Results 11 to 20 of about 30,621 (198)
Estimating runtime of a job in Hadoop MapReduce
Hadoop MapReduce is a framework to process vast amounts of data in the cluster of machines in a reliable and fault-tolerant manner. Since being aware of the runtime of a job is crucial to subsequent decisions of this platform and being better management,
Narges Peyravi, Ali Moeini
doaj +1 more source
On Distributed Runtime Verification by Aggregate Computing [PDF]
Runtime verification is a computing analysis paradigm based on observing a system at runtime (to check its expected behaviour) by means of monitors generated from formal specifications.
Giorgio Audrito +3 more
doaj +1 more source
Deep Graph Learning for Circuit Deobfuscation
Circuit obfuscation is a recently proposed defense mechanism to protect the intellectual property (IP) of digital integrated circuits (ICs) from reverse engineering.
Zhiqian Chen +8 more
doaj +1 more source
Analysis of the development Android’s runtime
The article presents the development of the Android runtime. Own application for Android is presented, which implements performance benchmarks used to test different versions of the Android runtime.
Kostiantyn Honcharenko, Jakub Smołka
doaj +1 more source
Runtime Monitoring of Software Execution Trace: Method and Tools
As with the extensive use of complex software in many fields, such as finance, transportation, aeronautics, and astronautics, software plays an increasingly more important role in society.
Shiyi Kong +3 more
doaj +1 more source
Accelerating Data Dependence Profiling Through Abstract Interpretation of Loop Instructions
Data dependence analysis is a must-do operation for parallelisation since it reveals the safe parallelisable regions of serial codes. Generally, it relies on dynamic analysis, which incurs substantial execution time and memory space overheads.
Mostafa Abbas +4 more
doaj +1 more source
Malware Authorship Attribution Model using Runtime Modules based on Automated Analysis
Malware authorship attribution is a research field that identifies the author of malware by extracting and analyzing features that relate the authors from the source code or binary code of malware.
Sangwoo Lee, Jungwon Cho
doaj +1 more source
IncDTW: An R Package for Incremental Calculation of Dynamic Time Warping
Dynamic time warping (DTW) is a popular distance measure for time series analysis and has been applied in many research domains. This paper proposes the R package IncDTW for the incremental calculation of DTW, and based on this principle IncDTW also ...
Maximilian Leodolter +2 more
doaj +1 more source
Session Types with Runtime Adaptation: Overview and Examples [PDF]
In recent work, we have developed a session types discipline for a calculus that features the usual constructs for session establishment and communication, but also two novel constructs that enable communicating processes to be stopped, duplicated, or ...
Cinzia Di Giusto, Jorge A. Pérez
doaj +1 more source
Designing Multi-Agent System Organisations for Flexible Runtime Behaviour
We address the challenge of multi-agent system (MAS) design for organisations of agents acting in dynamic and uncertain environments where runtime flexibility is required to enable improvisation through sharing knowledge and adapting behaviour.
Kathleen Keogh, Liz Sonenberg
doaj +1 more source

