Beautiful Code [373]
Reactor pattern
readability of code 2nd 3rd 4th 5th
Recall replication framework
records (faulty)
recursion
LU factorization 2nd 3rd 4th
Recursive Descent
Recursive LU Algorithm
redundancy
reentrant functions
ref( ) function (Perl)
references (variable)
regular expression matcher
implementation
reasons for compactness of code
termination conditions
regular expressions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
for input validity in Cryptonite mail system
mapping into actions with lex
notation
program for printing article-fetch lines (example) 2nd 3rd 4th 5th
regulatory DNA
regulatory protein bound to specific site of the DNA
relational databases
ERP5
in eLocutor
predictor databases
relationship managers (ERP5)
reliability of CIP
streamer service
Replace feature (eLocutor)
replication 2nd
Replication::Recall module (Perl)
representations (syntax-case expansion algorithm)
reserved words
resources (ERP5)
REST (Representational State Transfer) 2nd 3rd 4th 5th 6th
exposing services to external clients 2nd 3rd
defining service interface 2nd 3rd
routing the service using factory pattern
restrictions built into code
retrieval of data
return statement (JavaScript)
reusing data to reduce memory traffic
reverse web link graph
revision number
right associative operators (JavaScript)
right mouse button as single binary input for eLocutor
RISC computers
with cache hierarchies
river meandering
RNA sequences
robustness
CIP (Collaborative Information Portal)
hot swapping
dynamic reconfiguration
hot swapping
streamer service case study 2nd 3rd 4th
functionality
reliability
service architecture
system architecture 2nd
Rosettanet e-business protocol
exchanging requests and responses using 2nd
web site
RowFixture class (Java)
RPG legacy systems
RSS and Atom feeds
rsync's rolling checksum algorithm
Ruby implementation
Ruby programming language 2nd 3rd 4th 5th 6th 7th 8th
array implementation
beautiful code support
brevity (Hello World example)
brevity and DRY
simplicity
counting article fetches
optimizing program that reports most popular articles
stripped-down design
runtime environment (exp procedure)
Index
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]
s-expression
conversion to/from syntax object using datum->syntax
representing a quote form
same-marks? predicate
Santa Claus problem (concurrent program using STM) 2nd 3rd 4th 5th 6th 7th 8th 9th
Savoia
Sawzall language for logs analysis
scalability
CIP
of beautiful code
Scalable Vector Graphics (SVG) images
ScaLAPACK
LU factorization
Scheme language
expanding expressions containing macros into expressions in the core language
primitives for converting strings to and from symbols
quasiquote syntax for creating list structure
syntax-case
transformation of or form into let and if
Schmidt 2nd 3rd 4th 5th
scientific method
scope 2nd 3rd 4th
functions
new scope for a function or a block
scripting language (MATLAB)
scrolling in eLocutor
searches
binary search
content-addressable storage 2nd
emacspeak-websearch module for taskoriented search 2nd 3rd 4th 5th
postings
ranking results
regular expressions 2nd 3rd
using in program that prints article-fetch lines 2nd 3rd 4th
time involved in running and programming
weblog data
writing search algorithm
secure communications 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
complexity of secure messaging
Cryptonite mail system 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
hacking the civilization
privacy protection for individual rights
Seiwald 2nd 3rd 4th
self-evaluating? predicate
sequential concurrency models 2nd 3rd 4th
serialization
Service class (Cryptonite)
Service class (example)
services
exposing to external clients 2nd 3rd 4th
Session class (Java)
session key
sets
SGBSV routine (LAPACK library) 2nd 3rd 4th 5th 6th 7th
implementation details
shadow folder for mailbox messages
shadowed folder for mailbox messages
shards