Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,331,513 papers from all fields of science
Search
Sign In
Create Free Account
Lazy evaluation
Known as:
Lazy evalution
, Lazy eval
, Infinite lists
Expand
In programming language theory, lazy evaluation, or call-by-need is an evaluation strategy which delays the evaluation of an expression until its…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
APL
Active updating
Apache Spark
Categorical abstract machine
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Modeling and evaluation of trust in cloud computing environments
Qiang Guo
,
Dawei Sun
,
G. Chang
,
Lina Sun
,
Xingwei Wang
American Control Conference
2011
Corpus ID: 16594152
Today, one of the most important factors for the success of cloud computing is to create trust and security. Cloud computing will…
Expand
Highly Cited
2007
Highly Cited
2007
Instace-Based AMN Classification for Improved Object Recognition in 2D and 3D Laser Range Data
Rudolph Triebel
,
Richard Schmidt
,
Óscar Martínez Mozos
,
Wolfram Burgard
International Joint Conference on Artificial…
2007
Corpus ID: 1973951
In this paper, we present an algorithm to identify different types of objects from 2D and 3D laser range data. Our method is a…
Expand
Review
2007
Review
2007
Supporting Generic Sketching-Based Input of Diagrams in a Domain-Specific Visual Language Meta-Tool
J. Grundy
,
J. Hosking
International Conference on Software Engineering
2007
Corpus ID: 10441498
Software engineers often use hand-drawn diagrams as preliminary design artefacts and as annotations during reviews. We describe…
Expand
2005
2005
REDMAN: a decentralized middleware solution for cooperative replication in dense MANETs
P. Bellavista
,
Antonio Corradi
,
Eugenio Magistretti
Third IEEE International Conference on Pervasive…
2005
Corpus ID: 15712205
The mass market of wireless devices is pushing towards service provisioning over dense mobile ad-hoc networks (MANETs), i.e…
Expand
Highly Cited
2004
Highly Cited
2004
Duplicate Data Elimination in a SAN File System
Bo Hong
,
D. Plantenberg
,
D. Long
,
M. Sivan-Zimet
IEEE Conference on Mass Storage Systems and…
2004
Corpus ID: 12290109
Duplicate Data Elimination (DDE) is our method for identifying and coalescing identical data blocks in Storage Tank, a SAN file…
Expand
Highly Cited
2003
Highly Cited
2003
Strategies for Information Systems Evaluation : Six Generic Types
Stefan Cronholm
,
G. Goldkuhl
2003
Corpus ID: 11529140
The aim of this paper is to contribute to the decision of how to perform evaluation depending on the evaluation context. Three…
Expand
1989
1989
A lazy cache algorithm
Y. Afek
,
Geoffrey M. Brown
,
Michael Merritt
ACM Symposium on Parallelism in Algorithms and…
1989
Corpus ID: 1244668
This paper examines cache consistency conditions (safety conditions) for multiprocessor shared memory systems. It states and…
Expand
Highly Cited
1987
Highly Cited
1987
The lazy, adaptable lions: a Markovian model of group foraging
C. Clark
Animal Behaviour
1987
Corpus ID: 53172831
Highly Cited
1985
Highly Cited
1985
The humiliation of the word
J. Ellul
1985
Corpus ID: 144606847
Argues that visual reality has overcome verbal truth, examines the biblical distinction between truth and reality, and considers…
Expand
Highly Cited
1978
Highly Cited
1978
A Quantitative Study of the Orientation Bias of Some Edge Detector Schemes
E. Deutsch
,
J. Fram
IEEE transactions on computers
1978
Corpus ID: 33056281
Further work on the evaluation of a particular set of edge detection schemes is described. The orientational bias of these…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE