Results 11 to 20 of about 9,877,117 (330)

Stack and Queue Layouts via Layered Separators [PDF]

open access: yesInternational Symposium Graph Drawing and Network Visualization, 2016
It is known that every proper minor-closed class of graphs has bounded stack-number (a.k.a. book thickness and page number). While this includes notable graph families such as planar graphs and graphs of bounded genus, many other graph families are not ...
V. Dujmović, Fabrizio Frati
semanticscholar   +3 more sources

Numerical Study on the Plume Behavior of Multiple Stacks of Container Ships

open access: yesAtmosphere, 2021
This paper showed different plume behaviors of exhausts from different number of stacks of the container ship, using CFD code PHOENICS version 6.0. The plume behavior was quantitatively analyzed by mass fraction of the pollutant in the exhaust and plume ...
Yine Xu, Qi Yu, Yan Zhang, Weichun Ma
doaj   +1 more source

Directed Acyclic Outerplanar Graphs Have Constant Stack Number

open access: yes2023 IEEE 64th Annual Symposium on Foundations of Computer Science (FOCS), 2023
The stack number of a directed acyclic graph $G$ is the minimum $k$ for which there is a topological ordering of $G$ and a $k$-coloring of the edges such that no two edges of the same color cross, i.e., have alternating endpoints along the topological ordering.
Jungeblut, Paul   +2 more
openaire   +3 more sources

Generating Question Titles for Stack Overflow from Mined Code Snippets [PDF]

open access: yesACM Transactions on Software Engineering and Methodology, 2020
Stack Overflow has been heavily used by software developers as a popular way to seek programming-related information from peers via the internet. The Stack Overflow community recommends users to provide the related code snippet when they are creating a ...
Zhipeng Gao   +4 more
semanticscholar   +1 more source

Dual-stack host discovery method based on SSDP and DNS-SD protocol

open access: yes网络与信息安全学报, 2023
With the exhaustion of the IPv4 addresses, the promotion and deployment of IPv6 has been accelerating.Dual-stack technology allows devices to enable both IPv4 and IPv6 protocols, which means that users are facing more security risks.Although the existing
Fan SHI, Yao ZHONG, Pengfei XUE, Chengxi XU
doaj   +3 more sources

Towards μs tail latency and terabit ethernet: disaggregating the host network stack

open access: yesConference on Applications, Technologies, Architectures, and Protocols for Computer Communication, 2022
Dedicated, tightly integrated, and static packet processing pipelines in today's most widely deployed network stacks preclude them from fully exploiting capabilities of modern hardware.
Qizhe Cai   +4 more
semanticscholar   +1 more source

The Taming of the Stack: Isolating Stack Data from Memory Errors

open access: yesNetwork and Distributed System Security Symposium, 2022
—Despite vast research on defenses to protect stack objects from the exploitation of memory errors, much stack data remains at risk. Historically, stack defenses focus on the protection of code pointers, such as return addresses, but emerging techniques ...
Kaiming Huang   +6 more
semanticscholar   +1 more source

A stack-based chaotic algorithm for encryption of colored images [PDF]

open access: yesJournal of Artificial Intelligence and Data Mining, 2017
In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose
H. Khodadadi, O. Mirzaei
doaj   +1 more source

Energy Harvesting by Waste Acid/Base Neutralization via Bipolar Membrane Reverse Electrodialysis

open access: yesEnergies, 2020
Bipolar Membrane Reverse Electrodialysis (BMRED) can be used to produce electricity exploiting acid-base neutralization, thus representing a valuable route in reusing waste streams.
Andrea Zaffora   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy