The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Hardware accelerators have become a de-facto standard to achieve high performance on current supercomputers and there are indications that this trend will increase in the future. Modern accelerators feature high-bandwidth memory next to the computing cores. For example, the Intel Knights Landing (KNL) processor is equipped with 16 GB of high-bandwidth memory (HBM) that works together with conventional...
Next-generation supercomputers will feature more hierarchical and heterogeneous memory systems with different memory technologies working side-by-side. A critical question is whether at large scale existing HPC applications and emerging data-analytics workloads will have performance improvement or degradation on these systems. We propose a systematic and fair methodology to identify the trend of application...
The arising opportunity exposed in this paper is leveraging the capabilities of network virtualization to provide a whole IP Network as a Service (NaaS). Users are offered the capability to customize the policies, the configuration and the management on their allocated virtual network to meet their own requirements. Following the NaaS paradigm, the European Community funded project Mantychore is developing...
A novel modular exponent randomizing method is proposed to resist side-channel attack in RSA cryptosystem. The limitation of this method is given and the way of using random values also brings the security benefits. Experimental results show that though the randomized exponentiation sequence can be analyzed, the real private key is still covered. At last, the attack cost for this randomized sequence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.