首页 > 最新文献

IEEE Transactions on Emerging Topics in Computing最新文献

英文 中文
A Virtual Reality Perceptual Study of Multi-Technique Redirected Walking Method 多技术重定向行走方法的虚拟现实感知研究
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-09 DOI: 10.1109/TETC.2024.3471249
Jesus Mayor;Laura Raya;Sofia Bayona;Alberto Sanchez
Within virtual reality experiences, locomotion methods manage the user’s movement within the virtual environment. The use of natural locomotion, common in virtual reality, can be limited in video games with large scenarios. Thus, video games with gamepad or teleport-based locomotion methods are gaining importance. Redirected walking methods focus on maximizing the exploitation of the real workspace. As the user moves in the real environment, subtle modifications are applied to that movement within the virtual environment. Although the results of the Multi-Technique Redirected Walking (MTRW) method that combines the application of four gain algorithms are promising, a perceptual evaluation with users is needed to determine its suitability. This article presents the perceptual evaluation of the presence and cybersickness factors for the MTRW method, comparing it with a Fully Natural Walking (FNW) method. The presence factor was measured with the Igroup Presence Questionnaire (IPQ), and no significant differences in the overall presence score were detected between the FNW and the MTRW methods. The cybersickness factor was measured using the Simulator Sickness Questionnaire (SSQ) and, this time, significant differences in cybersickness between the two locomotion methods were obtained. The potential increase in cybersickness should be weighed against the benefit of maximizing workspace utilization.
在虚拟现实体验中,运动方法管理用户在虚拟环境中的运动。在虚拟现实中常见的自然运动在大型场景的视频游戏中可能会受到限制。因此,带有手柄或基于传送的移动方法的电子游戏变得越来越重要。重定向步行方法侧重于最大限度地利用实际工作空间。当用户在真实环境中移动时,会对虚拟环境中的移动进行细微的修改。虽然多技术重定向行走(MTRW)方法结合了四种增益算法的应用,结果很有希望,但需要用户的感知评估来确定其适用性。本文介绍了MTRW方法的存在和晕动因素的感知评价,并将其与完全自然行走(FNW)方法进行了比较。使用iggroup在场问卷(IPQ)测量在场因子,FNW和MTRW两种方法在总体在场得分上无显著差异。晕动症因子采用模拟晕动症问卷(SSQ)进行测量,这一次,两种运动方式在晕动症方面存在显著差异。晕机的潜在增加应该与最大限度地利用工作空间的好处进行权衡。
{"title":"A Virtual Reality Perceptual Study of Multi-Technique Redirected Walking Method","authors":"Jesus Mayor;Laura Raya;Sofia Bayona;Alberto Sanchez","doi":"10.1109/TETC.2024.3471249","DOIUrl":"https://doi.org/10.1109/TETC.2024.3471249","url":null,"abstract":"Within virtual reality experiences, locomotion methods manage the user’s movement within the virtual environment. The use of natural locomotion, common in virtual reality, can be limited in video games with large scenarios. Thus, video games with gamepad or teleport-based locomotion methods are gaining importance. Redirected walking methods focus on maximizing the exploitation of the real workspace. As the user moves in the real environment, subtle modifications are applied to that movement within the virtual environment. Although the results of the Multi-Technique Redirected Walking (MTRW) method that combines the application of four gain algorithms are promising, a perceptual evaluation with users is needed to determine its suitability. This article presents the perceptual evaluation of the presence and cybersickness factors for the MTRW method, comparing it with a Fully Natural Walking (FNW) method. The presence factor was measured with the Igroup Presence Questionnaire (IPQ), and no significant differences in the overall presence score were detected between the FNW and the MTRW methods. The cybersickness factor was measured using the Simulator Sickness Questionnaire (SSQ) and, this time, significant differences in cybersickness between the two locomotion methods were obtained. The potential increase in cybersickness should be weighed against the benefit of maximizing workspace utilization.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"604-613"},"PeriodicalIF":5.4,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10713064","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145051022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HiT-CIM: A High-Throughput Compute-in-Memory SRAM Architecture With Simultaneous Weight Loading/Computing and Balance Capabilities HiT-CIM:具有同时负载/计算和平衡能力的高吞吐量内存SRAM架构
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-09 DOI: 10.1109/TETC.2024.3471176
Junzhan Liu;Sifan Sun;Liang Zhang;Lichuan Luo;Liang Ran;He Zhang;Wang Kang;Weisheng Zhao
In the post-Moore's era, compute-in-memory (CIM) techniques are promising to break the memory wall. In particular, SRAM-based CIMs (SRAM-CIMs) have attracted widespread attention owing to its good scalability with advanced process. At present, a rich variety of works focus on energy-efficiency improvement by either designing different bit-cell structures or optimizing circuit/chip architectures. However, owing to the CIM's primitive property to store one of the operands in the memory bit-cells, substantial computing resource is wasted by suspension during the operands loading procedure. In this article, a high-throughput SRAM-CIM (HiT-CIM) architecture with simultaneous weight loading and computing capabilities is proposed by integrating on-chip nonvolatile MRAM (magnetic random-access memory). Meanwhile, both the mainstream current-domain and charge-domain SRAM bit-cell structures are optimized to support such an architecture. Furthermore, a reconfigurable fully-pipelined MRAM is designed to provide fast data loading in HiT-CIM, which can finetune weight loading strategy rapidly for different neural network models. Afterwards, an optimal evaluation and configuration strategy is proposed to improve the macro-level performance by considering the key components and parameters in terms of SRAM array, ADC, MRAM structure and frequency. Finally, the HiT-CIM's feasibility is verified under a 40-nm foundry's process. The results show that a multiple-fold speed improvement can be obtained on VGG19, ResNet18 and MobileNetV1, respectively. In specific, the area efficiency of HiT-CIM on VGG19 achieves 1124 GOPS/mm$^{2}$ and 1880.12 GOPS/mm$^{2}$ for the current-domain and charge-domain SRAM-CIMs, respectively. Up to 5.3× improvement is realized compared with prior works.
在后摩尔时代,内存计算(CIM)技术有望打破内存墙。特别是基于sram的CIMs (SRAM-CIMs)由于其良好的可扩展性和先进的工艺而受到广泛关注。目前,通过设计不同的位单元结构或优化电路/芯片架构,各种各样的工作都集中在提高能效方面。但是,由于CIM的基本属性是将其中一个操作数存储在内存位单元中,因此在操作数加载过程中由于挂起而浪费了大量计算资源。本文通过集成片上非易失性MRAM(磁性随机存取存储器),提出了一种具有同时称重加载和计算能力的高吞吐量SRAM-CIM (HiT-CIM)架构。同时,主流的电流域和电荷域SRAM位元结构都进行了优化,以支持这种架构。此外,设计了一个可重构的全流水线MRAM,在HiT-CIM中提供快速的数据加载,可以快速调整不同神经网络模型的权重加载策略。然后,从SRAM阵列、ADC、MRAM结构和频率等关键部件和参数出发,提出了一种优化评估和配置策略,以提高宏观性能。最后,在40纳米晶圆厂工艺下验证了HiT-CIM的可行性。结果表明,在VGG19、ResNet18和MobileNetV1上分别可以获得数倍的速度提升。其中,HiT-CIM在VGG19上的面积效率分别为1124 GOPS/mm$^{2}$和1880.12 GOPS/mm$^{2}$。与以前的工作相比,实现了5.3倍的改进。
{"title":"HiT-CIM: A High-Throughput Compute-in-Memory SRAM Architecture With Simultaneous Weight Loading/Computing and Balance Capabilities","authors":"Junzhan Liu;Sifan Sun;Liang Zhang;Lichuan Luo;Liang Ran;He Zhang;Wang Kang;Weisheng Zhao","doi":"10.1109/TETC.2024.3471176","DOIUrl":"https://doi.org/10.1109/TETC.2024.3471176","url":null,"abstract":"In the post-Moore's era, compute-in-memory (CIM) techniques are promising to break the memory wall. In particular, SRAM-based CIMs (SRAM-CIMs) have attracted widespread attention owing to its good scalability with advanced process. At present, a rich variety of works focus on energy-efficiency improvement by either designing different bit-cell structures or optimizing circuit/chip architectures. However, owing to the CIM's primitive property to store one of the operands in the memory bit-cells, substantial computing resource is wasted by suspension during the operands loading procedure. In this article, a high-throughput SRAM-CIM (HiT-CIM) architecture with simultaneous weight loading and computing capabilities is proposed by integrating on-chip nonvolatile MRAM (magnetic random-access memory). Meanwhile, both the mainstream current-domain and charge-domain SRAM bit-cell structures are optimized to support such an architecture. Furthermore, a reconfigurable fully-pipelined MRAM is designed to provide fast data loading in HiT-CIM, which can finetune weight loading strategy rapidly for different neural network models. Afterwards, an optimal evaluation and configuration strategy is proposed to improve the macro-level performance by considering the key components and parameters in terms of SRAM array, ADC, MRAM structure and frequency. Finally, the HiT-CIM's feasibility is verified under a 40-nm foundry's process. The results show that a multiple-fold speed improvement can be obtained on VGG19, ResNet18 and MobileNetV1, respectively. In specific, the area efficiency of HiT-CIM on VGG19 achieves 1124 GOPS/mm<inline-formula><tex-math>$^{2}$</tex-math></inline-formula> and 1880.12 GOPS/mm<inline-formula><tex-math>$^{2}$</tex-math></inline-formula> for the current-domain and charge-domain SRAM-CIMs, respectively. Up to 5.3× improvement is realized compared with prior works.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 4","pages":"1396-1409"},"PeriodicalIF":5.4,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145674712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic Network Socialization: An Adaptive Spatio-Temporal Graph Convolutional Network for Traffic Prediction 交通网络社会化:用于交通预测的自适应时空图卷积网络
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-07 DOI: 10.1109/TETC.2024.3471629
Rong Wang;Miaofei Li;Jiankuan Zhao;Anyu Cheng;Chaolong Jia
Accurate traffic prediction is important for developing intelligent transportation system (ITS). We take inspiration from the graph convolutional network (GCN) technology of link prediction in social networks. Traffic and social networks are similar in the link prediction structure. Link prediction in social networks is related to user information and topology information; moreover, the future traffic flow of nodes is related to neighbor nodes and historical traffic flow. This study proposes an adaptive spatio-temporal GCN for traffic prediction based on similarities in the link prediction structure. First, considering the traffic flow data socialization problem, the road network nodes are compared to users in social networks, and the relationship between users is mapped to spatial correlation in traffic flow data. Furthermore, because of the hidden spatial dependence between road network nodes, an enhancing GCN based on an adaptive adjacency matrix is developed to enhance system robustness. Second, aiming at the dynamic spatio-temporal correlation of traffic data, the dynamic spatio-temporal graph module (DST-graph module) is proposed, which is based on the modeling ability of the transformer for long time series. The module captures the dynamic spatio-temporal correlation and the long-term temporal dependence. Finally, a gate fusion module is designed to effectively integrate the learned temporal-spatial features of traffic flow to improve system robustness and prediction accuracy. Multiple experiments have been performed on four real-world datasets. The results show that, compared with other baseline methods, the proposed model achieves additional accuracy for long-term traffic flow under complex traffic conditions.
准确的交通预测对智能交通系统的发展具有重要意义。我们从社交网络中链接预测的图卷积网络(GCN)技术中获得灵感。流量和社交网络在链接预测结构上是相似的。社交网络中的链接预测与用户信息和拓扑信息有关;此外,节点的未来交通流与相邻节点和历史交通流有关。本文提出了一种基于链路预测结构相似性的自适应时空GCN流量预测方法。首先,考虑交通流数据社会化问题,将路网节点比作社交网络中的用户,并将用户之间的关系映射到交通流数据中的空间相关性;在此基础上,针对路网节点间隐藏的空间依赖性,提出了一种基于自适应邻接矩阵的增强GCN算法,增强了系统的鲁棒性。其次,针对交通数据的动态时空相关性,提出了基于变压器长时间序列建模能力的动态时空图模块(dst图模块)。该模块捕获了动态时空相关性和长期时间依赖性。最后,设计栅极融合模块,有效整合学习到的交通流时空特征,提高系统的鲁棒性和预测精度。在四个真实数据集上进行了多次实验。结果表明,与其他基线方法相比,该模型对复杂交通条件下的长期交通流具有更高的精度。
{"title":"Traffic Network Socialization: An Adaptive Spatio-Temporal Graph Convolutional Network for Traffic Prediction","authors":"Rong Wang;Miaofei Li;Jiankuan Zhao;Anyu Cheng;Chaolong Jia","doi":"10.1109/TETC.2024.3471629","DOIUrl":"https://doi.org/10.1109/TETC.2024.3471629","url":null,"abstract":"Accurate traffic prediction is important for developing intelligent transportation system (ITS). We take inspiration from the graph convolutional network (GCN) technology of link prediction in social networks. Traffic and social networks are similar in the link prediction structure. Link prediction in social networks is related to user information and topology information; moreover, the future traffic flow of nodes is related to neighbor nodes and historical traffic flow. This study proposes an adaptive spatio-temporal GCN for traffic prediction based on similarities in the link prediction structure. First, considering the traffic flow data socialization problem, the road network nodes are compared to users in social networks, and the relationship between users is mapped to spatial correlation in traffic flow data. Furthermore, because of the hidden spatial dependence between road network nodes, an enhancing GCN based on an adaptive adjacency matrix is developed to enhance system robustness. Second, aiming at the dynamic spatio-temporal correlation of traffic data, the dynamic spatio-temporal graph module (DST-graph module) is proposed, which is based on the modeling ability of the transformer for long time series. The module captures the dynamic spatio-temporal correlation and the long-term temporal dependence. Finally, a gate fusion module is designed to effectively integrate the learned temporal-spatial features of traffic flow to improve system robustness and prediction accuracy. Multiple experiments have been performed on four real-world datasets. The results show that, compared with other baseline methods, the proposed model achieves additional accuracy for long-term traffic flow under complex traffic conditions.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 4","pages":"1481-1496"},"PeriodicalIF":5.4,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145729313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NGQR: A Novel Generalized Quantum Image Representation NGQR:一种新的广义量子图像表示
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-07 DOI: 10.1109/TETC.2024.3471086
Zheng Xing;Xiaochen Yuan;Chan-Tong Lam;Penousal Machado
To address the size limitations of existing quantum image models in terms of accurate image representation, as well as inaccurate image operation and retrieval, we propose a Novel Generalized Quantum Image Representation (NGQR) for images of arbitrary size and type. For generalizing the size model, we first propose the Perception-Aided Encoding (PE) method to perceive the target qubits in the quantum information. Based on PE, we propose the quantum image representation PE-NGQR, which accurately ignores redundant information thereby targeting valid pixels for operations and retrieval. Then, to accurately represent the needed pixel information without redundancy, we propose the Coherent-Size Encoding (CE) method. The CE can encode an arbitrary number of quantum states. Based on CE, we propose CE-NGQR, a quantum image model capable of accurate image representation, processing and retrieval. Specifically, we describe in detail the concept, representation and quantum circuits of NGQR. We provide detailed quantum circuits and simulations of NGQR-based operations and geometric transformations. Moreover, NGQR enables flexible quantum image scaling. We illustrate the complementarity of the proposed PE-NGQR and CE-NGQR through complexity simulations and clarify the respective applicability scenarios. Finally, comparisons and analyses with existing quantum image models demonstrate the versatility and flexibility advantages of NGQR.
为了解决现有量子图像模型在精确图像表示方面的尺寸限制,以及图像操作和检索的不准确性,我们提出了一种适用于任意大小和类型图像的新型广义量子图像表示(NGQR)。为了推广尺寸模型,我们首先提出了感知辅助编码(PE)方法来感知量子信息中的目标量子比特。在此基础上,我们提出了量子图像表示PE- ngqr,它可以精确地忽略冗余信息,从而针对有效像素进行操作和检索。然后,为了在没有冗余的情况下准确地表示所需的像素信息,我们提出了相干尺寸编码(Coherent-Size Encoding, CE)方法。CE可以编码任意数量的量子态。在此基础上,我们提出了一种能够精确表示、处理和检索图像的量子图像模型CE- ngqr。具体来说,我们详细描述了NGQR的概念、表示和量子电路。我们提供了详细的量子电路和基于ngqr的操作和几何变换的模拟。此外,NGQR实现了灵活的量子图像缩放。我们通过复杂性仿真说明了所提出的PE-NGQR和CE-NGQR的互补性,并阐明了各自的适用场景。最后,通过与现有量子图像模型的比较分析,证明了NGQR的通用性和灵活性优势。
{"title":"NGQR: A Novel Generalized Quantum Image Representation","authors":"Zheng Xing;Xiaochen Yuan;Chan-Tong Lam;Penousal Machado","doi":"10.1109/TETC.2024.3471086","DOIUrl":"https://doi.org/10.1109/TETC.2024.3471086","url":null,"abstract":"To address the size limitations of existing quantum image models in terms of accurate image representation, as well as inaccurate image operation and retrieval, we propose a Novel Generalized Quantum Image Representation (NGQR) for images of arbitrary size and type. For generalizing the size model, we first propose the Perception-Aided Encoding (PE) method to perceive the target qubits in the quantum information. Based on PE, we propose the quantum image representation PE-NGQR, which accurately ignores redundant information thereby targeting valid pixels for operations and retrieval. Then, to accurately represent the needed pixel information without redundancy, we propose the Coherent-Size Encoding (CE) method. The CE can encode an arbitrary number of quantum states. Based on CE, we propose CE-NGQR, a quantum image model capable of accurate image representation, processing and retrieval. Specifically, we describe in detail the concept, representation and quantum circuits of NGQR. We provide detailed quantum circuits and simulations of NGQR-based operations and geometric transformations. Moreover, NGQR enables flexible quantum image scaling. We illustrate the complementarity of the proposed PE-NGQR and CE-NGQR through complexity simulations and clarify the respective applicability scenarios. Finally, comparisons and analyses with existing quantum image models demonstrate the versatility and flexibility advantages of NGQR.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"591-603"},"PeriodicalIF":5.4,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145050994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Analysis of Software Aging in Relational Database System Environments 关系型数据库系统环境下软件老化的比较分析
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-07 DOI: 10.1109/TETC.2024.3471684
Herderson Couto;Fumio Machida;Gustavo Callou;Ermeson Andrade
Computer systems that operate continuously over extended periods of time can be susceptible to a phenomenon known as software aging. This phenomenon can result in the gradual depletion of computational resources and has the potential to cause performance degradation in these systems. Among the systems affected, Database Management Systems (DBMSs) are particularly crucial. The consequences of software aging in DBMSs can result in data loss, compromised database integrity, transaction failures, and negative effects on system availability. This work analyzes and compares the effects of software aging in systems using SQL Server and MySQL DBMSs. The presence of this phenomenon is confirmed through statistical analysis of memory consumption and response time degradation. Process-level analysis identified database and server processes contributing most to memory consumption. Additionally, we developed machine learning models to predict memory exhaustion in both SQL Server and MySQL environments across diverse workloads.
长时间连续运行的计算机系统容易受到软件老化现象的影响。这种现象可能导致计算资源的逐渐耗尽,并有可能导致这些系统的性能下降。在受影响的系统中,数据库管理系统(dbms)尤为重要。dbms中软件老化的后果可能导致数据丢失、数据库完整性受损、事务失败以及对系统可用性的负面影响。本文分析和比较了使用SQL Server和MySQL数据库管理系统的系统中软件老化的影响。通过对内存消耗和响应时间退化的统计分析,可以证实这种现象的存在。进程级分析确定了对内存消耗贡献最大的数据库和服务器进程。此外,我们开发了机器学习模型来预测不同工作负载下SQL Server和MySQL环境中的内存耗尽情况。
{"title":"A Comparative Analysis of Software Aging in Relational Database System Environments","authors":"Herderson Couto;Fumio Machida;Gustavo Callou;Ermeson Andrade","doi":"10.1109/TETC.2024.3471684","DOIUrl":"https://doi.org/10.1109/TETC.2024.3471684","url":null,"abstract":"Computer systems that operate continuously over extended periods of time can be susceptible to a phenomenon known as software aging. This phenomenon can result in the gradual depletion of computational resources and has the potential to cause performance degradation in these systems. Among the systems affected, Database Management Systems (DBMSs) are particularly crucial. The consequences of software aging in DBMSs can result in data loss, compromised database integrity, transaction failures, and negative effects on system availability. This work analyzes and compares the effects of software aging in systems using SQL Server and MySQL DBMSs. The presence of this phenomenon is confirmed through statistical analysis of memory consumption and response time degradation. Process-level analysis identified database and server processes contributing most to memory consumption. Additionally, we developed machine learning models to predict memory exhaustion in both SQL Server and MySQL environments across diverse workloads.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 2","pages":"370-381"},"PeriodicalIF":5.1,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144323227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Transactions on Emerging Topics in Computing Information for Authors 电气和电子工程师学会(IEEE)《计算领域新兴专题论文》(IEEE Transactions on Emerging Topics in Computing)供作者参考的信息
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-05 DOI: 10.1109/TETC.2024.3449211
{"title":"IEEE Transactions on Emerging Topics in Computing Information for Authors","authors":"","doi":"10.1109/TETC.2024.3449211","DOIUrl":"https://doi.org/10.1109/TETC.2024.3449211","url":null,"abstract":"","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 3","pages":"C2-C2"},"PeriodicalIF":5.1,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10666934","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142143744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special Section on Emerging Social Computing 新兴社交计算专栏
