Multiple pattern matching for network security applications: Acceleration through vectorization
As both new network attacks emerge and network traffic increases in volume, the need to perform network traffic inspection at high rates is ever increasing. The core of many security applications that inspect network traffic (such as ...
Highlights
- A new algorithm for multiple pattern matching for Network Intrusion Detection.
- ...
Improved GPU near neighbours performance for multi-agent simulations
Complex systems simulations are well suited to the SIMT paradigm of GPUs, enabling millions of actors to be processed in fractions of a second. At the core of many such simulations, fixed radius near neighbours (FRNN) search provides ...
Highlights
- Optimisations to FRNN search, for reducing latency and redundant accesses.
- ...
Performance evaluation of decision making under uncertainty for low power heterogeneous platforms
Value Iteration (VI) is a core method to find optimal policies, allowing a robot to act autonomously in environments where the effects of its actions are not deterministic. Although there are extensive studies on VI’s theoretical ...
Highlights
- Heterogeneous parallelisation strategies to implement Value Iteration algorithm.
Parallel implementation of the Image Block Representation using OpenMP
Herein, a parallel implementation in OpenMP of the Image Block Representation (IBR) for binary imagesis investigated. The IBR is a region-based image representation scheme that represents the binary image as a set of non-overlapping ...
Highlights
- The Image Block Representation (IBR) has been used for the creation of fast image processing and analysis algorithms.
Batched transpose-free ADI-type preconditioners for a Poisson solver on GPGPUs
We investigate the iterative solution of a symmetric positive definite linear system involving the shifted Laplacian as the system matrix on General Purpose Graphics Processing Units (GPGPUs). We consider in particular the Chebyshev ...
Highlights
- Solution of batched tridiagonal linear systems on GPUs.
- Problems originating ...
Joker: Elastic stream processing with organic adaptation
This paper addresses the problem of auto-parallelization of streaming applications. We propose an online parallelization optimization algorithm that adjusts the degree of pipeline and data parallelism in a joint manner. We define an ...
Highlights
- Develops an online parallelization optimization algorithm for streaming applications.
A precise non-asymptotic complexity analysis of parallel hash functions without tree topology constraints
A recent work shows how we can optimize a tree based mode of operation for a hash function where the sizes of input message blocks and digest are the same, subject to the constraint that the involved tree structure has all its leaves ...
Highlights
- Estimation of the optimal parallel time obtained using hash trees of smallest height.
COMITMENT: A Fog Computing Trust Management Approach
- Mohammed Al-khafajiy,
- Thar Baker,
- Muhammad Asim,
- Zehua Guo,
- Rajiv Ranjan,
- Antonella Longo,
- Deepak Puthal,
- Mark Taylor
As an extension of cloud computing, fog computing is considered to be relatively more secure than cloud computing due to data being transiently maintained and analyzed on local fog nodes closer to data sources. However, there exist ...
Highlights
- A Fog Computing Trust Management Approach has been proposed.
- An algorithm to ...
Variational approach for privacy funnel optimization on continuous data
Here we consider a common data encryption problem encountered by users who want to disclose some data to gain utility but preserve their private information. Specifically, we consider the inference attack, in which an adversary ...
Highlights
- Propose a simple but effective algorithm for privacy funnel optimization.
- ...
Malware detection in mobile environments based on Autoencoders and API-images
Due to their open nature and popularity, Android-based devices represent one of the main targets for malware attacks that may adversely affect the privacy of their users. Considering the huge Android market share, it is necessary to ...
Highlights
- Using Neural Networks and Deep Learning to timely detect zero-day malware on Android platforms.
Securing instruction interaction for hierarchical management
Hierarchical management is a typical approach to managing complex information networks (CINs). In hierarchical management, as the only avenue to control information storage, transmission and usage, instruction interaction is often ...
Highlights
- Five basic instruction operations for hierarchical management in complex information networks are proposed.
Efficient authentication protocol with anonymity and key protection for mobile Internet users
To preserve user privacy and guarantee data confidentiality on the mobile Internet, it is crucial to secure communication between the mobile devices held by users and a remote server. In real applications, a serious threat against ...
Highlights
- We propose a novel anonymous authentication protocol with key protection.
- We ...
Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption
Cloud computing empowers enterprises to efficiently manage big data and discovery of useful information which are the most fundamental challenges for big data enabled applications. The cloud offered unlimited resources that can store, ...
Highlights
- A privacy-preserving distributed analytics framework for big data in the cloud is proposed.
Blockchain-based accountability for multi-party oblivious RAM
Recently, oblivious random access machine (ORAM) has been widely used to prevent privacy leakage from user’s access pattern. However, in multi-user scenarios, the obliviousness property of ORAM facilitates the malicious data ...
Highlights
- We summarize the two critical problems in data integrity protection by applying ORAM technology into the cloud storage.
A Hitchhiker’s Guide On Distributed Training Of Deep Neural Networks
Deep learning has led to tremendous advancements in the field of Artificial Intelligence. One caveat, however, is the substantial amount of compute needed to train these deep learning models. Training a benchmark dataset like ImageNet ...
Highlights
- End to end survey on various aspects of distributed training of neural networks.
KASLR-MT: Kernel Address Space Layout Randomization for Multi-Tenant cloud systems
Cloud computing has completely changed our lives. This technology dramatically impacted on how we play, work and live. It has been widely adopted in many sectors mainly because it reduces the cost of performing tasks in a flexible, ...
Highlights
- We discuss the effects on memory caused by the KASLR protection in Cloud environments.
Improving the performance of physics applications in atom-based clusters with rCUDA
Traditionally, High-Performance Computing (HPC) has been associated with large power requirements. The reason was that chip makers of the processors typically employed in HPC deployments have always focused on getting the highest ...
Graphical abstractDisplay Omitted
Highlights
- New proposal for using remote GPU virtualization in Atom-based clusters.
- ...
HDOT — An approach towards productive programming of hybrid applications
A wealth of important scientific and engineering applications are configured for use on high performance computing architectures using functionality found in the MPI specification. This specification provides application developers ...
Highlights
- We present HDOT, a top-down approach for productive, hybrid programming.
- We ...
Algorithmic and language-based optimization of Marsa-LFIB4 pseudorandom number generator using OpenMP, OpenACC and CUDA
The aim of this paper is to present new high-performance implementations of Marsa-LFIB4 which is an example of high-quality multiple recursive pseudorandom number generators. We propose an algorithmic approach that combines language-...
Highlights
- New algorithmic approach for vectorization and parallelization of recursive PRNGs.
Parallel tiled cache and energy efficient codes for O ( n 4 ) RNA folding algorithms
In this paper, we consider two O ( n 4 ) RNA folding algorithms, Zuker’s recurrence and the maximum expected accuracy prediction (MEA), which are challenging dynamic programming tasks to optimize because they are computationally ...
Highlights
- Dynamic programming code can be represented with the polyhedral model.
- Tile ...
Intrusion detection in Edge-of-Things computing
Edge-of-Things (EoT) is a new evolving computing model driven by the Internet of Things (IoT). It enables data processing, storage, and service to be shifted from the Cloud to nearby Edge devices/systems such as smartphones, routers, ...
Highlights
- A review of existing Intrusion detection in Edge-of-Things computing environment is presented.