The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We first introduced the multicore specific optimization modules of two common MPI implementations â" MPICH2 and Open MPI, and then tested their performance on one multicore computer. By enabling and disabling these modules, we provided their performance, including bandwidth and latency, under different circumstances. Finally, we analyzed the two MPI implementations and discussed the...
In this paper we present a fast unsupervised spoken term detection system based on lower-bound Dynamic Time Warping (DTW) search on Graphical Processing Units (GPUs). The lower-bound estimate and the K nearest neighbor DTW search are carefully designed to fit the GPU parallel computing architecture. In a spoken term detection task on the TIMIT corpus, a 55x speed-up is achieved compared to our previous...
TCP/UDP/IP and Ethernet have become undisputed leaders of network communication since last decade. TCP/IP stacks are usually implemented in operating system software and packets are handled by the main (host) processor due to which protocol processing of incoming and outgoing network traffic consumes processor cycle. Usually in the application of data transfer, there are several copies of data from...
Many security models and systems are built upon the assumption that super users are trustworthy. However, it becomes challenging to hold super users accountable since they can erase any trace of their activities. This paper proposes an accountable administration model for operating systems where all system administrators can be accounted for even if they are untrustworthy. The model is implemented...
With the development of computer science, desktop virtualization technology is more and more popular. In virtualized desktop, it is a very significant research to share periphery devices in the client-end computer seamlessly. We implement a device sharing mechanism to extend the universal serial bus in client-end host to the network for server-end host using transparently. This virtual device bus...
According to the problem that the ECC cannot correct the multibit error in ECC memory, this paper proposes a memory error processing method on software level. On the foundation of revising the Linux kernel code, the method can discover this area of influence area of memory error according to seek the process information mapping to the mistaken address. This way can avoid wastage to the user due to...
This paper proposes a novel approach and system for functional verification of the Set-Top Boxes (STB) related to Conditional Access Kernel (CAK) functionality. The proposed solution is built on already existing BBT testing system with supporting audio-video capturing device, in the form of two newly developed functional device drivers. Since the CAK functionality, within the STB with a smart card,...
In this paper, we propose a novel expansion terms selection model, in which similarity kernel function is used to estimate the relevance between query and candidate expansion terms. In previous method, expansion terms are usually selected by counting term co-occurrences in the documents. However, term co-occurrences are not always a good indicator for relevance, whereas some are background terms of...
The paper presents a question-answer approach to programming of precedents during a collaborative designing of automated systems. Efficiency of the general work can be essentially increased if the human part of the work will be fulfilled as an execution of a special kind of programs by “human processors” which use models of question-answer reasoning. Such approach was investigated and evolved till...
Internet of Things (IoT) built on the existing (mobile) Internet has emerged as a solution to effectively interact with things around us. In order to meet the actual needs of monitoring laboratory equipments in college/university, we design and implement a smart equipment monitoring system to monitor the location information of the equipments based on ARM and RFID technology in this paper. Meanwhile...
Translation Look aside Buffers (TLBs) have a significant impact on system performance. Numerous prior studies focus on TLBs design for uniprocessors. As the advent of chip multiprocessors (CMPs), we need shift to TLBs for chip multiprocessors. This paper presents a software-implemented level-two TLB -- SL2-TLB which is a shared level-two TLB for multiprocessors. It not only reduces the cost of TLB...
A new Gaussian kernel function which called “Accumulating Gaussian kernel” was presented in this paper. The diagnostic x-ray coherent scatter images are a set of patterns of spatial distribution of photon energy, the signal from a coarser scale have to keep the total energy from finer scale. The accumulating Gaussian kernel can decompose the image same as the general Gaussian kernel and transfer the...
Due to increase computer hardware technologies, software developers are more focusing on to developing embedded operating system. GNU/Linux becomes a common operating system widely use in embedded technologies. In this paper, we report performance results on a TS-7800 Single Board Computer with different version of kernel that has been released by hardware provider. We compare the performance between...
One-class SVM, which is a good machine learning method, has recently attracted wide interest. In this paper, we focus on the properties of the optimal solution to its primal optimization problem. We first prove that the optimal solution with respect to the normal vector of the hyperplane is unique, and then present and prove the necessary and sufficient conditions for the case where the optimal solution...
Trojan technology not only the most common and the most effective attack mean in network, but also an important approach in intercepted network information. The effective hidden which directly determine the survival of Trojans is the key for success implant Trojan. This paper first analysis the principle of Rootkit, researching the Windows kernel-level Trojan's hidden technologies further, and to...
The flaws of ARP protocol, the kinds of ARP attack and the major existing defensive technologies are analyzed in details. Due to the cost of existing defensive technologies is too high; therefore, we design and develop a light-weight tool based on Linux platform. It is suitable for most users because it can detect and defend the ARP attacks accompany with very small extra overhead. Moreover, it is...
A multi-agent based Web mining model is designed for the improvement of the efficiency of keywords based search engine. The model divides mining task into several parallel agents which coordinately work together, and the mining efficiency is improved greatly. Evolving from HITS, algorithm named Grabber in the model removes Link Farm pages in the expansion of root set, makes anchor text similarity...
Large stadium is designed and constructed to address the short and huge numbers of people, logistics, and information flow which brought by large-scale sports events; therefore, the post-match benefit of stadium is the difficult problem which troubles sports management departments and operation organizations of various countries. Virtual operation mode can take full advantages of modern computer and...
SIFT-NMI algorithm is proposed for image matching based on SIFT (Scale-invariant feature transform) and NMI (Normalized Moment of Intertia) algorithm in this paper. Firstly, the SIFT algorithm is used to obtain the coordinates and vector matrix of the image's feature points. Then, the moment of intertia of the vector is obtained based on NMI algorithm and the pairs of matching features points are...
We describe computational experiments exploring the performance improvements from overlapping computation and communication on hybrid parallel computers. Our test case is explicit time integration of linear advection with constant uniform velocity in a three-dimensional periodic domain. The test systems include a Cray XT5, a Cray XE6, and two multicore Infiniband clusters with different generations...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.