Search alternatives:
"source code" » "sources code" (Expand Search)
Showing 101 - 120 results of 614 for search '"source code"', query time: 0.10s Refine Results
  1. 101

    Evolution Process and Supply Chain Adaptation of Smart Contracts in Blockchain by Yue Wu, Junxiang Li, Jiru Zhou, Shichang Luo, Liwei Song

    Published 2022-01-01
    “…Because of its unique decentralization, encryption, reliability, and tamper-proof, the block chain system makes smart contracts break through the shackles of the lack of trusted environment, and its application field keeps expanding. We read the source code and official documents of Bitcoin, Ethereum, and Hyperledger to explore the operation principle and implementation mode of smart contract. …”
    Get full text
    Article
  2. 102

    Investigation of parameters influencing erosive wear using DEM by Akbar Jafari, Reza Abbasi Hattani

    Published 2019-03-01
    “…The Finnie model was implemented using an open-source code. Regarding the time integration, the Gear algorithm was used, and to ensure the accuracy of the DEM results, a time-step sensitivity analysis was performed. …”
    Get full text
    Article
  3. 103

    Inferring Strain Mixture within Clinical Plasmodium falciparum Isolates from Genomic Sequence Data. by John D O'Brien, Zamin Iqbal, Jason Wendler, Lucas Amenga-Etego

    Published 2016-06-01
    “…Applied to simulation data, artificial laboratory mixtures, and field samples, the model provides reasonable inference with as few as 10 reads or 50 SNPs and works efficiently even with much larger data sets. Source code and example data for the model are provided in an open source fashion. …”
    Get full text
    Article
  4. 104

    Detached Circumstellar Matter as an Explanation for Slowly-Rising Interacting Type Ibc Supernovae by Yuki Takei, Daichi Tsuna

    Published 2024-12-01
    “…Some hydrogen-poor (Type Ibc) supernovae (SNe) are known to have massive circumstellar matter (CSM) that are well detached from the star. Using the open-source code \texttt{CHIPS}, we construct a grid of models of SN Ibc interacting with detached CSM, inspired by a recently proposed scenario of such CSM generated by a mass eruption and feedback process from the leftover star. …”
    Get full text
    Article
  5. 105

    Modeling of the transition from transgranular to intergranular fracture at elevated temperatures in EI698 nickel alloy by Andrey Tumanov

    Published 2025-07-01
    “…The location of crack initiation and the crack path in the proposed method controlled by the difference in the values of the critical energy release rate for the intergranular and transgranular spaces for the phase field model. The source code of the created and used finite element is an open source project and available to download from https://github.com/Andrey-Fog/ANSYS-USERELEMENT-PHFLD. …”
    Get full text
    Article
  6. 106

    Analysis of DoS attacks on Docker inter-component stdio copy by Tianyu ZHOU, Wenbo SHEN, Nanzi YANG, Jinku LI, Chenggang QIN, Wang YU

    Published 2020-12-01
    “…In recent years,Docker has been widely deployed due to its flexibility and high scalability.However,its modular design leads to the DoS attacks on inter-component communication.A new DoS attack that outputs to stdout,causing high CPU usages among different Docker components.Analysis shows that the stdout output triggers the goroutines of Docker components.To find all goroutines setup paths,using the static analysis method to analyze the Docker components systematically was proposed.A static analysis framework was designed and implemented,and evaluated on Docker source code.The results show that static analysis framework finds 34 paths successfully,while 22 of them are confirmed by runtime verification.…”
    Get full text
    Article
  7. 107

    Automatic Data Race Error Detection in SystemC Models by A. V. Zakharov, M. J. Moiseev

    Published 2011-12-01
    “…In this paper we propose an approach to data race detection in SystemC programs which is based on the source code static analysis. We have developed some static analysis algorithms that can extract information for data race detection in a SystemC program without quantitative time. …”
    Get full text
    Article
  8. 108

    The Use of Dependencies for Improving the Precision of Program Static Analysis by M. I. Glukhikh, V. M. Itsykson, V. A. Tsesko

    Published 2011-12-01
    “…Reasons for precision loss is abstract interpretation methods when detecting defects in program source code are explained. The need for program object dependency extraction and interpretation is justified by numerous real-world examples. …”
    Get full text
    Article
  9. 109

    Research on compatibility of high-performance network stack by Huiyou JIANG, Junfeng LI, Dan LI

