Association for Computing Machinery

Displaying 1-40 of 6701 results

  • White Papers // Jan 2015

    Compiler Management of Communication and Parallelism for Quantum Computation

    Quantum Computing (QC) offers huge promise to accelerate a range of computationally intensive benchmarks. Quantum computing is limited, however, by the challenges of decoherence: i.e., a quantum state can only be maintained for short windows of time before it decoheres. While quantum error correction codes can protect against decoherence, fast...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    A Symbolic Execution Algorithm for Constraint-Based Testing of Database Programs

    In so-called constraint-based testing, symbolic execution is a common technique used as a part of the process to generate test data for imperative programs. Databases are ubiquitous in software and testing of programs manipulating databases is thus essential to enhance the reliability of software. In this paper, the authors propose...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    CQIC: Revisiting Cross-Layer Congestion Control for Cellular Networks

    With the advent of high-speed cellular access and the overwhelming popularity of Smartphone's, a large percent of today's Internet content is being delivered via cellular links. Due to the nature of long-range wireless signal propagation, the capacity of the last hop cellular link can vary by orders of magnitude within...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    GRAPHITE: An Extensible Graph Traversal Framework for Relational Database Management Systems

    Graph traversals are a basic but fundamental ingredient for a variety of graph algorithms and graph-oriented queries. To achieve the best possible query performance, they need to be implemented at the core of a database management system that aims at storing, manipulating, and querying graph data. Increasingly, modern business applications...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Uncovering Network Tarpits with Degreaser

    Network tarpits, whereby a single host or appliance can masquerade as many fake hosts on a network and slow network scanners, are a form of defensive cyber-deception. In this paper, the authors develop degreaser, an efficient fingerprinting tool to remotely detect tarpits. In addition to validating their tool in a...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Design-Theoretic Encoding of Deterministic Hypotheses as Constraints and Correlations Into U-Relational Databases

    In view of the paradigm shift that makes science ever more data-driven, in this paper the authors consider deterministic scientific hypotheses as uncertain data. In the form of mathematical equations, hypotheses symmetrically relate aspects of the studied phenomena. For computing predictions, however, deterministic hypotheses are used asymmetrically as functions. They...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Patterns in the Chaos - A Study of Performance Variation and Predictability in Public IaaS Clouds

    Benchmarking the performance of public cloud providers is a common research topic. Previous paper has already extensively evaluated the performance of different cloud platforms for different use cases, and under different constraints and experiment setups. In this paper, the authors present a principled, large-scale literature review to collect and codify...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed

    Central to the secure operation of a Public Key Infrastructure (PKI) is the ability to revoke certificates. While much of users' security rests on this process taking place quickly, in practice, revocation typically requires a human to decide to reissue a new certificate and revoke the old one. Thus, having...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    PixelVault: Using GPUs for Securing Cryptographic Operations

    Protecting the confidentiality of cryptographic keys in the event of partial or full system compromise is crucial for containing the impact of attacks. The Heartbleed vulnerability of April 2014, which allowed the remote leakage of secret keys from HTTPS web servers, is an indicative example. In this paper, the authors...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication

    In an effort to hinder attackers from compromising user accounts, Facebook launched a form of two-factor authentication called Social Authentication (SA), where users are required to identify photos of their friends to complete a log-in attempt. Recent research, however, demonstrated that attackers can bypass the mechanism by employing face recognition...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild

    Online accounts are inherently valuable resources - both for the data they contain and the reputation they accrue over time. Unsurprisingly, this value drives criminals to steal, or hijack, such accounts. In this paper, the authors focus on manual account hijacking - account hijacking performed manually by humans instead of...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Search + Seizure: The Effectiveness of Interventions on SEO Campaigns

    Black hat Search Engine Optimization (SEO), the practice of abusively manipulating search results, is an enticing method to acquire targeted user traffic. In turn, a range of interventions - from modifying search results to seizing domains - are used to combat this activity. In this paper, the authors examine the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Challenges in Inferring Internet Interdomain Congestion

    The authors introduce and demonstrate the utility of a method to localize and quantify inter-domain congestion in the Inter-net. Their Time Sequence Latency Probes (TSLP) method depends on two facts: internet traffic patterns are typically diurnal, and queues increase packet delay through a router during periods of adjacent link congestion....

