Results 41 to 50 of about 1,840,164 (310)

Communicating Efficiently on Cluster-Based Remote Direct Memory Access (RDMA) over InfiniBand Protocol

open access: yesApplied Sciences, 2018
Distributed systems are commonly built under the assumption that the network is the primary bottleneck, however this assumption no longer holds by emerging high-performance RDMA enabled protocols in datacenters.
Masoud Hemmatpour   +2 more
doaj   +1 more source

An area-efficient 2-D convolution implementation on FPGA for space applications [PDF]

open access: yes, 2011
The 2-D Convolution is an algorithm widely used in image and video processing. Although its computation is simple, its implementation requires a high computational power and an intensive use of memory.
Di Carlo, Stefano   +5 more
core   +1 more source

On Learning Associative Relationship Memory among Knowledge Concepts

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2020
A high-level associative memory modelling method was developed to explore the realization of associative memory. In the proposed method, two stage procedures are progressively performed to construct a unified associative knowledge network.
Zhenping Xie, Kun Wang, Yuan Liu
doaj   +1 more source

Converting Concurrent Range Index Structure to Range Index Structure for Disaggregated Memory

open access: yesApplied Sciences, 2023
In this work, we propose the Spread approach, which tailors a concurrent range index structure to a range index structure for disaggregated memory connected via RDMA (Remote Direct Memory Access).
Bonmoo Koo   +3 more
doaj   +1 more source

Semantics of Remote Direct Memory Access: Operational and Declarative Models of RDMA on TSO Architectures

open access: yesProc. ACM Program. Lang.
Remote direct memory access (RDMA) is a modern technology enabling networked machines to exchange information without involving the operating system of either side, and thus significantly speeding up data transfer in computer clusters.
Guillaume Ambal   +5 more
semanticscholar   +1 more source

ToF Estimation Based on Compressed Real-Time Histogram Builder for SPAD Image Sensors [PDF]

open access: yes, 2019
This paper presents a FPGA implementation of a novel depth map estimation algorithm for direct time-of-flight CMOS image sensors (dToF-CISs) based on single-photon avalanche-diodes (SPADs).
Carmona Galán, Ricardo   +3 more
core   +1 more source

Preferences of Pediatric Patients and Their Caregivers for Chemotherapy‐Induced Nausea and Vomiting Control Endpoints: A Mixed Methods Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Although not always achieved, complete chemotherapy‐induced nausea and vomiting (CINV) control is the conventional goal of CINV prophylaxis. In this two‐center, mixed‐methods study, we sought to understand the preferences of adolescent patients and family caregivers for CINV control endpoints.
Haley Newman   +8 more
wiley   +1 more source

Gen-Z memory pool system implementation and performance measurement

open access: yesETRI Journal, 2022
The Gen-Z protocol is a memory semantic protocol between the memory and CPU used in computer architectures with large memory pools. This study presents the implementation of the Gen-Z hardware system configured using Gen-Z specification 1.0 and reports ...
Won-ok Kwon   +4 more
doaj   +1 more source

Transformation of C Programming Language Memory Model into Object-Oriented Representation of EO Language

open access: yesМоделирование и анализ информационных систем, 2022
The paper analyzes the possibilities of transforming C programming language constructs into objects of EO programming language. The key challenge of the method is the transpilation from a system programming language into a language of a higher level of ...
Alexander I. Legalov   +5 more
doaj   +1 more source

The Impact of RDMA on Agreement

open access: yes, 2020
Remote Direct Memory Access (RDMA) is becoming widely available in data centers. This technology allows a process to directly read and write the memory of a remote host, with a mechanism to control access permissions.
Aguilera, Marcos K.   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy