CUDA(Compute Unified Device Architecture) acceleration of very large scale matrix-vector and matrix-matrix multiplication is presented in this paper. the intrinsic parallelism in the matrix computations are exploited ...
详细信息
Similar to many technological developments, wireless sensor networks have emerged from military needs and found its way into civil applications. Today wireless sensor networks have become a key technology for differen...
详细信息
ISBN:
(纸本)9781424474226;9780769540887
Similar to many technological developments, wireless sensor networks have emerged from military needs and found its way into civil applications. Today wireless sensor networks have become a key technology for different kinds of smart environments and an intense research effort is currently underway to enable the application of wireless sensor networks for a wide range of industrial problems. Wireless networks are of particular importance when a large number of sensor nodes have to be deployed and/or in hazardous situations. the research field in this paper is supposed to be on this issue that many of these sensors are distributed randomly and just a few of them are aware of their position [e.g. by GPS]. the purpose is to determine the best way that allows all the nodes to find their position. Localization in wireless Sensor Network is NP-hard problems. this paper presents an effective geometric algorithm for localization. Result of implementation show that this algorithm can be a better substitution for current methods because of lower expense and simple implementation.
Large-scale distributedcomputing systems (LDCSs) can be best characterized by their dynamic nature particularly in terms of availability and performance. Typically, these systems deal with various types of jobs in ma...
详细信息
A free and easy to use distributed monitoring and measurement platform would be valuable in several applications: monitoring network or server infrastructures, performing research experiments using many ISPs and test ...
详细信息
ISBN:
(纸本)9783642123337
A free and easy to use distributed monitoring and measurement platform would be valuable in several applications: monitoring network or server infrastructures, performing research experiments using many ISPs and test nodes, or checking for network neutrality violations performed by service providers. In this paper we present MOR, a technique for performing distributed measurement and monitoring tasks using the geographically diverse infrastructure of the Tor anonymizing network. through several case studies, we show the applicability and value of MOR in revealing the structure and function of large hosting infrastructures and detecting network neutrality violations. Our experiments show that about 7.5% of the tested organizations block at least one popular application port and about 5.5% of them modify HTTP headers.
this paper proposes a new model checking-based test generation approach for Web applications. the Kripke structure is reconstructed to model the Web application from the end users' perspective. Test coverage crite...
详细信息
ISBN:
(纸本)9781424474226;9780769540887
this paper proposes a new model checking-based test generation approach for Web applications. the Kripke structure is reconstructed to model the Web application from the end users' perspective. Test coverage criterion is expressed as trap properties in CTL so that counterexamples can be instantiated to construct test cases. But a counterexample for each trap property is generated will result in too many redundant test cases. So, a test deduction rule and an algorithm based on the greedy heuristic are given to resolve this problem. the test sequences finally generated are those satisfy the coverage criterion and have no redundancy. throughout the paper, a typical small case study of the WGVS (Web Grade View System) is used to illustrate our approach. this approach presented can help to generate test sequences automatically for Web application and it is a significance complement to the model checking test generation.
the proceedings contain 11 papers. the topics discussed include: defining the future of multi-gigabit mmWave wireless communications;a dual-band architecture for multi-GBPS communication in 60 GHz multi-hop networks;s...
ISBN:
(纸本)9781450301428
the proceedings contain 11 papers. the topics discussed include: defining the future of multi-gigabit mmWave wireless communications;a dual-band architecture for multi-GBPS communication in 60 GHz multi-hop networks;support of high-performance i/o protocols over mmWave networks;efficient codebook-based symbol-wise beamforming for millimeter-wave WPAN system;fast beam training for mmWave communication system: from algorithm to circuits;adaptive beamforming for 60 GHz radios: challenges and preliminary solutions;LDPC code set for mmWave communication;statistical modeling of fading and diversity for outdoor 60 GHz channels;effect of device mobility and phased array antennas on 60 GHz wireless networks;on the feasibility of spatial multiplexing for indoor 60 GHz communication;and systematic design of mmWave PLLs based on N-push oscillators.
Cloud computing has become a popular computing paradigm in which virtualized and scalable resources are consolidated to provide services over Internet. However, the resource capability of a single cloud is generally l...
详细信息
ISBN:
(纸本)9781424474226;9780769540887
Cloud computing has become a popular computing paradigm in which virtualized and scalable resources are consolidated to provide services over Internet. However, the resource capability of a single cloud is generally limited, and some applications often require various cloud centers over Internet to deliver services together. therefore, a Virtual Organization (VO) will be a promising approach to integrate services and users across multiple autonomous clouds. However, how to build a secure virtual organization to achieve the collaboration goals is a critical problem, and some issues such as membership agreement, policy conflict and trust management should be adequately addressed. In this paper, we present a framework CloudVO which based on security policies and trust management techniques to provide some flexible and dynamic VO management protocols for clouds. therefore, CloudVO can achieve inter-cloud collaboration without destroying a cloud's local policies. Based on previous VO security management experiences, we have conducted some preliminary simulations to verify the effectiveness our approaches for cloud computing environments.
Service level agreements are an intrinsic part of service level management frameworks. they are electronic contracts, or part of a contract, and capture quality-of-service guarantees, responsibilities and constraints ...
详细信息
OpenMP applications executed on top of software distributed shared memory (SDSM) systems show peaks in network traffic. In these scenarios, synchronization points are used to maintain memory consistency and improve pe...
详细信息
Concurrency control in distributed and parallel applications has been studied for many years but is still an ongoing research topic. Transactional memory addresses this challenge for multicore processors by proposing ...
详细信息
暂无评论