Academic literature on the topic 'Lex (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Lex (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Lex (Computer file)"

1

Liu, Hai Lang, Cheng De Lin, and Ai Zhen Wang. "Research on a Compiler for NC System Based on PC." Advanced Materials Research 189-193 (February 2011): 2875–78. http://dx.doi.org/10.4028/www.scientific.net/amr.189-193.2875.

Full text
Abstract:
With the constant development of numerical control technology, the development cycle and efficiency of CNC (computer numerical control) system is restricted with NC code compiler insufficient in Rapid Development and efficiency. In order to solve this problem, a compiler developed with Lex&Yacc for CNC system based on PC is put forward. This compiler is consisted of a lexical analysis module, a syntax analysis module and an object-storage module. With designed in modules, parameter-driven programming and assisted by Lex&Yacc which is an efficient language for compiler development, this
APA, Harvard, Vancouver, ISO, and other styles
2

Mosweu, Tshepho Lydia, and Lekoko Kenosi. "Implementation of the Court Records Management System in the delivery of justice at the Gaborone Magisterial District, Botswana." Records Management Journal 28, no. 3 (2018): 234–51. http://dx.doi.org/10.1108/rmj-11-2017-0033.

Full text
Abstract:
Purpose The purpose of this study is to assess whether the implementation of the electronic Court Records Management System (CRMS) at the Gaborone Magisterial District, Botswana, brought improvements in the delivery of justice as expected in the management of case file records. Design/methodology/approach Principally, a quantitative approach utilizing a research survey design, supplemented by a qualitative approach was used in this study. Findings The CRMS implementation led to improvements in case file management at the Gaborone Magisterial District; case files were successfully captured into
APA, Harvard, Vancouver, ISO, and other styles
3

Al-Nabki, Wesam, Eduardo Fidalgo, Enrique Alegre, and Rocío Alaiz-Rodríguez. "Short Text Classification Approach to Identify Child Sexual Exploitation Material." Scientific Reports 13, no. 1 (2023): 16108. https://doi.org/10.1038/s41598-023-42902-8.

Full text
Abstract:
Producing or sharing Child Sexual Exploitation Material (CSEM) is a severe crime that Law Enforcement Agencies (LEAs) fight daily. When the LEA seizes a computer from a potential producer or consumer of the CSEM, it analyzes the storage devices of the suspect looking for evidence. Manual inspection of CSEM is time-consuming given the limited time available for Spanish police to use a search warrant. Our approach to speeding up the identification of CSEM-related files is to analyze only the file names and their absolute paths rather than their content. The main challenge lies in handling short
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Chao, Jiagui Xie, Yanan Cheng, et al. "Research on the Construction of High-Trust Root Zone File Based on Multi-Source Data Verification." Electronics 12, no. 10 (2023): 2264. http://dx.doi.org/10.3390/electronics12102264.

Full text
Abstract:
The root zone is located at the top level of the DNS system’s hierarchical structure and serves as the entry point for all domain name resolutions. The accuracy of the root zone file determines whether domain names can be resolved correctly. To solve the problems of single-source distrust and inaccurate data in the use of root zone files, this paper utilizes multi-source root zone files to build an accurate, real-time, and highly trustworthy root zone file through the validation of data accuracy and integrity. First, we propose a weighted voting statistical verification method. We select top-l
APA, Harvard, Vancouver, ISO, and other styles
5

Ko, Kyung-Kyu, and Eun-Sung Jung. "Development of Cybersecurity Technology and Algorithm Based on Quantum Computing." Applied Sciences 11, no. 19 (2021): 9085. http://dx.doi.org/10.3390/app11199085.

Full text
Abstract:
Many hacking incidents are linked to work files because most companies work with them. However, a variety of file encryption and decryption methods have been proposed. Existing file encryption/decryption technologies are under threat as hacking technologies advance, necessitating the development of stronger encryption algorithms. Therefore, in this study, we propose a modified advanced encryption standard (AES) algorithm and use quantum computing to encrypt/decrypt AES image files. Because the shift is regular during the AES Shift Row procedure, the change technique led the shift to become irr
APA, Harvard, Vancouver, ISO, and other styles
6

Zhuravel, I. M., and L. Z. Mychuda. "VISUALIZATION AND INCREASING THE INFORMATIVENESS OF LARGE GRAPHIC FILES." Ukrainian Journal of Information Technology 4, no. 1 (2022): 78–84. http://dx.doi.org/10.23939/ujit2022.01.078.

