نتایج جستجو برای: data flow computing

تعداد نتایج: 3073999  

Journal: :EURASIP Journal on Wireless Communications and Networking 2017

Journal: :Parallel Computing 2014
Leandro A. J. Marzulo Tiago A. O. Alves Felipe Maia Galvão França Vítor Santos Costa

Data-flow is a natural approach to parallelism. However, describing dependencies and control between finegrained data-flow tasks can be complex and present unwanted overheads. TALM (TALM is an Architecture and Language for Multi-threading) introduces a user-defined coarse-grained parallel data-flow model, where programmers identify code blocks, called superinstructions, to be run in parallel an...

Journal: :international journal of automotive engineering 0
khodayari ghaffari

car-following models, as the most popular microscopic traffic flow modeling, is increasingly being used by transportation experts to evaluate new intelligent transportation system (its) applications. a number of factors including individual differences of age, gender, and risk-taking behavior, have been found to influence car-following behavior. this paper presents a novel idea to calculate the...

Journal: :Computer Methods in Applied Mechanics and Engineering 2017

Journal: :Electr. Notes Theor. Comput. Sci. 2005
Chiara Braghin Agostino Cortesi

In this paper, we present a refinement of a Control Flow Analysis aimed at studying information flow security in the the calculus of Mobile Ambients. The improvements are achieved by making the analysis be flow-sensitive: the analysis is able to keep track of temporal dependencies of capabilities application when computing a safe approximation of the run-time topology of Mobile Ambient processes.

ژورنال: پیاورد سلامت 2020
Hosseini, Foroughosadat , Ronaghi, Mohammad Hossein ,

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

Journal: :Information Security Journal: A Global Perspective 2009
Amine Boukhtouta Dima Alhadidi Mourad Debbabi

The main contribution of this paper is to present an extension to AspectJ compiler ajc-1.5.0 for security hardening. The extension consists of two pointcuts that can capture the returned computable values of methods in both the execution scope or following a method invocation. The returned values in programs are the results of operations done in the execution scope of methods. They are signific...

1995
Ivan P. Radivojevic Forrest Brewer

Optimization of hardware resources for conditional data-flow graph behavior is particularly important when conditional behavior occurs in cyclic loops and maximiza-tion of throughput is desired. In this paper, an exact and efficient conditional resource sharing analysis using a guard-based control representation is presented. The analysis is transparent to a scheduler implementation. The propos...

2010
Tangqing Kuang Wenjuan Gu

During the design of a two-cavity injection mould for router covers, two plans, single-gate plan and dual-gates plan, were setup based on the results of best gate location analysis combined with other aspects. Then fill analysis for the two plans were carried out. The dual-gates plan was selected as an optimal choice for its smaller clamping force, wall shear stress and injection pressure in co...

1992
Srinivasan Keshav

The flow control component of a transport layer protocol regulates the natural data transmission rate of an application to match the service rate offered by the network. In this paper, we study the problems that arise when a flow control protocol has to deal with long delays in receiving information about network state, and has large amounts of data transmitted but unacknowledged. We describe t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید