Essays about: "Memory Access Pattern"

Showing result 1 - 5 of 14 essays containing the words Memory Access Pattern.

  1. 1. Exploring Column Update Elimination Optimization for Spike-Timing-Dependent Plasticity Learning Rule

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ojasvi Singh; [2022]
    Keywords : Spike-Timing Dependent Plasticity; neuromorphic computing; Hebbian Learning; Spiking Neural Networks; memory optimization.; Spike-Timing Beroende Plasticitet; neuromorfisk beräkning; Hebbiansk inlärning; Spiking Neural Networks; Minnes optimering;

    Abstract : Hebbian learning based neural network learning rules when implemented on hardware, store their synaptic weights in the form of a two-dimensional matrix. The storage of synaptic weights demands large memory bandwidth and storage. READ MORE

  2. 2. Exploring the column elimination optimization in LIF-STDP networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Mingda Sun; [2022]
    Keywords : SpikingNeuralNetwork SNN ; neuromorphiccomputing; memoryoptimization; Hebbian learning; Spike-timing-depend plasticity STDP learning; Spiking Neural Network SNN ; neuromorphic computing; minnesoptimering; Hebbisk inlärning; spike-timing-depend plasticity STDP inlärning;

    Abstract : Spiking neural networks using Leaky-Integrate-and-Fire (LIF) neurons and Spike-timing-depend Plasticity (STDP) learning, are commonly used as more biological possible networks. Compare to DNNs and RNNs, the LIF-STDP networks are models which are closer to the biological cortex. READ MORE

  3. 3. AXI-PACK : Near-memory Bus Packing for Bandwidth-Efficient Irregular Workloads

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chi Zhang; [2022]
    Keywords : General propose processor; on-chip bus protocol; irregular memory access; ASIC digital circuit design.; Generellt förslag på processor; on-chip-bussprotokoll; oregelbunden minnesåtkomst; digital ASIC-kretsdesign.;

    Abstract : General propose processor (GPP) are demanded high performance in dataintensive applications, such as deep learning, high performance computation (HPC), where algorithm kernels like GEMM (general matrix-matrix multiply) and SPMV (sparse matrix-vector multiply) kernels are intensively used. The performance of these data-intensive applications are bounded with memory bandwidth, which is limited by computing & memory access coupling and memory wall effect. READ MORE

  4. 4. Digital incursion: Breaching the android lock screen and liberating data

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Tim Oskarsson; [2021]
    Keywords : Android forensics; Mobile forensics; Memory forensics; Device access; PIN; Pattern; Biometrics; Android Debug Bridge; TWRP; Frida.;

    Abstract : Android is the most used operating system in the world, because of this the probability of an android device being acquired in an investigation is high. To begin to extract data from an android device you first need to gain access to it. Mechanisms like full system encryption can make this very difficult. READ MORE

  5. 5. Hybrid Auto-Scaling for an Asynchronous Computationally Intensive Application

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Arnþór Jóhann Jónsson; [2020]
    Keywords : ;

    Abstract : Cloud computing has developed rapidly in recent years. It enables users to access computing resources on an on-demand basis, acquiring resources when an application requires them and releasing them when they are no longer needed. READ MORE