Browsing Supercomputer Education and Research Centre (SERC) by Title
Now showing items 39-58 of 98
-
Elasticity in IaaS Cloud, Preserving Performance SLAs
(2017-11-14)Infrastructure-as-a-Service(IaaS), one of the service models of cloud computing, provides resources in the form of Virtual Machines(VMs). Many applications hosted on the IaaS cloud have time varying workloads. These kind ... -
Emulating Variable Block Size Caches
(2013-08-02) -
Enhancing GPGPU Performance through Warp Scheduling, Divergence Taming and Runtime Parallelizing Transformations
(2018-08-29)There has been a tremendous growth in the use of Graphics Processing Units (GPU) for the acceleration of general purpose applications. The growth is primarily due to the huge computing power offered by the GPUs and the ... -
An Extension Of Multi Layer IPSec For Supporting Dynamic QoS And Security Requirements
(2013-08-30)Governments, military, corporations, financial institutions and others exchange a great deal of confidential information using Internet these days. Protecting such confidential information and ensuring their integrity and ... -
Fast Identification of Structured P2P Botnets Using Community Detection Algorithms
(2018-05-01)Botnets are a global problem, and effective botnet detection requires cooperation of large Internet Service Providers, allowing near global visibility of traffic that can be exploited to detect them. The global visibility ... -
Fast Solvers and Preconditioning Methods in Computational Electromagnetics
Method of Moments (MoM) is an integral equation based solver and is one of the most popular computational techniques to solve complex 3D Electromagnetic problems efficiently and accurately. Compared to the conventional ... -
Hardware Consolidation Of Systolic Algorithms On A Coarse Grained Runtime Reconfigurable Architecture
(2013-07-10)Application domains such as Bio-informatics, DSP, Structural Biology, Fluid Dynamics, high resolution direction finding, state estimation, adaptive noise cancellation etc. demand high performance computing solutions for ... -
Holistic Source-centric Schema Mappings For XML-on-RDBMS
(2011-09-07) -
Improving The Communication Performance Of I/O Intensive And Communication Intensive Application In Cluster Computer Systems
(2009-04-13)Cluster computer systems assembled from commodity off-the-shelf components have emerged as a viable and cost-effective alternative to high-end custom parallel computer systems.In this thesis, we investigate how scalable ... -
Information Theoretic Approach To Extractive Text Summarization
(2009-04-13)Automatic text summarization techniques, which can reduce a source text to a summary text by content generalization or selection have assumed signifi- cance in recent times due to the ever expanding information explosion ... -
An Integrated Systems Biology Approach to Study Drug Resistance in Mycobacteria
(2018-06-23)Emergence of drug resistance is a major problem in the treatment of many diseases including tuberculosis. To tackle the problem, it is essential to obtain a global perspective of the molecular mechanisms by which bacteria ... -
Intrusion Identification For Mobile Ad Hoc Networks
(2010-08-16)A Mobile Ad Hoc Network (MANETs) is a collection of wireless hosts that can be rapidly deployed as a multi hop packet radio network without the aid of any established infrastructure or centralized administration. Such ... -
Long-Running Multi-Component Climate Applications On Grids
(2013-10-04)Climate science or climatology is the scientific study of the earth’s climate, where climate is the term representing weather conditions averaged over a period of time. Climate models are mathematical models used to ... -
Low Overhead Soft Error Mitigation Methodologies
(2018-03-06)CMOS technology scaling is bringing new challenges to the designers in the form of new failure modes. The challenges include long term reliability failures and particle strike induced random failures. Studies have shown ... -
Malware Analysis using Profile Hidden Markov Models and Intrusion Detection in a Stream Learning Setting
(2018-02-18)In the last decade, a lot of machine learning and data mining based approaches have been used in the areas of intrusion detection, malware detection and classification and also traffic analysis. In the area of malware ... -
Memory Efficient Regular Expression Pattern Matching Architecture For Network Intrusion Detection Systems
(2014-06-05)The rampant growth of the Internet has been coupled with an equivalent growth in cyber crime over the Internet. With our increased reliance on the Internet for commerce, social networking, information acquisition, and ... -
Metascheduling of HPC Jobs in Day-Ahead Electricity Markets
(2018-01-03)High performance grid computing is a key enabler of large scale collaborative computational science. With the promise of exascale computing, high performance grid systems are expected to incur electricity bills that grow ... -
Motion Based Event Analysis
(2018-05-09)Motion is an important cue in videos that captures the dynamics of moving objects. It helps in effective analysis of various event related tasks such as human action recognition, anomaly detection, tracking, crowd behavior ...