In order to identify and schedule jobs that are suitable for determined resources, an execution time estimation model is required. In this paper, it is described a Chronological history-based execution time estimation...
详细信息
The computing power provided by high performance low-cost PC-based Cluster and Grid platforms are attractive, and they are equal or superior to supercomputers and mainframes widely available. In this research paper, w...
详细信息
In content-based video analysis, shot boundary detection (SBD) is a common first step to segment a video into fundamental units of shots, each composing consecutive frames filmed with a single camera act. Many methods...
详细信息
Summary form is only given. Breakthrough-quality scientific discoveries in the new millennium (such as those expected in computation biology and others), along with optimal engineering designs, have created a demand f...
详细信息
Summary form is only given. Breakthrough-quality scientific discoveries in the new millennium (such as those expected in computation biology and others), along with optimal engineering designs, have created a demand for High-End Computing (HEC) systems with sustained performance requirements at a petaflop scale and beyond. Despite the very pessimistic (if not negative) views on parallel computing systems that have prevailed in 1990s, there seems to be no other viable alternatives for such HEC systems. In this talk, we present a fresh look at the problems facing the design of petascale parallel computing systems. We review several fundamental issues that such HEC parallel computing systems must resolve. These issues include: execution models that support dynamic and adaptive multithreading, fine-grain synchronization, and global name-space and memory consistency. Related issues in parallel programming, dynamic compilation models, and system software design will also be discussed. Present solutions and future direction will be discussed based on (1) application demand (e.g. computation biology and others), (2) the recent trend as demonstrated by the HTMT, HPCS, and the Blue-Gene Cyclops (e.g. Cyclops-64) architectures, and (3) a historical perspective on influential models such as dataflow, along with concepts learned from these models.
Various feature selection techniques were studied. The trend toward richer data types is pushing feature selection in both scale and complexity. Natural language text features and image features are becoming commonpla...
详细信息
Various feature selection techniques were studied. The trend toward richer data types is pushing feature selection in both scale and complexity. Natural language text features and image features are becoming commonplace. Several trends will increase the demand for feature selection. Time plays an additional role in some nonstationary domains where the best features have a seasonal dependency.
This paper presents a new application of independent component analysis (ICA) in magnetic resonance (MR) image analysis. One of most successful applications for ICA-based approaches in MR imaging is functional MRI (fM...
详细信息
Considering the typically large data size and real time constraints of most multimedia contents, specially video, current encryption algorithms developed to secure text data are not applicable. Several video encryptio...
详细信息
Considering the typically large data size and real time constraints of most multimedia contents, specially video, current encryption algorithms developed to secure text data are not applicable. Several video encryption methods have been proposed in the literature, but most methods are either too complicated for a real time hardware implementation, or are not secure enough. In this paper a new video cipher/decipher scheme for MPEG video streams has been proposed. The proposed architecture has been implemented in VHDL and tested with MPEG-4 streams. Simulation results indicate that the hardware implementation complexity of the proposed stream cipher is just %2 and %13 of the AES and TDES methods respectively. The computational complexity required to break the cipher is in the order of 2 63
This paper presents new fast algorithms to improve the widely used endmember extraction algorithm, called pixel purity index (PPI) and also modify a revised version of PPI, called block of skewers (BOS) method. Since ...
详细信息
In this paper, an FIR cascade structure for adaptive linear prediction is studied in which each stage FIR filter is independently adapted using LMS algorithm. The theoretical analysis shows that the cascade performs a...
详细信息
Motivated by the success of free-parts based representations in face recognition, we have attempted to address some of the problems associated with applying such a philosophy to the task of speaker-independent visual ...
详细信息
暂无评论