Document details from CiteSeerX (Isaac Councill, Lee Giles): We describe APE-100, a SIMD, modular parallel processor architecture for large scale scientific computations. The largest configuration that will be implemented in the present... more
Document details from CiteSeerX (Isaac Councill, Lee Giles): We describe APE-100, a SIMD, modular parallel processor architecture for large scale scientific computations. The largest configuration that will be implemented in the present design ...
—The study of reversible circuits holds great promise for emerging technologies. Reversible circuits offer the possibility for great reductions in power consumption, and quantum computers will require logically reversible digital... more
—The study of reversible circuits holds great promise for emerging technologies. Reversible circuits offer the possibility for great reductions in power consumption, and quantum computers will require logically reversible digital circuits. Many different reversible implementations of logical and arithmetic units have been proposed in the literature, but very few reversible floating-point designs exist. Floating-point operations are needed very frequently in nearly all computing disciplines, and studies have shown floating-point addition to be the most oft used floating-point operation. In this paper we present for the first time a reversible floating-point adder that closely follows the IEEE754 specification for binary floating-point arithmetic. Our design requires reversible designs of a controlled swap unit, a subtracter, an alignment unit, signed integer representation conversion units, an integer adder, a normalization unit, and a rounding unit. We analyze these major components in terms of quantum cost, garbage outputs, and constant inputs.
Resumen: Con el crecimiento explosivo de Internet y particularmente de las aplicaciones de comercio electronico, los ataques a las redes se han vuelto mas comunes y sofisticados. Las redes demandan medidas de proteccion mas elaboradas... more
Resumen: Con el crecimiento explosivo de Internet y particularmente de las aplicaciones de comercio electronico, los ataques a las redes se han vuelto mas comunes y sofisticados. Las redes demandan medidas de proteccion mas elaboradas para garantizar que estas operen seguras y dar continuidad a los servicios criticos, estas medidas incluyen metodos de deteccion y repuesta en tiempo real a los intentos de intrusion. Este trabajo usa modelos estadisticos y clasificadores multivariables para detectar perfiles de trafico anomalos, utilizando redes neuronales. El analisis estadistico basa su calculo en el algebra de las funciones de densidad de probabilidad (PDF). La red neuronal integra esta informacion en una sola salida reportando el estado de la red, la que alimenta un software que configura al firewall, para producir un rechazo de la amenaza en tiempo real.
CWI is a founding member of ERCIM, the European Research Consortium for Informatics and Mathematics. CWI's research has a theme-oriented structure and is grouped into four clusters. Listed below are the names of the clusters and... more
CWI is a founding member of ERCIM, the European Research Consortium for Informatics and Mathematics. CWI's research has a theme-oriented structure and is grouped into four clusters. Listed below are the names of the clusters and in parentheses their acronyms.
Performance and energy consumption of the devices, thus it is clear that there was a reduction in CPU power consumption close to 1%, in contrast, 2% loss in performance. GPU obtained a reduction of 6% in energy consumption and 12%... more
Performance and energy consumption of the devices, thus it is clear that there was a reduction in CPU power consumption close to 1%, in contrast, 2% loss in performance. GPU obtained a reduction of 6% in energy consumption and 12% reduction in performance because the main and caches memories have not had significant reductions. This experience is relevant to prove how current architectures are optimized and as any simple parametric change reflects the imbalance of architectural devices.
Resumo Este artigo descreve um experimento de desempenho e consumo energético de Graphics Processing Unit (GPU), Central Processing Unit (CPU) Memória Principal e Cache em ambiente simulado. Utilizou-se um conjunto de benchmarks para esta tarefa. Os resultados são baseados na alteração da configuração do parâmetro MaxInFlightMen da GPU. Esse parâmetro é responsável pelo número máximo de acesso simultâneo ao vetor de memória da GPU. Essas modificações refletiram diretamente na desempenho e consumo energético dos dispositivos, portanto é claro que houve uma redução no consumo de energia da CPU próximo de 1%, em contrapartida, perda de 2% no desempenho, na GPU obteve-se uma redução de 6% no consumo energético e 12% de redução no desempenho porque as memórias caches e principais não tiveram reduções significativas. Este experimento é relevante para provar como as arquiteturas atuais são otimizadas e como qualquer simples mudança paramétrica reflete no desequilíbrio dos dispositivos arquitetônicos.
The development of learning technology systems is expensive and time consuming. This applies to both the system and the educational content. This article describes an effective solution in the form of an application framework. The... more
The development of learning technology systems is expensive and time consuming. This applies to both the system and the educational content. This article describes an effective solution in the form of an application framework. The framework is capable to deliver highly interactive content and is suitable for all kinds of instruction, with or without adaptive behavior. It can be handled by educational designers and requires minor technical skills. The framework architecture is designed for change by programmers.
El grupo INCA trabaja en diferentes lineas de investigacion tales como: procesamiento digital de senales, busqueda de patrones en imagenes, sistemas de tiempo real, sistemas de navegacion y sistemas embebidos. Este trabajo integra estos... more
El grupo INCA trabaja en diferentes lineas de investigacion tales como: procesamiento digital de senales, busqueda de patrones en imagenes, sistemas de tiempo real, sistemas de navegacion y sistemas embebidos. Este trabajo integra estos conocimientos, para el desarrollo de un sistema embebido que permita la conversion de senales digitales en analogicas, a traves de algoritmos de procesamiento de senales en tiempo real.
