In this paper,the state-of-the-art parallel computational model research is *** will introduce various models that were developed during the past *** to their targeting architecture features,especially memory organiza...
详细信息
In this paper,the state-of-the-art parallel computational model research is *** will introduce various models that were developed during the past *** to their targeting architecture features,especially memory organization,we classify these parallel computational models into three *** models and their characteristics are discussed based on three generations *** believe that with the ever increasing speed gap between the CPU and memory systems,incorporating non-uniform memory hierarchy into computational models will become *** the emergence of multi-core CPUs,the parallelism hierarchy of current computing platforms becomes more and more *** this complicated parallelism hierarchy in future computational models becomes more and more important.A semi-automatic toolkit that can extract model parameters and their values on real computers can reduce the model analysis complexity,thus allowing more complicated models with more parameters to be *** memory and hierarchical parallelism will be two very important features that should be considered in future model design and research.
A subset of the parallel Research Kernels (PRK),simplified parallel application patterns, are used to study the behavior of different runtimes implementing the PGAS programming model. The goal of this paper is to show...
详细信息
A subset of the parallel Research Kernels (PRK),simplified parallel application patterns, are used to study the behavior of different runtimes implementing the PGAS programming model. The goal of this paper is to show that such an approach is practical and effective as we approach the exascale era. Our experimental results indicate that forthe kernels we selected, MPI with two-sided communications outperforms the PGAS runtimes SHMEM, UPC, Grappa, and MPI-3 with RMA extensions.
Full correlation matrix analysis (FCMA) is an unbiased approach for exhaustively studying interactions among brain regions in functional magnetic resonance imaging (fMRI) data from human participants. In order to answ...
详细信息
In this paper, we present a general survey on parallelcomputing. The main contents include parallel computer system which is the hardware platform of parallelcomputing, parallel algorithm which is the theoretical ba...
详细信息
In this paper, we present a general survey on parallelcomputing. The main contents include parallel computer system which is the hardware platform of parallelcomputing, parallel algorithm which is the theoretical base of parallelcomputing, parallel programming which is the software support of parallelcomputing. After that, we also introduce some parallel applications and enabling technologies. We argue that parallelcomputing research should form an integrated methodology of "architecture algorithm programming application". Only in this way, parallelcomputing research becomes continuous development and more realistic.
Trust management has been identified as vital component for establishing and maintaining successful relational exchanges between e-commerce trading partners in cloud environment. In this highly competitive and distrib...
详细信息
Trust management has been identified as vital component for establishing and maintaining successful relational exchanges between e-commerce trading partners in cloud environment. In this highly competitive and distributed service environment, the assurances are insufficient for the consumers to identify the dependable and trustworthy Cloud providers. Due to these limitations, potential consumers are not sure whether they can trust the Cloud providers in offering dependable services. In this paper, we propose a multi-faceted trust management system architecture for cloud computing marketplaces, to support customers in identifying trustworthy cloud providers. This paper presents the important threats to a trust system and proposed a method for tackling these threats. It described the desired feature of a trust management system. It security components to determine the trustworthiness of e- commerce participants to helps online customers to decide whether or not to proceed with a transaction. Based on this framework, we proposed an approach for filtering out malicious feedbacks and a trust metric to evaluate the trustworthiness of service provider. Results of various simulation experiments show that the proposed multi-attribute trust management system can be highly effective in identifying risky transaction in electronic market places.
In this paper, an approach for profiling email-born phishing activities is proposed. Profiling phishing activities are useful in determining the activity of an individual or a particular group of phishers. By generati...
详细信息
In this paper, an approach for profiling email-born phishing activities is proposed. Profiling phishing activities are useful in determining the activity of an individual or a particular group of phishers. By generating profiles, phishing activities can be well understood and observed. Typically, work in the area of phishing is intended at detection of phishing emails, whereas we concentrate on profiling the phishing email. We formulate the profiling problem as a clustering problem using the various features in the phishing emails as feature vectors. Further, we generate profiles based on clustering predictions. These predictions are further utilized to generate complete profiles of these emails. The performance of the clustering algorithms at the earlier stage is crucial for the effectiveness of this model. We carried out an experimental evaluation to determine the performance of many classification algorithms by incorporating clustering approach in our model. Our proposed profiling email-born phishing algorithm (ProEP) demonstrates promising results with the RatioSize rules for selecting the optimal number of clusters.
The problem considered in this paper is the definition and evaluation of control strategies for handling image features spanning over several partitions of a parallel data structure, whenever such partitions are assig...
详细信息
In service-oriented computing applications, trust management systems are emerging as a promising technology to improve the e-commerce consumers and provider's relationship. Both consumers and providers need to eva...
详细信息
In service-oriented computing applications, trust management systems are emerging as a promising technology to improve the e-commerce consumers and provider's relationship. Both consumers and providers need to evaluate the trust levels of potential partners before engaging in interactions. The accuracy of trust evaluation greatly affects the success rate of the interaction. This paper addresses the threats and challenges that can compromise the reliability of the current trust management system. This paper studies and examines the importance of the trust factors of the trust management framework, specifically in dealing with malicious feedback ratings from e-commerce users. To improve the reliability of the trust management systems, an approach that addresses feedback-related vulnerabilities is paramount. A multilevel trust management system computes trust by combining different types of information. Using this combination, we introduce a multilevel framework for a new interactive trust management to improve the correctness in estimate of trust information.
Digital libraries offer a massive set of digital services to geographically distributed library patrons. The digital services are commonly sourced from third-party service providers for charge. As externally sourced d...
详细信息
Digital libraries offer a massive set of digital services to geographically distributed library patrons. The digital services are commonly sourced from third-party service providers for charge. As externally sourced digital services are becoming prevalence, issues regarding their quality assessment are gaining critical importance. Unfortunately, sourcing digital services from external providers has brought with it stringent quality of service (QoS) demand from the library service users. Currently, there is no way for ensuring QoS between the digital service providers and the library management. In this paper, we propose service level agreements (SLAs) to capture the QoS requirements of the digital service users and the commitments, as well as adherence of the digital service providers.
With the introduction of digital library services, the quality of service (QoS) has become paramount importance for evaluating the performance of the digital library service provisioning. Various models and frameworks...
详细信息
With the introduction of digital library services, the quality of service (QoS) has become paramount importance for evaluating the performance of the digital library service provisioning. Various models and frameworks have been proposed to evaluate digital library QoS. However, the prevalent research concentration in QoS for digital library is on the dimensions of the perspective of users’ perception. In this paper, we address the same research problem from a different dimension which is from the perspective of the digital service providers. To this end, we propose a new model suitable for evaluating the performance of digital library services. We argue that the level of QoS provided by the digital service providers have direct impact on the perception and satisfaction of the digital service end-users.
暂无评论