Graph processing and machine learning architectures with emerging memory technologies:a survey

来源 :Science China(Information Sciences) | 被引量 : 0次 | 上传用户:zhangyi89521
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
This paper surveys domain-specific architectures(DSAs) built from two emerging memory technologies. Hybrid memory cube(HMC) and high bandwidth memory(HBM) can reduce data movement between memory and computation by placing computing logic inside memory
其他文献
Focal distance tabu search modifies a standard tabu search algorithm for binary optimization by augmenting a periodic diversification step that drives the search away from a current best (or elite) solution until the objective function deteriorates beyond
In the present study,the finite-time asynchronous dissipative filter design problem for the Markov jump systems with conic-type nonlinearity is studied.The hidden Markov model can describe the asyn-chronism embodied in the system modes and the filter mode
Dear editor,rnThe propulsion module of an anchor-hole driller controls the drilling speed with a hydraulic cylinder that provides the ax-ial force when driving a drilling rig to break the surrounding rocks.This drilling process is traditionally controlled
期刊
Individual privacy preservation has become an important issue with the development of big data technology.The definition of p-differential identifiability (DI) precisely matches the legal definitions of privacy,which can provide an easy parameterization a
Tangential leakage loss reduction has great significance on improving the performance of scroll compressors.In this study,the flow field of a scroll compressor working with CO2 was numerically investigated.The development characteristics of the tangential
In order to protect the privacy and data security of mobile devices during the transactions in the industrial Internet of Things (IIoT),we propose a mobile edge computing (MEC)-based mobile blockchain framework by considering the limited bandwidth and com
Dear editor,rnImplementation attacks such as fault attack(FA)[1]and side-channel analysis (SCA)[2]are signifi-cant threats to the cryptographic device security.Infective countermeasure is a promising strategy to resist FAs.Its principle is to scramble the
期刊
In this study,the fault-tolerant attitude control of flexible spacecraft is investigated over digital communication channels,where a uniform quantizer is considered with respect to the sensor signals and controller indexes.Further,an adaptive fuzzy backst
Dear editor,rnHuman-powered lower exoskeletons are widely studied by academia and industry with regard to human locomotion and strength augmentation.Technological developments have boosted the use of machine learning toward improv-ing the control performa
期刊
In consideration of the high-density dislocations from the lithiation process of high-capacity electrodes in Li-ion batteries,in this paper,a new elastoplastic model is established to describe the diffusion-induced deformation and damage fracture.With the