[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/2923302guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
PAAP '15: Proceedings of the 2015 Seventh International Symposium on Parallel Architectures, Algorithms and Programming (PAAP)
2015 Proceeding
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
Conference:
December 12 - 14, 2015
ISBN:
978-1-4673-9117-7
Published:
12 December 2015

Reflects downloads up to 21 Jan 2025Bibliometrics
Abstract

No abstract available.

Article
Cover Art
Article
Article
Article
Article
Article
Keynotes
Article
Sponsorships
Article
Efficient Heuristic for Placing Monitors on Flow Networks

Network flow monitoring is a crucial procedure for optimizing the network infrastructure for better application performance or security issue. In this paper, we address the problem of Flow Edge-Monitoring (denoted as FEM), for which we need to find k (k ...

Article
Efficient Implementation of Genetic Algorithms on GP-GPU with Scheduled Persistent CUDA Threads

In this paper we present a heavily exploration oriented implementation of genetic algorithms to be executed on graphic processor units (GPUs) that is optimized with our novel mechanism for scheduling GPU-side synchronized jobs that takes inspiration ...

Article
Exploiting Pure Superword Level Parallelism for Array Indirections

SIMD (Single Instruction Multiple Data) extension units are ubiquitous in modern processors. Array indirections raise several challenges for SIMD vectorization including disjoint memory access, unknown alignment and dependence cycle. Existing SIMD ...

Article
Modelling Binary Oriented Software Buffer-Overflow Vulnerability in Process Algebra

Software is ubiquitous in numerous industries, such as financial and commercial industries and military industries, playing the manager role to manipulate the data and equipment. Consequently, its vulnerabilities become great insecurity factors. To ...

Article
OpenISMA: An Approach of Achieving a Scalable OpenFlow Network by Identifiers Separating and Mapping

Scalability is always a serious issue influencing the development of Software-Defined Network (SDN). Identifiers Separating and Mapping Architecture (ISMA) is a promising solution to the current Internet scaling problems by dividing the network into ...

Article
PDNI: A Distributed Framework for NFV Infrastructure

Network Function Virtualization (NFV) is an attempt to help operators more effectively manage their networks by implementing traditional network functions embedded in specialized hardware platforms in term of virtualized software instances. And, ...

Article
An Efficient Tolerant-Anisotropic Localization for Large-Scale Wireless Sensor Network

Multi-hop localization is a common method which is suitable for large-scale application. However, it is usually influenced by the network anisotropy, leading to the instability of the localization performance. In order to reduce the influence of the ...

Article
Distributed Processing of Approximate Range Queries in Wireless Sensor Networks

In Wireless Sensor Networks (WSNs), the large amount of high-dimensional sensed data play a key role in many emerging WSN applications. Existing approaches to similarity search rely on the assumption that sensed data are centralized to deal with, or ...

Article
Vector Localization Algorithm Based on Signal Strength in Wireless Sensor Network

To deal with the inaccuracy and the uniform distribution of the DV-Hop algorithm, it is necessary to put forward a new optimization algorithm based on DV-Hop and RSSI for the two-dimensional planar node location called RSDV-Hop. The algorithm is based ...

Article
Parallel and Improvement of Pre-computation Technique for Approximation Shortest Distance Query

With the development of mobile Internet, more and more applications are associated with location. There are many applications just care about shortest distance of two points and do not care about the paths, such as take-away applications. The problem of ...

Article
Adaptive Generalized Function Projective Lag Synchronization and Parameter Identification of Hyperchaotic Systems

Generalized function projective lag synchronization (GFPLS) is characterized by the output of the drive system proportionally lagging behind the output of the response system and ratio of the two systems is desired function scaling matrix. In this paper,...

Article
Adaptive Generalized Function Projective Lag Synchronization of Time-Delay Systems with Uncertain Parameters

In this paper, we consider generalized function projective lag synchronization of time-delay systems using adaptive control methods, and system parameters are uncertain. By means of the Lyapunov stability theory, an adaptive controller and parameter ...

Article
The Minimal Exposure Path in Mobile Wireless Sensor Network

Target traversing is an important research topic in wireless sensor networks. Most works in this area consider the coverage issues of the target's moving paths. The minimal exposure path problem is to find a path among sensors so that the target's total ...

Article
Improvement of Workload Balancing Using Parallel Loop Self-Scheduling on Xeon Phi

In this paper, we will examine how to improve workload balancing on a computing cluster by a parallel loop self-scheduling scheme. We use hybrid MPI and OpenMP parallel programming in C language. The block partition loop is according to the performance ...

Article
Automated Classification of Brain MR Images by Wavelet-Energy and k-Nearest Neighbors Algorithm

(Aim) It is of great importance to find abnormal or pathological brains in the early stage, to save hospital and social resources. However, potential of wavelet-energy is not widely used in this field. (Method) The popular "wavelet-energy" is regarded ...

Article
Research on Test Paper Auto-generating Based on Improved Particle Swarm Optimization

The existing algorithm of generating test paper has the problem of low efficiency and slow convergence rate, etc. Improved particle swarm algorithm for test paper auto-generating is proposed on the basic of the particle swarm optimization algorithm and ...

Article
Support-Based Prefetching Technique for Hierarchical Collaborative Caching Algorithm to Improve the Performance of a Distributed File System

Prefetching and client side caching are the two important techniques used in distributed file systems (DFSs) for improving performance. Collaborative client side caching techniques are discussed in the literature for reducing the read access time in the ...

Article
The Implementation of Virtualization in Data Plane of For CES

The emergence of network virtualization solves the problem of ossification. At the same time, it provides endless possibilities for the innovations of the network architecture. As a result, it has attracted the attention of the next generation Internet ...

Article
A Secure Routing Mechanism against Wormhole Attack in IPv6-Based Wireless Sensor Networks

The increasing popularity of wireless sensor networks and IPv6 technology is creating varieties of applications for wireless sensor networks based on IPv6. However, IPv6-based Wireless sensor networks are vulnerable to a harmful attack known as the ...

Article
Minimizing the Maximum Sensor Movement towards Grid Points for Barrier Coverage

Barrier coverage has important applications in military and homeland security. Given a set of mobile sensors and their initial positions, how to move these sensors to achieve the required barrier coverage while maintaining balanced battery consumption ...

Article
Two Modified Multicast Algorithms for Two Dimensional Mesh and Torus Networks

Multicast is message propagation from a source node to a number of destination nodes. Multicast could become the bottleneck for the performance of processes and systems. The main parameters for evaluating a multicast are time and traffic. Optimizing ...

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations