Weak scaling Sample Clauses

Weak scaling. If, instead of dividing the execution times by the total number of synapses, we divided it by the number of synapses assigned to each computational core, we should obtain, for the same consideration of the previous section, a value that for an ideal code, executing on an ideal machine should be constant for different network sizes and number of computational cores assigned to the solution of the problem. Figure 3-5 is the graph of our measures. Looking for hints about how to further enhance the scalability features of the system, we observe an interesting feature: when the simulation is distributed among a large number of hardware cores, the simulation runs relatively faster for larger configurations (i.e. configurations that host more “neural columns” per hardware core/software process). We analyze this point in the next “Discussion” section. Figure 3-5 Weak scaling of the DPSNN-STDP benchmark
AutoNDA by SimpleDocs

Related to Weak scaling

  • Unbundled Channelization (Multiplexing) 5.7.1 To the extent NewPhone is purchasing DS1 or DS3 or STS-1 Dedicated Transport pursuant to this Agreement, Unbundled Channelization (UC) provides the optional multiplexing capability that will allow a DS1 (1.544 Mbps) or DS3 (44.736 Mbps) or STS-1 (51.84 Mbps) Network Elements to be multiplexed or channelized at a BellSouth central office. Channelization can be accomplished through the use of a multiplexer or a digital cross-connect system at the discretion of BellSouth. Once UC has been installed, NewPhone may request channel activation on a channelized facility and BellSouth shall connect the requested facilities via COCIs. The COCI must be compatible with the lower capacity facility and ordered with the lower capacity facility. This service is available as defined in NECA 4.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Mileage Measurement Where required, the mileage measurement for LIS rate elements is determined in the same manner as the mileage measurement for V&H methodology as outlined in NECA Tariff No. 4.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!