Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

  • In [[continuum physics]], '''materials with memory''', also referred as '''materials with hereditary effects''' are a class of ...the recent past, was stated in modern continuum mechanics as the [[fading memory principle]] by [[Bernard Coleman]] and [[Walter Noll]]. ...
    18 KB (2,224 words) - 03:07, 12 November 2024
  • {{Short description|Part of computer memory}} ...thumb|260px|Layout for the silicon implementation of a six transistor SRAM memory cell]] ...
    28 KB (4,011 words) - 04:14, 29 September 2024
  • [[File:Parallel External Memory Model PEM.png|thumb|400x400px|PEM Model]] ...rocessors, together with their respective private caches and a shared main memory. ...
    16 KB (2,522 words) - 09:49, 16 October 2023
  • ...in that they are both forms of [[Association (psychology)|associative]] [[memory]]. However, Hopfield nets return patterns of the same size. The memory or storage capacity of BAM may be given as <math>\min(m,n)</math>, where "< ...
    5 KB (758 words) - 14:57, 9 October 2024
  • ...mory: Synchronous [[dynamic RAM]] [[DIMM|modules]], primarily used as main memory in [[personal computers]], [[workstation]]s, and [[Server (computing)|serve {{Memory types}} ...
    58 KB (8,028 words) - 07:06, 15 February 2025
  • {{Short description|Mathematical model of memory}} ...ributed memory''' ('''SDM''') is a mathematical model of human [[long-term memory]] introduced by [[Pentti Kanerva]] in 1988 while he was at [[Ames Research ...
    56 KB (8,318 words) - 16:00, 15 December 2024
  • ...emory Access Time''' ('''AMAT''') is a common metric to analyze [[computer memory]] system performance. ...current-AMAT (C-AMAT), is introduced for more accurate analysis of current memory systems. More information on C-AMAT can be found in the external links sect ...
    2 KB (321 words) - 09:40, 23 May 2022
  • ...is a type of [[graph traversal]] optimized for accessing externally stored memory. ..., the need for efficient traversal of [[external memory algorithm|external memory]] exists. ...
    9 KB (1,520 words) - 20:55, 12 October 2024
  • A '''time/memory/data tradeoff attack''' is a type of [[cryptanalysis|cryptographic attack]] .../stamp.jsp?tp=&arnumber=1056220&isnumber=22715&tag=1 "A cryptanalytic time-memory trade-off"], IEEE Transactions on Information Theory, vol.26, no.4, pp. 401 ...
    13 KB (2,300 words) - 20:11, 18 February 2025
  • '''Stochastic chains with memory of variable length''' are a family of [[stochastic process|stochastic chain A stochastic chain with memory of variable length is a stochastic chain <math>(X_n)_{n\in Z}</math>, takin ...
    10 KB (1,578 words) - 23:45, 1 April 2024

Page text matches

  • ...emory Access Time''' ('''AMAT''') is a common metric to analyze [[computer memory]] system performance. ...current-AMAT (C-AMAT), is introduced for more accurate analysis of current memory systems. More information on C-AMAT can be found in the external links sect ...
    2 KB (321 words) - 09:40, 23 May 2022
  • ...sis|catalysts]] in chemistry, based on the metaphorically viewing the full memory as a "catalyst", a non-consumed factor critical for the computational "reac ...nes whose work tape is bounded by s(n) tape cells and whose auxiliary full memory space is bounded by <math>2^{s(n)}</math> tape cells.<ref name=":1" /> It h ...
    3 KB (379 words) - 06:18, 2 March 2025
  • == Minimum memory, maximum query time == == Maximum memory, minimum query time == ...
    4 KB (661 words) - 08:30, 12 April 2022
  • ...011/DesignPrinciplesMulticoreProcessors/Sun1993.pdf] Scalable Problems and Memory-Bounded Speedup, X.H. Sun, and L. Ni, Journal of Parallel and Distributed C ...unded function, ''W=G(M)'', it reveals the trade-off between computing and memory in algorithm and [[Computer architecture|system architecture]] design. ...
    10 KB (1,608 words) - 09:37, 29 June 2024
  • ''F''(''r'') is referred to as the memory function. The value of <math>\bar{X}</math> and the function ''F''(''r'') c ===Relation between the memory function and the correlation function=== ...
    4 KB (685 words) - 14:55, 6 February 2023
  • ...in that they are both forms of [[Association (psychology)|associative]] [[memory]]. However, Hopfield nets return patterns of the same size. The memory or storage capacity of BAM may be given as <math>\min(m,n)</math>, where "< ...
    5 KB (758 words) - 14:57, 9 October 2024
  • ...cedure for generating code using a minimal number of loads and stores from memory is as follows: ...in a temporary register, or, if none is available, a temporary location in memory ...
    4 KB (648 words) - 17:02, 18 January 2025
  • ...d on the assumption that commercially-sold hardware already has quite high memory bandwidth, so improvements made by custom hardware may not be worth the dev ...me complexity is proportional to <math>2^{\frac{n}{k+1}+d}</math>while the memory complexity is proportional to <math>2^{k+\frac{n}{k+1}}</math>. The algorit ...
    6 KB (786 words) - 19:36, 15 November 2024
  • ...is a type of [[graph traversal]] optimized for accessing externally stored memory. ..., the need for efficient traversal of [[external memory algorithm|external memory]] exists. ...
    9 KB (1,520 words) - 20:55, 12 October 2024
  • ...lly practical search performance for a compressed suffix array in external-memory has been demonstrated.<ref>M. P. Ferguson, [https://link.springer.com/chapt ...rrays. FEMTO is an implementation of compressed suffix arrays for external memory. In addition, a variety of implementations, including the original [[FM-ind ...
    6 KB (859 words) - 00:53, 6 December 2024
  • ...he tall cache assumption that <math>Z = \Omega(L^2)</math>. This number of memory transfers has been shown to be asymptotically optimal for comparison sorts. <!-- mention stacked-based memory allocation? --> ...
    6 KB (971 words) - 12:50, 19 December 2024
  • ...gn data. The term is generally used in the context of attacks which search memory much more efficiently than simply testing each sequence of bytes to determi ...h entropy and an attacker needs to only test for matching keys in areas of memory or storage that have high entropy. ...
    7 KB (1,210 words) - 15:20, 7 January 2025
  • ...een from 32 to 512 fully merged steps and data could be stored in 22 to 88 memory register. The default set-up was 22 register and 512 steps. From there one ...supported [[Addressing mode#Memory indirect|indirect]] addressing both for memory access and jumps and therefore programming model could be considered [[Tur ...
    7 KB (949 words) - 22:37, 10 January 2025
  • ...ems]] and [[radiation hardening|radiation-hardened]] [[Memory architecture|memory designs]].<ref>{{cite conference |title=A new 2-D parity checking architect ...title=Multi Dimensional Parity Based Hamming Codes For Correcting The SRAM Memory Faults Under High EMI Conditions |author=A. Vadinala, G. K. Kumar |journal= ...
    4 KB (622 words) - 12:01, 6 February 2025
  • [[File:Parallel External Memory Model PEM.png|thumb|400x400px|PEM Model]] ...rocessors, together with their respective private caches and a shared main memory. ...
    16 KB (2,522 words) - 09:49, 16 October 2023
  • ...ent memory access with those need less memory access is also profitable as memory access is a costly operation. ...
    5 KB (859 words) - 03:49, 9 May 2024
  • ...ification of the 2-dimensional majority vote rule and can have more robust memory when considered as a thermal physical system in [[statistical field theory] ==Toom's rule as a memory== ...
    8 KB (1,347 words) - 16:09, 5 January 2024
  • ...ature, but is not ''the'' [[martensite]] that is responsible for the shape memory and superelastic effect. ...teresis (typically {{cvt|2|-|5|C|F}}). It also exhibits a very small shape memory effect, and within a very narrow temperature range, superelasticity. The R- ...
    8 KB (1,097 words) - 19:07, 27 April 2024
  • ...nodewise attractiveness. Another example is activity-driven networks with memory,<ref name="zino">{{cite journal |title=Modeling Memory Effects in Activity-Driven Networks ...
    3 KB (480 words) - 15:01, 9 January 2024
  • ...unication, in this context refers to moving data, either between levels of memory or between multiple processors over a network. It is much more expensive th === Two-level memory model === ...
    13 KB (1,863 words) - 21:54, 17 April 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)