scispace - formally typeset
Search or ask a question
Topic

Object (computer science)

About: Object (computer science) is a research topic. Over the lifetime, 106024 publications have been published within this topic receiving 1360115 citations. The topic is also known as: obj & Rq.


Papers
More filters
Patent
26 Jun 1995
TL;DR: In this article, the link manager records these associations in a mapping file, which is used by the application to translate the request to the database format, converting values of parameters of GUI objects to input values of a database operation as defined by the mapping file.
Abstract: To provide an interface between a computer application and a database, a user invokes the application and another program, called "link manager". The user "drags and drops" GUI objects from the application window to the link manager window to command the link manager to associate parameters of the GUI objects (e.g., object names) with input and output fields of database operations. The link manager records these associations in a mapping file. When later the application is executed, a program, called "execution manager", reads the mapping file. When the application issues a request to the database, the execution manager uses the mapping file to translate the request to the database format, converting values of parameters of GUI objects to input values of a database operation as defined by the mapping file. The execution manager translates the database response to the application format, converting output values of the response to values of application GUI parameters as defined by the mapping file.

221 citations

Journal ArticleDOI
TL;DR: The results support a shared-resource model of working memory, in which increasing memory load incrementally degrades storage of visual information, reducing the fidelity with which both object features and feature bindings are maintained.

221 citations

Patent
05 Jun 2002
TL;DR: In this paper, the authentication information is made from information in one portion of the digital representation and incorporated into another portion of digital representation that does not overlap the first portion, where the two portions must further be non-overlapping in the analog form.
Abstract: Techniques for incorporating authentication information into digital representations of objects and using the authentication information to authenticate the objects. The authentication information may be made from information in one portion of the digital representation and incorporated into another portion of the digital representation that does not overlap the first portion. Where the digital representation is made into an analog form and that in turn is made into a digital representation and the second digital representation is verified, the two portions must further be non-overlapping in the analog form. The information from which the authentication information is made may exist at many levels: representations of physical effects produced by the object, representations of features of the object, codes that represent the object's contents, and representations of descriptions of the object. Also disclosed are a verification server and techniques for reducing errors by an OCR. The verification server verifies authenticated documents. When a document is verified, an identifier is associated with the document and the identifier is used to locate a key for the authentication information and in some cases a second copy of the authentication information. The verification process may also involve security patterns that are a physical part of the analog form. The error reduction techniques include an error code specifying characters in the object that are confusing to OCR devices, and the error code is used to correct the results of an OCR reading of an analog form.

221 citations

Patent
Dale R. Olds1
20 Mar 1997
TL;DR: In this article, an access constraint propagator reads an access control property of an ancestor of a target object and enforces the inheritable access constraint by applying it to at least the target object.
Abstract: Methods and systems are provided for controlling access to objects in a hierarchical database. The database may include a directory services repository, and/or synchronized partitions. An access constraint propagator reads an access control property of an ancestor of a target object. The access control property designates an inheritable access constraint such as an object class filter or an "inheritable" flag. The object class filter restricts a grant of rights to objects of an identified class. The "inheritable" flag allows inheritance of an access constraint on a specific object property. The propagator enforces the inheritable access constraint by applying it to at least the target object.

221 citations

Journal ArticleDOI
TL;DR: This paper presents a meta-modelling framework that automates the very labor-intensive and therefore time-heavy and expensive process of manually cataloging and cataloging individual objects in a scene.
Abstract: THE SCHEMA SYSTEM EMBODIES A KNOWLEDGE-BASED APPROACH TO SCENE INTERPRE- TATION. LOW-LEVEL ROUTINES ARE APPLIED TO EXTRACT IMAGE DESCRIPTORS CALLED TOKENS, AND THESE TOKENS ARE FURTHER ORGANIZED BY INTERMEDIATE-LEVEL ROUT- INES INTO MORE ABSTRACT STRUCTURES THAT CAN BE ASSOCIATED WITH OBJECT INST- ANCES. THE THOUSANDS OF TOKENS THAT ARE EXTRACTED FROM AN IMAGE CAN BE GROUPED IN A COMBINATORIALLY EXPLOSIVE MANNER. THEREFORE, KNOWLEDGE IN THE SCHEMA SYSTEM IS NOT LIMITED TO THE DESCRIPTIONS OF OBJECTS; IT INCLUDES INFORMATION ABOUT HOW EACH OBJECT CAN BE RECOGNIZED. OBJECT SCHEMAS CONTROL THE INVOCATION AND EXECUTION OF THE LOW-LEVEL AND INTERMEDIATE-LEVEL ROUT- INES WITH THE GOAL OF FORMING HYPOTHESES ABOUT OBJECTS IN THE SCENE. THE SYSTEM DESCRIBED PRODUCES IMAGE INTERPRETATIONS BASED ON TWO-DIMENSIONAL REASONING, ALTHOUGH NOTHING IN THE SYSTEM ORGANIZATION AND CONTROL STRATEG- IES PRECLUDE THE INCLUSION OF THREE-DIMENSIONAL INFORMATION. THE SCHEMA FRAMEWORK EXPLOITS COARSE-GRAINED PARALLELISM IN A COOPERA- TIVE INTERPRETATION PROCESS. SCHEMA INSTANCES RUN CONCURRENTLY, AND AN OB- JECT SCHEMA OFTEN HAS AVAILABLE A VARIETY OF STRATEGIES FOR IDENTIFICATION, EACH ONE INVOKING KNOWLEDGE SOURCES TO GATHER SUPPORT FOR THE PRESENCE OF A HYPOTHESIZED OBJECT. INTER-SCHEMA COMMUNICATION IS CARRIED OUT ASYNCHRON- OUSLY THROUGH A GLOBAL BLACKBOARD. IN THIS WAY SCHEMA INSTANCES COOPERATE TO IDENTIFY AND LOCATE THE SIGNIFICANT OBJECTS PRESENT IN THE SCENE.

221 citations


Network Information
Related Topics (5)
Query optimization
17.6K papers, 474.4K citations
84% related
Programming paradigm
18.7K papers, 467.9K citations
84% related
Software development
73.8K papers, 1.4M citations
83% related
Compiler
26.3K papers, 578.5K citations
83% related
Software system
50.7K papers, 935K citations
82% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202238
20213,087
20205,900
20196,540
20185,940
20175,046