programming, Computer, IT
Arxiv.org
by Thomas Braibant; Adam Chlipala
texts
eye 65
favorite 1
comment 0
We report on the implementation of a certified compiler for a high-level hardware description language (HDL) called Fe-Si (FEatherweight SynthesIs). Fe-Si is a simplified version of Bluespec, an HDL based on a notion of guarded atomic actions. Fe-Si is defined as a dependently typed deep embedding in Coq. The target language of the compiler corresponds to a synthesisable subset of Verilog or VHDL. A key aspect of our approach is that input programs to the compiler can be defined and proved...
Source: http://arxiv.org/abs/1301.4779v1
Folkscanomy: A Library of Books
texts
eye 206
favorite 1
comment 0
Notes on Economic Time Series Analysis: System Theoretic Perspectives Author: Prof. Masanao Aoki Published by Springer Berlin Heidelberg ISBN: 978-3-540-12696-6 DOI: 10.1007/978-3-642-45565-0 Table of Contents: Introduction The Notion of State Time-Invariant Linear Dynamics Time Series Representation Equivalence of Arma and State Space Models Decomposition of Data into Cyclical and Growth Components Prediction of Time Series Spectrum and Covariances Estimation of System Matrices: Initial Phase...
Topics: Time-series analysis, Economics, System theory, Análisis de sistemas, Série chronologique,...
Folkscanomy: A Library of Books
by PATMOS (Workshop) (14th : 2004 : Santorini, Greece); Macii, Enrico; Paliouras, Vassilis; Koufopavlou, Odysseas
texts
eye 1,502
favorite 1
comment 0
Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation: 14th International Workshop, PATMOS 2004, Santorini, Greece, September 15-17, 2004. Proceedings Author: Enrico Macii, Vassilis Paliouras, Odysseas Koufopavlou Published by Springer Berlin Heidelberg ISBN: 978-3-540-23095-3 DOI: 10.1007/b100662 Table of Contents: Connecting E-Dreams to Deep-Submicron Realities Design Methodology for Rapid Development of SoC ICs Based on an Innovative System Architecture...
Topics: Integrated circuits, Circuits intégrés à très grande échelle, Integrated circuits,...
Languages for System Specification: Selected Contributions on UML, SystemC, System Verilog, Mixed-Signal Systems, and Property Specification from FDL’03 Author: Christoph Grimm Published by Springer US ISBN: 978-1-4020-7990-0 DOI: 10.1007/b116586 Table of Contents: UML-Based Co-Design for Run-Time Reconfigurable Architectures A Unified Approach to Code Generation from Behavioral Diagrams Platform-Independent Design for Embedded Real-Time Systems Real-Time System Modeling with ACCORD/UML...
Topics: Computer hardware description languages, Integrated circuits
Folkscanomy: A Library of Books
by CHARME 2003 (2003 : L'Aquila, Italy); Geist, Daniel, 1961-; Tronci, Enrico, 1961-; SpringerLink (Online service)
texts
eye 482
favorite 1
comment 0
Correct Hardware Design and Verification Methods: 12th IFIP WG 10.5 Advanced Research Working Conference, CHARME 2003, L’Aquila, Italy, October 21-24, 2003. Proceedings Author: Daniel Geist, Enrico Tronci Published by Springer Berlin Heidelberg ISBN: 978-3-540-20363-6 DOI: 10.1007/b93958 Table of Contents: What Is beyond the RTL Horizon for Microprocessor and System Design? The Charme of Abstract Entities The PSL/Sugar Specification Language A Language for all Seasons Finding Regularity:...
