To maintain excellence in global hyper-competitive economies in the upcoming decades, manufacturers must improve the design, development, and distribution of subsequent product generations, production technologies, eq...
详细信息
In current routing algorithms based on encounter history in Delay-Tolerant Networks (DTNs), packets are always forwarded to nodes with highest probability to reach destination node. However, to the best of our knowled...
详细信息
ISBN:
(纸本)9781538626672
In current routing algorithms based on encounter history in Delay-Tolerant Networks (DTNs), packets are always forwarded to nodes with highest probability to reach destination node. However, to the best of our knowledge, no analytical node transient contact pattern detection to achieve highperformance, is reported in the literature. In this letter, DTN-Knca - a novel routing which detects frequently encountered nodes' transient contact patterns by correlation analysis is proposed. The trace-driven simulations demonstrate the higher throughput of DTN-Knca in comparison to the state-of-the-art DTN typical routing algorithms based on the encounter history knowledge.
The proceedings contain 40 papers. The special focus in this conference is on Smart Computing and Communications. The topics include: I2P Anonymous Communication Network Measurement and Analysis;plot Digitizing over B...
ISBN:
(纸本)9783030341381
The proceedings contain 40 papers. The special focus in this conference is on Smart Computing and Communications. The topics include: I2P Anonymous Communication Network Measurement and Analysis;plot Digitizing over Big Data Using Beam Search;trust-Aware Resource Provisioning for Meteorological Workflow in Cloud;do Top Social Apps Effect Voice Call? Evidence from Propensity Score Matching Methods;Cognitive Hierarchy Based Coexistence and Resource Allocation for URLLC and eMBB;smart Custom Package Decision for Mobile Internet Services;a Space Dynamic Discovery Scheme for Crowd Flow of Urban City;automated Classification of Attacker Privileges Based on Deep Neural Network;nnD: Shallow Neural Network Based Collision Decoding in IoT Communications;a Smart Roll Wear Check Scheme for Ensuring the Rolling Quality of Steel Plates;subordinate Relationship Discovery Method Based on Directed Link Prediction;an Elephant Flow Detection Method Based on Machine Learning;AI Enhanced Automatic Response System for Resisting Network Threats;A Cross-Plane Cooperative DDoS Detection and Defense Mechanism in Software-Defined Networking;a Hardware Trojan Detection Method Design Based on TensorFlow;Resolving the Loop in high-Level SDN program for Multi-table Pipeline Compilation;DC Coefficients Recovery from AC Coefficients in the JPEG Compression Scenario;a performance Evaluation Method of Coal-Fired Boiler Based on Neural Network;Analysis and Prediction of Commercial Big Data Based on WIFI Probe;Design and Optimization of Camera HAL Layer Based on Android;an Improved Prediction Model for the Network Security Situation;music Rhythm Customized Mobile Application Based on Information Extraction;computational Challenges and Opportunities in Financial Services;A Shamir Threshold Model Based Recoverable IP Watermarking Scheme.
Advances in the volume, diversity, and complexity of research data and associated workflows requires enhanced capabilities to access, secure, reuse, process, analyze, understand, curate, share, and preserve data. To a...
详细信息
ISBN:
(纸本)9781450372275
Advances in the volume, diversity, and complexity of research data and associated workflows requires enhanced capabilities to access, secure, reuse, process, analyze, understand, curate, share, and preserve data. To address this need at the regional level the University of Colorado, Colorado State University, and the University of Utah formed a "Cyberteam" in 2017 to provide cyberinfrastructure (CI) support to researchers at institutions in the Rocky Mountain Advanced Computing Consortium (RMACC) encompassing states across the Intermountain West. The Cyberteam is comprised of CI professionals across the three institutions who collaborate closely, sharing expertise and resources. Since its establishment, the Cyberteam has worked to broaden accessibility and options for computing, storage, and data publishing for RMACC researchers;enhance training on data- and workflow-oriented topics;improve engagement with researchers using CI;and better understand user needs and challenges. One key accomplishment has been the development of a series of focus group and survey instruments to achieve better understanding the CI needs and challenges of researchers across a diverse spectrum of disciplines. This paper provides an overview of the RMACC Cyberteam's objectives, accomplishments, challenges, and future direction.
Data centers provide services for various real-time applications, such as social networks, instance message, which produce a large number of bursty and urgent mice flow. However, the traditional flow queuing model can...
详细信息
The explosive growth in cloud-based services, big data analytics, and artificial intelligence related services provisioning leads to the rapid growth of construction of large scale Internet data centers (IDCs). Modern...
详细信息
\ This paper presents an online early anomaly detection framework for phasor measurement units (PMUs) to monitor power system dynamics and help prevent blackouts using machine learning approaches. Dynamical machine le...
详细信息
ISBN:
(纸本)9781538635964
\ This paper presents an online early anomaly detection framework for phasor measurement units (PMUs) to monitor power system dynamics and help prevent blackouts using machine learning approaches. Dynamical machine learning solutions including state space model and Kalman filter are presented in this study to learn the nonlinear and nonstationary PMU measurements and accurately predict system behaviors in real-time. The anomalies can be detected within seconds by comparing the predicted system behaviors with the real system observations. The method proposed in this framework uses PMU data with a given time window (e.g., 5 seconds) using a dynamic nonlinear model, and then predicts system behaviors during the following time window. high prediction accuracy is achieved by applying the dynamic nonlinear model to the real-world PMU measurements - the anomalies detected are successfully validated given the recorded real- world events. high-performance-computing (HPC) techniques are utilized to further reduce computational time to provide real time power system situational awareness.
Convolutional Neural Network(CNN) is a hot and state-of-the-art algorithm which is widely used in applications such as face recognition, intelligent monitoring, image recognition and text recognition. Because of its h...
详细信息
ISBN:
(纸本)9781538666142
Convolutional Neural Network(CNN) is a hot and state-of-the-art algorithm which is widely used in applications such as face recognition, intelligent monitoring, image recognition and text recognition. Because of its high computational complexity, many efficient hardware accelerators have been proposed to exploit high degree of parallel processing for CNN. However, accelerators which are implemented on FPGAs and ASICs usually sacrifice generality for higher performance and lower power consumption. Other accelerators, such as GPUs, are general enough, but they lead to higher power consumption. Fine-grained dataflow architectures, which break conventional Von Neumann architectures, show natural advantages in processing CNN-like algorithms with high computational efficiency and low power consumption. At the same time, it remains broadly applicable and adaptable. In this paper, we propose a scheme for implementing and optimizing CNN on fine-grained dataflow architecture based accelerators. The experiment results reveal that by using our scheme, the performance of AlexNet running on the dataflow accelerator is 3.11x higher than that on NVIDIA Tesla K80, and the power consumption of our hardware is 8.52x lower than that of K80.
We present a scientific computing accelerator on FPGA that uses hundreds of processors working in parallel organized in several SIMD cores. The accelerator is installed within an Ethernet network and acts as a high-pe...
详细信息
We present a scientific computing accelerator on FPGA that uses hundreds of processors working in parallel organized in several SIMD cores. The accelerator is installed within an Ethernet network and acts as a high-performance computing server. A prototype is presented for processing solar images and achieves a great performance that can compete with a cluster.
Prevalent software engineering practices such as code reuse and the "one-size-fits-all" methodology have contributed to significant and widespread increases in the size and complexity of software. The result...
详细信息
ISBN:
(纸本)9781450356930
Prevalent software engineering practices such as code reuse and the "one-size-fits-all" methodology have contributed to significant and widespread increases in the size and complexity of software. The resulting software bloat has led to decreased performance and increased security vulnerabilities. We propose a system called Chisel to enable programmers to effectively customize and debloat programs. Chisel takes as input a program to be debloated and a high-level specification of its desired functionality. The output is a reduced version of the program that is correct with respect to the specification. Chisel significantly improves upon existing program reduction systems by using a novel reinforcement learning-based approach to accelerate the search for the reduced program and scale to large programs. Our evaluation on a suite of 10 widely used UNIX utility programs each comprising 13-90 KLOC of C source code demonstrates that Chisel is able to successfully remove all unwanted functionalities and reduce attack surfaces. Compared to two state-of-the-art program reducers C-Reduce and Perses, which time out on 6 programs and 2 programs respectively in 12 hours, Chisel runs up to 7.1x and 3.7x faster and finishes on all programs.
暂无评论