{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T14:08:26Z","timestamp":1720966106764},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,6,13]],"date-time":"2013-06-13T00:00:00Z","timestamp":1371081600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Neural Process Lett"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1007\/s11063-013-9307-8","type":"journal-article","created":{"date-parts":[[2013,6,12]],"date-time":"2013-06-12T04:59:33Z","timestamp":1371013173000},"page":"1-23","source":"Crossref","is-referenced-by-count":1,"title":["ENAMeL: A Language for Binary Correlation Matrix Memories"],"prefix":"10.1007","volume":"40","author":[{"given":"Nathan","family":"Burles","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Simon","family":"O\u2019Keefe","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"James","family":"Austin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stephen","family":"Hobson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2013,6,13]]},"reference":[{"issue":"6","key":"9307_CR1","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/352029.352035","volume":"35","author":"A Van Deursen","year":"2000","unstructured":"Van Deursen A, Klint P, Visser J (2000) Domain-specific languages: an annotated bibliography. ACM Sigplan Notices 35(6):26\u201336. doi: 10.1145\/352029.352035","journal-title":"ACM Sigplan Notices"},{"key":"9307_CR2","unstructured":"Brewer G (2008) Spiking cellular associative neural networks for pattern recognition. Ph.D. Thesis, University of York"},{"key":"9307_CR3","doi-asserted-by":"crossref","unstructured":"Shanker KPS, Turner A, Sherly E, Austin J (2010) Sequential data mining using correlation matrix memory. In: International conference on network information technology, pp 470\u2013472. doi: 10.1109\/ICNIT.2010.5508469","DOI":"10.1109\/ICNIT.2010.5508469"},{"key":"9307_CR4","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/S0164-1212(00)00089-3","volume":"56","author":"D Spinellis","year":"2001","unstructured":"Spinellis D (2001) Notable design patterns for domain-specific languages. J Syst Softw 56:91\u201399. doi: 10.1016\/S0164-1212(00)00089-3","journal-title":"J Syst Softw"},{"key":"9307_CR5","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1145\/1118890.1118892","volume":"37","author":"M Mernik","year":"2005","unstructured":"Mernik M, Heering J, Sloane AM (2005) When and how to develop domain-specific languages. ACM Comput Surv (CSUR) 37:316\u2013344. doi: 10.1145\/1118890.1118892","journal-title":"ACM Comput Surv (CSUR)"},{"key":"9307_CR6","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1016\/j.infsof.2007.04.002","volume":"50","author":"T Kosar","year":"2008","unstructured":"Kosar T, Lopez PEM, Barrientos PA, Mernik M (2008) A preliminary study on various implementation approaches of domain-specific language. Inf Softw Technol 50:390\u2013405. doi: 10.1016\/j.infsof.2007.04.002","journal-title":"Inf Softw Technol"},{"key":"9307_CR7","unstructured":"Ladd DA, Ramming JC (1994) Two application languages in software production. In: USENIX very high level languages symposium proceeding 1994, pp 169\u2013178"},{"key":"9307_CR8","unstructured":"Van Deursan A, Klint P (1998) Little languages: little maintenance? J Softw Maintenance 10:75\u201392. doi: 10.1002\/(SICI)1096-908X(199803\/04)10:2<75:AID-SMR168>3.0.CO;2-5"},{"key":"9307_CR9","doi-asserted-by":"crossref","unstructured":"Kieburtz RB, McKinney L, Bell JM, Hook J, Kotov A, Lewis J, Oliva DP, Sheard T, Smith I, Walton L (1996) A software engineering experiment in software component generation. In: 18th International conference on software engineering, pp 542\u2013552","DOI":"10.1109\/ICSE.1996.493448"},{"key":"9307_CR10","unstructured":"Basu A (1997) A language-based approach to protocol construction. Ph.D. Thesis, Cornell University"},{"key":"9307_CR11","unstructured":"Bruce D (1997) What makes a good domain-specific language? APOSTLE, and its approach to parallel discrete event simulation. ACM SIGPLAN Workshop on Domain-Specific Languages, pp 17\u201335"},{"key":"9307_CR12","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1145\/331963.331972","volume":"35","author":"V Menon","year":"2000","unstructured":"Menon V, Keshav P (2000) A case for source-level transformations in MATLAB. ACM SIGPLAN Notices 35:53\u201365. doi: 