首页 > 最新文献

2010 First International Conference on Networking and Computing最新文献

英文 中文
Inconsistency Detection System for Security Policy and Firewall Policy 安全策略与防火墙策略不一致检测系统
Pub Date : 2010-11-17 DOI: 10.1109/IC-NC.2010.45
Yi Yin, Xiaodong Xu, Y. Katayama, N. Takahashi
Packet filtering in firewall either accepts or denies network packets based upon a set of pre-defined filters called firewall policy. Firewall policy is designed under the instruction of security policy. A network security policy is a generic document that outlines the needs for computer network access permissions. And it determines how firewall filters are designed. If inconsistencies, such as redundant filters, insufficient filters or contradict filters, exist between security policy and firewall policy, firewall policy could not filter packets exactly, and the network protected by the firewall will be affected. To resolve this problem, we propose an inconsistency detection system to detect the inconsistencies between the security policy and firewall policy. When the administrator could not get host IP addresses, port number and other specific values, according to the network configurations, our proposed system could transform the network security policy and firewall policy to the same range value, represent and analyze their spatial relationships to detect their inconsistencies. The proposed system has been successfully implemented in a prototype system. We have been confirmed the effectiveness of the proposed system.
防火墙中的包过滤根据一组预定义的过滤器(称为防火墙策略)接受或拒绝网络数据包。防火墙策略是在安全策略的指导下设计的。网络安全策略是概述计算机网络访问权限需求的通用文档。它还决定了如何设计防火墙过滤器。如果安全策略与防火墙策略之间存在过滤冗余、过滤不充分、过滤矛盾等不一致的情况,将导致防火墙策略无法准确过滤报文,从而影响防火墙所保护的网络。为了解决这个问题,我们提出了一个不一致检测系统来检测安全策略和防火墙策略之间的不一致。当管理员无法获取主机IP地址、端口号等具体值时,根据网络配置,我们提出的系统可以将网络安全策略和防火墙策略转换为相同的范围值,并表示和分析它们之间的空间关系,以检测它们之间的不一致性。该系统已在原型系统中成功实现。我们已经证实了所提议的制度的有效性。
{"title":"Inconsistency Detection System for Security Policy and Firewall Policy","authors":"Yi Yin, Xiaodong Xu, Y. Katayama, N. Takahashi","doi":"10.1109/IC-NC.2010.45","DOIUrl":"https://doi.org/10.1109/IC-NC.2010.45","url":null,"abstract":"Packet filtering in firewall either accepts or denies network packets based upon a set of pre-defined filters called firewall policy. Firewall policy is designed under the instruction of security policy. A network security policy is a generic document that outlines the needs for computer network access permissions. And it determines how firewall filters are designed. If inconsistencies, such as redundant filters, insufficient filters or contradict filters, exist between security policy and firewall policy, firewall policy could not filter packets exactly, and the network protected by the firewall will be affected. To resolve this problem, we propose an inconsistency detection system to detect the inconsistencies between the security policy and firewall policy. When the administrator could not get host IP addresses, port number and other specific values, according to the network configurations, our proposed system could transform the network security policy and firewall policy to the same range value, represent and analyze their spatial relationships to detect their inconsistencies. The proposed system has been successfully implemented in a prototype system. We have been confirmed the effectiveness of the proposed system.","PeriodicalId":375145,"journal":{"name":"2010 First International Conference on Networking and Computing","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123965026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dynamic Communication Performance of a Modified Hierarchical 3D-Torus Network under Non-uniform Traffic Patterns 非均匀流量模式下改进分层三维环面网络的动态通信性能
Pub Date : 2010-11-17 DOI: 10.1109/IC-NC.2010.27
M. Rahman, Yukinori Sato, Y. Inoguchi
A Modified Hierarchical 3D-Torus (MH3DT) network is a 3D-torus network of multiple basic modules, in which the basic modules are themselves 3D-torus networks which are hierarchically interconnected into higher-level networks. The static network performance of the MH3DT has already been studied and has been shown to be good. Dynamic communication performance has been evaluated using dimension-order routing and 2 virtual channels under uniform traffic patterns but not under non-uniform traffic patterns. In this paper, we evaluate the dynamic communication performance of MH3DT under five non-uniform traffic patterns, and compare it with other networks. We found that under non-uniform traffic patterns, the MH3DT yields high throughput and low latency, providing better dynamic communication performance compared to H3DT, TESH, mesh, and torus networks. Also, we found that non-uniform traffic patterns have higher throughput than uniform traffic patterns in the MH3DT network.
