GPGPU has been widely used in recent years in both academia and industry. Many research for benchmarks on GPUs were reported to achieve over 100 times speedup, however, due to the high overhead of data transfer betwee...
详细信息
In order to minimize the conflict miss rate, cache memories can be organized in set-associative manner. The downside of increasing the associativity is increase in the per access energy consumption. In conventional n-...
详细信息
In order to minimize the conflict miss rate, cache memories can be organized in set-associative manner. The downside of increasing the associativity is increase in the per access energy consumption. In conventional n-way set-associative caches, irrespective of the set-wise demand, each set has n cache ways at its disposal, but cache sets may exhibit non-uniform demand for these cache ways. Exploiting this property, we propose a novel cache architecture, called way sharing cache, wherein by allowing sharing of cache ways among a pair of cache sets, we obtain dynamic energy savings as high as 41% in DL1 cache with negligible performance penalty.
Since early ages, people tried to predicate earthquakes using simple observations such as strange or atypical animal behavior. In this paper, we study data collected from past earthquakes to give better forecasting fo...
详细信息
The performance of a mesh network is mainly affected by the utilized routing protocol and its capability to detect topology changes and to select stable and reliable routes. In real-world scenarios, a high fraction of...
详细信息
The performance of a mesh network is mainly affected by the utilized routing protocol and its capability to detect topology changes and to select stable and reliable routes. In real-world scenarios, a high fraction of links have asymmetric characteristics which has to be concerned by routing protocols in order to find optimized routes. The latest version of the Better Approach to Mobile Adhoc Networking protocol (B.A.T.M.A.N.) introduces its own routing metric, addressing the problem of integrating asymmetric links efficiently in the network topology. In this work, we compare version III and IV of the B.A.T.M.A.N protocol in terms of delivery ratio, average end-to-end hop count and generated overhead in two scenarios with a high fraction of asymmetric links to assess the quality of the newly introduced mechanisms on the performance of the protocol.
Nowadays, a large user community uses the Internet as a platform for manifold interactions. While sharing content, communicating or collaborating, users share a common context which can be exploited by services to ada...
详细信息
Nowadays, a large user community uses the Internet as a platform for manifold interactions. While sharing content, communicating or collaborating, users share a common context which can be exploited by services to adapt to users needs or to support collaborations. In this paper, we introduce group context as a means for clearly separating individual context knowledge from context information shared among the members of a group in a social interaction. Group context is established by a negotiation process among all group members keeping all participants under control of their individual context knowledge. We introduce a modeling approach for group context and define a process to establish group context based on the individual context of all group members. The feasibility of our approach is illustrated based on a social networking scenario.
In this paper, an actual system based on wavelet transform and artificial neural networks was established to diagnose different types of fault in a gearbox. As a key step, biorthogonal wavelet was used to denoise in f...
详细信息
Using directional antennas in Wireless Ad hoc Networks (WANETs) offers great potential of reducing the radio interference, and improving the communication throughput. Directional antennas, however, introduces new prob...
详细信息
Using directional antennas in Wireless Ad hoc Networks (WANETs) offers great potential of reducing the radio interference, and improving the communication throughput. Directional antennas, however, introduces new problems in the wireless Media Access Control (MAC), that is, the deafness and new hidden terminal problem, which may cause severe performance degradation. To solve the problems, we propose an effective Circular RTR Directional MAC (CRDMAC) protocol for WANETs by using a sub-transmission channel and Ready to Receive (RTR) packets, which modifies the IEEE 802.11 Distributed Coordinated Function (DCF). The sub-channel avoids collisions to other ongoing transmission, and the RTR packets notify the neighbor nodes that the mutual transmission has been finished. We evaluate the CRDMAC protocol through simulations and the results show that the proposed protocol outperforms existing DMAC (directional MAC) protocol and the CRCM (Circular RTS and CTS MAC) protocol in terms of throughput and packet drop rate.
Software composed of artifacts written in multiple (programming) languages is pervasive in today's enterprise, desktop, and mobile applications. Since they form one system, artifacts from different languages refer...
详细信息
Software composed of artifacts written in multiple (programming) languages is pervasive in today's enterprise, desktop, and mobile applications. Since they form one system, artifacts from different languages reference one another, thus creating what we call semantic cross-language links. By their very nature, such links are out of scope of the individual programming language, they are ignored by most language-specific tools and are often only established -- and checked for errors -- at runtime. This is unfortunate since it requires additional testing, leads to brittle code, and lessens maintainability. In this paper, we advocate a generic approach to understanding, analyzing and refactoring cross-language code by explicitly specifying and exploiting semantic links with the aim of giving developers the same amount of control over and confidence in multi-language programs they have for single-language code today.
暂无评论