Association for Computing Machinery

Displaying 1-40 of 6826 results

  • White Papers // Jan 2015

    Compiler Management of Communication and Parallelism for Quantum Computation

    Quantum Computing (QC) offers huge promise to accelerate a range of computationally intensive benchmarks. Quantum computing is limited, however, by the challenges of decoherence: i.e., a quantum state can only be maintained for short windows of time before it decoheres. While quantum error correction codes can protect against decoherence, fast...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    A Symbolic Execution Algorithm for Constraint-Based Testing of Database Programs

    In so-called constraint-based testing, symbolic execution is a common technique used as a part of the process to generate test data for imperative programs. Databases are ubiquitous in software and testing of programs manipulating databases is thus essential to enhance the reliability of software. In this paper, the authors propose...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    CQIC: Revisiting Cross-Layer Congestion Control for Cellular Networks

    With the advent of high-speed cellular access and the overwhelming popularity of Smartphone's, a large percent of today's Internet content is being delivered via cellular links. Due to the nature of long-range wireless signal propagation, the capacity of the last hop cellular link can vary by orders of magnitude within...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    GRAPHITE: An Extensible Graph Traversal Framework for Relational Database Management Systems

    Graph traversals are a basic but fundamental ingredient for a variety of graph algorithms and graph-oriented queries. To achieve the best possible query performance, they need to be implemented at the core of a database management system that aims at storing, manipulating, and querying graph data. Increasingly, modern business applications...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Uncovering Network Tarpits with Degreaser

    Network tarpits, whereby a single host or appliance can masquerade as many fake hosts on a network and slow network scanners, are a form of defensive cyber-deception. In this paper, the authors develop degreaser, an efficient fingerprinting tool to remotely detect tarpits. In addition to validating their tool in a...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Design-Theoretic Encoding of Deterministic Hypotheses as Constraints and Correlations Into U-Relational Databases

    In view of the paradigm shift that makes science ever more data-driven, in this paper the authors consider deterministic scientific hypotheses as uncertain data. In the form of mathematical equations, hypotheses symmetrically relate aspects of the studied phenomena. For computing predictions, however, deterministic hypotheses are used asymmetrically as functions. They...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Patterns in the Chaos - A Study of Performance Variation and Predictability in Public IaaS Clouds

    Benchmarking the performance of public cloud providers is a common research topic. Previous paper has already extensively evaluated the performance of different cloud platforms for different use cases, and under different constraints and experiment setups. In this paper, the authors present a principled, large-scale literature review to collect and codify...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Challenges in Inferring Internet Interdomain Congestion

    The authors introduce and demonstrate the utility of a method to localize and quantify inter-domain congestion in the Inter-net. Their Time Sequence Latency Probes (TSLP) method depends on two facts: internet traffic patterns are typically diurnal, and queues increase packet delay through a router during periods of adjacent link congestion....

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Characterizing Large-Scale Click Fraud in ZeroAccess

    Click fraud is a scam that hits a criminal sweet spot by both tapping into the vast wealth of online advertising and exploiting that ecosystem's complex structure to obfuscate the flow of money to its perpetrators. In this paper, the authors illuminate the intricate nature of this activity through the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    On The Security of Mobile Cockpit Information Systems

    Recent trends in aviation have led many general aviation pilots to adopt the use of iPads (or other tablets) in the cockpit. While initially used to display static charts and documents, uses have expanded to include live data such as weather and traffic information that is used to make flight...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild

    Online accounts are inherently valuable resources - both for the data they contain and the reputation they accrue over time. Unsurprisingly, this value drives criminals to steal, or hijack, such accounts. In this paper, the authors focus on manual account hijacking - account hijacking performed manually by humans instead of...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Search + Seizure: The Effectiveness of Interventions on SEO Campaigns

    Black hat Search Engine Optimization (SEO), the practice of abusively manipulating search results, is an enticing method to acquire targeted user traffic. In turn, a range of interventions - from modifying search results to seizing domains - are used to combat this activity. In this paper, the authors examine the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed

