[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 74, Issue 1January 2018
Publisher:
  • Kluwer Academic Publishers
  • 101 Philip Drive Assinippi Park Norwell, MA
  • United States
ISSN:0920-8542
Reflects downloads up to 12 Feb 2025Bibliometrics
Skip Table Of Content Section
article
Solving traveling salesman problem using parallel repetitive nearest neighbor algorithm on OTIS-Hypercube and OTIS-Mesh optoelectronic architectures

Over the past years, researchers drew their attention to propose optoelectronic architectures, including optical transpose interconnection system (OTIS) networks. On the other hand, there are limited attempts devoted to design parallel algorithms for ...

article
Interactive 3D simulation for fluid---structure interactions using dual coupled GPUs

The scope of this work involves the integration of high-speed parallel computation with interactive, 3D visualization of the lattice-Boltzmann-based immersed boundary method for fluid---structure interaction. An NVIDIA Tesla K40c is used for the ...

article
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags

Recently, Tewari and Gupta proposed a ultra-lightweight mutual authentication protocol in IoT environments for RFID tags. Their protocol aims to provide secure communication with least cost in both storage and computation. Unfortunately, in this paper, ...

article
A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications

The Internet of Things (IoT) is a new technology, which enables objects to exchange data via the internet network. One part of the infrastructure of IoT is Radio Frequency Identification (RFID). One way to fortify the system and prevent it against an ...

article
General queuing model for optimal seamless delivery of payload processing in multi-core processors

Recent developments in unmanned aerial systems (UAS) provide new opportunities in remote sensing application. In contrast to satellite and conventional (manned) aerial tasks, UAS flights can be operated in a very short period of time. UAS can also be ...

article
Recommender system architecture based on Mahout and a main memory database

In this study, we propose a news recommendation system architecture using a main memory database (DB) and Mahout. The user's news preference rate is calculated automatically based on the time the user spends reading news items and their length. While ...

article
Resource-aware virtual machine placement algorithm for IaaS cloud

Cloud computing is an on-demand Internet-based computing service, where computing resources are shared among the users via the Internet and its usage based on the pay-for-use model. Virtualization of computing resources allows the system to use the ...

article
A novel buffer management scheme based on particle swarm optimization for SSD

As flash memory becomes popular, flash memory-based solid-state drive (SSD) has been the major storage device. SSD has numerous merits such as high I/O speed, low energy consumption, strong shock resistance and small form factor. Meanwhile, some ...

article
A high-performance and energy-efficient exhaustive key search approach via GPU on DES-like cryptosystems

Recently, graphical processing units (GPUs) have found a prominent role in general-purpose applications. Specifically, in parallel processing applications where a considerable number of tasks should be processed while meeting specific design ...

article
A churn-aware durable data storage scheme in hybrid P2P networks

Durable P2P data storage is a research focus in recent years. It aims at providing data for requesters anytime and anywhere. Considering the fact that any peer could join and leave P2P network freely and randomly, how to improve the data availability is ...

article
ECCN: an extended CCN architecture to improve data access in vehicular content-centric network

Content-centric network (CCN) has been considered for VANETs, due to its scalability, flexibility and security. In this paper, an extended CCN architecture is proposed to reduce critical data access time in vehicular content centric networks by storing ...

article
A comprehensive evaluation of availability and operational cost for a virtualized server system using stochastic reward nets

Virtualized server systems, as a major underlying element in high-performance computing systems, require further studies on many aspects of dependability. Among the significant factors, the availability measures are crucial to deliver high-quality ...

article
Survey on clustering in heterogeneous and homogeneous wireless sensor networks

In wireless sensor networks (WSNs), nodes have limited energy and cannot be recharged. In order to tackle this problem, clustering methods are employed to optimize energy consumption, gather data and also enhance the effective lifetime of the network. ...

article
A fast optimal parallel algorithm for a short addition chain

Given a natural number e, an addition chain for e is a finite sequence of numbers having the following properties: (1) the first number is one, (2) every element is the sum of two earlier elements, and (3) the given number occurs at the end of the ...

article
On energy consumption of switch-centric data center networks

Data center network (DCN) is the core of cloud computing and accounts for 40% energy spend when compared to cooling system, power distribution and conversion of the whole data center (DC) facility. It is essential to reduce the energy consumption of DCN ...

article
An adaptive task allocation technique for green cloud computing

The rapid growth of todays IT demands reflects the increased use of cloud data centers. Reducing computational power consumption in cloud data center is one of the challenging research issues in the current era. Power consumption is directly ...

article
Energy-efficient load balancing scheme for two-tier communication in wireless sensor networks

Wireless sensor network (WSN) has gained an enormous attention of researchers with its dynamic applications. Energy is considered as a scarce and the most vital resource in WSNs. In clustering-based approach, there is huge energy consumption while ...

article
Dynamic performance isolation management for cloud computing services

Unmanaged resource contention in cloud computing environments can cause problems such as performance interference, service quality degradation, and consequently service agreements violation. Performance isolation is an indispensable remedy solution for ...

article
GPU-based real-time super-resolution system for high-quality UHD video up-conversion

Super-resolution (SR) is a technique that reconstructs high-resolution images using the information present in low-resolution images. Due to their potentials of being used in wide range of image and video applications, various SR algorithms have been ...

article
Energy constrained scheduling of stochastic tasks

Energy-efficient scheduling of stochastic tasks is considered in this paper. The main characteristic of a stochastic task is that its execution time is a random variable whose actual value is not known in advance, but only its probability distribution. ...

article
DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT

In recent years, RFID (radio-frequency identification) systems are widely used in many applications. One of the most important applications for this technology is the Internet of things (IoT). Therefore, researchers have proposed several authentication ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.