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Characterizing Large-Scale Click Fraud in ZeroAccess

    Click fraud is a scam that hits a criminal sweet spot by both tapping into the vast wealth of online advertising and exploiting that ecosystem's complex structure to obfuscate the flow of money to its perpetrators. In this paper, the authors illuminate the intricate nature of this activity through the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    On The Security of Mobile Cockpit Information Systems

    Recent trends in aviation have led many general aviation pilots to adopt the use of iPads (or other tablets) in the cockpit. While initially used to display static charts and documents, uses have expanded to include live data such as weather and traffic information that is used to make flight...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Computing Multi-Relational Sufficient Statistics for Large Databases

    Databases contain information about which relationships do and do not hold among entities. To make this information accessible for statistical analysis requires computing sufficient statistics that combine information from different database tables. Such statistics may involve any number of positive and negative relationships. With a naive enumeration approach, computing sufficient...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    SoftMoW: Recursive and Reconfigurable Cellular WAN Architecture

    The current LTE network architecture is organized into very large regions, each having a core network and a radio access network. The core network contains an Internet edge comprised of Packet data network GateWays (PGWs). The radio network consists of only base stations. There are minimal interactions among regions other...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    PRAN: Programmable Radio Access Networks

    With the continued exponential growth of mobile traffic and the rise of diverse applications, the current LTE Radio Access Network (RAN) architecture of cellular operators faces mounting challenges. Current RAN suffers from insufficient radio resource coordination, inefficient infrastructure utilization, and inflexible data paths. The authors present the high level design...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Sweet Little Lies: Fake Topologies for Flexible Routing

    Link-state routing protocols (e.g., OSPF and IS-IS) are widely used because they are scalable, robust, and based on simple abstractions. Unfortunately, these protocols are also relatively inflexible, since they direct all traffic over shortest paths. In contrast, Software Defined Networking (SDN) offers fine-grained control over routing, at the expense of...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Tango: Simplifying SDN Control with Automatic Switch Property Inference, Abstraction, and Optimization

    A major benefit of Software-Defined Networking (SDN) over traditional networking is simpler and easier control of network devices. The diversity of SDN switch implementation properties, which include both diverse switch hardware capabilities and diverse control-plane software behaviors, however, can make it difficult to understand and/or to control the switches in...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Blender: Upgrading Tenant-based Data Center Networking

    In this paper, the authors present Blender, a framework that enables network operators to improve tenant performance by tailoring the network's behavior to tenant needs. Tenants may upgrade their provisioned portion of the network with specific features, such as multi-path routing, isolation, and failure recovery, without modifying hosted application code....

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    System-Level Memory Optimization for High-Level Synthesis of Component-Based SoCs

    The design of specialized accelerators is essential to the success of many modern systems-on-chip. Electronic system-level design methodologies and high-level synthesis tools are critical for the efficient design and optimization of an accelerator. Still, these methodologies and tools offer only limited support for the optimization of the memory structures, which...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Automatic Custom Instruction Identification in Memory Streaming Algorithms

    Application-Specific Instruction Set Processors (ASIPs) extend the instruction set of a general purpose processor by dedicated Custom Instructions (CIs). In the last decade, reconfigurable processors advanced this concept towards runtime reconfiguration to increase the efficiency and adaptivity. Compiler support for automatic identification and implementation of ASIP CIs exists commercially and...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Measurement and Analysis of OSN Ad Auctions

    Advertising is ubiquitous on the web; numerous ad networks serve billions of ads daily via keyword or search term auctions. Recently, Online Social Networks (OSNs) such as Facebook have created site-specific ad services that differ from traditional ad networks by letting advertisers bid on users rather than keywords. With Facebook's...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Beyond CPM and CPC: Determining the Value of Users on OSNs

    Not all of the over one billion users of Online Social Networks (OSNs) are equally valuable to the OSNs. The current business model of monetizing advertisements targeted to users does not appear to be based on any visible grouping of the users. The primary metrics remain CPM (Cost Per Mille...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks

    Intrusion detection, traffic classification, and other network monitoring applications need to analyze the captured traffic beyond the network layer to allow for connection-oriented analysis, and achieve resilience to evasion attempts based on TCP segmentation. Existing network traffic capture frameworks, however, provide applications with raw packets and leave complex operations like...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Security and QoS Tradeoff Recommendation System (SQT-RS) for Dynamic Assessing CPRM-based Systems

    Context-based Parametric Relationship Models (CPRM) defines complex dependencies between different types of parameters. In particular, security and QoS relationships that may occur at different levels of abstraction are easily identified using CPRM. However, the growing number of parameters and relationships, typically due to the heterogeneous scenarios of future networks, increase...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Poster - iSync: A High Performance and Scalable Data Synchronization Protocol for Named Data Networking

    In this paper, the authors present a high performance synchronization protocol for Named Data Networking (NDN). The protocol, called iSync, uses a two-level Invertible Bloom Filter (IBF) structure to support efficient data reconciliation. Multiple differences can be found by subtracting a remote IBF from a local IBF, and therefore, from...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Consumer-Producer API for Named Data Networking

    As a new architecture, NDN requires a new API. Today's socket API cannot be reused for NDN communication because its foundational concept is point-to-point virtual channel that does not exist in NDN. This paper presents a new network programming interface to NDN communication protocols and architectural modules. This new API...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    On the Role of Routing in Named Data Networking

    A unique feature of Named Data Networking (NDN) is that its forwarding plane can detect and recover from network faults on its own, enabling each NDN router to handle network failures locally without relying on global routing convergence. This new feature prompts the authors to re-examine the role of routing...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    VIP: A Framework for Joint Dynamic Forwarding and Caching in Named Data Networks

    Emerging information-centric networking architectures seek to optimally utilize both bandwidth and storage for efficient content distribution. This highlights the need for joint design of traffic engineering and caching strategies, in order to optimize network performance in view of both current traffic loads and future traffic demands. The authors present a...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Kite: A Mobility Support Scheme for NDN

    Named Data Networking (NDN) natively supports the mobility of data consumers through its data-centric design and stateful forwarding plane. However, the mobility support for data producers remains open in the original proposal. In this paper, the authors introduce Kite, a design of mobility support for NDN. Kite leverages the state...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Automatic Verification of Interactions in Asynchronous Systems with Unbounded Buffers

    Asynchronous communication requires message queues to store the messages that are yet to be consumed. Verification of interactions in asynchronously communicating systems is challenging since the sizes of these queues can grow arbitrarily large during execution. In fact, behavioral models for asynchronously communicating systems typically have in finite state spaces,...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    A Bi-Objective Cost Model for Database Queries in a Multi-Cloud Environment

    Cost models are broadly used in query processing to drive the query optimization process, accurately predict the query execution time, schedule database query tasks, apply admission control and derive resource requirements to name a few applications. The main role of cost models is to produce the time needed to run...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Proximity-Based Wireless Access Control through Considerate Jamming

    As diverse types of wireless devices emerge, it becomes difficult to apply the existing wireless security measures to them without efforts. Those devices lack conventional user interfaces or they are resource-constrained to process the security protocols. Meanwhile, many of them are used within a geographical boundary to access to the...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Rethink Energy Accounting with Cooperative Game Theory

    Energy accounting determines how much a software principal contributes to the total system energy consumption. It is the foundation for evaluating software and for operating system based energy management. While various energy accounting policies have been tried, there is no known way to evaluate them directly simply because it is...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Combating Inter-cell Interference in 802.11ac-based Multi-user MIMO Networks

    In an 802.11ac-based MU-MIMO network comprised of multiple cells, inter-cell interference allows only a single AP to serve its clients at the same time, significantly limiting the network capacity. In this paper, the authors overcome this limitation by letting the APs and clients in interfering cells coordinately cancel the inter-cell...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Enfold: Downclocking OFDM in WiFi

    Dynamic Voltage and Frequency Scaling (DVFS) has long been used as a technique to save power in a variety of computing domains but typically not in communications devices. A fundamental limit that prevents decreasing the clock frequency is the Nyquist (-Shannon) sampling theorem, which states that the sampling rate must...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Cutting the Cord: a Robust Wireless Facilities Network for Data Centers

    Today's network control and management traffic are limited by their reliance on existing data networks. Fate sharing in this paper, is highly undesirable, since control traffic has very different availability and traffic delivery requirements. In this paper, the authors explore the feasibility of building a dedicated wireless facilities network for...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Overheard ACK with Token Passing: An Optimization to 802.11 MAC Protocol

    Distributed Coordination Function (DCF) is defined in IEEE 802.11 standard, which is widely used in practice. Despite of its wide use, it has several limitations. Because of the idle and collision times, it suffers from poor channel utilization. Besides, the control packets, particularly, ACKnowledgement (ACK), consume non-trivial amount of bandwidth....

    Provided By Association for Computing Machinery

  • White Papers // Nov 2003

    Computing Equilibrium Strategies in Infinite Games of Incomplete Information

    This paper describes an algorithm for computing best-response strategies in a class of infinite games of incomplete information (of which various auctions are prime examples). Under certain conditions, this algorithm can be used to automatically compute Bayes-Nash equilibria. The predominant game-solving algorithms generally address finite games and approximate infinite games...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-Based Single Sign-on for Google Apps

    Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by different companies. The OASIS Security Assertion Markup Language (SAML) 2.0 Web Browser SSO Profile is the emerging standard in this context. This...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2009

    Towards Combining Web Classification and Web Information Extraction: A Case Study

    Web content analysis often has two sequential and separate steps: Web Classification to identify the target Web pages, and Web Information Extraction to extract the metadata contained in the target Web pages. This decoupled strategy is highly ineffective since the errors in Web classification will be propagated to Web information...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2009

    Using Static Analysis for Ajax Intrusion Detection

    This paper presents a static control-flow analysis for JavaScript programs running in a web browser. The analysis tackles numerous challenges posed by modern web applications including asynchronous communication, frameworks, and dynamic code generation. The paper uses the analysis to extract a model of expected client behavior as seen from the...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2009

    Semi-Supervised Co-Training and Active Learning Based Approach for Multi-View Intrusion Detection

    Although there is immense data available from networks and hosts, a very small proportion of this data is labeled due to the cost of obtaining expert labels. This proves to be a significant bottle-neck for developing supervised intrusion detection systems that rely solely on labeled data. In spite of the...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2009

    Detecting Image Spam Using Local Invariant Features and Pyramid Match Kernel

    Image spam is a new obfuscating method which spammers invented to more effectively bypass conventional text based spam filters. This paper extracts local invariant features of images and runs a one-class SVM classifier which uses the pyramid match kernel as the kernel function to detect image spam. Experimental results demonstrate...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2009

    Linked Latent Dirichlet Allocation in Web Spam Filtering

    Latent Dirichlet Allocation (LDA) is a fully generative statistical language model on the content and topics of a corpus of documents. This paper applies an extension of LDA for web spam classification. The inferred LDA model can be applied for classification as dimensionality reduction similarly to latent semantic indexing. They...

    Provided By Association for Computing Machinery

  • White Papers // May 2009

    OSD: An Online Web Spam Detection System

    Web spam which refers to any deliberate actions bringing to selected web pages an unjustifiable favorable relevance or importance is one of the major obstacles for high quality information retrieval on the web. Most of the existing web spam detection methods are supervised that require a large and representative training...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    Anti-Phishing Based on Automated Individual White-List

    In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The traditional blacklist approach for anti-phishing is partially effective due to its partial list of global phishing sites. This paper presents a novel anti-phishing approach...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2009

    Web Spam Challenge Proposal for Filtering in Archives

    This paper proposes new tasks for a possible future Web Spam Challenge motivated by the needs of the archival community. The Web archival community consists of several relatively small institutions that operate independently and possibly over different Top Level Domains (TLDs). Each of them may have a large set of...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2009

    Web Spam Filtering in Internet Archives

    While Web spam is targeted for the high commercial value of top-ranked search-engine results, Web archives observe quality deterioration and resource waste as a side effect. So far Web spam filtering technologies are rarely used by Web archivists but planned in the future as indicated in a survey with responses...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    On Voting Machine Design for Verification and Testability

    The authors present an approach for the design and analysis of an electronic voting machine based on a novel combination of formal verification and systematic testing. The system was designed specifically to enable verification and testing. In the architecture, the voting machine is a finite-state transducer that implements the bare...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Eddi: Interactive Topic-Based Browsing of Social Status Streams

    Twitter streams are on overload: Active users receive hundreds of items per day, and existing interfaces force one to march through a chronologically-ordered morass to find tweets of interest. The authors present an approach to organizing a user's own feed into coherently clustered trending topics for more directed exploration. The...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Contention Analysis of MAC Protocols That Count

    The key aspect in the design of any contention-based Medium Access Control (MAC) protocol is the mechanism to measure and resolve simultaneous contention. Generally, terrestrial wireless MACs can only observe success or collision of a contention attempt through carrier sense. An implicit estimate of the number of contenders occurs through...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2011

