Functional Program Design in Scala
Functional Program Design in Scala
Week 1
Recap: Functions and Pattern Matching
// We'd represent JSONs in Scala using case classes
abstract class JSON
case class JSeq(elems: List[JSON] extends JSON
case class JObj(bindings: Map[String, JSON]) extends JSON
case class JNum(num: double) extends JSON
case class JStr(str: String) extends JSON
cas...
Functional Programming Principles in Scala
Functional Programming Principles in Scala | Coursera
Week 1
Main programming paradigms:
imperative programming ⇒ instruction sequences for a Von Neumann computer (processor, memory, bus)
Von Neumann bottleneck ⇒ conceptualizing data strictures word-by-word
So, we need a higher level idea of programming in ord...
The Difficulties in Interpreting Myth Between Two Worlds
While Howard O’Hagan’s Tay John and John Marlyn’s Under the Ribs of Death differ vastly in their narrative structure, their cast, and their settings, both tell the coming of age stories of their protagonists as they attempt to contend with an existence between two worlds, yet belonging to neither. For Tay John and Sandor Hunyadi, this quest for ...
ENGL 315
Professor Winfried Siemerling, Winter 2020
Module 1
modernity (1850s on)
historical shift starting in Victorian/Confederation era
industrialization + communications ⇒ faster pace of life
attitude that life gets better (more knowledge, better life) over time through industrialization/knowledge (Lampman)
art ackn...
CS 486
Professor Alice Gao, Spring 2019
Lecture 1
Applications of AI:
checkers
chess
go
Jeopardy
Topics in this course:
Search: Heuristic
Supervised Learning
Reasoning under uncertainty
Learning under uncertainty
Decision making under uncertainty
Describe the four definitions of AI. Explain why we will pursue one over the o...
ENGL 108D
Professor Stephen Fernandez, Spring 2019
June 5th
selfie:
photographic object that transmits human feeling
practice/gesture with meaning relative to the community that it’s shared in e.g. likes, comments, shares
although selfies are taken with our consent, they are distributed to the digital superpublic, where it...
CS 480
These notes are incomplete and only cover pre-midterm content.
Lecture 2
Lecture
inductive learning: given a training set of examples of the form $(x, f(x))$, return a function $h$ that approximates $f$
deductive learning: given the rule + practice exercises, deduce $h$, inverse of inductive learning
2 types of problems
Clas...
CS 348
Overview of Data Management
data: formalized representation of information about some entity (e.g. a person)
History of Data Management
Magnetic tapes: Every program only uses 1 tape at a time, so programs cannot manage the same data at the same time. Data set 1, 2, and 3 are duplicates.
File management: Multiple programs ca...
19 post articles, 3 pages.