Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,786,675 papers from all fields of science
Search
Sign In
Create Free Account
Variable shadowing
Known as:
Shadowing
In computer programming, variable shadowing occurs when a variable declared within a certain scope (decision block, method, or inner class) has the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
ALGOL
Association list
Block (programming)
C++
Expand
Broader (1)
Variable (computer science)
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
ReWiFlow: Restricted Wildcard OpenFlow Rules
S. Shirali-Shahreza
,
Y. Ganjali
CCRV
2015
Corpus ID: 8811893
The ability to manage individual flows is a major benefit of Software-Defined Networking. The overheads of this fine-grained…
Expand
2013
2013
Pauci ex tanto numero: reduce redundancy in multi-model ensembles
E. Solazzo
,
A. Riccio
,
I. Kioutsioukis
,
S. Galmarini
2013
Corpus ID: 54704567
Abstract. We explicitly address the fundamental issue of member diversity in multi-model ensembles. To date, no attempts in this…
Expand
2013
2013
A New Multispectral Method for Face Liveness Detection
Yueyang Wang
,
X. Hao
,
Ya-Li Hou
,
Changqing Guo
2nd IAPR Asian Conference on Pattern Recognition
2013
Corpus ID: 2097322
A face recognition system can be deceived by photos, mimic masks, mannequins and etc. And with the advances in the 3D printing…
Expand
2012
2012
The velocity field of sunspot penumbrae - II. Return flow and magnetic fields of opposite polarity
M. Franz
,
R. Schlichenmaier
2012
Corpus ID: 54172640
Aims. We search for penumbral magnetic fields of opposite polarity and for their correspondence with downflows. Methods. We used…
Expand
2005
2005
Automatic normalization of satellite images using unchanged pixels within urban areas
S. Mohammad Ya’allah
,
M. Reza Saradjian
Information Fusion
2005
Corpus ID: 205431760
Review
2003
Review
2003
Object Classification and Tracking in Video Surveillance
Qi Zang
,
R. Klette
International Conference on Computer Analysis of…
2003
Corpus ID: 11685209
The design of a video surveillance system is directed on automatic identification of events of interest, especially on tracking…
Expand
2001
2001
Simulation-based solution of load-balancing problems in the photolithography area of a semiconductor wafer fabrication facility
L. Mönch
,
Matthias Prause
,
Volker Schmalfuss
Proceeding of the Winter Simulation Conference…
2001
Corpus ID: 15762320
Presents the results of a simulation study for the solution of load-balancing problems in a semiconductor wafer fabrication…
Expand
1996
1996
Linking broken character borders with variable sized masks to improve recognition
A. Whichello
,
Hong Yan
Pattern Recognition
1996
Corpus ID: 1023171
Highly Cited
1972
Highly Cited
1972
Integrated injection logic: a new approach to LSI
C. M. Hart
,
A. Slob
1972
Corpus ID: 62625941
Multicollector transistors fed by carrier injection are used. A simplified (five masks) standard bipolar process is used…
Expand
1970
1970
IC mask layout with a single conductor layer
S. Akers
,
James M. Geyer
,
D. L. Roberts
Design Automation Conference
1970
Corpus ID: 11293984
A computer program for the automatic layout of single conductor layer IC masks is described. Descriptions are included of element…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required