Energy Efficiency Evaluation of Workload Execution on Intel Xeon Phi Coprocessor (English)
- New search for: Zhao, Q.
- New search for: Yang, H.
- New search for: Wei, G.
- New search for: Luan, Z.
- New search for: Qian, D.
- New search for: Zhao, Q.
- New search for: Yang, H.
- New search for: Wei, G.
- New search for: Luan, Z.
- New search for: Qian, D.
- New search for: Yuan, Yuyu
- New search for: Wu, Xu
- New search for: Lu, Yueming
In:
International standard conference on trustworthy computing and services; ISCTS 2013
426
;
268-275
;
2014
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Energy Efficiency Evaluation of Workload Execution on Intel Xeon Phi Coprocessor
-
Contributors:Zhao, Q. ( author ) / Yang, H. ( author ) / Wei, G. ( author ) / Luan, Z. ( author ) / Qian, D. ( author ) / Yuan, Yuyu / Wu, Xu / Lu, Yueming
-
Conference:International standard conference on trustworthy computing and services; ISCTS 2013 ; 2013 ; Beijing
-
Published in:COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE , 426 ; 268-275
-
Publisher:
- New search for: Springer
-
Place of publication:Heidelberg
-
Publication date:2014-01-01
-
Size:8 pages
-
Remarks:Includes bibliographical references and author index, ISCTS 2013
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Security Memory System for Mobile Device or Computer Against Memory AttacksLiu, G. / Zhang, X. / Wang, D. / Liu, Z. / Wang, H. et al. | 2014
- 9
-
Research on Technologies of Software Requirements PrioritizationTong, Z. / Zhuang, Q. / Guo, Q. / Ma, P. et al. | 2014
- 22
-
MD5 Calculation and Decryption Using CUDA on GPUJiang, Y. / Lei, M. et al. | 2014
- 29
-
Transparency and Semantics Coexist: When Malware Analysis Meets the Hardware Assisted VirtualizationWang, G. / Liu, C. / Lin, J. et al. | 2014
- 38
-
Imbalanced Chinese Text Classification Based on Weighted SamplingLi, H. / Zou, P. / Han, W. / Xia, R. et al. | 2014
- 46
-
Hijacking Activity Technology Analysis and Research in Android SystemRen, Y. / Li, Y. / Yuan, F. / Zhang, F. et al. | 2014
- 54
-
A Mobile Botnet Model Based on Android SystemWang, P. / Zhang, C. / Li, X. et al. | 2014
- 62
-
An Improved Common Vulnerability Scoring System Based on K-meansLiu, P. / Tian, Z. / Wu, X. / Liu, W. et al. | 2014
- 70
-
A Design of Linkage Security Defense System Based on HoneypotFeng, G. / Zhang, C. / Zhang, Q. et al. | 2014
- 78
-
A Modified Single-Channel Blind Separation Method Using EMD and ICAWang, J. / Liu, Y. / Chao, Z. / He, W. et al. | 2014
- 86
-
Flexible Mechanism Research of Workflow System Based on SOAWang, S. / Zhang, Y. / Peng, Y. et al. | 2014
- 93
-
Effective Rate Control Algorithm for H.264 Based on Scene Change DetectionGuo, Y. / Sun, S. / Jing, X. / Huang, H. / Lu, Y. / Chen, N. et al. | 2014
- 100
-
Another Improvement of LMAP++: An RFID Authentication ProtocolHuang, A. / Zhang, C. / Tang, C. et al. | 2014
- 107
-
A New Approach to Decrease Invalidate Rate of Weak Consistency Methods in Web Proxy CachingChen, C. / Liu, Q. / Sha, H. / Zhou, Z. / Zheng, C. et al. | 2014
- 115
-
An Anomaly Detection Model Based on Cloud Model and Danger TheoryWang, W. / Zhang, C. / Zhang, Q. et al. | 2014
- 123
-
Generation and Distribution of Decoy Document SystemWang, L. / Li, C. / Tan, Q. / Wang, X. et al. | 2014
- 130
-
Detecting the DGA-Based Malicious Domain NamesZhang, Y. / Xiao, J. et al. | 2014
- 138
-
Microblog Sentiment Classification Based on Supervised and Unsupervised CombinationPei, S. / Zhang, L. / Li, A. / Liu, Y. et al. | 2014
- 146
-
A Prefetching Mechanism Based on MooseFSShi, X. / Ji, Y. / Xie, H. / Lu, Y. et al. | 2014
- 154
-
Improving the Efficiency of Storing SNS Small Files in HDFSZhang, G. / Zuo, M. / Liu, X. / Xia, F. et al. | 2014
- 161
-
A Highly Efficient Indoor Localization Scheme Based Only on Mobile TerminalWu, D. / Li, X. / Sun, Y. / Ji, Y. / Mao, J. / Liu, Y. et al. | 2014
- 169
-
A Zones-Based Metadata Management Method for Distributed File SystemXie, X. / Yang, Y. / Lu, Y. et al. | 2014
- 176
-
Survey on Data Recovery for Cloud StorageShi, X. / Guo, K. / Lu, Y. / Chen, X. et al. | 2014
- 185
-
The Evaluation of Service Trustworthiness Based on BP-Neural NetworkLi, Y. / Gao, Q. / Boegh, J. et al. | 2014
- 191
-
Research on Trustworthy Sensor Network Based on Zigbee TechnologyWang, S. / Boegh, J. / Yang, J. et al. | 2014
- 198
-
Research of Digital Campus Construction Based on Cloud ComputingLu, L. / Shang, Y. / Ge, Y. / Qu, J. et al. | 2014
- 205
-
Multi-layer CAPTCHA Based on Chinese Character DeformationWang, T. / Boegh, J. et al. | 2014
- 212
-
Filtering Training Data When Training Feed-Forward Artificial Neural NetworkMoniz, K. / Yuan, Y. et al. | 2014
- 219
-
Security Risk Assessment of Mobile Internet Under Cloud Computing ModeChen, L. / Guo, Y. / Zhou, F. et al. | 2014
- 227
-
Business Impact Analysis Model Based on the Analytic Hierarchy ProcessGuan, J. / Zhu, X. / Lei, M. / Liu, J. / Wang, C. et al. | 2014
- 235
-
Trust and Trustworthiness in Human Behavior and IT Services - Concepts, Definitions and RelationsBoegh, J. et al. | 2014
- 252
-
A Black-Box Approach for Detecting the Failure TracesMeng, Y. / Yu, L. / Luan, Z. / Qian, D. / Xie, M. / Du, Z. et al. | 2014
- 260
-
An Effective Resource Management Architecture in HSE SystemQiu, S. / Zhang, L. / Huang, Y. / Mao, Y. et al. | 2014
- 268
-
Energy Efficiency Evaluation of Workload Execution on Intel Xeon Phi CoprocessorZhao, Q. / Yang, H. / Wei, G. / Luan, Z. / Qian, D. et al. | 2014
- 276
-
A Covert Channel Bases on CPU Load in Cloud ComputingLiu, Q. / He, Q. / Zhang, Y. et al. | 2014
- 283
-
Adaptive Synchronization of Complex Networks with Time-Varying Delay Nodes and Delay CouplingZhang, Y. / Li, F. et al. | 2014
- 290
-
Gigabit Ethernet Data Transfer Based on FPGAZhou, S. / Yao, L. et al. | 2014
- 297
-
Research on Efficient Dynamic Cloud Storage Ciphertext Access ControlSong, N. / Mei, Z. / Yao, L. et al. | 2014
- 304
-
Research on the Inverted Index Based on Compression and PerceptionSong, N. / Zou, L. / Liu, Y. et al. | 2014
- 311
-
Term Committee Based Event Identification and Dependency DiscoveryZhang, K. / Li, J. / Wu, G. et al. | 2014
- 328
-
A Semantics Enabled Intelligent Semi-structured Document ProcessorZhang, K. / Li, J. / Hong, M. / Yan, X. / Song, Q. et al. | 2014
- 345
-
Introduction and Analysis of Simulators of MapReduceFan, Y. / Wei, W. / Gao, Y. / Wu, W. et al. | 2014
- 351
-
Level Set Method Based Image Segmentation by Combining Local Information with Global InformationYang, C. / Wu, W. / Su, Y. et al. | 2014
- 362
-
Trustworthiness in the Patient Centred Health Care SystemLiu, E. / Feng, X. et al. | 2014
- 366
-
Multidisciplinary Trust Conceptualization: A General Model for Customer Trust Building in e-CommerceAnakpa, M. / Yuan, Y. et al. | 2014
- 374
-
Concept of Service Trustworthiness Management System (STMS)Miandrilala / Yuan, Y. et al. | 2014
- 382
-
Android-Based Remote-Control with Real-Time Video Surveillance for Wi-Fi RobotSong, C. et al. | 2014
- 389
-
Characterizing and Comparing User Location Preference in an Urban Mobile NetworkMei, C. / Zhang, M. / Qi, Z. / Bi, Q. et al. | 2014
- 397
-
Security Testing Approaches - For Research, Industry and StandardizationRennoch, A. / Schieferdecker, I. / Grossmann, J. et al. | 2014