[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 63, Issue 4April 2014
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
ISSN:0018-9340
Reflects downloads up to 31 Dec 2024Bibliometrics
Skip Table Of Content Section
research-article
A Scalable Destination-Oriented MulticastProtocol with Incremental Deployability

In this paper, we develop a scalable destination-oriented multicast (DOM) protocol for computer networks where the routers have enhanced intelligence to process packets. The basic idea of DOM is that each multicast data packet carries explicit ...

research-article
A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns

Host-based anomaly intrusion detection system design is very challenging due to the notoriously high false alarm rate. This paper introduces a new host-based anomaly intrusion detection methodology using discontiguous system call patterns, in an attempt ...

research-article
An Efficient Non-Linear Cost Compression Algorithm for Multi Level Cell Memory

This paper defines a non-linear cost compression problem, proposes an efficient algorithm, and applies it to a real application of multi level cell memory to minimize energy consumption and latency. The non-linear cost compression problem extends the ...

research-article
Automatic Generation of Miniaturized Synthetic Proxies for Target Applications to Efficiently Design Multicore Processors

Prohibitive simulation time with pre-silicon design models and unavailability of proprietary target applications make microprocessor design very tedious. The framework proposed in this paper is the first attempt to automatically generate synthetic ...

research-article
Booting Time Minimization for Real-Time Embedded Systems with Non-Volatile Memory

Minimizing the booting time of an embedded system has become a major technical issue for the success of many consumer electronics. In this paper, the booting time minimization problem for real-time embedded systems with the joint consideration of DRAM ...

research-article
CACC: A Cooperative Approachto Cache Consistency in WMNs

Cooperative caching is a desirable approach to achieve efficient data access in multi-hop wireless networks. Existing cooperative caching algorithms mostly focus on cache placement. Another key issue, cache consistency, has not been adequately ...

research-article
Cache Friendliness-Aware Managementof Shared Last-Level Caches for HighPerformance Multi-Core Systems

To achieve high efficiency and prevent destructive interference among multiple divergent workloads, the last-level cache of Chip Multiprocessors has to be carefully managed. Previously proposed cache management schemes suffer from inefficient cache ...

research-article
Coordinating Garbage Collectionfor Arrays of Solid-State Drives

Although solid-state drives (SSDs) offer significant performance improvements over hard disk drives (HDDs) for a number of workloads, they can exhibit substantial variance in request latency and throughput as a result of garbage collection (GC). When GC ...

research-article
Design and Analysis of a Highly User-Friendly, Secure, Privacy-Preserving, and Revocable Authentication Method

A large portion of system breaches are caused by authentication failure, either during the login process or in the post-authentication session; these failures are themselves related to the limitations associated with existing authentication methods. ...

research-article
FLOTT—A Fast, Low Memory T-TransformAlgorithm for Measuring String Complexity

This paper presents flott, a fast, low memory T-transform algorithm which can be used to compute the string complexity measure T-complexity. The algorithm uses approximately one third of the memory of its predecessor while reducing the running time by ...

research-article
HRT-PLRU: A New Paging Schemefor Executing Hard Real-Time Programson NAND Flash Memory

For advanced features of next generation vehicles, the real-time programs in automotive embedded systems are dramatically increasing. For such large volume program codes, this paper proposes a novel framework to use high-density and low-cost nonvolatile ...

research-article
Identity-Based Secure DistributedData Storage Schemes

Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver without the necessity of knowing the ...

research-article
Improving MapReduce Performance Using Smart Speculative Execution Strategy

MapReduce is a widely used parallel computing framework for large scale data processing. The two major performance metrics in MapReduce are job execution time and cluster throughput. They can be seriously impacted by straggler machines—machines on which ...

research-article
MuSA: Multivariate Sampling Algorithmfor Wireless Sensor Networks

A wireless sensor network can be used to collect and process environmental data, which is often of multivariate nature. This work proposes a multivariate sampling algorithm based on component analysis techniques in wireless sensor networks. To improve ...

research-article
Schedulability Analysis of DeferrableScheduling Algorithms for MaintainingReal-Time Data Freshness

Although the deferrable scheduling algorithm for fixed priority transactions ( DS-FP) has been shown to provide a better performance compared with the More-Less (ML) method, there is still a lack of any comprehensive studies on the necessary and ...

research-article
Single Disk Failure Recovery for X-Code-Based Parallel Storage Systems

In modern parallel storage systems (e.g., cloud storage and data centers), it is important to provide data availability guarantees against disk (or storage node) failures via redundancy coding schemes. One coding scheme is X-code, which is double-fault ...

research-article
Using Branch Predictors and Variable Encoding for On-the-Fly Program Tracing

Unobtrusive capturing of program execution traces in real-time is crucial for debugging many embedded systems. However, tracing even limited program segments is often cost-prohibitive, requiring wide trace ports and large on-chip trace buffers. This ...

research-article
Where the Sidewalk Ends: Extending theInternet AS Graph Using Traceroutesfrom P2P Users

An accurate Internet topology graph is important in many areas of networking, from understanding ISP business relationships to diagnosing network anomalies. Most Internet mapping efforts have derived the network structure, at the level of interconnected ...

research-article
A Note on EDF Schedulingfor Real-Time Energy Harvesting Systems

Energy harvesting is the capture of ambient energy, its conversion into a usable form, and its storage for immediate or future use. Interest in energy harvesting has increased over the last decade because of its environmental friendliness and its ...

research-article
Fast Inversion in ${\schmi{GF(2^m)}}$ with Normal Basis Using Hybrid-Double Multipliers

Fast inversion in finite fields is crucial for high-performance cryptography and codes. We present techniques to exploit the recently proposed hybrid-double multipliers for fast inversions in binary fields $GF(2^m)$ with normal bases. A hybrid-double ...

research-article
Sharing Logic for Built-In Generationof Functional Broadside Tests

When built-in test generation is used for a design that can be partitioned into logic blocks, it is advantageous to identify groups of blocks whose tests have similar characteristics, and use the same built-in test generation logic for the blocks in ...

research-article
Comments on “Algorithmic Aspectsof Hardware/Software Partitioning: 1D Search Algorithms”

In this paper, the work in is analyzed. An error in its theoretical description part is pointed out and illustrated by a simple example. A modification suggestion is proposed to make the theoretical description of the work more deliberate and thus being ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.