Accurate analysis of HPC storage system designs is contingent on the use of I/O workloads that are truly representative of expected use. However, I/O analyses are generally bound ...
Shane Snyder, Philip H. Carns, Robert Latham, Misb...
The ability to record and replay program execution helps significantly in debugging non-deterministic MPI applications by reproducing message-receive orders. However, the large a...
Abstract— We study simulation of underwater communications using acoustic signals impaired by attenuation and multipath propagation. Attenuation is sensitive to the sourcereceive...
Jie Huang, Michel Barbeau, Stephane Blouin, Craig ...
— The multi-armed bandit (MAB) problem has been an active area of research since the early 1930s. The majority of the literature restricts attention to i.i.d. or Markov reward pr...
Prokopis C. Prokopiou, Peter E. Caines, Aditya Mah...
Abstract— Side Channel Attacks (SCA) using power measurements are a known method of breaking cryptographic algorithms such as AES. Published research into attacks on AES frequent...
— Sparse representation-based classifier (SRC), which represents a test sample with a linear combination of training samples, has shown promise in pattern classification. Howev...
—In this paper we propose a hybrid LDO regulator and switching regulator circuit design that uses an LDO regulator instead of a switching regulator to operate in light load. By m...
—This paper presents the design and implementation of an e-health smart networked system. The system is aimed to prevent delays in the arrival of patients’ medical information ...
Mohammad S. Jassas, Abdullah A. Qasem, Qusay H. Ma...
Abstract— In this paper, we investigate the hardware implementation of four different, but similar, lightweight block ciphers: PRESENT, Piccolo, PRINTcipher and LED. The purpose ...