Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,275,343 papers from all fields of science
Search
Sign In
Create Free Account
Write-only documentation
Known as:
Write-only
Write-only documentation (WOD) is a tongue-in-cheek term for documentation that is written to satisfy a process but never read subsequent to its…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Documentation
Programmer
Requirements analysis
Software documentation
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
DataLair: Efficient Block Storage with Plausible Deniability against Multi-Snapshot Adversaries
Anrin Chakraborti
,
Chen Chen
,
R. Sion
Proceedings on Privacy Enhancing Technologies
2017
Corpus ID: 3518055
Abstract Sensitive information is present on our phones, disks, watches and computers. Its protection is essential. Plausible…
Expand
2014
2014
An algebraic characterization of unary two-way transducers
C. Choffrut
,
B. Guillon
Italian Conference on Theoretical Computer…
2014
Corpus ID: 45493
Two-way transducers are ordinary finite two-way automata that are provided with a one-way write-only tape. They perform a word to…
Expand
Review
2010
Review
2010
An overview of the K semantic framework
Grigore Roşu
,
Traian-Florin Serbanuta
J. Log. Algebraic Methods Program.
2010
Corpus ID: 13756844
2009
2009
SEMICONDUCTOR INTEGRATED CIRCUITS: Testing content addressable memories with physical fault models
M. Lin
,
Yang Xu
,
Zhong Shiqiang
,
Yunji Chen
2009
Corpus ID: 56857703
Content addressable memory (CAM) is widely used and its tests mostly use functional fault models. However, functional fault…
Expand
2009
2009
Evaluation of Load Scheduling Strategies for Real-Time Data Warehouse Environments
Maik Thiele
,
Wolfgang Lehner
Business Intelligence for the Real-Time…
2009
Corpus ID: 33508573
The demand for so-called living or real-time data warehouses is increasing in many application areas, including manufacturing…
Expand
Highly Cited
2008
Highly Cited
2008
Terascale direct numerical simulations of turbulent combustion using S3D
Jacqueline H. Chen
,
Alok N. Choudhary
,
+10 authors
Chun Sang Yoo
2008
Corpus ID: 3251783
Computational science is paramount to the understanding of underlying processes in internal combustion engines of the future that…
Expand
Highly Cited
2007
Highly Cited
2007
An Implementation and Evaluation of Client-Side File Caching for MPI-IO
W. Liao
,
A. Ching
,
Kenin Coloma
,
A. Choudhary
,
L. Ward
IEEE International Parallel and Distributed…
2007
Corpus ID: 2323677
Client-side file caching has long been recognized as a file system enhancement to reduce the amount of data transfer between…
Expand
Highly Cited
1999
Highly Cited
1999
Efficient implementation of lazy suffix trees
R. Giegerich
,
S. Kurtz
,
J. Stoye
Software, Practice & Experience
1999
Corpus ID: 2542265
We present an efficient implementation of a write‐only top‐down construction for suffix trees. Our implementation is based on a…
Expand
Highly Cited
1984
Highly Cited
1984
A Trusted Computing Base for Embedded Systems
J. Rushby
1984
Corpus ID: 4174629
The structure of many secure systems has been based on the idea of a security kernel—an operating system nucleus that performs…
Expand
Highly Cited
1978
Highly Cited
1978
The complexity of satisfiability problems
T. Schaefer
Symposium on the Theory of Computing
1978
Corpus ID: 17125814
The problem of deciding whether a given propositional formula in conjunctive normal form is satisfiable has been widely studied…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE