Filters








80 Hits in 11.3 sec

An efficient tag-based routing algorithm for the backward network of a bidirectional general shuffle-exchange network in honor of Frank k. Hwang's 65th Birthday

Chiuyuan Chen, Jing-Kai Lou
2006 IEEE Communications Letters  
This letter considers the problem of designing efficient routing algorithms for the backward network of a bidirectional general shuffle-exchange network (BNBGSEN for short); switch elements in the network  ...  We use this property to derive an efficient tag-based routing algorithm. Index Terms-Multistage interconnection network, Omega network, shuffle-exchange, tag-based routing algorithm.  ...  INTRODUCTION T HE purpose of this letter is to derive an efficient tagbased routing algorithm for the backward network of a bidirectional general shuffle-exchange network.  ... 
doi:10.1109/lcomm.2006.1613752 fatcat:zli4wtav2zfvbfxsxhw7bjeu5a

Using the multistage cube network topology in parallel supercomputers

H.J. Siegel, W.G. Nation, C.P. Kruskal, L.M. Napolitano
1989 Proceedings of the IEEE  
These include O(N log, N) cost for an N inputloutput network, decentralized control, a variety of implementation options, good data permuting capability to support single instruction stream/multiple data  ...  The multistage cube topology can he converted into a single-stage network by associating with each switch in the network a processor (and a memory).  ...  ACKNOWLEDGMENT The authors gratefully acknowledge the following people for providing information for section VII: Ken  ... 
doi:10.1109/5.48833 fatcat:kiwmgx4lqrbyza6m52nvpuwf2y

Wormhole routing techniques for directly connected multicomputer systems

Prasant Mohapatra
1998 ACM Computing Surveys  
We start with an overview of the direct network topologies and a comparison of various switching techniques.  ...  We present a detailed survey of various techniques for enhancing the performance and reliability of wormhole-routing schemes in directly connected networks.  ...  An extensive and detailed review of an earlier draft of the article by Professor José Duato is greatly appreciated.  ... 
doi:10.1145/292469.292472 fatcat:awgtqfbqvjfmvfibgxf3aeqlay

A scalable, commodity data center network architecture

Mohammad Al-Fares, Alexander Loukissas, Amin Vahdat
2008 Proceedings of the ACM SIGCOMM 2008 conference on Data communication - SIGCOMM '08  
The network architecture typically consists of a tree of routing and switching elements with progressively more specialized and expensive equipment moving up the network hierarchy.  ...  Our approach requires no modifications to the end host network interface, operating system, or applications; critically, it is fully backward compatible with Ethernet, IP, and TCP.  ...  Acknowledgments We wish to thank George Varghese as well as the anonymous referees for their valuable feedback on earlier drafts of this paper.  ... 
doi:10.1145/1402958.1402967 dblp:conf/sigcomm/Al-FaresLV08 fatcat:372nu6umpne4naamikz5zaoxn4

A scalable, commodity data center network architecture

Mohammad Al-Fares, Alexander Loukissas, Amin Vahdat
2008 Computer communication review  
The network architecture typically consists of a tree of routing and switching elements with progressively more specialized and expensive equipment moving up the network hierarchy.  ...  Our approach requires no modifications to the end host network interface, operating system, or applications; critically, it is fully backward compatible with Ethernet, IP, and TCP.  ...  Acknowledgments We wish to thank George Varghese as well as the anonymous referees for their valuable feedback on earlier drafts of this paper.  ... 
doi:10.1145/1402946.1402967 fatcat:m34tpdvkebaixb5svbpmi7o4lu

Breaking and (Partially) Fixing Provably Secure Onion Routing [article]

Christiane Kuhn, Martin Beck, Thorsten Strufe
2019 arXiv   pre-print
After several years of research on onion routing, Camenisch and Lysyanskaya, in an attempt at rigorous analysis, defined an ideal functionality in the universal composability model, together with properties  ...  We demonstrate how to avoid it by showing our improved properties for one protocol, thus partially fixing the family of provably secure onion routing protocols.  ...  ACKNOWLEDGMENT We thank our shepherd Ian Goldberg and the anonymous reviewers for their very valuable feedback. This work in part was funded by DFG EXC 2050/1 -ID 390696704.  ... 
arXiv:1910.13772v1 fatcat:jgi2arw5lrea5kjwqn3uhrlppa

NER in Archival Finding Aids: Extended

Luís Filipe da Costa Cunha, José Carlos Ramalho
2022 Machine Learning and Knowledge Extraction  
The amount of information preserved in Portuguese archives has increased over the years. These documents represent a national heritage of high importance, as they portray the country's history.  ...  These named entities translate into crucial information about their context and, with high confidence results, they can be used for several purposes, for example, the creation of smart browsing tools by  ...  Deep Learning Framework for NLP This framework consists of using a statistical model based on Neural Networks to predict the actions to be taken.  ... 
doi:10.3390/make4010003 fatcat:xfgvkz5rzfdehidl2vss6heypq

Pico: A Domain-Specific Language For Data Analytics Pipelines

Claudia Misale, Marco Aldinucci, Guy Tremblay
2017 Zenodo  
Second, we propose a programming environment based on such layered model in the form of a Domain-Specific Language (DSL) for processing data collections, called PiCo (Pipeline Composition). T [...]  ...  This analysis can be considered as a first step toward a formal model to be exploited in the design of a (new) framework for Big Data analytics.  ...  Acknowledgements Funding This work has been partially supported by the Italian Ministry of Education and Research (MIUR), by the EU-H2020 RIA project "Toreador" (no. 688797), the EU-H2020 RIA project  ... 
doi:10.5281/zenodo.579753 fatcat:aadje57qh5hk3ijmqn4j7vkhpm

A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks

Wenbo Wang, Dinh Thai Hoang, Peizhao Hu, Zehui Xiong, Dusit Niyato, Ping Wang, Yonggang Wen, Dong In Kim
2019 IEEE Access  
From a game-theoretic point of view, we also provide a thorough review on the strategy adoption for self-organization by the individual nodes in the blockchain backbone networks.  ...  Consequently, we provide a comprehensive survey on the emerging applications of the blockchain networks in a wide range of areas.  ...  ACKNOWLEDGMENT The ASEAN IVO (http://www.nict.go.jp/en/asean_ivo) project Cyberattack Detection and Information Security for Industry 4.0 was also involved in the production of the contents of this work  ... 
doi:10.1109/access.2019.2896108 fatcat:sgldb5225zgbblapruvsz2gdky

29th Annual Computational Neuroscience Meeting: CNS*2020

2020 BMC Neuroscience  
Deep RL offers a rich framework for studying the interplay among learning, representation and decision-making, offering to the brain sciences a new set of research tools and a wide range of novel hypotheses  ...  only a tiny fraction of visual input information for further processing.  ...  Institute (Challenge grants to SJ), the Research Corporation for Science Advancement (a Cottrell SEED Award to TV), and the German Research Foundation (DFG grant #ME 1535/7-1 to RM), and the Foundation  ... 
doi:10.1186/s12868-020-00593-1 pmid:33342424 fatcat:edosycf35zfifm552a2aogis7a

30th Annual Computational Neuroscience Meeting: CNS*2021–Meeting Abstracts

2021 Journal of Computational Neuroscience  
within the constraints of biological networks.  ...  Currently, most functional models of neural activity are based on firing rates, while the most relevant signals for inter-neuron communication are spikes.  ...  Acknowledgements This work is an output of a research project implemented as part of the Basic Research Program at the HSE University.  ... 
doi:10.1007/s10827-021-00801-9 pmid:34931275 pmcid:PMC8687879 fatcat:evpmmfpaivgpxdqpive5xdgmwu

CARS 2021: Computer Assisted Radiology and Surgery Proceedings of the 35th International Congress and Exhibition Munich, Germany, June 21–25, 2021

2021 International Journal of Computer Assisted Radiology and Surgery  
The University Rovira i Virgili also supports this work with project 2019PFR-B2-61. References  ...  Acknowledgements This work has been funded by the research project PI18/00169 from Instituto de Salud Carlos III & FEDER funds.  ...  Instead of training a deep convolutional network from scratch, the method utilized a pre-trained network for classifying the images efficiently.  ... 
doi:10.1007/s11548-021-02375-4 pmid:34085172 fatcat:6d564hsv2fbybkhw4wvc7uuxcy

Notes on Theory of Distributed Systems [article]

James Aspnes
2021 arXiv   pre-print
Notes for the Yale course CPSC 465/565 Theory of Distributed Systems.  ...  This does not give a lower bound on the problem in general, and indeed the renaming-network based algorithms discussed previously do not have this property.  ...  The basic idea is to build a sorting network out of test-and-sets; the resulting structure, called a renaming network, routes each process through a sequence of test-and-sets to a unique output wire.  ... 
arXiv:2001.04235v2 fatcat:viv5nl6qyvdnhjb73vm64gxj5u

DLL architecture for OFDM based VLC transceivers in FPGA

Luis Duarte, Luis Rodrigues, Luis N. Alves, Carlos Ribeiro, Monica Figueiredo
2016 2016 10th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)  
The main objective of this dissertation work is to implement an efficient DLL in a Microblaze soft processor in a FPGA and to study its usage in a broadcast VLC system for lighting systems.  ...  This work addresses the problem of achieving high bandwidth in a DLL design for OFDM based VLC broadcast systems and is inserted in a funded project called VL-CLighting.  ...  The aim of this work is to propose a Network Layered Architecture for an Orthogonal Frequency-Division Multiplexing (OFDM) based VLC system.  ... 
doi:10.1109/csndsp.2016.7573949 dblp:conf/csndsp/DuarteRARF16 fatcat:mudtujqt2bdhbgva5h7ruddjku

Caching Mechanism in Peer-to-Peer Networks through Active XML

Abdullah Alrefae, Eric Pardede, Binh Viet Phan
2012 Journal of Software  
Furthermore, some criteria are introduced, which are necessary and sufficient for liveness, to determine the liveness of global system by the same ones of local systems.  ...  In a synthesis process, such good properties of subsystems as liveness and deadlock-freeness etc, must be preserved in synthesized system.  ...  This work was supported in part by a grant from the Natural Science Foundation of Guangdong (101510631-01000046) and the National Science Foundation of China (60940033).  ... 
doi:10.4304/jsw.7.3.508-515 fatcat:6vlsijzaxjbohh3ti5toew7rmi
« Previous Showing results 1 — 15 out of 80 results