期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
A spatially triggered dissipative resource distribution policy for SMT processors 被引量:1
1
作者 Hong-zhou CHEN Xue-zeng PAN +2 位作者 ling-di ping Kui-jun LU Xiao-ping CHEN 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第8期1070-1082,共13页
Programs take on changing behavior at nmtime in a simultaneous multithreading (SMT) environment. How reasonably common resources are distributed among the threads significantly determines the throughput and fairness... Programs take on changing behavior at nmtime in a simultaneous multithreading (SMT) environment. How reasonably common resources are distributed among the threads significantly determines the throughput and fairness performance in SMT processors. Existing resource distribution methods either mainly rely on the front-end fetch policy, or make distribution decisions according to the limited information from the pipeline. It is difficult for them to efficiently catch the various resource requirements of the threads. This work presents a spatially triggered dissipative resource distribution (SDRD) policy for SMT processors, its two parts, the self-organization mechanism that is driven by the real-time instructions per cycle (IPC) performance and the introduction of chaos that tries to control the diversity Of trial resource distributions, work together to supply sustaining resource distribution optimization for changing program behavior. Simulation results show that SDRD with fine-grained diversity controlling is more effective than that with a coarse-grained one. And SDRD benefits much from its two well-coordinated parts, providing potential fairness gains as well as good throughput gains. Meanings and settings of important SDRD parameters are also discussed. 展开更多
关键词 Simultaneous multithreading (SMT) Resource distribution Dynamic optimization Dissipative structures
在线阅读 下载PDF
A recoverable stress testing algorithm for compression and encryption cards
2
作者 Bao-jun ZHANG Xue-zeng PAN +1 位作者 Jie-bing WANG ling-di ping 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第10期1398-1405,共8页
This study proposes a recoverable stress testing algorithm (RSTA) for such special devices as compression/decompression card and encryption/deeryption card. It uses a chaos function to generate a random sequence, an... This study proposes a recoverable stress testing algorithm (RSTA) for such special devices as compression/decompression card and encryption/deeryption card. It uses a chaos function to generate a random sequence, and then, according to the random sequence, generates an effective command sequence. The dispatch of command obeys a special schedule strategy we designed for such devices, i.e., the commands are sent according to the command sequence, and the complete commands are put in a buffer for further result check. RSTA is used to test the HIFN compression acceleration card SAICHI-1000. Test results show that RSTA can make the card work continuously and adequately. 展开更多
关键词 Stress testing Random sequence Chaos function SYNCHRONIZATION CONCURRENCY
在线阅读 下载PDF
An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks 被引量:8
3
作者 Rong FAN Dao-jing HE +1 位作者 Xue-zeng PAN ling-di ping 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2011年第7期550-560,共11页
Wireless sensor networks(WSNs)are vulnerable to security attacks due to their deployment and resource constraints.Considering that most large-scale WSNs follow a two-tiered architecture,we propose an efficient and den... Wireless sensor networks(WSNs)are vulnerable to security attacks due to their deployment and resource constraints.Considering that most large-scale WSNs follow a two-tiered architecture,we propose an efficient and denial-of-service(DoS)-resistant user authentication scheme for two-tiered WSNs.The proposed approach reduces the computational load,since it performs only simple operations,such as exclusive-OR and a one-way hash function.This feature is more suitable for the resource-limited sensor nodes and mobile devices.And it is unnecessary for master nodes to forward login request messages to the base station,or maintain a long user list.In addition,pseudonym identity is introduced to preserve user anonymity.Through clever design,our proposed scheme can prevent smart card breaches.Finally,security and performance analysis demonstrates the effectiveness and robustness of the proposed scheme. 展开更多
关键词 User authentication User anonymity Smart card Two-tiered Wireless sensor network(WSN)
原文传递
Robust lossless data hiding scheme 被引量:2
4
作者 Xian-ting ZENG Xue-zeng PAN +1 位作者 ling-di ping Zhuo LI 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2010年第2期101-110,共10页
This paper presents a robust lossless data hiding scheme. The original cover image can be recovered without any distortion after data extraction if the stego-image remains intact, and conversely, the hidden data can s... This paper presents a robust lossless data hiding scheme. The original cover image can be recovered without any distortion after data extraction if the stego-image remains intact, and conversely, the hidden data can still be extracted correctly if the stego-image goes through JPEG compression to some extent. A cover image is divided into a number of non-overlapping blocks, and the arithmetic difference of each block is calculated. By shifting the arithmetic difference value, we can embed bits into the blocks. The shift quantity and shifting rule are fixed for all blocks, and reversibility is achieved. Furthermore, because the bit-0- and bit-1-zones are separated and the particularity of the arithmetic differences, minor changes applied to the stego-image generated by non-malicious attacks such as JPEG compression will not cause the bit-0- and bit-l-zones to overlap, and robustness is achieved. The new embedding mechanism can enhance embedding capacity and the addition of a threshold can make the al- gorithm more robust. Experimental results showed that, compared with previous schemes, the performance of the proposed scheme is significantly improved. 展开更多
关键词 WATERMARKING Lossless data hiding Reversible data hiding Robust lossless data hiding Semi-fragile authentication
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部