Fire alarm systems play a vital role in providing early warnings, facilitating prompt evacuation in emergency situations. These systems ensure the security of individuals by alerting them to possible risks and allowin...
详细信息
Graph processing has been widely used in many scenarios,from scientific computing to artificial *** processing exhibits irregular computational parallelism and random memory accesses,unlike traditional ***,running gra...
详细信息
Graph processing has been widely used in many scenarios,from scientific computing to artificial *** processing exhibits irregular computational parallelism and random memory accesses,unlike traditional ***,running graph processing workloads on conventional architectures(e.g.,CPUs and GPUs)often shows a significantly low compute-memory ratio with few performance benefits,which can be,in many cases,even slower than a specialized single-thread graph *** domain-specific hardware designs are essential for graph processing,it is still challenging to transform the hardware capability to performance boost without coupled software *** article presents a graph processing ecosystem from hardware to *** start by introducing a series of hardware accelerators as the foundation of this ***,the codesigned parallel graph systems and their distributed techniques are presented to support graph ***,we introduce our efforts on novel graph applications and hardware *** results show that various graph applications can be efficiently accelerated in this graph processing ecosystem.
Named in-network computing service (NICS) is a potential computing paradigm emerged recently. Benefitted from the characteristics of named addressing and routing, NICS can be flexibly deployed on NDN router side and p...
详细信息
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell computers and Humans Apart)has emerged as a key strategy for distinguishing huma...
详细信息
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell computers and Humans Apart)has emerged as a key strategy for distinguishing human users from automated ***-based CAPTCHAs,designed to be easily decipherable by humans yet challenging for machines,are a common form of this ***,advancements in deep learning have facilitated the creation of models adept at recognizing these text-based CAPTCHAs with surprising *** our comprehensive investigation into CAPTCHA recognition,we have tailored the renowned UpDown image captioning model specifically for this *** approach innovatively combines an encoder to extract both global and local features,significantly boosting the model’s capability to identify complex details within CAPTCHA *** the decoding phase,we have adopted a refined attention mechanism,integrating enhanced visual attention with dual layers of Long Short-Term Memory(LSTM)networks to elevate CAPTCHA recognition *** rigorous testing across four varied datasets,including those from Weibo,BoC,Gregwar,and Captcha 0.3,demonstrates the versatility and effectiveness of our *** results not only highlight the efficiency of our approach but also offer profound insights into its applicability across different CAPTCHA types,contributing to a deeper understanding of CAPTCHA recognition technology.
The increaing significance of plant life and botanical expertise extends beyond mere visual appreciation. With the growing interest in sustainable living and alternative remedies, there is a pressing demand for easily...
详细信息
Generative adversarial networks(GANs) have drawn enormous attention due to their simple yet efective training mechanism and superior image generation quality. With the ability to generate photorealistic high-resolutio...
详细信息
Generative adversarial networks(GANs) have drawn enormous attention due to their simple yet efective training mechanism and superior image generation quality. With the ability to generate photorealistic high-resolution(e.g., 1024 × 1024) images, recent GAN models have greatly narrowed the gaps between the generated images and the real ones. Therefore, many recent studies show emerging interest to take advantage of pre-trained GAN models by exploiting the well-disentangled latent space and the learned GAN priors. In this study, we briefly review recent progress on leveraging pre-trained large-scale GAN models from three aspects, i.e.,(1) the training of large-scale generative adversarial networks,(2) exploring and understanding the pre-trained GAN models, and(3) leveraging these models for subsequent tasks like image restoration and editing.
Foundation models(FMs) [1] have revolutionized software development and become the core components of large software systems. This paradigm shift, however, demands fundamental re-imagining of software engineering theo...
Foundation models(FMs) [1] have revolutionized software development and become the core components of large software systems. This paradigm shift, however, demands fundamental re-imagining of software engineering theories and methodologies [2]. Instead of replacing existing software modules implemented by symbolic logic, incorporating FMs' capabilities to build software systems requires entirely new modules that leverage the unique capabilities of ***, while FMs excel at handling uncertainty, recognizing patterns, and processing unstructured data, we need new engineering theories that support the paradigm shift from explicitly programming and maintaining user-defined symbolic logic to creating rich, expressive requirements that FMs can accurately perceive and implement.
Anomaly detection is a task that involves identifying patterns or events that deviate significantly from the expected or normal behavior. In the context of classroom settings, it is essential to identify mischievous b...
详细信息
This paper presents a comprehensive evaluation and ranking of five Large Language Models - Mistral, Vicuna, Phi, Llama 2, and Zephyr - across five temperature variants. The focus is on their ability to predict the lik...
详细信息
In task offloading, the movement of vehicles causes the switching of connected RSUs and servers, which may lead to task offloading failure or high service delay. In this paper, we analyze the impact of vehicle movemen...
详细信息
In task offloading, the movement of vehicles causes the switching of connected RSUs and servers, which may lead to task offloading failure or high service delay. In this paper, we analyze the impact of vehicle movements on task offloading and reveal that data preparation time for task execution can be minimized via forward-looking scheduling. Then, a Bi-LSTM-based model is proposed to predict the trajectories of vehicles. The service area is divided into several equal-sized grids. If the actual position of the vehicle and the predicted position by the model belong to the same grid, the prediction is considered correct, thereby reducing the difficulty of vehicle trajectory prediction. Moreover, we propose a scheduling strategy for delay optimization based on the vehicle trajectory prediction. Considering the inevitable prediction error, we take some edge servers around the predicted area as candidate execution servers and the data required for task execution are backed up to these candidate servers, thereby reducing the impact of prediction deviations on task offloading and converting the modest increase of resource overheads into delay reduction in task offloading. Simulation results show that, compared with other classical schemes, the proposed strategy has lower average task offloading delays.
暂无评论