A hybrid MPI/OpenMP parallel implementation of NSGA-II for finding patterns in protein sequences
Since the late 1970s, when the first DNA-based genome was sequenced, the field of biology is experiencing a significant growth in the amount of data that needs to be processed. Long ago it became impractical to analyze all this information manually, ...
Task scheduling for heterogeneous computing systems
Efficient scheduling of tasks in heterogeneous computing systems is of primary importance for high-performance execution of programs. The programs are to be considered as multiple sequences of tasks that are presented as directed acyclic graphs (DAG). ...
Multi-query processing of XML data streams on multicore
The multicore architecture has been the norm for all computing systems in recent years as it provides the CPU-level support of parallelism. However, existing algorithms for processing XML streams do not fully take advantage of the facility since they ...
Energy consumption reduction for asynchronous message-passing applications
It is widely accepted that the asynchronous parallel methods are more suitable than the synchronous ones on a grid architecture. Indeed, they outperform the synchronous methods, because they overlap the communications of the synchronous methods with ...
Multi-cache resizing via greedy coordinate descent
To reduce power consumption in CPUs, researchers have studied dynamic cache resizing. However, existing techniques only resize a single cache within a uniprocessor or the shared last-level cache (LLC) within a multi-core CPU. To maximize benefits, it is ...
ATSDS: adaptive two-stage deadline-constrained workflow scheduling considering run-time circumstances in cloud computing environments
A significant aspect of cloud computing is scheduling of a large number of real-time concurrent workflow instances. Most of the existing scheduling algorithms are designed for a single complex workflow instance. This study examined instance-intensive ...
Hardware coprocessors for high-performance symmetric cryptography
This work presents two hardware coprocessors for high-performance symmetric cryptographic algorithms. Two algorithms have been implemented, that is, Advanced Encryption Standard Algorithm and International Data Encryption Algorithm, using two different ...
Estimating the processing time of a model of cloud computing
In recent years, cloud services have been used not only as storage but also to increase computational power. Cloud computing systems perform computations using distributed computation across a large number of computers connected to the Internet. ...
A quantitative measure of the information leaked from queries to search engines and a scheme to reduce it
In recent years, the opportunity to use search engines has increased due to the greater variety and number of Internet-capable devices. Search engines have become indispensable for many users, who provide vast amounts of information as input. However, ...
Performance modeling and optimization of parallel LU-SGS on many-core processors for 3D high-order CFD simulations
As a typical Gauss---Seidel method, the inherent strong data dependency of lower-upper symmetric Gauss---Seidel (LU-SGS) poses tough challenges for shared-memory parallelization. On early multi-core processors, the pipelined parallel LU-SGS approach ...
Leveraging irrevocability to deal with signature saturation in hardware transactional memory
In hardware transactional memory, signatures have been proposed to keep track of memory locations accessed in a transaction to help conflict detection. Generally, signatures are implemented as Bloom filters that suffer from aliasing, that is, they can ...
Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues
The incessant spurt of research activities to augment capabilities of resource-constrained mobile devices by leveraging heterogeneous cloud resources has created a new research impetus called mobile cloud computing. However, this rapid relocation to the ...
Reliable and energy efficient topology control in probabilistic Wireless Sensor Networks via multi-objective optimization
In Wireless Sensor Networks (WSNs) instead of using the possible network connectivity to its maximum extent, a deliberate choice must be made to restrict the topology of the network. Constructing a virtual backbone network using Connected Dominating ...
Moving metadata from ad hoc files to database tables for robust, highly available, and scalable HDFS
As a representative large-scale data management technology, Apache Hadoop is an open-source framework for processing a variety of data such as SNS, medical, weather, and IoT data. Hadoop largely consists of HDFS, MapReduce, and YARN. Among them, we ...
Identifying fake feedback in cloud trust management systems using feedback evaluation component and Bayesian game model
Cloud computing trust management has become an important subject in recent years. Trust management is a difficult and complicated work in cloud computing due to features such as distributed, dynamic and non-transparent environment. Since most trust ...
A low-overhead soft---hard fault-tolerant architecture, design and management scheme for reliable high-performance many-core 3D-NoC systems
The Network-on-Chip (NoC) paradigm has been proposed as a favorable solution to handle the strict communication requirements between the increasingly large number of cores on a single chip. However, NoC systems are exposed to the aggressive scaling down ...
SLA-based task scheduling algorithms for heterogeneous multi-cloud environment
Service-level agreement (SLA) is a major issue in cloud computing because it defines important parameters such as quality of service, uptime, downtime, period of service, pricing, and security. However, the service may vary from one cloud service ...
Privacy in cloud computing environments: a survey and research challenges
Definitely, cloud computing represents a real evolution in the IT world that provides many advantages for both providers and users. This new paradigm includes several services that allow data storage and processing. However, outsourcing data to the ...
Efficient representation of higher-dimensional arrays by dimension transformations
Array operations are important for large number of scientific and engineering applications. Two-dimensional array operations are prominent in these applications because of their simplicity and good performance. But in practical applications, the number ...
Development of a hybrid parallel MCV-based high-order global shallow-water model
Utilization of high-order spatial discretizations is an important trend in developing global atmospheric models. As a competitive choice, the multi-moment constrained volume (MCV) method can achieve high accuracy while maintaining similar parallel ...