نتایج جستجو برای: lisp
تعداد نتایج: 3359 فیلتر نتایج به سال:
There is an increasing drive to provide improved levels of trust within Internet-of-Things (IoTs) environments, but the devices and sensors used tend be limited in their capabilities for dealing with traditional cryptography methods. Resource constraints security are often two major concerns IIoT (Industrial IoT applications big data generation at present time. The strict measures not significa...
A package of Lisp functions is described which implements a simple multi-level simulation toolkit, MLS. Its design owes a great deal to MIMOSE. MLS runs within Lisp-Stat. It offers a set of functions, macros and objects designed to make the specification of multi-level models straightforward and easy to understand. Lisp-Stat provides a Lisp environment, statistical functions and easy to use gra...
The Common Lisp Object System is an object-oriented system that is based on the concepts of generic functions, multiple inheritance, and method combination. All objects in the Object System are instances of classes that form an extension to the Common Lisp type system. The Common Lisp Object System is based on a meta-object protocol that renders it possible to alter the fundamental structure of...
Kawa started as a Scheme implementation written in Java, based on compiling Scheme forms to Java byte-codes. It has developed into a powerful Scheme dialect whose strengths include speed and easy access to Java classes. It is Free Software that some companies depend on. The Kawa compiler and run-time environment have been generalized to implement other languages besides Scheme, both in the Lisp...
We present the information-theoretic incompleteness theorems that arise in a theory of program-size complexity based on something close to real LISP. The complexity of a formal axiomatic system is defined to be the minimum size in characters of a LISP definition of the proofchecking function associated with the formal system. Using this concrete and easy to understand definition, we show (a) th...
The present document sketches an optional approach to provide inpacket information about EID-to-RLOC mappings used to encapsulate LISP data packets. The proposed approach is based on associating a version number to EID-to-RLOC mappings and transport such a version number in the LISP specific header of LISP-encapsulated packets. This versioning approach is particularly useful to inform communica...
Simple Network Management Protocol (SNMP) is widely used for management of Internet-based network today. In Lisp community, there’re large Lisp-based applications which may need be monitored, and there’re Lispers who may need to monitor other remote systems which are either Lisp-based or not. However, the relationship between Lisp and SNMP haven’t been studied enough during past 20 years. The C...
Lisp, invented in 1958 by John McCarthy, revolutionized how programs could be written and expressed. Instead of giving explicit instructions to a computer, Lisp expressed programs as logical operations and functions. Lisp was the first language to incorporate modern language features including: garbage collection, conditionals, first class functions, and recursion. Also, in 1994 Common Lisp bec...
Lisp has done quite well over the last ten years: becoming nearly standardized, forming the basis of a commercial sector, achieving excellent performance, having good environments, able to deliver applications. Yet the Lisp community has failed to do as well as it could have. In this paper I look at the successes, the failures, and what to do next. The Lisp world is in great shape: Ten years ag...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید