Data dominates in finance, which is significant. The financial industry needs a cross-institutional data circulation mechanism to promote development, but data sharing faces challenges such as low credibility, low sha...
详细信息
Within Quantum softwareengineering, the development of hybrid classical-quantum applications is an active research topic. Concretely, there is a focus on the usage of microservices architectures to offer quantum func...
详细信息
Target Controlled Infusion (TCI) systems are based in drug Pharmacokinetic (Pk) and Pharmacodynamic (Pd) models implemented in an algorithm to drive an infusion device. Several studies had compare manual titration of ...
详细信息
ISBN:
(纸本)9781424441242
Target Controlled Infusion (TCI) systems are based in drug Pharmacokinetic (Pk) and Pharmacodynamic (Pd) models implemented in an algorithm to drive an infusion device. Several studies had compare manual titration of anesthesia and TCI system use;some studies evaluate the performance of the control algorithms for TCI systems, and a considerable number of studies assess the performance of Pk/ Pd models implemented into TCI systems. This study presents a set of tests to validate the performance of a TCI system as a computer- aided. The goal of the current study was to assess the performance of the TCI system, Anaesthesia Synchronization software (ASYS), on clinical set up to evaluate communication consistence (computer - infusion device) and controller performance in real time. These measures provided quantitative and qualitative evidences of software robustness and accuracy to be used at clinical environment.
The CUDA software platform gives abilities of outstanding performance for parallel computing using GPGPUs (General Purpose Graphics Processing Unit). The external memory interface is the main bottleneck of GPGPU for m...
详细信息
Recent efforts to standardize a deployment modeling language for cloud applications resulted in TOSCA. At the same time, the software modeling standard UML supports architecture modeling from different viewpoints. Com...
详细信息
ISBN:
(纸本)9789897581823
Recent efforts to standardize a deployment modeling language for cloud applications resulted in TOSCA. At the same time, the software modeling standard UML supports architecture modeling from different viewpoints. Combining these standards from cloud computing and softwareengineering would allow engineers to refine UML architectural models into TOSCA deployment models that enable automatic provisioning of cloud applications. However, this refinement task is currently carried out manually by recreating TOSCA models from UML models because a conceptual mapping between the two languages as basis for an automated translation is missing. In this paper, we exploit cloud modeling extensions to UML called CAML as the basis for our approach CAML2TOSCA, which aims at bridging UML and TOSCA. The validation of our approach shows that UML models can directly be injected into a TOSCA-based provisioning process. As current UML modeling tools lack cloud-based refinement support for deployment models, the added value of CAML2TOSCA is emphasized because it provides the glue between architecture modeling and application provisioning.
Context-aware computing is characterized by the ability of a software system to continuously adapt its behavior to a changing environment over which it has little or no control. Previous work along these lines presume...
详细信息
Context-aware computing is characterized by the ability of a software system to continuously adapt its behavior to a changing environment over which it has little or no control. Previous work along these lines presumed a rather narrow definition of context, one that was centered on resources immediately available to the component in question, e.g., communication bandwidth, physical location, etc. This paper explores context-aware computing in the setting of ad hoc networks consisting of numerous mobile hosts that interact with each other opportunistically via transient wireless interconnections. We extend the context to encompass awareness of an entire neighborhood within the ad hoc network. A formal abstract characterization of this new perspective is proposed. The result is a specification method and associated context maintenance protocol. The former enables an application to define an individualized context, one that extends across multiple mobile hosts in the ad hoc network. The latter makes it possible to delegate the continuous reevaluation of the context and the performance of operations on it to some middleware operating below the application level. This relieves application development of the obligation of explicitly managing mobility and its implications on the component's behavior.
Existing capabilities of computing devices are unable to match the growing demands of modern computing tasks such as multimedia processing, artificial intelligence, pattern matching, and data mining etc. Towards this ...
详细信息
ISBN:
(纸本)9781728127880
Existing capabilities of computing devices are unable to match the growing demands of modern computing tasks such as multimedia processing, artificial intelligence, pattern matching, and data mining etc. Towards this end, advancements have been made in approximate hardware and software designs for such error tolerant, soft applications. We present a novel framework for approximate in-memory computing on memristive crossbars. First, we generate "Approximate Reduced Ordered Binary Decision Diagram" (ROBDDs) representations of arbitrary compute kernels. These Approximate ROBDDs are then mapped to crossbar circuits for flow-based in-memory execution. We make improvement on two fronts, (i) approximation approach reduces computational requirements without sacrificing much accuracy (ii) in-memory computing circumvents the von Neumann bottleneck by unifying processing and storage. Our approach generates designs that are approximate to 10-80% more compact than exact designs while sacrificing small (less than 10%) amounts in accuracy. Our approach synthesized a crossbar design for edge detection that is 72% more compact than the state of the art on approximate synthesis for flow-based computing.
This paper renders a configurable distributed high performance computing(HPC) framework for TDI-CCD imaging simulation. It uses strategy pattern to adapt multi-algorithms. Thus, this framework help to decrease the sim...
详细信息
ISBN:
(纸本)9780819483805
This paper renders a configurable distributed high performance computing(HPC) framework for TDI-CCD imaging simulation. It uses strategy pattern to adapt multi-algorithms. Thus, this framework help to decrease the simulation time with low expense. Imaging simulation for TDI-CCD mounted on satellite contains four processes: 1) atmosphere leads degradation, 2) optical system leads degradation, 3) electronic system of TDI-CCD leads degradation and re-sampling process, 4) data integration. Process 1) to 3) utilize diversity data-intensity algorithms such as FFT, convolution and LaGrange Interpol etc., which requires powerful CPU. Even uses Intel Xeon X5550 processor, regular series process method takes more than 30 hours for a simulation whose result image size is 1500 * 1462. With literature study, there isn't any mature distributing HPC framework in this field. Here we developed a distribute computing framework for TDI-CCD imaging simulation, which is based on WCF([1]), uses Client/Server (C/S) layer and invokes the free CPU resources in LAN. The server pushes the process 1) to 3) tasks to those free computing capacity. Ultimately we rendered the HPC in low cost. In the computing experiment with 4 symmetric nodes and 1 server, this framework reduced about 74% simulation time. Adding more asymmetric nodes to the computing network, the time decreased namely. In conclusion, this framework could provide unlimited computation capacity in condition that the network and task management server are affordable. And this is the brand new HPC solution for TDI-CCD imaging simulation and similar applications.
Efficient metadata management is a critical aspect of overall system performance in large distributed storage systems. Directory subtree partitioning and traditional hashing are two common techniques used for managing...
详细信息
The existence of defects in modern soft-ware has lead to a lot of effort being put into the development of software verification methods. There are, however, no economically viable methods that guarantee that a softwa...
详细信息
ISBN:
(纸本)1932415513
The existence of defects in modern soft-ware has lead to a lot of effort being put into the development of software verification methods. There are, however, no economically viable methods that guarantee that a software is free from defects. Automated black-box testing techniques solves some of the problems with time consuming software testing, since it is possible to execute a large amount of tests in parallel on existing hardware, thus making it less expensive. In this paper we propose a distributed architecture with a shared repository for the execution of black-box tests. This architecture reduces the time spent on testing, thus improving the available testing capacity. Hence it will be possible to complete more tests within the project deadline. The paper also includes a principal empirical study of the time/cost efficiency and scalability of the proposed architecture in a model sized, but still real-life, example with a shared repository running in parallel over a computer cluster.
暂无评论