Subspace selection is widely adopted in many areas of patternrecognition. A recent result, named maximizing the geometric mean of Kullback-Leibler (KL) divergences of class pairs (MGMD), is a successful method for su...
详细信息
Proximity searching is an algorithmic abstraction covering a large number of applications in areas such as machine learning, statistics, multimedia information retrieval, computer vision and patternrecognition, to na...
详细信息
By considering different weights of items, weighted frequent pattern (WFP) mining can find more important frequent patterns. However previous WFP algorithms are not suitable for continuous, unbounded and high-speed da...
详细信息
Irregular or pointer-based structures such as graphs and trees are commonly used in algorithms dealing with sparse data. Given their reliance on pointers, these algorithms are difficult to analyze and the structure of...
详细信息
ISBN:
(纸本)9781450306980
Irregular or pointer-based structures such as graphs and trees are commonly used in algorithms dealing with sparse data. Given their reliance on pointers, these algorithms are difficult to analyze and the structure of their memory accesses is obfuscated which makes the extraction of parallelism difficult. In this work, we present a framework that is capable of reasoning about the semantics of the dynamic data footprints of operations to determine their potential overlap. We leverage the knowledge the programmer has about access patterns for the algorithm but is currently unable to express. this knowledge allows our runtime to make either a parallelization decision or throttle concurrency to improve performance in Software Transactional Memories (STMs) [6]. Our framework relies on programmer-supplied predicates that are appropriately evaluated at runtime and utilized to probabilistically assert certain properties about data footprints. We present simple abstractions and a low-overhead runtime to support our framework. We demonstrate our work by parallelizing a graph-coloring benchmark and by improving the transactional performance of benchmarks from the STAMP suite.
the proceedings contain 142 papers. the topics discussed include: distributed caching strategies in peer-to-peer systems;a power-aware based storage architecture for high performance computing;a distributed reconfigur...
ISBN:
(纸本)9780769545387
the proceedings contain 142 papers. the topics discussed include: distributed caching strategies in peer-to-peer systems;a power-aware based storage architecture for high performance computing;a distributed reconfigurable active SSD platform for data intensive applications;a parallel processing scheme for large-size sliding-window applications;algebraic models for the cube connected cycles and shuffle exchange graphs;a high-performance and energy-efficient virtually tagged stack cache architecture for multi-core environments;providing quality of science in volunteer computing;an effective dynamic scheduling runtime and tuning system for heterogeneous multi and many-core desktop platforms;on the social aspects of personalized ranking for web services;stable adaptive work-stealing for concurrent multi-core runtime systems;rule pattern parallelization of packet filters on multi-core environments;and memory-intensive applications on a many-core processor.
We present a new video character recognition method based on hierarchical classification. In the first step, we propose a method for character segmentation of the text line detected by the text detection method. the s...
详细信息
ISBN:
(纸本)9780769545202
We present a new video character recognition method based on hierarchical classification. In the first step, we propose a method for character segmentation of the text line detected by the text detection method. the segmentation algorithm uses dynamic programming to find least-cost paths in the gray domain to identify the spaces between characters. For the segmented characters, we get a Canny edge image as input for the character recognition step. We introduce hierarchical classification based on voting criteria with structural features to classify 62 character classes into different smaller classes. We divide the perimeter of a character into 8 segments according to 8 directions at the centroid. then the shape of each segment is studied to recognize the characters based on distances between the centroid and end points, and distances between the midpoint and end points. Our experiments on 1462 characters of upper case, lower case and numerals shows that 10% samples per class for training is enough to obtain 94.5% recognition accuracy. the dataset is chosen from TRECVID database of 2005 and 2006.
Texture analysis is used in numerous applications in various fields. there have been many different approaches/techniques in the literature for texture analysis among which the texton-based approach that computes the ...
详细信息
ISBN:
(纸本)9783642215926;9783642215933
Texture analysis is used in numerous applications in various fields. there have been many different approaches/techniques in the literature for texture analysis among which the texton-based approach that computes the primitive elements representing textures using k-means algorithm has shown great success. Recently, dictionary learning and sparse coding has provided state-of-the-art results in various applications. With recent advances in computingthe dictionary and sparse coefficients using fast algorithms, it is possible to use these techniques to learn the primitive elements and histogram of them to represent textures. In this paper, online learning is used as fast implementation of sparse coding for texture classification. the results show similar to or better performance than texton based approach on CUReT database despite of computation of dictionary without taking into account the class labels.
this study proposes an intelligent real-time odor monitoring system for monitoring odor problems, a new type of environmental problems, in real-time and for managing harmful substances. this system minimizes the measu...
详细信息
Cloud computing has become an emerging computing paradigm which brings new opportunities and challenges to overcome. While the cloud provides seemingly limitless scalability and an alternative to expensive data center...
详细信息
ISBN:
(纸本)9783642215377;9783642215384
Cloud computing has become an emerging computing paradigm which brings new opportunities and challenges to overcome. While the cloud provides seemingly limitless scalability and an alternative to expensive data center infrastructure, it raises new issues in regards to security and privacy as processing and storage tasks are handed over to third parties. this article outlines a Distributed OSGi (DOSGi) architecture for sharing electronic health records utilizing public and private clouds which overcomes some of the security issues inherent in cloud systems. this system, called HCX (Health Cloud eX-change), allows for health records and related healthcare services to be dynamically discovered and interactively used by client programs accessing services within a federated cloud. A basic prototype is presented as proof of concept along with a description of the steps and processes involved in setting up the underlying security services. Several improvements have been added to HCX including a Role-Based Single-Sign-On (RBSSO).
A three-dimensional numerical model is developed to simulate the human nasal cilia motion in the periciliary liquid (PCL) layer. the governing equations are solved using the immersed boundary method combined withthe ...
详细信息
ISBN:
(纸本)9780889868663
A three-dimensional numerical model is developed to simulate the human nasal cilia motion in the periciliary liquid (PCL) layer. the governing equations are solved using the immersed boundary method combined withthe projection method. the cilia beating pattern is imposed as an input for the calculation. the ciliary forces are computed by the direct forcing method. the present preliminary results are consistent with other reported results for the average velocity of the PCL and its linear dependency on the cilia beat frequency.
暂无评论