Reliable benchmarking: requirements and solutions
Benchmarking is a widely used method in experimental computer science, in particular, for
the comparative evaluation of tools and algorithms. As a consequence, a number of …
the comparative evaluation of tools and algorithms. As a consequence, a number of …
[HTML][HTML] Integrity verification for digital Holy Quran verses using cryptographic hash function and compression
M Almazrooie, A Samsudin, AAA Gutub… - Journal of King Saud …, 2020 - Elsevier
Data Integrity is one of the primary concepts in information security. The main task of the
cryptographic hash function is to assure the integrity of the transmitted data. In this work …
cryptographic hash function is to assure the integrity of the transmitted data. In this work …
Runtime and memory evaluation of data race detection tools
An analysis tool's usefulness depends on whether its runtime and memory consumption
remain within reasonable bounds for a given program. In this paper we present an …
remain within reasonable bounds for a given program. In this paper we present an …
Inner loop program construct: A faster way for program execution
TP Adewumi - Open Computer Science, 2018 - degruyter.com
Loops are repetitive control structures in programming languages. They are used
extensively in many algorithms. The for-loop and while-loop exist, where the former is …
extensively in many algorithms. The for-loop and while-loop exist, where the former is …
Towards practical predicate analysis
P Wendler - 2017 - opus4.kobv.de
Software model checking is a successful technique for automated program verification.
Several of the most widely used approaches for software model checking are based on …
Several of the most widely used approaches for software model checking are based on …
An empirical study of transaction throughput thrashing across multiple relational DBMSes
YK Suh, RT Snodgrass, S Currim - Information Systems, 2017 - Elsevier
Modern DBMSes are designed to support many transactions running simultaneously. DBMS
thrashing is indicated by the existence of a sharp drop in transaction throughput. Thrashing …
thrashing is indicated by the existence of a sharp drop in transaction throughput. Thrashing …
A javascript framework comparison based on benchmarking software metrics and environment configuration
J Ferreira - 2018 - arrow.tudublin.ie
JavaScript is a client-side programming language that can be used in multi-platform
applications. It controls HTML and CSS to manipulate page behaviours and is widely used …
applications. It controls HTML and CSS to manipulate page behaviours and is widely used …
Anomaly detection for portfolio risk management: An evaluation of econometric and machine learning based approaches to detecting anomalous behaviour in …
S Westerlind - 2018 - diva-portal.org
Financial institutions manage numerous portfolios whose risk must be managed
continuously, and the large amounts of data that has to be processed renders this a …
continuously, and the large amounts of data that has to be processed renders this a …
[PDF][PDF] Anomaly Detection for Portfolio Risk Management
S WESTERLIND - KTH Industrial Engineering and Management …, 2018 - diva-portal.org
Financial institutions manage numerous portfolios whose risk must be managed
continuously, and the large amounts of data that has to be processed renders this a …
continuously, and the large amounts of data that has to be processed renders this a …
[PDF][PDF] Computer and Information Sciences
abstract Data Integrity is one of the primary concepts in information security. The main task of
the cryptographic hash function is to assure the integrity of the transmitted data. In this work …
the cryptographic hash function is to assure the integrity of the transmitted data. In this work …