Full text
Abstract:
The constant development of digital technology has led to a sharp increase in the number and volume of media files, including digital images, which make up a significant part of computer network traffic, which reduces the speed of their transmission. The research conducted in this work is based on the provisions and methods of digital image processing, the laws of visual perception, the basics of probability theory and mathematical modeling. The results of theoretical research were verified by simulation. The paper proposes a technology that, through the analysis of the color space of the imag
APA, Harvard, Vancouver, ISO, and other styles
7

Yang, Feng, Pu Xuan Lu, Min Deng, et al. "Annotations of Lung Abnormalities in the Shenzhen Chest X-ray Dataset for Computer-Aided Screening of Pulmonary Diseases." Data 7, no. 7 (2022): 95. http://dx.doi.org/10.3390/data7070095.

Full text
Abstract:
Developments in deep learning techniques have led to significant advances in automated abnormality detection in radiological images and paved the way for their potential use in computer-aided diagnosis (CAD) systems. However, the development of CAD systems for pulmonary tuberculosis (TB) diagnosis is hampered by the lack of training data that is of good visual and diagnostic quality, of sufficient size, variety, and, where relevant, containing fine-region annotations. This study presents a collection of annotations/segmentations of pulmonary radiological manifestations that are consistent with
APA, Harvard, Vancouver, ISO, and other styles
8

Ryasov, Aleksandr. "THE POSSIBILITY OF OBTAINING AND USING CRIMINALLY SIGNIFICANT INFORMATION FROM FILE METADATA IN THE DETECTION AND INVESTIGATION OF CRIMES." VESTNIK ADVANCED TRAINING INSTITUTE OF THE MIA OF RUSSIA, no. 2 (August 12, 2024): 110–16. http://dx.doi.org/10.29039/2312-7937-2024-2-110-116.

Full text
Abstract:
Modern technologies and the digitalization of society have led to the fact that most of the information in the world is stored and transmitted electronically. This circumstance opens up new opportunities for law enforcement agencies in the detection and investigation of crimes. In today's world, where technology plays a key role in society, digital footprints are becoming an important element in crime investigation. Everyone has already got used to the fact that the main object of computer expertise in the field of computer information is the contents of files. However, such an important area
APA, Harvard, Vancouver, ISO, and other styles
9

Alukwe, Chrispus. "Enhancing Cybersecurity: Smart Intrusion Detection in File Server SYSTEMS." Journal of Science, Innovation and Creativity 2, no. 1 (2023): 1–6. http://dx.doi.org/10.58721/jsic.v2i1.287.

Full text
Abstract:
System security is a major challenge worldwide, which has led to the increasing implementation of security surveillance systems in the public and private sectors. Likewise, it is inevitable to secure server-based systems that store vast amounts of sensitive data that is accessed from time to time. Intrusion Detection Systems (IDS) use metrics to detect anomalous activity on computers and computer networks. Modern detection algorithms try to reach detection metrics by acting as an antivirus. This is not enough, the need to explore more controlled, porous, and more secure systems is inevitable,
APA, Harvard, Vancouver, ISO, and other styles
10

da Silva, Erico Correia, Liria Matsumoto Sato, and Edson Toshimi Midorikawa. "Distributed File System to Leverage Data Locality for Large-File Processing." Electronics 13, no. 1 (2023): 106. http://dx.doi.org/10.3390/electronics13010106.

Full text
Abstract:
Over the past decade, significant technological advancements have led to a substantial increase in data proliferation. Both scientific computation and Big Data workloads play a central role, manipulating massive data and challenging conventional high-performance computing architectures. Efficiently processing voluminous files using cost-effective hardware remains a persistent challenge, limiting access to new technologies for individuals and organizations capable of higher investments. In response to this challenge, AwareFS, a novel distributed file system, addresses the efficient reading and
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Lex (Computer file)"

1

Dao, Thi Thu Ha. "Les files et les reseaux zero-automatiques." Phd thesis, Université Paris-Diderot - Paris VII, 2007. http://tel.archives-ouvertes.fr/tel-00195119.

Full text
Abstract:
On introduit un nouveau modele de file d'attente: les files Zero-automatiques. Tout d'abord, on considere la discipline de service Premier Arrive Premier Servi. Les files 0-automatiques sont caracterisees par une salle d'attente evoluant suivant un mecanisme de marche aleatoire sur un groupe ou un monoede infini. En considerant les deux cas les plus simples et aussi extremes de files 0-automatiques, nous retrouvons la file simple M/M/1 et la G-file de Gelenbe avec clients positifs et negatifs.<br />Le resultat saillant est que toutes les files 0-automatiques ont une distribution stationnaire a
APA, Harvard, Vancouver, ISO, and other styles
2

Weis, Frédéric. "Exploitation d'approches système dans les réseaux sans fil." Habilitation à diriger des recherches, Université Rennes 1, 2012. http://tel.archives-ouvertes.fr/tel-00790484.

Full text
Abstract:
Les travaux présentés s'inscrivent dans le cadre des systèmes mobiles et distribués, et s'intéressent tout particulièrement aux perspectives offertes par les réseaux locaux sans fil. A l'opposé de la complexité de déploiement d'une infrastructure cellulaire étendue, les interactions sans fil courte portée peuvent être utilisées de manière très simple, sans infrastructure. Ainsi, elles permettent à des calculateurs proches d'échanger automatiquement des informations. Nous proposons des supports système prenant en compte la volatilité des communications sans fil, et permettant de développer des
APA, Harvard, Vancouver, ISO, and other styles
3

Boudguiga, Aymen. "Authentification dans les réseaux maillés sans fils avec la cryptographie basée sur l'identité." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00762635.

Full text
Abstract:
De nos jours, l'authentification dans les réseaux maillés sans fils fait appel aux certificats ou aux secrets partagés. Dans les environnements sans fils, la gestion des certificats est désavantageuse. En effet, les certificats nécessitent le déploiement d'une infrastructure à clés publiques (ICP) et la définition d'une autorité de certification (AC). La AC définit toute une politique qui permet de contrôler la génération, la transmission et la révocation des certificats. Cette politique ne prend pas en considération les limites en termes de puissance et de mémoire que peuvent avoir les statio
APA, Harvard, Vancouver, ISO, and other styles
4

Darties, Benoit. "Problèmes algorithmiques et de complexité dans les réseaux sans fil." Phd thesis, Université Montpellier II - Sciences et Techniques du Languedoc, 2007. http://tel.archives-ouvertes.fr/tel-00270118.

Full text
Abstract:
Ces dernières années ont connu l'avènement des réseaux sans fil, dopés par leur facilité de déploiement et par leur usage dans de multiples domaines : réseaux domestiques Wi-Fi, téléphonie mobile, réseaux ad-hoc, réseaux de capteurs, ... L'objet de cette thèse porte sur l'étude de problèmes algorithmiques directement inspirés des contraintes de fonctionnement rencontrées dans de tels réseaux, et se découpe en trois parties.<br />La première partie de nos travaux s'intéresse à l'étude du problème de la diffusion d'un message émis depuis un noeud source unique vers l'ensemble des noeuds particip
APA, Harvard, Vancouver, ISO, and other styles
5

Lasaulce, Samson. "Coopération et Compétition dans les Réseaux sans Fils." Habilitation à diriger des recherches, Université Paris Sud - Paris XI, 2010. http://tel.archives-ouvertes.fr/tel-00845381.

Full text
Abstract:
Le premier chapitre de ce manuscrit correspond au CV long de l'auteur (établi en mai 2010). Le second chapitre décrit ses contributions scientifiques pour les réseaux sans fils équipés de terminaux multi-dimensionnels. Le troisième chapitre est dédié aux contributions de l'auteur aux réseaux sans fils équipés de terminaux-relais. Le quatrième chapitre correspond lui aux réseaux sans fils équipés de terminaux autonomes décisionnellement (réseaux sans fils distribués). Le manuscrit est conclu par les perspectives de l'auteur.
APA, Harvard, Vancouver, ISO, and other styles
6

Lafourcade, Pascal. "Sécurité assistée par ordinateur pour les primitives cryptgraphiques, les protocoles de vote électronique et les réseaux de capteurs sans fil." Habilitation à diriger des recherches, Université de Grenoble, 2012. http://tel.archives-ouvertes.fr/tel-00807568.

