throbber
Case 1:20-cv-00034-ADA Document 45-26 Filed 03/20/20 Page 1 of 6
`Case 1:20-cv-00034-ADA Document 45-26 Filed 03/20/20 Page 1 of 6
`
`
`
`EXHIBIT 24
`
`EXHIBIT 24
`
`
`
`
`
`
`
`

`

`Case 1:20-cv-00034-ADA Document 45-26 Filed 03/20/20 Page 2 of 6
`
`COMPUTING
`
`1m to
`
`I".
`
`xx
`
`-
`
`OXFORD
`
`{q 3‘
`V
`
`3'!
`
`.
`
`:---
`l
`
`p
`
`.
`
`DEFS_ANCORA00002131
`
`

`

`Case 1:20-cv-00034-ADA Document 45-26 Filed 03/20/20 Page 3 of 6
`Case 1:20-cv-00034-ADA Document 45-26 Filed 03/20/20 Page 3 of 6
`
`Dictionary of
`Computing
`
`Fourth Edition
`
`Oxford New York Tokyo
`
`OXFORD UNIVERSITY PRESS
`
`1996
`
`STiFii—iititz
`
`
`
`
`COU “GIL
`LlBRARiES
`
`
`
`
`DEFS_ANCORA00002132
`
`

`

`Case 1:20-cv-00034-ADA D0cumen99§£k§l5 Ffia‘HtM/ZOIZO Page 4 of 6
`Case 1:20-cv-00034-ADA Document 45-26 Filed 03/20/20 Page 4 of 6
`
`Oxford University Press. Walton Street. 0.x:tord OX2 ()DP
`
`Oxford New York
`Athens Auckland Bangkok Bogota Bombay
`BuenosAt'res Caicutto Cape Town Dot'es Salaam
`Deihi Fiarence Hong Kong istanhui Karachi
`KttaioLutttpur Modras Madrid Meiitourne
`Me.\'icoC'ity Nairobi Paris Singapore
`Taipei Tokyo Toronto
`
`and associated companies in
`Bert'in ihadan
`
`Oxford is a trade mark of Oxford University Press
`
`Pubiished in the United States
`
`h,1-'0.\jord University Press the. New York
`
`C”) Market House Books. i983. t936. 1990, t996
`
`Fit's! pubiished 1993
`Reprinted 1983, ”84. 1985
`Second Edition i 986
`Third Edition 1' 990
`
`Reprinted tOOU, 1'99} {twice t. i 993
`Fourth Edition i996
`
`Ah‘ rights reserved. No part of this publication may be
`reproduced. stored in o retriet-‘ai system. or transmitted. in any
`jornt or by any means. without the prior permission in n-‘riting 010.13”:er
`University Press. Within the UK. exceptions are oiiowcd itt respect at'atty
`fair deaiingfor the purpose of research or private study. or criticism or
`review. as permitted under the Copyright. Designs and Potents Act. i 988. or
`in the case ofreprogrophic reproduction in accordance with the terms of
`iicences issued by the Copyright Licensing Agency. Enquiries concerning
`reproduction outside those terms and iii other countries shotdd he sent to
`the Rights Department. Osford University Press. at the address above.
`
`This book is said subject to the condition that it shaii not.
`by way oftrade or otherwise. he tent. re-soid. hired out. or otherwise
`circuiated without the puhiisher 's prior consent in ("U-"fut?” of hinding
`or cover other than that in u-‘hich it is pahiis'hed and without a sintihtr
`condition including this condition heing imposed
`on the subsequent purchaser.
`
`A ct'ttatogae recot'djor this hook is ovaiiabieflrom the British Library
`
`Lihrory of Congress Cataioging in Puhiication Date
`{ Data ttl’aiiahie J
`
`[SEN 0—) 91953855—3
`
`Text prepared by Market House Books Ltd. A‘s-'ieshury
`Printed in Great Britain by
`Biddies Ltd. Guiiojrord & King's Lynn
`
`Cot-69L
`
`in"
`-.t
`
`'
`tL
`
`DEFSHANCORAOOOO2133
`
`

`

`Case 1:20-cv-00034-ADA Document 45-26 Filed 03/20/20 Page 5 of 6
`I':-'_“'-"'easerfc'fi'EFCifiGUOM-ADA Document 45-26 Filed 03/20/20 Page50f6
`ALARP PRINCIPLE
`
`lI
`
`tutc, which in turn represents a *graph. Ill-‘1
`is the adjacency matrix corresponding to ,1
`given graph G, thenri'
`-—
`I
`,
`'
`U
`if there is an edge from vertex i to vertex; in
`G; otherwise
`
`to : 0
`If G is a directed *giatih then
`in: l
`o
`if there is an edge directed from vertex i to
`vertex j; otherwise
`ay- 5 U
`If the vertices of the graph are numbered
`1,2,...m, the adjacency matrix is of a type
`tin-(iii. if
`
`.o‘XxIX, . .XA (1) terms, {Sin}
`is evaluated,
`the nonzero entries indicate
`those vcrtices that are joined by a *path of
`lgngth p; indeed the value of the (ifith entry
`of AP gives the number of paths of length ,0
`from the vertex i to vertex 3’. By examining
`the set ot‘such matrices,
`in = 1,2,..., m——I
`it can be determined whether two vertices are
`connected.
`It is also possible for adjacency matrices to
`he formed from *Boolean matrices.
`adjacency structure {adjacency list) A
`means of representing :1 *graph. The adja—
`cency structure corresponding to a *path G
`is the set
`{Adj(v) | c is a vertex in C}
`”'0‘ is an undirected graph, then a vertex H’ is
`in Adfiy) if and only if there is an edge in G
`betWecn c and IF; if G is a directed graph,
`then It? is in Adflc) if and only if there is an
`edge in G directed from c to at.
`ADP Arman-ti. fiJr automatic data processing. Sec
`data processing.
`affine mapping (affine transformation) A
`mapping from one coordinate system to
`another under which parallel
`lines remain
`parallel and ratios ofcollinear points are pre-
`served. An afline mapping can be decom-
`posed into linear transformations (rotation,
`scaling, and shear) and translation.
`AFIPS American Federation of Information
`Processing Societies, founded in 1%] to pro-
`vide a structure for professional societies
`with a primary interest in information prm
`
`ccssing to join together in order to advance
`the state of the art. AFIPS was dissolved in
`
`1990. In 1991 its two principal members, the
`*ACM and the ”REF. Computer Society,
`formed a joint committee known as FOCUS
`{Focus on Computing in the US). which rep—
`resents the US in *IFIP.
`
`AFL AiriErrttjhr abstract family of languages.
`
`agenda mechanism A control scheme often
`used in *knnwledge—hased systems and
`*biackhoard systems to order the sequence of
`action execution. While the system is run—
`ning, inference processes may examine the
`agenda and manipulate it by the dynamic
`addition, removal, and reordering oFitems.
`
`agent An autonomous system that receives
`information from its environment, processes
`it, and performs actions on that environ—
`ment. Agents may have different degrees of
`intelligence or rationality, and may be soft-
`ware, hardware, or both.
`Software agents operate in symbolic envi—
`ronments, and perceive and act upon strings
`of symbols; examples include personal assis-
`tant agents that enhance and customize i'aciln
`ities for computer users, and *data mining
`agents that search for interesting patterns in
`large databases. In a *distrihuted system, the
`agent for a *rcmote procedure call is in a dif-
`ferent computer from the caller; its environ—
`ment is the network and the procedure body.
`A robot (sec robotics) is an example of an
`agent that perceives its physical environment
`through sensors and acts through effectors.
`
`AGV .-*lM)J‘t’I‘. for autonomous guided vehicle.
`
`AI .-‘Hiiirct‘-. for artificial intelligence.
`
`Altken’s A2 process A method to convert
`any convergent sequence {tn} into a more
`rapidly convergent sequence {.rfl’}. For lin_
`early converging sequences the formula is:
`‘Yn’ : "In _ ("IIIWI — "Irr)2/('rn+l _ 2Itfll + I")
`AIX An IBM version of * UNIX.
`
`ALARP principle A principle that is associat-
`ed with the design and development oi'safety
`systems, and captures the notion that the risk
`to individuals, society, and the environment
`should he sis Low As Reasonably Possible.
`See aisu safetyrci'itical system, satiety-related
`system.
`
`DEFS_ANCORADOOO2134
`
`

`

`Case 1:20-cv-00034-ADA Document 45-26 Filed 03/20/20 Page 6 of 6
`Case 1:20-cv-00034-ADA Document 45-26 Filed 03/20/20 Page 6 of 6
`
`tot
`
`FIRST NORMAL FORM
`
`ny'crzoig stairs, and let .7“ be some member of
`Q (referred to as the star! state). The language
`recognizer! by the FSA is the set of all JP such
`that
`
`finia‘fu)
`is an accepting state, i.e. the set of all strings
`that take the start state to an accepting state.
`For example, in the FSA shown in the figure
`let g" be 1 and let 4 be the only accepting
`state; the language recognized is then the set
`of all strings over
`la,b,r} that somewhere
`contain all: as a substring. A language recog—
`nized by an FSA is known as a '* regular lan»
`guage.
`A generalization is to allow more than one
`state to which the FSA can move, for a given
`input symbol and current state. This gives a
`nwith-terminittir FSA. The input string is
`then accepted if there is some sequence of
`choices of moves leading to an accepting
`state. Such a machine can always be convert—
`ed to a deterministic one recognizing the
`
`same language.
`See also sequential machine, minimal
`machine.
`
`FIPS .--irrmt_1oa for Federal Information Pro-
`cessing Standards. Standards that
`the US
`government uses in its procurement efforts
`and that are adopted (rarely created) and
`maintained by the US National Institute of
`Standards and Technology, NIST (formerly
`the National Bureau of Standards).
`
`Fire codes A family of *polynomial *block
`codes designed to correct *burst errors.
`
`firewall A sysrem designed to control the pas—
`sage of information from one network into a
`second network. Typically a firewall will be
`used as a means of reducing the risk of
`unwanted access to sensitive systems, where
`one carefully regulated network contains the
`sensitive systems and is connected to a larger
`less-regulated network. A firewall can be
`effective if access to the firewall itself is care-
`
`fully regulated.
`
`firing rule Sec Petri net.
`
`firmware System software that is held in read
`only memory (*ROM).
`
`FIRST .-irrmnon for Forum of Incident and
`Response Teams. An international group
`
`bringing together those working on the pro-
`vision of protection against computer mis-
`use. See also computer emergency response
`[BRIT].
`
`first—class type in the design of a program-
`ming language. A *type whose *obiccts can
`take part in the full range of'operations avail-
`able within the language (such as declaration
`ol‘constants and variables oflhe type in ques—
`tion, assignment of values, employment as
`fields of records and as elements of arrays,
`
`occurrence as parameters and return values
`of functions). The objects ofa first-class type
`arcfirsi-rlun objrds. 1"or example, functions
`are first-class in Algol 68 but not in Algol an,
`Pascal or Ada.
`
`first fit A method of selecting a contiguous
`area of memory that is to be allocated for a
`segment. The *frce—space list is scanned in
`order of starting address, and the allocation
`made from the first
`free area whose size
`
`exceeds that of the request. Despite its
`apparent simplicity this algorithm has a
`number of desirable properties in terms of
`
`performance.
`
`first generation of computers. The Series of
`calculating and computing machines whose
`designs were started between 1940 (approxi—
`mately) and 1955. These machines are char-
`acterized by electronic tube (valve) circuitry,
`and delay line,
`rotating, or electrostatic
`(Williams tube) memory. The majority of
`them embodied the stored program concept.
`For the most part, first—generation machines
`used as input/output punched paper tape,
`punched card, magnetic wire, magnetic tape,
`and printers. Despite these seeming handi—
`caps,
`impressive computations in weather
`forecasting, atomic energy calculations, and
`similar scientific applications were routinely
`performed on them.
`Important
`first—generation development
`machines include the *Manchester Mark I,
`*EDSAC, *EDVAC, *SEAC, *Whirlwind.
`*IAS, and *ENIAC while the earliest com-
`mercially available computers include.
`the
`*Fert‘anti Mark I,
`*UNIVAC I,
`and
`*I.E0 I.
`
`first in first out See FIFO.
`
`first normal form .S'er normal forms.
`
`DEFS_ANCORADOOO2135
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket