Association for Computing Machinery

Displaying 1-40 of 6568 results

  • White Papers // Jun 2015

    Redundant Memory Mappings for Fast Access to Large Memories

    Page-based virtual memory improves programmer productivity, security and memory utilization, but incurs performance overheads due to costly page table walks after TLB (Translation Lookaside Buffer) misses. This overhead can reach 50% for modern workloads that access increasingly vast memory with stagnating TLB sizes. To reduce the overhead of virtual memory,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2015

    Computer Performance Microscopy with SHIM

    Developers and architects spend a lot of time trying to understand and eliminate performance problems. Unfortunately, the root causes of many problems occur at a fine granularity that existing continuous profiling and direct measurement approaches cannot observe. This paper presents the design and implementation of SHIM, a continuous profiler that...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2015

    Verification of Producer-Consumer Synchronization in GPU Programs

    Previous efforts to formally verify code written for GPUs have focused solely on kernels written within the traditional data-parallel GPU programming model. No previous paper has considered the higher performance, but more complex, warp-specialized kernels based on producer-consumer named barriers available on current hardware. In this paper, the authors present...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2015

    Tier-Partitioning for Power Delivery Vs Cooling Tradeoff in 3D VLSI for Mobile Applications

    Power delivery to the tier farthest away from the package in 3D VLSI is challenging. This is because the current provided by the package on the bottom is first used by other tiers before it reaches the top and delivered using extremely small-size intra and inter-tier vias. The authors' solution...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2015

    Design, Packaging, and Architectural Policy Co-Optimization for DC Power Integrity in 3D DRAM

    3D DRAM is the next-generation memory system targeting high bandwidth, low power and small form factor. This paper presents a cross-domain CAD/architectural platform that address DC power noise issues in 3D DRAM targeting stacked DDR3, wide I/O and hybrid memory cube technologies. The authors' design and analysis include both individual...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2015

    Area-Efficient Pipelining for FPGA-Targeted High-Level Synthesis

    Traditional techniques for pipeline scheduling in high-level synthesis for FPGAs assume an additive delay model where each operation incurs a pre-characterized delay. While a good approximation for some operation types, this fails to consider technology mapping, where a group of logic operations can be mapped to a single Look-Up Table...

    Provided By Association for Computing Machinery

  • White Papers // May 2015

    Predicting Program Phases and Defending Against Side-Channel Attacks using Hardware Performance Counters

    Sharing of functional units inside a processor by two applications can lead to information leaks and micro architectural side-channel attacks. Meanwhile, processors now commonly come with hardware performance counters which can count a variety of micro-architectural events, ranging from cache behavior to floating point unit usage. In this paper, the...

    Provided By Association for Computing Machinery

  • White Papers // May 2015

    Analysis of Smartphone Adoption and Usage in a Rural Community Cellular Network

    The smartphone has been touted as the technology of the 21st century. Global smartphone adoption rates are growing rapidly, up to over 24% in 2014, with usage increasing 25% in the last year. However, rural areas are often the last places to benefit from these technological trends. Utilizing cellular network...

    Provided By Association for Computing Machinery

  • White Papers // May 2015

    On the Feasibility of Attribute-Based Encryption on Smartphone Devices

    Attribute-Based Encryption (ABE) is a powerful crypto-graphic tool that allows fine-grained access control over data. Due to its features, ABE has been adopted in several applications, such as encrypted storage or access control systems. Recently, researchers argued about the non-acceptable performance of ABE when implemented on mobile devices. In-deed, the...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2015

    Fast Serializable Multi-Version Concurrency Control for Main-Memory Database Systems

    Multi-Version Concurrency Control (MVCC) is a widely employed concurrency control mechanism, as it allows for execution modes where readers never block writers. However, most systems implement only Snapshot Isolation (SI) instead of full serializability. Adding serializability guarantees to existing SI implementations tends to be prohibitively expensive. The authors present a...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2015

    Sirius: An Open End-to-End Voice and Vision Personal Assistant and Its Implications for Future Warehouse Scale Computers

    As user demand scales for Intelligent Personal Assistants (IPAs) such as Apple's Siri, Google's google now, and Microsoft's Cortana, the authors are approaching the computational limits of current datacenter architectures. It is an open question how future server architectures should evolve to enable this emerging class of applications, and the...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2015

    A Comprehensive Implementation and Evaluation of Direct Interrupt Delivery

    As the performance overhead associated with CPU (Central Processing Unit) and memory virtualization becomes largely negligible, research efforts are directed toward reducing the I/O (Input/Output) virtualization overhead, which mainly comes from two sources: DMA (Direct Memory Access) setup and payload copy, and interrupt delivery. The advent of SRIOV (Single-Root I/O...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2015

    Mapping-Aware Constrained Scheduling for LUT-Based FPGAs

    Scheduling plays a central role in high-level synthesis as it inserts clock boundaries into the untimed behavioral model and greatly impacts the performance, power and area of the synthesized circuits. While current scheduling techniques can make use of pre-characterized delay values of individual operations, it is difficult to obtain accurate...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2015

    Enhancing Design Space Exploration by Extending CPU/GPU Specifications onto FPGAs

    The design cycle for complex special-purpose computing systems is extremely costly and time-consuming. It involves a multi-parametric design space exploration for optimization, followed by design verification. Designers of special purpose VLSI (Very-Large-Scale Integration) implementations often need to explore parameters, such as optimal bit width and data representation, through time-consuming Monte...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2015

    Libra: Software-Controlled Cell Bit-Density to Balance Wear in NAND Flash

    Hybrid flash storages combine a small Single-Level Cell (SLC) partition with a large MultiLevel Cell (MLC) partition. Compared to MLC-only solutions, the SLC partition exploits fast and short local write updates, while the MLC part brings large capacity. On the whole, hybrid storage achieves a tangible performance improvement for a...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    Compiler Management of Communication and Parallelism for Quantum Computation

    Quantum Computing (QC) offers huge promise to accelerate a range of computationally intensive benchmarks. Quantum computing is limited, however, by the challenges of decoherence: i.e., a quantum state can only be maintained for short windows of time before it decoheres. While quantum error correction codes can protect against decoherence, fast...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    A Symbolic Execution Algorithm for Constraint-Based Testing of Database Programs

    In so-called constraint-based testing, symbolic execution is a common technique used as a part of the process to generate test data for imperative programs. Databases are ubiquitous in software and testing of programs manipulating databases is thus essential to enhance the reliability of software. In this paper, the authors propose...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    CQIC: Revisiting Cross-Layer Congestion Control for Cellular Networks

    With the advent of high-speed cellular access and the overwhelming popularity of Smartphone's, a large percent of today's Internet content is being delivered via cellular links. Due to the nature of long-range wireless signal propagation, the capacity of the last hop cellular link can vary by orders of magnitude within...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    Utility of the OpenAccess Database in Academic Research

    Twenty years ago, there was a common design tool which was free and open-source and satisfied the needs of many academic circuit designers. The proliferation of OpenAccess is opening promising new research opportunities to academic communities. The benefits of adopting an OpenAccess based approach to EDA research are growing, and...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    GRAPHITE: An Extensible Graph Traversal Framework for Relational Database Management Systems

    Graph traversals are a basic but fundamental ingredient for a variety of graph algorithms and graph-oriented queries. To achieve the best possible query performance, they need to be implemented at the core of a database management system that aims at storing, manipulating, and querying graph data. Increasingly, modern business applications...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Hot-Hardening: Getting More Out of Your Security Settings

    Applying optimized security settings to applications is a difficult and laborious task. Especially in cloud computing, where virtual servers with various pre-installed software packages are leased, selecting optimized security settings is very difficult. In particular, optimized security settings are not identical in every setup. They depend on characteristics of the...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Uncovering Network Tarpits with Degreaser

    Network tarpits, whereby a single host or appliance can masquerade as many fake hosts on a network and slow network scanners, are a form of defensive cyber-deception. In this paper, the authors develop degreaser, an efficient fingerprinting tool to remotely detect tarpits. In addition to validating their tool in a...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Exploring Big Data with Helix: Finding Needles in a Big Haystack

    While much work has focused on efficient processing of big data, little work considers how to understand them. In this paper, the authors describe Helix, a system for guided exploration of big data. Helix provides a unified view of sources, ranging from spreadsheets and XML files with no schema, all...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Towards Hardware-Driven Design of Low-Energy Algorithms for Data Analysis

    In the era of "Big" data, data analysis algorithms need to be efficient. Traditionally researchers would tackle this problem by considering "Small" data algorithms and investigating how to make them computationally more efficient for big data applications. The main means to achieve computational efficiency would be to revise the necessity...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Foundations of Crowd Data Sourcing

    Crowdsourcing techniques are very powerful when harnessed for the purpose of collecting and managing data. In order to provide sound scientific foundations for crowdsourcing and support the development of efficient crowdsourcing processes, adequate formal models must be defined. In particular, the models must formalize unique characteristics of crowd-based settings, such...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Design-Theoretic Encoding of Deterministic Hypotheses as Constraints and Correlations Into U-Relational Databases

    In view of the paradigm shift that makes science ever more data-driven, in this paper the authors consider deterministic scientific hypotheses as uncertain data. In the form of mathematical equations, hypotheses symmetrically relate aspects of the studied phenomena. For computing predictions, however, deterministic hypotheses are used asymmetrically as functions. They...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Patterns in the Chaos - A Study of Performance Variation and Predictability in Public IaaS Clouds

    Benchmarking the performance of public cloud providers is a common research topic. Previous paper has already extensively evaluated the performance of different cloud platforms for different use cases, and under different constraints and experiment setups. In this paper, the authors present a principled, large-scale literature review to collect and codify...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Taking Authenticated Range Queries to Arbitrary Dimensions

    In this paper, the authors study the problem of authenticated multi-dimensional range queries over outsourced databases, where an owner outsources its database to an untrusted server, which maintains it and answers queries to clients. Previous schemes either scale exponentially in the number of query dimensions, or rely on heuristic data...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed

    Central to the secure operation of a Public Key Infrastructure (PKI) is the ability to revoke certificates. While much of users' security rests on this process taking place quickly, in practice, revocation typically requires a human to decide to reissue a new certificate and revoke the old one. Thus, having...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Computing Multi-Relational Sufficient Statistics for Large Databases

    Databases contain information about which relationships do and do not hold among entities. To make this information accessible for statistical analysis requires computing sufficient statistics that combine information from different database tables. Such statistics may involve any number of positive and negative relationships. With a naive enumeration approach, computing sufficient...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    PixelVault: Using GPUs for Securing Cryptographic Operations

    Protecting the confidentiality of cryptographic keys in the event of partial or full system compromise is crucial for containing the impact of attacks. The Heartbleed vulnerability of April 2014, which allowed the remote leakage of secret keys from HTTPS web servers, is an indicative example. In this paper, the authors...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication

    In an effort to hinder attackers from compromising user accounts, Facebook launched a form of two-factor authentication called Social Authentication (SA), where users are required to identify photos of their friends to complete a log-in attempt. Recent research, however, demonstrated that attackers can bypass the mechanism by employing face recognition...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Characterizing Large-Scale Click Fraud in ZeroAccess

    Click fraud is a scam that hits a criminal sweet spot by both tapping into the vast wealth of online advertising and exploiting that ecosystem's complex structure to obfuscate the flow of money to its perpetrators. In this paper, the authors illuminate the intricate nature of this activity through the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    On The Security of Mobile Cockpit Information Systems

    Recent trends in aviation have led many general aviation pilots to adopt the use of iPads (or other tablets) in the cockpit. While initially used to display static charts and documents, uses have expanded to include live data such as weather and traffic information that is used to make flight...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild

    Online accounts are inherently valuable resources - both for the data they contain and the reputation they accrue over time. Unsurprisingly, this value drives criminals to steal, or hijack, such accounts. In this paper, the authors focus on manual account hijacking - account hijacking performed manually by humans instead of...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Search + Seizure: The Effectiveness of Interventions on SEO Campaigns

    Black hat Search Engine Optimization (SEO), the practice of abusively manipulating search results, is an enticing method to acquire targeted user traffic. In turn, a range of interventions - from modifying search results to seizing domains - are used to combat this activity. In this paper, the authors examine the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Challenges in Inferring Internet Interdomain Congestion

    The authors introduce and demonstrate the utility of a method to localize and quantify inter-domain congestion in the Inter-net. Their Time Sequence Latency Probes (TSLP) method depends on two facts: internet traffic patterns are typically diurnal, and queues increase packet delay through a router during periods of adjacent link congestion....

