Code vs Code

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Beautiful Parallel Code: Evolution vs. Intelligent Design

The individual node of a massively parallel distributed memory cluster is now itself a complex parallel computer with multiple processors, each of which may have multiple cores and/or hardware accelerators. We focus on the question of how to effectively code such nodes targeting the problem domain of dense matrix computations. We argue that the traditional way of programming leads to a level of...

متن کامل

Integer Linear Programming vs. Graph-based Methods in Code Generation Integer Linear Programming vs. Graph-based Methods in Code Generation

A common characteristic of many embedded applications is that they are aimed at the high-volume consumer market, which is extremely cost-sensitive. However many of them impose stringent performance demands on the underlying system. Therefore, the code generation must take into account the restrictions and features given by the target architecture while satisfying these performance demands. High...

متن کامل

Code Obfuscation using Code Splitting with Self-modifying Code

Code Obfuscation is a protection technique that transforms the software into a semantically equivalent one which is strenuous to reverse engineer. As a part of software protection and security, code obfuscation got commercial interest from both vendors’ side to keep their proprietary as secret and customers’ side to have a trusted software that don’t leek or destroy their personal information. ...

متن کامل

NAO-mark vs QR-code Recognition by NAO Robot Vision

Nowadays, the research on robot on-map localization while using landmarks is more intensively dealing with visual code recognition. One of the most popular landmarks of this type is the QR-code. This paper is devoted to the experimental evaluation of vision-based on-map localization procedures that apply QR-codes or NAO marks, as implemented in service robot control systems. In particular, the ...

متن کامل

SCISM vs IA-64 Tagging: Differences/Code Density Effects

In this paper we first present two tagging mechanisms; the SCISM and IA-64; thereafter we describe the mapping of IA-64 ISA to a SCISM configuration without changing or reassigning the IA-64 instructions to preserve the original architectural properties. Under this limiting SCISM scenario, opcode reassignment will improve even more the SCISM performance, it is shown that SCISM tagging will sign...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: European Review of Contract Law

سال: 2012

ISSN: 1614-9939,1614-9920

DOI: 10.1515/ercl-2012-0277