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-05 DOI: 10.1109/TETC.2024.3447428
Yuan-Hao Chang;Paloma Díaz;Yunpeng Xiao
{"title":"Special Section on Emerging Social Computing","authors":"Yuan-Hao Chang;Paloma Díaz;Yunpeng Xiao","doi":"10.1109/TETC.2024.3447428","DOIUrl":"https://doi.org/10.1109/TETC.2024.3447428","url":null,"abstract":"","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 3","pages":"686-687"},"PeriodicalIF":5.1,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10666936","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142143745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DALTON - Deep Local Learning in SNNs via Local Weights and Surrogate-Derivative Transfer DALTON - 通过本地权重和代理-衍生转移在 SNN 中进行深度本地学习
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-27 DOI: 10.1109/TETC.2024.3440932
Ramashish Gaurav;Duy Anh Do;Thinh T. Doan;Yang Yi
Direct training of Spiking Neural Networks (SNNs) is a challenging task because of their inherent temporality. Added to it, the vanilla Back-propagation based methods are not applicable either, due to the non-differentiability of the spikes in SNNs. Surrogate-Derivative based methods with Back-propagation Through Time (BPTT) address these direct training challenges quite well; however, such methods are not neuromorphic-hardware friendly for the On-chip training of SNNs. Recently formalized Three-Factor based Rules (TFR) for direct local-training of SNNs are neuromorphic-hardware friendly; however, they do not effectively leverage the depth of the SNN architectures (we show it empirically here), thus, are limited. In this work, we present an improved version of a conventional three-factor rule, for local learning in SNNs which effectively leverages depth – in the context of learning features hierarchically. Taking inspiration from the Back-propagation algorithm, we theoretically derive our improved, local, three-factor based learning method, named DALTON (Deep LocAl Learning via local WeighTs and SurrOgate-Derivative TraNsfer), which employs weights and surrogate-derivative transfer from the local layers. Along the lines of TFR, our proposed method DALTON is also amenable to the neuromorphic-hardware implementation. Through extensive experiments on static (MNIST, FMNIST, & CIFAR10) and event-based (N-MNIST, DVS128-Gesture, & DVS-CIFAR10) datasets, we show that our proposed local-learning method DALTON makes effective use of the depth in Convolutional SNNs, compared to the vanilla TFR implementation.
由于其固有的时效性,直接训练脉冲神经网络是一项具有挑战性的任务。此外,由于snn中峰值的不可微性,传统的基于反向传播的方法也不适用。基于代理导数的时间反向传播(BPTT)方法很好地解决了这些直接训练挑战;然而,这些方法对于snn的片上训练来说并不是神经形态硬件友好的。最近正式提出的用于snn直接局部训练的基于三因子的规则(TFR)是神经形态和硬件友好的;然而,它们并不能有效地利用SNN体系结构的深度(我们在这里以经验来展示),因此是有限的。在这项工作中,我们提出了传统三因素规则的改进版本,用于snn的局部学习,有效地利用了深度-在分层学习特征的背景下。受反向传播算法的启发,我们从理论上推导了改进的局部三因素学习方法,称为DALTON (Deep local learning via local WeighTs and surroget -derivative TraNsfer),该方法使用了来自局部层的权重和proxy -derivative TraNsfer。与TFR类似,我们提出的DALTON方法也适用于神经形态硬件实现。通过在静态(MNIST、FMNIST和CIFAR10)和基于事件(N-MNIST、DVS128-Gesture和DVS-CIFAR10)数据集上的大量实验,我们表明,与传统的TFR实现相比,我们提出的局部学习方法DALTON有效地利用了卷积snn的深度。
{"title":"DALTON - Deep Local Learning in SNNs via Local Weights and Surrogate-Derivative Transfer","authors":"Ramashish Gaurav;Duy Anh Do;Thinh T. Doan;Yang Yi","doi":"10.1109/TETC.2024.3440932","DOIUrl":"10.1109/TETC.2024.3440932","url":null,"abstract":"Direct training of Spiking Neural Networks (SNNs) is a challenging task because of their inherent temporality. Added to it, the vanilla Back-propagation based methods are not applicable either, due to the non-differentiability of the spikes in SNNs. Surrogate-Derivative based methods with Back-propagation Through Time (BPTT) address these direct training challenges quite well; however, such methods are not neuromorphic-hardware friendly for the On-chip training of SNNs. Recently formalized Three-Factor based Rules (TFR) for direct local-training of SNNs are neuromorphic-hardware friendly; however, they do not effectively leverage the depth of the SNN architectures (we show it empirically here), thus, are limited. In this work, we present an <italic>improved version</i> of a conventional three-factor rule, for local learning