Hong Kong Baptist University

Displaying 1-16 of 16 results

  • White Papers // Sep 2013

    A Measurement Study of GPU DVFS on Energy Conservation

    Energy conservation on computing systems has become an important research topic in recent years. Dynamic Voltage/Frequency Scaling (DVFS) has been shown as an appealing method for saving energy. Now-a-days, GPUs have been widely used to accelerate many high performance computing applications. However, there is a lack of study on the...

    Provided By Hong Kong Baptist University

  • White Papers // Mar 2013

    Constructing Connected-Dominating-Set With Maximum Lifetime in Cognitive Radio Networks

    Connected-Dominating-Set (CDS) is a representative technique for constructing virtual backbones of wireless networks and thus facilitates implementation of many tasks including broadcasting, routing, etc. Most of existing works on CDS aim at constructing the Minimum CDS (MCDS), so as to reduce the communication overhead over the CDS. However, MCDS may...

    Provided By Hong Kong Baptist University

  • White Papers // Feb 2013

    Multiple Radios for Effective Rendezvous in Cognitive Radio Networks

    Rendezvous is a fundamental operation in Cognitive Radio Networks (CRNs) for establishing a communication link on a commonly-available channel between cognitive users. The existing works on rendezvous implicitly assume that each cognitive user is equipped with one radio (i.e., one wireless transceiver). As the cost of wireless transceivers is dropping,...

    Provided By Hong Kong Baptist University

  • White Papers // Sep 2012

    Speeding Up K-Means Algorithm by GPUs

    Cluster analysis plays a critical role in a wide variety of applications; but it is now facing the computational challenge due to the continuously increasing data volume. Parallel computing is one of the most promising solutions to overcoming the computational challenge. In this paper, the authors target at parallelizing k-means,...

    Provided By Hong Kong Baptist University

  • White Papers // Aug 2012

    Capacity Management of Vehicle-to-Grid System for Power Regulation Services

    Due to green initiatives adopted in many countries, renewable energy will be massively incorporated into the future smart grid. However, the intermittency of the renewables may result in power imbalance, thus adversely affecting the stability of a power system. Voltage regulation may be used to maintain the power balance at...

    Provided By Hong Kong Baptist University

  • White Papers // Jul 2012

    Tsunami: Massively Parallel Homomorphic Hashing on Many-Core GPUs

    In recent years, Peer-To-Peer (P2P) distributed systems such as file sharing application (e.g., BitTorrent) and multimedia streaming applications (e.g., ppLive, ppStream), have become the killer Internet applications. Erasure coding and network coding are very promising mechanisms to improve the performance of such P2P applications. However, P2P applications with coding techniques...

    Provided By Hong Kong Baptist University

  • White Papers // Feb 2012

    Maximizing Lifetime of Connected-Dominating-Set in Cognitive Radio Networks

    Connected-Dominating-Set (CDS) is a representative technique for constructing a virtual backbone of wireless networks. Most of existing works on CDS aim at minimizing the size of the CDS, i.e., constructing the Minimum CDS (MCDS), so as to reduce the communication overhead over the CDS. However, MCDS may not work well...

    Provided By Hong Kong Baptist University

  • White Papers // Jun 2011

    Ring-Walk Rendezvous Algorithms for Cognitive Radio Networks

    Rendezvous in cognitive radio networks is the process that cognitive users meet and establish a communication link on a commonly available channel, so that consequent information exchange and data communications can be accomplished on the channel. In this paper, the authors propose two Ring-Walk (RW) rendezvous algorithms to solve the...

    Provided By Hong Kong Baptist University

  • White Papers // Nov 2010

    Processing Private Queries Over Untrusted Data Cloud Through Privacy Homomorphism

    Query processing that preserves both the data privacy of the owner and the query privacy of the client is a new research problem. It shows increasing importance as cloud computing drives more businesses to outsource their data and querying services. However, most existing studies, including those on data outsourcing, address...

    Provided By Hong Kong Baptist University

  • White Papers // May 2010

    GPUMP: A Multiple-Precision Integer Library for GPUs

    Public-key encryption plays a critical role in the users' daily life. The core component of a public-key system is a set of multiple-precision integer operations. Multiple-precision integer operations are key components of many security applications; but unfortunately they are computationally expensive on contemporary CPUs. In this paper, the authors present...

