Results 31 to 40 of about 759,542 (211)
Python Type Hints are Turing Complete [PDF]
Grigore showed that Java generics are Turing complete by describing a reduction from Turing machines to Java subtyping. We apply Grigore's algorithm to Python type hints and deduce that they are Turing complete. In addition, we present an alternative reduction in which the Turing machines are simulated in real time, resulting in significantly lower ...
arxiv
Automated integration of real-time and non-real-time defense systems
Various application domains require the integration of distributed real-time or near-real-time systems with non-real-time systems. Smart cities, smart homes, ambient intelligent systems, or network-centric defense systems are among these application ...
Emre Dalkıran+3 more
doaj
Accelerating Java Ray Tracing Applications on Heterogeneous Hardware [PDF]
Ray tracing has been typically known as a graphics rendering method capable of producing highly realistic imagery and visual effects generated by computers. More recently the performance improvements in Graphics Processing Units (GPUs) have enabled developers to exploit sufficient computing power to build a fair amount of ray tracing applications with ...
arxiv
Scoped Types for Real-Time Java [PDF]
A memory model based on scoped areas is one of the distinctive features of the Real-Time Specification for Java (RTSJ). Scoped types ensure timely reclamation of memory and predictable performance. The price to pay for these benefits is an unfamiliar programming model that, at the same time, is complex, requires checking all memory accesses, and ...
Tian Zhao, Jan Vitek, James Noble
openaire +1 more source
Achieving Fairness in DareFightingICE Agents Evaluation Through a Delay Mechanism [PDF]
This paper proposes a delay mechanism to mitigate the impact of latency differences in the gRPC framework--a high-performance, open-source universal remote procedure call (RPC) framework--between different programming languages on the performance of agents in DareFightingICE, a fighting game research platform.
arxiv
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing [PDF]
Contemporary fuzz testing techniques focus on identifying memory corruption vulnerabilities that allow adversaries to achieve either remote code execution or information disclosure. Meanwhile, Algorithmic Complexity (AC)vulnerabilities, which are a common attack vector for denial-of-service attacks, remain an understudied threat.
arxiv +1 more source
Um fator recorrente das redes de escritório é a busca por maior desempenho, ou seja, redes que executem suas tarefas no menor tempo possível. Porém, para redes industriais o desempenho médio não é o fator mais relevante, isso porque o desempenho de um ...
Jalerson Raposo Ferreira de Lima+6 more
doaj +1 more source
The purpose of this study is to investigate central java teachers’ perspective about STEM. Science, technology, engineering and mathematics or STEM recently has been becoming the most discussed in education practice.
Fiki Kusuma Astuti+4 more
doaj +1 more source
By consulting various worldwide definitions of microgrids and distributed energy, this study presents a microgrid-structured multi-agent system and uses Matlab/Simulink to construct a circuit with microgrid features, which enables the changes in each ...
Ming-Tse Kuo, Shiue-Der Lu
doaj +1 more source
Greatest-common-divisor dependency of juggling sequence rotation efficient performance
In previous experimental study with three-way-reversal and juggling sequence rotation algorithms, using 20,000,000 elements for type LONG in Java, the average execution times have been shown to be 49.66761ms and 246.4394ms, respectively.
Erho Joseph A.+2 more
doaj +1 more source