Results 11 to 20 of about 615,424 (263)

Risk Factors for Return Visits to the Pediatric Emergency Department: Systematic Search and Review

open access: yesPanorama of Emergency Medicine, 2023
Objectives: Return visits (RVs) to the emergency department (ED) has always been a major concern. RVs to the emergency department are a big burden on the healthcare system as its cost is higher than the cost of the initial visit.
Chady El Tawil   +4 more
doaj   +1 more source

Specifying and Verifying Concurrent Algorithms with Histories and Subjectivity [PDF]

open access: yes, 2014
We present a lightweight approach to Hoare-style specifications for fine-grained concurrency, based on a notion of time-stamped histories that abstractly capture atomic changes in the program state.
A. Cerone   +10 more
core   +1 more source

Architecture and experimental evaluation of context-aware adaptation in vehicular networks

open access: yesEURASIP Journal on Wireless Communications and Networking, 2020
In vehicular networks, the propagation environment changes rapidly for mobile nodes. To achieve high throughput, wireless devices need to be highly adaptive to these environmental changes by altering their transmission parameters across different layers ...
Hui Liu   +4 more
doaj   +1 more source

A formally verified compiler back-end [PDF]

open access: yes, 2008
This article describes the development and formal verification (proof of semantic preservation) of a compiler back-end from Cminor (a simple imperative intermediate language) to PowerPC assembly code, using the Coq proof assistant both for programming ...
A Dold   +85 more
core   +8 more sources

Programs as Polypeptides [PDF]

open access: yes, 2015
We describe a visual programming language for defining behaviors manifested by reified actors in a 2D virtual world that can be compiled into programs comprised of sequences of combinators that are themselves reified as actors.
Williams, Lance R.
core   +1 more source

A Non-Null Annotation Inferencer for Java Bytecode [PDF]

open access: yes, 2008
We present a non-null annotations inferencer for the Java bytecode language. We previously proposed an analysis to infer non-null annotations and proved it soundness and completeness with respect to a state of the art type system.
Hubert, Laurent
core   +6 more sources

A partial breadth-first execution model for prolog [PDF]

open access: yes, 1994
MEM (Multipath Execution Model) is a novel model for the execution of Prolog programs which combines a depth-first and breadth-first exploration of the search tree.
González Colás, Antonio María   +1 more
core   +1 more source

Dynamic modelling of a direct internal reforming solid oxide fuel cell stack based on single cell experiments

open access: yesApplied Energy, 2019
Direct internal reforming enables optimal heat integration and reduced complexity in solid oxide fuel cell (SOFC) systems, but thermal stresses induced by the increased temperature gradients may inflict damage to the stack.
L. V. Biert   +3 more
semanticscholar   +1 more source

StORMeD: Stack Overflow Ready Made Data

open access: yes2015 IEEE/ACM 12th Working Conference on Mining Software Repositories, 2015
Stack Overflow is the de facto Question and Answer (Q&A) website for developers, and it has been used in many approaches by software engineering researchers to mine useful data.
Luca Ponzanelli   +2 more
semanticscholar   +1 more source

Degrees of tenant isolation for cloud-hosted software services: a cross-case analysis

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2018
A challenge, when implementing multi-tenancy in a cloud-hosted software service, is how to ensure that the performance and resource consumption of one tenant does not adversely affect other tenants.
Laud Charles Ochei   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy