نتایج جستجو برای: removing

تعداد نتایج: 34936  

1999
Kevin Skadron

Control-flow mispredictions are a profound impediment to processor performance, because each misprediction introduces a pipeline bubble of many cycles’ duration. For example, the minimum bubble in the recently released Alpha 21264 is at least seven cycles, and often as much as twenty cycles. With such long penalties, even small misprediction rates harm performance substantially. Although a huge...

Journal: :Eur. J. Comb. 2007
Michael J. Pelsmajer Marcus Schaefer Daniel Stefankovic

We give a new, topological proof that the weak Hanani-Tutte theorem is true on orientable surfaces and extend the result to nonorientable surfaces. That is, we show that if a graph G cannot be embedded on a surface S, then any drawing of G on S must contain two edges that cross an odd number of times. We apply the result and proof techniques to obtain new and old results about generalized thrac...

2011
Andrea Doroftei Nadia El-Mabrouk

Reconciliation is the commonly used method for inferring the evolutionary scenario for a gene family. It consists in “embedding” an inferred gene tree into a known species tree, revealing the evolution of the gene family by duplications and losses. The main complaint about reconciliation is that the inferred evolutionary scenario is strongly dependant on the considered gene tree, as few misplac...

Journal: :Journal of Software Maintenance 1999
Richard Fanta Václav Rajlich

In this paper we discus the elimination of function and class clones from industrial object-oriented code. Clone removal can decrease code size and facilitate maintenance. We eliminate clones by reengineering scenarios that are based on automated restructuring tools. The paper presents examples of clones, reengineering scenarios, and restructuring tools. The usefulness of the approach is demons...

2007
Montse Rubia Juan Carlos Cruellas Manel Medina

This paper concerns the barriers to interoperability that exist between the X.509 and EDIFACT Public Key Infrastructures (PKI), and proposes a method to overcome them. The solution lies in the DED-ICA 1 (Directory based EDI Certiicate Access and management) TELEM-ATIC Project, funded by the European Union. The main objective of this project is to deene and provide means to make these two infras...

2013
Volker Diekert Paul Gastin Antoine Petit

Timed automata are among the most widely studied models for real-time systems. Silent transitions, i.e., "-transitions, have already been proposed in the original paper on timed automata by Alur and Dill [2]. In [7] it is shown that "-transitions can be removed, if they do not reset clocks; moreover "-transitions strictly increase the power of timed automata, if there is a self-loop containing ...

2017
JIŘÍ LEBL

Suppose that the inverse image of the zero vector by a continuous map f : R → R has an isolated point P . The existence of a continuous map g which approximates f but is nonvanishing near P is equivalent to a topological property we call “locally inessential,” generalizing the notion of index zero for vector fields, the q = n case. For dimensions n, q where πn−1(Sq−1) is trivial, every isolated...

1996
M. Anton Ertl Andreas Krall

1 I n t r o d u c t i o n Computer designers and computer architects have been striving to improve uniprocessor performance since the invention of computers. The next step in this quest for higher performance is the exploitation of significant amounts of instruction-level parallelism. Therefore, superscalar and VLIW (very large instruction word) machines have been designed, which can execute se...

2017
Jaeho Lee Dan S. Wallach

Cryptographic libraries that implement Transport Layer Security (TLS) have a responsibility to delete cryptographic keys once they’re no longer in use. Any key that’s left in memory can potentially be recovered through the actions of an attacker, up to and including the physical capture and forensic analysis of a device’s memory. This paper describes an analysis of the TLS library stack used in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید