Showing 261 - 280 results of 807 for search '"Control flow"', query time: 0.43s Refine Results
  1. 261

    MC/DC Implications for Software Testing from (Combinational) Logic Design by Kamal Z., Zamli, Al-Sewari, Abdul Rahman Ahmed Mohammed, Mohd Hafiz, Mohd Hassin

    Published 2013
    “…Structural testing is often the most common sought criteria for exercising aspects of control flow (i.e. such as statement, branch and path coverage). …”
    Get full text
    Conference or Workshop Item
  2. 262

    On Analysis and Effectiveness of Signature Based in Detecting Metamorphic Virus by Imran Edzereiq, Kamarudin, Syahrizal Azmir, Md Sharif, Tutut, Herawan

    Published 2013
    “…In metamorphic virus, if dead code is added and the control flow is changed sufficiently by inserting jump statements, the virus cannot be detected. …”
    Get full text
    Article
  3. 263

    Automatic control valve using servo motor by Zul Fadli, Mohamad Tohid

    Published 2013
    “…Based on the result, these small scale control flow system are capable to gradually reduce cost especially in control valve. …”
    Get full text
    Undergraduates Project Papers
  4. 264

    Sequence Matching Analysis for Curriculum Development by Liem Yenny Bendatu, Bernardo Nugroho Yahya

    Published 2015-06-01
    “…Considering conformance checking as the basis of this approach, this proposed approach utilizes the current control flow technique in process mining domain. A case study in the field of educational process has been conducted. …”
    Get full text
    Article
  5. 265

    On Secure Workflow Decentralisation on the Internet by Petteri Kaskenpalo

    Published 2010-06-01
    “…We review a set of these protocols, focusing on the required message sequences in reviewing the protocols, and discuss how these security protocols provide the foundations for implementing core control-flow, data, and resource patterns in a distributed workflow environment.…”
    Get full text
    Article
  6. 266

    Simulation of Spraying Process in Lateral VRI Sprinkler System based on PWM by Zhou Zhiyu, Tao Shuai, Mo Jinqiua

    Published 2018-01-01
    “…And Pulse width modulation (PWM) technique is applied to control flow rate of each sprinkler. Uniformity and accuracy of application are main indexes to evaluate performance of lateral VRI sprinkler system. …”
    Get full text
    Article
  7. 267

    Description of the approach to development of the obfuscating compiler by Sh. F. Kurmangaleev, V. P. Korchagin, H. A. Matevosyan

    Published 2018-10-01
    “…We have formulated the efficiency criteria for an obfuscating technique: an obfuscation transformation should obfuscate both control flow and data flow simultaneously. The main feature of the described approach is using the set of transformations, which mask the various aspects of the obfuscated application. …”
    Get full text
    Article
  8. 268

    A multi-paradigm language for reactive synthesis by Ioannis Filippidis, Richard M. Murray, Gerard J. Holzmann

    Published 2016-02-01
    “…The syntax allows defining which player controls data and control flow, and separating a program into assumptions and guarantees. …”
    Get full text
    Article
  9. 269

    Specifying and Executing Optimizations for Parallel Programs by William Mansky, Dennis Griffith, Elsa L. Gunter

    Published 2014-07-01
    “…The fundamental approach of PTRANS is to describe program transformations as rewrites on control flow graphs with temporal logic side conditions. …”
    Get full text
    Article
  10. 270

    Service-Oriented Architectures: from Design to Production exploiting Workflow Patterns by Saverio GIALLORENZO, Maurizio GABBRIELLI, Fabrizio MONTESI

    Published 2015-03-01
    “…To this end, we employ a collection of recurring control-flow patterns, called Workflow Patterns, as composable blocks of the translation. …”
    Get full text
    Article
  11. 271

    Polyvariant Program Specialisation with Property-based Abstraction by John P. Gallagher

    Published 2019-08-01
    “…Using examples, we show the flexibility of specialisation with property-based abstraction and discuss its application in control flow refinement, verification, termination analysis and dimension-based specialisation.…”
    Get full text
    Article
  12. 272

