Search results for "Computer architecture"

showing 10 items of 191 documents

Polysyllabic Word Forms

2021

HistoryWord (computer architecture)Linguistics
researchProduct

Exploring the sense distributions of homographs

2006

This paper quantitatively investigates in how far local context is useful to disam-biguate the senses of an ambiguous word. This is done by comparing the co-occurrence frequencies of particular context words. First, one context word representing a certain sense is chosen, and then the co-occurrence frequencies with two other context words, one of the same and one of another sense, are compared. As expected, it turns out that context words belonging to the same sense have considerably higher co-occurrence frequencies than words belonging to different senses. In our study, the sense inventory is taken from the University of South Florida homograph norms, and the co-occurrence counts are based…

HomographComputer scienceBritish National CorpusContext (language use)Word (computer architecture)LinguisticsProceedings of the Eleventh Conference of the European Chapter of the Association for Computational Linguistics: Posters & Demonstrations on - EACL '06
researchProduct

Document Word Clouds: Visualising Web Documents as Tag Clouds to Aid Users in Relevance Decisions

2009

Περιέχει το πλήρες κείμενο Information Retrieval systems spend a great effort on determining the significant terms in a document. When, instead, a user is looking at a document he cannot benefit from such information. He has to read the text to understand which words are important. In this paper we take a look at the idea of enhancing the perception of web documents with visualisation techniques borrowed from the tag clouds of Web 2.0. Highlighting the important words in a document by using a larger font size allows to get a quick impression of the relevant concepts in a text. As this process does not depend on a user query it can also be used for explorative search. A user study showed, th…

Information retrievalProcess (engineering)Computer sciencemedia_common.quotation_subjectDocument clusteringUser requirements documentWorld Wide WebPerceptionRelevance (information retrieval)Tag cloudtf–idfΤεχνικές υπηρεσίες σε βιβλιοθήκες αρχεία και μουσείαTechnical services in libraries archives and museumsWord (computer architecture)media_common
researchProduct

Architectural improvements and FPGA implementation of a multimodel neuroprocessor

2003

Since neural networks (NNs) require an enormous amount of learning time, various kinds of dedicated parallel computers have been developed. In the paper a 2-D systolic array (SA) of dedicated processing elements (PEs) also called systolic cells (SCs) is presented as the heart of a multimodel neural-network accelerator. The instruction set of the SA allows the implementation of several neural algorithms, including error back propagation and a self organizing feature map algorithm. Several special architectural facilities are presented in the paper in order to improve the 2-D SA performance. A swapping mechanism of the weight matrix allows the implementation of NNs larger than 2-D SA. A systo…

Instruction setArtificial neural networkComputer architectureComputer scienceFeature (machine learning)Systolic arrayParallel computingDifference-map algorithmField-programmable gate arrayBackpropagationWord (computer architecture)Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02.
researchProduct

Bit-Parallel Approximate Pattern Matching on the Xeon Phi Coprocessor

2014

Bit-parallel pattern matching encodes calculated values in bit arrays. This approach gains its efficiency by performing multiple updates within a machine word. An important parameter is therefore the machine word size (e.g. 32 or 64 bits). With the increasing length of vector registers, the efficient mapping of bit-parallel pattern matching algorithms onto modern high performance computing architectures is becoming increasingly important. In this paper, we investigate an efficient implementation of the Wu-Manber approximate pattern matching algorithm on the Intel Xeon Phi coprocessor. This architecture features a 512-bit long vector processing unit (VPU) as well as a large number of process…

Instruction setCoprocessorSpeedupComputer scienceParallel computingPattern matchingIntrinsicsWord (computer architecture)Xeon PhiVector processor2014 IEEE 26th International Symposium on Computer Architecture and High Performance Computing
researchProduct

Design methods of multithreaded architectures for multicore microcontrollers

2011

The development of electronic technology today has allowed the implementation of complex architectures, which led to the emergence of multicore processors technology. Multicore architectures are built from superscalar and multithreaded processors. Integrating new technologies in embedded applications requires the development of multicore processors that can be integrated into a smaller area like a classic microcontroller. These processors must manage fewer resources and be able to manage multiple tasks simultaneously. In this paper we present a method of modeling, simulation and evaluation of two multithreaded architectures with limited resources, which could be integrated into embedded sys…

Instruction setMicrocontrollerMulti-core processorComputer architectureComputer scienceMultithreadingContext (language use)ElectronicsComputer multitaskingComputerSystemsOrganization_PROCESSORARCHITECTURESTemporal multithreading2011 6th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)
researchProduct

SimuRed: A flit-level event-driven simulator for multicomputer network performance evaluation

