Proceedings of the 12th ACM International Conference on Computing Frontiers最新文献

筛选
英文 中文
BandArb: mitigating the effects of thermal and process variations in silicon-photonic network 减轻硅光子网络中热和工艺变化的影响
Proceedings of the 12th ACM International Conference on Computing Frontiers Pub Date : 2015-05-06 DOI: 10.1145/2742854.2742876
Yi Xu, Jun Yang, R. Melhem
{"title":"BandArb: mitigating the effects of thermal and process variations in silicon-photonic network","authors":"Yi Xu, Jun Yang, R. Melhem","doi":"10.1145/2742854.2742876","DOIUrl":"https://doi.org/10.1145/2742854.2742876","url":null,"abstract":"The resonant wavelengths of the μrings, the basic components of nanophotonic interconnects, can drift because of process variations (PV) and thermal fluctuation (TF), which may paralyze μrings because of the limited correction capability of current technology. Failed μrings cause network bandwidth loss, which renders the network unreliable. To mitigate this problem, this paper proposes BandArb that allocates the bandwidth at runtime according to demand and temperature. BandArb first re-assigns the μrings to resonant wavelengths in each network node to tackle both static and dynamic variations at a coarse (a few milliseconds) granularity. Next, fine-grained wavelength arbitration is used to maximize bandwidth utilization. Evaluation with synthetic traces shows that coarse-grained BandArb can recover 95% of the bandwidth lost to PV and TF, while fine-grained BandArb can improve the network throughput by up to 18% over coarse-grained BandArb.","PeriodicalId":417279,"journal":{"name":"Proceedings of the 12th ACM International Conference on Computing Frontiers","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125026545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Energy efficiency of a parallel HEVC software decoder for embedded devices 嵌入式设备并行HEVC软件解码器的能效研究
Proceedings of the 12th ACM International Conference on Computing Frontiers Pub Date : 2015-05-06 DOI: 10.1145/2742854.2747286
E. Raffin, W. Hamidouche, Erwan Nogues, M. Pelcat, D. Ménard, S. Tomperi
{"title":"Energy efficiency of a parallel HEVC software decoder for embedded devices","authors":"E. Raffin, W. Hamidouche, Erwan Nogues, M. Pelcat, D. Ménard, S. Tomperi","doi":"10.1145/2742854.2747286","DOIUrl":"https://doi.org/10.1145/2742854.2747286","url":null,"abstract":"In the context of fast adoption and deployment of recent video compression standard and thanks to recent high performance embedded processors, software video decoding can be performed in real time. But, it becomes among the most energy-intensive applications. Current embedded processors are based on multi-core architecture with advanced convenient features such as Dynamic Voltage Frequency Scaling (DVFS) in order to reduce their power consumption, allowing low power video decoding when no hardware decoding support is available for a given device. This paper deals with energy efficiency impact of different parallelization strategies of a software High Efficiency Video Coding (HEVC) decoder on multi-core ARM big.LITTLE processor. These strategies include the exploitation of data and task-level parallelism, as well as the use of different available DVFS policies.","PeriodicalId":417279,"journal":{"name":"Proceedings of the 12th ACM International Conference on Computing Frontiers","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115071474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Big data analytics for climate change and biodiversity in the EUBrazilCC federated cloud infrastructure EUBrazilCC联合云基础设施中的气候变化和生物多样性大数据分析
Proceedings of the 12th ACM International Conference on Computing Frontiers Pub Date : 2015-05-06 DOI: 10.1145/2742854.2747282
S. Fiore, Marco Mancini, D. Elia, P. Nassisi, F. Brasileiro, I. Blanquer, Iana A. A. Rufino, A. Seijmonsbergen, Carlos de Oliveira Galvao, V. Canhos, Andrea Mariello, Cosimo Palazzo, A. Nuzzo, Alessandro D'Anca, G. Aloisio
{"title":"Big data analytics for climate change and biodiversity in the EUBrazilCC federated cloud infrastructure","authors":"S. Fiore, Marco Mancini, D. Elia, P. Nassisi, F. Brasileiro, I. Blanquer, Iana A. A. Rufino, A. Seijmonsbergen, Carlos de Oliveira Galvao, V. Canhos, Andrea Mariello, Cosimo Palazzo, A. Nuzzo, Alessandro D'Anca, G. Aloisio","doi":"10.1145/2742854.2747282","DOIUrl":"https://doi.org/10.1145/2742854.2747282","url":null,"abstract":"The analysis of large volumes of data is key for knowledge discovery in several scientific domains such as climate, astrophysics, life sciences among others. It requires a large set of computational and storage resources, as well as flexible and efficient software solutions able to dynamically exploit the available infrastructure and address issues related to data volume, distribution, velocity and heterogeneity. This paper presents a data-driven and cloud-based use case implemented in the context of the EUBrazilCC project for the analysis of climate change and biodiversity data. The use case architecture and main components, as well as a Platform as a Service (PaaS) framework for big data analytics named PDAS, together with its elastic deployment in the EUBrazilCC federated cloud infrastructure are presented and discussed in detail.","PeriodicalId":417279,"journal":{"name":"Proceedings of the 12th ACM International Conference on Computing Frontiers","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128275579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Two-level logging with non-volatile byte-addressable memory in log-structured file systems 在日志结构文件系统中使用非易失字节可寻址内存的两级日志记录
Proceedings of the 12th ACM International Conference on Computing Frontiers Pub Date : 2015-05-06 DOI: 10.1145/2742854.2742892
Yeonseong Hwang, Hyunho Gwak, Dongkun Shin
{"title":"Two-level logging with non-volatile byte-addressable memory in log-structured file systems","authors":"Yeonseong Hwang, Hyunho Gwak, Dongkun Shin","doi":"10.1145/2742854.2742892","DOIUrl":"https://doi.org/10.1145/2742854.2742892","url":null,"abstract":"The file system durability is provided by flushing dirty pages periodically into the non-volatile storage. Since the traditional storage devices such as hard disk and flash memory can be written in the unit of block, the file system writes a whole block even when only a small number of bytes are modified. To resolve such a wasting write traffic problem, we propose a two-level logging scheme by exploiting non-volatile and byte-addressable memories (NVMs). Whereas the previous approach which exploits the NVM device is targeted for EXT4 file system, our scheme uses log-structured file systems in order to guarantee the file system reliability even for sudden system crashes. While the NVM is used for fine-grained logging, the flash memory is used for coarse-grained logging. Experiments with a real NVM device show that the proposed scheme reduces the write traffic on storage by up to 78% and improves the I/O performance significantly.","PeriodicalId":417279,"journal":{"name":"Proceedings of the 12th ACM International Conference on Computing Frontiers","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126230165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The able amble: gait recognition using Gaussian mixture model for biometric applications 基于高斯混合模型的步态识别在生物识别中的应用
Proceedings of the 12th ACM International Conference on Computing Frontiers Pub Date : 2015-05-06 DOI: 10.1145/2742854.2745717
Pallavi Meharia, D. Agrawal
{"title":"The able amble: gait recognition using Gaussian mixture model for biometric applications","authors":"Pallavi Meharia, D. Agrawal","doi":"10.1145/2742854.2745717","DOIUrl":"https://doi.org/10.1145/2742854.2745717","url":null,"abstract":"With the advent of wearable devices and commonality of on-body monitoring devices, it is anticipated that a day will come in the future where body-area networks will become commonplace in our lives. It is envisioned that the whole process will be automated wherein a user wearing such a device automatically enables the security mechanism and establishes communication between that user and his/her surroundings. This paper addresses a technique to identify the wearer of the device by way of Gaussian Mixture Models (GMM), allowing for identification and verification before establishing communication. It suggests using gait as a metric for identity association using wearable sensors.","PeriodicalId":417279,"journal":{"name":"Proceedings of the 12th ACM International Conference on Computing Frontiers","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127652733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Removing duplicated writes at DB checkpointing with file system-level block remapping 通过文件系统级块重新映射在DB检查点删除重复写
Proceedings of the 12th ACM International Conference on Computing Frontiers Pub Date : 2015-05-06 DOI: 10.1145/2742854.2742891
D. Park, Dongkun Shin
{"title":"Removing duplicated writes at DB checkpointing with file system-level block remapping","authors":"D. Park, Dongkun Shin","doi":"10.1145/2742854.2742891","DOIUrl":"https://doi.org/10.1145/2742854.2742891","url":null,"abstract":"Database systems use the journaling techniques in order to guarantee database consistency even at system crashes. Since the journaling needs duplicated write operations, it exhausts the lifetime of NAND flash-based storage device. In this paper, we propose a novel file system-level block remapping technique, which changes only the file system metadata at database checkpointing without any data write operations. Experiments show that the proposed scheme can reduce the write traffic on storage device by 17% on average.","PeriodicalId":417279,"journal":{"name":"Proceedings of the 12th ACM International Conference on Computing Frontiers","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129839254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A practical evaluation of synchronicity in action potentials with noise 噪声作用下动作电位同步性的实际评价
Proceedings of the 12th ACM International Conference on Computing Frontiers Pub Date : 2015-05-06 DOI: 10.1145/2742854.2742897
J. Edwards, Simon E. M. O'Keefe
{"title":"A practical evaluation of synchronicity in action potentials with noise","authors":"J. Edwards, Simon E. M. O'Keefe","doi":"10.1145/2742854.2742897","DOIUrl":"https://doi.org/10.1145/2742854.2742897","url":null,"abstract":"The focus of this paper is to examine the temporal pattern recognition capacities of a simplified action potential model. The model is similar to that proposed by Hopfield, but with no logarithmic scaling and the addition of a speed variable to set the pattern. There is also a more thorough specification of synchronicity between units, by explicitly identifying a window where approximate alignment causes output activation. Action potential models have been shown to easily solve a vector scaling issue referred to as the analogue match problem. Two further noisy extensions to this problem are proposed. The first incorporates noise into the signal intensity and the second introduces noise into the recognition vector. The simplified action potential model is shown to function in the short-term, using a fixed window, as long as the noise is in proportion to the signal intensity.","PeriodicalId":417279,"journal":{"name":"Proceedings of the 12th ACM International Conference on Computing Frontiers","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130180591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compiler analysis for OpenMP tasks correctness 编译器分析OpenMP任务的正确性
Proceedings of the 12th ACM International Conference on Computing Frontiers Pub Date : 2015-05-06 DOI: 10.1145/2742854.2742882
Sara Royuela, R. Ferrer, Diego Caballero, X. Martorell
{"title":"Compiler analysis for OpenMP tasks correctness","authors":"Sara Royuela, R. Ferrer, Diego Caballero, X. Martorell","doi":"10.1145/2742854.2742882","DOIUrl":"https://doi.org/10.1145/2742854.2742882","url":null,"abstract":"OpenMP has become the most frequently used programming model for shared memory parallel systems by virtue of its simplicity and scalability. Notwithstanding its easiness, the constant evolution of OpenMP brings forth difficulties when it comes to keep up with its capabilities. Compilers are key tools to anticipate bugs that may appear at runtime. Despite this, most compilers do not diagnose common mistakes that cause execution errors. Furthermore, many compilers do not yet implement the latest extensions of the OpenMP asynchronous model, and there are no checking systems to properly identify errors in that model. In this paper, we focus on the mistakes derived from the usage of OpenMP tasks. We define a data-flow algorithm that computes the live tasks at every point of the program. Based on that, we present different scenarios and the analyses that allow detecting possible runtime failures, loss of performance or non-deterministic results. We have implemented all the analyses in the Mercurium source-to-source compiler, which, based on the results, suggests changes to the user in order to avoid runtime problems. We test our implementation with over 70 students and 6 benchmarks, as well as with the results of the Oracle Solaris Studio 12.3 compiler, which warns about correctness issues related to the scope of variables in OpenMP.","PeriodicalId":417279,"journal":{"name":"Proceedings of the 12th ACM International Conference on Computing Frontiers","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134270028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
B2L: a case for buffered and bufferless hybrid NoCs B2L:缓冲和无缓冲混合noc的案例
Proceedings of the 12th ACM International Conference on Computing Frontiers Pub Date : 2015-05-06 DOI: 10.1145/2742854.2742890
Juan Fang, Sitong Liu, Z. Leng, Shuying Song, Jianhua Wei, Yuening Wang
{"title":"B2L: a case for buffered and bufferless hybrid NoCs","authors":"Juan Fang, Sitong Liu, Z. Leng, Shuying Song, Jianhua Wei, Yuening Wang","doi":"10.1145/2742854.2742890","DOIUrl":"https://doi.org/10.1145/2742854.2742890","url":null,"abstract":"A NoC is a critical shared resource among these concurrently-executing applications, significantly affecting system performance, and energy efficiency. In this paper, we propose B2L, a buffered and bufferless hybrid NoC design that can satisfy application's performance requirements, while the system's energy consumption is minimized. This can be achieved by designing a dedicated buffered and bufferless NoC separately, and dynamically control flits from different apps or within the same app to flow across the two networks according to application's requirement and network status.","PeriodicalId":417279,"journal":{"name":"Proceedings of the 12th ACM International Conference on Computing Frontiers","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133381687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Escalation of TRUST analysis in web 网络信任分析的升级
Proceedings of the 12th ACM International Conference on Computing Frontiers Pub Date : 2015-05-06 DOI: 10.1145/2742854.2745721
Himani Singal, Shruti Kohli
{"title":"Escalation of TRUST analysis in web","authors":"Himani Singal, Shruti Kohli","doi":"10.1145/2742854.2745721","DOIUrl":"https://doi.org/10.1145/2742854.2745721","url":null,"abstract":"Today's generation rely heavily on Internet for fetching information of any kind. Internet, in turn is overloaded with it. On typing one search query in any search engine, thousands or even more web links are returned claiming to contain the information being sought for. Form this ocean of options, a user/requestor has to deep dive in to find the best solution to the problem being faced through his/her understanding and ability of decision-making. There are many a chances, when this procedure also involves amount of risk-taking viz. queries related to health symptoms, first-aid techniques etc. Though the information is streamlined on Internet and Web2.0, but still the problem of TRUST sustains at the user end as to what content provided by the web should be trusted and up to what extent? This paper is an endeavor to provide a solution to this persisting problem based on overall human behavior as HCI (Human-Computer Interaction) plays a vital role in forming antecedents of TRUST and risk analysis. The freshness of our contribution in this area can be analyzed from the fact that till now, to our best of knowledge, no study (except our previous contributions) on TRUST has taken the overall perspective of visitors' (other users') behavior of Web usage to necessitate the quantization of TRUST.","PeriodicalId":417279,"journal":{"name":"Proceedings of the 12th ACM International Conference on Computing Frontiers","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122040806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信