Dangling pointer error is pervasive in C/C++ programs and it is very hard to detect. This paper introduces an efficient detector to detect dangling pointer error in C/C++ programs. By selectively leave some memory acc...
详细信息
Urban land use and land cover (LULC) classification is one of the core applications in Geographic Information System (GIS). In this paper, a novel classification approach based on Deep Belief Network (DBN) for detaile...
详细信息
ISBN:
(纸本)9781479953141
Urban land use and land cover (LULC) classification is one of the core applications in Geographic Information System (GIS). In this paper, a novel classification approach based on Deep Belief Network (DBN) for detailed urban mapping is proposed. Deep Belief Network (DBN) is a widely investigated and deployed deep learning model. By applying the DBN model, effective spatio-temporal mapping features can be automatically extracted to improve the classification performance. Six-date RADARSAT-2 Polarimetric SAR (PolSAR) data over the Great Toronto Area were used for evaluation. Experimental results showed that the proposed method can outperform SVM and contextual approaches using adaptive MRF.
The goal of knowledge graph completion (KGC) is to predict missing facts among entities. Previous methods for KGC re-ranking are mostly built on non-generative language models to obtain the probability of each candida...
详细信息
Message Passing Interface (MPI) is a de facto standard for writing high-performance message-passing applications on distributed memory systems. To design effective applications and predict the performance of future sy...
详细信息
Message Passing Interface (MPI) is a de facto standard for writing high-performance message-passing applications on distributed memory systems. To design effective applications and predict the performance of future systems, an accurate communication model is needed. In this paper, we discuss the characteristics of current systems and MPI implementations, then propose a more complete communication model, named LoGPX, which synthetically captures the influences of MPI communication protocol, the invoking time of communication primitive, hardware resource and network contention. Based on the model, we obtain the condition that the message transmission cost reaches the infimum, and we show that if ignoring some factors of LoGPX model, it can be degenerated to several popular models such as LogP, LogGP, LoGPC and LogGPO.
Traditional security protocols can not be trusted in some application scenarios of high security level because the endpoints integrity is ignored. In this paper, we propose a novel trusted remote attestation model whi...
详细信息
ISBN:
(纸本)9781479914449
Traditional security protocols can not be trusted in some application scenarios of high security level because the endpoints integrity is ignored. In this paper, we propose a novel trusted remote attestation model which combines the secure channel and the integrity measurement architecture of trusted computing. We design and implement a prototype system based on a mature security protocol, Transport Layer Security (TLS) protocol, integrated with integrity report provided by trusted platform module (TPM). The TLS protocol guarantees the security of data exchange process and the integrity report of TPM provides the evidence about the trustworthiness and the security state of the communication endpoints. Compared by traditional approaches, our method is more efficient and can be deployed in large scale systems easily.
The performance gap for high performance applications has been widening over time. High level program transformations are critical to improve applications' performance, many of which concern the determination of o...
详细信息
It is necessary to assess the reliability of distributed safety-critical systems to a high degree of confidence before they are deployed in the field. However, distributed safety-critical software systems often includ...
ISBN:
(纸本)9783540241287
It is necessary to assess the reliability of distributed safety-critical systems to a high degree of confidence before they are deployed in the field. However, distributed safety-critical software systems often include some rarely executed critical functions that are often inadequately tested in statistical testing based reliability estimation. This paper presents a method that can accelerate statistical testing of distributed safety-critical software. The method starts with the derivation of scenario usage diagram model (SUD) from UML diagrams annotated with usage related attributes and reliability attributes. Then the statistical testing accelerating method based on importance sampling is presented. When both the critical scenarios and the entire software are adequately tested, the method can still compute the unbiased software reliability from the test results with much less test cases. Thus, the statistical testing cost of distributed safety-critical software can be reduced effectively.
Convolution neural network models are widely used in image classification tasks. However, the running time of such models is so long that it is not the conforming to the strict real-time requirement of mobile devices....
详细信息
Convolution neural network models are widely used in image classification tasks. However, the running time of such models is so long that it is not the conforming to the strict real-time requirement of mobile devices. In order to optimize models and meet the requirement mentioned above, we propose a method that replaces the fully-connected layers of convolution neural network models with a tree classifier. Specifically, we construct a Visual Confusion Label Tree based on the output of the convolution neural network models, and use a multi-kernel SVM plus classifier with hierarchical constraints to train the tree classifier. Focusing on those confusion subsets instead of the entire set of categories makes the tree classifier more discriminative and the replacement of the fully-connected layers reduces the original running time. Experiments show that our tree classifier obtains a significant improvement over the state-of-the-art tree classifier by 4.3% and 2.4% in terms of top-1 accuracy on CIFAR-100 and ImageNet datasets respectively. Additionally, our method achieves 124× and 115× speedup ratio compared with fully-connected layers on AlexNet and VGG16 without accuracy decline.
The Streamline Texture Synthesis (STS) method uses a different 1D texture to texture map each streamline and streamline textures are synthesized. The Enhanced STS (ESTS) adjusts the width of a streamline based on the ...
详细信息
ISBN:
(纸本)0769505892
The Streamline Texture Synthesis (STS) method uses a different 1D texture to texture map each streamline and streamline textures are synthesized. The Enhanced STS (ESTS) adjusts the width of a streamline based on the critical point and maps several 1D textures to a streamline in order to accelerate computing. ESTS can also simulate animations and visualize 2D unsteady or 3D surface flows. The analyzed result proves that ESTS produces substantially better visual results and ESTS is fast enough to visualize vector field interactively.
In open source community, there are a large number of software resources existing. Such software resources distribute in different societies or storehouses, which require different software characteristic. This phenom...
详细信息
ISBN:
(数字)9781728109459
ISBN:
(纸本)9781728109466
In open source community, there are a large number of software resources existing. Such software resources distribute in different societies or storehouses, which require different software characteristic. This phenomenon results in difficult to evaluate software quality using traditional methods. In this case, a novel open-source software sorting algorithm may be an effective solution. Considering both subjective and objective levels, we propose a new method on software sorting and retrieving. In the subjective level, metrics are selected from the corresponding collaborative development community based on software topic. In the objective level, metrics are obtained from the group emotional evaluation value of the knowledge sharing community. We have proved the effectiveness of the method through comparison experiments. Combining with the Solrcloud tool, this method has been integrated into the OSSEAN platform.
暂无评论