You are currently viewing a new version of our website. To view the old version click .

Algorithms, Volume 15, Issue 7

July 2022 - 35 articles

Cover Story: Conflict detection ensures the correctness of packet classification and has received considerable attention in recent years. However, most conflict detection algorithms are implemented on a CPU. Compared with a CPU, a GPU exhibits higher computing power with parallel computing. In this study, we employed a GPU to develop two efficient algorithms for parallel conflict detection. In the first algorithm, we demonstrate how to perform conflict detection through parallel execution on GPU cores. In the second algorithm, we analyze the critical procedure in conflict detection so as to reduce the number of matches required for each filter. In addition, the second algorithm adopts a workload balance method to enable the load balancing of GPU execution threads, thereby significantly improving performance. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (35)

  • Article
  • Open Access
1 Citations
2,675 Views
15 Pages

LTU Attacker for Membership Inference

  • Joseph Pedersen,
  • Rafael Muñoz-Gómez,
  • Jiangnan Huang,
  • Haozhe Sun,
  • Wei-Wei Tu and
  • Isabelle Guyon

20 July 2022

We address the problem of defending predictive models, such as machine learning classifiers (Defender models), against membership inference attacks, in both the black-box and white-box setting, when the trainer and the trained model are publicly rele...

  • Article
  • Open Access
7 Citations
3,504 Views
27 Pages

Linear Computation Coding: A Framework for Joint Quantization and Computing

  • Ralf Reiner Müller,
  • Bernhard Martin Wilhelm Gäde and
  • Ali Bereyhi

20 July 2022

Here we introduce the new concept of computation coding. Similar to how rate-distortion theory is concerned with the lossy compression of data, computation coding deals with the lossy computation of functions. Particularizing to linear functions, we...

  • Article
  • Open Access
6 Citations
3,447 Views
14 Pages

20 July 2022

Missing observations in time series will distort the data characteristics, change the dataset expectations, high-order distances, and other statistics, and increase the difficulty of data analysis. Therefore, data imputation needs to be performed fir...

  • Article
  • Open Access
6 Citations
2,810 Views
12 Pages

Adaptive IDS for Cooperative Intelligent Transportation Systems Using Deep Belief Networks

  • Sultan Ahmed Almalki,
  • Ahmed Abdel-Rahim and
  • Frederick T. Sheldon

20 July 2022

The adoption of cooperative intelligent transportation systems (cITSs) improves road safety and traffic efficiency. Vehicles connected to cITS form vehicular ad hoc networks (VANET) to exchange messages. Like other networks and systems, cITSs are tar...

  • Article
  • Open Access
4 Citations
3,688 Views
26 Pages

19 July 2022

Uncertainty quantification has proven to be an indispensable study for enhancing reliability and robustness of engineering systems in the early design phase. Single and multi-fidelity surrogate modelling methods have been used to replace the expensiv...

  • Article
  • Open Access
3 Citations
2,380 Views
13 Pages

19 July 2022

Data mining refers to a variety of techniques in the fields of databases, machine learning and pattern recognition. The intent is to obtain useful patterns and associations from a large collection of data. In this paper we describe extensions to the...

  • Article
  • Open Access
2 Citations
2,829 Views
13 Pages

18 July 2022

The role of multi-parametric magnetic resonance imaging (mp-MRI) is becoming increasingly important in the diagnosis of the clinical severity of prostate cancer (PCa). However, mp-MRI images usually contain several unaligned 3D sequences, such as DWI...

  • Review
  • Open Access
47 Citations
8,007 Views
26 Pages

15 July 2022

In order to provide an accurate and timely response to different types of the attacks, intrusion and anomaly detection systems collect and analyze a lot of data that may include personal and other sensitive data. These systems could be considered a s...

  • Article
  • Open Access
8 Citations
4,863 Views
42 Pages

13 July 2022

The work in this paper is motivated by a recently published article in which the authors developed an efficient two-stage genetic algorithm for a comprehensive model of a flexible job-shop scheduling problem (FJSP). In this paper, we extend the appli...

  • Article
  • Open Access
1 Citations
3,213 Views
26 Pages

13 July 2022

In analysis of problems with parametric spline boundaries that are immersed or inserted into an underlying domain, the discretization on the underlying domain usually does not conform to the inserted boundaries. While the fixed underlying discretizat...

of 4

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Algorithms - ISSN 1999-4893Creative Common CC BY license