نتایج جستجو برای: heap leaching structure

تعداد نتایج: 1579971  

2008
M. Sepehri

Several distributed algorithms require that there be a coordinator process in the entire system. Since all other processes in the system have to interact with the coordinator, they all must agree on who the coordinator is. Furthermore, if the coordinator process fails due to the failure of the site on which it is located, a new coordinator process must be elected to take up the job of the faile...

2013
Luk'avs Vokvr'inek

Computing the abelian heap of unpointed stable homotopy classes of maps Abstract An algorithmic computation of the set of unpointed stable homotopy classes of equivariant fibrewise maps was described in a recent paper [4] of the author and his collaborators. In the present paper, we describe a simplification of this computation that uses an abelian heap structure on this set that was observed i...

2012
Stefan Edelkamp Amr Elmasry Jyrki Katajainen

An array-based weak heap is an efficient data structure for realizing an elementary priority queue. In this paper we focus on the construction of a weak heap. Starting from a straightforward algorithm, we end up with a catalogue of algorithms that optimize the standard algorithm in different ways. As the optimization criteria, we consider how to reduce the number of instructions, branch mispred...

Journal: :Multiple Sclerosis Journal 2021

2012
Pietro Ferrara Raphael Fuchs Uri Juhasz

Effective static analyses must precisely approximate both heap structure and information about values. During the last decade, shape analysis has obtained great achievements in the field of heap abstraction. Similarly, numerical and other value abstractions have made tremendous progress, and they are effectively applied to the analysis of industrial software. In addition, several generic static...

2012
Stephanie Balzer Thomas R. Gross Peter Müller

Most ownership systems enforce a tree topology on a program’s heap. The tree topology facilitates many aspects of programming such as thread synchronization, memory management, and program verification. Ownership-based verification techniques leverage the tree topology of an ownership system (and hence the fact that there exists a single owner) to restore sound modular reasoning about invariant...

2013
S. P. Anandaraj

Memory leak is a time consuming bug often created by C++ developers. Detection of memory leaks is often tedious. Things get worst if the code is not written by you, or if the code base is quite huge. The most difficult coding bugs such as Memory Corruption, reading uninitialized memory, using freed memory, are challenging in recognizing and fixing due to the delay and non-determinism linking th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید