Existing privacy-preserving approaches are generally designed to provide privacy guarantee for individual data in a database, which reduces the utility of the database for data analysis. In this paper, we propose a no...
详细信息
Transactional memory (TM) is a parallel programming concept. Existing consistency protocols in distributed transactional memory system consume too much bandwidth and bring high latency. In this paper, we propose our T...
详细信息
Server consolidation, an application form of virtualization technology, consolidates multiple physical servers into a single or fewer real machines. It results in higher resource utilization and smaller space consumpt...
详细信息
Geographic routing has been introduced in mobile ad hoc networks and sensor networks. But its per-formance suffers greatly from mobility-induced location errors that can cause Lost Link (LLNK) and LOOP problems. Thu...
详细信息
Geographic routing has been introduced in mobile ad hoc networks and sensor networks. But its per-formance suffers greatly from mobility-induced location errors that can cause Lost Link (LLNK) and LOOP problems. Thus various mobility prediction algorithms have been proposed to mitigate the errors, but sometimes their prediction errors are substantial. A novel mobility prediction technique that incorpo-rates both mobile positioning information and road topology knowledge was presented. Furthermore, the performance of the scheme was evaluated via simulations, along with two other schemes, namely, Linear Velocity Prediction (LVP) and Weighted Velocity Prediction (WVP) for comparison purpose. The results of simulation under Manhattan mobility model show that the proposed scheme could track the movement of a node well and hence provide noticeable improvement over LVP and MVP.
Virtualization technology improves the resource utilization, but also raises the probability of resource contention. Thus, it arises one problem, namely how about performance isolation among VMs. To answer the questio...
详细信息
Text categorization is the process of assigning documents to a set of previously fixed categories. It is widely used in many data-oriented management applications. Many popular algorithms for text categorization have ...
详细信息
Multicast routing scheme seems so extravagant in resource respect in mobile ad hoc network (MANET), especially in delay tolerant network (DTN), that yields to high resource occupation rate, low submission rate, and lo...
详细信息
This paper proposes a novel parallel data transfer mechanism to improve the performance of data transfer in grid environment. It utilizes the servers distributed in grid system and selects some of them as the proxy se...
详细信息
Due to the prohibitively long time when detailedly simulating a realistic benchmark to its completion, sampling is frequently used to reduce the simulation time. However, it may often require profiling or iterative si...
详细信息
Due to the prohibitively long time when detailedly simulating a realistic benchmark to its completion, sampling is frequently used to reduce the simulation time. However, it may often require profiling or iterative simulations to determine the sampling parameters. This paper employs the generation procedure of trisection Cantor set, one classic fractal, to select instructions simulated in detail as an approach to enable a simple and fast micro-architecture simulation. Randomly selected six benchmarks from SPEC CPU2000 are tested on the simulator, CantorSim, which implements the trisection Cantor fractal approach. The results show that it is very easy to use this approach and it can achieve actual average acceleration of 23.4% over SMARTS[3] while the accuracy only reduces marginally. CantorSims accuracy is validated against the sim-outorder and is accurate in a 3.2% error margin. Similar CPI relative errors with the same parameter values of experiments on simulators of different processor models indicate that this approach is microarchitecture independent and can be applied to well predict the performance of new micro-architecture design.
Dynamic instrumentation systems offer a valuable solution for program profiling and analysis, architectural simulation, and bug detection. However, the performance of target programs suffers great losses when they are...
详细信息
暂无评论