{"title":"Supporting sensor orchestration in non-stationary environments","authors":"Christoph-Alexander Holst, V. Lohweg","doi":"10.1145/3203217.3203228","DOIUrl":"https://doi.org/10.1145/3203217.3203228","url":null,"abstract":"The aim of sensor orchestration is to design and organise multi-sensor systems both to reduce manual design efforts and to facilitate complex sensor systems. A sensor orchestration is required to adapt to non-stationary environments, even if it is applied in streaming data scenarios where labelled data are scarce or not available. Without labels in dynamic environments, it is challenging to determine not only the accuracy of a classifier but also its reliability. This contribution proposes monitoring algorithms intended to support sensor orchestration in classification tasks in non-stationary environments. Proposed measures regard the relevance of features, the separability of classes, and the classifier's reliability. The proposed monitoring algorithms are evaluated regarding their applicability in the scope of a publicly available and synthetically created collection of datasets. It is shown that the approach (i) is able to distinguish relevant from irrelevant features, (ii) measures class separability as class representations drift through feature space, and (iii) marks a classifier as unreliable if errors in the drift-adaptation occur.","PeriodicalId":127096,"journal":{"name":"Proceedings of the 15th ACM International Conference on Computing Frontiers","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114175483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. L. Sartor, A. Lorenzon, S. Kundu, I. Koren, A. C. S. Beck
{"title":"Adaptive and polymorphic VLIW processor to optimize fault tolerance, energy consumption, and performance","authors":"A. L. Sartor, A. Lorenzon, S. Kundu, I. Koren, A. C. S. Beck","doi":"10.1145/3203217.3203238","DOIUrl":"https://doi.org/10.1145/3203217.3203238","url":null,"abstract":"Because most traditional homogeneous and heterogeneous processors have a fixed design that limits its runtime adaptability, they are not able to cope with the varying application behavior when one considers the axes of fault tolerance, performance, and energy consumption altogether. In this context, we propose a new dynamically adaptive processor design that is capable of delivering the best trade-off among these three axes according to the application at hand, or be tuned to optimize a specific metric. This is achieved by extending a polymorphic processor that can change its issue-width during runtime with specific mechanisms for fault tolerance, energy optimization, and performance enhancement. They are controlled by an optimization algorithm that evaluates and chooses which is the best configuration according to given requirements. Considering a metric that weighs all three axes, the proposed adaptive processor delivers a result that is 94.88% of the oracle processor on average, while a static configuration (defined at design time without runtime adaptation) only achieves 28.24% at most, which means that dynamic adaptation is required to cope with different application behaviors as there is not one specific configuration that fits all applications.","PeriodicalId":127096,"journal":{"name":"Proceedings of the 15th ACM International Conference on Computing Frontiers","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115298509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GPU power prediction via ensemble machine learning for DVFS space exploration","authors":"Bishwajit Dutta, Vignesh Adhinarayanan, Wu-chun Feng","doi":"10.1145/3203217.3203273","DOIUrl":"https://doi.org/10.1145/3203217.3203273","url":null,"abstract":"A software-based approach to achieve high performance within a power budget often involves dynamic voltage and frequency scaling (DVFS). Thus, accurately predicting the power consumption of an application at different DVFS levels (or more generally, different processor configurations) is paramount for the energy-efficient functioning of a high-performance computing (HPC) system. The increasing prevalence of graphics processing units (GPUs) in HPC systems presents new challenges in power management, and machine learning presents an unique way to improve the software-based power management of these systems. As such, we explore the problem of GPU power prediction at different DVFS states via machine learning. Specifically, we propose a new ensemble technique that incorporates three machine-learning techniques --- sequential minimal optimization regression, simple linear regression, and decision tree --- to reduce the mean absolute error (MAE) to 3.5%.","PeriodicalId":127096,"journal":{"name":"Proceedings of the 15th ACM International Conference on Computing Frontiers","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126083387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dual-threshold directed execution progress maximization for nonvolatile processors","authors":"Dongqin Zhou, Keni Qiu, Xin Shi, Yongpan Liu","doi":"10.1145/3203217.3203263","DOIUrl":"https://doi.org/10.1145/3203217.3203263","url":null,"abstract":"To meet the needs of the Internet of Things (IoTs) devices, energy harvesting systems are proposed to power the systems instead of battery. Addressing the problem that harvested energy is unstable, nonvolatile processors (NVPs) have been proposed to hold intermediate