137,663 research outputs found
On the Computational Power of Shared Objects
Abstract. We propose a new classification for evaluating the strength of shared objects. The classification is based on finding, for each object of type o, the strongest progress condition for which it is possible to solve consensus for any number of processes, using any number of objects of type o and atomic registers. We use the strongest progress condition to associate with each object a number call the power number of that object. Objects with higher power numbers are considered stronger. Then, we define the power hierarchy which is an infinite hi-erarchy of objects such that the objects at level i of the hierarchy are exactly those objects with power number i. Comparing our classification with the traditional one which is based on fixing the progress condition (namely, wait-freedom) and finding the largest number of processes for which consensus is solvable, reveals interesting results. Our equivalence and extended universality results, provide a deeper understanding of the nature of the relative computational power of shared objects
Java on Networks of Workstations (JavaNOW): A Parallel Computing Framework Inspired by Linda and the Message Passing Interface (MPI)
Networks of workstations are a dominant force in the distributed computing arena, due primarily to the excellent price/performance ratio of such systems when compared to traditionally massively parallel architectures. It is therefore critical to develop programming languages and environments that can help harness the raw computational power available on these systems. In this article, we present JavaNOW (Java on Networks of Workstations), a Java‐based framework for parallel programming on networks of workstations. It creates a virtual parallel machine similar to the MPI (Message Passing Interface) model, and provides distributed associative shared memory similar to the Linda memory model but with a richer set of primitive operations.
JavaNOW provides a simple yet powerful framework for performing computation on networks of workstations. In addition to the Linda memory model, it provides for shared objects, implicit multithreading, implicit synchronization, object dataflow, and collective communications similar to those defined in MPI. JavaNOW is also a component of the Computational Neighborhood, a Java‐enabled suite of services for desktop computational sharing. The intent of JavaNOW is to present an environment for parallel computing that is both expressive and reliable and ultimately can deliver good to excellent performance. As JavaNOW is a work in progress, this article emphasizes the expressive potential of the JavaNOW environment and presents preliminary performance results only
The Meeting of Acquaintances: A Cost-efficient Authentication Scheme for Light-weight Objects with Transient Trust Level and Plurality Approach
Wireless sensor networks consist of a large number of distributed sensor
nodes so that potential risks are becoming more and more unpredictable. The new
entrants pose the potential risks when they move into the secure zone. To build
a door wall that provides safe and secured for the system, many recent research
works applied the initial authentication process. However, the majority of the
previous articles only focused on the Central Authority (CA) since this leads
to an increase in the computation cost and energy consumption for the specific
cases on the Internet of Things (IoT). Hence, in this article, we will lessen
the importance of these third parties through proposing an enhanced
authentication mechanism that includes key management and evaluation based on
the past interactions to assist the objects joining a secured area without any
nearby CA. We refer to a mobility dataset from CRAWDAD collected at the
University Politehnica of Bucharest and rebuild into a new random dataset
larger than the old one. The new one is an input for a simulated authenticating
algorithm to observe the communication cost and resource usage of devices. Our
proposal helps the authenticating flexible, being strict with unknown devices
into the secured zone. The threshold of maximum friends can modify based on the
optimization of the symmetric-key algorithm to diminish communication costs
(our experimental results compare to previous schemes less than 2000 bits) and
raise flexibility in resource-constrained environments.Comment: 27 page
Visual pathways from the perspective of cost functions and multi-task deep neural networks
Vision research has been shaped by the seminal insight that we can understand
the higher-tier visual cortex from the perspective of multiple functional
pathways with different goals. In this paper, we try to give a computational
account of the functional organization of this system by reasoning from the
perspective of multi-task deep neural networks. Machine learning has shown that
tasks become easier to solve when they are decomposed into subtasks with their
own cost function. We hypothesize that the visual system optimizes multiple
cost functions of unrelated tasks and this causes the emergence of a ventral
pathway dedicated to vision for perception, and a dorsal pathway dedicated to
vision for action. To evaluate the functional organization in multi-task deep
neural networks, we propose a method that measures the contribution of a unit
towards each task, applying it to two networks that have been trained on either
two related or two unrelated tasks, using an identical stimulus set. Results
show that the network trained on the unrelated tasks shows a decreasing degree
of feature representation sharing towards higher-tier layers while the network
trained on related tasks uniformly shows high degree of sharing. We conjecture
that the method we propose can be used to analyze the anatomical and functional
organization of the visual system and beyond. We predict that the degree to
which tasks are related is a good descriptor of the degree to which they share
downstream cortical-units.Comment: 16 pages, 5 figure
Are Face and Object Recognition Independent? A Neurocomputational Modeling Exploration
Are face and object recognition abilities independent? Although it is
commonly believed that they are, Gauthier et al.(2014) recently showed that
these abilities become more correlated as experience with nonface categories
increases. They argued that there is a single underlying visual ability, v,
that is expressed in performance with both face and nonface categories as
experience grows. Using the Cambridge Face Memory Test and the Vanderbilt
Expertise Test, they showed that the shared variance between Cambridge Face
Memory Test and Vanderbilt Expertise Test performance increases monotonically
as experience increases. Here, we address why a shared resource across
different visual domains does not lead to competition and to an inverse
correlation in abilities? We explain this conundrum using our
neurocomputational model of face and object processing (The Model, TM). Our
results show that, as in the behavioral data, the correlation between
subordinate level face and object recognition accuracy increases as experience
grows. We suggest that different domains do not compete for resources because
the relevant features are shared between faces and objects. The essential power
of experience is to generate a "spreading transform" for faces that generalizes
to objects that must be individuated. Interestingly, when the task of the
network is basic level categorization, no increase in the correlation between
domains is observed. Hence, our model predicts that it is the type of
experience that matters and that the source of the correlation is in the
fusiform face area, rather than in cortical areas that subserve basic level
categorization. This result is consistent with our previous modeling
elucidating why the FFA is recruited for novel domains of expertise (Tong et
al., 2008)
The technological mediation of mathematics and its learning
This paper examines the extent to which mathematical knowledge, and its related pedagogy, is inextricably linked to the tools – physical, virtual, cultural – in which it is expressed. Our goal is to focus on a few exemplars of computational tools, and to describe with some illustrative examples, how mathematical meanings are shaped by their use. We begin with an appraisal of the role of digital technologies, and our rationale for focusing on them. We present four categories of digital tool-use that distinguish their differing potential to shape mathematical cognition. The four categories are: i. dynamic and graphical tools, ii. tools that outsource processing power, iii. new representational infrastructures, and iv. the implications of highbandwidth connectivity on the nature of mathematics activity. In conclusion, we draw out the implications of this analysis for mathematical epistemology and the mathematical meanings students develop. We also underline the central importance of design, both of the tools themselves and the activities in which they are embedded
Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms
The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different areassuch as seamless platform integration, context based cognitive network integration,new mobile sensor/actuator network paradigms, things identification(addressing, naming in IoT) and dynamic things discoverability and manyothers. The IoRT represents new convergence challenges and their need to be addressed, in one side the programmability and the communication ofmultiple heterogeneous mobile/autonomous/robotic things for cooperating,their coordination, configuration, exchange of information, security, safetyand protection. Developments in IoT heterogeneous parallel processing/communication and dynamic systems based on parallelism and concurrencyrequire new ideas for integrating the intelligent “devices”, collaborativerobots (COBOTS), into IoT applications. Dynamic maintainability, selfhealing,self-repair of resources, changing resource state, (re-) configurationand context based IoT systems for service implementation and integrationwith IoT network service composition are of paramount importance whennew “cognitive devices” are becoming active participants in IoT applications.This chapter aims to be an overview of the IoRT concept, technologies,architectures and applications and to provide a comprehensive coverage offuture challenges, developments and applications
- …