Refactoring is a standard part of any modern development cycle. It helps to reduce technical debt and keep software projects healthy. However, in many cases refactoring requires that transformations are applied global...
详细信息
In this paper we propose an approach to optimization of reflection which combines flexibility and efficiency while implementing metaobject-based systems. The main idea is to flatten nested metainterpreter layers using...
详细信息
This study leverages the capabilities of Long Short-Term Memory (LSTM) models in forecasting global Monkeypox infections, thereby demonstrating the significant potential of advanced machine learning techniques in epid...
This study leverages the capabilities of Long Short-Term Memory (LSTM) models in forecasting global Monkeypox infections, thereby demonstrating the significant potential of advanced machine learning techniques in epidemiological forecasting. Our LSTM model effectively navigates the challenges posed by non-stationary time-series data, a common issue in epidemiological studies. It successfully captures the underlying patterns in the data, producing reliable forecasts. The model’s performance was evaluated using several metrics, including RMSE, MSE, MAE, and R 2 , all of which pointed to its robust and satisfactory predictive capabilities. Our findings underscore the significant role LSTM models can play in informing the development of timely and effective disease control and prevention strategies. They thereby contribute to enhancing public health responses to emerging infectious diseases such as Monkeypox. However, despite the promising results, the study highlights the ongoing challenge of enhancing the interpretability of LSTM models, an area that warrants further research. As a future direction, efforts should focus on refining LSTM models to bolster their interpretability, ensuring their broader adoption and utility in public health practice.
The challenges of black box optimization arise due to imprecise responses and limited output information. This article describes new results on optimizing multivariable functions using an Order Oracle, which provides ...
详细信息
In this paper, we consider checking the robustness of web services using the model of finite state automata and analyzing the solvability of an automaton equation over the concatenation operator. The paper contains th...
详细信息
In this paper, we consider checking the robustness of web services using the model of finite state automata and analyzing the solvability of an automaton equation over the concatenation operator. The paper contains the procedure for constructing the largest solution for a solvable automata equation, since a solution to the equation describes a malicious input. Experimental results have shown that this approach can be effective when checking the robustness of web services.
Decompilation is reconstruction of a program in a highlevel language from a program in a low-level language. In most cases static decompilation is unable to completely reconstruct high-level data types due to loss of ...
We consider the task of minimizing the sum of smooth and strongly convex functions stored in a decentralized manner across the nodes of a communication network whose links are allowed to change in time. We solve two f...
ISBN:
(纸本)9781713845393
We consider the task of minimizing the sum of smooth and strongly convex functions stored in a decentralized manner across the nodes of a communication network whose links are allowed to change in time. We solve two fundamental problems for this task. First, we establish the first lower bounds on the number of decentralized communication rounds and the number of local computations required to find an ∈-accurate solution. Second, we design two optimal algorithms that attain these lower bounds: (i) a variant of the recently proposed algorithm ADOM (Kovalev et al., 2021) enhanced via a multi-consensus subroutine, which is optimal in the case when access to the dual gradients is assumed, and (ii) a novel algorithm, called ADOM+, which is optimal in the case when access to the primal gradients is assumed. We corroborate the theoretical efficiency of these algorithms by performing an experimental comparison with existing state-of-the-art methods.
The paper presents a test program generator for functional verification of RISC-V microprocessors. The generator is implemented on the base of MicroTESK framework and consists of formal specifications of RISC-V ISA an...
详细信息
ISBN:
(纸本)9781538692516
The paper presents a test program generator for functional verification of RISC-V microprocessors. The generator is implemented on the base of MicroTESK framework and consists of formal specifications of RISC-V ISA and ISA-independent core. The specifications describe instructions' syntax and semantics and can be easily modified to support more instructions (including custom extensions). The core implements techniques of instruction sequences composition and test data generation. Test programs are generated from test templates, describing the programs' structural and behavioral properties; among generation techniques, random, combinatorial, and constraint-based ones are supported.
Abstract: The formulation of the problem, the numerical solution method, and description of the test calculation case for modeling a melt flow in the problem of crystal growth by the Czochralski (Chochralsky) method a...
详细信息
Preconditioning is a crucial operation in gradient-based numerical optimisation. It helps decrease the local condition number of a function by appropriately transforming its gradient. For a convex function, where the ...
详细信息
暂无评论