Results 11 to 20 of about 221,250 (263)
SOTPM: Software One-Time Programmable Memory to Protect Shared Memory on ARM Trustzone
In ARM TrustZone-based architecture, shared memory is one of the most useful schemes to enable isolated execution environments supported by TrustZone to communicate between environments.
Dongwook Shim, Dong Hoon Lee
doaj +1 more source
Data structures access model for remote shared memory [PDF]
Recent achievements in high-performance computing significantly narrow the performance gap between single and multi-node computing, and open up opportunities for systems with remote shared memory.
Nyrkov Anatoliy +4 more
doaj +1 more source
Memory leaks: information shared across memory systems [PDF]
The brain is highly segregated. Multiple mechanisms ensure that different types of memories are processed independently. Nonetheless, information leaks out across these memory systems. Only recently has the diversity of these leaks been revealed. Different memory types (skills vs.
openaire +2 more sources
Deep learning is one of the major promising machine learning methodologies. Deep learning is widely used in various application domains, e.g., image recognition, voice recognition, and natural language processing.
Shinyoung Ahn +3 more
doaj +1 more source
MsBV: A Memory Compression Scheme for Bit-Vector-Based Classification Lookup Tables
Packet classification is widely used in Software-Defined Networking (SDN). At present, packet classification is mainly implemented by software, such as OpenvSwitch, which has the disadvantage of low performance. On the Field Programmable Gate Array (FPGA)
Zilin Shi +5 more
doaj +1 more source
Interdomain I/O Optimization in Virtualized Sensor Networks
In virtualized sensor networks, virtual machines (VMs) share the same hardware for sensing service consolidation and saving power. For those VMs that reside in the same hardware, frequent interdomain data transfers are invoked for data analytics, and ...
Congfeng Jiang +6 more
doaj +1 more source
In pre-sensitizing events, immunological memory is mainly created via indirect allorecognition where CD4+ T cells recognize foreign peptides in the context of self-HLA class II (pHLA) presented on antigen-presenting cells.
Toshihide Tomosugi +14 more
doaj +1 more source
Toward Bounds on Parallel Execution Times of Task Graphs on Multicores With Memory Constraints
As more and more parallel programs are migrating to shared computing platforms, bounding their parallel execution times under resource constraints is particularly important for their efficient executions.
Jiangong Song, Qinyong Li, Shilong Ma
doaj +1 more source
Scientific applications often require high-bandwidth shared storage to perform joint simulations and collaborative data analytics. Shared memory pools provide a chance to satisfy such needs.
Awais Khan +3 more
doaj +1 more source
The use of list-learning paradigms to explore false memory has revealed several critical findings about the contributions of similarity and relatedness in memory phenomena more broadly. Characterizing the nature of “similarity and relatedness” can inform
Jennifer H. Coane +5 more
doaj +1 more source

