Zobrazeno 1 - 10
of 767
pro vyhledávání: '"Code optimization"'
Autor:
Juliette Alimena, Christoph Beyer, Ben Brüers, Frank Gaede, Nils Gillwald, Michel Hernandez Villanueva, Eleanor Jones, Yves Kemp, Thomas Madlener, Kilian Schwarz, Christoph Wissing
Publikováno v:
Frontiers in Computer Science, Vol 6 (2024)
This perspective article details the program of sustainable computing workshops launched within the High Energy Physics department at Deutsches Elektronen-Synchrotron (DESY) in 2023. The workshop series targets scientific users of the National Analys
Externí odkaz:
https://doaj.org/article/ab778a8d1d954ee99659655d9e620e84
Publikováno v:
EURASIP Journal on Advances in Signal Processing, Vol 2024, Iss 1, Pp 1-16 (2024)
Abstract Optimizing the correlation properties of spreading codes is critical for minimizing inter-channel interference in satellite navigation systems. By improving the codes’ correlation sidelobes, we can enhance navigation performance while mini
Externí odkaz:
https://doaj.org/article/15a136663af44bfe9abcea19a3afed27
Autor:
Hyukwoo Park, Seonghyun Kim
Publikováno v:
IEEE Access, Vol 12, Pp 111801-111817 (2024)
JavaScript has significantly evolved, broadening its capabilities. However, the uptake of tail call optimization (TCO) remains limited, largely due to concerns about debugging difficulties and the potential increase in overall complexity. This paper
Externí odkaz:
https://doaj.org/article/4abb8579e13c41008a310a7174d5a02a
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Buzađija, Nevzudin
Publikováno v:
saZnanje / Knowledge. 2(2):539-548
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=943581
Publikováno v:
IEEE Access, Vol 8, Pp 129478-129496 (2020)
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes. The obfuscation technique is most
Externí odkaz:
https://doaj.org/article/fba16a1144ba44e080e090a456b4b119
Publikováno v:
MethodsX, Vol 9, Iss , Pp 101802- (2022)
Partial evaluation (PE) is a branch of computer science that achieves code optimization via specialization. This article describes a PE methodology for optimizing rewrite theories that encode concurrent as well as nondeterministic systems by means of
Externí odkaz:
https://doaj.org/article/1be6112c1a9e49e4900a55c6b92082bf
Publikováno v:
IEEE Access, Vol 7, Pp 21491-21501 (2019)
Binary translation technology is an effective method to solve the problem of software cross-platform transplantation, especially for software porting without source code. Static binary translation has a good translation effect in general, but it face
Externí odkaz:
https://doaj.org/article/fe3715dfd6664ccd85f98660a1abc6bc
Publikováno v:
IEEE Access, Vol 7, Pp 85241-85252 (2019)
Performances of smartphones are profoundly affected by battery life. Maximizing the amount of usage of energy is essential to extend battery life. However, developers might concentrate more on the functionality of applications while ignoring the ener
Externí odkaz:
https://doaj.org/article/1ed6003fd6814b418195da7af6ec5119