Using excess code to design fault-tolerant topologies
Describing the main synthesis of fault-tolerant topologies, the consideration of the possibilities of using their features and the analysis of the main characteristics in comparison with each other and with classic versions based on binary code.
Подобные документы
The essence of using a functionally complete tolerant elements. Comparison of the exponential reliability functional performance. Rating and characteristic tree of the transmitting transistors. Description of redundancy of the transmitting transistors.
статья, добавлен 28.02.2016Consideration of methods of information coding. Use of coded pages for the improvement of design objects. Study of the functional purpose of barcode and QR-code. Analysis of the engineering sequence of the artistic and graphic process of code creation.
статья, добавлен 03.07.2023Consideration of new forms of binary representations of Boolean functions. Analysis of single algebraic and non-inverting classic models of the Reed-Muller. Using technology "EDM - Extended Data Mining". Characteristics of main data mining algorithms.
статья, добавлен 14.07.2016The main features of non-traditional social engineering. Characteristics of the main non-traditional design, which involves the formation of a number of new types of activities (involvement of users in design, complex management and project expertise).
статья, добавлен 26.04.2023This article describes the main features of the design in 3D format. Demonstrated the usefulness of this method in the design and in the analysis. Presents basic examples of the practical application of data modeling functions for real design solutions.
статья, добавлен 28.09.2016Analysis of the specific features of automatic code generation for diagrams in the Dragon programming language. Computer’s training by creating an expert system as very different form of human learning. The algorithm of a trip by bus on Python 2.7.
статья, добавлен 10.08.2018Fair Blind Signatures without Random Oracles. Fair Partially Blind Signatures. Parallel Shortest Lattice Vector Enumeration on Graphics Cards. Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes. Side-Channel, Fault Attacks.
книга, добавлен 08.03.2014Analysis of information modeling processes and tasks, and options for improvement using extensive programming capabilities. Characteristics of the main methods of automating and speeding up the design process using programming and their properties.
статья, добавлен 30.08.2022The article is aimed at researching the possibilities and strategies of innovative integration of parametricism in the field of graphic design and analyzing the main problems and solutions of using parametric design in the creation of graphic objects.
статья, добавлен 20.07.2024Feature of writing wrapper libraries on top of libraries written in other programming languages or transpiled from other programming languages. Characteristics of the improvement of most of the standard indicators of the quality of the software code.
статья, добавлен 19.03.2024A new algorithm for parallel fault simulation of VLSI on multicore workstations with common memory was proposed. The results of computational experiments on ISCAS-89 benchmarks circuits, which are obtained on the 12-core workstation, were reported.
статья, добавлен 28.02.2016Analysis of affine coordinates for pairing computation. Construction of designated connfirmer signature and its application to optimistic fair exchange. Designing a code generator for pairing based cryptographic functions and efficient constructions.
книга, добавлен 08.03.2014The article considers an example that contains the main features of a relational database - tabular representation, primary key, foreign key. It is shown that this database is completely described by the new format. A comma-separated values (CSV) files.
статья, добавлен 06.07.2023Dictionary data structures. Tolerant retrieval: Wildcards, Spell correction, Soundex. Sort-based index construction. Blocked sort-based Indexing (Sorting with fewer disk seeks). Remaining problem with sort-based algorithm. Single-pass in-memory indexing.
презентация, добавлен 19.02.2014- 15. The code book
The history of codes and ciphers as the story of the centuries-old battle between codemakers and codebreakers, an intellectual arms race that has had a dramatic impact on the course of history. The mechanization of secrecy. A qantum leap into the future.
книга, добавлен 08.03.2014 A new approach to computer security. Building a unified binary analysis platform and using it to provide novel solutions. Providing an extensible architecture. Combining static and dynamic analysis in program. Properties from binary programs BitBlaze.
статья, добавлен 15.04.2014Procedure Oriented Programming. Return Type of mai. Example with Class. Creating Source File. Compiling and Linking. Representation of subjects of real problems in system design. Developing module, which are tolerant to any changes in the future.
курс лекций, добавлен 29.09.2014Code switching as an aspect of studying results within the framework of the theory of language contacts. The structure of a sentence at the level of its morphological and syntactic structures, the nature of linguistic borrowings in a synchronous plan.
статья, добавлен 09.04.2021Efficient second-order power analysis. Long modular multiplication for cryptographic applications. The leak resistant arithmetic. Compared elliptic curve cryptography. Instruction set extensions for fast arithmetic. Fault analysis of stream ciphers.
курс лекций, добавлен 08.03.2014Describe the architecture for building a cloud-based SaaS application platform, the main characteristics of the services. Creating a software template for the device of communication inherited of air transport, the use of algebras of real-time processes.
статья, добавлен 25.10.2016Identify and select fragments of developed software products and applied technologies that contribute to the formation and development of professional competencies of professionals. Reviews software applications and fragments of their software code.
статья, добавлен 16.08.2023Опис інноваційної методики колективної співпраці в спільноті Індустрії 4.0, що передбачає створення нових керівних документів, цифрових платформ. Інструменти low-code платформи. Комплексний аналіз алгоритму low-code крізь призму етапів його реалізації.
статья, добавлен 12.06.2023- 23. Virtual Memory
Levels in Memory Hierarchy. Design of DRAM caches. Locating an Object in a "Cache". A System with Physical Memory Only and with Virtual Memory. Servicing a Page Fault. Multiple processes in physical memory. Macintosh Memory Model. Page Table Operation.
презентация, добавлен 03.06.2012 Основные этапы программирования на ассемблере. Реализация алгоритма Cyclic Redundancy Code. Методы проверки массива данных. Трансляция кода в исполняемый файл. Контроль на четность массива данных, хранящегося в некоторой области памяти и программы.
курсовая работа, добавлен 10.01.2017The study of accidents and disasters involving a variety of critical infrastructures, assessment of the level of fault tolerance software management systems. The calculation method based optimization of software testing management system infrastructure.
статья, добавлен 28.02.2016