Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Asymmetrical Gameplay (1)
- C++ (1)
- Computer-assisted instruction | Learning -- Theory (1)
- Gemmini (1)
- Hardware accelerators (1)
-
- Haunted House (1)
- Large Language Models (LLM) (1)
- Management information systems | Application software (1)
- Non Von-Neumann architecture (1)
- Personal information management | Executives -- Time management | Information resources management | Human-machine systems | Intranet programming | Business communication -- Computer network (1)
- Processing-in-memory (1)
- Software engineering | Intelligent agents (Computer software) | Computer science (1)
- Spatial array multiplier (1)
Articles 1 - 6 of 6
Full-Text Articles in Engineering
Gen-Acceleration: Pioneering Work For Hardware Accelerator Generation Using Large Language Models, Durga Lakshmi Venkata Deepak Vungarala
Gen-Acceleration: Pioneering Work For Hardware Accelerator Generation Using Large Language Models, Durga Lakshmi Venkata Deepak Vungarala
Theses
Optimizing computational power is critical in the age of data-intensive applications and Artificial Intelligence (AI)/Machine Learning (ML). While facing challenging bottlenecks, conventional Von-Neumann architecture with implementing such huge tasks looks seemingly impossible. Hardware Accelerators are critical in efficiently deploying these technologies and have been vastly explored in edge devices. This study explores a state-of-the-art hardware accelerator; Gemmini is studied; we leveraged the open-sourced tool. Furthermore, we developed a Hardware Accelerator in the study we compared with the Non-Von-Neumann architecture. Gemmini is renowned for efficient matrix multiplication, but configuring it for specific tasks requires manual effort and expertise. We propose implementing …
Scare Tactics, Tiago Martines, Gabriel Ortega, Karan Sahu, Lucas Pereira Vasconcelos, Henrique Silva Chaltein De Almeida
Scare Tactics, Tiago Martines, Gabriel Ortega, Karan Sahu, Lucas Pereira Vasconcelos, Henrique Silva Chaltein De Almeida
Theses
It is the purpose of this document to describe the design and development processes of Scare Tactics. The game will be discussed in further detail as it relates to several areas, such as market analysis, development process, game design, technical design, and each team members’ individual area of background research. The research areas include asymmetrical game design, level design, game engine architecture, real-time graphics, user interface design, networking and artificial intelligence.
As part of the team’s market analysis, other games featuring asymmetric gameplay are discussed. The games described in this section serve as inspirations for asymmetric game design. Some …
Optimization In Multi-Agent Systems : Structures And Procedures, Ingo Stengel
Optimization In Multi-Agent Systems : Structures And Procedures, Ingo Stengel
Theses
The main advantage for the use of agent technology is in the capacity of agents to represent the interests of individual entities and to act autonomously on their behalf. In multi-agent systems this involves communication, coordination and negotiation.
The focus of this dissertation is to find ways to optimize multi-agent systems at different levels by taking into consideration their structure and the procedures used. As optimization depends to a large extent on the problem to be solved, group forming scenarios, in which self-interested agents compete to form and join groups, have been selected here for consideration. Optimization issues are discussed …
Personal Information Management. A Framework For Development Of Personalisable Web Based Services, Christopher Fuchs
Personal Information Management. A Framework For Development Of Personalisable Web Based Services, Christopher Fuchs
Theses
The thesis research proposed herein will model, analyse and implement strategies for the development of personalised services. The goal of the research work is to design and implement a framework which supports developers by minimising the effort required in implementing personalised services. This includes the ability to react to localisation changes and to present proper information. An overall design goal is the independency of most components from each other which will be attained through the use of standard technologies and protocols and the consistent use of a component model. The result will include the proposed framework and the analyses of …
A Service-Based Architecture For Learning Management Systems Which Supports Personalisation And Collaboration, Markus Schmid
A Service-Based Architecture For Learning Management Systems Which Supports Personalisation And Collaboration, Markus Schmid
Theses
This work develops a service-based architecture for an extensible and customisable learning management system (LMS) runtime environment. The architecture mainly defines interfaces for the interaction of functional system components represented by loosely coupled distributed services. Services that represent functional components of the distributed LMS are called e-leaming services. In addition, underlying infrastructure services provide supportive functionality such as service-lookup within an institution. Users access the system using an LMS portal component that acts as a front-end for the LMS services.
While existing e-leaming environments provide a relatively good coverage of most of the functional requirements defined in this work, they …
Enterprise Business Objects : Design And Implementation Of A Business Object Framework, Kai-Uwe Schafer
Enterprise Business Objects : Design And Implementation Of A Business Object Framework, Kai-Uwe Schafer
Theses
Software components representing business entities like customer or purchase order introduce a new way of Online Transaction Processing to business applications. Collaborating business objects allow to complete whole business processes as a single distributed transaction, instead of dividing it into queued steps, which sometimes even require user intervention. This IS due to the fact that business objects contain both business data and logic and that they incorporate multiple databases from different vendors and different geographic locations in a single transaction.
Business objects cannot be used as stand-alone components, but require a framework of services that manage persistence, concurrent transactions, and …