Search results for "Tribute"

showing 10 items of 1455 documents

Massively Parallel Huffman Decoding on GPUs

2018

Data compression is a fundamental building block in a wide range of applications. Besides its intended purpose to save valuable storage on hard disks, compression can be utilized to increase the effective bandwidth to attached storage as realized by state-of-the-art file systems. In the foreseeing future, on-the-fly compression and decompression will gain utmost importance for the processing of data-intensive applications such as streamed Deep Learning tasks or Next Generation Sequencing pipelines, which establishes the need for fast parallel implementations. Huffman coding is an integral part of a number of compression methods. However, efficient parallel implementation of Huffman decompre…

020203 distributed computingComputer sciencebusiness.industryDeep learning020206 networking & telecommunicationsData_CODINGANDINFORMATIONTHEORY02 engineering and technologyParallel computingHuffman codingsymbols.namesakeCUDATitan (supercomputer)0202 electrical engineering electronic engineering information engineeringsymbolsArtificial intelligencebusinessMassively parallelData compressionProceedings of the 47th International Conference on Parallel Processing
researchProduct

Wireless NoC for Inter-FPGA Communication: Theoretical Case for Future Datacenters

2020

Integration of FPGAs in datacenters might have different motivations from acceleration to energy efficiency, but the goal of better performance tops all. FPGAs are being utilized in a variety of ways today, tightly coupled with heterogenous computing resources, and as a standalone network of homogenous resources. Open source software stacks, propriety tool chain, and programming languages with advanced methodologies are hitting hard on the programmability wall of the FPGAs. The deployment of FPGAs in datacenters will neither be sustainable nor economical, without realizing the multi-tenancy in multiple FPGAs. Inter-FPGA communication among multiple FPGAs remained relatively less addressed p…

020203 distributed computingComputer sciencebusiness.industryWireless networkDistributed computingCloud computing02 engineering and technologyVirtualizationcomputer.software_genreBottleneck020202 computer hardware & architectureSoftware deployment0202 electrical engineering electronic engineering information engineeringWireless[INFO]Computer Science [cs]businessField-programmable gate arraycomputerComputingMilieux_MISCELLANEOUSEfficient energy use2020 IEEE 23rd International Multitopic Conference (INMIC)
researchProduct

Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct

2020

Blockchain is a multiparty protocol to reach agreement on the order of events, and to record them consistently and immutably without centralized trust. In some cases, however, the blockchain can benefit from some controlled mutability. Examples include removing private information or unlawful content, and correcting protocol vulnerabilities which would otherwise require a hard fork. Two approaches to control the mutability are: moderation, where one or more designated administrators can use their private keys to approve a redaction, and voting, where miners can vote to endorse a suggested redaction. In this paper, we first present several attacks against existing redactable blockchain solut…

020203 distributed computingComputer sciencemedia_common.quotation_subject02 engineering and technologyConstruct (python library)RedactionComputer securitycomputer.software_genreDigital signatureOrder (exchange)020204 information systemsVoting0202 electrical engineering electronic engineering information engineeringFork (file system)Protocol (object-oriented programming)computerPrivate information retrievalmedia_common
researchProduct

Security and Privacy in Wireless IoT

2018

The 13 articles in this special section focus on security and privacy in wireless Internet of Things (IoT). IoT is a paradigm that involves networked physical objects with embedded technologies to collect, communicate, sense, and interact with the external environment through wireless or wired connections. With rapid advancements in IoT technology, the number of IoT devices is expected to surpass 50 billion by 2020, which has also drawn the attention of attackers who seek to exploit the merits of this new technology for their own benefits. There are many potential security and privacy threats to IoT, such as attacks against IoT systems and unauthorized access to private information of end u…

020203 distributed computingExploitEnd userbusiness.industryWireless networkComputer scienceNetwork security020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreComputer Science Applications0202 electrical engineering electronic engineering information engineeringWirelessEnergy supplyElectrical and Electronic EngineeringInternet of ThingsbusinessPrivate information retrievalcomputerIEEE Wireless Communications
researchProduct

Smart urbanism

2020

A characteristic of intelligent cities is urban development where local and national governments regulate land use plans in order to efficiently plan and control urban and real state growth.This article describes the case of use in urban licensing in the government of Colombia in which a digitalization system was designed and developed in the public administration where data collection, storage and analysis are carried out to control urban licensing in 37 cities of Colombia. The system allows visual and statistical analysis of the urban growth of the cities.The results obtained by the system have allowed to improve the control and legality of the construction licenses in Colombia and has co…

020203 distributed computingGovernmentData collectionLand useComputer scienceControl (management)02 engineering and technologyPlan (drawing)Principle of legalityUrban planning0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingUrbanismEnvironmental planningProceedings of the 10th Euro-American Conference on Telematics and Information Systems
researchProduct

Thorough analysis of Raspberry Pi devices in outdoor/indoor communications in terms of QoS

