Modern recommendation systems are widely used in modern data *** random and sparse embedding lookup operations are the main performance bottleneck for processing recommendation systems on traditional platforms as they...
详细信息
Modern recommendation systems are widely used in modern data *** random and sparse embedding lookup operations are the main performance bottleneck for processing recommendation systems on traditional platforms as they induce abundant data movements between computing units and ***-based processing-in-memory(PIM)can resolve this problem by processing embedding vectors where they are ***,the embedding table can easily exceed the capacity limit of a monolithic ReRAM-based PIM chip,which induces off-chip accesses that may offset the PIM ***,we deploy the decomposed model on-chip and leverage the high computing efficiency of ReRAM to compensate for the decompression performance *** this paper,we propose ARCHER,a ReRAM-based PIM architecture that implements fully yon-chip recommendations under resource ***,we make a full analysis of the computation pattern and access pattern on the decomposed *** on the computation pattern,we unify the operations of each layer of the decomposed model in multiply-and-accumulate *** on the access observation,we propose a hierarchical mapping schema and a specialized hardware design to maximize resource *** the unified computation and mapping strategy,we can coordinatethe inter-processing elements *** evaluation shows that ARCHER outperforms the state-of-the-art GPU-based DLRM system,the state-of-the-art near-memory processing recommendation system RecNMP,and the ReRAM-based recommendation accelerator REREC by 15.79×,2.21×,and 1.21× in terms of performance and 56.06×,6.45×,and 1.71× in terms of energy savings,respectively.
Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion *** address such threats towards cloud services,numerous t...
详细信息
Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion *** address such threats towards cloud services,numerous techniques exist that mitigate the service threats according to different *** rule-based approaches are unsuitable for new threats,whereas trust-based systems estimate trust value based on behavior,flow,and other ***,the methods suffer from mitigating intrusion attacks at a higher *** article presents a novel Multi Fractal Trust Evaluation Model(MFTEM)to overcome these *** method involves analyzing service growth,network growth,and quality of service *** process estimates the user’s trust in various ways and the support of the user in achieving higher service performance by calculating Trusted Service Support(TSS).Also,the user’s trust in supporting network stream by computing Trusted Network Support(TNS).Similarly,the user’s trust in achieving higher throughput is analyzed by computing Trusted QoS Support(TQS).Using all these measures,the method adds the Trust User Score(TUS)value to decide on the clearance of user *** proposed MFTEM model improves intrusion detection accuracy with higher performance.
Consumer electronic devices used to support data communication are integral components of vehicular networks. However, due to factors such as the limited reliability and failure of electronic devices, vehicle communic...
详细信息
Consumer electronic devices used to support data communication are integral components of vehicular networks. However, due to factors such as the limited reliability and failure of electronic devices, vehicle communication data may fail to be uploaded and downloaded in a timely manner, potentially leading to serious traffic accidents. With the emergence of edge computing technology, computing tasks are distributed from traditional centralized cloud computing to the network edge, thereby enabling faster response to the processing demands of vehicle data. However, even though edge computing offers faster data processing capabilities, the issue of effective routing of data within vehicular edge computing (VEC) networks remains to be addressed. Therefore, this paper proposes a two-phase multi-path routing scheme for VEC networks. In the route decision phase, the scheme introduces an integrated adaptive function, that plans the route reasonably by considering the transmission latency, energy balance and communication quality. On this basis, different routing requirements (e.g., maximizing network lifetime or transmission reliability) can be achieved by setting the weights of the proposed function. In the route maintenance phase, the scheme implements real-time multi-path adjustment based on the route maintenance mechanism to support data routing. The simulation results show that the proposed scheme has significant advantages over three baseline schemes in terms of routing reliability and energy balance. In addition, we explore the impacts of the weights and initial network configuration on the routing performance. The obtained results can provide guidance for planning reliable and sustainable routes. IEEE
The security challenges posed by Infrastructure as code (IaC) are outgrowing established security procedures in an era of rapidly adopting cloud computing and DevOps methodologies. Using security principles to be inte...
详细信息
Similar to the role of Markov decision processes in reinforcement learning,Markov games(also called stochastic games) lay down the foundation for the study of multi-agent reinforcement learning and se quential agent *...
详细信息
Similar to the role of Markov decision processes in reinforcement learning,Markov games(also called stochastic games) lay down the foundation for the study of multi-agent reinforcement learning and se quential agent *** introduce approximate Markov perfect equilibrium as a solution to the computational problem of finite-state sto chastic games repeated in the infinite horizon and prove its *** solution concept preserves the Markov perfect property and opens up the possibility for the success of multi-agent reinforcement learning algorithms on static two-player games to be extended to multi-agent dynamic games,expanding the reign of the PPAD-complete class.
In recent years, the role of computational methods such as machine learning and deep learning has evolved to help better understand an individual’s response to drugs. Through advancements in the discipline of precisi...
详细信息
Maintaining public safety and reducing the effects of unplanned incidents need real-time accident prevention. This research work presents a comprehensive plan for developing an advanced computer vision-based accident-...
详细信息
As cities expand, vehicles and congestion become more complex. Efficient vehicle-to-vehicle contact networks are needed for road safety and efficient traffic flow. Thus, Vehicular Ad Hoc Networks are needed to overcom...
详细信息
Improvements in artificial intelligence and machine learning have led to the growing integration of face recognition technology for a wide range of applications, from security systems to social media. Three related us...
详细信息
In recent years, the agricultural sector has faced challenges in achieving optimal crop yields due to complex environmental factors and limited access to data-driven decision-making tools. An innovative IoT-based appr...
详细信息
暂无评论