Search
Search Results
-
Compiler Optimization for Irregular Memory Access Patterns in PGAS Programs
Irregular memory access patterns pose performance and user productivity challenges on distributed-memory systems. They can lead to fine-grained... -
File Access Patterns of Distributed Deep Learning Applications
Nowadays, Deep Learning (DL) applications have become a necessary solution for analyzing and making predictions with big data in several areas.... -
Debugging Architecture Patterns
You now have enough background material that I can introduce debugging architecture patterns in this chapter. These are solutions to common problems... -
Informed Memory Access Monitoring
Memory monitoring is of critical use in understanding applications and evaluating systems. Due to the dynamic nature in programs’ memory accesses,... -
Debugging Presentation Patterns
In this chapter, you will look at another Python IDE, Jupyter Notebook and Lab, with a case study introducing a few more debugging analysis... -
Behavioral Patterns
In this chapter, we discuss how behavioral patterns in NLP models can be analyzed. We discuss how models can be systematically tested for linguistic... -
Automatic Discovery of Collective Communication Patterns in Parallelized Task Graphs
Collective communication APIs equip MPI vendors with the necessary context to optimize cluster-wide operations on the basis of theoretical complexity...
-
Error Patterns
The next block of patterns we cover is Error Patterns. These patterns are related to error and failure messages, either explicitly stating that there... -
Privileged Access Management (PAM)
Privileged Access Management (PAM) is a subdiscipline within the Identity and Access Management framework. PAM can be implemented and can operate on... -
Access Control and Authorization
Access control is a process to determine “Who does what to what,” based on a policy. One of the system administrator’s biggest problems, which can... -
Performance analysis of memory data layout for sub-block data access
The design of Digital Signal Processing systems involving video data has many challenges other than the optimal design of the processing algorithms....
-
Common Design Patterns
Now that we have discussed the importance of good architecture and defined it (modular and testable), we need to achieve it. To do so, we need to... -
Integration Patterns and Processes
This chapter introduces and formally defines the basic building blocks when designing, implementing, and executing application integration processes... -
Software Design Patterns
This chapter covers a great majority of the original design patterns published in the mid-1990s, with a focus on the design ideas behind the... -
API Patterns
APIs should be designed for longevity. Any change to an API carries the risk of breaking the client’s application code. Frequent changes to an API... -
Open access research outputs receive more diverse citations
The goal of open access is to allow more people to read and use research outputs. An observed association between highly cited research outputs and...
-
Bioinspired FHE model with recursive revokable selective access control for attribute-based privacy preservation
Access control and authentication are two aspects of cyber-physical systems that improve their usability, security and accessibility. Along with...
-
Common Parallel Patterns
Chapter 14 explores several common parallel patterns—map, stencil, reduction, scan, pack, and unpack—and discusses how they can be expressed in SYCL.... -
Edge AI Patterns
This paper comprehensively explores a spectrum of AI patterns tailored for edge computing, including regular, branched, circular, serial, concurrent,... -
BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud
Cloud computing technology offers flexible and expedient services that carry a variety of profits for both societies as well as individuals....