نتایج جستجو برای: subroutine

تعداد نتایج: 2923  

1996
Antony L. Hosking

We explore !.he ramifications ofobject residency assumptions and their impact on residency checking for several subroutine dispatch scenarios: procedural, static object-oriented, and dynamic (virtual) object-oriented. We obtain dynamic counts of the residency checks necessary for execution of several benchmark persistent programs under each of these scenarios. The resuhs reveal that significant...

Journal: :CoRR 2002
Larry Wos

The likelihood of an automated reasoning program being of substantial assistance for a wide spectrum of applications rests with the nature of the options and parameters it offers on which to base needed strategies and methodologies. This article focuses on such a spectrum, featuring W. McCune’s program OTTER, discussing widely varied successes in answering open questions, and touching on some o...

2013
Chris Peikert Yan Wang

The idea behind the SizeReduce(B) subroutine is, in the Gram-Schmidt decomposition B = B̃ ·U, to shift the entries in the upper triangle of U by integers (via unimodular transformations), so that they lie in [−12 , 1 2). Because changing an entry of U may affect the ones above it (but not below it) in the same column, we must make the changes upward in each column. Formally, the algorithm works ...

Journal: :J. Comb. Theory, Ser. B 2013
Maria Chudnovsky Paul D. Seymour Nicolas Trotignon

A net is a graph consisting of a triangle C and three more vertices, each of degree one and with its neighbour in C, and all adjacent to different vertices of C. We give a polynomial-time algorithm to test whether an input graph has an induced subgraph which is a subdivision of a net. Unlike many similar questions, this does not seem to be solvable by an application of the “three-in-a-tree” sub...

2003

For CBD, a component is much more than a subroutine in a modular programming approach, an object or class in an object-oriented system, or a package in a system model. In CBD the notion of a component both subsumes and expands on those ideas. A component is used as the basis for design, implementation, and maintenance of component-based systems. For now we will assume a rather broad, general no...

2012
Christina Brzuska Özgür Dagdelen Marc Fischlin

To establish a secure channel between two parties common security solutions often use a key exchange protocol as a preliminary subroutine to generate a shared key. These solutions include the protocols for secure communication between a reader and an identity card or passport, called PACE and EAC, and the TLS protocol for secure web communication. In this work we survey the cryptographic status...

2002
Matteo Slanina

This paper presents a deductive approach to the control problem for infinite-state reactive systems. It describes three proof rules, sound and relatively complete for formulas in the first two levels of the hierarchy of linear temporal logic—safety and response. The control conditions forming the premises of the rules are Π02 first-order formulas. If a subroutine can prove their validity constr...

2002
Maria Garcia Roger Goodwin

Survey data editing using the Fellegi-Holt model requires the complete set of explicit and implicit edits. This report presents new SAS software that generates the complete set of implicit (implied) edits from a given set of explicit ratio edits. We describe the corresponding methodology, along with detailed discussions on the considered alternatives. The new software implements a shortest path...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید