Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,119,083 papers from all fields of science
Search
Sign In
Create Free Account
Closure (computer programming)
Known as:
Function closures
, Closure (Computer Science)
, Closures (computer science)
Expand
In programming languages, closures (also lexical closures or function closures) are techniques for implementing lexically scoped name binding in…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ALGOL
Actor model
Automatic Reference Counting
Automatic variable
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Forecasting Spatiotemporal Impact of Traffic Incidents on Road Networks
Bei Pan
,
Ugur Demiryurek
,
C. Shahabi
,
Chetan Gupta
IEEE 13th International Conference on Data Mining
2013
Corpus ID: 9390606
The advances in sensor technologies enable real-time collection of high-fidelity spatiotemporal data on transportation networks…
Expand
2013
2013
Dual multi-adjoint concept lattices
J. Medina
,
M. Ojeda‐Aciego
Information Sciences
2013
Corpus ID: 15240393
Highly Cited
2011
Highly Cited
2011
Operational forest stream crossings effects on water quality in the Virginia Piedmont
W. Aust
,
Mathew Carroll
,
M. Bolding
,
C. A. Dolloff
2011
Corpus ID: 9917123
10–40%. Many ephemeral and intermittent streams in this landscape have unstable banks because they are recovering erosion gullies…
Expand
2007
2007
Image representations beyond histograms of gradients: The role of Gestalt descriptors
S. Bileschi
,
Lior Wolf
IEEE Conference on Computer Vision and Pattern…
2007
Corpus ID: 9636780
Histograms of orientations and the statistics derived from them have proven to be effective image representations for various…
Expand
Highly Cited
2002
Highly Cited
2002
Fuzzy closure operators II: induced relations, representation, and examples
R. Belohlávek
Soft Computing - A Fusion of Foundations…
2002
Corpus ID: 5233437
Abstract Closure operators (and related structures) are investigated from the point of view of fuzzy set theory. The paper is a…
Expand
1998
1998
Topological Equivalence and Similarity in Multi-Representation Geographic Databases
J. Paiva
1998
Corpus ID: 127931864
Highly Cited
1994
Highly Cited
1994
Constraint satisfaction as a basis for designing nonmasking fault-tolerance
A. Arora
,
M. Gouda
,
G. Varghese
IEEE International Conference on Distributed…
1994
Corpus ID: 3528567
We present a method for the design of nonmasking fault-tolerant programs. In our method, a set of constraints is associated with…
Expand
Highly Cited
1986
Highly Cited
1986
Trellises formed by stable and unstable manifolds in the plane
R. Easton
1986
Corpus ID: 54188642
A trellis is the figure formed by the stable and unstable manifolds of a hyperbolic periodic point of a diSeomorphism of a 2…
Expand
1985
1985
Minimum matrix representation of closure operations
J. Demetrovics
,
Z. Füredi
,
G. Katona
Discrete Applied Mathematics
1985
Corpus ID: 37266303
1957
1957
Structure theory of faithful rings. II. Restricted rings
R. E. Johnson
1957
Corpus ID: 54014299
The first paper of this series(2) concerned itself mainly with closure operations on a lattice. This paper applies these results…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE