Filters








12,281 Hits in 7.4 sec

Discovery of Potential Parallelism in Sequential Programs

Zhen Li, Ali Jannesari, Felix Wolf
2013 2013 42nd International Conference on Parallel Processing  
The data-dependence profiler serves as the foundation of the parallelism discovery framework. Traditional dependence profiling approaches introduce a tremendous amount of time and memory overhead.  ...  Zia Ul Huda, a sincere friend who shared the same office with me for more than three years, made key contributions to DiscoPoP on parallel pattern detection.  ...  To the best of our knowledge, it is an open problem of dependence-based parallelism discovery approaches.  ... 
doi:10.1109/icpp.2013.119 dblp:conf/icpp/LiJW13 fatcat:6dc5s2ao4rhv7avxb4oai77hoi

Massively parallel acceleration of a document-similarity classifier to detect web attacks

Craig Ulmer, Maya Gokhale, Brian Gallagher, Philip Top, Tina Eliassi-Rad
2011 Journal of Parallel and Distributed Computing  
In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented  ...  The TFIDF classifier is used to detect web attacks in HTTP data.  ...  Parallel implementations The TFIDF method offers a novel approach to detecting malicious web HTTP requests.  ... 
doi:10.1016/j.jpdc.2010.07.005 fatcat:s677czskm5a3fk7xgbnde56jea

◾ Knowledge Discovery Applications [chapter]

2012 Service-Oriented Distributed Knowledge Discovery  
This series aims to capture new developments and applications in data mining and knowledge discovery, while summarizing the computational tools and techniques useful in data analysis.  ...  The scope of the series includes, but is not limited to, titles in the areas of data mining and knowledge discovery methods and applications, modeling, algorithms, theory and foundations, data and knowledge  ...  Acknowledgments We would like to thank the colleagues who cooperated with us on the research themes of this book.  ... 
doi:10.1201/b12990-15 fatcat:vte5ahxzbvgizetdwimfxfic54

Signal Processing Challenges and Examples for in-situ Transmission Electron Microscopy [article]

Josh Kacher, Yao Xie, Sven P. Voigt, Shixiang Zhu, Henry Yuchi, Jordan Key, Surya R. Kalidindi
2021 arXiv   pre-print
Recent advances in data collection technology for TEM have enabled high-volume and high-resolution data collection at a microsecond frame rate.  ...  In this paper, we highlight a few areas in materials science that have benefited from combining signal processing and statistical analysis with data collection capabilities in TEM and present a future  ...  Consider the sequential change-point detection problem that the underlying distribution of the data changes from a known state to an unknown state after at an unknown change-point ν.  ... 
arXiv:2104.08688v2 fatcat:gofufjq7cvh2tnhg3u5w5so454

Recognising the dynamic form of fire

Fintan Nagle, Alan Johnston
2021 Scientific Reports  
Increased errors with embedded sequence length were driven by positive responses to non-target sequences (false alarms) rather than omissions.  ...  We also suggest that prediction could provide a means of providing and evaluating evidence in a sequential analysis model.  ...  This sequential analysis approach also admits the occurrence of false positives for patterns that are similar to the target pattern, since it is stochastic and based on partial evidence.  ... 
doi:10.1038/s41598-021-89453-4 pmid:34011973 fatcat:23i5mttjrjelrormkexgtb7cnm

Integrating profile-driven parallelism detection and machine-learning-based mapping

Zheng Wang, Georgios Tournavitis, Björn Franke, Michael F. P. O'boyle
2014 ACM Transactions on Architecture and Code Optimization (TACO)  
Compiler-based auto-parallelization is a much studied area, but has yet to find wide-spread application.  ...  We have identified two weaknesses in traditional parallelizing compilers and propose a novel, integrated approach, resulting in significant performance improvements of the generated parallel code.  ...  Column 2 in table IV shows the number of loops our approach detects as potentially parallel. The column labeled FP ("false positive") shows how many of these were in fact sequential.  ... 
doi:10.1145/2579561 fatcat:x5b7hvxjgrgjnmyk3pozdrtzye

A fast PC algorithm for high dimensional causal discovery with multi-core PCs

Thuc Le, Tao Hoang, Jiuyong Li, Lin Liu, Huawen Liu, Shu Hu
2018 IEEE/ACM Transactions on Computational Biology & Bioinformatics  
Discovering causal relationships from observational data is a crucial problem and it has applications in many research areas.  ...  to finish within around 12 hours with a 4-core CPU computer, and less than 6 hours with a 8-core CPU computer.  ...  However, the results from these heuristic methods may involve a high rate of false discoveries.  ... 
doi:10.1109/tcbb.2016.2591526 pmid:27429444 fatcat:fiai6kihzzdl7p5szayu5pt76u

Computational Methods for Detecting Large-Scale Structural Rearrangements in Chromosomes [chapter]

Muneeba Jilani, Nurit Haspel
2021 Bioinformatics  
This chapter is a survey of computational methods based on paired end reading, efficient search techniques and parallel computing to detect structural variants in both whole genome and transcriptome sequences  ...  Due to the massive amounts of data and the fact that structural variants account for just a small fraction of the data, efficient and accurate search methods are required for the detection of chromosomal  ...  It is possible to analyze the NGS data for the detection of boundaries of CNV regions on a chromosome or a genome by phrasing the problem as a statistical change point detection problem presented in the  ... 
doi:10.36255/exonpublications.bioinformatics.2021.ch3 fatcat:u4hshjk2ofb2nmq37v5m7xv7ja

Automated Testing of WS-BPEL Service Compositions: A Scenario-Oriented Approach

Chang-ai Sun, Yan Zhao, Lin Pan, Huai Liu, Tsong Yueh Chen
2018 IEEE Transactions on Services Computing  
The experimental results show that the automatic scenario-oriented testing approach is effective in detecting many types of faults seeded in the service compositions.  ...  In this paper, we propose a scenario-oriented testing approach that can automatically generate test cases for service compositions.  ...  The other metric, fault discovery rate, is also natural and straightforward to reflect how effective a test suite is in detecting a certain fault.  ... 
doi:10.1109/tsc.2015.2466572 fatcat:bapkwygwcbhqvo6lse65le3niy

A Review of Rule Learning Based Intrusion Detection Systems and Their Prospects in Smart Grids

Qi Liu, Veit Hagenmeyer, Hubert B. Keller
2021 IEEE Access  
Despite the fact that anomaly based IDS can detect novel attacks, they are not often deployed in industry, mainly owing to high false positive rate and lack of interpretability of trained models.  ...  With misuse based IDS' inability to detect unknown attacks and requirement for frequently manually crafting and updating signatures and with anomaly based IDS' bad reputation for high false alarm rate,  ...  The worst false positive rate is 4.2% while keeping a 100% detection rate.  ... 
doi:10.1109/access.2021.3071263 fatcat:4knmfd4yezhabkbnsl5ahdt2bi

Cloud4SNP

Giuseppe Agapito, Mario Cannataro, Pietro Hiram Guzzi, Fabrizio Marozzo, Domenico Talia, Paolo Trunfio
2007 Proceedings of the International Conference on Bioinformatics, Computational Biology and Biomedical Informatics - BCB'13  
The paper presents the design and experimentation of Cloud4SNP, a novel Cloud-based bioinformatics tool for the parallel preprocessing and statistical analysis of pharmacogenomics SNP microarray data.  ...  SNPs data, produced by microarray platforms, need to be preprocessed and analyzed in order to find correlation between the presence/absence of SNPs and the toxicity or efficacy of a drug.  ...  Moreover, different statistical corrections such as Bonferroni, False Discovery Rate, or none correction, can be applied in parallel on the Cloud, allowing the user to choice among different statistical  ... 
doi:10.1145/2506583.2506605 dblp:conf/bcb/AgapitoCGMTT13 fatcat:dbno35zp3ra6jj3phwhurcbzga

Saliency Detection: A Spectral Residual Approach

Xiaodi Hou, Liqing Zhang
2007 2007 IEEE Conference on Computer Vision and Pattern Recognition  
The ability of human visual system to detect visual saliency is extraordinarily fast and reliable. However, computational modeling of this basic intelligent behavior still remains a challenge.  ...  This paper presents a simple method for the visual saliency detection. Our model is independent of features, categories, or other forms of prior knowledge of the objects.  ...  The selection of threshold is a trade-off problem between false alarm and neglect of objects. A brief discussion of this problem is provided in Section 4.1.  ... 
doi:10.1109/cvpr.2007.383267 dblp:conf/cvpr/HouZ07 fatcat:2axgtd3olnfgbnao6zfau2bscq

Vessel-guided airway tree segmentation: A voxel classification approach

Pechin Lo, Jon Sporring, Haseem Ashraf, Jesper J.H. Pedersen, Marleen de Bruijne
2010 Medical Image Analysis  
We propose a voxel classification approach for the appearance model, which uses a classifier that is trained to differentiate between airway and non-airway voxels.  ...  A vessel orientation similarity measure is introduced, which indicates how similar the orientation of an airway candidate is to the orientation of the neighboring vessel.  ...  The voxel classification based methods resulted in higher false discovery rate compared to intensity based method, but it must be noted that a slightly higher false discovery rate may actually be desirable  ... 
doi:10.1016/j.media.2010.03.004 pmid:20395163 fatcat:smo77sq7bvhdpjuygbkog6alha

On the Fusion of Text Detection Results: A Genetic Programming Approach

Jose L. Flores Campana, Allan Pinto, Manuel Cordova Neira, Luis G. L. Decker, Andreza Santos, Jhonatas S. Conceicao, Ricardo da Silva Torres
2020 IEEE Access  
INDEX TERMS Scene text detection, multi-oriented text, convolutional neural network, data fusion, genetic programming.  ...  both false positives and negatives.  ...  ACKNOWLEDGMENT The authors would like to thank Samsung R&D Institute, Brazil.  ... 
doi:10.1109/access.2020.2987869 fatcat:fcxoeuvonbdjtlvvzpclvs22de

SNAPS: Semantic network traffic analysis through projection and selection

Bram C.M. Cappers, Jarke J. van Wijk
2015 2015 IEEE Symposium on Visualization for Cyber Security (VizSec)  
In SNAPS (Semantic Network traffic Analysis through Projection and Selection), we provide a bottom-up pixel-oriented approach for network traffic analysis where the expert starts with low-level anomalies  ...  However, to detect security breaches that are specifically designed to target one network (e.g., Advanced Persistent Threats), deep packet inspection and anomaly detection are indispensible.  ...  ACKNOWLEDGMENTS This work is funded by SpySpot, a project in the Cyber Security program of Netherlands Organisation for Scientific Research (NWO).  ... 
doi:10.1109/vizsec.2015.7312768 dblp:conf/vizsec/CappersW15 fatcat:odzwew3d7fcgfodr4t2nhsrsai
« Previous Showing results 1 — 15 out of 12,281 results