Antilock braking system improves vehicle stability and direction control ability, allowing the wheel to stop without reducing and locking the distance to stop. A model of a quarter auto model of electronically monitor...
详细信息
In recent years, various vendors have made quantum software frameworks available. Yet with vendor-specific frameworks, code portability seems at risk, especially in a field where hardware and software libraries have n...
详细信息
ISBN:
(纸本)9781665494939
In recent years, various vendors have made quantum software frameworks available. Yet with vendor-specific frameworks, code portability seems at risk, especially in a field where hardware and software libraries have not yet reached a consolidated state, and even foundational aspects of the technologies are still in flux. Accordingly, the development of vendor-independent quantum programming languages and frameworks is often suggested. this follows the established architectural pattern of introducing additional levels of abstraction into software stacks, thereby piling on layers of abstraction. Yet software architecture also provides seemingly less abstract alternatives, namely to focus on hardware-specific formulations of problems that peel off unnecessary layers. In this article, we quantitatively and experimentally explore these strategic alternatives, and compare popular quantum frameworks from the software implementation perspective. We find that for several specific, yet generalisable problems, the mathematical formulation of the problem to be solved is not just sufficiently abstract and serves as precise description, but is likewise concrete enough to allow for deriving framework-specific implementations with little effort. Additionally, we argue, based on analysing dozens of existing quantum codes, that porting between frameworks is actually low-effort, since the quantum- and framework-specific portions are very manageable in terms of size, commonly in the order of mere hundreds of lines of code. Given the current state-of-the-art in quantum programming practice, this leads us to argue in favour of peeling off unnecessary abstraction levels.
this paper studies an inpatient allocation admission scheduling problem by considering the sharing of inpatient beds among patients from different medical departments. Hospital managers need to make admission control ...
详细信息
Answer-Set programming (ASP) has seen tremendous progress over the last two decades and is nowadays successfully applied in many real-world domains. However, for certain problems, the well-known ASP grounding bottlene...
详细信息
Existing deep-learning-based features have shown strong enough results (more than 90% accuracy) if a large amount of annotated data is available. However, in reality, data annotation is labor-intensive and expensive. ...
详细信息
Domain Name System (DNS) has been widely abused by cybercriminals as the critical infrastructure to supply their activities. thus malicious domains detection is a crucial assignment to combat and mitigate cybercrimes....
详细信息
Delay and jitter sensitive industrial control and remote driving application-driven network by best-effort to deterministic service. To meet the deterministic application of delay and jitter demands, industry and acad...
详细信息
the proceedings contain 35 papers. the topics discussed include: the search for meaning: inferential strategic reading comprehension in programming;examples of unsuccessful use of code comprehension strategies: a reso...
ISBN:
(纸本)9781450399760
the proceedings contain 35 papers. the topics discussed include: the search for meaning: inferential strategic reading comprehension in programming;examples of unsuccessful use of code comprehension strategies: a resource for developing code comprehension pedagogy;chronicles of exploration: examining the materiality of computational artifacts;engagement and anonymity in online computer science course forums;uncovering the hidden curriculum of university computing majors via undergraduate-written mentoring guides: a learner-centered design workflow;exploring models and theories of spatial skills in CS through a multi-national study;understanding spatial skills and encoding strategies in student problem solving activities;navigating a black box: students’ experiences and perceptions of automated hiring;and funds of knowledge used by adolescents of color in scaffolded sensemaking around algorithmic fairness.
Withthe increasing popularity of Bitcoin, considerable attention has been paid to its privacy and anonymity. To protect users' privacy better from the P2P network perspective, Bitcoin encourages users to connect ...
详细信息
暂无评论