WWW 2013 22Nd International World Wide Web Conference
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Taxonomy of Accelerator Architectures and Their
A taxonomy of accelerator C. Cas$caval S. Chatterjee architectures and their H. Franke K. J. Gildea programming models P. Pattnaik As the clock frequency of silicon chips is leveling off, the computer architecture community is looking for different solutions to continue application performance scaling. One such solution is the multicore approach, i.e., using multiple simple cores that enable higher performance than wide superscalar processors, provided that the workload can exploit the parallelism. Another emerging alternative is the use of customized designs (accelerators) at different levels within the system. These are specialized functional units integrated with the core, specialized cores, attached processors, or attached appliances. The design tradeoff is quite compelling because current processor chips have billions of transistors, but they cannot all be activated or switched at the same time at high frequencies. Specialized designs provide increased power efficiency but cannot be used as general-purpose compute engines. Therefore, architects trade area for power efficiency by placing in the design additional units that are known to be active at different times. The resulting system is a heterogeneous architecture, with the potential of specialized execution that accelerates different workloads. While designing and building such hardware systems is attractive, writing and porting software to a heterogeneous platform is even more challenging than parallelism for homogeneous multicore systems. In this paper, we propose a taxonomy that allows us to define classes of accelerators, with the goal of focusing on a small set of programming models for accelerators. We discuss several types of currently popular accelerators and identify challenges to exploiting such accelerators in current software stacks. -
Online Visualization of Geospatial Stream Data Using the Worldwide Telescope
Online Visualization of Geospatial Stream Data using the WorldWide Telescope Mohamed Ali#, Badrish Chandramouli*, Jonathan Fay*, Curtis Wong*, Steven Drucker*, Balan Sethu Raman# #Microsoft SQL Server, One Microsoft Way, Redmond WA 98052 {mali, sethur}@microsoft.com *Microsoft Research, One Microsoft Way, Redmond WA 98052 {badrishc, jfay, curtis.wong, sdrucker}@microsoft.com ABSTRACT execution query pipeline. StreamInsight has been used in the past This demo presents the ongoing effort to meld the stream query to process geospatial data, e.g., in traffic monitoring [4, 5]. processing capabilities of Microsoft StreamInsight with the On the other hand, the WorldWide Telescope (WWT) [9] enables visualization capabilities of the WorldWide Telescope. This effort a computer to function as a virtual telescope, bringing together provides visualization opportunities to manage, analyze, and imagery from the various ground and space-based telescopes in process real-time information that is of spatio-temporal nature. the world. WWT enables a wide range of user experiences, from The demo scenario is based on detecting, tracking and predicting narrated guided tours from astronomers and educators featuring interesting patterns over historical logs and real-time feeds of interesting places in the sky, to the ability to explore the features earthquake data. of planets. One interesting feature of WWT is its use as a 3-D model of earth, enabling its use as an earth viewer. 1. INTRODUCTION Real-time stream data acquisition has been widely used in This demo presents the ongoing work at Microsoft Research and numerous applications such as network monitoring, Microsoft SQL Server groups to meld the value of stream query telecommunications data management, security, manufacturing, processing of StreamInsight with the unique visualization and sensor networks. -
Taeho Jung 1/5
Taeho Jung 1/5 Contact Department of Computer Science and Engineering Phone: (773) 431-3225 Information University of Notre Dame Email: [email protected] Notre Dame, IN 46556 USA Website: sites.nd.edu/taeho-jung Research Cybersecurity, big data security, user privacy, privacy-preserving computation, accountability Interests Working University of Notre Dame, Department of Computer Science and Engineering, Notre Dame, IN Experience Assistant Professor Aug. 2017 - Present Illinois Institute of Technology, Department of Computer Science, Chicago, IL Teaching Assistant Aug. 2011 - May. 2017 • CS330 | Discrete Structures: Spring'15, Spring'14, Fall'13, Spring'13, Fall'12 • CS430 | Introduction to Algorithms: Spring'17, Fall'16, Spring'16, Fall'15, Fall'14 • CS331, CS485, CS561, CS595: Spring'12, Fall'11 Research Assistant Aug. 2011 - May. 2017 • Studied information security and user privacy implications in big data life cycle. Adjunct Instructor May. 2016 - July 2016 • CS330 | Discrete Structures Instructor Evaluation 5.0/5.0, Course Evaluation 4.75/5.0 Education Illinois Institute of Technology, Chicago, IL USA Ph.D. Candidate, Computer Science. 2017 • Dissertation: \Ensuring Security and Privacy in Big Data Sharing, Trading, and Computing" • Adviser: Dr. Xiang-Yang Li and Dr. Peng-Jun Wan Tsinghua University, Beijing, China B.E., Computer Software, 2011 • Thesis: \Design and Implementation of Anonymous Access Control Protocol for Cloud Envi- ronment | AnonyABE" • Thesis score tied at 2nd place out of 26 students. • Adviser: Dr. Zhiguo Wan Honors and Runner up for Best Paper Award, BigCom 2015 Awards Teaching Assistant of the Year, Department of C.S., Illinois Tech. 2015 • Nominated by Prof. Edward M. Reingold and Prof. -
The Fourth Paradigm
ABOUT THE FOURTH PARADIGM This book presents the first broad look at the rapidly emerging field of data- THE FOUR intensive science, with the goal of influencing the worldwide scientific and com- puting research communities and inspiring the next generation of scientists. Increasingly, scientific breakthroughs will be powered by advanced computing capabilities that help researchers manipulate and explore massive datasets. The speed at which any given scientific discipline advances will depend on how well its researchers collaborate with one another, and with technologists, in areas of eScience such as databases, workflow management, visualization, and cloud- computing technologies. This collection of essays expands on the vision of pio- T neering computer scientist Jim Gray for a new, fourth paradigm of discovery based H PARADIGM on data-intensive science and offers insights into how it can be fully realized. “The impact of Jim Gray’s thinking is continuing to get people to think in a new way about how data and software are redefining what it means to do science.” —Bill GaTES “I often tell people working in eScience that they aren’t in this field because they are visionaries or super-intelligent—it’s because they care about science The and they are alive now. It is about technology changing the world, and science taking advantage of it, to do more and do better.” —RhyS FRANCIS, AUSTRALIAN eRESEARCH INFRASTRUCTURE COUNCIL F OURTH “One of the greatest challenges for 21st-century science is how we respond to this new era of data-intensive -
Denying Extremists a Powerful Tool Hany Farid ’88 Has Developed a Means to Root out Terrorist Propaganda Online
ALUMNI GAZETTE Denying Extremists a Powerful Tool Hany Farid ’88 has developed a means to root out terrorist propaganda online. But will companies like Google and Facebook use it? By David Silverberg be a “no-brainer” for social media outlets. Farid is not alone in his criticism of so- But so far, the project has faced resistance cial media companies. Last August, a pan- Hany Farid ’88 wants to clean up the In- from the leaders of Facebook, Twitter, and el in the British Parliament issued a report ternet. The chair of Dartmouth’s comput- other outlets who argue that identifying ex- charging that Facebook, Twitter, and er science department, he’s a leader in the tremist content is more difficult, presenting Google are not doing enough to prevent field of digital forensics. In the past several more gray areas, than child pornography. their networks from becoming recruitment years, he has played a lead role in creating In a February 2016 blog post, Twitter laid tools for extremist groups. programs to identify and root out two of out its official position: “As many experts Steve Burgess, president of the digital fo- the worst online scourges: child pornogra- and other companies have noted, there is rensics firm Burgess Consulting and Foren- phy and extremist political content. no ‘magic algorithm’ for identifying terror- sics, admires Farid’s dedication to projects “Digital forensics is an exciting field, es- ist content on the Internet, so global online that, according to Burgess, aren’t common pecially since you can have an impact on platforms are forced to make challenging in the field. -
Microsoft .NET Gadgeteer a New Way to Create Electronic Devices
Microsoft .NET Gadgeteer A new way to create electronic devices Nicolas Villar Microsoft Research Cambridge, UK What is .NET Gadgeteer? • .NET Gadgeteer is a new toolkit for quickly constructing, programming and shaping new small computing devices (gadgets) • Takes you from concept to working device quickly and easily Driving principle behind .NET Gadgeteer • Low threshold • Simple gadgets should be very simple to build • High ceiling • It should also be possible to build sophisticated and complex devices The three key components of .NET Gadgeteer The three key components of .NET Gadgeteer The three key components of .NET Gadgeteer Some background • We originally built Gadgeteer as a tool for ourselves (in Microsoft Research) to make it easier to prototype new kinds of devices • We believe the ability to prototype effectively is key to successful innovation Some background • Gadgeteer has proven to be of interest to other researchers – but also hobbyists and educators • With the help of colleagues from all across Microsoft, we are working on getting Gadgeteer out of the lab and into the hands of others Some background • Nicolas Villar, James Scott, Steve Hodges Microsoft Research Cambridge • Kerry Hammil Microsoft Research Redmond • Colin Miller Developer Division, Microsoft Corporation • Scarlet Schwiderski-Grosche, Stewart Tansley Microsoft Research Connections • The Garage @ Microsoft First key component of .NET Gadgeteer Quick example: Building a digital camera Some existing hardware modules Mainboard: Core processing unit Mainboard -
Build Reliable Cloud Networks with Sonic and ONE
Build Reliable Cloud Networks with SONiC and ONE Wei Bai 白巍 Microsoft Research Asia OCP China Technology Day, Shenzhen, China 1 54 100K+ 130+ $15B+ REGIONS WORLDWIDE MILES OF FIBER AND SUBSEA CABLE EDGE SITES Investments Two Open Source Cornerstones for High Reliability Networking OS: SONiC Network Verification: ONE 3 Networking OS: SONiC 4 A Solution to Unblock Hardware Innovation Monitoring, Management, Deployment Tools, Cutting Edge SDN SONiC SONiC SONiC SONiC Switch Abstraction Interface (SAI) Merchant Silicon Switch Abstraction Interface (SAI) NetworkNetwork ApplicationsApplicationsNetwork Applications Simple, consistent, and stable Hello network application stack Switch Abstraction Interface Help consume the underlying complex, heterogeneous частный 你好 नमते Bonjour hardware easily and faster https://github.com/opencomputeproject/SAI 6 SONiC High-Level Architecture Switch State Service (SWSS) • APP DB: persist App objects • SAI DB: persist SAI objects • Orchestration Agent: translation between apps and SAI objects, resolution of dependency and conflict • SyncD: sync SAI objects between software and hardware Key Goal: Evolve components independently 8 SONiC Containerization 9 SONiC Containerization • Components developed in different environments • Source code may not be available • Enables choices on a per- component basis 10 SONiC – Powering Microsoft At Cloud Scale Tier 3 - Regional Spine T3-1 T3-2 T3-3 T3-4 … … … Tier 2 - Spine T2-1-1 T2-1-2 T2-1-8 T2-4-1 T2-4-2 T2-4-4 Features and Roadmap Current: BGP, ECMP, ECN, WRED, LAG, SNMP, -
Evaluation of Edge Caching/Offloading for Dynamic
Evaluation of Edge Caching/Offloading for Dynamic Content Delivery Chun Yuan Yu Chen Zheng Zhang Microsoft Research Asia Microsoft Research Asia Microsoft Research Asia 3F Sigma Center, #49 Zhichun Road 3F Sigma Center, #49 Zhichun Road 3F Sigma Center, #49 Zhichun Road Beijing 100080, China Beijing 100080, China Beijing 100080, China 86-10-62617711 86-10-62617711 86-10-62617711 [email protected] [email protected] [email protected] ABSTRACT caching, we still lack the insight on what will be the best As dynamic content becomes increasingly dominant, it becomes offloading and caching strategies and their design/deployment an important research topic as how the edge resources such as tradeoffs. client-side proxies, which are otherwise underutilized for such In this paper, using a representative e-commerce benchmark, we content, can be put into use. However, it is unclear what will be have extensively studied many partitioning strategies. We found the best strategy and the design/deployment tradeoffs lie therein. that offloading and caching at edge proxy servers achieves In this paper, using one representative e-commerce benchmark, significant advantages without pulling database out near the client. we report our experience of an extensive investigation of different Our results show that, under typical user browsing patterns and offloading and caching options. Our results point out that, while network conditions, 2~3 folds of latency reduction can be great benefits can be reached in general, advanced offloading achieved. Furthermore, over 70% server requests are filtered at strategies can be overly complex and even counter-productive. In the proxies, resulting significant server load reduction. -
A Large-Scale Study of Web Password Habits
WWW 2007 / Track: Security, Privacy, Reliability, and Ethics Session: Passwords and Phishing A Large-Scale Study of Web Password Habits Dinei Florencioˆ and Cormac Herley Microsoft Research One Microsoft Way Redmond, WA, USA [email protected], [email protected] ABSTRACT to gain the secret. However, challenge response systems are We report the results of a large scale study of password use generally regarded as being more time consuming than pass- and password re-use habits. The study involved half a mil- word entry and do not seem widely deployed. One time lion users over a three month period. A client component passwords have also not seen broad acceptance. The dif- on users' machines recorded a variety of password strength, ¯culty for users of remembering many passwords is obvi- usage and frequency metrics. This allows us to measure ous. Various Password Management systems o®er to assist or estimate such quantities as the average number of pass- users by having a single sign-on using a master password words and average number of accounts each user has, how [7, 13]. Again, the use of these systems does not appear many passwords she types per day, how often passwords are widespread. For a majority of users, it appears that their shared among sites, and how often they are forgotten. We growing herd of password accounts is maintained using a get extremely detailed data on password strength, the types small collection of passwords. For a user with, e.g. 30 pass- and lengths of passwords chosen, and how they vary by site. -
Winter 2006-2007
UNIVERSITY OF NEBRASKA–LINCOLN COLLEGE OF JOURNALISM AND MASS COMMUNICATIONS ALUMNI MAGAZINE WINTER 2006-2007 Q&A With Steve Pederson Pages 44–51 Photo courtesy Lincoln Journal Star M E D I A Wesley G. Pippert ‘JUST POLITICS’ The nation has been reminded in recent days of the quality of There had been jokes that Ford had played football too long President Gerald R. Ford’s life and the easy, comfortable rela- without a helmet, making light of his presumed lack of wit — tionship he had with members of the press corps. even though he finished in the top third of his class both at In many ways, this relationship was another demonstration Michigan and the Yale law school. So during the speech Ford of Ford’s general friendliness with everyone. And it seems to me tried to put on an old helmet he had worn — but it wouldn’t fit. that it also was the result of his having worked on a frequent, “Heads tend to swell in Washington,” he said, a remark that daily basis with reporters during a quarter of a century in brought down the house. Congress. It was something of a surprise, then, when in 1974 Ford In times past, reporters gathered on the floor of the Senate a vetoed a bill that would have strengthened the 1966 Freedom of few minutes before the start of the session for what was called Information Act. (FOIA gives any citizen the right to gain access “dugout chatter,” a time when the majority leader would answer to government documents, with certain exceptions such as questions. -
Matrox Imaging Library (MIL) 9.0 Update 58
------------------------------------------------------------------------------- Matrox Imaging Library (MIL) 9.0 Update 58. Release Notes (Whatsnew) September 2012 (c) Copyright Matrox Electronic Systems Ltd., 1992-2012. ------------------------------------------------------------------------------- For more information and what's new in processing, display, drivers, Linux, ActiveMIL, and all MIL 9 updates, consult their respective readme files. Main table of contents Section 1 : What's new in Mil 9.0 Update 58 Section 2 : What's new in MIL 9.0 Release 2. Section 3 : What's new in MIL 9.0. Section 4 : Differences between MIL Lite 8.0 and 7.5 Section 5 : Differences between MIL Lite 7.5 and 7.1 Section 6 : Differences between MIL Lite 7.1 and 7.0 ------------------------------------------------------------------------------- ------------------------------------------------------------------------------- Section 1: What's new in MIL 9.0 Update 58. Table of Contents for Section 1 1. Overview. 2. Mseq API function definition 2.1 MseqAlloc 2.2 MseqControl 2.3 MseqDefine 2.4 MseqFeed 2.5 MseqFree 2.6 MseqGetHookInfo 2.7 MseqHookFunction 2.8 MseqInquire 2.9 MseqProcess 3. Examples 4. Operating system information 1. Overview. The main goal for MIL 9.0 Update 58 is to add a new module called Mseq, which offers a user-friendly interface for H.264 compression. 2. Mseq API function definition 2.1 MseqAlloc - Synopsis: Allocate a sequence context. - Syntax: MIL_ID MseqAlloc( MIL_ID SystemID, MIL_INT64 SequenceType, MIL_INT64 Operation, MIL_UINT32 OutputFormat, MIL_INT64 InitFlag, MIL_ID* ContextSeqIdPtr) - Parameters: * SystemID: Specifies the identifier of the system on which to allocate the sequence context. This parameter must be given a valid system identifier. * SequenceType: Specifies the type of sequence to allocate: Values: M_DEFAULT - Specifies the sequence as a context in which the related operation should be performed. -
An FPGA-Accelerated Embedded Convolutional Neural Network
Master Thesis Report ZynqNet: An FPGA-Accelerated Embedded Convolutional Neural Network (edit) (edit) 1000ch 1000ch FPGA 1000ch Network Analysis Network Analysis 2x512 > 1024 2x512 > 1024 David Gschwend [email protected] SqueezeNet v1.1 b2a ext7 conv10 2x416 > SqueezeNet SqueezeNet v1.1 b2a ext7 conv10 2x416 > SqueezeNet arXiv:2005.06892v1 [cs.CV] 14 May 2020 Supervisors: Emanuel Schmid Felix Eberli Professor: Prof. Dr. Anton Gunzinger August 2016, ETH Zürich, Department of Information Technology and Electrical Engineering Abstract Image Understanding is becoming a vital feature in ever more applications ranging from medical diagnostics to autonomous vehicles. Many applications demand for embedded solutions that integrate into existing systems with tight real-time and power constraints. Convolutional Neural Networks (CNNs) presently achieve record-breaking accuracies in all image understanding benchmarks, but have a very high computational complexity. Embedded CNNs thus call for small and efficient, yet very powerful computing platforms. This master thesis explores the potential of FPGA-based CNN acceleration and demonstrates a fully functional proof-of-concept CNN implementation on a Zynq System-on-Chip. The ZynqNet Embedded CNN is designed for image classification on ImageNet and consists of ZynqNet CNN, an optimized and customized CNN topology, and the ZynqNet FPGA Accelerator, an FPGA-based architecture for its evaluation. ZynqNet CNN is a highly efficient CNN topology. Detailed analysis and optimization of prior topologies using the custom-designed Netscope CNN Analyzer have enabled a CNN with 84.5 % top-5 accuracy at a computational complexity of only 530 million multiply- accumulate operations. The topology is highly regular and consists exclusively of convolu- tional layers, ReLU nonlinearities and one global pooling layer.