173 Hits in 10.3 sec

Avoiding Algorithmic Obfuscation in a Message-Driven Parallel MD Code [chapter]

James C. Phillips, Robert Brunner, Aritomo Shinozaki, Milind Bhandarkar, Neal Krawetz, Attila Gursoy, Laxmikant Kalé, Robert D. Skeel, Klaus Schulten
1999 Lecture Notes in Computational Science and Engineering  
In order to avoid obfuscation of the simulation algorithm by the parallel framework, the algorithm associated with a patch is encapsulated by a single function executing in a separate thread.  ...  The execution of compute objects takes place in a prioritized message-driven manner, allowing maximum overlap of work and communication without significant programmer effort.  ...  from the complex logic of a message-driven parallel code.  ... 
doi:10.1007/978-3-642-58360-5_28 fatcat:ek7yeejkbjfy3lmc4csj7ssrqi

Gaming security by obscurity [article]

Dusko Pavlovic
2012 arXiv   pre-print
In fact, modern cryptography goes even further than Shannon or Kerckhoffs in tacitly assuming that *if there is an algorithm that can break the system, then the attacker will surely find that algorithm  ...  This view is still endorsed in cryptography.  ...  The task of obfuscation is to transform a program representation so that the obfuscated program runs roughly the same as the original one, but that the original code (or some secrets built into it) cannot  ... 
arXiv:1109.5542v4 fatcat:i5k7csvk5jbsna7yy3f77r3734

Scalable molecular dynamics with NAMD

James C. Phillips, Rosemary Braun, Wei Wang, James Gumbart, Emad Tajkhorshid, Elizabeth Villa, Christophe Chipot, Robert D. Skeel, Laxmikant Kalé, Klaus Schulten
2005 Journal of Computational Chemistry  
NAMD is a parallel molecular dynamics code designed for high-performance simulation of large biomolecular systems.  ...  The motivations for and a roadmap to the internal design of NAMD, implemented in Cϩϩ and based on Charmϩϩ parallel objects, are outlined.  ...  Acknowledgments The NAMD source code has been written, revised, and extended by many talented individuals, including (in alphabetical order) Milind Bhandarkar, Robert Brunner, Christophe Chipot, Andrew  ... 
doi:10.1002/jcc.20289 pmid:16222654 pmcid:PMC2486339 fatcat:ltac7t3jtrbkngvn33tkmemmta

On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques

Arezou Soltani Panah, Ron Van Schyndel, Timos Sellis, Elisa Bertino
2016 IEEE Access  
For example, a loose definition of robustness might be in terms of the resilience of a watermark against normal host data operations, and of invisibility as resilience of the data interpretation against  ...  With the aid of a few examples of watermarking applications, we demonstrate these distinctions and we look at the latest research in this regard to make our argument clear and more meaningful.  ...  After encrypting the message and possibly appending a error correction code, it is converted into a perturbation code to be hidden in the original shape.  ... 
doi:10.1109/access.2016.2570812 fatcat:2xxteahvprepzekaqqbbyey7hi

An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends

Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb
2021 IEEE Access  
This closed-design paradigm has limited the capability of the switches to proprietary implementations which are hard-coded by vendors, inducing a lengthy, costly, and inflexible process.  ...  Despite the impressive advantages of programmable data plane switches and their importance in modern networks, the literature has been missing a comprehensive survey.  ...  Additionally, the signaling protocol and multicast algorithm are hard coded in the router, which reduces flexibility in building and managing the tree.  ... 
doi:10.1109/access.2021.3086704 fatcat:2jgbxj2cbfbp7fawkxwrztbbia

An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends [article]

Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb
2021 arXiv   pre-print
Despite the impressive advantages of programmable data plane switches and their importance in modern networks, the literature has been missing a comprehensive survey.  ...  Recently, data plane programmability has attracted significant attention from both the research community and the industry, permitting operators and programmers in general to run customized packet processing  ...  Additionally, the signaling protocol and multicast algorithm are hard coded in the router, which reduces flexibility in building and managing the tree.  ... 
arXiv:2102.00643v2 fatcat:izxi645kozdc5ibfsqp2y2foau

Proposal for a Standard Format for Neurophysiology Data Recording and Exchange

Matt Stead, Jonathan J. Halford
2016 Journal of clinical neurophysiology  
The lack of interoperability between information networks is a significant source of cost in healthcare.  ...  parallel processing; (3) efficient and flexible lossy or lossless data compression; (4) industry standard multi-layered data encryption and time obfuscation which permits sharing of human data without  ...  In keeping with this requirement, care has been taken with the MEF3 library code to maintain thread safety, meaning that the code only manipulates the format data structures in a manner that guarantees  ... 
doi:10.1097/wnp.0000000000000257 pmid:26808620 pmcid:PMC4956586 fatcat:wrqakcpjhbe5vhebcxqpmumkae

Privacy Management of Multi User Environment in Online Social Networks (OSNs)

P. Amrutha
2013 IOSR Journal of Computer Engineering  
These OSNs provides digital social interactions and social as well as personal information sharing, but in sharing a number of security and privacy problems raised.  ...  To this end, we propose an approach to enable the protection of shared data associated with multiple users in OSNs.  ...  In case a requestor sends the obfuscated data package to a third party the same process, described above, applies.  ... 
doi:10.9790/0661-1320107 fatcat:rdpsdcqelbbzvkg5rm4og4tzba

An Empirical Study on System Level Aspects of Internet of Things (IoT)

Narasimha Swamy S, Kota Solomon Raju
2020 IEEE Access  
This condition usually occurs when there is a rebooting and no idea on about state of the receiving node. The code represents the message type of the request and response messages.  ...  The RTPS message format is shown in Figure 25 (A), and it consists of a leading header and a variable number of sub-messages.  ... 
doi:10.1109/access.2020.3029847 fatcat:5nprx4xtbjfnnkyibk6vbeg47m

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
The information in this document reflects only the author's views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose.  ...  Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section  ...  Encryption and Authentication TinySec uses a block cipher algorithm for its encryption scheme that is also used for the message authentication code (MAC) resulting in greater code efficiency.  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

Sensor Networks for High-Confidence Cyber-Physical Systems

Feng Xia, Tridib Mukherjee, Yan Zhang, Ye-Qiong Song
2011 International Journal of Distributed Sensor Networks  
., cyber-physical coupling driven by new demands and applications) give rise to a lot of open challenges for design and deployment of sensor networks in such systems.  ...  The performance of this algorithm is analyzed with a number of simulations based on data set obtained in urban roadway.  ...  Acknowledgments The work described in this paper was supported by a Acknowledgments The authors would like to thank the reviewers for their detailed comments that have helped to improve the quality  ... 
doi:10.1155/2011/245734 fatcat:lswungc2orda5pcqvpyqu7vrna

Evil Offspring - Ransomware and Crypto Technology

Hilarie Orman
2016 IEEE Internet Computing  
message, ransomware can avoid the reliance on a single public key.  ...  ., Suite 320, Rockville, MD 20850 (Attn: A. Jindal).  ...  A Ph.D. in computer science or a closely related area is required.  ... 
doi:10.1109/mic.2016.90 fatcat:v5zmzx7qrba5dkqxweoo3ifvry

A topological data analytic approach for discovering biophysical signatures in protein dynamics

Wai Shing Tang, Gabriel Monteiro da Silva, Henry Kirveslahti, Erin Skeens, Bibo Feng, Timothy Sudijono, Kevin K. Yang, Sayan Mukherjee, Brenda Rubenstein, Lorin Crawford, Petras J Kundrotas
2022 PLoS Computational Biology  
Algorithmically, SINATRA Pro works by first taking in the 3D atomic coordinates for each protein snapshot and summarizing them according to their underlying topology.  ...  These results highlight SINATRA Pro as a promising method for facilitating the non-trivial task of pattern recognition in trajectories resulting from molecular dynamics simulations, with substantially  ...  Acknowledgments A majority of this research was conducted using computational resources and services at the Center for Computation and Visualization (CCV), Brown University.  ... 
doi:10.1371/journal.pcbi.1010045 pmid:35500014 pmcid:PMC9098046 fatcat:fmkw26c4sndd3a5o7ewifern2u

Enterprise Tools for Data Forensics [chapter]

Zlatan Moric, Jasmin Redzepagic, Frano Gatti
2021 DAAAM Proceedings  
These can be applied for different functions in the forensic processes. Competencies and knowledge are often outsourced in most organizations.  ...  There will always be a demand for data forensics procedures, and it will only increase as IT develops.  ...  MD5) is used in digital forensics. It creates 128-bit message digests and is free to use. • Secure hash algorithm (SHA-0. SHA-1, SHA-224, SHA-256, SHA-384, SHA-512).  ... 
doi:10.2507/32nd.daaam.proceedings.014 fatcat:3lez6ca4czdarew5xuuht6o3pe

From the Web of Data to a World of Action

Alan Dix, Giorgos Lepouras, Akrivi Katifori, Costas Vassilakis, Tiziana Catarci, Antonella Poggi, Yannis Ioannidis, Miguel Mora, Ilias Daradimos, Nazihah Md. Akim, Shah Rukh Humayoun, Fabio Terella
2010 Social Science Research Network  
t, and a prototype desktop application On Time, and the paper discusses how the components could be more fully, yet more openly, linked in terms of both architecture and interaction.  ...  ; spreading activation over personal ontologies, to allow modelling of context; algorithms for automatically inferring 'typing' of web-form input data based on previous user inputs; and early work on inferring  ...  This has influenced algorithm design throughout. For example, in Snip!t, the use of triggered recognisers was partly driven by this consideration.  ... 
doi:10.2139/ssrn.3199492 fatcat:l4yxdle47zfdfc4tguhsmnh72e
« Previous Showing results 1 — 15 out of 173 results