Results 11 to 20 of about 5,283,237 (295)

Adding Control-Flow to a Visual Data-Flow Representation [PDF]

open access: yes13th International Workshop on Program Comprehension (IWPC'05), 2005
Previous studies have shown that novices do not tend to extract or use data-flow information during program comprehension. However, for impact analysis and similar tasks, data-flow information is necessary and highly relevant. Visual data-flow programming languages, such as Prograph/CPX, have been commercially successful, suggesting that they provide ...
David Dearman   +2 more
openaire   +1 more source

Value-Based Constraint Control Flow Integrity

open access: yesIEEE Access, 2020
Control flow integrity (CFI) is a generic technique that prevents a control flow hijacking attacks by verifying the legitimacy of indirect branches against a predefined set of targets.
Dongjae Jung   +3 more
doaj   +1 more source

Control versus Data Flow in Parallel Database Machines [PDF]

open access: yes, 1993
The execution of a query in a parallel database machine can be controlled in either a control flow way, or in a data flow way. In the former case a single system node controls the entire query execution.
Blanken, Henk M., Teeuw, Wouter B.
core   +2 more sources

Data Delivery Implementation on River Flow Control System Prototype Using HTTP

open access: yesJITeCS (Journal of Information Technology and Computer Science), 2023
Data transmission is one of the most essential components in a critical system. One of them is to control the river water canal. Previous research related to water canal monitoring has been carried out, but the data is still local.
Mochammad Hannats Hanafi Ichsan   +4 more
doaj   +1 more source

The flow past a flatback airfoil with flow control devices: benchmarking numerical simulations against wind tunnel data [PDF]

open access: yesWind Energy Science, 2020
As wind turbines grow larger, the use of flatback airfoils has become standard practice for the root region of the blades. Flatback profiles provide higher lift and reduced sensitivity to soiling at significantly higher drag values.
G. Papadakis, M. Manolesos
doaj   +1 more source

A watchdog processor to detect data and control flow errors [PDF]

open access: yes, 2003
A watchdog processor for the MOTOROLA M68040 microprocessor is presented. Its main task is to protect from transient faults caused by SEUs the transmission of data between the processor and the system memory, and to ensure a correct instructions' flow ...
Benso, Alfredo   +3 more
core   +1 more source

The Influence of Alias and References Escape on Java Program Analysis [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2015
The alias and references escape are often used in Java programs. They bring much convenience to the developers, but, at the same time, they also give adverse affects on the data flow and control flow of program during program analysis.
Shengbo Chen, Dashen Sun, Huaikou Miao
doaj   +1 more source

Information-Flow Control for Programming on Encrypted Data [PDF]

open access: yes2012 IEEE 25th Computer Security Foundations Symposium, 2012
Using homomorphic encryption and secure multiparty computation, cloud servers may perform regularly structured computation on encrypted data, without access to decryption keys. However, prior approaches for programming on encrypted data involve restrictive models such as boolean circuits, or standard languages that do not guarantee secure execution of ...
John C. Mitchell   +3 more
openaire   +2 more sources

Research on the control strategies of data flow transmission paths for MPTCP-based communication networks [PDF]

open access: yesPeerJ Computer Science, 2023
The performance of multipath transmission control protocol (MPTCP) subflow through the enhancement mechanism of the MPTCP communication is improved. When dealing with multiple MPTCP subflows occupying the same transmission path, critical issues such as ...
Zhong Shu   +4 more
doaj   +2 more sources

LC-PCN: The Load Control PCN Solution [PDF]

open access: yes, 2007
There is an increased interest of simple and scalable resource provisioning solution for Diffserv network. The Load Control PCN (LC-PCN) addresses the following issues:\ud o Admission Control for real time data flows in stateless Diffserv Domains\ud o
Bader, A.   +3 more
core   +8 more sources

Home - About - Disclaimer - Privacy