    Central to the secure operation of a Public Key Infrastructure (PKI) is the ability to revoke certificates. While much of users' security rests on this process taking place quickly, in practice, revocation typically requires a human to decide to reissue a new certificate and revoke the old one. Thus, having...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    PixelVault: Using GPUs for Securing Cryptographic Operations

    Protecting the confidentiality of cryptographic keys in the event of partial or full system compromise is crucial for containing the impact of attacks. The Heartbleed vulnerability of April 2014, which allowed the remote leakage of secret keys from HTTPS web servers, is an indicative example. In this paper, the authors...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication

    In an effort to hinder attackers from compromising user accounts, Facebook launched a form of two-factor authentication called Social Authentication (SA), where users are required to identify photos of their friends to complete a log-in attempt. Recent research, however, demonstrated that attackers can bypass the mechanism by employing face recognition...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Computing Multi-Relational Sufficient Statistics for Large Databases

    Databases contain information about which relationships do and do not hold among entities. To make this information accessible for statistical analysis requires computing sufficient statistics that combine information from different database tables. Such statistics may involve any number of positive and negative relationships. With a naive enumeration approach, computing sufficient...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    SoftMoW: Recursive and Reconfigurable Cellular WAN Architecture

    The current LTE network architecture is organized into very large regions, each having a core network and a radio access network. The core network contains an Internet edge comprised of Packet data network GateWays (PGWs). The radio network consists of only base stations. There are minimal interactions among regions other...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    PRAN: Programmable Radio Access Networks

    With the continued exponential growth of mobile traffic and the rise of diverse applications, the current LTE Radio Access Network (RAN) architecture of cellular operators faces mounting challenges. Current RAN suffers from insufficient radio resource coordination, inefficient infrastructure utilization, and inflexible data paths. The authors present the high level design...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Sweet Little Lies: Fake Topologies for Flexible Routing

    Link-state routing protocols (e.g., OSPF and IS-IS) are widely used because they are scalable, robust, and based on simple abstractions. Unfortunately, these protocols are also relatively inflexible, since they direct all traffic over shortest paths. In contrast, Software Defined Networking (SDN) offers fine-grained control over routing, at the expense of...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Tango: Simplifying SDN Control with Automatic Switch Property Inference, Abstraction, and Optimization

    A major benefit of Software-Defined Networking (SDN) over traditional networking is simpler and easier control of network devices. The diversity of SDN switch implementation properties, which include both diverse switch hardware capabilities and diverse control-plane software behaviors, however, can make it difficult to understand and/or to control the switches in...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Blender: Upgrading Tenant-based Data Center Networking

    In this paper, the authors present Blender, a framework that enables network operators to improve tenant performance by tailoring the network's behavior to tenant needs. Tenants may upgrade their provisioned portion of the network with specific features, such as multi-path routing, isolation, and failure recovery, without modifying hosted application code....

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    System-Level Memory Optimization for High-Level Synthesis of Component-Based SoCs

    The design of specialized accelerators is essential to the success of many modern systems-on-chip. Electronic system-level design methodologies and high-level synthesis tools are critical for the efficient design and optimization of an accelerator. Still, these methodologies and tools offer only limited support for the optimization of the memory structures, which...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Measurement and Analysis of OSN Ad Auctions

    Advertising is ubiquitous on the web; numerous ad networks serve billions of ads daily via keyword or search term auctions. Recently, Online Social Networks (OSNs) such as Facebook have created site-specific ad services that differ from traditional ad networks by letting advertisers bid on users rather than keywords. With Facebook's...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Beyond CPM and CPC: Determining the Value of Users on OSNs

    Not all of the over one billion users of Online Social Networks (OSNs) are equally valuable to the OSNs. The current business model of monetizing advertisements targeted to users does not appear to be based on any visible grouping of the users. The primary metrics remain CPM (Cost Per Mille...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks

    Intrusion detection, traffic classification, and other network monitoring applications need to analyze the captured traffic beyond the network layer to allow for connection-oriented analysis, and achieve resilience to evasion attempts based on TCP segmentation. Existing network traffic capture frameworks, however, provide applications with raw packets and leave complex operations like...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Poster - iSync: A High Performance and Scalable Data Synchronization Protocol for Named Data Networking

    In this paper, the authors present a high performance synchronization protocol for Named Data Networking (NDN). The protocol, called iSync, uses a two-level Invertible Bloom Filter (IBF) structure to support efficient data reconciliation. Multiple differences can be found by subtracting a remote IBF from a local IBF, and therefore, from...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Consumer-Producer API for Named Data Networking

    As a new architecture, NDN requires a new API. Today's socket API cannot be reused for NDN communication because its foundational concept is point-to-point virtual channel that does not exist in NDN. This paper presents a new network programming interface to NDN communication protocols and architectural modules. This new API...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Security and QoS Tradeoff Recommendation System (SQT-RS) for Dynamic Assessing CPRM-based Systems

    Context-based Parametric Relationship Models (CPRM) defines complex dependencies between different types of parameters. In particular, security and QoS relationships that may occur at different levels of abstraction are easily identified using CPRM. However, the growing number of parameters and relationships, typically due to the heterogeneous scenarios of future networks, increase...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    On the Role of Routing in Named Data Networking

    A unique feature of Named Data Networking (NDN) is that its forwarding plane can detect and recover from network faults on its own, enabling each NDN router to handle network failures locally without relying on global routing convergence. This new feature prompts the authors to re-examine the role of routing...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    VIP: A Framework for Joint Dynamic Forwarding and Caching in Named Data Networks

    Emerging information-centric networking architectures seek to optimally utilize both bandwidth and storage for efficient content distribution. This highlights the need for joint design of traffic engineering and caching strategies, in order to optimize network performance in view of both current traffic loads and future traffic demands. The authors present a...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Kite: A Mobility Support Scheme for NDN

    Named Data Networking (NDN) natively supports the mobility of data consumers through its data-centric design and stateful forwarding plane. However, the mobility support for data producers remains open in the original proposal. In this paper, the authors introduce Kite, a design of mobility support for NDN. Kite leverages the state...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Automatic Verification of Interactions in Asynchronous Systems with Unbounded Buffers

    Asynchronous communication requires message queues to store the messages that are yet to be consumed. Verification of interactions in asynchronously communicating systems is challenging since the sizes of these queues can grow arbitrarily large during execution. In fact, behavioral models for asynchronously communicating systems typically have in finite state spaces,...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    A Bi-Objective Cost Model for Database Queries in a Multi-Cloud Environment

    Cost models are broadly used in query processing to drive the query optimization process, accurately predict the query execution time, schedule database query tasks, apply admission control and derive resource requirements to name a few applications. The main role of cost models is to produce the time needed to run...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Enfold: Downclocking OFDM in WiFi

    Dynamic Voltage and Frequency Scaling (DVFS) has long been used as a technique to save power in a variety of computing domains but typically not in communications devices. A fundamental limit that prevents decreasing the clock frequency is the Nyquist (-Shannon) sampling theorem, which states that the sampling rate must...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Cutting the Cord: a Robust Wireless Facilities Network for Data Centers

    Today's network control and management traffic are limited by their reliance on existing data networks. Fate sharing in this paper, is highly undesirable, since control traffic has very different availability and traffic delivery requirements. In this paper, the authors explore the feasibility of building a dedicated wireless facilities network for...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Rethink Energy Accounting with Cooperative Game Theory

    Energy accounting determines how much a software principal contributes to the total system energy consumption. It is the foundation for evaluating software and for operating system based energy management. While various energy accounting policies have been tried, there is no known way to evaluate them directly simply because it is...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Proximity-Based Wireless Access Control through Considerate Jamming

    As diverse types of wireless devices emerge, it becomes difficult to apply the existing wireless security measures to them without efforts. Those devices lack conventional user interfaces or they are resource-constrained to process the security protocols. Meanwhile, many of them are used within a geographical boundary to access to the...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Combating Inter-cell Interference in 802.11ac-based Multi-user MIMO Networks

    In an 802.11ac-based MU-MIMO network comprised of multiple cells, inter-cell interference allows only a single AP to serve its clients at the same time, significantly limiting the network capacity. In this paper, the authors overcome this limitation by letting the APs and clients in interfering cells coordinately cancel the inter-cell...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Overheard ACK with Token Passing: An Optimization to 802.11 MAC Protocol

    Distributed Coordination Function (DCF) is defined in IEEE 802.11 standard, which is widely used in practice. Despite of its wide use, it has several limitations. Because of the idle and collision times, it suffers from poor channel utilization. Besides, the control packets, particularly, ACKnowledgement (ACK), consume non-trivial amount of bandwidth....

    Provided By Association for Computing Machinery

  • White Papers // Aug 2014

    Knock It Off: Profiling the Online Storefronts of Counterfeit Merchandise

    The authors describe an automated system for the large-scale monitoring of Web sites that serve as online storefronts for spam-advertised goods. Their system is developed from an extensive crawl of black-market Web sites that deal in illegal pharmaceuticals, replica luxury goods, and counterfeit software. The operational goal of the system...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    An Efficient Code Update Scheme for DSP Applications in Mobile Embedded Systems

    DSP processors usually provide dedicated Address Generation Units (AGUs) to assist address computation. By carefully allocating variables in the memory, DSP compilers take advantage of AGUs and generate efficient code with compact size and improved performance. However, DSP applications running on mobile embedded systems often need to be updated after...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    Performance-Aware Thermal Management Via Task Scheduling

    High on-chip temperature impairs the processor's reliability and reduces its lifetime. Hardware-level Dynamic Thermal Management (DTM) techniques can effectively constrain the chip temperature, but degrades the performance. The authors propose an OS-level technique that performs thermal-aware job scheduling to reduce DTMs. The algorithm is based on the observation that hot...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2009

    Variation-Tolerant Non-Uniform 3D Cache Management in Die Stacked Multicore Processor

    Process variations in integrated circuits have significant impact on their performance, leakage and stability. This is particularly evident in large, regular and dense structures such as DRAMs. DRAMs are built using minimized transistors with presumably uniform speed in an organized array structure. Process variation can introduce latency disparity among different...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Energy Reduction for STT-RAM Using Early Write Termination

    The emerging Spin Torque Transfer memory (STT-RAM) is a promising candidate for future on-chip caches due to STT-RAM's high density, low leakage, long endurance and high access speed. However, one of the major challenges of STT-RAM is its high write current, which is disadvantageous when used as an on-chip cache...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    A Durable and Energy Efficient Main Memory Using Phase Change Memory Technology

    Using nonvolatile memories in memory hierarchy has been investigated to reduce its energy consumption because non-volatile memories consume zero leakage power in memory cells. One of the difficulties is, however, that the endurance of most nonvolatile memory technologies is much shorter than the conventional SRAM and DRAM technology. This has...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2013

    Trend Makers and Trend Spotters in a Mobile Application

    Media marketers and researchers have shown great interest in what becomes a trend within social media sites. Their interests have focused on analyzing the items that become trends, and done so in the context of Youtube, Twitter, and Foursquare. Here, the authors move away from these three platforms and consider...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2013

    Detection of Reactive Jamming in DSSS-Based Wireless Networks

    The authors propose a novel approach to detect reactive jammers in Direct Sequence Spread Spectrum (DSSS) wireless networks. The key idea is to use the chip error rate of the first few jamming-free symbols at the DSSS demodulator during the signal synchronization phase of regular packet reception to estimate the...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2011

