• GHC

  • Referenced in 103 articles [sw06691]
  • these calls to recover an efficiently executable program. In principle, inclining is dead simple: just ... black art, full of delicate compromises that work together to give good performance without unnecessary...
  • GHC

  • Referenced in 43 articles [sw23765]
  • computation model as well as a programming language. Attention has always been paid ... prover deliberately, not as a result of compromise. Nevertheless, it can be used for efficient ... exhaustive solution search for Horn- clause programs. We showed how to automatically compile a Horn...
  • Flow123d

  • Referenced in 4 articles [sw13697]
  • physical parameter that does not compromise performance. Program supports output into GMSH and VTK formats...
  • RKWard

  • Referenced in 8 articles [sw05473]
  • statistical computing language and programming environment. The current status of R is a command line ... analysis, while not compromising on flexibility and modularity of the R programming environment itself...
  • Codejail

  • Referenced in 2 articles [sw07596]
  • library can lead to compromise of the whole program. Moreover, the library may also contain...
  • Panorama

  • Referenced in 3 articles [sw23936]
  • detection and analysis. Malicious programs spy on users’ behavior and compromise their privacy. Even software...
  • Diogenes

  • Referenced in 3 articles [sw30238]
  • translate it into a skeletal Java program. Then, they can refine this skeleton into proper ... verify that its honesty has not been compromised by the refinement...
  • Sandcrust

  • Referenced in 1 article [sw35846]
  • level development has been dominated by traditional programming languages such ... security holes or compromise the safety properties of software. The Rust programming language is targeted...
  • RECFMM

  • Referenced in 5 articles [sw21760]
  • well exploited. The program modules of RECFMM constitute a map between numerical computation components ... preserved and exploited, not obscured nor compromised, by parallel rendition of the recursion scheme. Modern...
  • Jinja not Java

  • Referenced in 2 articles [sw28876]
  • Java- We introduce Jinja, a Java-like programming language with a formal semantics designed ... Java language architecture. Jinja is a compromise between realism of the language and tractability...
  • QuantumOptics.jl

  • Referenced in 2 articles [sw23907]
  • open quantum systems written in the Julia programming language. Built exclusively in Julia and based ... level statically typed languages, without compromising on the accessibility and code readability found in dynamic...
  • FluidSim

  • Referenced in 4 articles [sw25606]
  • rich, scientific Python ecosystem and the Application Programming Interfaces (API) provided by fluiddyn and fluidfft ... reuse and maintenance of the code without compromising performance. The implementation details including optimization methods...
  • SWATT

  • Referenced in 5 articles [sw09061]
  • networks and smart appliances. An adversary can compromise our privacy and safety by maliciously modifying ... verify the contents of the program memory even while the sensor node is running...
  • GraphMat

  • Referenced in 2 articles [sw32720]
  • performance of graph analysis frameworks without compromising on productivity. GraphMat is our solution to bridge ... optimized code. GraphMat functions by taking vertex programs and mapping them to high performance sparse...
  • JSBML

  • Referenced in 2 articles [sw13871]
  • validating SBML files through its Application Programming Interface (API). Originally written ... However, the platform independence of Java is compromised in libSBML due to the fact that...
  • RSW-MCFP

  • Referenced in 1 article [sw25307]
  • area through Monte Carlo simulation-based fuzzy programming. The growth of global population and economy ... information and subjective judgments, which are usually compromised by uncertainties. This study proposed a resource ... novel Monte Carlo simulation-based fuzzy programming approach. The developed system was tested...
  • mPyPl

  • Referenced in 1 article [sw39065]
  • proposed approach to monads in functional programming. We also show how the library was used ... different evaluation strategies that allow for different compromises in terms of memory and performance...
  • NBSymple

  • Referenced in 2 articles [sw20351]
  • various CPUs by mean of OpenMP Application Program. The code works both in single precision ... some critical situations. We find a good compromise in using a software reconstruction of double...
  • DynOpVm

  • Referenced in 1 article [sw31719]
  • emerged as an effective technique for program obfuscation. Despite various attempts in improving its effectiveness ... effectively recover the secret mapping to compromise the protection, and then propose a novel ... attack ineffective, but dictates the execution and program analysis to follow the original control flow...
  • eLBM

  • Referenced in 2 articles [sw31183]
  • energy-based LBM), is performed in CUDA programming language to take maximum advantage of accelerated ... grid (D3Q19 scheme), which provides the best compromise between accuracy and computational efficiency. The benefits...