نتایج جستجو برای: accesses to inputs

تعداد نتایج: 10618814  

Journal: :Poultry Science 1990

ژورنال: علوم آب و خاک 2009
سادات باریکانی, سیدحامد, ساسولی, محمدرضا, کاوسی کلاشمی, محمد, کوپاهی, مجید,

Risk and uncertainty have an important role in determining farmers' goals and their decision making. Risk affects optimal use of inputs and production efficiency. Using production inputs especially new inputs is one of the effective factors in production risk hence, it is necessary to obtain information about inputs use risk in order to find solution to risk management. For investigating effect...

Journal: :Journal of vascular surgery 2006
Juergen Zanow Karen Petzold Michael Petzold Ulf Krueger Hans Scholz

PURPOSE This study used intraoperative monitoring of the access flow to evaluate the results of flow reduction in the management of high-flow arteriovenous access-related symptoms of distal ischemia and cardiac insufficiency. METHODS A retrospective study was conducted of 95 patients (78 with ischemia, 17 with cardiac failure) who underwent flow reduction between 1999 and 2005. A preoperative...

Journal: :Perform. Eval. 2008
Peter G. Harrison Naresh M. Patel Soraya Zertal

Flash memory is becoming an increasingly important storage component among non-volatile storage devices. Its cost is decreasing dramatically, which makes it a serious competitor of disks and a candidate for enterprise-tier storage device of the future. Consequently, there is an urgent need for models and tools to analyse its behaviour and evaluate its effects on a system’s performance. We propo...

Journal: :IEEE Trans. Knowl. Data Eng. 1998
Elisa Bertino Elena Ferrari Giovanna Guerrini

The management of temporal data is a crucial requirement for many data intensive applications. A considerable research e ort have been devoted in the past years to query languages for temporal data in the context of the relational model. Recently, temporal object-oriented data models have been proposed. In this paper, we focus on the navigational approach to querying object-oriented databases a...

2005
Michael Venable Mohamed R. Chouchane Md. Enamul Karim Arun Lakhotia

Programmers obfuscate their code to defeat manual or automated analysis. Obfuscations are often used to hide malicious behavior. In particular, malicious programs employ obfuscations of stack-based instructions, such as call and return instructions, to prevent an analyzer from determining which system functions it calls. Instead of using these instructions directly, a combination of other instr...

2007
Mackale Joyner Zoran Budimlic Vivek Sarkar

One of the outcomes of DARPA’s HPCS program has been the creation of three new high productivity languages: Chapel, Fortress, and X10. While these languages have introduced improvements in language expressiveness and programmer productivity, several technical challenges still remain in delivering high performance with these languages. In the absence of optimization, the high-level language cons...

2015
Wei Ding Xulong Tang Mahmut Kandemir Yuanrui Zhang Emre Kultursay

In a network-on-chip (NoC) based manycore architecture, an offchip data access (main memory access) needs to travel through the on-chip network, spending considerable amount of time within the chip (in addition to the memory access latency). In addition, it contends with on-chip (cache) accesses as both use the same NoC resources. In this paper, focusing on data-parallel, multithreaded applicat...

2005
Girish Venkataramani Tiberiu Chelcea Seth Copen Goldstein

A major constraint in high-level synthesis (HLS) for large-scale ASIC systems is memory access patterns. Typically, most stateof-the-art HLS tools severely constrain the kinds of memory references allowed in the source, requiring them to have predictable access patterns or requiring dependencies between them to be statically determinable. This paper shows how these constraints can be eliminated...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید