Layla A. A. El-Sayed

  • Citations Per Year
Learn More
Embedded systems such as mobile devices are currently ubiquitous. The performance potential of these devices is rapidly improving by incorporating multi-core and GPU technologies, and is rapidly catching up with the workstation platforms. Nevertheless, the heterogeneity of the underlying hardware as well as the low-power constraints severely limit(More)
With the increasing ubiquity of mobile devices with computational capabilities comparable to many personal computers, while at the same time, wireless connectivity is almost available everywhere, researchers started to explore how to make use of that huge amount of potential aggregated computing resources. However, mobile devices still suffer short battery(More)
Matrix factorization is an advanced and efficient technique for recommender systems. Recently, Stochastic Gradient Descent (SGD) method is considered to be one of the most popular techniques for matrix factorization. SGD is a sequential algorithm, which is difficult to be parallelized for large-scale problems. Nowadays, researches focus on efficiently(More)
With the increasing ubiquity of mobile devices with computational capabilities comparable to many personal computers, they became the dominant personal computing devices nowadays. However, mobile devices still suffer short battery life and many of them are not capable of running rich-media, data-intensive and compute-intensive applications. Offloading to(More)
Data Security is the most important issue nowadays. A lot of cryptosystems are introduced to provide security. Public key cryptosystems are the most common cryptosystems used for securing data communication. The common drawback of applying such cryptosystems is the heavy computations which degrade performance of a system. Modular multiplication is the basic(More)
Data Security is the most important issue nowadays. A lot of cryptosystems are introduced to provide security. Public key cryptosystems are the most common cryptosystems used for securing data communication. Modular multiplication is the basic operation of common public key cryptosystems such as RSA, Diffie-Hellman key agreement (DH), ElGamal and ECC. Much(More)
  • 1