نتایج جستجو برای: executor
تعداد نتایج: 508 فیلتر نتایج به سال:
Simulation is a powerful tool in the development cycle of distributed systems; it has long been studied and practiced. The present paper presents an approach to timed interactive simulation based on the execution of timed CSP-like models; the language presented is PROMELA+, derived from PROMELA with the extension to temporal quantification. The whole simulation environment, named YES, includes ...
Intraquery parallelism has been recognized as a key requirement for DB2 major customers to allow data intensive queries with acceptable response time. DB2 delivers intraquery parallelism in three stages since DB2 Version 3 Release 1 in 1993. DB2 intraquery parallelism requires extensions on many DB2 components, such as optimizer, query executor, buffer manager, . ..etc. We briefly discuss the m...
This paper explores the design history of the nmake shell coprocess. Originally a special purpose uniprocessor executor, the coshell has evolved into a general purpose service that automatically executes shell actions on lightly loaded hosts in a local network. A major thrust of this work has been ease of use. The only privilege required for installation, administration or use is rsh access to ...
• Testing works ■ But, each test only explores one possible execution assert(f(3) == 5) ■ We hope test cases generalize, but no guarantees • Symbolic execution generalizes testing ■ Allows unknown symbolic variables in evaluation y = α; assert(f(y) == 2*y-1); ■ If execution path depends on unknown, conceptually fork symbolic executor int f(int x) { if (x > 0) then return 2*x 1; else return 10; }
This paper looks at the impact of changing Spark’s configuration parameters on machine learning algorithms using a large dataset—the UNSW-NB15 dataset. The environmental conditions that will optimize classification process are studied. To build smart intrusion detection systems, deep understanding is necessary. Specifically, focus following parameters: executor memory, number executors, cores p...
ABSTRACT Purpose: to analyze the relevance of family engagement in implementation Picture Exchange Communication System (PECS) children presented with Autism Spectrum Disorder (ASD). Methods: a longitudinal study sample 22 mother- child dyads ASD; 17 boys and 5 girls, mean age 7 years 2 months. The Executor Skills Protocol was used. PECS program consisted 24 therapy sessions active presence mot...
Nucleosome occupancy controls the accessibility of the transcription machinery to DNA regulatory regions and serves an instructive role for gene expression. Chromatin remodelers, such as the BAF complexes, are responsible for establishing nucleosome occupancy patterns, which are key to epigenetic regulation along with DNA methylation and histone modifications. Some reports have assessed the rol...
Symbolic binary execution is a dynamic analysis method which explores program paths to generate test cases for compiled code. Throughout execution, a program is evaluated with a bit-vector theorem prover and a runtime interpreter as a mix of symbolic expressions and concrete values. Left untended, these symbolic expressions grow to negatively impact interpretation performance. We describe an ex...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید