SIMILARITY-BASED HIERARCHICAL DATA LOADING FOR MACHINE LEARNING TRAINING

    公开(公告)号:US20210312316A1

    公开(公告)日:2021-10-07

    申请号:US16837133

    申请日:2020-04-01

    IPC分类号: G06N20/00 G06F3/06

    摘要: Original data for machine learning training can be received. The original data can be divided into baseline data and difference data. The baseline data and the difference data can be stored in different memory devices of the memory hierarchy associated with a computer, wherein the baseline data is stored in a first memory device having faster access speed than a second memory device in which the difference data is stored. The baseline data and the difference data can be loaded from the different memory devices. The original data can be reconstructed from the baseline data and the difference data. The reconstructed original data can be fed to a machine learning model to train the machine learning model.

    METHODOLOGY FOR FAST DETECTION OF FALSE SHARING IN THREADED SCIENTIFIC CODES
    4.
    发明申请
    METHODOLOGY FOR FAST DETECTION OF FALSE SHARING IN THREADED SCIENTIFIC CODES 有权
    用于快速检测螺纹科学代码中的假共享的方法

    公开(公告)号:US20140156939A1

    公开(公告)日:2014-06-05

    申请号:US13689927

    申请日:2012-11-30

    IPC分类号: G06F12/08

    CPC分类号: G06F11/3624

    摘要: A profiling tool identifies a code region with a false sharing potential. A static analysis tool classifies variables and arrays in the identified code region. A mapping detection library correlates memory access instructions in the identified code region with variables and arrays in the identified code region while a processor is running the identified code region. The mapping detection library identifies one or more instructions at risk, in the identified code region, which are subject to an analysis by a false sharing detection library. A false sharing detection library performs a run-time analysis of the one or more instructions at risk while the processor is re-running the identified code region. The false sharing detection library determines, based on the performed run-time analysis, whether two different portions of the cache memory line are accessed by the generated binary code.

    摘要翻译: 分析工具识别具有虚假共享潜力的代码区域。 静态分析工具将识别的代码区域中的变量和数组进行分类。 映射检测库将所识别的代码区域中的存储器访问指令与所识别的代码区域中的变量和数组相关联,同时处理器正在运行所识别的代码区域。 映射检测库识别在识别的代码区域中有风险的一个或多个指令,这些指令受到虚假共享检测库的分析。 虚假共享检测库在处理器重新运行所识别的代码区域时对处于风险中的一个或多个指令执行运行时分析。 假共享检测库基于执行的运行时分析来确定高速缓冲存储器行的两个不同部分是否被生成的二进制代码访问。

    TRANSPARENT SERVICE-AWARE MULTI-PATH NETWORKING WITH A FEATURE OF MULTIPLEXING

    公开(公告)号:US20230079088A1

    公开(公告)日:2023-03-16

    申请号:US17475414

    申请日:2021-09-15

    IPC分类号: H04L12/707

    摘要: A computer-implemented method, a computer program product, and a computer system for multi-path networking with a feature of multiplexing. One or more computing devices or servers configure wrappers for respective ones of applications and run the applications with the wrappers preloaded to the respective ones of the applications. The wrappers establish communication through one or more alternative paths between wrapped applications, where the one or more alternative paths are parallel to an original path between the applications. The wrappers exchange data between the applications through either the one or more alternative paths or the original path. The wrappers finalize connections through the one or more alternative paths, in response to all the data being exchanged.

    Optical Flow Based Forecasting of Binding States in Molecular Dynamic Simulations

    公开(公告)号:US20220230702A1

    公开(公告)日:2022-07-21

    申请号:US17154120

    申请日:2021-01-21

    摘要: A computer-implemented method for executing a computation task in a molecular dynamic simulation includes identifying a bonding target on a ligand; constructing a protein structure; rendering an image of the ligand; subsampling data pertaining to the constructed protein structure and the image of the ligand at a particular frequency; rendering a two-dimensional image of the constructed protein structure relative to the ligand from a plurality of viewpoints; computing optical flows of the protein structure relative to the ligand based on the two-dimensional image; analyzing the optical flows to determine a displacement of atoms; simulating a binding state outcome of the protein structure relative to the ligand for each of the plurality of viewpoints; and predicting a probability of the protein structure binding with the ligand, based on the predicted binding state outcome for each of the plurality of viewpoints.

    Similarity-based hierarchical data loading for machine learning training

    公开(公告)号:US11354595B2

    公开(公告)日:2022-06-07

    申请号:US16837133

    申请日:2020-04-01

    摘要: Original data for machine learning training can be received. The original data can be divided into baseline data and difference data. The baseline data and the difference data can be stored in different memory devices of the memory hierarchy associated with a computer, wherein the baseline data is stored in a first memory device having faster access speed than a second memory device in which the difference data is stored. The baseline data and the difference data can be loaded from the different memory devices. The original data can be reconstructed from the baseline data and the difference data. The reconstructed original data can be fed to a machine learning model to train the machine learning model.

    Methodology for fast detection of false sharing in threaded scientific codes
    8.
    发明授权
    Methodology for fast detection of false sharing in threaded scientific codes 有权
    用于快速检测线程科学代码中的虚假共享的方法

    公开(公告)号:US08898648B2

    公开(公告)日:2014-11-25

    申请号:US13689927

    申请日:2012-11-30

    CPC分类号: G06F11/3624

    摘要: A profiling tool identifies a code region with a false sharing potential. A static analysis tool classifies variables and arrays in the identified code region. A mapping detection library correlates memory access instructions in the identified code region with variables and arrays in the identified code region while a processor is running the identified code region. The mapping detection library identifies one or more instructions at risk, in the identified code region, which are subject to an analysis by a false sharing detection library. A false sharing detection library performs a run-time analysis of the one or more instructions at risk while the processor is re-running the identified code region. The false sharing detection library determines, based on the performed run-time analysis, whether two different portions of the cache memory line are accessed by the generated binary code.

    摘要翻译: 分析工具识别具有虚假共享潜力的代码区域。 静态分析工具将识别的代码区域中的变量和数组进行分类。 映射检测库将所识别的代码区域中的存储器访问指令与所识别的代码区域中的变量和数组相关联,同时处理器正在运行所识别的代码区域。 映射检测库识别在识别的代码区域中有风险的一个或多个指令,这些指令受到虚假共享检测库的分析。 虚假共享检测库在处理器重新运行所识别的代码区域时对处于风险中的一个或多个指令执行运行时分析。 假共享检测库基于执行的运行时分析来确定高速缓冲存储器行的两个不同部分是否被生成的二进制代码访问。

    Transparent service-aware multi-path networking with a feature of multiplexing

    公开(公告)号:US11665087B2

    公开(公告)日:2023-05-30

    申请号:US17475414

    申请日:2021-09-15

    IPC分类号: H04L45/24 H04L45/00

    CPC分类号: H04L45/24 H04L45/22

    摘要: A computer-implemented method, a computer program product, and a computer system for multi-path networking with a feature of multiplexing. One or more computing devices or servers configure wrappers for respective ones of applications and run the applications with the wrappers preloaded to the respective ones of the applications. The wrappers establish communication through one or more alternative paths between wrapped applications, where the one or more alternative paths are parallel to an original path between the applications. The wrappers exchange data between the applications through either the one or more alternative paths or the original path. The wrappers finalize connections through the one or more alternative paths, in response to all the data being exchanged.