Association for Computing Machinery

Displaying 1-40 of 7282 results

  • White Papers // Jun 2014

    Domino: An Incremental Computing Framework in Cloud with Eventual Synchronization

    In recent years, more and more applications in cloud have needed to process large-scale online data sets that evolve over time as entries are added or modified. Several programming frameworks, such as percolator and oolong, are proposed for such incremental data processing and can achieve efficient updates with an event-driven...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Computation and Communication Efficient Graph Processing with Distributed Immutable View

    Cyclops is a new vertex-oriented graph-parallel framework for writing distributed graph analytics. Unlike existing distributed graph computation models, cyclops retains simplicity and computation-efficiency by synchronously computing over a distributed immutable view, which grants a vertex with read-only access to all its neighboring vertices. The view is provided via read-only replication...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    CrowdFill: Collecting Structured Data from the Crowd

    The authors present CrowdFill, a system for collecting structured data from the crowd. While a typical microtask-based approach would pose specific questions to each worker and assemble the answers, Crowd-Fill shows a partially-filled table to all participating workers. Workers contribute by filling in empty cells, as well as upvoting and...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Indexing for Interactive Exploration of Big Data Series

    Numerous applications continuously produce big amounts of data series, and in several time critical scenarios analysts need to be able to query these data as soon as they become available, which is not currently possible with the state-of-the-art indexing methods and for very large data series collections. In this paper,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    H2O: A Hands-Free Adaptive Store

    Modern state-of-the-art database systems are designed around a single data storage layout. This is a fixed decision that drives the whole architectural design of a database system, i.e., row-stores, column-stores. However, none of those choices is a universally good solution; different workloads require different storage layouts and data access methods...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Database Cracking: Fancy Scan, not Poor Man's Sort!

    Database cracking is an appealing approach to adaptive indexing: on every range-selection query, the data is partitioned using the supplied predicates as pivots. The core of database cracking is, thus, pivoted partitioning. While pivoted partitioning, like scanning, requires a single pass through the data it tends to have much higher...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    H2RDF+: An Efficient Data Management System for Big RDF Graphs

    The proliferation of data in RDF format has resulted in the emergence of a plethora of specialized management systems. While the ability to adapt to the complexity of a SPARQL query - given their inherent diversity - is crucial, current approaches do not scale well when faced with substantially complex,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Scalable Indexing and Adaptive Querying of RDF Data in the Cloud

    Efficient RDF data management systems are central to the vision of the semantic Web. The enormous increase in both user and machine generated content dictates for scalable solutions in triple data stores. Current systems manage to decentralize some or all the stages of RDF data management, scaling to arbitrarily large...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Dynamic Fine-Grained Scheduling for Energy-Efficient Main-Memory Queries

    Power and cooling costs are some of the highest costs in data centers today, which make improvement in energy efficiency crucial. Energy efficiency is also a major design point for chips that power whole ranges of computing devices. One important goal in this area is energy proportionality, arguing that the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Next Generation Job Management Systems for Extreme-Scale Ensemble Computing

    With the exponential growth of supercomputers in parallelism, applications are growing more diverse, including traditional large-scale HPC MPI jobs, and ensemble workloads such as finer-grained Many-Task Computing (MTC) applications. Delivering high throughput and low latency for both workloads requires developing a distributed job management system that is magnitudes more scalable...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Design and Evaluation of the GeMTC Framework for GPU-enabled Many-Task Computing

    The authors present the design and first performance and usability evaluation of GeMTC, a novel execution model and runtime system that enables accelerators to be programmed with many concurrent and independent tasks of potentially short or variable duration. With GeMTC, a broad class of such \"Many-task\" applications can leverage the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Accessing Multiple Clouds with Cloudmesh

    The authors present the design of a toolkit that can be employed by users and administrators to manage virtual machines on multi-cloud environments. It can be run by individual users or offered as a service to a shared user community. They have practically demonstrated its use as part of a...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Self Managing Monitoring for Highly Elastic Large Scale Cloud Deployments

    Infrastructure as a service computing exhibits a number of properties, which are not found in conventional server deployments. Elasticity is among the most significant of these properties which has wide reaching implications for applications deployed in cloud hosted VMs. Among the applications a affected by elasticity is monitoring. In this...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Infinite CacheFlow in Software-Defined Networks

    Software-Defined Networking (SDN) enables ne-grained policies for firewalls, load balancers, routers, traffic monitoring, and other functionality. While Ternary Content Address-able Memory (TCAM) enables OpenFlow switches to process packets at high speed based on multiple header fields, today's commodity switches support just thousands to tens of thousands of rules. To realize...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Memory Bandwidth Reservation in the Cloud to Avoid Information Leakage in the Memory Controller

    Multiple Virtual Machines (VMs) are typically co-scheduled on cloud servers. Each VM experiences different latencies when accessing shared resources, based on contention from other VMs. This introduces timing channels between VMs that can be exploited to launch attacks by an untrusted VM. This paper focuses on trying to eliminate the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Resource Allocation for Hardware Implementations of Map

    The map operation, in which a function is applied independently to each element in a collection to produce a new collection, appears in many settings and is easy to parallelize. While a straight-forward implementation in hardware will consist of multiple functional units with buffers to balance variable execution times, the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Activity-Edge Centric Multi-Label Classification for Mining Heterogeneous Information Networks

    Multi-label classification of heterogeneous information networks has received renewed attention in social network analysis. In this paper, the authors present an activity-edge centric multi-label classification framework for analyzing heterogeneous information networks with three unique features. First, they model a heterogeneous information network in terms of a collaboration graph and multiple...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Revealing Applications' Access Pattern in Collective I/O for Cache Management

    Collective I/O is a critical I/O strategy on high-performance parallel computing systems that enables programmers to reveal parallel processes' I/O accesses collectively and makes possible for the parallel I/O middleware to carry out I/O requests in a highly efficient manner. Collective I/O has been proven as a core parallel I/O...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    A Framework for Enhancing Data Reuse via Associative Reordering

    The freedom to reorder computations involving associative operators has been widely recognized and exploited in designing parallel algorithms and to a more limited extent in optimizing compilers. In this paper, the authors develop a novel framework utilizing the associativity and commutativity of operations in regular loop computations to enhance register...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    A Runtime Cloud Efficiency Software Quality Metric

    In this paper, the authors introduce the Cloud Efficiency (CE) metric, a novel runtime metric which assesses how effectively an application uses software-defined infrastructure. The CE metric is computed as the ratio of two functions: a benefit function which captures the current set of benefits derived from the application, and...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    System-Level Security for Network Processors with Hardware Monitors

    New attacks are emerging that target the Internet infrastructure. Modern routers use programmable network processors that may be exploited by merely sending suitably crafted data packets into a network. Hardware monitors that are co-located with processor cores can detect attacks that change processor behavior with high probability. In this paper,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    SHiFA: System-Level Hierarchy in Run-Time Fault-Aware Management of Many-Core Systems

    A system-level approach to fault-aware resource management of many-core systems is proposed. The proposed approach, called SHiFA, is able to tolerate run-time faults at system level without any hardware overhead. In contrast to the existing system-level methods, network resources are also considered to be potentially faulty. Accordingly, applications are mapped...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Autonomic Resource Provisioning for Cloud-Based Software

    Cloud elasticity provides a software system with the ability to maintain optimal user experience by automatically acquiring and releasing resources, while paying only for what has been consumed. The mechanism for automatically adding or removing resources on the fly is referred to as auto-scaling. The state-of-the practice with respect to...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    A Semi-Formal Approach for Analog Circuits Behavioral Properties Verification

    The analog circuit design process is becoming very complex and therefore new verification approaches are very much needed. Simulation is the most used technique to compute the behavior of a circuit model. Statistical methods like Monte Carlo rely on repeating numerical simulations for a random sampling of parameters. The authors...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Generation of Reduced Analog Circuit Models Using Transient Simulation Traces

    The generation of fast models for device level circuit descriptions is a very active area of research. Model order reduction is an attractive technique for dynamical models size reduction. In this paper, the authors propose an approach based on clustering, curve-fitting, linearization and Krylov space projection to build reduced models...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    A Qualitative Simulation Approach for Verifying PLL Locking Property

    Simulation cannot give a full coverage of Phase Locked Loop (PLL) behavior in presence of process variation, jitter and varying initial conditions. Qualitative Simulation is an attracting method that computes behavior envelopes for dynamical systems over continuous ranges of their parameters. Therefore, this method can be employed to verify PLLs...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Horizontal Benchmark Extension for Improved Assessment of Physical CAD Research

    The rapid growth in complexity and diversity of IC designs, design flows and methodologies has resulted in a benchmark-centric culture for evaluation of performance and scalability in physical design algorithm research. Landmark papers in the literature present vertical benchmarks that can be used across multiple design flow stages; artificial benchmarks...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    A New Methodology for Reduced Cost of Resilience

    Resilient design techniques are used to ensure correct operation under dynamic variations; and improve design performance (e.g., through timing speculation). However, significant overheads (e.g., 17% and 15% energy penalties due to throughput degradation and additional circuits) are incurred by existing resilient design techniques. For instance, resilient designs require additional circuits...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    OCV-Aware Top-Level Clock Tree Optimization

    The clock trees of high-performance synchronous circuits have many clock logic cells (e.g., clock gating cells, multiplexers and dividers) in order to achieve aggressive clock gating and required performance across a wide range of operating modes and conditions. As a result, clock tree structures have become very complex and difficult...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Neural Network-Based Accelerators for Transcendental Function Approximation

    The general-purpose approximate nature of Neural Network (NN) based accelerators has the potential to sustain the historic energy and performance improvements of computing systems. The authors propose the use of NN-based accelerators to approximate mathematical functions in the GNU C Library (glibc) that commonly occur in application benchmarks. Using their...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Towards Topic Modeling for Big Data

    Latent Dirichlet Allocation (LDA) is a popular topic modeling technique in academia but less so in industry, especially in large-scale applications involving search engines and on-line advertisement systems. A main underlying reason is that the topic models used have been too small in scale to be useful; for example, some...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Resolving Conflicts in Heterogeneous Data by Truth Discovery and Source Reliability Estimation

    In many applications, one can obtain descriptions about the same objects or events from a variety of sources. As a result, this will inevitably lead to data or information conflicts. One important problem is to identify the true information (i.e., the truths) among conflicting sources of data. It is intuitive...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    NewsNetExplorer: Automatic Construction and Exploration of News Information Networks

    News data is one of the most abundant and familiar data sources. News data can be systematically utilized and explored by database, data mining and NLP information retrieval researchers to demonstrate to the general public the power of advanced information technology. In the authors view, news data contains rich, inter-related...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Imprecise Datapath Design: An Overclocking Approach

    In this paper, the authors describe an alternative circuit design methodology when considering trade-offs between accuracy, performance and silicon area. They compare two different approaches that could trade accuracy for performance. One is the traditional approach where the precision used in the datapath is limited to meet target latency. The...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Explore-by-Example: An Automatic Query Steering Framework for Interactive Data Exploration

    Interactive Data Exploration (IDE) is a key ingredient of a diverse set of discovery-oriented applications, including ones from scientific computing and evidence-based medicine. In these applications, data discovery is a highly ad hoc interactive process where users execute numerous exploration queries using varying predicates aiming to balance the trade-off between...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Reconfiguration-Assisted Charging in Large-Scale Lithium-Ion Battery Systems

    Large-scale Lithium-ion batteries are widely adopted in many systems such as electric vehicles and energy backup in power grids. Due to factors such as manufacturing difference and heterogeneous discharging conditions, cells in the battery system may have different statuses such as diverse voltage levels. This cell diversity is commonly known...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Reconciling High Server Utilization and Sub-Millisecond Quality-of-Service

    The simplest strategy to guarantee good Quality-of-Service (QoS) for a latency-sensitive workload with sub-millisecond latency in a shared cluster environment is to never run other workloads concurrently with it on the same server. Unfortunately, this inevitably leads to low server utilization, reducing both the capability and cost effectiveness of the...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Using Restricted Transactional Memory to Build a Scalable In-Memory Database

    The recent availability of Intel Haswell processors marks the transition of hardware transactional memory from research toys to mainstream reality. DBX is an in-memory database that uses Intel's Restricted Transactional Memory (RTM) to achieve high performance and good scalability across multicore machines. The main limitation (and also key to practicality)...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Snapshots in a Flash with ioSnap

    Snapshots are a common and heavily relied upon feature in storage systems. The high performance of flash-based storage systems brings new, more stringent, requirements for this classic capability. The author's present ioSnap, a flash optimized snapshot system. Through careful design exploiting common snapshot usage patterns and flash oriented optimizations, including...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Aerie: Flexible File-System Interfaces to Storage-Class Memory

    Storage-class memory technologies such as phase-change memory and memristors present a radically different interface to storage than existing block devices. As a result, they provide a unique opportunity to re-examine storage architectures. The authors find that the existing kernel-based stack of components, well suited for disks, unnecessarily limits the design...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2013

    Intel \"Big Data\" Science and Technology Center Vision and Execution Plan

    This paper has described the newest Intel ISTC focused on big data. As the authors explained, they are working on both big volume and big velocity issues, leaving big variety as a future topic. Their approach is to develop and leverage DBMS technology, as opposed to file systems. In all...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2012

    A Cross-Protocol Attack on the TLS Protocol

    This paper describes a cross-protocol attack on all versions of TLS; it can be seen as an extension of the Wagner and Schneier attack on SSL 3.0. The attack presents valid explicit elliptic curve Diffie-Hellman parameters signed by a server to a client that incorrectly interprets these parameters as valid...

    Provided By Association for Computing Machinery

  • White Papers // May 2011

    Rethinking Passwords to Adapt to Constrained Keyboards

    The authors describe and analyze a variant of the traditional password scheme. This is designed to take advantage of standard error-correcting methods of the types used to facilitate text entry on handsets. They call the new approach fastwords to emphasize their primary feature compared to regular passwords. Compared with passwords,...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2008

    Love and Authentication

    Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security practitioners have battled with the dilemma of how to authenticate people who have forgotten their passwords. Existing approaches suffer from high false positive...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2013

    A Framework of N-Screen Services Based on PVR and Named Data Networking in Cloud Computing

    The authors develop architecture of a new N-Screen Service which enables application streaming based on N-Screen services using Personal Video Recorder (PVR) and Named Data Networking (NDN) in cloud computing environment. In particular, they propose a framework of N-Screen Services called \"ShopMark\" based on PVR and NDN technology in cloud...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    OASIS: On Achieving a Sanctuary for Integrity and Secrecy on Untrusted Platforms

    Currently, Trusted Platform Module (TPM) based solutions have not reached wide-spread application in security-sensitive contexts, perhaps because TCG solutions lack protection against a more resourceful adversary, lack sufficient properties for end-to-end application protection, lack architectural safeguards against supply-chain compromises, or concerns over poor performance. OASIS offers a stronger degree of...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    SafeSlinger: Easy-to-Use and Secure Public-Key Exchange

    Users regularly experience a crisis of confidence on the internet. Is that email or instant message truly originating from the claimed individual? Such doubts are commonly resolved through a leap of faith, expressing the desperation and helplessness of users. To establish a secure basis for online communication, the authors propose...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    AppIntent: Analyzing Sensitive Data Transmission in Android for Privacy Leakage Detection

    Android phones often carry personal information, attracting malicious developers to embed code in Android applications to steal sensitive data. With known techniques in the literature, one may easily determine if sensitive data is being transmitted out of an Android phone. However, transmission of sensitive data in itself does not necessarily...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    Attacking Software-Defined Networks: A First Feasibility Study

    In this paper, the authors introduce a new fingerprinting attack against SDN networks, and they also show its feasibility with real world experimental data. To the best of their knowledge, the proposed attack scenario is the first realistic attack case to a SDN network that can be conducted by a...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2013

    Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors

    Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One paradigm to achieve data privacy is to use tamper-resistant processors, inside which users' private data is decrypted and computed upon. These processors need to interact with untrusted external memory. Even if the authors encrypt...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2009

    Security and Privacy for Geospatial Data: Concepts and Research Directions

    Geospatial data play a key role in a wide spectrum of critical data management applications, such as disaster and emergency management, environmental monitoring, land and city planning, and military operations, often requiring the coordination among diverse organizations, their data repositories, and users with different responsibilities. Although a variety of models...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    POSTER - TRIPLEX: Verifying Data Minimisation in Communication Systems

    The main idea behind the TRIPLEX framework is to analyze relevant privacy aspects of privacy-enhancing protocols in a specified scenario that may involve several actors and protocol instances (of different protocols). Systems dealing with personal information are legally required to satisfy the principle of data minimization. Privacy-enhancing protocols use cryptographic...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    Perceived Risk Assessment

    In the last years, IT systems play a more and more fundamental role in human activities and, in particular, in critical activities such as the management of Air Traffic Control and Nuclear Power Plant. This has spurred several researchers to develop models, metrics, and methodologies for analyzing and measuring the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2007

    How to Capture, Model, and Verify the Knowledge of Legal, Security, and Privacy Experts: A Pattern-Based Approach

    Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary security measures. Several frameworks have been proposed to deal with this issue. For instance, purpose-based access control is normally considered a good solution for...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2011

    Trust-Based Anonymous Communication: Adversary Models and Routing Algorithms

    The authors introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. They focus on anonymous communication, and in particular onion routing, although they expect the approach to apply more broadly. This paper provides two main...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    AS-Awareness in Tor Path Selection

    Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an anonymity network grows, it becomes more secure against a given observer because the observer will see less of the network. In particular, as...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2011

    A Peel of Onion

    Onion routing was invented more than fifteen years ago to separate identification from routing in network communication. Since that time there has been much design, analysis and deployment of onion routing systems. This has been accompanied by much confusion about what these systems do, what security they provide, how they...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2007

    Probabilistic Analysis of Onion Routing in a Black-Box Model

    The authors perform a probabilistic analysis of onion routing. The analysis is presented in a black-box model of anonymous communication that abstracts the essential properties of onion routing in the presence of an active adversary that controls a portion of the network and knows all a priori distributions on user...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2007

    On Interdomain Routing Security and Pretty Secure BGP (psBGP)

    It is well-known that the Border Gateway Protocol (BGP), the IETF standard inter-domain routing protocol, is vulnerable to a variety of attacks, and that a single mis-configured or malicious BGP speaker could result in large scale service disruption. In this paper, the authors present pretty secure BGP (psBGP) - a...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2006

    On Countering Online Dictionary Attacks with Login Histories and Humans-in-the-Loop

    Automated Turing Tests (ATTs), also known as human-in-the-loop techniques, were recently employed in a login protocol to protect against online password-guessing attacks. The authors present modifications providing a new history-based login protocol with ATTs, which uses failed-login counts. Analysis indicates that the new protocol offers opportunities for improved security and...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Hobbes: Composition and Virtualization as the Foundations of an Extreme-scale OS/R

    In this paper, the authors describe their vision for Hobbes, an Operating System and Runtime (OS/R) framework for extreme-scale systems. The Hobbes design explicitly supports application composition, which is emerging as a key approach for applications to address scalability and power concerns anticipated with coming extreme-scale architectures. They make use...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2012

    Better than Native: Using Virtualization to Improve Compute Node Performance

    Modified variants of Linux are likely to be the underlying operating systems for future exascale platforms. Despite the many advantages of this approach, a subset of applications exist in which a LightWeight Kernel (LWK) based OS is needed and/or preferred. The authors contend that virtualization is capable of supporting LWKs...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Virtual TCP Offload: Optimizing Ethernet Overlay Performance on Advanced Interconnects

    Ethernet overlay networks are a powerful tool for virtualizing networked applications. Their performance suffers on advanced interconnects such as Infiniband, however, be-cause of differences between the semantics of Ethernet and the underlying network. In this paper, the authors demonstrate that providing a virtual TCP offload Ethernet device to the guest...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2012

    Shifting GEARS to Enable Guest-Context Virtual Services

    The authors argue that the implementation of VMM-based virtual services for a guest should extend into the guest itself, even without its cooperation. Placing service components directly into the guest OS or application can reduce implementation complexity and increase performance. In this paper, they show that the set of tools...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2012

    A Case for Tracking and Exploiting Inter-Node and Intra-Node Memory Content Sharing in Virtualized Large-Scale Parallel Systems

    In virtualized large-scale parallel systems scientific workloads consist of numerous processes running across many virtual nodes. Their memory footprint is massive, and this has consequences for services that enhance performance, reliability, or power. The authors argue that a service that dynamically tracks the sharing of memory content, both within individual...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2012

    ADEL: An Automatic Detector of Energy Leaks for Smartphone Applications

    Energy leaks occur when applications use energy to perform useless tasks, a surprisingly common occurrence. They are particularly important for mobile applications running on Smartphones due to their energy constraints. Energy leaks are difficult to detect and isolate because their negative consequences are often far removed from their causes. Few...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2012

    Understanding the Impact of Laptop Power Saving Options on User Satisfaction Using Physiological Sensors

    Several techniques are available to save power consumption in laptop computers. However, their effect on user satisfaction has not been well studied. The authors analyze how user satisfaction is affected by these techniques and show that, within a fixed power budget, some techniques cause more dissatisfaction than others. Second, they...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Sonar-based Measurement of User Presence and Attention

    The authors describe a technique to detect the presence of computer users. This technique relies on sonar using hardware that already exists on commodity laptop computers and other electronic devices. It leverages the fact that human bodies have a different effect on sound waves than air and other objects. They...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2012

