Architectural Considerations of the Parallel SIMULA Machine
نویسندگان
چکیده
منابع مشابه
determination of maximal singularity free zones in the workspace of parallel manipulator
due to the limiting workspace of parallel manipulator and regarding to finding the trajectory planning of singularity free at workspace is difficult, so finding a best solution that can develop a technique to determine the singularity-free zones in the workspace of parallel manipulators is highly important. in this thesis a simple and new technique are presented to determine the maximal singula...
15 صفحه اولParallel machine match-up scheduling with manufacturing cost considerations
Many scheduling problems in practice involve rescheduling of disrupted schedules. In this study, we show that in contrast to fixed processing times, if we have the flexibility to control the processing times of the jobs, we can generate alternative reactive schedules considering the manufacturing cost implications in response to disruptions. We consider a non-identical parallel machining enviro...
متن کاملThe Simula Family
In this paper, we will describe a pedagogical immersive 3D story TBI-SIM and how it works. The system is a narrative simulation in a fully immersive 3D world in which the user controls a character that can interact with non-player characters (NPCs) and objects. The users achieve goals and make frequent choices that have an impact on the course of the story, thanks to a AI-based interactive dram...
متن کاملArchitectural Considerations with Distributed Computing
We understand distributed systems as a collection of distributed computation resources that work together as one harmonious system. It is the great achievement of computer networks, data communication and small but powerful computers that make it possible to use distributed commodity computers to facilitate distributed applications, to achieve reliable or high performance computing. The IT indu...
متن کاملArchitectural considerations for cryptanalytic hardware
We examine issues in high-performance cryptanalysis, focusing on the use of programmable logic. Several standard techniques from computer architecture are adapted and applied to this application. We present performance measurements for RC4, A5, DES, and CDMF; these measurements were taken from actual implementations. We conclude by estimating the resources needed to break these encryption algor...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Computer Journal
سال: 1984
ISSN: 0010-4620,1460-2067
DOI: 10.1093/comjnl/27.3.254