In this paper, we present a nonintrusive and time-based mechanism to estimate the available bandwidth of a node with the nodes collision and backoff stage taken into account. We first give a new definition of availabl...
详细信息
In this paper, we present a nonintrusive and time-based mechanism to estimate the available bandwidth of a node with the nodes collision and backoff stage taken into account. We first give a new definition of available bandwidth in IEEE802.11b network to reflect the collision and contention between nodes. Then, the investigated node obtains the NAV information of its neighbors within the measurement duration through CSMA/CA mechanism and stores the information into its routing buffers. Subsequently, we obtain the available bandwidth of the investigated node by calculate the ratio of its channel accessible time to the measurement duration, which should subtract the sum of NAV values of its neighbors and the backoff time itself from the measurement duration. Simulation shows the proposed scheme is accurate and can completely reflect the collision and contention between nodes
As wireless ad-hoc networks become feasible, security issues have been important. Because taping and the falsification are easy in a wireless network, and it is difficult to find the attacker, defenses are more diffic...
详细信息
As wireless ad-hoc networks become feasible, security issues have been important. Because taping and the falsification are easy in a wireless network, and it is difficult to find the attacker, defenses are more difficult than in cable networks. Therefore, a message authentication scheme in wireless networks is becoming important. For wireless ad-hoc networks, it is necessary to reduce signature information, etc. which become overheads in narrow wireless communication. In addition, since an ad hoc network is often achieved with mobile terminals, a security scheme which does not need computation power and any complex mechanism is required. In this paper, we propose two efficient message authentication schemes which improve the performance of conventional schemes. In our scheme, the hash calculation time and overhead of the packet is less than the conventional method. The simulation results show that our schemes have a better packet authentication rate in a burst error environment than conventional methods.
Diverse computers interconnected via mixed network equipments are commonly available parallel architecture now, and achieve good performance/price ratio. As an important parallel communication tool, MPI system is a na...
详细信息
Diverse computers interconnected via mixed network equipments are commonly available parallel architecture now, and achieve good performance/price ratio. As an important parallel communication tool, MPI system is a natural choice to support heterogeneous computing platform. The paper classifies the definition of heterogeneity into three categories, and presents the issues of them in detail respectively. Then overviews the heterogeneous support in eight MPI implementations. Comparison and analysis results are given from several aspects at last.
A small scale distributedcomputing system that is able to meet the needs of parallel intelligent techniques for engineering and science applications is reported in this paper. The reported system is a cluster of gene...
详细信息
A small scale distributedcomputing system that is able to meet the needs of parallel intelligent techniques for engineering and science applications is reported in this paper. The reported system is a cluster of general-purpose PCs interconnected in a network. Such systems are powerful yet low cost. While such systems are not new, most applications written for cluster systems are programmed in MPI-C. Results from the proposed system have shown that it is advantageous to use Java due to its simplicity and mobility. Hence, the goal of this research is to design a Java-based parallel platform for efficient execution of intelligent techniques for engineering and science applications on a cluster system.
CrownFS is a file system for continuous media server in the CROWN (Clustering Resources On Workstations' Network) system. Because of the high I/O bandwidth rate and strict real-time constraints, the design issues ...
详细信息
ISBN:
(纸本)0818682272
CrownFS is a file system for continuous media server in the CROWN (Clustering Resources On Workstations' Network) system. Because of the high I/O bandwidth rate and strict real-time constraints, the design issues of CrownFS are that of efficiently balancing user load against limited disk: bandwidth, network and I/O channel bandwidth. CrownFS accomplishes this balancing by striping continuous data file across several workstations and computing at each workstation in the CROWN system. This paper describes the CROWN system architecture and the CrownFS design. CrownFS runs on a cluster of workstations consisted of Kawaiis, AlphaStations and PCs.
This paper aims to present a multi-tiered approach to designing learning experiences in HPC for undergraduate students that significantly reinforce comprehension of CS topics while working with new concepts in paralle...
详细信息
This paper aims to present a multi-tiered approach to designing learning experiences in HPC for undergraduate students that significantly reinforce comprehension of CS topics while working with new concepts in parallel and distributedcomputing. The paper will detail the experience of students working in the design, construction, and testing of a computing cluster including budgeting, hardware purchase and setup, software installation and configuration, interconnection networks, communication, benchmarking, and running parallel code using MPI and OpenMP. The case study of building a relatively low-cost, small-scale computing cluster that can be used as a template for CS senior projects or independent studies, also yielded an opportunity to involve students in the creation of teaching tools for parallelcomputing at many levels of the CS curriculum.
Intrusion detection (ID) has become an important area of research since building a system with no vulnerabilities has not been technically feasible. In this paper, effect of change in rate of genetic algorithm operato...
详细信息
Intrusion detection (ID) has become an important area of research since building a system with no vulnerabilities has not been technically feasible. In this paper, effect of change in rate of genetic algorithm operator on fitness value in composition of signatures for misuse intrusion detection system is presented. The proposed genetic algorithm uses a set of classification rules which are generated from a predefined intrusion behavior. From the results it could be concluded that if crossover performed is not sufficient, there is not sufficient sharing of genes. If we crossover too much, good segments of individuals get split up a lot. This allows some individuals with high fitness's to be copied directly to the next population.
In this paper, we propose a novel deadlock resolution algorithm. In the presence of global deadlocks in a multidatabase system, this algorithm always selects an optimal set of victims for removing deadlocks. It makes ...
详细信息
ISBN:
(纸本)0818672676
In this paper, we propose a novel deadlock resolution algorithm. In the presence of global deadlocks in a multidatabase system, this algorithm always selects an optimal set of victims for removing deadlocks. It makes use of network flow techniques, and runs in time O(n/sup 3/), where n is the number of the deadlocked global transactions. Furthermore, the proposed deadlock resolution algorithm does not have livelock and transaction processing starvation problems.
The Transformer model, which has significantly advanced natural language processing and computer vision, overcomes the limitations of recurrent neural networks and convolutional neural networks. However, it faces chal...
The Transformer model, which has significantly advanced natural language processing and computer vision, overcomes the limitations of recurrent neural networks and convolutional neural networks. However, it faces challenges with computational efficiency and memory management due to complex computations and variable-length inputs. Despite research efforts, these issues persist. This paper presents a novel optimization of the Transformer model, following an indepth analysis of its computational graph structure. Firstly, we utilize Deep computing Unit (DCU) as our hardware platform. Secondly, we optimize element-wise and reduction operators through operator fusion and rewriting. Thirdly, we develop a fine-grained memory management algorithm using a greedy strategy. As a result, the training speed of the Transformer model increases by 1.2x - 1.4x without compromising accuracy.
The incremental learning is a method to compose an associate memory using a chaotic neural network and provides larger capacity than correlative learning in compensation for a large amount of computation. A chaotic ne...
详细信息
The incremental learning is a method to compose an associate memory using a chaotic neural network and provides larger capacity than correlative learning in compensation for a large amount of computation. A chaotic neuron has spatiotemporal sum in it and the temporal sum makes the learning stable to input noise. When there is no noise in input, the neuron may not need temporal sum. In this paper, to reduce the computations, a simplified network without temporal sum are introduced and investigated through the computer simulations comparing with the network as in the past. It turns out that the simplified network has the same capacity to and can learn faster than the usual network.
暂无评论