    A consistency-guaranteed approach for Internet of Things by Yang Zhang, Shixin Sun, Dongwen Zhang, Jing Qiu, Zhihong Tian

    Published 2020-01-01
    “…To this end, this article proposes a novel refactoring correction detection approach to ensure software security. Control flow analysis and data flow analysis are used to detect code changes before and after refactoring, and synchronization dependency analysis is used to detect changes in synchronization dependency. …”
    Get full text
    Article
  13. 273

    Research on assembly reliability control technology for computer numerical control machine tools by Yan Ran, Genbao Zhang, Jihong Pang

    Published 2017-01-01
    “…Firstly, assembly faults and assembly reliability control flow of computer numerical control machine tools are studied. …”
    Get full text
    Article
  14. 274

    Low-cost feedback-controlled syringe pressure pumps for microfluidics applications. by John R Lake, Keith C Heyde, Warren C Ruder

    Published 2017-01-01
    “…As such, there are a large number of options for the devices used to drive and control flow through microfluidic channels. Commercially available syringe pumps are probably the most commonly used instruments for this purpose, but are relatively high-cost and have inherent limitations due to their flow profiles when they are run open-loop. …”
    Get full text
    Article
  15. 275

    Blade coating analysis of a Williamson fluid by A.M. Siddiqui, S. Bhatti, M.A. Rana, M. Zahid

    Published 2017-01-01
    “…It is found that material parameter is used to control flow rate, coating thickness, power input and the pressure distribution. …”
    Get full text
    Article
  16. 276

    Process Mining Approach Towards Optimization of ERP Business Processes: A Case Study of Healthcare by Ayesha Rashid, Naveed Anwer Butt, Nauman Riaz Choudhary, Reema Choudhary, Huma Jabeen

    Published 2019-02-01
    “…In this paper we have focused on one of the three features of process mining application i.e. discovery of process model with control flow perspective. Case study of a Pakistani Enterprise has been presented to analyze the results of three applied discovery algorithms Alpha Miner, Fuzzy Model and Heuristic Miner have determined the most frequent behaviors underlying its complaint monitoring process. …”
    Get full text
    Article
  17. 277

    Automatic Differentiation in ROOT by Vassilev Vassil, Efremov Aleksandr, Shadura Oksana

    Published 2020-01-01
    “…AD exploits the fact that every computer program, no matter how complicated, executes a sequence of elementary arithmetic operations (addition, subtraction, multiplication, division, etc.), elementary functions (exp, log, sin, cos, etc.) and control flow statements. AD takes source code of a function as input and produces source code of the derived function. …”
    Get full text
    Article
  18. 278

    Interpretation of Four Unique Phenomena and the Mechanism in Unsteady Flow Separation Controls by Weiyu Lu, Guoping Huang, Jinchun Wang, Yuxuan Yang

    Published 2019-02-01
    “…Second, the bases of unsteady flow control, flow instability, and free shear flow theories are introduced to elucidate the unique phenomena and mechanism in unsteady flow separation controls. …”
    Get full text
    Article
  19. 279

    Software Fault Location of CNC System Based on Similar Path Set and Artificial Neural Network by Xiuhua Yuan, Yiqiang Wang, Yan Gu

    Published 2013-01-01
    “…The detailed fault location process involves the following steps: ( 1 ) according to the execution information recorded by the monitor, the failed path is generated; ( 2 ) the similar path set is obtained from the control flow graph and the failed path; the ANN is trained by the learning sample which is composed of the failed path and the similar path set; ( 3 ) the defect code is judged by ANN. …”
    Get full text
    Article
  20. 280

    Parametric Inversion of Programs by Morejon, David

    Published 2022
    “…Specifically, we introduce a language, IR, and address problems related to inversion of a simple code block, control flow, and re-use of variables. This includes a practical implementation in Julia that is able to correctly invert a suite of sample programs.…”
    Get full text
    Thesis