No abstract available.
Keynotes
Efficient Heuristic for Placing Monitors on Flow Networks
Network flow monitoring is a crucial procedure for optimizing the network infrastructure for better application performance or security issue. In this paper, we address the problem of Flow Edge-Monitoring (denoted as FEM), for which we need to find k (k ...
Efficient Implementation of Genetic Algorithms on GP-GPU with Scheduled Persistent CUDA Threads
In this paper we present a heavily exploration oriented implementation of genetic algorithms to be executed on graphic processor units (GPUs) that is optimized with our novel mechanism for scheduling GPU-side synchronized jobs that takes inspiration ...
Exploiting Pure Superword Level Parallelism for Array Indirections
SIMD (Single Instruction Multiple Data) extension units are ubiquitous in modern processors. Array indirections raise several challenges for SIMD vectorization including disjoint memory access, unknown alignment and dependence cycle. Existing SIMD ...
Modelling Binary Oriented Software Buffer-Overflow Vulnerability in Process Algebra
Software is ubiquitous in numerous industries, such as financial and commercial industries and military industries, playing the manager role to manipulate the data and equipment. Consequently, its vulnerabilities become great insecurity factors. To ...
OpenISMA: An Approach of Achieving a Scalable OpenFlow Network by Identifiers Separating and Mapping
Scalability is always a serious issue influencing the development of Software-Defined Network (SDN). Identifiers Separating and Mapping Architecture (ISMA) is a promising solution to the current Internet scaling problems by dividing the network into ...
PDNI: A Distributed Framework for NFV Infrastructure
Network Function Virtualization (NFV) is an attempt to help operators more effectively manage their networks by implementing traditional network functions embedded in specialized hardware platforms in term of virtualized software instances. And, ...
An Efficient Tolerant-Anisotropic Localization for Large-Scale Wireless Sensor Network
Multi-hop localization is a common method which is suitable for large-scale application. However, it is usually influenced by the network anisotropy, leading to the instability of the localization performance. In order to reduce the influence of the ...
Distributed Processing of Approximate Range Queries in Wireless Sensor Networks
In Wireless Sensor Networks (WSNs), the large amount of high-dimensional sensed data play a key role in many emerging WSN applications. Existing approaches to similarity search rely on the assumption that sensed data are centralized to deal with, or ...
Vector Localization Algorithm Based on Signal Strength in Wireless Sensor Network
To deal with the inaccuracy and the uniform distribution of the DV-Hop algorithm, it is necessary to put forward a new optimization algorithm based on DV-Hop and RSSI for the two-dimensional planar node location called RSDV-Hop. The algorithm is based ...
Parallel and Improvement of Pre-computation Technique for Approximation Shortest Distance Query
With the development of mobile Internet, more and more applications are associated with location. There are many applications just care about shortest distance of two points and do not care about the paths, such as take-away applications. The problem of ...
Adaptive Generalized Function Projective Lag Synchronization and Parameter Identification of Hyperchaotic Systems
Generalized function projective lag synchronization (GFPLS) is characterized by the output of the drive system proportionally lagging behind the output of the response system and ratio of the two systems is desired function scaling matrix. In this paper,...
Adaptive Generalized Function Projective Lag Synchronization of Time-Delay Systems with Uncertain Parameters
In this paper, we consider generalized function projective lag synchronization of time-delay systems using adaptive control methods, and system parameters are uncertain. By means of the Lyapunov stability theory, an adaptive controller and parameter ...
The Minimal Exposure Path in Mobile Wireless Sensor Network
Target traversing is an important research topic in wireless sensor networks. Most works in this area consider the coverage issues of the target's moving paths. The minimal exposure path problem is to find a path among sensors so that the target's total ...
Improvement of Workload Balancing Using Parallel Loop Self-Scheduling on Xeon Phi
In this paper, we will examine how to improve workload balancing on a computing cluster by a parallel loop self-scheduling scheme. We use hybrid MPI and OpenMP parallel programming in C language. The block partition loop is according to the performance ...
Automated Classification of Brain MR Images by Wavelet-Energy and k-Nearest Neighbors Algorithm
(Aim) It is of great importance to find abnormal or pathological brains in the early stage, to save hospital and social resources. However, potential of wavelet-energy is not widely used in this field. (Method) The popular "wavelet-energy" is regarded ...
Research on Test Paper Auto-generating Based on Improved Particle Swarm Optimization
The existing algorithm of generating test paper has the problem of low efficiency and slow convergence rate, etc. Improved particle swarm algorithm for test paper auto-generating is proposed on the basic of the particle swarm optimization algorithm and ...
Support-Based Prefetching Technique for Hierarchical Collaborative Caching Algorithm to Improve the Performance of a Distributed File System
Prefetching and client side caching are the two important techniques used in distributed file systems (DFSs) for improving performance. Collaborative client side caching techniques are discussed in the literature for reducing the read access time in the ...
The Implementation of Virtualization in Data Plane of For CES
The emergence of network virtualization solves the problem of ossification. At the same time, it provides endless possibilities for the innovations of the network architecture. As a result, it has attracted the attention of the next generation Internet ...
A Secure Routing Mechanism against Wormhole Attack in IPv6-Based Wireless Sensor Networks
The increasing popularity of wireless sensor networks and IPv6 technology is creating varieties of applications for wireless sensor networks based on IPv6. However, IPv6-based Wireless sensor networks are vulnerable to a harmful attack known as the ...
Minimizing the Maximum Sensor Movement towards Grid Points for Barrier Coverage
Barrier coverage has important applications in military and homeland security. Given a set of mobile sensors and their initial positions, how to move these sensors to achieve the required barrier coverage while maintaining balanced battery consumption ...
Two Modified Multicast Algorithms for Two Dimensional Mesh and Torus Networks
Multicast is message propagation from a source node to a number of destination nodes. Multicast could become the bottleneck for the performance of processes and systems. The main parameters for evaluating a multicast are time and traffic. Optimizing ...