    A Game Theoretic Framework for Heterogeneous Information Network Clustering

    Heterogeneous information networks are pervasive in applications ranging from bioinformatics to e-commerce. As a result, unsupervised learning and clustering methods pertaining to such networks have gained significant attention recently. Nodes in a heterogeneous information network are regarded as objects derived from distinct domains such as 'Authors' and 'Papers'. In many...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2013

    Implementation and Validation of LTE Downlink Schedulers for Ns-3

    In LTE systems, the downlink scheduler is an essential component for efficient radio resource utilization; hence, in the context of LTE simulation, the availability of good down-link scheduler models is very important. At the time this work started, the LTE module of the ns-3 simulator only supported two types of...

    Provided By Association for Computing Machinery

  • White Papers // May 2009

    Energy-Efficient Capture of Stochastic Events by Global- and Local-Periodic Network Coverage

    In this paper, the authors show that knowledge about the event dynamics can be exploited for significant energy savings, by putting the sensors on a periodic on/o schedule. They discuss energy-aware optimization of the periodic schedule for both cases of a synchronous and an asynchronous network. Under the periodic scheduling,...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2011

    Identifying and Using Energy-Critical Paths

    The power consumption of the Internet and datacenter networks is already significant, and threatens to shortly hit the power delivery limits while the hardware is trying to sustain ever-increasing traffic requirements. Existing energy-reduction approaches in this domain advocate re-computing network configuration with each substantial change in demand. Unfortunately, computing the...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2011

    TreeCAM: Decoupling Updates and Lookups in Packet Classification

    Packet classification involves determining the highest-priority rule to which each network packet matches out of a set of rules (i.e., a classifier). Each rule specifies a desired action on matching packets identified by a combination of the packet fields (e.g., source/destination IP, source/destination port, and protocol). Packet classification is vital...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2011

    TCP Fast Open

    Today's web services are dominated by TCP flows so short that they terminate a few round trips after handshaking; this handshake is a significant source of latency for such flows. In this paper, the authors describe the design, implementation, and deployment of the TCP Fast Open protocol, a new mechanism...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Pull-Patching: A Combination of Multicast and Adaptive Segmented HTTP Streaming

    Multicast delivery for video streaming gains credibility with the introduction of commercial IPTV. The authors therefore revisit patching, a video-on-demand idea from the 1990s. They have built Pull-Patching, an approach that combines the patching ideas with adaptive segmented HTTP streaming and a unicast technique that is used by most commercial...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Sierra: Practical Power-Proportionality for Data Center Storage

    In this paper, the authors present Sierra, a power-proportional distributed storage subsystem for data centers. Sierra allows powering down of a large fraction of servers during troughs without migrating data and without imposing extra capacity requirements. It addresses the challenges of maintaining read and write availability, no performance degradation, consistency,...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Symbolic Crosschecking of Floating-Point and SIMD Code

    The authors present an effective technique for crosschecking an IEEE 754 floating-point program and its SIMD-vectorized version, implemented in KLEE-FP, an extension to the KLEE symbolic execution tool that supports symbolic reasoning on the equivalence between floating-point values. The key insight behind their approach is that floating-point values are only...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Feature Consistency in Compile-Time - Configurable System Software

    Much system software can be configured at compile time to tailor it with respect to a broad range of supported hardware architectures and application domains. A good example is the Linux kernel, which provides more than 10,000 configurable features, growing rapidly. From the maintenance point of view, compile-time configurability imposes...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Database Engines on Multicores, Why Parallelize When You Can Distribute?

