We describe a. new approach to implementing functions as first class values. Using this technique, there is no additional overhead imposed for the most common case, that of non-nested functions bound at compile time. Invoking function values assigned to variables requires two additional instructions. It is only when functions are...
(Brandt) were surveyed for the presence of polyploid cells.
Large polyploid cells were found in the hepatic cecum, gut
and sheath of the testis.
The relative DNA content of the polyploid nuclei was
measured by means of two wavelength cytophotometry. Histograms
plotted from the data provide information on the level...
The purpose of this study was to determine the effect of theological
education on philosophy of human nature among Sunday school teachers in
the Church of the Nazarene. Research materials consisted of Wrightsman's
Philosophy of Human Nature scale and a demographic questionnaire
constructed by the researcher. These materials were mailed...
Proxy Pipe is designed to be a bus in the transport layer of the communication between the two different processes. Its major function is to transfer bytes. When the client process tries to send a command to the server process, it will talk to a proxy as if it were...
A sucrose density-gradient ultracentrifugation technique for
obtaining microsomes has been developed. This technique has
advantages over the classic differential centrifugation technique, in
that it is faster, is better suited to work with small quantities of
tissue, and offers the opportunity to work with a defined microsomal
sub-cellular fraction, rather than...
Cryptographic systems are used for secure communications in the government, in industry, and by individuals. Many cryptographic systems base their security on our inability to factor quickly. For this reason, in the last few decades several fast factoring algorithms have been developed. The Quadratic Sieve is one of the best...
A basic tradeoff to consider when designing a distributed data-mining framework is the need for a compromise between the cost of communication and computation resources and the accuracy of the mining results. This is essentially a decision of whether it is more efficient to communicate all of the data to...
Multiparadigm languages are languages that are designed to support more than one style of programming. Leda is a strongly-typed multiparadigm programming language that supports imperative, functional, object-oriented, and logic programming. The constraint programming paradigm is a declarative style of programming where the programmer is able to state relationships among some...
Remote Event Listener(REL) is designed to glue remote events and remote listeners dynamically, and dispatch remote events efficiently and transparently
for distributed object-oriented systems. Components can be independently developed and remotely interconnected with REL, and software reusability can
be improved. Remote Event Listener along with Remote Method Invocation
makes distributed...