2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)最新文献

筛选
英文 中文
A novel algorithm for sparse FFT pruning and its applications to OFDMA technology 一种新的稀疏FFT剪枝算法及其在OFDMA技术中的应用
S. Abdulla, Haewoon Nam, J. Abraham
{"title":"A novel algorithm for sparse FFT pruning and its applications to OFDMA technology","authors":"S. Abdulla, Haewoon Nam, J. Abraham","doi":"10.1109/PCCC.2014.7017080","DOIUrl":"https://doi.org/10.1109/PCCC.2014.7017080","url":null,"abstract":"This paper proposes novel DIF and DIT, FFT algorithms that utilizes data sparsity information to acheive sub-optimal computational complexity over traditional radix-2 FFT. Using the sparsity information, a map of the relavant nodes that would contribute to the FFT sum is first derived. Then the second part of the algorithm traverses this map and performs computation. This paper also provides the analysis of the computational complexity and how it can be tied in to existing frame work of OFDMA baseband. This algorithm is well suited for hardware efficient in-place FFT computations and especially for large size FFTs. The best application would be to use this algorithm in OFDMA basebands where the sparsity information can be known in advance.","PeriodicalId":105442,"journal":{"name":"2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117205366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance enhancement in shared-memory multiprocessors using dynamically classified sharing information 使用动态分类共享信息增强共享内存多处理器的性能
Nilufa Ferdous, Byeong Kil Lee, E. John
{"title":"Performance enhancement in shared-memory multiprocessors using dynamically classified sharing information","authors":"Nilufa Ferdous, Byeong Kil Lee, E. John","doi":"10.1109/PCCC.2014.7017063","DOIUrl":"https://doi.org/10.1109/PCCC.2014.7017063","url":null,"abstract":"Advances in process technology has enabled the integration of many cores on a single die. The advent of many core systems has led to a commensurate increase in cache coherence complexity. As a solution to this problem, researches have proposed directory based protocols, which are scalable alternatives to snoop-based protocols. Although write-invalidation based directory protocols enhance the performance of large-scale multiprocessors, coherence misses are intrinsic impediments in such systems. Write-update protocols were proposed as a means to reduce these coherence misses. However, previous researches have shown that pure write-update protocol is highly undesirable because of the heavy traffic caused by the aggressive updates. In order to remedy these limitations, we propose a performance-aware mechanism which dynamically classifies the sharers of each cache block, either as a weak-sharing-group or an efficient-sharing-group and exploit this dynamic classification as a metric for seamless dynamic adaptation between write-invalidate and write-update strategy on a per block basis. Exploitation of the dynamic adaptation of the protocol, based on the sharing-group speculation, reduces unnecessary accesses to the shared last level cache and hence reduces the traffic caused by coherence misses and directory accesses. Simulation results on a 64-core CMP show that our proposed method can achieve 15 % (average) speedup over the baseline directory-based MOESI cache coherence protocol with PARSEC workloads. Our proposed work also reduces the L1 cache miss rate by 17 %(average). The network traffic caused by directory accesses and L1 read misses are also reduced by 16% and 17% respectively.","PeriodicalId":105442,"journal":{"name":"2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122164368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of antenna arrays for isoflux radiation in satellite systems 卫星系统等通量辐射天线阵列设计
Miguel Ibarra, Á. G. Andrade, M. Panduro, A. Mendez
{"title":"Design of antenna arrays for isoflux radiation in satellite systems","authors":"Miguel Ibarra, Á. G. Andrade, M. Panduro, A. Mendez","doi":"10.1109/PCCC.2014.7017028","DOIUrl":"https://doi.org/10.1109/PCCC.2014.7017028","url":null,"abstract":"This paper presents the multi-objective design of concentric ring antenna arrays for isoflux radiation. The purpose of this paper is to present the application of an evolutionary multi-objective optimization technique to design concentric ring antenna arrays for isoflux radiation in GEO and MEO satellites. This multi-objective design of concentric ring antenna arrays considers the optimization of the spacing between rings and the amplitude excitation across the antenna elements. The objective designs are the isoflux radiation desired and the side lobe level.","PeriodicalId":105442,"journal":{"name":"2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)","volume":"329 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124636659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA 基于多级μTESLA的高效增强型广播认证协议
Xiang Li, Na Ruan, Fan Wu, Jie Li, Mengyuan Li
{"title":"Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA","authors":"Xiang Li, Na Ruan, Fan Wu, Jie Li, Mengyuan Li","doi":"10.1109/PCCC.2014.7017109","DOIUrl":"https://doi.org/10.1109/PCCC.2014.7017109","url":null,"abstract":"Providing lightweight authentication and resisting Denial of Service (DoS) attacks are challenging problems in wireless ad hoc networks, such as wireless sensor networks (WSNs). We introduce two improved protocols based on fault-tolerant protocol and DoS-resistant protocol in Multilevel μTESLA to overcome these difficulties. The proposed Efficient Fault-Tolerant Protocol contributes in shortening the recovery time when highlevel packets are lost, and hence reduces the risk of memory-based DoS attacks. The proposed Enhanced DoS-Resistant Protocol enhances the resistance to DoS attacks by offering packet-loss recovery of authentication message.","PeriodicalId":105442,"journal":{"name":"2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127513242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A light-weight authentication scheme based on message digest and location for mobile cloud computing 基于消息摘要和位置的移动云计算轻量级身份验证方案
Saurabh Dey, S. Sampalli, Qiang Ye
{"title":"A light-weight authentication scheme based on message digest and location for mobile cloud computing","authors":"Saurabh Dey, S. Sampalli, Qiang Ye","doi":"10.1109/PCCC.2014.7017041","DOIUrl":"https://doi.org/10.1109/PCCC.2014.7017041","url":null,"abstract":"The security of data transmission is of paramount importance to mobile cloud computing. For security purposes, the data transmission in mobile cloud computing typically requires a mutually-authenticated environment for mobile devices and cloud servers. SSH (secure shell) could be used to satisfy the requirement. However, it makes the authentication process computationally expensive for mobile devices because it involves public key cryptosystem and mobile devices are relatively restricted in terms of computation capacity. This places the onus of establishing and maintaining secure communication sessions on the resourceful cloud servers. We propose a novel mutual authentication scheme, “Message Digest and Location based Authentication (MDLA)”, which involves symmetric key operations. In addition to computational simplicity, MDLA achieves integrity through message digest, and ensures the unpredictability of keys using location vector and timestamp.","PeriodicalId":105442,"journal":{"name":"2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)","volume":"63 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126968268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An efficient time-stamping solution for long-term digital archiving 一个有效的时间戳解决方案,用于长期数字存档
M. Vigil, Christian Weinert, Denise Demirel, J. Buchmann
{"title":"An efficient time-stamping solution for long-term digital archiving","authors":"M. Vigil, Christian Weinert, Denise Demirel, J. Buchmann","doi":"10.1109/PCCC.2014.7017099","DOIUrl":"https://doi.org/10.1109/PCCC.2014.7017099","url":null,"abstract":"Long-term archiving of digital data is necessary to meet many legal requirements. For example, hospitals in many countries must keep health records of patients for decades. Archiving usually relies on digital signatures and time-stamps to prove the security properties of archived data, such as integrity and proof of existence. Moreover, archived data often needs to be updated, e.g. a new prescription is added to a patient's record, but without compromising integrity and proof of existence. To date, a solution that guarantees integrity and proof of existence indefinitely and allows for updates on archived data is Content Integrity Service (CIS). In this paper, we introduce an improved version of CIS named Content Integrity Service with Skip Lists (CISS) that changes the time-stamping process of CIS by using two different types of time-stamps together with skip lists. We demonstrate that CISS outperforms CIS by analyzing the algorithms and running experiments in realistic scenarios.","PeriodicalId":105442,"journal":{"name":"2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130760471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secure data provenance compression using arithmetic coding in wireless sensor networks 无线传感器网络中使用算术编码的安全数据来源压缩
Syed Rafiul Hussain, Changda Wang, Salmin Sultana, E. Bertino
{"title":"Secure data provenance compression using arithmetic coding in wireless sensor networks","authors":"Syed Rafiul Hussain, Changda Wang, Salmin Sultana, E. Bertino","doi":"10.1109/PCCC.2014.7017068","DOIUrl":"https://doi.org/10.1109/PCCC.2014.7017068","url":null,"abstract":"Since data are originated and processed by multiple agents in wireless sensor networks, data provenance plays an important role for assuring data trustworthiness. However, the size of the provenance tends to increase at a higher rate as it is transmitted from the source to the base station and is processed by many intermediate nodes. Due to bandwidth and energy limitations of wireless sensor networks, such increasing of provenance size slows down the network and depletes the energy of sensor nodes. Therefore, compression of data provenance is an essential requirement. Existing lossy compression schemes based on Bloom filters or probabilistic packet marking approaches have high error rates in provenance-recovery. In this paper, we address this problem and propose a distributed and lossless arithmetic coding based compression technique which achieves a compression ratio higher than that of existing techniques and also close to Shannon's entropy bound. Unlike other provenance schemes, the most interesting characteristic of our scheme is that the provenance size is not directly proportional to the number of hops, but to the occurrence probabilities of the nodes that are on a packet's path. We also ensure the confidentiality, integrity, and freshness of provenance to prevent malicious nodes from compromising the security of data provenance. Finally, the simulation and testbed results provide a strong evidence for the claims in the paper.","PeriodicalId":105442,"journal":{"name":"2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130438376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Application-aware video-sharing services via provenance in cloud storage 应用程序感知的视频分享服务通过云存储的来源
Jinjun Liu, D. Feng, Yu Hua, Bin Peng, Pengfei Zuo
{"title":"Application-aware video-sharing services via provenance in cloud storage","authors":"Jinjun Liu, D. Feng, Yu Hua, Bin Peng, Pengfei Zuo","doi":"10.1109/PCCC.2014.7017097","DOIUrl":"https://doi.org/10.1109/PCCC.2014.7017097","url":null,"abstract":"With the wide use of video-editing software, more and more similar videos are uploaded to the video-sharing platforms in cloud storage. The large number of near-duplicate videos would not only make the users not satisfactory, but also consume more resources with service providers. Since the near-duplicate videos have redundancy at the content level, the traditional de-duplication technology is not suitable to address the redundancies. In order to decrease the redundancy, we proposed a novel high performance provenance-based video-sharing system, called Provis. Provis records the provenance of the videos and compresses the near-duplicate videos via storing their provenance which replaces storing their video files to improve the space efficiency. When users attempt to upload the edited videos, Provis can rebuild the videos in the cloud via collecting and uploading their provenance to reduce the network overhead of uploading videos. We implemented Provis and compared its performance with other existing video compression techniques. Our evaluation shows that Provis achieves significant space savings.","PeriodicalId":105442,"journal":{"name":"2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125741660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reducing (m, k)-missing rate for overloaded real-time systems 降低过载实时系统的(m, k)缺失率
Alemayehu Mengste, Linwei Niu
{"title":"Reducing (m, k)-missing rate for overloaded real-time systems","authors":"Alemayehu Mengste, Linwei Niu","doi":"10.1109/PCCC.2014.7017035","DOIUrl":"https://doi.org/10.1109/PCCC.2014.7017035","url":null,"abstract":"In this paper, we explore reducing the rate for missing the Quality of Service (QoS) constraint for overloaded real-time systems. The QoS constraint is modeled using (m, k)-constraints, which require that at least m out of any k consecutive jobs of a task meet their deadlines. We proposed a dynamic scheduling scheme to satisfy the (m, k)-constraints for real-time tasks. The simulation results demonstrate that our proposed techniques have great potential in reducing the (m, k)-missing rate for overloaded real-time systems.","PeriodicalId":105442,"journal":{"name":"2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120957035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy efficient distributed grouping and scaling for real-time data compression in sensor networks 传感器网络中实时数据压缩的高效分布式分组和缩放
Tommy Szalapski, S. Madria
{"title":"Energy efficient distributed grouping and scaling for real-time data compression in sensor networks","authors":"Tommy Szalapski, S. Madria","doi":"10.1109/PCCC.2014.7017073","DOIUrl":"https://doi.org/10.1109/PCCC.2014.7017073","url":null,"abstract":"Wireless sensor networks possess significant limitations in storage, bandwidth, and power. This has led to the development of several compression algorithms designed for sensor networks. Many of these methods exploit the correlation often present between the data on different sensors in the network. Most of these algorithms require collecting a great deal of data before compressing which introduces an increase in latency that cannot be tolerated in real-time systems. We propose a distributed method for collaborative compression of correlated sensor data. The compression can be lossless or lossy with a parameter for maximum tolerable error. Error rate can be adjusted dynamically to increase compression under heavy load. Performance evaluations show comparable compression ratios to centralized methods and a decrease in latency and network bandwidth compared to some recent approaches.","PeriodicalId":105442,"journal":{"name":"2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131191181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信