The proceedings contain 95 papers. The topics discussed include: distributed sparse random projection trees for constructing K-nearest neighbor graphs;fast deterministic gathering with detection on arbitrary graphs: t...
ISBN:
(纸本)9798350337662
The proceedings contain 95 papers. The topics discussed include: distributed sparse random projection trees for constructing K-nearest neighbor graphs;fast deterministic gathering with detection on arbitrary graphs: the power of many robots;accurate and efficient distributed covid-19 spread prediction based on a large-scale time-varying people mobility graph;accelerating packet processing in container overlay networks via packet-level parallelism;efficient hardware primitives for immediate memory reclamation in optimistic data structures;efficient hardware primitives for immediate memory reclamation in optimistic data structures;accelerating distributed deep learning training with compression assisted Allgather and reduce-scatter communication;accelerating CNN inference on long vector architectures via co-design;exploiting input tensor dynamics in activation checkpointing for efficient training on GPU;drill: log-based anomaly detection for large-scale storage systems using source code analysis;dynasparse: accelerating GNN inference through dynamic sparsity exploitation;exploiting sparsity in pruned neuralnetworks to optimize large model training;SRC: mitigate I/O throughput degradation in network congestion control of disaggregated storage systems;boosting multi-block repair in cloud storage systems with wide-stripe erasure coding;on doorway egress by autonomous robots;and on the arithmetic intensity of distributed-memory dense matrix multiplication involving a symmetric input matrix (SYMM).
Intelligent transportation is an important guarantee for the safety and efficiency of urban transportation in smart cities, and regular road pavement inspection is the focus of road and bridge maintenance in intellige...
详细信息
The real implementation of a recurrent neuralnetwork (RNN) in a low complexity IoT device is evaluated in order to predict the time series of power consumption in tertiary buildings. The RNN type long short-term memo...
详细信息
ISBN:
(纸本)9781538674628
The real implementation of a recurrent neuralnetwork (RNN) in a low complexity IoT device is evaluated in order to predict the time series of power consumption in tertiary buildings. The RNN type long short-term memory (LSTM) algorithm is adapted for a 32-bit microcontroller unit (MCU) and the backpropagation (BP) algorithm is implemented in-house. We therefore demonstrate that Intelligent IoT (IIoT) devices, such as the Espressif ESP32 MCU, not only implement neuralnetworks (NNs), but also learn on their own. The resulting IIoT architecture has been proven to operate efficiently and compared to the traditional computer-based learning platform. The selected results confirm that stand-alone IoT devices are a truly efficient solution that adds flexibility to the architecture, reduces storage and computation costs, and is more energy-friendly. As a conclusion, it is practically more efficient to exploit low-power and processing-time IIoT for our prediction use case rather than relying on server based distributed systems.
Graph neuralnetworks (GNNs) have been demonstrated as a powerful tool for analyzing non-Euclidean graph data. However, the lack of efficient distributed graph learning systems severely hinders applications of GNNs, e...
详细信息
The process of extracting, transforming, and loading (also known as ETL) of a high volume of data plays an essential role in data integration strategies in data warehouse systems in recent years. In almost all distrib...
详细信息
ISBN:
(纸本)9783030967727;9783030967710
The process of extracting, transforming, and loading (also known as ETL) of a high volume of data plays an essential role in data integration strategies in data warehouse systems in recent years. In almost all distributed ETL systems currently use in both industrial and academia context, a simple heuristic-based scheduling policy is employed. Such a heuristic policy tries to process a stream of jobs in the best-effort fashion, however, it can result in under-utilization of computing resources in most practical scenarios. On the other hand, such inefficient resource allocation strategy can result in an unwanted increase in the total completion time of data processing jobs. In this paper, we develop an efficient reinforcement learning technique that uses a Graph neuralnetwork (GNN) model to combine all submitted tasks graphs into a single graph to simplify the representation of the states within the environment and efficiently make a parallel application for processing of the submitted jobs. Besides, to positively augment the embedding features in each leaf node, we pass messages from leaf to root so the nodes can collaboratively represent actions within the environment. The performance results show up to 15% improvement in job completion time compared to the state-of-the-art machine learning scheduler and up to 20% enhancement compared to a tuned heuristic-based scheduler.
Cloud computing is an emerging standard in modern days for the purpose of sharing huge data, as it affords numerous user friendly behaviors. Cloud computing services offer an extensive range of resource pool in order ...
