Articles with "critical path" as a keyword



Photo by alterego_swiss from unsplash

Printing the network: AIDS activism and online access in the 1980s

Sign Up to like & get
recommendations!
Published in 2018 at "Continuum"

DOI: 10.1080/10304312.2018.1404670

Abstract: Abstract HIV/AIDS activists in the 1980s made up a significant cohort of early computer network users, who used Bulletin Board Systems (BBS) to create and circulate health information amongst PWA (People living with AIDS) communities.… read more here.

Keywords: information; network; hiv aids; critical path ... See more keywords
Photo from wikipedia

Energy-Efficient High-Speed ASIC Implementation of Convolutional Neural Network Using Novel Reduced Critical-Path Design

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3162066

Abstract: Convolutional Neural Network (CNN) plays an important role in several machine learning tasks related to speech, image, and video processing applications. The increasing demand for faster processing in real-time applications requires high-speed implementation of CNN.… read more here.

Keywords: high speed; architecture; implementation; critical path ... See more keywords
Photo by goumbik from unsplash

PreGNN: Hardware Acceleration to Take Preprocessing Off the Critical Path in Graph Neural Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Computer Architecture Letters"

DOI: 10.1109/lca.2022.3193256

Abstract: In this paper, we observe that the main performance bottleneck of emerging graph neural networks (GNNs) is not the inference algorithms themselves, but their graph data preprocessing. To take such preprocessing off the critical path… read more here.

Keywords: neural networks; take preprocessing; graph neural; critical path ... See more keywords
Photo from wikipedia

Critical Path-Based Backdoor Detection for Deep Neural Networks.

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE transactions on neural networks and learning systems"

DOI: 10.1109/tnnls.2022.3201586

Abstract: Backdoor attack to deep neural networks (DNNs) is among the predominant approaches to bring great threats into artificial intelligence. The existing methods to detect backdoor attacks focus on the perspective of distributions in DNNs, however,… read more here.

Keywords: neural networks; deep neural; path; based backdoor ... See more keywords
Photo by bladeoftree from unsplash

Distributed Latency Profiling through Critical Path Tracing

Sign Up to like & get
recommendations!
Published in 2022 at "Communications of the ACM"

DOI: 10.1145/3570522

Abstract: CPT can provide actionable and precise latency analysis. read more here.

Keywords: latency profiling; path tracing; distributed latency; latency ... See more keywords
Photo by charlesdeluvio from unsplash

Using the critical path method to rollout and optimise new PMTCT guidelines to eliminate mother-to-child transmission of HIV in Zimbabwe: a descriptive analysis

Sign Up to like & get
recommendations!
Published in 2020 at "BMC Health Services Research"

DOI: 10.1186/s12913-020-05900-4

Abstract: Achievement of the elimination target for mother-to-child transmission (MTCT) of HIV in selected countries has increased hope to end the HIV epidemic in children across the world. However, MTCT rates remain well above the 5%… read more here.

Keywords: pmtct; pmtct guidelines; hiv; critical path ... See more keywords
Photo by sunburned_surveyor from unsplash

Generalized Resource-Constrained Critical Path Method to Improve Sustainability in Construction Project Scheduling

Sign Up to like & get
recommendations!
Published in 2020 at "Sustainability"

DOI: 10.3390/su12218918

Abstract: Delays by limited supply of resources are common in many construction projects and may cause serious monetary disputes between project participants. Since the dispute resolution may require unnecessary additional time and cost, preventing delays in… read more here.

Keywords: constrained critical; construction; resource; resource constrained ... See more keywords