672 Hits in 7.4 sec

Page 336 of IEEE Transactions on Computers Vol. 52, Issue 3 [page]

2003 IEEE Transactions on Computers  
Xue Let’s Study Whole-Program Behaviour Analytically , | th Int'l Symp. High-Performance Computer ( pp. 175-186, Feb. 2002 |. Sanchez and A.  ...  Singhal An Analytic Study of Caching in Computer Systems,” |. Parallel and Distributed Computing, vol. 32, pp 205-214, Feb. 1996 B.L. Jacob, "P.M. Chen, S.R. Silverman, and T.N.  ... 

Modeling cache performance for embedded systems

Ogechukwu Kingsley Ugwueze, Chijindu C. V., Udeze C. C., Ahaneku A. M., Eneh N. J., Obinna M. Ezeja, Edward C. Anoliefo
2021 Bulletin of Electrical Engineering and Informatics  
This paper presents a cache performance model for embedded systems.  ...  The need for efficient cache design in embedded systems has led to the exploration of various methods of design for optimal cache configurations for embedded processor.  ...  The earlier background for analytical cache model is from the work of Mattson et al.  ... 
doi:10.11591/eei.v10i5.2459 fatcat:ppleei7ezrhqzbbxft34ppo2va

Soft error benchmarking of L2 caches with PARMA

Jinho Suh, Mehrtash Manoochehri, Murali Annavaram, Michel Dubois
2011 Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems - SIGMETRICS '11  
PARMA continuously and accurately accounts for the increase of failure density due to soft errors affecting program behavior during an execution.  ...  PARMA is a rigorous analytical framework to measure the failure rate in the presence of soft errors under any protection scheme.  ...  Now, let's look at the L1 cache. Even if a corrupted L2 cache block reaches the first level cache, the computation may still be correct.  ... 
doi:10.1145/1993744.1993755 dblp:conf/sigmetrics/SuhMAD11 fatcat:o5hoh4q2ajg2jdre6llydpdrl4

Simple Hide-and-seek at its Core: Play Features and the Game of Geocaching [chapter]

Mare Kalda
2017 Sator : artikleid usundi- ja kombeloost  
Caches are placed in concealed locations in physical space, and the information that the participants jointly manage and renew is uploaded to the Internet, where communication takes place.  ...  The aim of this research is to juxtapose geocaching with the play features highlighted in classical ludology as well as present other possibilities of categorisation which have been applied in previous studies  ...  by institutional research grant IUT22-5 from the Estonian Ministry of Education and Research and by the European Union through the European Regional Development Fund (Centre of Excellence in Estonian Studies  ... 
doi:10.7592/sator.2017.18.13 fatcat:iroe2zcojveitbxubgf7cugi2a

A fast and resource-conscious MPI message queue mechanism for large-scale jobs

Judicael A. Zounmevo, Ahmad Afsahi
2014 Future generations computer systems  
We have extended the complexity analysis study of the proposed message queue structure as well as the linked list and arraybased designs.  ...  We explain, analytically and with test data, why other data structures including search trees are not optimal in building a fast message queue container specifically for MPI.  ...  We thank the HPC Advisory Council and Mellanox Technologies for the resources to conduct this study.  ... 
doi:10.1016/j.future.2013.07.003 fatcat:hju3pu54qjex5btmduhobvfihq

PTEMagnet: fine-grained physical memory reservation for faster page walks in public clouds

Artemiy Margaritov, Dmitrii Ustiugov, Amna Shahab, Boris Grot
2021 Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems  
The fragmentation results in the effective cache footprint of the host PT being larger than that of the guest PT.  ...  The bloated footprint of the host PT leads to frequent cache misses during nested page walks, increasing page walk latency.  ...  We study the discrepancy in behaviour of accesses to the guest and host PTs and find that cache behaviour (hit or miss) of page walks is defined by spatial locality of page table entries (PTEs) that reside  ... 
doi:10.1145/3445814.3446704 fatcat:d2g3b3rcijdzloxovecij3kegu

FairCache: Introducing Fairness to ICN Caching - Technical Report [article]

Liang Wang and Gareth Tyson and Jussi Kangasharju and Jon Crowcroft
2017 arXiv   pre-print
Information-centric networking extensively uses universal in-network caching. However, developing an efficient and fair collaborative caching algorithm for selfish caches is still an open question.  ...  We analytically investigate the collaboration overhead on general graph topologies, and theoretically show that collaboration has to be constrained within a small neighborhood due to its cost growing exponentially  ...  The above optimisation problem is a typical Integer Programming program which is NP-Complete.  ... 
arXiv:1412.0041v4 fatcat:36z2asnqf5bndodobrzivdd3vy

