Control-flow analysis | Application-specific graphs

Control-flow graph

In computer science, a control-flow graph (CFG) is a representation, using graph notation, of all paths that might be traversed through a program during its execution. The control-flow graph was discovered by Frances E. Allen, who noted that Reese T. Prosser used boolean connectivity matrices for flow analysis before. The CFG is essential to many compiler optimizations and static-analysis tools. (Wikipedia).

Control-flow graph
Video thumbnail

Everything You Need to Know About Control Theory

Control theory is a mathematical framework that gives us the tools to develop autonomous systems. Walk through all the different aspects of control theory that you need to know. Some of the concepts that are covered include: - The difference between open-loop and closed-loop control - How

From playlist Control Systems in Practice

Video thumbnail

The Step Response | Control Systems in Practice

Check out the other videos in this series: https://www.youtube.com/playlist?list=PLn8PRpmsu08pFBqgd_6Bi7msgkWFKL33b This video covers a few interesting things about the step response. We’ll look at what a step response is and some of the ways it can be used to specify design requirements f

From playlist Control Systems in Practice

Video thumbnail

Nonlinear Plant Control at Different Operating Points

Design and analyze a controller for different operating points of a nonlinear plant simultaneously.For a free Control System toolbox Trial, visit: https://www.mathworks.com/programs/trials/trial_request.html?prodcode=CT&s_eid=PEP_12669 For more info on Control System Toolbox, visit: http:

From playlist Control System Design and Analysis

Video thumbnail

Graphing Equations By Plotting Points - Part 1

This video shows how to graph equations by plotting points. Part 1 of 2 http://www.mathispower4u.yolasite.com

From playlist Graphing Various Functions

Video thumbnail

What Is Feedforward Control? | Control Systems in Practice

A control system has two main goals: get the system to track a setpoint, and reject disturbances. Feedback control is pretty powerful for this, but this video shows how feedforward control can make achieving those goals easier. Temperature Control in a Heat Exchange Example: http://bit.ly

From playlist Control Systems in Practice

Video thumbnail

Understanding Control Systems, Part 1: Open-Loop Control Systems

Explore open-loop control systems by walking through some introductory examples. Learn how open-loop systems are found in every day appliances like toasters or showers, and discover how they can be tuned by trial-and-error to achieve a desired output. Watch other MATLAB Tech Talks: https:

From playlist Understanding Control Systems

Video thumbnail

Block Diagram Algebra

In this video we introduce block diagrams (AKA signal flow diagrams). We explore how they are used to describe complex systems as well as how to perform block diagram algebra (AKA block diagram reduction) to simplify complex block diagrams. Topics and time stamps: (0:56) – Introduction t

From playlist Control Theory

Video thumbnail

Working with Transfer Functions in MATLAB

Learn how to work with transfer functions using MATLAB® and Control System Toolbox™. This video demonstrates how you can create a transfer function to model a linear-time invariant system. Two transfer functions are combined to create a plant model. You can add a controller, and compute

From playlist Control System Design and Analysis

Video thumbnail

System Identification and Control Using OPC Data

Get a Free Trial: https://goo.gl/C2Y9A5 Get Pricing Info: https://goo.gl/kDvGHt Ready to Buy: https://goo.gl/vsIeA5 Improve process performance by designing and implementing a model predictive controller. Use OPC Toolbox and System Identification Toolbox to collect the input-output data

From playlist Control System Design and Analysis

Video thumbnail

Creating and Deploying CDF Documents to Teach Undergraduate Graph Theory

Matthew Fairtlough To learn more about the Wolfram Technologies, visit http://www.wolfram.com The European Wolfram Technology Conference featured both introductory and expert sessions on all major technologies and many applications made possible with Wolfram technology. Learn to achieve

From playlist European Wolfram Technology Conference 2015

Video thumbnail

RubyConf 2022: scip-ruby - A Ruby indexer built with Sorbet by Varun Gandhi

scip-ruby is an open source indexer that lets you browse Ruby code online, with IDE functionality like “Go to definition” and “Find usages”. We originally built scip-ruby to improve Ruby support in Sourcegraph, a code intelligence platform. In this talk, you will learn how we built scip-ru

From playlist RubyConf 2022: Mini and Houston

Video thumbnail

CERIAS Security: Signature Analysis Coupled With Slicing Analysis for the Validation of Software 1/3

Clip 1/3 Speaker: Adam Dugger · Arxan What if you could determine exactly where, in any compiled binary, a security threat existed? Answering this question has been the fundamental goal of anti-virus software for many years past, with limited success. Instead, what if you could determin

From playlist The CERIAS Security Seminars 2008

Video thumbnail

Laser: Static Analysis for Ruby, in Ruby by Michael Edgar

What truly makes Ruby special as a language is its focus on expressivity, flexibility, and dynamism. Yet these same properties - and their widespread use in the community - make even straightforward application code difficult to analyze statically in a meaningful way. Laser seeks to change

From playlist Ruby Conference 2011

Video thumbnail

Compilation - Part Four: Intermediate Code

This is part four of a series of videos about compilation. Part four is about an intermediate representation of source programs that some compilers generate known as intermediate code. The video focuses on a form of intermediate code known as Three Address Code (TAC). You will see the g

From playlist Compilation

Video thumbnail

27c3: Code deobfuscation by optimization (en)

Speaker: Branko Spasojevic Optimization algorithms present an effective way for removing most obfuscations that are used today. Much of the compiler theory can be applied in removing obfuscations and building fast and reliable deobfuscation systems. By understanding traditional optimizati

From playlist 27C3: We come in peace

Video thumbnail

GRCon19 - Managing Latency in Continuous GNU Radio Flowgraphs by Matt Ettus

Managing Latency in Continuous GNU Radio Flowgraphs by Matt Ettus

From playlist GRCon 2019

Video thumbnail

What Is Gain Scheduling? | Control Systems in Practice

Often, the best control system is the simplest. When the system you’re trying to control is highly nonlinear, this can lead to very complex controllers. This video continues our discussion on control systems in practice by talking about a simple form of nonlinear control: gain scheduling.

From playlist Control Systems in Practice

Video thumbnail

Stanford Seminar - Multiscale Dataflow Computing: Competitive Advantage at the Exascale Frontier

EE380: Computer Systems Colloquium Seminar Multiscale Dataflow Computing: Competitive Advantage at the Exascale Frontier Speaker: Brian Boucher, Maxeler Technologies Maxeler Multiscale Dataflow computing is at the leading edge of energy-efficient high performance computing, providing c

From playlist Stanford EE380-Colloquium on Computer Systems - Seminar Series

Related pages

Edge contraction | Constant folding | Program dependence graph | Graph (discrete mathematics) | Unreachable code | Reachability | Depth-first search | Abstract syntax tree | Jump threading | Adjacency matrix | Data-flow analysis | Dominator (graph theory) | Flowchart | Vertex (graph theory) | Loop-invariant code motion | Halting problem | Directed acyclic graph | Cyclomatic complexity | Infinite loop