Filters








8,822 Hits in 5.4 sec

Grasping the Gap Between Blocking and Non-Blocking Transactional Memories [chapter]

Petr Kuznetsov, Srivatsan Ravi
2015 Lecture Notes in Computer Science  
In sum, our results exhibit a considerable complexity gap between non-blocking and blocking TM implementations.  ...  Early TM designs avoided using locks and relied on non-blocking synchronization to ensure obstructionfreedom: a transaction that encounters no step contention is not allowed to abort.  ...  Altogether, we grasp a considerable complexity gap between blocking and non-blocking TM implementations, justifying theoretically the shift in TM practice we observed during the past decade.  ... 
doi:10.1007/978-3-662-48653-5_16 fatcat:yzp7oxgcbzewbeqrf54yzgtf2y

Untangling Blockchain: A Data Processing View of Blockchain Systems [article]

Tien Tuan Anh Dinh, Rui Liu, Meihui Zhang, Gang Chen, Beng Chin Ooi, Ji Wang
2017 arXiv   pre-print
The results demonstrate several trade-offs in the design space, as well as big performance gaps between blockchain and database systems.  ...  As the technology landscape is expanding rapidly, it is both important and challenging to have a firm grasp of what the core technologies have to offer, especially with respect to their data processing  ...  We would like to thank colleagues who have provided valuable feedback to help improve the paper.  ... 
arXiv:1708.05665v1 fatcat:tf3fuh2fxnbdjaxywuhc3qz6ra

A 3D-Printed Omni-Purpose Soft Gripper

Charbel Tawk, Andrew Gillett, Marc in het Panhuis, Geoffrey M. Spinks, Gursel Alici
2019 IEEE Transactions on robotics  
The blocked force and stroke of the actuators are accurately predicted using finite element and analytical models. The OPSOG can grasp at least 20 different objects.  ...  The blocked force and stroke of the actuators are accurately predicted using finite element and analytical models. The OPSOG can grasp at least 20 different objects.  ...  While the experimental blocked force data matched the FEM results with an acceptable difference as shown in Table II , there is a non-negligible difference between the experimental and FEM strokes.  ... 
doi:10.1109/tro.2019.2924386 fatcat:w6ap7k5bdvbq5hzj77u2npfafu

Untangling Blockchain: A Data Processing View of Blockchain Systems

Tien Tuan Anh Dinh, Rui Liu, Meihui Zhang, Gang Chen, Beng Chin Ooi, Ji Wang
2018 IEEE Transactions on Knowledge and Data Engineering  
The results demonstrate several trade-offs in the design space, as well as big performance gaps between blockchain and database systems.  ...  As the technology landscape is expanding rapidly, it is both important and challenging to have a firm grasp of what the core technologies have to offer, especially with respect to their data processing  ...  We would like to thank colleagues and the anonymous reviewers who have provided valuable feedback to help improve the paper.  ... 
doi:10.1109/tkde.2017.2781227 fatcat:7fedxsxy2jda7gz352iw2cyfzy

A Parallel Functional Database on GRIP [chapter]

Gert Akerholt, Kevin Hammond, Simon Peyton Jones, Phil Trinder
1992 Functional Programming, Glasgow 1991  
The particular features investigated are the thread-creation costs and caching of GRIP's distributed memory.  ...  A database implemented in a pure functional language must be modi ed non-destructively, i.e. the original database must be preserved and a new copy constructed.  ...  From an architectural perspective, the database application is interesting in two respects: it bridges the gap between simple, well-understood parallel benchmarks such as n b, and complex real functional  ... 
doi:10.1007/978-1-4471-3196-0_1 dblp:conf/fp/AkerholtHJT91 fatcat:jk4dxv7svnde7l3v2sujb3hdum

ThimbleSense: A Fingertip-Wearable Tactile Sensor for Grasp Analysis

Edoardo Battaglia, Matteo Bianchi, Alessandro Altobelli, Giorgio Grioli, Manuel G. Catalano, Alessandro Serio, Marco Santello, Antonio Bicchi
2016 IEEE Transactions on Haptics  
Accurate measurement of contact forces between hand and grasped objects is crucial to study sensorimotor control during grasp and manipulation.  ...  the device's rigid shells on grasp forces. !  ...  Following this concept, a F/T sensor is assembled between an inner and an outer shell separated by a gap.  ... 
doi:10.1109/toh.2015.2482478 pmid:26462243 fatcat:jpwtwwwz3vbwpemk6ieyhwm3tq

Gate-Level Simulation with GPU Computing

Debapriya Chatterjee, Andrew Deorio, Valeria Bertacco
2011 ACM Transactions on Design Automation of Electronic Systems  
Noting the vast available parallelism in the hardware of modern GPUs, and the inherently parallel structures of gate-level netlists, we propose novel algorithms for the efficient mapping of complex designs  ...  Yet, the performance of logic simulation is not sufficient to satisfy the demand, leading to incomplete validation processes, escaped functional bugs, and continuous pressure on the EDA industry to develop  ...  For more complex processor designs, the memory controller can be mimicked by a kernel which processes the processor's transactions.  ... 
doi:10.1145/1970353.1970363 fatcat:msv44q4wffh6vcmzwplmsoi254

Teaching skills and concepts for embedded systems design

Peter Bertels, Michiel D'Haene, Tom Degryse, Dirk Stroobandt
2009 ACM SIGBED Review  
Smart devices are omnipresent today and the design of these embedded systems requires a multidisciplinary approach.  ...  It is important that students in electrical engineering and computer science learn these different aspects of embedded systems design.  ...  The emphasis is on reading and writing to the FIFO channels in a blocking or a non-blocking way. During the second part of the exercise the students gain insight in the system.  ... 
doi:10.1145/1534480.1534484 fatcat:jmaqjhwcuzcifpnaquykcb2ajy

Why Transactional Memory Should Not Be Obstruction-Free [article]

Petr Kuznetsov, Srivatsan Ravi
2016 arXiv   pre-print
In sum, our results exhibit a considerable complexity gap between non-blocking and blocking TM implementations.  ...  Early TM designs avoided using locks and relied on non-blocking synchronization to ensure obstruction-freedom: a transaction that encounters no step contention is not allowed to abort.  ...  Altogether, we grasp a considerable complexity gap between blocking and non-blocking TM implementations, justifying theoretically the shift in TM practice we observed during the past decade. Roadmap.  ... 
arXiv:1502.02725v2 fatcat:33mjdkvemnai5mj2qfansll3ma

Performance evaluation and optimization of dual-port SDRAM architecture for mobile embedded systems

Hoeseok Yang, Sungchan Kim, Hae-woo Park, Jinwoo Kim, Soonhoi Ha
2007 Proceedings of the 2007 international conference on Compilers, architecture, and synthesis for embedded systems - CASES '07  
Further, by dividing the shared bank into multiple blocks, we enable simultaneous accesses to different blocks and achieve considerable performance gain.  ...  Recently dual-port SDRAM (DPSDRAM) architecture tailored for dual-processor based mobile embedded systems has been announced where a single memory chip plays the role of the local memories and the shared  ...  The performance gap between the static-copy scheme and the lockpriority scheme gets wider as the access count increases.  ... 
doi:10.1145/1289881.1289893 dblp:conf/cases/YangKPKH07 fatcat:uc2qgkeuujdjpisoeam5pfuwd4

Efficient distributed memory management with RDMA and caching

Qingchao Cai, Wentian Guo, Hao Zhang, Divyakant Agrawal, Gang Chen, Beng Chin Ooi, Kian-Lee Tan, Yong Meng Teo, Sheng Wang
2018 Proceedings of the VLDB Endowment  
Recent advancements in high-performance networking interconnect significantly narrow the performance gap between intra-node and inter-node communications, and open up opportunities for distributed memory  ...  We further build a transaction engine and a distributed hash table (DHT) atop GAM to show the ease-of-use and applicability of the provided APIs.  ...  Cache Coherence Protocol Although the throughput and latency of RDMA networking have improved significantly, almost approaching those of QPI interconnect, there is still around 10× gap between local memory  ... 
doi:10.14778/3236187.3236209 fatcat:2t3hmhnygncdjes2g3friojzs4

An iterative time-bucket refinement algorithm for a high-resolution resource-constrained project scheduling problem

Martin Riedler, Thomas Jatschka, Johannes Maschler, Günther R. Raidl
2017 International Transactions in Operational Research  
Based on these primal and dual solutions and bounds the time-buckets are successively refined.  ...  Diverse strategies for performing the time-bucket refinement are investigated. The approach shows excellent performance in comparison to the traditional formulations and a metaheuristic.  ...  Acknowledgments We thank EBG MedAustron GmbH, Wiener Neustadt, Austria, for the collaboration on particle therapy patient scheduling and partially funding this work.  ... 
doi:10.1111/itor.12445 fatcat:gmhukx42vrf2rfjwfz55sepex4

Alleviating I/O Interference in Virtualized Systems with VM-aware Persistency Control

Taehyung Lee, Minho Lee, Young Ik Eom
2021 IEEE Access  
In our experiments, Baseline means the conventional system, where there exists a semantic gap between the host and the storage device.  ...  More specifically, vFLUSH identifies which I/O requests are relevant to which VM, and it bridges the semantic gap between the host and the SSD by transferring each I/O request with additional semantic  ... 
doi:10.1109/access.2021.3090865 fatcat:vo7gllwvt5bwhm6m3gwtz4chum

On the Cost of Concurrency in Transactional Memory [article]

Srivatsan Ravi
2015 arXiv   pre-print
Program-specific \emph{fine-grained} locking or \emph{non-blocking} (\emph{i.e.}, not using locks) synchronization, on the other hand, is a dark art to most programmers and trusted to the wisdom of a few  ...  TM allows the programmer to \emph{speculatively} execute sequences of shared-memory operations as \emph{atomic transactions} with \emph{all-or-nothing} semantics: the transaction can either \emph{commit  ...  We say that a concurrent implementation of a given sequential data type is locally serializable if it ensures that the local execution of each operation is equivalent to some execution of its sequential  ... 
arXiv:1511.01779v1 fatcat:ahlaq4z7dffklp7fiytspfmbti

Decentralized Approach to Secure IoT based Networks using Blockchain Technology

Urooj Waheed, M. Sadiq Ali Khan, Samia Masood Awan, M. Ahsan Khan, Yusra Mansoor
2019 3C Tecnología  
Emerging Technologies of Fourth Industrial Revolution such as Internet of Things has the potential to change the way we are living today and interact with information systems and devices.  ...  At the same instance, IoT deals with personalized human and quite important data from various types of devices, a small loophole can be a reason to bring disastrous impact on human lives, a minor vulnerability  ...  Each block has a hash of the previous block so any hacker cannot temper any block in between any two blocks. Blockchain is high immutable so it's impossible to delete or revert changes.  ... 
doi:10.17993/3ctecno.2019.specialissue2.182-205 fatcat:zkj4ik5khjbgzmwhth4nyfts6u
« Previous Showing results 1 — 15 out of 8,822 results