Results 101 to 110 of about 7,287,958 (273)

Intro To Regular Expressions

open access: yes, 2018
This slide deck was presented at the Library Carpentry Workshop at SUB Hamburg on Nov 5 2018. Please note: This presentation is incomplete without the oral speech.
openaire   +2 more sources

Using regular expressions to express bowing patterns for string players [PDF]

open access: yes, 2009
The study of bowing is critically important for string players. Traditional bowing annotations are a valuable part of orchestral and individual documentation, but they do not help the performer to search a piece for other passages that should be bowed ...
Hall, C.V., O'Donnell, J.T.
core   +1 more source

On the use of regular expressions for searching text [PDF]

open access: bronze, 1997
Charles L. A. Clarke, Gordon V. Cormack
openalex   +1 more source

Derivatives for Enhanced Regular Expressions [PDF]

open access: yes, 2016
Regular languages are closed under a wealth of formal language operators. Incorporating such operators in regular expressions leads to concise language specifications, but the transformation of such enhanced regular expressions to finite automata becomes more involved.
openaire   +4 more sources

Technology Corner: A Regular Expression Training App

open access: yesJournal of Digital Forensics, Security and Law, 2012
Regular expressions enable digital forensic analysts to find information in files. The best way for an analyst to become proficient in writing regular expressions is to practice.
Nick Flor
doaj  

Covariance and PCA for Categorical Variables

open access: yes, 2007
Covariances from categorical variables are defined using a regular simplex expression for categories. The method follows the variance definition by Gini, and it gives the covariance as a solution of simultaneous equations.
Niitsuma, Hirotaka, Okada, Takashi
core   +1 more source

Highly Parallel Regular Expression Matching Using a Real Processing-in-Memory System

open access: yesIEEE Access
Processing-in-Memory (PIM) is an emerging computing paradigm exploiting a cutting-edge memory device (PIM device) that integrates hundreds to thousands of processing units with the memory modules. A data-intensive application running in a host system can
Jeonghyeon Joo   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy