throbber
DICTIONARY OF
`
`Comcast, Ex. 1027
`
`1
`
`

`

`i
`
`
`
`A Dictionary of
`
`Computing
`
`
`
`FOURTH EDITION
`
`
`
`Oxford New York
`
`OXFORD UNIVERSITY PRESS
`
`
`
`2
`
`

`

`Oxford University Press, Great Clarendon Street, Oxford OX2 GDP
`Oxford New York
`Athens Auckland Bangkok Bogota Buenos Aires Calcutta
`Cape Town Chennai Dar es Salaam Delhi Florence Hong Kong Istanbul
`Karachi Kuala Lumpur Madrid Melbourne Mexico City Mumbai
`Nairobi Paris 560 Paolo Singapore Taipei Tokyo Toronto Warsaw
`and associated companies in
`Berlin Ibadan
`
`Oxford is a registered trade mark of Oxford University Press
`© Market House Books Ltd. 1983, 1986, 1990, 1996
`First published 1983
`Second published 1986
`Third edition 1990
`Fourth edition I 996
`
`All rights reserved. No part of this publication may be reproduced,
`stored in a retrieval system, or transmitted, in any form or by any means,
`without the prior permission in writing of Oxford University Press.
`Within the UK, exceptions are allowed in respect of any fair dealing for the
`purpose of research or private study, or criticism or review, as permitted
`under the Copyright, Designs and Patents Act, 1988, or in the case of
`reprographic reproduction in accordance with the terms of the licences
`issued by the Copyright Licensing Agency. Enquiries concerning
`reproduction outside these terms and in other countries should be
`sent to the Rights Department, Oxford University Press,
`at the address above
`
`This book is sold subject to the condition that it shall not, by way
`of trade or otherwise, be lent, re-sold, hired out or otherwise circulated
`without the publisher’s prior consent in any form of binding or cover
`other than that in which it is published and without a similar condition
`including this condition being imposed on the subsequent purchaser
`British Library Cataloguing in Publication Data
`Data available
`
`Library of Congress Cataloging in Publication Data
`Data available
`ISBN 0—19—280046—9
`7 9 10 8
`
`Printed in Great Britain by
`Cox Cg Wyman Ltd
`Reading, Berkshire
`
`
`
`3
`
`

`

`BLENDING
`
`blending The process of constructing
`*blends.
`
`blink An attribute that causes a character to be
`intermittently displayed on a screen at a reg—
`ular rate, usually in the range 1—10 Hz. Com—
`pare flicker.
`blobby modeI A model where objects have a
`basic shape that can be perturbed by interac—
`tions with neighbors or the environment.
`Such objects are described as so]? and include
`muscles and the human body. See also meta—
`balls.
`
`block I. A collection of data units such as
`words, characters, or records (generally more
`than a single word) that are stored in adjacent
`physical positions in memory or on a periph—
`eral storage device. A block can therefore be
`treated as a single unit whereby data can be
`(and usually is) transferred between storage
`device and memory, using one instruction.
`Blocks may be fixed or variable in size.
`A stream of data to be recorded on mag-
`netic tape is divided into blocks for conveni—
`ence of handling and particularly of *error
`recovery. (The equivalent on disks is *sec—
`tors.) Successive blocks are usually separated
`by interblock gaps and often also by control
`signals introduced by the magnetic tape sub—
`system and invisible to the host (see tape for—
`mat). It is usual but not essential for the block
`' length to be the same for all blocks of data
`within a volume or at
`least within a file,
`though this may not apply to *labels; where
`the end of a file occurs partway through a
`block,
`the remainder of the block may be
`filled with padding drummers.
`The choice of block length is largely
`dependent on *error management consider-
`ations. The minimum length of
`the
`interblock gap is defined by the standard for
`the tape format in use; the maximum length
`is usually undefined, except that a very long
`stretch (typically 25 feet) of blank tape is
`taken to mean that there is no more data on
`the volume. To avoid wastage of tape the gap
`written is usually fairly close to the minimum
`but it may be elongated in some circum—
`stances, e.g. by error recovery actions or to
`leave space for the editing of a file (which in
`
`
`
`this context means its replacement by a new
`version of the same length).
`In conventional magnetic tape subsystems
`the division of data into blocks is carried out
`by the host. However some buffered tape
`subsystems, particularly streaming cartridge
`tape, accept a continuous data stream from
`the host, and the subsystem itself divides the
`data into blocks (in this case often called
`Malcolm) in a manner that is not visible to
`the host. In these subsystems the interblock
`gap may be very short or absent.
`2. In coding theory, an ordered set ofsymbols,
`usually of a fixed length. The term is gener-
`ally synonymous with word or string, but
`with the impliution of fixed length.
`3. See block—structured languages.
`1. In parallel programming, to prevent fur—
`ther execution of one sequence of instruc—
`tions until another sequence has done what—
`ever is necessary to unblock it. See also
`blocked process.
`block cipher A cipher in which a fixed-length
`block of data is encrypted, or decrypted, at
`each iteration of the algorithm: each block is
`input, encrypted, and output, with no mem—
`ory (to retain message-dependent informa—
`tion) between blocks
`(compare
`stream
`cipher). Nevertheless, it is possible to use a
`block cipher as a component within a more
`complex system that effects a stream cipher.
`Ste alto cryptography.
`block code A type of *error—correcting or
`*error—detecting code in which a fixed num—
`ber (conventionally k) of digits are taken into
`the encoder at a time and then output in the
`form of a codeword consisting of a greater
`number (conventionally n) of digits. It
`is
`often specified as an (n, k) code, with block
`length Ia and codeword length n. The corre—
`sponding decoder takes in 71 digits, and out—
`puts Ie digits, at a time. Since the codewords
`are longer than the input words, the possible
`received words are no more numerous. The
`codewords are only a selection of all possible
`words of their length: the selection method
`gives any code its particular properties. See
`also code.
`
`46
`
`‘
`
`block compaction Another namefor memory
`compaction.
`
`4
`
`

`

`LIKELIHOOD
`
`being displayed to determine the position of
`the light pen.
`The light pen is used to draw items with
`the aid of a tracking cross. As the light pen is
`moved across the screen,
`the part of the
`tracking cross sensed changes thus allowing
`the direction of movement of the light pen to
`be ascertained. The tracking cross can be
`redrawn to locate it at the expected new cen—
`ter of the light pen’s position and thus
`appears to follow the light pen.
`Ilkellhood The *probability that an observa-
`tion belongs to a *probability distribution
`with *parameters 0, considered as a function
`of the parameters rather than of the observa—
`tion.
`The method of maximum likelihood, origi—
`nated by R. A. Fisher, estimates *parameters
`in statistical models by maximizing the likeli—
`hood ofobserving the data with respect to the
`parameters ofthe model. The values taken by
`the parameters at the maximum are known as
`maximum likelihood estimates. This method is
`computationally equivalent to the method of
`*least squares when the distribution of the
`observations about their theoretical means is
`the *normal distribution.
`Ilrnited license A license granted to a cus-
`tomer that limits the use that is made of a
`computer program. Under *copyright law,
`limited licenses restrict customers from
`legally being entitled to use several copies of
`individual programs at the same time or use
`copies on anything except a particular com-
`puter.
`Linda A particular model for *disu-ibuted pro-
`cessing in which the *prooesses communi-
`mte by inserting, examining, and deleting
`objects in a common *bag. It is architecture—
`independent.
`. Llndenmeyer system See L—system.
`linear algebraic equatlons (slmultaneous
`equations) A problem in *numerical linear
`algebra that requires the solution of n equa—
`tions in the unknowns x1, rpm, an of the
`form
`Ax = b
`where A is a square an matrix. The solution
`obtained by computing the inverse matrix
`and forming A411 is
`less accurate and
`
`274
`
`requires more arithmetical operatiOns than
`elimination methods. In Gaussian eliminatin
`multiples of successive equations are adde;
`to all succeeding ones to eliminate the
`unknowns x], xz,..., xH In turn. Properly .
`used, with row interchanges to avoid large
`multiples, this leads to a solution that 5mg~
`fies exactly a system close to the one gm,“
`relative to the machine precision. The ace“:
`racy of the solution, which can be Chaply
`estimated, depends on the *condition num.
`ber of the problem.
`Many other methods are used to deal with
`matrices of special form. Very large Systems
`where the matrix A has predominantly Zero
`entries occur in the solution of *pardal dif—
`ferential equations. Elimination methods
`tend to fill in the zeros causing storage prob.
`lems and *iterative methods are often pre—
`ferred for such problems.
`linear array Another namefor one-dimension—
`al array, i.e. for a *vector. See alto array.
`"near-bounded automaton (LBA) A
`*Turing machine M such that the number of
`tape cells visited by M is bounded by Some
`linear function of the length of the input
`string. 0f equivalent power is the smaller
`class of Turing machines that visit only the
`cells bearing the input string. The *context—
`sensitive languages are precisely those recog—
`nized by such Turing machines.
`linear channel A transmission channel in
`which the information *signal and the *noise
`signal combine addiuvely to form the output
`signal. In a *q—ary linear channel, with a
`finite number, 4, of amplitudes, the signals
`add modulo-q; in the binary use (4 = 2), this
`has the same effect as an *exclusive—OR
`operation between the signals.
`llnear codes In coding theory, codes whose
`encoding and decoding operations may be
`expressed in terms of linear operations. The
`term is usually applied to certain *error—
`correcting codes in which the encoding oper-
`ation involves a generator matrix and the
`decoding operation involves a parity—cheek
`matrix. Linear codes are,
`therefore, also
`called parity-cheek codes. A particular linear
`code forms a commutative *group that has
`the zero codeword as its identity.
`
`
`
`
`
`
`
`5
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket