The influence of the viscosity on a wave attractor flow has been previously studied, particularly in relation to the widening of the hydrodynamical structures. In this work, we simulate an attractor flow with a peculi...
详细信息
The influence of the viscosity on a wave attractor flow has been previously studied, particularly in relation to the widening of the hydrodynamical structures. In this work, we simulate an attractor flow with a peculiar bottom shape that includes an underwater hill. During the simulation, we discovered a side structure appearing beyond the wave attractor. We determined that the appearance of this structure is connected to viscosity. In this article, we consider the behavior of this newly found structure. Additionally, we discuss the challenges of energy accumulation and the estimation of the Reynolds number, which is a non-trivial problem in the context of wave attractor flows.
The vulnerability of artificial neural networks to adversarial perturbations in the black-box setting is widely studied in the literature. The majority of attack methods to construct these perturbations suffer from an...
详细信息
This article presents novel method for efficient fuzzing of programs accepting complex structured data. It generates input data based on formal grammar description. Data generator is periodically autoconfigured based ...
详细信息
In this paper, we focused on the problem of extracting information from web pages containing many records, a task of growing importance in the era of massive web data. Recently, the development of neural network metho...
详细信息
In the last 15 years many dedicated leak detection tools utilizing novel approaches were designed. Unfortunately, most of them are hard to implement and fully utilize in the scope of a multi-purpose industrial analyze...
详细信息
ISBN:
(数字)9798331526023
ISBN:
(纸本)9798331526030
In the last 15 years many dedicated leak detection tools utilizing novel approaches were designed. Unfortunately, most of them are hard to implement and fully utilize in the scope of a multi-purpose industrial analyzer. In this paper we present a full-fledged approach to static analysis through the lens of resource leak detection. We show how general analysis architecture without much of a focus for specific defects can still be effective at finding leaks both in terms of performance and number of warnings. We briefly describe an overall structure of the Svace static analyzer and how it achieves context and path sensitivities as well as interprocedurality, while allowing for checking many program properties and being highly extensible. We also show how to use this system to implement leak detection algorithm with including a few unique extensions that we have never seen in other instruments. Our test results show a low false positive rate, relatively good performance for a multi-detector static analyzer and great scalability potential both in terms of adding new algorithms and analyzing millions of lines of code.
The Unified Extensible Firmware Interface (UEFI) is a standardised interface between the firmware and the oper-ating system used in all x86-based platforms over the past ten years. A side effect of the transition from...
详细信息
Vast majority of execution engines are first im-plemented as interpreters. Once they reach maturity and gain audience authors strive to improve performance by utilizing static or JIT compilation techniques. The latter...
详细信息
The article presents the results of a study of the field material of the Purovsky dialect of the Forest Nenets language. His experimental phonological analysis was conducted using the LingvoDoc data processing algorit...
The article presents the results of a study of the field material of the Purovsky dialect of the Forest Nenets language. His experimental phonological analysis was conducted using the LingvoDoc data processing algorithms. A comparison of the vowel sound system obtained as a result of this analysis with other phonetic systems of the Forest Nenets language proposed by linguists of the XX-XXI centuries, and its four separate native speakers, allowed us to conclude that this dialect is unique and further research is necessary, taking into account data on contact languages for the Forest Nenets.
The problem of efficient solution of the boundary integral equation arising at each time step in problems of 2D outer flow simulation by using the Vortex Particle Method is considered. It is necessary to develop an ef...
详细信息
The fog computing paradigm has become prominent in stream processing for IoT systems where cloud computing struggles from high latency challenges. It enables the deployment of computational resources between the edge ...
详细信息
暂无评论