Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,756 papers from all fields of science
Search
Sign In
Create Free Account
The Art of the Metaobject Protocol
Known as:
AMOP
The Art of the Metaobject Protocol (AMOP) is a 1991 book by Gregor Kiczales, Jim des Rivieres, and Daniel G. Bobrow (all three working for Xerox PARC…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Book
Common Lisp
Daniel G. Bobrow
Generic function
Expand
Broader (1)
Lisp
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
How to determine the handedness of single molecules using Coulomb explosion imaging
M. Pitzer
2017
Corpus ID: 29434060
This tutorial is based on a doctoral thesis that was shortlisted for the 2016 AMOP dissertation prize of the German Physical…
Expand
2016
2016
ANÁLISE DO GÊNERO DISCURSIVO TIRAS EM QUADRINHOS A PARTIR DO MÉTODO SOCIOLÓGICO DE BAKHTIN
Dayse Grassi Bernardon
,
T. Costa-Hübes
,
P. Sella
2016
Corpus ID: 192739444
Amop 14.00 800x600 Working with comic strips in the classroom for teaching languages requires scientific knowledge which are able…
Expand
2015
2015
A descriptor coping with complicated human activities
Zuchun Ding
,
Wenying Mo
IEEE Advanced Information Technology, Electronic…
2015
Corpus ID: 33661833
Human activity discrimination algorithms are concentrated ordinary to upright poses. The algorithms become unsuitable when…
Expand
2009
2009
An Efficient Greedy Algorithm for Sparse Recovery in Noisy Environment
Hao Zhang
,
Gang Li
,
H. Meng
arXiv.org
2009
Corpus ID: 5550561
Greedy algorithm are in widespread use for sparse recovery because of its efficiency. But some evident flaws exi sts in most…
Expand
2008
2008
3JIEKTPOTEXHOJIOrWlECKHECBOHCTBA AMOP<DHOrO rH,ll;POrEHH3HPOBAHHOrOKPEMHHlI, nOJIYqEHHOrO B BbICOKOHOHH30BAHHOHnJIA3ME CBQ r A30BOrO PA3PMA HH3KOrO ,ll;ABJIEHHlI
D. Nefedov
,
V. Shanigin
,
R. Yafarov
2008
Corpus ID: 177295579
2007
2007
Weak Protection for Re ective Operating Systems ( Extended Position Paper )
Shigeru Chiba Takeshi
,
NishimuraKenichi
,
K. Takashi
,
MasudaDepartment
2007
Corpus ID: 18261095
Interface: For ease of use, the interface of the module should provide a higherlevel abstraction and hides implementation details…
Expand
2006
2006
TransVERSE : A case study of re-engineering a mission critical planning tool for HST operations
M. Giuliano
2006
Corpus ID: 9578487
The task of infusing new technology into mission critical systems is often filled with many pitfalls and roadblocks. System…
Expand
Review
2005
Review
2005
Self-Organization in Overlay Networks
S. Apel
,
Klemens Böhm
CAiSE Workshops
2005
Corpus ID: 5514196
Overlay networks are an important kind of P2P infrastructures. The range of applications and requirements is broad. Consequently…
Expand
1997
1997
Operating system extensibility through event capture
T. Pinckney
1997
Corpus ID: 12108902
Empirically, operating systems are inevitably faced with application demands that the operating system cannot adequately handle…
Expand
1993
1993
Gregor Kiczales, Jim des Rivières, and Daniel G. Bobrow, The Art of the Metaobject Protocol
R. Gabriel
Artificial Intelligence
1993
Corpus ID: 35800063
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE