Gotowa bibliografia na temat „Pipelined methods”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Pipelined methods”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Pipelined methods"
Sanan, P., S. M. Schnepp i D. A. May. "Pipelined, Flexible Krylov Subspace Methods". SIAM Journal on Scientific Computing 38, nr 5 (styczeń 2016): C441—C470. http://dx.doi.org/10.1137/15m1049130.
Pełny tekst źródłaAbbas, Abdulkareem Dawah. "Review of high-speed phase accumulator for direct digital frequency synthesizer". International Journal of Electrical and Computer Engineering (IJECE) 10, nr 4 (1.08.2020): 4008. http://dx.doi.org/10.11591/ijece.v10i4.pp4008-4014.
Pełny tekst źródłaGANAPATHY, KUMAR, i BENJAMIN W. WAH. "OPTIMAL SYNTHESIS OF PROCESSOR ARRAYS WITH PIPELINED ARITHMETIC UNITS". Parallel Processing Letters 04, nr 03 (wrzesień 1994): 339–50. http://dx.doi.org/10.1142/s0129626494000314.
Pełny tekst źródłaBonomo, John P., i Wayne R. Dyksen. "Pipelined iterative methods for shared memory machines". Parallel Computing 11, nr 2 (sierpień 1989): 187–99. http://dx.doi.org/10.1016/0167-8191(89)90028-8.
Pełny tekst źródłaChen, Rongxin, Zongyue Wang i Yuling Hong. "Pipelined XPath Query Based on Cost Optimization". Scientific Programming 2021 (27.05.2021): 1–16. http://dx.doi.org/10.1155/2021/5559941.
Pełny tekst źródłaWang, Cheng-Yeh, Chih-Bin Kuo i Jing-Yang Jou. "Hybrid Wordlength Optimization Methods of Pipelined FFT Processors". IEEE Transactions on Computers 56, nr 8 (sierpień 2007): 1105–18. http://dx.doi.org/10.1109/tc.2007.1059.
Pełny tekst źródłaMorgan, Hannah, Matthew G. Knepley, Patrick Sanan i L. Ridgway Scott. "A stochastic performance model for pipelined Krylov methods". Concurrency and Computation: Practice and Experience 28, nr 18 (31.03.2016): 4532–42. http://dx.doi.org/10.1002/cpe.3820.
Pełny tekst źródłaSas, Jerzy, i Andrzej Żołnierek. "Pipelined language model construction for Polish speech recognition". International Journal of Applied Mathematics and Computer Science 23, nr 3 (1.09.2013): 649–68. http://dx.doi.org/10.2478/amcs-2013-0049.
Pełny tekst źródłaLiu, Ya Li, Wen Yan Chai i Xiu Rong Li. "A Pipelined Parallelism Approach to Parallel Short-Range Molecular Dynamics Simulations on Multi-Core Platforms". Applied Mechanics and Materials 513-517 (luty 2014): 2207–10. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2207.
Pełny tekst źródłaYanakova, E. S., G. T. Macharadze, L.G. Gagarina i A. A. Shvachko. "Parallel-Pipelined Video Processing in Multicore Heterogeneous Systems on Chip". Proceedings of Universities. Electronics 26, nr 2 (kwiecień 2021): 172–83. http://dx.doi.org/10.24151/1561-5405-2021-26-2-172-183.
Pełny tekst źródłaRozprawy doktorskie na temat "Pipelined methods"
Beckwith, Luke Parkhurst. "An Investigation of Methods to Improve Area and Performance of Hardware Implementations of a Lattice Based Cryptosystem". Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/100798.
Pełny tekst źródłaMaster of Science
Cryptography is prevalent in almost every aspect of our lives. It is used to protect communication, banking information, and online transactions. Current cryptographic protections are built specifically upon public key encryption, which allows two people who have never communicated before to setup a secure communication channel. However, due to the nature of current cryptographic algorithms, the development of quantum computers will make it possible to break the algorithms that secure our communications. Because of this threat, new algorithms based on principles that stand up to quantum computing are being investigated to find a suitable alternative to secure our systems. These algorithms will need to be efficient in order to keep up with the demands of the ever growing internet. This paper investigates four hardware implementations of a proposed quantum-secure algorithm to explore ways to make designs more efficient. The improvements are valuable for high throughput applications, such as a server which must handle a large number of connections at once.
Sever, Refik. "Wave Component Sampling Method For High Performance Pipelined Circuits". Phd thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613893/index.pdf.
Pełny tekst źródłam CMOS technology. A generic transmission gate logic block with optimized output delay variation depending on the input pattern is designed and used in all of the sub blocks of the multiplier. Post layout simulation results show that, this multiplier can operate at a speed of 3GHz, using only 70 latches. Comparing with the mesochronous pipelining scheme, the number of the registers is decreased by 41% and the total power of the chip is also decreased by 9.5% without any performance loss. An ultra high speed full pipelined CSA multiplier with an operating frequency of 5GHz is also implemented with WCSM. The number of registers is decreased by 45%, and the power consumption of the circuit is decreased by 18.4% comparing with conventional or mesochronous pipelining methods. WCSM is also applied to different multiplier structures employing booth encoders, Wallace trees, and carry look-ahead adders. Comparing full pipelined 8x8 bit WCSM multiplier with the conventional pipelined multiplier, the number of registers in the implementation of booth encoder, Wallace tree, and carry look-ahead adder is decreased by 30%, 51%, and %62, respectively.
Bettis, Dane Edward. "Digital production pipelines: examining structures and methods in the computer effects industry". Thesis, Texas A&M University, 2005. http://hdl.handle.net/1969.1/2406.
Pełny tekst źródłaDurrani, Jawad Nadeem. "Dynamics of pipelines with a finite element method". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/MQ65153.pdf.
Pełny tekst źródłaLaricchia, Francesco. "Study of offshore flexible pipelines with analytical and numerical methods". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Znajdź pełny tekst źródłaWood, Stephen L. "Modeling of Pipeline Transients: Modified Method of Characteristics". FIU Digital Commons, 2011. http://digitalcommons.fiu.edu/etd/456.
Pełny tekst źródłaShirazi, Nabeel. "Methods and tool for implementing run-time reconfigurable FPGA designs". Thesis, Imperial College London, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.313986.
Pełny tekst źródłaBenkherouf, A. "Failure identification methods for detecting leaks in pipelines and sensor faults". Thesis, University of Manchester, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.375341.
Pełny tekst źródłaAlam, Muhammad Shafiqul. "Lattice Boltzmann modelling of two and three-dimensional flow and scour around offshore pipelines". University of Western Australia. School of Civil and Resource Engineering, 2009. http://theses.library.uwa.edu.au/adt-WU2009.0161.
Pełny tekst źródłaARAMAKI, THIAGO LESSA. "DEVELOPMENT AND VALIDATION OF METHODS FOR DETECTION AND LOCALIZATION OF PIPELINE LEAKS". PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2016. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=27567@1.
Pełny tekst źródłaCompanies in the business of pipeline operations have as a basic assumption, operational security. Concerning this issue, there are some factors that could lead to accidents with material, environment and personal damage possibilities such as: internal and external corrosion, accidental excavations, improper operation that could submit the pipe to high pressures and third party interventions interested in commodities theft. This dissertation is aligned with pipeline companies real demands through the development of systems that could be used by these companies. Leak detection systems provided with leak location capabilities were developed to be used in liquid pipeline control centers, exploring non-conventional methods, besides the ones mentioned by API 1130. The leak detection systems developed were: mass balance, volume balance, fuzzy logic and neural networks. For the leak location systems the systems tested were: sonic velocity, hydraulic gradient and artificial neural networks. The products used were gasoline, diesel and fuel oil. On the issue of leak detection, the system based on neural networks detected simulated leakages, although there were some false indications. The system based on fuzzy logic presented good results, giving correct leak indications without any indication of false alarms, interpreting correctly the phenomena due to pipeline usual operations. The mass balance system has also presented good results, not generating false alarms, but detecting simulated leaks even with the pipeline in shut-in condition. To evaluate leak detection systems is common to conduct field tests that can be costly and take a long time to accomplish. A method for testing at a lower cost should be developed and a proposal is being shown in this work.