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Data Driven Investigation of Faults in HVAC Systems with Model, Cluster and Compare (MCC)

    The complexity of modern HVAC systems leads to device misconfiguration in about 40% of buildings, wasting upto 40% of the energy consumed. Fault detection methods generate excessive alarms leading to operator alert fatigue, faults left unfixed and energy wastage. Sophisticated fault detection techniques developed in the literature are seldom used...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Plug&Chip: A Framework for Supporting Rapid Prototyping of 3D Hybrid Virtual SoCs

    In the embedded system domain there is a continuous demand towards providing higher flexibility for application development. This trend strives for virtual prototyping solutions capable of performing fast system simulation. Among other benefits, such a solution supports concurrent hardware/software system design by enabling to start developing, testing and validating the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Multiplierless Design of Folded DSP Blocks

    In this paper, the authors address the problem of minimizing the implementation cost of the Time-Multiplexed Constant Multiplication (TMCM) operation that realizes the multiplication of an input variable by a single constant selected from a set of multiple constants at a time. It presents an efficient algorithm, called ORPHEUS that...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2003

    Computing Equilibrium Strategies in Infinite Games of Incomplete Information

    This paper describes an algorithm for computing best-response strategies in a class of infinite games of incomplete information (of which various auctions are prime examples). Under certain conditions, this algorithm can be used to automatically compute Bayes-Nash equilibria. The predominant game-solving algorithms generally address finite games and approximate infinite games...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Delegating Network Security With More Information

    Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be able to cope, the administrator needs to delegate some control back to end-hosts and users, a...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Helios: Heterogeneous Multiprocessing With Satellite Kernels

    Helios is an operating system designed to simplify the task of writing, deploying, and tuning applications for heterogeneous platforms. Helios introduces satellite kernels, which export a single, uniform set of OS abstractions across CPUs of disparate architectures and performance characteristics. Access to I/O services such as file systems are made...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Locking Key Ranges With Unbundled Transaction Services

    To adapt database technology to new environments like cloud platforms or multi-core hardware, or to try anew to provide an extensible database platform, it is useful to separate transaction services from data management elements that need close physical proximity to data. With "Generic" transactional services of concurrency control and recovery...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    De-Anonymizing the Internet Using Unreliable IDs

    Today's Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable. This paper, presents a system called HostTracker that tracks dynamic bindings between hosts and IP addresses by leveraging application-level data with unreliable IDs. Using a month-long...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    Biorthogonality, Step-Indexing and Compiler Correctness

    This paper defines logical relations between the denotational semantics of a simply typed functional language with recursion and the operational behaviour of low-level programs in a variant SECD machine. The relations, which are defined using biorthogonality and step-indexing, capture what it means for a piece of low-level code to implement...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    DARWIN: An Approach for Debugging Evolving Programs

    Debugging refers to the laborious process of finding causes of program failures. Often, such failures are introduced when a program undergoes changes and evolves from a stable version to a new, modified version. This paper proposes an automated approach for debugging evolving programs. Given two programs (a reference, stable program...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    DebugAdvisor: A Recommender System for Debugging

    In large software development projects, when a programmer is assigned a bug to x, she typically spends a lot of time searching (in an ad-hoc manner) for instances from the past where similar bugs have been debugged, analyzed and resolved. Systematic search tools that allow the programmer to express the...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Detailed Diagnosis in Enterprise Networks

    By studying trouble tickets from small enterprise networks, the paper concludes that their operators need detailed fault diagnosis. That is, the diagnostic system should be able to diagnose not only generic faults (e.g., performance-related) but also application specific faults (e.g., error codes). It should also identify culprits at a fine...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    BCube: A High Performance, Server-Centric Network Architecture for Modular Data Centers

    This paper presents BCube, a new network architecture specifically designed for shipping-container based, modular data centers. At the core of the BCube architecture is its server-centric network structure, where servers with multiple network ports connect to multiple layers of COTS (commodity o-the-shelf) mini-switches. Servers act as not only end hosts,...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    White Space Networking With Wi-Fi Like Connectivity

    Networking over UHF white spaces is fundamentally different from conventional Wi-Fi along three axes: spatial variation, temporal variation, and fragmentation of the UHF spectrum. Each of these differences gives rise to new challenges for implementing a wireless network in this band. The paper presents the design and implementation of WhiteFi,...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Why Should We Integrate Services, Servers, and Networking in a Data Center?

