In order to reduce the complexity of traditional multithreaded parallel programming, this paper explores a new task-based parallel programming using the Microsoft .NET Task Parallel Library (TPL). Firstly, this paper ...
详细信息
ISBN:
(纸本)9781479932801
In order to reduce the complexity of traditional multithreaded parallel programming, this paper explores a new task-based parallel programming using the Microsoft .NET Task Parallel Library (TPL). Firstly, this paper proposes a custom data partitioning optimization method to achieve an efficient data parallelism, and applies it to the matrix multiplication. The result of the application supports the custom data partitioning optimization method. Then we develop a task parallel application: Image Blender, and this application explains the efficiency and pitfall aspects associated with task parallelism. Finally, the paper analyzes the performance of our applications. Experiments results show that TPL can dramatically alleviate programmer burden and boost the performance of programs with its task-based parallel programming mechanism.
Leakage-resilient public key encryption (PKE) schemes are designed to resist "memory attacks", i.e., the adversary recovers the cryptographic key in the memory adaptively, but subject to constraint that the ...
详细信息
In recent years, the rapid development of mobile network and device promotes the investigation of mobile thin client technology. Based on the surveys in this field, we found that the codec used in the thin client prot...
详细信息
Mobile thin client technology allows mobile users to access their services through mobile devices which can be used everywhere. The mobile devices only visualize the output of remote resource-intensive applications. I...
详细信息
In recent years, the rapid development of mobile network and device promotes the investigation of mobile thin client technology. Based on the surveys in this field, we found that the codec used in the thin client prot...
详细信息
In recent years, the rapid development of mobile network and device promotes the investigation of mobile thin client technology. Based on the surveys in this field, we found that the codec used in the thin client protocol should be able to provide efficient data compression (to reduce network bandwidth consumption), and operate with low computing complexity (to decrease response latency and thin client power consumption). In this paper, we proposed a hybrid remote display protocol for mobile thin client, together with the main results of performance study.
In recent years,the rapid development of mobile network and device promotes the investigation of mobile thin client *** on the surveys in this field,we found that the codec used in the thin client protocol should be a...
详细信息
In recent years,the rapid development of mobile network and device promotes the investigation of mobile thin client *** on the surveys in this field,we found that the codec used in the thin client protocol should be able to provide efficient data compression (to reduce network bandwidth consumption),and operate with low computing complexity (to decrease response latency and thin client power consumption).In this paper,we proposed a hybrid remote display protocol for mobile thin client,together with the main results of performance study.
The injury by various computer viruses is over the time comprised of the tendency to increase. Therefore, various methodologies for protecting the computer system from the threats of new malicious software are activel...
详细信息
ISBN:
(纸本)9789898565242
The injury by various computer viruses is over the time comprised of the tendency to increase. Therefore, various methodologies for protecting the computer system from the threats of new malicious software are actively studied. In this paper, we present a network-based executable file extraction and analysis technique for malware detection. Here, an executable file extraction is processed by executable file specific session and pattern matching in reconfiguring hardware. Next, malware detection is processed by clustering analysis technique about an executable file which is divided into many regions. In other words, it detects a malware by measuring the byte distribution similarity between malicious executable files and normal executable files. The proposed technique can detect not only the known malicious software but also the unknown malicious software. Most of all, it uses network packets as analysis source unlike the existing host anti-virus techniques. Besides, the proposed detection technique easily can detect malicious software without complicated command analysis. Therefore, our approach can minimize the load on the system execution despite the load on the additional network packet processing.
The phenomenon of cloud computing has been driven largely these days. Personal Cloud, as the cloud computing for personal usage, has come to the forefront. Compare with traditional operating system, personal cloud shi...
详细信息
Virtualization was considered as the best way to isolate independent thin client sessions on a physical machine. However, the hypervisor, guest OS and guest remote server not only consumes a considerable amount of mem...
详细信息
The phenomenon of cloud computing has been driven largely these days. Personal Cloud, as the cloud computing for personal usage, has come to the forefront. Compare with traditional operating system, personal cloud shi...
详细信息
ISBN:
(纸本)9781424492220
The phenomenon of cloud computing has been driven largely these days. Personal Cloud, as the cloud computing for personal usage, has come to the forefront. Compare with traditional operating system, personal cloud shifts individual computing "from being device-centric to information-centric", which create a bridge between operating system-based computing and the more service-oriented approach to IT. Also, the mobile thin-client has brought mobility to cloud computing. In this paper, we provide a reference base for the development of methodologies tailored for personal cloud computing. Besides, we also provide a security architecture for personal cloud based on the security requirement analysis.
暂无评论