Results 71 to 80 of about 10,356 (199)

Batched ranged random integer generation

open access: yesSoftware: Practice and Experience, Volume 55, Issue 1, Page 155-169, January 2025.
Summary Pseudorandom values are often generated as 64‐bit binary words. These random words need to be converted into ranged values without statistical bias. We present an efficient algorithm to generate multiple independent uniformly‐random bounded integers from a single uniformly‐random binary word, without any bias.
Nevin Brackett‐Rozinsky, Daniel Lemire
wiley   +1 more source

Two-stage compilation for optimizing and deploying programs in general purpose languages

open access: yesТруды Института системного программирования РАН, 2018
We describe the approach for two-stage compilation of C/C++ programs using the LLVM compiler infrastructure that allows optimizing programs taking into account the user profile and his/her target machine features, as well as deploying programs in a cloud
Arutyun Avetisyan
doaj  

Machine Learning-Based Vulnerability Detection in Rust Code Using LLVM IR and Transformer Model

open access: yesMachine Learning and Knowledge Extraction
Rust’s growing popularity in high-integrity systems requires automated vulnerability detection in order to maintain its strong safety guarantees. Although Rust’s ownership model and compile-time checks prevent many errors, sometimes unexpected bugs may ...
Young Lee   +4 more
doaj   +1 more source

Interprocedural taint analysis for LLVM-bitcode

open access: yesТруды Института системного программирования РАН, 2018
Today the development cycle of many application classes requires a security analysis stage. Taint analysis is widely used to check programs for different security vulnerabilities.
V. K. Koshelev   +2 more
doaj   +1 more source

Enhancing intrusion detection against denial of service and distributed denial of service attacks: Leveraging extended Berkeley packet filter and machine learning algorithms

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
Abstract As organizations increasingly rely on network services, the prevalence and severity of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have emerged as significant threats. The cornerstone of effectively addressing these challenges lies in the timely and precise detection capabilities offered by advanced intrusion ...
Nemalikanti Anand   +5 more
wiley   +1 more source

Cross‐Platform Based Scalable 3D Media Sequence Playback Framework Architecture

open access: yesElectronics Letters, Volume 61, Issue 1, January/December 2025.
This paper presents a novel study on a web playback framework designed to efficiently render stereoscopic 3D media content across various platforms within web environments. We propose a scalable 3D media web playback framework (S3WPF) that leverages advanced encoding technology.
Kwangmu Shin, Sunghoon Kim
wiley   +1 more source

Quantum–Classical Hybrid Architecture for Solving the Muskat–Leverett Model

open access: yesIET Quantum Communication, Volume 6, Issue 1, January/December 2025.
This study develops a hybrid quantum–classical algorithm to solve the Muskat–Leverett model by reformulating it as a system of linear equations. Utilising quantum algorithms, such as HHL and VQLS, alongside classical (CPU and GPU) computing, the approach achieves up to 6.42× speedup over CPUs and ∼10× over quantum simulators.
Beimbet Daribayev   +4 more
wiley   +1 more source

Аналiз захищеностi LLVM

open access: yes, 2023
У роботі наведено огляд компонентів платформи LLVM, проаналізовано механізми безпеки та виконано тестування захищеностів від шкідливого коду. В аналіз безпеки входить перевірка можливих вразливостей, та систем захисту які інтегровані в системі.
openaire   +1 more source

Innovative Hardware Accelerator Architecture for FPGA‐Based General‐Purpose RISC Microprocessors

open access: yesJournal of Electrical and Computer Engineering, Volume 2025, Issue 1, 2025.
Reconfigurable computing (RC) theory aims to take advantage of the flexibility of general‐purpose processors (GPPs) alongside the performance of application specific integrated circuits (ASICs). Numerous RC architectures have been proposed since the 1960s, but all are struggling to become mainstream.
Ehsan Ali, Iouliia Skliarova
wiley   +1 more source

Ionospheric Radio Beacon Signal Analysis and Parameter Estimation Using Automatic Differentiation

open access: yesJournal of Geophysical Research: Machine Learning and Computation, Volume 1, Issue 4, December 2024.
Abstract Continuous wave signals from a network of high frequency (HF) beacons in Peru and other instruments are used to reconstruct the regional ionospheric electron number density in the volume surrounding the network. The continuous wave (CW) HF signals employ binary phase codes with pseudorandom noise (PRN) encoding, and the observables include ...
Jhassmin A. Aricoche, David L. Hysell
wiley   +1 more source

Home - About - Disclaimer - Privacy