The proceedings contain 11 papers. The topics discussed include: challenges of provenance in scientific workflow management systems;a domain-specific composition environment for provenance query of scientific workflow...
ISBN:
(纸本)9781665451918
The proceedings contain 11 papers. The topics discussed include: challenges of provenance in scientific workflow management systems;a domain-specific composition environment for provenance query of scientific workflows;radical-pilot and Parsl: executing heterogeneous workflows on HPC platforms;workflow anomaly detection with graph neural networks;co-scheduling ensembles of in situ workflows;events as a basis for workflow scheduling;an automated cryo-EM computational environment on the HPC system using Pegasus WMS;cross-facility workflows: case studies with active experiments;and novel proposals for FAIR, automated, recommendable, and robust workflows.
Explainable AI (XAI) aims to provide insights into the decisions made by AI models. To date, most XAI approaches provide only one-time, static explanations, which cannot cater to users' diverse knowledge levels an...
详细信息
Gas turbine health management is of great significant for enhancing flight safety and reducing maintenance costs. Based on the architecture of gas turbine fault identification system, a multi-arm spiral microphone arr...
详细信息
Graphics Processing Units (GPUs) are widely used in safety-critical real-time systems such as autonomous vehicles due to their high performance on artificial intelligence (AI) workloads. As the computing power of rece...
详细信息
ISBN:
(数字)9781665453462
ISBN:
(纸本)9781665453462
Graphics Processing Units (GPUs) are widely used in safety-critical real-time systems such as autonomous vehicles due to their high performance on artificial intelligence (AI) workloads. As the computing power of recent GPUs keeps growing, it becomes increasingly possible to allow multiple independent programs to access the GPU concurrently. This complicates timing analysis, as contention for shared GPU resources renders execution times less predictable and worst-case execution times (WCETs) difficult to estimate. This paper provides a method for producing enemy programs that intentionally contend for GPU resources in order to enable more confident measurement-based WCET estimations. This paper provides an experiment-driven method to design effective enemy programs for several different interference channels-specific shared resources within the GPU through which concurrent computations may impact others' execution times. The method is flexible and can be applied to different GPU sharing mechanisms. The enemies are evaluated against a large number of real GPU applications, and the results indicate that these enemies cause higher slowdowns for GPU tasks than other baseline resource-stressing methods.
A nonlinear Sigma point Kalman filter known as Central Difference Filter which considers only first order Taylor series approximation with the help of interpolation formula, have been employed here for the first time ...
详细信息
Since December 2020, the Apple App Store has required all developers to create a privacy label when submitting new apps or app updates. However, there has not been a comprehensive study on how developers responded to ...
详细信息
ISBN:
(纸本)9781450391566
Since December 2020, the Apple App Store has required all developers to create a privacy label when submitting new apps or app updates. However, there has not been a comprehensive study on how developers responded to this requirement. We present the first measurement study of Apple privacy nutrition labels to understand how apps on the U.S. App Store create and update privacy labels. We collected weekly snapshots of the privacy label and other meta-data for all the 1.4 million apps on the U.S. App Store from April 2 to November 5, 2021. Our analysis showed that 51.6% of apps still do not have a privacy label as of November 5, 2021. Although 35.3% of old apps have created a privacy label, only 2.7% of old apps created a privacy label without app updates (i.e., voluntary adoption). Our findings suggest that inactive apps have little incentive to create privacy labels.
This research focuses on the modeling of human gait in order to recognize a human by their walking style. Gait analysis is a very important parameter, especially for biometric systems and also for healthcare applicati...
详细信息
ISBN:
(纸本)9781450396318
This research focuses on the modeling of human gait in order to recognize a human by their walking style. Gait analysis is a very important parameter, especially for biometric systems and also for healthcare applications. In this research, human gait is captured by using only a single Inertial measurement Unit (IMU) sensor, which is positioned on top of the ankle. MATLAB mobile application is used to access the IMU sensor. A small study of 30 participants was conducted and two databases are then developed with different features. The first database contains only IMU sensor data, while the second database contains information on the height and gender of each participant. Both databases are used to train and test four different machine learning algorithms and their performances are compared. The experimental results show that the acquired setup performs well for classification purposes. Results from both databases are comparable and provide sufficient accuracy in the recognition task.
As the global economy's demand for computer applications soars, the demand for well-trained computer science (CS) professionals is rising. This trend fuels a surge in CS undergraduate degree production which, in t...
详细信息
ISBN:
(纸本)9781450394338
As the global economy's demand for computer applications soars, the demand for well-trained computer science (CS) professionals is rising. This trend fuels a surge in CS undergraduate degree production which, in turn, puts a strain on departmental resources. In addition, CS departments have to contend with high dropout and failure rates, fragile learning and bimodal outcomes [1]. Thus, the need for effective teaching techniques in CS education is greater than ever. Some concepts and skills in CS are very difficult to acquire such as analyzing the running time of short pieces of code [2], and particularly, computing the running time of loops. Most instructors use a trace-sum-approximate flow chart described in [2] to teach students how to analyze the running time of code. The two most important skills in this analysis process are the tracing of code and the approximation of the sum of different number patterns, e.g. the sum of the linear number pattern 1 + 2 + 3 +... + n is equal to n*(n+1)/2 and it is approximated to O(n(2)). Novice programmers struggle with both these integral skills [3, 4]. Visual systems have been recognized to improve students' understanding of these concepts [4]. Several tools have been developed to assist students with running time analysis. Existing tools are targeted at students with more advanced training, such as a background in advanced data structures (AAV [4]) or experience with code tracing and approximation of the sum of different number patterns (Compigorithm [5]). However, none of the existing tools teach students how to compute the running time at the introductory level, and this gap presented a unique opportunity for us. An effective run-time analysis visualization system for introductory courses must depict the tracing and approximation of the sum. We propose a design in which the depiction of the loop tracing for run-time analysis is done through the use of a table, where the columns represent loop variables and each row represe
Anxiety and depression rates in Computer Science (CS) students are double those of other undergraduates and 5-10 times higher than the general population. However, factors contributing to the elevated mental health is...
详细信息
5G claims to support mobility up to 500 km/h according to the 3GPP standard. However, its field performance under high-speed scenes remains in mystery. In this paper, we conduct the first large-scale measurement campa...
详细信息
暂无评论