The paper presents a taxonomy of the existing forms of parallel computer architectures, based on the characteristics of the hardware architecture and the abstract machine layered upon it. The abstract machine reflects...
详细信息
The paper presents a taxonomy of the existing forms of parallel computer architectures, based on the characteristics of the hardware architecture and the abstract machine layered upon it. The abstract machine reflects the programming models provided. The main classes of hardware architectures are: physically shared memory systems and distributed memory systems. Distributed memory systems may be remote memory access architectures or message passing architectures. The major forms of abstract machine architecture are: message passing systems and logically shared memory architectures. Three solutions for logically shared memory architectures are known (1) distributed shared memory architectures, (2) multi-threaded architectures, and (3) virtual shared memory architectures. All three types are discussed in detail under the aspects of performance, programmability, and scalability, and their corresponding programming paradigms are characterized. The implications of the three concepts on node architecture and the requirements of latency minimization or latency hiding are discussed and illustrated by examples taken from pioneering realizations of the three kinds of architecture such as DASH, *T, and MANNA.
A major attribute of telecommunications software systems is change. For evolving telecom systems, significant expertise is needed to effectively handle and capitalize on these changes. This paper discusses some of the...
详细信息
A major attribute of telecommunications software systems is change. For evolving telecom systems, significant expertise is needed to effectively handle and capitalize on these changes. This paper discusses some of the key dimensions of change that occur during telecom systems software development, the areas of expertise that software developers apply in managing these changes, and some of the means by which high-performing project members have overcome the learning curves associated with these systems. We base our results on data gathered from several Bell Labs multiyear development projects and interviews with experienced staff.
In the era of rapid societal modernization, the issue of crime stands as an intrinsic facet, demanding our attention and consideration. As our communities evolve and adopt technological advancements, the dynamic lands...
详细信息
Next-generation 6G networks will significantly advance the development of integrated sensing, communication, and computing (ISSC) systems, particularly in collection and processing of point cloud data. High bandwidth ...
详细信息
Next-generation 6G networks will significantly advance the development of integrated sensing, communication, and computing (ISSC) systems, particularly in collection and processing of point cloud data. High bandwidth and low latency offered by 6G enable sensors to generate high-resolution point cloud data more efficiently, providing precise geometric information for tunnel lining inspections. As a key application within ISSC systems, tunnel lining detection has garnered widespread attention in the transportation and infrastructure sectors, helping to enhance the structural stability of tunnels and ensure their long-term safe operation. However, current tunnel inspection methods often require extensive experimental data and struggle to effectively extract features from tunnel objects. In this article, we propose a novel point cloud semantic segmentation (PCSS) network built upon few-shot learning for tunnel detection, capable of segmenting various essential elements within the tunnel, such as bolts, pipes, and tracks. First, due to the prevalent issue of sample imbalance in tunnel point cloud data, we introduce few-shot learning to tackle this challenge, enabling the model to perform effective semantic segmentation with limited data samples. Second, recognizing that different objects and structures within the tunnel scene may exhibit significant scale variations, we employ multiembedding networks to capture features at various scales within the point cloud data. Additionally, we propose a heterogeneous feature interaction (HFI) module to merge features derived from distinct embedding networks.
Managing dependencies between software development artifacts helps achieve traceability and consistency in software-intensive systems. Traceability supports the alignment between different stakeholder concerns, develo...
详细信息
作者:
Slewe, THoogenboom, MManaging consultant
specializing in security and architecture Capgemini The Netherlands. Principal consultant
specializing in connecting architecture studies to software engineering projects Capgemini The Netherlands
In the not-so-distant past, bandits and highwaymen frequently roamed themajor transportation routes robbing travelers and the pony express of gold, money, and otherprecious assets. In the current digital age, except f...
详细信息
In the not-so-distant past, bandits and highwaymen frequently roamed themajor transportation routes robbing travelers and the pony express of gold, money, and otherprecious assets. In the current digital age, except for few retail transactions where paper money orcoins are used, money and money flows are represented by information about financial assets owned,owed, or transferred to another party. When information is no longer isolated, surrounded by thickwalls, or guarded by armed security personnel, and never locked in a safe, it seems an almostimpossible task to provide security for money.
It has become clear that spacecraft system complexity is reaching a threshold where customary methods of control are no longer affordable or sufficiently reliable. At the heart of this problem are the conventional app...
详细信息
A reproducing kernel collocation method based on strong formulation is introduced for transient dynamics. To study the stability property of this method, an algorithm based on the von Neumann hypothesis is proposed to...
详细信息
A reproducing kernel collocation method based on strong formulation is introduced for transient dynamics. To study the stability property of this method, an algorithm based on the von Neumann hypothesis is proposed to predict the critical time step. A numerical test is conducted to validate the algorithm. The numerical critical time step and the predicted critical time step are in good agreement. The results are compared with those obtained based on the radial basis collocation method, and they axe in good agreement. Several important conclusions for choosing a proper support size of the reproducing kernel shape function are given to improve the stability condition.
We describe a methodology for precise quantitative measurement of technology impact on software change effort. The methodology employs measures of small software changes to determine the effect of technology. We illus...
详细信息
We describe a methodology for precise quantitative measurement of technology impact on software change effort. The methodology employs measures of small software changes to determine the effect of technology. We illustrate this approach in a detailed case study on the impact of using two particular technologies-a version-sensitive source code editor and a domain-engineered application environment-in a telecommunications product In both cases, the change effort was reduced. The methodology can precisely measure cost savings in change effort and is simple and inexpensive, since it relies on information automatically collected by Version control systems.
暂无评论