共查询到20条相似文献,搜索用时 15 毫秒
1.
I. Antcheva M. Ballintijn B. Bellenot M. Biskup R. Brun N. Buncic Ph. Canal D. Casadei O. Couet V. Fine L. Franco G. Ganis A. Gheata D. Gonzalez Maline M. Goto J. Iwaszkiewicz A. Kreshuk D. Marcos Segura R. Maunder L. Moneta A. Naumann E. Offermann V. Onuchin S. Panacek F. Rademakers P. Russo M. Tadel 《Computer Physics Communications》2009,180(12):2499-2512
2.
I. Antcheva M. Ballintijn B. Bellenot M. Biskup R. Brun N. Buncic Ph. Canal D. Casadei O. Couet V. Fine L. Franco G. Ganis A. Gheata D. Gonzalez Maline M. Goto J. Iwaszkiewicz A. Kreshuk D. Marcos Segura R. Maunder L. Moneta A. Naumann E. Offermann V. Onuchin S. Panacek F. Rademakers P. Russo M. Tadel 《Computer Physics Communications》2011,(6):1384-1385
A new stable version (“production version”) v5.28.00 of ROOT [1] has been published [2]. It features several major improvements in many areas, most noteworthy data storage performance as well as statistics and graphics features. Some of these improvements have already been predicted in the original publication Antcheva et al. (2009) [3]. This version will be maintained for at least 6 months; new minor revisions (“patch releases”) will be published [4] to solve problems reported with this version.
New version program summary
Program title: ROOTCatalogue identifier: AEFA_v2_0Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEFA_v2_0.htmlProgram obtainable from: CPC Program Library, Queen?s University, Belfast, N. IrelandLicensing provisions: GNU Lesser Public License v.2.1No. of lines in distributed program, including test data, etc.: 2 934 693No. of bytes in distributed program, including test data, etc.: 1009Distribution format: tar.gzProgramming language: C++Computer: Intel i386, Intel x86-64, Motorola PPC, Sun Sparc, HP PA-RISCOperating system: GNU/Linux, Windows XP/Vista/7, Mac OS X, FreeBSD, OpenBSD, Solaris, HP-UX, AIXHas the code been vectorized or parallelized?: YesRAM: > 55 MbytesClassification: 4, 9, 11.9, 14Catalogue identifier of previous version: AEFA_v1_0Journal reference of previous version: Comput. Phys. Commun. 180 (2009) 2499Does the new version supersede the previous version?: YesNature of problem: Storage, analysis and visualization of scientific dataSolution method: Object store, wide range of analysis algorithms and visualization methodsReasons for new version: Added features and corrections of deficienciesSummary of revisions: The release notes at http://root.cern.ch/root/v528/Version528.news.html give a module-oriented overview of the changes in v5.28.00. Highlights include•
File format Reading of TTrees has been improved dramatically with respect to CPU time (30%) and notably with respect to disk space. •
Histograms A new TEfficiency class has been provided to handle the calculation of efficiencies and their uncertainties, TH2Poly for polygon-shaped bins (e.g. maps), TKDE for kernel density estimation, and TSVDUnfold for singular value decomposition. •
Graphics Kerning is now supported in TLatex, PostScript and PDF; a table of contents can be added to PDF files. A new font provides italic symbols. A TPad containing GL can be stored in a binary (i.e. non-vector) image file; add support for full-scene anti-aliasing. Usability enhancements to EVE. •
Math New interfaces for generating random number according to a given distribution, goodness of fit tests of unbinned data, binning multidimensional data, and several advanced statistical functions were added. •
RooFit Introduction of HistFactory; major additions to RooStats. •
TMVA Updated to version 4.1.0, adding e.g. the support for simultaneous classification of multiple output classes for several multivariate methods. •
PROOF Many new features, adding to PROOF?s usability, plus improvements and fixes. •
PyROOT Support of Python 3 has been added. •
Tutorials Several new tutorials were provided for above new features (notably RooStats).
[1]
http://root.cern.ch. [2]
http://root.cern.ch/drupal/content/production-version-528. [3]
I. Antcheva, M. Ballintijn, B. Bellenot, M. Biskup, R. Brun, N. Buncic, Ph. Canal, D. Casadei, O. Couet, V. Fine, L. Franco, G. Ganis, A. Gheata, D. Gonzalez Maline, M. Goto, J. Iwaszkiewicz, A. Kreshuk, D. Marcos Segura, R. Maunder, L. Moneta, A. Naumann, E. Offermann, V. Onuchin, S. Panacek, F. Rademakers, P. Russo, M. Tadel, ROOT — A C++ framework for petabyte data storage, statistical analysis and visualization, Comput. Phys. Commun. 180 (2009) 2499. [4]
http://root.cern.ch/drupal/content/root-version-v5-28-00-patch-release-notes.
3.
程序优化是提高程序运行效率的重要步骤,程序剖析是程序优化的第一步。对于串行语言,程序剖析代码是由编译器通过一个命令行开关自动插入。但是,大部分并行语言编译器都不具有这个功能。该文以并行C++语言的可移植的动态剖析程序(profiler)为例,从两方面对问题进行了论述:首先给出实现可移植动态剖析程序的一般方法;然后分析一个用于pC++插桩(Instrumentation)工具。 相似文献
4.
Incorporating dimensional-analysis facilities in a language lets an environment detect an additional class of errors, but at the expense of requiring a change to the language you used. However, if the language you used has suitable data-abstraction facilities, most of the benefits of dimensional analysis can be had without changing the language. To demonstrate how to get these benefits, the authors use the data-abstraction facilities of C++ to implement dimensional analysis. C++ is an upwardly compatible extension of C that provides data-abstraction facilities called classes. The authors define a set of classes that allows the writing of programs with automatic checking of units (i.e. dimensional analysis) and automatic conversion between consistent (compatible or equivalent) units. They discuss the pros and cons of this approach and compare the advantage C++ has over Ada for implementing dimensional analysis 相似文献
5.
Shaunak Chatterjee Shuvendu K. Lahiri Shaz Qadeer Zvonimir Rakamarić 《International Journal on Software Tools for Technology Transfer (STTT)》2009,11(2):105-116
Reasoning about program heap, especially if it involves handling unbounded, dynamically heap-allocated data structures such as linked lists and arrays, is challenging. Furthermore, sound analysis that precisely models heap becomes significantly more challenging in the presence of low-level pointer manipulation that is prevalent in systems software. The reachability predicate has already proved to be useful for reasoning about the heap in type-safe languages where memory is manipulated by dereferencing object fields. In this paper, we present a memory model suitable for reasoning about low-level pointer operations that is accompanied by a formalization of the reachability predicate in the presence of internal pointers and pointer arithmetic. We have designed an annotation language for C programs that makes use of the new predicate. This language enables us to specify properties of many interesting data structures present in the Windows kernel. We present our experience with a prototype verifier on a set of illustrative C benchmarks. 相似文献
6.
This work presents a novel distributed symbolic algorithm for reachability analysis that can effectively exploit, as needed, a large number of machines working in parallel. The novelty of the algorithm is in its dynamic allocation and reallocation of processes to tasks and in its mechanism for recovery from local state explosion. As a result, the algorithm is work-efficient: it utilizes only those resources that are actually needed. In addition, its high adaptability makes it suitable for exploiting the resources of very large and heterogeneous distributed, nondedicated environments. Thus, it suitable for verifying very large systems. We implemented our algorithm in a tool called Division. Our experimental results show that the algorithm is indeed work-efficient. Although the goal of this research is to check larger models, the results also indicate that the algorithm can obtain high speedups, because communication overhead is very small. 相似文献
7.
8.
Viktor Schuppan Armin Biere 《International Journal on Software Tools for Technology Transfer (STTT)》2004,5(2-3):185-204
Two types of temporal properties are usually distinguished: safety and liveness. Recently we have shown how to verify liveness properties of finite state systems using safety checking. In this article we extend the translation scheme to typical combinations of temporal operators. We discuss optimizations that limit the overhead of our translation. Using the notions of predicated diameter and radius we obtain revised bounds for our translation scheme. These notions also give a tight bound on the minimal completeness bound for simple liveness properties. Experimental results show the feasibility of the approach for complex examples. For one example, even an exponential speedup can be observed. 相似文献
9.
Many existing techniques for reversing data structures in C/C ++ binaries are limited to low-level programming constructs, such as individual variables or structs. Unfortunately, without detailed information about a program's pointer structures, forensics and reverse engineering are exceedingly hard. To fill this gap, we propose MemPick, a tool that detects and classifies high-level data structures used in stripped binaries. By analyzing how links between memory objects evolve throughout the program execution, it distinguishes between many commonly used data structures, such as singly- or doubly-linked lists, many types of trees (e.g., AVL, red-black trees, B-trees), and graphs. We evaluate the technique on 10 real world applications, 4 file system implementations and 16 popular libraries. The results show that MemPick can identify the data structures with high accuracy. 相似文献
10.
Static analysis is a popular tool for detecting the vulnerabilities that cannot be found by means of ordinary testing. The main problem in the development of static analyzers is their low speed. Methods for accelerating such analyzers are described, which include incremental analysis, lazy analysis, and header file caching. These methods make it possible to considerably accelerate the detection of defects and to integrate the static analysis tools in the development environment. As a result, defects in a file edited in the Visual Studio development environment can be detected in 0.5 s or faster, which means that they can be practically detected after each keystroke. Therefore, critical vulnerabilities can be detected and corrected at the stage of coding. 相似文献
11.
基于PCI-2300多功能数据采集卡,在C++Builder开发环境下,运用多线程技术,给出了合金铸造过程中温度、线收缩、热裂等参数的采集系统的设计。该系统具有对合金铸造过程中的温度变化、线收缩率等参数进行实时采集、保存、图像显示、输出MS Office报告等功能。 相似文献
12.
13.
Quality of data model for supporting mobile decision making 总被引:2,自引:0,他引:2
This paper describes research towards implementation of a mobile decision support system. Our view is that the mobile decision maker will benefit if provided with a measure of the Quality of the Data (QoD) used in deriving a decision, and how QoD improves or deteriorates while he/she is on the move. We propose a QoD model taking into account static and dynamic properties of the mobile decision context, and use multicriteria decision analysis to represent decision model and derive a QoD measure. A prototype mobile decision support system has been developed to investigate the usefulness of the proposed QoD model. 相似文献
14.
15.
Prasun Dewan 《Software》1991,21(7):719-738
We have designed an inheritance model that reduces the effort required to define presentations of data structures of programs written in conventional languages. It assumes that the presentation of a data structure is determined by one or more attributes of the data structure; classifies data structures into several groups based on their types, contexts, siblings, ancestors and other properties; and allows an attribute to be defined once for all members of a group. These groups are arranged in multiple intersecting hierarchies, and a subgroup is allowed to inherit attributes from its supergroups(s). This paper motivates, describes, and illustrates our method of grouping values and arranging the value groups in inheritance hierarchies. 相似文献
16.
López-Gómez Javier del Rio Astorga David Dolz Manuel F. Fernández Javier García J. Daniel 《The Journal of supercomputing》2020,76(7):5057-5078
The Journal of Supercomputing - The use of synchronization mechanisms in multithreaded applications is essential on shared-memory multi-core architectures. However, debugging parallel applications... 相似文献
17.
Safety verification and reachability analysis for hybrid systems 总被引:1,自引:0,他引:1
Safety verification and reachability analysis for hybrid systems is a very active research domain. Many approaches that seem quite different, have been proposed to solve this complex problem. This paper presents an overview of various approaches for autonomous, continuous-time hybrid systems and presents them with respect to basic problems related to verification. 相似文献
18.
程序模拟了两数相乘的人工竖式算法,利用C++标准模板库中string类接收键盘输入的大数,并用标准模板库vector类存储大数和相乘,解决了基本数据类型表示大数位数有限的问题. 相似文献
19.
20.
给出了一种应用于分析C 程序的类切片算法。对于一个给定的C 程序及其继承关系,应用此算法可以除去与程序执行无关的数据成员、成员函数、类及继承关系,从而对大而复杂的面向对象软件的调试、测试、分析、理解和修改过程提供了一种切实可行的方法。 相似文献