Książki na temat "Pipelined methods"
Liou, Jim C. P. Pipeline variable uncertainties and their effects on leak detectability. Washington, D.C: American Petroleum Institute, 1993.
Znajdź pełny tekst źródłaEnloe, Lindsay. Practical corrosion control methods for gas utility piping. Wyd. 2. Houston, TX: NACE International, 1995.
Znajdź pełny tekst źródłaJ, Scholze R., i Construction Engineering Research Laboratory, red. Review of PIM (Pipeline Insertion Method) technology. Champaign, Ill: US Army Corps of Engineers, Construction Engineering Research Laboratory, 1991.
Znajdź pełny tekst źródłaAlberta. Scientific and Engineering Services and Research Division. A thermographic detection system for pipeline leaks. [Edmonton, Alta.]: Alberta Energy and Natural Resources, Scientific and Engineering Services and Research Division, 1985.
Znajdź pełny tekst źródła1909-, Miller John E., Schmidt Frederick 1945- i ASTM Committee G-2 on Erosion and Wear., red. Slurry erosion: Uses, applications, and test methods : a symposium. Philadelphia, PA: American Society for Testing and Materials, 1987.
Znajdź pełny tekst źródłaAlberta. Alberta Energy. Research and Technology Branch. i Alberta Office of Coal Research and Technology., red. Studies of coal slurry systems and alternative coal transportation methods. Edmonton: Alberta Energy, Research and Technology Branch, 1991.
Znajdź pełny tekst źródłaW, Maresca J., i Risk Reduction Engineering Laboratory (U.S.), red. Standard test procedures for evaluating leak detection methods: Pipeline leak detection systems. Cincinnati, OH: U.S. Environmental Protection Agency, Risk Reduction Engineering Laboratory, 1991.
Znajdź pełny tekst źródłaHobbs, J. M. Standard methods for calibrating flowmeters and testing pipeline components in water at NEL. East Kilbridge,Glasgow: National Engineering Laboratory, 1987.
Znajdź pełny tekst źródłaFowler, Jimmy E. Coastal scour problems and methods for prediction of maximum scour. [Vicksburg, Miss: U.S. Army Engineer Waterways Experiment Station, 1993.
Znajdź pełny tekst źródłaFowler, Jimmy E. Coastal scour problems and methods for prediction of maximum scour. [Vicksburg, Miss: U.S. Army Engineer Waterways Experiment Station, 1993.
Znajdź pełny tekst źródłaCzęści książek na temat "Pipelined methods"
Manolios, Panagiotis. "Correctness of Pipelined Machines". W Formal Methods in Computer-Aided Design, 181–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-40922-x_11.
Pełny tekst źródłaSawada, Jun. "Verification of a Simple Pipelined Machine Model". W Advances in Formal Methods, 137–50. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4757-3188-0_9.
Pełny tekst źródłaVelev, Miroslav N., i Ping Gao. "Method for Formal Verification of Soft-Error Tolerance Mechanisms in Pipelined Microprocessors". W Formal Methods and Software Engineering, 355–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16901-4_24.
Pełny tekst źródłaVelev, Miroslav N., i Randal E. Bryant. "Bit-Level Abstraction in the Verification of Pipelined Microprocessors by Correspondence Checking". W Formal Methods in Computer-Aided Design, 18–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49519-3_3.
Pełny tekst źródłaDavlianidze, Pridon, Levan Alekhin, Tengiz Tsamalashvili i Ioseb Zeikidze. "Methods to Determine Parameters Characterizing Technical State of Pipelines with Pronounced Deposition". W Pipeline Systems, 323–30. Dordrecht: Springer Netherlands, 1992. http://dx.doi.org/10.1007/978-94-017-2677-1_26.
Pełny tekst źródłaPedrioli, Patrick G. A. "Trans-Proteomic Pipeline: A Pipeline for Proteomic Analysis". W Methods in Molecular Biology, 213–38. Totowa, NJ: Humana Press, 2009. http://dx.doi.org/10.1007/978-1-60761-444-9_15.
Pełny tekst źródłaGarfias-Gallegos, Diego, Claudia Zirión-Martínez, Edder D. Bustos-Díaz, Tania Vanessa Arellano-Fernández, José Abel Lovaco-Flores, Aarón Espinosa-Jaime, J. Abraham Avelar-Rivas i Nelly Sélem-Mójica. "Metagenomics Bioinformatic Pipeline". W Methods in Molecular Biology, 153–79. New York, NY: Springer US, 2022. http://dx.doi.org/10.1007/978-1-0716-2429-6_10.
Pełny tekst źródłaTimashev, Sviatoslav, i Anna Bushinskaya. "Methods of ILI Results Analysis". W Diagnostics and Reliability of Pipeline Systems, 73–223. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-25307-7_4.
Pełny tekst źródłaStarr, Justin. "Methods for Detecting Hydrogen Sulfide Gas". W Water and Wastewater Pipeline Assessment Technologies, 97–110. First edition. | Boca Raton : CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9780429198731-5.
Pełny tekst źródłaKeller, Andrew, i David Shteynberg. "Software Pipeline and Data Analysis for MS/MS Proteomics: The Trans-Proteomic Pipeline". W Methods in Molecular Biology, 169–89. Totowa, NJ: Humana Press, 2010. http://dx.doi.org/10.1007/978-1-60761-977-2_12.
Pełny tekst źródłaStreszczenia konferencji na temat "Pipelined methods"
Fleming, Kermin, Myron King, Man Cheuk Ng, Asif Khan i Muralidaran Vijayaraghavan. "High-throughput Pipelined Mergesort". W 2008 6th ACM/IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE '08). IEEE, 2008. http://dx.doi.org/10.1109/memcod.2008.4547704.
Pełny tekst źródłaJavaid, Haris, Andhi Janapsatya, Mohammad Shihabul Haque i Sri Parameswaran. "Rapid runtime estimation methods for pipelined MPSoCs". W 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010). IEEE, 2010. http://dx.doi.org/10.1109/date.2010.5457178.
Pełny tekst źródłaTiwari, Manasi, i Sathish Vadhiyar. "Pipelined Preconditioned Conjugate Gradient Methods for Distributed Memory Systems". W 2020 IEEE 27th International Conference on High Performance Computing, Data, and Analytics (HiPC). IEEE, 2020. http://dx.doi.org/10.1109/hipc50609.2020.00029.
Pełny tekst źródłaJuang, Tso-Bing, i Chin-Chieh Chiu. "New recoding methods for fully pipelined parallel CORDIC rotations". W 2015 International SoC Design Conference (ISOCC). IEEE, 2015. http://dx.doi.org/10.1109/isocc.2015.7401702.
Pełny tekst źródłaHofferek, Georg, i Roderick Bloem. "Controller synthesis for pipelined circuits using uninterpreted functions". W 2011 9th IEEE/ACM International Conference on Formal Methods and Models for Codesign (MEMOCODE 2011). IEEE, 2011. http://dx.doi.org/10.1109/memcod.2011.5970508.
Pełny tekst źródłaBauer, Michael A., Alain Biem, Stewart McIntyre, Yuzhen Xie, Ilias Kotsireas, Roderick Melnik i Brian West. "Pipelined Processing of X-ray Microdiffraction Data on Multicores". W ADVANCES IN MATHEMATICAL AND COMPUTATIONAL METHODS: ADDRESSING MODERN CHALLENGES OF SCIENCE, TECHNOLOGY, AND SOCIETY. AIP, 2011. http://dx.doi.org/10.1063/1.3663524.
Pełny tekst źródłaZhang Sheng, Wang Nailong i Zhou Runde. "Power analysis and optimization methods of the pipelined array multiplier". W 2003 5th International Conference on ASIC Proceedings (IEEE Cat No 03TH8690) ICASIC-03. IEEE, 2003. http://dx.doi.org/10.1109/icasic.2003.1277436.
Pełny tekst źródłaJeitler, Marcus, i Jakob Lechner. "Low Latency Recovery from Transient Faults for Pipelined Processor Architectures". W 2010 13th Euromicro Conference on Digital System Design: Architectures, Methods and Tools (DSD). IEEE, 2010. http://dx.doi.org/10.1109/dsd.2010.87.
Pełny tekst źródłaTiwari, Manasi, i Sathish Vadhiyar. "Pipelined Preconditioned s-step Conjugate Gradient Methods for Distributed Memory Systems". W 2021 IEEE International Conference on Cluster Computing (CLUSTER). IEEE, 2021. http://dx.doi.org/10.1109/cluster48925.2021.00061.
Pełny tekst źródłaTiwari, Manasi, i Sathish Vadhiyar. "Pipelined Preconditioned s-step Conjugate Gradient Methods for Distributed Memory Systems". W 2021 IEEE International Conference on Cluster Computing (CLUSTER). IEEE, 2021. http://dx.doi.org/10.1109/cluster48925.2021.00061.
Pełny tekst źródłaRaporty organizacyjne na temat "Pipelined methods"
Kiefner, John, i Harvey Haines. IPC-04-02 Comparisons of Pipeline Integrity Assessment Methods. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), wrzesień 2002. http://dx.doi.org/10.55274/r0011828.
Pełny tekst źródłaOswald i Smith. L52260 Gap Study and Recommendation - Pipe Response to Buried Explosive Detonations. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), maj 2005. http://dx.doi.org/10.55274/r0010252.
Pełny tekst źródłaBrown, R. J. L51598 Tow Methods Design Guide for the Installation of Offshore Pipelines. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), styczeń 1989. http://dx.doi.org/10.55274/r0010093.
Pełny tekst źródłaHarris. L52060 Internal Repair of Gas Pipelines Survey of Operator Experience and Industry Needs Report. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), wrzesień 2003. http://dx.doi.org/10.55274/r0010270.
Pełny tekst źródłaSchultz. L51975 Pressure Testing of Large Diameter Pipelines in Artic and Subartic Regions. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), grudzień 2002. http://dx.doi.org/10.55274/r0011336.
Pełny tekst źródłaTeitsma i Shuttleworth. PR-004-03127-R01 Gas Coupled Ultrasonic Pipeline Inspection. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), styczeń 2008. http://dx.doi.org/10.55274/r0010897.
Pełny tekst źródłaKiefner, Maxey i Eiber. L51607 Pipeline Coating Impedance Effect on Powerline Fault Current Coupling. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), styczeń 1989. http://dx.doi.org/10.55274/r0010294.
Pełny tekst źródłaFu. L51878 Methods for Assessing Corroded Pipeline-Review Validation and Recommendations. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), kwiecień 2002. http://dx.doi.org/10.55274/r0010358.
Pełny tekst źródłaJaske i Hart. L52047 PRCI Pipeline Repair Manual 6th Edition. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), sierpień 2006. http://dx.doi.org/10.55274/r0010249.
Pełny tekst źródłaRothe, Paul. L41072 Design Methods For Multiphase Flow In Gas Pipelines. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), maj 1987. http://dx.doi.org/10.55274/r0012069.
Pełny tekst źródła