This document discusses near-optimal sensor placement for linear inverse problems. It introduces the concept of using sensors to measure physical fields and describes how inverse problems aim to estimate parameters of interest from sensor measurements. It presents the FrameSense algorithm, which uses a greedy approach to minimize frame potential as a proxy for minimizing mean squared error in sensor placement. FrameSense provides near-optimal sensor placement for linear inverse problems in polynomial time. As an example application, the document describes how FrameSense can be used for optimal placement of temperature sensors on a microprocessor to reconstruct thermal maps from sparse measurements.
Ensemble Contextual Bandits for Personalized RecommendationLiang Tang
The cold-start problem has attracted extensive attention among various online services that provide personalized recommendation. Many online vendors employ contextual bandit strategies to tackle the so-called exploration/exploitation dilemma rooted from the cold-start problem. However, due to high-dimensional user/item features and the underlying characteristics of bandit policies, it is often difficult for service providers to obtain and deploy an appropriate algorithm to achieve acceptable and robust economic profit.
In this paper, we explore ensemble strategies of contextual bandit algorithms to obtain robust predicted click-through rate (CTR) of web objects. The ensemble is acquired by aggregating different pulling policies of bandit algorithms, rather than forcing the agreement of prediction results or learning a unified predictive model. To this end, we employ a meta-bandit paradigm that places a hyper bandit over the base bandits, to explicitly explore/exploit the relative importance of base bandits based on user feedbacks. Extensive empirical experiments on two real-world data sets (news recommendation and online advertising) demonstrate the effectiveness of our proposed approach in terms of CTR.
Ensemble Contextual Bandits for Personalized RecommendationLiang Tang
The cold-start problem has attracted extensive attention among various online services that provide personalized recommendation. Many online vendors employ contextual bandit strategies to tackle the so-called exploration/exploitation dilemma rooted from the cold-start problem. However, due to high-dimensional user/item features and the underlying characteristics of bandit policies, it is often difficult for service providers to obtain and deploy an appropriate algorithm to achieve acceptable and robust economic profit.
In this paper, we explore ensemble strategies of contextual bandit algorithms to obtain robust predicted click-through rate (CTR) of web objects. The ensemble is acquired by aggregating different pulling policies of bandit algorithms, rather than forcing the agreement of prediction results or learning a unified predictive model. To this end, we employ a meta-bandit paradigm that places a hyper bandit over the base bandits, to explicitly explore/exploit the relative importance of base bandits based on user feedbacks. Extensive empirical experiments on two real-world data sets (news recommendation and online advertising) demonstrate the effectiveness of our proposed approach in terms of CTR.
Characterizing Faults, Errors and Failures in Extreme-Scale Computing Systemsinside-BigData.com
In this deck from PASC18, Christian Engelmann from Oak Ridge National Laboratory presents: Characterizing Faults, Errors and Failures in Extreme-Scale Computing Systems.
"Building a reliable supercomputer that achieves the expected performance within a given cost budget and providing efficiency and correctness during operation in the presence of faults, errors, and failures requires a full understanding of the resilience problem. The Catalog project develops a fault taxonomy, catalog and models that capture the observed and inferred conditions in current supercomputers and extrapolates this knowledge to future-generation systems. To date, the Catalog project has analyzed billions of node hours of system logs from supercomputers at Oak Ridge National Laboratory and Argonne National Laboratory. This talk provides an overview of our findings and lessons learned."
Watch the video: https://wp.me/p3RLHQ-iTE
Learn more: https://ornlwiki.atlassian.net/wiki/display/CFEFIES
and
https://pasc18.pasc-conference.org/
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Contention - Aware Scheduling (a different approach)Dimos Raptis
This presentation covers the topic of scheduling in operating systems and more specifically the field of contention-aware scheduling that seems to be really promising. It presents the outcome of a recent project, where a different approach resulted in the implementation of a contention-aware scheduler (called LCN) attempting to compete with the most modern schedulers and the current scheduler of Linux
An Elitist Simulated Annealing Algorithm for Solving Multi Objective Optimiza...Eswar Publications
Internet of Things (IoT) is going to introduce billions of data collection and computing nodes all over the world in next few years. IoT would be impacting daily life in many ways by virtue of more granular field-level data collection via those nodes and thus delivering faster actions. One of the key challenges in IoT design decision is resource constraint which often limits the space, battery capacity, computing power available in each of the nodes.
This presents an optimization problem with multiple objectives, with competing objectives. This paper proposes an algorithm based on Simulated annealing. Simulated Annealing is inspired by the physical annealing process which leads to a gradual movement towards a solution set. This paper proposes to use a variant of this mechanism to solve multi-objective optimization problems in IoT space to come out with a set of solutions which are non dominated from each other.
Real-time Puppies and Ponies - Evolving Indicator Recommendations in Real-timeTed Dunning
This talk describes how indicator-based recommendations can be evolved in real time. Normally, indicator-based recommendations use a large off-line computation to understand the general structure of items to be recommended and then make recommendations in real-time to users based on a comparison of their recent history versus the large-scale product of the off-line computation.
In this talk, I show how the same components of the off-line computation that guarantee linear scalability in a batch setting also give strict real-time bounds on the cost of a practical real-time implementation of the indicator computation.
Characterizing Faults, Errors and Failures in Extreme-Scale Computing Systemsinside-BigData.com
In this deck from PASC18, Christian Engelmann from Oak Ridge National Laboratory presents: Characterizing Faults, Errors and Failures in Extreme-Scale Computing Systems.
"Building a reliable supercomputer that achieves the expected performance within a given cost budget and providing efficiency and correctness during operation in the presence of faults, errors, and failures requires a full understanding of the resilience problem. The Catalog project develops a fault taxonomy, catalog and models that capture the observed and inferred conditions in current supercomputers and extrapolates this knowledge to future-generation systems. To date, the Catalog project has analyzed billions of node hours of system logs from supercomputers at Oak Ridge National Laboratory and Argonne National Laboratory. This talk provides an overview of our findings and lessons learned."
Watch the video: https://wp.me/p3RLHQ-iTE
Learn more: https://ornlwiki.atlassian.net/wiki/display/CFEFIES
and
https://pasc18.pasc-conference.org/
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Contention - Aware Scheduling (a different approach)Dimos Raptis
This presentation covers the topic of scheduling in operating systems and more specifically the field of contention-aware scheduling that seems to be really promising. It presents the outcome of a recent project, where a different approach resulted in the implementation of a contention-aware scheduler (called LCN) attempting to compete with the most modern schedulers and the current scheduler of Linux
An Elitist Simulated Annealing Algorithm for Solving Multi Objective Optimiza...Eswar Publications
Internet of Things (IoT) is going to introduce billions of data collection and computing nodes all over the world in next few years. IoT would be impacting daily life in many ways by virtue of more granular field-level data collection via those nodes and thus delivering faster actions. One of the key challenges in IoT design decision is resource constraint which often limits the space, battery capacity, computing power available in each of the nodes.
This presents an optimization problem with multiple objectives, with competing objectives. This paper proposes an algorithm based on Simulated annealing. Simulated Annealing is inspired by the physical annealing process which leads to a gradual movement towards a solution set. This paper proposes to use a variant of this mechanism to solve multi-objective optimization problems in IoT space to come out with a set of solutions which are non dominated from each other.
Real-time Puppies and Ponies - Evolving Indicator Recommendations in Real-timeTed Dunning
This talk describes how indicator-based recommendations can be evolved in real time. Normally, indicator-based recommendations use a large off-line computation to understand the general structure of items to be recommended and then make recommendations in real-time to users based on a comparison of their recent history versus the large-scale product of the off-line computation.
In this talk, I show how the same components of the off-line computation that guarantee linear scalability in a batch setting also give strict real-time bounds on the cost of a practical real-time implementation of the indicator computation.
Nutraceutical market, scope and growth: Herbal drug technologyLokesh Patil
As consumer awareness of health and wellness rises, the nutraceutical market—which includes goods like functional meals, drinks, and dietary supplements that provide health advantages beyond basic nutrition—is growing significantly. As healthcare expenses rise, the population ages, and people want natural and preventative health solutions more and more, this industry is increasing quickly. Further driving market expansion are product formulation innovations and the use of cutting-edge technology for customized nutrition. With its worldwide reach, the nutraceutical industry is expected to keep growing and provide significant chances for research and investment in a number of categories, including vitamins, minerals, probiotics, and herbal supplements.
Professional air quality monitoring systems provide immediate, on-site data for analysis, compliance, and decision-making.
Monitor common gases, weather parameters, particulates.
Cancer cell metabolism: special Reference to Lactate PathwayAADYARAJPANDEY1
Normal Cell Metabolism:
Cellular respiration describes the series of steps that cells use to break down sugar and other chemicals to get the energy we need to function.
Energy is stored in the bonds of glucose and when glucose is broken down, much of that energy is released.
Cell utilize energy in the form of ATP.
The first step of respiration is called glycolysis. In a series of steps, glycolysis breaks glucose into two smaller molecules - a chemical called pyruvate. A small amount of ATP is formed during this process.
Most healthy cells continue the breakdown in a second process, called the Kreb's cycle. The Kreb's cycle allows cells to “burn” the pyruvates made in glycolysis to get more ATP.
The last step in the breakdown of glucose is called oxidative phosphorylation (Ox-Phos).
It takes place in specialized cell structures called mitochondria. This process produces a large amount of ATP. Importantly, cells need oxygen to complete oxidative phosphorylation.
If a cell completes only glycolysis, only 2 molecules of ATP are made per glucose. However, if the cell completes the entire respiration process (glycolysis - Kreb's - oxidative phosphorylation), about 36 molecules of ATP are created, giving it much more energy to use.
IN CANCER CELL:
Unlike healthy cells that "burn" the entire molecule of sugar to capture a large amount of energy as ATP, cancer cells are wasteful.
Cancer cells only partially break down sugar molecules. They overuse the first step of respiration, glycolysis. They frequently do not complete the second step, oxidative phosphorylation.
This results in only 2 molecules of ATP per each glucose molecule instead of the 36 or so ATPs healthy cells gain. As a result, cancer cells need to use a lot more sugar molecules to get enough energy to survive.
Unlike healthy cells that "burn" the entire molecule of sugar to capture a large amount of energy as ATP, cancer cells are wasteful.
Cancer cells only partially break down sugar molecules. They overuse the first step of respiration, glycolysis. They frequently do not complete the second step, oxidative phosphorylation.
This results in only 2 molecules of ATP per each glucose molecule instead of the 36 or so ATPs healthy cells gain. As a result, cancer cells need to use a lot more sugar molecules to get enough energy to survive.
introduction to WARBERG PHENOMENA:
WARBURG EFFECT Usually, cancer cells are highly glycolytic (glucose addiction) and take up more glucose than do normal cells from outside.
Otto Heinrich Warburg (; 8 October 1883 – 1 August 1970) In 1931 was awarded the Nobel Prize in Physiology for his "discovery of the nature and mode of action of the respiratory enzyme.
WARNBURG EFFECT : cancer cells under aerobic (well-oxygenated) conditions to metabolize glucose to lactate (aerobic glycolysis) is known as the Warburg effect. Warburg made the observation that tumor slices consume glucose and secrete lactate at a higher rate than normal tissues.
What is greenhouse gasses and how many gasses are there to affect the Earth.moosaasad1975
What are greenhouse gasses how they affect the earth and its environment what is the future of the environment and earth how the weather and the climate effects.
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...University of Maribor
Slides from:
11th International Conference on Electrical, Electronics and Computer Engineering (IcETRAN), Niš, 3-6 June 2024
Track: Artificial Intelligence
https://www.etran.rs/2024/en/home-english/
Introduction:
RNA interference (RNAi) or Post-Transcriptional Gene Silencing (PTGS) is an important biological process for modulating eukaryotic gene expression.
It is highly conserved process of posttranscriptional gene silencing by which double stranded RNA (dsRNA) causes sequence-specific degradation of mRNA sequences.
dsRNA-induced gene silencing (RNAi) is reported in a wide range of eukaryotes ranging from worms, insects, mammals and plants.
This process mediates resistance to both endogenous parasitic and exogenous pathogenic nucleic acids, and regulates the expression of protein-coding genes.
What are small ncRNAs?
micro RNA (miRNA)
short interfering RNA (siRNA)
Properties of small non-coding RNA:
Involved in silencing mRNA transcripts.
Called “small” because they are usually only about 21-24 nucleotides long.
Synthesized by first cutting up longer precursor sequences (like the 61nt one that Lee discovered).
Silence an mRNA by base pairing with some sequence on the mRNA.
Discovery of siRNA?
The first small RNA:
In 1993 Rosalind Lee (Victor Ambros lab) was studying a non- coding gene in C. elegans, lin-4, that was involved in silencing of another gene, lin-14, at the appropriate time in the
development of the worm C. elegans.
Two small transcripts of lin-4 (22nt and 61nt) were found to be complementary to a sequence in the 3' UTR of lin-14.
Because lin-4 encoded no protein, she deduced that it must be these transcripts that are causing the silencing by RNA-RNA interactions.
Types of RNAi ( non coding RNA)
MiRNA
Length (23-25 nt)
Trans acting
Binds with target MRNA in mismatch
Translation inhibition
Si RNA
Length 21 nt.
Cis acting
Bind with target Mrna in perfect complementary sequence
Piwi-RNA
Length ; 25 to 36 nt.
Expressed in Germ Cells
Regulates trnasposomes activity
MECHANISM OF RNAI:
First the double-stranded RNA teams up with a protein complex named Dicer, which cuts the long RNA into short pieces.
Then another protein complex called RISC (RNA-induced silencing complex) discards one of the two RNA strands.
The RISC-docked, single-stranded RNA then pairs with the homologous mRNA and destroys it.
THE RISC COMPLEX:
RISC is large(>500kD) RNA multi- protein Binding complex which triggers MRNA degradation in response to MRNA
Unwinding of double stranded Si RNA by ATP independent Helicase
Active component of RISC is Ago proteins( ENDONUCLEASE) which cleave target MRNA.
DICER: endonuclease (RNase Family III)
Argonaute: Central Component of the RNA-Induced Silencing Complex (RISC)
One strand of the dsRNA produced by Dicer is retained in the RISC complex in association with Argonaute
ARGONAUTE PROTEIN :
1.PAZ(PIWI/Argonaute/ Zwille)- Recognition of target MRNA
2.PIWI (p-element induced wimpy Testis)- breaks Phosphodiester bond of mRNA.)RNAse H activity.
MiRNA:
The Double-stranded RNAs are naturally produced in eukaryotic cells during development, and they have a key role in regulating gene expression .
1. Juri Ranieri
Joint work with: Dr. Amina Chebira, Prof. Martin Vetterli, Prof. D. Atienza,
Dr. Z. Chen, I. Dokmanic, A. Vincenzi, R. Zhang
Near-optimal sensor placement for linear
inverse problems
2. EPFL, March 25th 2015
Sensing the real world
2
We experience the surrounding environment through sensors.
We have a set of natural sensors, i.e., eyes, ears, nose...
3. EPFL, March 25th 2015
Sensing the real world
2
We experience the surrounding environment through sensors.
We have a set of natural sensors, i.e., eyes, ears, nose...
Tech devices are equipped with many sensors, providing
an incredible amount of information about the real world.
4. EPFL, March 25th 2015
Inverse problems
3
We have access to an incredible amount of data.
How can we use it?
• Provide it to the end-user as measured,
• Store it on a server for future use,
• Use it to estimate other parameters of interest.
5. EPFL, March 25th 2015
Inverse problems
3
We have access to an incredible amount of data.
How can we use it?
• Provide it to the end-user as measured,
• Store it on a server for future use,
• Use it to estimate other parameters of interest.
Parameters
Measurements
Physical
model
6. EPFL, March 25th 2015
Inverse problems
3
We have access to an incredible amount of data.
How can we use it?
• Provide it to the end-user as measured,
• Store it on a server for future use,
• Use it to estimate other parameters of interest.
Inverse
problem
Parameters
Measurements
Physical
model
7. EPFL, March 25th 2015
Inverse problems
3
We have access to an incredible amount of data.
How can we use it?
• Provide it to the end-user as measured,
• Store it on a server for future use,
• Use it to estimate other parameters of interest.
Inverse
problem
Inverse problem are variegated.
Signal processing problems are inverse problems.
Parameters
Measurements
Physical
model
8. EPFL, March 25th 2015
A discrete model for physical fields
4
We consider a discretization of the physical field:
Environmental sensing
Pollution
IC temperature
9. EPFL, March 25th 2015
A discrete model for physical fields
4
We consider a discretization of the physical field:
f
Environmental sensing
Pollution
IC temperature
10. EPFL, March 25th 2015
A discrete model for physical fields
4
We consider a discretization of the physical field:
f
Environmental sensing
Pollution
IC temperature
11. EPFL, March 25th 2015
Solving a linear inverse problem
5
• Source localization.
• Data interpolation (low-dim representation).
• Boundary estimation.
• Parameter estimation.
12. EPFL, March 25th 2015
Solving a linear inverse problem
5
We aim at precisely estimating .↵
• Source localization.
• Data interpolation (low-dim representation).
• Boundary estimation.
• Parameter estimation.
13. EPFL, March 25th 2015
Sensing is expensive
6
Sensing is generally expensive and maybe technically difficult.
Where do we place the sensors to get the maximum information?
16. EPFL, March 25th 2015
Where do we place the sensors?
7
↵
Sensor placement finds .
pick rows!
17. EPFL, March 25th 2015
Where do we place the sensors?
7
↵
Sensor placement finds .
LProblem: choose the placement to minimize the MSE of .
pick rows!
18. EPFL, March 25th 2015
Where do we place the sensors?
7
↵
Sensor placement finds .
Subset selection: NP-hard! [Das 2008]
LProblem: choose the placement to minimize the MSE of .
pick rows!
19. EPFL, March 25th 2015
Classic approximation strategy: go greedy!
8
Iteration 0
Iteration 1
Iteration 2
Optimal
Greedy
Greedy algorithms:
at each iteration, pick the best local choice.
• No guarantees about the distance
between the greedy and the global
optimal solution
• Polynomial time (if the cost function
can be efficiently computed)
20. EPFL, March 25th 2015
Classic approximation strategy: go greedy!
8
Can we optimize directly the MSE?
MSE greedy minimization is usually inefficient [Das 2008] and slow.
Iteration 0
Iteration 1
Iteration 2
Optimal
Greedy
Greedy algorithms:
at each iteration, pick the best local choice.
• No guarantees about the distance
between the greedy and the global
optimal solution
• Polynomial time (if the cost function
can be efficiently computed)
21. EPFL, March 25th 2015
Frame Potential as a proxy of the MSE
9
FP( L) =
X
i,j2L
|h i, ji|2
Frame Potential (FP) as a cost function: .
22. EPFL, March 25th 2015
Frame Potential as a proxy of the MSE
9
FP( L) =
X
i,j2L
|h i, ji|2
Frame Potential (FP) as a cost function: .
• FP is a measure of the closeness to orthogonality,
• The minimizers of the FP are UN tight frames [Casazza 2009],
• Minimizing the FP induces a minimization of the MSE.
23. EPFL, March 25th 2015
Frame Potential as a proxy of the MSE
9
FP( L) =
X
i,j2L
|h i, ji|2
Frame Potential (FP) as a cost function: .
Physical interpretation [Fickus 2006]:
vectors repulse each other like
electrons under the Coulomb force.
• FP is a measure of the closeness to orthogonality,
• The minimizers of the FP are UN tight frames [Casazza 2009],
• Minimizing the FP induces a minimization of the MSE.
24. EPFL, March 25th 2015
Frame Potential as a proxy of the MSE
9
FP( L) =
X
i,j2L
|h i, ji|2
Frame Potential (FP) as a cost function: .
Physical interpretation [Fickus 2006]:
vectors repulse each other like
electrons under the Coulomb force.
• FP is a measure of the closeness to orthogonality,
• The minimizers of the FP are UN tight frames [Casazza 2009],
• Minimizing the FP induces a minimization of the MSE.
25. EPFL, March 25th 2015 10
Theorem [Nemhauser 1978]: Consider a greedy
algorithm maximizing a submodular, normalized,
monotonically increasing set function .
Then, the greedy solution is near-optimal:
g(·)
g(Sopt) g(Sgreedy)
✓
1
1
e
◆
g(Sopt)
• Submodularity ~ concept of diminishing returns.
Greedy algorithms and submodularity
26. EPFL, March 25th 2015 10
Theorem [Nemhauser 1978]: Consider a greedy
algorithm maximizing a submodular, normalized,
monotonically increasing set function .
Then, the greedy solution is near-optimal:
g(·)
g(Sopt) g(Sgreedy)
✓
1
1
e
◆
g(Sopt)
• Submodularity ~ concept of diminishing returns.
• Frame Potential is submodular
Greedy algorithms and submodularity
27. EPFL, March 25th 2015
FrameSense
11
Greedy worst-out sensor selection:
• At the k-th iteration, we remove the row maximizing the FP of ,
• After iterations, the sensor placement is .L = SN L
28. EPFL, March 25th 2015
FrameSense is near-optimal w.r.t. MSE
12
Our strategy:
• FP is submodular,
• FrameSense is near-optimal w.r.t. FP,
• We derive LB and UB of the MSE w.r.t. FP,
• FrameSense is near-optimal w.r.t. MSE.
29. EPFL, March 25th 2015
FrameSense is near-optimal w.r.t. MSE
12
Our strategy:
• FP is submodular,
• FrameSense is near-optimal w.r.t. FP,
• We derive LB and UB of the MSE w.r.t. FP,
• FrameSense is near-optimal w.r.t. MSE.
and are the greedy and the optimal solution, respectively.
Theorem [Ranieri C. V. 2013]:
Given and sensors, FrameSense is
near-optimal w.r.t. MSE (under certain conditions on ):
,
where the approximation factor depends on the spectrum and
the norms of the rows of .
30. EPFL, March 25th 2015
FrameSense is near-optimal w.r.t. MSE
12
Our strategy:
• FP is submodular,
• FrameSense is near-optimal w.r.t. FP,
• We derive LB and UB of the MSE w.r.t. FP,
• FrameSense is near-optimal w.r.t. MSE.
and are the greedy and the optimal solution, respectively.
Theorem [Ranieri C. V. 2013]:
Given and sensors, FrameSense is
near-optimal w.r.t. MSE (under certain conditions on ):
,
where the approximation factor depends on the spectrum and
the norms of the rows of .
31. −5 −4 −3 −2 −1 0 1
15
20
25
30
35
40
Computational time [log s]
NormalizedMSE[dB]
Random tight frames
FrameSense
Determinant
Mutual Information
MSE
Random
Convex Opt. Method [6]
EPFL, March 25th 2015
Numerical experiment on synthetic data
13
32. EPFL, March 25th 2015
Proposed algorithm
14
FrameSense (polytime, no heuristics, guarantees):
• Greedy algorithm optimizing the Frame Potential (FP),
• Near-optimal w.r.t. the MSE,
• State-of-the-art performance w.r.t. the MSE,
• Low computational complexity.
33. One of the applications where FrameSense shines...
Sensing the temperature of a processor
34. EPFL, March 25th 2015
Application: temperature sensing
16
A modern 8 core microprocessor
35. EPFL, March 25th 2015
Application: temperature sensing
16
A modern 8 core microprocessor
36. EPFL, March 25th 2015
Application: temperature sensing
16
A modern 8 core microprocessor
• Thermal stress: failures, reduced performance, increased power
consumption, mechanical stress.
• Temperature information is desirable to optimize workload.
• Temperature cannot be sensed everywhere.
37. EPFL, March 25th 2015
Problem statement
17
Objectives:
• Design an algorithm to recover the entire
thermal map from few measurements.
• Design a sensor placement algorithm to
minimize the reconstruction error.
38. EPFL, March 25th 2015
Problem statement
17
Given: a set of thermal distributions,
representing the workload of the processor.
, , . . . . ,
{ }
Objectives:
• Design an algorithm to recover the entire
thermal map from few measurements.
• Design a sensor placement algorithm to
minimize the reconstruction error.
41. EPFL, March 25th 2015
Low-dimensional linear model
18
We learn using PCA [Ranieri V.C.A.V. 2012]
↵1 +↵2 +↵3
+↵4 + . . . + K
... 5 10 15 20 25 30 35
10
−8
10
−6
10
−4
10
−2
10
0
10
2
10
4
10
6
Eigenvalues
... 5 10 15 20 25 30 35
10
−8
10
−6
10
−4
10
−2
10
0
10
2
10
4
10
6
Eigenvalues
... 5 10 15 20 25 30 35
10
−8
10
−6
10
−4
10
−2
10
0
10
2
10
4
10
6
Eigenvalues
... 5 10 15 20 25 30 35
10
−8
10
−6
10
−4
10
−2
10
0
10
2
10
4
10
6
Eigenvalues
... 5 10 15 20
10
−8
10
−6
10
−4
10
−2
10
0
10
2
10
4
10
6
Eigenvalue
Recover the parameters from
few measurements to recover
the thermal map.
We use FrameSense to place the sensors.
optimized given the noise level.
42. EPFL, March 25th 2015
Performance evaluation
19
Reconstruction results on the 8-cores Niagara.
5 10 15 20 25 30
10
−6
10
−4
10
−2
10
0
10
2
10
4
10
6
Number of Sensors L
MeanSquaredError
FrameSense + PCA
[Nowroz 2010]
43. EPFL, March 25th 2015
Performance evaluation
19
Similar results on a 64-cores STM architecture.
Reconstruction results on the 8-cores Niagara.
5 10 15 20 25 30
10
−6
10
−4
10
−2
10
0
10
2
10
4
10
6
Number of Sensors L
MeanSquaredError
FrameSense + PCA
[Nowroz 2010]
44. EPFL, March 25th 2015
Results and future work
20
FrameSense (TSP 2014):
• A greedy algorithm based on the frame potential,
• First near-optimal algorithm w.r.t. MSE,
• Computationally efficient,
• State-of-the-art performance.
Applications
• Thermal monitoring of many-core processors (DAC 2012, TCOMP 2015),
• DASS: distributed adaptive sampling scheduling (TCOMM 2014).
Extensions
• Source placement for linear forward problems,
• Union of subspaces (EUSIPCO 2014).
Future work
• Sensor optimization for control theory,
• Tomographic sensing.