Results 31 to 40 of about 49,891 (172)
Algorithms for the executable programs planning on supercomputers
This research dealt with the problem of scheduling applied to the supercomputer’s execution. The goal is to develop an appreciated algorithm that schedules a group of several programs characterized by their time consuming very high on different ...
Abdullah M. Algashami
doaj +2 more sources
An unfair administrative decision considering by individuals or private corporates subject to be dismissed through Public Administrative Courts. This essay was written based on research conducted during September 2016 on the final and executable judge’s ...
Eny Kusdarini
doaj +1 more source
SPECRUN: The Danger of Speculative Runahead Execution in Processors [PDF]
Runahead execution is a continuously evolving microarchitectural technique for processor performance. This paper introduces the first transient execution attack on the runahead execution, called SPECRUN, which exploits the unresolved branch prediction during runahead execution.
arxiv
Programming Without Refining [PDF]
To derive a program for a given specification R means to find an artifact P that satisfies two conditions: P is executable in some programming language; and P is correct with respect to R.
Marwa Benabdelali+3 more
doaj +1 more source
Detecting Malicious Code by Binary File Checking [PDF]
The object, library and executable code is stored in binary files. Functionality of a binary file is altered when its content or program source code is changed, causing undesired effects.
Marius POPA
doaj +1 more source
Large-scale executable biology using rapid integration of computational models [PDF]
We plan to develop a systematic framework for assembling large-scale computational biological models by reusing and combining already existing modelling efforts.
Vladimir Rogojin, Ion Petre
doaj
COMPUTER VIROLOGY: SELF-DEFENSE SYSTEM
Based on the biological human models in defending human body against viruses, a new approach in designing the anti-virus system is introduced. This approach is called SDS( Self- Defence System).
Hamid M. A. Abdul-Hussain+1 more
doaj +1 more source
A Deep-Q-Network (DQN) controls a virtual agent as the level of a player using only screenshots as inputs. Replay memory selects a limited number of experience replays according to an arbitrary batch size and updates them using the associated Q-function.
Bonwoo Gu, Yunsick Sung
doaj +1 more source
METHOD OF DISPLAYING AN EXECUTABLE BUSINESS PROCESS MODELS INTO PETRI NETS
Executable business process models, as well as programs, require evidence of a defect-free finish. The methods based on the formalism of Petri nets are widely used.
Igor G. Fedorov
doaj +1 more source
BOXVIA: Bayesian optimization executable and visualizable application
Bayesian optimization (BO) has attracted attention in various research fields as a powerful probabilistic approach for solving optimization problems. To further facilitate the use of BO, we developed a graphical user interface-based Python application ...
Akimitsu Ishii+3 more
doaj