2020

The proliferation of commercial low-cost Small Board Computers (SBC) devices have allowed the deployment of many Wireless Sensor Networks (WSN) focused on different applications, mainly based on monitoring issues. These networks are characterized by a set of these SBCs devices working in a collaborative way where each device is sensing, processing and later sending out the data to the sink. These devices are equipped with power supply, a processing unit and communications capabilities (in particular WiFi), making themselves very interesting to fit in many topologies. However, their performance in terms of communications basically depends on the environment and usually heuristic techniques a…

020203 distributed computingHeuristic (computer science)Computer scienceQuality of serviceReal-time computing02 engineering and technologyNetwork topology0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRay tracing (graphics)Wireless sensor networkThroughput (business)Multipath propagationJitterProceedings of the 10th Euro-American Conference on Telematics and Information Systems
researchProduct

A segmentation algorithm for noisy images

2005

International audience; This paper presents a segmentation algorithm for gray-level images and addresses issues related to its performance on noisy images. It formulates an image segmentation problem as a partition of a weighted image neighborhood hypergraph. To overcome the computational difficulty of directly solving this problem, a multilevel hypergraph partitioning has been used. To evaluate the algorithm, we have studied how noise affects the performance of the algorithm. The alpha-stable noise is considered and its effects on the algorithm are studied. Key words : graph, hypergraph, neighborhood hypergraph, multilevel hypergraph partitioning, image segmentation and noise removal.

020203 distributed computingHypergraphMathematics::Combinatorics[ INFO ] Computer Science [cs]Computer sciencebusiness.industrySegmentation-based object categorizationComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONScale-space segmentationImage processing02 engineering and technologyImage segmentation[INFO] Computer Science [cs]020202 computer hardware & architectureComputer Science::Computer Vision and Pattern Recognition0202 electrical engineering electronic engineering information engineeringGraph (abstract data type)SegmentationComputer vision[INFO]Computer Science [cs]Artificial intelligencebusinessAlgorithmMathematicsofComputing_DISCRETEMATHEMATICS
researchProduct

Rings for Privacy: an Architecture for Large Scale Privacy-Preserving Data Mining

2021

This article proposes a new architecture for privacy-preserving data mining based on Multi Party Computation (MPC) and secure sums. While traditional MPC approaches rely on a small number of aggregation peers replacing a centralized trusted entity, the current study puts forth a distributed solution that involves all data sources in the aggregation process, with the help of a single server for storing intermediate results. A large-scale scenario is examined and the possibility that data become inaccessible during the aggregation process is considered, a possibility that traditional schemes often neglect. Here, it is explicitly examined, as it might be provoked by intermittent network connec…

020203 distributed computingInformation privacyDistributed databasesDistributed databaseSettore ING-INF/03 - TelecomunicazioniComputer scienceReliability (computer networking)Secure Multi-Party Computation02 engineering and technologycomputer.software_genreSecret sharingData Mining; Data privacy; Distributed databases; Peer-to-peer computing; Secret sharing; Secure Multi-Party ComputationComputational Theory and MathematicsHardware and ArchitectureServerSignal Processing0202 electrical engineering electronic engineering information engineeringSecure multi-party computationData MiningData miningPeer-to-peer computingC-means data mining Privacy secret sharing secure multi-party computationSecret sharingcomputerData privacy
researchProduct

Image retrieval system for citizen services using penalized logistic regression models

2020

This paper describes a procedure to deal with large image collections obtained by smart city services based on interaction with citizens providing pictures. The semantic gap between the low-level image features and represented concepts and situations has been addressed using image retrieval techniques. A relevance feedback procedure is proposed for Content-Based Image Retrieval (CBIR) based on the modelling of user responses. One of the novelties of the proposal is that the feedback learning procedure can use the information that citizens themselves can provide when using these services.The proposed algorithm considers the probability of an image belonging to the set of those sought by the …

020203 distributed computingInformation retrievalComputer scienceRelevance feedback02 engineering and technologyLogistic regressionImage (mathematics)Set (abstract data type)Smart city0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingHigh dimensionalityImage retrievalSemantic gapProceedings of the 10th Euro-American Conference on Telematics and Information Systems
researchProduct

Combining congested-flow isolation and injection throttling in HPC interconnection networks

2011

Existing congestion control mechanisms in interconnects can be divided into two general approaches. One is to throttle traffic injection at the sources that contribute to congestion, and the other is to isolate the congested traffic in specially designated resources. These two approaches have different, but non-overlapping weaknesses. In this paper we present in detail a method that combines injection throttling and congested-flow isolation. Through simulation studies we first demonstrate the respective flaws of the injection throttling and of flow isolation. Thereafter we show that our combined method extracts the best of both approaches in the sense that it gives fast reaction to congesti…

020203 distributed computingInterconnectionbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSFlow (psychology)020206 networking & telecommunications02 engineering and technologyBandwidth throttlingThrottleNetwork congestion0202 electrical engineering electronic engineering information engineeringIsolation (database systems)businessCombined methodComputer network
researchProduct