In cluster file systems, the metadata management is critical to the whole system. Past researches mainly focus on journaling which alone is not enough to provide high-available metadata service. Some others try to use...
详细信息
Task scheduling is one of the most prominent problems in the era of parallel computing. We find scheduling algorithms in every domain of computerscience, e.g., mapping multiprocessor tasks to clusters, mapping jobs t...
详细信息
In a delay tolerant network (DTN), nodes are connected intermittently and the future node connections are mostly unknown. Since in these networks, a fully connected path from source to destination is unlikely to exist...
详细信息
Recently, DoS (Denial of Service) detection has become more and more important in web security. In this paper, we argue that DoS attack can be taken as continuous data streams, and thus can be detected by using stream...
详细信息
Delay tolerant networks are characterized by the sporadic connectivity between their nodes and therefore the lack of stable end-to-end paths from source to destination. Since the future node connections are mostly unk...
详细信息
The DIRECT approach for 3-D Time-of-Flight (TOF) PET reconstruction performs all iterative predictor-corrector operations directly in image space. A computational bottleneck here is the convolution with the long TOF (...
详细信息
The DIRECT approach for 3-D Time-of-Flight (TOF) PET reconstruction performs all iterative predictor-corrector operations directly in image space. A computational bottleneck here is the convolution with the long TOF (resolution) kernels. Accelerating this convolution operation using GPUs is very important especially for spatially variant resolution kernels, which cannot be efficiently implemented in the Fourier domain. The main challenge here is the memory cache performance at non-axis aligned directions. We devised a scheme that first re-samples the image into an axis-aligned orientation offering good memory coherence for the convolution operations. In order to maintain good accuracy, we carefully design the resampling and new convolution kernels to combine into the original TOF kernel. This paper demonstrates the validity, accuracy, and high speed-performance of our scheme for a comprehensive set of orientation angles. Future work will apply these cascaded kernels within a GPU-accelerated version of DIRECT.
With the introduction of mobile Ad hoc networks (MANETs), nodes are able to participate in a dynamic network which lacks an underlying infrastructure. Before two nodes agree to interact, they must trust that each will...
详细信息
With the introduction of mobile Ad hoc networks (MANETs), nodes are able to participate in a dynamic network which lacks an underlying infrastructure. Before two nodes agree to interact, they must trust that each will satisfy the security and privacy requirements of the other. In this paper, using the cognition inspired method from the brain informatics (BI), we present a novel approach to improving the search efficiency and scalability of MANETs by clustering nodes based on cognitive trust mechanism. The trust relationship is formed by evaluating the level of trust using Bayesian statistic analysis, and clusters can be formed and maintained autonomously by nodes with only partial knowledge. Simulation experiments show that each node can form and join proper clusters, which improve the interaction performance of the entire network. The essence of the underlying reason is analyzed through the theory of complex networks, revealing great scalability of this method.
Steganography is an important research direction of information security, which mainly research how to embed secret information into carriers, in order to achieve the objectives of secure communication. In this paper,...
详细信息
The advent of GPGPU technologies has allowed for sensible speed-ups in many high-dimension, memory-intensive computational problems. In this paper we demonstrate the effectiveness of such techniques by describing two ...
详细信息
This paper describes a supervised reinforcement learning-based model for discrete environment domains. The model was tested within the domain of backgammon game. Our results show that a supervised actor-critic based l...
详细信息
暂无评论