The paper presents the results of numerical simulation of the propeller Ka4-70 using the actuator line model in the OpenFOAM, AMReX and Nek5000 open-source software. The modifications of the tools for wind farm simula...
详细信息
Cryptographic protocols are utilized for establishing a secure session between 'honest' agents which communicate strictly according to the protocol rules as well as for ensuring the authenticated and confident...
详细信息
Perhaps, PDF is the most popular format to share non-editable documents. PDF documents are often untagged. In particular, this means that positions and the cell structure of tables are not designated explicitly. PDF t...
详细信息
A new approach is developed for the no-slip boundary condition in vortex methods. The procedure of double layer potential density reconstruction is considered, which consist of two steps. Firstly the integral equation...
详细信息
We present an automatic method, named SemaTESK, for generation of test sets for a translator front end. We focus on the validation and verification of static semantics checker. Most the know methods for semantics test...
详细信息
In this paper we describe a method for simulation-based verification of microprocessor units based on cycle-accurate contract specifications. Such specifications describe behavior of a unit in the form of precondition...
详细信息
This paper presents SWAT - system-Wide Analysis Toolkit. It is based on open source emulation and debugging projects and implements the approaches for non-intrusive system-wide analysis and debugging: lightweight OS-a...
详细信息
ISBN:
(数字)9781728189130
ISBN:
(纸本)9781728189147
This paper presents SWAT - system-Wide Analysis Toolkit. It is based on open source emulation and debugging projects and implements the approaches for non-intrusive system-wide analysis and debugging: lightweight OS-agnostic virtual machine introspection, full system execution replay, non-intrusive debugging with WinDbg, and full system reverse debugging. These features are based on novel non-intrusive introspection and reverse debugging methods. They are useful for stealth debugging and analysis of the platforms with custom kernels. SWAT includes multi-platform emulator QEMU with additional instrumentation and debugging features, GUI for convenient QEMU setup and execution, QEMU plugin for non-intrusive introspection, and modified version of GDB. Our toolkit may be useful for the developers of the virtual platforms, emulators, and firmwares/drivers/operating systems. Virtual machine intospection approach does not require loading any guest agents and source code of the OS. Therefore it may be applied to ROM-based guest systems and enables using of record/replay of the system execution. This paper includes the description of SWAT components, analysis methods, and some SWAT use cases.
This article presents novel method for efficient fuzzing of programs accepting complex structured data. It generates input data based on formal grammar description. Data generator is periodically autoconfigured based ...
详细信息
Code search is an important and well-studied task, but it usually means searching for code by a text query. We argue that using a code snippet (and possibly an error traceback) as a query while looking for bugfixing i...
详细信息
Abstract: An original algorithm is developed for vortex methods of computational fluid dynamics for determining the intensity of the vortex sheet on the surface of a body in the flow of an incompressible medium. Unlik...
详细信息
暂无评论