Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 38, Issue 5Sep 2023
Reflects downloads up to 14 Jan 2025Bibliometrics
Skip Table Of Content Section
research-article
Reinvent Cloud Software Stacks for Resource Disaggregation
Abstract

Due to the unprecedented development of low-latency interconnect technology, building large-scale disaggregated architecture is drawing more and more attention from both industry and academia. Resource disaggregation is a new way to organize the ...

research-article
FedIERF: Federated Incremental Extremely Random Forest for Wearable Health Monitoring
Abstract

Wearable health monitoring is a crucial technical tool that offers early warning for chronic diseases due to its superior portability and low power consumption. However, most wearable health data is distributed across different organizations, such ...

research-article
Top-down Text-Level Discourse Rhetorical Structure Parsing with Bidirectional Representation Learning
Abstract

Early studies on discourse rhetorical structure parsing mainly adopt bottom-up approaches, limiting the parsing process to local information. Although current top-down parsers can better capture global information and have achieved particular ...

research-article
FDNet: A Deep Learning Approach with Two Parallel Cross Encoding Pathways for Precipitation Nowcasting
Abstract

With the goal of predicting the future rainfall intensity in a local region over a relatively short period time, precipitation nowcasting has been a long-time scientific challenge with great social and economic impact. The radar echo extrapolation ...

research-article
Chinese Named Entity Recognition Augmented with Lexicon Memory
Abstract

Inspired by the concept of content-addressable retrieval from cognitive science, we propose a novel fragmentbased Chinese named entity recognition (NER) model augmented with a lexicon-based memory in which both characterlevel and word-level ...

research-article
Cognition: Accurate and Consistent Linear Log Parsing Using Template Correction
Abstract

Logs contain runtime information for both systems and users. As many of them use natural language, a typical log-based analysis needs to parse logs into the structured format first. Existing parsing approaches often take two steps. The first step ...

research-article
Dalea: A Persistent Multi-Level Extendible Hashing with Improved Tail Performance
Abstract

Persistent memory (PM) promises byte-addressability, large capacity, and durability. Main memory systems, such as key-value stores and in-memory databases, benefit from such features of PM. Due to the great popularity of hashing index in main ...

research-article
VTensor: Using Virtual Tensors to Build a Layout-Oblivious AI Programming Framework
Abstract

Tensors are a popular programming interface for developing artificial intelligence (AI) algorithms. Layout refers to the order of placing tensor data in the memory and will affect performance by affecting data locality; therefore the deep neural ...

research-article
Path-Based Multicast Routing for Network-on-Chip of the Neuromorphic Processor
Abstract

Network-on-Chip (NoC) is widely adopted in neuromorphic processors to support communication between neurons in spiking neural networks (SNNs). However, SNNs generate enormous spiking packets due to the one-to-many traffic pattern. The spiking ...

research-article
CA-DTS: A Distributed and Collaborative Task Scheduling Algorithm for Edge Computing Enabled Intelligent Road Network
Abstract

Edge computing enabled Intelligent Road Network (EC-IRN) provides powerful and convenient computing services for vehicles and roadside sensing devices. The continuous emergence of transportation applications has caused a huge burden on roadside ...

research-article
Side-Channel Analysis for the Re-Keying Protocol of Bluetooth Low Energy
Abstract

In the era of the Internet of Things, Bluetooth low energy (BLE/BTLE) plays an important role as a well-known wireless communication technology. While the security and privacy of BLE have been analyzed and fixed several times, the threat of side-...

research-article
Accurate Robotic Grasp Detection with Angular Label Smoothing
Abstract

Grasp detection is a visual recognition task where the robot makes use of its sensors to detect graspable objects in its environment. Despite the steady progress in robotic grasping, it is still difficult to achieve both real-time and high ...

research-article
Model Checking for Probabilistic Multiagent Systems
Abstract

In multiagent systems, agents usually do not have complete information of the whole system, which makes the analysis of such systems hard. The incompleteness of information is normally modelled by means of accessibility relations, and the ...

research-article
Parallel Bounded Search for the Maximum Clique Problem
Abstract

Given an undirected graph, the Maximum Clique Problem (MCP) is to find a largest complete subgraph of the graph. MCP is NP-hard and has found many practical applications. In this paper, we propose a parallel Branch-and- Bound (BnB) algorithm to ...

Comments