Association for Computing Machinery

Displaying 1-40 of 6791 results

  • White Papers // Nov 2014

    Patterns in the Chaos - A Study of Performance Variation and Predictability in Public IaaS Clouds

    Benchmarking the performance of public cloud providers is a common research topic. Previous paper has already extensively evaluated the performance of different cloud platforms for different use cases, and under different constraints and experiment setups. In this paper, the authors present a principled, large-scale literature review to collect and codify...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed

    Central to the secure operation of a Public Key Infrastructure (PKI) is the ability to revoke certificates. While much of users' security rests on this process taking place quickly, in practice, revocation typically requires a human to decide to reissue a new certificate and revoke the old one. Thus, having...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    SoftMoW: Recursive and Reconfigurable Cellular WAN Architecture

    The current LTE network architecture is organized into very large regions, each having a core network and a radio access network. The core network contains an Internet edge comprised of Packet data network GateWays (PGWs). The radio network consists of only base stations. There are minimal interactions among regions other...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    PRAN: Programmable Radio Access Networks

    With the continued exponential growth of mobile traffic and the rise of diverse applications, the current LTE Radio Access Network (RAN) architecture of cellular operators faces mounting challenges. Current RAN suffers from insufficient radio resource coordination, inefficient infrastructure utilization, and inflexible data paths. The authors present the high level design...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Tango: Simplifying SDN Control with Automatic Switch Property Inference, Abstraction, and Optimization

    A major benefit of Software-Defined Networking (SDN) over traditional networking is simpler and easier control of network devices. The diversity of SDN switch implementation properties, which include both diverse switch hardware capabilities and diverse control-plane software behaviors, however, can make it difficult to understand and/or to control the switches in...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    System-Level Memory Optimization for High-Level Synthesis of Component-Based SoCs

    The design of specialized accelerators is essential to the success of many modern systems-on-chip. Electronic system-level design methodologies and high-level synthesis tools are critical for the efficient design and optimization of an accelerator. Still, these methodologies and tools offer only limited support for the optimization of the memory structures, which...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Beyond CPM and CPC: Determining the Value of Users on OSNs

    Not all of the over one billion users of Online Social Networks (OSNs) are equally valuable to the OSNs. The current business model of monetizing advertisements targeted to users does not appear to be based on any visible grouping of the users. The primary metrics remain CPM (Cost Per Mille...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Measurement and Analysis of OSN Ad Auctions

    Advertising is ubiquitous on the web; numerous ad networks serve billions of ads daily via keyword or search term auctions. Recently, Online Social Networks (OSNs) such as Facebook have created site-specific ad services that differ from traditional ad networks by letting advertisers bid on users rather than keywords. With Facebook's...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Security and QoS Tradeoff Recommendation System (SQT-RS) for Dynamic Assessing CPRM-based Systems

    Context-based Parametric Relationship Models (CPRM) defines complex dependencies between different types of parameters. In particular, security and QoS relationships that may occur at different levels of abstraction are easily identified using CPRM. However, the growing number of parameters and relationships, typically due to the heterogeneous scenarios of future networks, increase...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Proximity-Based Wireless Access Control through Considerate Jamming

    As diverse types of wireless devices emerge, it becomes difficult to apply the existing wireless security measures to them without efforts. Those devices lack conventional user interfaces or they are resource-constrained to process the security protocols. Meanwhile, many of them are used within a geographical boundary to access to the...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Combating Inter-cell Interference in 802.11ac-based Multi-user MIMO Networks

    In an 802.11ac-based MU-MIMO network comprised of multiple cells, inter-cell interference allows only a single AP to serve its clients at the same time, significantly limiting the network capacity. In this paper, the authors overcome this limitation by letting the APs and clients in interfering cells coordinately cancel the inter-cell...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Rethink Energy Accounting with Cooperative Game Theory

    Energy accounting determines how much a software principal contributes to the total system energy consumption. It is the foundation for evaluating software and for operating system based energy management. While various energy accounting policies have been tried, there is no known way to evaluate them directly simply because it is...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2014

    OpenNF: Enabling Innovation in Network Function Control

    Network Functions Virtualization (NFV) together with Software Defined Networking (SDN) has the potential to help operators satisfy tight service level agreements, accurately monitor and manipulate network traffic, and minimize operating expenses. However, in scenarios that require packet processing to be redistributed across a collection of Network Function (NF) instances, simultaneously...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2014

    Pratyaastha: An Efficient Elastic Distributed SDN Control Plane

    Several distributed SDN controller architectures have been proposed to mitigate the risks of overload and failure. However, since they statically assign switches to controller instances and store state in distributed data stores (which doubles flow setup latency), they hinder operators' ability to minimize both flow setup latency and controller resource...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2014

    Dynamic Scheduling of Network Updates

    The authors present Dionysus, a system for fast, consistent network updates in software-defined networks. Dionysus encodes as a graph the consistency-related dependencies among updates at individual switches, and it then dynamically schedules these updates based on runtime differences in the update speeds of different switches. This dynamic scheduling is the...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2014

    LTE Radio Analytics Made Easy and Accessible

    Despite the rapid growth of next-generation cellular networks, researchers and end-users today have limited visibility into the performance and problems of these networks. As LTE deployments move towards femto and pico cells, even operators struggle to fully understand the propagation and interference patterns affecting their service, particularly indoors. This paper...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2014

    Compiling Minimum Incremental Update for Modular SDN Languages

    Measurement results show that updating rules on switches poses major latency overhead during the course of the policy update. However, current SDN policy compilers do not handle policy updates well and generate large amount of redundant rule updates, most of which modify only the priority field. The authors' analysis shows...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2014

    Power Napping with Loud Neighbors: Optimal Energy-Constrained Jamming and Anti-Jamming

    The openness of wireless communication and the recent development of software-defined radio technology, respectively, provide a low barrier and a wide range of capabilities for misbehavior, attacks, and defenses against attacks. In this paper, the authors present finite-energy jamming games, a game model that allows a jammer and sender to...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2014

    Gaining Insight on Friendly Jamming in a Real-World IEEE 802.11 Network

    Frequency jamming is the fiercest attack tool to disrupt wireless communication and its malicious aspects have received much attention in the literature. Yet, several recent papers propose to turn the table and employ so called friendly jamming for the benefit of a wireless network. For example, recently proposed friendly jamming...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2014

    Understanding and Specifying Social Access Control Lists

    Online Social Network (OSN) users upload millions of pieces of content to share with others every day. While a significant portion of this content is benign (and is typically shared with all friends or all OSN users), there are certain pieces of content that are highly privacy sensitive. Sharing such...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2014

    A Methodology for Social BI

    Social BI (SBI) is the emerging discipline that aims at combining corporate data with textual User-Generated Content (UGC) to let decision-makers analyze their business based on the trends perceived from the environment. Despite the increasing diffusion of SBI applications, no specific and organic design methodology is available yet. In this...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2014

    Towards Detecting Anomalous User Behavior in Online Social Networks

    Users increasingly rely on crowd-sourced information, such as reviews on Yelp and Amazon, and liked posts and ads on Facebook. This has led to a market for blackhat promotion techniques via fake (e.g., Sybil) and compromised accounts, and collusion networks. Existing approaches to detect such behavior relies mostly on supervised...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Domino: An Incremental Computing Framework in Cloud with Eventual Synchronization

    In recent years, more and more applications in cloud have needed to process large-scale online data sets that evolve over time as entries are added or modified. Several programming frameworks, such as percolator and oolong, are proposed for such incremental data processing and can achieve efficient updates with an event-driven...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Computation and Communication Efficient Graph Processing with Distributed Immutable View

    Cyclops is a new vertex-oriented graph-parallel framework for writing distributed graph analytics. Unlike existing distributed graph computation models, cyclops retains simplicity and computation-efficiency by synchronously computing over a distributed immutable view, which grants a vertex with read-only access to all its neighboring vertices. The view is provided via read-only replication...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    CrowdFill: Collecting Structured Data from the Crowd

    The authors present CrowdFill, a system for collecting structured data from the crowd. While a typical microtask-based approach would pose specific questions to each worker and assemble the answers, Crowd-Fill shows a partially-filled table to all participating workers. Workers contribute by filling in empty cells, as well as upvoting and...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Next Generation Job Management Systems for Extreme-Scale Ensemble Computing

    With the exponential growth of supercomputers in parallelism, applications are growing more diverse, including traditional large-scale HPC MPI jobs, and ensemble workloads such as finer-grained Many-Task Computing (MTC) applications. Delivering high throughput and low latency for both workloads requires developing a distributed job management system that is magnitudes more scalable...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Design and Evaluation of the GeMTC Framework for GPU-enabled Many-Task Computing

    The authors present the design and first performance and usability evaluation of GeMTC, a novel execution model and runtime system that enables accelerators to be programmed with many concurrent and independent tasks of potentially short or variable duration. With GeMTC, a broad class of such \"Many-task\" applications can leverage the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Indexing for Interactive Exploration of Big Data Series

    Numerous applications continuously produce big amounts of data series, and in several time critical scenarios analysts need to be able to query these data as soon as they become available, which is not currently possible with the state-of-the-art indexing methods and for very large data series collections. In this paper,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    H2O: A Hands-Free Adaptive Store

    Modern state-of-the-art database systems are designed around a single data storage layout. This is a fixed decision that drives the whole architectural design of a database system, i.e., row-stores, column-stores. However, none of those choices is a universally good solution; different workloads require different storage layouts and data access methods...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Database Cracking: Fancy Scan, not Poor Man's Sort!

    Database cracking is an appealing approach to adaptive indexing: on every range-selection query, the data is partitioned using the supplied predicates as pivots. The core of database cracking is, thus, pivoted partitioning. While pivoted partitioning, like scanning, requires a single pass through the data it tends to have much higher...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Dynamic Fine-Grained Scheduling for Energy-Efficient Main-Memory Queries

    Power and cooling costs are some of the highest costs in data centers today, which make improvement in energy efficiency crucial. Energy efficiency is also a major design point for chips that power whole ranges of computing devices. One important goal in this area is energy proportionality, arguing that the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    H2RDF+: An Efficient Data Management System for Big RDF Graphs

    The proliferation of data in RDF format has resulted in the emergence of a plethora of specialized management systems. While the ability to adapt to the complexity of a SPARQL query - given their inherent diversity - is crucial, current approaches do not scale well when faced with substantially complex,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Scalable Indexing and Adaptive Querying of RDF Data in the Cloud

    Efficient RDF data management systems are central to the vision of the semantic Web. The enormous increase in both user and machine generated content dictates for scalable solutions in triple data stores. Current systems manage to decentralize some or all the stages of RDF data management, scaling to arbitrarily large...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Device Drivers Should Not Do Power Management

    The authors argue that device drivers are not the best place to implement power management policies for components on a System-on-Chip (SoC). They present empirical evidence that device driver developers are inadequately implementing power management and show the information needed for good power management policies is available outside the device...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Draining our Glass: An Energy and Heat Characterization of Google Glass

    The Google Glass is a mobile device designed to be worn as eyeglasses. This form factor enables new use cases, such as hands-free video chat and web search. However, its shape also hampers its potential: battery size, and therefore lifetime, is limited by a need for the device to be...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Accessing Multiple Clouds with Cloudmesh

    The authors present the design of a toolkit that can be employed by users and administrators to manage virtual machines on multi-cloud environments. It can be run by individual users or offered as a service to a shared user community. They have practically demonstrated its use as part of a...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Self Managing Monitoring for Highly Elastic Large Scale Cloud Deployments

    Infrastructure as a service computing exhibits a number of properties, which are not found in conventional server deployments. Elasticity is among the most significant of these properties which has wide reaching implications for applications deployed in cloud hosted VMs. Among the applications a affected by elasticity is monitoring. In this...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Infinite CacheFlow in Software-Defined Networks

    Software-Defined Networking (SDN) enables ne-grained policies for firewalls, load balancers, routers, traffic monitoring, and other functionality. While Ternary Content Address-able Memory (TCAM) enables OpenFlow switches to process packets at high speed based on multiple header fields, today's commodity switches support just thousands to tens of thousands of rules. To realize...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Rio: A System Solution for Sharing I/O Between Mobile Systems

    Mobile systems are equipped with a diverse collection of I/O devices, including cameras, microphones, sensors, and modems. There exist many novel use cases for allowing an application on one mobile system to utilize I/O devices from another. This paper presents Rio, an I/O sharing solution that supports unmodified applications and...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    SpareEye: Enhancing the Safety of Inattentionally Blind Smartphone Users

    Using mobile phones while walking for activities that require continuous focus on the screen, such as texting, has become more and more popular in the last years. To avoid colliding with obstacles, such as lampposts and pedestrians, focus has to be taken off the screen in regular intervals. In this...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2011

    Authenticating Location with Femtocells

    Providers of location-based services seek new methods to authenticate the location of their clients. The authors propose a novel, intelligent infrastructure-based solution that provides spontaneous and transaction-oriented, collusion-resistant mobile device location authentication via an integrated 802.11x wireless access point and 3G femtocell access system. By simply making a voice call...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2011

    Discovering Interesting Sub-paths in Spatiotemporal Datasets: A Summary of Results

    Given a SpatioTemporal (ST) dataset and a path in its embedding spatiotemporal framework, the goal is to identify all interesting sub-paths defined by an interest measure. Sub-path discovery is of fundamental importance for understanding climate changes, agriculture, and many other application. However, this problem is computationally challenging due to the...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2012

    Understanding Human Movement Semantics: A Point of Interest Based Approach

    The recent availability of human mobility traces has driven a new wave of research - on human movement - with straight-forward applications in wireless/cellular network algorithmic problems. In this paper, the authors revisit the human mobility problem with new assumptions. They believe that human movement is not independent of the...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    Analyzing Content-Level Properties of the Web Adversphere

    Advertising has become an integral and inseparable part of the World Wide Web. However, neither public auditing nor monitoring mechanisms still exist in this emerging area. In this paper, the authors present their initial efforts on building a content-level auditing service for web-based ad networks. Their content-level measurements - understanding...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2012

    Content Delivery and the Natural Evolution of DNS

    Content Delivery Networks (CDNs) rely on the Domain Name System (DNS) for replica server selection. DNSbased server selection builds on the assumption that, in the absence of information about the client's actual network location, the location of a client's DNS resolver provides a good approximation. The recent growth of remote...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2012

    namehelp: Intelligent Client-Side DNS Resolution

    The Domain Name System (DNS) is a fundamental component of today's Internet. Recent years have seen radical changes to DNS with increases in usage of remote DNS and public DNS services such as OpenDNS. Given the close relationship between DNS and Content Delivery Networks (CDNs) and the pervasive use of...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2012

    Crowd (Soft) Control: Moving Beyond The Opportunistic

    A number of novel wireless networked services, ranging from participatory sensing to social networking, leverage the increasing capabilities of mobile devices and the movements of the individuals carrying them. For many of these systems, their effectiveness fundamentally depends on coverage and the particular mobility patterns of the participants. Given the...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2011

    Distributed Systems and Natural Disasters - BitTorrent as a Global Witness

    Peer-To-Peer (P2P) systems represent some of the largest distributed systems in today's Internet. Among P2P systems, BitTorrent is the most popular, potentially accounting for 20-50% of P2P file-sharing traffic. In this paper, the authors argue that this popularity can be leveraged to monitor the impact of natural disasters and political...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2011

    Crowdsourcing ISP Characterization to The Network Edge

    Evaluating and characterizing Internet Service Providers (ISPs) is critical to subscribers shopping for alternative ISPs, companies providing reliable Internet services, and governments surveying the coverage of broadband services to its citizens. Ideally, ISP characterization should be done at scale, continuously, and from end users. While there has been significant progress...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2011

    On Blind Mice and the Elephant - Understanding the Network Impact of a Large Distributed System

    A thorough understanding of the network impact of emerging large-scale distributed systems - where traffic flows and what it costs - must encompass users' behavior, the traffic they generate and the topology over which that traffic flows. In the case of BitTorrent, however, previous studies have been limited by narrow...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Symbolic Crosschecking of Floating-Point and SIMD Code

    The authors present an effective technique for crosschecking an IEEE 754 floating-point program and its SIMD-vectorized version, implemented in KLEE-FP, an extension to the KLEE symbolic execution tool that supports symbolic reasoning on the equivalence between floating-point values. The key insight behind their approach is that floating-point values are only...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Feature Consistency in Compile-Time - Configurable System Software

    Much system software can be configured at compile time to tailor it with respect to a broad range of supported hardware architectures and application domains. A good example is the Linux kernel, which provides more than 10,000 configurable features, growing rapidly. From the maintenance point of view, compile-time configurability imposes...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Database Engines on Multicores, Why Parallelize When You Can Distribute?

    Multicore computers pose a substantial challenge to infrastructure software such as operating systems or databases. Such software typically evolves slower than the underlying hardware, and with multicore it faces structural limitations that can be solved only with radical architectural changes. In this paper, the authors argue that, as has been...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Finding Complex Concurrency Bugs in Large Multi-Threaded Applications

    Parallel software is increasingly necessary to take advantage of multi-core architectures, but it is also prone to concurrency bugs which are particularly hard to avoid, find, and fix, since their occurrence depends on specific thread inter-leavings. In this paper, the authors propose a concurrency bug detector that automatically identifies when...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Fine-Grained Power Modeling for Smartphones Using System Call Tracing

    The authors propose a new, system-call-based power modeling approach which gracefully encompasses both utilization-based and non-utilization-based power behavior. They present the detailed design of such a power modeling scheme and its implementation on Android and Windows Mobile. Their experimental results using a diverse set of applications confirm that the new...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    A Case for Scaling Applications to Many-Core with OS Clustering

    In this paper, the authors propose an approach to scaling UNIX-like operating systems for many cores in a backward-compatible way, which still enjoys common wisdom in new operating system designs. The proposed system, called Cerberus, mitigates contention on many shared data structures within OS kernels by clustering multiple commodity operating...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Parallel Symbolic Execution for Automated Real-World Software Testing

    In this paper, the authors introduce Cloud9, a platform for automated testing of real-world software. Their main contribution is the scalable parallelization of symbolic execution on clusters of commodity hardware, to help cope with path explosion. Cloud9 provides a systematic interface for writing "Symbolic tests" that concisely specify entire families...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    SRM-Buffer: An OS Buffer Management Technique to Prevent Last Level Cache From Thrashing in Multicores

    In this paper, the authors propose a buffer cache design called Selected Region Mapping Buffer (SRM-Buffer) for multicore systems to effectively address the cache pollution problem caused by OS buffer. SRM-buffer improves existing OS buffer management with an enhanced page allocation policy that carefully selects mapping physical pages upon buffer...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Scheduling Large Jobs by Abstraction Refinement

    The static scheduling problem often arises as a fundamental problem in real-time systems and grid computing. The authors consider the problem of statically scheduling a large job expressed as a task graph on a large number of computing nodes, such as a data center. This paper solves the large-scale static...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Is Co-Scheduling Too Expensive for SMP VMs?

    Symmetric MultiProcessing (SMP) Virtual Machines (VMs) allow users to take advantage of a multiprocessor infrastructure. Despite the advantage, SMP VMs can cause synchronization latency to increase significantly, depending on task scheduling. In this paper, the authors show that even if a SMP VM runs non-concurrent applications, the synchronization latency problem...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Refuse to Crash with Re-FUSE

    The authors introduce Re-FUSE, a framework that provides support for restartable user-level file systems. Re-FUSE monitors the user-level file-system and on a crash transparently restarts the file system and restores its state; the restart process is completely transparent to applications. Re-FUSE provides transparent recovery through a combination of novel techniques,...

    Provided By Association for Computing Machinery

  • White Papers // May 2011

    Run-Time Energy Management of Manycore Systems Through Reconfigurable Interconnects

    In this paper, the authors propose a novel, low-cost method to reconfigure the network channel width at run time to maximize energy efficiency of applications. They analyze the effect of channel width choices for two commonly used cache hierarchies, private and distributed caches, on many core systems with an underlying...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2012

    Providing Fault-Tolerant Execution of Web-Service-Based Workflows within Clouds

    With a variety of services rapidly evolving at all architectural levels of cloud computing, there is an increasing demand for a standardized way to coordinate their interactions. Business process management, that is, more general, the management of Web-service-based workflows, could satisfy this demand and, indeed, first corresponding offerings have gained...

    Provided By Association for Computing Machinery

  • White Papers // May 2009

    Fault-Tolerant BPEL Workflow Execution via Cloud-Aware Recovery Policies

    BPEL is the de facto standard for business process modeling in today's enterprises and is a promising candidate for the integration of business and scientific applications that run in Grid or Cloud environments. In these distributed infrastructures, the occurrence of faults is quite likely. Without sophisticated fault handling, workflows are...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2013

    Security, Fault Tolerance and Modeling of Grid Workflows in BPEL4Grid

    BPEL is the de facto standard for business process modeling in today's enterprises and is a promising candidate for the integration of business and scientific applications that run in Grid or Cloud environments. In this paper, selected components of BPEL4Grid, a scientific workflow system for developing service-oriented Grid applications based...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2012

    FaCETa: Backward and Forward Recovery for Execution of Transactional Composite WS

    In distributed software contexts, Web Services (WSs) that provide transactional properties are useful to guarantee reliable Transactional Composite WSs (TCWSs) execution and to ensure the whole system consistent state even in presence of failures. Fails during the execution of a TCWS can be repaired by forward or backward recovery processes,...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2010

    Low Overhead Container Format for Adaptive Streaming

    Current segmented HTTP streaming systems provide scalable and quality adaptive video delivery services to a huge number of users. In this paper, the authors present an appropriate way of coding the segments and a simple multimedia container format that is optimized for adaptive streaming and video composition over HTTP. They...

    Provided By Association for Computing Machinery

  • White Papers // May 2012

    An Intermittent Energy Internet Architecture

    If the people had a tenth the energy to run the Internet, and if that energy were ten times as volatile, how might they rethink the Internet's design? Recent studies indicate that energy costs will rise substantially over the coming decades, due primarily to the increasing difficulty of locating and...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Video Streaming into Virtual Worlds: The Effects of Virtual Screen Distance and Angle on Perceived Quality

    There is an increasing trend to include streamed video data in 3D environments. Such environments allow potentially several concurrently visible videos on a single display device, and consequently, network and processing bottlenecks. As a first step towards an avoidance of such problems, the authors have performed subjective assessments using a...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2013

    MPRTP: Multipath Considerations for Real-Time Media

    The Internet infrastructure often supports multiple routes between two communicating hosts and, today, especially mobile hosts usually offer multiple network interfaces, so that disjoint paths between the hosts can be constructed. Having a number of (partly or fully) disjoint paths available may allow applications to distribute their traffic, aggregate capacity...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2012

    Reducing Server and Network Load With Shared Buffering

    Today, content replication methods are common ways of reducing the network and servers load. Present content replication solutions have different problems, including the need for pre-planning and management, and they are ineffective in case of sudden traffic spikes. In spite of these problems, content replication methods are more popular today...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2012

    SCAMPI Application Platform

    The development and deployment of opportunistic networking applications on real consumer devices has been slow. This is in large part due to the lack of suitable frameworks and software stacks on popular consumer mobile device platforms. In this paper, the authors demonstrate an application platform architecture and implementation that allows...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2012

    Enabling Ad-Hoc-Style Communication in Public WLAN Hot-Spots

    Opportunistic networking between mobile devices relies on the capabilities of those devices to establish ad-hoc communication among each other. While the two dominant wireless interface technologies, IEEE 802.11 wireless LAN and Bluetooth, offer such capabilities in theory, limitations of the protocol specification, chipsets, and operating systems in mobile devices render...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2012

    Opportunistic Content Sharing Applications

    Opportunistic communication between mobile nodes allows for asynchronous content sharing within groups. Limiting the spread of information to a geographic area creates an infrastructure-less variant of digital graffiti, a social network with coupling in space and limited decoupling in time. Due to its nature, this kind of a communication network...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2012

    Supporting Wireless Access Markets With a User-Centric QoE-Based Geo-Database

    This paper presents the u-map, a novel user-centric geo-database for wireless access markets that enables clients to upload information about their profile, their Quality-of-Experience (QoE) feedback for a service, traffic demand, network/spectrum conditions (e.g., interference, coverage), providers, and their position (e.g., GPS-based measurements) in a spatio-temporal geo-database. To evaluate the...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2012

    Security Asset Elicitation for Collaborative Models

    Building secure systems is a difficult job for most engineers since it requires in-depth understanding of security aspects. This task, however, can be assisted by capturing security knowledge in a particular domain and reusing the knowledge when designing applications. The authors use this strategy and employ information security ontology to...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    InstantLeap: Fast Neighbor Discovery in P2P VoD Streaming

    A fundamental challenge in Peer-To-Peer (P2P) Video-on-Demand (VoD) streaming is to quickly locate new supplying peers whenever a VCR command is issued, in order to achieve smooth viewing experiences. For most existing commercial systems which resort to tracking servers for such neighbor discovery, the increasing scale of P2P VoD systems...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2010

    Exploiting Memory Usage Patterns to Improve Garbage Collections in Java

    Copying-based garbage collectors are currently widely employed in JVM systems, as they provide not only cheap allocations but also fast collections. Comparing to their compacting-based counterparts, copying-based collectors trade space for time: they conservatively reserve half of the available heap for the purpose of copying live objects. It is a...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2011

    Modeling and Synthesizing Task Placement Constraints in Google Compute Clusters

    Evaluating the performance of large compute clusters requires benchmarks with representative workloads. At Google, performance benchmarks are used to obtain performance metrics such as task scheduling delays and machine resource utilizations to assess changes in application codes, machine configurations, and scheduling algorithms. Existing approaches to workload characterization for high performance...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2013

    Experimental Analysis of Task-Based Energy Consumption in Cloud Computing Systems

    Cloud computing delivers IT solutions as a utility to users. One consequence of this model is that large cloud data centres consume large amounts of energy and produce significant carbon footprints. A common objective of cloud providers is to develop resource provisioning and management solutions that minimise energy consumption while...

    Provided By Association for Computing Machinery