Learn More
Content Delivery Networks (CDN) play an important role in today's video distribution system. While its advantage of efficient content delivery is well understood, the energy consumption of the video CDN system needs to be understood since energy saving recently has become a key challenge for the system designers and operators. This paper investigates the(More)
We designed and implemented an algorithm for conducting bioinformatic sequence comparisons with GPU processing. The input is a set of short " test " sequences and a set of longer " reference " sequences. The algorithm determines where along any of the reference sequences the test sequences may align. We compared run-times of the GPU implementation with a(More)
S ecurity is often described as a weak-link phenomenon. Ken Thompson in his 1983 Turing Award Lecture [3] described how a compiler could be modified to plant a Trojan horse into the system's login authentication program so that it would accept a known password. In addition, the C compiler could be altered to propagate this change when it was recompiled from(More)
  • 1