Amdhal's law [1] says that, we cannot go faster than the serial1 section of the program though we might have infinite processing resource. Therefore, to obtain optimal performance in many-core era, we should explo...
详细信息
ISBN:
(纸本)9781450333436
Amdhal's law [1] says that, we cannot go faster than the serial1 section of the program though we might have infinite processing resource. Therefore, to obtain optimal performance in many-core era, we should exploit both Thread Level parallelism (TLP) and Instruction Level parallelism (ILP) : TLP by extracting more parallelism and ILP by making sequential cores faster. An application parallelized using shared memory model application can be divided into: 1. Serial section that runs only in one core and 2. parallel sections that run simultaneously in multiple cores. In this paper, we characterize the inherent program behavior of the serial and parallel sections to find the difference between them in currently available multi-threaded applications. Our analysis shows that, the micro-architectural resource requirements of both these sections are different, thereby affirming that heterogeneous cores with few complex cores and many small cores will benefit most applications in many-core era. Copyright 2015 ACM.
In order to implement Sequential Bayesian estimator using Monte carlo simulation and to get rid of limitations of Kalman filter, Particle filtering techniques plays a very crucial role for target tracking applications...
详细信息
Wireless Sensor Networks is extensively used in many of applications related to different fields. Some of those applications deal with confidential and critical data that must be protected from unauthorized access. So...
详细信息
ISBN:
(纸本)9781479986606
Wireless Sensor Networks is extensively used in many of applications related to different fields. Some of those applications deal with confidential and critical data that must be protected from unauthorized access. Some other systems use WSNs that are deployed in very harsh environments with limited energy resources. Those systems cannot tolerate network failures that can be caused by network intruders. In this paper, an efficient intrusion detection model is introduced. The model uses intelligent techniques to detect intrusions. Two different architectures are introduced. The first architecture represents the level of sensor node, sink node, and base station. The second architecture represents the levels of sensor and sink nodes. This work proposes two intrusion detection algorithms, one uses a supervised learning mechanism to be used on the level of the sensor node and the other uses an unsupervised learning mechanism to be used on the levels of both the sink node and base station. The output of the algorithms is a set of detection rules which are structured in the form of binary tree. The introduced algorithms provided a high detection accuracy using less number of selected features, compared to previous work for intrusion detection, which decreases the complexity and the processing time. The proposed learning algorithms used only 10% of the data for training. An enhancement for J48 classification algorithm is also introduced which decreases the size of the algorithm's decision tree and makes it suitable to be used for intrusion detection in WSNs.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
ISBN:
(纸本)9781467376853
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Random indexing is a method for constructing vector spaces at a reduced dimensionality. Previously, the method has been proposed using Kanerva's sparse distributed memory model. Although intuitively plausible, thi...
详细信息
ISBN:
(纸本)9783319195810;9783319195803
Random indexing is a method for constructing vector spaces at a reduced dimensionality. Previously, the method has been proposed using Kanerva's sparse distributed memory model. Although intuitively plausible, this description fails to provide mathematical justification for setting the method's parameters. The random indexing method is revisited using the principles of sparse random projections in Euclidean spaces in order to complement its previous delineation.
The proceedings contain 81 papers. The special focus in this conference is on Genetic Algorithms, Evolutionary Programming and Evolution Strategies, parallel Computation, Membrane, Mobile Computing, Computer Networks ...
ISBN:
(纸本)9788132221340
The proceedings contain 81 papers. The special focus in this conference is on Genetic Algorithms, Evolutionary Programming and Evolution Strategies, parallel Computation, Membrane, Mobile Computing, Computer Networks and Security, Data Structures and Algorithms, Data Compression, Data Encryption and Digital Signal processing. The topics include: Web information extraction on multiple ontologies based on concept relationships upon training the user profiles;high payload reversible watermarking for securing medical images in a cloud environment;enhanced security framework for data integrity using third-party auditing in the cloud system;an intelligent cloud security system for critical applications;state variable filter design using improvised particle swarm optimization algorithm;reliable virtual cluster-based opportunistic routing protocol for mobile ad hoc networks;weighted Euclidean distance based sign language recognition using shape features;event monitoring for adaptive multi-priority streaming time sensitive-based EDF scheduling;automatic genre classification from videos;a machine learning approach to cluster the users of stack overflow forum;data storage optimization in cloud environment;evaluation of worst-case execution time of tasks on multi-core processor;FPGA-based intelligent control of AC motors;secretly shared QR code and its applications;efficient silhouette-based input methods for reliable human action recognition from videos;an analysis of various edge detection techniques on illuminant variant images;fuzzy-based sign language interpreter;optimized distributed text document clustering algorithm;a study on medical data hiding using wireless capsule endoscopy;optic disk and optic cup segmentation for glaucoma screening;analysis of shortest route for heterogeneous node in wireless sensor network and wavelet transform-based land cover classification of satellite images.
Wireless communication systems beyond 3G are characterized by variety of applications which have the requirement of simultaneous transmission/reception of low data rate voice and high data rate video streaming content...
详细信息
ISBN:
(纸本)9781467367356
Wireless communication systems beyond 3G are characterized by variety of applications which have the requirement of simultaneous transmission/reception of low data rate voice and high data rate video streaming content. Wireless applications such as live video chat requires more bandwidth for transmitting/receiving with high quality. The civilian/COTS cellular wireless systems are very promising and prospective communications systems, but they have several drawbacks from military point of view. Increase in communication range and data security are the major. To increase the range increasing receiver sensitivity is very important. Furthermore, to accommodate uninterrupted voice channel in parallel to video transmission reducing the bandwidth occupancy of voice channel is crucial. To reduce the bandwidth occupancy, several source coding techniques exists. CVSD is one of the best source coding technique for reducing the occupied bandwidth as well as improving receiver sensitivity at baseband level. In this paper, hardware efficient voice communication module with bandwidth efficient CVSD source coding is implemented on FPGA. This module has been integrated in wireless LAN as an additional feature for voice calls without disturbing the video/data transfer. Improvement in receiver sensitivity for voice channel by using this technique has been observed.
Multilingual summarization task aims to develop summarization systems that are fully or partly language free. Extractive techniques are at the center of such systems. They use statistical features to score and extract...
详细信息
ISBN:
(纸本)9783319195810;9783319195803
Multilingual summarization task aims to develop summarization systems that are fully or partly language free. Extractive techniques are at the center of such systems. They use statistical features to score and extract most relevant sentences to form a summary within a size limit. In this paper, we investigate recently released multilingual distributed word representations combined with mRMR discriminant analysis to score terms then sentences. We also propose a novel sentence extraction algorithm to deal with redundancy issue. We present experimental results of our system applied to three languages: English, Arabic and French using the TAC MultiLing 2011 Dataset. Our results demonstrate that word representations enhance the summarization system, MeMoG and ROUGE results are comparable to recent state-of-theart systems.
The proceedings contain 52 papers. The special focus in this conference is on Big Data and Its applications. The topics include: Preference-aware HDFS for hybrid storage;urban traffic congestion prediction using float...
ISBN:
(纸本)9783319271217
The proceedings contain 52 papers. The special focus in this conference is on Big Data and Its applications. The topics include: Preference-aware HDFS for hybrid storage;urban traffic congestion prediction using floating car trajectory data;a metadata cooperative caching architecture based on SSD and DRAM for file systems;parallel training GBRT based on kmeans histogram approximation for big data;an intelligent clustering algorithm based on mutual reinforcement;an effective method for gender classification with convolutional neural networks;a highly efficient indexing and retrieving method for astronomical big data of time series images;specialized FPGA-based accelerator architecture for data-intensive k-means algorithms;effectively identifying hot data in large-scale I/O streams with enhanced temporal locality;a search-efficient hybrid storage system for massive text data;enhancing parallel data loading for large scale scientific database;tradeoff between the price of distributing a database and its collusion resistance based on concatenated codes;a mapreduce reinforced distributed sequential pattern mining algorithm;a fast documents classification method based on simhash;identification of natural images and computer generated graphics using multi-fractal differences of PRNU;enriching document representation with the deviations of word co-occurrence frequencies;big data analytics and visualization with spatio-temporal correlations for traffic accidents;a novel app recommendation method based on SVD and social influence;a segmentation hybrid index structure for temporal data and a refactored content-aware host-side SSD cache.
This paper presents a preliminary evaluation of TraceR, a trace replay tool built upon the ROSS-based CODES simulation framework. TraceR can be used for predicting network performance and understanding network behavio...
详细信息
ISBN:
(纸本)9783319273082;9783319273075
This paper presents a preliminary evaluation of TraceR, a trace replay tool built upon the ROSS-based CODES simulation framework. TraceR can be used for predicting network performance and understanding network behavior by simulating messaging on interconnection networks. It addresses two major shortcomings in current network simulators. First, it enables fast and scalable simulations of large-scale supercomputer networks. Second, it can simulate production HPC applications using BigSim's emulation framework. In addition to introducing TraceR, this paper studies the impact of input parameters on simulation performance. We also compare TraceR with other network simulators such as SST and BigSim, and demonstrate TraceR's scalability using various case studies.
暂无评论