With the explosive growth of information, more and more organizations are deploying private cloud systems or renting public cloud systems to process big data. However, there is no existing benchmark suite for evaluati...
详细信息
With the explosive growth of information, more and more organizations are deploying private cloud systems or renting public cloud systems to process big data. However, there is no existing benchmark suite for evaluating cloud performance on the whole system level. To the best of our knowledge, this paper proposes the first benchmark suite CloudRank-D to benchmark and rank cloud computing sys- tems that are shared for running big data applications. We an- alyze the limitations of previous metrics, e.g., floating point operations, for evaluating a cloud computing system, and propose two simple metrics: data processed per second and data processed per Joule as two complementary metrics for evaluating cloud computing systems. We detail the design of CloudRank-D that considers representative applications, di- versity of data characteristics, and dynamic behaviors of both applications and system software platforms. Through experi- ments, we demonstrate the advantages of our proposed met- tics. In several case studies, we evaluate two small-scale de- ployments of cloud computing systems using CloudRank-D.
Image processing in digital computer systems usually considers the visual information as a sequence of frames. These frames are from cameras that capture reality for a short period of time. They are renewed and transm...
详细信息
ISBN:
(纸本)9789898425720
Image processing in digital computer systems usually considers the visual information as a sequence of frames. These frames are from cameras that capture reality for a short period of time. They are renewed and transmitted at a rate of 25-30 fps (typical real-time scenario). Digital video processing has to process each frame in order to obtain a filter result or detect a feature on the input. In stereo vision, existing algorithms use frames from two digital cameras and process them pixel by pixel until it is found a pattern match in a section of both stereo frames. Spike-based processing is a relatively new approach that implements the processing by manipulating spikes one by one at the time they are transmitted, like a human brain. The mammal nervous system is able to solve much more complex problems, such as visual recognition by manipulating neuron's spikes. The spike-based philosophy for visual information processing based on the neuro-inspired Address-Event- Representation (AER) is achieving nowadays very high performances. In this work we study the existing digital stereo matching algorithms and how do they work. After that, we propose an AER stereo matching algorithm using some of the principles shown in digital stereo methods.
The paper presents a solution and a tool for automatic, fast and easy adaptation of legacy Unix applications into services in BeesyCluster. The latter is a middleware that allows users to access distributed servers an...
详细信息
ISBN:
(纸本)9788360779026
The paper presents a solution and a tool for automatic, fast and easy adaptation of legacy Unix applications into services in BeesyCluster. The latter is a middleware that allows users to access distributed servers and clusters via WWW/Web services. Each BeesyCluster user can publish own applications as services and define access policies to such services to make them available to others. Such services can be composed into scientific or business workflows. To offer a wider selection of services, our solution retrieves information from Linux packages such as deb and rpm to automatically register applications as services in BeesyCluster making it a platform with a large registry containing thousands of services. Furthermore, we show a mechanism for searching for services based on a text query formulated by the user.
The paper presents a workflow application aimed at detection of unwanted and potentially dangerous events observed by multimedia cameras installed at public facilities, such as universities. The detection of unwanted ...
详细信息
ISBN:
(纸本)9788360779026
The paper presents a workflow application aimed at detection of unwanted and potentially dangerous events observed by multimedia cameras installed at public facilities, such as universities. The detection of unwanted events launches alarms, causes notifications to be sent to respective forces and videos to be recorded. The proposed application model consists of several stages: nodes with camera(s) attached to them, node(s) for fetching data streams, node(s) for data processing and nodes used for notification and data storage. The already implemented testbed application fetches either a stream of data from a camera attached to a computer or reads a video file. The stream is decoded and data are processed by parallel processes on a cluster. The implemented testbed application detects a movement in the stream and can be applied for monitoring the university during the night.
The use of simulation tools in the development of new Wireless Sensor Networks protocols and applications should be accompanied by minimisation of redundant code and work, making it possible to seamlessly run the same...
详细信息
ISBN:
(纸本)9789898425690
The use of simulation tools in the development of new Wireless Sensor Networks protocols and applications should be accompanied by minimisation of redundant code and work, making it possible to seamlessly run the same code on simulated and real platforms. This work proposes an architecture for a WSN testing platform that integrates simulation tools in an application-transparent way. The platform will be focused on testing the WSN sink node and providing it with both real and simulated data. The novelty of this approach lies in the use of a flexible network simulation tool not focused on a specific network technology, and the use of generic hardware and open source tools.
With regard to the fundamental problem of the MANET routing protocols,this paper according to the campus mobile node behaviour,aims to establish a campus wireless mobile model based on AOC *** NS-2 simulation platform...
详细信息
ISBN:
(纸本)9780863419256
With regard to the fundamental problem of the MANET routing protocols,this paper according to the campus mobile node behaviour,aims to establish a campus wireless mobile model based on AOC *** NS-2 simulation platform extensive simulate result and analysis of different mobile fashion which effect on the MANET routing protocol performance:in the aspect of Packet Delivery Ratio,DSR and AODV both surpass 95%,were not greatly affected by the changes of node mobile rate;DSDV and DSR closed to the Path Optimality.
Dataflow architecture has shown its advantages in many high-performance computing cases. In dataflow computing, a large amount of data are frequently transferred among processing elements through the network-on-chip ...
详细信息
Dataflow architecture has shown its advantages in many high-performance computing cases. In dataflow computing, a large amount of data are frequently transferred among processing elements through the network-on-chip (NoC). Thus the router design has a significant impact on the performance of dataflow architecture. Common routers are designed for control-flow multi-core architecture and we find they are not suitable for dataflow architecture. In this work, we analyze and extract the features of data transfers in NoCs of dataflow architecture: multiple destinations, high injection rate, and performance sensitive to delay. Based on the three features, we propose a novel and efficient NoC router for dataflow architecture. The proposed router supports multi-destination; thus it can transfer data with multiple destinations in a single transfer. Moreover, the router adopts output buffer to maximize throughput and adopts non-flit packets to minimize transfer delay. Experimental results show that the proposed router can improve the performance of dataflow architecture by 3.6x over a state-of-the-art router.
We built a spatial hybrid system that combines a personal computer (PC) and virtual reality (VR) for visual sensemaking, addressing limitations in both environments. Although VR offers immense potential for interactiv...
详细信息
The challenge for on-chip networks is to provide low latency communication in a very low power budget. To reduce the latency and keep the simplicity of a mesh network, torus network is proposed. As torus networks have...
详细信息
The problem of selecting the patterns to be learned by any model is usually not considered by the time of designing the concrete model but as a preprocessing step. Information theory provides a robust theoretical fram...
详细信息
ISBN:
(纸本)2930307099
The problem of selecting the patterns to be learned by any model is usually not considered by the time of designing the concrete model but as a preprocessing step. Information theory provides a robust theoretical framework for performing input variable selection thanks to the concept of mutual information. Recently the computation of the mutual information for regression tasks has been proposed so this paper presents a new application of the concept of mutual information not to select the variables but to decide which prototypes should belong to the training data set in regression problems. The proposed methodology consists in deciding if a prototype should belong or not to the training set using as criteria the estimation of the mutual information between the variables. The novelty of the approach is to focus in prototype selection for regression problems instead of classification as the majority of the literature deals only with the last one. Other element that distinguishes this work from others is that it is not proposed as an outlier identificator but as an algorithm that determines the best subset of input vectors by the time of building a model to approximate it. As the experiment section shows, this new method is able to identify a high percentage of the real data set when it is applied to a highly distorted data sets.
暂无评论