Large-scale supercomputing is revolutionizing the way science is conducted. A growing challenge, however, is understanding the massive quantities of data produced by largescale simulations. the data, typically time-va...
详细信息
ISBN:
(纸本)9781581139648
Large-scale supercomputing is revolutionizing the way science is conducted. A growing challenge, however, is understanding the massive quantities of data produced by largescale simulations. the data, typically time-varying, multivariate, and volumetric, can occupy from hundreds of gigabytes to several terabytes of storage space. Transferring and processing volume data of such sizes is prohibitively expensive and resource intensive. Although it may not be possible to entirely alleviate these problems, data compression should be considered as part of a viable solution, especially when the primary means of data analysis is volume rendering. In this paper we present our study of multivariate compression, which exploits correlations among related variables, for volume rendering. Two configurations for multidimensional compression based on vector quantization are examined. We emphasize quality reconstruction and interactive rendering, which leads us to a solution using graphics hardware to perform on-the-fly decompression during rendering. Copyright 2005 acm.
Component-Based Development (CBD) is an emerging discipline for promoting practical reuse of software. In CBD, by building new software with independently developed components, we can gain the benefits promised by the...
详细信息
ISBN:
(纸本)9781605581668
Component-Based Development (CBD) is an emerging discipline for promoting practical reuse of software. In CBD, by building new software with independently developed components, we can gain the benefits promised by the software reuse such as quality improvement and rapid development. Accordingly, to improve quality of components, we propose the component-based metrics applying the strength of dependency between classes to measure precisely. In addition, we prove the theoretical soundness of the proposed metrics by the axioms of Briand et al. and suggest the accuracy and practicality of the proposed metrics through a comparison withthe conventional metrics in component development phase. Copyright 2009 acm.
In this paper, we propose a new distributed dynamic data driven model and strategy to direct and evaluate the interlinked data sets in Dynamic Data Driven Application Systems (DDDAS). the underlying technique is the i...
详细信息
ISBN:
(纸本)9781450316569
In this paper, we propose a new distributed dynamic data driven model and strategy to direct and evaluate the interlinked data sets in Dynamic Data Driven Application Systems (DDDAS). the underlying technique is the introduction of a reinforcement Q-Learning approach including search strategies to determine how to drill and drive a series of highly dependent data in order to increase prediction accuracy and efficiency. In simulation, the new model utilizes individual sensors, distributed databases, and predictors in Dynamic Data Stream Nodes with multiple dimensional variables which can be instantiated to explore the search space, so that search convergence can be improved. We show the effectiveness and applicability of using the technique in the analysis of typhoon rainfall data. the result shows that the proposed approach performed better than traditional linear regression approaches, reducing the error rate by 30. 48%. Copyright 2013 acm.
the vast number of on-line biological and medical databases available can be a great resource for biomedical researchers. However, the different types of data and interfaces available can be overwhelming for many biom...
详细信息
BFT protocols in the synchronous setting rely on a strong assumption: every message sent by a party will arrive at its destination within a known bounded time. To allow some degree of asynchrony while still tolerating...
详细信息
ISBN:
(纸本)9781450385480
BFT protocols in the synchronous setting rely on a strong assumption: every message sent by a party will arrive at its destination within a known bounded time. To allow some degree of asynchrony while still tolerating a minority corruption, recently, in Crypto'19, a weaker synchrony assumption called mobile sluggish faults was introduced. In this work, we investigate the support for mobile sluggish faults in existing synchronous protocols such as Dfinity, Streamlet, Sync HotStuff, OptSync and the optimal latency BFT protocol. We identify key principles that can be used to "compile" these synchronous protocols to tolerate mobile sluggish faults.
Ubiquitous Learning (UbiLearning) environments heavily employ mobile devices to empower users with mobility and tooling support to learn anytime, anywhere. Introducing mobile devices in educational settings imposes co...
详细信息
ISBN:
(纸本)9781605581668
Ubiquitous Learning (UbiLearning) environments heavily employ mobile devices to empower users with mobility and tooling support to learn anytime, anywhere. Introducing mobile devices in educational settings imposes constraints on search behavior due to limited resources on these devices such as small screens and restricted input functionalities. Targeting this scenario, this paper proposes an architecture for implicit relevance feedback which considers users' work context to expand search queries in order to satisfy information needs with greater precision. Evaluation results conducted over a local test collection enriched with contextual features reveal improvements on average precision when compared to a pseudo relevance feedback baseline. Copyright 2009 acm.
Cloud computing is rapidly increasing in popularity. Companies such as RedHat, Microsoft, Amazon, Google, and IBM are increasingly funding cloud computing infrastructure and research, making it important for students ...
详细信息
Blogs are becoming an important social tool. By means of blogs, bloggers share their likes and dislikes, express their opinions, report news and form groups related to some subjects. thus, the available information on...
详细信息
A knowledge graph represents a network of real-world entities (i.e., objects, events, or concepts) and illustrates the relationship between entities. A recommender system can improve its reasoning and explainability u...
详细信息
During functional verification, complex interactions between multiple modules that compose a digital circuit design can reveal hard-to-find bugs. Functional coverage specifications must be precise to assure these inte...
详细信息
ISBN:
(纸本)9781605581668
During functional verification, complex interactions between multiple modules that compose a digital circuit design can reveal hard-to-find bugs. Functional coverage specifications must be precise to assure these interactions occur during the simulation. We are proposing a technique for improving the functional verification specification of individual modules, preserving the occurrence of these interactions scenarios in the composition phase. We obtain these new specifications in a deductive way, by means of set theory. Using experimental results, we show how our work can contribute to error detection and save functional verification time. Copyright 2009 acm.
暂无评论