A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Pervasive Sensing and Monitoring for Situational Awareness
[chapter]
2012
Handbook on Securing Cyber-Physical Critical Infrastructure
strength analysis). ...
New programming abstractions required for programming sentient space applications that hide application programmers from having to deal with heterogeneity of sensors, low-level details of the specific ...
situational awareness. ...
doi:10.1016/b978-0-12-415815-3.00020-0
fatcat:xg7a6nswn5ebzeejrwmpno4344
Mitigating inefficient task mappings with an Adaptive Resource-Moldable Scheduler (ARMS)
[article]
2021
arXiv
pre-print
While such approaches are viable, an adaptive scheduling strategy is preferred to enhance locality and resource sharing efficiency using a portable programming scheme. ...
Compared to previous approaches, ARMS achieves up to 3.5x performance gain over state-of-the-art locality-aware scheduling schemes. ...
The main hypothesis behind ARMS is that the impact of scheduling decisions can be estimated via an online performance model that is aware of the task type and of topology information that encodes the data ...
arXiv:2112.09509v1
fatcat:vidlzdanrvfhfp2nbqmj5kzjdy
Behavioral resource-aware model inference
2014
Proceedings of the 29th ACM/IEEE international conference on Automated software engineering - ASE '14
We describe Perfume, an automated approach for inferring behavioral, resource-aware models of software systems from logs of their executions. ...
These finite state machine models ease understanding of system behavior and resource use. ...
Perfume-inferred models may also improve software processes and various forms of program analysis. ...
doi:10.1145/2642937.2642988
dblp:conf/kbse/OhmannHFHPBB14
fatcat:bqri5xwl2rcabopka3mfu5gd64
[Front matter]
2021
2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD)
The members of the executive committee, the technical program committee, and numerous volunteers have spent an enormous effort to prepare an outstanding technical program. ...
However, the organizers are leeen to provide an interesting program involving excellent technical contributions while also focusing on the networleing aspects. ...
Object Detection for Technology Resource-Constrained Embedded Devices Jaekang Shin, Korea Advanced Institute of Science and Marina Neseem, Brown University Technology Sherief Reda, Brown University Lee-Sup ...
doi:10.1109/iccad51958.2021.9643527
fatcat:exsvb7o7rndtjbz3d7oziw273i
A programming system for sensor-based scientific applications
2010
Journal of Computational Science
Second, it provides programming abstractions and system software support for developing in-network data processing mechanisms. ...
semantically meaningful abstractions. ...
Resource Aware Programming System Resource aware programming [85] is an important aspect of system software, especially for resource constraint sensor networks. ...
doi:10.1016/j.jocs.2010.07.006
fatcat:qqto42z3arefvnevzhcsf6dzia
Scanning the Issue
2020
IEEE transactions on intelligent transportation systems (Print)
We offer a relatively simple but robust and efficient solution to generate (un)directed graphs at any level of abstraction required for their analysis. ...
Heuristic Coarsening for Generating Multiscale Transport Networks P. Krishnakumari, O. ...
We offer a relatively simple but robust and efficient solution to generate (un)directed graphs at any level of abstraction required for their analysis. ...
doi:10.1109/tits.2020.2994973
fatcat:t2vtrc5gmnba3eo3ohpdmqqjyq
The tradeoff between the utility and risk of location data and implications for public good
[article]
2019
arXiv
pre-print
How do we rectify the clear security and safety risks of this data, its high market value, and its potential as a resource for public good? ...
[Online]. ...
This data jeopardizes individual privacy and security, and the way it is collected often circumvents users' awareness or explicit consent. ...
arXiv:1905.09350v2
fatcat:px5mgsxygbh5doaknllf3rmjlq
Keeping track of user steering actions in dynamic workflows
2019
Future generations computer systems
According to a recent report [13] , current online data analysis solutions are not aware of parameter combinations and their relations with output values. Challenge 2: Register the steering action. ...
In previous works [15, 16] , we show how applications can benefit from online analysis for steering, supporting Challenge 1, but we are not aware of other works that have addressed the latter two challenges ...
