-
261
MC/DC Implications for Software Testing from (Combinational) Logic Design
Published 2013“…Structural testing is often the most common sought criteria for exercising aspects of control flow (i.e. such as statement, branch and path coverage). …”
Get full text
Conference or Workshop Item -
262
On Analysis and Effectiveness of Signature Based in Detecting Metamorphic Virus
Published 2013“…In metamorphic virus, if dead code is added and the control flow is changed sufficiently by inserting jump statements, the virus cannot be detected. …”
Get full text
Article -
263
Automatic control valve using servo motor
Published 2013“…Based on the result, these small scale control flow system are capable to gradually reduce cost especially in control valve. …”
Get full text
Undergraduates Project Papers -
264
Sequence Matching Analysis for Curriculum Development
Published 2015-06-01“…Considering conformance checking as the basis of this approach, this proposed approach utilizes the current control flow technique in process mining domain. A case study in the field of educational process has been conducted. …”
Get full text
Article -
265
On Secure Workflow Decentralisation on the Internet
Published 2010-06-01“…We review a set of these protocols, focusing on the required message sequences in reviewing the protocols, and discuss how these security protocols provide the foundations for implementing core control-flow, data, and resource patterns in a distributed workflow environment.…”
Get full text
Article -
266
Simulation of Spraying Process in Lateral VRI Sprinkler System based on PWM
Published 2018-01-01“…And Pulse width modulation (PWM) technique is applied to control flow rate of each sprinkler. Uniformity and accuracy of application are main indexes to evaluate performance of lateral VRI sprinkler system. …”
Get full text
Article -
267
Description of the approach to development of the obfuscating compiler
Published 2018-10-01“…We have formulated the efficiency criteria for an obfuscating technique: an obfuscation transformation should obfuscate both control flow and data flow simultaneously. The main feature of the described approach is using the set of transformations, which mask the various aspects of the obfuscated application. …”
Get full text
Article -
268
A multi-paradigm language for reactive synthesis
Published 2016-02-01“…The syntax allows defining which player controls data and control flow, and separating a program into assumptions and guarantees. …”
Get full text
Article -
269
Specifying and Executing Optimizations for Parallel Programs
Published 2014-07-01“…The fundamental approach of PTRANS is to describe program transformations as rewrites on control flow graphs with temporal logic side conditions. …”
Get full text
Article -
270
Service-Oriented Architectures: from Design to Production exploiting Workflow Patterns
Published 2015-03-01“…To this end, we employ a collection of recurring control-flow patterns, called Workflow Patterns, as composable blocks of the translation. …”
Get full text
Article -
271
Polyvariant Program Specialisation with Property-based Abstraction
Published 2019-08-01“…Using examples, we show the flexibility of specialisation with property-based abstraction and discuss its application in control flow refinement, verification, termination analysis and dimension-based specialisation.…”
Get full text
Article -
272
A consistency-guaranteed approach for Internet of Things
Published 2020-01-01“…To this end, this article proposes a novel refactoring correction detection approach to ensure software security. Control flow analysis and data flow analysis are used to detect code changes before and after refactoring, and synchronization dependency analysis is used to detect changes in synchronization dependency. …”
Get full text
Article -
273
Research on assembly reliability control technology for computer numerical control machine tools
Published 2017-01-01“…Firstly, assembly faults and assembly reliability control flow of computer numerical control machine tools are studied. …”
Get full text
Article -
274
Low-cost feedback-controlled syringe pressure pumps for microfluidics applications.
Published 2017-01-01“…As such, there are a large number of options for the devices used to drive and control flow through microfluidic channels. Commercially available syringe pumps are probably the most commonly used instruments for this purpose, but are relatively high-cost and have inherent limitations due to their flow profiles when they are run open-loop. …”
Get full text
Article -
275
Blade coating analysis of a Williamson fluid
Published 2017-01-01“…It is found that material parameter is used to control flow rate, coating thickness, power input and the pressure distribution. …”
Get full text
Article -
276
Process Mining Approach Towards Optimization of ERP Business Processes: A Case Study of Healthcare
Published 2019-02-01“…In this paper we have focused on one of the three features of process mining application i.e. discovery of process model with control flow perspective. Case study of a Pakistani Enterprise has been presented to analyze the results of three applied discovery algorithms Alpha Miner, Fuzzy Model and Heuristic Miner have determined the most frequent behaviors underlying its complaint monitoring process. …”
Get full text
Article -
277
Automatic Differentiation in ROOT
Published 2020-01-01“…AD exploits the fact that every computer program, no matter how complicated, executes a sequence of elementary arithmetic operations (addition, subtraction, multiplication, division, etc.), elementary functions (exp, log, sin, cos, etc.) and control flow statements. AD takes source code of a function as input and produces source code of the derived function. …”
Get full text
Article -
278
Interpretation of Four Unique Phenomena and the Mechanism in Unsteady Flow Separation Controls
Published 2019-02-01“…Second, the bases of unsteady flow control, flow instability, and free shear flow theories are introduced to elucidate the unique phenomena and mechanism in unsteady flow separation controls. …”
Get full text
Article -
279
Software Fault Location of CNC System Based on Similar Path Set and Artificial Neural Network
Published 2013-01-01“…The detailed fault location process involves the following steps: ( 1 ) according to the execution information recorded by the monitor, the failed path is generated; ( 2 ) the similar path set is obtained from the control flow graph and the failed path; the ANN is trained by the learning sample which is composed of the failed path and the similar path set; ( 3 ) the defect code is judged by ANN. …”
Get full text
Article -
280
Parametric Inversion of Programs
Published 2022“…Specifically, we introduce a language, IR, and address problems related to inversion of a simple code block, control flow, and re-use of variables. This includes a practical implementation in Julia that is able to correctly invert a suite of sample programs.…”
Get full text
Thesis