10.1145\/331960.331972","journal-title":"ACM SIGPLAN Notices"},{"key":"9307_CR13","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1145\/130844.130856","volume":"24","author":"CW Krueger","year":"1992","unstructured":"Krueger CW (1992) Software reuse. ACM Comput Surv (CSUR) 24:131\u2013183. doi: 10.1145\/130844.130856","journal-title":"ACM Comput Surv (CSUR)"},{"key":"9307_CR14","doi-asserted-by":"crossref","first-page":"960","DOI":"10.1038\/222960a0","volume":"222","author":"DJ Willshaw","year":"1969","unstructured":"Willshaw DJ, Buneman OP, Longuet-Higgins HC (1969) Non-holographic associative memory. Nature 222:960\u2013962. doi: 10.1038\/222960a0","journal-title":"Nature"},{"key":"9307_CR15","volume-title":"Neural computation and self-organizing maps: an introduction","author":"H Ritter","year":"1992","unstructured":"Ritter H, Martinetz T, Schulten K, Barsky D, Tesch M, Kates R (1992) Neural computation and self-organizing maps: an introduction. Addison Wesley, Redwood City"},{"key":"9307_CR16","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1016\/0262-8856(87)90001-1","volume":"5","author":"J Austin","year":"1987","unstructured":"Austin J, Stonham TJ (1987) Distributed associative memory for use in scene analysis. Image Vis Comput 5:251\u2013260. doi: 10.1016\/0262-8856(87)90001-1","journal-title":"Image Vis Comput"},{"key":"9307_CR17","doi-asserted-by":"crossref","unstructured":"Hobson S, Austin J (2009) Improved storage capacity in correlation matrix memories storing fixed weight codes. In: International conference on artificial neural networks, pp 728\u2013736. doi: 10.1007\/978-3-642-04274-4_75","DOI":"10.1007\/978-3-642-04274-4_75"},{"key":"9307_CR18","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/BF00332910","volume":"59","author":"EB Baum","year":"1988","unstructured":"Baum EB, Moody J, Wilczek F (1988) Internal representations for associative memory. Biol Cybern 59:217\u2013228. doi: 10.1007\/BF00332910","journal-title":"Biol Cybern"},{"key":"9307_CR19","doi-asserted-by":"crossref","unstructured":"Orovas C, Austin J (1997) Cellular associative neural networks for image interpretation. In: Sixth international conference on image processing and its applications, pp 665\u2013669. doi: 10.1049\/cp:19970978","DOI":"10.1049\/cp:19970978"},{"key":"9307_CR20","doi-asserted-by":"crossref","unstructured":"Austin J, Hobson S, Burles N, O\u2019Keefe S (2012) A rule chaining architecture using a correlation matrix memory. In: International conference on artificial neural networks, pp 49\u201356. doi: 10.1007\/978-3-642-33269-2_7","DOI":"10.1007\/978-3-642-33269-2_7"},{"key":"9307_CR21","doi-asserted-by":"crossref","first-page":"1145","DOI":"10.1002\/nme.1620180804","volume":"18","author":"SC Eisenstat","year":"1982","unstructured":"Eisenstat SC, Gursky MC, Schultz MH, Sherman AH (1982) Yale sparse matrix package I: the symmetric codes. Int J Numer Methods Eng 18:1145\u20131151. doi: 10.1002\/nme.1620180804","journal-title":"Int J Numer Methods Eng"},{"key":"9307_CR22","volume-title":"Artificial intelligence: a modern approach","author":"SJ Russell","year":"1995","unstructured":"Russell SJ, Norvig P, Canny JF, Malik JM, Edwards DD (1995) Artificial intelligence: a modern approach. Prentice Hall, Englewood Cliffs"},{"key":"9307_CR23","doi-asserted-by":"crossref","unstructured":"Austin J (1992) Parallel distributed computation. In: International conference on artificial neural networks, 1992","DOI":"10.1016\/B978-0-444-89488-5.50142-1"}],"container-title":["Neural Processing Letters"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-013-9307-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11063-013-9307-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-013-9307-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,15]],"date-time":"2019-07-15T03:11:06Z","timestamp":1563160266000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11063-013-9307-8"}},"subtitle":["Reducing the Memory Constraints of Matrix Memories"],"short-title":[],"issued":{"date-parts":[[2013,6,13]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["9307"],"URL":"https:\/\/doi.org\/10.1007\/s11063-013-9307-8","relation":{},"ISSN":["1370-4621","1573-773X"],"issn-type":[{"value":"1370-4621","type":"print"},{"value":"1573-773X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6,13]]}}}