• No results found

[PDF] Top 20 Matching Data Intensive Applications and Hardware/Software Architectures

Has 10000 "Matching Data Intensive Applications and Hardware/Software Architectures" found on our website. Below are the top 20 most common "Matching Data Intensive Applications and Hardware/Software Architectures".

Matching Data Intensive Applications and Hardware/Software Architectures

Matching Data Intensive Applications and Hardware/Software Architectures

... compare data intensive architectures and decide which applications fit which machines and which ...big data applications to identify characteristics of data ... See full document

78

Secure Hardware-Software Architectures for Robust Computing Systems

Secure Hardware-Software Architectures for Robust Computing Systems

... Management System built on top of django. The benefit of the Django/Django-cms combo is that they provide a clear, well documented Application Programming Interface. They are much more compact than other solutions which ... See full document

17

A Tale of Two Data Intensive Paradigms: Applications, Abstractions and Architectures

A Tale of Two Data Intensive Paradigms: Applications, Abstractions and Architectures

... for data intensive problems even though commercial clouds presumably devote more resources to data analytics than supercomputers devote to ...compare data intensive architectures ... See full document

35

Hardware/software co-design for data-intensive genomics workloads

Hardware/software co-design for data-intensive genomics workloads

... where hardware/software co-design is fundamental is ...intermediate data structures stored in main memory for good ...genomics applications are usually scaled-out to multiple compute ... See full document

115

Autotuning Memory-Intensive Software for Node Architectures

Autotuning Memory-Intensive Software for Node Architectures

... for data-intensive ...provide data as fast as CPU ...parallelism, hardware and software prefetching, are used to hide memory access ...provide data as much as CPU ...node ... See full document

97

Hardware Efficient Pattern Matching Algorithms and Architectures for Fast Intrusion Detection.

Hardware Efficient Pattern Matching Algorithms and Architectures for Fast Intrusion Detection.

... current software-based intrusion detection systems do not have the speed required to protect computer networks in ...AC-based software intrusion detection systems generally use huge data structures ... See full document

142

Enclave Computing Paradigm: Hardware-assisted Security Architectures & Applications

Enclave Computing Paradigm: Hardware-assisted Security Architectures & Applications

... co-processor-based, hardware-only Trusted Computing Base ( TCB ), preemption of enclaves, upgrade-able TCB , and backwards ...of hardware and ...of data stored to memory outside the SoC ... See full document

256

Many-Core Architectures: Hardware-Software Optimization and

Modeling Techniques

Many-Core Architectures: Hardware-Software Optimization and Modeling Techniques

... vision applications is usually a parallel kernel scanning each frame, and applying the same algorithm to different ...contiguous data, likely to stay in the same cache ... See full document

184

Latency-aware dynamic voltage and frequency scaling on many-core architectures for data-intensive applications

Latency-aware dynamic voltage and frequency scaling on many-core architectures for data-intensive applications

... real hardware determining the power efficiency of the power management ...a data-intensive benchmark, Graph 500 ...in data- intensive applications (up to 31% energy saving and 60% ... See full document

7

MapReduce and Data Intensive Applications

MapReduce and Data Intensive Applications

... scientific applications because it incorporates different perspectives for the use of both hardware and ...distributed data processing architecture, instantiating the new paradigm of “bring the ... See full document

10

Entity matching with transformer architectures - a step forward in data integration

Entity matching with transformer architectures - a step forward in data integration

... transformer architectures require very resource-intensive pre- training on large amounts of ...to hardware constrains, we always used the smallest available pre-trained ... See full document

11

Big Data Applications, Software and System Architectures

Big Data Applications, Software and System Architectures

... big Data applications are drawn from a study from NIST and the layered software from a compendium of open- source, commercial and HPC ..."big data analytics" Machine learning with varied ... See full document

69

Big Data Applications, Software, Hardware and Curricula

Big Data Applications, Software, Hardware and Curricula

... McKinsey Institute on Big Data Jobs • There will be a shortage of talent necessary for organizations to take advantage of big data. By 2018, the United States alone could face a shortage of 140,000 to ... See full document

71

Techniques for efficient regular expression matching across hardware architectures

Techniques for efficient regular expression matching across hardware architectures

... In this section, we analyze how the number of DFAs affects the overall performance. In Table 3.6, we can see the DFAs generated by our double set implementation. Table 3.7 shows the corresponding performance results and ... See full document

79

On Performance of GPU and DSP Architectures for Computationally Intensive Applications

On Performance of GPU and DSP Architectures for Computationally Intensive Applications

... Thus for the 7-class system, the final version of the original code parallelized with as many GPU optimizations as could be found resulted in a final per prediction time of 835µs, 410µ[r] ... See full document

82

Memory Intensive Architectures for DSP and Data Communication

Memory Intensive Architectures for DSP and Data Communication

... In the design of the forwarding engines, two types of forwarding schemes were suggested. In the first scheme, which uses a trie-based approach, a novel method to compress the forwarding table information was used to ... See full document

137

Hardware and Software Requirements for Server Applications

Hardware and Software Requirements for Server Applications

... Minimum Hardware Requirements Statement Any recommendations regarding personal computers, servers and applications which may be implemented using RMG Networks software are based on RMG's experience ... See full document

7

Applications of obfuscation to software and hardware systems

Applications of obfuscation to software and hardware systems

... Total obfuscation is a transformation of a program P into an equivalent program P' such that one can’t understand what P' is doing (i.e. one can’t learn the functionality of P from the[r] ... See full document

33

Hardware and Software Requirements for Server Applications

Hardware and Software Requirements for Server Applications

... Minimum Hardware Requirements Statement Any recommendations regarding personal computers, servers and applications which may be implemented using RMG Networks software are based on RMG's experience ... See full document

7

Deploying Safety Critical Applications on Complex Avionics Hardware Architectures

Deploying Safety Critical Applications on Complex Avionics Hardware Architectures

... the hardware architecture is ...the hardware architecture, and to pre-vali- date its ...different architectures could be fast analyzed and compared, based on results from ex- perimental spatial ... See full document

7

Show all 10000 documents...