Syntactic analysis of arithmetic expressions for optimizing the operation of programs

Our algorithm combines the Reverse Polish Notation (RPN) and expression tree algorithms it is a novel method for efficiently evaluating arithmetic expressions. The algorithm combines the benefits of Reverse Polish Notation (RPN) and Expression Trees.

Подобные документы

  • Encryption standard adopted by the USA government through a competitive Advanced Encryption Standard. Evaluation algorithms for the various platforms. Cryptographic analysis and its properties. Testing of individual algorithms. Algorithmic version of AES.

    книга, добавлен 15.09.2012

  • The creation of an intuitive family tree on the basis of the online service Coggle, which is designed to develop mental maps. The main criteria that should be in the program for mobile application development. Structure of the mobile application.

    статья, добавлен 06.06.2023

  • The design of a von Neumann architecture machine. A stored-program digital computer. Development of the stored-program concept. Early von Neumann-architecture computers. Von Neumann bottleneck. Features of Von Neumann Architecture. Arithmetic Logic Unit.

    презентация, добавлен 25.10.2017

  • Biological Data in Digital Symbol Sequences. Machine-Learning Foundations: The Probabilistic Framework. Probabilistic Modeling and Inference. Machine Learning Algorithms. Hidden Markov Models and probabilistic Models of Evolution: Phylogenetic Trees.

    учебное пособие, добавлен 25.11.2013

  • Изучение основ работы с Genetic Algorithm в MatLAB, исследование экстремумов функций с помощью генетических алгоритмов без включения операции мутации и кроссовера с установлением параметров Crossover fraction из вкладки Reproduction в 1.0 и в 0.

    лабораторная работа, добавлен 28.12.2016

  • A problem with the automated exploit building method for the stack buffer overflow vulnerability. Application of the method to the problem of assessing the severity of errors in software and building protection for software and operating systems.

    статья, добавлен 28.10.2020

  • Steganographic communication with quantum information. Software integrity checking expressions for robust tamper detection. Exposing digital forgeries through specular highlights on the eye. Imaging sensor noise as digital X-ray for revealing forgeries.

    курс лекций, добавлен 08.03.2014

  • Systolic tree structure. Pattern mining operations. Throughput and cost effective performance are the highlights of the systolic tree based reconfigurable architecture. Frequently occurring item sets in databases. Weighted Association Rule Mining.

    статья, добавлен 30.08.2016

  • Analysis of the widespread approach to modeling and verification of systems, known as Model Checking, which allows to identify errors at different stages of development and maintenance of territorial development programs in order to eliminate them.

    статья, добавлен 30.04.2018

  • Программы векторной графики, их характеристика: Corel Draw 8-9, Adobe Illustrator 6, Micrografx Designer 7, Macromedia FreeHand 7, Corel Xara 1.5, Canvas. Fractal Design Expression. Принципы построения графических объектов. Векторная графика в интернете.

    курсовая работа, добавлен 09.03.2012

  • A structured language as one of a variety of programming possibilities. Unions, enumerations, and user-defined types systems the standard function library. Exception handling and miscellaneous classes. An object-oriented expression parser in program.

    учебное пособие, добавлен 08.03.2014

  • The replacement of the distribution of probable landmark locations, obtained from each local detector, with simpler parametric forms. Extensions to handle partial occlusions and reduce computational complexity. Algorithm regularized landmark mean-shift.

    статья, добавлен 24.12.2016

  • A new approach to computer security. Building a unified binary analysis platform and using it to provide novel solutions. Providing an extensible architecture. Combining static and dynamic analysis in program. Properties from binary programs BitBlaze.

    статья, добавлен 15.04.2014

  • Develop architecture for route construction, which allows philosophy of insertion and, more importantly, deletion of customer in route. Develop the structure of heuristic in such way, so the algorithm find satisfactory solution in acceptable time period.

    дипломная работа, добавлен 28.08.2016

  • Course determination algorithm that proposed based on the correlation of pairs of images. The errors of course determination that are investigated for different threshold values of normalized correlation coefficient. Components of course errors.

    статья, добавлен 26.10.2016

  • The goal of the paper is to obtain a system of target operation indicators, which provide unique identification of the system process with the ability to solve structural and parametric optimization problems in the framework of the controlled system.

    статья, добавлен 30.10.2016

  • Ассоциативные правила. Алгоритм Apriori. The FP-Growth Algorithm. Обобщенные ассоциативные правила. Определение и применение таксономии. Алгоритм вычисления обобщенных ассоциативных правил. Обработка данных в Python. Поиск артикула товара и запись в файл.

    дипломная работа, добавлен 30.08.2016

  • Creating a new table structure with the table wizard. Changing a table design from the relationships window. Using the spelling checker and autocorrect. Getting help from the expression builder. Assigning or changing permissions and ownerships.

    книга, добавлен 19.03.2014

  • Alan Mathison Turning - an English computer scientist, mathematician, cryptanalyst. He was highly influential in the development of theoretical computer science, providing a formalisation of the concepts of algorithm, computation with the Turing machine.

    презентация, добавлен 29.03.2016

  • Общий обзор программ векторной графики. Принципы работы Corel Draw 8-9, Adobe Illustrator 6, Micrografx Designer 7, Macromedia FreeHand 7, Corel Xara 1.5, Canvas 5, Fractal Design Expression. Сравнения характеристик программ. Применение векторной графики.

    курсовая работа, добавлен 10.03.2010

  • Исследование методов, использующих оптимальность по Парето на основе генетических алгоритмов. Описание преимуществ метода SPEA (Strength Pareto Evolutionary Algorithm) и SPEA2 по отношению к другим наиболее часто применяемым методам VEGA, FFGA, NSGA.

    статья, добавлен 27.07.2017

  • Clustering algorithms for very large database used in image processing and video. Search for groups (classes, clusters, segments) of the objects surveyed in the analyzed information arrays. Multidimensional vectors forming a traditional data table.

    статья, добавлен 14.01.2017

  • Features of the authentication scheme built on the complex fractal sets using the composition methods of remote evaluation of knowledge. Algorithm for client-server interaction. Improvement in security of network information resources in the scheme.

    статья, добавлен 25.03.2016

  • Theory of condensation growth of aerosol particles under saturation conditions. Mathematical description of heat and mass transfer processes. The structure of mathematical models and the algorithm of pollution dynamics modeling in "clean rooms".

    статья, добавлен 26.06.2016

  • Database and logic abduction method. Classical Logic Programming approach. Soundness and completeness DLA method. Various aspects of analysis of security protocols. Needham-Schroeder protocol. Optimized Otway-Rees protocol. Internet Key Exchange Protocol.

    научная работа, добавлен 15.09.2012

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.