首页 > 最新文献

2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery最新文献

英文 中文
A Case Study on Digital Forensics in the Cloud 云中的数字取证案例研究
F. Marturana, G. Me, S. Tacconi
Cloud computing and cloud forensics are probably the two most popular and debated IT topics in recent years, implying relevant technological and economic opportunities, the former, and open issues such as the ability to perform digital investigations in the cloud, the latter. In cloud forensics, the distributed nature of data processing in the cloud and the lack of physical access to digital artifacts on the server side represent, indeed, a serious concern for investigators and stakeholders, as traditional approaches to evidence collection and recovery may be no longer applicable. In this paper we discuss technical aspects of digital forensics in cloud computing environments and present results of a case study about user-cloud interaction, aimed at assessing whether existing digital forensics techniques are still applicable to cloud investigations. We conclude proposing a new methodology for automatic cloud-based artifact categorization as a future work.
云计算和云取证可能是近年来最受欢迎和争论的两个IT主题,前者意味着相关的技术和经济机会,后者意味着在云中执行数字调查的能力等开放问题。在云取证中,由于传统的证据收集和恢复方法可能不再适用,因此,云数据处理的分布式性质以及对服务器端数字工件缺乏物理访问,确实是调查人员和利益攸关方严重关切的问题。在本文中,我们讨论了云计算环境中数字取证的技术方面,并介绍了一个关于用户-云交互的案例研究的结果,旨在评估现有的数字取证技术是否仍然适用于云调查。最后,我们提出了一种新的基于云的工件自动分类方法作为未来的工作。
{"title":"A Case Study on Digital Forensics in the Cloud","authors":"F. Marturana, G. Me, S. Tacconi","doi":"10.1109/CyberC.2012.26","DOIUrl":"https://doi.org/10.1109/CyberC.2012.26","url":null,"abstract":"Cloud computing and cloud forensics are probably the two most popular and debated IT topics in recent years, implying relevant technological and economic opportunities, the former, and open issues such as the ability to perform digital investigations in the cloud, the latter. In cloud forensics, the distributed nature of data processing in the cloud and the lack of physical access to digital artifacts on the server side represent, indeed, a serious concern for investigators and stakeholders, as traditional approaches to evidence collection and recovery may be no longer applicable. In this paper we discuss technical aspects of digital forensics in cloud computing environments and present results of a case study about user-cloud interaction, aimed at assessing whether existing digital forensics techniques are still applicable to cloud investigations. We conclude proposing a new methodology for automatic cloud-based artifact categorization as a future work.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126034705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
An Efficient and Flexible Embedded Memory IP Compiler 一种高效灵活的嵌入式内存IP编译器
Ming Chen, B. Na
The efficiency and flexibility of current state-of-the-art memory compilers are often limited due to the heavy dependence on specific circuit structure, which leads to the high recurring design cost and long design cycle. To address these issues systematically, a set of novel design schemes have been proposed in this paper, including a general, scalable memory architecture that is suitable for various memories, an highly efficient layout tiling method based on overlap-distance, an automatic and easy-to-use template expansion scheme using an ASP-style tag language, and a general and accurate timing and power prediction technique based on a piecewise polynomial interpolation algorithm. To verify the effectiveness of these schemes proposed in this paper, a single-port SRAM compiler with the maximum capacity of 1Mb has been developed and taped out successfully in SMIC 65nm process.
当前的内存编译器由于严重依赖特定的电路结构,其效率和灵活性往往受到限制,从而导致重复设计成本高,设计周期长。为了系统地解决这些问题,本文提出了一套新颖的设计方案,包括一种适用于各种存储器的通用可扩展内存架构,一种基于重叠距离的高效布局平铺方法,一种使用asp风格标签语言的自动且易于使用的模板扩展方案,以及一种基于分段多项式插值算法的通用准确定时和功耗预测技术。为了验证本文提出的方案的有效性,开发了一个最大容量为1Mb的单端口SRAM编译器,并在中芯国际65nm工艺下成功地录下。
{"title":"An Efficient and Flexible Embedded Memory IP Compiler","authors":"Ming Chen, B. Na","doi":"10.1109/CyberC.2012.52","DOIUrl":"https://doi.org/10.1109/CyberC.2012.52","url":null,"abstract":"The efficiency and flexibility of current state-of-the-art memory compilers are often limited due to the heavy dependence on specific circuit structure, which leads to the high recurring design cost and long design cycle. To address these issues systematically, a set of novel design schemes have been proposed in this paper, including a general, scalable memory architecture that is suitable for various memories, an highly efficient layout tiling method based on overlap-distance, an automatic and easy-to-use template expansion scheme using an ASP-style tag language, and a general and accurate timing and power prediction technique based on a piecewise polynomial interpolation algorithm. To verify the effectiveness of these schemes proposed in this paper, a single-port SRAM compiler with the maximum capacity of 1Mb has been developed and taped out successfully in SMIC 65nm process.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128420120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Holistic View Angles of Cloud Computing Services Provisions 云计算服务条款的整体视角
C. Oriaku, Ihsam Alshahib Lami
Cloud computing services (CCS) is a modern blend of provisioning technologies and management of resources formed on limited requirements such as accessibility, hypotheses of elasticity and massive deployment. This paradigm offers on-demand IT resources such as applications, networks, services, data, servers and storage that are readily accessible through the Internet. Need for globalisation and collaboration is currently driving the adoption/rollout of cloud technology. Therefore, the current provision of CCS is focused and segmented, addressing explicit concerns according to these needs. This presents challenges for integrated services such as the missing interfaces concerning the diverse attributes of CCS, the required techniques and dependencies for efficient rollout/adoption. This paper proposes 6-view angles necessary for offering CCS, including all their important criteria and categories. These proposed views should help CCS architects and software developers achieve diverse optimised services, enhance these services in relation to communication, power usage, and interfaces that will ease cost and time, make these services desirable and accessible.
云计算服务(CCS)是供应技术和资源管理的现代混合,这些资源是在有限的需求(如可访问性、弹性假设和大规模部署)上形成的。这种模式提供了随需应变的IT资源,如应用程序、网络、服务、数据、服务器和存储,这些都可以通过Internet轻松访问。全球化和协作的需求正在推动云技术的采用和推广。因此,目前的CCS提供是集中和分段的,根据这些需求解决明确的问题。这对集成服务提出了挑战,例如缺少与CCS的各种属性有关的接口、有效推出/采用所需的技术和依赖关系。本文提出了提供CCS所需的6个视角,包括它们的所有重要标准和类别。这些建议的视图应该帮助CCS架构师和软件开发人员实现各种优化服务,在通信、电力使用和接口方面增强这些服务,从而降低成本和时间,使这些服务变得理想和可访问。
{"title":"Holistic View Angles of Cloud Computing Services Provisions","authors":"C. Oriaku, Ihsam Alshahib Lami","doi":"10.1109/CyberC.2012.24","DOIUrl":"https://doi.org/10.1109/CyberC.2012.24","url":null,"abstract":"Cloud computing services (CCS) is a modern blend of provisioning technologies and management of resources formed on limited requirements such as accessibility, hypotheses of elasticity and massive deployment. This paradigm offers on-demand IT resources such as applications, networks, services, data, servers and storage that are readily accessible through the Internet. Need for globalisation and collaboration is currently driving the adoption/rollout of cloud technology. Therefore, the current provision of CCS is focused and segmented, addressing explicit concerns according to these needs. This presents challenges for integrated services such as the missing interfaces concerning the diverse attributes of CCS, the required techniques and dependencies for efficient rollout/adoption. This paper proposes 6-view angles necessary for offering CCS, including all their important criteria and categories. These proposed views should help CCS architects and software developers achieve diverse optimised services, enhance these services in relation to communication, power usage, and interfaces that will ease cost and time, make these services desirable and accessible.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"40 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133196413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hybrid-Priority Configuration Cache Supervision Method for Coarse Grained Reconfigurable Architecture 粗粒度可重构体系结构的混合优先级配置缓存监督方法
Bo Liu, Peng Cao, Jinjiang Yang
Coarse-grained reconfigurable architecture (CGRA) aims to provide satisfying solutions in terms of both efficiency and flexibility. However, to meet the ever increasing performance demand for multimedia applications, the scale of CGRAs should be larger enough to contain more computation resources for higher processing performance. In this paper, we present a hybrid-priority configuration cache supervision approach to optimize the reconfiguration process of large-scale coarse-grained reconfigurable architectures for multimedia applications. By analyzing the reconfiguration features during mapping multimedia applications onto large-scale CGRAs, three types of priority are summarized and adopted to the supervision strategy of hierarchical configuration cache. Taking the H.264 standard as benchmark, the experimental results show that the proposed approach can improve the reconfiguration efficiency of the large-scale CGRAs much, even with reduced configuration cache size.
粗粒度可重构体系结构(CGRA)旨在提供在效率和灵活性方面都令人满意的解决方案。然而,为了满足多媒体应用日益增长的性能需求,CGRAs的规模必须足够大,以包含更多的计算资源,以获得更高的处理性能。本文提出了一种混合优先级配置缓存监督方法,以优化多媒体应用中大规模粗粒度可重构架构的重构过程。通过分析多媒体应用映射到大规模CGRAs时的重构特征,总结出三种优先级,并将其应用到分级配置缓存的监督策略中。以H.264标准为基准,实验结果表明,在减少配置缓存大小的情况下,该方法可以显著提高大规模CGRAs的重构效率。
{"title":"Hybrid-Priority Configuration Cache Supervision Method for Coarse Grained Reconfigurable Architecture","authors":"Bo Liu, Peng Cao, Jinjiang Yang","doi":"10.1109/CyberC.2012.74","DOIUrl":"https://doi.org/10.1109/CyberC.2012.74","url":null,"abstract":"Coarse-grained reconfigurable architecture (CGRA) aims to provide satisfying solutions in terms of both efficiency and flexibility. However, to meet the ever increasing performance demand for multimedia applications, the scale of CGRAs should be larger enough to contain more computation resources for higher processing performance. In this paper, we present a hybrid-priority configuration cache supervision approach to optimize the reconfiguration process of large-scale coarse-grained reconfigurable architectures for multimedia applications. By analyzing the reconfiguration features during mapping multimedia applications onto large-scale CGRAs, three types of priority are summarized and adopted to the supervision strategy of hierarchical configuration cache. Taking the H.264 standard as benchmark, the experimental results show that the proposed approach can improve the reconfiguration efficiency of the large-scale CGRAs much, even with reduced configuration cache size.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133045893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MPI-Based Twi-extraction of Traffic State Evaluation Rules 基于mpi的交通状态评价规则双提取
Yingjie Xia, Yiwen Fang, Zhoumin Ye
Through converting transportation data into some conditional attributes and one decision attribute which constitute the decision table, we use Rough Set theory (RS) to extract rules for traffic state evaluation. This method, named twi-extraction, combines the first extraction by the confidence threshold and the second extraction on the eliminated rules by the matching accuracy. Since the computational intensity is mainly placed onto the attribute significance computation of twi-extraction, Message Passing Interface (MPI) is adopted to parallelize it for acceleration. The experimental results show that by comparing the twi-extraction with the first extraction and pseudo twi-extraction, our MPI-based implementation can achieve both higher matching accuracy and higher computing efficiency.
