A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Discovery of Potential Parallelism in Sequential Programs
2013
2013 42nd International Conference on Parallel Processing
The data-dependence profiler serves as the foundation of the parallelism discovery framework. Traditional dependence profiling approaches introduce a tremendous amount of time and memory overhead. ...
Zia Ul Huda, a sincere friend who shared the same office with me for more than three years, made key contributions to DiscoPoP on parallel pattern detection. ...
To the best of our knowledge, it is an open problem of dependence-based parallelism discovery approaches. ...
doi:10.1109/icpp.2013.119
dblp:conf/icpp/LiJW13
fatcat:6dc5s2ao4rhv7avxb4oai77hoi
Massively parallel acceleration of a document-similarity classifier to detect web attacks
2011
Journal of Parallel and Distributed Computing
In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented ...
The TFIDF classifier is used to detect web attacks in HTTP data. ...
Parallel implementations The TFIDF method offers a novel approach to detecting malicious web HTTP requests. ...
doi:10.1016/j.jpdc.2010.07.005
fatcat:s677czskm5a3fk7xgbnde56jea
◾ Knowledge Discovery Applications
[chapter]
2012
Service-Oriented Distributed Knowledge Discovery
This series aims to capture new developments and applications in data mining and knowledge discovery, while summarizing the computational tools and techniques useful in data analysis. ...
The scope of the series includes, but is not limited to, titles in the areas of data mining and knowledge discovery methods and applications, modeling, algorithms, theory and foundations, data and knowledge ...
Acknowledgments We would like to thank the colleagues who cooperated with us on the research themes of this book. ...
doi:10.1201/b12990-15
fatcat:vte5ahxzbvgizetdwimfxfic54
Signal Processing Challenges and Examples for in-situ Transmission Electron Microscopy
[article]
2021
arXiv
pre-print
Recent advances in data collection technology for TEM have enabled high-volume and high-resolution data collection at a microsecond frame rate. ...
In this paper, we highlight a few areas in materials science that have benefited from combining signal processing and statistical analysis with data collection capabilities in TEM and present a future ...
Consider the sequential change-point detection problem that the underlying distribution of the data changes from a known state to an unknown state after at an unknown change-point ν. ...
arXiv:2104.08688v2
fatcat:gofufjq7cvh2tnhg3u5w5so454
Recognising the dynamic form of fire
2021
Scientific Reports
Increased errors with embedded sequence length were driven by positive responses to non-target sequences (false alarms) rather than omissions. ...
We also suggest that prediction could provide a means of providing and evaluating evidence in a sequential analysis model. ...
This sequential analysis approach also admits the occurrence of false positives for patterns that are similar to the target pattern, since it is stochastic and based on partial evidence. ...
doi:10.1038/s41598-021-89453-4
pmid:34011973
fatcat:23i5mttjrjelrormkexgtb7cnm
Integrating profile-driven parallelism detection and machine-learning-based mapping
2014
ACM Transactions on Architecture and Code Optimization (TACO)
Compiler-based auto-parallelization is a much studied area, but has yet to find wide-spread application. ...
We have identified two weaknesses in traditional parallelizing compilers and propose a novel, integrated approach, resulting in significant performance improvements of the generated parallel code. ...
Column 2 in table IV shows the number of loops our approach detects as potentially parallel. The column labeled FP ("false positive") shows how many of these were in fact sequential. ...
doi:10.1145/2579561
fatcat:x5b7hvxjgrgjnmyk3pozdrtzye
A fast PC algorithm for high dimensional causal discovery with multi-core PCs
2018
IEEE/ACM Transactions on Computational Biology & Bioinformatics
Discovering causal relationships from observational data is a crucial problem and it has applications in many research areas. ...
to finish within around 12 hours with a 4-core CPU computer, and less than 6 hours with a 8-core CPU computer. ...
However, the results from these heuristic methods may involve a high rate of false discoveries. ...
doi:10.1109/tcbb.2016.2591526
pmid:27429444
fatcat:fiai6kihzzdl7p5szayu5pt76u
Computational Methods for Detecting Large-Scale Structural Rearrangements in Chromosomes
[chapter]
2021
Bioinformatics
This chapter is a survey of computational methods based on paired end reading, efficient search techniques and parallel computing to detect structural variants in both whole genome and transcriptome sequences ...
Due to the massive amounts of data and the fact that structural variants account for just a small fraction of the data, efficient and accurate search methods are required for the detection of chromosomal ...
It is possible to analyze the NGS data for the detection of boundaries of CNV regions on a chromosome or a genome by phrasing the problem as a statistical change point detection problem presented in the ...
doi:10.36255/exonpublications.bioinformatics.2021.ch3
fatcat:u4hshjk2ofb2nmq37v5m7xv7ja
Automated Testing of WS-BPEL Service Compositions: A Scenario-Oriented Approach
2018
IEEE Transactions on Services Computing
The experimental results show that the automatic scenario-oriented testing approach is effective in detecting many types of faults seeded in the service compositions. ...
In this paper, we propose a scenario-oriented testing approach that can automatically generate test cases for service compositions. ...
The other metric, fault discovery rate, is also natural and straightforward to reflect how effective a test suite is in detecting a certain fault. ...
doi:10.1109/tsc.2015.2466572
fatcat:bapkwygwcbhqvo6lse65le3niy
A Review of Rule Learning Based Intrusion Detection Systems and Their Prospects in Smart Grids
2021
IEEE Access
Despite the fact that anomaly based IDS can detect novel attacks, they are not often deployed in industry, mainly owing to high false positive rate and lack of interpretability of trained models. ...
With misuse based IDS' inability to detect unknown attacks and requirement for frequently manually crafting and updating signatures and with anomaly based IDS' bad reputation for high false alarm rate, ...
The worst false positive rate is 4.2% while keeping a 100% detection rate. ...
doi:10.1109/access.2021.3071263
fatcat:4knmfd4yezhabkbnsl5ahdt2bi
Cloud4SNP
2007
Proceedings of the International Conference on Bioinformatics, Computational Biology and Biomedical Informatics - BCB'13
The paper presents the design and experimentation of Cloud4SNP, a novel Cloud-based bioinformatics tool for the parallel preprocessing and statistical analysis of pharmacogenomics SNP microarray data. ...
SNPs data, produced by microarray platforms, need to be preprocessed and analyzed in order to find correlation between the presence/absence of SNPs and the toxicity or efficacy of a drug. ...
Moreover, different statistical corrections such as Bonferroni, False Discovery Rate, or none correction, can be applied in parallel on the Cloud, allowing the user to choice among different statistical ...
doi:10.1145/2506583.2506605
dblp:conf/bcb/AgapitoCGMTT13
fatcat:dbno35zp3ra6jj3phwhurcbzga
Saliency Detection: A Spectral Residual Approach
2007
2007 IEEE Conference on Computer Vision and Pattern Recognition
The ability of human visual system to detect visual saliency is extraordinarily fast and reliable. However, computational modeling of this basic intelligent behavior still remains a challenge. ...
This paper presents a simple method for the visual saliency detection. Our model is independent of features, categories, or other forms of prior knowledge of the objects. ...
The selection of threshold is a trade-off problem between false alarm and neglect of objects. A brief discussion of this problem is provided in Section 4.1. ...
doi:10.1109/cvpr.2007.383267
dblp:conf/cvpr/HouZ07
fatcat:2axgtd3olnfgbnao6zfau2bscq
Vessel-guided airway tree segmentation: A voxel classification approach
2010
Medical Image Analysis
We propose a voxel classification approach for the appearance model, which uses a classifier that is trained to differentiate between airway and non-airway voxels. ...
A vessel orientation similarity measure is introduced, which indicates how similar the orientation of an airway candidate is to the orientation of the neighboring vessel. ...
The voxel classification based methods resulted in higher false discovery rate compared to intensity based method, but it must be noted that a slightly higher false discovery rate may actually be desirable ...
doi:10.1016/j.media.2010.03.004
pmid:20395163
fatcat:smo77sq7bvhdpjuygbkog6alha
On the Fusion of Text Detection Results: A Genetic Programming Approach
2020
IEEE Access
INDEX TERMS Scene text detection, multi-oriented text, convolutional neural network, data fusion, genetic programming. ...
both false positives and negatives. ...
ACKNOWLEDGMENT The authors would like to thank Samsung R&D Institute, Brazil. ...
doi:10.1109/access.2020.2987869
fatcat:fcxoeuvonbdjtlvvzpclvs22de
SNAPS: Semantic network traffic analysis through projection and selection
2015
2015 IEEE Symposium on Visualization for Cyber Security (VizSec)
In SNAPS (Semantic Network traffic Analysis through Projection and Selection), we provide a bottom-up pixel-oriented approach for network traffic analysis where the expert starts with low-level anomalies ...
However, to detect security breaches that are specifically designed to target one network (e.g., Advanced Persistent Threats), deep packet inspection and anomaly detection are indispensible. ...
ACKNOWLEDGMENTS This work is funded by SpySpot, a project in the Cyber Security program of Netherlands Organisation for Scientific Research (NWO). ...
doi:10.1109/vizsec.2015.7312768
dblp:conf/vizsec/CappersW15
fatcat:odzwew3d7fcgfodr4t2nhsrsai
« Previous
Showing results 1 — 15 out of 12,281 results