Gotowa bibliografia na temat „Tradeoff bandwidth/memory”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Tradeoff bandwidth/memory”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Tradeoff bandwidth/memory"
Ahmadi, Mahdieh, James Roberts, Emilio Leonardi i Ali Movaghar. "Cache Subsidies for an Optimal Memory for Bandwidth Tradeoff in the Access Network". IEEE Journal on Selected Areas in Communications 38, nr 4 (kwiecień 2020): 736–49. http://dx.doi.org/10.1109/jsac.2020.2971806.
Pełny tekst źródłaMartin, Milo M. K., Pacia J. Harper, Daniel J. Sorin, Mark D. Hill i David A. Wood. "Using destination-set prediction to improve the latency/bandwidth tradeoff in shared-memory multiprocessors". ACM SIGARCH Computer Architecture News 31, nr 2 (maj 2003): 206–17. http://dx.doi.org/10.1145/871656.859642.
Pełny tekst źródłaKukreja, Navjot, Jan Hückelheim, Mathias Louboutin, John Washbourne, Paul H. J. Kelly i Gerard J. Gorman. "Lossy checkpoint compression in full waveform inversion: a case study with ZFPv0.5.5 and the overthrust model". Geoscientific Model Development 15, nr 9 (12.05.2022): 3815–29. http://dx.doi.org/10.5194/gmd-15-3815-2022.
Pełny tekst źródłaSingh, Shikha, Prashant Pandey, Michael A. Bender, Jonathan W. Berry, Martín Farach-Colton, Rob Johnson, Thomas M. Kroeger i Cynthia A. Phillips. "Timely Reporting of Heavy Hitters Using External Memory". ACM Transactions on Database Systems 46, nr 4 (31.12.2021): 1–35. http://dx.doi.org/10.1145/3472392.
Pełny tekst źródłaGabbay, Freddy, Rotem Lev Aharoni i Ori Schweitzer. "Deep Neural Network Memory Performance and Throughput Modeling and Simulation Framework". Mathematics 10, nr 21 (6.11.2022): 4144. http://dx.doi.org/10.3390/math10214144.
Pełny tekst źródłaRadwan, Amr, Taghreed Ali Alenezi, Wejdan Alrashdan i Won-Joo Hwang. "Balancing Tradeoffs in Network Queue Management Problem via Forward–Backward Sweeping with Finite Checkpoints". Symmetry 15, nr 7 (10.07.2023): 1395. http://dx.doi.org/10.3390/sym15071395.
Pełny tekst źródłaBiryukov, Alex, i Dmitry Khovratovich. "Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem". Ledger 2 (28.04.2017): 1–30. http://dx.doi.org/10.5195/ledger.2017.48.
Pełny tekst źródłaPeterson, Brennan, Michael Kwan, Fred Duewer, Andrew Reid i Rhiannon Brooks. "Optimizing X-Ray Inspection for Advanced Packaging Applications". International Symposium on Microelectronics 2020, nr 1 (1.09.2020): 000165–68. http://dx.doi.org/10.4071/2380-4505-2020.1.000165.
Pełny tekst źródłaAlqahtani, Fahad, Mohammed Almutairi i Frederick T. Sheldon. "Cloud Security Using Fine-Grained Efficient Information Flow Tracking". Future Internet 16, nr 4 (25.03.2024): 110. http://dx.doi.org/10.3390/fi16040110.
Pełny tekst źródłaYin, Jun, i Marian Verhelst. "CNN-based Robust Sound Source Localization with SRP-PHAT for the Extreme Edge". ACM Transactions on Embedded Computing Systems, 6.03.2023. http://dx.doi.org/10.1145/3586996.
Pełny tekst źródłaRozprawy doktorskie na temat "Tradeoff bandwidth/memory"
Benkirane, Nada. "La gestion du trafic dans les réseaux orientés contenus". Electronic Thesis or Diss., Paris 6, 2014. http://www.theses.fr/2014PA066039.
Pełny tekst źródłaContent Centric Network (CCN) architecture has been designed to optimize network resources and ensure greater security. The design and the implementation of this architecture are only in its beginning. This work has made some proposals in traffic management related to the internet of the future.We argue that it is necessary to supplement CCN with mechanisms enabling controlled sharing of network bandwidth by competitive flows. Traffic control is necessary to ensure low latency for conversational and streaming flows, and to realize satisfactory bandwidth sharing between elastic flows. These objectives can be realized using "per-flow bandwidth sharing". As the bandwidth sharing algorithms in the IP architecture are not completely satisfactory, we proposed the Interest Discard as a new technique for CCN. We tested some of the mechanisms using CCNx prototype software and simulations. In evaluating the performance of multi-paths we noted the role of cache performance in the choice of selected paths.In the second part, we evaluate the performance of caches using a simple approximation for LRU cache performance that proves highly accurate. As caches performance heavily depends on populations and catalogs sizes, we evaluate their performance using popularity and catalogs representing the current Internet exchanges. Considering alpha values, we observe that the cache size should be very large, which can be restrictive for caches implementation in routers.We believe that the distribution of caches on an architecture creates an excessive bandwidth consumption. Then, it is important to determine a tradeoff bandwidth/memory to determine how we should size caches and where we should place them, this amounts to evaluate differences, in cost, between architectures
Streszczenia konferencji na temat "Tradeoff bandwidth/memory"
Roberts, James, i Nada Sbihi. "Exploring the memory-bandwidth tradeoff in an information-centric network". W 2013 25th International Teletraffic Congress (ITC 2013). IEEE, 2013. http://dx.doi.org/10.1109/itc.2013.6662936.
Pełny tekst źródłaMartin, Milo M. K., Pacia J. Harper, Daniel J. Sorin, Mark D. Hill i David A. Wood. "Using destination-set prediction to improve the latency/bandwidth tradeoff in shared-memory multiprocessors". W the 30th annual international symposium. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/859618.859642.
Pełny tekst źródłaMok, Fai. "Applications of holographic storage in lithium niobate". W OSA Annual Meeting. Washington, D.C.: Optica Publishing Group, 1992. http://dx.doi.org/10.1364/oam.1992.we1.
Pełny tekst źródłaLangguth, Johannes, Xing Cai i Mohammed Sourouri. "Memory Bandwidth Contention: Communication vs Computation Tradeoffs in Supercomputers with Multicore Architectures". W 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2018. http://dx.doi.org/10.1109/padsw.2018.8644601.
Pełny tekst źródła