首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
《中国新通信》2010,12(8):22-22
伴随着云计算的快速升温,Amazon、Google、IBM、微软等IT巨头都相继推出了云计算的相关产品;美国政府力挺云计算,称其2010年将推云服务;日本政府投资5.37亿美元建云计算特区;欧洲正制定保护法保证云计算安全……同时,我们也看到包括电信运营商在内的众多机构都在这样的热潮下对“云”跃跃欲试,  相似文献   

2.
3.
孙元  吴先良  李超 《信息技术》2008,32(4):16-19
涂覆雷达吸波材料技术(RAM)是隐身技术中重要的技术之一,在现代隐身武器设计中得到广泛应用.GRECO方法使用Phong光照模型获取法矢等几何参数,只能处理目标表面单一涂覆的情况.使用索引法即用像素的颜色表示索引序号的方法,就可以处理目标表面不同部位有不同涂覆参数的多种涂覆情况.计算结果与相关文献进行比较,结果令人满意.  相似文献   

4.
The “memory wall” of traditional von Neumann computing systems severely restricts the efficiency of data-intensive task execution, while in-memory computing(IMC) architecture is a promising approach to breaking the bottleneck. Although variations and instability in ultra-scaled memory cells seriously degrade the calculation accuracy in IMC architectures, stochastic computing(SC) can compensate for these shortcomings due to its low sensitivity to cell disturbances. Furthermore, massive parallel c...  相似文献   

5.
The vast infrastructure of the microelectronic and microtechnological processing industry has yielded highly reproducible devices through reliable, reproducible, and fabrication-compatible processing techniques. Much development has occurred in bulk and surface micromachining, as well as in thin-film deposition techniques. Nevertheless, only a limited number of metrological applications have benefited from the use of this technology. Only two metrological applications that use microtechnology have been developed into commercially available devices: the JJA, as a DC reference, and the thermal RMS-to-DC converter, as an AC reference. Single electron tunneling devices and micromachined electrostatic RMS-to-DC converters are still under development. The accuracy requirements of the existing applications will continue to increase. This makes the development of on-chip references and on-chip self-test and self-calibration facilities essential. These microelectronic features, until now have remained unexploited in metrology, as well as in most other applications  相似文献   

6.
A sender communicates with a receiver who wishes to reliably evaluate a function of their combined data. We show that if only the sender can transmit, the number of bits required is a conditional entropy of a naturally defined graph. We also determine the number of bits needed when the communicators exchange two messages  相似文献   

7.
There are numerous opportunities to apply electronic commerce (EC) technologies to networking. These include the assembly, pricing, and payments for complementary infrastructure resources, and the selection of and payment for value-added collaboration and information access services. EC can support the separate provision and coordination of these elements, or allow them to be bundled by a customer care organization. These opportunities and options are discussed  相似文献   

8.
9.
10.
Contrasting with the extensive research focusing on nano-devices properties and fabrication, not enough attention is probably given to computing architectures for these devices. This paper describes a method for mapping an FPGA architecture to a nano-device called NASIC (for Nano-ASIC). This mapping is an illustration of the interest of nano- and micro-architecture models stacked to quickly obtain CAD environments for the investigated technologies.  相似文献   

11.
High-performance computing for vision   总被引:2,自引:0,他引:2  
The main focus of the paper is on effectively using commercial-off-the-shelf (COTS) based general purpose parallel computing platforms to realize high speed implementations of vision tasks. Due to the successful use of the COTS-based systems in a variety of high performance applications, it is attractive to consider their use for vision applications as well. However, the irregular data dependencies in vision tasks lead to large communication overheads in the HPC systems. At the University of Southern California, our research efforts have been directed toward designing scalable parallel algorithms for vision tasks on the HPC systems. In our approach, we use the message passing programming model to develop portable code. Our algorithms are specified using C and MPI. In this paper, we summarize our efforts, and illustrate our approach using several example vision tasks  相似文献   

12.
Multiprocessor computing for images   总被引:1,自引:0,他引:1  
A review of image-processing systems developed until now is given, highlighting the weak points of such systems and the trends that have dictated their evolution through the years producing different generations of machines. Each generation may be characterized by the hardware architecture, the programmability features and the relative application areas. The need for multiprocessing hierarchical systems is discussed, focusing on pyramidal architectures. Their computational paradigms, their virtual and physical implementation, their programming and languages, are discussed  相似文献   

13.
A method called visual computing was used to solve angular four-components' proportions and directional vegetation cover fraction for discrete canopies and continuous row-planted plants. It proved effective to predict the angular characteristics on pixel scale. The method could be an alternative way to a classical solution of geometrical optical models. A visual computing method would be effective especially when the canopies' spatial distribution and shapes were irregular and could not be described statistically.  相似文献   

14.
数字家庭是指各种家电通过不同的互连方式进行通信及数据交换,实现家用电器之间的“互联互通”,从而使人们足不出户就可以更加方便快捷的获取信息,从而极大提高人类居住的舒适性和娱乐性。目前中国城市家庭的个人电脑、家用电器的普及率已经达到一个很高的水平。同时,随着互联网应用水平的提高,宽带也进入越来越多的家庭中。由此看来,中国家庭的数字化具有一定的发展基础。  相似文献   

15.
An important domain for autonomic systems is the area of ubiquitous computing: users are increasingly surrounded by technology that is heterogeneous, pervasive, and variable. In this paper we describe our work in developing self-adapting computing infrastructure that automates the configuration and reconfiguration of such environments. Focusing on the engineering issues of self-adaptation in the presence of heterogeneous platforms, legacy applications, mobile users, and resource variable environments, we describe a new approach based on the following key ideas: 1) explicit representation of user tasks allows us to determine what service qualities are required of a given configuration; 2) decoupling task and preference specification from the lower level mechanisms that carry out those preferences provides a clean engineering separation of concerns between what is needed and how it is carried out; and 3) efficient algorithms allow us to calculate in real time near-optimal resource allocations and reallocations for a given task.  相似文献   

16.
Fuzzy computing for data mining   总被引:7,自引:0,他引:7  
The study is devoted to linguistic data mining, an endeavor that exploits the concepts, constructs, and mechanisms of fuzzy set theory. The roles of information granules, information granulation, and the techniques therein are discussed in detail. Particular attention is given to the manner in which these information granules are represented as fuzzy sets and manipulated according to the main mechanisms of fuzzy sets. We introduce unsupervised learning (clustering) where optimization is supported by the linguistic granules of context, thereby giving rise to so-called context-sensitive fuzzy clustering. The combination of neuro, evolutionary, and granular computing in the context of data mining is explored. Detailed numerical experiments using well-known datasets are also included and analyzed  相似文献   

17.
18.
19.
Cloud computing enables a transparent access to information technology (IT) services such that the users do not need to know the location and characteristics of the relevant resources. While IT resource virtualization and service abstraction have been widely investigated, data transport within the cloud and its efficient control have not received much attention in the technical literature. In fact, connectivity is, itself, a service that contributes to the overall performance of the cloud. This paper introduces a novel classification of the Network as a Service (NaaS) such that it can be orchestrated with other cloud services. Then, it proposes a network virtualization platform (NVP) as the mediation layer able to provide NaaS to cloud computing by exploiting the functionality provided by control plane (CP)-enabled networks. In particular, the proposed NVP maps the end-point addresses and perceived Quality of Service parameters of a NaaS requests in the parameters characterizing the connectivity as viewed by transport networks using the information obtained from the CP at the boundary of the network. The NVP uses these parameters to fulfill connectivity requests to the CP. Finally, this paper presents a complete design from both the software implementation and network signaling perspective of two use cases in which NaaS is involved as stand-alone facility for the connectivity service provisioning or is combined with other cloud services for a storage service provisioning.  相似文献   

20.
本文旨在介绍边缘计算产生的背景、应用需求、技术特性、应用场景,以及英特尔公司在推进边缘计算创新进程中所扮演的角色和发挥的作用。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号