{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:55:34Z","timestamp":1747810534733},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2009,1,17]],"date-time":"2009-01-17T00:00:00Z","timestamp":1232150400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1007\/s10586-009-0076-0","type":"journal-article","created":{"date-parts":[[2009,1,16]],"date-time":"2009-01-16T11:54:26Z","timestamp":1232106866000},"page":"123-140","source":"Crossref","is-referenced-by-count":5,"title":["On GPU\u2019s viability as a middleware accelerator"],"prefix":"10.1007","volume":"12","author":[{"given":"Samer","family":"Al-Kiswany","sequence":"first","affiliation":[]},{"given":"Abdullah","family":"Gharaibeh","sequence":"additional","affiliation":[]},{"given":"Elizeu","family":"Santos-Neto","sequence":"additional","affiliation":[]},{"given":"Matei","family":"Ripeanu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,1,17]]},"reference":[{"key":"76_CR1","unstructured":"Moya, V., Gonzalez, C., Roca, J., Fernandez, A., et al.: Shader performance analysis on a modern GPU architecture. In: IEEE\/ACM International Symposium on Microarchitecture, MICRO-38, 2005"},{"issue":"1","key":"76_CR2","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1111\/j.1467-8659.2007.01012.x","volume":"26","author":"J.D. Owens","year":"2007","unstructured":"Owens, J.D., Luebke, D., Govindaraju, N., Harris, M., et al.: A survey of general-purpose computation on graphics hardware. Comput. Graph. Forum 26(1), 80\u2013113 (2007). doi: 10.1111\/j.1467-8659.2007.01012.x","journal-title":"Comput. Graph. Forum"},{"key":"76_CR3","unstructured":"NVIDIA CUDA Compute Unified Device Architecture: Programming Guide v2.0 (2008)"},{"key":"76_CR4","unstructured":"Quinlan, S., Dorward, S.: Venti: a new approach to archival data storage. In: FAST, Monterey, CA, 2002"},{"key":"76_CR5","unstructured":"Twisted Storage. http:\/\/twistedstorage.sourceforge.net\/ (2008)"},{"key":"76_CR6","unstructured":"Weatherspoon, H., Kubiatowicz, J.: Erasure coding vs. replication: a quantitative comparison. In: IPTPS, 2002"},{"key":"76_CR7","doi-asserted-by":"crossref","unstructured":"Muthitacharoen, A., Chen, B., Mazieres, D.: A low-bandwidth network file system, In: SOSP, 2001","DOI":"10.1145\/502034.502052"},{"key":"76_CR8","unstructured":"Chun, B.-G., Dabek, F., Haeberlen, A., Sit, E., et al.: Efficient replica maintenance for distributed storage systems. In: NSDI, San Jose, CA, (2006)"},{"issue":"7","key":"76_CR9","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B. Bloom","year":"1970","unstructured":"Bloom, B.: Space\/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422\u2013426 (1970). doi: 10.1145\/362686.362692","journal-title":"Commun. ACM"},{"issue":"9","key":"76_CR10","doi-asserted-by":"crossref","first-page":"1098","DOI":"10.1109\/JRPROC.1952.273898","volume":"40","author":"D. Huffman","year":"1952","unstructured":"Huffman, D.: A method for the construction of minimum-redundancy codes. Proc. IRE 40(9), 1098\u20131101 (1952). doi: 10.1109\/JRPROC.1952.273898","journal-title":"Proc. IRE"},{"key":"76_CR11","unstructured":"Vilayannur, M., Nath, P., Sivasubramaniam, A.: Providing tunable consistency for a parallel file store. In: USENIX Conference on File and Storage Technologies, 2005"},{"key":"76_CR12","doi-asserted-by":"crossref","unstructured":"Al-Kiswany, S., Ripeanu, M., Vazhkudai, S., Gharaibeh, A.: STDCHK: a checkpoint storage system for desktop grid computing. In: ICDCS, Beijing, China, 2008","DOI":"10.1109\/ICDCS.2008.19"},{"key":"76_CR13","doi-asserted-by":"crossref","unstructured":"Yumerefendi, A.R., Chase, J.S.: Strong accountability for network storage. In: FAST\u201907, 2007","DOI":"10.1145\/1288783.1288786"},{"key":"76_CR14","doi-asserted-by":"crossref","unstructured":"Cox, L.P., Noble, B.D.: Samsara: honor among thieves in peer-to-peer storage. In: ACM Symposium on Operating Systems Principles, 2003","DOI":"10.1145\/945445.945458"},{"key":"76_CR15","unstructured":"Fu, K., Kaashoek, M.F., Mazi\u00e8res, D.: Fast and secure distributed read-only file system. In: OSDI, 2000"},{"key":"76_CR16","unstructured":"Kotla, R., Alvisi, L., Dahlin, M.: SafeStore: a durable and practical storage system. In: USENIX Annual Technical Conference, 2007"},{"key":"76_CR17","unstructured":"Karger, D.R., Lehman, E., Leighton, F.T., Panigrahy, R., et al.: Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web. In: Symposium on Theory of Computing, 1997. ACM, New York (1997)"},{"key":"76_CR18","doi-asserted-by":"crossref","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., et al.: Chord: a scalable peer-to-peer lookup service for Internet applications. In: SIGCOMM 2001, San Diego, USA, 2001","DOI":"10.1145\/383059.383071"},{"key":"76_CR19","doi-asserted-by":"crossref","unstructured":"Rowstron, A., Druschel, P.: Pastry: scalable, distributed object location and routing for large-scale peer-to-peer systems. In: IFIP\/ACM International Conference on Distributed Systems Platforms (Middleware), Heidelberg, Germany, 2001","DOI":"10.1007\/3-540-45518-3_18"},{"key":"76_CR20","unstructured":"DeCandia, G., Hastorun, D., Jampani, M., Kakulapati, G., et al.: Dynamo: Amazon\u2019s highly available key-value store. In: SOSP07, 2007"},{"key":"76_CR21","doi-asserted-by":"crossref","unstructured":"Dabek, F., Kaashoek, M.F., Karger, D., Morris, R., et al.: Wide-area cooperative storage with CFS. In: SOSP, 2001","DOI":"10.1145\/502034.502054"},{"key":"76_CR22","unstructured":"Eshghi, K., Lillibridge, M., Wilcock, L., Belrose, G., et al.: JumboStore: providing efficient incremental upload and versioning for a utility rendering service. In: FAST, 2007"},{"key":"76_CR23","unstructured":"Jon Peddie Research Report: NVIDIA on a roll, grabs more desktop graphics market share in 4Q. http:\/\/www.jonpeddie.com\/about\/press\/MarketWatch_Q405.shtml (2006)"},{"key":"76_CR24","unstructured":"Jon Peddie Research Report: Overall GPU market was up an astounding 20%\u2014desktop displaced mobile. http:\/\/www.jonpeddie.com\/about\/press\/2007\/GPU_market_Q307.shtml (2007)"},{"key":"76_CR25","unstructured":"AMD Stream Computing SDK. Available from: http:\/\/ati.amd.com\/technology\/streamcomputing\/ (2008)"},{"key":"76_CR26","unstructured":"ATI Close To Metal (CTM) Technical Reference Version 1.01 Manual (2008)"},{"key":"76_CR27","unstructured":"Open, C.L.: Available from: http:\/\/www.khronos.org\/opencl\/ (2008)"},{"key":"76_CR28","unstructured":"RapidMind Development Platform. Available from: http:\/\/www.rapidmind.net\/ (2008)"},{"issue":"3","key":"76_CR29","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1145\/1015706.1015800","volume":"23","author":"I. Buck","year":"2004","unstructured":"Buck, I., Foley, T., Horn, D., Sugerman, J., et al.: Brook for GPUs: stream computing on graphics hardware. ACM Trans. Graph. 23(3), 777\u2013786 (2004). doi: 10.1145\/1015706.1015800","journal-title":"ACM Trans. Graph."},{"key":"76_CR30","volume-title":"Metaprogramming GPUs with Sh","author":"M. McCool","year":"2004","unstructured":"McCool, M., Toit, S.D.: Metaprogramming GPUs with Sh. AK Peters, Wellesley (2004)"},{"key":"76_CR31","doi-asserted-by":"crossref","unstructured":"Lindholm, E., Nickolls, J., Oberman, S., Montrym, J.: NVIDIA tesla: a unified graphics and computing architecture. In: IEEE Micro, pp. 39\u201355, 2008","DOI":"10.1109\/MM.2008.31"},{"key":"76_CR32","doi-asserted-by":"crossref","unstructured":"Ryoo, S., Rodrigues, C.I., Baghsorkhi, S.S., Stone, S.S., et al.: Optimization principles and application performance evaluation of a multithreaded GPU using CUDA. In: ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2008","DOI":"10.1145\/1345206.1345220"},{"key":"76_CR33","doi-asserted-by":"crossref","unstructured":"Che, S., Boyer, M., Meng, J., Tarjan, D. et al.: A performance study of general-purpose applications on graphics processors using CUDA. J. Parallel Distrib. Comput. 68(10), (2008). doi: 10.1016\/j.jpdc.2008.05.014","DOI":"10.1016\/j.jpdc.2008.05.014"},{"key":"76_CR34","unstructured":"Merkle, R.: A certified digital signature. In: Advances in Cryptology\u2014CRYPTO. Lecture Notes in Computer Science. Springer, Berlin (1989)"},{"key":"76_CR35","unstructured":"Damgard, I.: A design principle for hash functions. In: Advances in Cryptology\u2014CRYPTO. Lecture Notes in Computer Science. Springer, Berlin (1989)"},{"key":"76_CR36","unstructured":"Hargrove, P.H., Duell, J.C.: Berkeley Lab Checkpoint\/Restart (BLCR) for Linux clusters. In: Scientific Discovery through Advanced Computing Program (SciDAC), 2006"},{"key":"76_CR37","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/S0022-2836(05)80360-2","volume":"215","author":"S.F. Altschul","year":"1990","unstructured":"Altschul, S.F., Gish, W., Miller, W., Myers, E., et al.: Basic local alignment tool. Mol. Biol. 215, 403\u2013410 (1990)","journal-title":"Mol. Biol."},{"key":"76_CR38","unstructured":"Liu, W., Schmidt, B., Voss, G., Schroder, A., et al.: Bio-sequence database scanning on a GPU. In: IPDPS, 2006"},{"key":"76_CR39","doi-asserted-by":"crossref","unstructured":"Thompson, C.J., Hahn, S., Oskin, M.: Using modern graphics architectures for general-purpose computing: a framework and analysis. In: ACM\/IEEE International Symposium on Microarchitecture, 2002","DOI":"10.1109\/MICRO.2002.1176259"},{"key":"76_CR40","doi-asserted-by":"crossref","unstructured":"Kruger, J., Westermann, R.: Linear algebra operators for GPU implementation of numerical algorithms. In: ACM SIGGRAPH International Conference on Computer Graphics and Interactive Techniques, 2003","DOI":"10.1145\/1201775.882363"},{"key":"76_CR41","doi-asserted-by":"crossref","unstructured":"Govindaraju, N.K., Lloyd, B., Wang, W., Manocha, M.L.: Fast computation of database operations using graphics processors. In: ACM SIGMOD International Conference on Management of Data, 2004","DOI":"10.1145\/1007568.1007594"},{"key":"76_CR42","doi-asserted-by":"crossref","unstructured":"Curry, M.L., Skjellum, A., Ward, H.L., Brightwell, R.: Accelerating Reed\u2013Solomon coding in RAID systems with GPUs. In: IPDPS, 2008","DOI":"10.1109\/IPDPS.2008.4536322"},{"issue":"2","key":"76_CR43","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1137\/0108018","volume":"8","author":"I.S. Reed","year":"1960","unstructured":"Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. J. Soc. Ind. Appl. Math. 8(2), 300\u2013304 (1960). doi: 10.1137\/0108018","journal-title":"J. Soc. Ind. Appl. Math."},{"key":"76_CR44","doi-asserted-by":"crossref","unstructured":"Falcao, G., Sousa, L., Silva, V.: Massive parallel LDPC decoding on GPU. In: ACM SIGPLAN Symposium on Principles and practice of Parallel Programming (PPoPP), Salt Lake City, 2008","DOI":"10.1145\/1345206.1345221"},{"key":"76_CR45","unstructured":"Harrison, O., Waldron, J.: AES encryption implementation and analysis on commodity graphics processing units, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Vienna, Austria, 2007"},{"key":"76_CR46","unstructured":"Harrison, O., Waldron, J.: Practical symmetric key cryptography on modern graphics hardware. In: USENIX Security Symposium, San Jose, CA, 2008"},{"key":"76_CR47","doi-asserted-by":"crossref","unstructured":"Manavski, S.A.: CUDA compatible GPU as an efficient hardware accelerator for AES cryptography. In: IEEE International Conference on Signal Processing and Communications (ICSPC), Dubai, United Arab Emirates, 2007","DOI":"10.1109\/ICSPC.2007.4728256"},{"key":"76_CR48","unstructured":"Moss, A., Page, D., Smart, N.: Toward acceleration of RSA using 3D graphics hardware. In: Cryptography and Coding, 2007"},{"key":"76_CR49","unstructured":"Kaspersky Antivirus. Available from: http:\/\/www.kaspersky.com\/ (2008)"},{"key":"76_CR50","unstructured":"Elcomsoft password recovery software. Available from: http:\/\/www.elcomsoft.com (2008)"},{"key":"76_CR51","unstructured":"Geforce 9 Series. http:\/\/www.nvidia.com\/object\/geforce9.html (2008)"},{"issue":"4","key":"76_CR52","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1109\/18.391235","volume":"41","author":"D. Dabiri","year":"1995","unstructured":"Dabiri, D., Blake, I.F.: Fast parallel algorithms for decoding Reed\u2013Solomon codes based on remainder polynomials. IEEE Trans. Inf. Theory 41(4), 873\u2013885 (1995). doi: 10.1109\/18.391235","journal-title":"IEEE Trans. Inf. Theory"},{"key":"76_CR53","unstructured":"Gilchrist, J.: Parallel compression with BZIP2. In: IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS), 2004"},{"key":"76_CR54","doi-asserted-by":"crossref","unstructured":"Nightingale, E.B., Peek, D., Chen, P.M., Flinn, J.: Parallelizing security checks on commodity hardware. In: ASPLOS, Seattle, WA, 2008","DOI":"10.1145\/1346281.1346321"},{"key":"76_CR55","unstructured":"Geforce 8 Series. http:\/\/www.nvidia.com\/page\/geforce8.html (2008)"},{"key":"76_CR56","unstructured":"Bakhoda, A., Yuan, G., Fung, W.W.L., Wong, H., et al.: Performance analysis of GPU compute workloads via detailed simulation. In: IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), Boston, MA, 2009"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-009-0076-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-009-0076-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-009-0076-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T14:40:11Z","timestamp":1559227211000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-009-0076-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1,17]]},"references-count":56,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,6]]}},"alternative-id":["76"],"URL":"https:\/\/doi.org\/10.1007\/s10586-009-0076-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,1,17]]}}}