نتایج جستجو برای: memory protocol
تعداد نتایج: 500200 فیلتر نتایج به سال:
This paper describes a new model for constructing distributed systems called the Remote Memory Model. The remote memory model consists of several client machines, one or more dedicated machines called remote memory servers, and a communication channel interconnecting them. In the remote memory model, client machines share the memory resources located on the remote memory server. Client machines...
It is known that N-methyl-D-aspartate (NMDA) receptor in the basolateral nucleus of amygdala (BLA) is essential for fear memory formation. NMDA NR2B and NR2A subtype receptors exhibit difference in electrophysiological and signaling properties. However, it is unclear whether these two subtype receptors have different roles in fear memory formation. Here, we provide evidence, using pharmacologic...
A cache memory contributes in both hiding memory latency and reducing the traffic on the processor interconnection network of shared memory multiprocessors but it causes the coherence problem. A coherence protocol [Tomasevic93] is required in order to guarantee the coherence of the cached copies. An adequate choice of the coherence protocol is critical for performance. In fact, when the number ...
By using rate-based flow control, out-of-band retransmissions, and aligning the size of protocol segments and end-system memory pages, the protocol (“Zing”) described in this paper enables efficient schedulable bulk data transfer over optical lightpaths.
BACKGROUND Genetic material extracted from in situ microbial communities has high promise as an indicator of biological system status. However, the challenge is to access genomic information from all organisms at the population or community scale to monitor the biosystem's state. Hence, there is a need for a better diagnostic tool that provides a holistic view of a biosystem's genomic status. H...
The type 1 and 8 adenylyl cyclase (ADCY1 ADCY8) exclusively account for Ca 2+ -stimulated cyclic AMP (cAMP) production regulate activity-dependent synaptic modification. In this study, we examined distinct forms of plasticity in the hippocampus Adcy1 −/− Adcy8 mice. We found that, at Schaffer collateral-CA1 synapses, while mice displayed normal long-term potentiation (LTP) following various ind...
This document describes a protocol providing Remote Direct Memory Access (RDMA) as a new transport for Remote Procedure Call (RPC). The RDMA transport binding conveys the benefits of efficient, bulkdata transport over high-speed networks, while providing for minimal change to RPC applications and with no required revision of the application RPC protocol, or the RPC protocol itself.
We propose an easy implementable prepare-and-measure protocol for robust quantum key distribution with photon polarization. The protocol is fault tolerant against collective random unitary channel noise. The protocol does not need any collective quantum measurement or quantum memory. A security proof and a specific linear optical realization using spontaneous parametric down conversion are given.
We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory.
In this paper we have discussed various memory architectures for Quantum Dot Cellular automata. New architectures have been proposed and their comparison has been done on the basis of area and latency. A protocol for using the serial memory has been outlined. A hybrid memory has been proposed. It is shown that the hybrid memory can be used as a tradeoff between area advantage of serial memory a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید