Association for Computing Machinery
Displaying 1-40 of 6243 results
-
Auditeur: A Mobile-Cloud Service Platform for Acoustic Event Detection on Smartphones
Auditeur is a general-purpose, energy-efficient, and context-aware acoustic event detection platform for Smartphones. It enables app developers to have their app register for and get notified on a wid...
Provided By Association for Computing Machinery
-
Virtual TCP Offload: Optimizing Ethernet Overlay Performance on Advanced Interconnects
Ethernet overlay networks are a powerful tool for virtualizing networked applications. Their performance suffers on advanced interconnects such as Infiniband, however, be-cause of differences between ...
Provided By Association for Computing Machinery
-
ElasticSwitch: Practical Work-Conserving Bandwidth Guarantees for Cloud Computing
While cloud computing providers offer guaranteed allocations for resources such as CPU and memory, they do not offer any guarantees for network resources. The lack of network guarantees prevents tenan...
Provided By Association for Computing Machinery
-
Hobbes: Composition and Virtualization as the Foundations of an Extreme-scale OS/R
In this paper, the authors describe their vision for Hobbes, an Operating System and Runtime (OS/R) framework for extreme-scale systems. The Hobbes design explicitly supports application composition, ...
Provided By Association for Computing Machinery
-
Building Blocks for Exploratory Data Analysis Tools
Data exploration is largely manual and labor intensive. Although there are various tools and statistical techniques that can be applied to data sets, there is little help to identify what questions to...
Provided By Association for Computing Machinery
-
Software Transactional Networking: Concurrent and Consistent Policy Composition
It seems natural to imagine that SDN policy specification and control is distributed, and this paper focuses on the resulting concurrency issues. Indeed, conflicts among concurrent policy updates may ...
Provided By Association for Computing Machinery
-
Rebalancing in a Multi-Cloud Environment
Rebalancing policies, which replace instances in lower preferred clouds with instances in higher-preferred clouds, are needed to meet these preferences. The authors present an environment that manages...
Provided By Association for Computing Machinery
-
Leveraging Endpoint Flexibility in Data-Intensive Clusters
Many applications do not constrain the destinations of their network transfers. New opportunities emerge when such transfers contribute a large amount of network bytes. By choosing the endpoints to av...
Provided By Association for Computing Machinery
-
Data-driven Neuroscience: Enabling Breakthroughs Via Innovative Data Management
Scientists in all disciplines increasingly rely on simulations to develop a better understanding of the subject they are studying. For example the neuroscientists collaborate with in the Blue Brain pr...
Provided By Association for Computing Machinery
-
TOUCH: In-Memory Spatial Join by Hierarchical Data-Oriented Partitioning
Efficient spatial joins are pivotal for many applications and particularly important for geographical information systems or for the simulation sciences where scientists work with spatial models. Past...
Provided By Association for Computing Machinery
-
See Through Walls with Wi-Fi!
Wi-Fi signals are typically information carriers between a transmitter and a receiver. In this paper, the authors show that Wi-Fi can also extend their senses, enabling there to see moving objects thr...
Provided By Association for Computing Machinery
-
Modeling/Predicting the Evolution Trend of OSN-Based Applications
While various models have been proposed for generating social/ friendship network graphs, the dynamics of user interactions through Online Social Network (OSN) based applications remain largely unexpl...
Provided By Association for Computing Machinery
-
Accountable Key Infrastructure (AKI): A Proposal for a Public-Key Validation Infrastructure
Recent trends in public-key infrastructure research explore the tradeoff between decreased trust in Certificate Authorities (CAs), resilience against attacks, communication overhead (bandwidth and lat...
Provided By Association for Computing Machinery
-
STRIDE: Sanctuary Trail - Refuge From Internet DDoS Entrapment
The authors propose STRIDE, a new DDoS-resilient Internet architecture that isolates attack traffic through viable band-width allocation, preventing a botnet from crowding out legitimate flows. This n...
Provided By Association for Computing Machinery
-
Non-Monetary Fair Scheduling - A Cooperative Game Theory Approach
The authors consider a multi-organizational system in which each organization contributes processors to the global pool but also jobs to be processed on the common resources. The fairness of the sched...
Provided By Association for Computing Machinery
-
On the Feasibility of Online Malware Detection with Performance Counters
The proliferation of computers in any domain is followed by the proliferation of malware in that domain. Systems, including the latest mobile platforms, are laden with viruses, rootkits, spyware, adwa...
Provided By Association for Computing Machinery
-
COSBench: Cloud Object Storage Benchmark
With object storage systems being increasingly recognized as a preferred way to expose one's storage infrastructure to the web, the past few years have witnessed an explosion in the acceptance of thes...
Provided By Association for Computing Machinery
-
A Meta-Model for Performance Modeling of Dynamic Virtualized Network Infrastructures
The increasing popularity of Cloud Computing is leading to the emergence of large virtualized data centers hosting increasingly complex and dynamic IT systems and services. The performance of applicat...
Provided By Association for Computing Machinery
-
Dynamic Networked Coverage of Time-Varying Environments in the Presence of Fading Communication Channels
In this paper, the authors study the problem of dynamic coverage of a set of Points Of Interest (POIs) in a time-varying environment. They consider the scenario where a physical quantity is constantly...
Provided By Association for Computing Machinery
-
Perfect Contextual Information Privacy in WSNs Under Colluding Eavesdroppers
The authors address the problem of preserving contextual information privacy in Wireless Sensor Networks (WSNs). They consider an adversarial network of colluding eavesdroppers that are placed at unkn...
Provided By Association for Computing Machinery
-
Securing Communications Between External Users and Wireless Body Area Networks
Wireless Body Area Networks (BANs) are expected to play a crucial role in patient-health monitoring in the near future. Establishing secure communications between BAN sensors and external users is key...
Provided By Association for Computing Machinery
-
ScreenPass: Secure Password Entry on Touchscreen Devices
Users routinely access cloud services through third-party apps on Smartphones by giving apps login credentials (i.e., a username and password). Unfortunately, users have no assurance that their apps w...
Provided By Association for Computing Machinery
-
Process Firewalls: Protecting Processes During Resource Access
Processes retrieve a variety of resources from the operating system in order to execute properly, but adversaries have several ways to trick processes into retrieving resources of the adversaries' cho...
Provided By Association for Computing Machinery
-
STREX: Boosting Instruction Cache Reuse in OLTP Workloads Through Stratified Transaction Execution
OnLine Transaction Processing (OLTP) workload performance suffers from instruction stalls; the instruction footprint of a typical transaction exceeds by far the capacity of an L1 cache, leading to ong...
Provided By Association for Computing Machinery
-
BusMonitor: A Hypervisor-Based Solution for Memory Bus Covert Channels
Researchers continue to find side channels present in cloud infrastructure which threaten Virtual Machine (VM) isolation. Specifically, the memory bus on virtualized x86 systems has been targeted as o...
Provided By Association for Computing Machinery
-
Verifying Information Flow Properties of Hybrid Systems
With incidents such as Stuxnet attacking SCADA systems, the security of embedded control systems has come to the limelight. One of the most fundamental security properties is confidentiality, i.e., th...
Provided By Association for Computing Machinery
-
Sensing Vehicle Dynamics for Determining Driver Phone Use
This paper utilizes Smartphone sensing of vehicle dynamics to determine driver phone use, which can facilitate many traffic safety applications. The authors' system uses embedded sensors in Smartphone...
Provided By Association for Computing Machinery
-
Achieving Resilience of Heterogeneous Networks Through Predictive, Formal Analysis
Rapid development and wide deployment of wireless technologies in recent years have brought an increasing number and variety of services that are accessible directly from mobile terminals via multiple...
Provided By Association for Computing Machinery
-
Temperature Aware Workload Management in Geo-Distributed Datacenters
Datacenters consume an enormous amount of energy with significant financial and environmental costs. For geo-distributed datacenters, a workload management approach that routes user requests to locati...
Provided By Association for Computing Machinery
-
MuMMI: Multiple Metrics Modeling Infrastructure for Exploring Performance and Power Modeling
In this paper, the authors discussed the MuMMI framework which consists of an Instrumentor, Databases and Analyzer. The MuMMI Instrumentor provides for automatic performance and power data collection ...
Provided By Association for Computing Machinery
-
Efficient Query Answering Against Dynamic RDF Databases
A promising method for efficiently querying RDF data consists of translating SPARQL queries into efficient RDBMS-style operations. However, answering SPARQL queries requires handling RDF reasoning, wh...
Provided By Association for Computing Machinery
-
VPerfGuard: An Automated Model-Driven Framework for Application Performance Diagnosis in Consolidated Cloud Environments
The authors have implemented vPerfGuard as a combination of three modules: a sensor module, a model building module, and a model updating module. They evaluate its effectiveness using different benchm...
Provided By Association for Computing Machinery
-
From A to E: Analyzing TPC's OLTP Benchmarks
Introduced in 2007, TPC-E is the most recently standardized OLTP benchmark by TPC. Even though TPC-E has already been around for six years, it has not gained the popularity of its predecessor TPC-C: a...
Provided By Association for Computing Machinery
-
Web Data Indexing in the Cloud: Efficiency and Cost Reductions
The authors propose architecture for warehousing large-scale web data, in particular XML, in a commercial cloud platform, specifically, Amazon Web Services. Since cloud users support monetary costs di...
Provided By Association for Computing Machinery
-
A Performance Comparison of Parallel DBMSs and MapReduce on Large-Scale Text Analytics
Text analytics has become increasingly important with the rapid growth of text data. Particularly, Information Extraction (IE), which extracts structured data from text, has received significant atten...
Provided By Association for Computing Machinery
-
Efficient Parallel Partition-based Algorithms for Similarity Search and Join with Edit Distance Constraints
The quantity of data in real-world applications is growing significantly while the data quality is still a big problem. Similarity search and similarity join are two important operations to address th...
Provided By Association for Computing Machinery
-
To Hardware Prefetch or Not to Prefetch?
Most hardware and software venders suggest disabling hardware prefetching in virtualized environments. They claim that prefetching is detrimental to application performance due to inaccurate predictio...
Provided By Association for Computing Machinery
-
EXTERIOR: Using Dual-VM Based External Shell for Guest-OS Introspection, Configuration, and Recovery
This paper presents EXTERIOR, a dual-VM architecture based external shell that can be used for trusted, timely out-of-VM management of guest-OS such as introspection, configuration, and recovery. Insp...
Provided By Association for Computing Machinery
-
Preemptable Ticket Spinlocks: Improving Consolidated Performance in the Cloud
When executing inside a virtual machine environment, OS level synchronization primitives are faced with significant challenges due to the scheduling behavior of the underlying virtual machine monitor....
Provided By Association for Computing Machinery
-
Towards Verifiable Resource Accounting for Outsourced Computation
Outsourced computation services should ideally only charge customers for the resources used by their applications. Unfortunately, no verifiable basis for service providers and customers to reconcile r...
Provided By Association for Computing Machinery
-
EXTERIOR: Using Dual-VM Based External Shell for Guest-OS Introspection, Configuration, and Recovery
This paper presents EXTERIOR, a dual-VM architecture based external shell that can be used for trusted, timely out-of-VM management of guest-OS such as introspection, configuration, and recovery. Insp...
Provided By Association for Computing Machinery
-
Enhancement of Xen's Scheduler for MapReduce Workloads
As the trends move towards data outsourcing and cloud computing, the efficiency of distributed data centers increases in importance. Cloud-based services such as Amazon's EC2 rely on Virtual Machines ...
Provided By Association for Computing Machinery
-
To Hardware Prefetch or Not to Prefetch?
Most hardware and software venders suggest disabling hardware prefetching in virtualized environments. They claim that prefetching is detrimental to application performance due to inaccurate predictio...
Provided By Association for Computing Machinery
-
OS-SOMMELIER: Memory-Only Operating System Fingerprinting in the Cloud
Precise fingerprinting of an Operating System (OS) is critical to many security and Virtual Machine (VM) management applications in the cloud, such as VM introspection, penetration testing, guest OS a...
Provided By Association for Computing Machinery
-
Securing Untrusted Code Via Compiler-Agnostic Binary Rewriting
Binary code from untrusted sources remains one of the primary vehicles for malicious software attacks. This paper presents REINS, a new, more general, and lighter-weight binary rewriting and in-lining...
Provided By Association for Computing Machinery
-
DVM: Towards a Datacenter-Scale Virtual Machine
As cloud-based computation becomes increasingly important, providing a general computational interface to support datacenter-scale programming has become an imperative research agenda. Many cloud syst...
Provided By Association for Computing Machinery
-
Virtualization Challenges: A View From Server Consolidation Perspective
Server consolidation, by running multiple virtual machines on top of a single platform with virtualization, provides an efficient solution to parallelism and utilization of modern multi-core processor...
Provided By Association for Computing Machinery
-
Experience with an Implementation of the Idle Sense Wireless Access Method
An overwhelming part of research work on wireless networks validates new concepts or protocols with simulation or analytical modeling. Unlike this approach, the authors present Their experience with i...
Provided By Association for Computing Machinery
-
Performance and Energy Modeling for Live Migration of Virtual Machines
Live migration of Virtual Machine (VM) provides a significant benefit for virtual server mobility without disrupting service. It is widely used for system management in virtualized data centers. Howev...
Provided By Association for Computing Machinery
-
Towards a Pluralist Internet Using a Virtual Machine Server for Network Customization
The Internet success is frequently credited to its basic pillars, the end-to-end argument and the TCP/IP protocol stack. Nevertheless, this simple architecture does not facilitate the addition of new ...
Provided By Association for Computing Machinery
-
Operational Experience With a Virtual Networking Laboratory
Virtual laboratories are a potential replacement for standard laboratory facilities. Use of these virtual resources can reduce cost and maintenance overheads for teaching institutions while still ensu...
Provided By Association for Computing Machinery
-
Virtual TCP Offload: Optimizing Ethernet Overlay Performance on Advanced Interconnects
Ethernet overlay networks are a powerful tool for virtualizing networked applications. Their performance suffers on advanced interconnects such as Infiniband, however, be-cause of differences between ...
Provided By Association for Computing Machinery
-
Better than Native: Using Virtualization to Improve Compute Node Performance
Modified variants of Linux are likely to be the underlying operating systems for future exascale platforms. Despite the many advantages of this approach, a subset of applications exist in which a Ligh...
Provided By Association for Computing Machinery
-
Hobbes: Composition and Virtualization as the Foundations of an Extreme-scale OS/R
In this paper, the authors describe their vision for Hobbes, an Operating System and Runtime (OS/R) framework for extreme-scale systems. The Hobbes design explicitly supports application composition, ...
Provided By Association for Computing Machinery
-
ADEL: An Automatic Detector of Energy Leaks for Smartphone Applications
Energy leaks occur when applications use energy to perform useless tasks, a surprisingly common occurrence. They are particularly important for mobile applications running on Smartphones due to their ...
Provided By Association for Computing Machinery
-
Shifting GEARS to Enable Guest-Context Virtual Services
The authors argue that the implementation of VMM-based virtual services for a guest should extend into the guest itself, even without its cooperation. Placing service components directly into the gues...
Provided By Association for Computing Machinery
-
A Case for Tracking and Exploiting Inter-Node and Intra-Node Memory Content Sharing in Virtualized Large-Scale Parallel Systems
In virtualized large-scale parallel systems scientific workloads consist of numerous processes running across many virtual nodes. Their memory footprint is massive, and this has consequences for servi...
Provided By Association for Computing Machinery
-
ShadowStream: Performance Evaluation as a Capability in Production Internet Live Streaming Networks
As live streaming networks grow in scale and complexity, they are becoming increasingly difficult to evaluate. Existing evaluation methods including lab/testbed testing, simulation, and theoretical mo...
Provided By Association for Computing Machinery
-
Understanding the Impact of Laptop Power Saving Options on User Satisfaction Using Physiological Sensors
Several techniques are available to save power consumption in laptop computers. However, their effect on user satisfaction has not been well studied. The authors analyze how user satisfaction is affec...
Provided By Association for Computing Machinery
-
Sonar-based Measurement of User Presence and Attention
The authors describe a technique to detect the presence of computer users. This technique relies on sonar using hardware that already exists on commodity laptop computers and other electronic devices....
Provided By Association for Computing Machinery
-
Generating Correct EPCs from Configured C-EPCs
Process reference models play an important role for the alignment and configuration of commercial off-the-shelf Enterprise Systems to requirements of an organization. Recently, Configurable Event-driv...
Provided By Association for Computing Machinery
-
Transformation of yEPC Business Process Models to YAWL
Model transformations are frequently applied in Business Process Modeling to bridge between languages on a different level of abstraction and formality. In this paper, the authors define a transformat...
Provided By Association for Computing Machinery
-
Does Virtualization Make Disk Scheduling Pass
Analysis of technology and application trends reveals a growing imbalance in the peak compute-to-memory-capacity ratio for future servers. At the same time, the fraction contributed by memory systems ...
Provided By Association for Computing Machinery
-
Johnny in Internet Caf?: User Study and Exploration of Password Autocomplete in Web Browsers
One of the most popular aids adopted by users to reduce the pain suffered from the use of passwords is browsers' auto-complete feature. This feature, caching username and password after getting the us...
Provided By Association for Computing Machinery
-
Dealing with Changes in Service Orchestrations
Service Oriented Computing (SOC) allows programmers to build distributed applications by putting together (i.e., orchestrating) existing services exported by remote providers. The main source of compl...
Provided By Association for Computing Machinery
-
High Performance Content-Based Matching Using GPUs
Matching incoming event notifications against received subscriptions is a fundamental part of every publish-subscribe infrastructure. In the case of content-based systems this is a fairly complex and ...
Provided By Association for Computing Machinery
-
TESLA: A Formally Defined Event Specification Language
The need for timely processing large amounts of information, owing from the peripheral to the center of a system, is common to different application domains, and it has justified the development of se...
Provided By Association for Computing Machinery
-
RACED: an Adaptive Middleware for Complex Event Detection
While several event noti cation systems are built around a publish-subscribe communication infrastructure, the latter only supports detection of simple events. Complex events, involving several, relat...
Provided By Association for Computing Machinery
-
Inoculation Against Malware Infection Using Kernel-level Software Sensors
The authors present a technique for dynamic malware detection that relies on a set of sensors that monitor the interaction of applications with the underlying operating system. By monitoring the reque...
Provided By Association for Computing Machinery
-
On the use of Computational Geometry to Detect Software Faults at Runtime
Despite advances in software engineering, software faults continue to cause system downtime. Software faults are difficult to detect before the system fails, especially since the first symptom of a fa...
Provided By Association for Computing Machinery
-
Detection and Mitigation of Abnormal Traffic Behavior in Autonomic Networked Environments
Autonomic network environments are required to be resilient. Resilience is defined as the ability for a network to provide and maintain an acceptable level of service in the face of various challenges...
Provided By Association for Computing Machinery
-
Throughput and Stability of Digital and Analog Network Coding for Wireless Networks With Single and Multiple Relays
The authors evaluate the throughput and stability properties of digital and analog network coding for wireless terminals exchanging broadcast traffic with the assistance of relay nodes. For stochastic...
Provided By Association for Computing Machinery
-
Interactive Detection of Network Anomalies Via Coordinated Multiple Views
This paper presents a new approach to intrusion detection that supports the identification and analysis of network anomalies using an interactive Coordinated Multiple Views (CMV) mechanism. A CMV visu...
Provided By Association for Computing Machinery
-
Harnessing Frequency Diversity in Wi-Fi Networks
Wireless multicarrier communication systems transmit data by spreading it over multiple subcarriers and are widely used today owing to their robustness to multipath fading, high spectrum efficiency, a...
Provided By Association for Computing Machinery
-
Improving Energy Efficiency for Mobile Platforms by Exploiting Low-Power Sleep States
Reducing energy consumption is one of the most important design aspects for small form-factor mobile platforms, such as smart-phones and tablets. Despite its potential for power savings, optimally lev...
Provided By Association for Computing Machinery
-
DirectPath: High Performance and Energy Efficient Platform I/O Architecture for Content Intensive Usages
With the widespread development of cloud computing and high speed communications, end users store or retrieve video, music, photo and other contents over the cloud or the local network for video-on-de...
Provided By Association for Computing Machinery
-
The Networking Shape of Vehicular Mobility
Mobility is the distinguishing feature of vehicular networks, affecting the evolution of network connectivity over space and time in a unique way. Connectivity dynamics, in turn, determine the perform...
Provided By Association for Computing Machinery
-
Insights on Metropolitan-Scale Vehicular Mobility From a Networking Perspective
The management of mobility is commonly regarded as one of the most critical issues in large-scale telecommunication networks. The problem is exacerbated when considering vehicular mobility, which is c...
Provided By Association for Computing Machinery
-
Brief Announcement: Waiting in Dynamic Networks
The authors consider infrastructure-less highly dynamic networks, where connectivity does not necessarily hold, and the network may actually be disconnected at every time instant. These networks are n...
Provided By Association for Computing Machinery
-
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
Group communication has proven to be a powerful paradigm for designing applications and services in Wireless Sensor Networks (WSNs). Given the tight interaction between WSNs and the physical world, a ...
Provided By Association for Computing Machinery