Full text
Abstract:
La sécurité est une des préoccupations principales de l'informatique moderne. De plus en plus de personnes utilisent un ordinateur pour des opérations sensibles comme pour des transferts bancaires, des achats sur internet, le payement des impôts ou même pour voter. La plupart de ces utilisateurs ne savent pas comment la sécurité est assurée, par conséquence ils font totalement confiance à leurs applications. Souvent ces applications utilisent des protocoles cryptographiques qui sont sujet à erreur, comme le montre la célèbre faille de sécurité découverte sur le protocole de Needham-Schroeder d
APA, Harvard, Vancouver, ISO, and other styles
7

Schiller, Eryk. "Les architectures des réseaux pour des environnements entierement sans fil." Phd thesis, Université de Grenoble, 2010. http://tel.archives-ouvertes.fr/tel-00619262.

Full text
Abstract:
Dans ce document, nous avons étudié les nouvelles possibilités de routage et d'adressage dans les réseaux sans-fil multisauts spontanés de grande taille (WMNs). Les WMNs promettent à l'avenir un changement profond de l'architecture d'Internet, mais beaucoup de problèmes restent à résoudre avant leur déploiement. Le routage, par exemple, est simple dans de petits réseaux statiques, mais les réseaux sans fil sont en pratique dynamiques : des liens peuvent apparaître et disparaître, des noeuds rejoignent ou quittent le réseau. Ainsi la taille du réseau peut s'agrandir, ce qui implique des problèm
APA, Harvard, Vancouver, ISO, and other styles
8

Aad, Imad. "Qualité de service dans les réseaux locaux sans-fil." Phd thesis, Université Joseph Fourier (Grenoble), 2002. http://tel.archives-ouvertes.fr/tel-00406507.

Full text
Abstract:
Les réseaux IEEE 802.11 sont, entre autres, très souvent utilisés pour se connecter à l'Internet car ils proposent une solution bon marché, facile à déployer et qui supporte la mobilité. Dans cette thèse nous considérons quatre différents aspects de la qualité de service (QoS) dans ces réseaux :<br />- Différentiation de service : Le protocole IEEE 802.11 actuel n'a aucun support de la QoS. Ainsi, tous les terminaux partagent équitablement le débit disponible. Nous proposons des mécanismes de différentiation de services au niveau MAC. Nous développons et simulons plusieurs mécanismes de différ
APA, Harvard, Vancouver, ISO, and other styles
9

Mailles, Danielle. "Files d'attente descriptives pour la modelisation de la synchronisation dans les systemes informatiques." Paris 6, 1987. http://www.theses.fr/1987PA066503.

Full text
Abstract:
Dans cette these, la notion de transition, empruntee aux reseaux de petri, est introduite dans les systemes d'attente classiques. Les modeles issus de cette representation sont appeles "files d'attente descriptives". Ils sont composes de files d'attente d'une part et d'objets nouveaux appeles "dedoublement" et "regroupement" d'autre part. Des primitives de synchronisation sont etudiees et resolues analytiquement: le semaphore et les drapeaux. L'analyse de reseaux integrant ces mecanismes est realisee par une methode de decomposition et une methode d'agregation et validee par simulation. Le der
APA, Harvard, Vancouver, ISO, and other styles
10

Albu, Roxana. "Architecture de communication pour les réseaux d'instrumentation sans fil." Phd thesis, Institut National Polytechnique de Toulouse - INPT, 2011. http://tel.archives-ouvertes.fr/tel-00619443.

Full text
Abstract:
Aujourd'hui les réseaux de capteurs sont devenus des systèmes pouvant atteindre un très grand nombre de nœuds, avec une zone de couverture déterminée et déployés d'une manière plus ou moins dense dans un environnement hétérogène dont on mesure ainsi son état global. La problématique de cette thèse consiste à concevoir une architecture pour les objets communicants à faible consommation en utilisant des antennes " intelligentes " pour l'instrumentation et la mesure. Intégrant une approche pluridisciplinaire, cette architecture couvre les services offerts depuis les couches MAC jusqu'à celles de
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Lex (Computer file)"

1

Levine, John R. Lex & yacc. 2nd ed. O’Reilly & Assocoates, Inc., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Levine, John R. lex & yacc. 2nd ed. O’Reilly & Associates, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Levine, John R. Lex & yacc. 2nd ed. O’Reilly & Assocoates, Inc., 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Levine, John R. Lex & yacc. 2nd ed. O’Reilly & Assocoates, Inc., 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dougherty, Dale, ed. lex & yacc. 2nd ed. O’Reilly Media, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Levine, John R. lex & yacc. 2nd ed. O’Reilly & Assocoates, Inc., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

1965-, Mason Tony, and Brown Doug 1952-, eds. Lex & yacc. 2nd ed. O’Reilly & Assocoates, Inc., 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

1952-, Brown Doug, and Dougherty Dale, eds. lex & yacc. O’Reilly Media, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

(Firm), ActiveEducation, ed. Microsoft Windows 2000 professional: Instructor-led training. Microsoft Press, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

White, Kenneth J. Introduction to the theory and practice of econometrics--a computer handbook using SHAZAM and SAS: For use with Judge-Hill-Griffiths-Lütkepohl-Lee, Introduction to the theory and practice of econometrics, second edition. Wiley, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Lex (Computer file)"

1

Langer, Markus, and Isabel Valera. "Leveraging Actionable Explanations to Improve People’s Reactions to AI-Based Decisions." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-73741-1_18.

Full text
Abstract:
AbstractThis paper explores the role of explanations in mitigating negative reactions among people affected by AI-based decisions. While existing research focuses primarily on user perspectives, this study addresses the unique needs of people affected by AI-based decisions. Drawing on justice theory and the algorithmic recourse literature, we propose that actionability is a primary need of people affected by AI-based decisions. Thus, we expected that more actionable explanations – that is, explanations that guide people on how to address negative outcomes – would elicit more favorable reaction
APA, Harvard, Vancouver, ISO, and other styles
2

Alam, Sadaf, Javier Bartolome, Sanzio Bassini, et al. "Fenix: Distributed e-Infrastructure Services for EBRAINS." In Lecture Notes in Computer Science. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-82427-3_6.

Full text
Abstract:
AbstractThe Human Brain Project (HBP) (https://humanbrainproject.eu/) is a large-scale flagship project funded by the European Commission with the goal of establishing a research infrastructure for brain science. This research infrastructure is currently being realised and will be called EBRAINS (https://ebrains.eu/). The wide ranging EBRAINS services for the brain research communities require diverse access, processing and storage capabilities. As a result, it will strongly rely on e-infrastructure services. The HBP led to the creation of Fenix (https://fenix-ri.eu/), a collaboration of five
APA, Harvard, Vancouver, ISO, and other styles
3

Buhler, Thomas, Matthieu Adam, Hakim Ramdani, and Pauline Jobard. "Press Discourse on Cycling Before, During, and After the First Covid-19 Lockdown in France. The Rise of the User-Group Voice." In The Urban Book Series. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-45308-3_4.

Full text
Abstract:
AbstractIn this chapter we explore what a “crisis” event (here the first lockdown related to Covid-19 in France) means in terms of (i) the balance of power among actors expressing themselves in the daily press and of (ii) the main messages that the more prominent of these actors disseminate. In order to analyze changes in press discourse on city cycling in France, we examine a corpus that spans the period from September 2019 to September 2020, i.e., six months before the first lockdown (March 17, 2020) and five months after the end of the month-long lockdown (May 11, 2020). The discourse analy
APA, Harvard, Vancouver, ISO, and other styles
4

Birkoben, Tom, Mirko Hansen, Marina Ignatov, Martin Ziegler, and Hermann Kohlstedt. "A Bio-inspired Perceptual Decision-Making Circuit Based on the Hassenstein-Reichardt Direction Detector." In Springer Series on Bio- and Neurosystems. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-36705-2_13.

Full text
Abstract:
AbstractDecision-making belongs to one of the most prominent principles in the nerve system of living species. The crucial trade-off between time to decide (speed) and accuracy is essential for a creature to react to environmental stimuli and most importantly, relevant for survival. In-depth studies of coherent motion tasks in primates, based on two-choice decision experiments, led to a profound understanding of neuronal information processing and even bridged the gap to behavioural psychology. Three fundamental processing stages are needed to successfully perform a two-choice decision experim
APA, Harvard, Vancouver, ISO, and other styles
5

Hoenig, Alan. "Logical Documents Via Latex." In Tex Unbound. Oxford University PressNew York, NY, 1998. http://dx.doi.org/10.1093/oso/9780195096859.003.0004.

Full text
Abstract:
Abstract Imagine yourself as a computer user, but blind. The situation isn’t as dreadful as you might think-certain gadgets let the computer read ASCII files out loud, and TEX input files, which are pure ASCII, work well in this arrangement. (For a discussion of an actual such system, see both Raman (1995) and Gibbs (1996).) Now imagine the computer reading a TEX input file to you. Certain situations arise.
APA, Harvard, Vancouver, ISO, and other styles
6

Kosseff, Jeff. "Online Anonymity and Copyright." In The United States of Anonymous. Cornell University Press, 2022. http://dx.doi.org/10.7591/cornell/9781501762383.003.0009.

Full text
Abstract:
This chapter focuses on the notion of online anonymity and copyright. It looks into the peer-to-peer (P2P) system allowing personal computer users to share media files without cost and without compensating labels or artists for their music, which led to the recording industry arguing that the P2P system and its users were infringing their copyright. The Recording Industry Association of America (RIAA) announced it would begin gathering identifying information of people who shared large amounts of music on P2P networks as they considered the sharing to be stealing. Additionally, the RIAA file-s
APA, Harvard, Vancouver, ISO, and other styles
7

S, Vennila, Iyyamma B, and Anbunilavan R. "THE PROGNOSIS IN THE TREATMENT OF COMPUTER VISION SYNDROME." In Futuristic Trends in Medical Sciences Volume 3 Book 9. Iterative International Publisher, Selfypage Developers Pvt Ltd, 2024. http://dx.doi.org/10.58532/v3bfms9p1ch29.

Full text
Abstract:
Introduction: Computer vision syndrome (CVS) refers to a collection of vision-related symptoms that stem from prolonged usage of digital display devices like computers, tablets, and smartphones. Today's students have convenient access to online resources and e-books via their smartphones, decreasing reliance on traditional printed materials. The use of computers is generally encouraged as it aligns with the fast-paced landscape of technology, research, and science. However, the widespread adoption of computers has led to a significant surge in the incidence of computer vision syndrome (CVS), r
APA, Harvard, Vancouver, ISO, and other styles
8

Gorfinkel, Elena. "Conclusion." In Lewd Looks. University of Minnesota Press, 2017. http://dx.doi.org/10.5749/minnesota/9781517900175.003.0006.

Full text
Abstract:
There is no better place to end than in the desires for the future of the past, of sexploitation cinema’s febrile imaginary, materialized by a sex film and reflexively about the sex film as a waning form. In the year 2427, a futuristic culture lives on in what remains of Los Angeles, which was ravaged by an earthquake in 1969. The society is ruled by “Master Computer” and a secret group of cult film viewers gathers each week to view cherished “underground” films from the film historical past, “decadent films which have been outlawed in these enlightened times.” These covert rebels, led by Lian
APA, Harvard, Vancouver, ISO, and other styles
9

Hemion, Geoffrey. "The final result." In The Classification of Knots and 3-Dimensional Spaces. Oxford University PressOxford, 1993. http://dx.doi.org/10.1093/oso/9780198596974.003.0022.

Full text
Abstract:
Abstract We are left with the task of relating this theory to the argument of Chapter 13. As we have seen in Chapter 3, the classification algorithm involves splitting 3-manifolds along incompressible surfaces to obtain, in the end, 3-cells with boundary patterns. This works fine except in the case that a piece suddenly appears which is a Stallings fibration containing no incompressible tori. How does the computer know when it is dealing with this case? Let M be the given 3-manifold which we know is a Stallings fibration.
APA, Harvard, Vancouver, ISO, and other styles
10

Chion, Michel. "The Composer of musique concrète Wields a Camera." In The Oxford Handbook of Film Theory. Oxford University Press, 2022. http://dx.doi.org/10.1093/oxfordhb/9780190873929.013.24.

Full text
Abstract:
Abstract This chapter stresses the importance of careful observation. I have noticed a paradox in film criticism in France, particularly in scholarly essays. Whereas in the 1960s and 1970s it was still difficult and expensive to obtain prints of films for study purposes, let alone to make films, today’s widely available and lightweight audiovisual equipment—from personal computers to tablets, phones, and digital tape recorders—allows anybody to put images together, to create and record and edit sounds. You can edit and mix films all by yourself and you can observe the results instantly; you ca
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Lex (Computer file)"

1

Cochran, J., and J. T. Bass. "Computer Analysis/Optimization of Anode Geometries for Congested Anode Arrays." In CORROSION 1986. NACE International, 1986. https://doi.org/10.5006/c1986-86047.

Full text
Abstract:
Abstract Justification for using specific classical equations, used herein, to obtain state-of-the-art cathodic protection designs is presented. Also, selected sacrificial anodes and their galvanic properties are briefly discussed, including deration methods. A personal computer is used to optimize anode geometries for some offshore platform members where the required anode congestion creates mutual interference problems too complex to readily solve without a computer. A computer flow chart showing the optimization process, some practical offshore cathodic protection examples via computer prin
APA, Harvard, Vancouver, ISO, and other styles
2

Lee, Jaewon, Euijun Chung, Saurabh Singh, et al. "Let-Me-In: (Still) Employing In-pointer Bounds Metadata for Fine-grained GPU Memory Safety." In 2025 IEEE International Symposium on High Performance Computer Architecture (HPCA). IEEE, 2025. https://doi.org/10.1109/hpca61900.2025.00122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Boukharfane, Radouan, and Nabil El Mo�ayd. "Sensitivity Analysis of Key Parameters in LES-DEM Simulations of Fluidized Bed Systems Using Generalized Polynomial Chaos." In The 35th European Symposium on Computer Aided Process Engineering. PSE Press, 2025. https://doi.org/10.69997/sct.116388.

Full text
Abstract:
In applications involving fine powders and small particles, the accuracy of numerical simulations, particularly those employing the Discrete Element Method (DEM) to predict granular material behavior, can be significantly affected by uncertainties in critical parameters. These uncertainties include the coefficients of restitution for particle-particle and particle-wall collisions, viscous damping coefficients, and other related factors. In this study, we use stochastic expansions based on point-collocation non-intrusive polynomial chaos to perform a sensitivity analysis of a fluidized bed syst
APA, Harvard, Vancouver, ISO, and other styles
4

Guo, Yang, Chisachi Kato, Yoshinobu Yamade, Yutaka Ohta, Taku Iwase, and Ryo Takayama. "Numerical Prediction of Noise From the Internal Flow in a Centrifugal Blower." In ASME/JSME/KSME 2015 Joint Fluids Engineering Conference. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/ajkfluids2015-09194.

Full text
Abstract:
The noise generated from the internal flow in a centrifugal blower was computed by computational aero-acoustics (CAA). The sound sources were obtained by computational fluid dynamics (CFD), using large-eddy simulation (LES) to compute the turbulent flow in the centrifugal blower. The computed sound pressure level (SPL) with sound source from coarse mesh LES is overpredicted, while the computed SPL with sound source from fine mesh LES agrees fairly well with the experimental data. The peak of SPL at blade passing frequency (BPF) of 600 Hz can be somewhat captured by CAA with sound source from f
APA, Harvard, Vancouver, ISO, and other styles
5

Thornton, Jay, Dan Bybell, Bill Donovan, and John McCann. "Color Rendering from CMYK Inks into Film Dyes." In Applied Vision. Optica Publishing Group, 1989. http://dx.doi.org/10.1364/av.1989.fa5.

Full text
Abstract:
It is often difficult to obtain quality hard copy for high resolution (eg. 6000×3000 pixels) digital images. To obtain hard copy, we use a film recorder which writes a fine image raster directly onto Polaroid instant color print film. Our concern that the color in the print be controlled as precisely as possible led to the development of a special purpose color computer. The color computer resides in the film recorder and transforms the input image pixel values into those output exposure control values necessary to attain the desired color on film. This color transformation is done on the fly
APA, Harvard, Vancouver, ISO, and other styles
6

Alharbi, Noha Abdulkhalig M., and Quintin I. Cutts. "An Elaboration of Research Led Computer Science Framework for Early Education." In 2023 IEEE Frontiers in Education Conference (FIE). IEEE, 2023. http://dx.doi.org/10.1109/fie58773.2023.10342646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Thornton, Jay, Jim Burkhardt, Bill Donovan, and John McCann. "High Resolution "Paint by Number"." In Color Appearance. Optica Publishing Group, 1987. http://dx.doi.org/10.1364/ca.1987.tuc3.

