top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advanced Parallel Processing Technologies : 5th International Workshop, APPT 2003, Xiamen, China, September 17-19, 2003, Proceedings / / edited by Xingming Zhou, Stefan Jähnichen, Ming Xu, Jiannong Cao
Advanced Parallel Processing Technologies : 5th International Workshop, APPT 2003, Xiamen, China, September 17-19, 2003, Proceedings / / edited by Xingming Zhou, Stefan Jähnichen, Ming Xu, Jiannong Cao
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (XIV, 678 p.)
Disciplina 004.35
Collana Lecture Notes in Computer Science
Soggetto topico Software engineering
Computer hardware
Computer organization
Algorithms
Numerical analysis
Computer science—Mathematics
Software Engineering/Programming and Operating Systems
Computer Hardware
Computer Systems Organization and Communication Networks
Algorithm Analysis and Problem Complexity
Numeric Computing
Discrete Mathematics in Computer Science
ISBN 3-540-39425-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Architecture -- Using Split Queues to Improve the Performance of Parallel Switch -- LEAP: A Data Driven Loop Engine on Array Processor -- A New Architecture of a Fast Floating-Point Multiplier -- A Highly Efficient FC-SAN Based on Load Stream -- A New High-Performance Distributed Shared I/O System -- IA64 Oriented OpenMP Compiler: Design and Implementation of Fortran Front End -- An Alternative Superscalar Architecture with Integer Execution Units Only -- A High Efficiency Distributed Mutual Exclusion Algorithm -- The Security Architecture of the Java Operating System JX – A Security Architecture for Distributed Parallel Computing -- Simultaneous Multithreading Trace Processors -- A VLSI Architecture Design of 1-D DWT -- Overcoming Static Register Pressure for Software Pipelining in the Itanium Architecture -- Separating Data Storage, Data Computation, and Resource Management One from Another in Operating Systems -- A High Performance Design and Implementation of the Virtual Interface Architecture -- A Portable Debugger for PVM / MPI Programs on IA64 Cluster -- Optimization of Asynchronous Volume Replication Protocol -- Predicate Analysis Based on Path Information -- kd-Clos: New No-Blocking Permutation Network -- LilyTask: A Task-Oriented Parallel Computation Model -- A Method of Data Assignment on Heterogeneous Disk System -- Apply Aggregate I/O to Improve Performance of Network Storage Based on IP -- Orthogonal Design Method for Optimal Cache Configuration -- A Probabilistically Correct Election Protocol in Asynchronous Distributed Systems -- Software and Theory -- A Formal Specification and Method for MAS as a Distributed System -- Optimal Fixed Priority Assignment with Limited Priority Levels -- A Proof Assistant for Mobile Processes -- Data Space Fusion Based Approach for Effective Alignment of Computation and Data -- Optimization Parameter Selection by Means of Limited Execution and Genetic Algorithms -- Study on CORBA-Based Load Balance Algorithm -- Parallel Algorithm for Mining Maximal Frequent Patterns -- Design of Cluster Safe File System -- Graph Scaling: A Technique for Automating Program Construction and Deployment in ClusterGOP -- Pattern Classification with Parallel Processing of the Cellular Neural Networks-Based Dynamic Programming -- An Effective Molecular Algorithm for Solving the Satisfiability Problem -- Scheduling Outages in Distributed Environments -- An Improved Parallel Algorithm for Certain Toeplitz Cyclic Tridiagonal Systems on Distributed-Memory Multicomputer -- Generic Programming for Scientific Computing in C++, JavaTM, and C# -- A General Metric of Load Balancing in ?-Range -- Lattice Boltzmann Simulations of Fluid Flows -- Grid and Network -- Design and Research of Strong-Mobile Agent Based Grid’s Architecture -- A Cost-Based Online Scheduling Algorithm for Job Assignment on Computational Grids -- Composition and Automation of Grid Services -- Algorithmic Skeletons for Metacomputing -- Grid Services Performance Tuning in OGSA -- A Transaction Model for Grid Computing -- An Overview of Research on QoS Routing -- A Novel Model and Architecture on NMS – Dynamically Constructed Network Management -- QoS-Driven Multicast Tree Generation Using Genetic Algorithm -- A Scalable Peer-to-Peer Network with Constant Degree -- Symmetric Distributed Server Architecture for Network Management System -- A Distributed Network Management Framework Based on NGI -- Performance Evaluation of Scheme Integrating Mobile IP and NHRP over ATM Networks -- Improving Availability of P2P Storage Systems -- Research and Implementation of Dynamic Web Services Composition -- Call Admission Control for Multimedia CDMA Networks under Imperfect Power Control -- Efficient Data Consistency Schemes in 2-Tier Cellular Networks -- iHOPE: An Intelligent Handoff Protocol for Seamless Multimedia Service in Wireless Network -- Content and Cell Based Predictive Routing (CCPR) Protocol for Mobile Ad Hoc Networks -- A Multiple Access Scheme Using Split and Merge Algorithm for Contention/Reservation-Based Wireless MAC Protocols -- Applied Technologies -- Reconfigurable Cipher Processing Framework and Implementation -- A Dynamic Reconfiguration Platform Based on Distributed Component Technology CCM -- TMO-Based Object Group Framework for Supporting Distributed Object Management and Real-Time Services -- Extendable and Interchangeable Architecture Description of Distributed Systems Using UML and XML -- Dynamics in Hierarchical CSCW Systems -- The Tenure Duty Method (TDM) in the Active Incident Recovery Research -- A Combined Continuous-Time/Discrete-Event Computation Model for Heterogeneous Simulation Systems -- Information Geometry on Modular and Hierarchical Neural Network -- A Novel Speed-Up Algorithm of Fractal Image Compression -- Implementation and Evaluation of a Novel Parallel SAR Imaging Method on Clustering Systems -- Shape Registration Based on Modified Chain Codes -- A Distributed Parallel Resampling Algorithm for Large Images -- Collaborative Supervision of Machine Vision Systems: Breaking a Sequential Bottleneck in the Supervised Learning Process -- Parallel Storing and Querying XML Documents Using Relational DBMS -- A Variable Consistent Server Replication Model for Mobile Database -- Multi-scheduler Concurrency Control for Parallel Database Systems -- Optimal Broadcast Channel for Data Dissemination in Mobile Database Environment -- Global System Image Architecture for Cluster Computing.
Record Nr. UNINA-9910144045103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Software Technologies for Post-Peta Scale Computing [[electronic resource] ] : The Japanese Post-Peta CREST Research Project / / edited by Mitsuhisa Sato
Advanced Software Technologies for Post-Peta Scale Computing [[electronic resource] ] : The Japanese Post-Peta CREST Research Project / / edited by Mitsuhisa Sato
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (317 pages)
Disciplina 004.35
Soggetto topico Computer programming
Programming Techniques
ISBN 981-13-1924-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto JST CREST Post-petascale software project bridging to exascale computing -- ppOpen-HPC/pK-Open-HPC: Application Development Framework with Automatic Tuning (AT) -- Scalable Eigen-analysis Engine for Large-scale Eigenvalue Problems -- System Software for Many-core & Multi-core Architecture -- Highly Productive, High Performance Application Frameworks for Post Petascale Computing -- System Software for Data-intensive Science -- Approaches for Memory-Efficient Communication Library and Runtime Communication Optimization -- A development platform for embedded domain-specific languages -- Xevolver: a user-defined code transformation approach to streamlining legacy code migration -- Numerical Library Based on Hierarchical Domain Decomposition -- Advanced Computing & Optimization Infrastructure for Extremely Large-Scale Graphs on Post Peta-Scale Supercomputers -- Software Technology that Deals with Deeper Memory Hierarchy in Post-petascale Era -- Power Management Framework for Post-Petascale Supercomputers -- Project CASSIA —Framework for Exhaustive and Large-scale Social Simulation— -- GPU Accelerated Language and Communication Support by FPGA.
Record Nr. UNINA-9910350238103321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Techniques for Power, Energy, and Thermal Management for Clustered Manycores / / by Santiago Pagani, Jian-Jia Chen, Muhammad Shafique, Jörg Henkel
Advanced Techniques for Power, Energy, and Thermal Management for Clustered Manycores / / by Santiago Pagani, Jian-Jia Chen, Muhammad Shafique, Jörg Henkel
Autore Pagani Santiago
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (295 pages) : illustrations
Disciplina 004.35
Soggetto topico Electronic circuits
Microprocessors
Electronics
Microelectronics
Circuits and Systems
Processor Architectures
Electronics and Microelectronics, Instrumentation
ISBN 3-319-77479-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Background and Related Work -- System Model -- Experimental Framework -- Thermal Safe Power (TSP) -- Transient and Peak Temperature Computation based on Matrix Exponentials (MatEx) -- Selective Boosting for Multicore Systems (seBoost) -- Energy and Peak Power Efficiency Analysis for Simple Approximation Schemes -- Energy-Efficient Task-to-core Assignment for Homogeneous Clustered Manycores -- Energy-Efficient Task-to-core Assignment for Heterogeneous Clustered Manycores -- Conclusions.
Record Nr. UNINA-9910299942703321
Pagani Santiago  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Natural Computation : 1st international conference, ICNC 2005 : Changsha, China, August 2005 : proceedings / Lipo Wang...[et al.](ed.)
Advances in Natural Computation : 1st international conference, ICNC 2005 : Changsha, China, August 2005 : proceedings / Lipo Wang...[et al.](ed.)
Autore International conference ICNC 2005 : <1. ; : 2005
Pubbl/distr/stampa Berlin [etc.] : Springer, copyr. 2005
Descrizione fisica v. : ill. ; 20 cm
Disciplina 004.35
Collana Lecture notes in computer science
Soggetto topico Informatica -- Congressi -- Changsha -- 2005
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-990002962980203316
International conference ICNC 2005 : <1. ; : 2005  
Berlin [etc.] : Springer, copyr. 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Natural Computation : international conference, ICNC 2006 : Xi'an, China, September 24-28, 2006 : proceedings / Licheng Jiao...[et al.](ed.)
Advances in Natural Computation : international conference, ICNC 2006 : Xi'an, China, September 24-28, 2006 : proceedings / Licheng Jiao...[et al.](ed.)
Autore International conference ICNC 2006 : 2006
Pubbl/distr/stampa Berlin [etc.] : Springer, copyr. 2006
Descrizione fisica v. : ill. ; 24 cm
Disciplina 004.35
Collana Lecture notes in computer science
Soggetto topico Informatica -- Congressi -- Xi'an -- 2006
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-990003105940203316
International conference ICNC 2006 : 2006  
Berlin [etc.] : Springer, copyr. 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in optimization and parallel computing : honorary volume on the occasion of J.B. Rosen's 70th birthday / edited by Panos M. Pardalos
Advances in optimization and parallel computing : honorary volume on the occasion of J.B. Rosen's 70th birthday / edited by Panos M. Pardalos
Autore Pardalos, Panos M.
Pubbl/distr/stampa Amsterdam : North-Holland, 1992
Descrizione fisica xxiv, 316 p. : ill. ; 25 cm.
Disciplina 004.35
Soggetto topico Parallel processing
Rosen, J.B. (Judah Ben), 1922-
ISBN 0444890718
Classificazione AMS 68Q10
CR D.1.3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISALENTO-991000648089707536
Pardalos, Panos M.  
Amsterdam : North-Holland, 1992
Materiale a stampa
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Advances in Parallel and Distributed Processing, and Applications : Advances in parallel & distributed processing, and applications : proceedings from PDPTA'20, CSC'20, MSV'20, and GCC'20 / / Hamid R. Arabnia [and six others], editors
Advances in Parallel and Distributed Processing, and Applications : Advances in parallel & distributed processing, and applications : proceedings from PDPTA'20, CSC'20, MSV'20, and GCC'20 / / Hamid R. Arabnia [and six others], editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (1201 pages)
Disciplina 004.35
Collana Transactions on computational science and computational intelligence
Soggetto topico Parallel processing (Electronic computers)
ISBN 3-030-69984-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Scientific Computing -- CSC 2020 - Program Committee -- Parallel & -- Distributed Processing Techniques and Applications -- PDPTA 2020 - Program Committee -- Modeling, Simulation & -- Visualization Methods -- MSV 2020 - Program Committee -- Grid, Cloud, & -- Cluster Computing -- GCC 2020 - Program Committee -- Contents -- Part I Military and Defense Modeling and Simulation -- Julia and Singularity for High Performance Computing -- 1 Introduction -- 2 The Julia Programming Language -- 2.1 Just-in-Time Compilation -- 2.2 LLVM -- 2.3 Native GPU Support -- 3 Containerization -- 3.1 Differences Between Containers and Virtual Machines -- 3.2 Docker versus Singularity -- 3.3 Singularity and GPUs -- 4 Conclusion -- References -- Trojan Banker Simulation Utilizing Python -- 1 Introduction -- 2 Methodology -- 2.1 Methodology -- 3 Results -- 4 Conclusion -- References -- CovidLock Attack Simulation -- 1 Introduction -- 2 Background and Related Information -- 2.1 Ransomware in the States -- 2.2 Reaction Time -- 3 Overview of the Simulation -- 4 Simulation Methodology -- 5 Comparison to Other Mitigation Methods -- 6 Attack Example -- 7 Conclusion -- References -- The New Office Threat: A Simulation of Watering HoleCyberattacks -- 1 Introduction -- 2 Methodology -- 2.1 Results -- 2.2 Analysis -- 3 Conclusion -- 3.1 Future Research -- References -- Simulation of SYN Flood Attack and Counter-Attack Methods Using Average Connection Times -- 1 Introduction -- 2 Methodology -- 2.1 Results -- 3 Conclusion and Future Work -- References -- Part II Computational Intelligence, Data Science, HPC, Optimization and Applications -- Dielectric Polymer Genome: Integrating Valence-Aware Polarizable Reactive Force Fields and Machine Learning -- 1 Introduction -- 2 Method -- 2.1 Valance-Aware ReaxPQ (ReaxPQ-v) Model.
2.2 Computational Framework and Dataset Generation -- 2.3 Machine-Learning Models -- 3 Results and Discussion -- 3.1 Training Dataset -- 3.2 Predictive Accuracy of Machine Learning -- 4 Conclusion -- References -- A Methodology to Boost Data Science in the Context of COVID-19 -- 1 Introduction -- 2 Literature Review -- 3 Proposing a Data Science Model -- 4 Using the Model -- 5 Conclusions -- References -- Shallow SqueezeNext Architecture Implementation on BlueBox2.0 -- 1 Introduction -- 2 BlueBox2.0 Development Platform -- 2.1 Vision Processor (S32V234) -- 2.2 LS-2084A -- 2.3 Real-Time Multisensors Applications (RTMaps) -- 3 Shallow SqueezeNext Architecture -- 4 Shallow SqueezeNext Deployment -- 5 Results -- 5.1 Shallow SqueezeNext Results -- 5.2 BlueBox2.0 Implementation Results -- 6 Conclusion -- References -- Dark Data: Managing Cybersecurity Challenges and Generating Benefits -- 1 Background -- 2 Introduction -- 3 Collection of Dark Data -- 3.1 Dark and Unstructured Data -- 3.2 Dark Data as a Treasure -- 4 Dark Data Risks -- 4.1 Data Challenges with Dark Data -- 4.2 Turn Dark Data into Active Revenues -- 4.3 Make Dark Data to Work -- 5 Recommendations -- 5.1 Analyzing -- 5.2 Benefits of Analyzing Dark Data -- 5.3 Cybersecurity Monitoring -- 5.4 Analytics Technologies -- 6 Methodology -- 6.1 Dark Data User Activities -- 6.1.1 Using Security Log as an Auditing Tool -- 7 Conclusion -- References -- Implementing Modern Security Solutions for Challenges Faced by Businesses in the Internet of Things (IoT) -- 1 Background -- 2 Introduction -- 2.1 IoT Management -- 3 Challenges -- 3.1 Privacy -- 3.2 Security -- 3.3 Limitations -- 3.4 Connectivity -- 3.5 Requirements -- 3.6 Data Storage -- 3.7 Network -- 3.8 Maintenance -- 4 Recommendations -- 4.1 Risk Assessment -- 4.2 Monitoring -- 4.3 Add Security -- 4.4 Cloud and Gateway Architectures.
5 Methodologies -- 5.1 Segmenting Networks -- 5.2 Secure Hardware -- 5.3 VPN -- 5.4 Virtual Local Area Networks (VLANs) -- 6 Conclusion -- References -- Trusted Reviews: Applying Blockchain Technology to Achieve Trusted Reviewing System -- 1 Introduction -- 2 Literature Review -- 2.1 Reviews and Reputation Systems -- 2.2 Applying Blockchain in Reputation System -- 3 Methodology -- 3.1 Trusted Reviews Model -- 3.2 Data Collection -- 4 System Analysis Results -- 4.1 Quantitative Data Analysis -- 4.2 System Requirements -- 4.3 System Design -- 5 Implementation -- 5.1 Code Snippets -- 5.2 Conclusion and Future Studies -- References -- Large-Scale Parallelization of Lattice QCD on Sunway TaihuLight Supercomputer -- 1 Introduction -- 1.1 Lattice Quantum Chromodynamics -- 1.2 SW26010 Heterogeneous Many-Core Processor -- 1.3 Overview of the Paper -- 2 Lattice QCD Calculation Theory -- 3 Innovations Realized -- 3.1 Data Allocation of CPEs -- 3.2 Parallelization Method Based on Multiple Core Groups -- 3.3 Algorithms and Pseudocodes -- 4 Large-Scale Parallel Experiments and Analysis -- 4.1 Experiment Environments -- 4.2 Experiments, Results, and Analysis -- 5 Conclusions -- References -- Part III Scientific Computing, Modeling and Simulation -- Reverse Threat Modeling: A Systematic Threat Identification Method for Deployed Vehicles -- 1 Introduction -- 2 Background -- 2.1 Threat Analysis and Risk Assessment (TARA) -- 3 Related Work -- 3.1 TARA Methods -- 4 Approach -- 5 Example -- 6 Conclusion -- References -- PRNG-Broker: A High-Performance Broker to Supply Parallel Streams of Pseudorandom Numbers for Large-Scale Simulations -- 1 Introduction -- 2 Random Number Generation -- 2.1 Popular PRNG Algorithms -- 2.2 Transforming Uniformly Distributed PRNs -- 2.3 PRNG Libraries -- 3 The PRNG-Broker -- 3.1 Core of the Broker -- 3.2 Hardware-Aware PRN Generation.
3.3 Libraries and the PRNG-Broker API -- 4 Scientific Data Analyses -- 5 Results and Discussion -- 5.1 Test Beds and Associated Case Studies -- 5.2 Performance of the Case Studies with the PRNG-Broker -- 5.3 Comparative Performance on Different Servers -- 6 Conclusions and Future Work -- References -- Numerical Modeling of a Viscous Incompressible Fluid Flow in a Channel with a Step -- 1 Introduction -- 2 Mathematical Problem -- 3 The Difference Schemes -- 4 Comparison of Results -- 4.1 Effect of Step Height on the Flow -- 5 Conclusion -- References -- Modeling, Simulation, and Verification for Structural Stability and Vibration Reduction of Gantry Robots for Shipyard Welding Automation Using ANSYS Workbench® and Recurdyn® -- 1 Introduction -- 2 Modeling of Three-Axes Cartesian Gantry Robot -- 3 Structural Stability Simulation of Gantry Robot -- 4 Verification for Vibration Reduction of Gantry Robots -- 5 Conclusion -- References -- Long Short-Term Memory Neural Network on the Trajectory Computing of Direct Dynamics Simulation -- 1 Introduction -- 2 Methodology -- 2.1 Prediction-Correction Algorith -- 2.2 Long Short-Term Memory -- 2.3 Model -- 3 Experimental Results -- 4 Conclusion and Future Work -- 5 Acknowledgment -- References -- Evaluating the Effect of Compensators and Load Model on Performance of Renewable and Nonrenewable DGs -- 1 Introduction -- 2 Problem Description -- 2.1 Distributed Generation -- 2.2 Compensators -- 2.3 Load Model of Network -- 2.4 Objective Functions -- 2.5 Technical Index -- 2.6 Economic Index -- 2.7 Environmental Index -- 2.8 Optimization Method -- 2.9 Numerical Results -- 3 Conclusion -- References -- The Caloric Curve of Polymers from the Adaptive Tempering Monte Carlo Method -- 1 Introduction -- 2 Methods -- 3 Results -- 3.1 Parallelization Protocol for the PPy Condensed Phase Analysis.
3.2 PPy Thermodynamic Properties -- 4 Conclusion -- References -- Part IV Scientific Computing, Computational Science, and Applications -- A New Technique of Invariant Statistical Embedding and Averaging in Terms of Pivots for Improvement of Statistical Decisions Under Parametric Uncertainty -- 1 Introduction -- 2 Preliminaries -- 3 Technique of Invariant Statistical Embedding and Averaging in Terms of Pivotal Quantities (ISE& -- APQ) -- 4 Comparison of Statistical Decision Rules -- 5 Example 1 (Quantile Estimation) -- 6 Characterization of Uniformly Non-dominated Decision Rules -- 7 Example 2 (Constructing Shortest-Length Confidence Intervals) -- 8 Example 3 (Constructing Within-Sample Prediction Limits) -- 9 Conclusion -- References -- A Note on the Sensitivity of Generic Approximate Sparse Pseudoinverse Matrix for Solving Linear Least Squares Problems -- 1 Introduction -- 2 Explicit Preconditioned Conjugate Gradient Least Squares Method -- 3 Generic Approximate Sparse Pseudoinverse Scheme -- 4 On Theoretical Estimates for the Sensitivity of the Generic Sparse Approximate Pseudoinverse Matrix -- 5 Numerical Results -- 6 Conclusion -- References -- Undergraduate Research: Bladerunner -- 1 Introduction -- 2 Summary -- 3 Software -- 4 Results (Table 1) -- 4.1 Programming Results -- 5 Conclusion -- Comparison of the IaaS Security Available from the Top Three Cloud Providers -- 1 Introduction -- 2 Related Work -- 3 Background on Security Threats -- 4 Problem Statement and Discussion -- 4.1 Problem 1: Agile Programming -- 4.2 Problem 2: Security Training for Employees -- 4.3 Problem 3: Security Support for Cloud IaaS -- 5 Evaluation -- 5.1 Data Center Locality -- 5.2 Uptime/Availability of Platform -- 5.3 Encryption at Rest -- 5.4 Encryption in Transit -- 5.5 Security Common to Top Three Cloud Platforms -- 6 Recommendations.
6.1 Use Multiple Cloud Providers.
Altri titoli varianti Advances in parallel and distributed processing, and applications
Record Nr. UNISA-996464401503316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Parallel and Distributed Processing, and Applications : Advances in parallel & distributed processing, and applications : proceedings from PDPTA'20, CSC'20, MSV'20, and GCC'20 / / Hamid R. Arabnia [and six others], editors
Advances in Parallel and Distributed Processing, and Applications : Advances in parallel & distributed processing, and applications : proceedings from PDPTA'20, CSC'20, MSV'20, and GCC'20 / / Hamid R. Arabnia [and six others], editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (1201 pages)
Disciplina 004.35
Collana Transactions on computational science and computational intelligence
Soggetto topico Parallel processing (Electronic computers)
ISBN 3-030-69984-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Scientific Computing -- CSC 2020 - Program Committee -- Parallel & -- Distributed Processing Techniques and Applications -- PDPTA 2020 - Program Committee -- Modeling, Simulation & -- Visualization Methods -- MSV 2020 - Program Committee -- Grid, Cloud, & -- Cluster Computing -- GCC 2020 - Program Committee -- Contents -- Part I Military and Defense Modeling and Simulation -- Julia and Singularity for High Performance Computing -- 1 Introduction -- 2 The Julia Programming Language -- 2.1 Just-in-Time Compilation -- 2.2 LLVM -- 2.3 Native GPU Support -- 3 Containerization -- 3.1 Differences Between Containers and Virtual Machines -- 3.2 Docker versus Singularity -- 3.3 Singularity and GPUs -- 4 Conclusion -- References -- Trojan Banker Simulation Utilizing Python -- 1 Introduction -- 2 Methodology -- 2.1 Methodology -- 3 Results -- 4 Conclusion -- References -- CovidLock Attack Simulation -- 1 Introduction -- 2 Background and Related Information -- 2.1 Ransomware in the States -- 2.2 Reaction Time -- 3 Overview of the Simulation -- 4 Simulation Methodology -- 5 Comparison to Other Mitigation Methods -- 6 Attack Example -- 7 Conclusion -- References -- The New Office Threat: A Simulation of Watering HoleCyberattacks -- 1 Introduction -- 2 Methodology -- 2.1 Results -- 2.2 Analysis -- 3 Conclusion -- 3.1 Future Research -- References -- Simulation of SYN Flood Attack and Counter-Attack Methods Using Average Connection Times -- 1 Introduction -- 2 Methodology -- 2.1 Results -- 3 Conclusion and Future Work -- References -- Part II Computational Intelligence, Data Science, HPC, Optimization and Applications -- Dielectric Polymer Genome: Integrating Valence-Aware Polarizable Reactive Force Fields and Machine Learning -- 1 Introduction -- 2 Method -- 2.1 Valance-Aware ReaxPQ (ReaxPQ-v) Model.
2.2 Computational Framework and Dataset Generation -- 2.3 Machine-Learning Models -- 3 Results and Discussion -- 3.1 Training Dataset -- 3.2 Predictive Accuracy of Machine Learning -- 4 Conclusion -- References -- A Methodology to Boost Data Science in the Context of COVID-19 -- 1 Introduction -- 2 Literature Review -- 3 Proposing a Data Science Model -- 4 Using the Model -- 5 Conclusions -- References -- Shallow SqueezeNext Architecture Implementation on BlueBox2.0 -- 1 Introduction -- 2 BlueBox2.0 Development Platform -- 2.1 Vision Processor (S32V234) -- 2.2 LS-2084A -- 2.3 Real-Time Multisensors Applications (RTMaps) -- 3 Shallow SqueezeNext Architecture -- 4 Shallow SqueezeNext Deployment -- 5 Results -- 5.1 Shallow SqueezeNext Results -- 5.2 BlueBox2.0 Implementation Results -- 6 Conclusion -- References -- Dark Data: Managing Cybersecurity Challenges and Generating Benefits -- 1 Background -- 2 Introduction -- 3 Collection of Dark Data -- 3.1 Dark and Unstructured Data -- 3.2 Dark Data as a Treasure -- 4 Dark Data Risks -- 4.1 Data Challenges with Dark Data -- 4.2 Turn Dark Data into Active Revenues -- 4.3 Make Dark Data to Work -- 5 Recommendations -- 5.1 Analyzing -- 5.2 Benefits of Analyzing Dark Data -- 5.3 Cybersecurity Monitoring -- 5.4 Analytics Technologies -- 6 Methodology -- 6.1 Dark Data User Activities -- 6.1.1 Using Security Log as an Auditing Tool -- 7 Conclusion -- References -- Implementing Modern Security Solutions for Challenges Faced by Businesses in the Internet of Things (IoT) -- 1 Background -- 2 Introduction -- 2.1 IoT Management -- 3 Challenges -- 3.1 Privacy -- 3.2 Security -- 3.3 Limitations -- 3.4 Connectivity -- 3.5 Requirements -- 3.6 Data Storage -- 3.7 Network -- 3.8 Maintenance -- 4 Recommendations -- 4.1 Risk Assessment -- 4.2 Monitoring -- 4.3 Add Security -- 4.4 Cloud and Gateway Architectures.
5 Methodologies -- 5.1 Segmenting Networks -- 5.2 Secure Hardware -- 5.3 VPN -- 5.4 Virtual Local Area Networks (VLANs) -- 6 Conclusion -- References -- Trusted Reviews: Applying Blockchain Technology to Achieve Trusted Reviewing System -- 1 Introduction -- 2 Literature Review -- 2.1 Reviews and Reputation Systems -- 2.2 Applying Blockchain in Reputation System -- 3 Methodology -- 3.1 Trusted Reviews Model -- 3.2 Data Collection -- 4 System Analysis Results -- 4.1 Quantitative Data Analysis -- 4.2 System Requirements -- 4.3 System Design -- 5 Implementation -- 5.1 Code Snippets -- 5.2 Conclusion and Future Studies -- References -- Large-Scale Parallelization of Lattice QCD on Sunway TaihuLight Supercomputer -- 1 Introduction -- 1.1 Lattice Quantum Chromodynamics -- 1.2 SW26010 Heterogeneous Many-Core Processor -- 1.3 Overview of the Paper -- 2 Lattice QCD Calculation Theory -- 3 Innovations Realized -- 3.1 Data Allocation of CPEs -- 3.2 Parallelization Method Based on Multiple Core Groups -- 3.3 Algorithms and Pseudocodes -- 4 Large-Scale Parallel Experiments and Analysis -- 4.1 Experiment Environments -- 4.2 Experiments, Results, and Analysis -- 5 Conclusions -- References -- Part III Scientific Computing, Modeling and Simulation -- Reverse Threat Modeling: A Systematic Threat Identification Method for Deployed Vehicles -- 1 Introduction -- 2 Background -- 2.1 Threat Analysis and Risk Assessment (TARA) -- 3 Related Work -- 3.1 TARA Methods -- 4 Approach -- 5 Example -- 6 Conclusion -- References -- PRNG-Broker: A High-Performance Broker to Supply Parallel Streams of Pseudorandom Numbers for Large-Scale Simulations -- 1 Introduction -- 2 Random Number Generation -- 2.1 Popular PRNG Algorithms -- 2.2 Transforming Uniformly Distributed PRNs -- 2.3 PRNG Libraries -- 3 The PRNG-Broker -- 3.1 Core of the Broker -- 3.2 Hardware-Aware PRN Generation.
3.3 Libraries and the PRNG-Broker API -- 4 Scientific Data Analyses -- 5 Results and Discussion -- 5.1 Test Beds and Associated Case Studies -- 5.2 Performance of the Case Studies with the PRNG-Broker -- 5.3 Comparative Performance on Different Servers -- 6 Conclusions and Future Work -- References -- Numerical Modeling of a Viscous Incompressible Fluid Flow in a Channel with a Step -- 1 Introduction -- 2 Mathematical Problem -- 3 The Difference Schemes -- 4 Comparison of Results -- 4.1 Effect of Step Height on the Flow -- 5 Conclusion -- References -- Modeling, Simulation, and Verification for Structural Stability and Vibration Reduction of Gantry Robots for Shipyard Welding Automation Using ANSYS Workbench® and Recurdyn® -- 1 Introduction -- 2 Modeling of Three-Axes Cartesian Gantry Robot -- 3 Structural Stability Simulation of Gantry Robot -- 4 Verification for Vibration Reduction of Gantry Robots -- 5 Conclusion -- References -- Long Short-Term Memory Neural Network on the Trajectory Computing of Direct Dynamics Simulation -- 1 Introduction -- 2 Methodology -- 2.1 Prediction-Correction Algorith -- 2.2 Long Short-Term Memory -- 2.3 Model -- 3 Experimental Results -- 4 Conclusion and Future Work -- 5 Acknowledgment -- References -- Evaluating the Effect of Compensators and Load Model on Performance of Renewable and Nonrenewable DGs -- 1 Introduction -- 2 Problem Description -- 2.1 Distributed Generation -- 2.2 Compensators -- 2.3 Load Model of Network -- 2.4 Objective Functions -- 2.5 Technical Index -- 2.6 Economic Index -- 2.7 Environmental Index -- 2.8 Optimization Method -- 2.9 Numerical Results -- 3 Conclusion -- References -- The Caloric Curve of Polymers from the Adaptive Tempering Monte Carlo Method -- 1 Introduction -- 2 Methods -- 3 Results -- 3.1 Parallelization Protocol for the PPy Condensed Phase Analysis.
3.2 PPy Thermodynamic Properties -- 4 Conclusion -- References -- Part IV Scientific Computing, Computational Science, and Applications -- A New Technique of Invariant Statistical Embedding and Averaging in Terms of Pivots for Improvement of Statistical Decisions Under Parametric Uncertainty -- 1 Introduction -- 2 Preliminaries -- 3 Technique of Invariant Statistical Embedding and Averaging in Terms of Pivotal Quantities (ISE& -- APQ) -- 4 Comparison of Statistical Decision Rules -- 5 Example 1 (Quantile Estimation) -- 6 Characterization of Uniformly Non-dominated Decision Rules -- 7 Example 2 (Constructing Shortest-Length Confidence Intervals) -- 8 Example 3 (Constructing Within-Sample Prediction Limits) -- 9 Conclusion -- References -- A Note on the Sensitivity of Generic Approximate Sparse Pseudoinverse Matrix for Solving Linear Least Squares Problems -- 1 Introduction -- 2 Explicit Preconditioned Conjugate Gradient Least Squares Method -- 3 Generic Approximate Sparse Pseudoinverse Scheme -- 4 On Theoretical Estimates for the Sensitivity of the Generic Sparse Approximate Pseudoinverse Matrix -- 5 Numerical Results -- 6 Conclusion -- References -- Undergraduate Research: Bladerunner -- 1 Introduction -- 2 Summary -- 3 Software -- 4 Results (Table 1) -- 4.1 Programming Results -- 5 Conclusion -- Comparison of the IaaS Security Available from the Top Three Cloud Providers -- 1 Introduction -- 2 Related Work -- 3 Background on Security Threats -- 4 Problem Statement and Discussion -- 4.1 Problem 1: Agile Programming -- 4.2 Problem 2: Security Training for Employees -- 4.3 Problem 3: Security Support for Cloud IaaS -- 5 Evaluation -- 5.1 Data Center Locality -- 5.2 Uptime/Availability of Platform -- 5.3 Encryption at Rest -- 5.4 Encryption in Transit -- 5.5 Security Common to Top Three Cloud Platforms -- 6 Recommendations.
6.1 Use Multiple Cloud Providers.
Altri titoli varianti Advances in parallel and distributed processing, and applications
Record Nr. UNINA-9910506407403321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in parallel computing technologies and applications
Advances in parallel computing technologies and applications
Autore Hemanth D. Jude
Edizione [1st ed.]
Pubbl/distr/stampa , : IOS Press, Incorporated, , 2021
Descrizione fisica 1 online resource (450 pages)
Disciplina 004.35
Altri autori (Persone) ElhosenyMohamed
NguyenT. N
Collana Advances in Parallel Computing
Soggetto topico Parallel processing (Electronic computers)
Parallel programming (Computer science)
ISBN 1-64368-219-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Title Page -- Preface -- Contents -- Intrusion Detection System Using Convolutional Neural Network on UNSW NB15 Dataset -- VANET: Trust Evaluation Using Artificial Neural Network -- Auto Question Tagging for Health Care Using Machine Learning Technique -- A Noninvasive Model to Detect Malaria Based on Symptoms Using Machine Learning -- A Contemporary Method on Feature Selection and Classification Using Multi-Model Deep Learning Technique for Identifying Diabetic Retinopathy -- Multilevel Security Biometric Authentication Locking System Using Arduino UNO -- Footstep Power Generating System -- Secure and Privacy Based Home Patient Monitoring Internet of Things (HPMIoT) -- An Efficient Algorithm for Movie Recommendation System -- Person Identification Using Face and Speech Recognition for Visually Challenged with Mask Detection -- Framework for Authentication 802.1X Security Protocol of WNAS as RFC Access Management Device Associated with RFC Authentication Management Technique -- Fog Enabled Cloud Based Heart Rate Monitoring System -- COVID-19: Role of Deep Learning and Cloud Through Identification of Kidney, Pancreas and Intestine -- Energy Efficient Clustering Technique for VANET -- Trust-Based Public Key Management for Data Distribution in Wireless Networks -- Enhanced Handwritten Document Recognition Using Confusion Matrix Analysis -- The Role of AI in Battling Against Covid-19 Crisis in India -- Deep Learning Based Static Analysis of Malwares in Android Applications -- A Comparative Study of Detection and Classification of Emotions on Social Media Using SVM and Naive Bayes Techniques -- Survey on Erythema Migrans, and Basal Cell Carcinoma in Computer-Aided Diagnosis -- Sign Language Translator Using YOLO Algorithm -- Student Performance Prediction Using Machine Learning.
A New Approach for Security in Cloud Data Storage for IOT Applications Using Hybrid Cryptography Technique -- Intelligent Framework for Number Plate Detection and Recognition in Toll Using Image Processing Techniques -- IoT Based Health Monitoring System -- Traffic Monitoring System Using IoT and DL -- Distinct Actions Classification Using Human Action Tracker Technique in Sports Videos -- Smart Wearable System to Assist Asthma Patients -- Covid-19 Sentiment Analysis Using Deep Learning and Machine Learning -- Maize Grain Quality Classification Using Convolutional Neural Network -- Finding State of Mind Through Emotion and Sentiment Analysis of the Twitter Text -- A Novel Dual Encryption Algorithm to Enhance the Security in Image Transmission Using LSB 3-2-2 Technique -- Applications of Object Detection, Brain Tumor Detection and Classification -- Parallel Computing Enabled Cloudd-Based IOT Applications -- A Survey on Securing Medical Data in Cloud Using Blockchain -- Network Lifetime Analysis in IOT Environment in Healthcare Sectors Using Deep Learning Routing Approach -- An Comprehensive Survey on Applications of Precision Agriculture in the Context of Weed Classification, Leave Disease Detection, Yield Prediction and UAV Image Analysis -- IoT Based Shirodhara -- Model for Refactoring a Software Using Feature Oriented Dependency (FOD) -- Automatic Biometric System for Finger Knuckle Using Sparse Encoder Approaches -- Stock Market Prediction Using Machine Learning Techniques -- Smart Surveillance System for Abnormal Activity Detection Using CNN -- Increased Energy Conservation in Internet of Things (IoT) Related Wireless Networking -- Multi-Scale Fish Segmentation Refinement Using Contour Based Segmentation -- Heart Disease Prediction Using Hybrid Random Forest Model Integrated with Linear Model.
Heart Disease Prediction Using Convolutional Neural Network -- Ensuring the Survivablity of the Trekker Using Drone and RFID Technology -- IoT Based Smart Electrolytic Bottle Monitoring -- Smartphone Controlled Fingerprint Door Look System (SCFDLS) -- Effective Cataloging over Diverse Algorithms for Automatic Text Summarization and Its Survey -- Prospective Classification over Various Handwritten Character Recognition Algorithms - A Survey -- E-Society - A Financial and Event Management System -- Subject Index -- Author Index.
Record Nr. UNINA-9910795023703321
Hemanth D. Jude  
, : IOS Press, Incorporated, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in parallel computing technologies and applications
Advances in parallel computing technologies and applications
Autore Hemanth D. Jude
Edizione [1st ed.]
Pubbl/distr/stampa , : IOS Press, Incorporated, , 2021
Descrizione fisica 1 online resource (450 pages)
Disciplina 004.35
Altri autori (Persone) ElhosenyMohamed
NguyenT. N
Collana Advances in Parallel Computing
Soggetto topico Parallel processing (Electronic computers)
Parallel programming (Computer science)
ISBN 1-64368-219-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Title Page -- Preface -- Contents -- Intrusion Detection System Using Convolutional Neural Network on UNSW NB15 Dataset -- VANET: Trust Evaluation Using Artificial Neural Network -- Auto Question Tagging for Health Care Using Machine Learning Technique -- A Noninvasive Model to Detect Malaria Based on Symptoms Using Machine Learning -- A Contemporary Method on Feature Selection and Classification Using Multi-Model Deep Learning Technique for Identifying Diabetic Retinopathy -- Multilevel Security Biometric Authentication Locking System Using Arduino UNO -- Footstep Power Generating System -- Secure and Privacy Based Home Patient Monitoring Internet of Things (HPMIoT) -- An Efficient Algorithm for Movie Recommendation System -- Person Identification Using Face and Speech Recognition for Visually Challenged with Mask Detection -- Framework for Authentication 802.1X Security Protocol of WNAS as RFC Access Management Device Associated with RFC Authentication Management Technique -- Fog Enabled Cloud Based Heart Rate Monitoring System -- COVID-19: Role of Deep Learning and Cloud Through Identification of Kidney, Pancreas and Intestine -- Energy Efficient Clustering Technique for VANET -- Trust-Based Public Key Management for Data Distribution in Wireless Networks -- Enhanced Handwritten Document Recognition Using Confusion Matrix Analysis -- The Role of AI in Battling Against Covid-19 Crisis in India -- Deep Learning Based Static Analysis of Malwares in Android Applications -- A Comparative Study of Detection and Classification of Emotions on Social Media Using SVM and Naive Bayes Techniques -- Survey on Erythema Migrans, and Basal Cell Carcinoma in Computer-Aided Diagnosis -- Sign Language Translator Using YOLO Algorithm -- Student Performance Prediction Using Machine Learning.
A New Approach for Security in Cloud Data Storage for IOT Applications Using Hybrid Cryptography Technique -- Intelligent Framework for Number Plate Detection and Recognition in Toll Using Image Processing Techniques -- IoT Based Health Monitoring System -- Traffic Monitoring System Using IoT and DL -- Distinct Actions Classification Using Human Action Tracker Technique in Sports Videos -- Smart Wearable System to Assist Asthma Patients -- Covid-19 Sentiment Analysis Using Deep Learning and Machine Learning -- Maize Grain Quality Classification Using Convolutional Neural Network -- Finding State of Mind Through Emotion and Sentiment Analysis of the Twitter Text -- A Novel Dual Encryption Algorithm to Enhance the Security in Image Transmission Using LSB 3-2-2 Technique -- Applications of Object Detection, Brain Tumor Detection and Classification -- Parallel Computing Enabled Cloudd-Based IOT Applications -- A Survey on Securing Medical Data in Cloud Using Blockchain -- Network Lifetime Analysis in IOT Environment in Healthcare Sectors Using Deep Learning Routing Approach -- An Comprehensive Survey on Applications of Precision Agriculture in the Context of Weed Classification, Leave Disease Detection, Yield Prediction and UAV Image Analysis -- IoT Based Shirodhara -- Model for Refactoring a Software Using Feature Oriented Dependency (FOD) -- Automatic Biometric System for Finger Knuckle Using Sparse Encoder Approaches -- Stock Market Prediction Using Machine Learning Techniques -- Smart Surveillance System for Abnormal Activity Detection Using CNN -- Increased Energy Conservation in Internet of Things (IoT) Related Wireless Networking -- Multi-Scale Fish Segmentation Refinement Using Contour Based Segmentation -- Heart Disease Prediction Using Hybrid Random Forest Model Integrated with Linear Model.
Heart Disease Prediction Using Convolutional Neural Network -- Ensuring the Survivablity of the Trekker Using Drone and RFID Technology -- IoT Based Smart Electrolytic Bottle Monitoring -- Smartphone Controlled Fingerprint Door Look System (SCFDLS) -- Effective Cataloging over Diverse Algorithms for Automatic Text Summarization and Its Survey -- Prospective Classification over Various Handwritten Character Recognition Algorithms - A Survey -- E-Society - A Financial and Event Management System -- Subject Index -- Author Index.
Record Nr. UNINA-9910824194203321
Hemanth D. Jude  
, : IOS Press, Incorporated, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...