We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Compiler Optimization for Irregular Memory Access Patterns in PGAS Programs

    Irregular memory access patterns pose performance and user productivity challenges on distributed-memory systems. They can lead to fine-grained...
    Thomas B. Rolinger, Christopher D. Krieger, Alan Sussman in Languages and Compilers for Parallel Computing
    Conference paper 2023
  2. File Access Patterns of Distributed Deep Learning Applications

    Nowadays, Deep Learning (DL) applications have become a necessary solution for analyzing and making predictions with big data in several areas....
    Edixon Parraga, Betzabeth Leon, ... Emilio Luque in Cloud Computing, Big Data & Emerging Topics
    Conference paper 2022
  3. Debugging Architecture Patterns

    You now have enough background material that I can introduce debugging architecture patterns in this chapter. These are solutions to common problems...
    Chapter 2024
  4. Informed Memory Access Monitoring

    Memory monitoring is of critical use in understanding applications and evaluating systems. Due to the dynamic nature in programs’ memory accesses,...
    Jidong Zhai, Yuyang **, ... Weimin Zheng in Performance Analysis of Parallel Applications for HPC
    Chapter 2023
  5. Debugging Presentation Patterns

    In this chapter, you will look at another Python IDE, Jupyter Notebook and Lab, with a case study introducing a few more debugging analysis...
    Chapter 2024
  6. Behavioral Patterns

    In this chapter, we discuss how behavioral patterns in NLP models can be analyzed. We discuss how models can be systematically tested for linguistic...
    Lisa Beinborn, Nora Hollenstein in Cognitive Plausibility in Natural Language Processing
    Chapter 2024
  7. Automatic Discovery of Collective Communication Patterns in Parallelized Task Graphs

    Collective communication APIs equip MPI vendors with the necessary context to optimize cluster-wide operations on the basis of theoretical complexity...

    Fabian Knorr, Philip Salzmann, ... Thomas Fahringer in International Journal of Parallel Programming
    Article Open access 22 March 2024
  8. Error Patterns

    The next block of patterns we cover is Error Patterns. These patterns are related to error and failure messages, either explicitly stating that there...
    Chapter 2023
  9. Privileged Access Management (PAM)

    Privileged Access Management (PAM) is a subdiscipline within the Identity and Access Management framework. PAM can be implemented and can operate on...
    Morey J. Haber, Darran Rolls in Identity Attack Vectors
    Chapter 2024
  10. Access Control and Authorization

    Access control is a process to determine “Who does what to what,” based on a policy. One of the system administrator’s biggest problems, which can...
    Joseph Migga Kizza in Guide to Computer Network Security
    Chapter 2024
  11. Performance analysis of memory data layout for sub-block data access

    The design of Digital Signal Processing systems involving video data has many challenges other than the optimal design of the processing algorithms....

    Supriya Unnikrishnan, Sreelekha G in Multimedia Tools and Applications
    Article 17 August 2022
  12. Common Design Patterns

    Now that we have discussed the importance of good architecture and defined it (modular and testable), we need to achieve it. To do so, we need to...
    Eric Vennaro in iOS Development at Scale
    Chapter 2023
  13. Integration Patterns and Processes

    This chapter introduces and formally defines the basic building blocks when designing, implementing, and executing application integration processes...
    Stefanie Rinderle-Ma, Jürgen Mangler, Daniel Ritter in Fundamentals of Information Systems Interoperability
    Chapter 2024
  14. Software Design Patterns

    This chapter covers a great majority of the original design patterns published in the mid-1990s, with a focus on the design ideas behind the...
    Chapter 2023
  15. API Patterns

    APIs should be designed for longevity. Any change to an API carries the risk of breaking the client’s application code. Frequent changes to an API...
    Brajesh De in API Management
    Chapter 2023
  16. Open access research outputs receive more diverse citations

    The goal of open access is to allow more people to read and use research outputs. An observed association between highly cited research outputs and...

    Chun-Kai Huang, Cameron Neylon, ... Katie Wilson in Scientometrics
    Article Open access 08 January 2024
  17. Bioinspired FHE model with recursive revokable selective access control for attribute-based privacy preservation

    Access control and authentication are two aspects of cyber-physical systems that improve their usability, security and accessibility. Along with...

    Namrata Jiten Patel, Ashish Jadhav in International Journal of Information Technology
    Article 12 October 2023
  18. Common Parallel Patterns

    Chapter 14 explores several common parallel patterns—map, stencil, reduction, scan, pack, and unpack—and discusses how they can be expressed in SYCL....
    James Reinders, Ben Ashbaugh, ... **nmin Tian in Data Parallel C++
    Chapter Open access 2023
  19. Edge AI Patterns

    This paper comprehensively explores a spectrum of AI patterns tailored for edge computing, including regular, branched, circular, serial, concurrent,...
    Conference paper 2023
  20. BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud

    Cloud computing technology offers flexible and expedient services that carry a variety of profits for both societies as well as individuals....

    M. Pavithra, M. Prakash, V. Vennila in Journal of Cloud Computing
    Article Open access 05 January 2024
Did you find what you were looking for? Share feedback.