the proceedings contain 12 papers. the topics discussed include: CUDA flux: a lightweight instruction profiler for CUDA applications;testing the limits of tapered fat tree networks;performance analysis of deep learnin...
ISBN:
(纸本)9781728159775
the proceedings contain 12 papers. the topics discussed include: CUDA flux: a lightweight instruction profiler for CUDA applications;testing the limits of tapered fat tree networks;performance analysis of deep learning workloads on leading-edge systems;automatic throughput and critical path analysis of x86 and ARM assembly kernels;OMB-UM: design, implementation, and evaluation of CUDA unified memory aware MPI benchmarks;enhancing Monte Carlo proxy applications on GPUs;a generalized statistics-based model for predicting network-induced variability;and comparing managed memory and ATS with and without prefetching on NVIDIA Volta GPUs.
event sourcing is increasingly used and implemented in event-basedsystems for maintaining the evolution of application state. However, unbounded event logs are impracticable for many systems, as it is difficult to al...
详细信息
ISBN:
(纸本)9781450357821
event sourcing is increasingly used and implemented in event-basedsystems for maintaining the evolution of application state. However, unbounded event logs are impracticable for many systems, as it is difficult to align scalability requirements and long-term runtime behavior withthe corresponding storage requirements. To this end, we explore the design space of log pruning approaches suitable for event-sourced systems. Furthermore, we survey specific log pruning mechanisms for event-sourced logs. In a brief evaluation, we point out the trade-offs when applying pruning to event logs and highlight the applicability of log pruning to event-sourced systems.
the proceedings contain 19 papers. the special focus in this conference is on Broadband Communications, Networks, and systems. the topics include: Dynamic IFFSM Modeling Using IFHMM-based Bayesian Non-parametric Learn...
ISBN:
(纸本)9783030364410
the proceedings contain 19 papers. the special focus in this conference is on Broadband Communications, Networks, and systems. the topics include: Dynamic IFFSM Modeling Using IFHMM-based Bayesian Non-parametric Learning for Energy Disaggregation in Smart Solar Home System;distributed Integrated Modular Avionics Resource Allocation and Scheduling Algorithm Supporting Task Migration;an Intelligent Question and Answering System for Dental Healthcare;classifier Fusion Method based Emotion Recognition for Mobile Phone Users;toward Detection of Driver Drowsiness with Commercial Smartwatch and Smartphone;Fast Algorithm for the Minimum Chebyshev Distance in RNA Secondary Structure;fine-Grained Access Control in mHealth with Hidden Policy and Traceability;construction of Laboratory Refined Management in Local Applied University;Design of VNF-Mapping with Node Protection in WDM Metro Networks;human Activity Recognition Using Wi-Fi Imaging with Deep Learning;Convex Optimization Algorithm for Wireless Localization by Using Hybrid RSS and AOA Measurements;wi-Fi Floor Localization in an Unsupervised Manner;virtual Network Embedding Algorithm based on Multi-objective Particle Swarm Optimization of Pareto Entropy;Measuring and Analyzing the Burst Ratio in IP Traffic;WiCLR: A Sign Language Recognition System Framework based on Wireless Sensing;high-Resolution Image Reconstruction Array of based on Low-Resolution Infrared Sensor;analysis and Implementation of Multidimensional Data Visualization Methods in Large-Scale Power Internet of things.
distributedevent-sourced systems adopt a fairly new architectural style for data-intensive applications that maintains the full history of the application state. However, the performance implications of such systems ...
详细信息
ISBN:
(纸本)9781450357821
distributedevent-sourced systems adopt a fairly new architectural style for data-intensive applications that maintains the full history of the application state. However, the performance implications of such systems are not yet well explored, let alone how the performance of these systems can be improved. A central issue is the lack of systematic performance engineering approaches that take into account the specific characteristics of these systems. To address this problem, we suggest a methodology for performance engineering and performance analysis of distributedevent-sourced systemsbased on specific measurements and subsequent, targeted optimizations. the methodology blends in well into existing software engineering processes and helps developers to identify bottlenecks and to resolve performance issues. Using our structured approach, we improved an existing event-sourced system prototype and increased its performance considerably.
Nowadays, building an efficient, reliable and scalable decentralized data storage architecture is an actual problem in both corporate and academic communities since decentralization requires new approaches that adapt ...
详细信息
Stateful applications are based on the state they hold and how it changes over time. this history of state changes is usually discarded as the application progresses. By building on concepts from event processing and ...
详细信息
ISBN:
(纸本)9781450357821
Stateful applications are based on the state they hold and how it changes over time. this history of state changes is usually discarded as the application progresses. By building on concepts from event processing and storing the application history, we envision a novel programming paradigm that supports retroaction. Retroactive computing introduces new opportunities for a developer to access and even modify an application timeline. By enabling the exploration of alternative scenarios, retroactive computing establishes powerful new ways to debug systems and introduces new approaches to solve problems. Initial work has shown the practicality and possibilities of this new programming paradigm and introduces further research questions and challenges.
Recently, the wide adoption of Internet of things (IoT) devices has introduced new challenges that the current cloud-centric approach must overcome. the high-latency obtained from sending daily massive volumes of gene...
详细信息
the proceedings contain 28 papers. the special focus in this conference is on e-Infrastructure and e-Services for Developing Countries. the topics include: Access control model based on dynamic delegations and privacy...
ISBN:
(纸本)9783030160418
the proceedings contain 28 papers. the special focus in this conference is on e-Infrastructure and e-Services for Developing Countries. the topics include: Access control model based on dynamic delegations and privacy in a health system of connected objects;secure, transparent and uniform mobile money for internet-underserved areas using sporadically-synchronized blockchain;internet development in Africa: A content use, hosting and distribution perspective;the (missing?) role of health information systems (HIS) in patient care coordination and continuity (PCCC): the case of Uganda;performance barriers to cloud services in Africa’s public sector: A latency perspective;Impact of ZRP zone radius value on wireless network performance;classification and prediction of arrhythmias from electrocardiograms patterns based on empirical mode decomposition and neural network;cyber-healthcare Kiosks for healthcare support in developing countries;data model for cloud computing environment;online courseware development in public universities in Uganda: the precepts of active, passive and exclusive participation;the quest for white spaces in the democratic Republic of Congo;qoS strategies for wireless multimedia sensor networks in the context of IoT;a user-centered approach to the development of E-Healthsystems: A case of Uganda;community tools for digital inclusion;comm4Dev: Communication infrastructure for development;adaptability of learning games based on learner profiles in the context of autonomous training;multi agent-based addresses geocoding for more efficient home delivery service in developing countries;the contribution of LMS to the learning environment: Views from the state university of Zanzibar;Secure exchanges activity in function of event detection withthe SDN.
the proceedings contain 32 papers. the special focus in this conference is on Intelligence Computation and Applications. the topics include: Causes of the imbalance between exploration and exploitation in evolutionary...
ISBN:
(纸本)9789811364723
the proceedings contain 32 papers. the special focus in this conference is on Intelligence Computation and Applications. the topics include: Causes of the imbalance between exploration and exploitation in evolutionary computation;Analysis of optimization capability of selection operator for DE algorithm;a new quantum evolutionary algorithm in 0-1 knapsack problem;a general selection method for mutation strategy in differential evolution;an enhanced region-based model for segmentation images with intensity inhomogeneity;algorithm research on distributed pattern recognition;anime sketch coloring with swish-gated residual U-net;a novel moving object detection algorithm of the monitor video in the foggy weather;language-ontology-based russian-chinese basic sentence bank construction;artificial bee colony algorithm based on uniform local search;Chinese text classification based on character-level CNN and SVM;malay-corpus-enhanced indonesian-chinese neural machine translation;combining transformation and classification for recognizing textual entailment;research on the construction of three level customer service knowledge graph in electric marketing;YVONNE: A fast and accurate prediction scoring retrieval framework based on MF;authentication mechanism for IoT device in micro grid environments;event relation identification based on dependency and co-occurrence;Adaptively calling selection based on distance sorting in CoBiDE;outlier detection based on cluster outlier factor and mutual density;local outlier detection algorithm based on gaussian kernel density function;an improved firefly algorithm hybrid with fireworks;the research of data blood relationship analysis on metadata;detection of pedestrians based on the fusion of human characteristics and kernel density estimation;entropy isolation forest based on dimension entropy for anomaly detection.
the 2018 Grand Challenge targets the problem of accurate predictions on data streams produced by automatic identification system (AIS) equipment, describing naval traffic. this paper reports the technical details of a...
详细信息
ISBN:
(纸本)9781450357821
the 2018 Grand Challenge targets the problem of accurate predictions on data streams produced by automatic identification system (AIS) equipment, describing naval traffic. this paper reports the technical details of a custom solution, which exposes multiple tuning parameters, making its configurability one of the main strengths. Our solution employs a cell grid architecture essentially based on a sequence of hash tables, specifically built for the targeted use case. this makes it particularly effective in prediction on AIS data, obtaining a high accuracy and scalable performance results. Moreover, the architecture proposed accommodates also an optionally semi-supervised learning process besides the basic supervised mode.
暂无评论