Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2023
A parallel image encryption algorithm using intra bitplane scrambling
Mathematics and Computers in Simulation (MCSC), Volume 204, Issue CPages 71–88https://doi.org/10.1016/j.matcom.2022.07.029AbstractMore and more privacy-sensitive images have been produced daily. Chaotic encryption guarantees that only the targeted receiver can obtain the raw image. Many works perform encryption on bit-level for better permutation but incur an unbearable ...
Highlights- The proposed parallel bit-level permutation algorithm offers a good trade-off between efficiency and effect.
- To accelerate the keystreams generation in diffusion stage, multi-threading technology is used to generate them in parallel.
- research-articleJune 2020
HydraFS: an efficient NUMA-aware in-memory file system
Cluster Computing (KLU-CLUS), Volume 23, Issue 2Pages 705–724https://doi.org/10.1007/s10586-019-02952-yAbstractEmerging persistent file systems are designed to achieve high-performance data processing by effectively exploiting the advanced features of Non-volatile Memory (NVM). Non-uniform memory access (NUMA) architectures are universally used in high-...
- research-articleMay 2020
A novel batch image encryption algorithm using parallel computing
Information Sciences: an International Journal (ISCI), Volume 518, Issue CPages 211–224https://doi.org/10.1016/j.ins.2020.01.009AbstractChaos-based encryption provides a practical way to protect the confidentiality of digital images nowadays. The increasing convenience (e.g., larger bandwidth) of data sharing stimulates the need for encrypting amounts of images in a ...
- articleDecember 2018
GPS$$+$$+: Reasoning About Fences and Relaxed Atomics
International Journal of Parallel Programming (IJPP), Volume 46, Issue 6Pages 1157–1183https://doi.org/10.1007/s10766-017-0518-xIn order to support efficient compilation to modern architectures, mainstream programming languages, such as C/C$$++$$++ and Java, have adopted weak (or relaxed) memory models. According to these weak memory models, multithreaded programs are allowed to ...
- ArticleNovember 2010
Design and Implementation of the Remote Monitor Server Based on Video Image
ICINIS '10: Proceedings of the 2010 Third International Conference on Intelligent Networks and Intelligent SystemsPages 32–35https://doi.org/10.1109/ICINIS.2010.54The problems of large numbers of image data and concurrent client connection requests to the remote video server in C / S mode was resolved by using IOCP (I/O Completion Port) mechanism in image characteristic transmission. The multiple concurrent ...
- ArticleApril 2005
A Novel Approach to Real-Time RTI Based Distributed Simulation System
ANSS '05: Proceedings of the 38th annual Symposium on SimulationPages 267–274https://doi.org/10.1109/ANSS.2005.9HLA, a DoD high level architecture, is emerging as a standard platform for large-scale distributed interactive simulation systems. It mainly emphasizes on the reusability and interoperability of different simulation components. HLA was well designed and ...