75 research outputs found
Recommended from our members
Modeling and Analysis Using Computational Tools
This book chapter presents two special algorithms, Mean Value Analysis and Convolution Algorithm, for the analysis of closed queuing networks, and an introduction to simulation techniques that are widely used in analyzing queuing systems in general
Optimization of Storage-Referencing Gestures
We describe techniques for identifying and optimizing memory-accessing instruction sequences. We capture a sequence of such instructions, with the goal of sending the sequence as a single instruction from the CPU to a smart memory subsystem (IRAM or PIM). With a software/hardware codesign, the memory-accessing gestures can be rewritten as succinct superoperator instructions, and the gestures themselves could vary at runtime. As a result, the CPU executes fewer instructions and the CPU-memory bus is charged less often, resulting in lower power consumption. Reduction in power can be crucial for constrained, embedded systems. We discover gestures using a static and a dynamic approach, and we present data showing the presence of such gestures in real benchmarks (Java and C). We have shown the gesture-minimization problem to be NP-Complete, so we offer in this paper a heuristic approach the effectiveness of which we evaluate with experiments
Recommended from our members
An Efficient Non-Preemptive Real-Time Scheduling
This paper discusses non-preemptive, real-time scheduling
Recommended from our members
A Non-Preemptive Scheduling Algorithm for Soft Real-Time Systems
This article discusses a non-preemptive scheduling algorithm for soft real-time systems
Recommended from our members
Performance Enhancement by Eliminating Redundant Function Execution
This paper discusses performance enhancement by eliminating redundant function execution
Recommended from our members
Self-Configuring Wireless MEMS Network
This presentation discusses miniature, lightweight, self-powered wireless sensors, and networking software needs
Recommended from our members
NextGen-Malloc: Giving Memory Allocator Its Own Room in the House
Article describes how memory allocation and management have a significant impact on performance and energy of modern applications. The authors observe that performance can vary by as much as 72% in some applications based on which memory allocator is used, and in this paper, the authors make a case for offloading memory allocation (and other similar management functions) from main processing cores to other processing units to boost performance, reduce energy consumption, and customize services to specific applications or application domains
Identifying water stress-response mechanisms in citrus by in silico transcriptome analysis
Annual (2023) taxonomic update of RNA-directed RNA polymerase-encoding negative-sense RNA viruses (realm Riboviria: kingdom Orthornavirae: phylum Negarnaviricota)
55 Pág.In April 2023, following the annual International Committee on Taxonomy of Viruses (ICTV) ratification vote on newly proposed taxa, the phylum Negarnaviricota was amended and emended. The phylum was expanded by one new family, 14 new genera, and 140 new species. Two genera and 538 species were renamed. One species was moved, and four were abolished. This article presents the updated taxonomy of Negarnaviricota as now accepted by the ICTV.This work was supported in part through the Laulima Government Solutions, LLC, prime contract with the U.S. National Institute of Allergy and Infec tious Diseases (NIAID) under Contract No. HHSN272201800013C. J.H.K. performed this work as an employee of Tunnell Government Services (TGS), a subcontractor of Laulima Government Solutions, LLC, under Contract No. HHSN272201800013C. U.J.B. was supported by the Division of Intramural Resarch, NIAID. This work was also funded in part by Contract No. HSHQDC15-C-00064 awarded by DHS S and T for the management and operation of The National Biodefense Analysis and Countermeasures Centre, a federally funded research and development centre operated by the Battelle National Biodefense Institute (V.W.); and NIH contract HHSN272201000040I/HHSN27200004/D04 and grant R24AI120942 (N.V., R.B.T.). S.S. acknowl edges support from the Mississippi Agricultural and Forestry Experiment Station (MAFES), USDA-ARS project 58-6066-9-033 and the National Institute of Food and Agriculture, U.S. Department of Agriculture, Hatch Project, under Accession Number 1021494. The funders had no role in the design of the study; in the collection, analysis, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results. The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. Department of the Army, the U.S. Department of Defence, the U.S. Department of Health and Human Services, including the Centres for Disease Control and Prevention, the U.S. Department of Homeland Security (DHS) Science and Technology Directorate (S and T), or of the institutions and companies affiliated with the authors. In no event shall any of these entities have any responsibility or liability for any use, misuse, inability to use, or reliance upon the information contained herein. The U.S. departments do not endorse any products or commercial services mentioned in this publication. The U.S. Government retains and the publisher, by accepting the article for publication, acknowledges that the U.S.Government retains a non-exclusive, paid up, irrevocable, world-wide license to publish or reproduce the published form of this manuscript, or allow others to do so, for U.S. Government purposes.Peer reviewe
- …
