Unpredictable power outages in NAND flashbased Solid State Drives (SSDs) may cause system failure or reliability problems. Capacitors are widely adopted as the interim power supplier when power interruption happens. H...
详细信息
ISBN:
(纸本)9781479989386
Unpredictable power outages in NAND flashbased Solid State Drives (SSDs) may cause system failure or reliability problems. Capacitors are widely adopted as the interim power supplier when power interruption happens. However, since the energy provided by backup capacitors is limited, and the capacitance of a capacitor will gradually degrade with time, it is imperative to improve the efficiency and reliability of the backup process for SSDs with capacitors. This paper presents a novel backup scheme called SmartBackupfor MLC NAND flash-based SSDs with backup capacitors. In SmartBackup, by exploiting the feature of the discharge process of capacitors, all available SSD channels are fully utilized and dynamically adjusted based on the available voltage, so data can be efficiently stored in a reliable manner. Moreover, in SmartBackup, to write data in a time/energyefficient manner with better reliability, we adopt a fast and reliable programming strategy by only writing LSB (Least Significant Bit) pages in MLC NAND flash. To the best of our acknowledge, this is the first work to jointly utilize the property of the multi-page architecture of MLC NAND flash and the discharge characteristic of capacitors to improvethe efficiency and reliability of the backup process in SSDswith backup capacitors. The experimental results show thatSmartBackup can effectively accelerate the backup processand improve the reliability.
We consider the design of semidefinite programming (SDP) based approximation algorithm for the problem Max Hypergraph Cut with Limited Unbalance (MHC-LU): Find a partition of the vertices of a weighted hypergraph...
详细信息
We consider the design of semidefinite programming (SDP) based approximation algorithm for the problem Max Hypergraph Cut with Limited Unbalance (MHC-LU): Find a partition of the vertices of a weighted hypergraph H = (V, E) into two subsets V1, V2 with ||V2| - |1/1 || ≤ u for some given u and maximizing the total weight of the edges meeting both V1 and V2. The problem MHC-LU generalizes several other combinatorial optimization problems including Max Cut, Max Cut with Limited Unbalance (MC-LU), Max Set Splitting, Max Ek-Set Splitting and Max Hypergraph Bisection. By generalizing several earlier ideas, we present an SDP randomized approximation algorithm for MHC-LU with guaranteed worst-case performance ratios for various unbalance parameters τ = u/|V|. We also give the worst-case performance ratio of the SDP-algorithm for approximating MHC-LU regardless of the value of τ. Our strengthened SDP relaxation and rounding method improve a result of Ageev and Sviridenko (2000) on Max Hypergraph Bisection (MHC-LU with u = 0), and results of Andersson and Engebretsen (1999), Gaur and Krishnamurti (2001) and Zhang et al. (2004) on Max Set Splitting (MHC-LU with u = |V|). Furthermore, our new formula for the performance ratio by a tighter analysis compared with that in Galbiati and Maffioli (2007) is responsible for the improvement of a result of Galbiati and Maffioli (2007) on MC-LU for some range of τ.
In this paper, by making use of optimal models, we study the weighting matrices of the multlsplitting parallel methods for solving the symmetric positive definite linear complementarity problem, which is a powerful al...
详细信息
ISBN:
(纸本)9781784660529
In this paper, by making use of optimal models, we study the weighting matrices of the multlsplitting parallel methods for solving the symmetric positive definite linear complementarity problem, which is a powerful alternative for solving the large sparse linear complementarity problems. In our multisplitting there is only one that is required to be P-regular splitting and all the others can be constructed arbitrarily, which not only decreases the difficulty of constructing the multisplitting of the coefficient matrix, but also relaxes the constraints to the weighting matrices(unlike the standard methods, they are not necessarily nonnegative diagonal scalar matrices or given in advance). Finally, we prove the convergence of this new method.
The mobile storages especially in mobile devices hold a lot of important and private data. The portability and mobility may lead to loss and theft, therefore security problem of mobile storages and mobile data may suf...
详细信息
Sparse representation based single image super-resolution (SR) has attracted much interest. In this paper, we propose a novel SR reconstruction algorithm based on sparse representation of wavelet coefficients. The wav...
详细信息
The thesis expounded the connotation of cloud platform, and made a comparison between several commercial computing development platforms, for the development of cloud application program with high-efficiency and high-...
详细信息
The continuously increased demand for paralleling multitask in domains such as grid computing and cloud computing has significantly promoted research on concurrent mechanism and concurrent programming. The Java progra...
详细信息
In this paper a scheme named multi-use conditional proxy re-encryption based on ECC is proposed first, which can be used in the following email service scenarios: Alice can delegate her decryption rights to Bob for an...
详细信息
ISBN:
(纸本)9781479952465
In this paper a scheme named multi-use conditional proxy re-encryption based on ECC is proposed first, which can be used in the following email service scenarios: Alice can delegate her decryption rights to Bob for an encrypted mails sent to her, which contains a specific word and satisfies the condition set on the proxy by Alice, and Bob also can delegate the right to others just like Alice through the proxy, as the condition set by him is satisfied, and so on if required. Furthermore, as an important part for fulfilling our main goal, a new method to generate the partial re-encryption keys is proposed, and the security of our scheme is proven secure against chosen cipher text attacks based on the random oracle model.
Environment monitoring is the foundation of environment plan and environment protection. It has huge works, complicate and extensive sources, and need a lot of investments to do, and is difficult to perform monitoring...
详细信息
ISBN:
(纸本)9781849195379
Environment monitoring is the foundation of environment plan and environment protection. It has huge works, complicate and extensive sources, and need a lot of investments to do, and is difficult to perform monitoring at 24 hours every day periodically. To resolve the problem, a architecture of the internet of things of environment monitoring based on cloud computing is proposed, and a creative model named as Unified Layered Model is proposed, which combines wireless sensor network, GPS, WiFi, 3G communication, database, cloud storage, cloud computing, data mining, and service computing mode, etc. The model aims at collect and management environment monitoring data and related data, provides in time, online or offline, parallel, distributed, cross time and space environment quality monitoring, feedback and control functions.
An FPGA-based intellectual property protection method at physical design level is presented for ownership identification in IP reuse. The method uses the special physical structure of FPGA for watermark insertion and ...
详细信息
暂无评论