Academic literature on the topic 'Tradeoff bandwidth/memory'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Tradeoff bandwidth/memory.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Tradeoff bandwidth/memory"

1

Ahmadi, Mahdieh, James Roberts, Emilio Leonardi, and Ali Movaghar. "Cache Subsidies for an Optimal Memory for Bandwidth Tradeoff in the Access Network." IEEE Journal on Selected Areas in Communications 38, no. 4 (2020): 736–49. http://dx.doi.org/10.1109/jsac.2020.2971806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Martin, Milo M. K., Pacia J. Harper, Daniel J. Sorin, Mark D. Hill, and David A. Wood. "Using destination-set prediction to improve the latency/bandwidth tradeoff in shared-memory multiprocessors." ACM SIGARCH Computer Architecture News 31, no. 2 (2003): 206–17. http://dx.doi.org/10.1145/871656.859642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kukreja, Navjot, Jan Hückelheim, Mathias Louboutin, John Washbourne, Paul H. J. Kelly, and Gerard J. Gorman. "Lossy checkpoint compression in full waveform inversion: a case study with ZFPv0.5.5 and the overthrust model." Geoscientific Model Development 15, no. 9 (2022): 3815–29. http://dx.doi.org/10.5194/gmd-15-3815-2022.

Full text
Abstract:
Abstract. This paper proposes a new method that combines checkpointing methods with error-controlled lossy compression for large-scale high-performance full-waveform inversion (FWI), an inverse problem commonly used in geophysical exploration. This combination can significantly reduce data movement, allowing a reduction in run time as well as peak memory. In the exascale computing era, frequent data transfer (e.g., memory bandwidth, PCIe bandwidth for GPUs, or network) is the performance bottleneck rather than the peak FLOPS of the processing unit. Like many other adjoint-based optimization pr
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Shikha, Prashant Pandey, Michael A. Bender, et al. "Timely Reporting of Heavy Hitters Using External Memory." ACM Transactions on Database Systems 46, no. 4 (2021): 1–35. http://dx.doi.org/10.1145/3472392.

Full text
Abstract:
Given an input stream S of size N , a ɸ-heavy hitter is an item that occurs at least ɸN times in S . The problem of finding heavy-hitters is extensively studied in the database literature. We study a real-time heavy-hitters variant in which an element must be reported shortly after we see its T = ɸ N-th occurrence (and hence it becomes a heavy hitter). We call this the Timely Event Detection ( TED ) Problem. The TED problem models the needs of many real-world monitoring systems, which demand accurate (i.e., no false negatives) and timely reporting of all events from large, high-speed streams w
APA, Harvard, Vancouver, ISO, and other styles
5

Gabbay, Freddy, Rotem Lev Aharoni, and Ori Schweitzer. "Deep Neural Network Memory Performance and Throughput Modeling and Simulation Framework." Mathematics 10, no. 21 (2022): 4144. http://dx.doi.org/10.3390/math10214144.

Full text
Abstract:
Deep neural networks (DNNs) are widely used in various artificial intelligence applications and platforms, such as sensors in internet of things (IoT) devices, speech and image recognition in mobile systems, and web searching in data centers. While DNNs achieve remarkable prediction accuracy, they introduce major computational and memory bandwidth challenges due to the increasing model complexity and the growing amount of data used for training and inference. These challenges introduce major difficulties not only due to the constraints of system cost, performance, and energy consumption, but a
APA, Harvard, Vancouver, ISO, and other styles
6

Radwan, Amr, Taghreed Ali Alenezi, Wejdan Alrashdan, and Won-Joo Hwang. "Balancing Tradeoffs in Network Queue Management Problem via Forward–Backward Sweeping with Finite Checkpoints." Symmetry 15, no. 7 (2023): 1395. http://dx.doi.org/10.3390/sym15071395.

Full text
Abstract:
Network queue management can be modelled as an optimal control problem and is aimed at controlling the dropping rate, in which the state and control variables are the instantaneous queue length and the dropping rate, respectively. One way to solve it is by using an indirect method, namely forward–backward sweeping based on the Pontryagin minimum principle to derive control the trajectory of the dropping rate. However, there exists some performance balance issues in the network queue, such as memory usage versus runtime of the algorithm, or dropping rate versus network queue length. Many resear
APA, Harvard, Vancouver, ISO, and other styles
7

Biryukov, Alex, and Dmitry Khovratovich. "Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem." Ledger 2 (April 28, 2017): 1–30. http://dx.doi.org/10.5195/ledger.2017.48.

Full text
Abstract:
Proof-of-work is a central concept in modern cryptocurrencies and denial-ofservice protection tools, but the requirement for fast verification so far has made it an easy prey for GPU-, ASIC-, and botnet-equipped users. The attempts to rely on memory-intensive computations in order to remedy the disparity between architectures have resulted in slow or broken schemes. In this paper we solve this open problem and show how to construct an asymmetric proof-of-work (PoW) based on a computationally-hard problem, which requires a great deal of memory to generate a proof (called a ”memory-hardness” fea
APA, Harvard, Vancouver, ISO, and other styles
8

Peterson, Brennan, Michael Kwan, Fred Duewer, Andrew Reid, and Rhiannon Brooks. "Optimizing X-Ray Inspection for Advanced Packaging Applications." International Symposium on Microelectronics 2020, no. 1 (2020): 000165–68. http://dx.doi.org/10.4071/2380-4505-2020.1.000165.

Full text
Abstract:
ABSTRACT Over the coming decade, advanced packaging will become increasingly critical to performance, cost, and density improvements in advanced electronics. There is both an industry push: cost and performance advances in transistor scaling are increasingly difficult. And there is an industry pull: customization for each market can be done far more quickly by assembling a series of parts in a package, rather than by design and integration into a single device. This isnt a new idea: Gordon Moore said the same in the 60’s. But after decades of increased device level integration, it is an import
APA, Harvard, Vancouver, ISO, and other styles
9

Alqahtani, Fahad, Mohammed Almutairi, and Frederick T. Sheldon. "Cloud Security Using Fine-Grained Efficient Information Flow Tracking." Future Internet 16, no. 4 (2024): 110. http://dx.doi.org/10.3390/fi16040110.

Full text
Abstract:
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead on Cloud Service Providers (CSPs) and management activities, prompting the exploration of alternatives such as IFT. By augmenting consumer data subsets with security tags and deploying a network of monitors, IFT facilitates the detection and prevention of data leaks among cloud tenants. The research here has focused on preventing misuse, such as
APA, Harvard, Vancouver, ISO, and other styles
10

Yin, Jun, and Marian Verhelst. "CNN-based Robust Sound Source Localization with SRP-PHAT for the Extreme Edge." ACM Transactions on Embedded Computing Systems, March 6, 2023. http://dx.doi.org/10.1145/3586996.

Full text
Abstract:
Robust sound source localization for environments with noise and reverberation are increasingly exploiting deep neural networks fed with various acoustic features. Yet, state-of-the-art research mainly focuses on optimizing algorithmic accuracy, resulting in huge models preventing edge-device deployment. The edge, however, urges for real-time low-footprint acoustic reasoning for applications such as hearing aids and robot interactions. Hence, we set off from a robust CNN-based model using SRP-PHAT features, Cross3D [16], to pursue an efficient yet compact model architecture for the extreme edg
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Tradeoff bandwidth/memory"

1

Benkirane, Nada. "La gestion du trafic dans les réseaux orientés contenus." Electronic Thesis or Diss., Paris 6, 2014. http://www.theses.fr/2014PA066039.

Full text
Abstract:
Les réseaux orientés contenus (CCN) ont été créés afin d'optimiser les ressources réseau et assurer une plus grande sécurité. Le design et l'implémentation de cette architecture est encore à ces débuts. Ce travail de thèse présente des propositions pour la gestion de trafic dans les réseaux du future. Il est nécessaire d'ajouter des mécanismes de contrôle concernant le partage de la bande passante entre flots. Le contrôle de trafic est nécessaire pour assurer un temps de latence faible pour les flux de streaming vidéo ou audio, et pour partager équitablement la bande passante entre flux élasti
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Tradeoff bandwidth/memory"

1

Roberts, James, and Nada Sbihi. "Exploring the memory-bandwidth tradeoff in an information-centric network." In 2013 25th International Teletraffic Congress (ITC 2013). IEEE, 2013. http://dx.doi.org/10.1109/itc.2013.6662936.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Martin, Milo M. K., Pacia J. Harper, Daniel J. Sorin, Mark D. Hill, and David A. Wood. "Using destination-set prediction to improve the latency/bandwidth tradeoff in shared-memory multiprocessors." In the 30th annual international symposium. ACM Press, 2003. http://dx.doi.org/10.1145/859618.859642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mok, Fai. "Applications of holographic storage in lithium niobate." In OSA Annual Meeting. Optica Publishing Group, 1992. http://dx.doi.org/10.1364/oam.1992.we1.

Full text
Abstract:
Multiple volume holograms can be recorded in photorefractive crystals. Holograms are typically recorded by exposing the crystals to interference patterns of plane waves and signal beams. Any one of the two recording beams can be used to read the recorded holograms. Depending on the choice of the readout beam, a multiple-hologram memory can be configured either as an inner-product computer or as an imagery memory. We show experimental results of both configurations of our multiple-hologram memory. The storage capacity of a multiple-hologram memory is a function of the average diffraction effici
APA, Harvard, Vancouver, ISO, and other styles
4

Langguth, Johannes, Xing Cai, and Mohammed Sourouri. "Memory Bandwidth Contention: Communication vs Computation Tradeoffs in Supercomputers with Multicore Architectures." In 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2018. http://dx.doi.org/10.1109/padsw.2018.8644601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!