Topics: Integrated circuits, Integrated circuits
Folkscanomy: A Library of Books
by Singh, Leena, 1971-; Drucker, Leonard; Khann, Neyaz
texts
eye 551
favorite 1
comment 0
Advanced Verification Techniques: A SystemC Based Approach for Successful Tapeout Author: Leena Singh, Leonard Drucker, Neyaz Khan Published by Springer US ISBN: 978-1-4020-7672-5 DOI: 10.1007/b105272 Table of Contents: Introduction Verification Process Using SCV for Verification Functional Verification Testplan Testbench Concepts using SystemC Verification Methodology Regression/Setup and Run Functional Coverage Dynamic Memory Modeling Post Synthesis Gate Simulation
Topics: Integrated circuits, TECHNOLOGY & ENGINEERING, TECHNOLOGY & ENGINEERING, Integrated circuits
Folkscanomy: A Library of Books
by Radecka, Katarzyna; Zilic, Zeljko
texts
eye 253
favorite 1
comment 0
Verification by Error Modeling: Using Testing Techniques in Hardware Verification Author: Katarzyna Radecka, Zeljko Zilic Published by Springer US ISBN: 978-1-4020-7652-7 DOI: 10.1007/b105974 Table of Contents: Introduction Boolean Function Representations Don’t Cares and Their Calculation Testing Design Error Models Design Verification by At Identifying Redundant Gate and Wire Replacements Conclusions and Future Work
Topics: Integrated circuits, Error analysis (Mathematics), Error analysis (Mathematics)
Folkscanomy: A Library of Books
by CAV (Conference) (16th : 2004 : Boston, MA); Alur, Rajeev, 1966-; Peled, Doron, 1962-
texts
eye 429
favorite 1
comment 0
Computer Aided Verification: 16th International Conference, CAV 2004, Boston, MA, USA, July 13-17, 2004. Proceedings Author: Rajeev Alur, Doron A. Peled Published by Springer Berlin Heidelberg ISBN: 978-3-540-22342-9 DOI: 10.1007/b98490 Table of Contents: Rob Tristan Gerth: 1956–2003 Static Program Analysis via 3-Valued Logic Deductive Verification of Pipelined Machines Using First-Order Quantification A Formal Reduction for Lock-Free Parallel Algorithms An Efficiently Checkable, Proof-Based...
Topics: Computer software, Integrated circuits, Electronic digital computers, COMPUTERS
Folkscanomy: A Library of Books
by Iman, Sasan; Joshi, Sunita
texts
eye 422
favorite 2
comment 0
The e Hardware Verification Language Author: Sasan Iman, Sunita Joshi Published by Springer US ISBN: 978-1-4020-8023-4 DOI: 10.1007/b117092 Table of Contents: Introduction Verification Methodologies Anatomy of a Verification Environment e as a Programming Language e as a Verification Language Generator Operation Data Modeling and Stimulus Generation Sequence Generation Temporal Expressions Messages Collectors and Monitors Scoreboarding Coverage Engine Coverage Modeling e Reuse Methodology...
Topics: Computer hardware description languages, Integrated circuits, Computers, Engineering, Electrical...
Computer Systems Research Institute, Technical Reports
by Eric C.R. Hehner
texts
eye 86
favorite 1
comment 0
34
Topic: Electronic data processing
Naval Postgraduate School
by MacLennan, Bruce J.
texts
eye 411
favorite 1
comment 0
"NPS52-82-010."
Topics: GAUSSIAN PROCESSES., MARKOV PROCESSES.
Arxiv.org
by Adam Megacz
texts
eye 90
favorite 1
comment 0
Multi-level languages and Arrows both facilitate metaprogramming, the act of writing a program which generates a program. The arr function required of all Arrows turns arbitrary host language expressions into guest language expressions; because of this, Arrows may be used for metaprogramming only when the guest language is a superset of the host language. This restriction is also present in multi-level languages which offer unlimited cross-level persistence. This paper introduces generalized...
Source: http://arxiv.org/abs/1007.2885v2
University of Illinois Urbana-Champaign
by Hansen, Wilfred J; Doring, Richard; Whitlock, Lawrence Robert
texts
eye 186
favorite 1
comment 0
Bibliography: p. 52
Topics: Interactive computing, Computer-assisted instruction, PLATO (Electronic computer system)
University of Illinois Urbana-Champaign
by Kampen, Garry R
texts
eye 242
favorite 1
comment 0
"UILU-ENG 77 1710."
