首页 > 最新文献

ACM SE '10最新文献

英文 中文
A two-phased approach to reducing the false accept rate of spoofed iris codes 一种降低欺骗虹膜码误接受率的两阶段方法
Pub Date : 2010-04-15 DOI: 10.1145/1900008.1900048
Kelvin S. Bryant, G. Dozier
In this paper, we demonstrate how to reduce the chance of a spoofed iris code being falsely accepted by an iris recognition system. We simulate the system attack by taking one of the registered iris codes from a subject set and mutating it by several different rates and presenting the resultant iris codes to our system. Our approach uses the k-nearest neighbors from a training set to the known spoof to establish a critical distance. Presented iris codes from our mutant set that have a Hamming Ratio when compared to the spoof that is less than the critical distance are rejected. Those that are falsely accepted are totaled to produce a Spoof False Accept Rate (SP-FAR). The second phase of our approach uses traditional iris code recognition to reduce the SP-FAR by rejecting those spoofs that were mutated to a degree such that they will not match any of the other iris codes in the training set.
在本文中,我们演示了如何减少被欺骗的虹膜代码被虹膜识别系统错误接受的机会。我们模拟系统攻击的方法是,从一个主题集中提取一个注册的虹膜代码,并以几种不同的速率对其进行突变,并将生成的虹膜代码呈现给我们的系统。我们的方法使用从训练集到已知恶搞的k个最近邻来建立临界距离。从我们的突变集中呈现的虹膜编码与小于临界距离的欺骗相比具有汉明比被拒绝。那些被错误接受的被加起来产生欺骗错误接受率(SP-FAR)。我们的方法的第二阶段使用传统的虹膜代码识别,通过拒绝那些变异到一定程度的欺骗来降低SP-FAR,这样它们就不会匹配训练集中的任何其他虹膜代码。
{"title":"A two-phased approach to reducing the false accept rate of spoofed iris codes","authors":"Kelvin S. Bryant, G. Dozier","doi":"10.1145/1900008.1900048","DOIUrl":"https://doi.org/10.1145/1900008.1900048","url":null,"abstract":"In this paper, we demonstrate how to reduce the chance of a spoofed iris code being falsely accepted by an iris recognition system. We simulate the system attack by taking one of the registered iris codes from a subject set and mutating it by several different rates and presenting the resultant iris codes to our system. Our approach uses the k-nearest neighbors from a training set to the known spoof to establish a critical distance. Presented iris codes from our mutant set that have a Hamming Ratio when compared to the spoof that is less than the critical distance are rejected. Those that are falsely accepted are totaled to produce a Spoof False Accept Rate (SP-FAR). The second phase of our approach uses traditional iris code recognition to reduce the SP-FAR by rejecting those spoofs that were mutated to a degree such that they will not match any of the other iris codes in the training set.","PeriodicalId":333104,"journal":{"name":"ACM SE '10","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128932862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using the online webwork for student's homework practice in education 利用在线网络进行学生作业实践教育
Pub Date : 2010-04-15 DOI: 10.1145/1900008.1900121
Shangrong Deng, C. Hung, K. Qian
The goal of this project is to increase the success of students in learning mathematics and improve retention in STEM discipline via implementation of online WebWork in STEM education. This project will have broader impact on the teaching and learning mathematics by providing more effective and efficient homework practice. Students will benefit from the instant feedback since every homework problem is graded online. Instructors will also benefit greatly being relieved from the burden of manually checking homework and simultaneously being able to determine how well the students are learning the subject. The WebWork system has been adopted by over 100 colleges and universities in U.S. for Mathematics and Science homework delivery.
该项目的目标是通过在STEM教育中实施在线网络工作来提高学生学习数学的成功率,并提高STEM学科的记忆力。该项目将通过提供更有效和高效的作业练习,对数学的教与学产生更广泛的影响。学生将受益于即时反馈,因为每个作业问题都是在线评分的。教师也将从手工检查作业的负担中解脱出来,同时能够确定学生对该学科的学习情况。WebWork系统已被美国100多所高校用于数学和科学作业的交付。
{"title":"Using the online webwork for student's homework practice in education","authors":"Shangrong Deng, C. Hung, K. Qian","doi":"10.1145/1900008.1900121","DOIUrl":"https://doi.org/10.1145/1900008.1900121","url":null,"abstract":"The goal of this project is to increase the success of students in learning mathematics and improve retention in STEM discipline via implementation of online WebWork in STEM education. This project will have broader impact on the teaching and learning mathematics by providing more effective and efficient homework practice. Students will benefit from the instant feedback since every homework problem is graded online. Instructors will also benefit greatly being relieved from the burden of manually checking homework and simultaneously being able to determine how well the students are learning the subject. The WebWork system has been adopted by over 100 colleges and universities in U.S. for Mathematics and Science homework delivery.","PeriodicalId":333104,"journal":{"name":"ACM SE '10","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129008164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing metrics in police routing algorithms 警察路由算法中的优化指标
Pub Date : 2010-04-15 DOI: 10.1145/1900008.1900139
N. Hamner
A large part of the mission of state troopers is to prevent traffic accidents and to quickly respond to the accidents that do happen. However, driving about aimlessly during their shift is not efficient. Certain areas can be identified as "hotspots", places where crashes are known to frequently occur. It is advantageous to have officers target these critical locations during their patrol routes. Multiple officers taking similar routes is also inefficient. The number of officers patrolling is limited, and by keeping them spread out, response time to crashes can be decreased. The purpose of the Turn programming language is to create efficient routes daily, but with a degree of randomness to prevent the routes from becoming predictable. At its core is a graph representing the roads of Alabama, with vertices at each milepost and intersection. Turn programs utilize set reduction functions to choose what vertices officers should patrol. Depending on what functions the programmer uses and the order they are used, the route may be different to reflect the changing priorities. A Turn program's worth is measured by a number of metrics, such as how many hotspots were covered each day, how long those hotspots were patrolled, and time taken to respond to crashes in the simulation. Additionally, a program is worthless if the routes it creates are not realistic. In this paper, we present an analysis of various Turn programs, explain how they affect the metrics, and show a program that strikes a balance between them.
州警的很大一部分任务是防止交通事故,并迅速对发生的事故作出反应。然而,在他们轮班期间漫无目的地开车是没有效率的。某些区域可以被确定为“热点”,即已知经常发生撞车事故的地方。在巡逻路线上,让警官瞄准这些关键地点是有利的。多名警官走同样的路线效率也很低。巡逻警察的数量是有限的,通过分散巡逻,可以减少对交通事故的反应时间。Turn编程语言的目的是每天创建有效的路线,但带有一定程度的随机性,以防止路线变得可预测。它的核心是一个代表阿拉巴马州道路的图表,每个里程碑和十字路口都有顶点。Turn程序利用集合约简函数来选择警官应该巡逻的顶点。根据程序员使用的函数和它们使用的顺序,路由可能会有所不同,以反映变化的优先级。Turn程序的价值是通过许多指标来衡量的,例如每天覆盖多少热点,这些热点巡逻的时间,以及在模拟中响应崩溃所花费的时间。此外,如果程序创建的路由不现实,那么它就毫无价值。在本文中,我们对各种Turn程序进行了分析,解释了它们如何影响度量,并展示了一个在它们之间取得平衡的程序。
{"title":"Optimizing metrics in police routing algorithms","authors":"N. Hamner","doi":"10.1145/1900008.1900139","DOIUrl":"https://doi.org/10.1145/1900008.1900139","url":null,"abstract":"A large part of the mission of state troopers is to prevent traffic accidents and to quickly respond to the accidents that do happen. However, driving about aimlessly during their shift is not efficient. Certain areas can be identified as \"hotspots\", places where crashes are known to frequently occur. It is advantageous to have officers target these critical locations during their patrol routes. Multiple officers taking similar routes is also inefficient. The number of officers patrolling is limited, and by keeping them spread out, response time to crashes can be decreased.\u0000 The purpose of the Turn programming language is to create efficient routes daily, but with a degree of randomness to prevent the routes from becoming predictable. At its core is a graph representing the roads of Alabama, with vertices at each milepost and intersection. Turn programs utilize set reduction functions to choose what vertices officers should patrol. Depending on what functions the programmer uses and the order they are used, the route may be different to reflect the changing priorities.\u0000 A Turn program's worth is measured by a number of metrics, such as how many hotspots were covered each day, how long those hotspots were patrolled, and time taken to respond to crashes in the simulation. Additionally, a program is worthless if the routes it creates are not realistic. In this paper, we present an analysis of various Turn programs, explain how they affect the metrics, and show a program that strikes a balance between them.","PeriodicalId":333104,"journal":{"name":"ACM SE '10","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115839645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A framework for access control model in enterprise healthcare via SAML 通过SAML实现企业医疗保健中的访问控制模型框架
Pub Date : 2010-04-15 DOI: 10.1145/1900008.1900154
Saidi Mchumo, H. Chi
In modern healthcare systems, information sharing among different individuals or organizations is a crucial aspect of everyday operations. The ability to send and receive data over a large inter-organizational network while protecting the privacy of vital electronic medical records is a challenge that has to be met and resolved. To address this problem, several Electronic Healthcare Record (EHR) standards are being developed to enable organizations to exchange clinical data. This paper provides a framework of using Security Assertion Markup Language (SAML) in an inter-organizational E-Healthcare system. Previous studies have shown that a Role-Based Access Control Model is a suitable security model for a single E-Healthcare system. The main goal of this paper focuses on communication and data sharing EHR component among the inter-organizations without comprising any privacy.
在现代医疗保健系统中,不同个人或组织之间的信息共享是日常操作的关键方面。在保护重要电子医疗记录隐私的同时,在大型组织间网络上发送和接收数据的能力是必须应对和解决的挑战。为了解决这个问题,正在开发几个电子医疗记录(EHR)标准,使组织能够交换临床数据。本文提供了一个在组织间电子医疗系统中使用安全断言标记语言(SAML)的框架。先前的研究表明,基于角色的访问控制模型是适合单个电子医疗保健系统的安全模型。本文的主要目标是在不包含任何隐私的情况下,在组织间进行电子病历组件的通信和数据共享。
{"title":"A framework for access control model in enterprise healthcare via SAML","authors":"Saidi Mchumo, H. Chi","doi":"10.1145/1900008.1900154","DOIUrl":"https://doi.org/10.1145/1900008.1900154","url":null,"abstract":"In modern healthcare systems, information sharing among different individuals or organizations is a crucial aspect of everyday operations. The ability to send and receive data over a large inter-organizational network while protecting the privacy of vital electronic medical records is a challenge that has to be met and resolved. To address this problem, several Electronic Healthcare Record (EHR) standards are being developed to enable organizations to exchange clinical data. This paper provides a framework of using Security Assertion Markup Language (SAML) in an inter-organizational E-Healthcare system. Previous studies have shown that a Role-Based Access Control Model is a suitable security model for a single E-Healthcare system. The main goal of this paper focuses on communication and data sharing EHR component among the inter-organizations without comprising any privacy.","PeriodicalId":333104,"journal":{"name":"ACM SE '10","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116782935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Teaching with Alice 3: tutorial 与爱丽丝一起教学:教程
Pub Date : 2010-04-15 DOI: 10.1145/1900008.1900016
W. Dann, Pamela B. Lawhead, Aik Min Choong
This tutorial, designed for instructors of CS1/AP, introduces Alice3 with built-in transition from Alice to Java. The workshop offers hands-on experience programming with Alice3 and integrating a transition to Java IDE, e.g. NetBeans. Alice3 builds on Alice2's powerful program visualization technique, enabling students to "see" objects and work with object- oriented programming.
本教程是为CS1/AP教师设计的,介绍了具有从Alice到Java的内置转换的Alice3。该研讨会提供了使用Alice3编程的实践经验,以及集成到Java IDE(例如NetBeans)的过渡。Alice3建立在Alice2强大的程序可视化技术的基础上,使学生能够“看到”对象并使用面向对象的编程。
{"title":"Teaching with Alice 3: tutorial","authors":"W. Dann, Pamela B. Lawhead, Aik Min Choong","doi":"10.1145/1900008.1900016","DOIUrl":"https://doi.org/10.1145/1900008.1900016","url":null,"abstract":"This tutorial, designed for instructors of CS1/AP, introduces Alice3 with built-in transition from Alice to Java. The workshop offers hands-on experience programming with Alice3 and integrating a transition to Java IDE, e.g. NetBeans. Alice3 builds on Alice2's powerful program visualization technique, enabling students to \"see\" objects and work with object- oriented programming.","PeriodicalId":333104,"journal":{"name":"ACM SE '10","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115398246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ant colony optimization for the K-means algorithm in image segmentation 蚁群算法在图像分割中的应用
Pub Date : 2010-04-15 DOI: 10.1145/1900008.1900075
C. Hung, Mojia Sun
In this paper the ant colony optimization (ACO) is used in the K-means algorithm for improving the image segmentation. The learning mechanism of this algorithm is formulated by using the ACO meta-heuristic. As the pheromone dominates the exploration of ants for problem solutions, preliminary experiments on pheromone's update are reported. Two methods for defining and updating pheromone values are proposed and tested: one with the spatial coordinate distances and the other without using such a distance. The ACO improves the K-means algorithm by making it less dependent on the initial parameters.
本文将蚁群算法应用于K-means算法中,对图像分割进行改进。该算法的学习机制采用蚁群算法的元启发式。由于信息素在蚂蚁对问题解决的探索中占据主导地位,本文报道了信息素更新的初步实验。提出并测试了两种定义和更新信息素值的方法:一种是使用空间坐标距离,另一种是不使用空间坐标距离。蚁群算法通过减少对初始参数的依赖来改进K-means算法。
{"title":"Ant colony optimization for the K-means algorithm in image segmentation","authors":"C. Hung, Mojia Sun","doi":"10.1145/1900008.1900075","DOIUrl":"https://doi.org/10.1145/1900008.1900075","url":null,"abstract":"In this paper the ant colony optimization (ACO) is used in the K-means algorithm for improving the image segmentation. The learning mechanism of this algorithm is formulated by using the ACO meta-heuristic. As the pheromone dominates the exploration of ants for problem solutions, preliminary experiments on pheromone's update are reported. Two methods for defining and updating pheromone values are proposed and tested: one with the spatial coordinate distances and the other without using such a distance. The ACO improves the K-means algorithm by making it less dependent on the initial parameters.","PeriodicalId":333104,"journal":{"name":"ACM SE '10","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116846587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Mining relaxed closed subspace clusters 挖掘松弛闭子空间簇
Pub Date : 2010-04-15 DOI: 10.1145/1900008.1900032
Erich A. Peterson, P. Tang
This paper defines and discusses a new problem in the area of subspace clustering. It defines the problem of mining closed subspace clusters. This new concept allows for the culling of more high quality and less redundant clusters, than that of traditional clustering algorithms. In addition, our method contains a relaxation parameter, which allows for the classification of qualifying clusters into mutually exclusive bins of varying quality---extending the problem to mining relaxed closed subspace clusters. These concepts culminate in a new algorithm called Relaxed Closed Subspace Clustering (RCSC).
本文定义并讨论了子空间聚类领域中的一个新问题。它定义了封闭子空间簇的挖掘问题。与传统的聚类算法相比,这个新概念允许选择更高质量和更少冗余的聚类。此外,我们的方法包含一个松弛参数,允许将符合条件的簇分类到不同质量的互斥箱中——将问题扩展到挖掘松弛封闭子空间簇。这些概念最终形成了一种新的算法,称为松弛闭子空间聚类(RCSC)。
{"title":"Mining relaxed closed subspace clusters","authors":"Erich A. Peterson, P. Tang","doi":"10.1145/1900008.1900032","DOIUrl":"https://doi.org/10.1145/1900008.1900032","url":null,"abstract":"This paper defines and discusses a new problem in the area of subspace clustering. It defines the problem of mining closed subspace clusters. This new concept allows for the culling of more high quality and less redundant clusters, than that of traditional clustering algorithms. In addition, our method contains a relaxation parameter, which allows for the classification of qualifying clusters into mutually exclusive bins of varying quality---extending the problem to mining relaxed closed subspace clusters. These concepts culminate in a new algorithm called Relaxed Closed Subspace Clustering (RCSC).","PeriodicalId":333104,"journal":{"name":"ACM SE '10","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127186990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting software bugs using ARIMA model 利用ARIMA模型预测软件bug
Pub Date : 2010-04-15 DOI: 10.1145/1900008.1900046
Lisham L. Singh, A. Abbas, F. Ahmad, S. Ramaswamy
The number of software products available in market is increasing rapidly. Many a time, multiple companies develop software products of similar functionalities. Thus the competition among those owning companies is becoming tougher every day. Moreover, there are many crucial programs whose results should be always accurate without fail. As a consequence of such challenges, tackling software bugs issues efficiently is an important and essential task for the owning software companies. Therefore, predicting bugs and finding ways to address these at the earliest has become an important factor for sustainability in the software market. This paper proposes software bug predication models using Autoregressive Moving Average Model (ARIMA) based on Box-Jenkins Methodology, which depends on Autoregressive models (AR) with Moving Average (MA). The inputs to our models are the information extracted from the past bug repositories. We have verified our models using datasets of Eclipse [16] and Mozilla [17].
市场上可用的软件产品的数量正在迅速增加。很多时候,多个公司开发功能相似的软件产品。因此,那些拥有公司的人之间的竞争日益激烈。此外,有许多关键的程序,其结果必须始终准确无误。由于这些挑战,有效地解决软件bug问题是拥有软件公司的重要和必不可少的任务。因此,预测错误并尽早找到解决这些问题的方法已成为软件市场可持续性的重要因素。本文提出了基于Box-Jenkins方法的自回归移动平均模型(ARIMA)的软件bug预测模型,该模型依赖于带有移动平均线(MA)的自回归模型(AR)。我们模型的输入是从过去的bug存储库中提取的信息。我们使用Eclipse[16]和Mozilla[17]的数据集验证了我们的模型。
{"title":"Predicting software bugs using ARIMA model","authors":"Lisham L. Singh, A. Abbas, F. Ahmad, S. Ramaswamy","doi":"10.1145/1900008.1900046","DOIUrl":"https://doi.org/10.1145/1900008.1900046","url":null,"abstract":"The number of software products available in market is increasing rapidly. Many a time, multiple companies develop software products of similar functionalities. Thus the competition among those owning companies is becoming tougher every day. Moreover, there are many crucial programs whose results should be always accurate without fail. As a consequence of such challenges, tackling software bugs issues efficiently is an important and essential task for the owning software companies. Therefore, predicting bugs and finding ways to address these at the earliest has become an important factor for sustainability in the software market.\u0000 This paper proposes software bug predication models using Autoregressive Moving Average Model (ARIMA) based on Box-Jenkins Methodology, which depends on Autoregressive models (AR) with Moving Average (MA). The inputs to our models are the information extracted from the past bug repositories. We have verified our models using datasets of Eclipse [16] and Mozilla [17].","PeriodicalId":333104,"journal":{"name":"ACM SE '10","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124883386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Optimizing memory access on GPUs using morton order indexing 使用morton顺序索引优化gpu上的内存访问
Pub Date : 2010-04-15 DOI: 10.1145/1900008.1900035
Anthony E. Nocentino, P. J. Rhodes
High performance computing environments are not freely available to every scientist or programmer. However, massively parallel computational devices are available in nearly every workstation class computer and laptop sold today. The programmable GPU gives immense computational power to a user in a standard office environment; however, programming a GPU to function efficiently is not a trivial task. An issue of primary concern is memory latency, if not managed properly it can cost the GPU in performance resulting in increased runtimes waiting for data. In this paper we describe an optimization of memory access methods on GPUs using Morton order indexing, sometimes referred to as Z-order index.
并不是每个科学家或程序员都可以免费获得高性能计算环境。然而,大规模并行计算设备几乎可以在今天销售的所有工作站级计算机和笔记本电脑中使用。可编程GPU在标准办公环境中为用户提供了巨大的计算能力;然而,对GPU进行有效的编程并不是一项简单的任务。一个主要关注的问题是内存延迟,如果管理不当,它可能会降低GPU的性能,导致等待数据的运行时间增加。在本文中,我们描述了使用Morton顺序索引(有时称为z顺序索引)优化gpu上的内存访问方法。
{"title":"Optimizing memory access on GPUs using morton order indexing","authors":"Anthony E. Nocentino, P. J. Rhodes","doi":"10.1145/1900008.1900035","DOIUrl":"https://doi.org/10.1145/1900008.1900035","url":null,"abstract":"High performance computing environments are not freely available to every scientist or programmer. However, massively parallel computational devices are available in nearly every workstation class computer and laptop sold today. The programmable GPU gives immense computational power to a user in a standard office environment; however, programming a GPU to function efficiently is not a trivial task. An issue of primary concern is memory latency, if not managed properly it can cost the GPU in performance resulting in increased runtimes waiting for data. In this paper we describe an optimization of memory access methods on GPUs using Morton order indexing, sometimes referred to as Z-order index.","PeriodicalId":333104,"journal":{"name":"ACM SE '10","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133179706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Incorporating real-world projects in teaching computer science courses 在计算机科学课程教学中结合实际项目
Pub Date : 2010-04-15 DOI: 10.1145/1900008.1900042
Richard C. Detmer, Cen Li, Zhijiang Dong, J. Hankins
Research has shown students are more motivated and more likely to perform active learning when working on real-world projects that have societal impact. The Computer Science Department at Middle Tennessee State University has embarked on the task of incorporating real-world projects into multiple courses across the curriculum. This paper describes the real world project collection process and a management framework being developed to collect and track the usage of real-world projects for Computer Science courses. It discusses pilot courses that used real-world projects in teaching various computing subjects, as well as lessons learned from these pilot studies.
研究表明,在从事具有社会影响的现实世界项目时,学生更有动力,更有可能进行主动学习。中田纳西州立大学(Middle Tennessee State University)计算机科学系已经开始着手将现实世界的项目整合到课程中的多个课程中。本文描述了真实世界的项目收集过程和一个正在开发的管理框架,用于收集和跟踪计算机科学课程中真实世界项目的使用情况。它讨论了使用实际项目来教授各种计算科目的试点课程,以及从这些试点研究中获得的经验教训。
{"title":"Incorporating real-world projects in teaching computer science courses","authors":"Richard C. Detmer, Cen Li, Zhijiang Dong, J. Hankins","doi":"10.1145/1900008.1900042","DOIUrl":"https://doi.org/10.1145/1900008.1900042","url":null,"abstract":"Research has shown students are more motivated and more likely to perform active learning when working on real-world projects that have societal impact. The Computer Science Department at Middle Tennessee State University has embarked on the task of incorporating real-world projects into multiple courses across the curriculum. This paper describes the real world project collection process and a management framework being developed to collect and track the usage of real-world projects for Computer Science courses. It discusses pilot courses that used real-world projects in teaching various computing subjects, as well as lessons learned from these pilot studies.","PeriodicalId":333104,"journal":{"name":"ACM SE '10","volume":"57 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132738487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
ACM SE '10
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1