The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When we use binary tree support vector machine (SVM) to work the multi-classification problems out, we always find that the structure of the binary tree has a large chance and it has a great influence on the classification efficiency of the classification model. To solve this problem, according to the idea of separating the most widely distributed class first, an improved binary tree SVM multiple...
In this paper, we propose an efficient and robust gross outlier removal method, called the Conceptual Space based Gross Outlier Removal (CSGOR) method, to remove gross outliers for geometric model fitting. In the proposed method, each data point is mapped to a conceptual space by computing the preference of "good" model hypotheses. In the conceptual space, the distributions of inliers and...
This paper introduces a fast blind deconvolution strategy for image deblurring by modifying a recent natural image model, i.e., the total generalized variation (TGV), which aims at reconstructing an image with higher-order smoothness as well as sharp edges. But, when it turns to the blind issue, as demonstrated either empirically or theoretically by a few previous blind deblurring works, natural image...
Recent years witness the successful adoption of Cloud computing. However, security remains the top concern for cloud users. The fundamental issue is that cloud providers cannot convince cloud users the trustworthiness of cloud platforms. In this paper, we propose a cloud auditing framework, named CloudAuditor, to examine the behaviors of cloud platforms. By leveraging nested virtualization technology,...
Virtual Machine Cluster (VMC) is now widely used to host network applications due to its well scalability and high availability compared to physical cluster. To provide fault tolerance, VMC snapshot is one well known technique, it saves the entire VMC state into stable storage and rollbacks the VM from the latest saved state upon failures. However, due to the large snapshot size as well as numerous...
Power states in power-scalable systems are managed to maximize performance and reduce energy waste. Power-scalable processor capabilities (e.g., Intel Turbo Boost) embrace a "faster is better" approach to power management. While these technologies can vastly improve performance and energy efficiency, there is a growing body of evidence that "faster is not always better". For example,...
Hyperspectral imagery typically provides a wealth of information captured in a wide range of the electromagnetic spectrum for each pixel in the image; however, when used in statistical pattern-classification tasks, the resulting high-dimensional feature spaces often tend to result in ill-conditioned formulations. Popular dimensionality selection techniques such as filtering and wrapper methods fail...
Accelerators are used in about 13% of the current Top500 List. Supercomputers leveraging accelerators grew by a factor of 2.2x in 2012 and are expected to completely dominate the Top500 by 2015. Though most of these deployments use NVIDIA GPGPU accelerators, Intel's Xeon Phi architecture will likely grow in popularity in the coming years. Unfortunately, there are few studies analyzing the performance...
Virtualization is one of the main technologies currently used to deploy computing systems due to the high reliability and rapid crash recovery it offers in comparison to physical nodes. These features are mainly achieved by continuously producing snapshots of the status of running virtual machines. In earlier works, the snapshot of each individual VM is performed independently, ignoring the memory...
Cloud computing service has been evolved in providing a whole virtual data center from selling scattered virtual machines (VMs). Process Monitoring of a VM is a fundamental feature to guarantee the security of the virtual data center because of the rapid growth of the malware. Existing approaches are mainly based on virtual machine introspection (VMI) technique to isolate the monitor out-of-vm and...
Cloud computing brings a loose-coupled resources integration paradigm with virtualized, elastic and cost-efficient resource management capabilities. Virtualization-based logging and replay technologies give users the ability to record the executions of the whole virtual machines and recover them at any time in a peer to peer mode, and it has become an important approach to analyze the system vul-nerability,...
A method of milling system operation optimization is proposed in this paper. First, use Support Vector Machine to get the relations between milling unit consumption and its related operation parameters. Second, optimize the model with the help of genetic algorithm and composite algorithm, and then optimal operation parameters of this milling system under different working conditions are got, which...
Recently, "rootkit" becomes a popular hacker malware on the Internet, which controls the hosts on the Internet by hiding itself, and raises a serious security threat. Existing host-based and hardware-based solutions have some disadvantages, such as hardware overhead and being discovered by root kits, where the development of virtualization technology provides a better solution to avoid those...
Heterogeneous Computing is becoming an important technology trend in HPC, where more and more heterogeneous processors are used. However, in traditional node architecture, heterogeneous processors are always used as coprocessors. Such usage increases the communication latency between heterogeneous processors and prevents the node from achieving high density. With the purpose of improving communication...
System call interposition is a powerful method for regulating and monitoring program behavior. A wide variety of security tools have been developed which use this technique. However, traditional system call interposition techniques are vulnerable to kernel attacks and have some limitations on effectiveness and transparency. In this paper, we propose a novel approach named VSyscall, which leverages...
The hypersphere support vector machine is an efficient method to distinguish the state of mechanism. The state of Power-Shift Steering Transmission (PSST) is studied using hypersphere support vector machine and Principal Component Analysis(PCA) with spectrometric oil analysis data. The fundamental of hypersphere support vector machine and PCA is researched. The influence of model parameters for performance...
In recent years, with the development of GPU, based on the general purpose computation on graphics processors has became a new field. Aiming at the processing of GPU, this paper provides the formal description for data parallel mode, a detailed description of the CUDA programming mode land the principle of optimization. It shows by the comparative experiment that CUDA owns strongly of the ability...
The size of volumetric data generated by medical imaging and scientific simulations is increased significantly due to the dramatic advances in medical imaging modalities and computing technologies. The volumetric data generally need to be visualized and marching cubes algorithm (MC for short) is one of the standard methods of the isosurface extraction for the medical applications. However, MC algorithm...
The ever-increasing memory footprint in large scale applications not only requires efficient computation, but also needs efficient communication. Traditionally huge page is used to reduce CPUpsilas TLB miss, but how huge page impacts communication performance, and how HPC applications in large scale benefit from huge page are still not clear. In this paper, we support huge page in our D5000A platform...
Video on demand system (VOD) is a cross technique, which integrate the computer technology, network communications technology, multimedia technology, television technology and data compression technology. Along with rapid development of multimedia and network technique, VOD system already applies widely in many domains. In the DirectShow based VOD system, the role of DirectShow is to decode and play...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.