the proceedings contain 36 papers. the topics discussed include: heuristics for distributed systems clustering and mapping under network restrictions;a self-adaptive weighted sum technique for the joint optimization o...
ISBN:
(纸本)9781615675777
the proceedings contain 36 papers. the topics discussed include: heuristics for distributed systems clustering and mapping under network restrictions;a self-adaptive weighted sum technique for the joint optimization of performance and power consumption in data centers;static load balancing for cost minimization in distributed computingsystems;minimizing inter-iteration dependencies in multi-dimensional loops;a high performance Gibbs sampling algorithm for item response theory;parallel molecular dynamics on the cell architecture;resource discovery for query processing in data grids;scheduling real time tasks on heterogeneous reconfigurable devices;concurrent data processing for fusion simulation through distributed CCA component;and design and implement dynamic irregular parallel computation using the key-value-reference model.
the proceedings contain 21 papers. the topics discussed include: life on the trendmill;key microarchitectural innovations for future microprocessors;the challenges of multicore: information and mis-information;extract...
the proceedings contain 21 papers. the topics discussed include: life on the trendmill;key microarchitectural innovations for future microprocessors;the challenges of multicore: information and mis-information;extracting coarse-grained pipelined parallelism out of sequential applications for parallel processor arrays;parallelization approaches for hardware accelerators - loop unrolling versus loop partitioning;evaluation sampling based hotspot detection;a reconfigurable bloom filter architecture for BLASTN;SoCWire: a robust and fault tolerant network-on-chip approach for a dynamic reconfigurable system-on-chip in FPGAs;a light-weight approach to dynamical runtime linking supporting heterogeneous, parallel, and reconfigurable architectures;and ultra-fast downloading of partial bitstreams through Ethernet.
the proceedings contain 22 papers. the topics discussed include: a code-based analytical approach for using separate device coprocessors in computingsystems;scalability evaluation of a polymorphic register file: a CG...
ISBN:
(纸本)9783642191367
the proceedings contain 22 papers. the topics discussed include: a code-based analytical approach for using separate device coprocessors in computingsystems;scalability evaluation of a polymorphic register file: a CG case study;using Amdahl's law for performance analysis of many-core SoC architectures based on functionally asymmetric processors;application-aware power saving for online transaction processing using dynamic voltage and frequency scaling in a multicore environment;emulating transactional memory on FPGA multiprocessors;architecture of an adaptive test system built on FPGAs;analysis of execution efficiency in the microthreaded processor UTLEON3;a dynamic instruction scratchpad memory for embedded processors managed by hardware;exploring the Prefetcher/memory controller design space: an opportunistic Prefetch scheduling strategy;and compiler-assisted selection of a software transactional memory system.
Large language models (LLMs) are widely used for natural language understanding and text generation. An LLM model relies on a time-consuming step called LLM decoding to generate output tokens. Several prior works focu...
详细信息
A recent multiagent reinforcement learning method, the interactive advantage actor critic (IA2C), engages in individual agent training coupled with decentralized execution by predicting the other agents’ actions from...
详细信息
As robotic technologies advance, robotic arm manipulation tasks in complex environments become increasingly important. this paper presents a new collaborative pushing and grasping strategy to address two major challen...
详细信息
Critical embedded software, such as spacecraft flight software, requires high reliability, efficiency, and real-time performance while being capable enough to meet application needs. the increasing prevalence of Linux...
详细信息
Addition is a central operation in microcontrollers and hence faults should be detected for safety reasons. We extend the principle of recomputing with shifted operands (RESO) by doing the re-computation concurrently ...
详细信息
Addition is a central operation in microcontrollers and hence faults should be detected for safety reasons. We extend the principle of recomputing with shifted operands (RESO) by doing the re-computation concurrently to the computation in the case of small operands. thus, we generate a solution cheaper than two adders and faster than simple repetition. To extend RESO, we consider the actual bit-widths of the operands. We validate our method with data from static code analysis of two application kernels.
the goal of the workshop is to clarify the relationship between business process management and service provisioning. this relatively recent area of interest requires the development of concepts and methods to assist ...
详细信息
ISBN:
(纸本)9781424455638
the goal of the workshop is to clarify the relationship between business process management and service provisioning. this relatively recent area of interest requires the development of concepts and methods to assist the engineering and the management of Service-Oriented Enterprise architectures and their support systems. Five peer-reviewed papers have been presented during the workshop. they allowed to characterize the strong relationship existing between Business Process Management and Service oriented Enterprise architecture.
Computer hardware is always in danger of being hit by ionized particles which cause different kinds of faults. In this paper, the effect of transient soft-errors on the stages of parallel pipelines is investigated by ...
详细信息
ISBN:
(纸本)9783800731336
Computer hardware is always in danger of being hit by ionized particles which cause different kinds of faults. In this paper, the effect of transient soft-errors on the stages of parallel pipelines is investigated by the example of emergent algorithms and machine vision. A fault injection model is introduced and the corresponding protection scheme is presented. During simulation, the number of relevant faults showed to be relatively small and the effect on the pipelines was mostly negligible. However, the costs for protection are low possibly making use of protection worthwhile.
暂无评论