Underground coal mines (UCMs) environment is has a hazardous environment because of the presence of different toxic and inflammable gases. In UCMs, the presence of trapped gases may cause accidents and lead to loss of...
详细信息
GNU Parallel is a versatile and powerful tool for process parallelization widely used in scientific computing. This paper demonstrates its effective application in high-performance computing (HPC) environments, partic...
详细信息
This work presents SciTrust, a comprehensive framework for assessing the trustworthiness of large language models (LLMs) in scientific contexts, with a focus on truthfulness, accuracy, hallucination, and sycophancy. T...
详细信息
Neural network quantum state (NNQS) has emerged as a promising candidate for quantum many-body problems, but its practical applications are often hindered by the high cost of sampling and local energy calculation. We ...
详细信息
As computingsystems approach the limits of traditional silicon technology, the diminishing returns in performance per watt present a significant barrier to sustaining growth in HPC. From a large-scale scientific supe...
详细信息
The concept of phubbing (generally defned as a practice of ignoring co-present others by focusing on one's mobile device) is now widely used in studies aiming to understand the efects of smartphone use on co-prese...
详细信息
ISBN:
(纸本)9781450394215
The concept of phubbing (generally defned as a practice of ignoring co-present others by focusing on one's mobile device) is now widely used in studies aiming to understand the efects of smartphone use on co-present interactions. However, most of these studies are quantitative in nature and fail to grasp the interactional context of smartphone use. Drawing on video recordings and utilizing multimodal interaction analysis, the present study examines phubbing in naturally occurring interactions among young adults. Contrary to most previous research, the analysis reveals that disengagement often precedes self-initiated smartphone use rather than follows it. The study identifes factors that afect whether phubbing is reciprocated and whether it is oriented to as problematic. As a result of the analysis, an alternative conceptualization of phubbing is ofered. By refecting on participants' ways of managing phubbing and its consequences, we discuss design solutions for supporting them in this task.
All-flash storage (AFS) systems have become an essential infrastructure component to support enterprise applications, where sub-millisecond latency and very high throughput are required. Nevertheless, the price per ca...
详细信息
All-flash storage (AFS) systems have become an essential infrastructure component to support enterprise applications, where sub-millisecond latency and very high throughput are required. Nevertheless, the price per capacity of solid-state drives (SSDs) is relatively high, which has encouraged system architects to adopt data reduction techniques, mainly deduplication and compression, in enterprise storage solutions. To provide higher reliability and performance, SSDs are typically grouped using redundant array of independent disk (RAID) configurations. Data reduction on top of RAID arrays, however, adds I/O overheads and also complicates the I/O patterns redirected to the underlying backend SSDs, which invalidates the best-practice configurations used in AFS. Unfortunately, existing works on the performance of data reduction do not consider its interaction and I/O overheads with other enterprise storage components including SSD arrays and RAID controllers. In this paper, using a real setup with enterprise-grade components and based on the open-source data reduction module RedHat VDO, we reveal novel observations on the performance gap between the stateof-the-art and the optimal all-flash storage stack with integrated data reduction. We therefore explore the I/O patterns at the storage entry point and compare them with those at the disk subsystem. Our analysis shows a significant amount of I/O overheads for guaranteeing consistency and avoiding data loss through data journaling, frequent small-sized metadata updates, and duplicate content verification. We accompany these observations with cross-layer optimizations to enhance the performance of AFS, which range from deriving new optimal hardware RAID configurations up to introducing changes to the enterprise storage stack. By analyzing the characteristics of I/O types and their overheads, we propose three techniques: (a) application-aware lazy persistence, (b) a fast, read-only I/O cache for duplicate verification, and
The proceedings contain 24 papers. The topics discussed include: analysis of elephant movement in sub-Saharan Africa: ecological, climatic, and conservation perspectives;a simulated study exploring and testing fuzzy l...
ISBN:
(纸本)9798400701498
The proceedings contain 24 papers. The topics discussed include: analysis of elephant movement in sub-Saharan Africa: ecological, climatic, and conservation perspectives;a simulated study exploring and testing fuzzy logic AI and IoT-enabled hydroponic dosing systems aimed at rural subsistence farmers in South Africa;poverty rate prediction using multi-modal survey and earth observation data;understanding household consumption practices and their motivations: opportunities to foster sustainability practices;adapting forests to an uncertain climate – a critical technology review;pandemic, hybrid teaching & stress: examining Indian teachers’ sociotechnical support practices in low-income schools;FoodWise: food waste reduction and behavior change on campus with data visualization and gamification;and Windhoek Smart City Hunt App: designing for citizen engagement.
We provide an interior point method based on quasi-Newton iterations, which only requires first-order access to a strongly self-concordant barrier function. To achieve this, we extend the techniques of Dunagan-Harvey ...
详细信息
ISBN:
(纸本)9781450399135
We provide an interior point method based on quasi-Newton iterations, which only requires first-order access to a strongly self-concordant barrier function. To achieve this, we extend the techniques of Dunagan-Harvey [STOC '07] to maintain a preconditioner, while using only first-order information. We measure the quality of this preconditioner in terms of its relative excentricity to the unknown Hessian matrix, and we generalize these techniques to convex functions with a slowly-changing Hessian. We combine this with an interior point method to show that, given first-order access to an appropriate barrier function for a convex set K, we can solve well-conditioned linear optimization problems over K to epsilon precision in time (O) over tilde (T +n(2)) root log (1/epsilon)), where.. is the self-concordance parameter of the barrier function, and T is the time required to make a gradient query. As a consequence we show that: Linear optimization over..-dimensional convex sets can be solved in time (O) over tilde (T +n(2)) . This parallels the running time achieved by state of the art algorithms for cutting plane methods, when replacing separation oracles with first-order oracles for an appropriate barrier function. We can solve semidefinite programs involving matrices in R-nxn in time (O) over tilde (mn(4)+m(1.25)n(3.5) log(1/epsilon)) , improving over the state of the art algorithms, in the case where m = Omega(3.5/n omega-1.25) Along the way we develop a host of tools allowing us to control the evolution of our potential functions, using techniques from matrix analysis and Schur convexity.
The proceedings contain 6 papers. The topics discussed include: secure and lightweight access control for highly decentralized and distributed file systems;an analysis about federated learning in low-powerful devices;...
ISBN:
(纸本)9798400704574
The proceedings contain 6 papers. The topics discussed include: secure and lightweight access control for highly decentralized and distributed file systems;an analysis about federated learning in low-powerful devices;orchestrating serverless applications in the cloud-to-edge continuum;an optimized blockchain-based data transmission system for telemedicine;benchmarks for job scheduling in ultra-distributed systems;and BlazeFlow: a multi-layer communication middleware for real-time distributed IoT applications.
暂无评论