Results 81 to 90 of about 10,440 (199)
Quantum–Classical Hybrid Architecture for Solving the Muskat–Leverett Model
This study develops a hybrid quantum–classical algorithm to solve the Muskat–Leverett model by reformulating it as a system of linear equations. Utilising quantum algorithms, such as HHL and VQLS, alongside classical (CPU and GPU) computing, the approach achieves up to 6.42× speedup over CPUs and ∼10× over quantum simulators.
Beimbet Daribayev +4 more
wiley +1 more source
Innovative Hardware Accelerator Architecture for FPGA‐Based General‐Purpose RISC Microprocessors
Reconfigurable computing (RC) theory aims to take advantage of the flexibility of general‐purpose processors (GPPs) alongside the performance of application specific integrated circuits (ASICs). Numerous RC architectures have been proposed since the 1960s, but all are struggling to become mainstream.
Ehsan Ali, Iouliia Skliarova
wiley +1 more source
This paper analyzes approaches for optimizing C/C++ applications used in twostage compilation system, allowing distributing such applications in the LLVM (low level virtual machine) intermediate representation.
Sh. F. Kurmangaleev
doaj
Dynamic analysis of virtualization- and dispatching-obfuscated applications
Obfuscation algorithms are now widely used to prevent software reverse engineering. Binary code virtualization is one of the most powerful obfuscations technics.
M. G. Bakulin +5 more
doaj +1 more source
Метою роботи є пошук неоптимального машинного коду, який генерується iнфраструктурою LLVM для мов програмування, якi її використовують та подальша оптимiзацiя. Результатом роботи стала реалiзацiя проходу, який знаходить патерн перевiрки двох цiлих знакових чисел на одинаковий знак наївним методом та перетворює вiдповiдний IR на оптимальнiший ...
openaire +1 more source
Ionospheric Radio Beacon Signal Analysis and Parameter Estimation Using Automatic Differentiation
Abstract Continuous wave signals from a network of high frequency (HF) beacons in Peru and other instruments are used to reconstruct the regional ionospheric electron number density in the volume surrounding the network. The continuous wave (CW) HF signals employ binary phase codes with pseudorandom noise (PRN) encoding, and the observables include ...
Jhassmin A. Aricoche, David L. Hysell
wiley +1 more source
Copy-paste semantic errors detection
The paper describes a method for semantic errors detection arising during incorrect code copy-paste made by the developer. The method consists of two basic parts. The first part detects code clones based on lexical analysis of the program.
Sevak Sargsyan
doaj +1 more source
Towards Energy Consumption Verification via Static Analysis
In this paper we leverage an existing general framework for resource usage verification and specialize it for verifying energy consumption specifications of embedded programs.
Haemmerle, Remy +4 more
core
Metamorphic Code Generation from LLVM IR Bytecode [PDF]
Metamorphic software changes its internal structure across generations with its functionality remaining unchanged. Metamorphism has been employed by malware writers as a means of evading signature detection and other advanced detection strate- gies ...
Sjsu Scholarworks +4 more
core +3 more sources
We present libVersioningCompiler, a C++ library designed to support the dynamic generation of multiple versions of the same compute kernel in a HPC scenario.
S. Cherubin, G. Agosta
doaj +1 more source

