This paper describes the development of an auto-active verification technique in the Frama-C framework. We outline the lemma functions method and present the corresponding ACSL extension, its implementation in Frama-C...
详细信息
This paper introduces SPar, an internal C++ Domain-Specific Language (DSL) that supports the development of classic stream parallel applications. The DSL uses standard C++ attributes to introduce annotations tagging t...
详细信息
In this paper combining the features of swap sequence and swap operation based Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) and K-Opt operation a hybrid algorithm is proposed to solve well known Tr...
详细信息
Various existing optimization and memory consistency management techniques for GPU applications rely on memory access patterns of kernels. However, they suffer from poor practicality because they require explicit user...
详细信息
The principle of network construction and the principle of request signals service of Secondary surveillance radar systems predetermined the work of the respondents of the considered systems in conditions of intra-sys...
ISBN:
(数字)9781538652640
ISBN:
(纸本)9781538652657
The principle of network construction and the principle of request signals service of Secondary surveillance radar systems predetermined the work of the respondents of the considered systems in conditions of intra-system and intentional correlated and uncorrelated interferences. The article estimates the impact of masking fluctuation interferences on the quality of the request signals detection. It is shown that the choice of time-interval codes as the request signals predetermined the low noise immunity of the considered systems when a channel is exposed by the fluctuation interference.
In this article e-leaming traffic which is served by system on the hyper convergent platform is considered. It was done the analysis of the known methods of determine the degree of pulsation of traffic. The method for...
详细信息
In the paper, based on a comparative analysis of the methods of processing time-interval codes used as secondary surveillance radar information signals consisting of a different sequence of performing joint decoding o...
详细信息
ISBN:
(数字)9781538652640
ISBN:
(纸本)9781538652657
In the paper, based on a comparative analysis of the methods of processing time-interval codes used as secondary surveillance radar information signals consisting of a different sequence of performing joint decoding operations, selecting signals by duration and time position, it is shown that the most effective is the signal processing method in which first the signals are decoded, then the signals are selected in accordance with the duration and in the future with the selection according to the time position, which provides the lowest probability of a false alarm of the first kind.
In this article e-leaming traffic which is served by system on the hyper convergent platform is considered. It was done the analysis of the known methods of determine the degree of pulsation of traffic. The method for...
详细信息
In this article e-leaming traffic which is served by system on the hyper convergent platform is considered. It was done the analysis of the known methods of determine the degree of pulsation of traffic. The method for calculating of e-learning traffic peakedness is proposed. Simulation and calculation results peakedness is analyzed.
This report proposes a new approach to determination of security complex metric. Such approach allows to obtain a quantitative assess based on network security recorded monitoring. Assessment of separate network host,...
详细信息
ISBN:
(纸本)9781538606384
This report proposes a new approach to determination of security complex metric. Such approach allows to obtain a quantitative assess based on network security recorded monitoring. Assessment of separate network host, which could be accessed from other networks, is conducted. Proposed metric considers a possibility of attack propagation within the network.
暂无评论