    Multicore computers pose a substantial challenge to infrastructure software such as operating systems or databases. Such software typically evolves slower than the underlying hardware, and with multicore it faces structural limitations that can be solved only with radical architectural changes. In this paper, the authors argue that, as has been...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Finding Complex Concurrency Bugs in Large Multi-Threaded Applications

    Parallel software is increasingly necessary to take advantage of multi-core architectures, but it is also prone to concurrency bugs which are particularly hard to avoid, find, and fix, since their occurrence depends on specific thread inter-leavings. In this paper, the authors propose a concurrency bug detector that automatically identifies when...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Fine-Grained Power Modeling for Smartphones Using System Call Tracing

    The authors propose a new, system-call-based power modeling approach which gracefully encompasses both utilization-based and non-utilization-based power behavior. They present the detailed design of such a power modeling scheme and its implementation on Android and Windows Mobile. Their experimental results using a diverse set of applications confirm that the new...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    A Case for Scaling Applications to Many-Core with OS Clustering

    In this paper, the authors propose an approach to scaling UNIX-like operating systems for many cores in a backward-compatible way, which still enjoys common wisdom in new operating system designs. The proposed system, called Cerberus, mitigates contention on many shared data structures within OS kernels by clustering multiple commodity operating...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Parallel Symbolic Execution for Automated Real-World Software Testing

    In this paper, the authors introduce Cloud9, a platform for automated testing of real-world software. Their main contribution is the scalable parallelization of symbolic execution on clusters of commodity hardware, to help cope with path explosion. Cloud9 provides a systematic interface for writing "Symbolic tests" that concisely specify entire families...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    SRM-Buffer: An OS Buffer Management Technique to Prevent Last Level Cache From Thrashing in Multicores

    In this paper, the authors propose a buffer cache design called Selected Region Mapping Buffer (SRM-Buffer) for multicore systems to effectively address the cache pollution problem caused by OS buffer. SRM-buffer improves existing OS buffer management with an enhanced page allocation policy that carefully selects mapping physical pages upon buffer...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Scheduling Large Jobs by Abstraction Refinement

    The static scheduling problem often arises as a fundamental problem in real-time systems and grid computing. The authors consider the problem of statically scheduling a large job expressed as a task graph on a large number of computing nodes, such as a data center. This paper solves the large-scale static...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Is Co-Scheduling Too Expensive for SMP VMs?

    Symmetric MultiProcessing (SMP) Virtual Machines (VMs) allow users to take advantage of a multiprocessor infrastructure. Despite the advantage, SMP VMs can cause synchronization latency to increase significantly, depending on task scheduling. In this paper, the authors show that even if a SMP VM runs non-concurrent applications, the synchronization latency problem...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2012

    Enabling Ad-Hoc-Style Communication in Public WLAN Hot-Spots

    Opportunistic networking between mobile devices relies on the capabilities of those devices to establish ad-hoc communication among each other. While the two dominant wireless interface technologies, IEEE 802.11 wireless LAN and Bluetooth, offer such capabilities in theory, limitations of the protocol specification, chipsets, and operating systems in mobile devices render...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2012

    Opportunistic Content Sharing Applications

    Opportunistic communication between mobile nodes allows for asynchronous content sharing within groups. Limiting the spread of information to a geographic area creates an infrastructure-less variant of digital graffiti, a social network with coupling in space and limited decoupling in time. Due to its nature, this kind of a communication network...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2012

    Supporting Wireless Access Markets With a User-Centric QoE-Based Geo-Database

    This paper presents the u-map, a novel user-centric geo-database for wireless access markets that enables clients to upload information about their profile, their Quality-of-Experience (QoE) feedback for a service, traffic demand, network/spectrum conditions (e.g., interference, coverage), providers, and their position (e.g., GPS-based measurements) in a spatio-temporal geo-database. To evaluate the...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2012

    Security Asset Elicitation for Collaborative Models

    Building secure systems is a difficult job for most engineers since it requires in-depth understanding of security aspects. This task, however, can be assisted by capturing security knowledge in a particular domain and reusing the knowledge when designing applications. The authors use this strategy and employ information security ontology to...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    InstantLeap: Fast Neighbor Discovery in P2P VoD Streaming

