منابع مشابه
The GIPSY Architecture
Intensional Programming involves the programming of expressions placed in an inherent multidimensional context space. It is an emerging and highly dynamic domain of general application. The fast growing computer connectivity allows for more and more efficient implementation of distributed applications. The paradigm of intensionality inherently includes notions of parallelism at different levels...
متن کاملGIPSY ( Georeferenced Information Processing SYstem )
In current information retrieval systems, geographically-based searches such as "Find me all documents whose content pertains to location X" are not supported directly by indexing, query, and display functions. Instead, these searches at best exist only as side-effects of keyword indexing. Because of problems relating to ambiguity, synonymy, and other linguistic phenomena, the use of keyword in...
متن کاملGipsy: Knowledge Based Surface Inspection
Despite of a great demand of automatic image analysis systems in the production industry, the spread of installed systems is still limited. Reasons for this are, among others, the high requirements of image analysis systems with respect to computational effort and accuracy, the high engineering effort for the development of image analysis applications, and thus high investment costs for image a...
متن کاملGoogle Scholar as a new source for citation analysis
Traditionally, the most commonly used source of bibliometric data is Thomson ISI Web of Knowledge, in particular the Web of Science and the Journal Citation Reports (JCR), which provide the yearly Journal Impact Factors (JIF). This paper presents an alternative source of data (Google Scholar, GS) as well as 3 alternatives to the JIF to assess journal impact (h-index, g-index and the number of c...
متن کاملTowards Refactoring DMARF and GIPSY OSS
ion thereby addressing the problem of complexity. These aspects are realized by defining ASSL in multiple tiers, which are the AS tier, the ASIP tier and the AE tier.[1] In the process of making DMARF autonomous with ASSL, for each distributed node a single AE that introduces an autonomic behavior at that node is specified. The novelty in this approach is to safeguard the pipeline which is not ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Iowa Review
سال: 2008
ISSN: 0021-065X,2330-0361
DOI: 10.17077/0021-065x.6436