Academic literature on the topic 'Pipelined methods'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Pipelined methods.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Pipelined methods"
Sanan, P., S. M. Schnepp, and D. A. May. "Pipelined, Flexible Krylov Subspace Methods." SIAM Journal on Scientific Computing 38, no. 5 (January 2016): C441—C470. http://dx.doi.org/10.1137/15m1049130.
Full textAbbas, Abdulkareem Dawah. "Review of high-speed phase accumulator for direct digital frequency synthesizer." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 4 (August 1, 2020): 4008. http://dx.doi.org/10.11591/ijece.v10i4.pp4008-4014.
Full textGANAPATHY, KUMAR, and BENJAMIN W. WAH. "OPTIMAL SYNTHESIS OF PROCESSOR ARRAYS WITH PIPELINED ARITHMETIC UNITS." Parallel Processing Letters 04, no. 03 (September 1994): 339–50. http://dx.doi.org/10.1142/s0129626494000314.
Full textBonomo, John P., and Wayne R. Dyksen. "Pipelined iterative methods for shared memory machines." Parallel Computing 11, no. 2 (August 1989): 187–99. http://dx.doi.org/10.1016/0167-8191(89)90028-8.
Full textChen, Rongxin, Zongyue Wang, and Yuling Hong. "Pipelined XPath Query Based on Cost Optimization." Scientific Programming 2021 (May 27, 2021): 1–16. http://dx.doi.org/10.1155/2021/5559941.
Full textWang, Cheng-Yeh, Chih-Bin Kuo, and Jing-Yang Jou. "Hybrid Wordlength Optimization Methods of Pipelined FFT Processors." IEEE Transactions on Computers 56, no. 8 (August 2007): 1105–18. http://dx.doi.org/10.1109/tc.2007.1059.
Full textMorgan, Hannah, Matthew G. Knepley, Patrick Sanan, and L. Ridgway Scott. "A stochastic performance model for pipelined Krylov methods." Concurrency and Computation: Practice and Experience 28, no. 18 (March 31, 2016): 4532–42. http://dx.doi.org/10.1002/cpe.3820.
Full textSas, Jerzy, and Andrzej Żołnierek. "Pipelined language model construction for Polish speech recognition." International Journal of Applied Mathematics and Computer Science 23, no. 3 (September 1, 2013): 649–68. http://dx.doi.org/10.2478/amcs-2013-0049.
Full textLiu, Ya Li, Wen Yan Chai, and Xiu Rong Li. "A Pipelined Parallelism Approach to Parallel Short-Range Molecular Dynamics Simulations on Multi-Core Platforms." Applied Mechanics and Materials 513-517 (February 2014): 2207–10. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2207.
Full textYanakova, E. S., G. T. Macharadze, L.G. Gagarina, and A. A. Shvachko. "Parallel-Pipelined Video Processing in Multicore Heterogeneous Systems on Chip." Proceedings of Universities. Electronics 26, no. 2 (April 2021): 172–83. http://dx.doi.org/10.24151/1561-5405-2021-26-2-172-183.
Full textDissertations / Theses on the topic "Pipelined methods"
Beckwith, Luke Parkhurst. "An Investigation of Methods to Improve Area and Performance of Hardware Implementations of a Lattice Based Cryptosystem." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/100798.
Full textMaster of Science
Cryptography is prevalent in almost every aspect of our lives. It is used to protect communication, banking information, and online transactions. Current cryptographic protections are built specifically upon public key encryption, which allows two people who have never communicated before to setup a secure communication channel. However, due to the nature of current cryptographic algorithms, the development of quantum computers will make it possible to break the algorithms that secure our communications. Because of this threat, new algorithms based on principles that stand up to quantum computing are being investigated to find a suitable alternative to secure our systems. These algorithms will need to be efficient in order to keep up with the demands of the ever growing internet. This paper investigates four hardware implementations of a proposed quantum-secure algorithm to explore ways to make designs more efficient. The improvements are valuable for high throughput applications, such as a server which must handle a large number of connections at once.
Sever, Refik. "Wave Component Sampling Method For High Performance Pipelined Circuits." Phd thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613893/index.pdf.
Full textm CMOS technology. A generic transmission gate logic block with optimized output delay variation depending on the input pattern is designed and used in all of the sub blocks of the multiplier. Post layout simulation results show that, this multiplier can operate at a speed of 3GHz, using only 70 latches. Comparing with the mesochronous pipelining scheme, the number of the registers is decreased by 41% and the total power of the chip is also decreased by 9.5% without any performance loss. An ultra high speed full pipelined CSA multiplier with an operating frequency of 5GHz is also implemented with WCSM. The number of registers is decreased by 45%, and the power consumption of the circuit is decreased by 18.4% comparing with conventional or mesochronous pipelining methods. WCSM is also applied to different multiplier structures employing booth encoders, Wallace trees, and carry look-ahead adders. Comparing full pipelined 8x8 bit WCSM multiplier with the conventional pipelined multiplier, the number of registers in the implementation of booth encoder, Wallace tree, and carry look-ahead adder is decreased by 30%, 51%, and %62, respectively.
Bettis, Dane Edward. "Digital production pipelines: examining structures and methods in the computer effects industry." Thesis, Texas A&M University, 2005. http://hdl.handle.net/1969.1/2406.
Full textDurrani, Jawad Nadeem. "Dynamics of pipelines with a finite element method." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/MQ65153.pdf.
Full textLaricchia, Francesco. "Study of offshore flexible pipelines with analytical and numerical methods." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Find full textWood, Stephen L. "Modeling of Pipeline Transients: Modified Method of Characteristics." FIU Digital Commons, 2011. http://digitalcommons.fiu.edu/etd/456.
Full textShirazi, Nabeel. "Methods and tool for implementing run-time reconfigurable FPGA designs." Thesis, Imperial College London, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.313986.
Full textBenkherouf, A. "Failure identification methods for detecting leaks in pipelines and sensor faults." Thesis, University of Manchester, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.375341.
Full textAlam, Muhammad Shafiqul. "Lattice Boltzmann modelling of two and three-dimensional flow and scour around offshore pipelines." University of Western Australia. School of Civil and Resource Engineering, 2009. http://theses.library.uwa.edu.au/adt-WU2009.0161.
Full textARAMAKI, THIAGO LESSA. "DEVELOPMENT AND VALIDATION OF METHODS FOR DETECTION AND LOCALIZATION OF PIPELINE LEAKS." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2016. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=27567@1.
Full textCompanies in the business of pipeline operations have as a basic assumption, operational security. Concerning this issue, there are some factors that could lead to accidents with material, environment and personal damage possibilities such as: internal and external corrosion, accidental excavations, improper operation that could submit the pipe to high pressures and third party interventions interested in commodities theft. This dissertation is aligned with pipeline companies real demands through the development of systems that could be used by these companies. Leak detection systems provided with leak location capabilities were developed to be used in liquid pipeline control centers, exploring non-conventional methods, besides the ones mentioned by API 1130. The leak detection systems developed were: mass balance, volume balance, fuzzy logic and neural networks. For the leak location systems the systems tested were: sonic velocity, hydraulic gradient and artificial neural networks. The products used were gasoline, diesel and fuel oil. On the issue of leak detection, the system based on neural networks detected simulated leakages, although there were some false indications. The system based on fuzzy logic presented good results, giving correct leak indications without any indication of false alarms, interpreting correctly the phenomena due to pipeline usual operations. The mass balance system has also presented good results, not generating false alarms, but detecting simulated leaks even with the pipeline in shut-in condition. To evaluate leak detection systems is common to conduct field tests that can be costly and take a long time to accomplish. A method for testing at a lower cost should be developed and a proposal is being shown in this work.
Books on the topic "Pipelined methods"
Liou, Jim C. P. Pipeline variable uncertainties and their effects on leak detectability. Washington, D.C: American Petroleum Institute, 1993.
Find full textEnloe, Lindsay. Practical corrosion control methods for gas utility piping. 2nd ed. Houston, TX: NACE International, 1995.
Find full textJ, Scholze R., and Construction Engineering Research Laboratory, eds. Review of PIM (Pipeline Insertion Method) technology. Champaign, Ill: US Army Corps of Engineers, Construction Engineering Research Laboratory, 1991.
Find full textAlberta. Scientific and Engineering Services and Research Division. A thermographic detection system for pipeline leaks. [Edmonton, Alta.]: Alberta Energy and Natural Resources, Scientific and Engineering Services and Research Division, 1985.
Find full text1909-, Miller John E., Schmidt Frederick 1945-, and ASTM Committee G-2 on Erosion and Wear., eds. Slurry erosion: Uses, applications, and test methods : a symposium. Philadelphia, PA: American Society for Testing and Materials, 1987.
Find full textAlberta. Alberta Energy. Research and Technology Branch. and Alberta Office of Coal Research and Technology., eds. Studies of coal slurry systems and alternative coal transportation methods. Edmonton: Alberta Energy, Research and Technology Branch, 1991.
Find full textW, Maresca J., and Risk Reduction Engineering Laboratory (U.S.), eds. Standard test procedures for evaluating leak detection methods: Pipeline leak detection systems. Cincinnati, OH: U.S. Environmental Protection Agency, Risk Reduction Engineering Laboratory, 1991.
Find full textHobbs, J. M. Standard methods for calibrating flowmeters and testing pipeline components in water at NEL. East Kilbridge,Glasgow: National Engineering Laboratory, 1987.
Find full textFowler, Jimmy E. Coastal scour problems and methods for prediction of maximum scour. [Vicksburg, Miss: U.S. Army Engineer Waterways Experiment Station, 1993.
Find full textFowler, Jimmy E. Coastal scour problems and methods for prediction of maximum scour. [Vicksburg, Miss: U.S. Army Engineer Waterways Experiment Station, 1993.
Find full textBook chapters on the topic "Pipelined methods"
Manolios, Panagiotis. "Correctness of Pipelined Machines." In Formal Methods in Computer-Aided Design, 181–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-40922-x_11.
Full textSawada, Jun. "Verification of a Simple Pipelined Machine Model." In Advances in Formal Methods, 137–50. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4757-3188-0_9.
Full textVelev, Miroslav N., and Ping Gao. "Method for Formal Verification of Soft-Error Tolerance Mechanisms in Pipelined Microprocessors." In Formal Methods and Software Engineering, 355–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16901-4_24.
Full textVelev, Miroslav N., and Randal E. Bryant. "Bit-Level Abstraction in the Verification of Pipelined Microprocessors by Correspondence Checking." In Formal Methods in Computer-Aided Design, 18–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49519-3_3.
Full textDavlianidze, Pridon, Levan Alekhin, Tengiz Tsamalashvili, and Ioseb Zeikidze. "Methods to Determine Parameters Characterizing Technical State of Pipelines with Pronounced Deposition." In Pipeline Systems, 323–30. Dordrecht: Springer Netherlands, 1992. http://dx.doi.org/10.1007/978-94-017-2677-1_26.
Full textPedrioli, Patrick G. A. "Trans-Proteomic Pipeline: A Pipeline for Proteomic Analysis." In Methods in Molecular Biology, 213–38. Totowa, NJ: Humana Press, 2009. http://dx.doi.org/10.1007/978-1-60761-444-9_15.
Full textGarfias-Gallegos, Diego, Claudia Zirión-Martínez, Edder D. Bustos-Díaz, Tania Vanessa Arellano-Fernández, José Abel Lovaco-Flores, Aarón Espinosa-Jaime, J. Abraham Avelar-Rivas, and Nelly Sélem-Mójica. "Metagenomics Bioinformatic Pipeline." In Methods in Molecular Biology, 153–79. New York, NY: Springer US, 2022. http://dx.doi.org/10.1007/978-1-0716-2429-6_10.
Full textTimashev, Sviatoslav, and Anna Bushinskaya. "Methods of ILI Results Analysis." In Diagnostics and Reliability of Pipeline Systems, 73–223. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-25307-7_4.
Full textStarr, Justin. "Methods for Detecting Hydrogen Sulfide Gas." In Water and Wastewater Pipeline Assessment Technologies, 97–110. First edition. | Boca Raton : CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9780429198731-5.
Full textKeller, Andrew, and David Shteynberg. "Software Pipeline and Data Analysis for MS/MS Proteomics: The Trans-Proteomic Pipeline." In Methods in Molecular Biology, 169–89. Totowa, NJ: Humana Press, 2010. http://dx.doi.org/10.1007/978-1-60761-977-2_12.
Full textConference papers on the topic "Pipelined methods"
Fleming, Kermin, Myron King, Man Cheuk Ng, Asif Khan, and Muralidaran Vijayaraghavan. "High-throughput Pipelined Mergesort." In 2008 6th ACM/IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE '08). IEEE, 2008. http://dx.doi.org/10.1109/memcod.2008.4547704.
Full textJavaid, Haris, Andhi Janapsatya, Mohammad Shihabul Haque, and Sri Parameswaran. "Rapid runtime estimation methods for pipelined MPSoCs." In 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010). IEEE, 2010. http://dx.doi.org/10.1109/date.2010.5457178.
Full textTiwari, Manasi, and Sathish Vadhiyar. "Pipelined Preconditioned Conjugate Gradient Methods for Distributed Memory Systems." In 2020 IEEE 27th International Conference on High Performance Computing, Data, and Analytics (HiPC). IEEE, 2020. http://dx.doi.org/10.1109/hipc50609.2020.00029.
Full textJuang, Tso-Bing, and Chin-Chieh Chiu. "New recoding methods for fully pipelined parallel CORDIC rotations." In 2015 International SoC Design Conference (ISOCC). IEEE, 2015. http://dx.doi.org/10.1109/isocc.2015.7401702.
Full textHofferek, Georg, and Roderick Bloem. "Controller synthesis for pipelined circuits using uninterpreted functions." In 2011 9th IEEE/ACM International Conference on Formal Methods and Models for Codesign (MEMOCODE 2011). IEEE, 2011. http://dx.doi.org/10.1109/memcod.2011.5970508.
Full textBauer, Michael A., Alain Biem, Stewart McIntyre, Yuzhen Xie, Ilias Kotsireas, Roderick Melnik, and Brian West. "Pipelined Processing of X-ray Microdiffraction Data on Multicores." In ADVANCES IN MATHEMATICAL AND COMPUTATIONAL METHODS: ADDRESSING MODERN CHALLENGES OF SCIENCE, TECHNOLOGY, AND SOCIETY. AIP, 2011. http://dx.doi.org/10.1063/1.3663524.
Full textZhang Sheng, Wang Nailong, and Zhou Runde. "Power analysis and optimization methods of the pipelined array multiplier." In 2003 5th International Conference on ASIC Proceedings (IEEE Cat No 03TH8690) ICASIC-03. IEEE, 2003. http://dx.doi.org/10.1109/icasic.2003.1277436.
Full textJeitler, Marcus, and Jakob Lechner. "Low Latency Recovery from Transient Faults for Pipelined Processor Architectures." In 2010 13th Euromicro Conference on Digital System Design: Architectures, Methods and Tools (DSD). IEEE, 2010. http://dx.doi.org/10.1109/dsd.2010.87.
Full textTiwari, Manasi, and Sathish Vadhiyar. "Pipelined Preconditioned s-step Conjugate Gradient Methods for Distributed Memory Systems." In 2021 IEEE International Conference on Cluster Computing (CLUSTER). IEEE, 2021. http://dx.doi.org/10.1109/cluster48925.2021.00061.
Full textTiwari, Manasi, and Sathish Vadhiyar. "Pipelined Preconditioned s-step Conjugate Gradient Methods for Distributed Memory Systems." In 2021 IEEE International Conference on Cluster Computing (CLUSTER). IEEE, 2021. http://dx.doi.org/10.1109/cluster48925.2021.00061.
Full textReports on the topic "Pipelined methods"
Kiefner, John, and Harvey Haines. IPC-04-02 Comparisons of Pipeline Integrity Assessment Methods. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), September 2002. http://dx.doi.org/10.55274/r0011828.
Full textOswald and Smith. L52260 Gap Study and Recommendation - Pipe Response to Buried Explosive Detonations. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), May 2005. http://dx.doi.org/10.55274/r0010252.
Full textBrown, R. J. L51598 Tow Methods Design Guide for the Installation of Offshore Pipelines. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), January 1989. http://dx.doi.org/10.55274/r0010093.
Full textHarris. L52060 Internal Repair of Gas Pipelines Survey of Operator Experience and Industry Needs Report. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), September 2003. http://dx.doi.org/10.55274/r0010270.
Full textSchultz. L51975 Pressure Testing of Large Diameter Pipelines in Artic and Subartic Regions. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), December 2002. http://dx.doi.org/10.55274/r0011336.
Full textTeitsma and Shuttleworth. PR-004-03127-R01 Gas Coupled Ultrasonic Pipeline Inspection. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), January 2008. http://dx.doi.org/10.55274/r0010897.
Full textKiefner, Maxey, and Eiber. L51607 Pipeline Coating Impedance Effect on Powerline Fault Current Coupling. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), January 1989. http://dx.doi.org/10.55274/r0010294.
Full textFu. L51878 Methods for Assessing Corroded Pipeline-Review Validation and Recommendations. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), April 2002. http://dx.doi.org/10.55274/r0010358.
Full textJaske and Hart. L52047 PRCI Pipeline Repair Manual 6th Edition. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), August 2006. http://dx.doi.org/10.55274/r0010249.
Full textRothe, Paul. L41072 Design Methods For Multiphase Flow In Gas Pipelines. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), May 1987. http://dx.doi.org/10.55274/r0012069.
Full text