![]() Esmaeilzadeh Dilmaghani, Saharnaz ![]() ![]() ![]() in 2019 IEEE International Conference on Big Data (Big Data), 9-12 December 2019 (2020, February 24) Detailed reference viewed: 376 (31 UL)![]() Pinel, Frédéric ![]() ![]() in Communications in Computer and Information Science (2020, February) We present a procedure for the design of a Deep Neural Net- work (DNN) that estimates the execution time for training a deep neural network per batch on GPU accelerators. The estimator is destined to be ... [more ▼] We present a procedure for the design of a Deep Neural Net- work (DNN) that estimates the execution time for training a deep neural network per batch on GPU accelerators. The estimator is destined to be embedded in the scheduler of a shared GPU infrastructure, capable of providing estimated training times for a wide range of network architectures, when the user submits a training job. To this end, a very short and simple representation for a given DNN is chosen. In order to compensate for the limited degree of description of the basic network representation, a novel co-evolutionary approach is taken to fit the estimator. The training set for the estimator, i.e. DNNs, is evolved by an evolutionary algorithm that optimizes the accuracy of the estimator. In the process, the genetic algorithm evolves DNNs, generates Python-Keras programs and projects them onto the simple representation. The genetic operators are dynamic, they change with the estimator’s accuracy in order to balance accuracy with generalization. Results show that despite the low degree of information in the representation and the simple initial design for the predictor, co-evolving the training set performs better than near random generated population of DNNs. [less ▲] Detailed reference viewed: 147 (15 UL)![]() Kieffer, Emmanuel ![]() ![]() ![]() in IEEE Transactions on Evolutionary Computation (2020), 24(1), 44--56 Detailed reference viewed: 108 (20 UL)![]() Thanapol, Panissara ![]() ![]() in 5th International Conference on Information Technology, Bangsaen 21-22 October 2020 (2020) Detailed reference viewed: 76 (5 UL)![]() Duflo, Gabriel ![]() ![]() ![]() Scientific Conference (2020) Detailed reference viewed: 104 (27 UL)![]() ; ; et al in High Performance Computing (2020) This article explores the application of evolutionary algorithms and agent-oriented programming to solve the problem of searching and monitoring objectives through a fleet of unmanned aerial vehicles. The ... [more ▼] This article explores the application of evolutionary algorithms and agent-oriented programming to solve the problem of searching and monitoring objectives through a fleet of unmanned aerial vehicles. The subproblem of static off-line planning is studied to find initial flight plans for each vehicle in the fleet, using evolutionary algorithms to achieve compromise values between the size of the explored area, the proximity of the vehicles, and the monitoring of points of interest defined in the area. The results obtained in the experimental analysis on representative instances of the surveillance problem indicate that the proposed techniques are capable of computing effective flight plans. [less ▲] Detailed reference viewed: 185 (32 UL)![]() Brust, Matthias R. ![]() ![]() ![]() in Intelligent Information and Database Systems - 12th Asian Conference ACIIDS 2020, Phuket, Thailand, March 23-26, 2020, Companion Proceedings (2020) Detailed reference viewed: 107 (17 UL)![]() Stolfi Rosso, Daniel ![]() ![]() ![]() in IEEE 17th Annual Consumer Communications & Networking Conference CCNC 2020, Las Vegas, NV, USA, January 10-13, 2020 (2020) Detailed reference viewed: 118 (17 UL)![]() Changaival, Boonyarit ![]() ![]() in GECCO '20: Genetic and Evolutionary Computation Conference, Companion Volume, Cancún, Mexico, July 8-12, 2020 (2020) Detailed reference viewed: 106 (19 UL)![]() ; Kieffer, Emmanuel ![]() ![]() in Journal of Computational Science (2020), 41 Detailed reference viewed: 153 (32 UL)![]() Duflo, Gabriel ![]() ![]() ![]() in GECCO '20: Genetic and Evolutionary Computation Conference, Companion Volume, Cancún, Mexico, July 8-12, 2020 (2020) Detailed reference viewed: 110 (18 UL)![]() Stolfi Rosso, Daniel ![]() ![]() ![]() in 2020 IEEE International Parallel and Distributed Processing Symposium Workshops, IPDPSW 2020, New Orleans, LA, USA, May 18-22, 2020 (2020) Detailed reference viewed: 188 (21 UL)![]() Stolfi Rosso, Daniel ![]() ![]() ![]() in Optimization and Learning - Third International Conference, OLA 2020, Cádiz, Spain, February 17-19, 2020, Proceedings (2020) Detailed reference viewed: 149 (24 UL)![]() Stolfi Rosso, Daniel ![]() ![]() ![]() in Sensors (2020), 20(9), 2566 Detailed reference viewed: 138 (24 UL)![]() Varrette, Sébastien ![]() ![]() ![]() in Proc. of 13th Intl. Conf. on Parallel Processing and Applied Mathematics (PPAM 2019) (2019, December) For large scale systems, such as data centers, energy efficiency has proven to be key for reducing capital, operational expenses and environmental impact. Power drainage of a system is closely related to ... [more ▼] For large scale systems, such as data centers, energy efficiency has proven to be key for reducing capital, operational expenses and environmental impact. Power drainage of a system is closely related to the type and characteristics of workload that the device is running. For this reason, this paper presents an automatic software tuning method for parallel program generation able to adapt and exploit the hardware features available on a target computing system such as an HPC facility or a cloud system in a better way than traditional compiler infrastructures. We propose a search based approach combining both exact methods and approximated heuristics evolving programs in order to find optimized configurations relying on an ever-increasing number of tunable knobs i.e., code transformation and execution options (such as the num- ber of OpenMP threads and/or the CPU frequency settings). The main objective is to outperform the configurations generated by traditional compiling infrastructures for selected KPIs i.e., performance, energy and power usage (for both for the CPU and DRAM), as well as the runtime. First experimental results tied to the local optimization phase of the proposed framework are encouraging, demonstrating between 8% and 41% improvement for all considered metrics on a reference benchmark- ing application (i.e., Linpack). This brings novel perspectives for the global optimization step currently under investigation within the presented framework, with the ambition to pave the way toward automatic tuning of energy-aware applications beyond the performance of the current state-of-the-art compiler infrastructures. [less ▲] Detailed reference viewed: 187 (43 UL)![]() Samir Labib, Nader ![]() ![]() ![]() in Sensors (2019), 19(21), 22 The rapid adoption of Internet of Things (IoT) has encouraged the integration of new connected devices such as Unmanned Aerial Vehicles (UAVs) to the ubiquitous network. UAVs promise a pragmatic solution ... [more ▼] The rapid adoption of Internet of Things (IoT) has encouraged the integration of new connected devices such as Unmanned Aerial Vehicles (UAVs) to the ubiquitous network. UAVs promise a pragmatic solution to the limitations of existing terrestrial IoT infrastructure as well as bring new means of delivering IoT services through a wide range of applications. Owning to their potential, UAVs are expected to soon dominate the low-altitude airspace over populated cities. This introduces new research challenges such as the safe management of UAVs operation under high traffic demands. This paper proposes a novel way of structuring the uncontrolled, low-altitude airspace, with the aim of addressing the complex problem of UAV traffic management at an abstract level. The work, hence, introduces a model of the airspace as a weighted multilayer network of nodes and airways and presents a set of experimental simulation results using three UAV traffic management heuristics. [less ▲] Detailed reference viewed: 212 (38 UL)![]() Samir Labib, Nader ![]() ![]() in Samir Labib, Nader; Danoy, Grégoire; Musial, Jedrzej (Eds.) et al 9th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications (DIVANet '19) (2019, November) Over the recent years, Unmanned Aerial Vehicles' (UAVs) technology developed rapidly. In turn shedding light on a wide range of potential civil and commercial applications ranging from mapping and ... [more ▼] Over the recent years, Unmanned Aerial Vehicles' (UAVs) technology developed rapidly. In turn shedding light on a wide range of potential civil and commercial applications ranging from mapping and surveillance, parcel delivery to more demanding ones that require UAVs to operate in heterogeneous swarms. However, with the great advantages UAVs bring, they are expected to soon dominate the shared, low-altitude airspace over populated cities, introducing multiple new research challenges in safely managing the unprecedented traffic demands. The main contribution of this work is addressing the complex problem of UAV traffic management at an abstract level by proposing a structure for the uncontrolled low-altitude airspace. The paper proposes a model of the airspace as a weighted multilayer network of nodes and airways and presents a set of experimental simulations of UAV traffic for the verification and validation of the model. Finally, the paper outlines our intended future work. [less ▲] Detailed reference viewed: 261 (51 UL)![]() Samir Labib, Nader ![]() ![]() ![]() in Technical report on data protection and privacy in smart ICT (2019), 1 With the emergence of new digital trends like the Internet of Things (IoT), more industry actors and technical committees pursue research in utilizing such technologies as they promise better and ... [more ▼] With the emergence of new digital trends like the Internet of Things (IoT), more industry actors and technical committees pursue research in utilizing such technologies as they promise better and optimized management, improved energy efficiency and better quality living by facilitating a magnitude of value-added services. However, as communication, sensing and actuation become increasingly sophisticated, such promising data-driven IoT systems generate, process, and exchange larger amounts of data, some of which is privacy-sensitive and security-critical. The sustained increase in number of connected devices, catalyzed by IoT, affirms the importance of addressing data protection, privacy and security challenges, as indices of trust, to achieve market acceptance. This consequently, emphasizes the need of a solid technical and regulatory foundation to ensure trustworthiness within the IoT ecosystem. The goal of this study is to first introduce the concept of trustworthiness in IoT with its main pillars, data protection, privacy and security, and then analyze developments in research and standardization for each of these. The study presents a gap analysis on data protection, privacy and security between research and standardization, throughout which the use case of Unmanned Aerial Vehicles (UAVs) is referred to, as a promising value-added service example of mobile IoT devices. The study concludes with suggestions for future research and standardization in order to address the identified gaps. [less ▲] Detailed reference viewed: 73 (11 UL)![]() Samir Labib, Nader ![]() ![]() ![]() in Samir Labib, Nader; Brust, Matthias R.; Danoy, Grégoire (Eds.) et al Trustworthiness in IoT - A Standards Gap Analysis on Security, Data Protection and Privacy (2019, October) With the emergence of new digital trends like Internet of Things (IoT), more industry actors and technical committees pursue research in utilising such technologies as they promise a better and optimised ... [more ▼] With the emergence of new digital trends like Internet of Things (IoT), more industry actors and technical committees pursue research in utilising such technologies as they promise a better and optimised management, improved energy efficiency and a better quality living through a wide array of value-added services. However, as sensing, actuation, communication and control become increasingly more sophisticated, such promising data-driven systems generate, process, and exchange larger amounts of security-critical and privacy-sensitive data, which makes them attractive targets of attacks. In turn this affirms the importance of trustworthiness in IoT and emphasises the need of a solid technical and regulatory foundation. The goal of this paper is to first introduce the concept of trustworthiness in IoT, its main pillars namely, security, privacy and data protection, and then analyse the state-of-the-art in research and standardisation for each of these subareas. Throughout the paper, we develop and refer to Unmanned Aerial Vehicles (UAVs) as a promising value-added service example of mobile IoT devices. The paper then presents a thorough gap analysis and concludes with recommendations for future work. [less ▲] Detailed reference viewed: 356 (31 UL)![]() Capponi, Andrea ![]() ![]() ![]() in IEEE Symposium on Computers and Communications (ISCC), Barcelona, Spain, 2019 (2019, July) Urban planning typically relies on experience-based solutions and traditional methodologies to face urbanization issues and investigate the complex dynamics of cities. Recently, novel data-driven ... [more ▼] Urban planning typically relies on experience-based solutions and traditional methodologies to face urbanization issues and investigate the complex dynamics of cities. Recently, novel data-driven approaches in urban computing have emerged for researchers and companies. They aim to address historical urbanization issues by exploiting sensing data gathered by mobile devices under the so-called mobile crowdsensing (MCS) paradigm. This work shows how to exploit sensing data to improve traditionally experience-based approaches for urban decisions. In particular, we apply widely known Machine Learning (ML) techniques to achieve highly accurate results in predicting categories of local businesses (LBs) (e.g., bars, restaurants), and their attractiveness in terms of classes of temporal demands (e.g., nightlife, business hours). The performance evaluation is conducted in Luxembourg city and the city of Munich with publicly available crowdsensed datasets. The results highlight that our approach does not only achieve high accuracy, but it also unveils important hidden features of the interaction of citizens and LBs. [less ▲] Detailed reference viewed: 319 (26 UL) |
||