No abstract available.
How to write an APL utility function
In today's business climate, reusable code is essential. But many programmers often don't use existing utility functions because they find them difficult to use or not general enough. Also, they may not know that such functions exist. Instead, ...
War on the workspace!: supporting continuously changing commercial software using a relational database
We describe a relatively simple but effective set of techniques that is used to support a commercial computer application maintained by several developers and used by several thousand businesses. The techniques allow for complete control over a system ...
Data transfer between Java Applets and legacy APL systems
The rise of Internet technologies (particularly Java) provides many benefits for the development and deployment of user interfaces. In many cases, however, the back end system is behind the times: Internet hostile, no object orientation, etc. How can ...
A constructive algorithm for neural networks that generalize
APL functions were designed to describe a constructive algorithm that synthesizes a neural network while optimizing its ability to generalize. Algorithms are implemented in programs to discover networks of binary weights that assign unfamiliar, high-...
The computer construction of weaving designs
Weaving is the art of forming a fabric by interlacing threads at right angles and is performed on a frame called a loom. The threads at right angles to the weaver are the warp threads, and the threads parallel to the weaver and which are inserted ...
Interactive design of structures: a program for everyone
In this paper we present a program for the design and analysis of planar member frame structures. The intuitive graphic user interface covers all steps necessary for designing a load bearing structure, from geometry design to system optimization.This ...
Index Terms
- Proceedings of the conference on Share knowledge share success
Recommendations
Ideal Secret Sharing Schemes with Share Selectability
Information and Communications SecurityAbstractIn this paper, we investigate a new concept, called share selectable secret sharing, where no unauthorized set can obtain information of the secret (in the information-theoretic sense) even if shares are selectable as arbitrary values which are ...