2014 Sixth International Symposium on Parallel Architectures, Algorithms and Programming

13-15 July 2014

Filter Results

Displaying Results 1 - 25 of 71
  • [Front cover]

    Publication Year: 2014, Page(s): C4
    Request permission for reuse | PDF file iconPDF (1059 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2014, Page(s): i
    Request permission for reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2014, Page(s): iii
    Request permission for reuse | PDF file iconPDF (147 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): iv
    Request permission for reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):v - ix
    Request permission for reuse | PDF file iconPDF (163 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2014, Page(s): x
    Request permission for reuse | PDF file iconPDF (107 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Committee Chair

    Publication Year: 2014, Page(s): xi
    Request permission for reuse | PDF file iconPDF (28 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2014, Page(s): xii
    Request permission for reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2014, Page(s):xiii - xiv
    Request permission for reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Message from the HPCBD Workshop Chairs

    Publication Year: 2014, Page(s): xv
    Request permission for reuse | PDF file iconPDF (106 KB) | HTML iconHTML
    Freely Available from IEEE
  • HPCBD Workshop Organization

    Publication Year: 2014, Page(s): xvi
    Request permission for reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • External Reviewers

    Publication Year: 2014, Page(s): xvii
    Request permission for reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2014, Page(s):xviii - xxiv
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    These keynote speeches discuss the following: computing theory foundations of Big Data; WInternet: from net of things to Internet of things, market-oriented cloud computing and Big Data applications; programming with Big Data; and opportunistic resource utilization networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Evaluation of Dynamically-Allocated Multi-queue Buffers with Multiple Packets for NoC Routers

    Publication Year: 2014, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    A large portion of area and power in Network-on-Chip (NoC) routers is consumed by buffers, and hence these costly storage resources must be utilized well. However, some early related literatures are not suitable for modern NoC router architecture as well as various complicated traffic loads anymore. In this work, we first revisited the original dynamically-allocated multi-queue (DAMQ) buffer schem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithmic Aspects for Bi-Objective Multiple-Choice Hardware/Software Partitioning

    Publication Year: 2014, Page(s):7 - 12
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    Designing embedded systems has become a challengingprocess due to the increasing complexity of the applications. In addition, there is a need to meet multiple conflicting constraints such as speed, power and cost. These factors have led to an explosion in the design space as each task in the application can have various implementation options (software and a range of hardware customizations), wher... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault-Tolerant Distributed Publish/Subscribe Using Self-Stabilization

    Publication Year: 2014, Page(s):13 - 18
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    We propose a new fault-tolerant (self-stabilizing) distributed framework for the publish/subscribe scheme in a P2P network, where the participating nodes (peers) only need the state information of its immediate neighbors. The proposed system is guaranteed to recover from an unlimited number of transient faults (e.g., state corruption). We provide a complexity analysis of the recovery (stabilizatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Runtime Framework for GPGPU

    Publication Year: 2014, Page(s):19 - 22
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    A runtime framework for GPGPU is proposed. It provides a unified interface for applications to easily take advantage of the various computation powers on a heterogeneous environment. Multiple devices and platforms, such as CUDA and OpenCL can be utilized at the same time to achieve a better performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Sensitive and Robust Grid Reputation System Based on Rating of Recommenders

    Publication Year: 2014, Page(s):23 - 28
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    In this paper, we propose a sensitive and robust reputation system for service grid environments. A punishment factor is introduced to express the subjective opinion of evaluators and destroy the reputation of bad performers rapidly, which improves the sensitivity of the reputation system. By evaluating the reputation of recommenders, our solution filters out dishonest recommendations during the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Violation of IEEE Publication Principles<br>Efficient FPGA-mapping of 1024 point FFT Pipeline SDF Processor

    Publication Year: 2014, Page(s):29 - 34
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (406 KB) | HTML iconHTML

    In this paper the efficient mapping of pipeline single path delay feedback (SDF) fast Fourier transform (FFT) processors to FPGAs is considered. By paying special attention to how the design can efficiently be mapped to the course grained hardware structure of a target field programmable gate array (FPGA) better implementation results can be obtained.This is illustrated by mapping a R22 SDF FFT pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-parameter Online Identification Algorithm of Induction Motor for Hybrid Electric Vehicle Applications

    Publication Year: 2014, Page(s):35 - 39
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (186 KB) | HTML iconHTML

    The induction motor parameters vary with the operating conditions considerably in the Hybrid Electric Vehicle. The induction motor drive cannot deliver high static and dynamic performance without the correct machine parameter values in the controller. Therefore, an online multi-parameter identification technique for induction motor is necessary. In this paper, a novel Luenberger-sliding mode obser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wide Area Power System Fault Detection Using Compressed Sensing to Reduce the WAN Data Traffic

    Publication Year: 2014, Page(s):40 - 45
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    With the increasingly complex power system, wide area protection, using global data obtained from different substations through communications, has been a hot research topic for some time. However, the overall transmission of large amounts of data will cause communication network congestion, which will lead to delay and loss of data. Therefore building an algorithm which can make use of a reduced ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PSO Applied to Optimal Operation of a Micro-Grid with Wind Power

    Publication Year: 2014, Page(s):46 - 51
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    With deeper research of wind key technologies, concern on operation of a micro-grid with wind power has been aroused greatly. Fully use of supply resources and demand resources of a micro-grid is determined by optimal planning of integrated resources. Considering that implementation of demand-side management is available to change the load profiles and decrease the variation extent of load during ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fuzzy Multi-objective Optimization Method Solving the Output of Energy Storage System

    Publication Year: 2014, Page(s):52 - 56
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    The electricity consumption of a charging station is obviously fluctuant. An energy storage system is an effective device to improve the load variation of the charging station. In order to give full play to energy storage system, this paper proposes a charging and discharging control strategy of the storage system considering multi-objective including stabilizing load and economizing electric cons... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple Feature-Sets Method for Dependency Parsing

    Publication Year: 2014, Page(s):57 - 62
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    This paper presents a simple and effective approach to improve dependency parsing by exploiting multiple feature-sets. Traditionally, features are extracted by applying the feature templates to all the word pairs(first-order features)and word tuples(second-order features). In this pa per, we show that exploiting different feature templates for different word pairs and word tuples achieves signific... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Centroid-Based Clustering Algorithm for Text Document Data

    Publication Year: 2014, Page(s):63 - 68
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (956 KB) | HTML iconHTML

    Document clustering is a significantly popular research, which aims to partition a corpus into many subgroups of homogeneous documents. Traditional clustering approaches catholically lack of considerations of word weights with clusters. To address this problem, we propose an Adaptive Centroid-based Clustering (ACC) algorithm. As a successful supervised centroid-based classifier, Class-Feature-Cent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.