Reducing the power consumption while maintaining the response time constraint has been an important goal in server system design. One of the techniques widely explored in the literature to achieve this goal is Dynamic...
详细信息
ISBN:
(纸本)9781424475469
Reducing the power consumption while maintaining the response time constraint has been an important goal in server system design. One of the techniques widely explored in the literature to achieve this goal is Dynamic Voltage Scaling (DVS). However, DVS is not efficient in modern systems where the overall power consumption includes a large portion of static power consumption. In this paper, we aim to reduce the static power consumption by Dynamic Power Management (DPM) with sleep model in addition to DVS. We propose a smart PowerSleep power-saving scheme, where a procrastination technique is adopted to carefully aggregate jobs to reduce the overhead of transitions in and out of the sleep mode. We also observe that PowerSleep might not always be a good choice due to the mode transition overhead when the server utilization is high, where instead we use PowerIdle power-saving scheme with DVS only. By modeling the system with M/G/1/PS queuing model and further extensions, we present how to minimize the mean power consumption of the server under the given mean response time constraint for both power-saving schemes. Simulation results show that our smart PowerSleep scheme significantly outperforms the simple power saving scheme which adopts sleep mode.
In this paper, a probabilistic approach to combining spatial context with visual and co-occurrence information for semantic image analysis is presented. Overall, the examined image is segmented and subsequently an ini...
详细信息
In this paper, a probabilistic approach to combining spatial context with visual and co-occurrence information for semantic image analysis is presented. Overall, the examined image is segmented and subsequently an initial classification of the resulting image regions to semantic concepts is performed based solely on visual information. Then, a Genetic Algorithm (GA) is introduced for deciding on the optimal semantic image interpretation, realizing image analysis as a global optimization problem. The fundamental novelty of this work is that the GA incorporates in its evolutionary procedure a set of Bayesian Networks (BNs), which probabilistically learn the impact of the available spatial, visual and co-occurrence information on the final outcome for every possible pair of semantic concepts. Experimental results on two publicly available datasets demonstrate the efficiency of the proposed approach.
Motion is one of the most important characteristics in clinical epileptology. In developing an integrated motion analysis system for epileptic patients or children with neurological disorders (e.g. ADHD) we surveyed a...
详细信息
Transactional memory is a promising, optimistic synchronization mechanism for chip-multiprocessor systems. The simplicity of atomic sections, instead of using explicit locks, is also appealing for real-time systems. I...
详细信息
Transactional memory is a promising, optimistic synchronization mechanism for chip-multiprocessor systems. The simplicity of atomic sections, instead of using explicit locks, is also appealing for real-time systems. In this paper an implementation of real-time transactional memory (RTTM) in the context of a real-time Java chip-multiprocessor (CMP) is presented. To provide a predictable and analyzable solution of transactional memory, the transaction buffer is organized fully associative. Evaluation in an FPGA shows that an associativity of up to 64-way is possible without degrading the overall system performance. The paper presents synthesis results for different RTTM configurations and different number of processor cores in the CMP system. A CMP system with up to 8 processor cores with RTTM support is feasible in an Altera Cyclone-II FPGA.
This paper presents a semantic model which delivers personalized audio information. The personalization process is automated and decentralized. The metadata which support personalization are separated in two categorie...
详细信息
This paper presents a semantic model which delivers personalized audio information. The personalization process is automated and decentralized. The metadata which support personalization are separated in two categories: the metadata describing user preferences stored at each user and the resource adaptation metadata stored at the server. The multimedia models MPEG-21 and MPEG-7 are used to describe metadata information. The Web Ontology Language (OWL) language is used to produce and manipulate the relative ontological descriptions.
Databases have become an integral part of the web applications in the current world. Database based applications have brought a revolution in the domain of information technology. These applications interact with the ...
详细信息
Databases have become an integral part of the web applications in the current world. Database based applications have brought a revolution in the domain of information technology. These applications interact with the databases using Structured Query Language (SQL) queries embedded in the code. There are automated ways to test the applications written in imperative and structured languages. However, the methodologies to test the applications with embedded SQL queries are still in the nascent phase. The SQL injection attacks have become one of the most serious security threats. Testing of these applications poses grave challenges to the engineers. In this paper, a novel approach has been proposed to test the applications in a comprehensive way. The approach is a holistic one; it tests the system under real conditions without any artifacts, to avoid potential injection attacks.
Considering emerging demands for auction based efficient resource allocations, the ability to complete an auction within a fine-grained time period without loss of allocation efficiency is in strong demand. Recently, ...
详细信息
The objective of the discrete-time modeling tools is twofold. First, they give an insight into the basic ideas of discrete-time modeling of dc-dc converters for university students and interested power electronics spe...
详细信息
Embedded applications can be structured in terms of mobile agents that are flexibly installed on available nodes. In wireless systems, such nodes typically have limited battery and memory resources; therefore it is im...
详细信息
ISBN:
(纸本)9781424465330
Embedded applications can be structured in terms of mobile agents that are flexibly installed on available nodes. In wireless systems, such nodes typically have limited battery and memory resources; therefore it is important to place agents judiciously. In this paper we tackle the problem of placing a newcomer agent in such a system. The problem has two main components. First, enough memory space must be found or created at some node to place the agent. Second, the placement should be energy efficient. We present heuristics for tackling these two goals in a stepwise fashion, as well as a branch and bound method for achieving both goals at the same time. Our algorithms are centralized assuming a single entry point through which agents are injected into the system, with adequate knowledge of the system state and enough resources to run the proposed algorithms. The algorithms are evaluated under different simulated scenarios, and the tradeoffs across the two metrics (space, energy) are identified.
This paper aims to design a robust H ∞ control system against time invariant polytopic uncertainties. In general, such robust control problems are described by parameter dependent bilinear matrix inequality (PDBMI) ...
详细信息
This paper aims to design a robust H ∞ control system against time invariant polytopic uncertainties. In general, such robust control problems are described by parameter dependent bilinear matrix inequality (PDBMI) problems which are not tractable numerically and there are few efficient methods for solving them. In this paper, we propose an iterative approach to the robust H ∞ controller synthesis problems, which constructs a sequence of infeasible controllers. The feature of our approach is to be able to use any controller variables which may not be a robust stabilizing controller as an initial point. The efficiency of our approach is shown by a numerical example.
暂无评论