    Provided By Hong Kong Baptist University

  • White Papers // Mar 2010

    A Hybrid Approach for Generating Secure and Discriminating Face Template

    Biometric template protection is one of the most important issues in deploying a practical biometric system. To tackle this problem, many algorithms, that do not store the template in its original form, have been reported in recent years. They can be categorized into two approaches, namely biometric cryptosystem and transform-based....

    Provided By Hong Kong Baptist University

  • White Papers // Dec 2009

    Accelerating Network Coding on Many-Core GPUs and Multi-Core CPUs

    Network coding has recently been widely applied in various distributed systems for throughput improvement and/or resilience to network dynamics. However, the computational overhead introduced by network coding operations is not negligible and has become the obstacle for practical deployment of network coding. In this paper, the authors exploit the computing...

    Provided By Hong Kong Baptist University

  • White Papers // May 2009

    Fault-Tolerant Algorithms/Protocols in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have wide variety of applications and provide limitless future potentials. Nodes in WSNs are prone to be failure due to energy depletion, hardware failure, communication link errors, malicious attack, and so on. Therefore, fault tolerance is one of the critical issues in WSNs. The chapter investigates...

    Provided By Hong Kong Baptist University

  • White Papers // Jan 2009

    Financial Astrology: Mapping The Presidential Election Cycle In US Stock Markets

    This paper shows that in the almost four decades from January 1965 through to December 2003, US stock prices closely followed the four-year Presidential Election Cycle: in general, stock prices fell during the first half of a Presidency, reached a trough in the second year, rose during the second half...

    Provided By Hong Kong Baptist University

  • White Papers // Dec 2008

    Practical Random Linear Network Coding on GPUs

    Random linear network coding has recently been widely applied in peer-to-peer networks and wireless networks in order to enhance the system throughput and robustness. Such systems are prone to pollution attacks because a single polluted data packet from a malicious peer will be encoded with other genuine data packets and...

    Provided By Hong Kong Baptist University

  • White Papers // Nov 2008

    International Expansion Through Symbiosis, The Case Of Chinese Enterprises In Foreign Countries

    This paper studies an important characteristic of ethnic Chinese firms in terms of their international expansion, i.e., expansion through symbiosis. Based on research, especially that of transaction-cost economics and resources dependence theory, this paper proposes an integrative theoretical model explaining the symbiotic strategy adopted by the Chinese firms. It is...

    Provided By Hong Kong Baptist University

  • White Papers // Nov 2010

    Processing Private Queries Over Untrusted Data Cloud Through Privacy Homomorphism

    Query processing that preserves both the data privacy of the owner and the query privacy of the client is a new research problem. It shows increasing importance as cloud computing drives more businesses to outsource their data and querying services. However, most existing studies, including those on data outsourcing, address...

    Provided By Hong Kong Baptist University

  • White Papers // Nov 2008

    International Expansion Through Symbiosis, The Case Of Chinese Enterprises In Foreign Countries

    This paper studies an important characteristic of ethnic Chinese firms in terms of their international expansion, i.e., expansion through symbiosis. Based on research, especially that of transaction-cost economics and resources dependence theory, this paper proposes an integrative theoretical model explaining the symbiotic strategy adopted by the Chinese firms. It is...

    Provided By Hong Kong Baptist University

  • White Papers // May 2009

    Fault-Tolerant Algorithms/Protocols in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have wide variety of applications and provide limitless future potentials. Nodes in WSNs are prone to be failure due to energy depletion, hardware failure, communication link errors, malicious attack, and so on. Therefore, fault tolerance is one of the critical issues in WSNs. The chapter investigates...

    Provided By Hong Kong Baptist University

  • White Papers // Jun 2011

    Ring-Walk Rendezvous Algorithms for Cognitive Radio Networks

    Rendezvous in cognitive radio networks is the process that cognitive users meet and establish a communication link on a commonly available channel, so that consequent information exchange and data communications can be accomplished on the channel. In this paper, the authors propose two Ring-Walk (RW) rendezvous algorithms to solve the...

    Provided By Hong Kong Baptist University

  • White Papers // Feb 2012

    Maximizing Lifetime of Connected-Dominating-Set in Cognitive Radio Networks

    Connected-Dominating-Set (CDS) is a representative technique for constructing a virtual backbone of wireless networks. Most of existing works on CDS aim at minimizing the size of the CDS, i.e., constructing the Minimum CDS (MCDS), so as to reduce the communication overhead over the CDS. However, MCDS may not work well...

    Provided By Hong Kong Baptist University

  • White Papers // Aug 2012

    Capacity Management of Vehicle-to-Grid System for Power Regulation Services

    Due to green initiatives adopted in many countries, renewable energy will be massively incorporated into the future smart grid. However, the intermittency of the renewables may result in power imbalance, thus adversely affecting the stability of a power system. Voltage regulation may be used to maintain the power balance at...

    Provided By Hong Kong Baptist University

  • White Papers // Jul 2012

    Tsunami: Massively Parallel Homomorphic Hashing on Many-Core GPUs

    In recent years, Peer-To-Peer (P2P) distributed systems such as file sharing application (e.g., BitTorrent) and multimedia streaming applications (e.g., ppLive, ppStream), have become the killer Internet applications. Erasure coding and network coding are very promising mechanisms to improve the performance of such P2P applications. However, P2P applications with coding techniques...

    Provided By Hong Kong Baptist University

  • White Papers // Mar 2013

    Constructing Connected-Dominating-Set With Maximum Lifetime in Cognitive Radio Networks

    Connected-Dominating-Set (CDS) is a representative technique for constructing virtual backbones of wireless networks and thus facilitates implementation of many tasks including broadcasting, routing, etc. Most of existing works on CDS aim at constructing the Minimum CDS (MCDS), so as to reduce the communication overhead over the CDS. However, MCDS may...

    Provided By Hong Kong Baptist University

  • White Papers // Feb 2013

    Multiple Radios for Effective Rendezvous in Cognitive Radio Networks

    Rendezvous is a fundamental operation in Cognitive Radio Networks (CRNs) for establishing a communication link on a commonly-available channel between cognitive users. The existing works on rendezvous implicitly assume that each cognitive user is equipped with one radio (i.e., one wireless transceiver). As the cost of wireless transceivers is dropping,...

    Provided By Hong Kong Baptist University

  • White Papers // Dec 2009

    Accelerating Network Coding on Many-Core GPUs and Multi-Core CPUs

    Network coding has recently been widely applied in various distributed systems for throughput improvement and/or resilience to network dynamics. However, the computational overhead introduced by network coding operations is not negligible and has become the obstacle for practical deployment of network coding. In this paper, the authors exploit the computing...

    Provided By Hong Kong Baptist University

  • White Papers // Dec 2008

    Practical Random Linear Network Coding on GPUs

    Random linear network coding has recently been widely applied in peer-to-peer networks and wireless networks in order to enhance the system throughput and robustness. Such systems are prone to pollution attacks because a single polluted data packet from a malicious peer will be encoded with other genuine data packets and...

    Provided By Hong Kong Baptist University

  • White Papers // Mar 2010

    A Hybrid Approach for Generating Secure and Discriminating Face Template

    Biometric template protection is one of the most important issues in deploying a practical biometric system. To tackle this problem, many algorithms, that do not store the template in its original form, have been reported in recent years. They can be categorized into two approaches, namely biometric cryptosystem and transform-based....

    Provided By Hong Kong Baptist University

  • White Papers // Jan 2009

    Financial Astrology: Mapping The Presidential Election Cycle In US Stock Markets

    This paper shows that in the almost four decades from January 1965 through to December 2003, US stock prices closely followed the four-year Presidential Election Cycle: in general, stock prices fell during the first half of a Presidency, reached a trough in the second year, rose during the second half...

    Provided By Hong Kong Baptist University

  • White Papers // Sep 2012

    Speeding Up K-Means Algorithm by GPUs

    Cluster analysis plays a critical role in a wide variety of applications; but it is now facing the computational challenge due to the continuously increasing data volume. Parallel computing is one of the most promising solutions to overcoming the computational challenge. In this paper, the authors target at parallelizing k-means,...

    Provided By Hong Kong Baptist University

  • White Papers // May 2010

    GPUMP: A Multiple-Precision Integer Library for GPUs

    Public-key encryption plays a critical role in the users' daily life. The core component of a public-key system is a set of multiple-precision integer operations. Multiple-precision integer operations are key components of many security applications; but unfortunately they are computationally expensive on contemporary CPUs. In this paper, the authors present...

    Provided By Hong Kong Baptist University

  • White Papers // Sep 2013

    A Measurement Study of GPU DVFS on Energy Conservation

    Energy conservation on computing systems has become an important research topic in recent years. Dynamic Voltage/Frequency Scaling (DVFS) has been shown as an appealing method for saving energy. Now-a-days, GPUs have been widely used to accelerate many high performance computing applications. However, there is a lack of study on the...

    Provided By Hong Kong Baptist University