Exploiting Key-Value Data Stores Scalability for HPC

Cesare Cugnasco, Yolanda Becerra, Jordi Torres, Eduard Ayguade
2017 2017 46th International Conference on Parallel Processing Workshops (ICPPW)  
In this paper, we study the performance of a system that employs the DHT architecture to achieve fast in local analysis on indexed data.  ...  The focus now is on real-time analytics. Being able to analyse massive quantities of data in a short time enables multiple HPC applications and interactive analysis and visualization.  ...  It is also partially supported by grant SEV-2011-00067 of the Severo Ochoa Program awarded by the Spanish Government, the TIN2015-65316-P project, with funding from the Spanish Ministry of Economy and  ... 
doi:10.1109/icppw.2017.25 dblp:conf/icppw/CugnascoBTA17 fatcat:r7o44n2jq5fifdfv5h4jpw6h4q

Sparse data structure design for wavelet-based methods

Guillaume Latu
2011 ESAIM: Proceedings and Surveys  
They are often difficult to solve analytically, hence numerical methods have to be used.  ...  Benchmark the code and check the asymptotic behaviour in O(N ).  ... 
doi:10.1051/proc/201134005 fatcat:vw2pqs65pfgtrezubbw3nqejx4

Edge Intelligence: Architectures, Challenges, and Applications [article]

Dianlei Xu, Tong Li, Yong Li, Xiang Su, Sasu Tarkoma, Tao Jiang, Jon Crowcroft, Pan Hui
2020 arXiv   pre-print
Edge intelligence refers to a set of connected systems and devices for data collection, caching, processing, and analysis in locations close to where data is captured based on artificial intelligence.  ...  We first identify four fundamental components of edge intelligence, namely edge caching, edge training, edge inference, and edge offloading, based on theoretical and practical results pertaining to proposed  ...  From existing studies, the critical issues of caching technologies in edge networks fall into three aspects: the cached content, caching places, and caching strategies.  ... 
arXiv:2003.12172v2 fatcat:xbrylsvb7bey5idirunacux6pe

PSPAT: Software packet scheduling at hardware speed

Luigi Rizzo, Paolo Valente, Giuseppe Lettieri, Vincenzo Maffione
2018 Computer Communications  
We describe the operation of our system, discuss implementation and system issues, provide analytical bounds on the service guarantees of PSPAT, and validate the behaviour of its Linux implementation even  ...  The pkt-gen program is a fast UDP packet generator that uses the netmap API [14] ; although netmap normally bypasses the whole Linux kernel stack, we use a configuration (emulated netmap mode) that lets  ...  Let's first assume that DISPATCHERS operate with ∆ D = ∆ A and are synchronised with the ARBITER.  ... 
doi:10.1016/j.comcom.2018.02.018 fatcat:7hidnzipsjdtjprnyg3umtzvfq

Who's Afraid of Virginia's you: a Corpus-based Study of the French Translations of The Waves

Charlotte Bosseaux
2006 Meta : Journal des traducteurs  
<s>Quand je me suis assise, tu as porté la main à ta cravate, et toi, tu les as cachées sous la table. <s>Moi je ne cache rien. <s>Je suis prête.  ...  ment) or the whole group.  ... 
doi:10.7202/013565ar fatcat:wtv43snskzhpvbvgzuwn2ntzkm

Scalable Visual Hierarchy Exploration [chapter]

Ionel D. Stroe, Elke A. Rundensteiner, Matthew O. Ward
2000 Lecture Notes in Computer Science  
Also, object based caching has been studied recently in the context of web applications [15] .  ...  As the access behaviour of a program may vary during its execution, changing when to issue prefetching requests or the amount of data to be prefetched may influence the performance of prefetching.  ... 
doi:10.1007/3-540-44469-6_73 fatcat:skhe72xsqbfqthghfvhgf2qqdi

Models are just prostheses for our brains

Manfred Milinski
1991 Behavioral and Brain Sciences  
The technique has been widely used in behavioral studies of insects, fish, birds, mammals, and other organisms.  ...  In general, behavioural "mechanistic" studies refer qualitatively (and often uncritically) to the adaptive value of the behaviours studied.  ...  Another drawback to dynamic programming is that it is harder to check than a simple analytical or numerical solution.  ... 
doi:10.1017/s0140525x00065547 fatcat:hcga7vm4x5hfrhbidv4y2kzy3a

Short-term behavior and long-term consequences

Paul Schmid-Hempel
1991 Behavioral and Brain Sciences  
The technique has been widely used in behavioral studies of insects, fish, birds, mammals, and other organisms.  ...  In general, behavioural "mechanistic" studies refer qualitatively (and often uncritically) to the adaptive value of the behaviours studied.  ...  Another drawback to dynamic programming is that it is harder to check than a simple analytical or numerical solution.  ... 
doi:10.1017/s0140525x00065596 fatcat:axdbbyn2tneuzi22siishkzvry
« Previous Showing results 1 — 15 out of 672 results