2,058 research outputs found

    Fast N-Gram Language Model Look-Ahead for Decoders With Static Pronunciation Prefix Trees

    Get PDF
    Decoders that make use of token-passing restrict their search space by various types of token pruning. With use of the Language Model Look-Ahead (LMLA) technique it is possible to increase the number of tokens that can be pruned without loss of decoding precision. Unfortunately, for token passing decoders that use single static pronunciation prefix trees, full n-gram LMLA increases the needed number of language model probability calculations considerably. In this paper a method for applying full n-gram LMLA in a decoder with a single static pronunciation tree is introduced. The experiments show that this method improves the speed of the decoder without an increase of search errors.\u

    Token-passing nets for functional languages

    Get PDF
    Proceedings of the 7th International Workshop on Reduction Strategies in Rewriting and Programming (WRS 2007)Token-passing nets were proposed by Sinot as a simple mechanism for encoding evaluation strategies for the λ-calculus in interaction nets. This work extends token-passing nets to cover a typed functional language equipped with structured types and unrestricted recursion. The resulting interaction system is derived systematically from the chosen big-step operational semantics. Along the way, we actually characterize and discuss several design decisions of token-passing nets and extend them in order to achieve simpler interaction net systems with a higher degree of embedded parallelism.Fundação para a Ciência e a Tecnologia (FCT

    Cohesive token passing algorithm utilizing software agents

    Get PDF
    The communications domain has utilized the implementation of protocols for a wide spectrum of applications. This encompasses Medium Access Control (MAC) protocols. MAC protocols have been extensively researched from several angles. This encompasses the implementation in the area of Wave Division Multiplexing (WDM) networks and Mobile Adhoc Networks (MANET). The relevance of intelligence in sustaining the pre-requisites for dynamic reconfiguration has gained an integral attention in MANET. Approach: The implementation of Token Ring in MANET can be correlated to its complementary implementation in IP networks. In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. An enhanced Token Ring protocol governed by intelligent processing has been implemented in this paper. The core of the new protocol is based on the circulation mechanism of the token. As opposed to the traditional circulatory mechanism, a software agent is designed to become an intelligent circulatory agent is this research. The developed software agent is utilized to implement prioritized token access subject to the traffic type. Each station is coupled with a software agent who cohesively collaborates to assign the token. Results: The proposed agent and the enhanced Token Ring implementation have been extensively verified through simulation experiments. A complete circulation of the ring is defined upon all nodes being visited at least once. Discrete-event simulation models were developed and deployed for the purpose of performance analysis. The results acquired validated the improved results of the new software agent based implementation. The performance metrics studied were average delay and average buffer utilization. Conclusion: The proposed algorithm has enabled to derive an ideal balance between the complexity of intelligent processing and the versatility of managing the token ring

    The virtual token-passing Ethernet implementation and experimental results

    Get PDF
    This paper presents the design and first experimental results of VTPE (Virtual Token-passing Ethernet). VTPE \nis a deterministic protocol for real-time applications based on shared Ethernet, aimed to be used either in small \nprocessing power processors or in powerful ones. It is based on implicit token rotation similar to the virtual \ntoken-passing used in the P-NET protocol. The VTPE implementation leads to reduced program code, thus \nfitting in small microcontrollers' memory and imposing low communication overhead. \

    Simulation analysis of a switched event building architecture using token by-pass

    Get PDF
    At High Energy Physics experiments, extensive parallelism allowsscalable, high-bandwidth data acquisition systems. On-line eventbuilding of physical events is only feasible by using switch-basedevent builders. A scalable switch-based event building architectureis introduced. A special, non-starving token passing mechanismprovides high throughput for acquisition of stochastic detector data.The event building architecture with the associated event building method is analyzed by simulation
    corecore