- Parallel Computing and Optimization Techniques
- Distributed systems and fault tolerance
- Advanced Data Storage Technologies
- Cloud Computing and Resource Management
- Interconnection Networks and Systems
- Optimization and Search Problems
- Distributed and Parallel Computing Systems
- Caching and Content Delivery
- Smart Grid Security and Resilience
- Software-Defined Networks and 5G
- Green IT and Sustainability
- Network Traffic and Congestion Control
- Air Quality Monitoring and Forecasting
- Advanced Authentication Protocols Security
- Video Surveillance and Tracking Methods
- Multimedia Communication and Technology
- Wireless Networks and Protocols
- Security in Wireless Sensor Networks
- Smart Grid Energy Management
- Algorithms and Data Compression
- Interactive and Immersive Displays
- Energy Efficient Wireless Sensor Networks
- Tactile and Sensory Interactions
- Peer-to-Peer Network Technologies
- Traffic Prediction and Management Techniques
UiT The Arctic University of Norway
2014-2024
Centre for Arctic Gas Hydrate, Environment and Climate
2016-2023
Vietnam National University Ho Chi Minh City
2021-2023
Ho Chi Minh City International University
2023
University of Nebraska–Lincoln
2018-2021
Ho Chi Minh City University of Technology
2021
Chalmers University of Technology
2003-2007
Pohang University of Science and Technology
2004
Smart meters (SMs) are considered as foundational part of the smart metering infrastructure (SMI) in energy networks (SENs). SM is a digital device that makes use two-way communication between consumer and utility to exchange, manage control consumptions within home. However, despite all features, an raises several security-related concerns. For instance, how exchange data legal entities (e.g., server) while maintaining privacy consumer. To address these concerns, authentication key...
The smart home is an environment, where heterogeneous electronic devices and appliances are networked together to provide services in a ubiquitous manner the individuals. As homes become smarter, more complex, technology dependent, need for adequate security mechanism with minimum individual's intervention growing. recent serious attacks have shown how Internet-enabled can be turned into very dangerous spots various ill intentions, thus lead privacy concerns For instance, eavesdropper able...
For preventing malicious nodes joining wireless sensor networks (WSNs), an access control mechanism is necessary for the trustworthy cooperation between nodes. In addition to control, recently, privacy has been important topic regarding how achieve without disclosing real identity of communicating entities in WSNs. Based on elliptic curve cryptography, this paper, we present protocol with node (called ACP) WSN. The proposed scheme not only accomplishes authentication but also provides (i.e.,...
Multicore architectures have established themselves as the new generation of computer architectures. As part one core to many cores evolution, memory access mechanisms advanced rapidly. Several been implemented in modern commodity multicore By specifying how processing shared memory, directly influence synchronization capabilities Therefore, it is crucial investigate power these mechanisms. This paper investigates coalesced accesses, a family introduced recent large such Compute Unified...
Observing an environment is essential to its understanding. This certainly true for the arctic tundra as it extremely sensitive climate change. Satellites are used observe large areas of tundra. However, measurements not at sufficient spatial resolution be determine species animals, and measure humidity, temperature, CO2 levels small areas. Ground-based measurements, which represent less that one percent experiments carried on tundra, must done. Deploying maintaining ground-based instruments...
Shared memory multiprocessor systems typically provide a set of hardware primitives in order to support synchronization. Generally, they single-word read-modify-write such as compare-and-swap, load-linked/store-conditional and fetch-and-op, from which the higher-level synchronization operations are then implemented software. Although conceptually powerful enough synchronization, programmer's point view not useful their generalizations multi-word objects.This paper presents two fast reactive...
Like other fundamental abstractions for high-performance computing, search trees need to support both high concurrency and data locality. However, existing locality-aware based on the van Emde Boas layout (vEB-based trees), poorly concurrent (update) operations.
This paper aims at bridging the gap between lack of synchronization mechanisms in recent graphics processor (GPU) architectures and need parallel applications. Based on intrinsic features GPU architectures, we construct strong objects like wait-free t-resilient read-modify-write for a general model without hardware primitives test-and-set compare-and-swap. Accesses to new have time complexity O(N), where N is number concurrent processes. The space O(N2), which optimal. Our result...
