Essays about: "data parallelism"
Showing result 1 - 5 of 77 essays containing the words data parallelism.
-
1. A Conjugate Residual Solver with Kernel Fusion for massive MIMO Detection
University essay from Högskolan i Halmstad/Centrum för forskning om tillämpade intelligenta system (CAISR)Abstract : This thesis presents a comparison of a GPU implementation of the Conjugate Residual method as a sequence of generic library kernels against implementations ofthe method with custom kernels to expose the performance gains of a keyoptimization strategy, kernel fusion, for memory-bound operations which is to makeefficient reuse of the processed data. For massive MIMO the iterative solver is to be employed at the linear detection stageto overcome the computational bottleneck of the matrix inversion required in theequalization process, which is 𝒪(𝑛3) for direct solvers. READ MORE
-
2. RocksDB Read Optimization Strategies for Streaming Applications
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Modern stream processors rely on embedded key-value stores to manage state that accumulates over long-running computations and exceeds the available memory size. One of these key-value stores is RocksDB, which is widely used in many applications requiring high-performing storage with low latency. READ MORE
-
3. Big Data Analytics Using Apache Flink for Cybercrime Forensics on X (formerly known as Twitter)
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : The exponential growth of social media usage has led to massive data sharing, posing challenges for traditional systems in managing and analyzing such vast amounts of data. This surge in data exchange has also resulted in an increase in cyber threats from individuals and criminal groups. READ MORE
-
4. Automated Generation of EfficientBitslice Implementations forArbitrary Sboxes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Whitebox cryptography aims at protecting standard cryptographic algorithmsthat execute in attacker-controlled environments. In these, the attacker is ableto read a secret key directly from memory. Common implementations mask alldata at runtime and operate on masked data by using many small precomputedtables. READ MORE
-
5. Design and evaluation of architectures for efficient generation of control sequences
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Ultra millimeter-wave (mmWave) radars have become a vital sensor in automotive, surveillance, and consumer electronics thanks to its precise measurements and low power consumption. However, they required a precise control to coordinate their different modules and produce meaningful data. READ MORE