Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Write-only documentation

Known as: Write-only 
Write-only documentation (WOD) is a tongue-in-cheek term for documentation that is written to satisfy a process but never read subsequent to its… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Due to poor cache utilization and latching contention, the B-tree like structures, which have been heavily used in traditional… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2017
2017
Abstract Sensitive information is present on our phones, disks, watches and computers. Its protection is essential. Plausible… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
2016
2016
  • Lichun Li, A. Datta
  • International Journal of Information Security
  • 2016
  • Corpus ID: 9787276
Data outsourcing is plagued with several security and privacy concerns. Oblivious RAM (ORAM) can be used to address one of the… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2013
Highly Cited
2013
We propose a deterministic model for associating costs with strings that is parameterized by operations of interest (such as… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2013
Highly Cited
2013
We present the first scalable, geo-replicated storage system that guarantees low latency, offers a rich data model, and provides… Expand
  • table 1
  • figure 2
  • figure 1
  • figure 3
  • figure 4
Is this relevant?
2009
2009
Content addressable memory (CAM) is widely used and its tests mostly use functional fault models. However, functional fault… Expand
  • figure 1
  • figure 2
  • table 3
  • table 2
  • table 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Computational science is paramount to the understanding of underlying processes in internal combustion engines of the future that… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1995
Highly Cited
1995
We study the performance of concurrency control algorithms in maintaining temporal consistency of shared data in hard real time… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
1984
Highly Cited
1984
The structure of many secure systems has been based on the idea of a security kernel—an operating system nucleus that performs… Expand
Is this relevant?
Highly Cited
1978
Highly Cited
1978
The problem of deciding whether a given propositional formula in conjunctive normal form is satisfiable has been widely studied… Expand
Is this relevant?