The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
High Performance Computing systems expect applications to leverage the most of their processing power. This need is even more present for applications such as Monte Carlo simulations that require noteworthy CPU time and memory footprint. Optimizing applications is one approach to reduce the consumption of these resources. Before optimizing, it is mandatory to profile the application in order to pinpoint...
In the paper we present evaluation of the PCJ (Parallel Computations in Java) library for graph problems, namely for the first kernel in Graph500 benchmark. PCJ is a library for parallel computations in Java based on PGAS (Partitioned Global Address Space) paradigm. PCJ hides communication details such as threads or network programming, which allows to develop distributed applications easily. In the...
Hybrid nodes containing GPUs are rapidly becoming the norm in parallel machines. We have conducted some experiments regarding how to plug GPU-enabled computational kernels into PSBLAS, a MPI-based library specifically geared towards sparse matrix computations. In this paper, we present our findings on which strategies are more promising in the quest for the optimal compromise among raw performance,...
Vast amounts of valuable historical documents exist in libraries and in various National Archives that have not been exploited electronically. The analysis of historical documents presents specific difficulties with respect to other types of handwritten documents. Because of the low quality and the complexity of these documents, the document analysis remains an open research field. One of the major...
In Model Predictive Control (MPC), an optimization problem needs to be solved at each sampling time, and this has traditionally limited use of MPC to systems with slow dynamic. In recent years, there has been an increasing interest in the area of fast small-scale solvers for linear MPC, with the two main research areas of explicit MPC and tailored on-line MPC. State-of-the-art solvers in this second...
Certain problems encountered in electrical engineering incur an exponential time complexity and are therefore impossible to solve exactly for all problem sizes. However, heuristical approaches can sometimes use exact solutions of small instances of a problem to formulate a suboptimal solution to a larger instance of the problem. This paper demonstrates how to use the Unrank algorithm to solve small...
This work-in-progress paper presents an extension to the Arduino framework that introduces multitasking support. This allows to have more concurrent tasks instead of the single cyclic execution provided by the standard Arduino framework. The extension is implemented by integrating in a seamless way the ERIKA opensource Real-Time OS, maintaining the simplicity of the programming paradigm typical of...
Unified tracing is the process of collecting trace logs across the boundary of kernel and user spaces, and has been used to understand the in-depth correspondence between low level events and application program context for diagnosing system failures and performance problems. Crossing the boundary from the kernel space to a user space to collect trace events from dual spaces imposes challenges compared...
Message Passing Interface (MPI) has been the defacto programming model for scientific parallel applications. However, data driven applications with irregular communication patterns are harder to implement using MPI. The Partitioned Global Address Space (PGAS) programming models present an alternative approach to improve programmability. PGAS languages like UPC are growing in popularity because of...
Krylov subspace solvers are often the method of choice when solving sparse linear systems iteratively. At the same time, hardware accelerators such as graphics processing units (GPUs) continue to offer significant floating point performance gains for matrix and vector computations through easy-to-use libraries of computational kernels. However, as these libraries are usually composed of a well optimized...
In this work, we present a back-end for the Python library NumPy that utilizes the GPU seamlessly. We use dynamic code generation to generate kernels, and data is moved transparently to and from the GPU. For the integration into NumPy, we use the Bohrium runtime system. Bohrium hooks into NumPy through the implicit data parallelization of array operations, this approach requires no annotations or...
As mobile applications are being developed at a faster pace, the security aspect of is being neglected. A solid understanding of the characteristics of malware is the first step to preventing many unwanted consequences. This paper provides an overview of popular security threats posed by Android malware. In particular, we focus on the characteristics commonly found in malware applications and understand...
Android is a software stack that includes operating system, middle ware, applications for the development of devices. Android has evolved greatly and user experience in addition to consumer level efficiency along with integration of android powered devices also expanded. Because of its promising features and characteristics like open source nature, rich user interface, consistent app API's. Android...
The Cloud attempts to provide its users with automatically scalable platforms to host many applications and operating systems. To allow for quick deployment, they are often homogenised to a few images, restricting the variations used within the Cloud. An exploitable vulnerability stored within an image means that each instance will suffer from it and as a result, an attacker can be sure of a high...
Numerous advanced operating systems honestly hold both time-sliced and multiprocessor threading with a process scheduler. The kernel of an operating system permits programmers to control threads via the system call interface. Java incorporates threading facility within the language itself rather than managing threads as a facility of the underlying operating system. This research finding focuses on...
Appropriately motivating digital forensics topics in an educational environment is a challenging task for a lecturer. Not only will the skill levels of the students vary widely, but designing a lab exercise that introduces a single concept runs the risk of requiring too much additional knowledge to appropriately describe the task or may easily devolve into a contrived example that does not allow the...
We present an auto-parallelization technique for generating GPU implementation of data-structure operations from a sequential spec-ification. The technique partitions the data-structure operations into barrier-separated phases such that each phase executes only homogeneous operations. Homogeneity is dictated by the method type, which is derived from the specification. Two key aspects of our technique...
Introduction, description the structure and implementation process for WinPcap, then analyzed differences between IPv4 and IPv6 packet header, finally proposed a method to improve the efficiency of capturing packets. Using VC + + 6.0 program experiment implemented IPv6 packets capture and verify that the improved method is efficiency than the traditional method on capture packet.
Network security has been a serious problem in the Internet. To face this issue, network intrusion detection tools have become indispensable for computer systems and network gateways. In this paper we propose an embedded, multi-core aware network intrusion detection system (NIDS), which has the following features: 1) It integrates a novel multi-core aware packet capture module, called the MCA ring,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.