Full text
Abstract:
In working with high resolution (eg. 3000x3000 pixels) digital images, hard copy is often a difficult step. In this laboratory, we use a film recorder which writes a high resolution image raster directly onto Polaroid instant color print film. Since our digital images often represent computed responses from a psychophysical color model, we are concerned that the color in the print be controlled as precisely as possible. This concern has led to the development of a special purpose color computer which resides in the film recorder and transforms the input image pixel values into those output exp
APA, Harvard, Vancouver, ISO, and other styles
8

Alo, Richard A., Mohsen Beheshti, John Fernandez, Ann Quiroz Gates, and Desh Ranjan. "Work in progress - peer-led team learning implementation in computer science." In 2007 37th annual frontiers in education conference - global engineering: knowledge without borders, opportunities without passports. IEEE, 2007. http://dx.doi.org/10.1109/fie.2007.4417938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dones, Jaelyn, Fred Martin, Justin Lu, and Foozieh Mir. "Design and Impact of a Near Peer-Led Computer Science Summer Bridge Program." In 2022 IEEE Frontiers in Education Conference (FIE). IEEE, 2022. http://dx.doi.org/10.1109/fie56618.2022.9962588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kotha, Anita, and James E. Harvey. "Image Degradation due to the Opticam Manufacturing Process." In Optical Fabrication and Testing. Optica Publishing Group, 1996. http://dx.doi.org/10.1364/oft.1996.pdp.1.

Full text
Abstract:
The demand for modernizing the precision optics manufacturing industry has led to the development of a new generation of computer controlled precision machining process known as deterministic microgrinding at the Center for Optics Manufacturing (COM) at the University of Rochester in cooperation with the American Precision Manufacturers Association (APOMA). The Opticam (Optics Automation and Management) machine is a closed loop computer-integrated grinding and polishing system that generates and fine grinds blanks to an optical specification and centers to final dimensional requirements. The e
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Lex (Computer file)"

1

DiGrande, Laura, Sue Pedrazzani, Elizabeth Kinyara, et al. Field Interviewer– Administered Dietary Recalls in Participants’ Homes: A Feasibility Study Using the US Department of Agriculture’s Automated Multiple-Pass Method. RTI Press, 2021. http://dx.doi.org/10.3768/rtipress.2021.mr.0045.2105.

Full text
Abstract:
Objective: The purpose of this study was to assess the feasibility of administering the Automated Multiple-Pass Method (AMPM), a widely used tool for collecting 24-hour dietary recalls, in participants’ homes by field interviewers. Design: The design included computer-assisted personal interviews led by either a nutritionist (standard) or field interviewer. Portion estimators tested were a set of three-dimensional food models (standard), a two-dimensional food model booklet, or a tablet with digital images rendered via augmented reality. Setting: Residences in central North Carolina. Participa
APA, Harvard, Vancouver, ISO, and other styles
2

Mazzoni, Silvia, Nicholas Gregor, Linda Al Atik, Yousef Bozorgnia, David Welch, and Gregory Deierlein. Probabilistic Seismic Hazard Analysis and Selecting and Scaling of Ground-Motion Records (PEER-CEA Project). Pacific Earthquake Engineering Research Center, University of California, Berkeley, CA, 2020. http://dx.doi.org/10.55461/zjdn7385.

Full text
Abstract:
This report is one of a series of reports documenting the methods and findings of a multi-year, multi-disciplinary project coordinated by the Pacific Earthquake Engineering Research Center (PEER) and funded by the California Earthquake Authority (CEA). The overall project is titled “Quantifying the Performance of Retrofit of Cripple Walls and Sill Anchorage in Single-Family Wood-Frame Buildings,” henceforth referred to as the “PEER–CEA Project.” The overall objective of the PEER–CEA Project is to provide scientifically based information (e.g., testing, analysis, and resulting loss models) that
APA, Harvard, Vancouver, ISO, and other styles
3

L'Estampe en France: Thirty-Four Young Printmakers. Inter-American Development Bank, 1999. http://dx.doi.org/10.18235/0006415.

Full text
Abstract:
Forty-five limited edition prints (primarily etching and engraving, but also lithography, silkscreen, and computer-generated images, among others) by French printmakers under forty years of age. Through the Association Française d¿Action Artistique (AFAA) and L¿Association Les Ateliers, an association of Parisian printmaking workshops, the Center brought contemporary works by master printers whose work represents an extraordinary diversity of vision. The exhibition was organized in honor of Paris, France, site of the 40th Annual Meeting of the IDB Board of Governors in March, 1999, and later i
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!