Accurate resource requests prediction is essential to achieve optimal job scheduling and load balancing for cloud Computing. Existing prediction approaches fall short in providing satisfactory accuracy because of high...
详细信息
This paper presents a comprehensive survey on the development of Intel SGX(software guard extensions)processors and its *** the advent of SGX in 2013 and its subsequent development,the corresponding research works are...
详细信息
This paper presents a comprehensive survey on the development of Intel SGX(software guard extensions)processors and its *** the advent of SGX in 2013 and its subsequent development,the corresponding research works are also increasing *** order to get a more comprehensive literature review related to SGX,we have made a systematic analysis of the related papers in this *** first search through five large-scale paper retrieval libraries by keywords(i.e.,ACM Digital Library,IEEE/IET Electronic Library,SpringerLink,Web of science,and Elsevier science Direct).We read and analyze a total of 128 SGX-related *** first round of extensive study is conducted to classify *** second round of intensive study is carried out to complete a comprehensive analysis of the paper from various *** start with the working environment of SGX and make a conclusive summary of trusted execution environment(TEE).We then focus on the applications of *** also review and study multifarious attack methods to SGX framework and some recent security improvements made on ***,we summarize the advantages and disadvantages of SGX with some future research *** hope this review could help the existing and future research works on SGX and its application for both developers and users.
Glaucoma is a progressive and degenerative optic neuropathy that damages the optic nerve due to increased intraocular pressure and yields various visual field abnormalities. Any damage to the optic nerve (due to glauc...
详细信息
Multi-objective genetic algorithm is much suitable for solving multi-objective optimization problems. By use of Genetic algorithm, the optimization of S-boxes is explored in this paper. Results of the experiments show...
详细信息
Multi-objective genetic algorithm is much suitable for solving multi-objective optimization problems. By use of Genetic algorithm, the optimization of S-boxes is explored in this paper. Results of the experiments show that, with heuristic mutation strategy, the algorithm has high searching efficiency and fast convergence speed. Meanwhile, we also have take the avalanche probability of S-boxes into account, besides nonlinearity and difference uniformity. Under this method, an effective genetic algorithm for 6×6 S-boxes is provided and a number of S-boxes with good cryptographic capability can be obtained.
The Roadside Unit (RSU) allocation is critical for the functionality and topology control of Vehicular Ad-Hoc Networks. However, due to the complexity of different transportation scenarios and the challenging coordina...
详细信息
Phishing is a significant security threat to users of Internet services. Nowadays, phishing has become more resilient to detection and trace-back with the invention of Fast Flux (FF) service networks. We propose two a...
详细信息
Nowadays, Virtualization technology is an important means in effective management of cloud computing resources. Focuses on dividable batch tasks running in the cloud computing environment, we study resource virtualiza...
详细信息
ISBN:
(纸本)9781629932170
Nowadays, Virtualization technology is an important means in effective management of cloud computing resources. Focuses on dividable batch tasks running in the cloud computing environment, we study resource virtualization based on time-division multiplexing. Our methods make sure that users can use system resources equitably in cloud computing with multi-tenants, and allow limited computational resources to meet user requirements as more as possible, as well as improve the utilization of cloud resources.
There are several ways in which an "improved" technique for solving some computational problem can be defended: by mathematical argument;by simulation;and by experimental validation. Each of these has risks....
ISBN:
(纸本)1864877871
There are several ways in which an "improved" technique for solving some computational problem can be defended: by mathematical argument;by simulation;and by experimental validation. Each of these has risks. In this paper we describe some of the issues that arose during an experimental validation of architectures for distributed text query evaluation, and the approaches that were taken to resolve them. In particular, collections and clusters must be scaled in a way that maximizes comparability between different data sizes;query sets must be appropriate to the target collection;and hardware issues such as file placement on disk must also be considered. Our intention is to report on our experience in a practical sense, and thereby assist others to avoid the same problems.
Though K-means is very popular for general clustering, its performance, which generally converges to numerous local minima, depends highly on initial cluster centers. In this paper a novel initialization scheme to sel...
详细信息
Though K-means is very popular for general clustering, its performance, which generally converges to numerous local minima, depends highly on initial cluster centers. In this paper a novel initialization scheme to select initial cluster centers for K-means clustering is proposed. This algorithm is based on reverse nearest neighbor (RNN) search which retrieves all points in a given data set whose nearest neighbor is a given query point. The initial cluster centers computed using this methodology are found to be very close to the desired cluster centers for iterative clustering algorithms. This procedure is applicable to clustering algorithms for continuous data. The application of the proposed algorithm to K-means clustering algorithm is demonstrated. An experiment is carried out on several popular datasets and the results show the advantages of the proposed method.
The article introduces an innovative framework called Kororā, which aims to enhance the security and integrity of live virtual machine migration in a public cloud computing environment. The framework incorporates a t...
详细信息
暂无评论