0

a scalable architecture for discrete

Tài liệu A scaffolding architecture for conformal cooling design in rapid plastic injection moulding doc

Tài liệu A scaffolding architecture for conformal cooling design in rapid plastic injection moulding doc

Kĩ thuật Viễn thông

... degree can provide various heat capacities for the heat transfer−ve DirectContact area The larger the contact area of the cooling passageway for heat transfer, the greaterthe region to achieve ... cooling passageway with scaffoldingelements. Figure 19 shows the flowchart of scaffold coolingsurface approximation. a) Formulation and numerical solution of conformal cool-ing passageway formed ... has six faces that provide one face asthe inlet and five faces as the outlet pathways for thecoolant flow. Figure 21b is an example of a cavity mouldhalf that is integrated with a scaffold cooling...
  • 20
  • 965
  • 0
Báo cáo khoa học:

Báo cáo khoa học: "A Flexible Architecture for Reference Resolution" docx

Báo cáo khoa học

... which are anaphoric. This layer contains all syntactic and semantic analysis components and all interaction with the surrounding sys- tem, such as access to a gender database or a lexicon for ... will ex- actly match the data available to a particular sys- tem's reference resolution component, so it may The authors thank James Allen for help on this project, as well as the anonymous ... The framework enables compari- son of baseline techniques across corpora and al- lows for easy modification of an implemented system when the sources of information available to anaphora resolution...
  • 4
  • 279
  • 0
PADS: A Policy Architecture for Distributed Storage Systems pptx

PADS: A Policy Architecture for Distributed Storage Systems pptx

Tổ chức sự kiện

... part of a data plane and policies as part of a control plane. The data plane encapsulates a set of com-mon mechanisms that handle the details of storing andtransmitting data and maintaining ... a server and all reads occur at clients. TRIP uses a self-tuning prefetch algorithm and delays applying inval-idations to a client’s locally cached data to maximize theamount of data that a ... closed. a node picks a peer to exchange updates with via anti-entropy sessions.Pangaea [26] Pangaea is a peer-to-peer distributedstorage system for wide area networks. Pangaea main-tains a connected...
  • 15
  • 454
  • 0
Báo cáo khoa học:

Báo cáo khoa học: "A Connectionist Architecture for Learning to Parse" potx

Báo cáo khoa học

... ex. ac. uk Abstract We present a connectionist architecture and demon- strate that it can learn syntactic parsing from a cor- pus of parsed text. The architecture can represent syntactic ... demonstrating SSNs' ability to learn syntactic parsing. The task is to map a sentence's sequence of part of speech tags to either an unlabeled or labeled parse tree, as given in a preparsed ... &apos ;a& apos; and 'the' are encoded 'AT', and verbs such as 'is' encoded 'VBZ'. These are input to the network by setting one bit in each of three banks...
  • 7
  • 354
  • 0
A Key Management Architecture for Digital Cinema ppt

A Key Management Architecture for Digital Cinema ppt

Sân khấu điện ảnh

... cryptographic mechanisms. SPBs shall carry an RSA private key [8] and a matching digital certificate stating their role, as to allow authentication by a Security Manager or another SPB. After ... input and generates a KDM for the referred target player as output. The architecture was designed in such a way that the existing web platform handles all data persistency and user interactions. ... would be adequate as a programming language. Python and Java were also briefly considered, but PHP was the first choice for a number of reasons: The web platform is already written in PHP and since...
  • 8
  • 491
  • 0
A Scalable and Explicit Event Delivery Mechanism for UNIX doc

A Scalable and Explicit Event Delivery Mechanism for UNIX doc

Tổ chức sự kiện

... indicating which file descriptors are available for I/O. A member of the readfds set is available if thereis any available input data; a member of writefds is con-sidered writable if the available ... mechanism for UNIXGaurav Banga gaurav@netapp.comNetwork Appliance Inc., 2770 San Tomas Expressway, Santa Clara, CA 95051Jeffrey C. Mogul mogul@pa.dec.comCompaq Computer Corp. Western Research ... USENIX Annual Technical ConferenceMonterey, California, USA, June 6-11, 1999 A Scalable and Explicit EventDelivery Mechanism for UNIX_Gaurav Banga,Network Appliance Inc.Jeffrey C. MogulCompaq...
  • 14
  • 453
  • 0
Báo cáo khoa học:

Báo cáo khoa học: "A Scalable Probabilistic Classifier for Language Modeling" pdf

Báo cáo khoa học

... CategorizationResearch. Journal of Machine Learning Research,5:361–397. A. Mnih and G. Hinton. 2008. A Scalable HierarchicalDistributed Language Model. In Advances in NeuralInformation Processing ... Ducharme, P. Vincent, and C. Jauvin. 2003. A Neural Probabilistic Language Model. Journal ofMachine Learning Research, 3:1137–1155. A. Berger, V. Della Pietra, and S. Della Pietra. 1996. A Maximum ... that type of feature. The wildcard symbol*isused as a placeholder for arbitrary regular words. Thebias feature, which is active for each instance is writtenas* * *. In standard N-Gram...
  • 6
  • 350
  • 0
Chord: A Scalable Peertopeer Lookup Service for Internet Applications pot

Chord: A Scalable Peertopeer Lookup Service for Internet Applications pot

Quản trị mạng

... ring. Assuming that the data Chordis being used to locate is cryptographically authenticated, this is a threat to availability of data rather than to authenticity. The sameapproach used above ... de-sired authentication, caching, replication, and user-friendly namingof data. Chord’s flat key space eases the implementation of thesefeatures. For example, an application could authenticate data ... mechanism also helps higher layer softwarereplicate data. A typical application using Chord might store repli-cas of the data associated with a key at the nodes succeeding thekey. The fact that...
  • 12
  • 441
  • 0
A Layered Naming Architecture for the Internet doc

A Layered Naming Architecture for the Internet doc

Quản trị mạng

... cryptograph-ically strong identifier, as in HIP, may be preferable for securityreasons.FARA[8] is a meta -architecture that actual network architecturescould “instantiate.” In FARA, the basic ... P. Francis and R. Gummadi. IPNL: A NAT-extended Internet architecture. In ACM SIGCOMM, San Diego, CA, Aug.2001.[19] B. Gleeson, A. Lin, J. Heinanen, G. Armitage, and A. Malis. A framework for ... [59], and Open NetworkHandles [37] take an entirely different approach: they advocate a single new flat namespace that can serve all present and future net-work elements. A flat namespace has no...
  • 10
  • 413
  • 0
NiagaraCQ: A Scalable Continuous Query System for Internet Databases ppt

NiagaraCQ: A Scalable Continuous Query System for Internet Databases ppt

Quản trị mạng

... initial writing of the paper. We are particularly grateful toAshraf Aboulnaga, Navin Kabra and David Maier for theircareful review and helpful comments on the paper. We alsothank the anonymous ... (1999).[MD89] D. McCarthy and U. Dayal. The architecture of anactive database management system. SIGMOD 1989: 215-224.[RC88] A. Rosenthal and U. S. Chakravarthy. Anatomy of a Modular Multiple Query ... A. Kotz-Dittrich. Promises and Realities ofActive Database Systems. VLDB 1995: 642-653.[SPAM91] U. Schreier, H. Pirahesh, R. Agrawal, and C.Mohan. Alert: An architecture for transforming a...
  • 12
  • 425
  • 0
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications ppt

Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications ppt

Quản trị mạng

... the total cost of the system, since each participantneed providecapacity only for the averageload, not for thatparticipant’s peak load. Dabek et al. describe a realizationof this idea that uses ... in a particular geographi-cal region, or all the nodes that usea particular access link, orallthe nodes that have a certain IP address prefix. As was discussedabove, because Chord node IDs are ... David R. Karger‡, M. Frans Kaashoek‡, Frank Dabek‡,Hari Balakrishnan‡Abstract— A fundamental problem that confronts peer-to-peer applications is theefficient location of the node that...
  • 14
  • 539
  • 1
pattern-oriented software architecture volume 4 a pattern language for distributed computing

pattern-oriented software architecture volume 4 a pattern language for distributed computing

Đại cương

... several distribution and patternexperts. Ademar Aguimar, Steve Berczuk, Alan O’Callaghan, Ekata-rina Chtcherbina, Jens Coldewey, Richard Gabriel, Ian Graham,Prashant Jain, Nora Koch, Doug Lea, ... ABSTRACT FACTORY (525), BUILDER (527), FACTORY METHOD (529),and DISPOSAL METHOD (531).Database Access:DATABASE ACCESS LAYER (538), DATA MAPPER (540), ROW DATA GATEWAY (542),TABLE DATA GATEWAY ... of Pattern FormPatterns are often recognized and used informally, acquiring a namebased on a particular implementation, with the implication that anyuse of the key characteristics of a particular...
  • 639
  • 304
  • 0
a flexible and expandable architecture for computer games - thesis with appendix

a flexible and expandable architecture for computer games - thesis with appendix

Thiết kế - Đồ họa - Flash

... costs, is expandability and maintainability. Successful games often have new incarnations with expanded game play and updated technology. For example, Blizzard’s™ successful game Warcraft™ is currently ... hoc approach to creating a game architecture is that quality attributes like flexibility and expandability are rarely incorporated in the design. For example ID™ software ended up rewriting almost ... to actually build a game-like system to demonstrate the quality attributes. Unfortunately designing a commercial quality game to fully demonstrate the capabilities of the architecture are...
  • 412
  • 1,238
  • 0

Xem thêm