Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,168,521 papers from all fields of science
Search
Sign In
Create Free Account
Emerald
Known as:
Emerald (disambiguation)
Emerald is a distributed, object-oriented programming language developed in the 1980s by Andrew P. Black, Norman C. Hutchinson, Eric B. Jul, and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Hank Levy (computer scientist)
History of Programming Languages
Java
Language-based system
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2012
Review
2012
Host population perceptions of the social impacts of sport tourism events in transition countries: Evidence from Croatia
Ljudevit Pranić
,
L. Petrič
,
Liljana Cetinić
2012
Corpus ID: 55845500
Purpose – The purpose of this paper is to empirically investigate residents’ perceptions of social impacts from co‐hosting the…
Expand
2011
2011
Are religious individuals more generous, trusting, and cooperative? An experimental test of the effect of religion on prosociality
Brian M. Paciotti
,
P. Richerson
,
+5 authors
Edward Edsten
2011
Corpus ID: 6269870
We investigated the effect of religion on generosity, interpersonal trust, and cooperation by using games developed by…
Expand
Highly Cited
2007
Highly Cited
2007
Geographic relevance
J. Raper
J. Documentation
2007
Corpus ID: 31070071
Purpose – The purpose of this paper concerns the dimensions of relevance in information retrieval systems and their completeness…
Expand
2004
2004
Extracting value from data - the performance planning value chain
A. Neely
,
Y. Jarrar
Business Process Management Journal
2004
Corpus ID: 206385702
Focuses on the performance planning value chain (PPVC). The PPVC is the latest thinking in the field of Performance Measurement…
Expand
Review
2004
Review
2004
Cyberterrorism, computer crime, and reality
C. Foltz
Information Management & Computer Security
2004
Corpus ID: 206380162
The term cyberterrorism is being used with increasing frequency today. Since widespread concern with cyberterrorism is relatively…
Expand
2003
2003
A multi‐level causal model for best practices in project management
R. Loo
2003
Corpus ID: 168031984
This paper presents a multi‐level causal model for best practices in project management based upon the literature, especially…
Expand
Highly Cited
2003
Highly Cited
2003
Digital redemption of coupons: satisfying and dissatisfying effects of promotion codes
R. Oliver
,
Mikhael Shor
2003
Corpus ID: 15757776
Coupons, in the form of “promotion codes”, are now a mainstay of the online shopping experience, but online coupon redemption…
Expand
1999
1999
The average availability of parallel checkpointing systems and its importance in selecting runtime parameters
J. Plank
,
M. Thomason
Digest of Papers. Twenty-Ninth Annual…
1999
Corpus ID: 9906255
Performance prediction of checkpointing systems in the presence of failures is a well-studied research area. While the literature…
Expand
Highly Cited
1994
Highly Cited
1994
Composing Concurrent Objects
L. Bergmans
1994
Corpus ID: 47574280
Adopting the object-oriented paradigm for the development of large and complex software systems offers several advantages, of…
Expand
1992
1992
An object-oriented refinement calculus with modular reasoning
Barry Mark Utting
1992
Corpus ID: 61202181
In this thesis, the refinement calculus is extended to support a variety of object-oriented programming styles. The late binding…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE