GithubHelp home page GithubHelp logo

Tara's Projects

go-snmp icon go-snmp

GO SNMP Trap receiver and SNMP Get/Walk client

gosnmp icon gosnmp

An SNMP library written in GoLang.

parallel-matrix-multiply icon parallel-matrix-multiply

In this parallel strategy, rows and columns were partitioned into 4 so matrix A and B was partitioned into 4*4 block matrices. The tile width would be 512/4 = 128. At a time one block matrix A and B was brought to shared memory and all the threads computed on those data. Each thread would work on 128/64 = 2 columns of the block of matrix B. In parallel 64 threads would be working on a block at a time. The block sequence would be: First block of first row of C = first block of first row of c + (first block of first row of A * first block of first column of B) + (second block of first row of A * second block of first column of B) + … (fourth block of first row of A * fourth block of first column of B). This technique exploits both spatial and temporal locality of data since reuse of adjacent dataset and reuse of same dataset.

parallel-prefix-scan icon parallel-prefix-scan

The parallel algorithm is divided into 4 steps.1.First the input array is divided into blocks equally between the total number of threads and for each block prefix scan is done serially. But each block is worked upon in parallel by the threads. 2. An array is created with as many elements as there are threads in the program. The elements in this array were the sum of elements in one block. 3.This array goes through the reduction step and post scan step. 4. After the reduction and post scan step the elements in the array are used to increment each block of input array to achieve the required prefix scan output.

pcileech icon pcileech

Direct Memory Access (DMA) Attack Software

virtual-to-physical-address-conversion-linux- icon virtual-to-physical-address-conversion-linux-

Protecting systems in the filed of Security is of great concern. Research work done over ORAMs consider the DRAM to be an untrusted party while considering the processor trusted. In order to launch an attack over the system such as cache side channel attacks, exploting DMA to leak private information etc. we need to have access to the physical address space. As our kernels, applications and all other codes run in the virtual address space. Using this code, one can determine the physical address of a variable/buffer etc.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.