Home > Sentence > a lookup table

1 Memoization is an optimization technique that stores the results of resource-consuming function calls within a lookup table, allowing subsequent calls to reuse the stored results and avoid repeated computation.

2 In addition, flash memory for a lookup table provides single event upset protection for space applications.

3 After a function's value is computed for that parameter or set of parameters, the result is stored in a lookup table that is indexed by the values of those parameters;

4 Called 2A03 in NTSC consoles and 2A07 in PAL consoles (the difference being the memory divider ratio and a lookup table for audio sample rates), this processor was produced exclusively for Nintendo.

5 When an LSR receives a packet, it uses the label included in the packet header as an index to determine the next hop on the label-switched path (LSP) and a corresponding label for the packet from a lookup table.

6 (Although the WinAnsi and MacRoman encodings are derived from the historical properties of the Windows and Macintosh operating systems, fonts using these encodings work equally well on any platform.) PDF can specify a predefined encoding to use, the font's built-in encoding or provide a lookup table of differences to a predefined or built-in encoding (not recommended with TrueType fonts).

7 For purposes of visualization a lookup table has been used to color each of the cells in an image D. Here are the numbers as a simple vector in row/column order: 1 3 0 0 1 12 8 0 1 4 3 3 0 2 0 2 1 7 4 1 5 4 2 2 0 3 1 2 2 2 2 3 0 5 1 9 3 3 3 4 5 0 8 0 2 4 3 2 8 4 3 2 2 7 2 3 2 10 1 5 2 1 3 7 Finally, here is a run-length encoded representation of the raster, which has 55 positions: This process clearly results in a loss of information, from the real-valued coordinates of the points, through the integer cell counts, to the ordinal colors, but there are also gains: Three-dimensional voxel raster graphics are employed in video games and are also used in medical imaging such as MRI scanners.

8 The transformation can be done using a lookup table, such as the following: For example, in the following joke, the punchline has been obscured by ROT13: Transforming the entire text via ROT13 form, the answer to the joke is revealed: A second application of ROT13 would restore the original.

9 To promote identical grayscale image display on different monitors and consistent hard-copy images from various printers, the DICOM committee developed a lookup table to display digitally assigned pixel values.

10 One section of note is the import address table (IAT), which is used as a lookup table when the application is calling a function in a different module.

11 The solution to this problem was indexed color which adds a lookup table to the framebuffer.

12 The transducer layer is restricted to producing behavior according to a simple mapping, such as a lookup table, from inputs to actions on the system, and from the state of the system to outputs.

13 A relevant application is the evaluation of the natural logarithm and trigonometric functions: pick a few known data points, create a lookup table, and interpolate between those data points.

14 it is done by creating a lookup table that contains the warehouse surrogate key and the originating key.

15 In general, an S-box takes some number of input bits, m, and transforms them into some number of output bits, n, where n is not necessarily equal to m. An m×n S-box can be implemented as a lookup table with 2 words of n bits each.

16 The goal of each player is to accumulate money by moving his or her train token to map destinations which are generated at random via a lookup table.

17 Perfect hash functions may be used to implement a lookup table with constant worst-case access time.

18 A perfect hash function with values in a limited range can be used for efficient lookup operations, by placing keys from S (or other associated values) in a lookup table indexed by the output of the function.

19 A simple implementation of order-preserving minimal perfect hash functions with constant access time is to use an (ordinary) perfect hash function or cuckoo hashing to store a lookup table of the positions of each key.

20 text strings are chosen numerically from a lookup table and assembled to produce unique descriptions, such as a planet with "carnivorous arts graduates").