Due to the recent trend of software intelligence in the Fourth Industrial Revolution,deep learning has become a mainstream workload for modern computer *** the data size of deep learning increasingly grows,managing th...
详细信息
Due to the recent trend of software intelligence in the Fourth Industrial Revolution,deep learning has become a mainstream workload for modern computer *** the data size of deep learning increasingly grows,managing the limited memory capacity efficiently for deep learning workloads becomes *** this paper,we analyze memory accesses in deep learning workloads and find out some unique characteristics differentiated from traditional ***,when comparing instruction and data accesses,data access accounts for 96%–99%of total memory accesses in deep learning workloads,which is quite different from traditional ***,when comparing read and write accesses,write access dominates,accounting for 64%–80%of total memory ***,although write access makes up the majority of memory accesses,it shows a low access bias of 0.3 in the Zipf ***,in predicting re-access,recency is important in read access,but frequency provides more accurate information in write *** on these observations,we introduce a Non-Volatile Random Access Memory(NVRAM)-accelerated memory architecture for deep learning workloads,and present a new memory management policy for this *** considering the memory access characteristics of deep learning workloads,the proposed policy improves memory performance by 64.3%on average compared to the CLOCK policy.
This paper presents a parallel method for simulating real-time 3D deformable objects using the volume preservation mass-spring system method on tetrahedron *** general,the conventional mass-spring system is manipulate...
详细信息
This paper presents a parallel method for simulating real-time 3D deformable objects using the volume preservation mass-spring system method on tetrahedron *** general,the conventional mass-spring system is manipulated as a force-driven method because it is fast,simple to implement,and the parameters can be ***,the springs in traditional mass-spring system can be excessively elongated which cause severe stability and robustness issues that lead to shape restoring,simulation blow-up,and huge volume loss of the deformable *** addition,traditional method that uses a serial process of the central processing unit(CPU)to solve the system in every frame cannot handle the complex structure of deformable object in ***,the first order implicit constraint enforcement for a mass-spring model is utilized to achieve accurate visual realism of deformable objects with tough constraint *** this paper,we applied the distance constraint and volume conservation constraints for each tetrahedron element to improve the stability of deformable object simulation using the mass-spring system and behave the same as its real-world *** reduce the computational complexity while ensuring stable simulation,we applied a method that utilizes OpenGL compute shader,a part of OpenGL Shading Language(GLSL)that executes on the graphic processing unit(GPU)to solve the numerical problems *** applied the proposed methods to experimental volumetric models,and volume percentages of all objects are *** average volume percentages of all models during the simulation using the mass-spring system,distance constraint,and the volume constraint method were 68.21%,89.64%,and 98.70%,*** proposed approaches are successfully applied to improve the stability of mass-spring system and the performance comparison from our experimental tests also shows that the GPU-based method is faster than CPU-based implementation for all cases.
Recently, the increased use of artificial intelligence in healthcare has significantly changed the developments in the field of medicine. Medical centres have adopted AI applications and used it in many applications t...
详细信息
The proactive caching technique known as 'predictive caching' attempts to improve file system performance by anticipating and pre-fetching data that is likely to be requested in the future. Conventional cachin...
详细信息
Most of the research conducted in action recognition is mainly focused on general human action recognition, and most of the available datasets support studies in general human action recognition. In more specific cont...
详细信息
Image-text retrieval aims to capture the semantic correspondence between images and texts,which serves as a foundation and crucial component in multi-modal recommendations,search systems,and online *** mainstream meth...
详细信息
Image-text retrieval aims to capture the semantic correspondence between images and texts,which serves as a foundation and crucial component in multi-modal recommendations,search systems,and online *** mainstream methods primarily focus on modeling the association of image-text pairs while neglecting the advantageous impact of multi-task learning on image-text *** this end,a multi-task visual semantic embedding network(MVSEN)is proposed for image-text ***,we design two auxiliary tasks,including text-text matching and multi-label classification,for semantic constraints to improve the generalization and robustness of visual semantic embedding from a training ***,we present an intra-and inter-modality interaction scheme to learn discriminative visual and textual feature representations by facilitating information flow within and between ***,we utilize multi-layer graph convolutional networks in a cascading manner to infer the correlation of image-text *** results show that MVSEN outperforms state-of-the-art methods on two publicly available datasets,Flickr30K and MSCOCO,with rSum improvements of 8.2%and 3.0%,respectively.
Support vector machine(SVM)is a binary classifier widely used in machine ***,neglecting the latent data structure in previous SVM can limit the performance of SVM and its *** address this issue,the authors propose a n...
详细信息
Support vector machine(SVM)is a binary classifier widely used in machine ***,neglecting the latent data structure in previous SVM can limit the performance of SVM and its *** address this issue,the authors propose a novel SVM with discriminative low-rank embedding(LRSVM)that finds a discriminative latent low-rank subspace more suitable for SVM *** extension models of LRSVM are introduced by imposing different orthogonality constraints to prevent computational inaccuracies.A detailed derivation of the authors’iterative algorithms are given that is essentially for solving the SVM on the low-rank ***,some theorems and properties of the proposed models are presented by the *** is worth mentioning that the subproblems of the proposed algorithms are equivalent to the standard or the weighted linear discriminant analysis(LDA)*** indicates that the projection subspaces obtained by the authors’algorithms are more suitable for SVM classification compared to those from the LDA *** convergence analysis for the authors proposed algorithms are also ***,the authors conduct experiments on various machine learning data sets to evaluate the *** experiment results show that the authors’algorithms perform significantly better than other algorithms,which indicates their superior abilities on classification tasks.
Intracranial hemorrhage (ICH) is a life-threatening condition that requires rapid and accurate diagnosis to improve treatment outcomes and patient survival rates. Recent advancements in supervised deep learning have g...
详细信息
software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilit...
详细信息
software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining ***,these tools suffer from some *** terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search ***,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information *** this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation *** leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion *** combination allows for the unified handling of binary programs across various architectures,compilers,and compilation ***,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)***,the graph embedding network is utilized to evaluate the similarity of program *** on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target *** solved content serves as the initial seed for targeted *** binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity *** approach facilitates
The influence maximization (IM) problem aims to identify a budgeted set of nodes with the highest potential to influence the largest number of users in a cascade model, a key challenge in viral marketing. Traditional ...
暂无评论