The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The aims of this paper are to find algebraic characterizations of Schreier loops and explore the limits of the non-associative generalization of the theory of Schreier extensions. A loop can have Schreier decomposition with respect to a normal subgroup if and only if the subgroup is the middle and right nuclear. In this case the conjugation by elements of the loop induces inner automorphisms on the...
Small I/O requests are important for a large number of modern workloads in the data center. Traditionally, storage systems have been able to achieve low I/O rates for small I/O operations because of hard disk drive (HDD) limitations that are capable of about 100–150 IOPS (I/O operations per second) per spindle. Therefore, the host CPU processing capacity and network link throughput have been relatively...
The use of real-time operating systems for small micro controllers creates two major problems. The former refers to the way interruptions must be handled so that deadlines can be complied with. The latter regards the fact that there may be tasks that will not synchronize with events generated by multiple objects such as semaphores, mutexes, messages or interrupts. The present article discusses several...
Up to now in mine warfare context, most of Automatic Target Recognition (ATR) processes suffer from environmental effects and therefore try to erase them by image filtering or thresholding before performing shadow and/or echo extraction of the target. In order to design potentially more effective methods, environmental characterization can be investigated. The idea is to incorporate environmental...
This paper describes some new developments to a recently proposed approach to the generation of fault symptoms in dynamic systems. The method is model-free, in the sense that no analytical model of the plant is needed. The kernel-smoother makes it possible to detect changes in the plant dynamics, possibly due to some malfunction. A simple sufficient condition for fault detectability is presented and...
Classification of histology sections from large cohorts, in terms of distinct regions of microanatomy (e.g., tumor, stroma, normal), enables the quantification of tumor composition, and the construction of predictive models of the clinical outcome. To tackle the batch effects and biological heterogeneities that are persistent in large cohorts, sparse cellular morphometric context has recently been...
Co-design and co-verification of complex SoC requires a virtual platform, which in an ideal case has the single source codes with hardware blocks included. An effective way to do that is using the SystemC language together with high level synthesis technology. Execution of the virtual platform requires simulation of SystemC parts, which is quite time-consuming. We present an approach to accelerate...
This paper proposes novel models of F0 contours and phone durations using Gaussian process regression and classification (GPR and GPC) for statistical parametric speech synthesis. Although the use of frame-based GPR has shown the effectiveness of spectral feature modeling in previous studies, the application of GPR to prosodic features, i.e., F0 and phone duration, was not investigated sufficiently...
Graphics processing units (GPUs) are being widely used as co-processors in many application domains to accelerate general-purpose workloads that are computationally intensive, known as GPGPU computing. Real-time multi-tasking support is a critical requirement for many emerging GPGPU computing domains. However, due to the asynchronous and non-preemptive nature of GPU processing, in multi-tasking environments,...
Precise small-sample estimation of the error of an optimal filter is theoretically limited. This paper shows the possibility of obtaining better estimation in a Bayesian context by postulating prior knowledge regarding the probability distribution of the model. Prior knowledge is employed to estimate the estimation error, and thereby obtain a better estimate of filter error. Error estimation is done...
Software processes and Software Engineering (SE) methods belong to those knowledge areas which are challenging to be taught intuitively accessible. The specification “Kernel and Language for Software Engineering Methods (Essence)” [1] claims to deliver an approach to consolidate all essential dimensions of SE-endeavors into an universal compact and actionable kernel. This paper describes the characteristics...
Tracing is an approach used for debugging and profiling software. Conventional approach to create traces is to instrument program’s code tapping data out from an execution. An original execution is mixed with tracing routines. In consequent, a program in production state and development state are not identical. In addition, instrumentation code adds execution overhead and increases error probability...
We present a robust algorithm that registers one point set to another for nonrigid case. We formulate the problem as a Gaussian mixture model (GMM) density estimation by considering one of the point sets as the GMM centroids and the other as the data points generated by GMM. We displace the centroids and make them register to the data by maximizing the likelihood. To facilitate the process, we introduce...
GPUs have been proven effective for structured applications that map well to the rigid 1D-3D grid of threads in modern bulk synchronous parallel (BSP) programming languages. However, less success has been encountered in mapping data intensive irregular applications such as graph analytics, relational databases, and machine learning. Recently introduced nested device-side kernel launching functionality...
The use of contracts to enhance the maintainability of safety-critical systems has received a significant amount of research effort in recent years. However some key issues have been identified: the difficulty in dealing with the wide range of properties of systems and deriving contracts to capture those properties, and the challenge of dealing with the inevitable incompleteness of the contracts....
GPU's SIMD architecture is a double-edged sword confronting parallel tasks with control flow divergence. On the one hand, it provides a high performance yet power-efficient platform to accelerate applications via massive parallelism; however, on the other hand, irregularities induce inefficiencies due to the warp's lockstep traversal of all diverging execution paths. In this work, we present a software...
Security concerns are widely seen as an obstacle to the adoption of cloud computing solutions and although a wealth of law and regulation has emerged, the technical basis for enforcing and demonstrating compliance lags behind. Our Cloud Safety Net project aims to show that Information Flow Control (IFC) can augment existing security mechanisms and provide continuous enforcement of extended. Finer-grained...
Semantic relation extraction is an important part of information extraction, it has application value in the automatic question answering system, retrieval system, ontology learning, semantic web annotation, and many other areas. Pattern representation method is context pattern in previous semi-Supervised semantic relation extraction based on bootstrapping, but it did not consider the role of the...
The explosive growth of data, images in the World Wide Web makes it critical to the information retrievals. Image retrieval has been recognized as an elementary problem in the retrieval tasks and this exercise has got a wide attention based on the underlying domain characteristics. For instance, in social media data encompasses of noisy, diverse, heterogeneous, interconnected data. To confront these...
Food-related photos have become increasingly very popular, due to social networks, food recommendation and dietary assessment systems. Reliable annotation is essential in those systems, but user-contributed tags are often non-informative and inconsistent, and unconstrained automatic food recognition still has relatively low accuracy. Most works focus on exploiting only the visual content while ignoring...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.