搜索结果: 16-30 共查到“知识库 计算机工程”相关记录1101条 . 查询时间(0.578 秒)
HISTORIC BIM: A NEW REPOSITORY FOR STRUCTURAL HEALTH MONITORING
Archive BIM Bridge HBIM Monitoring Repository
2017/6/20
Recent developments in Building Information Modelling (BIM) technologies are facilitating the management of historic complex structures using new applications. This paper proposes a generative method ...
随着遥感、定位等技术的不断发展,时空数据大量的产生需要科学化的管理,从而发挥其价值。研究现状中,大量的工作关注于如何利用HBase有效存储和快速查询结构化的时空数据,然而实际中,有些时空数据存在于半结构文档中,如描述遥感产品的元数据,对于这类数据,往往进行如XPath的半结构化+时空查询,这个问题在前序工作中较少讨论。本文针对在HBase中如何进行有效的半结构化时空数据存储和查询问题展开研究,首先...
Attack Resistant Trust Metrics for Public Key Certification
Attack Resistant Trust Metrics Public Key Certification
2016/5/24
This paper investigates the role of trust metrics in attack-resistant public key certification. We present an analytical framework for understanding the effectiveness of trust metrics in resisting att...
Much research has been devoted to studies of and algorithms for memory management based on garbage collection or explicit allocation and deallocation. An alternative approach, region-based memory mana...
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
Towards Automated Detection Buffer Overrun Vulnerabilities
2016/5/24
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection of buffer overruns as...
Checking and Inferring Local Non-Aliasing
Restrict confine types type qualifiers alias analysis effect inference flow-sensitivity
2016/5/24
In prior work [15] we studied a language construct restrict that allows programmers to specify that certain pointers are not aliased to other pointers used within a lexical scope. Among other applicat...
Context- and Path-Sensitive Memory Leak Detection
Program analysis error detection memory management memory leaks boolean satisfiability
2016/5/24
We present a context- and path-sensitive algorithm for detecting memory leaks in programs with explicit memory management. Our leak detection algorithm is based on an underlying escape analysis: any a...
Conditional Must Not Aliasing for Static Race Detection
static race detection Java synchronization concurrency multi-threading
2016/5/24
Race detection algorithms for multi-threaded programs using the common lock-based synchronization idiom must correlate locks with the memory locations they guard. The heart of a proof of race freedom ...
Compilation for Explicitly Managed Memory Hierarchies
Software-managed memory hierarchy bulk operations
2016/5/24
We present a compiler for machines with an explicitly managed memory hierarchy and suggest that a primary role of any compiler for such architectures is to manipulate and schedule a hierarchy of bulk ...
A Portable Runtime Interface For Multi-Level Memory Hierarchies
Memory Hierarchies Parallelism Runtime Sequoia
2016/5/24
We present a platform independent runtime interface for moving data and computation through parallel machines with multi-level memory hierarchies. We show that this interface can be used as a compiler...
Symbolic Heap Abstraction with Demand-Driven Axiomatization of Memory Invariants
Heap Analysis Relational Static Analysis Array Analysis Memory Invariants
2016/5/24
Many relational static analysis techniques for precise reasoning about heap contents perform an explicit case analysis of all possible heaps that can arise. We argue that such precise relational reaso...
M3: High-Performance Memory Management from Off-the-Shelf Components
Memory Management Garbage Collection Tracing Mark-Sweep Reference Counting
2016/5/24
Real-world garbage collectors in managed languages are complex.We investigate whether this complexity is really necessary and show that by having a different (but wider) interface between the collecto...
Realm: An Event-Based Low-Level Runtime for Distributed Memory Architectures
Realm Legion distributed memory deferred execution events reservations heterogeneous architectures runtime
2016/5/24
We present Realm, an event-based runtime system for heterogeneous,distributed memory machines. Realm is fully asynchronous: all runtime actions are non-blocking. Realm supports spawning computations, ...
Automatic and Transparent I/O Optimization With Storage Integrated Application Runtime Support
Automatic Transparent I/O Optimization Storage Integrated Application Runtime Support
2016/5/24
Traditionally storage has not been part of a programming model’s semantics and is added only as an I/O library interface.
融合标签关联关系与用户社交关系的微博推荐方法
微博推荐 标签检索 用户-标签矩阵 用户标签权重 标签关联关系 用户-用户社交关系相似度矩阵
2017/1/16
通过分析微博特点及现有微博推荐算法的缺陷,提出一种融合了标签间关联关系与用户间社交关系的微博推荐方法.采用标签检索策略对未加标签和标签较少的用户进行加标,构建用户-标签矩阵,得到用户标签权重,为了解决该矩阵中稀疏的问题,通过挖掘标签间的关联关系,继而更新用户-标签矩阵.考虑到多用户之间社交关系对挖掘用户兴趣并进行微博推荐的重要性,构建用户-用户社交关系相似度矩阵,并与更新后的用户-标签矩阵进行迭代...