Association for Computing Machinery

Displaying 1-40 of 7276 results

  • White Papers // Jul 2014

    A Methodology for Social BI

    Social BI (SBI) is the emerging discipline that aims at combining corporate data with textual User-Generated Content (UGC) to let decision-makers analyze their business based on the trends perceived from the environment. Despite the increasing diffusion of SBI applications, no specific and organic design methodology is available yet. In this...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Dynamic Fine-Grained Scheduling for Energy-Efficient Main-Memory Queries

    Power and cooling costs are some of the highest costs in data centers today, which make improvement in energy efficiency crucial. Energy efficiency is also a major design point for chips that power whole ranges of computing devices. One important goal in this area is energy proportionality, arguing that the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    H2RDF+: An Efficient Data Management System for Big RDF Graphs

    The proliferation of data in RDF format has resulted in the emergence of a plethora of specialized management systems. While the ability to adapt to the complexity of a SPARQL query - given their inherent diversity - is crucial, current approaches do not scale well when faced with substantially complex,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Scalable Indexing and Adaptive Querying of RDF Data in the Cloud

    Efficient RDF data management systems are central to the vision of the semantic Web. The enormous increase in both user and machine generated content dictates for scalable solutions in triple data stores. Current systems manage to decentralize some or all the stages of RDF data management, scaling to arbitrarily large...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Database Cracking: Fancy Scan, not Poor Man's Sort!

    Database cracking is an appealing approach to adaptive indexing: on every range-selection query, the data is partitioned using the supplied predicates as pivots. The core of database cracking is, thus, pivoted partitioning. While pivoted partitioning, like scanning, requires a single pass through the data it tends to have much higher...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Indexing for Interactive Exploration of Big Data Series

    Numerous applications continuously produce big amounts of data series, and in several time critical scenarios analysts need to be able to query these data as soon as they become available, which is not currently possible with the state-of-the-art indexing methods and for very large data series collections. In this paper,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    H2O: A Hands-Free Adaptive Store

    Modern state-of-the-art database systems are designed around a single data storage layout. This is a fixed decision that drives the whole architectural design of a database system, i.e., row-stores, column-stores. However, none of those choices is a universally good solution; different workloads require different storage layouts and data access methods...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Computation and Communication Efficient Graph Processing with Distributed Immutable View

    Cyclops is a new vertex-oriented graph-parallel framework for writing distributed graph analytics. Unlike existing distributed graph computation models, cyclops retains simplicity and computation-efficiency by synchronously computing over a distributed immutable view, which grants a vertex with read-only access to all its neighboring vertices. The view is provided via read-only replication...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    CrowdFill: Collecting Structured Data from the Crowd

    The authors present CrowdFill, a system for collecting structured data from the crowd. While a typical microtask-based approach would pose specific questions to each worker and assemble the answers, Crowd-Fill shows a partially-filled table to all participating workers. Workers contribute by filling in empty cells, as well as upvoting and...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Domino: An Incremental Computing Framework in Cloud with Eventual Synchronization

    In recent years, more and more applications in cloud have needed to process large-scale online data sets that evolve over time as entries are added or modified. Several programming frameworks, such as percolator and oolong, are proposed for such incremental data processing and can achieve efficient updates with an event-driven...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Next Generation Job Management Systems for Extreme-Scale Ensemble Computing

    With the exponential growth of supercomputers in parallelism, applications are growing more diverse, including traditional large-scale HPC MPI jobs, and ensemble workloads such as finer-grained Many-Task Computing (MTC) applications. Delivering high throughput and low latency for both workloads requires developing a distributed job management system that is magnitudes more scalable...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Design and Evaluation of the GeMTC Framework for GPU-enabled Many-Task Computing

    The authors present the design and first performance and usability evaluation of GeMTC, a novel execution model and runtime system that enables accelerators to be programmed with many concurrent and independent tasks of potentially short or variable duration. With GeMTC, a broad class of such \"Many-task\" applications can leverage the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Self Managing Monitoring for Highly Elastic Large Scale Cloud Deployments

    Infrastructure as a service computing exhibits a number of properties, which are not found in conventional server deployments. Elasticity is among the most significant of these properties which has wide reaching implications for applications deployed in cloud hosted VMs. Among the applications a affected by elasticity is monitoring. In this...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Accessing Multiple Clouds with Cloudmesh

    The authors present the design of a toolkit that can be employed by users and administrators to manage virtual machines on multi-cloud environments. It can be run by individual users or offered as a service to a shared user community. They have practically demonstrated its use as part of a...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Infinite CacheFlow in Software-Defined Networks

    Software-Defined Networking (SDN) enables ne-grained policies for firewalls, load balancers, routers, traffic monitoring, and other functionality. While Ternary Content Address-able Memory (TCAM) enables OpenFlow switches to process packets at high speed based on multiple header fields, today's commodity switches support just thousands to tens of thousands of rules. To realize...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Memory Bandwidth Reservation in the Cloud to Avoid Information Leakage in the Memory Controller

    Multiple Virtual Machines (VMs) are typically co-scheduled on cloud servers. Each VM experiences different latencies when accessing shared resources, based on contention from other VMs. This introduces timing channels between VMs that can be exploited to launch attacks by an untrusted VM. This paper focuses on trying to eliminate the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Activity-Edge Centric Multi-Label Classification for Mining Heterogeneous Information Networks

    Multi-label classification of heterogeneous information networks has received renewed attention in social network analysis. In this paper, the authors present an activity-edge centric multi-label classification framework for analyzing heterogeneous information networks with three unique features. First, they model a heterogeneous information network in terms of a collaboration graph and multiple...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Resource Allocation for Hardware Implementations of Map

    The map operation, in which a function is applied independently to each element in a collection to produce a new collection, appears in many settings and is easy to parallelize. While a straight-forward implementation in hardware will consist of multiple functional units with buffers to balance variable execution times, the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Revealing Applications' Access Pattern in Collective I/O for Cache Management

    Collective I/O is a critical I/O strategy on high-performance parallel computing systems that enables programmers to reveal parallel processes' I/O accesses collectively and makes possible for the parallel I/O middleware to carry out I/O requests in a highly efficient manner. Collective I/O has been proven as a core parallel I/O...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    A Framework for Enhancing Data Reuse via Associative Reordering

    The freedom to reorder computations involving associative operators has been widely recognized and exploited in designing parallel algorithms and to a more limited extent in optimizing compilers. In this paper, the authors develop a novel framework utilizing the associativity and commutativity of operations in regular loop computations to enhance register...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    A Runtime Cloud Efficiency Software Quality Metric

    In this paper, the authors introduce the Cloud Efficiency (CE) metric, a novel runtime metric which assesses how effectively an application uses software-defined infrastructure. The CE metric is computed as the ratio of two functions: a benefit function which captures the current set of benefits derived from the application, and...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    System-Level Security for Network Processors with Hardware Monitors

    New attacks are emerging that target the Internet infrastructure. Modern routers use programmable network processors that may be exploited by merely sending suitably crafted data packets into a network. Hardware monitors that are co-located with processor cores can detect attacks that change processor behavior with high probability. In this paper,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    SHiFA: System-Level Hierarchy in Run-Time Fault-Aware Management of Many-Core Systems

    A system-level approach to fault-aware resource management of many-core systems is proposed. The proposed approach, called SHiFA, is able to tolerate run-time faults at system level without any hardware overhead. In contrast to the existing system-level methods, network resources are also considered to be potentially faulty. Accordingly, applications are mapped...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Autonomic Resource Provisioning for Cloud-Based Software

    Cloud elasticity provides a software system with the ability to maintain optimal user experience by automatically acquiring and releasing resources, while paying only for what has been consumed. The mechanism for automatically adding or removing resources on the fly is referred to as auto-scaling. The state-of-the practice with respect to...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Neural Network-Based Accelerators for Transcendental Function Approximation

    The general-purpose approximate nature of Neural Network (NN) based accelerators has the potential to sustain the historic energy and performance improvements of computing systems. The authors propose the use of NN-based accelerators to approximate mathematical functions in the GNU C Library (glibc) that commonly occur in application benchmarks. Using their...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Generation of Reduced Analog Circuit Models Using Transient Simulation Traces

    The generation of fast models for device level circuit descriptions is a very active area of research. Model order reduction is an attractive technique for dynamical models size reduction. In this paper, the authors propose an approach based on clustering, curve-fitting, linearization and Krylov space projection to build reduced models...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    A Qualitative Simulation Approach for Verifying PLL Locking Property

    Simulation cannot give a full coverage of Phase Locked Loop (PLL) behavior in presence of process variation, jitter and varying initial conditions. Qualitative Simulation is an attracting method that computes behavior envelopes for dynamical systems over continuous ranges of their parameters. Therefore, this method can be employed to verify PLLs...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    A Semi-Formal Approach for Analog Circuits Behavioral Properties Verification

    The analog circuit design process is becoming very complex and therefore new verification approaches are very much needed. Simulation is the most used technique to compute the behavior of a circuit model. Statistical methods like Monte Carlo rely on repeating numerical simulations for a random sampling of parameters. The authors...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    OCV-Aware Top-Level Clock Tree Optimization

    The clock trees of high-performance synchronous circuits have many clock logic cells (e.g., clock gating cells, multiplexers and dividers) in order to achieve aggressive clock gating and required performance across a wide range of operating modes and conditions. As a result, clock tree structures have become very complex and difficult...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    A New Methodology for Reduced Cost of Resilience

    Resilient design techniques are used to ensure correct operation under dynamic variations; and improve design performance (e.g., through timing speculation). However, significant overheads (e.g., 17% and 15% energy penalties due to throughput degradation and additional circuits) are incurred by existing resilient design techniques. For instance, resilient designs require additional circuits...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Horizontal Benchmark Extension for Improved Assessment of Physical CAD Research

    The rapid growth in complexity and diversity of IC designs, design flows and methodologies has resulted in a benchmark-centric culture for evaluation of performance and scalability in physical design algorithm research. Landmark papers in the literature present vertical benchmarks that can be used across multiple design flow stages; artificial benchmarks...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Towards Topic Modeling for Big Data

    Latent Dirichlet Allocation (LDA) is a popular topic modeling technique in academia but less so in industry, especially in large-scale applications involving search engines and on-line advertisement systems. A main underlying reason is that the topic models used have been too small in scale to be useful; for example, some...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Resolving Conflicts in Heterogeneous Data by Truth Discovery and Source Reliability Estimation

    In many applications, one can obtain descriptions about the same objects or events from a variety of sources. As a result, this will inevitably lead to data or information conflicts. One important problem is to identify the true information (i.e., the truths) among conflicting sources of data. It is intuitive...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    NewsNetExplorer: Automatic Construction and Exploration of News Information Networks

    News data is one of the most abundant and familiar data sources. News data can be systematically utilized and explored by database, data mining and NLP information retrieval researchers to demonstrate to the general public the power of advanced information technology. In the authors view, news data contains rich, inter-related...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Imprecise Datapath Design: An Overclocking Approach

    In this paper, the authors describe an alternative circuit design methodology when considering trade-offs between accuracy, performance and silicon area. They compare two different approaches that could trade accuracy for performance. One is the traditional approach where the precision used in the datapath is limited to meet target latency. The...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Explore-by-Example: An Automatic Query Steering Framework for Interactive Data Exploration

    Interactive Data Exploration (IDE) is a key ingredient of a diverse set of discovery-oriented applications, including ones from scientific computing and evidence-based medicine. In these applications, data discovery is a highly ad hoc interactive process where users execute numerous exploration queries using varying predicates aiming to balance the trade-off between...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Reconfiguration-Assisted Charging in Large-Scale Lithium-Ion Battery Systems

    Large-scale Lithium-ion batteries are widely adopted in many systems such as electric vehicles and energy backup in power grids. Due to factors such as manufacturing difference and heterogeneous discharging conditions, cells in the battery system may have different statuses such as diverse voltage levels. This cell diversity is commonly known...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Aerie: Flexible File-System Interfaces to Storage-Class Memory

    Storage-class memory technologies such as phase-change memory and memristors present a radically different interface to storage than existing block devices. As a result, they provide a unique opportunity to re-examine storage architectures. The authors find that the existing kernel-based stack of components, well suited for disks, unnecessarily limits the design...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Using Restricted Transactional Memory to Build a Scalable In-Memory Database

    The recent availability of Intel Haswell processors marks the transition of hardware transactional memory from research toys to mainstream reality. DBX is an in-memory database that uses Intel's Restricted Transactional Memory (RTM) to achieve high performance and good scalability across multicore machines. The main limitation (and also key to practicality)...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Reconciling High Server Utilization and Sub-Millisecond Quality-of-Service

    The simplest strategy to guarantee good Quality-of-Service (QoS) for a latency-sensitive workload with sub-millisecond latency in a shared cluster environment is to never run other workloads concurrently with it on the same server. Unfortunately, this inevitably leads to low server utilization, reducing both the capability and cost effectiveness of the...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    Managing Intrusion Detection Rule Sets

    The prevalent use of the signature-based approach in modern Intrusion Detection Systems (IDS) emphasizes the importance of the efficient management of the employed signature sets. With the constant discovery of new threats and vulnerabilities, the complexity and size of signature sets reach the point where the manual management of rules...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Survivable Key Compromise in Software Update Systems

    Today's software update systems have little or no defense against key compromise. As a result, key compromises have put millions of software update clients at risk. Here, the authors identify three classes of information whose authenticity and integrity are critical for secure software updates. Analyzing existing software update systems with...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    A Look in the Mirror: Attacks on Package Managers

    This work studies the security of ten popular package managers. These package managers use different security mechanisms that provide varying levels of usability and resilience to attack. The authors find that, despite their existing security mechanisms, all of these package managers have vulnerabilities that can be exploited by a man-in-the-middle...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2008

    Autonomic Composition of Ubiquitous Multimedia Applications in REACHES

    In this paper, the authors describe their work in developing an autonomic system that supports the composition of ubiquitous applications at run-time. The applications are composed and adapted accordingly to user preferences and user-provided criteria. They have designed a proof-of-concept prototype of the system and an example multimedia application. The...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2008

    PanOULU Luotsi: A Location Based Information Mash-Up With XML Aggregator and WiFi Positioning

    The authors introduce panOULU Luotsi, a multi-device location-based information mash-up provided for the users of a large municipal wireless network. XML content in various forms, such as RSS/ATOM feeds from several content providers are automatically merged into a database using a flexible XML aggregator. It allows mapping different heterogeneous information...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    MobiToss: A Novel Gesture Based Interface for Creating and Sharing Mobile Multimedia Art on Large Public Displays

    This paper presents MobiToss, a novel application for creating and sharing mobile multimedia art with an off-the-shelf mobile phone equipped with built-in accelerometer sensors allowing gesture control. The user first takes a photo or captures a video with the phone and then using a 'Throwing' gesture transfers the clip onto...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2011

    Getting Closer: An Empirical Investigation of the Proximity of User to Their Smart Phones

    Much research in ubiquitous computing assumes that a user's phone will be always on and at-hand, for collecting user context and for communicating with a user. Previous work with the previous generation of mobile phones has shown that such an assumption is false. Here, the authors investigate whether this assumption...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    Feasibility Evaluation of a Communication-Oriented P2P System in Mobile Environments