MH3DT (Modified Hierarchical 3D-Torus)网络是由多个基本模块组成的三维环面网络,其中基本模块本身就是三维环面网络,这些三维环面网络分层连接到更高级别的网络中。已经对MH3DT的静态网络性能进行了研究,并显示出良好的性能。采用维序路由和2个虚拟信道对均匀流量模式下的动态通信性能进行了评价,但不采用非均匀流量模式。在本文中,我们评估了MH3DT在五种不均匀流量模式下的动态通信性能,并与其他网络进行了比较。我们发现,在非均匀流量模式下,MH3DT具有高吞吐量和低延迟,与H3DT、TESH、mesh和torus网络相比,提供了更好的动态通信性能。此外,我们发现在MH3DT网络中,非均匀流量模式比均匀流量模式具有更高的吞吐量。
{"title":"Dynamic Communication Performance of a Modified Hierarchical 3D-Torus Network under Non-uniform Traffic Patterns","authors":"M. Rahman, Yukinori Sato, Y. Inoguchi","doi":"10.1109/IC-NC.2010.27","DOIUrl":"https://doi.org/10.1109/IC-NC.2010.27","url":null,"abstract":"A Modified Hierarchical 3D-Torus (MH3DT) network is a 3D-torus network of multiple basic modules, in which the basic modules are themselves 3D-torus networks which are hierarchically interconnected into higher-level networks. The static network performance of the MH3DT has already been studied and has been shown to be good. Dynamic communication performance has been evaluated using dimension-order routing and 2 virtual channels under uniform traffic patterns but not under non-uniform traffic patterns. In this paper, we evaluate the dynamic communication performance of MH3DT under five non-uniform traffic patterns, and compare it with other networks. We found that under non-uniform traffic patterns, the MH3DT yields high throughput and low latency, providing better dynamic communication performance compared to H3DT, TESH, mesh, and torus networks. Also, we found that non-uniform traffic patterns have higher throughput than uniform traffic patterns in the MH3DT network.","PeriodicalId":375145,"journal":{"name":"2010 First International Conference on Networking and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129379911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Parallelizing Hilbert-Huang Transform on a GPU 在GPU上并行化Hilbert-Huang变换
Pub Date : 2010-11-17 DOI: 10.1109/IC-NC.2010.44
Pulung Waskito, Shinobu Miwa, Y. Mitsukura, H. Nakajo
In this paper, we show parallel implementation of Hilbert-Huang Transform on GPU. This implementation focused on the reducing the computation complexity from O(N) on a single CPU to O(N/P log (N)) on GPU, as well as the use of 'shared-global' switching method to increase performance. Evaluation results show our single GPU implementation using Tesla C1060 achieves 29.0x speedup in best case, and a total of 7.1x speedup for all results when compared to a single Intel dual core CPU.
