Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Android (1)
- Android NDK (1)
- CUDA (1)
- Cellular sensor networks (1)
- Conference Proceedings (1)
-
- Control systems (1)
- Distributed Systems (1)
- Exploration-exploitation dilemma (1)
- Fault-tolerant systems (1)
- Image Conversion (1)
- Invited Talks (1)
- JNI (1)
- Job scheduler (1)
- K-armed bandit (1)
- Lachesis (1)
- Network Communication (1)
- Other research (1)
- Parallelism (1)
- Pursuit-evasion (1)
- Real-time systems (1)
- Reinforcement learning (1)
- Self-organizing neural network (1)
- Time (1)
- Web Services (1)
- WebP (1)
- Wildlife tracking (1)
- Wireless networks (1)
- Wireless sensor networks (1)
- Publication
- Publication Type
Articles 1 - 8 of 8
Full-Text Articles in Computer Engineering
At The Tone, The Time Will Be... Unknown – A Perspective On The Evolution Of Time In Telecommunications, Robert Iannucci
At The Tone, The Time Will Be... Unknown – A Perspective On The Evolution Of Time In Telecommunications, Robert Iannucci
Robert A Iannucci
No abstract provided.
Embedded Virtual Machines For Robust Wireless Control And Actuation, Miroslav Pajic, Rahul Mangharam
Embedded Virtual Machines For Robust Wireless Control And Actuation, Miroslav Pajic, Rahul Mangharam
Rahul Mangharam
Embedded wireless networks have largely focused on open-loop sensing and monitoring. To address actuation in closed-loop wireless control systems there is a strong need to re-think the communication architectures and protocols for reliability, coordination and control. As the links, nodes and topology of wireless systems are inherently unreliable, such time-critical and safety-critical applications require programming abstractions and runtime systems where the tasks are assigned to the sensors, actuators and controllers as a single component rather than statically mapping a set of tasks to a specific physical node at design time. To this end, we introduce the Embedded Virtual Machine (EVM), …
Lachesis: A Job Scheduler For The Cray T3e, Allen B. Downey
Lachesis: A Job Scheduler For The Cray T3e, Allen B. Downey
Allen B. Downey
This paper presents the design and implementation of Lachesis, a job scheduler for the Cray T3E. Lachesis was developed at the San Diego Supercomputer Center (SDSC) in an attempt to correct some problems with the scheduling system Cray provides with the T3E.
Cuda Web Api Remote Execution Of Cuda Kernels Using Web Services, Massimo J. Becker
Cuda Web Api Remote Execution Of Cuda Kernels Using Web Services, Massimo J. Becker
Master's Theses
Massively parallel programming is an increasingly growing field with the recent introduction of general purpose GPU computing. Modern graphics processors from NVIDIA and AMD have massively parallel architectures that can be used for such applications as 3D rendering, financial analysis, physics simulations, and biomedical analysis. These massively parallel systems are exposed to programmers through in- terfaces such as NVIDIAs CUDA, OpenCL, and Microsofts C++ AMP. These frame- works expose functionality using primarily either C or C++. In order to use these massively parallel frameworks, programs being implemented must be run on machines equipped with massively parallel hardware. These requirements limit …
A Multi-Modal Sensing And Communication Platform For Continental-Scale Migratory Bird Tracking, David J. Anthony
A Multi-Modal Sensing And Communication Platform For Continental-Scale Migratory Bird Tracking, David J. Anthony
Computer and Electronics Engineering: Dissertations, Theses, and Student Research
This thesis presents a novel platform for tracking migratory birds on a continental scale. Cellular technology is used to augment the short-range radios that have traditionally been used in wireless sensor networks. The platform utilizes multiple sensors, including a GPS and solid state compass. By using these sensors, the platform is capable of not only tracking a bird’s migration path, but also provides information on a bird’s behavior during its life-cycle. Testing methodology utilizing simulations and aspect-oriented programming is used to reveal faults in the platform prior to deployment on wild animals. In collaboration with the International Crane Foundation, and …
Strategyproof Mechanisms For Ad Hoc Network Formation, C. Jason Woodard, David C. Parkes
Strategyproof Mechanisms For Ad Hoc Network Formation, C. Jason Woodard, David C. Parkes
C. Jason Woodard
Agents in a peer-to-peer system typically have incentives to influence its network structure, either to reduce their costs or increase their ability to capture value. The problem is compounded when agents can join and leave the system dynamically. This paper proposes three economic mechanisms that offset the incentives for strategic behavior and facilitate the formation of networks with desirable global properties.
Check Image Processing: Webp Conversion And Micr Scan Android Application, Trevor Bliss
Check Image Processing: Webp Conversion And Micr Scan Android Application, Trevor Bliss
Computer Engineering
As more users favor smartphones over computers for simple tasks, small businesses are constantly exploring mobile options to present to their customers. This write-up documents an Android application designed for a small company, which allows users to send pictures of checks to the company’s servers for processing. The picture is taken with the devices built-in camera and is converted to Google’s new image format, WebP. The company’s server processes the check and returns the check’s MICR code as a response. This application leverages the Android NDK and JNI to use Google’s open source image conversion libraries as well as socket …
Self‐Regulating Action Exploration In Reinforcement Learning, Teck-Hou Teng, Ah-Hwee Tan, Yuan-Sin Tan
Self‐Regulating Action Exploration In Reinforcement Learning, Teck-Hou Teng, Ah-Hwee Tan, Yuan-Sin Tan
Research Collection School Of Computing and Information Systems
The basic tenet of a learning process is for an agent to learn for only as much and as long as it is necessary. With reinforcement learning, the learning process is divided between exploration and exploitation. Given the complexity of the problem domain and the randomness of the learning process, the exact duration of the reinforcement learning process can never be known with certainty. Using an inaccurate number of training iterations leads either to the non-convergence or the over-training of the learning agent. This work addresses such issues by proposing a technique to self-regulate the exploration rate and training duration …