6,618 research outputs found
UMSL Bulletin 2023-2024
The 2023-2024 Bulletin and Course Catalog for the University of Missouri St. Louis.https://irl.umsl.edu/bulletin/1088/thumbnail.jp
Worst-Case Communication Time Analysis for On-Chip Networks with Finite Buffers
Network-on-Chip (NoC) is the ideal interconnection architecture for many-core systems due to its superior scalability and performance. An NoC must deliver critical messages from a realtime application within specific deadlines. A violation of this requirement may compromise the entire system operation. Therefore, a series of experiments considering worst-case scenarios must be conducted to verify if deadlines can be satisfied. However, simulation-based experiments are time-consuming, and one alternative is schedulability analysis. In this context, this work proposes a schedulability analysis to
accelerate design space exploration in real-time applications on NoC-based systems. The proposed worstcase analysis estimates the maximum latency of traffic flows assuming direct and indirect blocking. Besides, we consider the size of buffers to reduce the analysis’ pessimism. We also present an extension of the analysis, including self-blocking. We conduct a series of experiments to evaluate the proposed analysis using a cycle-accurate simulator. The experimental results show that the proposed solution presents tighter results and runs four orders of magnitude faster than the simulation.N/
2023-2024 academic bulletin & course catalog
University of South Carolina Aiken publishes a catalog with information about the university, student life, undergraduate and graduate academic programs, and faculty and staff listings
2023-2024 Undergraduate Catalog
2023-2024 undergraduate catalog for Morehead State University
Accurate Measures of Vaccination and Concerns of Vaccine Holdouts from Web Search Logs
To design effective vaccine policies, policymakers need detailed data about
who has been vaccinated, who is holding out, and why. However, existing data in
the US are insufficient: reported vaccination rates are often delayed or
missing, and surveys of vaccine hesitancy are limited by high-level questions
and self-report biases. Here, we show how large-scale search engine logs and
machine learning can be leveraged to fill these gaps and provide novel insights
about vaccine intentions and behaviors. First, we develop a vaccine intent
classifier that can accurately detect when a user is seeking the COVID-19
vaccine on search. Our classifier demonstrates strong agreement with CDC
vaccination rates, with correlations above 0.86, and estimates vaccine intent
rates to the level of ZIP codes in real time, allowing us to pinpoint more
granular trends in vaccine seeking across regions, demographics, and time. To
investigate vaccine hesitancy, we use our classifier to identify two groups,
vaccine early adopters and vaccine holdouts. We find that holdouts, compared to
early adopters matched on covariates, are 69% more likely to click on untrusted
news sites. Furthermore, we organize 25,000 vaccine-related URLs into a
hierarchical ontology of vaccine concerns, and we find that holdouts are far
more concerned about vaccine requirements, vaccine development and approval,
and vaccine myths, and even within holdouts, concerns vary significantly across
demographic groups. Finally, we explore the temporal dynamics of vaccine
concerns and vaccine seeking, and find that key indicators emerge when
individuals convert from holding out to preparing to accept the vaccine
Optimal Multiprocessor Locking Protocols Under FIFO Scheduling
Real-time locking protocols are typically designed to reduce any priority-inversion blocking (pi-blocking) a task may incur while waiting to access a shared resource. For the multiprocessor case, a number of such protocols have been developed that ensure asymptotically optimal pi-blocking bounds under job-level fixed-priority scheduling. Unfortunately, no optimal multiprocessor real-time locking protocols are known that ensure tight pi-blocking bounds under any scheduler. This paper presents the first such protocols. Specifically, protocols are presented for mutual exclusion, reader-writer synchronization, and k-exclusion that are optimal under first-in-first-out (FIFO) scheduling when schedulability analysis treats suspension times as computation. Experiments are presented that demonstrate the effectiveness of these protocols
2023-2024 Boise State University Undergraduate Catalog
This catalog is primarily for and directed at students. However, it serves many audiences, such as high school counselors, academic advisors, and the public. In this catalog you will find an overview of Boise State University and information on admission, registration, grades, tuition and fees, financial aid, housing, student services, and other important policies and procedures. However, most of this catalog is devoted to describing the various programs and courses offered at Boise State
Cyberbullying in educational context
Kustenmacher and Seiwert (2004) explain a man’s inclination to resort to technology in his interaction with the environment and society. Thus, the solution to the negative consequences of Cyberbullying in a technologically dominated society is represented by technology as part of the technological paradox (Tugui, 2009), in which man has a dual role, both slave and master, in the interaction with it. In this respect, it is noted that, notably after 2010, there have been many attempts to involve artificial intelligence (AI) to recognize, identify, limit or avoid the manifestation of aggressive behaviours of the CBB type. For an overview of the use of artificial intelligence in solving various problems related to CBB, we extracted works from the Scopus database that respond to the criterion of the existence of the words “cyberbullying” and “artificial intelligence” in the Title, Keywords and Abstract. These articles were the subject of the content analysis of the title and, subsequently, only those that are identified as a solution in the process of recognizing, identifying, limiting or avoiding the manifestation of CBB were kept in the following Table where we have these data synthesized and organized by years
- …