Gotowa bibliografia na temat „Redundancy”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Redundancy”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Redundancy"
Kanno, Yoshihiro, i Yakov Ben-Haim. "Redundancy and Robustness, or When Is Redundancy Redundant?" Journal of Structural Engineering 137, nr 9 (wrzesień 2011): 935–45. http://dx.doi.org/10.1061/(asce)st.1943-541x.0000416.
Pełny tekst źródłaBarnard, Catherine. "Redundant approaches to redundancy". Cambridge Law Journal 59, nr 1 (marzec 2000): 36–39. http://dx.doi.org/10.1017/s000819730033001x.
Pełny tekst źródłaHarada, Takashi. "Mode changes of redundantly actuated asymmetric parallel mechanism". Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science 230, nr 3 (26.05.2015): 454–62. http://dx.doi.org/10.1177/0954406215588479.
Pełny tekst źródłaGitay, Habiba, J. Bastow Wilson i William G. Lee. "Species Redundancy: A Redundant Concept?" Journal of Ecology 84, nr 1 (luty 1996): 121. http://dx.doi.org/10.2307/2261706.
Pełny tekst źródłaCymek, D. H., S. Jahn i D. H. Manzey. "Monitoring and Cross-Checking Automation". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, nr 1 (wrzesień 2016): 143–47. http://dx.doi.org/10.1177/1541931213601033.
Pełny tekst źródłaLiu, Lu, Xin Chen i Dong Cao. "Research of Redundancy Management on Fight Control Computer for Unmanned Aerial Vehicle". Advanced Materials Research 383-390 (listopad 2011): 1573–77. http://dx.doi.org/10.4028/www.scientific.net/amr.383-390.1573.
Pełny tekst źródłaConkur, E. Sahin, i Rob Buckingham. "Clarifying the definition of redundancy as used in robotics". Robotica 15, nr 5 (wrzesień 1997): 583–86. http://dx.doi.org/10.1017/s0263574797000672.
Pełny tekst źródłaWu, J., J.-S. Wang, L.-P. Wang i T.-M. Li. "Dexterity and stiffness analysis of a three-degree-of-freedom planar parallel manipulator with actuation redundancy". Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science 221, nr 8 (1.08.2007): 961–69. http://dx.doi.org/10.1243/09544062jmes456.
Pełny tekst źródłaMa, Shugen, Shigeo Hirose i Hiroshi Yoshinada. "Efficient Redundancy Control of Redundant Manipulators." Journal of the Robotics Society of Japan 14, nr 5 (1996): 703–9. http://dx.doi.org/10.7210/jrsj.14.703.
Pełny tekst źródłaPotkonjak, Veljko. "Application of redundant robots to constrained-motion tasks". Robotica 10, nr 5 (wrzesień 1992): 397–407. http://dx.doi.org/10.1017/s0263574700010602.
Pełny tekst źródłaRozprawy doktorskie na temat "Redundancy"
Kabilafkas, D. "Natural redundancy and coding redundancy in information signals". Thesis, Imperial College London, 1989. http://hdl.handle.net/10044/1/47494.
Pełny tekst źródłaLewis, Paul. "The redundancy process and its implications for redundancy decision-making". Thesis, University of Leeds, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.288178.
Pełny tekst źródłaFernández, Gómez Manuel. "Binary Redundancy Elimination". Doctoral thesis, Universitat Politècnica de Catalunya, 2005. http://hdl.handle.net/10803/5985.
Pełny tekst źródłaPor otro lado, las optimizaciones aplicadas en tiempo de enlace o directamente al programa ejecutable final han recibido una atención creciente en los últimos años, debido a limitaciones existentes en el modelo de compilación tradicional. Incluso aplicando sofisticados análisis y transformaciones interprocedurales, un compilador tradicional no es capaz de optimizar un programa como una entidad completa. Un problema similar aparece aplicando técnicas de compilación dirigidas por profiling: grandes proyectos se ven forzados a recompilar todos y cada uno de sus módulos para aprovechar dicha información. Por el contrario, seria más conveniente construir la aplicación completa, instrumentarla para obtener información de profiling y optimizar entonces el binario final sin recompilar ni un solo fichero fuente.
En esta tesis presentamos nuevas técnicas de compilación dirigidas por profiling para eliminar la redundancia encontrada en programas ejecutables a nivel binario (esto es, redundancia binaria), incluso aunque estos programas hayan sido compilados agresivamente con un novísimo compilador comercial. Nuestras técnicas de eliminación de redundancia están diseñadas para eliminar operaciones de memoria y de salto redundantes, que son las más importantes para mitigar los problemas de rendimiento que hemos mencionado. Estas propuestas están basadas en técnicas de eliminación de redundancia parcial sensibles al camino de ejecución. Los resultados muestran que aplicando nuestras optimizaciones, somos capaces de alcanzar una reducción del 14% en el tiempo de ejecución de nuestro conjunto de programas.
En este trabajo también revisamos el problemas del análisis de alias en programas ejecutables, identificando el por qué la desambiguación de memoria es uno de los puntos débiles en la modificación de código objeto. Proponemos varios análisis para ser aplicados en el contexto de optimizadores binarios. Primero un análisis de alias estricto para descubrir dependencias de memoria sensibles al camino de ejecución, el cual es usado en nuestras optimizaciones para la eliminación de redundancias de memoria.
Seguidamente, dos análisis especulativos de posibles alias para detección de independencias de memoria. Estos análisis están basados en introducir información especulativa en tiempo de análisis, lo que incrementa la precisión en partes importantes de código manteniendo el análisis eficiente. Los resultados muestran que nuestras propuestas son altamente útiles para incrementar la desambiguación de memoria de código binario, lo que se traduce en oportunidades para aplicar optimizaciones.
Todos nuestros algoritmos, tanto de análisis como de optimización, han sido implementados en un optimizador binario, enfatizando los problemas más relevantes en la aplicaciones de nuestros algoritmos en código ejecutable, sin la ayuda de gran parte de la información de alto nivel presente en compiladores tradicionales.
Two of the most important performance limiters in today's processor families comes from solving the memory wall and handling control dependencies. In order to address these issues, cache memories and branch predictors are well-known hardware proposals that take advantage of, among other things, exploiting both temporal memory reuse and branch correlation. In other words, they try to exploit the dynamic redundancy existing in programs. This redundancy comes partly from the way that programmers write source code, but also from limitations in the compilation model of traditional compilers, which introduces unnecessary memory and conditional branch instructions. We believe that today's optimizing compilers should be very aggressive in optimizing programs, and then they should be expected to optimize a significant part of this redundancy away.
On the other hand, optimizations performed at link-time or directly applied to final program executables have received increased attention in recent years, due to limitations in the traditional compilation model. First, even though performing sophisticated interprocedural analyses and transformations, traditional compilers do not have the opportunity to optimize the program as a whole. A similar problem arises when applying profile-directe compilation techniques: large projects will be forced to re-build every source file to take advantage of profile information. By contrast, it would be more convenient to build the full application, instrument it to obtain profile data and then re-optimize the final binary without recompiling a single source file.
In this thesis we present new profile-guided compiler optimizations for eliminating the redundancy encountered on executable programs at binary level (i.e.: binary redundancy), even though these programs have been compiled with full optimizations using a state-ofthe- art commercial compiler. In particular, our Binary Redundancy Elimination (BRE) techniques are targeted at eliminating both redundant memory operations and redundant conditional branches, which are the most important ones for addressing the performance issues that we mentioned above in today's microprocessors. These new proposals are mainly based on Partial Redundancy Elimination (PRE) techniques for eliminating partial redundancies in a path-sensitive fashion. Our results show that, by applying our optimizations, we are able to achieve a 14% execution time reduction in our benchmark suite.
In this work we also review the problem of alias analysis at the executable program level, identifying why memory disambiguation is one of the weak points of object code modification. We then propose several alias analyses to be applied in the context of linktime or executable code optimizers. First, we present a must-alias analysis to recognize memory dependencies in a path- sensitive fashion, which is used in our optimization for eliminating redundant memory operations. Next, we propose two speculative may-alias data-flow algorithms to recognize memory independencies. These may-alias analyses are based on introducing unsafe speculation at analysis time, which increases alias precision on important portions of code while keeping the analysis reasonably cost-efficient. Our results show that our analyses prove to be very useful for increasing memory disambiguation accuracy of binary code, which turns out into opportunities for applying optimizations.
All our algorithms, both for the analyses and the optimizations, have been implemented within a binary optimizer, which overcomes most of the existing limitations of traditional source-code compilers. Therefore, our work also points out the most relevant issues of applying our algorithms at the executable code level, since most of the high-level information available in traditional compilers is lost.
Du, Xinli. "High redundancy actuator". Thesis, Loughborough University, 2008. https://dspace.lboro.ac.uk/2134/12232.
Pełny tekst źródłaCai, Qiong Computer Science & Engineering Faculty of Engineering UNSW. "Profile-guided redundancy elimination". Awarded by:University of New South Wales. School of Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/25156.
Pełny tekst źródłaJibrin, Shafiu. "Redundancy in semidefinite programming". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape15/PQDD_0010/NQ32337.pdf.
Pełny tekst źródłaJibrin, Shafiu Carleton University Dissertation Mathematics and Statistics. "Redundancy in semidefinite programming". Ottawa, 1997.
Znajdź pełny tekst źródłaTai, Cheng-Tao. "Time dependant redundancy optimization". Thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-01312009-063418/.
Pełny tekst źródłaZang, Joanna Q. "Design of a redundancy protocol /". free to MU campus, to others for purchase, 2003. http://wwwlib.umi.com/cr/mo/fullcit?p1418080.
Pełny tekst źródłaDoherty, Noeleen. "Managerial perceptions of the personal and career transitions of redundant executives and suvivors of redundancy". Thesis, Cranfield University, 2000. http://hdl.handle.net/1826/3678.
Pełny tekst źródłaKsiążki na temat "Redundancy"
Firth, Judith. Redundancy. Wyd. 3. London: Chartered Institute of Personnel and Development, 2003.
Znajdź pełny tekst źródłaDale, Jeannette. Redundancy. Birmingham: West Midlands Low Pay Unit, 1996.
Znajdź pełny tekst źródłaAssociation, British Dental. Redundancy. London: British Dental Association, 2000.
Znajdź pełny tekst źródłaServices, Incomes Data, red. Redundancy. London: Incomes Data Services, 1991.
Znajdź pełny tekst źródłaServices, Incomes Data, red. Redundancy. London: Incomes Data Services, 1996.
Znajdź pełny tekst źródłaServices, Incomes Data, red. Redundancy. London: Incomes Data Services, 1991.
Znajdź pełny tekst źródłaDirectorate, Great Britain Employment Rights. Redundancy. [U.K.]: Department of Trade and Industry, 2000.
Znajdź pełny tekst źródłaInstitute of Personnel Management. Information Department. Redundancy. London: The Institute, 1985.
Znajdź pełny tekst źródłaServices, Incomes Data, red. Redundancy. London: Incomes Data Services, 1987.
Znajdź pełny tekst źródłaCarby-Hall, Jo. Redundancy. Hull: Barmarick, 1988.
Znajdź pełny tekst źródłaCzęści książek na temat "Redundancy"
Marelli, A., i R. Micheloni. "Redundancy". W Inside NAND Flash Memories, 353–92. Dordrecht: Springer Netherlands, 2010. http://dx.doi.org/10.1007/978-90-481-9431-5_13.
Pełny tekst źródłaCaron, Richard J., Arnon Boneh i Shahar Boneh. "Redundancy". W Advances in Sensitivity Analysis and Parametric Programming, 464–504. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4615-6103-3_13.
Pełny tekst źródłaBurchill, Frank, i Alice Casey. "Redundancy". W Human Resource Management, 147–56. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24806-3_9.
Pełny tekst źródłaLockton, Deborah J. "Redundancy". W Employment Law, 235–50. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-15002-1_10.
Pełny tekst źródłaFuchs, Maurice Bernard. "Redundancy". W Structures and Their Analysis, 167–94. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31081-7_11.
Pełny tekst źródłaTantra, Ratna. "Redundancy". W A Survival Guide for Research Scientists, 207–13. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-05435-9_20.
Pełny tekst źródłaGeffroy, Jean-Claude, i Gilles Motet. "Redundancy". W Design of Dependable Computing Systems, 175–98. Dordrecht: Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-015-9884-2_8.
Pełny tekst źródłaBenson, Edward. "Redundancy". W A Guide to Redundancy Law, 44–67. London: Palgrave Macmillan UK, 1985. http://dx.doi.org/10.1007/978-1-349-07878-3_3.
Pełny tekst źródłaLockton, Deborah J. "Redundancy". W Employment Law, 304–21. London: Macmillan Education UK, 2014. http://dx.doi.org/10.1007/978-1-137-08551-1_10.
Pełny tekst źródłaCharles, Barrow, i Lyon Ann. "Redundancy". W Modern Employment Law, 173–85. Abingdon, Oxon; New York, NY : Routledge, 2018.: Routledge, 2018. http://dx.doi.org/10.4324/9781315713861-10.
Pełny tekst źródłaStreszczenia konferencji na temat "Redundancy"
Zhou, Xiang Sean, Ute Feuerlein, Zhigang Peng, Yiqiang Zhan, Maneesh Dewan, Bing Jian, Arun Krishnan, Yimo Tao, Martin Harder i Stefan Grosskopf. "Redundancy, redundancy, redundancy". W the international conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1743384.1743416.
Pełny tekst źródłaBabenko, M., A. Tchernykh, E. Golimblevskaia, H. N. Viet i V. Chaurasiya. "Computationally secure threshold secret sharing scheme with minimal redundancy". W The International Workshop on Information, Computation, and Control Systems for Distributed Environments. Crossref, 2020. http://dx.doi.org/10.47350/iccs-de.2020.02.
Pełny tekst źródłaGong, Lei, Sihang Zhou, Wenxuan Tu i Xinwang Liu. "Attributed Graph Clustering with Dual Redundancy Reduction". W Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/418.
Pełny tekst źródłaBarriére, Caroline. "Redundancy". W the 17th international conference. Morristown, NJ, USA: Association for Computational Linguistics, 1998. http://dx.doi.org/10.3115/980451.980863.
Pełny tekst źródłaBarriére, Caroline. "Redundancy". W the 36th annual meeting. Morristown, NJ, USA: Association for Computational Linguistics, 1998. http://dx.doi.org/10.3115/980845.980863.
Pełny tekst źródłaSubedi, Dipendra, Ilya Tyapin i Geir Hovland. "Control of Redundant Flexible Manipulators with Redundancy Resolution". W 2022 8th International Conference on Mechatronics and Robotics Engineering (ICMRE). IEEE, 2022. http://dx.doi.org/10.1109/icmre54455.2022.9734097.
Pełny tekst źródła"REDUNDANCY 2019 Committees". W 2019 XVI International Symposium "Problems of Redundancy in Information and Control Systems" (REDUNDANCY). IEEE, 2019. http://dx.doi.org/10.1109/redundancy48165.2019.9003327.
Pełny tekst źródła"Redundancy 2023 Committees". W 2023 XVIII International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY). IEEE, 2023. http://dx.doi.org/10.1109/redundancy59964.2023.10330196.
Pełny tekst źródłaMu¨ller, Andreas. "On the Terminology for Redundant Parallel Manipulators". W ASME 2008 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2008. http://dx.doi.org/10.1115/detc2008-49112.
Pełny tekst źródłaAmari, Suprasad V., i Glenn Dill. "Redundancy optimization problem with warm-standby redundancy". W 2010 Annual Reliability and Maintainability Symposium (RAMS). IEEE, 2010. http://dx.doi.org/10.1109/rams.2010.5448068.
Pełny tekst źródłaRaporty organizacyjne na temat "Redundancy"
Muley, P., M. Aissaoui i M. Bocci. Pseudowire Redundancy. RFC Editor, sierpień 2012. http://dx.doi.org/10.17487/rfc6718.
Pełny tekst źródłaKnight, S., D. Weaver, D. Whipple, R. Hinden, D. Mitzel, P. Hunt, P. Higginson, M. Shand i A. Lindem. Virtual Router Redundancy Protocol. RFC Editor, kwiecień 1998. http://dx.doi.org/10.17487/rfc2338.
Pełny tekst źródłaBrzozowski, J., J. Tremblay, J. Chen i T. Mrugalski. DHCPv6 Redundancy Deployment Considerations. RFC Editor, luty 2013. http://dx.doi.org/10.17487/rfc6853.
Pełny tekst źródłaHinden, R., red. Virtual Router Redundancy Protocol (VRRP). RFC Editor, kwiecień 2004. http://dx.doi.org/10.17487/rfc3768.
Pełny tekst źródłaXie, Q., R. Stewart, M. Stillman, M. Tuexen i A. Silverton. Endpoint Handlespace Redundancy Protocol (ENRP). RFC Editor, wrzesień 2008. http://dx.doi.org/10.17487/rfc5353.
Pełny tekst źródłaReiter, Michael. Scalable Redundancy for Infrastructure Services. Fort Belvoir, VA: Defense Technical Information Center, maj 2004. http://dx.doi.org/10.21236/ada424144.
Pełny tekst źródłaReiter, Michael K., i Gregory R. Ganger. Increasing Intrusion Tolerance via Scalable Redundancy. Fort Belvoir, VA: Defense Technical Information Center, lipiec 2006. http://dx.doi.org/10.21236/ada455860.
Pełny tekst źródłaXie, Q. Forward-Shifted RTP Redundancy Payload Support. RFC Editor, sierpień 2011. http://dx.doi.org/10.17487/rfc6354.
Pełny tekst źródłaKaplan, Alan J. Incorporating Redundancy Considerations Into Stockage Models. Fort Belvoir, VA: Defense Technical Information Center, styczeń 1987. http://dx.doi.org/10.21236/ada179306.
Pełny tekst źródłaUnseren, M. A., i D. B. Reister. A comparison of three redundancy resolution methods. Office of Scientific and Technical Information (OSTI), październik 1997. http://dx.doi.org/10.2172/631238.
Pełny tekst źródła