Results 81 to 90 of about 263,258 (207)
Accelerated‐USE: A Benchmark Framework for GPU‐Driven Graph Neural Network Training
ABSTRACT Graph processing is used in many domains to extract knowledge from real‐world data. With the rise of deep neural networks and scaled compute infrastructure in artificial intelligence (AI), specialized techniques emerged to leverage graphs in applications such as recommendation systems and social networks.
Lucas de Angelo Martins Ribeiro +5 more
wiley +1 more source
CC-NIC: a Cache-Coherent Interface to the NIC
Emerging interconnects make peripherals, such as the network interface controller (NIC), accessible through the processor's cache hierarchy, allowing these devices to participate in the CPU cache coherence protocol.
Henry N. Schuh +6 more
semanticscholar +1 more source
A parallel algorithm for generating Pareto‐optimal radiosurgery treatment plans
Abstract Background Using inverse planning tools to create radiosurgery treatment plans is an iterative process, where clinical trade‐offs are explored by changing the relative importance given to different objectives and rerunning the optimizer until a desirable plan is found.
Joakim da Silva +4 more
wiley +1 more source
Research on Linux network packet buffer recycling toward multi-core processor
A lock-free algorithm for Linux packet buffer recycling on multi-core processor was proposed.Through making a model of Linux network packet forwarding, the principle of Linux packet buffer recycling was analyzed, and the main reason that the mechanism ...
YAO Qi +3 more
doaj +2 more sources
Side-channel attacks leveraging microarchitectural components such as caches and translation lookaside buffers (TLBs) pose increasing risks to cryptographic and machine-learning workloads.
Xinyao Li, Akhilesh Tyagi
doaj +1 more source
A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca +6 more
wiley +1 more source
SmartNIC-Offloaded Worker Node for Storage-Compute Disaggregated Recommendation System [PDF]
Deep learning-based recommendation systems are commonly used to provide personalized recommendations. In a common storage-compute disaggregated inference architecture, the inference speed of the recommendation system is limited by the internode network ...
SHI Ruixin, YAN Ming, WU Jie
doaj +1 more source
Forward and Adjoint Calculations of Gravitational Potential in Heterogeneous, Aspherical Planets
Abstract We have developed a computational package for the calculation of numerically exact internal and external gravitational potential, its functional derivatives and sensitivity kernels, in an aspherical, heterogeneous planet. We detail our implementation, utilizing a transformation of the Poisson equation into a spherical reference domain, as well
Alex D. C. Myhill +2 more
wiley +1 more source
A high‐throughput field‐programmable gate array (FPGA)‐accelerated data‐reduction and ‐analysis pipeline combined with high‐performance computing enables the continuous handling of a 216 Gbps data stream from quasi‐elastic gamma‐ray scattering experiments at SPring‐8.We present a data‐acquisition and ‐analysis framework for quasi‐elastic gamma‐ray ...
Haruki Nishino +10 more
wiley +1 more source
Tuning I/O Subsystem: A Key Component in RDBMS Performance Tuning [PDF]
In a computer system, the fastest storage component is the CPU cache, followed by the system memory. I/O to disk is thousands of times slower than an access to memory. This fact is the key for why you try to make effective use of memory whenever possible
Hitesh Kumar SHARMA +2 more
doaj