详细信息
Cloud computing is an emerging standard in modern days for the purpose of sharing huge data, as it affords numerous user friendly behaviors. Cloud computing services offer an extensive range of resource pool in order to maintain huge scale data. Although, cloud computing model is disposed to several cyber-attacks and security problems regarding cloud structure, because of the dynamic and distribute character and exposures in virtualization implementation. distributed denial-of-service (DDoS) attack is a type of cyber-attack, which disturbs the usual traffic of targeted cloud server. Moreover, DDoS produces malicious traffic in cloud structure, and thus consumes cloud resources. In this paper, an effective DDoS attack detection model, named fractional anti corona virus student psychology optimization-based deep residual network (FACVSPO-based DRN) is implemented using spark architecture. The devised FACVSPO approach is newly designed by incorporating anti coronavirus optimization (ACVO) algorithm, fractional calculus (FC) and student psychology based optimization (SPBO) model. Moreover, the hybrid correlative scheme is designed for extracting significant features for attack detection. The DRN structure is utilized for performing attack recognition, which categorizes the data as normal or attack. In addition, the DRN classifier is trained by the developed FACVSPO approach. The developed attack detection model outperformed other existing techniques in terms of testing accuracy, true negative rate (TNR), true positive rate (TPR) of 0.9236, 0.9141, and 0.9412, respectively. The testing accuracy of the implemented model is 12.02%, 8.92%, 7.27%, 6.30%, 5.68%, and 1.20% better than the existing methods, such as Taylor-elephant herd optimisation based deep belief network (TEHO-DBN), deep learning, deep neuralnetwork (DNN), multiple kernel learning, Fuzzy Taylor elephant herd optimisation (EHO)-based DBN, fractional anti corona virus optimization-deep neuro fuzzy network (FA
The ever-increasing size of modern deep neuralnetwork (DNN) architectures has put increasing strain on the hardware needed to implement them. Sparsified DNNs can greatly reduce memory costs and increase throughput ov...
详细信息
The ever-increasing size of modern deep neuralnetwork (DNN) architectures has put increasing strain on the hardware needed to implement them. Sparsified DNNs can greatly reduce memory costs and increase throughput over standard DNNs, if the loss of accuracy can be adequately controlled. However, sparse DNNs present unique computational challenges. Efficient model or data parallelism algorithms are extremely hard to design and implement. The recent effort MIT/IEEE/Amazon HPEC Graph Challenge has drawn attention to high-performance inference methods for large sparse DNNs. In this article, we introduce SNIG, an efficient inference engine for large sparse DNNs. SNIG develops highly optimized inference kernels and leverages the power of CUDA Graphs to enable efficient decomposition of model and data parallelisms. Our decomposition strategy is flexible and scalable to different partitions of data volumes, model sizes, and GPU numbers. We have evaluated SNIG on the official benchmarks of HPEC Sparse DNN Challenge and demonstrated its promising performance scalable from a single GPU to multiple GPUs. Compared to the champion of the 2019 HPEC Sparse DNN Challenge, SNIG can finish all inference workloads using only a single GPU. At the largest DNN, which has more than 4 billion parameters across 1920 layers each of 65536 neurons, SNIG is up to 2.3x faster than a state-of-the-art baseline under a machine of 4 GPUs. SNIG receives the Champion Award in 2020 HPEC Sparse DNN Challenge.
With 5G and Internet technologies developing rapidly, outsourcing images to cloud servers has attracted growing attention. In existing technologies, images are often outsourced to cloud servers to reduce storage and c...
详细信息
With 5G and Internet technologies developing rapidly, outsourcing images to cloud servers has attracted growing attention. In existing technologies, images are often outsourced to cloud servers to reduce storage and computing burdens. However, outsourcing images to cloud servers without any processing may reveal the users' privacy, because the images may contain sensitive information about users, such as faces and locations, especially in electronic investigation. To overcome the security problems in image retrieval, we propose a privacy-preserving image retrieval scheme based on deep convolutional neuralnetwork (DCNN) and vector homomorphic encryption (VHE). We adopt DCNN and hash algorithms to extract image feature vectors, which improves retrieval accuracy. By combining VHE and K-means outsourcing clustering algorithms, the cloud server can build encrypted index trees, which speeds up the search and reduces the computational cost. In addition, a lightweight access control technique is used to allow image owners to set access policies for datasets flexibly. We prove the security of the proposed scheme and show the effectiveness of the scheme through experiments. Our scheme is suitable for application in electronic image investigation systems (EIIs) to optimize the storage and search of police data.
A web based education management system is established to develop education system by enhancing quality of education and teaching model. However, the existing resource allocation model and teaching in web-based educat...
详细信息
In the mobile driving scenario, insufficient data has become a major challenge for the application of scene text recognition models. An alternative to reduce the cost of data annotation is the active learning method, ...
详细信息
暂无评论