    The authors present the feasibility evaluation of a structured communication-oriented Peer-To-Peer (P2P) system being used in mobile environments in this paper. The different levels of churn are modeled by the exponential distribution with varied value of mean online time. Their system utilizes Kademlia with some modifications as the underlying Distributed...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2012

    Path-Exploration Lifting: Hi-Fi Tests for Lo-Fi Emulators

    Processor emulators are widely used to provide isolation and instrumentation of binary software. However, they have proved difficult to implement correctly: processor specifications have many corner cases that are not exercised by common workloads. It is untenable to base other system security properties on the correctness of emulators that have...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2011

    Sandnet: Network Traffic Analysis of Malicious Software

    Dynamic analysis of malware is widely used to obtain a better understanding of unknown software. While existing systems mainly focus on host-level activities of malware and limit the analysis period to a few minutes, the authors concentrate on the network behavior of malware over longer periods. They provide a comprehensive...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2012

    Periodic Transfers in Mobile Applications: Network-Wide Origin, Impact, and Optimization

    Cellular networks employ a specific radio resource management policy distinguishing them from wired and Wi-Fi networks. A lack of awareness of this important mechanism potentially leads to resource-inefficient mobile applications. The authors perform the first network-wide, large-scale investigation of a particular type of application traffic pattern called periodic transfers where...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2011

    Identifying Diverse Usage Behaviors of Smartphone Apps

    Smartphone users are increasingly shifting to using apps as "Gateways" to Internet services rather than traditional web browsers. App marketplaces for iOS, Android, and Windows Phone platforms have made it attractive for developers to deploy apps and easy for users to discover and start using many network-enabled apps quickly. For...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2011

    AccuLoc: Practical Localization of Performance Measurements in 3G Networks

    Operators of 3G data networks need to distinguish the performance of each geographic area in their 3G networks to detect and resolve local network problems. This is because the quality of the "Last mile" radio link between 3G base stations and end-user devices is a crucial factor in the end-to-end...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2011

    Profiling Resource Usage for Mobile Applications: A Cross-Layer Approach

    Despite the popularity of mobile applications, their performance and energy bottlenecks remain hidden due to a lack of visibility into the resource-constrained mobile execution environment with potentially complex interaction with the application behavior. The authors design and implement ARO, the mobile Application Resource Optimizer, the first tool that efficiently and...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2011

    Cellular Data Network Infrastructure Characterization and Implication on Mobile Content Placement

    Despite the tremendous growth in the cellular data network usage due to the popularity of smartphones, so far there is rather limited understanding of the network infrastructure of various cellular carriers. Understanding the infrastructure characteristics such as the network topology, routing design, address allocation, and DNS service configuration is essential...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2012

    When Prefetching Works, When It Doesn't, and Why

    In emerging and future high-end processor systems, tolerating increasing cache miss latency and properly managing memory bandwidth will be critical to achieving high performance. Prefetching, in both hardware and software, is among the authors' most important available techniques for doing so; yet, their claim that prefetching is perhaps also the...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2012

    Lazy Suspect-Set Computation: Fault Diagnosis for Deep Electrical Bugs

    Current silicon test methods are highly effective at sensitizing and propagating most electrical faults. Unfortunately, with ever increasing chip complexity and shorter time-to-market windows, an increasing number of faults escape undetected. To address this problem, the authors propose a novel technique to help identify hard-to-find electrical faults that are not...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2011

    Debugging With Dominance: On-the-Fly RTL Debug Solution Implications

    Design debugging has become a resource-intensive bottleneck in modern VLSI CAD flows, consuming as much as 60% of the total verification effort. With typical design sizes exceeding the half-million synthesized gates mark, the growing number of blocks to be examined dramatically slows down the debugging process. The aim of this...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2010

    Applying the Concurrent Collections Programming Model to Asynchronous Parallel Dense Linear Algebra

