Results 41 to 50 of about 10,025,655 (237)
Probabilistic data flow analysis: a linear equational approach [PDF]
Speculative optimisation relies on the estimation of the probabilities that certain properties of the control flow are fulfilled. Concrete or estimated branch probabilities can be used for searching and constructing advantageous speculative and ...
Di Pierro, Alessandra, Wiklicky, Herbert
core +3 more sources
Pseudo-shock waves and their interactions in high-speed intakes [PDF]
In an air-breathing engine the flow deceleration from supersonic to subsonic conditions takes places inside the isolator through a gradual compression consisting of a series of shock waves.
Gnani, F., Kontis, K., Zare-Behtash, H.
core +1 more source
Real-time Data Flow Control for CBM-TOF Super Module Quality Evaluation
Super module assembled with MRPC detectors is the component unit of TOF (Time of Flight) system for the Compressed Baryonic Matter (CBM) experiment. Quality of super modules needs to be evaluated before it is applied in CBM-TOF.
An, Qi +7 more
core +1 more source
Network Transfer of Control Data: An Application of the NIST SMART DATA FLOW [PDF]
Pervasive Computing environments range from basic mobile point of sale terminal systems, to rich Smart Spaces with many devices and sensors such as lapel microphones, audio and video sensor arrays and multiple interactive PDA acting as electronic brief ...
Vincent Stanford +2 more
doaj
Operating Power Grids with Few Flow Control Buses
Future power grids will offer enhanced controllability due to the increased availability of power flow control units (FACTS). As the installation of control units in the grid is an expensive investment, we are interested in using few controllers to ...
Leibfried, Thomas +7 more
core +1 more source
A physics-based approach to flow control using system identification [PDF]
Control of amplifier flows poses a great challenge, since the influence of environmental noise sources and measurement contamination is a crucial component in the design of models and the subsequent performance of the controller.
Hervé, Aurelien +3 more
core +3 more sources
Research on cross-domain access control technology
Based on the latest research at home and abroad, the access control technology in cross-domain data flow were summarized and prospected.Firstly, combined with access control in complex application environments, the development of access control models ...
Tianyi ZHU +3 more
doaj +3 more sources
Extended access control mechanism for cross-domain data exchange
Aiming at the controlled sharing for cross-domain data exchange for complicated application systems,an extended access control mechanism was proposed.The control process was divided into two steps:constraint control and propagation control.The constraint
Rongna XIE +5 more
doaj +2 more sources
Unified control flow and data dependence traces [PDF]
We describe the design, generation, and compression of the extended whole program path (eWPP), representation that not only captures the control flow history of a program execution but also its data dependence history.
Sriraman Tallam, Rajiv Gupta 0001
openaire +1 more source
Control and Data Flow Execution of Java Program
Since decade understanding of programs has become a compulsory task for the students as well as for others who are involved in the process of developing software and providing solutions to open problems. In that aspect showing the problem in a pictorial presentation in a best manner is a key advantage to better understand it.
Safeeullah Soomro +2 more
openaire +2 more sources

