Research Article
Hardware/Software Adaptive Cryptographic Acceleration for Big Data Processing
Table 2
Parameters for MM algorithm.
| Parameter | Description |
| N | The number of available CPUs in the system | | The number of CPUs used for software encryption with AES-NI | | The number of CPUs responsible for the processes of hardware invocation | | The processes invoked for software encryption with AES-NI | | The processes invoked for hardware encryption | | The total number of active processes | | The maximum bandwidth with hardware encryption, at the condition of i CPUs and j processes, and completely loaded | | The maximum bandwidth with software encryption, at the condition of i CPUs and i processes, and completely loaded | | The bandwidth difference between hardware encryption and software encryption () |
|
|