this two volume set LNCS 7016 and LNCS 7017 constitutes the refereed proceedings of the 11thinternationalconference on algorithms and architectures for parallelprocessing, ica3pp 2011, held in Melbourne, Australia,...
详细信息
ISBN:
(数字)9783642246500
ISBN:
(纸本)9783642246494
this two volume set LNCS 7016 and LNCS 7017 constitutes the refereed proceedings of the 11thinternationalconference on algorithms and architectures for parallelprocessing, ica3pp 2011, held in Melbourne, Australia, in October 2011. the first volume presents 24 revised regular papers and 17 revised short papers together withthe abstract of the keynote lecture - all carefully reviewed and selected from 85 initial submissions. the papers cover the many dimensions of parallelalgorithms and architectures, encompassing fundamental theoretical approaches, practical experimental results, and commercial components and systems and focus on two broad areas of parallel and distributed computing, i.e., architectures, algorithms and networks, and systems and applications.
this paper introduces a heuristic-based scheduler to optimise the throughput and latency of stream programs with dynamic network structure. the novelty is the utilisation of positive and negative demands of the stream...
详细信息
the proceedings contain 83 papers. the special focus in this conference is on Trust, Security and Privacy for Big Data. the topics include: Nth-Order Multifunction Filter Employing Current Differencing Transconductanc...
ISBN:
(纸本)9783319271606
the proceedings contain 83 papers. the special focus in this conference is on Trust, Security and Privacy for Big Data. the topics include: Nth-Order Multifunction Filter Employing Current Differencing Transconductance Amplifiers;An Efficient Spatial Query processing Algorithm in Multi-sink Directional Sensor Network;An Improved Method for Reversible Data Hiding in Encrypted Image;Study on Personalized Location Privacy Preservation algorithms Based on Road Networks;A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups;Towards Returning Data Control to Cloud Users;A Distributed Algorithm for Graph Edge Partitioning;Scheduling Stochastic Tasks with Precedence Constrain on Cluster Systems with Heterogenous Communication Architecture;An Output-Oriented Approach of Test Data Generation Based on Genetic Algorithm;An Efficient Pre-filter to Accelerate Regular Expression Matching;A Hybrid Optimization Approach for Anonymizing Transactional Data;Program Obfuscator for Privacy-Carrying Unidirectional One-hop Re-encryption;Predicting Severity of Software Vulnerability Based on Grey System theory;Characterization of Android Applications with Root Exploit by Using Static Feature Analysis;A Lightweighted Fine-Grained Privacy-Preserving Profile Matching Mechanism for Mobile Social Networks in Proximity;Context-Aware QoS Assurance for Smart Grid Big Data processing with Elastic Cloud Resource Reconfiguration;Continuous User Identity Verification for Trusted Operators in Control Rooms;Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model;Scheduling Resource of IaaS Clouds for Energy Saving Based on Predicting the Overloading Status of Physical Machines and Towards Mechanised Semantics of HPC.
the co-allocation architecture was developed in order to enable parallel downloads of datasets from multiple servers. Several co-allocation strategies have been coupled and used to exploit rate differences among vario...
详细信息
In this paper, we propose a parallel algorithm to solve a class of nonlinear network optimization problems. the proposed parallel algorithm is a combination of the successive quadratic programming and the dual method,...
详细信息
the current trend of multicore and Symmetric Multi-Processor (SMP), architectures underscores the need for parallelism in most scientific computations. Matrix-matrix multiplication is one of the fundamental computatio...
详细信息
the number of nodes inside supercomputers is continuously increasing. As detailed in the TOP500 list, there are now systems that include more than one million nodes;for instance China39;s Tianhe-2. To cope withthis...
详细信息
We show that developing an optimal parallelization of the two-list algorithm is much easier than we once thought. All it takes is to observe that the steps of the search phase of the two-list algorithm are closely rel...
详细信息
Matrix multiplication is an essential building block of many linear algebra operations and applications. this paper presents parallelalgorithms with shared A or B matrix in the memory for the special massively multit...
详细信息
Computer simulations withthe first-principle (kinetic) model are essential for studying multi-scale processes in space plasma. We develop numerical schemes for Vlasov simulations for practical use on currently-existi...
详细信息
暂无评论