1,191,086 research outputs found
Do the Barker Codes End?
A Barker code is a binary code with k^th autocorrelation <= 1 for all nonzero k.
At the workshop, the Barker code group split into four non-disjoint subgroups:
- An "algebra group", who explored symmetries of the search space that preserve the autocorrelations' magnitude.
- A "computing group", who explored methods for quickly finding binary codes with very good autocorrelation properties.
- A "statistics group", who explored ways to quantify what has been empirically observed about autocorrelation in the search space S_2^N.
- A "continuous group", who explored a non-discrete analogue of the problem of finding sequences with good autocorrelations
Application-tailored Linear Algebra Algorithms: A search-based Approach
In this paper, we tackle the problem of automatically generating algorithms
for linear algebra operations by taking advantage of problem-specific
knowledge. In most situations, users possess much more information about the
problem at hand than what current libraries and computing environments accept;
evidence shows that if properly exploited, such information leads to
uncommon/unexpected speedups. We introduce a knowledge-aware linear algebra
compiler that allows users to input matrix equations together with properties
about the operands and the problem itself; for instance, they can specify that
the equation is part of a sequence, and how successive instances are related to
one another. The compiler exploits all this information to guide the generation
of algorithms, to limit the size of the search space, and to avoid redundant
computations. We applied the compiler to equations arising as part of
sensitivity and genome studies; the algorithms produced exhibit, respectively,
100- and 1000-fold speedups
Socializing the Semantic Gap: A Comparative Survey on Image Tag Assignment, Refinement and Retrieval
Where previous reviews on content-based image retrieval emphasize on what can
be seen in an image to bridge the semantic gap, this survey considers what
people tag about an image. A comprehensive treatise of three closely linked
problems, i.e., image tag assignment, refinement, and tag-based image retrieval
is presented. While existing works vary in terms of their targeted tasks and
methodology, they rely on the key functionality of tag relevance, i.e.
estimating the relevance of a specific tag with respect to the visual content
of a given image and its social context. By analyzing what information a
specific method exploits to construct its tag relevance function and how such
information is exploited, this paper introduces a taxonomy to structure the
growing literature, understand the ingredients of the main works, clarify their
connections and difference, and recognize their merits and limitations. For a
head-to-head comparison between the state-of-the-art, a new experimental
protocol is presented, with training sets containing 10k, 100k and 1m images
and an evaluation on three test sets, contributed by various research groups.
Eleven representative works are implemented and evaluated. Putting all this
together, the survey aims to provide an overview of the past and foster
progress for the near future.Comment: to appear in ACM Computing Survey
Challenges of Internet of Things and Big Data Integration
The Internet of Things anticipates the conjunction of physical gadgets to the
In-ternet and their access to wireless sensor data which makes it expedient to
restrain the physical world. Big Data convergence has put multifarious new
opportunities ahead of business ventures to get into a new market or enhance
their operations in the current market. considering the existing techniques and
technologies, it is probably safe to say that the best solution is to use big
data tools to provide an analytical solution to the Internet of Things. Based
on the current technology deployment and adoption trends, it is envisioned that
the Internet of Things is the technology of the future, while to-day's
real-world devices can provide real and valuable analytics, and people in the
real world use many IoT devices. Despite all the advertisements that companies
offer in connection with the Internet of Things, you as a liable consumer, have
the right to be suspicious about IoT advertise-ments. The primary question is:
What is the promise of the Internet of things con-cerning reality and what are
the prospects for the future.Comment: Proceedings of the International Conference on International
Conference on Emerging Technologies in Computing 2018 (iCETiC '18), 23rd
-24th August, 2018, at London Metropolitan University, London, UK, Published
by Springer-Verla
The business perspective of cloud computing for small and medium enterprises
Cloud computing has been described as a technological change brought about by the convergence of a number of new and existing technologies. It enables all businesses to get the best of technology at extremely economical costs. Both perspectives of the Cloud are important to be reviewed, of the provider’s side as well as the consumers of the technology. While a lot of research is currently taking place in the technology itself, there is an equally urgent need for understanding the business-related issues surrounding cloud computing. In this paper, we identify the strengths and weaknesses for the Cloud computing. First of all, the Cloud computing has much to offer to the small and medium enterprises. It allows them to run applications that are traditionally too complex or expensive (either because of prohibitive licensing costs or impractical hardware requirements), to outsource the commodity aspects of providing IT services, thus reducing the need for them to maintain the overheads of a dedicated computing facility, such as: small to no capital required, smaller IT staff necessary, increased security and compliance certifications handled outside of the company, access to the right level of compute power (as fast as is needed, and only what is needed), etc. It reduces the need for long start-up times for implementing new services and capabilities as well as the ongoing need for operator training
- …