    Virtualization Challenges: A View From Server Consolidation Perspective

    Server consolidation, by running multiple virtual machines on top of a single platform with virtualization, provides an efficient solution to parallelism and utilization of modern multi-core processors system. However, the performance and scalability of server consolidation solution on modern massive advanced server is not well addressed. In this paper, the...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2012

    DVM: Towards a Datacenter-Scale Virtual Machine

    As cloud-based computation becomes increasingly important, providing a general computational interface to support datacenter-scale programming has become an imperative research agenda. Many cloud systems use existing Virtual Machine Monitor (VMM) technologies, such as Xen, VMware, and Windows Hypervisor, to multiplex a physical host into multiple virtual hosts and isolate computation...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2012

    Towards a Pluralist Internet Using a Virtual Machine Server for Network Customization

    The Internet success is frequently credited to its basic pillars, the end-to-end argument and the TCP/IP protocol stack. Nevertheless, this simple architecture does not facilitate the addition of new services such as mobility, security, and quality of service support. As a consequence, virtual networks are often being used as a...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2011

    Performance and Energy Modeling for Live Migration of Virtual Machines

    Live migration of Virtual Machine (VM) provides a significant benefit for virtual server mobility without disrupting service. It is widely used for system management in virtualized data centers. However, migration costs may vary significantly for different workloads due to the variety of VM configurations and workload characteristics. To take into...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2011

    Enhancement of Xen's Scheduler for MapReduce Workloads

    As the trends move towards data outsourcing and cloud computing, the efficiency of distributed data centers increases in importance. Cloud-based services such as Amazon's EC2 rely on Virtual Machines (VMs) to host MapReduce clusters for large data processing. However, current VM scheduling does not provide adequate support for MapReduce workloads,...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2013

    To Hardware Prefetch or Not to Prefetch?

    Most hardware and software venders suggest disabling hardware prefetching in virtualized environments. They claim that prefetching is detrimental to application performance due to inaccurate prediction caused by workload diversity and VM interference on shared cache. However, no comprehensive or quantitative measurements to support this belief have been performed. This paper...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2012

    OS-SOMMELIER: Memory-Only Operating System Fingerprinting in the Cloud

    Precise fingerprinting of an Operating System (OS) is critical to many security and Virtual Machine (VM) management applications in the cloud, such as VM introspection, penetration testing, guest OS administration (e.g., kernel update), kernel dump analysis, and memory forensics. The existing OS fingerprinting techniques primarily inspect network packets or CPU...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2012

    Securing Untrusted Code Via Compiler-Agnostic Binary Rewriting

    Binary code from untrusted sources remains one of the primary vehicles for malicious software attacks. This paper presents REINS, a new, more general, and lighter-weight binary rewriting and in-lining system to tame and secure untrusted binary programs. Unlike traditional monitors, REINS requires no cooperation from code-producers in the form of...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2013

    EXTERIOR: Using Dual-VM Based External Shell for Guest-OS Introspection, Configuration, and Recovery

    This paper presents EXTERIOR, a dual-VM architecture based external shell that can be used for trusted, timely out-of-VM management of guest-OS such as introspection, configuration, and recovery. Inspired by recent advances in Virtual Machine Introspection (VMI), EXTERIOR leverages an isolated, Secure Virtual Machine (SVM) to introspect the kernel state of...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    ElasticSwitch: Practical Work-Conserving Bandwidth Guarantees for Cloud Computing

    While cloud computing providers offer guaranteed allocations for resources such as CPU and memory, they do not offer any guarantees for network resources. The lack of network guarantees prevents tenants from predicting lower bounds on the performance of their applications. The research community has recognized this limitation but, unfortunately, prior...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2012

    On the Exploitation of Process Mining for Security Audits: The Conformance Checking Case

    Process mining stands for a set of techniques to analyze business process models and logs. However, the extent to which it can be used for security auditing has not been investigated. Focusing on conformance checking and its support in ProM, this paper reports on a case-study in the financial sector...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2006

    Generating Correct EPCs from Configured C-EPCs

    Process reference models play an important role for the alignment and configuration of commercial off-the-shelf Enterprise Systems to requirements of an organization. Recently, Configurable Event-driven Process Chains (C-EPCs) have been proposed as a language to support the model-driven configuration of such Enterprise Systems. While some problems of generating correct EPCs...

    Provided By Association for Computing Machinery