Now showing items 61-80 of 373

    Image and video object segmentation in low supervision scenarios 

    Bellver Bueno, Míriam (Date of defense: 2021-03-26)

    Computer vision plays a key role in Artificial Intelligence because of the rich semantic information contained in pixels and the ubiquity of cameras nowadays. Multimedia content is on a rise since social networks have such ...

    On the design and development of programming models for exascale systems 

    Maroñas, Marcos (Date of defense: 2021-02-17)

    High Performance Computing (HPC) systems have been evolving over time to adapt to the scientific community requirements. We are currently approaching to the Exascale era. Exascale systems will incorporate a large number ...

    Learning workload behaviour models from monitored time-series for resource estimation towards data center optimization 

    Buchaca Prats, David (Date of defense: 2021-01-14)

    In recent years there has been an extraordinary growth of the demand of Cloud Computing resources executed in Data Centers. Modern Data Centers are complex systems that need management. As distributed computing systems ...

    Energy-efficient architectures for recurrent neural networks 

    Silfa, Franyell (Date of defense: 2021-01-25)

    Deep Learning algorithms have been remarkably successful in applications such as Automatic Speech Recognition and Machine Translation. Thus, these kinds of applications are ubiquitous in our lives and are found in a plethora ...

    High-performance and energy-efficient irregular graph processing on GPU architectures 

    Segura Salvador, Albert (Date of defense: 2021-02-18)

    Graph processing is an established and prominent domain that is the foundation of new emerging applications in areas such as Data Analytics and Machine Learning, empowering applications such as road navigation, social ...

    Non-functional considerations of time-randomized processor architectures 

    Trilla Rodríguez, David (Date of defense: 2020-12-04)

    Critical Real-Time Embedded Systems (CRTES) are the subset of embedded systems with timing constraints whose miss behavior can endanger human lives or expensive equipment. To provide evidence of correctness, CRTES are ...

    Definition of new WAN paradigms enabled by smart measurements 

    Ciaccia, Francesco (Date of defense: 2020-12-04)

    Nowadays massive amounts of data are being moved over the Internet thanks to data-hungry applications, Big Data, and multimedia content. Combined with a reduction in cost and augmented reliability for high-speed broadband ...

    Runtime-assisted coherent caching 

    Caheny, Paul (Date of defense: 2020-12-22)

    In the middle of the 2000s a fundamental change of course occurred in computer architecture because techniques such as frequency scaling and instruction level parallelism were providing rapidly diminishing returns. Since ...

    Deep learning that scales: leveraging compute and data 

    Campos Camúñez, Víctor (Date of defense: 2020-12-22)

    Deep learning has revolutionized the field of artificial intelligence in the past decade. Although the development of these techniques spans over several years, the recent advent of deep learning is explained by an increased ...

    Runtime-assisted optimizations in the on-chip memory hierarchy 

    Dimić, Vladimir (Date of defense: 2020-11-27)

    Following Moore's Law, the number of transistors on chip has been increasing exponentially, which has led to the increasing complexity of modern processors. As a result, the efficient programming of such systems has become ...

    Low-power accelerators for cognitive computing 

    Riera Villanueva, Marc (Date of defense: 2020-10-09)

    Deep Neural Networks (DNNs) have achieved tremendous success for cognitive applications, and are especially efficient in classification and decision making problems such as speech recognition or machine translation. Mobile ...

    Adaptive learning-based resource management strategy in fog-to-cloud 

    Sengupta, Souvik (Date of defense: 2020-10-20)

    Technology in the twenty-first century is rapidly developing and driving us into a new smart computing world, and emerging lots of new computing architectures. Fog-to-Cloud (F2C) is among one of them, which emerges to ...

    Mobility-aware mechanisms for fog node discovery and selection 

    Rejiba, Zeineb (Date of defense: 2020-09-10)

    The recent development of delay-sensitive applications has led to the emergence of the fog computing paradigm. Within this paradigm, computation nodes present at the edge of the network can act as fog nodes (FNs) capable ...

    Programming models to support data science workflows 

    Ramón-Cortés Vilarrodona, Cristián (Date of defense: 2020-09-21)

    Data Science workflows have become a must to progress in many scientific areas such as life, health, and earth sciences. In contrast to traditional HPC workflows, they are more heterogeneous; combining binary executions, ...

    Enabling knowledge-defined networks : deep reinforcement learning, graph neural networks and network analytics 

    Suárez-Varela Macià, José Rafael (Date of defense: 2020-06-26)

    Significant breakthroughs in the last decade in the Machine Learning (ML) field have ushered in a new era of Artificial Intelligence (AI). Particularly, recent advances in Deep Learning (DL) have enabled to develop a new ...

    Exploiting frame coherence in real-time rendering for energy-efficient GPUs 

    Anglada Sánchez, Martí (Date of defense: 2020-06-09)

    The computation capabilities of mobile GPUs have greatly evolved in the last generations, allowing real-time rendering of realistic scenes. However, the desire for processing complex environments clashes with the ...

    Security strategies in genomic files 

    Naro, Daniel (Date of defense: 2020-05-15)

    There are new mechanisms to sequence and process the genomic code, discovering thus diagnostic tools and treatments. The file for a sequenced genome can reach hundreds of gigabytes. Thus, for further studies, we need new ...

    Virtualization techniques for memory resource exploitation 

    Garrido Platero, Luis Angel (Date of defense: 2019-11-26)

    Cloud infrastructures have become indispensable in our daily lives with the rise of cloud-based services offered by companies like Facebook, Google, Amazon and many others. These cloud infrastructures use a large numbers ...

    Exploring the topical structure of short text through probability models : from tasks to fundamentals 

    Capdevila Pujol, Joan (Date of defense: 2019-09-26)

    Recent technological advances have radically changed the way we communicate. Today’s communication has become ubiquitous and it has fostered the need for information that is easier to create, spread and consume. As a ...

    An extensive study on iterative solver resilience : characterization, detection and prediction 

    Mutlu, Burcu O. (Date of defense: 2019-11-12)

    Soft errors caused by transient bit flips have the potential to significantly impactan applicalion's behavior. This has motivated the design of an array of techniques to detect, isolate, and correct soft errors using ...