This paper presents a comparison of superscalar and decoupled access/execute architectures. Both architectures attempt to exploit instruction-level parallelism by issuing multiple instructions per cycle, employing dynamic scheduling to... more
This paper presents a comparison of superscalar and decoupled access/execute architectures. Both architectures attempt to exploit instruction-level parallelism by issuing multiple instructions per cycle, employing dynamic scheduling to maximize performance. Simulation results are presented for four different configurations, demonstrating that the architectural queues of the decoupled machines provide similar functionality to register renaming, dynamic loop unrolling, and out-of-order execution of the superscalar machines with significantly less complexity. 1. Introduction The importance of being able to make use of the available parallelism in a task is becoming more and more clear. Research over the last 30 years has demonstrated the difficulty of writing parallel programs; however, there are a number of techniques for exploiting instructionlevel parallelism that have been proposed. The most commercially successful approach has been superscalar architectures [John91], which execute...
In recent years the use of smartphones has increased because the convergence of technologies related in the development of these mobile devices. This convergence relates to communication, handheld devices and applications. The most common... more
In recent years the use of smartphones has increased because the convergence of technologies related in the development of these mobile devices. This convergence relates to communication, handheld devices and applications. The most common development platforms are Android, iOS, Windows Phone and Symbian. In most cases mobile application developers restrict the development to one or two platforms, since there is not strong multi-platform execution support. For example, an iOS application will not run on Android or another system. One solution is web development, but it presents some problems such as adaptability, overload on servers, low use of device capabilities, and poor code reuse. A better solution is to develop a middleware that helps to develop open applications. This paper gives an analysis of the problems involved in the design of open mobile applications, challenges and some solutions.
This paper presents a comparison of superscalar and decoupled access/execute architectures. Both architectures attempt to exploit instruction-level parallelism by issuing multiple instructions per cycle, employing dynamic scheduling to... more
This paper presents a comparison of superscalar and decoupled access/execute architectures. Both architectures attempt to exploit instruction-level parallelism by issuing multiple instructions per cycle, employing dynamic scheduling to maximize performance. Simulation results are presented for four different configurations, demonstrating that the architectural queues of the decoupled machines provide similar functionality to register renaming, dynamic loop unrolling, and out-of-order execution of the superscalar machines with significantly less complexity. 1. Introduction The importance of being able to make use of the available parallelism in a task is becoming more and more clear. Research over the last 30 years has demonstrated the difficulty of writing parallel programs; however, there are a number of techniques for exploiting instructionlevel parallelism that have been proposed. The most commercially successful approach has been superscalar architectures [John91], which execute...
Diversas líneas de investigación internacional han consolidado en el tiempo su interés en entender la evolución de la conducta de los nodos de red (usuarios y dispositivos activos), y extender tal entendimiento a estudiar y mejorar la... more
Diversas líneas de investigación internacional han consolidado en el tiempo su interés en entender la evolución de la conducta de los nodos de red (usuarios y dispositivos activos), y extender tal entendimiento a estudiar y mejorar la performance y productividad de las redes. En muchos trabajos se ha planteado el problema, con la recolección y estudio de trazas para redes cableadas y wireless, para encontrar tendencias comunes de grupos de nodos de red, caracterizando cada nodo de red por la conducta común mostrada en sus patrones de asociación a través de los días. Estos trabajos se han abocado a proponer y medir índices o parámetros para caracterizar su comportamiento. Se investigará y desarrollará un modelo para el análisis cuantitativo para determinar el grado del comportamiento diferenciado de distintas clases de nodos wireless (PC wireless, notebooks wireless, PDAs, y otros dispositivos móviles), en distintos contextos de una red WLAN (Wireless Local Area Network). El trabajo ...
In this article we show how knowledge representation techniques can be applied to software architecture. We define a representation model for software architecture concepts. The model is based on MY model (meta modeling in Y), which is a... more
In this article we show how knowledge representation techniques can be applied to software architecture. We define a representation model for software architecture concepts. The model is based on MY model (meta modeling in Y), which is a knowledge engineering methodology. It represents software architecture concepts using three branches: component, connector, and architecture. The component branch represents concepts that are related to computations, the connector branch represents concepts that are related to interactions, and the architecture branch represents concepts that are related to the structure and the topology of the system described. We think that such a representation of architecture concepts aids in improving reusability not only at the implementation level, but also at the description level. The model assigns a hierarchical library for the four software architecture conceptual levels (meta-meta architecture level, meta architecture level, architecture level, applicati...
Abstract: A hybrid control system for dynamic path following for an autonomous helicopter is described. The hierarchically structured system combines continuous control law execution with event-driven state machines. Trajectories are... more
Abstract: A hybrid control system for dynamic path following for an autonomous helicopter is described. The hierarchically structured system combines continuous control law execution with event-driven state machines. Trajectories are defined by a sequence of 3D path segments and velocity profiles, where each path segment is described as a parametric curve. The method can be used in combination with a path planner for flying collision-free in a known environment. Experimental flight test results are shown.
The Cognitive Walkthrough for the Web (CWW) is a partially automated usability evaluation method for identifying and repairing website navigation problems. Building on five earlier experiments [2,4], we first conducted two new experiments... more
The Cognitive Walkthrough for the Web (CWW) is a partially automated usability evaluation method for identifying and repairing website navigation problems. Building on five earlier experiments [2,4], we first conducted two new experiments to create a sufficiently large dataset for multiple regression analysis. Then we devised automatable problem-identification rules and used multiple regression analysis on that large dataset to develop a new CWW formula for accurately predicting problem severity. We then conducted a third experiment to test the prediction formula and refined CWW against an independent dataset, resulting in full cross-validation of the formula. We conclude that CWW has high psychological validity, because CWW gives us (a) accurate measures of problem severity, (b) high success rates for repairs of identified problems (c) high hit rates and low false alarms for identifying problems, and (d) high rates of correct rejections and low rates of misses for identifying non-p...