miércoles, abril 23, 2008

Os invito. Bueno, no.

Queridísimos lectores de este vuestro blog.

Como sabréis, dentro de 3 días un servidor cumple un cuarto de siglo. Y como impone esta sociedad tengo que invitar a mis allegados a cerveza y derivados.

Como no tengo ganas de ir detrás de todo el mundo diciendo: Oyeeee que celebro mi cuuuumpleeee en taaaal sitiooo que vengaaaaas y que a la semana me vengan con un porque no me invitaaaaasteeeee y yo es que se me olvidoooooo pues he decidido NO INVITAR A NADIE.

Así es. Desde aquí os aviso de que celebro mi cumpleaños el viernes 25 de abril en el pub Babel a las 23:30. Y que venga quien se considere digno de ser invitado.

Pistas de gente que debería considerarse digna de ser invitada (pueden cumplirse varias a la vez):

- Si se considera amigo o amiga mío.
- Si trabaja en cualquiera de los dos sitios donde yo trabajo.
- Si visita y comenta este blog con asiduidad.
- Si es mujer.
- Si le sale de los cojones venir, aunque me caiga como el culo. Este tipo de gente es menos digna que el resto, pero también será bienvenida.

Todos los que vengan tendrán cerveza (o derivados) gratis.

En fin, que espero que vengáis. Vosotros sabéis quienes sois.

lunes, abril 21, 2008

Festival Internacional de Jóvenes Realizadores

Ayer cogí mi chupa de cuero, mis gafas de pasta, mis converse vintage y mi PASE DE PRENSA y me fui al Festival de Internacional de Jovenes Realizadores. Las converse y las gafas las dejé en mi casa por la sencilla razón de que no tengo de eso.

Primero asistí a la entrega de premios, que no tengo ni idea de quien ganó, porque no fuí a las sesiones anteriores (el pase lo tenía otra persona), pero estuvo bastante ameno. En mitad salían unos haciendo unos teatrillos con plumas en plan Guerra Civil. Con maletas, zapatos de antiguo y tal. Homenaje al cine español, supongo.

Y después empezó la sesión de Cine Fantástico y de Terror, que es la que quería ver. A continuación una fergu-crítica corta para cada corto. Aunque tendría más gracia hacerlo al revés.

-THE PEARCE SISTERS, Luis Cook, Reino Unido, 9'17"
Bueh, dibujicos animados. Unas viejas que pescan, hay viento y no dicen nada.
-THE FAERIES OF BLACKHEATH WOOD, Ciaran Foy, Irlanda, 4'
Una niñica vé hadas, que son unas hijas de puta. Regulero.
-S.I.T.E, Pablo Orlowsky, Belice, 4'
Este está mejor. Grabaciones de un sitio raro, interferencias, códigos de cinta y demás pijadillas que siempre gustan.
-SAMSA - HOMMAGE AN FRANZ KAFKA, René Lange, Alemania, 4'
Una puta mierda. Sale Kafka hecho por ordenador a partir de la foto clásica y se convierte en cucaracha. Oh, que originales. Y ya está.
-BERNI'S DOLL, Yann J, Francia , 11'30"
Muy divertido. Un tipo timburtoniano compra en la tienda trozos de tía y se hace una tía personalizada. Al final la tía huye, obviamente.
-THE DARKSIDE, Jose Corral, España, 19'
Eso de España es relativo. Es ARGENTINO, entendiste vos? Un tipo busca a una tipa para matarla, pibe, porque engendrará al mal, viste? En medio hay efectos espesiales horriiibles. En 19 minutos paresé que no ocurrió nada.
-THE QUIET, Kike Mesa, España, 2'50"
Pa ser español y para estar el director en el teatro diciendo nosequé historias antes me pareció UNA PUTA MIERDA. Un árbol se come a un tío que era un asesino. En 2 minutos que dura el corto. Más visto que el copón. Y mira que el copón es una cosa muy vista.
-LAS HORAS MUERTAS, Haritz Zubillaga, España, 14'
Unos vascos son acosados por un francotirador en una caravana a 100 metros de la carretera. Bien rodado y tal. Hay tetas, claro. Pero para que no empecéis oh fergu que guarro eres no lo digo.
-PACTUM, Juan F. Padrón, España, 28'0"
El mejor de todos. Ramón Langa (el que le pone la voz a Bruce Willis) le quiere comprar a domicilio el alma a la Juani (sí, la de Médico de Familia). Un corto con gracia, con efectos especiales bien hechos y bien rodado, hostia.

Y hasta aquí mi modesta contribución a la causa, queridísimos lectores.

Este cuento se acaaaaboooooooooooooooo!

jueves, abril 17, 2008

[Cómics]: "Maus" de Art Spiegelman y "Fell" de Warren Ellis

Hablo poquico, asín que cuando lo hago que al menos sea para dejaros culturilla general. Y así gano un poco de puntos gafapasta, que siempre están bien, aunque no me sirvan para ligar en el tuenti.

[Maus] Art Spiegelman

Tremendo, me lo leí en 2 noches (antes de acostarme). Tremendo porque trata del Holocausto y eso siempre acojona, por mucho que los personajes sean ratoncitos. Y tremendo porque la parte importante del cómic trata sobre la relación del autor y su padre (y protagonista de la historia) mientras le entrevista para escribir el propio cómic. En mitad de la guerra, escenas cotidianas como ir a la compra, arreglar una persiana o mirar viejas fotos. Cojonuda mini-historia insertada y dibujada por el autor años antes. Y tremenda la foto de un rubito de 3 o 4 años, hermano mayor (y fallecido antes de) del autor y al que le dedica la segunda parte. Ahí, en mitad del libro. Sin avisar. No os digo como se muere, sería un spoiler. Aunque supongo que os lo imagináis. Ah. Ganó el premio Pulitzer. El cómic/novela gráfica/loquesea no el niño. Mencionar el premio está bien si os miran raro si leéis tebeos.

[Fell] Warren Ellis (préstamo de JJ)

Un detective. Una ciudad podrida. Cristales rotos. Tiroteos. Sombras. Latas vacías de cerveza. Farolas titilantes. Todas las cosas que me gustan (desde el calor de mi hogar, claro). Mola muy mucho.

Y ya. Que leáis de esto. Que está muy bien.

(Media de palabras por frase en este post: 5)

jueves, abril 10, 2008

Pheeeew!

Paper Submission due: April 14, 2008
Extended Paper Submission due: April 28, 2008



Todavía me quedaba escribir la sección de resultados. Espero que mi jefe no se entere.

jueves, abril 03, 2008

Artículo aceptado

Os pego el artículo que nos aceptaron el 1 de Abril para el WSDL2008, en Santa Catalina (Ohio), a ver si os gusta. Podéis descargar el PDF o los fuentes en LaTeX.


DISCLAIMER (una semanica más tarde):

Este artículo ha sido generado ALEATORIAMENTE desde esta web tan molona.

Me consta que algunos han picado vilmente.



Psychoacoustic, Stochastic Modalities



P Garcia-Sanchez, AE Romero, JC Calvo-Tudela and G Fernandez-Rodriguez









Abstract




The networking approach to object-oriented languages is defined not
only by the visualization of online algorithms, but also by the private
need for model checking [41]. In fact, few hackers worldwide
would disagree with the refinement of rasterization. Of course, this is
not always the case. Here we construct an analysis of voice-over-IP
(TAPA), which we use to verify that voice-over-IP and rasterization
can collude to achieve this objective.


Table of Contents


1) Introduction

2) Ambimorphic Symmetries

3) Implementation


4) Performance Results


5) Related Work


6) Conclusions


1
  Introduction






Unified robust information have led to many technical advances,
including write-ahead logging [41] and lambda calculus. Though
it at first glance seems counterintuitive, it has ample historical
precedence. A private grand challenge in "fuzzy" e-voting technology
is the deployment of symbiotic communication. Furthermore, The notion
that experts synchronize with interrupts is usually adamantly opposed.
Obviously, symbiotic theory and Scheme do not necessarily obviate the
need for the exploration of Markov models.





In order to fulfill this ambition, we concentrate our efforts on
verifying that the well-known reliable algorithm for the emulation of
neural networks by Timothy Leary et al. follows a Zipf-like
distribution. Further, existing large-scale and flexible methods use
real-time communication to control the exploration of courseware. This
is a direct result of the refinement of interrupts. While conventional
wisdom states that this quagmire is usually surmounted by the
understanding of 8 bit architectures, we believe that a different
approach is necessary [1]. Continuing with this rationale, we
emphasize that TAPA emulates flip-flop gates. Combined with the
evaluation of semaphores, it simulates a novel method for the emulation
of public-private key pairs.




The roadmap of the paper is as follows. We motivate the need for
context-free grammar. Similarly, to surmount this quagmire, we disprove
that the much-touted read-write algorithm for the evaluation of 32 bit
architectures by Harris runs in Q( n ) time. Third, to
overcome this problem, we introduce new interactive models (TAPA),
validating that DHCP and digital-to-analog converters can synchronize
to achieve this purpose. Ultimately, we conclude.





2
  Ambimorphic Symmetries






Motivated by the need for reliable communication, we now motivate a
model for disconfirming that wide-area networks and expert systems
can interact to solve this quagmire. This is a theoretical property of
our methodology. We assume that Web services can evaluate compilers
without needing to create forward-error correction. This seems to hold
in most cases. We show our system's modular prevention in
Figure 1. This seems to hold in most cases. See our
existing technical report [28] for details.












dia0.png


Figure 1:
The methodology used by our framework.







Along these same lines, we postulate that the unproven unification of
evolutionary programming and fiber-optic cables can emulate stochastic
communication without needing to request massive multiplayer online
role-playing games. Any intuitive exploration of Bayesian symmetries
will clearly require that context-free grammar can be made empathic,
distributed, and stochastic; our solution is no different. Along these
same lines, we estimate that write-back caches and erasure coding
can collaborate to address this riddle. We performed a minute-long
trace verifying that our model is unfounded. This may or may not
actually hold in reality. See our existing technical report
[12] for details.











dia1.png


Figure 2:
A methodology for classical configurations.








We hypothesize that the foremost event-driven algorithm for the
investigation of erasure coding by Williams runs in Q( log loglogn ! ) time. This may or may not actually hold in reality.
We instrumented a 6-month-long trace proving that our design holds for
most cases. TAPA does not require such a confirmed improvement to run
correctly, but it doesn't hurt. We assume that signed information can
enable virtual communication without needing to store symbiotic
methodologies. Thus, the methodology that TAPA uses is feasible.





3
  Implementation






Though many skeptics said it couldn't be done (most notably Davis et
al.), we describe a fully-working version of our algorithm. Next, the
hand-optimized compiler contains about 775 lines of Ruby. we have not
yet implemented the collection of shell scripts, as this is the least
natural component of our heuristic. On a similar note, our methodology
requires root access in order to manage the analysis of Web services.
TAPA requires root access in order to provide multicast heuristics.
Computational biologists have complete control over the collection of
shell scripts, which of course is necessary so that Scheme can be made
amphibious, decentralized, and efficient.






4
  Performance Results






Our performance analysis represents a valuable research contribution in
and of itself. Our overall evaluation seeks to prove three hypotheses:
(1) that we can do a whole lot to affect an algorithm's ABI; (2) that
popularity of the transistor stayed constant across successive
generations of Nintendo Gameboys; and finally (3) that erasure coding
no longer influences an algorithm's legacy API. an astute reader would
now infer that for obvious reasons, we have decided not to synthesize a
methodology's peer-to-peer API. our logic follows a new model:
performance is king only as long as simplicity takes a back seat to
simplicity constraints. Despite the fact that it is entirely an
essential goal, it has ample historical precedence. Our work in this
regard is a novel contribution, in and of itself.





4.1
  Hardware and Software Configuration













figure0.png


Figure 3:
The average sampling rate of our framework, compared with the other
solutions. Our intent here is to set the record straight.







A well-tuned network setup holds the key to an useful performance
analysis. We instrumented a real-time simulation on the KGB's 100-node
overlay network to disprove randomly low-energy models's influence on
the uncertainty of electrical engineering [28]. To begin with,
we halved the effective hard disk space of our mobile telephones to
prove the independently scalable nature of reliable algorithms. Second,
we added some USB key space to our system to investigate the effective
floppy disk throughput of the NSA's network. Next, we removed 300kB/s
of Ethernet access from our Planetlab overlay network. Note that only
experiments on our desktop machines (and not on our desktop machines)
followed this pattern. Continuing with this rationale, we quadrupled
the mean throughput of our interposable testbed to probe our secure
testbed. This configuration step was time-consuming but worth it in
the end. In the end, we halved the signal-to-noise ratio of our system.











figure1.png


Figure 4:
These results were obtained by Wu et al. [5]; we reproduce
them here for clarity.







TAPA does not run on a commodity operating system but instead requires
a lazily autogenerated version of Sprite Version 8c, Service Pack 8.
our experiments soon proved that patching our independent
public-private key pairs was more effective than making autonomous
them, as previous work suggested. We added support for TAPA as a
disjoint kernel patch. Continuing with this rationale, we made all of
our software is available under a very restrictive license.






4.2
  Experiments and Results






Is it possible to justify the great pains we took in our implementation?
It is. That being said, we ran four novel experiments: (1) we measured
Web server and RAID array throughput on our mobile telephones; (2) we
asked (and answered) what would happen if randomly discrete linked lists
were used instead of public-private key pairs; (3) we ran red-black
trees on 78 nodes spread throughout the 10-node network, and compared
them against flip-flop gates running locally; and (4) we measured tape
drive space as a function of floppy disk throughput on an IBM PC Junior.




We first analyze experiments (1) and (4) enumerated above. These power
observations contrast to those seen in earlier work [9], such
as Herbert Simon's seminal treatise on fiber-optic cables and observed
RAM speed. Gaussian electromagnetic disturbances in our Internet-2
testbed caused unstable experimental results. The curve in
Figure 3 should look familiar; it is better known as
f*(n) = n.





We have seen one type of behavior in Figures 3
and 3; our other experiments (shown in
Figure 4) paint a different picture. Note the heavy tail
on the CDF in Figure 4, exhibiting muted power. Error
bars have been elided, since most of our data points fell outside of 17
standard deviations from observed means. Along these same lines, the
results come from only 1 trial runs, and were not reproducible.




Lastly, we discuss experiments (1) and (4) enumerated above. These
popularity of Lamport clocks observations contrast to those seen in
earlier work [24], such as J. Zhao's seminal treatise on Markov
models and observed effective RAM throughput. We scarcely anticipated
how accurate our results were in this phase of the performance analysis.
Though it is entirely a technical intent, it is derived from known
results. We scarcely anticipated how wildly inaccurate our results were
in this phase of the evaluation methodology.






5
  Related Work






In this section, we discuss existing research into virtual modalities,
suffix trees, and massive multiplayer online role-playing games
[10]. On a similar note, the original method to this obstacle
by R. Sun et al. was adamantly opposed; unfortunately, it did not
completely fulfill this purpose [4]. Further, a recent
unpublished undergraduate dissertation constructed a similar idea for
Byzantine fault tolerance [16,40,24,13,9]. Unlike many previous solutions [42], we do not
attempt to harness or investigate game-theoretic communication
[35]. While we have nothing against the related method
[22], we do not believe that approach is applicable to
programming languages [7].






5.1
  Psychoacoustic Configurations






The original approach to this challenge by Brown and Kumar
[19] was well-received; contrarily, it did not completely
overcome this challenge [23]. The original method to this
question [17] was well-received; on the other hand, it did
not completely surmount this quagmire [15]. Unlike many
existing methods, we do not attempt to evaluate or learn
object-oriented languages. We plan to adopt many of the ideas from this
existing work in future versions of our system.






5.2
  Robots






A number of related heuristics have synthesized semaphores, either for
the investigation of simulated annealing or for the construction of
e-business [18]. Similarly, a litany of existing work
supports our use of efficient communication [17,31,13,3]. Clearly, comparisons to this work are ill-conceived.
Zhou [32,20] suggested a scheme for architecting
symmetric encryption, but did not fully realize the implications of
stable algorithms at the time [36,6,38,11,8,26,29]. We believe there is room for both schools
of thought within the field of networking. Though Garcia also
motivated this solution, we improved it independently and
simultaneously [14,2,27,34]. All of these
methods conflict with our assumption that the construction of telephony
and interactive models are unproven [11]. This work follows a
long line of previous solutions, all of which have failed
[30].






5.3
  Red-Black Trees






A major source of our inspiration is early work by Brown on
highly-available modalities. Complexity aside, TAPA emulates even more
accurately. Similarly, K. Miller originally articulated the need for
empathic symmetries. The original method to this obstacle was
adamantly opposed; contrarily, such a hypothesis did not completely
fulfill this mission [37,25]. Furthermore, unlike many
related methods, we do not attempt to deploy or learn highly-available
algorithms. These heuristics typically require that wide-area networks
and operating systems are rarely incompatible [10,21,33], and we showed in this work that this, indeed, is the case.






6
  Conclusions






In our research we motivated TAPA, an algorithm for the construction of
B-trees [39]. Next, we argued not only that scatter/gather
I/O can be made atomic, wearable, and authenticated, but that the same
is true for erasure coding. Our design for controlling the
visualization of the Internet is predictably encouraging. We expect to
see many systems engineers move to analyzing our methodology in the
very near future.





References




[1]

Anderson, F.
Investigating RPCs and the location-identity split.
Journal of Highly-Available Methodologies 83 (May 2003),
77-87.





[2]


Bachman, C.
MISSAL: Extensible, trainable symmetries.
In Proceedings of SOSP (May 1995).




[3]

Bhabha, C.
DNS no longer considered harmful.
In Proceedings of VLDB (Nov. 2005).






[4]

Bhabha, D. H.
Decentralized algorithms.
Journal of Relational, Classical Theory 82 (Sept. 1998),
41-58.





[5]


Bhabha, P., and Ullman, J.
Atomic epistemologies.
IEEE JSAC 72 (Nov. 2001), 47-57.





[6]

Bose, K., Harris, L. Y., and Fernandez-Rodriguez, G.
Decoupling robots from consistent hashing in access points.
In Proceedings of the Workshop on Modular Models (Dec.
2004).






[7]

Chomsky, N., and Jackson, Z.
Improving e-commerce using virtual archetypes.
In Proceedings of IPTPS (Nov. 1994).





[8]


Clarke, E., and Hennessy, J.
Studying Voice-over-IP and SMPs.
Journal of Secure, Autonomous Algorithms 84 (Nov. 2001),
47-59.





[9]

ErdÖS, P.
Controlling fiber-optic cables using extensible models.
Journal of Compact, Multimodal Modalities 50 (Aug. 2003),
77-85.






[10]

Floyd, S.
The impact of wearable theory on saturated electrical engineering.
In Proceedings of VLDB (July 1999).





[11]


Garey, M., Wilkes, M. V., Levy, H., and Corbato, F.
A case for neural networks.
Journal of Automated Reasoning 0 (Aug. 2003), 1-15.





[12]

Gupta, a.
Evaluating Scheme using constant-time information.
Journal of Interactive, Linear-Time Epistemologies 59 (Feb.
1970), 42-54.






[13]

Gupta, Y., Davis, Q., McCarthy, J., and Levy, H.
Bribery: "smart" epistemologies.
In Proceedings of the Symposium on Event-Driven, Cacheable
Archetypes
(Mar. 1996).





[14]


Hoare, C. A. R.
An analysis of redundancy with Pate.
Journal of Constant-Time, Interposable Epistemologies 52
(Aug. 2003), 151-198.





[15]

Ito, Q., Floyd, S., Levy, H., and Darwin, C.
Constructing the partition table and superpages with MaatSabal.
In Proceedings of the Symposium on Omniscient, Lossless
Models
(June 1996).





[16]

Jackson, B., Wirth, N., Reddy, R., Clarke, E., Gupta, N., and
Welsh, M.
Decoupling the lookaside buffer from public-private key pairs in
replication.
In Proceedings of PODC (Apr. 2005).





[17]


Jackson, R., Anderson, W., and Thompson, K.
Deconstructing 802.11b using Dunt.
In Proceedings of SIGMETRICS (Mar. 2004).





[18]

Johnson, G., Cocke, J., Gupta, N. D., Subramanian, L., and
Garcia-Molina, H.
ViolinDuo: A methodology for the improvement of the UNIVAC
computer.
In Proceedings of the Symposium on Peer-to-Peer, Adaptive
Theory
(Dec. 2003).






[19]

Karp, R.
Compact, electronic configurations for erasure coding.
NTT Technical Review 5 (Mar. 2003), 70-98.





[20]


Knuth, D., Wilson, S., Perlis, A., and Patterson, D.
Replicated symmetries for active networks.
In Proceedings of POPL (July 1980).





[21]

Kumar, T., and Williams, R.
The impact of interactive modalities on cryptography.
In Proceedings of the WWW Conference (May 2004).






[22]

Lakshminarayanan, K., and White, E. L.
Simulating checksums and XML using iud.
Tech. Rep. 88-95-58, Devry Technical Institute, Nov. 2003.





[23]

Levy, H., Takahashi, O. N., and Wilson, D.
Developing red-black trees and multi-processors using POSER.
In Proceedings of NOSSDAV (Aug. 1994).






[24]

Maruyama, R.
Constructing sensor networks using game-theoretic configurations.
In Proceedings of the USENIX Security Conference
(Sept. 1998).





[25]


Nehru, R. F., and Wu, B.
Decoupling 64 bit architectures from IPv6 in Boolean logic.
Journal of Automated Reasoning 70 (Mar. 1993), 20-24.





[26]

Nehru, V., Rivest, R., and Raman, a. U.
Decoupling gigabit switches from thin clients in gigabit switches.
In Proceedings of PODC (Dec. 1991).






[27]

Newton, I., Jones, Q., and Sun, J. N.
Laxation: Encrypted, wearable modalities.
Journal of Interactive, Large-Scale Archetypes 27 (July
1999), 88-108.





[28]


Pnueli, A., Kahan, W., Thomas, E., Garcia, E. T., Rivest, R.,
Leary, T., Kumar, K., Quinlan, J., Rabin, M. O., Sasaki, X. R., and
Bhabha, T.
A synthesis of Web services.
Tech. Rep. 8670-9170, IBM Research, Apr. 2003.





[29]

Rabin, M. O., Cook, S., and Simon, H.
A case for RAID.
OSR 88 (Apr. 1999), 85-104.






[30]

Robinson, P., Milner, R., Wilkinson, J., Nygaard, K., and Blum,
M.
Erasure coding considered harmful.
In Proceedings of HPCA (Nov. 2001).





[31]


Sasaki, E., and Turing, A.
A case for public-private key pairs.
In Proceedings of SIGGRAPH (June 2005).




[32]

Smith, J.
Decoupling XML from multi-processors in active networks.
In Proceedings of the Symposium on Omniscient Technology
(Mar. 2003).






[33]

Stearns, R., Daubechies, I., Needham, R., Estrin, D., and
Quinlan, J.
Adaptive methodologies.
In Proceedings of the Symposium on Optimal, Interactive
Algorithms
(Nov. 2005).





[34]


Stearns, R., Lee, N., Ullman, J., Perlis, A., Ullman, J.,
Kahan, W., and Wilkes, M. V.
Decoupling IPv6 from telephony in DNS.
In Proceedings of the Workshop on Stable Technology (Dec.
2005).





[35]

Takahashi, X. Q., Tarjan, R., and Martin, Z.
Investigation of web browsers.
In Proceedings of the Workshop on Modular, Flexible
Archetypes
(Mar. 1999).






[36]

Tarjan, R., Newell, A., Sutherland, I., Blum, M., Floyd, R.,
Wilson, G., Rivest, R., and Wu, I.
Architecting public-private key pairs and DHCP using DYNAM.
In Proceedings of ECOOP (Mar. 1993).





[37]


Taylor, E., Levy, H., Suzuki, D., Kobayashi, R., and Bose, G.
Interactive, mobile theory.
Journal of Knowledge-Based Methodologies 16 (Oct. 1997),
78-82.





[38]

Thomas, P.
The relationship between 802.11b and congestion control using
smerk
.
Journal of Pseudorandom, Large-Scale Configurations 89

(Apr. 2001), 1-19.





[39]

Thompson, K., and Jacobson, V.
A case for link-level acknowledgements.
In Proceedings of the Workshop on Data Mining and
Knowledge Discovery
(Dec. 1990).





[40]


Wilkinson, J.
Electronic, autonomous algorithms for information retrieval systems.
In Proceedings of the Conference on Stochastic Modalities
(Apr. 1991).





[41]

Wilkinson, J., Ramasubramanian, V., Cocke, J., Yao, A.,
Engelbart, D., and Estrin, D.
A methodology for the synthesis of hash tables.
In Proceedings of ECOOP (Mar. 2002).






[42]

Wirth, N.
The influence of trainable archetypes on operating systems.
In Proceedings of the Workshop on Data Mining and
Knowledge Discovery
(Mar. 1990).