Topic: Programming languages (Electronic computers)
University of Illinois Urbana-Champaign
by Tindall, Michael Harry
texts
eye 128
favorite 1
comment 0
Thesis--University of Illinois at Urbana-Champaign
Topics: Compiling (Electronic computers), Computer-assisted instruction, PLATO (Electronic computer...
University of Illinois Urbana-Champaign
by Sanford, Wayne C
texts
eye 398
favorite 1
comment 0
Bibliography: p. 33
Topics: Compiling (Electronic computers), Programming languages (Electronic computers)
University of Illinois Urbana-Champaign
by Doring, Richard; Whitlock, Lawrence Robert; Hansen, Wilfred J
texts
eye 137
favorite 1
comment 0
Topics: PLATO (Electronic computer system), Computer-assisted instruction, Interactive computing
University of Illinois Urbana-Champaign
by Embley, David W
texts
eye 162
favorite 1
comment 0
Includes bibliographical references
Topics: Computer-assisted instruction, Computer programming, Programming languages (Electronic computers)
Vita
Topics: Programming languages (Electronic computers), Computer-assisted instruction
Experienced teachers may learn from this manual how to author individualized learning packages. Based on the sequential steps for producing learning materials, a variety of activities for diagnostic, instructional, and evaluative purposes are included in it. The manual is organized into four major parts: (1) "A Model for Individualizing Instruction," which presents a description of individualized instruction and an overview of instructional technology and the training course; (2)...
Topics: ERIC Archive, Computer Assisted Instruction, Curriculum Development, Educational Media, Educational...
Naval Postgraduate School
by Williams, Arrena Sue
texts
eye 267
favorite 1
comment 0
ADA028868
Topic: Computer science
Naval Postgraduate School
texts
eye 416
favorite 1
comment 0
Available from National Technical Information Service, Springfield, Va
Topic: Computer science
The U.S. Southwest and particularly the region along the 1000-mile long U.S.-Mexican boundary, offers a ready laboratory for the observation of many phases of multilingualism and multiculturalism. The author feels, however, that the rich sociolinguistic material of the area has suffered from over-simplification and neglect. Very few synchronic studies along modern linguistic lines have appeared. He believes that the Bilingual Education Act of 1968 and the Sociolinguistic Study on Southwest...
Topics: ERIC Archive, Bilingualism, Dialect Studies, English (Second Language), Language Skills, Mexican...
Arxiv.org
by Benjamin Lucien Kaminski; Joost-Pieter Katoen
texts
eye 4
favorite 1
comment 0
This paper considers the computational hardness of computing expected outcomes and deciding (universal) (positive) almost-sure termination of probabilistic programs. It is shown that computing lower and upper bounds of expected outcomes is $\Sigma_1^0$- and $\Sigma_2^0$-complete, respectively. Deciding (universal) almost-sure termination as well as deciding whether the expected outcome of a program equals a given rational value is shown to be $\Pi^0_2$-complete. Finally, it is shown that...
Topics: Computational Complexity, Logic in Computer Science, Computing Research Repository
Source: http://arxiv.org/abs/1506.01930
U.S. Congressional Hearings
by Committee on Commerce, Science, and Transportation
texts
eye 23
favorite 1
comment 0
Government Publishing Office U.S. Congress Senate Committee on Commerce, Science, and Transportation THE PARTNERSHIP BETWEEN NIST AND THE PRIVATE SECTOR: IMPROVING CYBERSECURITY Date(s) Held: 2013-07-25 113th Congress, 1st Session GPO Document Source: CHRG-113shrg88081 Superintendents of Documents ID: Y 4.C 73/7 Witnesses: Dr. Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director, National Institute of Standards and Technology, United States Department of...
Topics: 113th, Senate
Defense Technical Information Archive
by Defense Technical Information Center
texts
eye 12
favorite 1
comment 0
The purpose of this grant was to investigate the state-of-the-art of information science (IS) research in the territory of the Asian Office of Aerospace Research and Development (AOARD), analyze its relevance to the Air Force Office of Scientific Research (AFOSR), and recommend appropriate activities for AOARD to consider funding under its basic research program. This was accomplished through several field trips to countries in the AOARD territory (which covers Asia and Australasia), through...
Topics: DTIC Archive, FRIEDLAND (PETER) CUPERTINO CA, *INTERNATIONAL RELATIONS, *INFORMATION SCIENCES,...
Journals
by 11
texts
eye 54
favorite 1
comment 0
Cybersecurity risk pervades all sectors of the US economy. It challenges the reliability, resiliency, and safety of our infrastructures. The chemical industry, particularly the petro-chemical industry, is a critical infrastructure that is vulnerable to cyber attacks. By its nature, the chemical industry deals with products that are sometimes highly hazardous for people and the environment. Cyber attacks on chemical industry represent a threat beyond the boundaries of the factory involved. This...
Topics: cybersecurity, computer security, chemical industry
U.S. Congressional Hearings
by Congressional Committee
texts
eye 18
favorite 1
comment 0
Government Publishing Office U.S. Congress Senate Congressional Committee CYBERSECURITY: PREPARING FOR AND RESPONDING TO THE ENDURING THREAT Date(s) Held: 2013-06-12 113th Congress, 1st Session GPO Document Source: CHRG-113shrg81526 Superintendents of Documents ID: Y 4.AP 6/2 Related Items: U.S. Code: 42 U.S.C. 5195c(e) U.S. Code: 50 U.S.C. 1881a(a) U.S. Code: 50 U.S.C. 1881a(b) U.S. Code: 50 U.S.C. 1881a(c) U.S. Code: 50 U.S.C. 1881a(g)(2) U.S. Code: 50 U.S.C. 1881(d)(2) U.S. Code: 50 U.S.C....
Topics: 113th, Senate
Arxiv.org
by Soham Chakraborty; Thomas A. Henzinger; Ali Sezgin; Viktor Vafeiadis
texts
eye 5
favorite 1
comment 0
Linearizability of concurrent data structures is usually proved by monolithic simulation arguments relying on the identification of the so-called linearization points. Regrettably, such proofs, whether manual or automatic, are often complicated and scale poorly to advanced non-blocking concurrency patterns, such as helping and optimistic updates. In response, we propose a more modular way of checking linearizability of concurrent queue algorithms that does not involve identifying linearization...
Topics: Programming Languages, Logic in Computer Science, Computing Research Repository
Source: http://arxiv.org/abs/1502.07639
Although homeland security has gained prominence as a national focus and investment, it is clear that much of the most effective preparation must begin at local, state, and regional levels. This report reveals that an astonishing number of community colleges offer degree and certificate programs for first responders--law enforcement officers, firefighters, and emergency medical technicians--as well as myriad other important programs for nurses, allied health professionals, utility workers, and...
Topics: ERIC Archive, National Security, Community Colleges, Partnerships in Education, Crisis Management,...
Community Texts
by gnsecBooks
texts
eye 110
favorite 1
comment 0
The predictions of what Artificial Intelligence progress has for us in the year of 2018. Thanks to the PwC.
Topics: AI, Business, GNSEC, gnsecBooks
The capabilities of the specified scheduling language and the program module library are outlined. The summary is written with the potential user in mind and, therefore, provides maximum insight on how the capabilities will be helpful in writing scheduling programs. Simple examples and illustrations are provided to assist the potential user in applying the capabilities of his problem.
Topics: NASA Technical Reports Server (NTRS), PROGRAMMING LANGUAGES, SCHEDULING, SYSTEMS ANALYSIS, USER...
The detailed functional specifications presented are written as requirements for software implementation of the language and the program modules, and are aimed at a specific audience.
Topics: NASA Technical Reports Server (NTRS), PROGRAMMING LANGUAGES, SCHEDULING, SPECIFICATIONS, USER...
University of Illinois Urbana-Champaign
by Massachusetts Agricultural College
texts
eye 34
favorite 1
comment 0
Title from cover
Topics: Massachusetts Agricultural College, Agricultural colleges
U.S. Congressional Hearings
by Committee on Energy and Commerce
texts
eye 28
favorite 1
comment 0
Government Publishing Office U.S. Congress House of Representatives Committee on Energy and Commerce CYBERSECURITY: NETWORK THREATS AND POLICY CHALLENGES Date(s) Held: 2009-05-01 111th Congress, 1st Session GPO Document Source: CHRG-111hhrg72884 Superintendents of Documents ID: Y 4.C 73/8 Related Items: Congressional Serial No. 111-35
Topics: 111th, House
Government Publishing Office U.S. Congress House of Representatives Committee on Commerce RESULTS OF SECURITY INSPECTIONS AT THE DEPARTMENT OF ENERGY'S LAWRENCE LIVERMORE NATIONAL LABORATORY Date(s) Held: 1999-07-20 106th Congress, 1st Session GPO Document Source: CHRG-106hhrg58496 Superintendents of Documents ID: Y 4.C 73/8 Related Items: Congressional Serial No. 106-146
Topics: 106th, House
University of Illinois Urbana-Champaign
by Massachusetts Agricultural College
texts
eye 28
favorite 1
comment 0
Title from cover
Topics: Massachusetts Agricultural College, Agricultural colleges, Agronomy, Agriculture
American Libraries
texts
eye 1,083
favorite 2
comment 0
Book digitized by Google from the library of the New York Public Library and uploaded to the Internet Archive by user tpb.
Source: http://books.google.com/books?id=2igOAAAAYAAJ&oe=UTF-8
Topics: julian, roman, fome, decline, himfelf, thofe, conftantius, moft, three thoufand, julian himfelf,...
Source: http://books.google.com/books?id=Ah52MTnMV5gC&hl=&source=gbs_api
In a study conducted at the University of Alberta, an attempt was made to use Piagetian-type observations as an assessment of intellectual capacities and to determine whether learning a second language at an early age has beneficial or detrimental effects on cognitive functioning. For this purpose an 18-question test dealing with conservation (awareness of invariance) and measurement of length was constructed. The six subtests and the questions used were similar to the tests used by Piaget and...
Topics: ERIC Archive, Bilingual Students, Bilingualism, Cognitive Development, Cognitive Tests,...
PDFy Mirrors
texts
eye 105
favorite 1
comment 0
This public document was automatically mirrored from PDFy . Original filename: 2014-au.pdf URL: https://pdf.yt/d/VMPWmd0jpDYvZIjm Upload date: August 08, 2014 16:21:20
Topics: mirror, pdf.yt
Click here to view the University of Florida catalog record
This thesis compares the concepts of Ada Programming Support Environments (APSE) and Computer Integrated Manufacturing Systems (CIMS) to see if they are similar enough to apply APSE concepts for solving CIMS problems. After establishing a discussion baseline for each of the concepts, the objectives, design guidelines and pictorial representations of an APSE and a CIMS are first compared. Then the two concepts are compared at the database, interfaces and toolset level. The major differences...
Topics: DTIC Archive, Austin,Kathleen M, AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH SCHOOL OF SYSTEMS...
Arxiv.org
by Shouhuai Xu
texts
eye 18
favorite 1
comment 0
We argue that emergent behavior is inherent to cybersecurity.
Topics: Cryptography and Security, Computing Research Repository
Source: http://arxiv.org/abs/1502.05102
U.S. Congressional Hearings
by Committee on Energy and Commerce
texts
eye 15
favorite 1
comment 0
Government Publishing Office U.S. Congress House of Representatives Committee on Energy and Commerce CYBERSECURITY AND CONSUMER DATA: WHAT'S AT RISK FOR THE CONSUMER? Date(s) Held: 2003-11-19 108th Congress, 1st Session GPO Document Source: CHRG-108hhrg90728 Superintendents of Documents ID: Y 4.C 73/8 Related Items: United States House Bill 1636 (108th Congress) United States House Bill 2885 (108th Congress) United States House Bill 2929 (108th Congress) Congressional Serial No. 108-52
Topics: 108th, House
U.S. Congressional Hearings
by Committee on Oversight and Government Reform
texts
eye 28
favorite 1
comment 0
Government Publishing Office U.S. Congress House of Representatives Committee on Oversight and Government Reform ENHANCING CYBERSECURITY OF THIRD-PARTY CONTRACTORS AND VENDORS Date(s) Held: 2015-04-22 114th Congress, 1st Session GPO Document Source: CHRG-114hhrg97335 Superintendents of Documents ID: Y 4.G 74/7 Witnesses: Mr. Tony Scott, Chief Information Officer, Administrator, Office of Electronic Government and Information Technology, Office of Management and Budget Ms. Donna K. Seymour,...
