9,950 research outputs found
Auditing with computers; Auditing procedure study;
https://egrove.olemiss.edu/aicpa_guides/1038/thumbnail.jp
Computers and Local Government: Low Cost Information Processing Technologies and Strategies for Local Governments: A Handbook for Workshop Participants
This training program was developed as part of a Department of Health, Education, and Welfare (HEW) grant, under the Higher Education Act of 1965, Title I-A, Community Service and Continuing Education, as amended, to the University of Georgia, Institute of Government (IG) and Institute of Community and Area Development (ICAD), in partnership with the International City Management Association (ICMA)
Signature file access methodologies for text retrieval: a literature review with additional test cases
Signature files are extremely compressed versions of text files which can be used as access or index files to facilitate searching documents for text strings. These access files, or signatures, are generated by storing hashed codes for individual words. Given the possible generation of similar codes in the hashing or storing process, the primary concern in researching signature files is to determine the accuracy of retrieving information. Inaccuracy is always represented by the false signaling of the presence of a text string. Two suggested ways to alter false drop rates are: 1) to determine if either of the two methologies for storing hashed codes, by superimposing them or by concatenating them, is more efficient; and 2) to determine if a particular hashing algorithm has any impact. To assess these issues, the history of suprimposed coding is traced from its development as a tool for compressing information onto punched cards in the 1950s to its incorporation into proposed signature file methodologies in the mid-1980\u27 s. Likewise, the concept of compressing individual words by various algorithms, or by hashing them is traced through the research literature. Following this literature review, benchmark trials are performed using both superimposed and concatenated methodologies while varying hashing algorithms. It is determined that while one combination of hashing algorithm and storage methodology is better, all signature file mehods can be considered viable
Wronskian Solution for AdS/CFT Y-system
Using the discrete Hirota integrability we find the general solution of the
full quantum Y-system for the spectrum of anomalous dimensions of operators in
the planar AdS5/CFT4 correspondence in terms of Wronskian-like determinants
parameterized by a finite number of Baxter's Q-functions. We consider it as a
useful step towards the construction of a finite system of non-linear integral
equations (FiNLIE) for the full spectrum. The explicit asymptotic form of all
the Q-functions for the large size operators is presented. We establish the
symmetries and the analyticity properties of the asymptotic Q-functions and
discuss their possible generalization to any finite size operators.Comment: 31 pages, 4 figures, 1 attached mathematica fil
Application of remote sensing to state and regional problems
There are no author-identified significant results in this report
Celescope catalog of ultraviolet stellar observations. Magnetic tape version
Observational results obtained by the celescope experiment during the first 16 months of operation of NASA's Orbiting Astronomical Observatory are presented. Results of the stellar observations are listed along with selected ground-based information obtained from the available literature
The Global Artificial Intelligence Revolution Challenges Patent Eligibility Laws
This Article examines patent eligibility jurisprudence of artificial intelligence in the United States, Europe, France, Japan, and Singapore. It identifies de facto requirements of patent-eligible artificial intelligence. It also examines the adaptability of patent eligibility jurisprudence to adapt with the growth of artificial intelligence
- …