EOL--a symbol manipulation language

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Epsilon Object Language (EOL)

Model-Driven Development requires model management languages and tools for supporting model operations such as editing, consistency checking, and transformation. At the core of these model management techniques is a set of facilities for model navigation and modification. A subset of the Object Constraint Language can be used for some of these tasks, but it has limitations as a general-purpose ...

متن کامل

Mirror notation: symbol manipulation without inscription manipulation

Stereotypically, computation involves intrinsic changes to the medium of representation: writing new symbols, erasing old symbols, turning ears, flipping switches, sliding abacus beads. Perspectival computation leaves the original inscriptions untouched. The problem solver obtains the output by merely alters his orientation toward the input. There is no rewriting or copying of the input inscrip...

متن کامل

Introduction to LISP and symbol manipulation

In this age of modern era, the use of internet must be maximized. Yeah, internet will help us very much not only for important thing but also for daily activities. Many people now, from any level can use internet. The sources of internet connection can also be enjoyed in many places. As one of the benefits is to get the on-line introduction to lisp and symbol manipulation book, as the world win...

متن کامل

Between Symbol and Language-in-use

Indexing is often designed with the intent of dimensional reduction, that is, of generating standardised and uniform descriptive metadata. This could be characterised as a process of decontextualisation. Formal knowledge representation systems typically have the aim of encapsulating granular pieces of information in a reusable manner. The result is a set of information elements with minimal lin...

متن کامل

Detectability of Symbol Manipulation by an Amplify-and-Forward Relay

This paper studies the problem of detecting a potential malicious relay node by a source node that relies on the relay to forward information to other nodes. The channel model of two source nodes simultaneously sending symbols to a relay is considered. The relay is contracted to forward the symbols that it receives back to the sources in the amplify-and-forward manner. However there is a chance...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Computer Journal

سال: 1967

ISSN: 0010-4620,1460-2067

DOI: 10.1093/comjnl/10.1.53