2009

The interconnection network is one of the most important multicomputer components, since it has a great impact on global system performance. Many models and simulators have been proposed to evaluate network performance. This paper presents SimuRed, an event-driven flit-level, cycle-accurate simulator to evaluate different orthogonal network configurations. The core of the simulator has been designed to be expandable and portable to different situations. Some of the advantages of this simulator over other similar tools are its visual interface, its fast execution and its simplicity. Moreover, it is multiplatform and its source code versions (C++ and Java) are freely available under GNU open-…

InterconnectionSource codeGeneral Computer ScienceComputer architecture simulatorJavaComputer scienceEvent (computing)business.industrymedia_common.quotation_subjectControl and Systems EngineeringEmbedded systemNetwork performancePolygon meshHypercubeElectrical and Electronic EngineeringbusinesscomputerSimulationmedia_commoncomputer.programming_languageComputers & Electrical Engineering
researchProduct

P2PRealm - Peer-to-Peer Network Simulator

2006

Peer-to-peer realm (P2PRealm) is an efficient peer-to-peer network simulator for studying algorithms based on neural networks. In contrast to many simulators, which emphasize on detailed network simulation, the speed of simulation in P2PRealm is essential, because neural networks require a time consuming training phase. Efficiency has been obtained by optimizing training loops inside the simulator, using Java native interface (JNI) as well as distributing the simulator to hundreds of workstations using the P2PDisCo platform. In this paper we describe the architecture of P2PRealm and its input/output interfaces. Also, we present the mechanisms used for internally optimizing the implementatio…

JavaComputer architecture simulatorWorkstationArtificial neural networkComputer scienceJava Native InterfaceDistributed computingPeer-to-peercomputer.software_genreNetwork simulationlaw.inventionvertaisverkkosimulaattorilawcomputerPower system simulator for engineeringcomputer.programming_language2006 11th Intenational Workshop on Computer-Aided Modeling, Analysis and Design of Communication Links and Networks
researchProduct

Some thoughts about the conceptual / procedural distinction in translation: a key-logging and eye-tracking study of processing effort

2014

This article builds on the conceptual / procedural distinction postulated by Relevance Theory to investigate processing effort in translation task execution. Drawing on relevance-theoretic assumptions, it assumes that instances related to procedural encodings will require more effortful processing not only in relation to the time spent on the task but also in terms of product indicators such as seconds per word and number of micro translation units per word. Drawing on key-logging and eye-tracking data, the article shows that there are statistically significant differences when conceptual and procedural encodings are analysed in selected areas of interest, with instances related to procedur…

Key loggingSeguimiento ocular (eye tracking)Linguistics and LanguageTranslation process research; Relevance Theory; Conceptual; Procedural distinction; Key logging; Eye trackingCodificación conceptual / procedimentalRelation (database)Computer scienceRelevance TheoryRegistros de teclado y ratón (key logging)computer.software_genreKeystroke loggingLanguage and LinguisticsEducationTask (project management)Encoding (semiotics)Teoría de la RelevanciaUNESCO::CIENCIAS DE LAS ARTES Y LAS LETRASEye trackingProceso de traducción; Teoría de la Relevancia; Codificación conceptual / procedimental; Registros de teclado y ratón (key logging); Seguimiento ocular (eye tracking)business.industryRelevance theorySIGNAL (programming language)Traducción e InterpretaciónTranslation process researchProceso de traducción:CIENCIAS DE LAS ARTES Y LAS LETRAS [UNESCO]Eye trackingArtificial intelligenceConceptual / procedural distinctionbusinesscomputerNatural language processingWord (computer architecture)MonTI. Monografías de Traducción e Interpretación
researchProduct

Minimal Forbidden Factors of Circular Words

2017

Minimal forbidden factors are a useful tool for investigating properties of words and languages. Two factorial languages are distinct if and only if they have different (antifactorial) sets of minimal forbidden factors. There exist algorithms for computing the minimal forbidden factors of a word, as well as of a regular factorial language. Conversely, Crochemore et al. [IPL, 1998] gave an algorithm that, given the trie recognizing a finite antifactorial language M, computes a DFA of the language having M as set of minimal forbidden factors. In the same paper, they showed that the obtained DFA is minimal if the input trie recognizes the minimal forbidden factors of a single word. We gener…

L-automatonDiscrete mathematicsFactorialFibonacci numberSettore INF/01 - InformaticaComputer Science (all)Computer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing)0102 computer and information sciences02 engineering and technologyCircular wordMinimal forbidden factor01 natural sciencesTheoretical Computer ScienceSet (abstract data type)010201 computation theory & mathematicsIf and only ifTrie0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer Science::Formal Languages and Automata TheoryWord (computer architecture)Mathematics
researchProduct