Zobrazeno 1 - 10
of 669
pro vyhledávání: '"Tong, Dong"'
Realistic reservoir simulation is known to be prohibitively expensive in terms of computation time when increasing the accuracy of the simulation or by enlarging the model grid size. One method to address this issue is to parallelize the computation
Externí odkaz:
http://arxiv.org/abs/2309.11488
Publikováno v:
Frontiers in Built Environment, Vol 10 (2024)
Sedimentary processes often produce natural and blown calcareous sands that are deposited in inclined and layered formations. These calcareous sands frequently exist in a complex stress state with rotating principal stress axes that result in intrica
Externí odkaz:
https://doaj.org/article/8dd6c38fa9984d1ca42a10c5c69ef5a7
Autor:
Hogervorst, Tom, Qiu, Tong Dong, Marchiori, Giacomo, Birger, Alf, Blatt, Markus, Nane, Razvan
Publikováno v:
ACM Transactions on Reconfigurable Technology and Systems, Volume 15, Issue 2, June 2022
Scientific computing is at the core of many High-Performance Computing applications, including computational flow dynamics. Because of the uttermost importance to simulate increasingly larger computational models, hardware acceleration is receiving i
Externí odkaz:
http://arxiv.org/abs/2101.01745
Publikováno v:
Journal of International Medical Research, Vol 52 (2024)
Objective To investigate the roles and underlying mechanisms of vascular endothelial growth factor receptor-3 (VEGFR-3) in gastric cancer (GC). Methods VEGFR-3 gene expression profiles in human gastric adenocarcinoma (GAC) tissues were analysed using
Externí odkaz:
https://doaj.org/article/b49b93e5a1ba49fc83d4dd4003221667
Annex K of C11, bounds-checking interfaces, recently introduced a set of alternative functions to mitigate buffer overflows, primarily those caused by string/memory functions. However, poor compatibility limits their adoption. Failure oblivious compu
Externí odkaz:
http://arxiv.org/abs/2004.09062
Use-After-Free vulnerabilities, allowing the attacker to access unintended memory via dangling pointers, are more threatening. However, most detection schemes can only detect dangling pointers and invalid them, but not provide a tolerance mechanism t
Externí odkaz:
http://arxiv.org/abs/2003.00175
Memory spatial errors, i.e., buffer overflow vulnerabilities, have been a well-known issue in computer security for a long time and remain one of the root causes of exploitable vulnerabilities. Most of the existing mitigation tools adopt a fail-stop
Externí odkaz:
http://arxiv.org/abs/2002.02831
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Land, Vol 13, Iss 5, p 653 (2024)
Influenced by climate change, significant alterations in vegetation phenology have been observed globally. Grassland phenology is highly sensitive to climate change. However, research on the variations in grassland phenology and its responses to seas
Externí odkaz:
https://doaj.org/article/d9e1538d18074e608617e297b7447d64
Publikováno v:
SAGE Open, Vol 13 (2023)
Employees not being able to express their thoughts and opinions about work has been argued to result in detrimental organizational outcomes. Employee silence has recently become a prevalent organizational issue but studies that have explored proximal
Externí odkaz:
https://doaj.org/article/fd627c057e3d4860a0aea2e4b7e9963d