data and avoid frequent program restarting from the beginning. However, NVPs often suffer a lot of waste on energy and system sources that can not be used for program execution owing to the frequent backup and recovery operations. To further improve the performance of NVPs, the paper proposes a dual-threshold method to maximize execution progress by enabling a system to hibernate to wait for power resumption instead of backing up data directly upon power interruptions. In particular, the optimal high and low thresholds, and the switches of system hibernation and backup, are discussed in details in order to achieve the goal of maximizing computation progress. The evaluation results show an average of up to 82.3% reduction on power failures and 1.5x speedup for forwarding progress by the proposed dual-threshold method compared to the conventional single threshold scheme.","PeriodicalId":127096,"journal":{"name":"Proceedings of the 15th ACM International Conference on Computing Frontiers","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126547097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Streaming graph analysis: new models, new architectures","authors":"E. J. Riedy","doi":"10.1145/3203217.3205343","DOIUrl":"https://doi.org/10.1145/3203217.3205343","url":null,"abstract":"Applications in computer network security, social media analysis, health care, and other areas rely on analyzing a changing environment. The data is rich in relationships and lends itself to graph analysis. Traditional static graph analysis cannot keep pace with network security applications analyzing nearly one million events per second. Streaming frameworks like STINGER support ingesting up three million of edge changes per second but there are few streaming analysis kernels that keep up with these rates. We present a new computational model along with promising novel architectures to tackle massive data rates.","PeriodicalId":127096,"journal":{"name":"Proceedings of the 15th ACM International Conference on Computing Frontiers","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125091294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Disease gene identification by walking on multilayer heterogeneous networks","authors":"Cangfeng Ding, Kan Li","doi":"10.1145/3203217.3203275","DOIUrl":"https://doi.org/10.1145/3203217.3203275","url":null,"abstract":"NOTE FROM ACM: It has been determined that this article plagiarized the contents of a previously published paper. Therefore ACM has shut off access to this paper. This article has been removed from the ACM Digital Library because it was found to plagiarize an earlier work written by Alberto Valdeolivas, Laurent Tichit, Claire Navarro, Sophie Perrin, Gaelle Odelin, Nicolas Levy, Pierre Cau, Elisabeth Remy and Anais Baudot, published by Bioinformatics and entitled \"Random Walk with Restart on Multiplex and Heterogeneous Biological Networks\" Bioinformatics https://doi.org/10.1101/134734. It was also determined that Cangfeng Ding added the name of Kan Li without the consent or knowledge of Kan Li. For further information, contact the ACM Director of Publications.","PeriodicalId":127096,"journal":{"name":"Proceedings of the 15th ACM International Conference on Computing Frontiers","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123661743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MIComp: 3D on-chip magneto-inductive computing with simultaneous wireless information and power transfer","authors":"B. Gulbahar, Gorkem Memisoglu","doi":"10.1145/3203217.3203281","DOIUrl":"https://doi.org/10.1145/3203217.3203281","url":null,"abstract":"On-chip computing platforms have bottlenecks including cost and physical limits of scaling transistors, communication bottleneck, energy efficiency and speed costs for memory. Three dimensional (3D) design, carbon nanotube materials, memristor based neuromorphic computing, and optical, RF and magneto-inductive (MI) wireless communication solutions are recently proposed. MI channels are non-radiative and non-interfering by forming coupled networks. They are future promising with capabilities of THz frequency, Tbit/s data rate, hundreds of zJ/bit and 109 W/mm2 communication and power transfer (PT) efficiencies, respectively. In addition, recently introduced network topology modulation (NTM) for MI channels provides network communication with low complexity, low latency and simultaneous wireless information and power transfer (SWIPT). In this article, unique advantages of THz MI channels, NTM design, nanoscale materials including graphene and single molecular magnets (SMMs), and 3D design are combined in a novel on-chip computing architecture denoted by MIComp by introducing fully efficient SWIPT for computing purposes. The system is theoretically modeled while the state space of the system obtained with nanoscale size coils and SMMs achieves 1010 to 1016 bits in each cycle and per mm3 volume of chip compared with the current transistor counts of on the orders of 109 per mm2. Furthermore, each MIComp cycle has ability to perform for multiple purposes consisting of computing operations, memory state implementations and on-chip communications. It promises a novel solution for communication, energy and space bottlenecks for on-chip computing design.","PeriodicalId":127096,"journal":{"name":"Proceedings of the 15th ACM International Conference on Computing Frontiers","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124853846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anita Aghaie, Mehran Mozaffari Kermani, R. Azarderakhsh
