Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/2470
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSnehal K., Ambulkar-
dc.date.accessioned2011-07-06T11:02:16Z-
dc.date.available2011-07-06T11:02:16Z-
dc.date.issued2011-06-01-
dc.identifier.urihttp://hdl.handle.net/123456789/2470-
dc.description.abstractMulticore processors are now present in many home based systems. This chance presents a massive challenge to application developers who must design a sufficient and suited parallelism onto each parallel algorithm. Considering today's hardware performance, in order to obtain best results, a proper programming strategy for optimum mapping of all processes to existing resources is necessary. The presence of multiple cores in a single chip requires applications with a higher level of parallelism.The use of suitable mapping algorithms can lead to a great performance improvement considering computing time at smaller energy consumption. Mapping a set of algorithms onto a multi core platform requires using a parallel programming model, which describes and controls the communication,concurrences, and synchronization of all components involved. Basic goal of CUDA is to help programmers focus on the task of parallelization of the algorithms.en_US
dc.publisherInstitute of Technologyen_US
dc.relation.ispartofseries08MCES51en_US
dc.subjectSpliten_US
dc.subjectSplit 2008en_US
dc.subjectCE Spliten_US
dc.subjectCE Split 2008en_US
dc.subjectComputer 2008-
dc.subjectProject Report 2008-
dc.subjectComputer Project Report-
dc.subjectProject Report-
dc.subject08MCES-
dc.subject08MCES51-
dc.titleImplementation of Security Algorithm Using CUDAen_US
dc.typeDissertationen_US
Appears in Collections:Dissertation, CE

Files in This Item:
File Description SizeFormat 
08MCES51.pdf08MCES511.37 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.