The network content security system of Internet information requires a controlling force over information flows which allows the access to some information and prohibits some other information. The complexity of Inter...
详细信息
The network content security system of Internet information requires a controlling force over information flows which allows the access to some information and prohibits some other information. The complexity of Internet information flows makes it difficult to control precisely over the Internet. Consequently, corresponding evaluation shall be conducted over all kinds of controlling methods. In the paper, precision rate and error rate metrics are proposed to evaluate the network content security system. Consequently we use the evaluation methods in intrusion detection and information retrieval for reference to evaluate the network content security system. We take a deep analysis for the evaluation methods from two aspects which are "monotony" of evaluation methods and the sensibility of evaluation methods and point out which of these methods are applicable to network content security controlling system. At last, we state briefly the application range of CID, ECC, NAMI and other metrics.
In current social computing system, not only hardware but also software experiences a directly discarded mode. Such directly discarded mode may result in huge waste. The major challenge in green computing is the recyc...
详细信息
In current social computing system, not only hardware but also software experiences a directly discarded mode. Such directly discarded mode may result in huge waste. The major challenge in green computing is the recyclability of the computing system. In order to address this challenge in the software field, this paper proposes a design idea of green software embodying the adaptability and recyclability. The adaptable and recyclable strategy may consist of two phases. The first one is compressing the increasingly deeper software stack, another one is keeping the functionality recycling and code reuse. The adaptability and recyclability mean automatically decomposing the complex software into several parts which are ease to be reused and automatically selecting the feasible parts for the on-writing software. And we also explore the system software design path to adaptability and recyclability in our previous work as well as in the future.
The advent of multi-core/many-core chip technology offers both an extraordinary opportunity and a profound challenge. In particular, computer architects and system software designers are faced with a unique opportunit...
详细信息
The advent of multi-core/many-core chip technology offers both an extraordinary opportunity and a profound challenge. In particular, computer architects and system software designers are faced with a unique opportunity to introducing new architecture features as well as adequate compiler technology -- together they may have profound impact. This paper presents a case study (using the 1-D Jacobi computation) of compiler-amendable performance optimization techniques on a many-core architecture Godson-T. Godson-T architecture has several unique features that are chosen for this study: 1) chip-level global addressable memory in particular the scratchpad memories (SPM) local to the processing cores; 2) fine-grain memory based synchronization (e.g., full-empty bit for fine-grain synchronization). Leveraging state-of-the-art performance optimization methods for 1-D stencil parallelization (e.g., timed tiling and variants), we developed and implement a number of many-core-based optimization for Godson-T. Our experimental study shows good performance in both execution time speedup and scalability, validate the value of globally accessed SPM and fine-grain synchronization mechanism (full-empty bits) under the Godson-T, and provides some useful guidelines for future compiler technology of many-core chip architectures.
The ground states of some many-body quantum systems can serve as resource states for the one-way quantum computing model, achieving the full power of quantum computation. Such resource states are found, for example, i...
详细信息
The ground states of some many-body quantum systems can serve as resource states for the one-way quantum computing model, achieving the full power of quantum computation. Such resource states are found, for example, in spin-52 and spin-32 systems. It is, of course, desirable to have a natural resource state in a spin-12, that is, qubit system. Here, we give a negative answer to this question for frustration-free systems with two-body interactions. In fact, it is shown to be impossible for any genuinely entangled qubit state to be a nondegenerate ground state of any two-body frustration-free Hamiltonian. What is more, we also prove that every spin-12 frustration-free Hamiltonian with two-body interaction always has a ground state that is a product of single- or two-qubit states. In other words, there cannot be any interesting entanglement features in the ground state of such a qubit Hamiltonian.
The Godson-3A microprocessor is a quad-core version of the scalable Godson-3 multi-core series. It is physically implemented based on the 65 nm CMOS process. This 174 mm2 chip consists of 425 million transistors. The ...
详细信息
The Godson-3A microprocessor is a quad-core version of the scalable Godson-3 multi-core series. It is physically implemented based on the 65 nm CMOS process. This 174 mm2 chip consists of 425 million transistors. The maximum frequency is 1GHz with a maximum power consumption of 15 W. The main challenges of Godson-3A physical implementation include very large scale, high frequency requirement, sub-micron technology effects and aggressive time schedule. This paper describes the design methodology of the physical implementation of Godson-3A, with particular emphasis on design methods for high frequency, clock tree design, power management, and on-chip variation (OCV) issue.