in SNNs which effectively leverages depth – in the context of learning features hierarchically. Taking inspiration from the Back-propagation algorithm, we theoretically derive our improved, local, three-factor based learning method, named DALTON (<underline>D</u>eep Loc<underline>A</u>l <underline>L</u>earning via local Weigh<underline>T</u>s and Surr<underline>O</u>gate-Derivative Tra<underline>N</u>sfer), which employs <italic>weights</i> and <italic>surrogate-derivative</i> transfer from the local layers. Along the lines of TFR, our proposed method DALTON is also amenable to the neuromorphic-hardware implementation. Through extensive experiments on static (MNIST, FMNIST, & CIFAR10) and event-based (N-MNIST, DVS128-Gesture, & DVS-CIFAR10) datasets, we show that our proposed local-learning method DALTON makes <italic>effective use of the depth</i> in Convolutional SNNs, compared to the vanilla TFR implementation.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"578-590"},"PeriodicalIF":5.4,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142216773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DP-PartFIM: Frequent Itemset Mining Using Differential Privacy and Partition DP-PartFIM:利用差异隐私和分区挖掘常项集
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-26 DOI: 10.1109/TETC.2024.3443060
Xinyu Liu;Wensheng Gan;Lele Yu;Yining Liu
Itemset mining is a popular data mining technique for extracting interesting and valuable information from large datasets. However, since datasets contain sensitive private data, it is not permitted to directly mine the data or share the mining results. Previous privacy-preserving frequent itemset mining research was not efficient because of the use of privacy budgets or long transaction truncation strategies, which are impractical for large datasets. In this article, we propose a more efficient partition mining technology, DP-PartFIM, based on differential privacy, which protects privacy while mining data. DP-PartFIM uses partition mining to mine frequent itemsets and constructs vertical data storage formats for each partition, which makes the algorithm equally efficient for large datasets. To protect data privacy, DP-PartFIM adds Laplace noise to support candidate itemsets. The experimental results show that, compared with the classical privacy-preserving itemset mining methods, DP-PartFIM better guarantees data utility and privacy.
项目集挖掘是一种流行的数据挖掘技术,用于从大型数据集中提取有趣和有价值的信息。但是,由于数据集包含敏感的私有数据,因此不允许直接挖掘数据或共享挖掘结果。以往的保护隐私的频繁项集挖掘研究由于使用隐私预算或长事务截断策略而效率不高,这对于大数据集是不切实际的。在本文中,我们提出了一种更高效的基于差分隐私的分区挖掘技术DP-PartFIM,它在挖掘数据的同时保护了隐私。DP-PartFIM利用分区挖掘挖掘频繁项集,并为每个分区构建垂直的数据存储格式,使得算法对大型数据集同样高效。为了保护数据隐私,DP-PartFIM增加了拉普拉斯噪声来支持候选项集。实验结果表明,与传统的保护隐私的项集挖掘方法相比,DP-PartFIM能更好地保证数据的实用性和隐私性。
{"title":"DP-PartFIM: Frequent Itemset Mining Using Differential Privacy and Partition","authors":"Xinyu Liu;Wensheng Gan;Lele Yu;Yining Liu","doi":"10.1109/TETC.2024.3443060","DOIUrl":"10.1109/TETC.2024.3443060","url":null,"abstract":"Itemset mining is a popular data mining technique for extracting interesting and valuable information from large datasets. However, since datasets contain sensitive private data, it is not permitted to directly mine the data or share the mining results. Previous privacy-preserving frequent itemset mining research was not efficient because of the use of privacy budgets or long transaction truncation strategies, which are impractical for large datasets. In this article, we propose a more efficient partition mining technology, DP-PartFIM, based on differential privacy, which protects privacy while mining data. DP-PartFIM uses partition mining to mine frequent itemsets and constructs vertical data storage formats for each partition, which makes the algorithm equally efficient for large datasets. To protect data privacy, DP-PartFIM adds Laplace noise to support candidate itemsets. The experimental results show that, compared with the classical privacy-preserving itemset mining methods, DP-PartFIM better guarantees data utility and privacy.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"567-577"},"PeriodicalIF":5.4,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142216774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TampML: Tampering Attack Detection and Malicious Nodes Localization in NoC-Based MPSoC TampML:基于 NoC 的 MPSoC 中的篡改攻击检测和恶意节点定位
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-26 DOI: 10.1109/TETC.2024.3434663
Haoyu Wang;Basel Halak
The relentless growth in demand for computing resources has spurred the development of large-scale, high-performance chips with diverse, innovative architectures. The Network-on-Chip (NoC) paradigm has become a predominant system for on-chip communication within Multi-Processor System-on-Chip (MPSoC) designs. However, the increasing complexity and the reliance on outsourced Third-Party Intellectual Properties (3PIPs) introduce non-negligible risks of Hardware Trojan (HT) insertions by untrusted IP vendors. One of the most critical threats posed by HTs is the tampering with communication data packets. In this article, we introduce a comprehensive framework for the detection of tampering attacks and localization of HTs within NoCs. This framework is incorporated into a novel distributed monitoring architecture that leverages the NoC structure. Utilizing a machine learning model for malicious flit detection and a high-precision algorithm for HT node localization, the framework's efficacy has been substantiated through tests with real PARSEC benchmark workloads. Achieving an impressive detection accuracy and precision of 99.8% and 99.5% respectively, the framework can localize HT nodes with up to 100% precision and recall in most cases. Furthermore, the data cost of localization is on average only 3.7% of tampered flits, which is significantly more efficient—up to 11 times faster—than our initial methods. As a comprehensive and cutting-edge security solution for combating communication data tampering attacks, it accomplishes the expected performance while maintaining minimal power and hardware overhead.
对计算资源需求的持续增长刺激了具有多种创新架构的大规模高性能芯片的发展。片上网络(NoC)模式已经成为多处理器片上系统(MPSoC)设计中片上通信的主要系统。然而,日益增加的复杂性和对外包第三方知识产权(3pip)的依赖引入了不可忽视的风险,即不受信任的IP供应商插入硬件木马(HT)。高温传输造成的最严重的威胁之一是对通信数据包的篡改。在本文中,我们介绍了一个用于检测篡改攻击和在noc中定位ht的综合框架。该框架被整合到利用NoC结构的新型分布式监控体系结构中。利用机器学习模型进行恶意飞行检测和高精度HT节点定位算法,该框架的有效性已通过真实PARSEC基准工作负载的测试得到证实。该框架的检测准确度和精度分别达到99.8%和99.5%,在大多数情况下,该框架可以以高达100%的精度和召回率定位HT节点。此外,本地化的数据成本平均仅为篡改飞行的3.7%,显著提高了效率,比我们最初的方法快了11倍。作为对抗通信数据篡改攻击的全面和先进的安全解决方案,它在保持最小功耗和硬件开销的同时实现了预期的性能。
{"title":"TampML: Tampering Attack Detection and Malicious Nodes Localization in NoC-Based MPSoC","authors":"Haoyu Wang;Basel Halak","doi":"10.1109/TETC.2024.3434663","DOIUrl":"10.1109/TETC.2024.3434663","url":null,"abstract":"The relentless growth in demand for computing resources has spurred the development of large-scale, high-performance chips with diverse, innovative architectures. The Network-on-Chip (NoC) paradigm has become a predominant system for on-chip communication within Multi-Processor System-on-Chip (MPSoC) designs. However, the increasing complexity and the reliance on outsourced Third-Party Intellectual Properties (3PIPs) introduce non-negligible risks of Hardware Trojan (HT) insertions by untrusted IP vendors. One of the most critical threats posed by HTs is the tampering with communication data packets. In this article, we introduce a comprehensive framework for the detection of tampering attacks and localization of HTs within NoCs. This framework is incorporated into a novel distributed monitoring architecture that leverages the NoC structure. Utilizing a machine learning model for malicious flit detection and a high-precision algorithm for HT node localization, the framework's efficacy has been substantiated through tests with real PARSEC benchmark workloads. Achieving an impressive detection accuracy and precision of 99.8% and 99.5% respectively, the framework can localize HT nodes with up to 100% precision and recall in most cases. Furthermore, the data cost of localization is on average only 3.7% of tampered flits, which is significantly more efficient—up to 11 times faster—than our initial methods. As a comprehensive and cutting-edge security solution for combating communication data tampering attacks, it accomplishes the expected performance while maintaining minimal power and hardware overhead.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 2","pages":"551-562"},"PeriodicalIF":5.1,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142216835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Emerging Topics in Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1