Texture is a fundamental component of computer graphics. Virtual texture technology is essential for facilitating large-scale texture loading and real-time rendering of natural terrain. To address the limitations pose...
详细信息
ISBN:
(数字)9798331532390
ISBN:
(纸本)9798331532406
Texture is a fundamental component of computer graphics. Virtual texture technology is essential for facilitating large-scale texture loading and real-time rendering of natural terrain. To address the limitations posed by low-computing-power platforms and enable extensive texture loading, it is imperative to identify an efficient texture loading methodology. this article will present a dynamic loading virtual texture technology designed for low-computing-power platforms, aimed at achieving large-scale texture rendering on lightweight devices.
this research explores the application of the Differentiable Neural Computer (DNC), a Neural Turing Machine model, in predicting the Remaining Useful Life (RUL) of Lithium-Ion Batteries, especially within Renewable En...
详细信息
this paper proposes an architecture model for tracking user interactions in a Web environment. the model utilizes *** as the server-side technology, integrates *** for facial recognition, and streams facial expression...
详细信息
ISBN:
(数字)9798350386998
ISBN:
(纸本)9798350387001
this paper proposes an architecture model for tracking user interactions in a Web environment. the model utilizes *** as the server-side technology, integrates *** for facial recognition, and streams facial expressions and landmarks directly through to a database and Kafka queue for further use. this architecture aims to enhance user experience and provide valuable insights into user behavior for Web applications.
the recent multi-sensor Generalized Labeled Multi-Bernoulli (GLMB) is an efficient analytic implementation to the multi-sensor multi-object state estimation problem. the multi-sensor multi-object posterior is recursiv...
详细信息
ISBN:
(数字)9781665452489
ISBN:
(纸本)9781665452489
the recent multi-sensor Generalized Labeled Multi-Bernoulli (GLMB) is an efficient analytic implementation to the multi-sensor multi-object state estimation problem. the multi-sensor multi-object posterior is recursively propagated using the multi-sensor multi-object filtering density, by updating it with multi-sensor measurements at each time step. the measurement update step requires solving a series of NP-hard multi-dimensional assignment problems. In this paper, we introduce a faster implementation of this algorithm by an intuitive approximation, and combine that withthe Gibbs sampler based truncation approach to produce an efficient multi-sensor multi-object estimation solution suitable for practical applications.
Digital services enable users to interact with a broad range of applications and, as such, have become an essential part of our daily lives. Although convenient, their ubiquity comes at a significant cost in energy, r...
Digital services enable users to interact with a broad range of applications and, as such, have become an essential part of our daily lives. Although convenient, their ubiquity comes at a significant cost in energy, raising sustainability concerns. We access these services by triggering a computing continuum, spanning from the device to the edge, fog, and cloud. Scheduling decisions made at each layer impact the overall quality of service (QoS) and energy consumption of digital services.
Over the last few years, computational power and intelligence are becoming more and more necessary in the sector of finance. More specifically, computational finance turns into a very popular topic for both academia a...
详细信息
ISBN:
(数字)9781665467179
ISBN:
(纸本)9781665467179
Over the last few years, computational power and intelligence are becoming more and more necessary in the sector of finance. More specifically, computational finance turns into a very popular topic for both academia and industry, where numerous published works from this field and especially investment and risk management, showcase the effects of these technological advancements. At the same time, the ever-increased computational demands have led to the deployment of various accelerators in order to meet both latency and power constraints for financial applicationsthat vary from special purpose, made by economists, to general purpose Digital Signal Processing (DSP) applied in financial time-series. One of the most widely used applications, belonging to the 2nd category, is the Savitzky-Golay algorithm, a filter used for smoothing time-series data. In this work, we propose a mechanism that automatically creates different accelerated Savitzky-Golay filters for GPUs and FPGAs, based on a set of pre-accelerated templates. By evaluating the provided templates with a set of real use-case parameters, a speedup of x33.5 on the NVIDIA T4 GPU and x21.9 on the Alveo U50 FPGA is achieved compared with an Intel Xeon Gold 5218R CPU as a baseline, while achieving a decrease in power consumption of 89% and 70% respectively, disclosing a real latency-power trade-of between both accelerators.
Cache locking is a commonly used mechanism to improve both performance and predictability for embedded programs. Dynamic cache locking methods proposed in the literature, where the locked content is modified during ex...
详细信息
ISBN:
(数字)9798350387957
ISBN:
(纸本)9798350387964
Cache locking is a commonly used mechanism to improve both performance and predictability for embedded programs. Dynamic cache locking methods proposed in the literature, where the locked content is modified during execution, require inserting locking and unlocking instructions in the program’s code. In this paper, we introduce a novel hardware mechanism that leverages the LRU age bits to perform duration-based locking. Our proposed mechanism dynamically locks and unlocks cache lines for different durations at run-time, without the need to modify the program’s code. We further devise a heuristic that analyzes a program’s loop structure and selects the set of addresses to be locked in a L1 instruction cache alongside their locking durations. Evaluation results show that our duration-based locking mechanism achieves comparable results to the dynamic approach while substantially reducing the initialization overhead and avoiding program code modifications.
the Robotic Mobile Fulfillment System (RMFS) is an automated technology to fulfill various types of orders (e.g., vehicle assembly) in modern warehouses or factories. In particular, battery-equipped mobile robots move...
详细信息
ISBN:
(数字)9798350387957
ISBN:
(纸本)9798350387964
the Robotic Mobile Fulfillment System (RMFS) is an automated technology to fulfill various types of orders (e.g., vehicle assembly) in modern warehouses or factories. In particular, battery-equipped mobile robots move racks that contain various components (Stock Keeping Unit) by visiting replenishment or picking stations to complete orders. We formulate the preliminary system model to optimize the order throughput and energy consumption of mobile robots, which consists of (i) rack allocation, (ii) task allocation, and (iii) route routing.
this article shows an algorithm that determines the constants necessary to achieve the time accuracy of a delay by software routine called delay by sums, for use withembedded processors or systems. the algorithm demo...
详细信息
ISBN:
(纸本)9798350398960
this article shows an algorithm that determines the constants necessary to achieve the time accuracy of a delay by software routine called delay by sums, for use withembedded processors or systems. the algorithm demonstrates the methodology to achieve accurate times and concludes withthe obtaining of a linear equation of first degree withthree unknowns, from which these values can be obtained;however, the equation obtained requires a special procedure to determine the value of each of the variables, which is described in this paper.
the proceedings contain 23 papers. the topics discussed include: a taxonomy on privacy and confidentiality;analyzing and modelling inaccessibility in dependable real-time networks;do dependable systems need good user ...
ISBN:
(纸本)9781450397377
the proceedings contain 23 papers. the topics discussed include: a taxonomy on privacy and confidentiality;analyzing and modelling inaccessibility in dependable real-time networks;do dependable systems need good user interfaces?;strengthening atomic multicast for partitioned state machine replication;a leaderless hierarchical atomic broadcast algorithm;compliance evaluation of cryptographic security requirements on IoT gateways;detecting DoS attacks in microservice applications: approach and case study;an ontology for context-aware middleware for dependable medical systems;efficient CRDT synchronization at scale using a causal multicast over a virtual hypercube overlay;searchable symmetric encryption for private data protection in cloud environments;evaluation of SMT solvers in abstraction-based software model checking;modeling attacker behavior in cyber-physical-systems;and simplifying operational scenario simulation for CubeSat mission analysis purposes.
暂无评论