In some instances it is necessary to draw partial circles or arcs and at other times complete circles are required. An algorithm is presented that draws complete circles accurately and quickly and is relatively simple...
详细信息
In some instances it is necessary to draw partial circles or arcs and at other times complete circles are required. An algorithm is presented that draws complete circles accurately and quickly and is relatively simple to program. The routine is written for IBM Personal computer using IBM's Macro Assembler, and can be implemented as an IBM Pascal procedure.
The article discusses the importance of using integrated instrument alarms in the testing process for automobile devices. It outlines the quality screening tests to be performed for the detection of potential failures...
详细信息
The article discusses the importance of using integrated instrument alarms in the testing process for automobile devices. It outlines the quality screening tests to be performed for the detection of potential failures in automotive components, which include semiconductor test and stress test. It discusses the benefits of using these alarms while performing such tests, which include voltage level detection and removal of programming errors.
Sabine is a practical example where Quebec's software designers have taken advantage of the possibilities of a PDP 11/40 minicomputer by a complete rewriting of the operating system and equipment drivers for a spe...
详细信息
Sabine is a practical example where Quebec's software designers have taken advantage of the possibilities of a PDP 11/40 minicomputer by a complete rewriting of the operating system and equipment drivers for a specific usage, a system for the on-line creation and consultation of bibliographic data bases simultaneously by many users. A description of the systems and its basic concepts is given. Reasons which make this software a useful and very performing tool are discussed.
This paper presents an algorithm for solving an extreme point complementary programming problem. The algorithm is of dual type as feasibility and optimality are achieved simultaneously. An example has been added to il...
详细信息
This paper presents an algorithm for solving an extreme point complementary programming problem. The algorithm is of dual type as feasibility and optimality are achieved simultaneously. An example has been added to illustrate the algorithm.
The objective of this paper is to develop a general approach to determine the optimal motion programs at the joints of a robot in order to perform a task between given work stations. The optimal joint motion programs ...
详细信息
The objective of this paper is to develop a general approach to determine the optimal motion programs at the joints of a robot in order to perform a task between given work stations. The optimal joint motion programs are determined by minimizing the joint torque values. The results obtained by this technique are compared with some of the standard motion programs used in industries.
作者:
GIERE, RNUNIV MINNESOTA
CTR PHILOSOPHY SCI315 FORD HALL224 CHURCH ST SEMINNEAPOLISMN 55455 USA
The article presents the author's response to comments of sociologist Peter Slezak on the symposium on 'computer Discovery and the Sociology of Scientific Knowledge,' published in the February 1991 issue o...
详细信息
The article presents the author's response to comments of sociologist Peter Slezak on the symposium on 'computer Discovery and the Sociology of Scientific Knowledge,' published in the February 1991 issue of the journal 'Social Studies of Science.' Peter Slezak argued that the existence of programmed computers capable of making scientific discoveries provides an empirical refutation of the strong programme in the sociology of scientific knowledge. Scientific discoveries is to some extent shaped by human interests. If computers have no human interests but nevertheless make genuine scientific discoveries, this minimal claim would be refuted. In his review of this debate, Herbert Simon points out that the human brain is also a syntactic engine. Semantics, he says, following two researchers, is just a correspondence between symbols and encoded perceptual inputs. So there is no theoretical reason why the needed semantics cannot be built into a computer as well. Even granting Simon's understanding of semantics, Slezak's claim to an empirical refutation of the strong programme remains doubtful. In all the cases Slezak cites, the semantics have in fact been taken over from a scientific community whose members would have acquired the postulated correspondences through a social process of training and professionalization.
This paper is an initial progress report on the development of an interactive system for verifying that computer programs meet given formal specifications. The system is based on the conventional inductive assertion m...
详细信息
This paper is an initial progress report on the development of an interactive system for verifying that computer programs meet given formal specifications. The system is based on the conventional inductive assertion method: given a program and its specifications, the object is to generate the verification conditions, simplify them, and prove what remains. The important feature of the system is that the human user has the opportunity and obligation to help actively in the simplifying and proving. A general description is given of the overall design philosophy, structure, and functional components of the system, and a simple sorting program is used to illustrate both the behavior of major system components and the type of user interaction the system provides.
AbstractThe increased sophistication of today鈥檚 computing environment has produced many benefits 鈥� better performance, considerably more sophisticated graphics and functionality, greater reliability, and others. A...
详细信息
AbstractThe increased sophistication of today鈥檚 computing environment has produced many benefits 鈥� better performance, considerably more sophisticated graphics and functionality, greater reliability, and others. At the same time, however, something insidious is occurring. Spyware and adware programs are being deliberately included with other legitimate software packages to deliver functionality that users do not want or need.
暂无评论