    Since the early days of networks, a basic principle has been that endpoints treat the network as a black box. An end-point injects a packet with a destination address and the network delivers the packet. This principle has served one well, and allowed one to scale the Internet to billions...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Buffer Management for Colored Packets With Deadlines

    The paper considers buffer management of unit packets with deadlines for a multi-port device with reconfiguration overhead. The goal is to maximize the throughput of the device, i.e., the number of packets delivered by their deadline. For a single port or with free reconfiguration, the problem reduces to the well-known...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Understanding Data Center Traffic Characteristics

    As data centers become more and more central in Internet communications, both research and operations communities have begun to explore how to better design and manage them. This paper presents a preliminary empirical study of end-to-end traffic patterns in data center networks that can inform and help evaluate research and...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Matchmaking for Online Games and Other Latency-Sensitive P2P Systems

    The latency between machines on the Internet can dramatically affect users' experience for many distributed applications. Particularly, in multiplayer online games, players seek to cluster themselves so that those in the same session have low latency to each other. A system that predicts latencies between machine pairs allows such matchmaking...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    VL2: A Scalable and Flexible Data Center Network

    To be agile and cost effective, data centers should allow dynamic resource allocation across large server pools. In particular, the data center network should enable any server to be assigned to any service. To meet these goals, the paper presentsVL2, a practical network architecture that scales to support huge data...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Change Is Hard: Adapting Dependency Graph Models for Unified Diagnosis in Wired/Wireless Networks

    Organizations world-wide are adopting wireless networks at an impressive rate, and a new industry has sprung up to provide tools to manage these networks. Unfortunately, these tools do not integrate cleanly with traditional wired network management tools, leading to unsolved problems and frustration among the IT staff. The paper explores...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    CAFE: A Configurable PAcket Forwarding Engine for Data Center Networks

    Recently, Data Center Networking (DCN) has attracted many research attentions and innovative DCN designs have been proposed. All these designs need specialized packet forwarding engines due to their special routing algorithms, which are either based on commonly used packet headers or self-defined ones. Although programmable forwarding devices are available, it...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Your Botnet Is My Botnet: Analysis of a Botnet Takeover

    Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophisticated and insidious type of bot is Torpig, a malware program that is designed to harvest sensitive information (such as bank account and...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Consistency Rationing in the Cloud: Pay Only When It Matters

    Cloud storage solutions promise high scalability and low cost. Existing solutions, however, differ in the degree of consistency they provide. Its experience using such systems indicates that there is a non-trivial trade-off between cost, consistency and availability. High consistency implies high cost per transaction and, in some situations, reduced availability....

    Provided By Association for Computing Machinery

  • White Papers // May 2009

    WaterCooler: Exploring an Organization Through Enterprise Social Media

    As organizations scale up, their collective knowledge increases, and the potential for serendipitous collaboration between members grows dramatically. However, finding people with the right expertise or interests becomes much more difficult. Semi-structured social media, such as blogs, forums, and bookmarking, present a viable platform for collaboration - if enough people...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-Based Single Sign-on for Google Apps

    Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by different companies. The OASIS Security Assertion Markup Language (SAML) 2.0 Web Browser SSO Profile is the emerging standard in this context. This...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2009

    Semi-Supervised Co-Training and Active Learning Based Approach for Multi-View Intrusion Detection

    Although there is immense data available from networks and hosts, a very small proportion of this data is labeled due to the cost of obtaining expert labels. This proves to be a significant bottle-neck for developing supervised intrusion detection systems that rely solely on labeled data. In spite of the...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    Anti-Phishing Based on Automated Individual White-List

    In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The traditional blacklist approach for anti-phishing is partially effective due to its partial list of global phishing sites. This paper presents a novel anti-phishing approach...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Recognizing Daily Activities With RFID-Based Sensors

    This paper explores a dense sensing approach that uses RFID sensor network technology to recognize human activities. In the setting, everyday objects are instrumented with UHF RFID tags called WISPs that are equipped with accelerometers. RFID readers detect when the objects are used by examining this sensor data, and daily...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Architectural Considerations for Distributed RFID Tracking and Monitoring

    This paper discusses architectural challenges in designing a distributed, scalable system for RFID tracking and monitoring. The paper argues for the need to combine inference and query processing techniques into a single system and consider several architectural choices for building such a system. Key research challenges in designing the system...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Towards a Zero-Configuration Wireless Sensor Network Architecture for Smart Buildings

    Offlate buildings account for a large fraction of energy consumption. In an effort to economize scarce fossil fuels on earth, sensor networks are a valuable tool to increase the energy efficiency of buildings without severely reducing quality of life. Within a smart building many sensors and actuators are interconnected to...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2010

    Harvesting Collective Intelligence

    When harvesting collective intelligence, a user wishes to maximize the accuracy and value of the acquired information without spending too much time collecting it. The author empirically studies how people behave when facing these conflicting objectives using data from Yahoo Answers, a community driven question-and-answer site. The paper takes two...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    3G and 3.5G Wireless Network Performance Measured From Moving Cars and High-Speed Trains

    In recent years, the world has witnessed the deployment of several 3G and 3.5G wireless networks based on technologies such as CDMA 1x EVolution Data-Only (EVDO), High-Speed Downlink Packet Access (HSDPA), and mobile WiMax (e.g., WiBro). Although 3G and 3.5G wireless networks support enough bandwidth for typical Internet applications, their...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    PortLand: A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric

    This paper considers the requirements for a scalable, easily manageable, fault-tolerant, and efficient data center net-work fabric. Trends in multi-core processors, end-host virtualization, and commodities of scale are pointing to future single-site data centers with millions of virtual end points. Existing layer 2 and layer 3 network protocols face some...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    OLS - Opportunistic Localization System for Smart Phones Devices

    People are eager to locate their peers on a campus or in buildings and stay connected with them. OLS makes that simple. OLS's core technology is an opportunistic location system based on smart phone devices. Its main advantage is that it seamlessly works throughout heterogeneous environment including indoors as opposed...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Improving Application Security With Data Flow Assertions

    Using RESIN, Web application programmers can prevent a range of problems, from SQL injection and cross-site scripting, to inadvertent password disclosure and missing access control checks. Adding a RESIN assertion to an application requires few changes to the existing application code, and an assertion can reuse existing code and data...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Multi-Aspect Security Configuration Assessment

    This paper presents a framework for building security assessment tools able to perform online verification of the security of a system configuration. Heterogeneous data generated from multiple sources are integrated into a homogeneous RDF representation using domain-specific ontologies and used for assessing the security of a configuration toward known attack...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Can They Hear Me Now?: A Security Analysis of Law Enforcement Wiretaps

    This paper analyzes the security properties of these inter-faces. It demonstrates that the standard CALEA interfaces are vulnerable to a range of unilateral attacks by the intercept target. In particular, because of poor design choices in the interception architecture and protocols, experiments show it is practical for a CALEA-tapped target...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Demo Abstract: Measuring Foot Pronation Using RFID Sensor Networks

    Running efficiency is an important factor to consider in order to avoid injury. In particular, foot pronation, the angle of the foot as it hits the ground, is a common cause for many types of injuries among runners. Though pronation is common, diagnosing pronation is difficult and imprecise. Currently there...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Wildlife and Environmental Monitoring Using RFID and WSN Technology

    Wireless Sensor Networks enable scientists to collect information about the environment with a granularity unseen before, while providing numerous challenges to software designers. Since sensor devices are often powered by small batteries, which take considerable effort to replace, it is of major importance to use energy carefully. The paper presents...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds

    Third-party cloud computing represents the promise of out-sourcing as applied to computation. Services, such as Microsoft's Azure and Amazon's EC2, allow users to instantiate Virtual Machines (VMs) on demand and thus purchase precisely the capacity they require when they require it. In turn, the use of virtualization allows third-party cloud...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    Capacity of Large-Scale CSMA Wireless Networks

    In the literature, asymptotic studies of multi-hop wireless network capacity often consider only centralized and deterministic TDMA (time-division multi-access) coordination schemes. There have been fewer studies of the asymptotic capacity of large-scale wireless networks based on CSMA (carrier-sensing multi-access), which schedules transmissions in a distributed and random manner. With the...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Implementation and Evaluation of a TDMA MAC for WiFi-Based Rural Mesh Networks

    WiFi mesh networks with outdoor links have become an attractive option to provide cost-effective broadband connectivity to rural areas, especially in developing regions. It is well understood that a TDMA-based approach is necessary to provide good performance over such networks. While preliminary prototypes of TDMA-based MAC protocols have been developed,...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    MobiClique: Middleware for Mobile Social Networking

    This paper considers a mobile ad hoc network setting where Bluetooth enabled mobile devices communicate directly with other devices as they meet opportunistically. The paper designs and implements a novel mobile social networking middleware named MobiClique. MobiClique forms and exploits ad hoc social networks to disseminate content using a store-carry-forward...

    Provided By Association for Computing Machinery