本文给出了Hilbert-Huang变换在GPU上的并行实现。该实现侧重于将计算复杂度从单个CPU上的O(N)降低到GPU上的O(N/P log (N)),以及使用“全局共享”切换方法来提高性能。评估结果显示,我们使用Tesla C1060的单个GPU实现在最佳情况下实现了29.0倍的加速,与单个Intel双核CPU相比,所有结果的加速总和为7.1倍。
{"title":"Parallelizing Hilbert-Huang Transform on a GPU","authors":"Pulung Waskito, Shinobu Miwa, Y. Mitsukura, H. Nakajo","doi":"10.1109/IC-NC.2010.44","DOIUrl":"https://doi.org/10.1109/IC-NC.2010.44","url":null,"abstract":"In this paper, we show parallel implementation of Hilbert-Huang Transform on GPU. This implementation focused on the reducing the computation complexity from O(N) on a single CPU to O(N/P log (N)) on GPU, as well as the use of 'shared-global' switching method to increase performance. Evaluation results show our single GPU implementation using Tesla C1060 achieves 29.0x speedup in best case, and a total of 7.1x speedup for all results when compared to a single Intel dual core CPU.","PeriodicalId":375145,"journal":{"name":"2010 First International Conference on Networking and Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129577647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Article Recommender for Feed Readers with a Loss Compensation Based on the TF-IDF Weight 基于TF-IDF权重损失补偿的Feed阅读器文章推荐
Pub Date : 2010-11-17 DOI: 10.1109/IC-NC.2010.21
Daichi Yokota, S. Fujita
In this paper, we improve the accuracy of item-based collaborative filtering by introducing a loss compensation based on the TF-IDF weight. The proposed scheme is implemented as a part of a feed reader, and is evaluated through the feedback from users.
在本文中,我们通过引入基于TF-IDF权重的损失补偿来提高基于项目的协同过滤的准确性。该方案作为提要阅读器的一部分实现,并通过用户的反馈进行评估。
{"title":"Article Recommender for Feed Readers with a Loss Compensation Based on the TF-IDF Weight","authors":"Daichi Yokota, S. Fujita","doi":"10.1109/IC-NC.2010.21","DOIUrl":"https://doi.org/10.1109/IC-NC.2010.21","url":null,"abstract":"In this paper, we improve the accuracy of item-based collaborative filtering by introducing a loss compensation based on the TF-IDF weight. The proposed scheme is implemented as a part of a feed reader, and is evaluated through the feedback from users.","PeriodicalId":375145,"journal":{"name":"2010 First International Conference on Networking and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129190204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Quick Detection of Colluders in P2P CDNs to Avoid an Illegal Leak of the Contents P2P cdn中串通者的快速检测,避免内容非法泄露
Pub Date : 2010-11-17 DOI: 10.1109/IC-NC.2010.14
E. Abdullah, S. Fujita
The objective of Peer-to-Peer Content Delivery Networks is to deliver copyrighted contents to paid clients in an efficient and secure manner. To protect such contents from being distributed to unauthorized peers, Lou and Hwang proposed a proactive content poisoning scheme to restrain an illegal download conducted by unauthorized peers, and a scheme to identify colluders who illegally leak the contents to such unauthorized peers. In this paper, we propose three schemes which extend the Lou and Hwang's colluder detection scheme in two directions. The first idea is to introduce an intensive probing to the check of suspected peers, and the second idea is to adopt a reputation system to select reliable (non-colluder) peers as a decoy. The performance of the resulting scheme is evaluated by simulation. The result of simulations indicates that the proposed schemes detect colluders 30% earlier in average than the original scheme while keeping the accuracy of the colluder detection at medium collusion rate.
点对点内容交付网络的目标是以高效和安全的方式向付费客户交付受版权保护的内容。为了防止这些内容被分发给未经授权的同行,Lou和Hwang提出了一种主动内容中毒方案,以限制未经授权的同行进行的非法下载,并提出了一种方案,以识别非法向这些未经授权的同行泄露内容的共谋者。在本文中,我们提出了三个方案,将Lou和Hwang的共谋检测方案在两个方向上进行了扩展。第一个想法是引入一个密集的探测来检查可疑的节点,第二个想法是采用声誉系统来选择可靠的(非串通的)节点作为诱饵。通过仿真对该方案的性能进行了评价。仿真结果表明,在保持中等合谋率下的合谋检测精度的同时,所提方案比原方案平均提前30%检测合谋。
{"title":"A Quick Detection of Colluders in P2P CDNs to Avoid an Illegal Leak of the Contents","authors":"E. Abdullah, S. Fujita","doi":"10.1109/IC-NC.2010.14","DOIUrl":"https://doi.org/10.1109/IC-NC.2010.14","url":null,"abstract":"The objective of Peer-to-Peer Content Delivery Networks is to deliver copyrighted contents to paid clients in an efficient and secure manner. To protect such contents from being distributed to unauthorized peers, Lou and Hwang proposed a proactive content poisoning scheme to restrain an illegal download conducted by unauthorized peers, and a scheme to identify colluders who illegally leak the contents to such unauthorized peers. In this paper, we propose three schemes which extend the Lou and Hwang's colluder detection scheme in two directions. The first idea is to introduce an intensive probing to the check of suspected peers, and the second idea is to adopt a reputation system to select reliable (non-colluder) peers as a decoy. The performance of the resulting scheme is evaluated by simulation. The result of simulations indicates that the proposed schemes detect colluders 30% earlier in average than the original scheme while keeping the accuracy of the colluder detection at medium collusion rate.","PeriodicalId":375145,"journal":{"name":"2010 First International Conference on Networking and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130123564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Prefetching Scheme for Peer-to-Peer Video-on-Demand Systems with a Media Server 带媒体服务器的点对点视频点播系统的自适应预取方案
Pub Date : 2010-11-17 DOI: 10.1109/IC-NC.2010.22
Ryusuke Uedera, S. Fujita
In this paper, we consider Peer-to-Peer Video on- Demand (P2P VoD) systems based on the Bit Torrent file sharing protocol. Since the rarest first policy adopted in the Bit Torrent protocol could not collect all pieces corresponding to a video file by their playback time, we need to develop a new piece selection rule particularly designed for P2P VoDs. In the proposed scheme, we assume the existence of a media server which can upload any piece upon request, and try to bound the load of such media server by carefully discriminating pieces to be requested, by taking into account the rareness of the pieces held by its nearby peers, estimated size of the overlay network, and the file size to be downloaded. The performance of the proposed scheme is evaluated by simulation.
本文研究了基于Bit Torrent文件共享协议的点对点视频点播系统。由于Bit Torrent协议中采用的最稀有优先策略无法按照播放时间收集视频文件对应的所有片段,因此我们需要开发一种专门针对P2P视频文件的新的片段选择规则。在提出的方案中,我们假设存在一个可以根据请求上传任何片段的媒体服务器,并尝试通过仔细区分要请求的片段来绑定该媒体服务器的负载,通过考虑其附近对等体持有的片段的稀存性、覆盖网络的估计大小和要下载的文件大小。通过仿真对该方案的性能进行了评价。
{"title":"Adaptive Prefetching Scheme for Peer-to-Peer Video-on-Demand Systems with a Media Server","authors":"Ryusuke Uedera, S. Fujita","doi":"10.1109/IC-NC.2010.22","DOIUrl":"https://doi.org/10.1109/IC-NC.2010.22","url":null,"abstract":"In this paper, we consider Peer-to-Peer Video on- Demand (P2P VoD) systems based on the Bit Torrent file sharing protocol. Since the rarest first policy adopted in the Bit Torrent protocol could not collect all pieces corresponding to a video file by their playback time, we need to develop a new piece selection rule particularly designed for P2P VoDs. In the proposed scheme, we assume the existence of a media server which can upload any piece upon request, and try to bound the load of such media server by carefully discriminating pieces to be requested, by taking into account the rareness of the pieces held by its nearby peers, estimated size of the overlay network, and the file size to be downloaded. The performance of the proposed scheme is evaluated by simulation.","PeriodicalId":375145,"journal":{"name":"2010 First International Conference on Networking and Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114967291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Parallel Algorithm for 2-Edge-Connectivity Augmentation of a Connected Graph with Multipartition Constraints 多分区约束连通图2边连通增强的并行算法
Pub Date : 2010-11-17 DOI: 10.1109/IC-NC.2010.58
T. Oki, S. Taoka, Toshimasa Watanabe
The k-edge-connectivity augmentation problem with multipartition constraints (kECAM for short) is defined by “Given an undirected graph G = (V, E) and a multipartition π = {V1,..., Vr} of V with Vi ∩ Vj = ∅ for ∀i, j ∈ {1,..., r} (i ≠ j), find an edge set E' of minimum cardinality, consisting of edges that connect distinct members of π, such that G' = (V, E∪E') is k edge-connected.” In this paper, we propose a parallel algorithm, running on an EREW PRAM, for finding a solution to 2ECAM when G is connected. The main idea is to reduce 2ECAM to the bipartition case, that is, 2ECAM with r = 2.
具有多分区约束的k边连通性增强问题(简称kECAM)定义为“给定一个无向图G = (V, E)和一个多分区π = {V1,…, Vr} of V with Vi∩Vj =∅for∀i, j∈{1,…, r} (i≠j),求一个最小cardinality的边集E',它由连接π的不同元素的边组成,使得G' = (V, E∪E')是k边连通的。在本文中,我们提出了一个并行算法,运行在EREW PRAM上,用于寻找G连接时2ECAM的解。主要思想是将2ECAM约简为两分区情况,即r = 2的2ECAM。
{"title":"A Parallel Algorithm for 2-Edge-Connectivity Augmentation of a Connected Graph with Multipartition Constraints","authors":"T. Oki, S. Taoka, Toshimasa Watanabe","doi":"10.1109/IC-NC.2010.58","DOIUrl":"https://doi.org/10.1109/IC-NC.2010.58","url":null,"abstract":"The k-edge-connectivity augmentation problem with multipartition constraints (kECAM for short) is defined by “Given an undirected graph G = (V, E) and a multipartition π = {V1,..., Vr} of V with Vi ∩ Vj = ∅ for ∀i, j ∈ {1,..., r} (i ≠ j), find an edge set E' of minimum cardinality, consisting of edges that connect distinct members of π, such that G' = (V, E∪E') is k edge-connected.” In this paper, we propose a parallel algorithm, running on an EREW PRAM, for finding a solution to 2ECAM when G is connected. The main idea is to reduce 2ECAM to the bipartition case, that is, 2ECAM with r = 2.","PeriodicalId":375145,"journal":{"name":"2010 First International Conference on Networking and Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134281709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Architecture and FPGA-Implementation of Scalable Picture Segmentation by 2D Scanning with Flexible Pixel-Block Size 二维扫描图像分割的结构与fpga实现
Pub Date : 2010-11-17 DOI: 10.1109/IC-NC.2010.48
T. Koide, R. Kimura, T. Sugahara, K. Okazaki, H. Mattausch
We report a two-dimensional (2D) pixel block scanning architecture for image segmentation by segment growing. This architecture can optimize processing speed, power consumption, and circuit area by modifying size and shape of the pixel block. Real-time processing can be maintained by using additional the two important techniques of (i) boundary-scan of the grown segment only, (ii) continued block-internal segment growing. We analyze and optimize the size and shape trade-offs for the pixel block, and evaluate the proposed architecture by an FPGA. Altogether, the investigated architecture concepts reduce the area-time product by 52.3 % in comparison to a previously reported one-dimensional (1D) scanning architecture.
我们报告了一种二维(2D)像素块扫描架构,用于分段生长的图像分割。这种架构可以通过改变像素块的大小和形状来优化处理速度、功耗和电路面积。实时处理可以通过使用另外两种重要技术(i)仅对生长段进行边界扫描,(ii)继续块内部段生长。我们分析和优化像素块的大小和形状权衡,并通过FPGA评估所提出的架构。总的来说,与之前报道的一维(1D)扫描架构相比,所研究的架构概念减少了52.3%的面积-时间产品。
{"title":"Architecture and FPGA-Implementation of Scalable Picture Segmentation by 2D Scanning with Flexible Pixel-Block Size","authors":"T. Koide, R. Kimura, T. Sugahara, K. Okazaki, H. Mattausch","doi":"10.1109/IC-NC.2010.48","DOIUrl":"https://doi.org/10.1109/IC-NC.2010.48","url":null,"abstract":"We report a two-dimensional (2D) pixel block scanning architecture for image segmentation by segment growing. This architecture can optimize processing speed, power consumption, and circuit area by modifying size and shape of the pixel block. Real-time processing can be maintained by using additional the two important techniques of (i) boundary-scan of the grown segment only, (ii) continued block-internal segment growing. We analyze and optimize the size and shape trade-offs for the pixel block, and evaluate the proposed architecture by an FPGA. Altogether, the investigated architecture concepts reduce the area-time product by 52.3 % in comparison to a previously reported one-dimensional (1D) scanning architecture.","PeriodicalId":375145,"journal":{"name":"2010 First International Conference on Networking and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134283368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Express Circuit Switching: Improving the Performance of Bufferless Networks-on-Chip 快速电路交换:改善片上无缓冲网络的性能
Pub Date : 2010-11-17 DOI: 10.1109/IC-NC.2010.12
Jing Lin, X. Lin
In this paper, we propose a new scheme for packet-switched bufferless Networks-on-Chip (NoCs). The goal is to reduce the area and power consumption while providing high performance. In the proposed scheme, we develop a new bufferless routing algorithm. Extensive cycle-accurate simulations have been conducted to show that the proposed scheme delivers a superior performance compared to both traditional buffered and bufferless methods.
在本文中,我们提出一种新的分组交换无缓冲片上网络(noc)方案。目标是在提供高性能的同时减少面积和功耗。在该方案中,我们开发了一种新的无缓冲路由算法。大量的周期精确仿真表明,与传统的有缓冲和无缓冲方法相比,所提出的方案具有优越的性能。
{"title":"Express Circuit Switching: Improving the Performance of Bufferless Networks-on-Chip","authors":"Jing Lin, X. Lin","doi":"10.1109/IC-NC.2010.12","DOIUrl":"https://doi.org/10.1109/IC-NC.2010.12","url":null,"abstract":"In this paper, we propose a new scheme for packet-switched bufferless Networks-on-Chip (NoCs). The goal is to reduce the area and power consumption while providing high performance. In the proposed scheme, we develop a new bufferless routing algorithm. Extensive cycle-accurate simulations have been conducted to show that the proposed scheme delivers a superior performance compared to both traditional buffered and bufferless methods.","PeriodicalId":375145,"journal":{"name":"2010 First International Conference on Networking and Computing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134554151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Softassign and EM-ICP on GPU GPU上的软分配和EM-ICP
Pub Date : 2010-11-17 DOI: 10.1109/IC-NC.2010.60
Toru Tamaki, Miho Abe, B. Raytchev, K. Kaneda
In this paper we propose CUDA-based implementations of two 3D point sets registration algorithms: Soft assign and EM-ICP. Both algorithms are known for being time demanding, even on modern multi-core CPUs. Our GPUbased implementations vastly outperform CPU ones. For instance, our CUDA EM-ICP aligns 5000 points in less than 7 seconds on a GeForce 8800GT, while the same implementation in OpenMP on an Intel Core 2 Quad would take 7 minutes.
在本文中,我们提出了两种基于cuda的三维点集配准算法的实现:Soft assign和EM-ICP。这两种算法都以时间要求高而闻名,即使在现代多核cpu上也是如此。我们基于gpu的实现大大优于CPU的实现。例如,在GeForce 8800GT上,我们的CUDA EM-ICP在不到7秒的时间内对齐5000个点,而在Intel Core 2 Quad上的OpenMP中,同样的实现需要7分钟。
{"title":"Softassign and EM-ICP on GPU","authors":"Toru Tamaki, Miho Abe, B. Raytchev, K. Kaneda","doi":"10.1109/IC-NC.2010.60","DOIUrl":"https://doi.org/10.1109/IC-NC.2010.60","url":null,"abstract":"In this paper we propose CUDA-based implementations of two 3D point sets registration algorithms: Soft assign and EM-ICP. Both algorithms are known for being time demanding, even on modern multi-core CPUs. Our GPUbased implementations vastly outperform CPU ones. For instance, our CUDA EM-ICP aligns 5000 points in less than 7 seconds on a GeForce 8800GT, while the same implementation in OpenMP on an Intel Core 2 Quad would take 7 minutes.","PeriodicalId":375145,"journal":{"name":"2010 First International Conference on Networking and Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115423388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
期刊
2010 First International Conference on Networking and Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1