Search results for " computing"
showing 10 items of 2075 documents
Opportunity Discovery and Creation in Cloud Computing
2013
Cloud computing provides opportunities for firms selling or using cloud services. However, little is known about how entrepreneurs discover or create these opportunities for cloud computing. In this study, we found that the opportunities discovered in cloud computing were related to the development of software for a particular need. By contrast, created opportunities were developed under conditions of technological uncertainty, at a time when the market did not yet exist. It appears that created opportunities, if successful, bring long-term competitive advantages, whereas discovered opportunities are more easily copied and exploited by competitors. peerReviewed
In Pursuit of Measuring Pre-reflective Music Listening Experiences
2022
While the diverse effects and uses of music and sound have been extensively documented within music psychology, relatively little attention has been paid to the process and experience of listening itself. Previous literature have, however, considered different ways of attending to sounds via the concept of listening modes, which highlights the different ways and strategies through which listeners intentionally orientate themselves to the activity of listening and creating the experiential meaning of the sound. In this paper, we continue on these lines by focusing on the very basic attentional dispositions for listening that often remain unconscious. As op posed to more deliberate and intent…
Computer aided scheduling and routing of vehicle-carrier fleet—a case study
2016
This paper presents a case study of development of an information system for a large enterprise from vehicle-transport industry. A novel optimization model and algorithms developed to solve scheduling and routing of vehicle-carrier fleet are presented and discussed. Carried out qualitative experiments confirmed the usability of developed user-guided search paradigm and high performance of autonomous algorithmic solution search methods.
Estimation of the Time-Variant Velocity of a Single Walking Person in Two-Dimensional Non-Stationary Indoor Environments Using Radio-Frequency Techni…
2020
Accurate estimation of the time-variant (TV) velocity of moving persons/objects in indoor spaces is of crucial importance for numerous wireless indoor applications. This article introduces a novel iterative procedure to estimate the TV velocity, i.e., TV speed and TV angle-of-motion (AOM), of a single moving person in 2D indoor environments by using radio-frequency (RF) techniques. The indoor area is equipped with a distributed 2 × 2 multiple-input multiple-output (MIMO) system. The proposed method is divided into two parts. In the first part, we estimate the path gains and the instantaneous Doppler frequencies by fitting the exact spectrograms of the complex channel gains of a 2D no…
Quantum coherent manipulation of spin information in molecular nanomagnets
2023
Los sistemas cuánticos de dos niveles basados en estados de espín, conocidos como ``qubits de espín'', son bloques prometedores para el desarrollo de tecnologías cuánticas. Entre las distintas plataformas físicas, los qubits de espín definidos en imanes de molécula única (SMM) son candidatos prometedores porque su estructura electrónica puede ajustarse fácilmente mediante ingeniería química (es decir, el Hamiltoniano de espín molecular puede modificarse con facilidad). Sin embargo, los qubits moleculares de espín generados en SMM se enfrentan a varios retos: coherencia cuántica frágil, control coherente insuficiente de los estados de espín y generación de entrelazamiento entre los qubits de…
Designing a graphics processing unit accelerated petaflop capable lattice Boltzmann solver: Read aligned data layouts and asynchronous communication
2016
The lattice Boltzmann method is a well-established numerical approach for complex fluid flow simulations. Recently, general-purpose graphics processing units (GPUs) have become available as high-performance computing resources at large scale. We report on designing and implementing a lattice Boltzmann solver for multi-GPU systems that achieves 1.79 PFLOPS performance on 16,384 GPUs. To achieve this performance, we introduce a GPU compatible version of the so-called bundle data layout and eliminate the halo sites in order to improve data access alignment. Furthermore, we make use of the possibility to overlap data transfer between the host central processing unit and the device GPU with com…
Preventing reverse engineering of native and managed programs
2015
One of the important aspects of protecting software from attack, theft of algorithms, or illegal software use is eliminating the possibility of performing reverse engineering. One common method used to deal with these issues is code obfuscation. However, it is proven to be ineffective. Code encryption is a much more effective means of defying reverse engineering, but it requires managing a cryptographic key available to none but the permissible users. The thesis presents a system for managing cryptographic keys in a protected environment and supporting execution of encrypted code. The system has strong security guarantees. In particular, the cryptographic keys are never stored on the target…
The ALICE experiment at the CERN LHC
2008
Journal of Instrumentation 3(08), S08002 (2008). doi:10.1088/1748-0221/3/08/S08002
Sing and Measure: Sound as Voice as Quanta
2022
The universal concept of a “music of the spheres” traverses the history of philosophy, science and art, from Pythagoras to Kepler and beyond. In modern times, a sphere in three dimensions—the Bloch sphere—is used to illustrate the state of a qubit, the basic unit of quantum information. On the same spherical surface, the fundamental components of voice production can be located, so that any utterance can be seen as the evolution of a unit two-dimensional vector having complex coefficients. Indeed, any sound can be analyzed and decomposed into overlapping sinusoidal components, broadband noises, and impulsive transients, which in turn can be associated to fundamental means of vocal sound pro…
Learn to Cache: Machine Learning for Network Edge Caching in the Big Data Era
2018
The unprecedented growth of wireless data traffic not only challenges the design and evolution of the wireless network architecture, but also brings about profound opportunities to drive and improve future networks. Meanwhile, the evolution of communications and computing technologies can make the network edge, such as BSs or UEs, become intelligent and rich in terms of computing and communications capabilities, which intuitively enables big data analytics at the network edge. In this article, we propose to explore big data analytics to advance edge caching capability, which is considered as a promising approach to improve network efficiency and alleviate the high demand for the radio resou…