Results 61 to 70 of about 11,256 (247)

Fine-Grain Iterative Compilation for WCET Estimation [PDF]

open access: yes, 2018
Compiler optimizations, although reducing the execution times of programs, raise issues in static WCET estimation techniques and tools. Flow facts, such as loop bounds, may not be automatically found by static WCET analysis tools after aggressive code ...
  +4 more
core   +3 more sources

Vehicular Traffic Networks Simulation: Towards the Implementation of a High‐Performance Computing Simulator

open access: yesComplexity, Volume 2026, Issue 1, 2026.
This work presents a comparison of different software and hardware implementations of a traffic simulator using a fluid‐based mesoscopic model. The model represents Vehicular Traffic Networks (VTNs) based on the flow resulting by the interconnection of dynamical agents associated to street segments and intersections.
Felipe Morales-Torres   +7 more
wiley   +1 more source

The Range‐Resident Logistic Model: A New Framework to Formalise the Population‐Dynamics Consequences of Range Residency

open access: yesEcology Letters, Volume 28, Issue 12, December 2025.
We introduce the range‐resident logistic model, an extension of the spatial logistic model that incorporates empirically supported range‐resident movement, showing that neglecting range residency can lead to under‐ or overestimating population carrying capacity.
Rafael Menezes   +4 more
wiley   +1 more source

AutoWIG: automatic generation of python bindings for C++ libraries [PDF]

open access: yesPeerJ Computer Science, 2018
Most of Python and R scientific packages incorporate compiled scientific libraries to speed up the code and reuse legacy libraries. While several semi-automatic solutions exist to wrap these compiled libraries, the process of wrapping a large library is ...
Pierre Fernique, Christophe Pradal
doaj   +2 more sources

FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution

open access: yes, 2017
The USB protocol has become ubiquitous, supporting devices from high-powered computing devices to small embedded devices and control systems. USB's greatest feature, its openness and expandability, is also its weakness, and attacks such as BadUSB exploit
Butler, Kevin R. B.   +4 more
core   +1 more source

Portable PGAS‐Based GPU‐Accelerated Branch‐And‐Bound Algorithms at Scale

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 25-26, 30 November 2025.
ABSTRACT The Branch‐and‐Bound (B&B) technique plays a key role in solving many combinatorial optimization problems, enabling efficient problem‐solving and decision‐making in a wide range of applications. It incrementally constructs a tree by building candidates to the solutions and abandoning a candidate as soon as it determines that it cannot lead to ...
Guillaume Helbecque   +4 more
wiley   +1 more source

Automatic Throughput and Critical Path Analysis of x86 and ARM Assembly Kernels

open access: yes, 2019
Useful models of loop kernel runtimes on out-of-order architectures require an analysis of the in-core performance behavior of instructions and their dependencies.
Hager, Georg   +3 more
core   +1 more source

Register‐Based and Stack‐Based Virtual Machines: Which Perform Better in JIT Compilation Scenarios?

open access: yesSoftware: Practice and Experience, Volume 55, Issue 11, Page 1896-1910, November 2025.
ABSTRACT Background Just‐In‐Time (JIT) compilation plays a critical role in optimizing the performance of modern virtual machines (VMs). While the architecture of VMs–register‐based or stack‐based–has long been a subject of debate, empirical analysis focusing on JIT compilation performance is relatively sparse. Objective In this study, we aim to answer
Bohuslav Šimek   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy