As deep learning grows rapidly, model training heavily relies on parallel methods and there exist numerous cluster configurations. However, current preferences for parallel training focus on data centers, overlooking ...
As deep learning grows rapidly, model training heavily relies on parallel methods and there exist numerous cluster configurations. However, current preferences for parallel training focus on data centers, overlooking the financial constraints faced by most researchers. To attain the best performance within the cost limitation, we introduce a throughput-cost metric to accurately characterize clusters' cost-effectiveness. Based on this metric, we design a cost-effective cluster featuring the 3090 with NVLink. The experiment results demonstrate that our cluster achieves remarkable cost-effectiveness in various distributed model training schemes.
Cloud computing and cyber-physical systems involve software capable of adapting at run time to remain compliant with user demands and environmental constraints. This calls for extending the life cycle of software syst...
详细信息
ISBN:
(纸本)9781665494939
Cloud computing and cyber-physical systems involve software capable of adapting at run time to remain compliant with user demands and environmental constraints. This calls for extending the life cycle of software systems with a reconfiguration step to go beyond analysis, design, development and deployment. Existing approaches compute a new valid configuration at design time, at run time, or both, inducing computational or validation overheads for each reconfiguration step. We propose an approach that relies on variability models to acquire a representation of the set of valid configurations of a system. We use feature models to automatically generate a JavaBIP run-time variability model. The generated model monitors and controls the application behaviour by intercepting reconfiguration requests and executing them in such a manner as to ensure that all reachable configurations are valid without the need of pre-computing the possible configurations neither at design time nor at run-time while only inducing a minimal run-time computational overhead.
ieee 802.11ah (also known as WiFi Halow) is a new WiFi standard for sub-l GHz communications intended to address key challenges of the Internet of Things. ieee 802 working group introduces ieee 802.11ah to overcome th...
详细信息
Limb stability refers to the ability of limbs to maintain posture during physical movements. Observing limb movements and quantizing limb stability is crucial for tremor detection. In this paper, we propose a quantita...
详细信息
Water is a precious and limited resource in agriculture, and its efficient management is becoming increasingly important. With factors such as population growth, urbanization, and climate change affecting water availa...
详细信息
The centralized computing model in industrial Internet of Things (IIoT) leads to large delay and unbalanced traffic, which strictly restricts the adoption of IIoT in industrial applications demanding high network perf...
详细信息
The centralized computing model in industrial Internet of Things (IIoT) leads to large delay and unbalanced traffic, which strictly restricts the adoption of IIoT in industrial applications demanding high network performance. To cope with the problem, researchers resort to the in-network computation model in which the computation capability is distributed among nodes in IIoT. Existing works on the in-network computation assume that the network connectivity built in advance meets the performance requirement of the in-network computation model. Nevertheless, no node placement methods have been proposed to build network connectivity supporting in-network computation. For this reason, we propose an in-network-computation-oriented node placement (INP) algorithm. The INP algorithm first decomposes the whole problem into several delay constrained relay node placement problems, and then, solves them sequentially. Moreover, we prove that the INP algorithm ensures explicit time complexity and approximation ratio. Finally, we verify the efficiency of this work through extensive simulations and preliminary experiments.
This paper investigates the distributed hypothesis testing (DHT) problem over AWGN channels, where the distributed nodes are restricted to transmit functions of the empirical distributions of the observed data sequenc...
详细信息
Existing deep-learning-based features have shown strong enough results (more than 90% accuracy) if a large amount of annotated data is available. However, in reality, data annotation is labor-intensive and expensive. ...
详细信息
Edge to Cloud Continuum is a concept that integrates cloud computing and cellular networks that has been gaining popularity due to its potential to provide a seamless user experience and address the challenges of mana...
详细信息
ISBN:
(纸本)9798350399806
Edge to Cloud Continuum is a concept that integrates cloud computing and cellular networks that has been gaining popularity due to its potential to provide a seamless user experience and address the challenges of managing complex multi-domain networks involving massive IoT devices. Enabling intelligence in the Edge to Cloud Continuum can further enhance its capabilities, offering benefits such as reduced latency, improved scalability, enhanced resource utilization, and increased context awareness. This paper provides insights into the opportunities and challenges of enabling intelligence in Edge to Cloud Continuum, highlighting the potential of this technology. This study presents a comprehensive review of the existing literature on enabling intelligence in Edge to Cloud Continuum, to reach the research questions that will construct the PhD. Various tools and technologies that can be used to integrate intelligence into the Edge to Cloud Continuum system were explored and analyzed. In addition, this study provides a detailed work plan for the upcoming months of the project.
High-performance sensors play a crucial role in IoV (Internet of Vehicles) to achieve advanced autonomous driving. Typically, IoV involves extensive data sharing and centralizes data storage, posing significant securi...
详细信息
暂无评论