Results 21 to 30 of about 726,600 (314)
A \emph(k,t)-track layout of a graph G consists of a (proper) vertex t-colouring of G, a total order of each vertex colour class, and a (non-proper) edge k-colouring such that between each pair of colour classes no two monochromatic edges cross.
Vida Dujmović +2 more
doaj +3 more sources
On Linear Layouts of Graphs [PDF]
In a total order of the vertices of a graph, two edges with no endpoint in common can be crossing, nested, or disjoint. A k-stack (respectively, k-queue, k-arch) layout of a graph consists of a total order of the vertices, and a partition of the
Vida Dujmović, David R. Wood
doaj +2 more sources
Improving the functionality, 5S rating, and inventory management system of the supply department of a regimental academy in the Philippines through industrial engineering applications [PDF]
The Philippine Military Academy's (PMA) Cadet Mess Supply Room is the institution's essential area for storing and dispatching tableware on a daily basis, as well as during conferences, functions, and events on the premises.
Geraldine G. Nerona +10 more
doaj +1 more source
Adelie: continuous address space layout re-randomization for Linux drivers [PDF]
While address space layout randomization (ASLR) has been extensively studied for user-space programs, the corresponding OS kernel's KASLR support remains very limited, making the kernel vulnerable to just-in-time (JIT) return-oriented programming (ROP ...
R. Nikolaev +3 more
semanticscholar +1 more source
Based on a prototype presented in a prior publication, this research investigates the operational characteristics of a methane-fueled solid oxide fuel cell (SOFC) system with anode off-gas recirculation (AOGR) for electrical energy supply on sea-going ...
Jan Hollmann, Stephan Kabelac
doaj +1 more source
The heterostructure bipolar transistor solar cell architecture offers an attractive route to realize monolithic 3-terminal perovskite/silicon tandem solar cells compatible with both-side contact Si photovoltaic technologies.
Giliberti Gemma +2 more
doaj +1 more source
An In-Depth Survey of Bypassing Buffer Overflow Mitigation Techniques
Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, potentially compromising any software application or system. This vulnerability occurs primarily when someone attempts to write more bytes of data (shellcode)
Muhammad Arif Butt +4 more
doaj +1 more source
Heat recovery from Combined Cycle Power Plants for Heat Pumps [PDF]
Fossil fuel power plants, as combined cycle plants (CCGT), will increasingly have to shift their role from providing base-load power to providing fluctuating back-up power to control and stabilize the grid, but they also have to be able to run at the ...
Vannoni Alberto +3 more
doaj +1 more source
Winding Layout Considerations for Variable-Pole Induction Motors in Electric Vehicles
Winding layout plays a crucial role in enabling variable-pole operation in an induction machine (IM). Several winding design alternatives, which consist of toroidal and distributed single- and double-layer windings, have been shown to increase speed ...
Elie Libbos +3 more
semanticscholar +1 more source
Looped Pipelines Enabling Effective 3D Qubit Lattices in a Strictly 2D Device
Many quantum computing platforms are based on a two-dimensional (2D) physical layout. Here we explore a concept called looped pipelines, which permits one to obtain many of the advantages of a three-dimensional (3D) lattice while operating a strictly 2D ...
Zhenyu Cai, Adam Siegel, Simon Benjamin
doaj +1 more source

