Results 11 to 20 of about 9,877,117 (330)
Stack and Queue Layouts via Layered Separators [PDF]
It is known that every proper minor-closed class of graphs has bounded stack-number (a.k.a. book thickness and page number). While this includes notable graph families such as planar graphs and graphs of bounded genus, many other graph families are not ...
V. Dujmović, Fabrizio Frati
semanticscholar +3 more sources
Graphs with queue number three and unbounded stack number
31 pages, 7 ...
Leung, Yui Hin Arvin
openaire +3 more sources
Numerical Study on the Plume Behavior of Multiple Stacks of Container Ships
This paper showed different plume behaviors of exhausts from different number of stacks of the container ship, using CFD code PHOENICS version 6.0. The plume behavior was quantitatively analyzed by mass fraction of the pollutant in the exhaust and plume ...
Yine Xu, Qi Yu, Yan Zhang, Weichun Ma
doaj +1 more source
Directed Acyclic Outerplanar Graphs Have Constant Stack Number
The stack number of a directed acyclic graph $G$ is the minimum $k$ for which there is a topological ordering of $G$ and a $k$-coloring of the edges such that no two edges of the same color cross, i.e., have alternating endpoints along the topological ordering.
Jungeblut, Paul+2 more
openaire +3 more sources
Generating Question Titles for Stack Overflow from Mined Code Snippets [PDF]
Stack Overflow has been heavily used by software developers as a popular way to seek programming-related information from peers via the internet. The Stack Overflow community recommends users to provide the related code snippet when they are creating a ...
Zhipeng Gao+4 more
semanticscholar +1 more source
Dual-stack host discovery method based on SSDP and DNS-SD protocol
With the exhaustion of the IPv4 addresses, the promotion and deployment of IPv6 has been accelerating.Dual-stack technology allows devices to enable both IPv4 and IPv6 protocols, which means that users are facing more security risks.Although the existing
Fan SHI, Yao ZHONG, Pengfei XUE, Chengxi XU
doaj +3 more sources
Towards μs tail latency and terabit ethernet: disaggregating the host network stack
Dedicated, tightly integrated, and static packet processing pipelines in today's most widely deployed network stacks preclude them from fully exploiting capabilities of modern hardware.
Qizhe Cai+4 more
semanticscholar +1 more source
The Taming of the Stack: Isolating Stack Data from Memory Errors
—Despite vast research on defenses to protect stack objects from the exploitation of memory errors, much stack data remains at risk. Historically, stack defenses focus on the protection of code pointers, such as return addresses, but emerging techniques ...
Kaiming Huang+6 more
semanticscholar +1 more source
A stack-based chaotic algorithm for encryption of colored images [PDF]
In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose
H. Khodadadi, O. Mirzaei
doaj +1 more source
Energy Harvesting by Waste Acid/Base Neutralization via Bipolar Membrane Reverse Electrodialysis
Bipolar Membrane Reverse Electrodialysis (BMRED) can be used to produce electricity exploiting acid-base neutralization, thus representing a valuable route in reusing waste streams.
Andrea Zaffora+6 more
doaj +1 more source