1,896 research outputs found

    Insecurity Cameras: Cinematic Elevators, Infidelity and the Crime of Time

    Get PDF
    The elevator, like the train and other icons of automated movement, would seem to hold a natural affinity with cinema, a kind of machine for making non-habitual space and time. Elevators displace human activity and effort, opening up instead a range of other types of encounters and types of mobility. As time-based mediums, elevators are zones of duration where the potential for change is made manifest. Unlike trains, however, elevators have not received or drawn critical interest on the part of cinema studies. This paper looks at the enduring verticality of cinematic elevators through a Bergsonian sense of duration as “infidelity to the self”, presenting a close reading of the elevator murder in Brian DePalma’s Dressed to Kill (1980) and a broader consideration of the elevator in cinema and urban culture.À l’instar d’icônes du mouvement automatisé, comme le train, l’ascenseur semble présenter une affinité naturelle avec le cinéma dans la mesure où il crée un espace-temps non habituel. Les ascenseurs dévient les activités et les efforts humains, en déployant d’autres formes de mobilité et de rencontres. En tant que médiums temporels, les ascenseurs représentent des zones de durée où se manifeste explicitement un potentiel de changement. Mais, contrairement aux trains, les ascenseurs n’ont jamais fait l’objet d’études cinématographiques approfondies. Cet article se propose de penser l’axe vertical des ascenseurs cinématographiques à partir de la conception « bergsonnienne » de la durée comprise comme « infidélité à soi ». Le célèbre meurtre dans un ascenseur du film Dressed to Kill (1980) de Brian de Palma servira de point d’ancrage afin de mener cette étude sur le rôle de l’ascenseur au cinéma et dans la culture urbaine

    SHADHO: Massively Scalable Hardware-Aware Distributed Hyperparameter Optimization

    Full text link
    Computer vision is experiencing an AI renaissance, in which machine learning models are expediting important breakthroughs in academic research and commercial applications. Effectively training these models, however, is not trivial due in part to hyperparameters: user-configured values that control a model's ability to learn from data. Existing hyperparameter optimization methods are highly parallel but make no effort to balance the search across heterogeneous hardware or to prioritize searching high-impact spaces. In this paper, we introduce a framework for massively Scalable Hardware-Aware Distributed Hyperparameter Optimization (SHADHO). Our framework calculates the relative complexity of each search space and monitors performance on the learning task over all trials. These metrics are then used as heuristics to assign hyperparameters to distributed workers based on their hardware. We first demonstrate that our framework achieves double the throughput of a standard distributed hyperparameter optimization framework by optimizing SVM for MNIST using 150 distributed workers. We then conduct model search with SHADHO over the course of one week using 74 GPUs across two compute clusters to optimize U-Net for a cell segmentation task, discovering 515 models that achieve a lower validation loss than standard U-Net.Comment: 10 pages, 6 figure

    A comparison of center of pressure variables recorded during running in barefoot, minimalist footwear, and traditional running shoes in the female population

    Get PDF
    In recent years, barefoot running and running in minimalist footwear as opposed to running in traditional running shoes has increased in popularity. The influence of such footwear choices on center of pressure (COP) displacements and velocity variables linked to injuries is yet to be understood. The aim of this study was to investigate differences between COP variables, linked to injuries measured in barefoot running, a minimalist running shoe, and with traditional running shoes and conditions during running in a healthy female population. Seventeen healthy female participants were examined. Participants performed five footfalls in each footwear condition while running at 12km/h±10% over a pressure plate while COP variables were recorded at 500Hz. The results suggest that minimalist running shoe COP characteristics were similar to those of barefoot runners, with various significant differences reported in both groups compared to runners with the traditional running shoe

    Cloudbus Toolkit for Market-Oriented Cloud Computing

    Full text link
    This keynote paper: (1) presents the 21st century vision of computing and identifies various IT paradigms promising to deliver computing as a utility; (2) defines the architecture for creating market-oriented Clouds and computing atmosphere by leveraging technologies such as virtual machines; (3) provides thoughts on market-based resource management strategies that encompass both customer-driven service management and computational risk management to sustain SLA-oriented resource allocation; (4) presents the work carried out as part of our new Cloud Computing initiative, called Cloudbus: (i) Aneka, a Platform as a Service software system containing SDK (Software Development Kit) for construction of Cloud applications and deployment on private or public Clouds, in addition to supporting market-oriented resource management; (ii) internetworking of Clouds for dynamic creation of federated computing environments for scaling of elastic applications; (iii) creation of 3rd party Cloud brokering services for building content delivery networks and e-Science applications and their deployment on capabilities of IaaS providers such as Amazon along with Grid mashups; (iv) CloudSim supporting modelling and simulation of Clouds for performance studies; (v) Energy Efficient Resource Allocation Mechanisms and Techniques for creation and management of Green Clouds; and (vi) pathways for future research.Comment: 21 pages, 6 figures, 2 tables, Conference pape

    A Taxonomy of Workflow Management Systems for Grid Computing

    Full text link
    With the advent of Grid and application technologies, scientists and engineers are building more and more complex applications to manage and process large data sets, and execute scientific experiments on distributed resources. Such application scenarios require means for composing and executing complex workflows. Therefore, many efforts have been made towards the development of workflow management systems for Grid computing. In this paper, we propose a taxonomy that characterizes and classifies various approaches for building and executing workflows on Grids. We also survey several representative Grid workflow systems developed by various projects world-wide to demonstrate the comprehensiveness of the taxonomy. The taxonomy not only highlights the design and engineering similarities and differences of state-of-the-art in Grid workflow systems, but also identifies the areas that need further research.Comment: 29 pages, 15 figure

    Flexible Session Management in a Distributed Environment

    Full text link
    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems
    corecore