Essays about: "Memory Access Pattern"
Showing result 1 - 5 of 14 essays containing the words Memory Access Pattern.
-
1. Exploring Column Update Elimination Optimization for Spike-Timing-Dependent Plasticity Learning Rule
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Hebbian learning based neural network learning rules when implemented on hardware, store their synaptic weights in the form of a two-dimensional matrix. The storage of synaptic weights demands large memory bandwidth and storage. READ MORE
-
2. Exploring the column elimination optimization in LIF-STDP networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Spiking neural networks using Leaky-Integrate-and-Fire (LIF) neurons and Spike-timing-depend Plasticity (STDP) learning, are commonly used as more biological possible networks. Compare to DNNs and RNNs, the LIF-STDP networks are models which are closer to the biological cortex. READ MORE
-
3. AXI-PACK : Near-memory Bus Packing for Bandwidth-Efficient Irregular Workloads
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : General propose processor (GPP) are demanded high performance in dataintensive applications, such as deep learning, high performance computation (HPC), where algorithm kernels like GEMM (general matrix-matrix multiply) and SPMV (sparse matrix-vector multiply) kernels are intensively used. The performance of these data-intensive applications are bounded with memory bandwidth, which is limited by computing & memory access coupling and memory wall effect. READ MORE
-
4. Digital incursion: Breaching the android lock screen and liberating data
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Android is the most used operating system in the world, because of this the probability of an android device being acquired in an investigation is high. To begin to extract data from an android device you first need to gain access to it. Mechanisms like full system encryption can make this very difficult. READ MORE
-
5. Hybrid Auto-Scaling for an Asynchronous Computationally Intensive Application
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cloud computing has developed rapidly in recent years. It enables users to access computing resources on an on-demand basis, acquiring resources when an application requires them and releasing them when they are no longer needed. READ MORE