نتایج جستجو برای: batch processing

تعداد نتایج: 523888  

2015

Traditional high performance computing (HPC)/ supercomputing, analytics and mainstream realtime/batch computing are quickly converging. Mainstream workloads are crossing over the high performance computing arena, demanding faster analytics/batching, resource-intensive computations and algorithms. To succeed in today’s accelerating digital world, enterprises must collect and analyze mind-bogglin...

2008
Yuan Wu Hongxin Zhang Chao Song Hujun Bao

This paper presents a method for analogizing high-dimensional spacetime curves, and shows how it can be used to transform a motion sequence into new content and styles according to two accompanied reference sequences. By providing examples, our system can estimate the parameters of a statistical model which incorporates spatial and temporal factors for motion curves. A user can then easily modi...

2004
Ed Sponsler

3 Processing Algorithm 3 3.1 Document File Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3.2 Successful Downloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 3.3 Removing Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 3.4 Obtaining Document Metadata . . . . . . . . . . ...

2008
Takashi Muramatsu Yamato Ohtani Tomoki Toda Hiroshi Saruwatari Kiyohiro Shikano

As typical voice conversion methods, two spectral conversion processes have been proposed: 1) the frame-based conversion that converts spectral parameters frame by frame and 2) the trajectory-based conversion that converts all spectral parameters over an utterance simultaneously. The former process is capable of real-time conversion but it sometimes causes inappropriate spectral movements. On t...

Journal: :IBM Systems Journal 1972
W. Sands Hobgood

a computer network experiment designed to study a method of making the computing power of a high-speed batch system available to the interactive terminal system user. Com-mazds for effecting the intersystem linkage and network operations are presented. Emphasized are system measurements and system tuning techniques for increasing eficiency. There are numerous large computer installations in the...

Journal: :Informatica, Lith. Acad. Sci. 2011
Kitae Kim Ikkwon Yie Seongan Lim Haeryong Park

Batch cryptography has been developed into two main branches – batch verification and batch identification. Batch verification is a method to determine whether a set of signatures contains invalid signatures, and batch identification is a method to find bad signatures if a set of signatures contains invalid signatures. Recently, some significant developments appeared in such field, especially b...

2007
O. GUSCHINSKAYA A. DOLGUI Olga Guschinskaya Alexandre Dolgui Nikolai Guschinsky Genrikh Levin

We study the problem of minimizing makespan for part machining on a multi-spindle heads machine with a mobile table. We show that this problem can be formulated as a scheduling problem for a single batch machine with compatibility and precedence constraints between jobs. Jobs grouped in a batch are processed simultaneously, but the difference from considered in the literature max-batch machine ...

2014
Luise Pufahl Ekaterina Bazhenova Mathias Weske

Today, the goal of many organizations is to optimize their business processes. A factor for optimization is the reduction of costs associated with mass production and customer service, e.g., by the mean of batch processing. In business process management, batch activities allow to improve the process performance by synchronizing the execution of a set of process instances. However, the issue of...

2012
Benjamin Van Durme

Inferring attributes of discourse participants has been treated as a batch-processing task: data such as all tweets from a given author are gathered in bulk, processed, analyzed for a particular feature, then reported as a result of academic interest. Given the sources and scale of material used in these efforts, along with potential use cases of such analytic tools, discourse analysis should b...

2003
Qingyu Zhang Kenneth L. Calvert

Secure distribution of information to authorized recipients is an important prerequisite for group applications with commercial potential. Typically in such applications data traffic is encrypted using a single key; that key in turn is distributed securely to the group using one of several mechanisms that rely on a set of “key encryption” keys assigned to each user. As users join and leave the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید