The Influence of Alias and References Escape on Java Program Analysis [PDF]
The alias and references escape are often used in Java programs. They bring much convenience to the developers, but, at the same time, they also give adverse affects on the data flow and control flow of program during program analysis.
Shengbo Chen, Dashen Sun, Huaikou Miao
doaj +1 more source
The flow past a flatback airfoil with flow control devices: benchmarking numerical simulations against wind tunnel data [PDF]
As wind turbines grow larger, the use of flatback airfoils has become standard practice for the root region of the blades. Flatback profiles provide higher lift and reduced sensitivity to soiling at significantly higher drag values.
G. Papadakis, M. Manolesos
doaj +1 more source
Adding Control-Flow to a Visual Data-Flow Representation [PDF]
Previous studies have shown that novices do not tend to extract or use data-flow information during program comprehension. However, for impact analysis and similar tasks, data-flow information is necessary and highly relevant. Visual data-flow programming languages, such as Prograph/CPX, have been commercially successful, suggesting that they provide ...
David Dearman +2 more
openaire +1 more source
Accelerating deep reinforcement learning strategies of flow control through a multi-environment approach [PDF]
Artificial Neural Networks trained through Deep Reinforcement Learning (DRL) have recently been proposed as a methodology to discover complex Active Flow Control (AFC) strategies [Rabault et. al., Journal of Fluid Mechanics, 2019].
J. Rabault, A. Kuhnle
semanticscholar +1 more source
Control versus Data Flow in Parallel Database Machines [PDF]
The execution of a query in a parallel database machine can be controlled in either a control flow way, or in a data flow way. In the former case a single system node controls the entire query execution.
Blanken, Henk M., Teeuw, Wouter B.
core +2 more sources
Detecting violations of access control and information flow policies in data flow diagrams
The security of software-intensive systems is frequently attacked. High fines or loss in reputation are potential consequences of not maintaining confidentiality, which is an important security objective.
Stephan Seifermann +3 more
semanticscholar +1 more source
A watchdog processor to detect data and control flow errors [PDF]
A watchdog processor for the MOTOROLA M68040 microprocessor is presented. Its main task is to protect from transient faults caused by SEUs the transmission of data between the processor and the system memory, and to ensure a correct instructions' flow ...
Benso, Alfredo +3 more
core +1 more source
Data assimilation for control of a plane mixing layer [PDF]
The design of active model-based flow controllers requires the knowledge of a dynamical model of the flow. However, real-time and robust estimation of the flow state remains a challenging task when only limited spatial and temporal discrete measurements ...
Kumar N., Kerhervé F., Cordier L.
doaj +1 more source
Research on the control strategies of data flow transmission paths for MPTCP-based communication networks [PDF]
The performance of multipath transmission control protocol (MPTCP) subflow through the enhancement mechanism of the MPTCP communication is improved. When dealing with multiple MPTCP subflows occupying the same transmission path, critical issues such as ...
Zhong Shu +4 more
doaj +2 more sources
Temporal analysis of data flow control systems [PDF]
Due to their distributed/parallel and data-driven nature, control systems can easily be modeled according to a data flow approach. Control systems are very often real-time systems; therefore, a formalism able to capture timing is required. In this paper we introduce a data flow model that includes time and priority for specifying real-time control ...
Cinzia Bernardeschi +4 more
openaire +2 more sources

