[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 72, Issue 5May 2016
Publisher:
  • Kluwer Academic Publishers
  • 101 Philip Drive Assinippi Park Norwell, MA
  • United States
ISSN:0920-8542
Reflects downloads up to 01 Jan 2025Bibliometrics
Skip Table Of Content Section
article
NTB branch predictor: dynamic branch predictor for high-performance embedded processors

Branch prediction accuracy becomes more crucial in high-performance embedded processors. The importance of branch prediction in embedded processors continues to grow in the future. Many branch predictors have been proposed to alleviate the performance ...

article
Relative weight comparison between virtual key factors of cloud computing with analytic network process

Drastical increase of a variety of information devices with networks are based on a rapid development and expansion of network infrastructures and technology. Cloud computing is a main technology which makes the information devices lighter and allows ...

article
Hybrid app security protocol for high speed mobile communication

In this paper, security vulnerabilities that can be found in hybrid apps, by which important data are downloaded from a web server, were analyzed and HIGHT algorithm based on OTP delimiter modification and bit slicing was proposed to enhance security of ...

article
RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks

The motion of address resolution protocol (ARP) is done without any problem in a general environment, but it is not considered from the security aspect; therefore, it risks being threatened by an attack from the network called ARP spoofing or ARP ...

article
Speaker diarization method of telemarketer and client for improving speech dictation performance

Financial institutions employ speech dictation systems that convert the conversation recordings between telemarketer and client into the texts. The dictation system is necessary for checking incomplete sales, in which a telemarketer fails to provide ...

article
Design of a high-efficient MSD adder

Carry propagation delay is a big obstacle to improve the addition efficiency in computer system. And the more data bits the operands have, the delay is more serious. As data bits of operand in optical computer can be huge this makes carry delay be very ...

article
Implications of shallower memory controller transaction queues in scalable memory systems

Scalable memory systems provide scalable bandwidth to the core growth demands in multicores and embedded systems processors. In these systems, as memory controllers (MCs) are scaled, memory traffic per MC is reduced, so transaction queues become ...

article
Simulated smart phone recordings for audio identification

This paper studies the use of simulated recordings to perform audio identification experiments. In contrast to use actual recordings in the experiments, we use the measured room impulse response to generate simulated recordings. Doing so greatly reduces ...

article
Anonymous paperless secure payment system using clouds

The growth of wireless networks and the increasing popularity of mobile devices present a significant opportunity to empower them as payment devices. Unfortunately, several problems hinder the widespread acceptance of mobile payments, for example, ...

article
Distributed RDF store for efficient searching billions of triples based on Hadoop

As the development of IT and scientific technology, very large amounts of knowledge data are continuously being created and the big data era can be said to have arrived. Therefore, RDF store inserting and inquiring into knowledge bases has to be scaled ...

article
Evaluation and design of function for tracing diffusion of classified information for file operations with KVM

Cases of classified information leakage have become increasingly common. To address this problem, we have proposed a function for tracing the diffusion of classified information within an operating system. However, this function suffers from the ...

article
Advanced metering infrastructure design and test bed experiment using intelligent agents: focusing on the PLC network base technology for Smart Grid system

Today, the power line communication (PLC) is being used for the configuration of Home-Network or factory automation. Due to the improvements in both the stability and the transmission speed resulting from recent digital PLC method, its field of ...

article
High performance clustering algorithm for analysis of protein family clusters

Techniques for analyzing genome sequences in high performance environments to predict the function and structure of a protein have been developing. The function of a protein is determined by its characteristics and the sequence pattern, and a protein is ...

article
Cloud service ranking as a multi objective optimization problem

Cloud computing is a kind of computing model on subscription basis. In cloud computing environment, there are a lot of cloud providers that present variety kind of services with different quality of services. Users have various kinds of applications ...

article
J2M: a Java to MapReduce translator for cloud computing

Cloud computing has gradually evolved into an infrastructural tool for a variety of scientific research and computing. It has become a trend that lots of products have been migrated from local servers to cloud by many institutions and organizations. One ...

article
Experimental analysis of operating system jitter caused by page reclaim

Operating system jitter is one of the causes of runtime overhead in high-performance computing applications. Many high-performance computing applications perform burst accesses to I/O, and such accesses consume a large amount of memory. When the Linux ...

article
A novel MPI reduction algorithm resilient to imbalances in process arrival times

Reduction algorithms are optimized only under the assumption that all processes commence the reduction simultaneously. Research on process arrival times has shown that this is rarely the case. Thus, all benchmarking methodologies that take into account ...

article
Combining association rule mining and network analysis for pharmacosurveillance

Retailers routinely use association mining to investigate trends in the use of their products. In the medical world, association mining is mostly used to identify associations between symptoms and diseases, or between drugs and adverse events. In ...

article
A novel heuristic algorithm for IP block mapping onto mesh-based networks-on-chip

With advancement in the nanometer era, more and more intellectual property (IP) blocks can be integrated on a single die. Network-on-chip (NoC) has emerged as a viable alternative to unplug the communication bottleneck in system-on-chip. In the NoC ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.