Beacon-enabled IEEE 802.15.4 standard has been widely applied for industrial applications because it can provide contention-free access by using guaranteed time slots (GTSs) in period (CFP) of a super frame. In networks, sensors also request GTSs purpose reliable communication. existing GTS scheduling studies, however, sensor wishing to use send network coordinator. The sending the carrier sense multiple with collision avoidance (CSMA/CA) algorithm fact creates more traffic networks. This...
Reactive spin-lock algorithms that can automatically adapt to contention variation on the lock have received great attention in field of multiprocessor synchronization, since they help applications achieve good performance all possible conditions. However, existing reactive spin-locks reaction relies (i) some fixed experimentally tuned thresholds, which may get frequently inappropriate dynamic environments like multiprogramming/multiprocessor systems, or (ii) known probability distributions...
The energy efficiency of computing systems can be enhanced via power models that provide insights into how the consume power. However, there are no application-general, fine-grained and validated which a given application running on an ultra-low (ULP) embedded system consumes In this study, we devise new ULP system. support architecture-application co-design by considering both platform properties. with data from 35 micro-benchmarks three kernels, namely dense matrix multiplication, sparse...
Air pollution involves multiple health and economic challenges. Its accurate low-cost monitoring is important for developing services dedicated to reduce the exposure of living beings pollution. Particulate matter (PM) measurement sensors belong key components that support operation these systems. In this work, a modular, mobile Internet Things sensor PM measurements has been proposed. Due limited accuracy detector, data are refined using two-stage procedure elimination non-physical signal...
In this paper we examine the general multi-word lock problem, where processes are allowed to multilock arbitrary registers. Aiming for a highly efficient solution propose randomized algorithm which successfully breaks long dependency chains, crucial factor slowing down an execution. analysis focus on 2-word problem and show that in special case execution of our takes with high probability at most time O(Δ3 log n /log n), is number registers Δ maximal interested same register (the...
Modern multiprocessor systems offer advanced synchronization primitives, built in hardware, to support the development of efficient parallel algorithms. In this article, we develop a simple and algorithm, READERSFIELD for atomic registers (variables) arbitrary length. The simplicity better complexity algorithm is achieved via utilization two such common primitives. also experimentally evaluate performance our together with lock-based approaches practical, previously known that based only on...
Recent years have witnessed a rapid increase of public cloud adoption as result the growing user demands and numerous advantages computing. However, great benefits computing come at cost little visibility underlying network resources. Motivated by strong desire users to gain more information resources, in this paper we experimentally study whether current Available Bandwidth Estimation Tools (ABETs) can accurately estimate available bandwidth clouds. We find that ABETs do not work well...
The advent of exascale computing, with the unparalleled rise in scale data Internet Things (IoT), high performance computing (HPC), and big domains, both at center edge system, requires optimal exploitation energy-efficient hardware dedicated for processing. Emerging processing must take advantage advanced concurrent locality-aware algorithms structures order to provide better throughput energy efficiency. Their design be portable their implementation perform equally well on as other...
Like time complexity models that have significantly contributed to the analysis and development of fast algorithms, energy for parallel algorithms are desired as crucial means develop efficient ubiquitous multicore platforms. Ideal should be validated on real platforms applicable a wide range algorithms. However, existing either theoretical without model validation or algorithm-specific ability analyze wide-range This paper presents new general (multithreaded) The abstracts away possible by...
With the rise of Internet Things, end-users expect to obtain data from well-connected smart devices and stations through services being provisioned in distributed architectures. Such could be aggregated a number ways provide third-party applications with sophisticated (e.g., weather coupled soil pollution), resulting growing service offerings requested. Service that have been shortlisted for certain request rainfall particular farming site) need ranked according end-users' preference. level...
Recently, renewed interest has been given to improving energy efficiency of automated home systems for which Zigbee (over IEEE 802.15.4) is a potential technology. The 802.15.4 standard supports both contention-free and contention-based services. Contention-free services can be provided via guaranteed time slots (GTS) in beacon mode. However, directly applying GTS scheduling resource management not efficient network performance. First, the improvement requires adding more bits fields frames...