Performance prediction is valuable in different areas of computing. The popularity of lease-based access to high performance computing resources particularly benefits from accurate performance prediction. Most contemp...
详细信息
Along with the development of the Internet and distributedsystems, it requires that the software is irrelative with the runtime platform, and can be transplanted. Meanwhile how to protect mobile code from malicious h...
详细信息
ISBN:
(纸本)9780769541105
Along with the development of the Internet and distributedsystems, it requires that the software is irrelative with the runtime platform, and can be transplanted. Meanwhile how to protect mobile code from malicious host is a new issue that cannot be dealt by traditional technologies. Under this condition, the Java appears. However the JVM instruction system is too simple, but its class format includes a lot of information which is useful for the anti-compiling. The obfuscation can prevent the java program from reverse-engineering effectively, and source codes which de-compiler got cannot read easily. This paper discusses the method of the combined class of code obfuscation;and simultaneously the definition, classification and standard judgment of the Obfuscation technology are given.
We present a novel architecture of a communication engine for non-coherent distributed shared memory systems. The shared memory is composed by a set of nodes exporting their memory. Remote memory access is possible by...
详细信息
For special structured linear systems, WZ factorizations of matrices are basic mathematical theories to design a class of parallel solving algorithms. So, firstly, new WZ factorizations for the p-tridiagonal matrix ar...
详细信息
ISBN:
(纸本)9780769541105
For special structured linear systems, WZ factorizations of matrices are basic mathematical theories to design a class of parallel solving algorithms. So, firstly, new WZ factorizations for the p-tridiagonal matrix are proposed and proved. Next, an effective parallel algorithm is designed. Solving both the subsystem in each processor and the reduced subsystem makes use of the WZ factorization so that a two-level method is formed. The experiment results confirm the validity of our method.
software protection is a major problem about which companies and programmers are concerned. This paper first analysis' the methods of current software protection, then proposes a method of serial distribution base...
详细信息
the key of distributed computing is to fully utilize computing resources. However, the efficiency of distributed computing can always be affected by volatility of available nodes and uncertainty of network environment...
详细信息
Mattern's GVT algorithm is a time management algorithm that helps achieve the synchronization in parallel and distributedsystems. This algorithm uses ring structure to establish cuts C1 and C2 to calculate the GV...
详细信息
ISBN:
(纸本)9789048136599
Mattern's GVT algorithm is a time management algorithm that helps achieve the synchronization in parallel and distributedsystems. This algorithm uses ring structure to establish cuts C1 and C2 to calculate the GVT. The latency of calculating the GVT is vital in parallel/distributedsystems which is extremely high if calculated using this algorithm. However, using synchronous barriers with the Matterns algorithm can help improving the GVT computation process by minimizing the GVT latency. In this paper, we incorporate the butterfly barrier to employ two cuts C1 and C2 and obtain the resultant GVT at an affordable latency. Our analysis shows that the proposed GVT computation algorithm significantly improves the overall performance in terms of memory saving and latency.
This paper presents a case study in which an inexpensive embedded control system has been designed and built on top of an open-source real-time operating system. A COTS protocol stack for the well-known MODBUS protoco...
详细信息
ISBN:
(纸本)9781424463916
This paper presents a case study in which an inexpensive embedded control system has been designed and built on top of an open-source real-time operating system. A COTS protocol stack for the well-known MODBUS protocol has been selected and enhanced to provide network communications with a wider address space and a periodic election of the bus master. This design technique has proved very effective to reduce software development time and cost, without incurring in the overhead and footprint issues sometimes associated with COTS software modules. The whole system runs effectively even on low-cost microcontrollers and can be ported easily from one microcontroller family to another.
The article discusses issues related to the editorial board of the journal, including the outcome of the open meeting held by the board at the Institute of Electrical and Electronics Engineers (IEEE) international Par...
详细信息
The article discusses issues related to the editorial board of the journal, including the outcome of the open meeting held by the board at the Institute of Electrical and Electronics Engineers (IEEE) internationalparallel and distributed Processing symposium (IPDPS) in April 2010.
In this paper we propose a novel parallel hardware architecture for two binary matrix inversion and vector decoding algorithms, for hard Raptor decoder. We compare the achieved performance to a software based implemen...
详细信息
ISBN:
(纸本)9781424453092
In this paper we propose a novel parallel hardware architecture for two binary matrix inversion and vector decoding algorithms, for hard Raptor decoder. We compare the achieved performance to a software based implementation in an embedded processor. We demonstrate the superiority of our proposed architecture in terms of performance (by a factor 12), power and energy dissipation (by a factor of 15). We also include the hardware resource requirements in the comparison. Furthermore, the proposed hardware architecture is parameterized and easily scalable. The data processing word size has been successfully extended up to 1024 bits and fitted within the chosen FPGA hardware platform.
暂无评论