Search results for "Tribute"
showing 10 items of 1455 documents
Massively Parallel Huffman Decoding on GPUs
2018
Data compression is a fundamental building block in a wide range of applications. Besides its intended purpose to save valuable storage on hard disks, compression can be utilized to increase the effective bandwidth to attached storage as realized by state-of-the-art file systems. In the foreseeing future, on-the-fly compression and decompression will gain utmost importance for the processing of data-intensive applications such as streamed Deep Learning tasks or Next Generation Sequencing pipelines, which establishes the need for fast parallel implementations. Huffman coding is an integral part of a number of compression methods. However, efficient parallel implementation of Huffman decompre…
Wireless NoC for Inter-FPGA Communication: Theoretical Case for Future Datacenters
2020
Integration of FPGAs in datacenters might have different motivations from acceleration to energy efficiency, but the goal of better performance tops all. FPGAs are being utilized in a variety of ways today, tightly coupled with heterogenous computing resources, and as a standalone network of homogenous resources. Open source software stacks, propriety tool chain, and programming languages with advanced methodologies are hitting hard on the programmability wall of the FPGAs. The deployment of FPGAs in datacenters will neither be sustainable nor economical, without realizing the multi-tenancy in multiple FPGAs. Inter-FPGA communication among multiple FPGAs remained relatively less addressed p…
Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct
2020
Blockchain is a multiparty protocol to reach agreement on the order of events, and to record them consistently and immutably without centralized trust. In some cases, however, the blockchain can benefit from some controlled mutability. Examples include removing private information or unlawful content, and correcting protocol vulnerabilities which would otherwise require a hard fork. Two approaches to control the mutability are: moderation, where one or more designated administrators can use their private keys to approve a redaction, and voting, where miners can vote to endorse a suggested redaction. In this paper, we first present several attacks against existing redactable blockchain solut…
Security and Privacy in Wireless IoT
2018
The 13 articles in this special section focus on security and privacy in wireless Internet of Things (IoT). IoT is a paradigm that involves networked physical objects with embedded technologies to collect, communicate, sense, and interact with the external environment through wireless or wired connections. With rapid advancements in IoT technology, the number of IoT devices is expected to surpass 50 billion by 2020, which has also drawn the attention of attackers who seek to exploit the merits of this new technology for their own benefits. There are many potential security and privacy threats to IoT, such as attacks against IoT systems and unauthorized access to private information of end u…
Smart urbanism
2020
A characteristic of intelligent cities is urban development where local and national governments regulate land use plans in order to efficiently plan and control urban and real state growth.This article describes the case of use in urban licensing in the government of Colombia in which a digitalization system was designed and developed in the public administration where data collection, storage and analysis are carried out to control urban licensing in 37 cities of Colombia. The system allows visual and statistical analysis of the urban growth of the cities.The results obtained by the system have allowed to improve the control and legality of the construction licenses in Colombia and has co…
Thorough analysis of Raspberry Pi devices in outdoor/indoor communications in terms of QoS
2020
The proliferation of commercial low-cost Small Board Computers (SBC) devices have allowed the deployment of many Wireless Sensor Networks (WSN) focused on different applications, mainly based on monitoring issues. These networks are characterized by a set of these SBCs devices working in a collaborative way where each device is sensing, processing and later sending out the data to the sink. These devices are equipped with power supply, a processing unit and communications capabilities (in particular WiFi), making themselves very interesting to fit in many topologies. However, their performance in terms of communications basically depends on the environment and usually heuristic techniques a…
A segmentation algorithm for noisy images
2005
International audience; This paper presents a segmentation algorithm for gray-level images and addresses issues related to its performance on noisy images. It formulates an image segmentation problem as a partition of a weighted image neighborhood hypergraph. To overcome the computational difficulty of directly solving this problem, a multilevel hypergraph partitioning has been used. To evaluate the algorithm, we have studied how noise affects the performance of the algorithm. The alpha-stable noise is considered and its effects on the algorithm are studied. Key words : graph, hypergraph, neighborhood hypergraph, multilevel hypergraph partitioning, image segmentation and noise removal.
Rings for Privacy: an Architecture for Large Scale Privacy-Preserving Data Mining
2021
This article proposes a new architecture for privacy-preserving data mining based on Multi Party Computation (MPC) and secure sums. While traditional MPC approaches rely on a small number of aggregation peers replacing a centralized trusted entity, the current study puts forth a distributed solution that involves all data sources in the aggregation process, with the help of a single server for storing intermediate results. A large-scale scenario is examined and the possibility that data become inaccessible during the aggregation process is considered, a possibility that traditional schemes often neglect. Here, it is explicitly examined, as it might be provoked by intermittent network connec…
Image retrieval system for citizen services using penalized logistic regression models
2020
This paper describes a procedure to deal with large image collections obtained by smart city services based on interaction with citizens providing pictures. The semantic gap between the low-level image features and represented concepts and situations has been addressed using image retrieval techniques. A relevance feedback procedure is proposed for Content-Based Image Retrieval (CBIR) based on the modelling of user responses. One of the novelties of the proposal is that the feedback learning procedure can use the information that citizens themselves can provide when using these services.The proposed algorithm considers the probability of an image belonging to the set of those sought by the …
Combining congested-flow isolation and injection throttling in HPC interconnection networks
2011
Existing congestion control mechanisms in interconnects can be divided into two general approaches. One is to throttle traffic injection at the sources that contribute to congestion, and the other is to isolate the congested traffic in specially designated resources. These two approaches have different, but non-overlapping weaknesses. In this paper we present in detail a method that combines injection throttling and congested-flow isolation. Through simulation studies we first demonstrate the respective flaws of the injection throttling and of flow isolation. Thereafter we show that our combined method extracts the best of both approaches in the sense that it gives fast reaction to congesti…