Filters








306 Hits in 4.3 sec

Pervasive Sensing and Monitoring for Situational Awareness [chapter]

Sharad Mehrotra, Nalini Venkatasubramanian, Mark-Oliver Stehr, Carolyn Talcott
2012 Handbook on Securing Cyber-Physical Critical Infrastructure  
strength analysis).  ...  New programming abstractions required for programming sentient space applications that hide application programmers from having to deal with heterogeneity of sensors, low-level details of the specific  ...  situational awareness.  ... 
doi:10.1016/b978-0-12-415815-3.00020-0 fatcat:xg7a6nswn5ebzeejrwmpno4344

Mitigating inefficient task mappings with an Adaptive Resource-Moldable Scheduler (ARMS) [article]

Mustafa Abduljabbar, Mahmoud Eljammaly, Miquel Pericas
2021 arXiv   pre-print
While such approaches are viable, an adaptive scheduling strategy is preferred to enhance locality and resource sharing efficiency using a portable programming scheme.  ...  Compared to previous approaches, ARMS achieves up to 3.5x performance gain over state-of-the-art locality-aware scheduling schemes.  ...  The main hypothesis behind ARMS is that the impact of scheduling decisions can be estimated via an online performance model that is aware of the task type and of topology information that encodes the data  ... 
arXiv:2112.09509v1 fatcat:vidlzdanrvfhfp2nbqmj5kzjdy

Behavioral resource-aware model inference

Tony Ohmann, Michael Herzberg, Sebastian Fiss, Armand Halbert, Marc Palyart, Ivan Beschastnikh, Yuriy Brun
2014 Proceedings of the 29th ACM/IEEE international conference on Automated software engineering - ASE '14  
We describe Perfume, an automated approach for inferring behavioral, resource-aware models of software systems from logs of their executions.  ...  These finite state machine models ease understanding of system behavior and resource use.  ...  Perfume-inferred models may also improve software processes and various forms of program analysis.  ... 
doi:10.1145/2642937.2642988 dblp:conf/kbse/OhmannHFHPBB14 fatcat:bqri5xwl2rcabopka3mfu5gd64

[Front matter]

2021 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD)  
The members of the executive committee, the technical program committee, and numerous volunteers have spent an enormous effort to prepare an outstanding technical program.  ...  However, the organizers are leeen to provide an interesting program involving excellent technical contributions while also focusing on the networleing aspects.  ...  Object Detection for Technology Resource-Constrained Embedded Devices Jaekang Shin, Korea Advanced Institute of Science and Marina Neseem, Brown University Technology Sherief Reda, Brown University Lee-Sup  ... 
doi:10.1109/iccad51958.2021.9643527 fatcat:exsvb7o7rndtjbz3d7oziw273i

A programming system for sensor-based scientific applications

Nanyan Jiang, Manish Parashar
2010 Journal of Computational Science  
Second, it provides programming abstractions and system software support for developing in-network data processing mechanisms.  ...  semantically meaningful abstractions.  ...  Resource Aware Programming System Resource aware programming [85] is an important aspect of system software, especially for resource constraint sensor networks.  ... 
doi:10.1016/j.jocs.2010.07.006 fatcat:qqto42z3arefvnevzhcsf6dzia

Scanning the Issue

Azim Eskandarian
2020 IEEE transactions on intelligent transportation systems (Print)  
We offer a relatively simple but robust and efficient solution to generate (un)directed graphs at any level of abstraction required for their analysis.  ...  Heuristic Coarsening for Generating Multiscale Transport Networks P. Krishnakumari, O.  ...  We offer a relatively simple but robust and efficient solution to generate (un)directed graphs at any level of abstraction required for their analysis.  ... 
doi:10.1109/tits.2020.2994973 fatcat:t2vtrc5gmnba3eo3ohpdmqqjyq

The tradeoff between the utility and risk of location data and implications for public good [article]

Dan Calacci, Alex Berke, Kent Larson, Alex Pentland
2019 arXiv   pre-print
How do we rectify the clear security and safety risks of this data, its high market value, and its potential as a resource for public good?  ...  [Online].  ...  This data jeopardizes individual privacy and security, and the way it is collected often circumvents users' awareness or explicit consent.  ... 
arXiv:1905.09350v2 fatcat:px5mgsxygbh5doaknllf3rmjlq

Keeping track of user steering actions in dynamic workflows

Renan Souza, Vítor Silva, Jose J. Camata, Alvaro L.G.A. Coutinho, Patrick Valduriez, Marta Mattoso
2019 Future generations computer systems  
According to a recent report [13] , current online data analysis solutions are not aware of parameter combinations and their relations with output values. Challenge 2: Register the steering action.  ...  In previous works [15, 16] , we show how applications can benefit from online analysis for steering, supporting Challenge 1, but we are not aware of other works that have addressed the latter two challenges  ...  Also, we introduce how users can evaluate, at runtime, the impact of adaptations, through adaptation-aware online data analysis relating to provenance, domain, and execution data (Challenge 3).  ... 
doi:10.1016/j.future.2019.05.011 fatcat:hppilac4vzbl7mgwqdgv3t27ca

Automated and dynamic abstraction of MPI application performance

Anna Sikora, Tomàs Margalef, Josep Jorba
2016 Cluster Computing  
programs.  ...  Careful performance analysis and optimization are crucial.  ...  Acknowledgments The authors thankfully acknowledge the computer resources, technical expertise and assistance provided by the BSC-Marenostrum.  ... 
doi:10.1007/s10586-016-0615-4 fatcat:lkw3v52przafph2ac4fxbvhp6u

The Value of Insiders as Mentors: Evidence from the Effects of NSF Rotators on Early Career Scientists

Sebastian Hoenen, Christos Kolympiris
2019 Review of Economics and Statistics  
Our template is the National Science Foundation rotation program in which the agency employs academics, called rotators, on loan from their university.  ...  Within two years after the rotator's return, fresh assistant professors in her department increase their research resources materially and are more likely to win small and medium size grants compared to  ...  For instance, we analyze The Online Appendix includes tests that dismiss favoritism towards rotator's colleagues as the mechanism and show, via a placebo test, that the effects we observe are tied  ... 
doi:10.1162/rest_a_00859 fatcat:ixqdwhxxbffavkmfje4m2gkmp4

Do voluntary environmental programs reduce emissions? EMAS in the German manufacturing sector

Roland Kube, Kathrine von Graevenitz, Andreas Löschel, Philipp Massier
2019 Energy Economics  
Abstract Voluntary environmental management programs for firms have become an increasingly popular instrument of environmental policy.  ...  To account for the self-selection of firms, we combine the Coarsened Exact Matching approach with a Difference-in-Differences estimation.  ...  From 2003 onwards, we proxy awareness regarding low-carbon alternatives and pro-environmental attitudes of the firm via dummies that indicate usage of renewable energy (Renewables) and investments into  ... 
doi:10.1016/j.eneco.2019.104558 fatcat:4pwmcq543jerjkzlqzkxn6ihfm

Smart, adaptive mapping of parallelism in the presence of external workload

M. K. Emani, Zheng Wang, M. F. P. O'Boyle
2013 Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO)  
A mechanism for co-scheduling of memory-intensive programs is described in the work proposed in [Ebrahimi et al. 2011 ]. It proposes prefetch-aware resource management techniques.  ...  When memory-intensive threads from co-running programs are competing for computing resources on an NUMA machine, a contention-aware scheduler is built in [Blagodurov et al. 2011] .  ... 
doi:10.1109/cgo.2013.6495010 dblp:conf/cgo/EmaniWO13 fatcat:ebxa4mr5qzcp5ifbiix23eyc4u

Extending NUMA-BTLP Algorithm with Thread Mapping Based on a Communication Tree

Iulia Știrb
2018 Computers  
The algorithm gets the type of each thread in the source code based on a static analysis of the code.  ...  The paper presents a Non-Uniform Memory Access (NUMA)-aware compiler optimization for task-level parallel code.  ...  is performed online [5] .  ... 
doi:10.3390/computers7040066 fatcat:5hohl44rhvepxklvp3kjzonpwa

Computing Graph Neural Networks: A Survey from Algorithms to Accelerators [article]

Sergi Abadal, Akshay Jain, Robert Guirado, Jorge López-Alonso, Eduard Alarcón
2021 arXiv   pre-print
On the other hand, an in-depth analysis of current software and hardware acceleration schemes is provided, from which a hardware-software, graph-aware, and communication-centric vision for GNN accelerators  ...  Instead of treating this problem via abstract models as done in ROC, GNNAdvisor does an online profiling of the input graph and GNN operations to guide the memory and workload management agents at the  ...  Second, memory management is treated as a cost minimization problem and solved via an online algorithm that finds where to best store each partition.  ... 
arXiv:2010.00130v3 fatcat:u5bcmjodcfdh7pew4nssjemdba

D7.9: Hardware developments V

Alan O'Cais, Christopher Werner, Simon Wong, Padraig Ó Conbhuí, Jony Castagna, Godehard Sutmann
2020 Zenodo  
To obtain resources from the DECI program, applications should be made via the DECI calls.  ...  At this stage, accelerator programming is quite mainstream and there are many training courses available online, see for example the NVIDIA education site for material related to CUDA and OpenACC.  ... 
doi:10.5281/zenodo.3931510 fatcat:kelxr6ap5vfunpjisfpwiauwue
« Previous Showing results 1 — 15 out of 306 results