    Published 2019-05-01
    “…The massive data processing in artificial intelligence system requires the support of high-throughput network.As a bridge between the upper artificial intelligence applications and the underlying high-speed hardware network adapter,the network stack plays a crucial role in the performance of the whole network system.Through detailed analysis and comparison of the compatibility of mainstream network stacks,it is found that the compatibility of various network stacks is generally low,which leads to difficulties in transplantation of artificial intelligence applications.The idea of achieving both high-compatibility and high-performance of user-level network stack were proposed.In this way,legacy applications could directly attain the improvement of performance without modification of the source code.Path for the subsequent development of network stack was lit up.…”
    Get full text
    Article
  10. 110

    Research on compatibility of high-performance network stack by Huiyou JIANG, Junfeng LI, Dan LI

    Published 2019-05-01
    “…The massive data processing in artificial intelligence system requires the support of high-throughput network.As a bridge between the upper artificial intelligence applications and the underlying high-speed hardware network adapter,the network stack plays a crucial role in the performance of the whole network system.Through detailed analysis and comparison of the compatibility of mainstream network stacks,it is found that the compatibility of various network stacks is generally low,which leads to difficulties in transplantation of artificial intelligence applications.The idea of achieving both high-compatibility and high-performance of user-level network stack were proposed.In this way,legacy applications could directly attain the improvement of performance without modification of the source code.Path for the subsequent development of network stack was lit up.…”
    Get full text
    Article
  11. 111

    Development of Real-Time and Mixed Criticality Distributed Systems through the DDS Standard by Héctor Pérez Tijero, J. Javier Gutiérrez

    Published 2018-09-01
    “…The use of distribution middleware facilitates the programming of heterogeneous real-time distributed systems, and it can also facilitate the automatic generation of source code when integrated as a part of a general MDE (Model-Driven Engineering) strategy. …”
    Get full text
    Article
  12. 112

    THE TEST PROGRAMME CONCERNING AIRCRAFT POSITIONING AND TRAFFIC MONITORING – PART II by Henryk JAFERNIK

    Published 2016-12-01
    “…Computations were executed in the “PPP_KINEMTIC” software, whose source code was written using the Scilab 5.3.2 platform. …”
    Get full text
    Article
  13. 113

    Specx: a C++ task-based runtime system for heterogeneous distributed architectures by Paul Cardosi, Bérenger Bramas

    Published 2025-07-01
    “…Not only does it allow efficient parallelization across distributed heterogeneous computing nodes, but it also allows for elegant source code structuring by describing hardware-independent algorithms. …”
    Get full text
    Article
  14. 114

    Design and implementation of a user office system for the Canadian Light Source by Kathryn Janzen, Michel Fodje

    Published 2025-03-01
    “…The system is designed for integration into other large-scale facilities with minimal effort, and the source code is publicly available.…”
    Get full text
    Article
  15. 115

    COVID-19 Modelling: The Effects of Social Distancing by Oliva Bendtsen Cano, Sabrina Cano Morales, Claus Bendtsen

    Published 2020-01-01
    “…This is shown through simulations formed by an open source code, which allows evaluation of the outcomes from different intervention scenarios or conditions.…”
    Get full text
    Article
  16. 116

    Approach to Plagiarism Detection in Programming Assignments by Malek Algabri, Firdaus Alhrazi

    Published 2025-03-01
    “…Also, a solution has been proposed to detect plagiarism in the source code and interfaces that pertain    to programming assignments. …”
    Get full text
    Article
  17. 117

    Applying the Intelligence of Ant and Tabu Search to Solve The 8-puzzle Problem by Ruqaya Sha’ban

    Published 2013-07-01
    “…In this research, the experimental show is very speed to obtain the goal. The source code is written in MATLAB language to simulate these two algorithms.   …”
    Get full text
    Article
  18. 118

    Code summarization based on large model knowledge distillation by YOU Gang, LIU Wenjie, LI Meipeng, SUN Liqun, WANG Lian, TIAN Tieku

    Published 2025-08-01
    “…Code summarization is a short natural language description of source code. Summaries are usually only one sentence long, but they are the primary way for developers to understand code. …”
    Get full text
    Article
  19. 119

    STRyper: A macOS application for microsatellite genotyping and chromatogram management. by Jean Peccoud

    Published 2025-01-01
    “…To fill this gap, I have developed STRyper, a macOS application whose source code is published under the General Public License. …”
    Get full text
    Article
  20. 120

    Quantization for Robust Distributed Coding by Xiaolin Wu, Abdul Bais, Nima Sarshar

    Published 2016-05-01
    “…A distributed source coding approach is proposed for robust data communications in sensor networks. …”
    Get full text
    Article