Results 41 to 50 of about 1,840,164 (310)
Distributed systems are commonly built under the assumption that the network is the primary bottleneck, however this assumption no longer holds by emerging high-performance RDMA enabled protocols in datacenters.
Masoud Hemmatpour +2 more
doaj +1 more source
An area-efficient 2-D convolution implementation on FPGA for space applications [PDF]
The 2-D Convolution is an algorithm widely used in image and video processing. Although its computation is simple, its implementation requires a high computational power and an intensive use of memory.
Di Carlo, Stefano +5 more
core +1 more source
On Learning Associative Relationship Memory among Knowledge Concepts
A high-level associative memory modelling method was developed to explore the realization of associative memory. In the proposed method, two stage procedures are progressively performed to construct a unified associative knowledge network.
Zhenping Xie, Kun Wang, Yuan Liu
doaj +1 more source
Converting Concurrent Range Index Structure to Range Index Structure for Disaggregated Memory
In this work, we propose the Spread approach, which tailors a concurrent range index structure to a range index structure for disaggregated memory connected via RDMA (Remote Direct Memory Access).
Bonmoo Koo +3 more
doaj +1 more source
Remote direct memory access (RDMA) is a modern technology enabling networked machines to exchange information without involving the operating system of either side, and thus significantly speeding up data transfer in computer clusters.
Guillaume Ambal +5 more
semanticscholar +1 more source
ToF Estimation Based on Compressed Real-Time Histogram Builder for SPAD Image Sensors [PDF]
This paper presents a FPGA implementation of a novel depth map estimation algorithm for direct time-of-flight CMOS image sensors (dToF-CISs) based on single-photon avalanche-diodes (SPADs).
Carmona Galán, Ricardo +3 more
core +1 more source
ABSTRACT Purpose Although not always achieved, complete chemotherapy‐induced nausea and vomiting (CINV) control is the conventional goal of CINV prophylaxis. In this two‐center, mixed‐methods study, we sought to understand the preferences of adolescent patients and family caregivers for CINV control endpoints.
Haley Newman +8 more
wiley +1 more source
Gen-Z memory pool system implementation and performance measurement
The Gen-Z protocol is a memory semantic protocol between the memory and CPU used in computer architectures with large memory pools. This study presents the implementation of the Gen-Z hardware system configured using Gen-Z specification 1.0 and reports ...
Won-ok Kwon +4 more
doaj +1 more source
The paper analyzes the possibilities of transforming C programming language constructs into objects of EO programming language. The key challenge of the method is the transpilation from a system programming language into a language of a higher level of ...
Alexander I. Legalov +5 more
doaj +1 more source
The Impact of RDMA on Agreement
Remote Direct Memory Access (RDMA) is becoming widely available in data centers. This technology allows a process to directly read and write the memory of a remote host, with a mechanism to control access permissions.
Aguilera, Marcos K. +4 more
core +1 more source

