نتایج جستجو برای: linked lists trick
تعداد نتایج: 268734 فیلتر نتایج به سال:
On the basis of an overview Spanish words for exclusion and discrimination, we present lists protected characteristics in anti-discrimination law. This builds ground discussing (anti-)discrimination issues lexicography, exemplified, first, by emblematic controversy about inclusion, or exclusion, expression judiada (‘dirty trick’) Dictionary Real Academia Española. We go on, then, to analyze dis...
Predator is a new open source tool for verification of sequential C programs with dynamic linked data structures. The tool is based on separation logic with inductive predicates although it uses a graph description of heaps. Predator currently handles various forms of lists, including singly-linked as well as doubly-linked lists that may be circular, hierarchically nested and that may have vari...
Linked lists and other list-based sets are one of the most ubiquitous data structures in computer science. They are useful in their own right and are frequently used as building blocks in other data structures. A linked list can be “unrolled” to combine multiple keys in each node; this improves storage density and overall performance. This organization also allows an operation to skip over node...
We present an automated veriication technique for veriica-tion of concurrent linked lists with integer variables. We show that using our technique one can automatically verify invariants that relate (unbounded) integer variables and heap variables such as head 6 = null ! numItems > 0. The presented technique extends our previous work on composite symbolic representations with shape analysis. Th...
This paper presents the first experiments with an Intelligent Tutoring System in the domain of linked lists, a fundamental topic in Computer Science. The system has been deployed in an introductory college-level Computer Science class, and engendered significant learning gains. A constraint-based approach has been adopted in the design and implementation of the system. We describe the system ar...
XML has become the de facto standard for data exchange and transformation on the World Wide Web and is widely used in many applications of various fields, so it is urgent to develop some efficient methods to manage, store, query, and update XML data. There are two main methods to do this: the first method is a native approach which uses native XML databases to store XML data, and the second met...
We present a technique for dynamic allocation of memory to different queues. Our approach lies between two well-known techniques, linked lists and the relocation of data for preserving reasonable contiguous areas of available memory space. However, we avoid the main drawbacks of both. We never allocate more than two segments of contiguous memory per flow and thus avoid the proliferation of poin...
This paper proposes a method for rendering scenes of both opaque and transparent objects. Transparency depends on the attenuation coefficient and the thickness of the transparent object we wish to render. To get the visible radiance, the volume rendering equation should be solved. Instead of marching a ray, we build a list that contains the intersection points of the ray and object surfaces. In...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید