The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we identify address aliasing as an important underlying mechanism causing measurement bias on modern Intel microarchitectures. By analyzing hardware performance counters, we show how bias arises from two external factors:size of environment variables, and characteristics of dynamically linked heap allocators. We demonstrate ways to deal with this type of bias, through runtime detection...
Learning path in online learning systems refers to a sequence of learning objects which are designated to help the students in improving their knowledge or skill in particular subjects or degree courses. In this paper, we review the recent research on learning path adaptation to pursue two goals, first is to organize and analyze the parameter of adaptation in learning path; the second is to discuss...
To cope with Internet video explosion, recent work proposes to deploy caches to absorb part of the traffic related to popular videos. Nonetheless, caching literature has mainly focused on network-centric metrics, while the quality of users' video streaming experience should be the key performance index to optimize. Additionally, the general assumption is that each user request can be satisfied by...
Video streaming provided by Over-The-Top (OTT) service providers through a cellular network is a common usage scenario for many people today. While video streaming will work reasonably well in a stationary scenario, several issues arise for mobile users. For instance, travelling through short areas without cellular coverage, such as an automobile tunnel, will often result in quality degradation or...
Source-level timing simulation (SLTS) is a promising method to overcome one major challenge in early and rapid prototyping: fast and accurate simulation of timing behavior. However, most of existing SLTS approaches are still coupled with a considerable simulation overhead. We present a method to reduce source-level timing simulation overhead by removing superfluous instrumentation based on instrumentation...
3D logic-logic integration is an important future lever for continued cost and density scaling value propositions in the semiconductor industry. In the 3DIC context, several works have proposed “mix-and-match” of multiple stacked die, according to binning information, to improve overall product yield. However, each of the stacked die in these works is independently designed: there is no holistic “design...
The paper deals with the Knapsack Problem with conflicts, also known as the Disjunctively Constrained Knapsack Problem (DCKP). The conflicts are represented by a graph whose vertices are the items such that adjacent items cannot be packed in the knapsack simultaneously. We consider a classical formulation for the DCKP, study the polytope associated with this formulation and investigate the facial...
Energy storage can provide services to several sectors in electricity industry, including generation, transmission and distribution and support a cost-effective transition to a low carbon electricity industry. Sharing storage plant's energy and power capacity for multiple services portfolios leads to conflicting or synergic interactions among services. In this context, the proposed methodology determines...
The coupling of the desalination process with solar technology is a complex problem. As various types of desalination processes and solar technologies have been developed, the selection of the best combination requires several design criteria. Capital costs, operation and maintenance costs, plant site, salinity of seawater, environmental impacts, and water quantity and quality requirements are examples...
Cloud computing datacenters dynamically provide millions of virtual machines in actual cloud computing markets and several challenging problems have to be addressed towards an efficient resource management of these infrastructures. In the context of resource allocation, Virtual Machine Placement (VMP) is one of the most studied problems with several possible formulations and a large number of existing...
Identity management (IdM) systems employ Identity Providers (IdPs), as guardians of users' critical information. However, Distributed Denial-of-Service (DDoS) attacks can make IdPs operations unavailable, compromising legitimate users. In the literature, the main countermeasures against DDoS attacks are based on either the application of external resources to extend the system lifetime (replication)...
Recent papers studied the control of spectral centrality measures of a network by manipulating the topology of the network. We extend these works by focusing on a specific spectral centrality measure, the Katz-Bonacich centrality. The optimization of the Katz-Bonacich centrality using a topological control is called the Katz-Bonacich optimization problem. We first prove that this problem is equivalent...
English is a language that is spoken by around 380–420 million people on this planet and understanding it is not at all easy. The meaning of a sentence varies according to the context and the tone of the speaker. To convey the thoughts efficiently, the knowledge of the language and its various rules is very important as thoughts take the form of words and the words take the form of action. One should...
Exploiting contextual cues has been a key idea to improve people detection in crowded scenes. Along this line we present a novel context-driven approach to detect people in crowded scenes. Based on a context graph that incorporates both geometric and social contextual patterns in crowds, we apply label propagation to discover weak detections contextually compatible with true detections while suppressing...
Several approaches have been proposed in the context of the smart grids and microgrids to validate the active participation of the end consumers in the energy management process. The present paper focuses in a model with dynamic application of optimization algorithm to manage the active participation of the end consumers in the demand response events. The method is performed using real and simulated...
The sparse matrix is a key data structure in various domains such as high-performance computing, machine learning, and graph analytics. To maximize performance of sparse matrix operations, it is especially important to optimize across the operations and not just within individual operations. While a straightforward per-operation mapping to library routines misses optimization opportunities, manually...
Automated image retargeting techniques are becoming important with the proliferation of different display units, such as cell phones, notebooks, televisions etc. Scale-and-stretch techniques have been successfully used for resizing images into different aspect ratios, while also preserving the most prominent visual features. The main idea of scale-and-stretch techniques is to utilize a single grid...
Inverse problems arising from Laplace transform inversion are ill-posed, and require suitable regularization strategies. Although the maximum entropy regularization approach usually appears as an adequate strategy due to its ability to recover regular positive valued signals, it was observed to lead to poor reconstruction results when the sought signal contains narrow peaks. In that case, a sparsity...
With the development of single-person analysis in computer vision, social group analysis has received growing attention as the next area of research. In particular, group detection has been actively studied as the first step of social analysis. Here, group means an F-formation, that is, a spatial organization of people gathered for conversation. Popular group detection methods are based on coincidences...
Adaptive transform learning schemes have been extensively studied in the literature with a goal to achieve better compression efficiency compared to extensively used Discrete Cosine Transforms (DCT) inside a video codec. These transforms are learned offline on a large training set and are tested either in competition with or in place of the core transforms i.e. DCT. In our previous work, we proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.