Bias detection and mitigation is an active area of research in machine learning. this work extends previous research done by the authors Van Busum and Fang (proceedings of the 38thacm/sigappsymposium on applied Comp...
详细信息
this paper presents a configurable approximate quantum multiplier that integrates approximate and exact controlled adders with a truncation scheme to balance accuracy and circuit complexity in noisy quantum environmen...
详细信息
ISBN:
(纸本)9798400706295
this paper presents a configurable approximate quantum multiplier that integrates approximate and exact controlled adders with a truncation scheme to balance accuracy and circuit complexity in noisy quantum environments. It achieves significant enhancements in error metrics over an exact multiplier, demonstrating its potential for noise-resilient quantum computing in noisy quantum devices.
the proceedings contain 272 papers. the topics discussed include: residual size is not enough for anomaly detection: improving detection performance using residual similarity in multivariate time series;CSP specificat...
ISBN:
(纸本)9781450387132
the proceedings contain 272 papers. the topics discussed include: residual size is not enough for anomaly detection: improving detection performance using residual similarity in multivariate time series;CSP specification and verification of relay-based railway interlocking systems;on enduring more data through enabling page rewrite capability on multi-level-cell flash memory;RAM: exploiting restrained and approximate management for enabling neural network training on NVM-based systems;CIIA: critical infrastructure impact assessment;ontology-based user privacy management in the smart grid;efficient and scalable geographical peer matching for P2P energy sharing communities;planetary digital twin: a case study in aquaculture;a framework for representing internet of things security and privacy policies and detecting potential problems;and energy-efficient fog computing-enabled data transmission protocol in tactile internet-based applications.
the proceedings contain 259 papers. the topics discussed include: EdGCon: auto-assigner of iconicity ratings grounded by lexical properties to aid in generation of technical gestures;a semantic evidence-based approach...
ISBN:
(纸本)9781450395175
the proceedings contain 259 papers. the topics discussed include: EdGCon: auto-assigner of iconicity ratings grounded by lexical properties to aid in generation of technical gestures;a semantic evidence-based approach to continuous cloud service certification;digital forgetting using key decay;on the measurement of performance metrics for virtualization-enhanced architectures;COSTA: a cost-driven solution for migrating applications in multi-cloud environments;towards a high-interaction physics-aware honeynet for industrial control systems;enhancing polar codes efficiency on 3D flash memory by exploiting multiple error variations;traffic intersections as agents: a model checking approach for analyzing communicating agents;an extensible framework for implementing byzantine fault-tolerant protocols;detection of adversarial attacks by observing deep features with structured data algorithms;and proof of swarm based ensemble learning for federated learning applications.
the demand for low latency, bandwidth efficiency, and privacy has driven distributed applications to the network edge, where heterogeneous, and untrusted, and uncontrolled networks pose challenges. this paper presents...
详细信息
ISBN:
(纸本)9798400706295
the demand for low latency, bandwidth efficiency, and privacy has driven distributed applications to the network edge, where heterogeneous, and untrusted, and uncontrolled networks pose challenges. this paper presents a software-defined overlay networking (SDON) middleware that simplifies application development through centralized control of edge resources while addressing many challenges prevalent at the edge. SDON enables applications to specify high-level requirements, such as service placement and communication goals. these are automatically translated into device-specific configurations and deployed on appropriate edge resources. the middleware is implemented as fully functional software, published as open-source, and will be evaluated in multiple edge computing use cases, to demonstrate its application optimization potential.
In this paper, we focus on how the main operations in evolutionary algorithms spend energy in two different languages: C++ and zig. By setting up a methodology that gives us a precise measure of the energy spent by ke...
详细信息
ISBN:
(纸本)9798400706295
In this paper, we focus on how the main operations in evolutionary algorithms spend energy in two different languages: C++ and zig. By setting up a methodology that gives us a precise measure of the energy spent by key evolutionary algorithm functions, we can give the scientific software engineer some actionable insights on how to write energy-conscious evolutionary algorithms. Our experiments show that C++ using the well-known GNU compiler can achieve a 50% reduction in energy consumption for some integer-based fitness functions, as well as very good performance on classical genetic operators.
Efficient data replica placement at the network edge is crucial for minimizing data access latency and enhancing user experience. Current solutions are mostly popularity oriented, assuming that users in close proximit...
详细信息
ISBN:
(纸本)9798400706295
Efficient data replica placement at the network edge is crucial for minimizing data access latency and enhancing user experience. Current solutions are mostly popularity oriented, assuming that users in close proximity share similar interests. While this strategy is effective for widely accessed data, it overlooks the specificity of user interests and their affinities, especially in diverse environments managed by different edge servers: data popular in region A may not be relevant in region B but be highly valuable in region *** introduce Paprika, an online heuristic-based hybrid algorithm that combines the strengths of Genetic Algorithms and Tabu Search to address replica selection and placement in edge computing environments. Paprika takes into account data popularity, pair-wise affinity between regions, and server storage capacity. Our evaluation demonstrates that the hybrid approach outperforms traditional heuristic methods by better balancing user interests across regions and favoring regions with stronger affinities.
Connected autonomous vehicles (CAVs) require extensive data processing to make real-time decisions such as obstacle detection, collision avoidance, and route optimization. To enable fast and accurate decision-making i...
详细信息
ISBN:
(纸本)9798400706295
Connected autonomous vehicles (CAVs) require extensive data processing to make real-time decisions such as obstacle detection, collision avoidance, and route optimization. To enable fast and accurate decision-making in CAVs, services traditionally executed in cloud data centers are being moved to the edge to minimize data transfer from vehicles to the cloud. We present a framework called Q-Edge that utilizes quantum computing at the network edge to improve the speed and effectiveness of data analysis for CAVs. By integrating quantum computing principles such as superposition, entanglement, and teleportation with edge computing, we propose a solution to address the latency and bandwidth issues inherent in traditional cloud computing methods. this approach, leveraging quantum software engineering practices, enables realtime decision-making, optimizing CAV performance and enhancing traffic management, urban mobility, and road safety.
this paper presents C2|Q>, a quantum software framework designed to bridge the gap between classical and quantum programming, specifically aimed at traditional developers who lack quantum computing expertise but wa...
详细信息
ISBN:
(纸本)9798400706295
this paper presents C2|Q>, a quantum software framework designed to bridge the gap between classical and quantum programming, specifically aimed at traditional developers who lack quantum computing expertise but want to leverage the potential benefits of quantum computers. C2|Q> transforms classical code written in high-level languages into quantum representations, enabling execution on Noisy Intermediate-Scale Quantum (NISQ) computers or simulators, and provides a user-friendly interface. the framework focuses on problems where quantum computing offers advantages, particularly nondeterministic polynomial-time complete (NP-complete) problems, which are considered classically *** key components of C2|Q> include a parser that identifies problem categories, extracts inputs, and converts classical inputs into quantum formats; a reducer that reformulates NP problems into 3-satisfiability problems (3SAT) when necessary; and an algorithm generator that constructs corresponding Hamiltonians and recommends feasible quantum algorithms. Additionally, the C2|Q> backend includes modules to optimize and compile quantum circuits, request and select suitable quantum hardware, and interpret computational results. the proposed framework empowers researchers and practitioners without prior quantum experience to harness the potential of hybrid quantum computation.
We present Xook-Flow, a model for constructing input/output systems for managing the data exchange in computing continuum environments. these systems are based on data distribution patterns created by structures calle...
详细信息
ISBN:
(纸本)9798400706295
We present Xook-Flow, a model for constructing input/output systems for managing the data exchange in computing continuum environments. these systems are based on data distribution patterns created by structures called abstract communication channels (ACCs). To prevent resource overload during execution, Xook-Flow automatically selects the appropriate communication channel based on user-defined criteria (e.g., throughput or resource utilization). We implemented this model in a prototype evaluated in a case study focused on managing medical data in HDF5 format across different environments.
暂无评论