University of Wales, Newport

Displaying 1-10 of 10 results

  • White Papers // Jan 2014

    Towards Autotuning of OpenMP Applications on Multicore Architectures

    In this paper the authors describe an auto-tuning tool for optimization of OpenMP applications on highly multi-core and multithreaded architectures. Their work was motivated by in-depth performance analysis of scientific applications and synthetic benchmarks on IBM Power 775 architecture. The tool provides an automatic code instrumentation of OpenMP parallel regions....

    Provided By University of Wales, Newport

  • White Papers // Nov 2013

    Proofs of Space

    Proofs of Work (PoW) have been suggested by the researchers (Crypto'92) as protection to a shared resource. The basic idea is to ask the service requestor to dedicate some non-trivial amount of computational work to every request. The original applications included prevention of spam and protection against denial of service...

    Provided By University of Wales, Newport

  • White Papers // Nov 2013

    On the Power of Rewinding Simulators in Functional Encryption

    In the recent years, Functional Encryption (FE) has received a lot of attention due to its versatility and unique challenges it poses. In FE, a receiver with secret-key sky can compute from an encryption of x the value F(y; x) for some functionality F. The seminal work of boneh, sahai...

    Provided By University of Wales, Newport

  • White Papers // Sep 2013

    Query Rewriting Based on Meta-Granular Aggregation

    Analytical database queries are exceptionally time consuming. Decision support systems employ various execution techniques in order to accelerate such queries and reduce their resource consumption. Probably the most important of them consists in materialization of partial results. However, any introduction of additional derived objects into the database schema increases the...

    Provided By University of Wales, Newport

  • White Papers // May 2013

    Exploring Heterogeneity of Unreliable Machines for P2p Backup

    P2P architecture is a viable option for enterprise backup. In contrast to dedicated backup servers, nowadays a standard solution, making backups directly on organization's workstations should be cheaper (as existing hardware is used), more efficient (as there is no single bottleneck server) and more reliable (as the machines are geographically...

    Provided By University of Wales, Newport

  • White Papers // Feb 2013

    Performance Analysis of Parallel Applications on Modern Multithreaded Processor Architectures

    In this paper, the authors describe the effort they have made to measure performance of applications and synthetic benchmarks with the use of different Simultaneous Multi-Threading (SMT) modes. This specific processor architecture feature is currently available in many petascale HPC systems worldwide. Both IBM Power7 processors available in Power775 (IH)...

    Provided By University of Wales, Newport

  • White Papers // Feb 2013

    Network Delay-Aware Load Balancing in Selfish and Cooperative Distributed Systems

    The authors consider a geographically distributed request processing system composed of various organizations and their servers connected by the Internet. The latency a user observes is a sum of communication delays and the time needed to handle the request on a server. The handling time depends on the server congestion,...

    Provided By University of Wales, Newport

  • White Papers // Sep 2012

    Efficient Refreshing Protocol for Leakage-Resilient Storage Based on the Inner-Product Extractor

    A recent trend in cryptography is to protect data and computation against various side-channel attacks. Dziembowski and Faust (TCC 2012) have proposed a general way to protect arbitrary circuits against any continual leakage assuming that: the memory is divided into the parts, which leaks independently the leakage in each observation...

    Provided By University of Wales, Newport

  • White Papers // Aug 2012

    Campaign Scheduling

    The authors study the problem of scheduling in parallel systems with many users. They analyze scenarios with many submissions issued over time by several users. These submissions contain one or more jobs; the set of submissions are organized in successive campaigns. Jobs belonging to a single campaign are sequential and...

    Provided By University of Wales, Newport

  • White Papers // Aug 2012

    Revisiting Gossip-Based Ad-Hoc Routing

    The authors focus on a popular message dissemination protocol for wireless ad-hoc networks, GOSSIP3. Their contribution is twofold. First, they perform an extensive experimental evaluation of GOSSIP3 under fully utilized wireless channel and across diverse node densities. They identify the parameters of GOSSIP3 that need special configuration for the protocol...

    Provided By University of Wales, Newport

  • White Papers // Feb 2013

    Network Delay-Aware Load Balancing in Selfish and Cooperative Distributed Systems

    The authors consider a geographically distributed request processing system composed of various organizations and their servers connected by the Internet. The latency a user observes is a sum of communication delays and the time needed to handle the request on a server. The handling time depends on the server congestion,...

    Provided By University of Wales, Newport

  • White Papers // Aug 2012

    Campaign Scheduling

    The authors study the problem of scheduling in parallel systems with many users. They analyze scenarios with many submissions issued over time by several users. These submissions contain one or more jobs; the set of submissions are organized in successive campaigns. Jobs belonging to a single campaign are sequential and...

    Provided By University of Wales, Newport

  • White Papers // May 2013

    Exploring Heterogeneity of Unreliable Machines for P2p Backup

    P2P architecture is a viable option for enterprise backup. In contrast to dedicated backup servers, nowadays a standard solution, making backups directly on organization's workstations should be cheaper (as existing hardware is used), more efficient (as there is no single bottleneck server) and more reliable (as the machines are geographically...

    Provided By University of Wales, Newport

  • White Papers // Aug 2012

    Revisiting Gossip-Based Ad-Hoc Routing

    The authors focus on a popular message dissemination protocol for wireless ad-hoc networks, GOSSIP3. Their contribution is twofold. First, they perform an extensive experimental evaluation of GOSSIP3 under fully utilized wireless channel and across diverse node densities. They identify the parameters of GOSSIP3 that need special configuration for the protocol...

    Provided By University of Wales, Newport

  • White Papers // Sep 2012

    Efficient Refreshing Protocol for Leakage-Resilient Storage Based on the Inner-Product Extractor

    A recent trend in cryptography is to protect data and computation against various side-channel attacks. Dziembowski and Faust (TCC 2012) have proposed a general way to protect arbitrary circuits against any continual leakage assuming that: the memory is divided into the parts, which leaks independently the leakage in each observation...

    Provided By University of Wales, Newport

  • White Papers // Sep 2013

    Query Rewriting Based on Meta-Granular Aggregation

    Analytical database queries are exceptionally time consuming. Decision support systems employ various execution techniques in order to accelerate such queries and reduce their resource consumption. Probably the most important of them consists in materialization of partial results. However, any introduction of additional derived objects into the database schema increases the...

    Provided By University of Wales, Newport

  • White Papers // Nov 2013

    Proofs of Space

    Proofs of Work (PoW) have been suggested by the researchers (Crypto'92) as protection to a shared resource. The basic idea is to ask the service requestor to dedicate some non-trivial amount of computational work to every request. The original applications included prevention of spam and protection against denial of service...

    Provided By University of Wales, Newport

  • White Papers // Nov 2013

    On the Power of Rewinding Simulators in Functional Encryption

    In the recent years, Functional Encryption (FE) has received a lot of attention due to its versatility and unique challenges it poses. In FE, a receiver with secret-key sky can compute from an encryption of x the value F(y; x) for some functionality F. The seminal work of boneh, sahai...

    Provided By University of Wales, Newport

  • White Papers // Feb 2013

    Performance Analysis of Parallel Applications on Modern Multithreaded Processor Architectures

    In this paper, the authors describe the effort they have made to measure performance of applications and synthetic benchmarks with the use of different Simultaneous Multi-Threading (SMT) modes. This specific processor architecture feature is currently available in many petascale HPC systems worldwide. Both IBM Power7 processors available in Power775 (IH)...

    Provided By University of Wales, Newport

  • White Papers // Jan 2014

    Towards Autotuning of OpenMP Applications on Multicore Architectures

    In this paper the authors describe an auto-tuning tool for optimization of OpenMP applications on highly multi-core and multithreaded architectures. Their work was motivated by in-depth performance analysis of scientific applications and synthetic benchmarks on IBM Power 775 architecture. The tool provides an automatic code instrumentation of OpenMP parallel regions....

    Provided By University of Wales, Newport