    The application of a novel programming model, called Concurrent Collections (CnC), to the implementation of an asynchronous-parallel algorithm for computing the Cholesky factorization of dense matrices. In CnC, the programmer expresses her computation in terms of application-specific operations, partially-ordered by semantic scheduling constraints. The authors demonstrate the performance potential of...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2010

    Model-Driven Autotuning of Sparse Matrix-Vector Multiply on GPUs

    The authors present a performance model-driven framework for automated performance tuning (auto-tuning) of Sparse Matrix-Vector multiply (SpMV) on systems accelerated by Graphics Processing Units (GPU). Their study consists of two parts. First, they describe several carefully hand-tuned SpMV implementations for GPUs, identifying key GPU-specific performance limitations, enhancements, and tuning opportunities....

    Provided By Association for Computing Machinery

  • White Papers // Jul 2011

    On the Interplay of Exception Handling and Design by Contract: An Aspect-Oriented Recovery Approach

    Design by Contract (DbC) is a technique for developing and improving functional software correctness through definition of "Contracts" between client classes and their suppliers. Such contracts are enforced during runtime and if any of them is violated a runtime error should occur. Runtime Assertions Checkers (RACs) are a well-known technique...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2010

    Procedure-Modular Verification of Control Flow Safety Properties

    This paper describes a novel technique for fully automated procedure - modular verification of Java programs equipped with method - local and global assertions that specify safety properties of sequences of method invocations. Modularity of verification is achieved by relativizing the correctness of global properties on the local properties rather...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2011

    Predicate Abstraction and Refinement for Verifying Multi-Threaded Programs

    Automated verification of multi-threaded programs requires explicit identification of the interplay between interacting threads, so-called environment transitions, to enable scalable, compositional reasoning. Once the environment transitions are identified, the authors can prove program properties by considering each program thread in isolation, as the environment transitions keep track of the interleaving...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    Caching and Incrementalisation in the Java Query Language

    Many contemporary object-oriented programming languages support first-class queries or comprehensions. These language extensions make it easier for programmers to write queries, but are generally implemented no more efficiently than the code using collections, iterators, and loops that they replace. Crucially, whenever a query is re-executed, it is recomputed from scratch....

    Provided By Association for Computing Machinery

  • White Papers // Mar 2012

    DreamWeaver: Architectural Support for Deep Sleep

    Numerous data center services exhibit low average utilization leading to poor energy efficiency. Although CPU voltage and frequency scaling historically has been an effective means to scale down power with utilization, transistor scaling trends are limiting its effectiveness and the CPU is accounting for a shrinking fraction of system power....

    Provided By Association for Computing Machinery

  • White Papers // May 2011

    Feature Cohesion in Software Product Lines: An Exploratory Study

    Software product lines gain momentum in research and industry. Many product-line approaches use features as a central abstraction mechanism. Feature-oriented software development aims at encapsulating features in cohesive units to support program comprehension, variability, and reuse. Surprisingly, not much is known about the characteristics of cohesion in feature-oriented product lines,...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2011

    Type Checking Annotation-Based Product Lines

    Software-product-line engineering is an efficient means to generate a family of program variants for a domain from a single code base. However, because of the potentially high number of possible program variants, it is difficult to test them all and ensure properties like type safety for the entire product line....

    Provided By Association for Computing Machinery

  • White Papers // May 2011

    JavAdaptor: Unrestricted Dynamic Software Updates for Java

    Dynamic Software Updates (DSU) are one of the top-most features requested by developers and users. As a result, DSU is already standard in many dynamic programming languages. But, it is not standard in statically typed languages such as Java. Even if at place number three of Oracle's current Request For...

