2015 International Symposium on Computer Architecture and High Performance Computing Workshop (SBAC-PADW) 2015
DOI: 10.1109/sbac-padw.2015.25
|View full text |Cite
|
Sign up to set email alerts
|

A Parallel Implementation of Data Fusion Algorithm Using Gamma

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…In 2015, another Gamma parallel implementation was proposed, now using a parallel hardware with support to Graphics Processing Unit (GPU) [20]. The Gamma paradigm can be applied to many application domains, for instance, Image Processing [21] and data fusion for target tracking [1], among others.…”
Section: B Gammamentioning
confidence: 99%
See 1 more Smart Citation
“…In 2015, another Gamma parallel implementation was proposed, now using a parallel hardware with support to Graphics Processing Unit (GPU) [20]. The Gamma paradigm can be applied to many application domains, for instance, Image Processing [21] and data fusion for target tracking [1], among others.…”
Section: B Gammamentioning
confidence: 99%
“…Parallel computing has been widely used as a tool to obtain performance in a scenario where the von Neumann architecture is close to the hardware's performance exploitation limits [1]. In the other words, despite the validity of Moore's law, possible technological improvements are not being converted into performance in a proportional way.…”
Section: Introductionmentioning
confidence: 99%
“…This approach is a graph-based method proposed in [ 11 ], which is PP (Pair of Plot [ 12 ]) based. In 2015, Mello et al proposed the implementation based on the model Gamma [ 13 ]. The proposed solution was the first parallel implementation of the PPTS method, which employed three Gamma models, where two of them exploited the resources of a parallel hardware environment (using MPI protocol and GPU).…”
Section: Introductionmentioning
confidence: 99%