Proceedings of the 3rd International Conference on High Performance Compilation, Computing and Communications最新文献

筛选
英文 中文
Self-adaptive algorithm for asynchronous multi-task communication on time-triggered avionics system 时间触发航电系统异步多任务通信的自适应算法
Qingfei Xu, Xinyu Yang, Gilles Saintonge
{"title":"Self-adaptive algorithm for asynchronous multi-task communication on time-triggered avionics system","authors":"Qingfei Xu, Xinyu Yang, Gilles Saintonge","doi":"10.1145/3318265.3318277","DOIUrl":"https://doi.org/10.1145/3318265.3318277","url":null,"abstract":"Avionics communication system has multiple ending equipment with safety-critical data exchanges which require high reliability, low latency, and no data loss. Time-Triggered Architecture which is prevalent in that safety-critical system is a synchronized real-time system with fault-tolerance ability, but most host applications usually work at asynchronous fashion, their execution speed is heavily dependent on the temperature and supply voltage. It's difficult for asynchronous host applications to synchronize with Time-Triggered communication Architecture. This paper introduced a novel algorithm which could periodically synchronize host applications with the global clock of Time-Triggered Architecture; furthermore, we introduced three different implementation alternatives, evaluated them in the same test board, and gave a performance comparison of them. The result showed our design worked fine in the embedded platform.","PeriodicalId":241692,"journal":{"name":"Proceedings of the 3rd International Conference on High Performance Compilation, Computing and Communications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126347912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of image corner detection methods 图像角点检测方法综述
He Yarui, Liu Yunhong, Fang Qiaochu
{"title":"A survey of image corner detection methods","authors":"He Yarui, Liu Yunhong, Fang Qiaochu","doi":"10.1145/3318265.3318295","DOIUrl":"https://doi.org/10.1145/3318265.3318295","url":null,"abstract":"In this paper, we present an overview of various corner detection approaches that have been proposed in the last four decades. Corner detection algorithms can be broadly divided into intensity-based, contour-based and model-based methods. Intensity-based methods are mainly based on measuring local intensity variation of image. Contour-based methods find corners by analyzing the shape of edge contour. Model-based methods extract corners by fitting the local image into a predefined model. Furthermore, the robustness of eight different popular detectors are evaluated using the average repeatability and localization error criterions.","PeriodicalId":241692,"journal":{"name":"Proceedings of the 3rd International Conference on High Performance Compilation, Computing and Communications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126403505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An FPGA-based accelerator platform implements for convolutional neural network 基于fpga的卷积神经网络加速平台的实现
Xiao Meng, Lixin Yu, Zhiyong Qin
{"title":"An FPGA-based accelerator platform implements for convolutional neural network","authors":"Xiao Meng, Lixin Yu, Zhiyong Qin","doi":"10.1145/3318265.3318285","DOIUrl":"https://doi.org/10.1145/3318265.3318285","url":null,"abstract":"In recent years, convolutional neural network (CNN) has become widely universal in large number of applications including computer vision, natural language processing and automatic driving. However, the CNN-based methods are computational-intensive and resource-intensive, and thus are hard to integrate the neural network into embedded systems such as smart phones, automatic driving and robots. To address the limitation, various deep learning accelerators have been proposed to implement on the field programmable gate array (FPGA) platform, because of its flexibility and reconfigurability. In this paper, we design and implement an FPGA-based accelerator platform which integrated the NVIDIA deep learning accelerator (NVDLA). We illustrate the detail architecture of the accelerator, and give the software and hardware co-design approaches which can instruct the system designs of FPGA-based accelerator platform. As a case study, we implement the CNN accelerator on an XCZU9EG FPGA platform and our implement achieves a peak performance of 25.6 GOPS when computing the valid output of convolutional layers under 100 MHz working frequency.","PeriodicalId":241692,"journal":{"name":"Proceedings of the 3rd International Conference on High Performance Compilation, Computing and Communications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129751572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A text sentiment analysis model based on self-attention mechanism 基于自注意机制的文本情感分析模型
L. Ji, Ping Gong, Zhuyu Yao
{"title":"A text sentiment analysis model based on self-attention mechanism","authors":"L. Ji, Ping Gong, Zhuyu Yao","doi":"10.1145/3318265.3318293","DOIUrl":"https://doi.org/10.1145/3318265.3318293","url":null,"abstract":"This paper focuses on the problem of text sentiment analysis. The task of sentiment analysis is to extract structured and valuable information from the text data that people express on various platforms. The field of sentiment analysis is attracting more and more attention from researchers. In recent years, due to the continuous development of deep learning theory, there have been many researches on the application of neural network model in sentiment analysis task. Sentiment analysis can be understood as the process of dividing text into different types according to the sentiment information expressed in the text. In this paper, we introduce the self-attention mechanism into sentiment analysis and propose a neural network model based on multi-head self-attention mechanism. In order to better capture the effective information in the text, we combine bidirectional GRU in our model. We evaluate our method on the dataset IMDB (Internet Movie Database). Experimental results show that the accuracy of the proposed model achieves 90.0 on the test dataset. It illuminates that our model outperforms other models. Our model can extract information more effectively in the task of sentiment analysis.","PeriodicalId":241692,"journal":{"name":"Proceedings of the 3rd International Conference on High Performance Compilation, Computing and Communications","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128092549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Parallelization of the streamline simulation based on CUDA 基于CUDA的流线仿真并行化
Mulan Luo, Xu-sheng Wang, Xiaohui Ji
{"title":"Parallelization of the streamline simulation based on CUDA","authors":"Mulan Luo, Xu-sheng Wang, Xiaohui Ji","doi":"10.1145/3318265.3318269","DOIUrl":"https://doi.org/10.1145/3318265.3318269","url":null,"abstract":"To accelerate the streamline simulation and satisfy the real-time demands, in this paper, we proposed a method based on GPUs to parallelize the streamline simulation. CUDA architecture was used to implement the parallel algorithm on a single GPU and a multi-GPU computer. In our method, a grid is organized into a 2D array of blocks, and all threads in a block are organized into a 1D array, such that each thread in a block computes one streamline. To implement the method on multiple GPUs, the physical cell model is divided into sub-models to make the number of sub-models equal to the number of GPUs. The algorithm is applied to a Tóthian basin as an example. The experimental analysis shows that the parallel algorithm based on different numbers of GPUs has different accelerations. For a single GPU, the speedup reaches 170 times; and for five GPUs, it is 808 times, for a physical model with 40×106 cells. The conclusion is that GPUs can greatly accelerate the streamline simulation.","PeriodicalId":241692,"journal":{"name":"Proceedings of the 3rd International Conference on High Performance Compilation, Computing and Communications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132151408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SWAP: a sliding window algorithm for in-network packet measurement SWAP:一种用于网络内数据包测量的滑动窗口算法
Zijun Hang, Yang Shi, M. Wen, W. Quan, Chunyuan Zhang
{"title":"SWAP: a sliding window algorithm for in-network packet measurement","authors":"Zijun Hang, Yang Shi, M. Wen, W. Quan, Chunyuan Zhang","doi":"10.1145/3318265.3318280","DOIUrl":"https://doi.org/10.1145/3318265.3318280","url":null,"abstract":"Network traffic measurement is a fundamental part of many network applications, such as DDOS detection, capacity planning, and quality-of-service improvement. To achieve this, we need to count the number of packets passed during a past time interval. Traditionally, switches sample the packets and send them to the CPU for analysis. It is unavoidable that the sampling will sacrifice the measuring accuracy. Nowadays, programmable switches can keep the counters in the data plane. However, they still rely on the CPU to drain and clear the records periodically, which brings in too much communication latency. To overcome these disadvantages, we propose a metering mechanism under the RMT architectural model called SWAP. SWAP is carefully designed to count the number of packets during an interval accurately with little hardware resource usage. We prototype it using P4 and simulation results show SWAP achieves high efficiency and moderate accuracy at line speed.","PeriodicalId":241692,"journal":{"name":"Proceedings of the 3rd International Conference on High Performance Compilation, Computing and Communications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126658746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance optimization of relay nodes in wireless powered network with dynamic node location 动态节点定位无线供电网络中继节点性能优化
Chunfeng Wang, Naijin Liu
{"title":"Performance optimization of relay nodes in wireless powered network with dynamic node location","authors":"Chunfeng Wang, Naijin Liu","doi":"10.1145/3318265.3318292","DOIUrl":"https://doi.org/10.1145/3318265.3318292","url":null,"abstract":"Microwave wireless energy transmission technology is becoming more and more mature, and how to integrate wireless energy transmission and wireless information transmission has become one of the hot research areas. This system is called wireless energy and information synchronous transmission system or synchronous wireless information and energy transmission (SWIPT) System. Synchronous wireless information and energy transmission system is of great significance to alleviate the power shortage of communication nodes and equipment. At present, there are many researches on point to point wireless information and energy transmission systems. In this paper, a system consisting of three nodes is presented, in which the intermediate node is a wireless information and energy synchronous receiving relay node, the relay node harvests the energy and retransmit information from the source node. When the location of the relay node changes dynamically, the traditional fixed-time switching for wireless energy transmission scheme cannot be realized. This paper discusses the optimization of wireless energy and information synchronization transmission of relay node under the condition of dynamic change of relay node location. The influence of relay node location on energy harvesting is fully considered and analyzed. Time switching is adjusted based on the change of relay node location to achieve the most effective and most efficient. The optimal switching time scheme improves the overall throughput performance of the system, and carries out numerical analysis.","PeriodicalId":241692,"journal":{"name":"Proceedings of the 3rd International Conference on High Performance Compilation, Computing and Communications","volume":"22 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131449939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A live migration strategy for virtual encryption card equipment 虚拟加密卡设备的实时迁移策略
Deliang Xu, Ze-Yao Cen, Cai Fu, Tao Liu, Guohui Li, Lansheng Han, Zhaokang Ke
{"title":"A live migration strategy for virtual encryption card equipment","authors":"Deliang Xu, Ze-Yao Cen, Cai Fu, Tao Liu, Guohui Li, Lansheng Han, Zhaokang Ke","doi":"10.1145/3318265.3318275","DOIUrl":"https://doi.org/10.1145/3318265.3318275","url":null,"abstract":"With the popularity of virtualization technologies, virtualization security issues have been appeared, which greatly hampers the development of its further application. Bringing the encryption card to the virtual environment is a good idea to enforce the security of the virtual platform. However, due to the particularity of the encryption card equipment, there is some difficult to virtualize the encryption card equipment. One of the most important difficulties is supporting Live Migration. As for the first question that we must ensure the encryption task continuity when migrating a virtual encryption card, we propose the encryption field migration for the physical encryption card, which guarantees the continuity of virtualization encryption card. For the second problem that Live Migration of virtualization encryption card must be protected from any attack, this paper designs migration protocol to ensure the security. For the last problem that the encryption card live migration should not increase the migration time of virtual machine drastically, including total migration time and downtime, we separate the migration protocol to a different stage, and complete in the different stage of virtual machine migration. By this way, we decrease the influence of virtual machine migration time. The implement and results of experiments on Kernel-based Virtual Machine indicate that the proposed scheme is feasible in function and performance.","PeriodicalId":241692,"journal":{"name":"Proceedings of the 3rd International Conference on High Performance Compilation, Computing and Communications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115361360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and implementation of power distribution systyem security protection technology based on blockchain 基于区块链的配电系统安全防护技术的研究与实现
D. Niu, Dongmei Zhang
{"title":"Research and implementation of power distribution systyem security protection technology based on blockchain","authors":"D. Niu, Dongmei Zhang","doi":"10.1145/3318265.3318279","DOIUrl":"https://doi.org/10.1145/3318265.3318279","url":null,"abstract":"Smart grids are gradually becoming popular, but itself, especially its power distribution grids, faces many security issues, and false data injection is one of the most attack that happens. Blockchain is considered a key technology for protecting IoT due to its decentralization, non-deformable and high scalability. However, the current blockchain technology costs lots of resources storing and producing blocks, it cannot be directly applied to the power distribution grids with a large number of resource-limited nodes. Therefore, this paper proposes historical chain compression, and then modifys the DPOS and applies it to the blockchain, which help reduce the storeage burden and improve the effiiciency of block producing.","PeriodicalId":241692,"journal":{"name":"Proceedings of the 3rd International Conference on High Performance Compilation, Computing and Communications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127721198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Accelerate RAID scaling by reducing disk I/Os and XOR operations 通过减少磁盘I/ o和异或操作加速RAID扩展
Zhu Yuan, Ping Xie, Xiaojuan Zhang, Shengling Geng, Jun Ma
{"title":"Accelerate RAID scaling by reducing disk I/Os and XOR operations","authors":"Zhu Yuan, Ping Xie, Xiaojuan Zhang, Shengling Geng, Jun Ma","doi":"10.1145/3318265.3318266","DOIUrl":"https://doi.org/10.1145/3318265.3318266","url":null,"abstract":"In order to suffice the storage requirements under the big data environment, scaling method is generally adopted to increase the storage capacity of the storage system with the exponential growth of data in the current. RAID has received wide attention in the academic and the industry due to good independence and redundancy. After long-term development, RAID has derived different RAID levels according to distinct requirements of users. In order to achieve load balance including old and new, some data need to be migrated from old data disks to new data disks. However, there will generate the disk I/O operations and the XOR computational operations because of the existence of independent parity disk during the migration process. These affect the efficiency of scaling to a certain extent and lead the problem of long scaling time. In this paper, the scaling process for RAID-4 is optimized by reducing the disk I/O operations and the XOR computational overhead. In the comparison experiment analysis of real storage system scaling, the scaling time of optimization approach is reduced by 49.9% to 57.3% compared with the traditional scaling approach.","PeriodicalId":241692,"journal":{"name":"Proceedings of the 3rd International Conference on High Performance Compilation, Computing and Communications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134061787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信