    Provided By Association for Computing Machinery

  • White Papers // May 2011

    View Infinity: A Zoomable Interface for Feature-Oriented Software Development

    Software Product Line (SPL) engineering provides efficient means to develop variable software. To support program comprehension of SPLs, the authors developed View Infinity, a tool that provides seamless and semantic zooming of different abstraction layers of an SPL. First results of a qualitative study with experienced SPL developers are promising...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Code Clones in Feature-Oriented Software Product Lines

    Some limitations of object-oriented mechanisms are known to cause code clones (e.g., extension using inheritance). Novel programming paradigms such as Feature-Oriented Programming (FOP) aim at alleviating these limitations. However, it is an open issue whether FOP is really able to avoid code clones or whether it even facilitates (FOP-related) clones....

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    A Model of Refactoring Physically and Virtually Separated Features

    Physical separation with class refinements and method refinements ? la AHEAD and virtual separation using annotations ? la #ifdef or CIDE are two competing implementation approaches for software product lines with complementary advantages. Although both approaches have been mainly discussed in isolation, the authors strive for an integration to leverage...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    How to Compare Program Comprehension in FOSD Empirically - An Experience Report

    There are many different implementation approaches to realize the vision of feature oriented software development, ranging from simple preprocessors, over feature-oriented programming, to sophisticated aspect-oriented mechanisms. Their impact on readability and maintainability (or program comprehension in general) has caused a debate among researchers, but sound empirical results are missing. The...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    Program Refactoring Using Functional Aspects

    A functional aspect is an aspect that has the semantics of a transformation; it is a function that maps a program to an advised program. Functional aspects are composed by function composition. In this paper, the authors explore functional aspects in the context of aspect-oriented refactoring. They show that refactoring...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    Feature Featherweight Java: A Calculus for Feature-Oriented Programming and Stepwise Refinement

    Feature-Oriented Programming (FOP) is a paradigm that incorporates programming language technology, program generation techniques, and stepwise refinement. Thaker et al. suggest the development of a type system for FOP to guarantee safe feature composition, i.e, to guarantee the absence of type errors during feature composition. The authors present such a...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2011

    Distributed Systems and Natural Disasters: BitTorrent as a Global Witness

    Peer-To-Peer (P2P) systems represent some of the largest distributed systems in today's Internet. Among P2P systems, BitTorrent is the most popular, potentially accounting for 20-50% of P2P file-sharing traffic. In this paper, the authors argue that this popularity can be leveraged to monitor the impact of natural disasters and political...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2011

    End-to-End Reliability for Best-Effort Content-Based Publish/Subscribe Networks

    When it comes to reliability, there are two main categories of distributed publish/subscribe systems: reliable systems and best-effort systems. The former gives the highest priority to guaranteed and ordered delivery while the latter aims for high throughput and low delays. The authors propose a method to improve the delivery guarantees...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2012

    Your Friends Have More Friends Than You Do: Identifying Influential Mobile Users Through Random Walks

    In this paper, the authors study the problem of identifying influential users in mobile social networks. Traditional approaches find these users through centralized algorithms on either friendship or social-contact graphs of all users. However, the computational complexity of these algorithms is known to be very high, making them unsuitable for...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2009

    XenoTiny: Emulating Wireless Sensor Networks on Xen

    The large-scale and inaccessibility of deployed wireless sensor networks mandate that the code installed in sensor nodes be rigorously tested prior to deployment. Such testing is primarily achieved using discrete event simulators designed to provide "High fidelity" simulation of the communications between nodes. Discrete event simulators, by their very nature,...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    Model/Analyzer: A Tool for Detecting, Visualizing and Fixing Design Errors in UML

    Integrated development environments are widely used in industry and support software engineers with instant error feedback about their work. Modeling tools often react to changes at a coarse level of granularity that make reasoning about errors inefficient and late. Furthermore, there is often a lack of appropriate visualizations of model...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2012

    Easing Software Evolution: Change-Data and Domain-Driven Approach

    Quick and quality changes to a software application to add new feature or change existing feature, depend largely on the code architecture and its atomic responsibilities. As the application evolves, the code undergoes modifications and drifts away from its original design, leading to anomalies in the code structure and non-atomic,...

    Provided By Association for Computing Machinery