    A fundamental challenge in Peer-To-Peer (P2P) Video-on-Demand (VoD) streaming is to quickly locate new supplying peers whenever a VCR command is issued, in order to achieve smooth viewing experiences. For most existing commercial systems which resort to tracking servers for such neighbor discovery, the increasing scale of P2P VoD systems...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2010

    Exploiting Memory Usage Patterns to Improve Garbage Collections in Java

    Copying-based garbage collectors are currently widely employed in JVM systems, as they provide not only cheap allocations but also fast collections. Comparing to their compacting-based counterparts, copying-based collectors trade space for time: they conservatively reserve half of the available heap for the purpose of copying live objects. It is a...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2011

    Modeling and Synthesizing Task Placement Constraints in Google Compute Clusters

    Evaluating the performance of large compute clusters requires benchmarks with representative workloads. At Google, performance benchmarks are used to obtain performance metrics such as task scheduling delays and machine resource utilizations to assess changes in application codes, machine configurations, and scheduling algorithms. Existing approaches to workload characterization for high performance...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2013

    Experimental Analysis of Task-Based Energy Consumption in Cloud Computing Systems

    Cloud computing delivers IT solutions as a utility to users. One consequence of this model is that large cloud data centres consume large amounts of energy and produce significant carbon footprints. A common objective of cloud providers is to develop resource provisioning and management solutions that minimise energy consumption while...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2012

    Improving Large Graph Processing on Partitioned Graphs in the Cloud

    As the study of large graphs over hundreds of gigabytes becomes increasingly popular for various data-intensive applications in cloud computing, developing large graph processing systems has become a hot and fruitful research area. Many of those existing systems support a vertex-oriented execution model and allow users to develop custom logics...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2012

    Constructing Large and Fast Multi-Level Cell STT-MRAM Based Cache for Embedded Processors

    MLC STT-MRAM (Multi-Level Cell Spin-Transfer Torque Magnetic RAM), an emerging non-volatile memory technology, has become a promising candidate to construct L2 caches for high-end embedded processors. However, the long write latency limits the effectiveness of MLC STT-MRAM based L2 caches. In this paper, the authors address this limitation with two...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2012

    ER: Elastic RESET for Low Power and Long Endurance MLC Based Phase Change Memory

    Phase Change Memory (PCM) has recently emerged as a promising nonvolatile memory technology. To effectively increase memory capacity and reduce per bit fabrication cost, Multi-Level Cell (MLC) PCM stores more than one bit per cell by differentiating multiple intermediate resistance levels. However, MLC PCMsuffers from significantly shortened endurance due to...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2011

    A Composite and Scalable Cache Coherence Protocol for Large Scale CMPs

    The number of on-chip cores of modern Chip Multi-Processors (CMPs) is growing fast with technology scaling. However, it remains a big challenge to efficiently support cache coherence for large scale CMPs. The conventional snoopy and directory coherence protocols cannot be smoothly scaled to many-core or thousand-core processors. Snoopy protocols introduce...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    MemTracker: An Accelerator for Memory Debugging and Monitoring

    Memory bugs are a broad class of bugs that is becoming increasingly common with increasing software complexity, and many of these bugs are also security vulnerabilities. Existing software and hardware approaches for finding and identifying memory bugs have a number of drawbacks including considerable performance overheads, target only a specific...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2012

    Low-Complexity Scheduling for Wireless Networks

    Designing efficient scheduling and power control algorithms for distributed wireless communication has been a challenging issue, especially in the physical interference model based on SINR constraints. In this paper, the authors discuss the first local distributed scheduling and power control algorithm in the SINR-model that achieves an O(g(L)) approximation factor...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2011

    Video Streaming Using a Location-Based Bandwidth-Lookup Service for Bitrate Planning

    In this paper, the authors describe a video streaming system for receivers equipped with a GPS. A receiver's download rate is constantly monitored, and periodically reported back to a central database along with associated GPS positional data. Thus, based on the current location, a streaming device can use a GPS-based...

    Provided By Association for Computing Machinery