Search results for "Scheme"

showing 10 items of 527 documents

AnySeq: A High Performance Sequence Alignment Library based on Partial Evaluation

2020

Sequence alignments are fundamental to bioinformatics which has resulted in a variety of optimized implementations. Unfortunately, the vast majority of them are hand-tuned and specific to certain architectures and execution models. This not only makes them challenging to understand and extend, but also difficult to port to other platforms. We present AnySeq - a novel library for computing different types of pairwise alignments of DNA sequences. Our approach combines high performance with an intuitively understandable implementation, which is achieved through the concept of partial evaluation. Using the AnyDSL compiler framework, AnySeq enables the compilation of algorithmic variants that ar…

FOS: Computer and information sciences0301 basic medicineScheme (programming language)Computer Science - PerformanceComputer science0206 medical engineeringSequence alignment02 engineering and technologyParallel computingcomputer.software_genreMetaprogrammingDNA sequencingPartial evaluationPerformance (cs.PF)03 medical and health sciences030104 developmental biologyComputer Science - Distributed Parallel and Cluster ComputingFunction composition (computer science)MultithreadingDistributed Parallel and Cluster Computing (cs.DC)Compilercomputer020602 bioinformaticscomputer.programming_languageCodebase
researchProduct

Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform

2018

In this paper, a robust blind image watermarking method is proposed for copyright protection of digital images. This hybrid method relies on combining two well-known transforms that are the discrete Fourier transform (DFT) and the discrete cosine transform (DCT). The motivation behind this combination is to enhance the imperceptibility and the robustness. The imperceptibility requirement is achieved by using magnitudes of DFT coefficients while the robustness improvement is ensured by applying DCT to the DFT coefficients magnitude. The watermark is embedded by modifying the coefficients of the middle band of the DCT using a secret key. The security of the proposed method is enhanced by appl…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer Networks and CommunicationsComputer scienceMultiple Watermarking02 engineering and technologyDiscrete Fourier transformImage (mathematics)Digital imageDiscrete Fourier transform (DFT)SchemeRobustness (computer science)Quantization0202 electrical engineering electronic engineering information engineeringMedia TechnologyDiscrete cosine transformHybrid method[INFO]Computer Science [cs]Digital watermarkingDiscrete cosine transform (DCT)DistanceImage watermarking020207 software engineeringWatermarkMultimedia (cs.MM)Hardware and ArchitectureMedical ImagesEmbedding020201 artificial intelligence & image processingArnold transformWavelet DomainSvdCryptography and Security (cs.CR)AlgorithmCopyright protectionSoftwareComputer Science - Multimedia
researchProduct

The rightmost equal-cost position problem.

2013

LZ77-based compression schemes compress the input text by replacing factors in the text with an encoded reference to a previous occurrence formed by the couple (length, offset). For a given factor, the smallest is the offset, the smallest is the resulting compression ratio. This is optimally achieved by using the rightmost occurrence of a factor in the previous text. Given a cost function, for instance the minimum number of bits used to represent an integer, we define the Rightmost Equal-Cost Position (REP) problem as the problem of finding one of the occurrences of a factor whose cost is equal to the cost of the rightmost one. We present the Multi-Layer Suffix Tree data structure that, for…

FOS: Computer and information sciencesOffset (computer science)Computer scienceSuffix treeComputer Science - Information Theorylaw.inventionCombinatoricslawLog-log plotComputer Science - Data Structures and AlgorithmsCompression schemetext compressiondictionary text compressionData Structures and Algorithms (cs.DS)LZ77 compressiondata compressionLossless compressionfull text indexSuffix Tree Data StructuresSettore INF/01 - InformaticaInformation Theory (cs.IT)Data structurePrefixCompression ratioCompression scheme; Constant time; Suffix Tree Data StructuresAlgorithmData compressionConstant time
researchProduct

WarpCore: A Library for fast Hash Tables on GPUs

2020

Hash tables are ubiquitous. Properties such as an amortized constant time complexity for insertion and querying as well as a compact memory layout make them versatile associative data structures with manifold applications. The rapidly growing amount of data emerging in many fields motivated the need for accelerated hash tables designed for modern parallel architectures. In this work, we exploit the fast memory interface of modern GPUs together with a parallel hashing scheme tailored to improve global memory access patterns, to design WarpCore -- a versatile library of hash table data structures. Unique device-sided operations allow for building high performance data processing pipelines ent…

FOS: Computer and information sciencesScheme (programming language)Amortized analysisComputer scienceHash functionParallel computingData structureHash tableCUDAComputer Science - Distributed Parallel and Cluster ComputingServerDistributed Parallel and Cluster Computing (cs.DC)Throughput (business)computercomputer.programming_language2020 IEEE 27th International Conference on High Performance Computing, Data, and Analytics (HiPC)
researchProduct

Blockchain-Based Proof of Location

2016

Location-Based Services (LBSs) build upon geographic information to provide users with location-dependent functionalities. In such a context, it is particularly important that geographic locations claimed by users are trustworthy. Centralized verification approaches proposed in the last few years are not satisfactory, as they entail a high risk to the privacy of users. In this paper, we present and evaluate a novel decentralized, infrastructure-independent proof-of-location scheme based on blockchain technology. Our scheme guarantees both location trustworthiness and user privacy preservation.

FOS: Computer and information sciencesScheme (programming language)Computer Science - Cryptography and SecurityBlockchainbusiness.industryComputer science020206 networking & telecommunicationsCryptographyContext (language use)02 engineering and technologyComputer securitycomputer.software_genreUser privacyTrustworthinessComputer Science - Distributed Parallel and Cluster Computing020204 information systemsServerC.2.40202 electrical engineering electronic engineering information engineeringPeer to peer computingDistributed Parallel and Cluster Computing (cs.DC)businessCryptography and Security (cs.CR)computercomputer.programming_language2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)
researchProduct

Progressive Stochastic Binarization of Deep Networks

2019

A plethora of recent research has focused on improving the memory footprint and inference speed of deep networks by reducing the complexity of (i) numerical representations (for example, by deterministic or stochastic quantization) and (ii) arithmetic operations (for example, by binarization of weights). We propose a stochastic binarization scheme for deep networks that allows for efficient inference on hardware by restricting itself to additions of small integers and fixed shifts. Unlike previous approaches, the underlying randomized approximation is progressive, thus permitting an adaptive control of the accuracy of each operation at run-time. In a low-precision setting, we match the accu…

FOS: Computer and information sciencesScheme (programming language)Computer Science - Machine LearningComputer scienceStochastic processScalar (physics)Sampling (statistics)Machine Learning (stat.ML)Machine Learning (cs.LG)Statistics - Machine LearningApproximation errorBounded functionReference implementationRepresentation (mathematics)computerAlgorithmcomputer.programming_language2019 Fifth Workshop on Energy Efficient Machine Learning and Cognitive Computing - NeurIPS Edition (EMC2-NIPS)
researchProduct

MAC Design for WiFi Infrastructure Networks: A Game-Theoretic Approach

2011

In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this protocol is in principle fair, since all the stations have the same probability to transmit on the channel, it has been shown that unfair behaviors may emerge in actual networking scenarios because of non-standard configurations of the nodes. Due to the proliferation of open source drivers and programmable cards, enabling an easy customization of the channel access policies, we propose a game-theoretic analysis of random access schemes. Assuming that each node is rational and implements a best response strategy, we show that…

FOS: Computer and information sciencesgame theorycheating nodeaccess protocolsmobile nodesComputer sciencegame-theoretic approachMAC designDistributed coordination functionUpload[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]MAC protocolschannel access policyComputer Science - Computer Science and Game TheoryFOS: MathematicsElectrical and Electronic EngineeringMathematics - Optimization and Controlwireless LANdistributed coordination functionMechanism designcheating nodesWiFi infrastructure networksbusiness.industryApplied MathematicsNode (networking)WiFiComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWiFi; cheating nodes; game theory; MAC protocolsComputer Science ApplicationsShared resourceprogrammable cardsOptimization and Control (math.OC)game-theoretic analysisBest responserandom access schemebusinessrandom access protocolRandom accessCommunication channelComputer networkComputer Science and Game Theory (cs.GT)
researchProduct

Simple algorithms for calculation of the axial‐symmetric heat transport problem in a cylinder

2001

The approximation of axial‐symmetric heat transport problem in a cylinder is based on the finite volume method. In the classical formulation of the finite volume method it is assumed that the flux terms in the control volume are approximated with the finite difference expressions. Then in the 1‐D case the corresponding finite difference scheme for the given source function is not exact. There we propose the exact difference scheme. In 2‐D case the corresponding integrals are approximated using different quadrature formulae. This procedure allows one to reduce the heat transport problem described by a partial differential equation to an initial‐value problem for a system of two ordinary diff…

FTCS schemeFinite volume methodDifferential equationMathematical analysisFinite difference method-Parabolic partial differential equationFinite element methodModeling and SimulationQA1-939CylinderAnalysisSIMPLE algorithmMathematicsMathematicsMathematical Modelling and Analysis
researchProduct

A fully adaptive wavelet algorithm for parabolic partial differential equations

2001

We present a fully adaptive numerical scheme for the resolution of parabolic equations. It is based on wavelet approximations of functions and operators. Following the numerical analysis in the case of linear equations, we derive a numerical algorithm essentially based on convolution operators that can be efficiently implemented as soon as a natural condition on the space of approximation is satisfied. The algorithm is extended to semi-linear equations with time dependent (adapted) spaces of approximation. Numerical experiments deal with the heat equation as well as the Burgers equation.

FTCS schemeNumerical AnalysisDifferential equationIndependent equationApplied MathematicsMathematical analysisMathematicsofComputing_NUMERICALANALYSISExponential integratorParabolic partial differential equationComputational MathematicsMultigrid methodAlgorithmMathematicsNumerical stabilityNumerical partial differential equationsApplied Numerical Mathematics
researchProduct

Diffusion front capturing schemes for a class of Fokker–Planck equations: Application to the relativistic heat equation

2010

In this research work we introduce and analyze an explicit conservative finite difference scheme to approximate the solution of initial-boundary value problems for a class of limited diffusion Fokker-Planck equations under homogeneous Neumann boundary conditions. We show stability and positivity preserving property under a Courant-Friedrichs-Lewy parabolic time step restriction. We focus on the relativistic heat equation as a model problem of the mentioned limited diffusion Fokker-Planck equations. We analyze its dynamics and observe the presence of a singular flux and an implicit combination of nonlinear effects that include anisotropic diffusion and hyperbolic transport. We present numeri…

FTCS schemeNumerical AnalysisDiffusion equationPhysics and Astronomy (miscellaneous)Anisotropic diffusionApplied MathematicsMathematical analysisComputer Science ApplicationsComputational MathematicsNonlinear systemModeling and SimulationInitial value problemFokker–Planck equationHeat equationBoundary value problemMathematicsJournal of Computational Physics
researchProduct