Carolyne Wright as "Scholar Gipsy"

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The GIPSY Architecture

Intensional Programming involves the programming of expressions placed in an inherent multidimensional context space. It is an emerging and highly dynamic domain of general application. The fast growing computer connectivity allows for more and more efficient implementation of distributed applications. The paradigm of intensionality inherently includes notions of parallelism at different levels...

متن کامل

GIPSY ( Georeferenced Information Processing SYstem )

In current information retrieval systems, geographically-based searches such as "Find me all documents whose content pertains to location X" are not supported directly by indexing, query, and display functions. Instead, these searches at best exist only as side-effects of keyword indexing. Because of problems relating to ambiguity, synonymy, and other linguistic phenomena, the use of keyword in...

متن کامل

Gipsy: Knowledge Based Surface Inspection

Despite of a great demand of automatic image analysis systems in the production industry, the spread of installed systems is still limited. Reasons for this are, among others, the high requirements of image analysis systems with respect to computational effort and accuracy, the high engineering effort for the development of image analysis applications, and thus high investment costs for image a...

متن کامل

Google Scholar as a new source for citation analysis

Traditionally, the most commonly used source of bibliometric data is Thomson ISI Web of Knowledge, in particular the Web of Science and the Journal Citation Reports (JCR), which provide the yearly Journal Impact Factors (JIF). This paper presents an alternative source of data (Google Scholar, GS) as well as 3 alternatives to the JIF to assess journal impact (h-index, g-index and the number of c...

متن کامل

Towards Refactoring DMARF and GIPSY OSS

ion thereby addressing the problem of complexity. These aspects are realized by defining ASSL in multiple tiers, which are the AS tier, the ASIP tier and the AE tier.[1] In the process of making DMARF autonomous with ASSL, for each distributed node a single AE that introduces an autonomic behavior at that node is specified. The novelty in this approach is to safeguard the pipeline which is not ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Iowa Review

سال: 2008

ISSN: 0021-065X,2330-0361

DOI: 10.17077/0021-065x.6436