Essays about: "Heterogena plattformar"
Found 4 essays containing the words Heterogena plattformar.
-
1. Code Synthesis for Heterogeneous Platforms
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Heterogeneous platforms, systems with both general-purpose processors and task-specific hardware, are largely used in industry to increase efficiency, but the heterogeneity also increases the difficulty of design and verification. We often need to wait for the completion of all the modules to know whether the functionality of the design is correct or not, which can cause costly and tedious design iteration cycles. READ MORE
-
2. Software Synthesis of Synchronous Data Flow Models Using ForSyDe IO
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The implementation of embedded software applications is a complex process. The complexity arises from the intense time-to-market pressures; power and memory constraints. To deal with this complexity, an idea is to automatically construct the applications based on the high-level abstraction model. READ MORE
-
3. Towards an Efficient Spectral Element Solver for Poisson’s Equation on Heterogeneous Platforms
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Neko is a project at KTH to refactor the widely used fluid dynamics solver Nek5000 to support modern hardware. Many aspects of the solver need adapting for use on GPUs, and one such part is the main communication kernel, the Gather-Scatter (GS) routine. To avoid race conditions in the kernel, atomic operations are used, which can be inefficient. READ MORE
-
4. Automatic secret synchronisation across heterogeneous IT environments
University essay from KTH/Hälsoinformatik och logistikAbstract : Following circumstances such as mergers and acquisitions, the IT systemsassociated with the participating organisations may need to share access towardsservices and systems with eachother. Access towards systems and services is oftencontrolled using secret information such as passwords or keys. READ MORE