Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Igor Smolyar"'
Autor:
Igor Smolyar, Daniel Smolyar
Publikováno v:
Applied Sciences, Vol 12, Iss 4, p 2037 (2022)
In our previous work, we introduced an empirical model (EM) of arbitrary binary images and three morphological characteristics: disorder of layer structure (DStr), disorder of layer size (DSize), and pattern complexity (PCom). The basic concept of th
Externí odkaz:
https://doaj.org/article/9482e2c524d745d4b99f882668384b7d
Autor:
Igor Smolyar, Daniel Smolyar
Publikováno v:
Applied Sciences, Vol 11, Iss 14, p 6300 (2021)
Patterns found among both living systems, such as fish scales, bones, and tree rings, and non-living systems, such as terrestrial and extraterrestrial dunes, microstructures of alloys, and geological seismic profiles, are comprised of anisotropic lay
Externí odkaz:
https://doaj.org/article/82627d6484be48c7a4c75070651d6ffc
Publikováno v:
PeerJ, Vol 7, p e7813 (2019)
Various natural patterns—such as terrestrial sand dune ripples, lamellae in vertebrate bones, growth increments in fish scales and corals, aortas and lamellar corpuscles in humans and animals—comprise layers of different thicknesses and lengths.
Externí odkaz:
https://doaj.org/article/48fa2aa124714ab8894e4bfa76361ff9
Autor:
Austin Bolen, Igor Smolyar, Alex Markuze, Dan Tsafrir, Gerd Zellweger, Haggai Eran, Boris Pismenny, Liran Liss, Adam Morrison
Publikováno v:
ASPLOS
In a multi-CPU server, memory modules are local to the CPU to which they are connected, forming a nonuniform memory access (NUMA) architecture. Because non-local accesses are slower than local accesses, the NUMA architecture might degrade application
Publikováno v:
ASPLOS
DMA operations can access memory buffers only if they are "mapped" in the IOMMU, so operating systems protect themselves against malicious/errant network DMAs by mapping and unmapping each packet immediately before/after it is DMAed. This approach wa
Publikováno v:
APSys
Infrastructure-as-a-Service (IaaS) cloud computing is causing a fundamental shift in the way computing resources are bought, sold, and used. We foresee a future whereby every CPU cycle, every memory word, and every byte of network bandwidth in the cl