通过将交通数据转换成若干条件属性和一个决策属性构成决策表,利用粗糙集理论提取交通状态评价规则。该方法将基于置信阈值的第一次规则提取和基于匹配精度的第二次规则提取相结合,称为双提取。由于计算强度主要集中在双提取的属性重要性计算上,因此采用消息传递接口(Message Passing Interface, MPI)对其进行并行化处理以加速。实验结果表明,通过与第一次提取和伪双提取的比较,基于mpi的实现可以获得更高的匹配精度和更高的计算效率。
{"title":"MPI-Based Twi-extraction of Traffic State Evaluation Rules","authors":"Yingjie Xia, Yiwen Fang, Zhoumin Ye","doi":"10.1109/CyberC.2012.10","DOIUrl":"https://doi.org/10.1109/CyberC.2012.10","url":null,"abstract":"Through converting transportation data into some conditional attributes and one decision attribute which constitute the decision table, we use Rough Set theory (RS) to extract rules for traffic state evaluation. This method, named twi-extraction, combines the first extraction by the confidence threshold and the second extraction on the eliminated rules by the matching accuracy. Since the computational intensity is mainly placed onto the attribute significance computation of twi-extraction, Message Passing Interface (MPI) is adopted to parallelize it for acceleration. The experimental results show that by comparing the twi-extraction with the first extraction and pseudo twi-extraction, our MPI-based implementation can achieve both higher matching accuracy and higher computing efficiency.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128769989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Parallel Cloning Simulation of Flood Mitigation Operations in the Upper-Middle Reach of Huaihe River 淮河中上游防洪行动并行克隆模拟
Guoyi Zhang, Minghui Fang, Mingkai Qian, Shijin Xu
Simulation based decision tools have been playing a significant role in the flood mitigation operation, especially for a river network with a large number of flood control structures. However, to evaluate the feasibility of alternative scenarios, decision-makers must repeat executing a simulation, which is a tiresome and time-consuming work. Based upon the technique of simulation cloning, a parallel and progressive incremental simulation cloning (PPISC) approach was proposed in this paper to concurrently analyze alternative scenarios of flood mitigation operations in the upper and middle reach of Huaihe River system. The objective of which was to optimize the simulation execution by avoiding unnecessary repeated computation among multiple associated scenarios. The basic idea of the PPISC was: merging associated scenarios into a compound one and performing the parallel incremental simulation cloning for each compound scenario according to the time sequence of its decision points. Both the theoretical analysis and test results show that the PPISC algorithm has the characteristic of high computational performance and twice more the parallel efficiency than traditional parallel and distributed simulation methods under the same time complexity.
基于仿真的决策工具在防洪调度中发挥着重要的作用,特别是在具有大量防洪设施的河网中。然而,为了评估备选方案的可行性,决策者必须重复执行模拟,这是一项令人厌烦且耗时的工作。基于模拟克隆技术,提出了一种并行渐进式增量模拟克隆(PPISC)方法,对淮河中上游水系防洪调度备选方案进行并行分析。其目的是通过避免多个相关场景之间不必要的重复计算来优化仿真执行。PPISC的基本思想是:将关联的场景合并为复合场景,并根据决策点的时间序列对每个复合场景执行并行增量模拟克隆。理论分析和实验结果表明,在相同时间复杂度下,PPISC算法具有较高的计算性能,并行效率是传统并行和分布式仿真方法的2倍以上。
{"title":"Parallel Cloning Simulation of Flood Mitigation Operations in the Upper-Middle Reach of Huaihe River","authors":"Guoyi Zhang, Minghui Fang, Mingkai Qian, Shijin Xu","doi":"10.1109/CyberC.2012.21","DOIUrl":"https://doi.org/10.1109/CyberC.2012.21","url":null,"abstract":"Simulation based decision tools have been playing a significant role in the flood mitigation operation, especially for a river network with a large number of flood control structures. However, to evaluate the feasibility of alternative scenarios, decision-makers must repeat executing a simulation, which is a tiresome and time-consuming work. Based upon the technique of simulation cloning, a parallel and progressive incremental simulation cloning (PPISC) approach was proposed in this paper to concurrently analyze alternative scenarios of flood mitigation operations in the upper and middle reach of Huaihe River system. The objective of which was to optimize the simulation execution by avoiding unnecessary repeated computation among multiple associated scenarios. The basic idea of the PPISC was: merging associated scenarios into a compound one and performing the parallel incremental simulation cloning for each compound scenario according to the time sequence of its decision points. Both the theoretical analysis and test results show that the PPISC algorithm has the characteristic of high computational performance and twice more the parallel efficiency than traditional parallel and distributed simulation methods under the same time complexity.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116707088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Digital Aggregated Self: A Literature Review 数字聚合自我:文献综述
Lynne Y. Williams, Diane M. Neal
As the Internet rapidly establishes itself as a major communications conduit, growing concern exists about personal privacy issues and the related ownership of personal data. Privacy and personal data may be vulnerable to exposure by unauthorized individuals, by commercial entities wishing to profit from the data, and even by the individual to whom the data pertains. Although fragments of data may not present a privacy issue on their own, data mining and other aggregation methods quickly assemble data to create a considerably more sensitive "whole. " This article presents an examination of aggregated personal data ownership, or "the digital aggregated self, " using a literature review and an ethical argument. We propose that while server owners may possess the disaggregated user data stored on their servers, individuals should hold the rights to their set of aggregated data that is stored throughout the entire network of online servers.
随着互联网迅速成为一种主要的通信渠道,人们对个人隐私问题和个人数据所有权的担忧日益增加。隐私和个人数据可能容易被未经授权的个人、希望从数据中获利的商业实体,甚至是数据所属的个人所暴露。虽然数据片段本身可能不存在隐私问题,但数据挖掘和其他聚合方法可以快速地将数据组装起来,从而创建一个相当敏感的“整体”。本文通过文献综述和伦理论证,对汇总个人数据所有权或“数字汇总自我”进行了考察。我们建议,虽然服务器所有者可能拥有存储在其服务器上的分类用户数据,但个人应该拥有存储在整个在线服务器网络中的汇总数据集的权利。
{"title":"The Digital Aggregated Self: A Literature Review","authors":"Lynne Y. Williams, Diane M. Neal","doi":"10.1109/CyberC.2012.36","DOIUrl":"https://doi.org/10.1109/CyberC.2012.36","url":null,"abstract":"As the Internet rapidly establishes itself as a major communications conduit, growing concern exists about personal privacy issues and the related ownership of personal data. Privacy and personal data may be vulnerable to exposure by unauthorized individuals, by commercial entities wishing to profit from the data, and even by the individual to whom the data pertains. Although fragments of data may not present a privacy issue on their own, data mining and other aggregation methods quickly assemble data to create a considerably more sensitive \"whole. \" This article presents an examination of aggregated personal data ownership, or \"the digital aggregated self, \" using a literature review and an ethical argument. We propose that while server owners may possess the disaggregated user data stored on their servers, individuals should hold the rights to their set of aggregated data that is stored throughout the entire network of online servers.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114209326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Memory Bandwidth Optimization Strategy of Coarse-Grained Reconfigurable Architecture 粗粒度可重构架构的内存带宽优化策略
Peng Cao, Huiyan Jiang, Bo Liu, Weiwei Shan
With the increasingly efficient streaming of multimedia standard and the computational resources in the coarse grained reconfigurable architecture (CGRA), how to provide high data throughput for the CGRA for multimedia application in real time becomes a bottleneck challenge. In this paper, a data reuse method is proposed based on the pre-parsing mechanism of MB information in advance. The pre-parsed information guides the replacement process of the data buffer. By employing the data reuse method, the required bandwidth can be reduced by nearly 50% on average and the CGRA can support 1080p@30fps video decoding at the frequency of 200MHz.
随着多媒体标准流化效率的提高和粗粒度可重构体系结构(CGRA)计算资源的不断增加,如何为多媒体应用提供高数据吞吐量成为当前的瓶颈挑战。本文提出了一种基于MB信息预解析机制的数据重用方法。预先解析的信息指导数据缓冲区的替换过程。采用数据复用的方法,平均减少了近50%的带宽,CGRA可以支持200MHz频率下的1080p@30fps视频解码。
{"title":"Memory Bandwidth Optimization Strategy of Coarse-Grained Reconfigurable Architecture","authors":"Peng Cao, Huiyan Jiang, Bo Liu, Weiwei Shan","doi":"10.1109/CyberC.2012.45","DOIUrl":"https://doi.org/10.1109/CyberC.2012.45","url":null,"abstract":"With the increasingly efficient streaming of multimedia standard and the computational resources in the coarse grained reconfigurable architecture (CGRA), how to provide high data throughput for the CGRA for multimedia application in real time becomes a bottleneck challenge. In this paper, a data reuse method is proposed based on the pre-parsing mechanism of MB information in advance. The pre-parsed information guides the replacement process of the data buffer. By employing the data reuse method, the required bandwidth can be reduced by nearly 50% on average and the CGRA can support 1080p@30fps video decoding at the frequency of 200MHz.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133427307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Configuration Cache Management for Coarse-Grained Reconfigurable Architecture with Multi-Array 基于多阵列的粗粒度可重构架构配置缓存管理
Peng Cao, Yong Cai, Bo Liu, Weiwei Shan
Coarse-Grained Reconfigurable Architectures (CGRAs) can achieve both high performance and flexibility, and CGRAs with multi-array are used to meet the increasing performance requirement of multimedia applications. Meanwhile, the context size also becomes quite large, so many CGRAs use a configuration cache to reduce reconfiguration overhead. However, with high power consumption, configuration cache management is still a challenge. This paper first analyzes context features of media algorithms, and introduces the base hardware architecture. Then a configuration cache management technique is proposed to implement H.264 video decoding on the base architecture. It includes a novel configuration cache structure and a configuration cache replacement algorithm based on Context Sequence Prefetching & Priority (CSPP). The experimental results show that the proposed approach can drastically improve system performance and reduce power consumption. The average configuration cache hit rate of CSPP is 96.83%, the speedup ranges from 64% to 109%, and our approach can support H.264 1080p@30fps decoding at a 200MHz working frequency.
粗粒度可重构体系结构(粗粒度可重构体系结构,CGRAs)可以同时实现高性能和灵活性,并且采用多阵列的CGRAs来满足多媒体应用日益增长的性能要求。同时,上下文大小也变得相当大,因此许多CGRAs使用配置缓存来减少重新配置开销。然而,由于功耗高,配置缓存管理仍然是一个挑战。本文首先分析了媒体算法的上下文特征,介绍了基本硬件结构。在此基础上,提出了一种配置缓存管理技术来实现H.264视频解码。它包括一种新的配置缓存结构和基于上下文序列预取和优先级(CSPP)的配置缓存替换算法。实验结果表明,该方法能显著提高系统性能,降低系统功耗。CSPP的平均配置缓存命中率为96.83%,加速范围为64% ~ 109%,并且我们的方法可以在200MHz工作频率下支持H.264 1080p@30fps解码。
{"title":"Configuration Cache Management for Coarse-Grained Reconfigurable Architecture with Multi-Array","authors":"Peng Cao, Yong Cai, Bo Liu, Weiwei Shan","doi":"10.1109/CyberC.2012.55","DOIUrl":"https://doi.org/10.1109/CyberC.2012.55","url":null,"abstract":"Coarse-Grained Reconfigurable Architectures (CGRAs) can achieve both high performance and flexibility, and CGRAs with multi-array are used to meet the increasing performance requirement of multimedia applications. Meanwhile, the context size also becomes quite large, so many CGRAs use a configuration cache to reduce reconfiguration overhead. However, with high power consumption, configuration cache management is still a challenge. This paper first analyzes context features of media algorithms, and introduces the base hardware architecture. Then a configuration cache management technique is proposed to implement H.264 video decoding on the base architecture. It includes a novel configuration cache structure and a configuration cache replacement algorithm based on Context Sequence Prefetching & Priority (CSPP). The experimental results show that the proposed approach can drastically improve system performance and reduce power consumption. The average configuration cache hit rate of CSPP is 96.83%, the speedup ranges from 64% to 109%, and our approach can support H.264 1080p@30fps decoding at a 200MHz working frequency.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130175883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Protocol for Intrusion Detection Based on Learning Automata in Forwarding Packets for Distributed Wireless Sensor Networks 基于学习自动机的分布式无线传感器网络入侵检测协议
Amirhosein Fathinavid, Amir Bagheri Aghababa
In recent years, wireless technology has enjoyed a tremendous rise in popularity and its usage opens new fields of applications. Due to their possible deployment in remote locations for civil, educational, scientific, military purposes and security which includes intrusion detection and intrusion prevention are of utmost importance. Distributed wireless sensor networks have problems on detecting and preventing malicious nodes which always bring destructive threats and compromise multiple sensor nodes. Therefore, sensor networks need to support an authentication service for sensor identity and message transmission. Furthermore, intrusion detection and prevention schemes are always integrated in sensor security appliances so that they can enhance network security by discovering malicious or compromised nodes. In this paper, we propose an energy-aware protocol for intrusion detection in wireless sensor networks (WSNs). Detection system is implemented based on learning automata concept. We implemented the system in network simulator "GloMoSim". Also we have rigorously evaluated the performance of our proposed solution by performing a variety of experiments and have found our solution approach to be promising.
近年来,无线技术得到了极大的普及,它的使用开辟了新的应用领域。由于它们可能部署在民用、教育、科学、军事目的的偏远地区,包括入侵检测和入侵防御在内的安全至关重要。分布式无线传感器网络在检测和防范恶意节点方面存在问题,恶意节点往往带来破坏性威胁,危及多个传感器节点。因此,传感器网络需要支持一种用于传感器身份和消息传输的认证服务。此外,入侵检测和预防方案总是集成在传感器安全设备中,以便它们可以通过发现恶意或受损节点来增强网络安全性。本文提出了一种用于无线传感器网络入侵检测的能量感知协议。检测系统是基于学习自动机的概念实现的。我们在网络模拟器GloMoSim中实现了该系统。此外,我们通过执行各种实验严格评估了我们提出的解决方案的性能,并发现我们的解决方案很有前途。
{"title":"A Protocol for Intrusion Detection Based on Learning Automata in Forwarding Packets for Distributed Wireless Sensor Networks","authors":"Amirhosein Fathinavid, Amir Bagheri Aghababa","doi":"10.1109/CyberC.2012.69","DOIUrl":"https://doi.org/10.1109/CyberC.2012.69","url":null,"abstract":"In recent years, wireless technology has enjoyed a tremendous rise in popularity and its usage opens new fields of applications. Due to their possible deployment in remote locations for civil, educational, scientific, military purposes and security which includes intrusion detection and intrusion prevention are of utmost importance. Distributed wireless sensor networks have problems on detecting and preventing malicious nodes which always bring destructive threats and compromise multiple sensor nodes. Therefore, sensor networks need to support an authentication service for sensor identity and message transmission. Furthermore, intrusion detection and prevention schemes are always integrated in sensor security appliances so that they can enhance network security by discovering malicious or compromised nodes. In this paper, we propose an energy-aware protocol for intrusion detection in wireless sensor networks (WSNs). Detection system is implemented based on learning automata concept. We implemented the system in network simulator \"GloMoSim\". Also we have rigorously evaluated the performance of our proposed solution by performing a variety of experiments and have found our solution approach to be promising.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134214691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1