Abstract. Foreign function interfaces are typically organised monolithically, tying together the specification of each foreign function with the mechanism used to make the functio...
We present a new constraint solver over Boolean variables, available as library(clpb)1 in SWI-Prolog. Our solver distinguishes itself from other available CLP(B) solvers by several...
Public institutions are increasingly reliant on data from social media sites to measure public attitude and provide timely public engagement. Such reliance includes the exploratio...
Hemant Purohit, Tanvi Banerjee, Andrew Hampton, Va...
Let n be a positive integer and B be a non-degenerate symmetric bilinear form over Fn q , where q is an odd prime power and Fq is the finite field with q elements. We determine th...
In contrast to the ‘universal’ multizeta shuffle relations, when the chosen infinite place of the function field over Fq is rational, we show that in the non-rational case, o...
In this paper, we present TOM (TOpic Modeling), a Python library for topic modeling and browsing. Its objective is to allow for an efficient analysis of a text corpus from start t...
Happens-before memory model (HMM) is used as the basis of Java memory model (JMM). Although HMM itself is simple, some complex axioms have to be introduced in JMM to prevent the ca...
Text, as one of the most influential inventions of humanity, has played an important role in human life, so far from ancient times. The rich and precise information embodied in te...
In a data center, an IO from an application to distributed storage traverses not only the network, but also several software stages with diverse functionality. This set of ordered...
Ioan A. Stefanovici, Bianca Schroeder, Greg O'Shea...
Traditional file system optimizations typically retain the one-to-one mapping of logical files to their physical metadata representations. This rigid mapping results in missed opp...