نتایج جستجو برای: heap leaching structures
تعداد نتایج: 468221 فیلتر نتایج به سال:
Dependence information between program values is extensively used in many program optimization techniques. The ability to identify statements, calls and loop iterations that do not depend on each other enables many transformations which increase the instruction and thread-level parallelism in a program. When program variables contain complex data structures including arrays, records, and recurs...
A Resource-Aware Semantics and Abstract Machine for a Functional Language with Explicit Deallocation
Safe is a first-order eager language with heap regions and unusual facilities such as programmer-controlled destruction and copying of data structures. The regions are disjoint parts of the heap where the compiler may allocate data structures. Thanks to regions, a runtime garbage collector is not needed. The language and its associated type system, guaranteeing that destruction facilities and r...
Sulfuric acid solution containing ferric iron is the extractant for industrial heap bioleaching of copper sulfides. To start a plant, sulfuric usually added to irrigation maintain adequate acidity (pH 1.0–2.0) dissolution. An practice secondary sulfide ore that began with only water without addition was successfully implemented and introduced in this manuscript. The mineral composition their be...
Many software model checkers are based on predicate abstraction. Values of variables in branching conditions are represented abstractly using predicates. The strength of this approach is its path-sensitive nature. However, if the control flow depends heavily on the values of memory cells on the heap, the approach does not work well, because it is difficult to find ‘good’ predicate abstractions ...
This whitepaper describes the basics of using and interpreting the results of the MTSA analysis tool. It also contains the results of several detailed case studies describing the results produced by the analysis for a number of interesting benchmarks, some of the features of the benchmarks that make them particularly interesting problems and examples of how the information provided by the MTSA ...
The goal of this paper is to propose a scheme that provides comprehensive security protection for the heap. Heap vulnerabilities are increasingly being exploited for attacks on computer programs. In most implementations, the heap management library keeps the heap meta-data (heap structure information) and the application’s heap data in an interleaved fashion and does not protect them against ea...
The extraction behavior of Cu(II) ions from a real sulfate liquor obtained from the heap leaching stage of a copper oxide ore was investigated using a chelating reagent, Chemorex CP-150 in kerosene. A comparative study was also carried out on the extraction capability of Cu(II) ions using other solvents including D2EHPA and Cyanex 272.Chemorex CP-150 demonstrated an effective and selective extr...
Modular analysis of procedures using summaries is a key technique to improve scalability of software model checking. Existing software model checkers do not fully exploit procedural structure for modular analysis. In the SLAM project, modular analysis using procedure summaries is done on a Boolean Program model, which contains only boolean types. We extend Boolean Programs to include reference ...
We develop general algorithms for reasoning about numerical properties of programs manipulating the heap via pointers. We automatically infer quantified invariants regarding unbounded sets of memory locations and unbounded numeric values. As an example, we can infer that for every node in a data structure, the node’s length field is less than its capacity field. We can also infer per-node state...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید