Search results for "RDW"

showing 10 items of 1401 documents

AIOC2: A deep Q-learning approach to autonomic I/O congestion control in Lustre

2021

Abstract In high performance computing systems, I/O congestion is a common problem in large-scale distributed file systems. However, the current implementation mainly requires administrator to manually design low-level implementation and optimization, we proposes an adaptive I/O congestion control framework, named AIOC 2 , which can not only adaptively tune the I/O congestion control parameters, but also exploit the deep Q-learning method to start the training parameters and optimize the tuning for different types of workloads from the server and the client at the same time. AIOC 2 combines the feedback-based dynamic I/O congestion control and deep Q-learning parameter tuning technology to …

ExploitComputer Networks and CommunicationsComputer sciencebusiness.industryQ-learningInterference (wave propagation)SupercomputerComputer Graphics and Computer-Aided DesignTheoretical Computer ScienceNetwork congestionArtificial IntelligenceHardware and ArchitectureEmbedded systemLustre (file system)Latency (engineering)businessThroughput (business)SoftwareParallel Computing
researchProduct

Reordering Method and Hierarchies for Quantum and Classical Ordered Binary Decision Diagrams

2017

We consider Quantum OBDD model. It is restricted version of read-once Quantum Branching Programs, with respect to "width" complexity. It is known that maximal complexity gap between deterministic and quantum model is exponential. But there are few examples of such functions. We present method (called "reordering"), which allows to build Boolean function $g$ from Boolean Function $f$, such that if for $f$ we have gap between quantum and deterministic OBDD complexity for natural order of variables, then we have almost the same gap for function $g$, but for any order. Using it we construct the total function $REQ$ which deterministic OBDD complexity is $2^{\Omega(n/\log n)}$ and present quantu…

FOS: Computer and information sciencesComputer Science - Computational ComplexityQuantum PhysicsTheoryofComputation_COMPUTATIONBYABSTRACTDEVICESComputer Science::Logic in Computer ScienceComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATIONFOS: Physical sciencesComputational Complexity (cs.CC)Computer Science::Artificial IntelligenceComputer Science::Computational ComplexityQuantum Physics (quant-ph)Hardware_LOGICDESIGN
researchProduct

Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform

2018

In this paper, a robust blind image watermarking method is proposed for copyright protection of digital images. This hybrid method relies on combining two well-known transforms that are the discrete Fourier transform (DFT) and the discrete cosine transform (DCT). The motivation behind this combination is to enhance the imperceptibility and the robustness. The imperceptibility requirement is achieved by using magnitudes of DFT coefficients while the robustness improvement is ensured by applying DCT to the DFT coefficients magnitude. The watermark is embedded by modifying the coefficients of the middle band of the DCT using a secret key. The security of the proposed method is enhanced by appl…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer Networks and CommunicationsComputer scienceMultiple Watermarking02 engineering and technologyDiscrete Fourier transformImage (mathematics)Digital imageDiscrete Fourier transform (DFT)SchemeRobustness (computer science)Quantization0202 electrical engineering electronic engineering information engineeringMedia TechnologyDiscrete cosine transformHybrid method[INFO]Computer Science [cs]Digital watermarkingDiscrete cosine transform (DCT)DistanceImage watermarking020207 software engineeringWatermarkMultimedia (cs.MM)Hardware and ArchitectureMedical ImagesEmbedding020201 artificial intelligence & image processingArnold transformWavelet DomainSvdCryptography and Security (cs.CR)AlgorithmCopyright protectionSoftwareComputer Science - Multimedia
researchProduct

Functions definable by numerical set-expressions

2011

A "numerical set-expression" is a term specifying a cascade of arithmetic and logical operations to be performed on sets of non-negative integers. If these operations are confined to the usual Boolean operations together with the result of lifting addition to the level of sets, we speak of "additive circuits". If they are confined to the usual Boolean operations together with the result of lifting addition and multiplication to the level of sets, we speak of "arithmetic circuits". In this paper, we investigate the definability of sets and functions by means of additive and arithmetic circuits, occasionally augmented with additional operations.

FOS: Computer and information sciencesComputer Science - Logic in Computer ScienceLogic0102 computer and information sciences01 natural sciencesTheoretical Computer Scienceexpressive powerSet (abstract data type)integer expressionArts and Humanities (miscellaneous)Saturation arithmeticBoolean expression0101 mathematicsElectronic circuitMathematics010102 general mathematicsTerm (logic)Logic in Computer Science (cs.LO)AlgebraArithmetic circuitdefinability010201 computation theory & mathematicsHardware and ArchitectureCascadeAlgebraic operationMultiplicationF.1.1SoftwareJournal of Logic and Computation
researchProduct

A General Framework for Complex Network-Based Image Segmentation

2019

International audience; With the recent advances in complex networks theory, graph-based techniques for image segmentation has attracted great attention recently. In order to segment the image into meaningful connected components, this paper proposes an image segmentation general framework using complex networks based community detection algorithms. If we consider regions as communities, using community detection algorithms directly can lead to an over-segmented image. To address this problem, we start by splitting the image into small regions using an initial segmentation. The obtained regions are used for building the complex network. To produce meaningful connected components and detect …

FOS: Computer and information sciencesComputer Science - Machine LearningComputer Networks and CommunicationsComputer scienceComputer Vision and Pattern Recognition (cs.CV)Computer Science - Computer Vision and Pattern RecognitionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONMachine Learning (stat.ML)02 engineering and technologyMachine Learning (cs.LG)Statistics - Machine Learning0202 electrical engineering electronic engineering information engineeringMedia TechnologySegmentationConnected componentbusiness.industrySimilarity matrix[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020207 software engineeringPattern recognitionImage segmentationComplex networkHardware and ArchitectureComputer Science::Computer Vision and Pattern RecognitionGraph (abstract data type)020201 artificial intelligence & image processingArtificial intelligencebusinessSoftware
researchProduct

