Our main use case features multiple companies that iteratively optimize on the architectural properties of aircraft components in a decentralized manner. In each optimization step of the so-called multi-disciplinary o...
详细信息
ISBN:
(纸本)9781450368667
Our main use case features multiple companies that iteratively optimize on the architectural properties of aircraft components in a decentralized manner. In each optimization step of the so-called multi-disciplinary optimization (MDO) process, sensitive data is exchanged between organizations, and we require auditability and traceability of actions taken to assure compliance with signed legal agreements. In this paper, we present a distributed protocol that coordinates authenticated and auditable exchanges of files, leveraging a smart contract. The entire life cycle of a file exchange, including file registration, access request and key distribution, is recorded and traceable via the smart contract. Moreover, when one party raises a dispute, the smart contract can be used to identify the dishonest party without compromising the file's confidentiality. The proposed protocol provides a simple, novel, yet efficient approach to exchange files with support for data access auditability between companies involved in a private consortium with no incentive to share files outside of the protocol. We implemented the protocol in Solidity, deployed it on a private Ethereum blockchain, and validated it within the use case of a decentralized workflow.
Data Stream Processing (DSP) enables near real-time analysis of fast data streams, produced, e.g., by Internet-of-Things devices. distributed DSP systems exploit distributedcomputing infrastructures, possibly spannin...
详细信息
Different libraries allow performing computer vision tasks, e.g., object recognition, in almost every mobile device that has a computing capability. In modern smartphones, such tasks are compute-intensive, energy hung...
ISBN:
(纸本)9781665433266
Different libraries allow performing computer vision tasks, e.g., object recognition, in almost every mobile device that has a computing capability. In modern smartphones, such tasks are compute-intensive, energy hungry computation running on the GPU or the particular Machine Learning (ML) processor embedded in the device. Task offloading is a strategy adopted to move compute-intensive tasks and hence their energy consumption to external computers, in the edge network or in the cloud. In this paper, we report an experimental study that measure under different mobile computer vision set-ups the energy reduction when the inference of an image processing is moved to an edge node, and the capability to still meet real-time *** particular, our experiments show that offloading the task - in our case real-time object recognition - to a possible next-to-the-user node allows saving about the 70% of battery consumption while maintaining the same frame rate (fps) that local processing can achieve.
We show an (O) over tilde (n(p/(p+2)))-round algorithm in the CONGEST model for listing of K-p (a clique with p nodes), for all p = 4, p >= 6. For p = 5, we show an (O) over tilde (n(3/4))-round algorithm. For p = ...
详细信息
ISBN:
(纸本)9781450375825
We show an (O) over tilde (n(p/(p+2)))-round algorithm in the CONGEST model for listing of K-p (a clique with p nodes), for all p = 4, p >= 6. For p = 5, we show an (O) over tilde (n(3/4))-round algorithm. For p = 4 and p = 5, our results improve upon the previous state-of-the-art of O(n(5/6+o(1))) and O(n(21/22+o(1))), respectively, by Eden et al. [DISC 2019]. For all p >= 6, ours is the first sub-linear round algorithm for Kp listing. We leverage the recent expander decomposition algorithm of Chang et al. [SODA 2019] to create clusters with a good mixing time. Three key novelties in our algorithm are: (1) we carefully iterate our listing process with coupled values of min-degree within the clusters and arboricity outside the clusters, (2) all the listing is done within the cluster, which necessitates new techniques for bringing into the cluster the information about all edges that can potentially form K-p instances with the cluster edges, and (3) within each cluster we use a sparsity-aware listing algorithm, which is faster than a general listing algorithm and which we can allow the cluster to use since we make sure to sparsify the graph as the iterations proceed. As a byproduct of our algorithm, we show an optimal sparsityaware algorithm for K-p listing, which runs in Theta(1 + m/n(1+2/p)) rounds in the CONGESTED CLIQUE model. Previously, Pandurangan et al. [SPAA 2018], Chang et al. [SODA 2019], and Censor-Hillel et al. [TCS 2020] showed sparsity-aware algorithms for the case of p = 3, yet ours is the first such sparsity aware algorithm for p >= 4.
A lease is an important primitive for building distributed protocols, and it is ubiquitously employed in distributed systems. However, the scope of the classic lease abstraction is restricted to the trusted computing ...
详细信息
Human-Computer Interaction is a multidisciplinary field that is taught in computing undergraduate courses. Although HCI Education has been a theme for research both nationally and internationally, much of this existin...
详细信息
ISBN:
(纸本)9781450381727
Human-Computer Interaction is a multidisciplinary field that is taught in computing undergraduate courses. Although HCI Education has been a theme for research both nationally and internationally, much of this existing research is focused on syllabi guidelines and the topics being taught. We propose an in-depth research so we can better understand how HCI is being taught in computing undergraduate courses in Brazil. For that, we chose to use the UDUM method, conducting semi-structured interviews with thirteen geographically distributed HCI professors that teach introductory courses in computing departments and courses in Brazil. Among our results, an aspect that stood out was the high value given to practice by our interviewees, which is the focus of this paper. The interviewees value conducting the course itself guided by a life cycle in HCI, walking through different phases and teaching respective methods and techniques in a practical way, where students can exercise and practice what they are learning in hands-on projects during the course.
The AP Computer Science principles (CSP) high school course introduces students to computer science and programming. What should motivated students study after successful completion of AP CSP? The AP CSA class teaches...
详细信息
ISBN:
(纸本)9781450380621
The AP Computer Science principles (CSP) high school course introduces students to computer science and programming. What should motivated students study after successful completion of AP CSP? The AP CSA class teaches Java programming and it has traditionally not attracted students from underrepresented groups. We are working on an alternative, projects-based course that will teach cutting edge CS concepts, such as distributedcomputing, computer networking, cybersecurity, the internet of things and machine learning, in a hands-on, accessible manner. Such an approach enables students to work on problems that interest them making computing more relevant and the curriculum more engaging. We utilize NetsBlox, a collaborative, block-based programming environment that extends Snap! with a few carefully selected abstractions that open up the vast array of resources freely available on the internet for student programs. Moreover, the tool enables students to work together on the same project remotely similarly to how Google Docs operate. This demonstration will introduce the environment and highlight its utility in creating distributed applications such as a shared whiteboard app and projects that access public domain scientific data sources and visualize them in various ways using online services such as Google Maps or charting. More information is available at https://***.
Machine learning (ML) models are increasingly trained in clusters with non-dedicated workers possessing heterogeneous resources. In such scenarios, model training efficiency can be negatively affected by stragglers - ...
详细信息
Checkpoint/Restart (C/R) is widely used to provide fault tolerance on High-Performance computing (HPC) systems. However, Parallel File System (PFS) overhead and failure uncertainty cause significant application overhe...
详细信息
ISBN:
(纸本)9781450370523
Checkpoint/Restart (C/R) is widely used to provide fault tolerance on High-Performance computing (HPC) systems. However, Parallel File System (PFS) overhead and failure uncertainty cause significant application overhead. This paper develops an adaptive multi-level C/R model that incorporates a failure prediction and analysis model, which orchestrates failure prediction, checkpointing, checkpoint frequency, and proactive live migration along with the additional benefit of Burst Buffers (BB). It effectively reduces the overheads due to failures, checkpointing, and recovery. Simulation results for the Summit supercomputer yield a reduction of approximate to 20%-86% in application overhead due to BBs, orchestrated failure prediction, and migration. We also observe a approximate to 29% decrease in checkpoint writes to BBs, which can increase the longevity of the BB storage devices.
暂无评论