Results 81 to 90 of about 263,258 (207)

Accelerated‐USE: A Benchmark Framework for GPU‐Driven Graph Neural Network Training

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 9, May 2026.
ABSTRACT Graph processing is used in many domains to extract knowledge from real‐world data. With the rise of deep neural networks and scaled compute infrastructure in artificial intelligence (AI), specialized techniques emerged to leverage graphs in applications such as recommendation systems and social networks.
Lucas de Angelo Martins Ribeiro   +5 more
wiley   +1 more source

CC-NIC: a Cache-Coherent Interface to the NIC

open access: yesInternational Conference on Architectural Support for Programming Languages and Operating Systems
Emerging interconnects make peripherals, such as the network interface controller (NIC), accessible through the processor's cache hierarchy, allowing these devices to participate in the CPU cache coherence protocol.
Henry N. Schuh   +6 more
semanticscholar   +1 more source

A parallel algorithm for generating Pareto‐optimal radiosurgery treatment plans

open access: yesMedical Physics, Volume 53, Issue 5, May 2026.
Abstract Background Using inverse planning tools to create radiosurgery treatment plans is an iterative process, where clinical trade‐offs are explored by changing the relative importance given to different objectives and rerunning the optimizer until a desirable plan is found.
Joakim da Silva   +4 more
wiley   +1 more source

Research on Linux network packet buffer recycling toward multi-core processor

open access: yesTongxin xuebao, 2009
A lock-free algorithm for Linux packet buffer recycling on multi-core processor was proposed.Through making a model of Linux network packet forwarding, the principle of Linux packet buffer recycling was analyzed, and the main reason that the mechanism ...
YAO Qi   +3 more
doaj   +2 more sources

Large Pages, Large Leaks? Hugepage-Induced Side-Channels vs. Performance Improvements in Cryptographic Computations

open access: yesCryptography
Side-channel attacks leveraging microarchitectural components such as caches and translation lookaside buffers (TLBs) pose increasing risks to cryptographic and machine-learning workloads.
Xinyao Li, Akhilesh Tyagi
doaj   +1 more source

A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments

open access: yesInternational Journal of Network Management, Volume 36, Issue 3, May/June 2026.
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca   +6 more
wiley   +1 more source

SmartNIC-Offloaded Worker Node for Storage-Compute Disaggregated Recommendation System [PDF]

open access: yesJisuanji gongcheng
Deep learning-based recommendation systems are commonly used to provide personalized recommendations. In a common storage-compute disaggregated inference architecture, the inference speed of the recommendation system is limited by the internode network ...
SHI Ruixin, YAN Ming, WU Jie
doaj   +1 more source

Forward and Adjoint Calculations of Gravitational Potential in Heterogeneous, Aspherical Planets

open access: yesEarth and Space Science, Volume 13, Issue 5, May 2026.
Abstract We have developed a computational package for the calculation of numerically exact internal and external gravitational potential, its functional derivatives and sensitivity kernels, in an aspherical, heterogeneous planet. We detail our implementation, utilizing a transformation of the Poisson equation into a spherical reference domain, as well
Alex D. C. Myhill   +2 more
wiley   +1 more source

FPGA‐accelerated streaming data reduction achieving an average compression ratio over 8000 in a 17.4 kHz, 840 kpixel CITIUS detector for quasi‐elastic gamma‐ray scattering

open access: yesJournal of Synchrotron Radiation, Volume 33, Issue 3, Page 609-616, May 2026.
A high‐throughput field‐programmable gate array (FPGA)‐accelerated data‐reduction and ‐analysis pipeline combined with high‐performance computing enables the continuous handling of a 216 Gbps data stream from quasi‐elastic gamma‐ray scattering experiments at SPring‐8.We present a data‐acquisition and ‐analysis framework for quasi‐elastic gamma‐ray ...
Haruki Nishino   +10 more
wiley   +1 more source

Tuning I/O Subsystem: A Key Component in RDBMS Performance Tuning [PDF]

open access: yesDatabase Systems Journal, 2016
In a computer system, the fastest storage component is the CPU cache, followed by the system memory. I/O to disk is thousands of times slower than an access to memory. This fact is the key for why you try to make effective use of memory whenever possible
Hitesh Kumar SHARMA   +2 more
doaj  

Home - About - Disclaimer - Privacy