We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 10,000 results
  1. Graph-Level Anomaly Detection via Hierarchical Memory Networks

    Graph-level anomaly detection aims to identify abnormal graphs that exhibit deviant structures and node attributes compared to the majority in a...
    Conference paper 2023
  2. Virtual Memory

    Virtual memory is a technique that allows the execution of the processes that may not be completely in memory. One major advantage of this scheme is...
    Pedro Mejia Alvarez, Marcelo Leon Ayala, Susana Ortega Cisneros in Main Memory Management on Relational Database Systems
    Chapter 2022
  3. HeterMM: applying in-DRAM index to heterogeneous memory-based key-value stores

    We propose HeterMM, a versatile framework that leverages in-DRAM indexes in KV stores on heterogeneous memory. HeterMM incorporates a plug-in...

    Yunhong Ji, Wentao Huang, Xuan Zhou in Frontiers of Computer Science
    Article 08 April 2024
  4. NEHASH: high-concurrency extendible hashing for non-volatile memory

    Extendible hashing is an effective way to manage increasingly large file system metadata, but it suffers from low concurrency and lack of...

    Tao Cai, Pengfei Gao, ... Jianfei Dai in Frontiers of Information Technology & Electronic Engineering
    Article 01 May 2023
  5. Iteration Structures

    This chapter shows how iterations structures work using flowcharts, pseudocode and Java. It includes pretest indefinite loop structures, both count...
    James T. Streib, Takako Soma in Guide to Java
    Chapter 2023
  6. Main memory controller with multiple media technologies for big data workloads

    SRAM and DRAM memory technologies have been dominant in the implementations of memory subsystems. In recent years, and mainly driven by the huge...

    Miguel A. Avargues, Manel Lurbe, ... Julio Sahuquillo in Journal of Big Data
    Article Open access 22 May 2023
  7. Pimo: memory-efficient privacy protection in video streaming and analytics

    Video streaming from cameras to backend cloud or edge servers for neural-based analytics has gained significant popularity. However, the transmission...

    Jie Yuan, Zicong Wang, ... Rui Qian in Multimedia Systems
    Article Open access 29 April 2024
  8. Predicting Memory Demands of BDD Operations Using Maximum Graph Cuts

    The BDD package Adiar manipulates Binary Decision Diagrams (BDDs) in external memory. This enables handling big BDDs, but the performance suffers...
    Steffan Christ Sølvsten, Jaco van de Pol in Automated Technology for Verification and Analysis
    Conference paper 2023
  9. Range Indexes on Non-Volatile Memory

    In this chapter, we survey range indexes built for non-volatile memory. They are typically built on top of B+-trees, tries, or a hybrid of both. Our...
    Kaisong Huang, Tianzheng Wang in Indexing on Non-Volatile Memory
    Chapter 2024
  10. Implementation of 16 Boolean logic operations based on one basic cell of spin-transfer-torque magnetic random access memory

    In-memory computing (IMC) systems based on emerging nonvolatile memories (NVMs) provide a thorough solution for memory wall issues and von Neumann...

    Yan Huang, Kaihua Cao, ... Weisheng Zhao in Science China Information Sciences
    Article 04 April 2023
  11. Chinese Named Entity Recognition Augmented with Lexicon Memory

    Inspired by the concept of content-addressable retrieval from cognitive science, we propose a novel fragmentbased Chinese named entity recognition...

    Yi Zhou, **ao-Qing Zheng, Xuan-**g Huang in Journal of Computer Science and Technology
    Article 30 September 2023
  12. Transformation of C Programming Language Memory Model into Object-Oriented Representation of EO Language

    Abstract—

    The paper analyzes the possibilities of transforming C programming language constructs into objects of EO programming language. The key...

    A. I. Legalov, Y. G. Bugayenko, ... A. N. Kamenskiy in Automatic Control and Computer Sciences
    Article 01 December 2023
  13. Distributed out-of-memory NMF on CPU/GPU architectures

    We propose an efficient distributed out-of-memory implementation of the non-negative matrix factorization (NMF) algorithm for heterogeneous...

    Ismael Boureima, Manish Bhattarai, ... Boian Alexandrov in The Journal of Supercomputing
    Article Open access 08 September 2023
  14. More Data Structures

    Welcome to Chapter 5 ! In this chapter, we’ll spend some more time exploring some common data structures provided...
    Chapter 2023
  15. Optimizing B+-tree for hybrid memory with in-node hotspot cache and eADR awareness

    The advance in Non-Volatile Memory (NVM) has changed the traditional DRAM-only memory system. Compared to DRAM, NVM has the advantages of...

    Peiquan **, Zhaole Chu, ... Shouhong Wan in Frontiers of Computer Science
    Article 23 December 2023
  16. Optimization of OLAP In-Memory Database Management Systems with Processing-In-Memory Architecture

    With the growing popularity of Processing-In-Memory (PIM) technology, many sectors of the industry are willing to take advantage of this new...
    Shima Hosseinzadeh, Amirhossein Parvaresh, Dietmar Fey in Architecture of Computing Systems
    Conference paper 2023
  17. Deep Memory-Augmented Proximal Unrolling Network for Compressive Sensing

    Map** a truncated optimization method into a deep neural network, deep proximal unrolling network has attracted attention in compressive sensing...

    Jiechong Song, Bin Chen, Jian Zhang in International Journal of Computer Vision
    Article 02 March 2023
  18. Memory Management

    Most programs work on more data than a typical processor can hold in its registers, so data needs to be stored in memory or long-term store (such as...
    Chapter 2022
  19. Memory enhancement method based on Skip-GANomaly for anomaly detection

    Unsupervised anomaly detection methods based on the Generative Adversarial Network have solved the problem of supervised anomaly detection methods...

    Wan Jiang, Kai Yang, ... Liming **e in Multimedia Tools and Applications
    Article 27 July 2023
Did you find what you were looking for? Share feedback.