Asset Search
Displaying assets 1 - 30 of 277 in total.
-
Description Single line nets of the logical workflow net in Fig. 2b
Article Title: Soundness Analytics of Composed Logical Workflow Nets
Publication Title: International Journal of Parallel Programming -
Description Total no. of used physical servers during the whole experimental period (12 h)
Article Title: Migration Cost and Energy-Aware Virtual Machine Consolidation Under Cloud Environments Considering Remaining Runtime
Publication Title: International Journal of Parallel Programming -
Description Histogram of the number of candidates needed to get a solution
Article Title: Memory Tampering Attack on Binary GCD Based Inversion Algorithms
Publication Title: International Journal of Parallel Programming -
Description Different k for DoS_DS
Article Title: An Intrusion Detection Framework Based on Hybrid Multi-Level Data Mining
Publication Title: International Journal of Parallel Programming -
Description Three situations of given two finite sequences x=(x1,x2)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy}...
Article Title: Against Signed Graph Deanonymization Attacks on Social Networks
Publication Title: International Journal of Parallel Programming -
Description Accuracy (%) comparisons of HMLD and some prior works
Article Title: An Intrusion Detection Framework Based on Hybrid Multi-Level Data Mining
Publication Title: International Journal of Parallel Programming -
Description Memory occupied by each graph using CSR, CuSha-CW, WolfPath
Article Title: WolfPath: Accelerating Iterative Traversing-Based Graph Processing Algorithms on GPU
Publication Title: International Journal of Parallel Programming -
Description Number of iterations executed by different systems and total execution times (ms)
Article Title: WolfPath: Accelerating Iterative Traversing-Based Graph Processing Algorithms on GPU
Publication Title: International Journal of Parallel Programming -
Description The total CPU cost and execution time
Article Title: A Novel Auction-Based Query Pricing Schema
Publication Title: International Journal of Parallel Programming -
Description Closeness distribution and their K–S test. a Facebook, b Wiki, c synthetic graph, d K–S test
Article Title: Against Signed Graph Deanonymization Attacks on Social Networks
Publication Title: International Journal of Parallel Programming -
Description Two logical workflow nets with same structure
Article Title: Soundness Analytics of Composed Logical Workflow Nets
Publication Title: International Journal of Parallel Programming -
Description Characteristics of multiplier layout
Article Title: Float-Fix: An Efficient and Hardware-Friendly Data Type for Deep Neural Network
Publication Title: International Journal of Parallel Programming -
Description Overall system architecture of proposed storage schema selection policy in Spark. Our implementation modules are highlighted as shaded boxes
Article Title: A Dependency-Aware Storage Schema Selection Mechanism for In-Memory Big Data Computing Frameworks
Publication Title: International Journal of Parallel Programming -
Description Latency-throughput comparison with single-flit packet size. a Uniform. b Shuffle. c Bitrev. d Transpose
Article Title: HARE: History-Aware Adaptive Routing Algorithm for Endpoint Congestion in Networks-on-Chip
Publication Title: International Journal of Parallel Programming -
Description How the change of K of HYB affects the SpMV performance
Article Title: Optimizing Sparse Matrix–Vector Multiplications on an ARMv8-based Many-Core Architecture
Publication Title: International Journal of Parallel Programming -
Description The CPU cost and execution time
Article Title: A Novel Auction-Based Query Pricing Schema
Publication Title: International Journal of Parallel Programming -
Description The timing correlations for guessing one of the AES key bytes, depending on the amount of measurements. The correct key (blue) becomes distinguishable at around 65,000 measurements (Color figure...
Article Title: : A False Dependency Attack Against Constant-Time Crypto Implementations
Publication Title: International Journal of Parallel Programming -
Description RDMA-based message format
Article Title: Improving the Performance of Distributed MXNet with RDMA
Publication Title: International Journal of Parallel Programming -
Description BEEA inputs and output example when tampering p using (3)
Article Title: Memory Tampering Attack on Binary GCD Based Inversion Algorithms
Publication Title: International Journal of Parallel Programming -
Description The comparison of the ABDM and the MIX
Article Title: Analysis for Behavioral Economics in Social Networks: An Altruism-Based Dynamic Cooperation Model
Publication Title: International Journal of Parallel Programming -
Description Notations
Article Title: ElasticActor: An Actor System with Automatic Granularity Adjustment
Publication Title: International Journal of Parallel Programming -
Description Original hash implementation
Article Title: Register-Aware Optimizations for Parallel Sparse Matrix–Matrix Multiplication
Publication Title: International Journal of Parallel Programming -
Description DeepLab training trace for different algorithms
Article Title: Training Deep Nets with Progressive Batch Normalization on Multi-GPUs
Publication Title: International Journal of Parallel Programming -
Description Different k for Probe_DS
Article Title: An Intrusion Detection Framework Based on Hybrid Multi-Level Data Mining
Publication Title: International Journal of Parallel Programming -
Description A sparse matrix and its CSR format
Article Title: Register-Aware Optimizations for Parallel Sparse Matrix–Matrix Multiplication
Publication Title: International Journal of Parallel Programming -
Description Characteristics of convertors layout
Article Title: Float-Fix: An Efficient and Hardware-Friendly Data Type for Deep Neural Network
Publication Title: International Journal of Parallel Programming -
Description Real world graphs used in the experiments
Article Title: WolfPath: Accelerating Iterative Traversing-Based Graph Processing Algorithms on GPU
Publication Title: International Journal of Parallel Programming -
Description The definitions of five labels
Article Title: An Intrusion Detection Framework Based on Hybrid Multi-Level Data Mining
Publication Title: International Journal of Parallel Programming -
Description An overview of different routing design for footprint which uses current VC info and HARE which uses all previous info about VC allocation. a Footprint. b HARE
Article Title: HARE: History-Aware Adaptive Routing Algorithm for Endpoint Congestion in Networks-on-Chip
Publication Title: International Journal of Parallel Programming -
Description Comparison between BSHIFT with state-of-the-art accelerators
Article Title: BSHIFT: A Low Cost Deep Neural Networks Accelerator
Publication Title: International Journal of Parallel Programming
Displaying assets 1 - 30 of 277 in total.