A Relational Tsetlin Machine with Applications to Natural Language Understanding

2021

TMs are a pattern recognition approach that uses finite state machines for learning and propositional logic to represent patterns. In addition to being natively interpretable, they have provided competitive accuracy for various tasks. In this paper, we increase the computing power of TMs by proposing a first-order logic-based framework with Herbrand semantics. The resulting TM is relational and can take advantage of logical structures appearing in natural language, to learn rules that represent how actions and consequences are related in the real world. The outcome is a logic program of Horn clauses, bringing in a structured view of unstructured data. In closed-domain question-answering, th…

FOS: Computer and information sciencesComputer Science - Machine LearningComputer Science - Logic in Computer ScienceComputer Science - Computation and LanguageI.2.4Computer Science - Artificial IntelligenceComputer Networks and CommunicationsI.2.7Machine Learning (cs.LG)Logic in Computer Science (cs.LO)Artificial Intelligence (cs.AI)Artificial IntelligenceHardware and ArchitectureComputation and Language (cs.CL)I.2.7; I.2.4SoftwareInformation Systems
researchProduct

Adding Partial Functions to Constraint Logic Programming with Sets

2015

AbstractPartial functions are common abstractions in formal specification notations such as Z, B and Alloy. Conversely, executable programming languages usually provide little or no support for them. In this paper we propose to add partial functions as a primitive feature to a Constraint Logic Programming (CLP) language, namely {log}. Although partial functions could be programmed on top of {log}, providing them as first-class citizens adds valuable flexibility and generality to the form of set-theoretic formulas that the language can safely deal with. In particular, the paper shows how the {log} constraint solver is naturally extended in order to accommodate for the new primitive constrain…

FOS: Computer and information sciencesComputer Science - Programming LanguagesProgramming languageComputer scienceOrder (ring theory)computer.file_formatcomputer.software_genreNotationTheoretical Computer ScienceComputational Theory and MathematicsArtificial IntelligenceHardware and ArchitectureFormal specificationPartial functionConstraint logic programmingExecutableSet theorycomputerSoftwareConstraint satisfaction problemProgramming Languages (cs.PL)
researchProduct

RationalizeRoots: Software Package for the Rationalization of Square Roots

2019

The computation of Feynman integrals often involves square roots. One way to obtain a solution in terms of multiple polylogarithms is to rationalize these square roots by a suitable variable change. We present a program that can be used to find such transformations. After an introduction to the theoretical background, we explain in detail how to use the program in practice.

FOS: Computer and information sciencesComputer Science - Symbolic ComputationHigh Energy Physics - TheoryHigh energy particleFeynman integralComputationGeneral Physics and AstronomyFOS: Physical sciencesengineering.materialSymbolic Computation (cs.SC)Rationalization (economics)01 natural sciences010305 fluids & plasmasHigh Energy Physics - Phenomenology (hep-ph)Square root0103 physical sciencesComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATIONAlgebraic number010306 general physicsMathematical PhysicsVariable (mathematics)MapleMathematical Physics (math-ph)AlgebraHigh Energy Physics - PhenomenologyHigh Energy Physics - Theory (hep-th)Hardware and ArchitectureengineeringComputer Science - Mathematical SoftwareMathematical Software (cs.MS)
researchProduct

Importance of the window function choice for the predictive modelling of memristors

2018

Window functions are widely employed in memristor models to restrict the changes of the internal state variables to specified intervals. Here we show that the actual choice of window function is of significant importance for the predictive modelling of memristors. Using a recently formulated theory of memristor attractors, we demonstrate that whether stable fixed points exist depends on the type of window function used in the model. Our main findings are formulated in terms of two memristor attractor theorems, which apply to broad classes of memristor models. As an example of our findings, we predict the existence of stable fixed points in Biolek window function memristors and their absence…

FOS: Computer and information sciencesComputer Science::Hardware ArchitectureEmerging Technologies (cs.ET)Computer Science::Emerging TechnologiesComputer Science - Emerging Technologies
researchProduct

Improving table compression with combinatorial optimization

2002

We study the problem of compressing massive tables within the partition-training paradigm introduced by Buchsbaum et al. [SODA'00], in which a table is partitioned by an off-line training procedure into disjoint intervals of columns, each of which is compressed separately by a standard, on-line compressor like gzip. We provide a new theory that unifies previous experimental observations on partitioning and heuristic observations on column permutation, all of which are used to improve compression rates. Based on the theory, we devise the first on-line training algorithms for table compression, which can be applied to individual files, not just continuously operating sources; and also a new, …

FOS: Computer and information sciencesComputer scienceHeuristic (computer science)E.4G.2.1Data_CODINGANDINFORMATIONTHEORYDisjoint setsTravelling salesman problemPermutationArtificial IntelligenceCompression (functional analysis)Computer Science - Data Structures and AlgorithmsH.1.8H.2.7Data Structures and Algorithms (cs.DS)E.4; F.1.3; F.2.2; G.2.1; H.1.1; H.1.8; H.2.7H.1.1Dynamic programmingHardware and ArchitectureControl and Systems EngineeringCombinatorial optimizationTable (database)F.1.3F.2.2AlgorithmSoftwareInformation SystemsJournal of the ACM
researchProduct