    Garbage Collection for Monitoring Parametric Properties

    Parametric properties are behavioral properties over program events that depend on one or more parameters. Parameters are bound to concrete data or objects at runtime, which makes parametric properties particularly suitable for stating multi-object relationships or protocols. Monitoring parametric properties independently of the employed formalism involves slicing traces with respect...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2011

    Personality-Based Privacy Management for Location-Sharing in Diverse Subpopulations

    Researchers in the area of privacy management often suggest to provide users with a collection of privacy settings and good defaults for them. However, the research into people's attitudes towards location-sharing technology (considering both adopters and non-adopters) indicates that the right way to manage privacy and the right default can...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2011

    With a Little Help From My Friends: Can Social Navigation Inform Interpersonal Privacy Preferences?

    Recent privacy controversies surrounding social networking sites demonstrate that the mere availability of settings is not enough for effective privacy management. The authors investigated whether the aggregated privacy choices of one's social circle might guide users in making informed privacy decisions. They conducted an experiment in which users specified preferences...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Generating Advertising Keywords From Video Content

    With the proliferation of online distribution methods for videos, content owners require easier and more effective methods for monetization through advertising. Matching advertisements with related content has a significant impact on the effectiveness of the ads, but current methods for selecting relevant advertising keywords for videos are limited by reliance...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Web Service Clustering Using Multidimensional Angles as Proximity Measures

    Increasingly, application developers seek the ability to search for existing Web services within large Internet-based repositories. The goal is to retrieve services that match the user's requirements. With the growing number of services in the repositories and the challenges of quickly finding the right ones, the need for clustering related...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2010

    Static Detection of Unsafe Component Loadings

    Dynamic loading of software components is a commonly used mechanism to achieve better flexibility and modularity in software. For an application's runtime safety, it is important for the application to load only its intended components. However, programming mistakes may lead to failures to load a component, or even worse, to...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2010

    Comparing Privacy Attitudes of Knowledge Workers in the U.S. and India

    The authors compared privacy attitudes of knowledge workers from the U.S. and India who were involved in a collaborative software development project distributed across five sites of a multinational corporation. Prior studies on consumer privacy suggest that privacy concerns in India are lower than those in the U.S. While the...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2011

    Stanford WebBase Components and Applications

    The authors describe the design and performance of WebBase, a tool for Web research. The system includes a highly customizable crawler, a repository for collected Web pages, an indexer for both text and link-related page features, and a high-speed content distribution facility. The distribution module enables researchers world-wide to retrieve...

    Provided By Association for Computing Machinery

  • White Papers // May 2011

    More Than Skin Deep: Measuring Effects of the Underlying Model on Access-Control System Usability

    In access-control systems, policy rules conflict when they prescribe different decisions (ALLOW or DENY) for the same access. The authors present the results of a user study that demonstrates the significant impact of conflict-resolution method on policy-authoring usability. In the study of 54 participants, varying the conflict-resolution method yielded statistically...

    Provided By Association for Computing Machinery

  • White Papers // May 2011

    Exploring Reactive Access Control

    As users store and share more digital content at home, access control becomes increasingly important. One promising approach for helping non-expert users create accurate access policies is reactive policy creation, in which users can update their policy dynamically in response to access requests that would not otherwise succeed. An earlier...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Power Management of Online Data-Intensive Services

    Much of the success of the Internet services model can be attributed to the popularity of a class of workloads that the authors call Online Data-Intensive (OLDI) services. These work-loads perform significant computing over massive data sets per user request but, unlike their offline counterparts (such as MapReduce computations), they...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2011

    MemScale: Active Low-Power Modes for Main Memory

    Main memory is responsible for a large and increasing fraction of the energy consumed by servers. Prior work has focused on exploiting DRAM low-power states to conserve energy. However, these states require entire DRAM ranks to be idled, which is difficult to achieve even in lightly loaded servers. In this...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    QoS Architectural Patterns for Self-Architecting Software Systems

    This paper discusses the automated application of architectural patterns for tuning the quality of service of service-oriented software. The paper first presents an overview of prior work in self-architecting, SASSY, and a motivating example in the emergency response domain. After summarizing the heuristic used for self-architecting, the paper discusses a...

    Provided By Association for Computing Machinery

  • White Papers // May 2010

    Social Computing Networks: A New Paradigm for Engineering Self-Adaptive Pervasive Software Systems

    Software systems are increasingly permeating a variety of domains including medical, industrial automation, and emergency response. The advances in portable and embedded computing devices and the recent advances in wireless network connectivity have paved the way for the proliferation of smart spaces in such domains. At the same time, the...

    Provided By Association for Computing Machinery

  • White Papers // May 2009

    Multicast Routing With Dynamic Packet Fragmentation

    Networks-on-Chip (NoCs) become a critical design factor as Chip MultiProcessors (CMPs) and Systems on a Chip (SoCs) scale up with technology. With fundamental benefits of high bandwidth and scalability in on-chip networks, a newly added multicast capability can further enhance the performance by reducing the network load and facilitate coherence...

    Provided By Association for Computing Machinery

  • White Papers // May 2010

    On Decentralized Self-Adaptation: Lessons From the Trenches and Challenges for the Future

    Self-adaptability has been proposed as an effective approach to deal with the increasing complexity, distribution, and dynamicity of modern software systems. Although noteworthy successes have been achieved in many fronts, there is a lack of understanding on how to engineer distributed self-adaptive software systems in which central control is not...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Functional Dependency Generation and Applications in Pay-as-You-Go Data Integration Systems

    Recently, the opportunity of extracting structured data from the Web has been identified by a number of research projects. One such example is that millions of relational-style HTML tables can be extracted from the Web. Traditional data integration approaches do not scale over such corpora with hundreds of small tables...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Keypad: An Auditing File System for Theft-Prone Devices

    This paper presents Keypad, an auditing file system for theft-prone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine-grained file auditing: a user can obtain explicit evidence that no files have been accessed after a device's loss. Second, a user can disable future...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2011

    Effective Page Refresh Policies for Web Crawlers

    In this paper the authors study how people can maintain local copies of remote data sources "Fresh," when the source data is updated autonomously and independently. In particular, the authors study the problem of Web crawlers that maintain local copies of remote Web pages for Web search engines. In this...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2010

    TurboTag: Lookup Filtering to Reduce Coherence Directory Power

    On-chip coherence directories of today's multi-core systems are not energy efficient. Coherence directories dissipate a significant fraction of their power on unnecessary lookups when running commercial server and scientific workloads. These workloads have large working sets that are beyond the reach of on-chip caches of modern processors. Limited to capturing...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Constrained Reverse Nearest Neighbor Search on Mobile Objects

    While the Reverse k-Nearest Neighbor (RkNN) search problem, i.e. finding all objects in a database that have a given query q among their corresponding k-nearest neighbors, has been studied extensively in the past years, considerably less work has been done so far to support RkNN queries on mobile objects that...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2010

    Memory-Efficient A*-Search Using Sparse Embeddings

    When searching for optimal paths in a network, algorithms like A-search need an approximation of the minimal costs between the current node and a target node. A reference node embedding is a universal method for making such an approximation working for any type of positive edge weights. A drawback of...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Input-Sensitive Scalable Continuous Join Query Processing

    This paper considers the problem of scalably processing a large number of continuous queries. The authors' approach, consisting of novel data structures and algorithms and a flexible processing framework, advances the state-of-the-art in several ways. First, their approach is query sensitive in the sense that it exploits potential overlaps in...

    Provided By Association for Computing Machinery

  • White Papers // May 2011

    On Processing and Notifying Range Top-k Subscriptions

    The authors consider how to support a large number of range top-k subscriptions for wide-area publish/subscribe. Given an object update, they need to notify subscriptions whose top-k results are affected. Simple solutions include using a content-driven network to notify all subscriptions whose ranges contain the update (ignoring top-k), or using...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Connected Substructure Similarity Search

    Substructure similarity search is to retrieve graphs that approximately contain a given query graph. It has many applications, e.g., detecting similar functions among chemical compounds. The problem is challenging as even testing subgraph containment between two graphs is NP-complete. Hence, existing techniques adopt the filtering-and-verification framework with the focus on...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Keyword Search on Structured and Semi-Structured Data

    Empowering users to access databases using simple keywords can relieve the users from the steep learning curve of mastering a structured query language and understanding complex and possibly fast evolving data schemas. In this paper, the authors give an overview of the state-of-the-art techniques for supporting keyword search on structured...

    Provided By Association for Computing Machinery