期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Reducing Network Traffic of Token Protocol Using Sharing Relation Cache 被引量:2
1
作者 王海霞 汪东升 +2 位作者 李鹏 王惊雷 李崇民 《Tsinghua Science and Technology》 SCIE EI CAS 2007年第6期691-699,共9页
Token protocol provides a new coherence framework for shared-memory multiprocessor systems. It avoids indirections of directory protocols for common cache-to-cache transfer misses, and achieves higher interconnect ban... Token protocol provides a new coherence framework for shared-memory multiprocessor systems. It avoids indirections of directory protocols for common cache-to-cache transfer misses, and achieves higher interconnect bandwidth and lower interconnect latency compared with snooping protocols. However, the broadcasting increases network traffic, limiting the scalability of token protocol. This paper describes an efficient technique to reduce the token protocol network traffic, called sharing relation cache. This cache provides destination set information for cache-to-cache miss requests by caching directory information for recent shared data. This paper introduces how to implement the technique in a token protocol. Simulations using SPLASH-2 benchmarks show that in a 16-core chip multiprocessor system, the cache reduced the network traffic by 15% on average. 展开更多
关键词 token protocol sharing relation cache network traffic
原文传递
Novel Video Steganography Algorithm Based on Secret Sharing and Error-Correcting Code for H.264/AVC 被引量:4
2
作者 Yingnan Zhang Minqing Zhang +2 位作者 Xiaoyuan Yang Duntao Guo Longfei Liu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第2期198-209,共12页
In this paper, we analyze the video steganography technique, which is used to ensure national security and the confidentiality of the information of governmental agencies and enterprises. Videos may be used to transmi... In this paper, we analyze the video steganography technique, which is used to ensure national security and the confidentiality of the information of governmental agencies and enterprises. Videos may be used to transmit secrets and conduct covert communication. As such, we present an algorithm based on a secret sharing scheme and an Error-Correcting Code(ECC), which combines Grey Relational Analysis(GRA) with a partition mode in video compression standard H.264/AVC. First, we process secret information by secret sharing, and then use an ECC to process the obtained information. Moreover, we choose the Discrete Cosine Transform(DCT) blocks using GRA, and then use rules to hide the pretreated information in DCT coefficients of the video frames. Experimental results indicate that our algorithm has good invisibility, better robustness, good anti-steganalysis ability, and little influence on the bit rate of the video carrier. In addition, the bit error rate is low after attacks such as noise, filtering,or frame loss in the simulation environment. 展开更多
关键词 steganography video secret sharing error-correcting code robustness grey relational analysis partition mode
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部