Search results for "Memory"

showing 10 items of 2004 documents

Asymmetries in path encoding in Sicilian: A diachronic overview

2017

This talk aims at describing the encoding of path within the system of spatial relations in Sicilian, an Italo-Romance language spoken in Sicily and its satellite islands. In general terms, spatial relations in Sicilian remain largely unexplored in the light of the current linguistic theories. As a consequence, the first point addressed in the proposed description is the comparison of Sicilian data with the cross-linguistic scenario. It is generally argued in the relevant literature that the encoding of path appears to be less autonomous compared to source, goal, and location at the cross-linguistic level, and its encoding is frequently based on location (see Stolz 1992). In Sicilian, the s…

Computer scienceEncoding (memory)Path (graph theory)languageTopologySicilian language space prepositionsSicilianlanguage.human_languageSettore L-LIN/01 - Glottologia E Linguistica
researchProduct

Topology of synaptic connectivity constrains neuronal stimulus representation, predicting two complementary coding strategies

2020

In motor-related brain regions, movement intention has been successfully decoded from in-vivo spike train by isolating a lower-dimension manifold that the high-dimensional spiking activity is constrained to. The mechanism enforcing this constraint remains unclear, although it has been hypothesized to be implemented by the connectivity of the sampled neurons. We test this idea and explore the interactions between local synaptic connectivity and its ability to encode information in a lower dimensional manifold through simulations of a detailed microcircuit model with realistic sources of noise. We confirm that even in isolation such a model can encode the identity of different stimuli in a lo…

Computer scienceEncoding (memory)Spike trainStimulus (physiology)Topology
researchProduct

''Investigating reduction of dimensionality during single-joint elbow movements: a case study on muscle synergies''

2013

Chiovetto, Enrico | Berret, Bastien | Delis, Ioannis | Panzeri, Stefano | Pozzo, Thierry; International audience; ''A long standing hypothesis in the neuroscience community is that the central nervous system (CNS) generates the muscle activities to accomplish movements by combining a relatively small number of stereotyped patterns of muscle activations, often referred to as" muscle synergies." Different definitions of synergies have been given in the literature. The most well-known are those of synchronous, time-varying and temporal muscle synergies. Each one of them is based on a different mathematical model used to factor some EMG array recordings collected during the execution of variety…

Computer scienceNeuroscience (miscellaneous)triphasic patternADJUSTMENTS''Variation (game tree)ORGANIZATIONTemporal musclelcsh:RC321-571NATURAL MOTOR BEHAVIORSnon-negative matrix factorizationACTIVATION03 medical and health sciencesCellular and Molecular Neuroscience0302 clinical medicineEMGEncoding (memory)muscle synergiesMATRIX FACTORIZATIONFeature (machine learning)Original Research ArticleSet (psychology)lcsh:Neurosciences. Biological psychiatry. Neuropsychiatry030304 developmental biologydimensionality reductionARM MOVEMENTSELECTROMYOGRAPHIC PATTERNS0303 health sciencesbusiness.industryDimensionality reductionCOMBINATIONS[SCCO.NEUR]Cognitive science/Neuroscienceelbow rotationsNeurophysiologyADJUSTMENTSBODY POINTING MOVEMENTS[ SCCO.NEUR ] Cognitive science/Neuroscience''NATURAL MOTOR BEHAVIORSArtificial intelligencebusiness030217 neurology & neurosurgeryCognitive psychologyCurse of dimensionalityNeuroscienceTRIPHASIC EMG PATTERN
researchProduct

Persistent software transactional memory in Haskell

2021

Emerging persistent memory in commodity hardware allows byte-granular accesses to persistent state at memory speeds. However, to prevent inconsistent state in persistent memory due to unexpected system failures, different write-semantics are required compared to volatile memory. Transaction-based library solutions for persistent memory facilitate the atomic modification of persistent data in languages where memory is explicitly managed by the programmer, such as C/C++. For languages that provide extended capabilities like automatic memory management, a more native integration into the language is needed to maintain the high level of memory abstraction. It is shown in this paper how persiste…

Computer scienceProgramming languagecomputer.software_genreRuntime systemSoftware portabilityMemory managementSoftware transactional memoryHaskellPersistent data structureSafety Risk Reliability and QualitycomputerSoftwareGarbage collectioncomputer.programming_languageVolatile memoryProceedings of the ACM on Programming Languages
researchProduct

Distributed Computing on Distributed Memory

2018

Distributed computation is formalized in several description languages for computation, as e.g. Unified Modeling Language (UML), Specification and Description Language (SDL), and Concurrent Abstract State Machines (CASM). All these languages focus on the distribution of computation, which is somewhat the same as concurrent computation. In addition, there is also the aspect of distribution of state, which is often neglected. Distribution of state is most commonly represented by communication between active agents. This paper argues that it is desirable to abstract from the communication and to consider abstract distributed state. This includes semantic handling of conflict resolution, e.g. i…

Computer scienceSemantics (computer science)ConcurrencyDistributed computing020207 software engineering0102 computer and information sciences02 engineering and technology01 natural sciencesSpecification and Description LanguageUnified Modeling Language010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineeringAbstract state machinesDistributed memoryMemory modelState (computer science)computercomputer.programming_language
researchProduct

Different mechanisms underlie implicit visual statistical learning in honey bees and humans

2020

International audience; The ability of developing complex internal representations of the environment is considered a crucial antecedent to the emergence of humans’ higher cognitive functions. Yet it is an open question whether there is any fundamental difference in how humans and other good visual learner species naturally encode aspects of novel visual scenes. Using the same modified visual statistical learning paradigm and multielement stimuli, we investigated how human adults and honey bees ( Apis mellifera ) encode spontaneously, without dedicated training, various statistical properties of novel visual scenes. We found that, similarly to humans, honey bees automatically develop a comp…

Computer scienceSensory systemEnvironmentENCODEunsupervised learning03 medical and health sciences[SCCO]Cognitive science0302 clinical medicineCognitionMemoryAnimalsHumansLearninginternal representation030304 developmental biologyhuman visual cognition0303 health sciencesMultidisciplinaryRepresentation (systemics)Contrast (statistics)Cognition[SCCO] Cognitive scienceBeesBiological Sciencesinsect cognitionAntecedent (behavioral psychology)Unsupervised learningApis melliferaVisual learning030217 neurology & neurosurgeryCognitive psychology
researchProduct

A Methodology for the Analysis of Memory Response to Radiation through Bitmap Superposition and Slicing

2015

A methodology is proposed for the statistical analysis of memory radiation test data, with the aim of identifying trends in the single-even upset (SEU) distribution. The treated case study is a 65nm SRAM irradiated with neutrons, protons and heavy-ions.

Computer sciencebitmap slicingParallel computingHardware_PERFORMANCEANDRELIABILITYRadiationSlicingUpsetElectronic mailSuperposition principleStatic random-access memoryMemoriesstatic testNuclear Experimentdynamic testta114ta213computer.file_formatSRAMBitmap[SPI.TRON]Engineering Sciences [physics]/ElectronicsMultiple Cell Upset (MCU)MCUSERBitmapradiation testevent accumulationSingle Event Upset (SEU)AlgorithmcomputerSEUTest data
researchProduct

Fractional Fourier transform dual random phase encoding of time-varying signals

2008

Optical techniques have shown great potential in the field of information security to encode high-security images. Among several established methods, a double-random phase encryption technique (DRPE) for encoding a primary image into stationary white noise was developed by using the analogy between Fresnel diffraction patterns and the fractional Fourier transform (FrFT-DRPE). In this case, additional keys are obtained through the knowledge of the fractional orders of the FrFTs. In this work we propose an encoding setup for time-varying signals, mainly for short-haul fiber optics link applications, that can be considered as the temporal analogue of the spatial FrFT-DRPE. The behavior of the …

Computer sciencebusiness.industryBandwidth (signal processing)Phase (waves)White noiseEncryptionSignalAtomic and Molecular Physics and OpticsFractional Fourier transformElectronic Optical and Magnetic MaterialsOpticsEncoding (memory)Wigner distribution functionElectrical and Electronic EngineeringPhysical and Theoretical ChemistrybusinessFresnel diffractionOptics Communications
researchProduct

Analysis and Visualization of Product Memory Layout in IP-XACT

2017

Modern ASIC and FPGA based embedded products use model based design, in which both hardware and software are developed in parallel. Previously HW was completed first and the information handed over to SW team, typically in the form of register tables. The information was even manually copied to SW code, making any changes error-prone and laborious. IP-XACT is the most feasible standard to model HW also for the SW needs. The HW design connectivity and overall memory layout may change due to component instantiations, configurations and conditional operation states, which makes it difficult to create register tables even for documentation. Current register design tools fall short in serving th…

Computer sciencecomputer.internet_protocolbusiness.industryProgramming languagecomputer.software_genreMemory mapVisualizationApplication-specific integrated circuitIP-XACTEmbedded systemModel-based designbusinessProgrammerInteractive visualizationcomputerXML2017 Euromicro Conference on Digital System Design (DSD)
researchProduct

An efficient swap algorithm for the lattice Boltzmann method

2007

During the last decade, the lattice-Boltzmann method (LBM) as a valuable tool in computational fluid dynamics has been increasingly acknowledged. The widespread application of LBM is partly due to the simplicity of its coding. The most well-known algorithms for the implementation of the standard lattice-Boltzmann equation (LBE) are the two-lattice and two-step algorithms. However, implementations of the two-lattice or the two-step algorithm suffer from high memory consumption or poor computational performance, respectively. Ultimately, the computing resources available decide which of the two disadvantages is more critical. Here we introduce a new algorithm, called the swap algorithm, for t…

Computer simulationComputer sciencebusiness.industryLattice Boltzmann methodsGeneral Physics and AstronomyComputational fluid dynamicsProgram optimizationNonlinear Sciences::Cellular Automata and Lattice GasesHigh memoryHardware and ArchitecturebusinessAlgorithmImplementationSwap (computer programming)Coding (social sciences)Computer Physics Communications
researchProduct