Task scheduling on multiprocessor system is a well-known problem in area of parallel computing. For this problem, many static scheduling algorithms have been reported. But in most static algorithms, only one attribute...
详细信息
Matrix multiplication is a very important computation kernel in many science and engineering applications. this paper presents a parallel implementation framework for dense matrix multiplication on multi-socket multi-...
详细信息
the Steiner Tree Problem in Graphs (STPG) is an important NP-hard combinatorial optimization problem arising naturally in many applications including network routing, social media analysis, power grid routing and in t...
详细信息
the Intel Xeon Phi is a many-core accelerator which focuses on the high performance applications. To characterize the performance of the Intel Xeon Phi, a system of dual 8-core Intel Xeon E5-2670 processors is employe...
详细信息
Due to increasingly large datasets, graph analytics-traversals, allpairs shortest path computations, centrality measures, etc.-are becoming the focus of high-performance computing (HPC). Because HPC is currently domin...
详细信息
Moving objects detection is important in traffic video analysis, and many algorithms are being increasingly applied to moving objects detection. Most of these algorithms are time-consuming and cannot satisfy real-time...
详细信息
In view of the increasing importance of hardware parallelism, a natural extension of per-instance algorithm selection is to select a set of algorithms to be run in parallel on a given problem instance, based on featur...
详细信息
ISBN:
(数字)9783319190846
ISBN:
(纸本)9783319190846;9783319190839
In view of the increasing importance of hardware parallelism, a natural extension of per-instance algorithm selection is to select a set of algorithms to be run in parallel on a given problem instance, based on features of that instance. Here, we explore how existing algorithm selection techniques can be effectively parallelized. To this end, we leverage the machine learning models used by existing sequential algorithm selectors, such as 3S, ISAC, SATzilla and ME-ASP, and modify their selection procedures to produce a ranking of the given candidate algorithms;we then select the top n algorithms under this ranking to be run in parallel on n processing units. Furthermore, we adapt the pre-solving schedules obtained by aspeed to be effective in a parallel setting with different time budgets for each processing unit. Our empirical results demonstrate that, using 4 processing units, the best of our methods achieves a 12-fold average speedup over the best single solver on a broad set of challenging scenarios from the algorithm selection library.
To solve the problem of high computational complexity and real-time poor of the SIFT(Scale Invariant Feature Transform) algorithm, a parallel data streams RGF-SIFT(Recursive Gaussian Filter -SIFT) algorithm based on D...
详细信息
ISBN:
(纸本)9781479972845
To solve the problem of high computational complexity and real-time poor of the SIFT(Scale Invariant Feature Transform) algorithm, a parallel data streams RGF-SIFT(Recursive Gaussian Filter -SIFT) algorithm based on DSP multi-core processor is proposed. the proposed algorithm uses the forth-order recursive Gaussian filter to replace the linear Gaussian filtering of the SIFT algorithm. then the four modules of RGF-SIFT computing tasks are assigned to multiple DSP core for parallelprocessing, and implemented synchronization for multicore processor through inter-processor communication (IPC) and other technologies. Experimental results show that the parallel RGF-SIFT algorithm detects feature point more than the algorithm of SIFT, and the repetition rate of the correct feature point is very high. At execution time, the parallel RGF-SIFT algorithm has higher speedup ratio.
Reverse nearest neighbor (RNN) queries are the complimentary problem and particular interest in the past few years, such as location-based services, profile-based marketing, resource allocation, and traffic monitoring...
详细信息
Reverse nearest neighbor (RNN) queries are the complimentary problem and particular interest in the past few years, such as location-based services, profile-based marketing, resource allocation, and traffic monitoring system. the one major drawback for the existing RNN is that it has inherent sequential nature and uses in-memory algorithm, which limits its applicability to large-scale spatial data queries. this paper proposes scalable algorithms for RNN queries in a distributed environment. Firstly, we investigate the Basic-scalable reverse nearest neighbor (SRNN) initialization query method based on the inverted grid index. Secondly, two optimization methods Lazy-SRNN and Eager-SRNN are proposed to effectively process scalable multi-dimensional RNN queries. Among them, Lazy-SRNN prunes the search space when all RNN objects are discovered in one pass;Eager-SRNN attempts to prune spatial objects incrementally as soon as they are visited. In addition, the SRNN algorithm is proved to be the first attempt for the exact scalable RNN algorithms in a distributed environment on multi-dimensional data sets. We show in an extensive experimental evaluation on real-world and synthetic data the scalability and the performance of our novel approach. Copyright (c) 2015 John Wiley & Sons, Ltd.
the proceedings contain 83 papers. the special focus in this conference is on Trust, Security and Privacy for Big Data. the topics include: Nth-Order Multifunction Filter Employing Current Differencing Transconductanc...
ISBN:
(纸本)9783319271606
the proceedings contain 83 papers. the special focus in this conference is on Trust, Security and Privacy for Big Data. the topics include: Nth-Order Multifunction Filter Employing Current Differencing Transconductance Amplifiers;An Efficient Spatial Query processing Algorithm in Multi-sink Directional Sensor Network;An Improved Method for Reversible Data Hiding in Encrypted Image;Study on Personalized Location Privacy Preservation algorithms Based on Road Networks;A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups;Towards Returning Data Control to Cloud Users;A Distributed Algorithm for Graph Edge Partitioning;Scheduling Stochastic Tasks with Precedence Constrain on Cluster Systems with Heterogenous Communication Architecture;An Output-Oriented Approach of Test Data Generation Based on Genetic Algorithm;An Efficient Pre-filter to Accelerate Regular Expression Matching;A Hybrid Optimization Approach for Anonymizing Transactional Data;Program Obfuscator for Privacy-Carrying Unidirectional One-hop Re-encryption;Predicting Severity of Software Vulnerability Based on Grey System theory;Characterization of Android Applications with Root Exploit by Using Static Feature Analysis;A Lightweighted Fine-Grained Privacy-Preserving Profile Matching Mechanism for Mobile Social Networks in Proximity;Context-Aware QoS Assurance for Smart Grid Big Data processing with Elastic Cloud Resource Reconfiguration;Continuous User Identity Verification for Trusted Operators in Control Rooms;Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model;Scheduling Resource of IaaS Clouds for Energy Saving Based on Predicting the Overloading Status of Physical Machines and Towards Mechanised Semantics of HPC.
暂无评论