1,191,086 research outputs found

    Do the Barker Codes End?

    Get PDF
    A Barker code is a binary code with k^th autocorrelation <= 1 for all nonzero k. At the workshop, the Barker code group split into four non-disjoint subgroups: - An "algebra group", who explored symmetries of the search space that preserve the autocorrelations' magnitude. - A "computing group", who explored methods for quickly finding binary codes with very good autocorrelation properties. - A "statistics group", who explored ways to quantify what has been empirically observed about autocorrelation in the search space S_2^N. - A "continuous group", who explored a non-discrete analogue of the problem of finding sequences with good autocorrelations

    Application-tailored Linear Algebra Algorithms: A search-based Approach

    Full text link
    In this paper, we tackle the problem of automatically generating algorithms for linear algebra operations by taking advantage of problem-specific knowledge. In most situations, users possess much more information about the problem at hand than what current libraries and computing environments accept; evidence shows that if properly exploited, such information leads to uncommon/unexpected speedups. We introduce a knowledge-aware linear algebra compiler that allows users to input matrix equations together with properties about the operands and the problem itself; for instance, they can specify that the equation is part of a sequence, and how successive instances are related to one another. The compiler exploits all this information to guide the generation of algorithms, to limit the size of the search space, and to avoid redundant computations. We applied the compiler to equations arising as part of sensitivity and genome studies; the algorithms produced exhibit, respectively, 100- and 1000-fold speedups

    Socializing the Semantic Gap: A Comparative Survey on Image Tag Assignment, Refinement and Retrieval

    Get PDF
    Where previous reviews on content-based image retrieval emphasize on what can be seen in an image to bridge the semantic gap, this survey considers what people tag about an image. A comprehensive treatise of three closely linked problems, i.e., image tag assignment, refinement, and tag-based image retrieval is presented. While existing works vary in terms of their targeted tasks and methodology, they rely on the key functionality of tag relevance, i.e. estimating the relevance of a specific tag with respect to the visual content of a given image and its social context. By analyzing what information a specific method exploits to construct its tag relevance function and how such information is exploited, this paper introduces a taxonomy to structure the growing literature, understand the ingredients of the main works, clarify their connections and difference, and recognize their merits and limitations. For a head-to-head comparison between the state-of-the-art, a new experimental protocol is presented, with training sets containing 10k, 100k and 1m images and an evaluation on three test sets, contributed by various research groups. Eleven representative works are implemented and evaluated. Putting all this together, the survey aims to provide an overview of the past and foster progress for the near future.Comment: to appear in ACM Computing Survey

    Challenges of Internet of Things and Big Data Integration

    Full text link
    The Internet of Things anticipates the conjunction of physical gadgets to the In-ternet and their access to wireless sensor data which makes it expedient to restrain the physical world. Big Data convergence has put multifarious new opportunities ahead of business ventures to get into a new market or enhance their operations in the current market. considering the existing techniques and technologies, it is probably safe to say that the best solution is to use big data tools to provide an analytical solution to the Internet of Things. Based on the current technology deployment and adoption trends, it is envisioned that the Internet of Things is the technology of the future, while to-day's real-world devices can provide real and valuable analytics, and people in the real world use many IoT devices. Despite all the advertisements that companies offer in connection with the Internet of Things, you as a liable consumer, have the right to be suspicious about IoT advertise-ments. The primary question is: What is the promise of the Internet of things con-cerning reality and what are the prospects for the future.Comment: Proceedings of the International Conference on International Conference on Emerging Technologies in Computing 2018 (iCETiC '18), 23rd -24th August, 2018, at London Metropolitan University, London, UK, Published by Springer-Verla

    The business perspective of cloud computing for small and medium enterprises

    Get PDF
    Cloud computing has been described as a technological change brought about by the convergence of a number of new and existing technologies. It enables all businesses to get the best of technology at extremely economical costs. Both perspectives of the Cloud are important to be reviewed, of the provider’s side as well as the consumers of the technology. While a lot of research is currently taking place in the technology itself, there is an equally urgent need for understanding the business-related issues surrounding cloud computing. In this paper, we identify the strengths and weaknesses for the Cloud computing. First of all, the Cloud computing has much to offer to the small and medium enterprises. It allows them to run applications that are traditionally too complex or expensive (either because of prohibitive licensing costs or impractical hardware requirements), to outsource the commodity aspects of providing IT services, thus reducing the need for them to maintain the overheads of a dedicated computing facility, such as: small to no capital required, smaller IT staff necessary, increased security and compliance certifications handled outside of the company, access to the right level of compute power (as fast as is needed, and only what is needed), etc. It reduces the need for long start-up times for implementing new services and capabilities as well as the ongoing need for operator training
    corecore