Regularized Low-rank approximation with missing data is an effective approach for Collaborative Filtering since it generates high quality rating predictions for recommender systems. Alternative LS (ALS) method is one ...
详细信息
Regularized Low-rank approximation with missing data is an effective approach for Collaborative Filtering since it generates high quality rating predictions for recommender systems. Alternative LS (ALS) method is one of the commonly used algorithms for the CF problem. However, ALS did not work very well in some applications, due to the over-fitting to observations. This paper proposes a novel estimate-piloted regularization that uses a pre-estimate of the unobserved entries and uses the approximation errors to the pre-estimates as a regularize term. This new regularization can reduce the risk of over-fitting and improve the approximation accuracy of ALS. We also proposed a fast implementation of the modified ALS method, which is also very suitable for parallel computing. The proposed algorithm PALS has higher accuracy than ALS for original model in three real-world data sets.
The limitation of the existing methods of traffic data collection is that they rely on techniques that are strictly local in nature. The airborne system in unmanned aircrafts provides the advantages of wider view angl...
详细信息
The limitation of the existing methods of traffic data collection is that they rely on techniques that are strictly local in nature. The airborne system in unmanned aircrafts provides the advantages of wider view angle and higher mobility. However, detecting vehicles in airborne videos is a challenging task because of the scene complexity and platform movement. Most of the techniques used in stationary platforms cannot perform well in this situation. A new and efficient method based on Bayes model is proposed in this paper. This method can be divided into two stages, attention focus extraction and vehicle classification. Experimental results demonstrated that, compared with other representative algorithms, our method obtained better performance with higher detection rate, lower false positive rate and faster detection speed.
Airborne vehicle detection and tracking systems equipped on unmanned aerial vehicles (UAVs) are difficult to develop because of factors like UAV motion, scene complexity and so on. In this paper, we propose a new fram...
详细信息
Airborne vehicle detection and tracking systems equipped on unmanned aerial vehicles (UAVs) are difficult to develop because of factors like UAV motion, scene complexity and so on. In this paper, we propose a new framework of multi-motion layer analysis to detect and track moving vehicles in airborne platform. Moving vehicles are firstly detected by registration and temporal differencing to establish motion layers. After motion layers are constructed, they are maintained over time for tracking vehicles. All vehicles are tracked by maintaining their corresponding motion layers. Our experimental results showed that compared with other previous algorithms, our method can achieve better results in terms of detection and tracking performance.
We address the optimal sink scheduling problem in wireless sensor networks (WSNs). The problem is inherently difficult since sink scheduling and data routing are tightly coupled. Previous approaches either have questi...
详细信息
We address the optimal sink scheduling problem in wireless sensor networks (WSNs). The problem is inherently difficult since sink scheduling and data routing are tightly coupled. Previous approaches either have questionable performance due to no joint considerations, or are based on relaxed constraints. Our aim is to fill in this blank in the research. First, by discretizing continuous time, we develop a novel bound technique to connect time-varying routes with the placement of sinks. This bounding technique transforms time-related constraints into pattern-based ones and allows us to mathematically formulate this optimization in a pattern-based way. The complexity of directly solving this optimization is intractable; therefore, on the basis of column generation (CG), a computationally efficient algorithm is developed to reduce the complexity by decomposing the problem into sub-problems and iteratively solving them to approach optimality. Simulations demonstrate the efficiency of the algorithm and substantiate the importance of sink mobility in energy-constrained sensor networks.
The authors studied the scientific application LU decomposition deeply. A speedup model for LU decomposition was proposed, and an algorithm for LU decomposition based on bit reverse xor (BRX) was implemented. Then a d...
详细信息
The authors studied the scientific application LU decomposition deeply. A speedup model for LU decomposition was proposed, and an algorithm for LU decomposition based on bit reverse xor (BRX) was implemented. Then a dynamic absolute balance policy (DABP) algorithm was presented. In order to estimate the algorithms of 2 dimensional (2D) scatter, BRX and DABP, two different estimation functions were given and they were used to estimate the load balance problem of the algorithms. These two functions verify that the DABP algorithm has the best load balance. The simulations of the three algorithms were performed on the many-core architecture Godson-T. The experiments prove that the speedup of the DABP algorithm is 46 and it is the best performance of the three algorithms.
暂无评论