首页 > 最新文献

2014 IEEE 17th International Conference on Computational Science and Engineering最新文献

英文 中文
NSCC: Self-Service Network Security Architecture for Cloud Computing 面向云计算的自助式网络安全架构
Jin He, M. Dong, K. Ota, Minyu Fan, Guangwei Wang
Modern cloud computing platforms based on virtual machine monitors carry a variety of complex business that present many network security vulnerabilities. At present, the traditional architecture employs a number of security devices at front-end of cloud computing to protect its network security. Under the new environment, however, this approach can not meet the needs of cloud security. New cloud security vendors and academia also made great efforts to solve network security of cloud computing, unfortunately, they also cannot provide a perfect and effective method to solve this problem. We introduce a novel network security architecture for cloud computing (NSCC) that addresses this problem. NSCC not only provides an effective solution for network security issues of cloud computing, but also greatly improves in scalability, fault-tolerant, resource utilization, etc. We have implemented a proof-of-concept prototype about NSCC and proved by experiments that NSCC is an effective architecture with minimal performance overhead that can be applied to the extensive practical promotion in cloud computing.
基于虚拟机监视器的现代云计算平台承载着各种复杂的业务,存在着许多网络安全漏洞。目前,传统架构在云计算前端采用了大量的安全设备来保护其网络安全。然而,在新的环境下,这种方式已经不能满足云安全的需求。新的云安全厂商和学术界也为解决云计算的网络安全做出了巨大的努力,但遗憾的是,他们也无法提供一个完美有效的方法来解决这一问题。我们介绍了一种新的云计算网络安全架构(NSCC)来解决这个问题。NSCC不仅为云计算的网络安全问题提供了有效的解决方案,而且在可扩展性、容错性、资源利用率等方面都有了很大的提高。我们已经实现了一个关于NSCC的概念验证原型,并通过实验证明了NSCC是一个性能开销最小的有效架构,可以应用于云计算中的广泛实际推广。
{"title":"NSCC: Self-Service Network Security Architecture for Cloud Computing","authors":"Jin He, M. Dong, K. Ota, Minyu Fan, Guangwei Wang","doi":"10.1109/CSE.2014.109","DOIUrl":"https://doi.org/10.1109/CSE.2014.109","url":null,"abstract":"Modern cloud computing platforms based on virtual machine monitors carry a variety of complex business that present many network security vulnerabilities. At present, the traditional architecture employs a number of security devices at front-end of cloud computing to protect its network security. Under the new environment, however, this approach can not meet the needs of cloud security. New cloud security vendors and academia also made great efforts to solve network security of cloud computing, unfortunately, they also cannot provide a perfect and effective method to solve this problem. We introduce a novel network security architecture for cloud computing (NSCC) that addresses this problem. NSCC not only provides an effective solution for network security issues of cloud computing, but also greatly improves in scalability, fault-tolerant, resource utilization, etc. We have implemented a proof-of-concept prototype about NSCC and proved by experiments that NSCC is an effective architecture with minimal performance overhead that can be applied to the extensive practical promotion in cloud computing.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125890041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Algorithm for Fractional Order System Identification 分数阶系统辨识的一种算法
Xixiao Liu, Guishu Liang
In this paper, a new algorithm for fractional order system identification is set up. We study the structure of vector fitting and give a decomposition through the computational instance. In the vector fitting method, we use the complex least-square method to instead least-square method when calculating the residues and dealing with the errors based on vector fitting. And the rational fractional function has been extended from integer field to fractional domain. For validity, a comparison between the original and the present method is conducted.
本文提出了一种新的分数阶系统辨识算法。研究了向量拟合的结构,并通过计算实例给出了向量拟合的分解。在向量拟合方法中,我们使用复最小二乘法来代替最小二乘法来计算残差和处理基于向量拟合的误差。并将有理分数函数从整数域推广到分数域。为了验证其有效性,对原方法和本方法进行了比较。
{"title":"An Algorithm for Fractional Order System Identification","authors":"Xixiao Liu, Guishu Liang","doi":"10.1109/CSE.2014.46","DOIUrl":"https://doi.org/10.1109/CSE.2014.46","url":null,"abstract":"In this paper, a new algorithm for fractional order system identification is set up. We study the structure of vector fitting and give a decomposition through the computational instance. In the vector fitting method, we use the complex least-square method to instead least-square method when calculating the residues and dealing with the errors based on vector fitting. And the rational fractional function has been extended from integer field to fractional domain. For validity, a comparison between the original and the present method is conducted.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124629539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
HPC Environment on Azure Cloud for Hydrological Parameter Estimation 基于Azure云的水文参数估算HPC环境
Guangjun Zhang, Yingying Yao, C. Zheng
High performance of data-intensive computation is required to deal with the complexity of analysis and simulation for hydrological modeling jobs like parameter estimation. The vigorously developing cloud computing has emerged as a promising platform for HPC (High Performance Computing) of science community. This paper presents our work in developing and implementing HPC environment on Azure cloud for applications of hydrological parameter estimation. According to the requirements of hydrological modeling, we design and construct a HPC environment on Azure cloud. After deploying parameter estimation applications on the HPC environment, a case study on groundwater uncertainty analysis in Heihe River Basin using the HPC environment is presented. Our work demonstrates that Azure cloud can advantageously complement traditional high performance computing infrastructure and help hydrological researchers improve model computing efficiency by handy process steps.
参数估计等水文建模工作需要高性能的数据密集型计算来处理复杂的分析和模拟。蓬勃发展的云计算已经成为科学界高性能计算(HPC)的一个很有前途的平台。本文介绍了我们在Azure云上开发和实现用于水文参数估计应用的高性能计算环境的工作。根据水文建模的要求,我们在Azure云上设计并构建了一个HPC环境。在HPC环境下部署参数估计应用后,以黑河流域为例,利用HPC环境进行了地下水不确定性分析。我们的工作表明,Azure云可以有利地补充传统的高性能计算基础设施,并帮助水文研究人员通过方便的过程步骤提高模型计算效率。
{"title":"HPC Environment on Azure Cloud for Hydrological Parameter Estimation","authors":"Guangjun Zhang, Yingying Yao, C. Zheng","doi":"10.1109/CSE.2014.83","DOIUrl":"https://doi.org/10.1109/CSE.2014.83","url":null,"abstract":"High performance of data-intensive computation is required to deal with the complexity of analysis and simulation for hydrological modeling jobs like parameter estimation. The vigorously developing cloud computing has emerged as a promising platform for HPC (High Performance Computing) of science community. This paper presents our work in developing and implementing HPC environment on Azure cloud for applications of hydrological parameter estimation. According to the requirements of hydrological modeling, we design and construct a HPC environment on Azure cloud. After deploying parameter estimation applications on the HPC environment, a case study on groundwater uncertainty analysis in Heihe River Basin using the HPC environment is presented. Our work demonstrates that Azure cloud can advantageously complement traditional high performance computing infrastructure and help hydrological researchers improve model computing efficiency by handy process steps.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125061280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PeerDigger: Digging Stealthy P2P Hosts through Traffic Analysis in Real-Time PeerDigger:通过实时流量分析挖掘隐秘的P2P主机
Jie He, Yuexiang Yang, Xiaolei Wang, Chuan Tang, Yingzhi Zeng
P2P technology has been widely applied in many areas due to its excellent properties. Some botnets also shift towards the decentralized architectures, since they provide a better resiliency against detection and takedown efforts. Besides, modern P2P bots tend to run on compromised hosts in a stealthy way, which renders most existing approaches ineffective. In addition, few approaches address the problem of real-time detection. However, it is important to detect bots as soon as possible in order to minimize their harm. In this paper, we propose Peer Digger, a novel real-time system capable of detecting stealthy P2P bots. Peer Digger first detects all P2P hosts base on several basic properties of flow records, and then distinguishes P2P bots from benign P2P hosts by analyzing their network behavior patterns. The experimental results demonstrate that our system is able to identity P2P bots with an average TPR of 98.07% and an average FPR of 1.5% within 4 minutes.
P2P技术以其优异的性能在许多领域得到了广泛的应用。一些僵尸网络也转向分散式架构,因为它们提供了更好的抵御检测和拆除工作的弹性。此外,现代P2P机器人倾向于以一种隐蔽的方式在受损主机上运行,这使得大多数现有方法无效。此外,很少有方法解决实时检测问题。然而,为了尽量减少它们的危害,尽快检测机器人是很重要的。在本文中,我们提出了Peer Digger,一个能够检测隐身P2P机器人的新型实时系统。Peer Digger首先根据流量记录的几个基本属性来检测所有P2P主机,然后通过分析P2P主机的网络行为模式来区分P2P僵尸主机和良性P2P主机。实验结果表明,我们的系统能够在4分钟内识别出平均TPR为98.07%,平均FPR为1.5%的P2P机器人。
{"title":"PeerDigger: Digging Stealthy P2P Hosts through Traffic Analysis in Real-Time","authors":"Jie He, Yuexiang Yang, Xiaolei Wang, Chuan Tang, Yingzhi Zeng","doi":"10.1109/CSE.2014.283","DOIUrl":"https://doi.org/10.1109/CSE.2014.283","url":null,"abstract":"P2P technology has been widely applied in many areas due to its excellent properties. Some botnets also shift towards the decentralized architectures, since they provide a better resiliency against detection and takedown efforts. Besides, modern P2P bots tend to run on compromised hosts in a stealthy way, which renders most existing approaches ineffective. In addition, few approaches address the problem of real-time detection. However, it is important to detect bots as soon as possible in order to minimize their harm. In this paper, we propose Peer Digger, a novel real-time system capable of detecting stealthy P2P bots. Peer Digger first detects all P2P hosts base on several basic properties of flow records, and then distinguishes P2P bots from benign P2P hosts by analyzing their network behavior patterns. The experimental results demonstrate that our system is able to identity P2P bots with an average TPR of 98.07% and an average FPR of 1.5% within 4 minutes.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129458005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Parallel Construction of Independent Spanning Trees on Parity Cubes 奇偶体上独立生成树的并行构造
Yu-Huei Chang, Jinn-Shyong Yang, Jou-Ming Chang, Yue-Li Wang
Zehavi and Itai (1989) proposed the following conjecture: every k-connected graph has k independent spanning trees (ISTs for short) rooted at an arbitrary node. An n-dimensional parity cube, denoted by PQn, is a variation of hyper cubes with connectivity n and has many features superior to those of hyper cubes. Recently, Wang et al. (2012) confirm the ISTs conjecture by providing an O(N log N) algorithm to construct n ISTs rooted at an arbitrary node on PQn, where N=2n is the number of nodes in PQn. However, this algorithm is executed in a recursive fashion and thus is hard to be parallelized. In this paper, we present a non-recursive and fully parallelized approach to construct n ISTs rooted at an arbitrary node of PQn in O(log N) time using N processors. In particular, the constructing rule of spanning trees is simple and the proof of independency is easier than ever before.
Zehavi和Itai(1989)提出了以下猜想:每个k连通图在任意节点上都有k棵独立的生成树(简称ISTs)。用PQn表示的n维奇偶校验立方体是连通度为n的超立方体的一种变体,它具有许多优于超立方体的特征。最近,Wang et al.(2012)提供了一种O(N log N)算法来构造N个ist猜想,该算法在PQn上的任意节点上构造N个ist,其中N=2n为PQn中的节点数。然而,这种算法是以递归的方式执行的,因此很难并行化。在本文中,我们提出了一种非递归的、完全并行的方法,在O(log n)时间内使用n个处理器在PQn的任意节点上构造n个ist。特别是生成树的构造规则简单,独立性的证明比以往任何时候都容易。
{"title":"Parallel Construction of Independent Spanning Trees on Parity Cubes","authors":"Yu-Huei Chang, Jinn-Shyong Yang, Jou-Ming Chang, Yue-Li Wang","doi":"10.1109/CSE.2014.225","DOIUrl":"https://doi.org/10.1109/CSE.2014.225","url":null,"abstract":"Zehavi and Itai (1989) proposed the following conjecture: every k-connected graph has k independent spanning trees (ISTs for short) rooted at an arbitrary node. An n-dimensional parity cube, denoted by PQn, is a variation of hyper cubes with connectivity n and has many features superior to those of hyper cubes. Recently, Wang et al. (2012) confirm the ISTs conjecture by providing an O(N log N) algorithm to construct n ISTs rooted at an arbitrary node on PQn, where N=2n is the number of nodes in PQn. However, this algorithm is executed in a recursive fashion and thus is hard to be parallelized. In this paper, we present a non-recursive and fully parallelized approach to construct n ISTs rooted at an arbitrary node of PQn in O(log N) time using N processors. In particular, the constructing rule of spanning trees is simple and the proof of independency is easier than ever before.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128234356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Time-Domain Dictionary for Sparse Representation of Radar High Resolution Range Profile 雷达高分辨率距离像稀疏表示的时域字典
Jinrong Zhong, G. Wen, Conghui Ma, Boyuan Ding
The Dictionary is the most important basis of sparse representation which is the key issue of sparse component analysis and compressed sensing. Most of the existing dictionaries are constructed in frequency domain. This paper presented a novel dictionary constructed in time domain for radar signal representation based on geometrical theory of diffraction (GTD) model. Since Radar signal is distributed non-uniformly in time domain, the low-energy part of time responses can be cut-off with insignificant energy loss. As a result, the time-domain dictionary (TD) can be viewed as a sparse matrix, which can save memory and reduce computation complexity greatly, compared with frequency domain dictionaries. Finally, experimental results demonstrate the effectiveness and superiority of the time-domain dictionary.
稀疏表示是稀疏分量分析和压缩感知的关键问题,字典是稀疏表示的重要基础。现有的词典大多是在频域构造的。提出了一种基于几何衍射理论(GTD)模型的雷达信号时域表示字典。由于雷达信号在时域上的分布不均匀,可以在能量损失不大的情况下截断时间响应的低能量部分。因此,时域字典(TD)可以看作是一个稀疏矩阵,与频域字典相比,可以大大节省内存和降低计算复杂度。最后,通过实验验证了该时域词典的有效性和优越性。
{"title":"Time-Domain Dictionary for Sparse Representation of Radar High Resolution Range Profile","authors":"Jinrong Zhong, G. Wen, Conghui Ma, Boyuan Ding","doi":"10.1109/CSE.2014.363","DOIUrl":"https://doi.org/10.1109/CSE.2014.363","url":null,"abstract":"The Dictionary is the most important basis of sparse representation which is the key issue of sparse component analysis and compressed sensing. Most of the existing dictionaries are constructed in frequency domain. This paper presented a novel dictionary constructed in time domain for radar signal representation based on geometrical theory of diffraction (GTD) model. Since Radar signal is distributed non-uniformly in time domain, the low-energy part of time responses can be cut-off with insignificant energy loss. As a result, the time-domain dictionary (TD) can be viewed as a sparse matrix, which can save memory and reduce computation complexity greatly, compared with frequency domain dictionaries. Finally, experimental results demonstrate the effectiveness and superiority of the time-domain dictionary.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129630669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic Communication Performance of STTN under Various Traffic Patterns Using Virtual Cut-Through Flow Control 基于虚拟直通流控制的STTN在不同流量模式下的动态通信性能
F. A. Faisal, M. Rahman, Y. Inoguchi
Symmetric Tori connected Torus Network (STTN) is a 2D-torus network of multiple basic modules, where each basic module is a 2D-torus network that are hierarchically interconnected for higher-level networks. The static network performance for STTN has already been studied earlier and shown to be good than that of other networks considering very large size networks. In this paper, we evaluate the dynamic communication performance of STTN using the virtual cut-through (VCT) flow control under different traffic patterns, and also evaluate the static cost factor for STTN against the most recently adopted 5D Torus network. We have found that with the non-uniform traffic patterns of STTN yields much better performance than that of 2D Torus, 2D Mesh, TESH and TTN networks in terms of network throughput and latency. The static cost factor of STTN is also better than that of 5D Torus network.
对称环面连接环面网络(STTN)是一个由多个基本模块组成的二维环面网络,其中每个基本模块都是一个二维环面网络,在更高层次的网络中,二维环面网络是分层连接的。对于STTN的静态网络性能已经有了较早的研究,并且考虑到非常大的网络规模,STTN的静态网络性能优于其他网络。在本文中,我们使用虚拟直通(VCT)流控制来评估STTN在不同流量模式下的动态通信性能,并针对最近采用的5D环面网络评估STTN的静态成本因子。我们发现,在非均匀流量模式下,STTN在网络吞吐量和延迟方面比2D Torus、2D Mesh、TESH和TTN网络的性能要好得多。STTN的静态成本系数也优于5D环面网络。
{"title":"Dynamic Communication Performance of STTN under Various Traffic Patterns Using Virtual Cut-Through Flow Control","authors":"F. A. Faisal, M. Rahman, Y. Inoguchi","doi":"10.1109/CSE.2014.331","DOIUrl":"https://doi.org/10.1109/CSE.2014.331","url":null,"abstract":"Symmetric Tori connected Torus Network (STTN) is a 2D-torus network of multiple basic modules, where each basic module is a 2D-torus network that are hierarchically interconnected for higher-level networks. The static network performance for STTN has already been studied earlier and shown to be good than that of other networks considering very large size networks. In this paper, we evaluate the dynamic communication performance of STTN using the virtual cut-through (VCT) flow control under different traffic patterns, and also evaluate the static cost factor for STTN against the most recently adopted 5D Torus network. We have found that with the non-uniform traffic patterns of STTN yields much better performance than that of 2D Torus, 2D Mesh, TESH and TTN networks in terms of network throughput and latency. The static cost factor of STTN is also better than that of 5D Torus network.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127131304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Saliency-Aware Image Completion 显著性感知图像补全
Z. Li, Haoqian Wang, Kai Li
In this paper, we present a saliency-aware image completion method which takes full advantage of a saliency detection result. On one hand, the saliency map is incorporated into the completion order computation procedure to take human visual attention into account. On the other hand, the saliency map used in patch matching makes the searched result more accurate and smooth. Furthermore, we employ an adaptive patch size determination algorithm which considers the color, structure, and saliency information simultaneously. Experiment results demonstrate the effectiveness of our system in preserving the structural information and robustness in various image content. We also show that the proposed system synthesizes more photo-realistic images than other image completion approaches.
本文提出了一种充分利用显著性检测结果的显著性感知图像补全方法。一方面,在补全顺序计算过程中引入显著性图,以考虑人的视觉注意;另一方面,在patch匹配中使用的显著性映射使得搜索结果更加准确和平滑。此外,我们还采用了一种同时考虑颜色、结构和显著性信息的自适应补丁大小确定算法。实验结果表明,该系统在保留结构信息和鲁棒性方面是有效的。我们还表明,所提出的系统比其他图像补全方法合成的图像更逼真。
{"title":"Saliency-Aware Image Completion","authors":"Z. Li, Haoqian Wang, Kai Li","doi":"10.1109/CSE.2014.119","DOIUrl":"https://doi.org/10.1109/CSE.2014.119","url":null,"abstract":"In this paper, we present a saliency-aware image completion method which takes full advantage of a saliency detection result. On one hand, the saliency map is incorporated into the completion order computation procedure to take human visual attention into account. On the other hand, the saliency map used in patch matching makes the searched result more accurate and smooth. Furthermore, we employ an adaptive patch size determination algorithm which considers the color, structure, and saliency information simultaneously. Experiment results demonstrate the effectiveness of our system in preserving the structural information and robustness in various image content. We also show that the proposed system synthesizes more photo-realistic images than other image completion approaches.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127132743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mathematical Models Applied to On-Chip Network on FPGA for Resource Estimation 基于FPGA的片上网络资源估计数学模型
V. Fresse, C. Combes, Hatem Belhasseb
One main challenge of prototyping a SoC (System on Chip) on FPGA (Field Programmable Gate Array) is to tune at best the communication architecture according to the task graph of an application and the available resources of the chosen FPGA. The exploration of the potential design candidates is time consuming, tedious and does not scale. The sheer number of parameters leads to a wide design space that cannot be explored in a limited time. The aim of this paper is to identify mathematical models applied to NoC to estimate FPGA resources. Mathematical models are obtained from a database containing a set of observed results. Using the database, the Pearson's correlation coefficient and the variable clustering are used to set the most appropriate variables and constants. The mathematical models are obtained and then validated with a set of experimental results. The validation shows that the error rate between observed results and the analytically estimated results is less than 5%. The designer can therefore tune the NoC in shorter exploration time.
在FPGA(现场可编程门阵列)上原型化SoC(片上系统)的一个主要挑战是根据应用程序的任务图和所选FPGA的可用资源至多调整通信架构。探索潜在的候选设计既耗时又乏味,而且不可扩展。参数的绝对数量导致了在有限的时间内无法探索的广泛设计空间。本文的目的是确定应用于NoC的数学模型来估计FPGA资源。数学模型是从包含一组观测结果的数据库中获得的。利用该数据库,利用Pearson相关系数和变量聚类来设置最合适的变量和常数。建立了数学模型,并用一组实验结果进行了验证。验证表明,观测结果与分析估计结果的错误率小于5%。因此,设计人员可以在更短的勘探时间内调整NoC。
{"title":"Mathematical Models Applied to On-Chip Network on FPGA for Resource Estimation","authors":"V. Fresse, C. Combes, Hatem Belhasseb","doi":"10.1109/CSE.2014.117","DOIUrl":"https://doi.org/10.1109/CSE.2014.117","url":null,"abstract":"One main challenge of prototyping a SoC (System on Chip) on FPGA (Field Programmable Gate Array) is to tune at best the communication architecture according to the task graph of an application and the available resources of the chosen FPGA. The exploration of the potential design candidates is time consuming, tedious and does not scale. The sheer number of parameters leads to a wide design space that cannot be explored in a limited time. The aim of this paper is to identify mathematical models applied to NoC to estimate FPGA resources. Mathematical models are obtained from a database containing a set of observed results. Using the database, the Pearson's correlation coefficient and the variable clustering are used to set the most appropriate variables and constants. The mathematical models are obtained and then validated with a set of experimental results. The validation shows that the error rate between observed results and the analytically estimated results is less than 5%. The designer can therefore tune the NoC in shorter exploration time.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130046091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Social Feature-Based Priority Relation Graph of Mobile Social Networks 基于社交特征的移动社交网络优先级关系图
Limei Lin, Li Xu, Shuming Zhou, Wei Wu
The mobile social network (MSN) can be considered as a system which provides a variety of data delivery services involving the social relationship among mobile users. Mobile social networks have the surprising property of being "searchable": Ordinary users contact with each other more frequently when they have more social features in common. In this paper, we first define a priority relationship between two mobile users in terms of their internal social features, and then we present a social feature-based priority relation graph of MSNs. The social feature-based priority relation graph is an (n{m1,...,mn}, k)-hypercube, in which two nodes are adjacent if and only if they differ in no more than k positions where k is the number of key features and k≪n. The priority relation graph of MSNs has some applications. First, it is the fundamental framework of data deliver routing. And then, a large area of circuit communication services can be guaranteed based on the priority relation graph in MSNs, which only need to a little cost.
移动社交网络(MSN)可以看作是一个提供涉及移动用户之间的社交关系的各种数据传递服务的系统。移动社交网络具有令人惊讶的“可搜索”属性:当普通用户拥有更多共同的社交功能时,他们会更频繁地相互联系。本文首先根据两个移动用户的内部社交特征定义了两个移动用户之间的优先级关系,然后给出了基于社交特征的msn优先级关系图。基于社会特征的优先级关系图为(n{m1,…,mn}, k)—超立方体,当且仅当两个节点相差不超过k个位置时相邻,其中k为关键特征的个数,k≪n。msn的优先级关系图具有一定的应用价值。首先,它是数据传递路由的基本框架。然后,基于优先级关系图在微信号网络中保证了大面积的电路通信业务,并且只需要很少的成本。
{"title":"The Social Feature-Based Priority Relation Graph of Mobile Social Networks","authors":"Limei Lin, Li Xu, Shuming Zhou, Wei Wu","doi":"10.1109/CSE.2014.352","DOIUrl":"https://doi.org/10.1109/CSE.2014.352","url":null,"abstract":"The mobile social network (MSN) can be considered as a system which provides a variety of data delivery services involving the social relationship among mobile users. Mobile social networks have the surprising property of being \"searchable\": Ordinary users contact with each other more frequently when they have more social features in common. In this paper, we first define a priority relationship between two mobile users in terms of their internal social features, and then we present a social feature-based priority relation graph of MSNs. The social feature-based priority relation graph is an (n{m1,...,mn}, k)-hypercube, in which two nodes are adjacent if and only if they differ in no more than k positions where k is the number of key features and k≪n. The priority relation graph of MSNs has some applications. First, it is the fundamental framework of data deliver routing. And then, a large area of circuit communication services can be guaranteed based on the priority relation graph in MSNs, which only need to a little cost.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"4 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128817584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2014 IEEE 17th International Conference on Computational Science and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1