Sparse LU decomposition is the core computation in the direct method that solves sparse systems of linear equations. Only little work has been conducted on parallelizing it on FPGAs. In this paper, we study paralleliz...
详细信息
ISBN:
(纸本)9781467328463;9781467328449
Sparse LU decomposition is the core computation in the direct method that solves sparse systems of linear equations. Only little work has been conducted on parallelizing it on FPGAs. In this paper, we study parallelization strategies for sparse LU decomposition on FPGAs. We first analyze how to parallelize the right-looking algorithm and find that this algorithm is not suitable for FPGAs. Then the left-looking algorithm is analyzed and considered as better candidate than the right-looking version. Our design derived from the left-looking algorithm is based on a simple yet efficient parallel computational model for FPGAs. Our design mainly consists of multiple parallel processing elements (PEs). A total of 14 PEs can be integrated into a Xilinx Virtex-5 XC5VLX330. Unlike related work, where their designs are applied to sparse matrices from particular application domains, our hardware design can be applied to any symmetric positive definite or diagonally dominant matrices.
Visual Cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. A binary image can be divided into shares that are able to...
详细信息
Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical informa tion extraction model of virtual machine and propose a perception mechanism in virtualization syst...
详细信息
Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical informa tion extraction model of virtual machine and propose a perception mechanism in virtualization system based on storage covert chan nel to overcome the affection of the semantic *** advan tage of undetectability of the covert channel, a secure channel is established between Guest and virtual machine monitor to pass data *** Guest machine can pass the control information of malicious process to virtual machine monitor by using the VMCALL instruction and shared *** parsing critical information in process control structure, virtual machine monitor can terminate the malicious *** test results show that the proposed mechanism can clear the user-level malicious pro grams in the virtual machine effectively and ***,its performance overhead is about the same as that of other main stream monitoring mode.
This paper presents a study of and triboson production using events from proton-proton collisions at a centre-of-mass energy of recorded with the ATLAS detector at the LHC and corresponding to an integrated luminos...
This paper presents a study of and triboson production using events from proton-proton collisions at a centre-of-mass energy of recorded with the ATLAS detector at the LHC and corresponding to an integrated luminosity of 20.2 fb . The production cross-section is determined using a final state containing an electron, a muon, a photon, and neutrinos ( ). Upper limits on the production cross-section of the final state and the and final states containing an electron or a muon, two jets, a photon, and a neutrino ( or ) are also derived. The results are compared to the cross-sections predicted by the Standard Model at next-to-leading order in the strong-coupling constant. In addition, upper limits on the production cross-sections are derived in a fiducial region optimised for a search for new physics beyond the Standard Model. The results are interpreted in the context of anomalous quartic gauge couplings using an effective field theory. Confidence intervals at 95% confidence level are derived for the 14 coupling coefficients to which and production are sensitive.
The β decay of Cd129, produced in the relativistic fission of a U238 beam, was experimentally studied at the RIBF facility at the RIKEN Nishina Center. From the γ radiation emitted after the β decays, a level schem...
详细信息
The β decay of Cd129, produced in the relativistic fission of a U238 beam, was experimentally studied at the RIBF facility at the RIKEN Nishina Center. From the γ radiation emitted after the β decays, a level scheme of In129 was established comprising 31 excited states and 69 γ-ray transitions. The experimentally determined level energies are compared to state-of-the-art shell-model calculations. The half-lives of the two β-decaying states in Cd129 were deduced and the β feeding to excited states in In129 were analyzed. It is found that, as in most cases in the Z<50, N≤82 region, both decays are dominated by the ν0g7/2→π0g9/2 Gamow–Teller transition, although the contribution of first-forbidden transitions cannot be neglected.
Half-wave-hole problem, mainly caused by refractive index inhomogeneity of hafnia, had greatly influenced the spectra and application of HfO2/SiO2 dichroic laser mirrors. Two approaches to eliminate the half-wave-hole...
详细信息
Approach to solving all types of design problems in spectral regions from X-ray to EUV is presented. It employs the most efficient general design tools and special technique aimed at taking into account interface roug...
详细信息
We show that design techniques elaborated for conventional optical coating allow one to design EUV coatings with superior properties. High potential of designs composed of more than two materials is demonstrated. ...
详细信息
In this paper, we propose a model-based reconstruction method for recovering a 2D parametric styling model with hierarchical structure from an image. Our method extracts characteristic features for industrial design w...
详细信息
With the explosive growth of information, more and more organizations are deploying private cloud systems or renting public cloud systems to process big data. However, there is no existing benchmark suite for evaluati...
详细信息
With the explosive growth of information, more and more organizations are deploying private cloud systems or renting public cloud systems to process big data. However, there is no existing benchmark suite for evaluating cloud performance on the whole system level. To the best of our knowledge, this paper proposes the first benchmark suite CloudRank-D to benchmark and rank cloud computing sys- tems that are shared for running big data applications. We an- alyze the limitations of previous metrics, e.g., floating point operations, for evaluating a cloud computing system, and propose two simple metrics: data processed per second and data processed per Joule as two complementary metrics for evaluating cloud computing systems. We detail the design of CloudRank-D that considers representative applications, di- versity of data characteristics, and dynamic behaviors of both applications and system software platforms. Through experi- ments, we demonstrate the advantages of our proposed met- tics. In several case studies, we evaluate two small-scale de- ployments of cloud computing systems using CloudRank-D.
暂无评论