Results 41 to 50 of about 5,314 (170)

Hardware Security in the Connected World

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee   +4 more
wiley   +1 more source

Mpisee: Communicator‐Centric Profiling of MPI Applications

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 15-17, 25 July 2025.
ABSTRACT mpisee is a lightweight profiling tool designed to track MPI communication operations per communicator, providing fine‐grained insights into MPI applications that use communicators to partition MPI communication. While existing profiling tools offer valuable information, they may limit detailed analysis and optimization for such MPI ...
Ioannis Vardas   +3 more
wiley   +1 more source

BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
Cloud computing technology offers flexible and expedient services that carry a variety of profits for both societies as well as individuals. De-duplication techniques were developed to minimize redundant data in the cloud storage.
M. Pavithra, M. Prakash, V. Vennila
doaj   +1 more source

A Study of Energy and Locality Effects using Space-filling Curves [PDF]

open access: yes, 2016
The cost of energy is becoming an increasingly important driver for the operating cost of HPC systems, adding yet another facet to the challenge of producing efficient code. In this paper, we investigate the energy implications of trading computation for
Jahre, Magnus   +2 more
core   +1 more source

A comprehensive survey on software‐defined networking for smart communities

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 1, 10 January 2025.
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary   +3 more
wiley   +1 more source

The Cost of Address Translation

open access: yes, 2012
Modern computers are not random access machines (RAMs). They have a memory hierarchy, multiple cores, and virtual memory. In this paper, we address the computational cost of address translation in virtual memory.
Jurkiewicz, Tomasz, Mehlhorn, Kurt
core   +1 more source

Batched ranged random integer generation

open access: yesSoftware: Practice and Experience, Volume 55, Issue 1, Page 155-169, January 2025.
Summary Pseudorandom values are often generated as 64‐bit binary words. These random words need to be converted into ranged values without statistical bias. We present an efficient algorithm to generate multiple independent uniformly‐random bounded integers from a single uniformly‐random binary word, without any bias.
Nevin Brackett‐Rozinsky, Daniel Lemire
wiley   +1 more source

Machine Learning Meets Encrypted Search: The Impact and Efficiency of OMKSA in Data Security

open access: yesInternational Journal of Intelligent Systems, Volume 2025, Issue 1, 2025.
The convergence of machine learning and searchable encryption enhances the ability to protect the privacy and security of data and enhances the processing power of confidential data. To enable users to efficiently perform machine learning tasks on encrypted data domains, we delve into oblivious keyword search with authorization (OKSA).
Zhongkai Wei   +6 more
wiley   +1 more source

Online fountain code with an improved caching mechanism

open access: yesIET Communications, Volume 18, Issue 20, Page 1813-1825, December 2024.
By catching some selected encoded symbols discarded in the original online fountain codes and giving an optimal degree selection strategy of encoded symbols, the proposed online fountain code improves the receiving rules of the encoded symbols. The proposed online codes outperform the state‐of‐art online fountain codes in terms of overhead factors ...
Yin Zhang   +7 more
wiley   +1 more source

Extending the Nested Parallel Model to the Nested Dataflow Model with Provably Efficient Schedulers

open access: yes, 2016
The nested parallel (a.k.a. fork-join) model is widely used for writing parallel programs. However, the two composition constructs, i.e. "$\parallel$" (parallel) and "$;$" (serial), are insufficient in expressing "partial dependencies" or "partial ...
Dinh, David   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy