Licensable technology created by BSC

Showing 101 - 120 results of 153

BSD License (Version 3.0)

Implementation of MPI in PhysiCell code (Based on PhysiCell and collaboration with Gaurav Saxena from HLST at BSC).

The PMES Framework allows users to execute jobs in the cloud.

GPL License (Version 2.0)

PredIG uses antigen processing and presentation features plus physicochemical properties of the epitopes to predict T-cell recognition and immunogenicity of neoantigens.

The PROFET tool (PROFiling-based EsTimation of performance and energy) is designed to profile memory system performance, quantify the application pressure to the memory system and estimate application performance on hardware platforms with novel memory systems. It was initially designed for SandyBridge platforms with DDR3 main memory.

Apache License (Version 2.0)

This repository serves as a comprehensive platform for evaluating large language models (LLMs) utilizing diverse prompt engineering techniques aimed at enhancing performance on medical benchmarks. Our goal is to explore how prompt engineering impact LLMs' accuracy, reliability, and overall usefulness in addressing complex medical scenarios. This repo was first created to support the Aloe model.

Solderpad Hardware License (Version 2.1)

ProNoC presents an FPGA-optimized Network-On-Chip RTL code with ASIC-based NoC functionalities. ProNoC offers a fully parametrizable design written in SystemVerilog. The NoC is configurable with many state-of-art features such as virtual channels, virtual networks, hard-built-in QoS, multicast, multihop bypass, different routing algorithms, and network typologies.
This code models the multiparameter Wave Equation using Pseudo-Spectral Time-Domain methods. Multiparameter, because It considers either the velocity of propagation, the material density or the attenuation factor. Note that this attenuation controls two additional terms used for characterizing the dispersion and the power law absorption typically observed in wave propagation through human tissue. 

pyDock is a fast protocol which uses electrostatics and desolvation energy to score docking poses generated with FFT-based algorithms.

Software that provides pyDock docking energy partitioned at the residue level, giving a much more detailed description of the docking energy landscape. Additionally, pyDockEneRes computes the contribution to the docking energy of the side-chain atoms.

This tool is a port of the POD/DMD of the tools from UPM in MATLAB to C/C++ using a python interface. So far POD, DMD and sPOD are fully implemented and work is being done to bring hoDMD and VAEs inside the tool.

pyRMSD goal is the fast (and easy!) calculation of rmsd collective operations, specially matrices of large ensembles of protein conformations. It also offers a symmetric distance matrix implementation with improved access speed and memory efficiency.

Highly scalable multidimensional indexing system for NoSQL databases.

Qsymlib is a collection of numerical tools to perform symulations of Quantum Computers coupled to a classical computer. The set of tools is designed to be executed in an HPC environment, taking advantage of the multinode architecture by formulating the quantum problem as a Tensor Network. The library includes Machine Learning tools to control Quantum devices.

RESTK is an implementation of the algorithm to upper-bound extremely high quantiles using Markov's inequality to the power-of-k for probabilistic WCET.

Further details can be found in this publication:

This technology implements a Post-Quantum Cryptographic (PQC) accelerator to integrate it inside a System On Chip (SoC) for FPGA. The module, implemented in a High-Level Synthesis (HLS) approach, accelerates two PQC schemes, the CRYSTALS-Kyber and the CRYSTALS-Dilithium. On the one hand, CRYSTALS-Kyber is a key-encapsulation mechanism (KEM) belonging to asymmetric cryptography. Whose security is based on the difficulty of solving the learning-with-errors (LWE) problem over module lattices. On the other hand, CRYSTALS-DIlithium is a Digital Signature Scheme (DSS). It is strongly secure under chosen message attacks based on the hardness of lattice problems over module lattices. The security notion means that an adversary with access to a signing oracle cannot produce a signature of a message whose signature he hasn't yet seen nor produce a different signature of a message he already saw signed. Then, both schemes (Kyber and Dilithium) are the candidate algorithms to be standardized by the NIST post-quantum cryptography project.

Apache License (Version 2.0)

Rosnet is a simulation library for Quantum circuits using Tensor Networks. It provides a mechanism to simulate large Quantum circuits in HPC machines.

GPL License (Version 3.0)

The advanced version of package 's2dverification'. It is intended for 'seasonal to decadal' (s2d) climate forecast verification, but it can also be used in other kinds of forecasts or general climate analysis. This package is specially designed for the comparison between the experimental and observational datasets. The functionality of the included functions covers from data retrieval, data post-processing, skill scores against observation, to visualization.

SafeDE (Safe Diversity Enforcer) is hardware module provides light-lockstep support by means of a non-intrusive and flexible hardware module that preserves staggering across cores running redundant threads, thus bringing time diversity to avoid common cause failures.

Hardware Diversity Monitor for Redundant Execution on Non-Lockstepped Cores (V1). SafeDM quantifies the diversity of each redundant processor to guarantee that CCF will not go unnoticed, and without needing to deploy lockstepped cores. SafeDM computes data and instruction diversity separately, using different techniques appropriate for each case.

MIT License

Safegantana enhances the baseline Sargantana core with safety properties employing a lockstep technology. Lockstep requires two instances of the Sargantana core and an extra logic that compares the inputs and outputs of these cores in order to identify error. With this technology, erroneous data can be detected before reaching the external system, and is a typical solution employed in safety critical systems domain, specially in automotive.