The world is walking towards an aged society as a consequence of the increasing rate of longevity in modern *** age comes the fact that memory decreases its efficiency and memory loss starts to *** this context, iGend...
详细信息
Specific architectures for different low level vision modalities have been developed and described using reconfigurable hardware. Each of them tries to solve a single low level vision problem: optical flow, disparity,...
详细信息
Specific architectures for different low level vision modalities have been developed and described using reconfigurable hardware. Each of them tries to solve a single low level vision problem: optical flow, disparity, segmentation, tracking, etc. We introduce a novel architecture that includes multiple processing engines in a massively parallel low level vision processing engine of very high complexity and performance. Our design is able to process input images and extract at the same time different visual features such as multi-scale stereo, optical flow and local contrast descriptors such as local orientation, energy or phase. The latest hardware design techniques have been employed in order to achieve the presented system with more than 2000 basic processing elements running in parallel. We have based our system in a Harmonic filter image decomposition model based on Gabor-like filters. It has been validated in multiple scenarios in previous works and it allows sharing hardware resources among different vision modalities on the same chip. In this paper we present an FPGA based implementation of this intensive processing engine as well as the designing techniques employed. The circuit processes input frames of 512×512 pixels at 28 frames per second.
Ontologies are often represented as a graph where nodes represent objects within given ontology and edges represent relations between those objects. Such graphs can be very complex even for medium sized ontologies so ...
详细信息
Ontologies are often represented as a graph where nodes represent objects within given ontology and edges represent relations between those objects. Such graphs can be very complex even for medium sized ontologies so a clean and complete graphical representation is needed. Existing solutions do not include all elements or produce unreadable results for big ontologies. In this paper a complete set of graphical objects for ontology representation was proposed. Algorithms for graph creation were defined. An implementation of proposed solution is described. Comparison with other solutions is made.
In this paper we introduce a preliminary proposal for linguistic description of images. The approach is based on i) a hierarchical fuzzy segmentation of the image, ii) a collection of linguistic features describing ea...
详细信息
In this paper we introduce a preliminary proposal for linguistic description of images. The approach is based on i) a hierarchical fuzzy segmentation of the image, ii) a collection of linguistic features describing each region, and iii) fuzzy spatial relations and locations. The procedure is independent from the way these elements have been obtained, and provides a description with the characteristics of a summary, i.e., a brief and accurate description of the whole image. As another characteristic of summaries, the method can be guided in the description by the user's preferences and interest. Remarkably, we are able to provide a description containing sentences about disjoint regions appearing in different levels of detail.
This paper presents how a plausible cerebellum-like architecture can abstract corrective models in the framework of a robot control task when manipulating objects that significantly affect the dynamics of the system. ...
详细信息
Operating systems have historically been implemented as independent layers between hardware and applications. User programs communicate with the OS through a set of well defined system calls, and do not have direct ac...
详细信息
Operating systems have historically been implemented as independent layers between hardware and applications. User programs communicate with the OS through a set of well defined system calls, and do not have direct access to the hardware. The OS, in turn, communicates with the underlying architecture via control registers. Except for these interfaces, the three layers are practically oblivious to each other. While this structure improves portability and transparency, it may not deliver optimal performance. This is especially true for High Performance Computing (HPC) systems, where modern parallel applications and multi-core architectures pose new challenges in terms of performance, power consumption, and system utilization. The hardware, the OS, and the applications can no longer remain isolated, and instead should cooperate to deliver high performance with minimal power consumption. In this paper we present our experience with the design and implementation of High Performance Linux (HPL), an operating system designed to optimize the performance of HPC applications running on a state-of-the-art compute cluster. We show how characterizing parallel applications through hardware and software performance counters drives the design of the OS and how including knowledge about the architecture improves performance and efficiency. We perform experiments on a dual-socket IBM POWER6 machine, showing performance improvements and stability (performance variation of 2.11% on average) for NAS, a widely used parallel benchmark suite.
A global network provides new opportunities for IT designers. It allows building applications from many pieces, known as components, distributed in different network locations. This methodology describes how to build ...
详细信息
A global network provides new opportunities for IT designers. It allows building applications from many pieces, known as components, distributed in different network locations. This methodology describes how to build all system elements; business logic, data access and a presentation layer from the coarse-grained components. Such a possibility gives us the Java programming language and related open source technologies: Enterprise JavaBeans (EJB) for creating business components and Java Portlets for creating interface components. The presented approach shows how to manage relationships between components and their versions. It describes methods to ensure reliable and fast communication between them. The authors present platforms for building and testing automation of component based applications and explain how the component based approach could help to speed up the team work.
This paper analyses different aspects of S2S (system to system) migration, such as data conversion, procedures migration, and human factor. We present problems that may occur during the process, with particular emphas...
详细信息
This paper analyses different aspects of S2S (system to system) migration, such as data conversion, procedures migration, and human factor. We present problems that may occur during the process, with particular emphasis on data migration issues. The latter part of the paper shows a connection between S2S migration and interoperability. Presented observations and conclusions are based on our experience gained while developing the e-University.
The paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client's request comes to the system and the ...
详细信息
The paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client's request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces a multilayer authentication and authorization. Actor's privileges are the result of the user's and the system's roles conjunction with the network zone. Unlike common systems, the privileges are given to a digital identity, not to particular accounts, so that it does not matter which account was used by the user - he will get the same privileges. Such a combination of many smaller ideas and methods results in a new and modern approach to the security aspects of the distributed service oriented systems.
In Code Division Multiple Access (CDMA) systems, the orthogonality of the spreading codes used to achieve multiple access over a channel is severely degraded due to multi-path interference. Expensive equalization tech...
详细信息
暂无评论