Probabilistic odd–even: an adaptive wormhole routing algorithm for 2D mesh network-on-chip (English)
- New search for: Hu, Su
- New search for: Xu, Wenzheng
- New search for: Lin, Jing
- New search for: Lin, Xiaola
- New search for: Hu, Su
- New search for: Xu, Wenzheng
- New search for: Lin, Jing
- New search for: Lin, Xiaola
In:
The Journal of Supercomputing
;
70
, 1
; 385-407
;
2014
-
ISSN:
- Article (Journal) / Print
-
Title:Probabilistic odd–even: an adaptive wormhole routing algorithm for 2D mesh network-on-chip
-
Contributors:
-
Published in:The Journal of Supercomputing ; 70, 1 ; 385-407
-
Publisher:
- New search for: Springer US
- New search for: Springer
-
Place of publication:New york, NY
-
Publication date:2014
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 770/3155
- New search for: 54.20
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
Table of contents – Volume 70, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Editorial of special section on Hybrid Information Security Technologies: part IIYeo, Sangsoo / Wang, Shiuh-Jeng et al. | 2014
- 3
-
Secure component composition with modular behavioral propertiesKim, Hyongsoon / Lee, Eunyoung et al. | 2014
- 20
-
Improved deleted file recovery technique for Ext2/3 filesystemLee, Seokjun / Shon, Taeshik et al. | 2014
- 31
-
An anonymous e-rental protocol based on ID-based cryptography and NFCLuo, Jia Ning / Yang, Ming Hour et al. | 2013
- 54
-
Design and analysis of a secure and effective emergency system for mountaineering eventsChen, Chin-Ling / Chen, Yu-Yi / Lee, Cheng-Chi / Wu, Cheng-Hsun et al. | 2013
- 75
-
An efficient mutual authentication RFID scheme based on elliptic curve cryptographyChou, Jue-Sam et al. | 2013
- 95
-
Biclique cryptanalysis of PRESENT-80 and PRESENT-128Lee, Changhoon et al. | 2014
- 104
-
Multilayer cluster designing algorithm for lifetime improvement of wireless sensor networksJabbar, Sohail / Minhas, Abid Ali / Paul, Anand / Rho, Seungmin et al. | 2014
- 133
-
An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architecturesHsieh, Wen-Bin / Leu, Jenq-Shiou et al. | 2014
- 149
-
Secure and reliable electronic record management system using digital forensic technologiesMajore, Sekie Amanuel / Yoo, Hyunguk / Shon, Taeshik et al. | 2014
- 166
-
Secure and efficient high-performance PROOF-based cluster system for high-energy physicsAhn, Sang Un / Yeo, Il Yeon / Park, Sang Oh et al. | 2014
- 177
-
Detection and analysis of secure intelligent universal designated verifier signature scheme for electronic voting systemZuo, Liming / Kumar, Neeraj / Tu, Hang / Singh, Ankit / Chilamkurti, Naveen / Rho, Seungmin et al. | 2014
- 200
-
Updating the trusted connection of re-organized computing resource under the automated system management platformYoon, Heejun / Yeo, Il-Yeon / Kim, Jeong Heon et al. | 2014
- 211
-
A study on security strategy in ICT convergence environmentLee, Chang-Moo / Chang, Hangbae et al. | 2014
- 224
-
An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networksTu, Hang / Kumar, Neeraj / He, Debiao / Kim, Jongsung / Lee, Changhoon et al. | 2014
- 236
-
Converting random bits into random numbersKoo, Bonwook / Roh, Dongyoung / Kwon, Daesung et al. | 2014
- 247
-
Visible watermarking with reversibility of multimedia images for ownership declarationsHsu, Fu-Hau / Wu, Min-Hao / Yang, Cheng-Hsing / Wang, Shiuh-Jeng et al. | 2014
- 269
-
StoryCube: supporting children’s storytelling with a tangible toolWang, Danli / He, Liang / Dou, Keqin et al. | 2013
- 284
-
High performance data clustering: a comparative analysis of performance for GPU, RASC, MPI, and OpenMP implementationsYang, Luobin / Chiu, Steve C. / Liao, Wei-Keng / Thomas, Michael A. et al. | 2013
- 301
-
Modeling computational limitations in H-Phy and Overlay-NoC architecturesZydek, Dawid / Chmaj, Grzegorz / Chiu, Steve et al. | 2013
- 321
-
Microarchitectural performance comparison of Intel Knights Corner and Intel Sandy Bridge with CFD applicationsChe, Yonggang / Zhang, Lilun / Wang, Yongxian / Xu, Chuanfu / Liu, Wei / Wang, Zhenghua et al. | 2014
- 349
-
Performance scalability and energy consumption on distributed and many-core platformsKaranikolaou, E. M. / Milovanović, E. I. / Milovanović, I. Ž. / Bekakos, M. P. et al. | 2014
- 365
-
Distributed generic approximate sparse inversesGravvanis, George A. / Filelis-Papadopoulos, Christos K. et al. | 2014
- 385
-
Probabilistic odd–even: an adaptive wormhole routing algorithm for 2D mesh network-on-chipHu, Su / Xu, Wenzheng / Lin, Jing / Lin, Xiaola et al. | 2014
- 408
-
Cloud computing in e-Science: research challenges and opportunitiesYang, Xiaoyu / Wallom, David / Waddington, Simon / Wang, Jianwu / Shaon, Arif / Matthews, Brian / Wilson, Michael / Guo, Yike / Guo, Li / Blower, Jon D. et al. | 2014
- 465
-
A comparative simulation study on the power–performance of multi-core architectureSaravanan, Vijayalakshmi / Anpalagan, Alagan / Kothari, D. P. / Woungang, Isaac / Obaidat, Mohammad S. / Fellow of IEEE and Fellow of SCS et al. | 2014
- 488
-
Exploiting controlled-grained parallelism in message-driven stream programsSu, Yan / Shi, Feng / Talpur, Shahnawaz / Wei, Jin / Tan, Hai et al. | 2014