首页 > 最新文献

2011 RoEduNet International Conference 10th Edition: Networking in Education and Research最新文献

英文 中文
Optimizing the workflow for automatic quiz evaluation 优化工作流程的自动测验评估
Ioan-Alexandru Eftimie, Mircea Bardac, R. Rughinis
Student examination is an important part of the educational process. Although various electronic testing and grading solutions have been developed and gained interest in the last years, classic paper quiz examination is still a preferred method of examination, due to the simplicity of implementation and low technical requirements. Korect is a complete solution for automatic test generation, processing and grading, with inline answer marks, and answer sheet processing using auto feed scanners and OCR detection. This paper presents the research performed for optimizing the preprocessing phase and the scan folder polling during the automatic verification flow. This research brings improved stability and performance for the Korect automatic quiz evaluation solution presented in the paper.
学生考试是教育过程的重要组成部分。尽管近年来各种电子测试和评分解决方案得到了发展并引起了人们的兴趣,但由于实现简单且技术要求低,经典的纸考考试仍然是首选的考试方法。Korect是一个完整的解决方案,用于自动测试生成,处理和评分,内联答案标记,以及使用自动馈送扫描仪和OCR检测的答题卡处理。本文对自动验证流程中预处理阶段和扫描文件夹轮询的优化进行了研究。该研究提高了本文提出的韩语自动考题评估方案的稳定性和性能。
{"title":"Optimizing the workflow for automatic quiz evaluation","authors":"Ioan-Alexandru Eftimie, Mircea Bardac, R. Rughinis","doi":"10.1109/ROEDUNET.2011.5993711","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2011.5993711","url":null,"abstract":"Student examination is an important part of the educational process. Although various electronic testing and grading solutions have been developed and gained interest in the last years, classic paper quiz examination is still a preferred method of examination, due to the simplicity of implementation and low technical requirements. Korect is a complete solution for automatic test generation, processing and grading, with inline answer marks, and answer sheet processing using auto feed scanners and OCR detection. This paper presents the research performed for optimizing the preprocessing phase and the scan folder polling during the automatic verification flow. This research brings improved stability and performance for the Korect automatic quiz evaluation solution presented in the paper.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127532811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Communication security in SCADA pipeline monitoring systems SCADA管道监控系统中的通信安全
Tudorica Daniela
This paper is dealing with the problem of communication security for automated systems. This problem became more and more stringent along with the growing use of automation in many technological procedures and keeping the pace with the increase of performance in the digital communications area. In the first part, it is made a critical analysis of a SCADA (Supervisory Control And Data Acquisition) system's vulnerabilities against cyber-attacks, with a case study - a SCADA monitoring system of a pipeline network for oil products transportation. In the second part, there are presented, with advantages and disadvantages, possible solutions for security communication in the system. Cyber-attack is defined as a computer-to-computer attack that undermines the confidentiality, integrity, or availability of a computer or information resident on it.
本文主要研究自动化系统的通信安全问题。随着自动化在许多技术过程中的应用越来越多,随着数字通信领域性能的提高,这个问题变得越来越严峻。在第一部分中,本文以石油产品运输管道网络的SCADA监控系统为例,对SCADA(监控和数据采集)系统对网络攻击的脆弱性进行了批判性分析。在第二部分,提出了系统中可能的安全通信解决方案,并分析了其优缺点。网络攻击被定义为计算机对计算机的攻击,它破坏了计算机或其上驻留的信息的保密性、完整性或可用性。
{"title":"Communication security in SCADA pipeline monitoring systems","authors":"Tudorica Daniela","doi":"10.1109/ROEDUNET.2011.5993706","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2011.5993706","url":null,"abstract":"This paper is dealing with the problem of communication security for automated systems. This problem became more and more stringent along with the growing use of automation in many technological procedures and keeping the pace with the increase of performance in the digital communications area. In the first part, it is made a critical analysis of a SCADA (Supervisory Control And Data Acquisition) system's vulnerabilities against cyber-attacks, with a case study - a SCADA monitoring system of a pipeline network for oil products transportation. In the second part, there are presented, with advantages and disadvantages, possible solutions for security communication in the system. Cyber-attack is defined as a computer-to-computer attack that undermines the confidentiality, integrity, or availability of a computer or information resident on it.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123478877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
SNMP protocol based home automation system 基于SNMP协议的家庭自动化系统
Demeter Robert, Sarkany Istvan
The main purpose of a home automation system is to monitor and control devices from a central location. In this paper, we present the design and implementation of low-cost, flexible and secure home automation system based on SNMP standard protocol, now widely supported by device vendors for their products, such as routers, bridges and printers. Communication between SNMP agents is done on Ethernet and wireless networks. The protocol implemented between the agents is optimized to be suitable for most applications. The system is designed for low-cost and flexibility in order to reuse existing local data communication network.
家庭自动化系统的主要目的是从一个中心位置监视和控制设备。本文提出了一种基于SNMP标准协议的低成本、灵活、安全的家庭自动化系统的设计与实现,该系统目前在路由器、网桥、打印机等设备厂商的产品中得到了广泛支持。SNMP代理之间的通信在以太网和无线网络上完成。对代理之间实现的协议进行了优化,以适合大多数应用程序。该系统具有低成本和灵活性,可以重用现有的本地数据通信网络。
{"title":"SNMP protocol based home automation system","authors":"Demeter Robert, Sarkany Istvan","doi":"10.1109/ROEDUNET.2011.5993697","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2011.5993697","url":null,"abstract":"The main purpose of a home automation system is to monitor and control devices from a central location. In this paper, we present the design and implementation of low-cost, flexible and secure home automation system based on SNMP standard protocol, now widely supported by device vendors for their products, such as routers, bridges and printers. Communication between SNMP agents is done on Ethernet and wireless networks. The protocol implemented between the agents is optimized to be suitable for most applications. The system is designed for low-cost and flexibility in order to reuse existing local data communication network.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123185362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extension of a port knocking client-server architecture with NTP synchronization 带NTP同步的端口敲打客户机-服务器体系结构的扩展
T. Popeea, V. Olteanu, L. Gheorghe, R. Rughinis
Port knocking is a form of host-to-host communication which relies on deliberately failed TCP connection attempts. The information is encoded into a port sequence. The client attempts to initiate several three-way-handshakes and receives no reply. These connection attempts are monitored by a daemon which interprets their destination port numbers as data. This mechanism has vulnerabilities that can be exploited by hackers with the help of data sniffed off the network. Through synchronization, these vulnerabilities can be minimized. A knock sequence is less vulnerable to replay and brute force attacks if its lifespan is shorter. All the entities involved in the knock sequence need to be aware all the time of the knock sequence that can be used. For this, it is required that clients and server share the same time. Both possess the means of the determining the sequence, which consists of a hash based on a preshared key, time value, client IP address and destination port. We present the means to achieve the client-server synchronization and describe an application that implements this.
端口敲门是主机对主机通信的一种形式,它依赖于故意失败的TCP连接尝试。信息被编码成一个端口序列。客户端尝试发起几次三方握手,但没有收到答复。这些连接尝试由一个守护进程监视,该守护进程将其目的端口号解释为数据。这种机制存在漏洞,黑客可以借助从网络嗅探到的数据利用这些漏洞。通过同步,这些漏洞可以被最小化。如果敲击序列的生命周期较短,它就不容易受到重放和暴力攻击。所有涉及到叩击序列的实体都需要时刻知道可以使用的叩击序列。为此,要求客户机和服务器共享相同的时间。两者都具有确定序列的方法,该方法由基于预共享密钥、时间值、客户端IP地址和目的端口的散列组成。我们介绍了实现客户机-服务器同步的方法,并描述了实现该同步的应用程序。
{"title":"Extension of a port knocking client-server architecture with NTP synchronization","authors":"T. Popeea, V. Olteanu, L. Gheorghe, R. Rughinis","doi":"10.1109/ROEDUNET.2011.5993704","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2011.5993704","url":null,"abstract":"Port knocking is a form of host-to-host communication which relies on deliberately failed TCP connection attempts. The information is encoded into a port sequence. The client attempts to initiate several three-way-handshakes and receives no reply. These connection attempts are monitored by a daemon which interprets their destination port numbers as data. This mechanism has vulnerabilities that can be exploited by hackers with the help of data sniffed off the network. Through synchronization, these vulnerabilities can be minimized. A knock sequence is less vulnerable to replay and brute force attacks if its lifespan is shorter. All the entities involved in the knock sequence need to be aware all the time of the knock sequence that can be used. For this, it is required that clients and server share the same time. Both possess the means of the determining the sequence, which consists of a hash based on a preshared key, time value, client IP address and destination port. We present the means to achieve the client-server synchronization and describe an application that implements this.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126381680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Open courseware initiatives - after 10 years 开放课件计划——10年后
Monica Vladoiu
In this paper we overview the state-of-the-art in open courseware initiatives worldwide. First, the MIT OpenCourseWare project is surveyed, as it has been the real starting point of the OCW movement. Generally, open courseware refers to a free and open digital publication of high quality university-level educational materials that are organized as courses, and include course planning materials, evaluation tools, and thematic content, under a Creative Commons license. OCW is free and openly licensed, accessible to anyone, anywhere, anytime via the Internet. The OCW initiative started in 2002, and since then many more projects that offer open access to courseware have been initiated: Carnegie Mellon Open Learning Initiative, Harvard Medical School's MyCourses, Webcast. Berkeley, Rice University's Connexions, OpenCourseWare Consortium, Open Education Resources Commons, and The Saylor Foundation's Free Education Initiative, along with open courseware projects worldwide. All these endeavors boost and contribute to the emerging open educational models.
在本文中,我们概述了世界范围内开放课件项目的最新进展。首先,麻省理工学院开放课程项目被调查,因为它是开放式课程运动的真正起点。一般来说,开放课件是指在知识共享许可下,以课程形式组织的高质量大学教育材料的免费开放数字出版物,包括课程规划材料、评估工具和主题内容。开放式课程是免费和公开许可的,任何人都可以随时随地通过互联网访问。开放式课程计划始于2002年,从那时起,更多提供开放获取课件的项目被启动:卡内基梅隆大学开放学习计划,哈佛医学院的MyCourses,网络广播。伯克利大学、莱斯大学的联盟、开放课程联盟、开放教育资源共享、塞勒基金会的免费教育倡议,以及全球范围内的开放课程项目。所有这些努力都推动和促进了新兴的开放教育模式。
{"title":"Open courseware initiatives - after 10 years","authors":"Monica Vladoiu","doi":"10.1109/ROEDUNET.2011.5993712","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2011.5993712","url":null,"abstract":"In this paper we overview the state-of-the-art in open courseware initiatives worldwide. First, the MIT OpenCourseWare project is surveyed, as it has been the real starting point of the OCW movement. Generally, open courseware refers to a free and open digital publication of high quality university-level educational materials that are organized as courses, and include course planning materials, evaluation tools, and thematic content, under a Creative Commons license. OCW is free and openly licensed, accessible to anyone, anywhere, anytime via the Internet. The OCW initiative started in 2002, and since then many more projects that offer open access to courseware have been initiated: Carnegie Mellon Open Learning Initiative, Harvard Medical School's MyCourses, Webcast. Berkeley, Rice University's Connexions, OpenCourseWare Consortium, Open Education Resources Commons, and The Saylor Foundation's Free Education Initiative, along with open courseware projects worldwide. All these endeavors boost and contribute to the emerging open educational models.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115040148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
SAR — A self-adaptive QoS aware network layer framework SAR -一个自适应的QoS感知网络层框架
B. Iancu, V. Dădârlat, A. Peculea, E. Cebuc, C. Ardelean
Quality of service frameworks in computer networks are sets of mechanisms that run over multiple network equipment with the aim of ensuring network services. Several frameworks have been developed using different approaches, each framework showing advantages but also drawbacks. In order to eliminate these shortcomings, a new organization of the bandwidth is proposed and a new framework for ensuring end-to-end quality of service was developed and implemented. The functionalities and performances of the proposed framework were tested and validated through an experimental methodology, using a software system for developing and testing of quality of services sensitive frameworks and technologies.
计算机网络中的服务质量框架是运行在多个网络设备上的一组机制,其目的是确保网络服务。已经使用不同的方法开发了几个框架,每个框架都显示出优点,但也有缺点。为了消除这些缺点,提出了一种新的带宽组织方式,并开发和实现了保证端到端服务质量的新框架。所提出的框架的功能和性能通过一种实验方法进行了测试和验证,该方法使用一个软件系统来开发和测试服务质量敏感框架和技术。
{"title":"SAR — A self-adaptive QoS aware network layer framework","authors":"B. Iancu, V. Dădârlat, A. Peculea, E. Cebuc, C. Ardelean","doi":"10.1109/ROEDUNET.2011.5993698","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2011.5993698","url":null,"abstract":"Quality of service frameworks in computer networks are sets of mechanisms that run over multiple network equipment with the aim of ensuring network services. Several frameworks have been developed using different approaches, each framework showing advantages but also drawbacks. In order to eliminate these shortcomings, a new organization of the bandwidth is proposed and a new framework for ensuring end-to-end quality of service was developed and implemented. The functionalities and performances of the proposed framework were tested and validated through an experimental methodology, using a software system for developing and testing of quality of services sensitive frameworks and technologies.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121097396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GPU optimized computation of stencil based algorithms 基于模板算法的GPU优化计算
Lucian Mihai Itu, C. Suciu, Florin Moldoveanu, A. Postelnicu
The paper describes an optimized GPU based approach for stencil based algorithms. The simulations have been performed for a two dimensional steady state heat conduction problem, which has been solved through the red black point successive over relaxation method. Two kernels have been developed and their performance has been greatly improved through coalesced memory accesses and special shared memory approaches. The approach described in the paper does not only represent a step forward for the steady state heat conduction problem but also for any other algorithm which performs the numerical solution of partial differential equations or which is stencil based. The paper not only describes the various code versions but also the process which has lead to these improvements. Also the optimized GPU code version has been compared with the corresponding CPU version. The testing results show that the GPU algorithm always leads to an improvement. The value of the improvement though greatly depends on the number of grid points on which the computations are performed.
本文描述了一种基于GPU的模板算法优化方法。用红黑点逐次过松弛法对二维稳态热传导问题进行了模拟。开发了两个内核,并通过合并内存访问和特殊的共享内存方法大大提高了它们的性能。本文所描述的方法不仅代表了稳态热传导问题的一个进步,而且对任何其他执行偏微分方程数值解或基于模板的算法都是一个进步。本文不仅描述了各种代码版本,而且还描述了导致这些改进的过程。并将优化后的GPU代码版本与相应的CPU版本进行了比较。测试结果表明,GPU算法总是会导致改进。然而,改进的价值很大程度上取决于执行计算的网格点的数量。
{"title":"GPU optimized computation of stencil based algorithms","authors":"Lucian Mihai Itu, C. Suciu, Florin Moldoveanu, A. Postelnicu","doi":"10.1109/ROEDUNET.2011.5993693","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2011.5993693","url":null,"abstract":"The paper describes an optimized GPU based approach for stencil based algorithms. The simulations have been performed for a two dimensional steady state heat conduction problem, which has been solved through the red black point successive over relaxation method. Two kernels have been developed and their performance has been greatly improved through coalesced memory accesses and special shared memory approaches. The approach described in the paper does not only represent a step forward for the steady state heat conduction problem but also for any other algorithm which performs the numerical solution of partial differential equations or which is stencil based. The paper not only describes the various code versions but also the process which has lead to these improvements. Also the optimized GPU code version has been compared with the corresponding CPU version. The testing results show that the GPU algorithm always leads to an improvement. The value of the improvement though greatly depends on the number of grid points on which the computations are performed.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132341439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Genetic algorithms applied in routing protocols for wireless sensor networks 遗传算法在无线传感器网络路由协议中的应用
Ioana Apetroaei, I. Oprea, B. Proca, L. Gheorghe
Wireless sensors have the capacity to gather information like temperature, sound, motion or pollutants, being distribute in an environment that has to be monitored and controlled for many domains like industry, healthcare or military applications. Grouped in networks with one Base Station gathering the useful data, the sensors are characterized by limited battery life and low processing power, which results in a limited network lifetime.
无线传感器有能力收集温度、声音、运动或污染物等信息,这些信息分布在工业、医疗保健或军事应用等许多领域必须监测和控制的环境中。在一个基站收集有用数据的网络中分组,传感器的特点是有限的电池寿命和低处理能力,这导致有限的网络寿命。
{"title":"Genetic algorithms applied in routing protocols for wireless sensor networks","authors":"Ioana Apetroaei, I. Oprea, B. Proca, L. Gheorghe","doi":"10.1109/ROEDUNET.2011.5993679","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2011.5993679","url":null,"abstract":"Wireless sensors have the capacity to gather information like temperature, sound, motion or pollutants, being distribute in an environment that has to be monitored and controlled for many domains like industry, healthcare or military applications. Grouped in networks with one Base Station gathering the useful data, the sensors are characterized by limited battery life and low processing power, which results in a limited network lifetime.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122650768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
The never ending problem of counting bits efficiently 没完没了的高效计数问题
A. Suciu, P. Cobârzan, K. Marton
The problem of counting the ones of a bit sequence (commonly known as the “popcount” function) is one of the most interesting problems in cryptography. Although it has received attention for a very long time, it was brought back into focus by the new developments in hardware, both for CPUs (SSE 4.2) and for GPUs. The problem is of special interest in the field of testing the quality of random sequences and occurs in the first tests of the NIST battery of statistical tests for randomness. Obviously, for a “good” random sequence we would expect a “popcount” of about half the length of that sequence. Since testing the quality of a random number generator is notoriously computationally intensive we are of course interested in implementing efficiently the “popcount” function. In the present paper we analyze several implementation methods in search of the most efficient one; for now, we restrict our attention to the serial implementations for CPUs.
对位序列的个位数进行计数的问题(通常称为“popcount”函数)是密码学中最有趣的问题之一。虽然它已经受到了很长时间的关注,但它被硬件的新发展重新引起了人们的关注,包括cpu (SSE 4.2)和gpu。这个问题在测试随机序列质量的领域特别有趣,并且出现在NIST随机统计测试系列的第一个测试中。显然,对于一个“好的”随机序列,我们期望的“popcount”大约是该序列长度的一半。由于测试随机数生成器的质量是出了名的计算密集型,我们当然对有效地实现“popcount”函数感兴趣。在本文中,我们分析了几种实现方法,以寻找最有效的方法;现在,我们将注意力限制在cpu的串行实现上。
{"title":"The never ending problem of counting bits efficiently","authors":"A. Suciu, P. Cobârzan, K. Marton","doi":"10.1109/ROEDUNET.2011.5993702","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2011.5993702","url":null,"abstract":"The problem of counting the ones of a bit sequence (commonly known as the “popcount” function) is one of the most interesting problems in cryptography. Although it has received attention for a very long time, it was brought back into focus by the new developments in hardware, both for CPUs (SSE 4.2) and for GPUs. The problem is of special interest in the field of testing the quality of random sequences and occurs in the first tests of the NIST battery of statistical tests for randomness. Obviously, for a “good” random sequence we would expect a “popcount” of about half the length of that sequence. Since testing the quality of a random number generator is notoriously computationally intensive we are of course interested in implementing efficiently the “popcount” function. In the present paper we analyze several implementation methods in search of the most efficient one; for now, we restrict our attention to the serial implementations for CPUs.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"43 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125828383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A framework for achieving optimal benefits from the internet in the context of development 在发展背景下实现互联网最佳效益的框架
E. A. Gamukama, O. Popov
The framework gives the characteristics of what would be the environment of the Internet services provision and usage in view of fostering development in a poor nation. It depicts the current Internet market state of art in most developing nations. Building on the domain of utility theory and the concept of fairness, the characteristics of the network services provision are set to maximize the users satisfaction through a utility fair function that unifies/equalizes the utilities of all users for a given traffic case. The utility value gained from the providers' utility equalization is used as a performance measure of the service delivery to the end-user. The framework strives to characterize the end-users by mapping the utility value to actual benefits that foster a positive social change in one's basic dimensions of life. This mapping is based on the leisure-labour theory that endeavours to explain why people seek some equity in the ability to access the Internet.
该框架给出了互联网服务提供和使用环境的特点,以促进贫穷国家的发展。它描述了目前大多数发展中国家的互联网市场现状。在效用理论领域和公平概念的基础上,网络服务提供的特征被设定为通过效用公平函数来最大限度地提高用户满意度,该函数统一/均衡了给定流量情况下所有用户的效用。从提供者的效用均衡中获得的效用值被用作向最终用户提供服务的性能度量。该框架通过将效用价值映射到实际利益,从而在一个人的基本生活方面促进积极的社会变革,从而努力描绘最终用户的特征。这种映射是基于休闲劳动理论,该理论试图解释为什么人们在访问互联网的能力上寻求某种公平。
{"title":"A framework for achieving optimal benefits from the internet in the context of development","authors":"E. A. Gamukama, O. Popov","doi":"10.1109/ROEDUNET.2011.5993709","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2011.5993709","url":null,"abstract":"The framework gives the characteristics of what would be the environment of the Internet services provision and usage in view of fostering development in a poor nation. It depicts the current Internet market state of art in most developing nations. Building on the domain of utility theory and the concept of fairness, the characteristics of the network services provision are set to maximize the users satisfaction through a utility fair function that unifies/equalizes the utilities of all users for a given traffic case. The utility value gained from the providers' utility equalization is used as a performance measure of the service delivery to the end-user. The framework strives to characterize the end-users by mapping the utility value to actual benefits that foster a positive social change in one's basic dimensions of life. This mapping is based on the leisure-labour theory that endeavours to explain why people seek some equity in the ability to access the Internet.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127252182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2011 RoEduNet International Conference 10th Edition: Networking in Education and Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1