In this paper we present the implementation of a framework for accelerating training and classification of arbitrary Convolutional Neural Networks (CNNs) on the GPU. CNNs are a derivative of standard Multilayer Percep...
详细信息
In this paper we present the implementation of a framework for accelerating training and classification of arbitrary Convolutional Neural Networks (CNNs) on the GPU. CNNs are a derivative of standard Multilayer Perceptron (MLP) neural networks optimized for two-dimensional pattern recognition problems such as Optical Character Recognition (OCR) or face detection. We describe the basic parts of a CNN and demonstrate the performance and scalability improvement that can be achieved by shifting the computation-intensive tasks of a CNN to the GPU. Depending on the network topology training and classification on the GPU performs 2 to 24 times faster than on the CPU. Furthermore, the GPU version scales much better than the CPU implementation with respect to the network size.
Recent decades have witnessed an explosive growth in the amounts of digital data in various fields of arts, science and engineering. Such data is generally of interest to a large number of people spread over wide geog...
详细信息
In this paper, we show how to use the novel extended strand space method to verify Kerberos V. First, we formally model novel semantical features in Kerberos V such as timestamps and protocol mixture in this new frame...
详细信息
In this paper, we show how to use the novel extended strand space method to verify Kerberos V. First, we formally model novel semantical features in Kerberos V such as timestamps and protocol mixture in this new framework. Second, we apply unsolicited authentication test to prove its secrecy and authentication goals of Kerberos V. Our formalization and proof in this case study have been mechanized using Isabelle/HOL.
Vehicular Ad-hoc Networks are a very interesting self-organizing communication system that can make the traffic on our roads much safer. A lot of aspects of the behavior of these systems are studied using network simu...
详细信息
Vehicular Ad-hoc Networks are a very interesting self-organizing communication system that can make the traffic on our roads much safer. A lot of aspects of the behavior of these systems are studied using network simulation frameworks. While the upper communication layers of Vehicular Ad-hoc Networks are mainly simulated according to their specifications, in this paper we will highlight weak points in these simulations. They occur due the fact that the layers below the link layer are considered very rarely and are also almost neglected by the commonly used network simulation frameworks. This can potentially lead to inaccurate simulation results which can be fatal when studying safety relevant applications or application with real-time constraints. In this work in progress paper we are going to propose an approach to get this under control.
In this paper, we present two extensions of the strand space method to model Kerberos V. First, we include time and timestamps to model security protocols with timestamps: we relate a key to a crack time and combine i...
详细信息
In this paper, we present two extensions of the strand space method to model Kerberos V. First, we include time and timestamps to model security protocols with timestamps: we relate a key to a crack time and combine it with timestamps in order to define a notion of recency. Therefore, we can check replay attacks in this new framework. Second, we extend the classic strand space theory to model protocol mixture. The main idea is to introduce a new relation to model the causal relation between one primary protocol session and one of its following secondary protocol session. Accordingly, we also extend the definition of unsolicited authentication test.
Network design is performed for a traffic load in the future. This traffic load is far greater than traffic loads observed at intermediate stages. In this paper, we propose to plan a multi-layer network for such a fut...
详细信息
Network design is performed for a traffic load in the future. This traffic load is far greater than traffic loads observed at intermediate stages. In this paper, we propose to plan a multi-layer network for such a future traffic load, but instead of provisioning the full network equipment at once, we suggest to defer the deployment of expensive IP interfaces and other enabling equipment only to stages when they are really needed to carry traffic. We develop an algorithm that concentrates IP traffic at an intermediate stage on a subset of those IP interfaces that are required to carry the full load in the future. This reduces the set of used IP interfaces which need to be installed at intermediate stages, and CAPEX investments for the other equipment can be deferred to the future.
We investigate an abstraction method, called meanfield method, for the performance evaluation of dynamic networks with pairwise communication between nodes. It allows us to evaluate systems with very large numbers of ...
详细信息
This paper presents an oceanographic toolchain that can be used to generate multi-vehicle robotic surveys for large-scale dynamic features in the coastal ocean. Our science application targets Harmful Algal Blooms (HA...
详细信息
Interdisciplinary product development is faced with the collaboration of diverse roles and a multitude of interrelated artifacts. Traditional and sequential process models cannot deal with the long-lasting and dynamic...
详细信息
ISBN:
(纸本)9789898425065
Interdisciplinary product development is faced with the collaboration of diverse roles and a multitude of interrelated artifacts. Traditional and sequential process models cannot deal with the long-lasting and dynamic behavior of the development processes of today. Moreover, development processes have to be tailored to the needs of the projects, which are usually distributed today. Thus, keeping these projects on track from a methodology point of view is difficult. In order to deal with these challenges, this paper will present a novel method engineering and enactment approach. It combines the ideas of workflow technologies and product line engineering for method engineering as well as agent technology for the development process enactment.
Through automated agricultural inspection, farmers can potentially achieve better productivity and accurately predict yields and crop quality. A variety of sensors can be used for agricultural inspection, but the chea...
详细信息
ISBN:
(纸本)9781424478149
Through automated agricultural inspection, farmers can potentially achieve better productivity and accurately predict yields and crop quality. A variety of sensors can be used for agricultural inspection, but the cheapest and most information-rich is the video camera. We collect data in the field from a monocular camera fixed to a mobile inspection platform. For purposes of pineapple crop mapping and yield prediction, we propose an image processing framework for in-field fruit detection, tracking, and 3D reconstruction. We perform a series of experiments on feature point extraction using Harris, SIFT, and SURF features, feature point description using SIFT and SURF descriptors, feature point classification using SVMs, fruit region tracking using blob tracking, and 3D reconstruction using structure from motion and robust ellipsoid estimation techniques. We find that SURF feature points and descriptors provide the best tradeoff between processing time and classification accuracy and that the method is sufficiently accurate for fruit region detection. Our preliminary results for fruit region tracking and 3D fruit reconstruction are promising. We plan further work towards development of a useful aid to help farmers manage their farms.
暂无评论