Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 27 Nov 2024Bibliometrics
Skip Table Of Content Section
research-article
A Two-Dimensional Low-Diameter Scalable On-Chip Network for Interconnecting Thousands of Cores

This paper introduces the Spidergon-Donut (SD) on-chip interconnection network for interconnecting 1,000 cores in future MPSoCs and CMPs. Unlike the Spidergon network, the SD network which extends the Spidergon network into the second dimension, ...

research-article
Accelerating Matrix Operations with Improved Deeply Pipelined Vector Reduction

Many scientific or engineering applications involve matrix operations, in which reduction of vectors is a common operation. If the core operator of the reduction is deeply pipelined, which is usually the case, dependencies between the input data ...

research-article
An Efficient Approach for Mobile Asset Tracking Using Contexts

Due to the heterogeneity involved in smart interconnected devices, cellular applications, and surrounding (GPS-aware) environments there is a need to develop a realistic approach to track mobile assets. Current tracking systems are costly and ...

research-article
Autonomic Placement of Mixed Batch and Transactional Workloads

To reduce the cost of infrastructure and electrical energy, enterprise datacenters consolidate workloads on the same physical hardware. Often, these workloads comprise both transactional and long-running analytic computations. Such consolidation brings ...

research-article
BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks

Efficient and effective full-text retrieval in unstructured peer-to-peer networks remains a challenge in the research community. First, it is difficult, if not impossible, for unstructured P2P systems to effectively locate items with guaranteed recall. ...

research-article
Communication-Aware Globally-Coordinated On-Chip Networks

With continued Moore's law scaling, multicore-based architectures are becoming the de facto design paradigm for achieving low-cost and performance/power-efficient processing systems through effective exploitation of available parallelism in software and ...

research-article
Compression of View on Anonymous Networks—Folded View—

View is a labeled directed graph containing all information about the network that a party can learn by exchanging messages with its neighbors. View can be used to solve distributed problems on an anonymous network (i.e., a network that does not ...

research-article
DDC: A Novel Scheme to Directly Decode the Collisions in UHF RFID Systems

RFID has been gaining popularity due to its variety of applications, such as inventory control and localization. One important issue in RFID system is tag identification. In RFID systems, the tag randomly selects a slot to send a Random Number (RN) ...

research-article
Delegation-Based I/O Mechanism for High Performance Computing Systems

Massively parallel applications often require periodic data checkpointing for program restart and post-run data analysis. Although high performance computing systems provide massive parallelism and computing power to fulfill the crucial requirements of ...

research-article
Fat versus Thin Threading Approach on GPUs: Application to Stochastic Simulation of Chemical Reactions

We explore two different threading approaches on a graphics processing unit (GPU) exploiting two different characteristics of the current GPU architecture. The fat thread approach tries to minimize data access time by relying on shared memory and ...

research-article
How Much to Share: A Repeated Game Model for Peer-to-Peer Streaming under Service Differentiation Incentives

In this paper, we propose a service differentiation incentive for P2P streaming system, according to peers' instant contributions. Also, a repeated game model is designed to analyze how much the peers should contribute in each round under this ...

research-article
In Cloud, Can Scientific Communities Benefit from the Economies of Scale?

The basic idea behind cloud computing is that resource providers offer elastic resources to end users. In this paper, we intend to answer one key question to the success of cloud computing: in cloud, can small-to-medium scale scientific communities ...

research-article
Interactivity-Constrained Server Provisioning in Large-Scale Distributed Virtual Environments

Maintaining interactivity is one of the key challenges in distributed virtual environments (DVEs). In this paper, we consider a new problem, termed the interactivity-constrained server provisioning problem, whose goal is to minimize the number of ...

research-article
Payments for Outsourced Computations

With the recent advent of cloud computing, the concept of outsourcing computations, initiated by volunteer computing efforts, is being revamped. While the two paradigms differ in several dimensions, they also share challenges, stemming from the lack of ...

research-article
Real-World Sensor Network for Long-Term Volcano Monitoring: Design and Findings

This paper presents the design, deployment, and evaluation of a real-world sensor network system in an active volcano—Mount St. Helens. In volcano monitoring, the maintenance is extremely hard and system robustness is one of the biggest concerns. ...

research-article
Self-Protection in a Clustered Distributed System

Self-protection refers to the ability for a system to detect illegal behaviors and to fight-back intrusions with counter-measures. This article presents the design, the implementation, and the evaluation of a self-protected system which targets ...

research-article
Semantic-Aware Metadata Organization Paradigm in Next-Generation File Systems

Existing data storage systems based on the hierarchical directory-tree organization do not meet the scalability and functionality requirements for exponentially growing data sets and increasingly complex metadata queries in large-scale, Exabyte-level ...

research-article
Sleep Scheduling for Critical Event Monitoring in Wireless Sensor Networks

In this paper, we focus on critical event monitoring in wireless sensor networks (WSNs), where only a small number of packets need to be transmitted most of the time. When a critical event occurs, an alarm message should be broadcast to the entire ...

research-article
Supporting Overcommitted Virtual Machines through Hardware Spin Detection

Multiprocessor operating systems (OSs) pose several unique and conflicting challenges to System Virtual Machines (System VMs). For example, most existing system VMs resort to gang scheduling a guest OS's virtual processors (VCPUs) to avoid OS ...

research-article
The Significance of CMP Cache Sharing on Contemporary Multithreaded Applications

Cache sharing on modern Chip Multiprocessors (CMPs) reduces communication latency among corunning threads, and also causes interthread cache contention. Most previous studies on the influence of cache sharing have concentrated on the design or ...

research-article
User-Level Implementations of Read-Copy Update

Read-copy update (RCU) is a synchronization technique that often replaces reader-writer locking because RCU's read-side primitives are both wait-free and an order of magnitude faster than uncontended locking. Although RCU updates are relatively heavy ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.