Shrew in a Beehive
نویسندگان
چکیده
منابع مشابه
The Beehive Cluster System
In this writeup, we present the system architecture of Beehive, a cluster system we are developing at Georgia Tech for supporting interactive applications and compute-intensive servers. The system provides a shared memory programming environment on a cluster of workstations interconnected by a high speed interconnect. The principal design features of Beehive include: a global address space acro...
متن کاملThe Scaffolded Sound Beehive
The Scaffolded Sound Beehive is an immersive multi-media installation which provides viewers an artistic visual and audio experience of activities in a beehive. Data were recorded in urban beehives and processed using sophisticated pattern recognition, AI technologies, and sonification and computer graphics software. The installation includes an experiment in using Deep Learning to interpret th...
متن کاملWorm Meets Beehive
Internet worms continue to plague the Internet infrastructure with wider and deeper impact since the Morris Worm in early 1988. It has been further shown that better-engineered worms like Warhol worms and Flash worms could spread across the Internet in minutes or even tens of seconds rather than hours. Such virulent spreading invalidates any manual counter-measures and poses an extremely seriou...
متن کاملResource Management and Transaction Model in BeeHive
The connuence of computers, communications and databases is quickly creating a global virtual database where many applications require real-time access to both temporally accurate and mul-timedia data. We are developing a global virtual database, called BeeHive, which is enterprise-speciic and ooers features along real-time, fault tolerance, quality of service for audio and video, and security ...
متن کاملThe Beehive Ring and Multiring Lock Protocols
Beehive is an experimental many-core computer implemented on a single FPGA. The system includes a number of RISC cores that are connected to each other and to main memory using a token ring interconnect. Among other things, the token ring is used to maintain a set of global hardware locks using a ring lock protocol. A multiring extension of the Beehive token ring has been proposed for which a m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Blue Jay
سال: 1965
ISSN: 2562-5667,0006-5099
DOI: 10.29173/bluejay2950