Introducing a Practical Educational Tool for Correlating Algorithm Time Complexity with Real Program Execution
نویسندگان
چکیده
منابع مشابه
Time and Space Complexity Reduction of a Cryptanalysis Algorithm
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
متن کاملIntroducing educational package of safety (An educational tool to get familiar with drugs and drinks
This article has no abstract.
متن کاملA Practical and Complete Algorithm for Testing Real-Time Systems
This paper presents a formal method for generating conformance tests for real-time systems. Our algorithm is complete in that, under a test hypothesis, if the system being tested passes every test generated then the tested system is bisimilar to its speciication. Because the test algorithm has exponential worst case complexity and nite state automata models of real-time systems are typically ve...
متن کاملIntroducing a New SYBR green Real-time PCR for Detection of SARS-CoV2 Virus Genome
Background and purpose: There are various methods for molecular detection of SARS-CoV2 genome among which, PCR-based methods are the most reliable for making diagnosis. The majority of approved PCR kits for detection of Coronavirus are based on TaqMan real-time PCR which is expensive due to incorporating fluorescent and quencher-harboring probe. The aim of this study was to design a simple and ...
متن کاملTime and Space Complexity Reduction of a Cryptanalysis Algorithm
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Technology and Computer Science
سال: 2018
ISSN: 2540-9824,2540-9433
DOI: 10.25126/jitecs.20183140