搜索结果: 1-15 共查到“知识库 计算机科学技术基础学科 Analysis”相关记录34条 . 查询时间(0.328 秒)
Polymorphic versus Monomorphic Flow-Insensitive Points-to Analysis for C
Polymorphic versus Monomorphic Flow-Insensitive Points-to Analysis for C
2016/5/24
Polymorphic versus Monomorphic Flow-Insensitive Points-to Analysis for C.
Banshee: A Scalable Constraint-Based Analysis Toolkit
Banshee Scalable Constraint-Based Analysis Toolkit
2016/5/24
We introduce Banshee, a toolkit for constructing constraintbased analyses. Banshee’s novel features include a code generator for creating customized constraint resolution engines, incremental analysis...
Towards Asynchornous Many-Task In Situ Data Analysis Using Legion
Programming Models Asynchronous ManyTask Parallel Computing Computational Statistics
2016/5/24
We explore the use of asynchronous many-task (AMT) programming models for the implementation of in situ analysis towards the goal of maximizing programmer productivity and overall performance on next ...
Identifying Redundancy and Exposing Provenance in Crowdsourced Data Analysis
Crowdsourcing social data analysis
2016/5/24
We present a system that lets analysts use paid crowd workers to explore data sets and helps analysts interactively
examine and build upon workers’ insights. We take advantage of the fact that, for m...
Static program analysis techniques cannot know certain values,such as the value of user input or network state, at analysis time. While such unknown values need to be treated as non-deterministic choi...
A Theoretical Analysis of Normalized Discounted Cumulative Gain (NDCG) Ranking Measures
Ranking Ranking measures NDCG Consistent Distinguishability
2016/1/23
A central problem in ranking is to design a measure for evaluation of ranking functions. In this paper we study, from a theoretical perspective, the Normalized Discounted Cumulative Gain (NDCG) which ...
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
block ciphers key-length extension provable security ideal-cipher model
2016/1/22
We revisit the security (as a pseudorandom permutation) of cascading-based constructions for block-cipher key-length extension. Pre-vious works typically considered the extreme case where the adversar...
Optimization as an analysis tool for human complex decision making
mixed-integer programming nonlinear programming cognitive psychology measurement and performance
2015/7/21
We present a problem class of mixed-integer nonlinear programs (MINLPs) with nonconvex continuous relaxations which stem from economic test scenarios that are used in the analysis of human complex pro...
Analysis and shape optimization in incompressible flows with unstructured grids
Adjoints Unstructured grids Incompressible fl ows
2015/7/3
The reduced gradient evaluations provide major computa tional savings for unstructured grids and its accuracy and use for canonical and industrial problems is a major contribution of this study. The d...
Comparative Analysis of Computational Methods for Limit-Cycle Oscillations
Comparative Analysis Computational Methods Limit-Cycle Oscillations
2015/7/2
Various methods are explored in the computation of time-periodic solutions for autonomous systems. The purpose of the work is to illuminate the capabilities and limitations of methods, including a new...
Computational algorithms for aerodynamic analysis and design
Computational algorithms aerodynamic analysis design
2015/7/1
This paper is dedicated to Jacques Louis Lions, in honor of his extraordinary contributions not only to mathematics, but also in demonstrating the crucial role that mathematics of the highest order ca...
Matlab Simulation Toolset for SBAS Availability Analysis
Matlab Simulation Toolset SBAS Availability Analysis
2015/6/29
This paper describes a set of MATLAB functions currently being developed for SBAS availability analysis. This toolset includes simulation algorithms that are constantly being developed and updated by ...
Security Analysis of Geoencryption:A Case Study Using Loran
Security Analysis Geoencryption
2015/6/25
The term “geoencryption” or “location-based encryption” refer to a security algorithm that limits the access or decryption of information content to specified locations and/or times. The algorithm doe...
This work analyzes and discusses the current security environment of today's (and future) smartphones, and proposes a security model which will reduce smartphone vulnerabilities, preserving privacy, i...
The use of the computer technology for the evaluation of the strict morphological sperm analysis
bull stallion boar human diagnosis
2015/1/20
A programme for evaluating the strict morphological analysis of sperm was developed. The programme was verified by conducting 552 morphological analyses of bull, stallion, boar and human ejaculates. T...