Results 181 to 190 of about 10,025,655 (237)
Some of the next articles are maybe not open access.
Complexity measurement of data and control flow
ACM SIGSOFT Software Engineering Notes, 2005This paper describes a simple mathematical algorithm to determine the complexity of software that includes control flow and data flow. Two techniques are analyzed using examples to determine the overall complexity. One of them computes the determinant of a square matrix represented as an N2 chart.
openaire +1 more source
Seamless integration of control flow and data flow in a visual language
Proceedings ACS/IEEE International Conference on Computer Systems and Applications, 2002In the visual programming domain, the stress of research is laid on the use of visual formalism, which is considered to be more intuitive than the textual formalism, in the programming task. Some visual languages are based purely on data flow. With such languages, the execution order depends on the availability of data and it is therefore difficult to ...
Honitriniela Randriamparany +1 more
openaire +1 more source
Concurrency and Computation, 2018
Recent developments in the cloud technologies have motivated the migration of distributed large systems, specifically the Internet of Things to the cloud architecture.
Anum Khurshid +5 more
semanticscholar +1 more source
Recent developments in the cloud technologies have motivated the migration of distributed large systems, specifically the Internet of Things to the cloud architecture.
Anum Khurshid +5 more
semanticscholar +1 more source
An execution model for the seamless integration of control flow and data flow
Proceedings ACS/IEEE International Conference on Computer Systems and Applications, 2002In the visual languages community, data flow and control flow models are often seen as antagonistic. However, data flow formalisms are seldom purely data flow based, and control flow formalisms are seldom purely control flow based. We describe the execution model of a formalism that completely integrates the two kinds of flows.
Bertrand Ibrahim +1 more
openaire +1 more source
Analysis of Control Flow and Data Flow
2010In this chapter, we analyze the control flow and dataflow of a C program. Understanding these properties helps a designer to understand the relationship between a C program and an equivalent hardware implementation of that C program. Control edges and data edges reflect relationships between the operations of the C program, and we distinguish control ...
openaire +1 more source
2013
In the process of choosing a Data Flow (DF) programming model for describing an application, one must make a difficult trade off between expressiveness and analytical properties. At one extreme, a Dynamic Data-flow (DDF) model is expressive enough to mimic the behavior of a Turing machine [10], but lacks many useful analytical properties; for instance,
Orlando Moreira, Henk Corporaal
openaire +1 more source
In the process of choosing a Data Flow (DF) programming model for describing an application, one must make a difficult trade off between expressiveness and analytical properties. At one extreme, a Dynamic Data-flow (DDF) model is expressive enough to mimic the behavior of a Turing machine [10], but lacks many useful analytical properties; for instance,
Orlando Moreira, Henk Corporaal
openaire +1 more source
Reduction, data flow and control flow models of computation
1987This paper introduces a systematic approach to the modeling of computational processes in terms of the control discipline which drives a computation step by step ahead; the operational discipline which, in an orderly manner, supplies operators with operands.
openaire +1 more source
Control flow and data flow oriented integration testing methods
Software Testing, Verification and Reliability, 1992AbstractThe testing of modular software systems can be divided into a module testing phase and an integration testing phase. While module testing checks the modules separately, integration testing examines the use of interfaces in a modular system. Integration testing allows errors to be found which cannot be found by module testing.
openaire +1 more source
Information Flow Control on the Basis of Meta Data
2019Usually security of information flows is supported by Firewalls, Proxy servers, Intrusion Detection Systems. These mechanisms work when there can be malicious information flows. The paper presents the new security mechanism which can be used instead of traditional measures. This is due to the strong limitation of the existence of non needed information
Alexander A. Grusho +2 more
openaire +1 more source
Coordinated Data Flow Control in IoT Networks
2020An IoT cloud environment consists of connected physical devices communicating with the cloud, sending telemetry data and accepting actuation information. For sensors, the data flow is from the physical devices to the cloud. The IoT edge device is responsible for collecting this data and forwarding it to the cloud environment for processing. The time it
Nipun Balan Thekkummal +4 more
openaire +1 more source