Also, we introduce how users can evaluate, at runtime, the impact of adaptations, through adaptation-aware online data analysis relating to provenance, domain, and execution data (Challenge 3). ...
doi:10.1016/j.future.2019.05.011
fatcat:hppilac4vzbl7mgwqdgv3t27ca
Automated and dynamic abstraction of MPI application performance
2016
Cluster Computing
programs. ...
Careful performance analysis and optimization are crucial. ...
Acknowledgments The authors thankfully acknowledge the computer resources, technical expertise and assistance provided by the BSC-Marenostrum. ...
doi:10.1007/s10586-016-0615-4
fatcat:lkw3v52przafph2ac4fxbvhp6u
The Value of Insiders as Mentors: Evidence from the Effects of NSF Rotators on Early Career Scientists
2019
Review of Economics and Statistics
Our template is the National Science Foundation rotation program in which the agency employs academics, called rotators, on loan from their university. ...
Within two years after the rotator's return, fresh assistant professors in her department increase their research resources materially and are more likely to win small and medium size grants compared to ...
For instance, we analyze
The Online Appendix includes tests that dismiss favoritism towards rotator's colleagues as the mechanism and show, via a placebo test, that the effects we observe are tied ...
doi:10.1162/rest_a_00859
fatcat:ixqdwhxxbffavkmfje4m2gkmp4
Do voluntary environmental programs reduce emissions? EMAS in the German manufacturing sector
2019
Energy Economics
Abstract Voluntary environmental management programs for firms have become an increasingly popular instrument of environmental policy. ...
To account for the self-selection of firms, we combine the Coarsened Exact Matching approach with a Difference-in-Differences estimation. ...
From 2003 onwards, we proxy awareness regarding low-carbon alternatives and pro-environmental attitudes of the firm via dummies that indicate usage of renewable energy (Renewables) and investments into ...
doi:10.1016/j.eneco.2019.104558
fatcat:4pwmcq543jerjkzlqzkxn6ihfm
Smart, adaptive mapping of parallelism in the presence of external workload
2013
Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO)
A mechanism for co-scheduling of memory-intensive programs is described in the work proposed in [Ebrahimi et al. 2011 ]. It proposes prefetch-aware resource management techniques. ...
When memory-intensive threads from co-running programs are competing for computing resources on an NUMA machine, a contention-aware scheduler is built in [Blagodurov et al. 2011] . ...
doi:10.1109/cgo.2013.6495010
dblp:conf/cgo/EmaniWO13
fatcat:ebxa4mr5qzcp5ifbiix23eyc4u
Extending NUMA-BTLP Algorithm with Thread Mapping Based on a Communication Tree
2018
Computers
The algorithm gets the type of each thread in the source code based on a static analysis of the code. ...
The paper presents a Non-Uniform Memory Access (NUMA)-aware compiler optimization for task-level parallel code. ...
is performed online [5] . ...
doi:10.3390/computers7040066
fatcat:5hohl44rhvepxklvp3kjzonpwa
Computing Graph Neural Networks: A Survey from Algorithms to Accelerators
[article]
2021
arXiv
pre-print
On the other hand, an in-depth analysis of current software and hardware acceleration schemes is provided, from which a hardware-software, graph-aware, and communication-centric vision for GNN accelerators ...
Instead of treating this problem via abstract models as done in ROC, GNNAdvisor does an online profiling of the input graph and GNN operations to guide the memory and workload management agents at the ...
Second, memory management is treated as a cost minimization problem and solved via an online algorithm that finds where to best store each partition. ...
arXiv:2010.00130v3
fatcat:u5bcmjodcfdh7pew4nssjemdba
D7.9: Hardware developments V
2020
Zenodo
To obtain resources from the DECI program, applications should be made via the DECI calls. ...
At this stage, accelerator programming is quite mainstream and there are many training courses available online, see for example the NVIDIA education site for material related to CUDA and OpenACC. ...
doi:10.5281/zenodo.3931510
fatcat:kelxr6ap5vfunpjisfpwiauwue
« Previous
Showing results 1 — 15 out of 306 results