{"title":"Comparative realization of error detection schemes for implementations of mixcolumns in lightweight cryptography","authors":"Anita Aghaie, Mehran Mozaffari Kermani, R. Azarderakhsh","doi":"10.1145/3203217.3203258","DOIUrl":"https://doi.org/10.1145/3203217.3203258","url":null,"abstract":"In this paper, through considering lightweight cryptography, we present a comparative realization of MDS matrices used in the VLSI implementations of lightweight cryptography. We verify the MixColumn/MixNibble transformation using MDS matrices and propose reliability approaches for thwarting natural and malicious faults. We note that one other contribution of this work is to consider not only linear error detecting codes but also recomputation mechanisms as well as fault space transformation (FST) adoption for lightweight cryptographic algorithms. Our intention in this paper is to propose reliability and error detection mechanisms (through linear codes, recomputations, and FST adopted for lightweight cryptography) to consider the error detection schemes in designing beforehand taking into account such algorithmic security. We also posit that the MDS matrices applied in the MixColumn (or MixNibble) transformation of ciphers to protect ciphers against linear and differential attacks should be incorporated in the cipher design in order to reduce the overhead of the applied error detection schemes. Finally, we present a comparative implementation framework on ASIC to benchmark the VLSI hardware implementation presented in this paper.","PeriodicalId":127096,"journal":{"name":"Proceedings of the 15th ACM International Conference on Computing Frontiers","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115536515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pablo Graubner, Patrick Lampe, Jonas Höchst, Lars Baumgärtner, M. Mezini, Bernd Freisleben
{"title":"Opportunistic named functions in disruption-tolerant emergency networks","authors":"Pablo Graubner, Patrick Lampe, Jonas Höchst, Lars Baumgärtner, M. Mezini, Bernd Freisleben","doi":"10.1145/3203217.3203234","DOIUrl":"https://doi.org/10.1145/3203217.3203234","url":null,"abstract":"Information-centric disruption-tolerant networks (ICN-DTNs) are useful to re-establish mobile communication in disaster scenarios when telecommunication infrastructures are partially or completely unavailable. In this paper, we present opportunistic named functions, a novel approach to operate ICN-DTNs during emergencies. Affected people and first responders use their mobile devices to specify their interests in particular content and/or application-specific functions that are then executed in the network on the fly, either partially or totally, in an opportunistic manner. Opportunistic named functions rely on user-defined interests and on locally optimal decisions based on battery lifetimes and device capabilities. In the presented emergency scenario, they are used to preprocess, analyze, integrate and transfer information extracted from images produced by smartphone cameras, with the aim of supporting the search for missing persons and the assessment of critical conditions in a disaster area. Experimental results show that opportunistic named functions reduce network congestion and improve battery lifetime in a network of battery-powered sensors, mobile devices, and mobile routers, while delivering crucial information to carry out situation analysis in disasters.","PeriodicalId":127096,"journal":{"name":"Proceedings of the 15th ACM International Conference on Computing Frontiers","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123683464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online anomaly detection framework for spark systems via stage-task behavior modeling","authors":"Rui Ren, Shuai Tian, Lei Wang","doi":"10.1145/3203217.3203265","DOIUrl":"https://doi.org/10.1145/3203217.3203265","url":null,"abstract":"With rapid growth of Big Data, Apache Spark has been in widespread use. However, with the system scale growing, application delays caused by abnormal tasks/nodes become a common problem in Spark systems. In this paper, we propose an anomaly detection approach based on stage-task behaviors modeling. First, we assume that the abnormal behavior of tasks can reflect the node's abnormal situation. Then, from the collected Spark runtime logs, we extract the four-dimension feature vector that related to the tasks execution status, and then classify the task behaviors as normal and abnormal, which is used to discover the abnormal nodes from the distribution of abnormal tasks. Simultaneously, we build the online framework on Spark Streaming and it could integrate the offline learning methodologies, such as the logical regression method, which is a very simple and powerful classifier for the low-dimensional eigenvectors. Additionally, our experiments show that the accuracy of realtime anomaly detection reaches about 91%, and the given cases show that our framework is really effective for detecting abnormal nodes.","PeriodicalId":127096,"journal":{"name":"Proceedings of the 15th ACM International Conference on Computing Frontiers","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115479651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}