intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Memory required

Xem 1-20 trên 125 kết quả Memory required
  • Ebook Designing with the mind in mind - Simple guide to understanding user interface design rules presents the following content: We perceive what we expect; our vision is optimized to see structure; we seek and use visual structure; reading is unnatural; our color vision is limited; our peripheral vision is poor; our attention is limited; our memory is imperfect; limits on attention, shape, thought and action; recognition is easy; recall is hard; learning from experience and performing learned actions are easy; problem solving and calculation are hard; many factors affect learning; we have...

    pdf188p zizaybay1103 29-05-2024 2 1   Download

  • Problem-solving process requires information processing, and the information processing is related to working memory capacity (WMC). This study aims to determine the effect of WMC on students' mathematical abilities and to describe the ability of the students with high and low WMC in solving mathematical problems.

    pdf13p viarnault 25-04-2024 2 1   Download

  • The goal of this book is to share the art of hacking with everyone. Understanding hacking techniques is often difficult, since it requires both breadth and depth of knowledge. Many hacking texts seem esoteric and confusing because of just a few gaps in this prerequisite education. Ebook Hacking: the art of exploitation (2nd edition): Part 1 includes contents: 0x100: Introduction, 0x200: Programming, 0x300: Exploitation, 0x400: Networking.

    pdf290p longtimenosee05 31-03-2024 3 0   Download

  • Part 2 book "The gerontology nurse's guide to the community based health network" includes contents: Home health services; skilled nurse competency requirements for home health services; hospice and palliative care services; skilled nurse competency requirements for hospice services ; independent living; assisted living; long term care; alzheimer’s and memory care; additional community health resources for the financially compromised;... and other contents.

    pdf184p muasambanhan08 04-03-2024 3 1   Download

  • In the age of big data, a memory with cross-bar array architecture is urgently required to facilitate highdensity data storage. To eliminate the sneak path current of integrated circuits, threshold switchingbased selectors have been utilized simultaneously with resistive switching memories.

    pdf13p viberbers 09-08-2023 9 3   Download

  • Continued part 1, part 2 of ebook "Compiler design in C" presents the following content: code generation; the virtual machine; memory organization; variable declarations; optimization strategies; parser optimizations; linear (peephole) optimizations; structural optimizations; common-subexpression elimination; database maintenance-hashing; miscellaneous functions; grammatical transformations;...

    pdf524p dieptieuung 14-07-2023 7 4   Download

  • This project examines how the moving image can be used as a vehicle of memory, to express what is lost, what is gained and what changes occur in relation to personal family migratory history—a messy and ambiguous process. This practice-led research project investigates video work, using filmed materials and objects, to focus attention on the non-linear aspect of time as it is subjected to individual and collective memories. The outcomes highlight the sometimes disconnecting and unpredictable experiences of migration, storytelling, and memory.

    pdf62p runthenight04 02-02-2023 4 1   Download

  • Lecture Human-computer interaction (3rd) - Chapter 1: The human. This chapter is the first of four in which we introduce some of the ‘foundations’ of HCI. We start with the human, the central character in any discussion of interactive systems. The human, the user, is, after all, the one whom computer systems are designed to assist. The requirements of the user should therefore be our first priority.

    ppt42p runordie1 10-05-2022 14 2   Download

  • Lecture Theory of Automata: Lesson 20. The main topics covered in this chapter include: recap theorem and example, finite automaton with output, moore machine and examples, Martin’s method, the memory required to recognize,...

    ppt18p wangziyi_1307 26-04-2022 12 3   Download

  • Lecture Theory of Automata: Lesson 19. The main topics covered in this chapter include: NFA corresponding to Closure of FA and examples, memory required to recognize a language and example, distinguishing one string from another and example, theorem and proof,...

    ppt20p wangziyi_1307 26-04-2022 11 2   Download

  • Although Kraken’s k-mer-based approach provides a fast taxonomic classification of metagenomic sequence data, its large memory requirements can be limiting for some applications. Kraken 2 improves upon Kraken 1 by reducing memory usage by 85%, allowing greater amounts of reference genomic data to be used, while maintaining high accuracy and increasing speed fivefold.

    pdf13p vielonmusk 30-01-2022 9 0   Download

  • Estimating memory required by complex programs is a well-known research topic. In this work, we build a type system to statically estimate the memory bounds required by shared variables in software transactional memory (STM) programs. This work extends our previous works with additional language features such as explicitly declared shared variables, introduction of primitive types, and allowing loop body to contain any statement, not required to be well-typed as in our previous works. Also, the new type system has better compositionality compared to available type systems.

    pdf19p guitaracoustic02 08-12-2021 18 1   Download

  • Lecture Analysis of Algorithms - Lesson 03: Sorting present the content: asymptotic performance, running time, memory/storage requirements, insertion sort, analyzing insertion sort, simplifications, upper bound notation,...

    pdf54p bachdangky 06-09-2021 10 1   Download

  • Objective: Objective of this dissertation is to find a novel method to reduce computation cost as well as memory requirement but still retain accuracy in video-based person ReID approach. In video-based person ReID, computation cost and memory requirement are the two main issues. Working with a large number of images is the burden of any surveillance system. This results in a high computation cost as well as a large memory capacity.

    pdf143p armyofthedead 23-06-2021 14 3   Download

  • The following will be discussed in this chapter: Circuits require memory to store intermediate data; sequential circuits use a periodic signal to determine when to store values; single bit storage element is a flip flop; a basic type of flip flop is a latch; latches are made from logic gates.

    ppt37p larachdumlanat126 31-12-2020 12 1   Download

  • Further advances in modern microscopy are leading to teravoxel-sized tiled 3D images at high resolution, thus increasing the dimension of the stitching problem of at least two orders of magnitude. The existing software solutions do not seem adequate to address the additional requirements arising from these datasets, such as the minimization of memory usage and the need to process just a small portion of data.

    pdf15p viwyoming2711 16-12-2020 8 1   Download

  • Processing of reads from high throughput sequencing is often done in terms of edges in the de Bruijn graph representing all k-mers from the reads. The memory requirements for storing all k-mers in a lookup table can be demanding, even after removal of read errors, but can be alleviated by using a memory efficient data structure.

    pdf19p viwyoming2711 16-12-2020 15 0   Download

  • The haplotype phasing problem tries to screen for phenotype associated genomic variations from millions of candidate data. Most of the current computer programs handle this problem with high requirements of computing power and memory.

    pdf9p vikentucky2711 26-11-2020 9 1   Download

  • Signatures are short sequences that are unique and not similar to any other sequence in a database that can be used as the basis to identify different species. Even though several signature discovery algorithms have been proposed in the past, these algorithms require the entirety of databases to be loaded in the memory, thus restricting the amount of data that they can process.

    pdf10p vikentucky2711 26-11-2020 11 2   Download

  • Advances in 3D graphics make it possible to generate highly realistic 3D models which usually contain a huge number of polygons. This large number of polygons gives rise to many challenges with respect to real-time rendering performance, storage requirements, and the transmission of graphics dataset over the network. In this paper, a networked rendering paradigm based on our pipeline-splitting method is introduced to facilitate the remote rendering system.

    pdf12p cothumenhmong8 05-11-2020 21 1   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
3=>0