There have been a large number of bounds checking techniques proposed for C. Among them, the approach proposed by Jones and Kelly (extended by Ruwase and Lam and further extended by Dhurjati and Adve) is the only one ...
详细信息
ISBN:
(纸本)9780889868113
There have been a large number of bounds checking techniques proposed for C. Among them, the approach proposed by Jones and Kelly (extended by Ruwase and Lam and further extended by Dhurjati and Adve) is the only one we know of that is both backwards-compatible and precise. Even the approach, however, can incur serious compatibility problems with threads. This paper proposes a collection of techniques to avoid such problems. Our experimental results show that our bounds checking is highly compatible with large multi-threaded programs (including Apache 2.2.2) and that it can detect boundary errors caused by them precisely.
Biological ants organize themselves into forager groups that converge to shortest paths to and from food sources. This has motivated development of a large class of biologically inspired agent-based graph search techn...
详细信息
ISBN:
(纸本)9780889868113
Biological ants organize themselves into forager groups that converge to shortest paths to and from food sources. This has motivated development of a large class of biologically inspired agent-based graph search techniques, called Ant Colony Optimization, to solve diverse combinatorial problems. Our approach to parallel graph search uses multiple ant agent populations distributed across processors and clustered computers to solve largescale graph search problems. We discuss our implementation using the NIst Data Flow System II, and show good scalability of our parallel search algorithm.
We describe four partitioning strategies, or patterns, used to decompose a serial application into multiple concurrently executing parts. These partitioning strategies augment the commonly used task and data parallel ...
详细信息
ISBN:
(纸本)9780889868113
We describe four partitioning strategies, or patterns, used to decompose a serial application into multiple concurrently executing parts. These partitioning strategies augment the commonly used task and data parallel patterns by recognizing that applications are spatiotemporal in nature. Therefore, data and instruction decomposition are further distinguished by whether the partitioning is done in the spatial or in temporal dimension. Thus, we arrive at four decomposition strategies: spatial data partitioning (SDP), temporal data partitioning (TDP), spatial instruction partitioning (SIP), and temporal instruction partitioning (TIP), and catalog the benefits and drawbacks of each. In addition, the practical use of this work is demonstrated by applying these strategies, and combinations thereof, to implement several different parallelizations of a multicore H.264 encoder for high-definition video.
In this paper, we introduce an implementation of algorithm for self-organizing maps(SOM) using GPUs and discuss its evaluation. We used CUDA provided by NVIDIA Corporation for parallel programming, profiling, and data...
详细信息
ISBN:
(纸本)9780889868113
In this paper, we introduce an implementation of algorithm for self-organizing maps(SOM) using GPUs and discuss its evaluation. We used CUDA provided by NVIDIA Corporation for parallel programming, profiling, and data flow optimization so as to exploit inherent data-level parallelism of the algorithm. By using three NVIDIA's graphic cards for evaluation, we investigated the relationships among the number of processor elements, amount of memory device and performance. As the result of performance evaluation with various parameter combinations, we found that implementation on GTX280 achieved 150 times higher performance of Intel Core 2 Quad 2.40 GHz when parameters of map size, dimension of vectors and learning size were 1372×1372, 128 and 128, respectively.
As security threats and network bandwidth increase in a very fast pace, there is a growing interest in designing highperformance network intrusion detection system (NIDS). This paper presents a parallelization strateg...
详细信息
ISBN:
(纸本)9780889868113
As security threats and network bandwidth increase in a very fast pace, there is a growing interest in designing highperformance network intrusion detection system (NIDS). This paper presents a parallelization strategy for the popular open-source Snort to build a high performance NIDS on multi-core IA platform. A modular design of parallel NIDS based on Snort is proposed in this paper. Named Para-Snort, it enables flexible and easy module design. This paper also analyzed the performance impact of load balancing and multi-pattern matching. Modified-JSQ and AC-WM algorithms are implemented in order to resolve a the bottlenecks and improve the performance of the system. Experimental results show that Para-Snort achieves significant speedup of 4 to 6 times for various traces with a 7-thread parallelizing test setup.
This paper proposes a new multi-path position-based routing protocol for mobile ad-hoc networks and analyzes its performance. The proposed protocol is called 3DGMPR (3-Dimensional Grid Multiple-path Position-based Rou...
详细信息
ISBN:
(纸本)9780889868113
This paper proposes a new multi-path position-based routing protocol for mobile ad-hoc networks and analyzes its performance. The proposed protocol is called 3DGMPR (3-Dimensional Grid Multiple-path Position-based Routing). It uses a logical 3-dimensional grid view of the geographical region. It allows the use of multiple celldisjoint routes for reliability. It supports adjusting the adesired level of reliability. Each node maintains a list of gateway nodes located in neighboring grid cells for efficient packet forwarding. The 3D-GMPR protocol has the following new features compared to other positionbased protocols: (a) it uses multi-path routing for reliability, (b) it uses efficiently pre-computed routing vectors avoiding path establishment and maintenance overheads and (c) it uses gateway nodes with low maintenance cost and distributed packet forwarding load. Performance evaluation results for the proposed protocol are obtained confirming its high reliability.
Due to computing grid's large scale, distributed and dynamic nature, the security issues around grid applications are more pervasive than computer network in general and thus call for more complicated solutions. I...
详细信息
ISBN:
(纸本)9780889868113
Due to computing grid's large scale, distributed and dynamic nature, the security issues around grid applications are more pervasive than computer network in general and thus call for more complicated solutions. In order to solve key problems such as security mechanism integration in heterogeneous grid, identity authentication and trust delegation, a cross-domain authentication and authorization model based on role translation and delegation is proposed. This model allows the establishment of trust among heterogeneous domains via certain protocols so that resource sharing across grid domains becomes possible. After a user logins to a local grid domain, its role in the local domain is mapped to a role in resource domain by using RBAC based role translation. This removes the need for cross-domain user logins while they are accessing resources across different domains, which results in much higher efficiency. The use of Security Assertion Markup Language (SAML) based delegation for transferring user privileges enables submitting operation by delegation assertion and the cross-domain federation is done automatically. This can greatly reduce users' manual involvement.
作者:
Huang, ZhenMa, Xiaoliang
Royal Institute of Technology Sweden
Royal Institute of Technology Teknikringen 72 10044 Stockholm Sweden
Air quality and fuel efficiency has become important factors in decision-makings on urban traffic planning and management. To support the process, simulation models have potential to play essential roles in evaluation...
详细信息
In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy languages put few emphasis on authorization provenance...
详细信息
In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy languages put few emphasis on authorization provenances. The capability of managing these provenances is important and useful in various security areas such as computer auditing and safeguarding delegations. Based on the newly proposed logic, we define one type of authorization provenances. We exemplify the applications of these provenances by a case study.
Intelligence Science is an interdisciplinary subject which dedicates to joint research on basic theory and technology of intelligence by brain science, cognitive science, artificial intelligence and others. Brain scie...
详细信息
暂无评论