Discussion of “Computer Systems for Matrix Operations”

1964 ◽  
Vol 90 (6) ◽  
pp. 375-376
Author(s):  
George Kostro
1970 ◽  
Vol 24 (5) ◽  
pp. 359-369 ◽  
Author(s):  
Robert Mittermayr ◽  
Johann Blieberger ◽  
Andreas Schöbel

Deadlock analysis for railway systems differs in several aspects from deadlock analysis in computer science. While the problem of deadlock analysis for standard computer systems is well-understood, multi-threaded embedded computer systems pose new challenges. A novel approach in this area can easily be applied to deadlock analysis in the domain of railway systems. The approach is based on Kronecker algebra. A lazy implementation of the matrix operations even allows analysing exponentially sized systems in a very efficient manner. The running time of the algorithm does not depend on the problem size but on the size of the solution. While other approaches suffer from the fact that additional constraints make the problem and its solution harder, our approach delivers its results faster if constraints are added. In addition, our approach is complete and sound for railway systems, i.e., it generates neither false positives nor false negatives.


1964 ◽  
Vol 90 (3) ◽  
pp. 125-146
Author(s):  
Herbert Rothman ◽  
Peter Reilly

1988 ◽  
Vol 108 (4) ◽  
pp. 260-267
Author(s):  
Kazuo Takaragi ◽  
Ryoichi Sasaki ◽  
Yasuhiko Nagai

Think India ◽  
2019 ◽  
Vol 22 (2) ◽  
pp. 315-328
Author(s):  
Vishal Patel ◽  
Pravin H. Bhathawala

Anti Virus are nasty software’s. It is designed to damage computer systems without the knowledge of the owner using the system and technique advancements are posing big challenges for researchers in both academia and the industry. The purpose of this study is to examine the available literatures on Anti Virus analysis and to determine how research has evolved and advanced in terms of quantity, content and publication outlets. Most Anti Virus programs are large and complex and one can’t possibly understand every detail. Educating the internet users about Anti Virus attack, as well as the implementation and proper application of anti-Anti Virus tools, are critical steps in protecting the identities of online consumers against Anti Virus attacks.


Sign in / Sign up

Export Citation Format

Share Document