Topics: 114th, House
The Business-Higher Education Forum (BHEF) has achieved particular success in operationalizing the National Higher Education and Workforce Initiative (HEWI) in Maryland around cybersecurity. Leveraging its membership of corporate CEOs, university presidents, and government agency leaders, BHEF partnered with the University System of Maryland to build a system-wide response to the state's (and nation's) cybersecurity workforce challenges. BHEF's work in Maryland illustrates that it is indeed...
Topics: ERIC Archive, Internet, Computer Security, Corporations, College Presidents, Case Studies,...
A few empirical studies of mnemonic techniques were conducted in the late 1800s and early 1900s. Then, until the 1960s, very little research was done on mnemonics. A revival of research interest in mnemonics, in the late 1960s, accompanied the general acceptability of cognitive processes as a legitimate area of research. Now we're back where we started a century ago--studying mental processes. Visual imagery has played a central role in mnemonic techniques and systems since ancient times, and...
Topics: ERIC Archive, Association (Psychology), Cognitive Processes, Educational Methods, History,...
American Libraries
texts
eye 546
favorite 1
comment 0
Book digitized by Google from the library of the New York Public Library and uploaded to the Internet Archive by user tpb.
Source: http://books.google.com/books?id=owsMAAAAYAAJ&oe=UTF-8
Naval Postgraduate School
by Henninger, Ernest Henry
texts
eye 307
favorite 1
comment 0
ADA712464
Topic: Mathematics
Source: half
U.S. Congressional Hearings
by Committee on Energy and Commerce
texts
eye 16
favorite 1
comment 0
Government Publishing Office U.S. Congress House of Representatives Committee on Energy and Commerce CYBERSECURITY: THREATS TO COMMUNICATIONS NETWORKS AND PRIVATE SECTOR RESPONSES Date(s) Held: 2012-02-08 112th Congress, 2nd Session GPO Document Source: CHRG-112hhrg82628 Superintendents of Documents ID: Y 4.C 73/8 Witnesses: Bill Conner, President and Chief Executive Officer, Entrust Robert B. Dix, Jr., Vice President, Government Affairs and Critical Infrastructure Protection, Juniper Networks...
Topics: 112th, House
U.S. Congressional Hearings
by Committee on Energy and Commerce
texts
eye 23
favorite 1
comment 0
Government Publishing Office U.S. Congress House of Representatives Committee on Energy and Commerce CRITICAL INFRASTRUCTURE CYBERSECURITY: ASSESSMENTS OF SMART GRID SECURITY Date(s) Held: 2012-02-28 112th Congress, 2nd Session GPO Document Source: CHRG-112hhrg76641 Superintendents of Documents ID: Y 4.C 73/8 Witnesses: Gregory C. Wilshusen, Director, Information Security Issues, Government Accountability Office David C. Trimble, Director, Natural Resources and Environment, Government...
Topics: 112th, House
National Defense University
by Institute For National Strategic Studies
texts
eye 90
favorite 1
comment 0
Defense Horizons 72
Topics: National Defense University, NDU
This report reviews the literature on memory enhancement and assesses the potential of techniques designed to enhance memory (mnemotechnics) for military training. An overview describes a wide range of mnemotechnics. After a review of the empirical literature on mnemotechnics, a research strategy is offered for applying mnemonics and mnemotechnics to military training. Mnemonics and mnemotechnics have the potential to significantly enhance training effectiveness. However, if they are not...
Topics: DTIC Archive, Griffith, Douglas, ARMY RESEARCH INST FOR THE BEHAVIORAL AND SOCIAL SCIENCES...