Displaying similar documents to “Some new technics regarding the parallelisation of ZéBuLoN, an object oriented finite element code for structural mechanics”

Some new technics regarding the parallelisation of ZéBuLoN, an object oriented finite element code for structural mechanics

Frédéric Feyel (2002)

ESAIM: Mathematical Modelling and Numerical Analysis - Modélisation Mathématique et Analyse Numérique

Similarity:

A finite element code, called ZéBuLoN was parallelised some years ago. This code is entirely written using an object oriented framework (C++ is the support language). The aim of this paper is to present some problems which arose during the parallelization, and some innovative solutions. Especially, a new concept of message passing is presented which allows to take into account SMP machines while still using the parallel virtual machine abstraction.

The Highlight Programme: Code and Syntax Highlighting

André Simon (2009)

Zpravodaj Československého sdružení uživatelů TeXu

Similarity:

The article presents features and options of the Highlight programme which is capable of highlighting source codes of different programming languages. The experimental approach of nested syntax configuration is tested on files with HTML+CSS+PHP+JavaScript, Perl+TeX, LaTeX+Sweave+R and Lua+TeX.

Lua in MetaPost

Hans Hagen (2017)

Zpravodaj Československého sdružení uživatelů TeXu

Similarity:

In LuaTeX, it is now possible to run snippets of Lua code from within MetaPost. The article describes the mechanism, the low-level interface available in LuaTeX, as well as the high-level interface available in ConTeXt through example.

Cross-task code reuse in genetic programming applied to visual learning

Wojciech Jaśkowski, Krzysztof Krawiec, Bartosz Wieloch (2014)

International Journal of Applied Mathematics and Computer Science

Similarity:

We propose a method that enables effective code reuse between evolutionary runs that solve a set of related visual learning tasks. We start with introducing a visual learning approach that uses genetic programming individuals to recognize objects. The process of recognition is generative, i.e., requires the learner to restore the shape of the processed object. This method is extended with a code reuse mechanism by introducing a crossbreeding operator that allows importing the genetic...

What is Genselfdual?

Bouyukliev, Iliya, Bouyuklieva, Stefka, Dzhumalieva-Stoeva, Maria, Monev, Venelin (2016)

Serdica Journal of Computing

Similarity:

This paper presents developed software in the area of Coding Theory. Using it, all binary self-dual codes with given properties can be classified. The programs have consequent and parallel implementations. ACM Computing Classification System (1998): G.4, E.4.

A tight bound for exhaustive key search attacks against Message Authentication Codes

Vinícius G. P. de SÁ, Davidson R. Boccardo, Luiz Fernando Rust, Raphael C. S. Machado (2013)

RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications

Similarity:

A Message Authentication Code (MAC) is a function that takes a message and a key as parameters and outputs an authentication of the message. MAC are used to guarantee the legitimacy of messages exchanged through a network, since generating a correct authentication requires the knowledge of the key defined secretly by trusted parties. However, an attacker with access to a sufficiently large number of message/authentication pairs may use a brute force algorithm to infer the secret key:...

MicroTalk – pdfsplit

Luigi Scarso (2011)

Zpravodaj Československého sdružení uživatelů TeXu

Similarity:

MicroTalk is a short and technical paper that shows some unusual, hopefully useful, ideas following the schema “figure to code”. The main topic is always typographic programming in ConTeXt Lua. A bit of Lua code, the macro and Leptonica extensions are the ingredients for this recipe to cook a pdfsplit macro that take a pdf and try to split into parts as the does with .

Creation of unequal error protection codes for two groups of symbols

Eugeniusz Kuriata (2008)

International Journal of Applied Mathematics and Computer Science

Similarity:

This article presents problems of unequal information importance. The paper discusses constructive methods of code generation, and a constructive method of generating asymptotic UEP codes is built. An analog model of Hamming's upper bound and Hilbert's lower bound for asymptotic UEP codes is determined.