منابع مشابه
Developing metadata-intensive applications with Rondo
The future of the Semantic Web depends on whether or not we succeed to integrate reliably thousands of online applications, services, and databases. These systems are tied together using mediators, mappings, database views, and transformation scripts. Model-management aims at reducing the amount of programming needed for the development of such integrated applications. We present a first comple...
متن کاملTowards Variational Object-Oriented Programming: The Rondo Model
This paper presents a proposal to improve the standard object-oriented programming model with respect to supporting a larger range of incremental behavior variations. It will be demonstrated that classes and inheritance perfectly support the incremental modeling of diierent variants of a base abstract data type, but they do not properly model what we call context-dependent variations. These beh...
متن کاملNeural Correlates of Phrase Rhythm: An EEG Study of Bipartite vs. Rondo Sonata Form
This paper introduces the neural correlates of phrase rhythm. In short, phrase rhythm is the rhythmic aspect of phrase construction and the relationships between phrases. For the sake of establishing the neural correlates, a musical experiment has been designed to induce music-evoked stimuli related to phrase rhythm. Brain activity is monitored through electroencephalography (EEG) by using a br...
متن کاملNitroglycerin and Nitric Oxide--A Rondo of Themes in Cardiovascular Therapeutics.
The rondo is a musical form in which a single recurrent theme alternates with different melodic motifs that are each distinct from one another. The recurrent theme is typically repeated multiple times, providing both the overall unity for the musical movement and a familiar musical destination to which the piece returns after the presentation of distinct interspersed themes. The parallels betwe...
متن کاملCode Obfuscation using Code Splitting with Self-modifying Code
Code Obfuscation is a protection technique that transforms the software into a semantically equivalent one which is strenuous to reverse engineer. As a part of software protection and security, code obfuscation got commercial interest from both vendors’ side to keep their proprietary as secret and customers’ side to have a trusted software that don’t leek or destroy their personal information. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 2013
ISSN: 0028-0836,1476-4687
DOI: 10.1038/498132a