On Syntax-Directed Adjoint Fortran Code
Uwe Naumann, Jan Riehme (2007)
Computer Science and Information Systems
Similarity:
Uwe Naumann, Jan Riehme (2007)
Computer Science and Information Systems
Similarity:
Frédéric Feyel (2002)
ESAIM: Mathematical Modelling and Numerical Analysis - Modélisation Mathématique et Analyse Numérique
Similarity:
A finite element code, called ZéBuLoN was parallelised some years ago. This code is entirely written using an object oriented framework (C++ is the support language). The aim of this paper is to present some problems which arose during the parallelization, and some innovative solutions. Especially, a new concept of message passing is presented which allows to take into account SMP machines while still using the parallel virtual machine abstraction.
André Simon (2009)
Zpravodaj Československého sdružení uživatelů TeXu
Similarity:
The article presents features and options of the Highlight programme which is capable of highlighting source codes of different programming languages. The experimental approach of nested syntax configuration is tested on files with HTML+CSS+PHP+JavaScript, Perl+TeX, LaTeX+Sweave+R and Lua+TeX.
Ruhui Ma, Haibing Guan, Erzhou Zhu, Yongqiang Gao, Alei Liang (2011)
Computer Science and Information Systems
Similarity:
Hans Hagen (2017)
Zpravodaj Československého sdružení uživatelů TeXu
Similarity:
In LuaTeX, it is now possible to run snippets of Lua code from within MetaPost. The article describes the mechanism, the low-level interface available in LuaTeX, as well as the high-level interface available in ConTeXt through example.
Dariusz Rzońca, Jan Sadolewski, Bartosz Trybus (2007)
Computer Science and Information Systems
Similarity:
Wojciech Jaśkowski, Krzysztof Krawiec, Bartosz Wieloch (2014)
International Journal of Applied Mathematics and Computer Science
Similarity:
We propose a method that enables effective code reuse between evolutionary runs that solve a set of related visual learning tasks. We start with introducing a visual learning approach that uses genetic programming individuals to recognize objects. The process of recognition is generative, i.e., requires the learner to restore the shape of the processed object. This method is extended with a code reuse mechanism by introducing a crossbreeding operator that allows importing the genetic...
Bouyukliev, Iliya, Bouyuklieva, Stefka, Dzhumalieva-Stoeva, Maria, Monev, Venelin (2016)
Serdica Journal of Computing
Similarity:
This paper presents developed software in the area of Coding Theory. Using it, all binary self-dual codes with given properties can be classified. The programs have consequent and parallel implementations. ACM Computing Classification System (1998): G.4, E.4.
Radivoje Protić, Dušan Tošić (1993)
Matematički Vesnik
Similarity:
Vinícius G. P. de SÁ, Davidson R. Boccardo, Luiz Fernando Rust, Raphael C. S. Machado (2013)
RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications
Similarity:
A Message Authentication Code (MAC) is a function that takes a message and a key as parameters and outputs an authentication of the message. MAC are used to guarantee the legitimacy of messages exchanged through a network, since generating a correct authentication requires the knowledge of the key defined secretly by trusted parties. However, an attacker with access to a sufficiently large number of message/authentication pairs may use a brute force algorithm to infer the secret key:...
António Menezes Leitão (2008)
Computer Science and Information Systems
Similarity:
Luigi Scarso (2011)
Zpravodaj Československého sdružení uživatelů TeXu
Similarity:
MicroTalk is a short and technical paper that shows some unusual, hopefully useful, ideas following the schema “figure to code”. The main topic is always typographic programming in ConTeXt Lua. A bit of Lua code, the macro and Leptonica extensions are the ingredients for this recipe to cook a pdfsplit macro that take a pdf and try to split into parts as the does with .
Žarko Živanov, Predrag Rakić, Miroslav Hajduković (2008)
Computer Science and Information Systems
Similarity:
Eugeniusz Kuriata (2008)
International Journal of Applied Mathematics and Computer Science
Similarity:
This article presents problems of unequal information importance. The paper discusses constructive methods of code generation, and a constructive method of generating asymptotic UEP codes is built. An analog model of Hamming's upper bound and Hilbert's lower bound for asymptotic UEP codes is determined.