Following the successful WCET Tool Challenges in 2006 and 2008, the third event in this series was organized in 2011, again with support from the ARTIST DESIGN Network of Excellence. Following the practice established...
详细信息
ISBN:
(纸本)9781632663153
Following the successful WCET Tool Challenges in 2006 and 2008, the third event in this series was organized in 2011, again with support from the ARTIST DESIGN Network of Excellence. Following the practice established in the previous Challenges, the WCET Tool Challenge 2011 (WCC'11) defined two kinds of problems to be solved by the Challenge participants with their tools, WCET problems, which ask for bounds on the execution time, and flow-analysis problems, which ask for bounds on the number of times certain parts of the code can be executed. The benchmarks to be used in WCC'11 were debie1, PapaBench, and an industrial-strength application from the automotive domain provided by Daimler. Two default execution platforms were suggested to the participants, the ARM7 as "simple target" and the MPC5553/5554 as a "complex target," but participants were free to use other platforms as well. Ten tools participated in WCC'11: aiT, Astrée, Bound-T, FORTAS, METAMOC, OTAWA, SWEET, TimeWeaver, TuBound and WCA.
This work presents a feasible solution to the problem of book losses prediction from financial and general data in companies. The specific problem tackled in this work corresponds to a real dataset of Spanish companie...
详细信息
Due to advancements in lighting technologies new opportunities for application emerge. In this paper an interdisciplinary study towards the development of adaptive lighting environments is presented. An implementation...
详细信息
Due to advancements in lighting technologies new opportunities for application emerge. In this paper an interdisciplinary study towards the development of adaptive lighting environments is presented. An implementation of an adaptive lighting environment is made in the domain of office work. For evaluation, experts from the domains of human-system interaction, activity and context recognition, and system architecture design are interviewed. Contributions are made with regard to the implementation of the adaptive lighting in office environments and an evaluation method that is in line with the interdisciplinary approach. From the evaluation method insights in the fields of human-computer interaction, activity and context recognition and system architecture and (wireless) networking and in topics that span across these fields are gained.
This paper introduces a two-stage Linear Logic based program synthesis approach to automatic RESTful web service composition. The Linear Logic theorem proof is applied at both resource and service invocation method le...
详细信息
This paper introduces a two-stage Linear Logic based program synthesis approach to automatic RESTful web service composition. The Linear Logic theorem proof is applied at both resource and service invocation method levels, which greatly improves the searching efficiency and guarantees the correctness and completeness of the service composition. Furthermore, the process calculus is used as formalism for the composition process, which enables the approach to be executable at the business management level. The process calculus is attached to the Linear Logic inference rules in the style of type theory, so the process model is extracted directly from the complete proof. An example is given to show the extraction of a process model from a Linear Logic proof search.
CUDA has become a very popular programming paradigm in parallel computing area. However, very little work has been done for characterizing CUDA kernels. In this work, we measure the thread level performance, collect t...
详细信息
CUDA has become a very popular programming paradigm in parallel computing area. However, very little work has been done for characterizing CUDA kernels. In this work, we measure the thread level performance, collect the basic block level characteristics, and glean the instruction level properties for about 35 programs from CUDA SDK, Parboil, and Rodinia benchmark suites. In addition, we define basic block vectors, synchronization vectors and thread similarity matrix to capture the characteristics of CUDA programs efficiently. We find that CUDA programs have some unique characteristics at each level compared to sequential programs.
In this paper, a permutation scheme is introduced for Distributed Video Coding. The main goal is to preserve privacy and security in video surveillance video communications and can be adapted for other scenarios. The ...
详细信息
In this paper, a permutation scheme is introduced for Distributed Video Coding. The main goal is to preserve privacy and security in video surveillance video communications and can be adapted for other scenarios. The proposed approach consists to apply permutation based encryption to the DVC scenario. The permutation is defined by a secret key which is required at the decoder for decompression providing security. Simulation results show that the reference architecture and the permutation-based proposed have similar rate distortion performance.
Affymetrix High Oligonucleotide expression arrays are widely used for the high-throughput assessment of gene expression of thousands of genes simultaneously. Although disputed by several authors, there are non-biologi...
详细信息
The paper presents a workflow application aimed at detection of unwanted and potentially dangerous events observed by multimedia cameras installed at public facilities, such as universities. The detection of unwanted ...
详细信息
ISBN:
(纸本)9788360779026
The paper presents a workflow application aimed at detection of unwanted and potentially dangerous events observed by multimedia cameras installed at public facilities, such as universities. The detection of unwanted events launches alarms, causes notifications to be sent to respective forces and videos to be recorded. The proposed application model consists of several stages: nodes with camera(s) attached to them, node(s) for fetching data streams, node(s) for data processing and nodes used for notification and data storage. The already implemented testbed application fetches either a stream of data from a camera attached to a computer or reads a video file. The stream is decoded and data are processed by parallel processes on a cluster. The implemented testbed application detects a movement in the stream and can be applied for monitoring the university during the night.
The paper presents a solution and a tool for automatic, fast and easy adaptation of legacy Unix applications into services in BeesyCluster. The latter is a middleware that allows users to access distributed servers an...
详细信息
ISBN:
(纸本)9788360779026
The paper presents a solution and a tool for automatic, fast and easy adaptation of legacy Unix applications into services in BeesyCluster. The latter is a middleware that allows users to access distributed servers and clusters via WWW/Web services. Each BeesyCluster user can publish own applications as services and define access policies to such services to make them available to others. Such services can be composed into scientific or business workflows. To offer a wider selection of services, our solution retrieves information from Linux packages such as deb and rpm to automatically register applications as services in BeesyCluster making it a platform with a large registry containing thousands of services. Furthermore, we show a mechanism for searching for services based on a text query formulated by the user.
In this paper, a Fuzzy Dominant Texture Descriptor is proposed for semantically describing an image. This fuzzy descriptor is defined over a set of fuzzy sets modelling the "coarseness" texture property. Con...
详细信息
暂无评论