6 Command Line Arguments

ثبت نشده
چکیده

bered that EUPHORIA is part of a distributed system; if the EUPHORIA module monopolizes the CPU, external modules will run slower which, in turn, will make EUPHORIA run slowly. Also, if other modules update their variables repeatedly at a rate faster than the update rate of EUPHORIA, time is still spent dealing with the intermediate values of the variables even though the values may be " skipped over ". External modules should utilize Playground's PGsleep [4] to adjust their speed to a reasonable rate, and should avoid resending redundant information. Q: I'm updating the position of an object on the screen from an external module. Why does the object " hop " , first moving on the x-axis and then on the y-axis? A: The problem is that the external module should be using Playground's atomic step mechanism [4]. This ensures that changes to the x coordinate and the y coordinate occur together. Another way to make drawing more efficient is to have all changes for an iteration within an atomic step, eliminating redundant drawing.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Parse Your Options

We describe the development of a couple of combinators which can be used to run applicative style parsers in an interleaved way. In the presentation we advocate a scheme for choosing identifier names which clearly shows the types of the values involved, and how to compose them into the desired result. We finish with describing how the combinators can be used to parse command line arguments and ...

متن کامل

Masquerade Detection Using Enriched Command Lines

A masquerade attack, in which one user impersonates another, is among the most serious forms of computer abuse, largely because such attacks are often mounted by insiders, and can be very difficult to detect. Automatic discovery of masqueraders is sometimes undertaken by detecting significant departures from normal user behavior, as represented by user profiles based on users’ command histories...

متن کامل

Lempel-Ziv Jaccard Distance, an Effective Alternative to Ssdeep and Sdhash

Recent work has proposed the Lempel-Ziv Jaccard Distance (LZJD) as a method to measure the similarity between binary byte sequences for malware classification. We propose and test LZJD’s effectiveness as a similarity digest hash for digital forensics. To do so we develop a high performance Java implementation with the same command-line arguments as sdhash, making it easy to integrate into exist...

متن کامل

SPANG: A Command-line Client Supporting Query Generation for Distributed SPARQL Endpoints

An increasing number of biological databases have been made available in the form of RDF that are accessible through SPARQL endpoints. These endpoints offer a valuable opportunity to utilize the RDF datasets as integrative databases. However, writing a SPARQL query often becomes a burden for biologists; thus, an easy-to-use querying tool for the SPARQL endpoints is necessary. Here, we developed...

متن کامل

Loftis • Germ-line Enhancement of Humans and Nonhumans

The current difference in attitude toward germ-line enhancement in humans and nonhumans is unjustified. Society should be more cautious in modifying the genes of nonhumans and more bold in thinking about modifying our own genome. I identify four classes of arguments pertaining to germ-line enhancement: safety arguments, justice arguments, trust arguments, and naturalness arguments. The first th...

متن کامل

Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract)

\Zero-knowledge arguments" is a fundamental cryptographic primitive which allows one polynomial-time player to convince another polynomial-time player of the validity of an NP statement, without revealing any additional information in the information-theoretic sense. Despite their practical and theoretical importance, it was only known how to implement zero-knowledge arguments based on speci c ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995