Results 31 to 40 of about 49,891 (172)

Algorithms for the executable programs planning on supercomputers

open access: yesPLoS ONE, 2022
This research dealt with the problem of scheduling applied to the supercomputer’s execution. The goal is to develop an appreciated algorithm that schedules a group of several programs characterized by their time consuming very high on different ...
Abdullah M. Algashami
doaj   +2 more sources

Gugatan pelanggaran asas-asas umum pemerintahan yang Baik setelah berlakunya UU Administrasi Pemerintahan melalui PTUN Yogyakarta

open access: yesJurnal Civics: Media Kajian Kewarganegaraan, 2017
An unfair administrative decision considering by individuals or private corporates subject to be dismissed through Public Administrative Courts. This essay was written based on research conducted during September 2016 on the final and executable judge’s ...
Eny Kusdarini
doaj   +1 more source

SPECRUN: The Danger of Speculative Runahead Execution in Processors [PDF]

open access: yesarXiv, 2023
Runahead execution is a continuously evolving microarchitectural technique for processor performance. This paper introduces the first transient execution attack on the runahead execution, called SPECRUN, which exploits the unresolved branch prediction during runahead execution.
arxiv  

Programming Without Refining [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2018
To derive a program for a given specification R means to find an artifact P that satisfies two conditions: P is executable in some programming language; and P is correct with respect to R.
Marwa Benabdelali   +3 more
doaj   +1 more source

Detecting Malicious Code by Binary File Checking [PDF]

open access: yesInformatică economică, 2014
The object, library and executable code is stored in binary files. Functionality of a binary file is altered when its content or program source code is changed, causing undesired effects.
Marius POPA
doaj   +1 more source

Large-scale executable biology using rapid integration of computational models [PDF]

open access: yesComputer Science Journal of Moldova, 2016
We plan to develop a systematic framework for assembling large-scale computational biological models by reusing and combining already existing modelling efforts.
Vladimir Rogojin, Ion Petre
doaj  

COMPUTER VIROLOGY: SELF-DEFENSE SYSTEM

open access: yesJournal of Engineering, 2007
Based on the biological human models in defending human body against viruses, a new approach in designing the anti-virus system is introduced. This approach is called SDS( Self- Defence System).
Hamid M. A. Abdul-Hussain   +1 more
doaj   +1 more source

Enhanced DQN Framework for Selecting Actions and Updating Replay Memory Considering Massive Non-Executable Actions

open access: yesApplied Sciences, 2021
A Deep-Q-Network (DQN) controls a virtual agent as the level of a player using only screenshots as inputs. Replay memory selects a limited number of experience replays according to an arbitrary batch size and updates them using the associated Q-function.
Bonwoo Gu, Yunsick Sung
doaj   +1 more source

METHOD OF DISPLAYING AN EXECUTABLE BUSINESS PROCESS MODELS INTO PETRI NETS

open access: yesСтатистика и экономика, 2016
Executable business process models, as well as programs, require evidence of a defect-free finish. The methods based on the formalism of Petri nets are widely used.
Igor G. Fedorov
doaj   +1 more source

BOXVIA: Bayesian optimization executable and visualizable application

open access: yesSoftwareX, 2022
Bayesian optimization (BO) has attracted attention in various research fields as a powerful probabilistic approach for solving optimization problems. To further facilitate the use of BO, we developed a graphical user interface-based Python application ...
Akimitsu Ishii   +3 more
doaj  

Home - About - Disclaimer - Privacy