Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 137, Issue CMar 2020
Publisher:
  • Academic Press, Inc.
  • 6277 Sea Harbor Drive Orlando, FL
  • United States
ISSN:0743-7315
Reflects downloads up to 12 Nov 2024Bibliometrics
Skip Table Of Content Section
editorial
Regular Articles
research-article
Multiple pattern matching for network security applications: Acceleration through vectorization
Abstract

As both new network attacks emerge and network traffic increases in volume, the need to perform network traffic inspection at high rates is ever increasing. The core of many security applications that inspect network traffic (such as ...

Highlights

  • A new algorithm for multiple pattern matching for Network Intrusion Detection.
  • ...

research-article
Improved GPU near neighbours performance for multi-agent simulations
Abstract

Complex systems simulations are well suited to the SIMT paradigm of GPUs, enabling millions of actors to be processed in fractions of a second. At the core of many such simulations, fixed radius near neighbours (FRNN) search provides ...

Highlights

  • Optimisations to FRNN search, for reducing latency and redundant accesses.
  • ...

research-article
Performance evaluation of decision making under uncertainty for low power heterogeneous platforms
Abstract

Value Iteration (VI) is a core method to find optimal policies, allowing a robot to act autonomously in environments where the effects of its actions are not deterministic. Although there are extensive studies on VI’s theoretical ...

Highlights

  • Heterogeneous parallelisation strategies to implement Value Iteration algorithm.

research-article
Parallel implementation of the Image Block Representation using OpenMP
Abstract

Herein, a parallel implementation in OpenMP of the Image Block Representation (IBR) for binary imagesis investigated. The IBR is a region-based image representation scheme that represents the binary image as a set of non-overlapping ...

Highlights

  • The Image Block Representation (IBR) has been used for the creation of fast image processing and analysis algorithms.

research-article
Batched transpose-free ADI-type preconditioners for a Poisson solver on GPGPUs
Abstract

We investigate the iterative solution of a symmetric positive definite linear system involving the shifted Laplacian as the system matrix on General Purpose Graphics Processing Units (GPGPUs). We consider in particular the Chebyshev ...

Highlights

  • Solution of batched tridiagonal linear systems on GPUs.
  • Problems originating ...

research-article
Joker: Elastic stream processing with organic adaptation
Abstract

This paper addresses the problem of auto-parallelization of streaming applications. We propose an online parallelization optimization algorithm that adjusts the degree of pipeline and data parallelism in a joint manner. We define an ...

Highlights

  • Develops an online parallelization optimization algorithm for streaming applications.

Research Note
rapid-communication
A precise non-asymptotic complexity analysis of parallel hash functions without tree topology constraints
Abstract

A recent work shows how we can optimize a tree based mode of operation for a hash function where the sizes of input message blocks and digest are the same, subject to the constraint that the involved tree structure has all its leaves ...

Highlights

  • Estimation of the optimal parallel time obtained using hash trees of smallest height.

Special issue on Theories, Algorithms and Modeling for Privacy Computing
research-article
COMITMENT: A Fog Computing Trust Management Approach
Abstract

As an extension of cloud computing, fog computing is considered to be relatively more secure than cloud computing due to data being transiently maintained and analyzed on local fog nodes closer to data sources. However, there exist ...

Highlights

  • A Fog Computing Trust Management Approach has been proposed.
  • An algorithm to ...

research-article
Variational approach for privacy funnel optimization on continuous data
Abstract

Here we consider a common data encryption problem encountered by users who want to disclose some data to gain utility but preserve their private information. Specifically, we consider the inference attack, in which an adversary ...

Highlights

  • Propose a simple but effective algorithm for privacy funnel optimization.
  • ...

research-article
Malware detection in mobile environments based on Autoencoders and API-images
Abstract

Due to their open nature and popularity, Android-based devices represent one of the main targets for malware attacks that may adversely affect the privacy of their users. Considering the huge Android market share, it is necessary to ...

Highlights

  • Using Neural Networks and Deep Learning to timely detect zero-day malware on Android platforms.

research-article
Securing instruction interaction for hierarchical management
Abstract

Hierarchical management is a typical approach to managing complex information networks (CINs). In hierarchical management, as the only avenue to control information storage, transmission and usage, instruction interaction is often ...

Highlights

  • Five basic instruction operations for hierarchical management in complex information networks are proposed.

research-article
Efficient authentication protocol with anonymity and key protection for mobile Internet users
Abstract

To preserve user privacy and guarantee data confidentiality on the mobile Internet, it is crucial to secure communication between the mobile devices held by users and a remote server. In real applications, a serious threat against ...

Highlights

  • We propose a novel anonymous authentication protocol with key protection.
  • We ...

research-article
Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption
Abstract

Cloud computing empowers enterprises to efficiently manage big data and discovery of useful information which are the most fundamental challenges for big data enabled applications. The cloud offered unlimited resources that can store, ...

Highlights

  • A privacy-preserving distributed analytics framework for big data in the cloud is proposed.

research-article
Blockchain-based accountability for multi-party oblivious RAM
Abstract

Recently, oblivious random access machine (ORAM) has been widely used to prevent privacy leakage from user’s access pattern. However, in multi-user scenarios, the obliviousness property of ORAM facilitates the malicious data ...

Highlights

  • We summarize the two critical problems in data integrity protection by applying ORAM technology into the cloud storage.

Special issue on Advances on High Performance Computing for Artificial Intelligence Applications
research-article
A Hitchhiker’s Guide On Distributed Training Of Deep Neural Networks
Abstract

Deep learning has led to tremendous advancements in the field of Artificial Intelligence. One caveat, however, is the substantial amount of compute needed to train these deep learning models. Training a benchmark dataset like ImageNet ...

Highlights

  • End to end survey on various aspects of distributed training of neural networks.

Special issue on Future Virtualization’19
research-article
KASLR-MT: Kernel Address Space Layout Randomization for Multi-Tenant cloud systems
Abstract

Cloud computing has completely changed our lives. This technology dramatically impacted on how we play, work and live. It has been widely adopted in many sectors mainly because it reduces the cost of performing tasks in a flexible, ...

Highlights

  • We discuss the effects on memory caused by the KASLR protection in Cloud environments.

research-article
Improving the performance of physics applications in atom-based clusters with rCUDA
Abstract

Traditionally, High-Performance Computing (HPC) has been associated with large power requirements. The reason was that chip makers of the processors typically employed in HPC deployments have always focused on getting the highest ...

Graphical abstract

Display Omitted

Highlights

  • New proposal for using remote GPU virtualization in Atom-based clusters.
  • ...

Special issue on Exascale Applications and Software 2018
research-article
HDOT — An approach towards productive programming of hybrid applications
Abstract

A wealth of important scientific and engineering applications are configured for use on high performance computing architectures using functionality found in the MPI specification. This specification provides application developers ...

Highlights

  • We present HDOT, a top-down approach for productive, hybrid programming.
  • We ...

Special issue on Parallel Programming
research-article
Algorithmic and language-based optimization of Marsa-LFIB4 pseudorandom number generator using OpenMP, OpenACC and CUDA
Abstract

The aim of this paper is to present new high-performance implementations of Marsa-LFIB4 which is an example of high-quality multiple recursive pseudorandom number generators. We propose an algorithmic approach that combines language-...

Highlights

  • New algorithmic approach for vectorization and parallelization of recursive PRNGs.

research-article
Parallel tiled cache and energy efficient codes for O ( n 4 ) RNA folding algorithms
Abstract

In this paper, we consider two O ( n 4 ) RNA folding algorithms, Zuker’s recurrence and the maximum expected accuracy prediction (MEA), which are challenging dynamic programming tasks to optimize because they are computationally ...

Highlights

  • Dynamic programming code can be represented with the polyhedral model.
  • Tile ...

Special issue on Cloud-of-Things and Edge Computing: Recent Advances and Future Trends
research-article
Intrusion detection in Edge-of-Things computing
Abstract

Edge-of-Things (EoT) is a new evolving computing model driven by the Internet of Things (IoT). It enables data processing, storage, and service to be shifted from the Cloud to nearby Edge devices/systems such as smartphones, routers, ...

Highlights

  • A review of existing Intrusion detection in Edge-of-Things computing environment is presented.

Comments

Please enable JavaScript to view thecomments powered by Disqus.