Association for Computing Machinery

Displaying 1-40 of 6815 results

  • White Papers // Jan 2015

    Compiler Management of Communication and Parallelism for Quantum Computation

    Quantum Computing (QC) offers huge promise to accelerate a range of computationally intensive benchmarks. Quantum computing is limited, however, by the challenges of decoherence: i.e., a quantum state can only be maintained for short windows of time before it decoheres. While quantum error correction codes can protect against decoherence, fast...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    CQIC: Revisiting Cross-Layer Congestion Control for Cellular Networks

    With the advent of high-speed cellular access and the overwhelming popularity of Smartphone's, a large percent of today's Internet content is being delivered via cellular links. Due to the nature of long-range wireless signal propagation, the capacity of the last hop cellular link can vary by orders of magnitude within...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Uncovering Network Tarpits with Degreaser

    Network tarpits, whereby a single host or appliance can masquerade as many fake hosts on a network and slow network scanners, are a form of defensive cyber-deception. In this paper, the authors develop degreaser, an efficient fingerprinting tool to remotely detect tarpits. In addition to validating their tool in a...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Patterns in the Chaos - A Study of Performance Variation and Predictability in Public IaaS Clouds

    Benchmarking the performance of public cloud providers is a common research topic. Previous paper has already extensively evaluated the performance of different cloud platforms for different use cases, and under different constraints and experiment setups. In this paper, the authors present a principled, large-scale literature review to collect and codify...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed

    Central to the secure operation of a Public Key Infrastructure (PKI) is the ability to revoke certificates. While much of users' security rests on this process taking place quickly, in practice, revocation typically requires a human to decide to reissue a new certificate and revoke the old one. Thus, having...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Characterizing Large-Scale Click Fraud in ZeroAccess

    Click fraud is a scam that hits a criminal sweet spot by both tapping into the vast wealth of online advertising and exploiting that ecosystem's complex structure to obfuscate the flow of money to its perpetrators. In this paper, the authors illuminate the intricate nature of this activity through the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    On The Security of Mobile Cockpit Information Systems

    Recent trends in aviation have led many general aviation pilots to adopt the use of iPads (or other tablets) in the cockpit. While initially used to display static charts and documents, uses have expanded to include live data such as weather and traffic information that is used to make flight...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild

    Online accounts are inherently valuable resources - both for the data they contain and the reputation they accrue over time. Unsurprisingly, this value drives criminals to steal, or hijack, such accounts. In this paper, the authors focus on manual account hijacking - account hijacking performed manually by humans instead of...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Search + Seizure: The Effectiveness of Interventions on SEO Campaigns

    Black hat Search Engine Optimization (SEO), the practice of abusively manipulating search results, is an enticing method to acquire targeted user traffic. In turn, a range of interventions - from modifying search results to seizing domains - are used to combat this activity. In this paper, the authors examine the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Challenges in Inferring Internet Interdomain Congestion

    The authors introduce and demonstrate the utility of a method to localize and quantify inter-domain congestion in the Inter-net. Their Time Sequence Latency Probes (TSLP) method depends on two facts: internet traffic patterns are typically diurnal, and queues increase packet delay through a router during periods of adjacent link congestion....

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    PixelVault: Using GPUs for Securing Cryptographic Operations

    Protecting the confidentiality of cryptographic keys in the event of partial or full system compromise is crucial for containing the impact of attacks. The Heartbleed vulnerability of April 2014, which allowed the remote leakage of secret keys from HTTPS web servers, is an indicative example. In this paper, the authors...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication

    In an effort to hinder attackers from compromising user accounts, Facebook launched a form of two-factor authentication called Social Authentication (SA), where users are required to identify photos of their friends to complete a log-in attempt. Recent research, however, demonstrated that attackers can bypass the mechanism by employing face recognition...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    SoftMoW: Recursive and Reconfigurable Cellular WAN Architecture

    The current LTE network architecture is organized into very large regions, each having a core network and a radio access network. The core network contains an Internet edge comprised of Packet data network GateWays (PGWs). The radio network consists of only base stations. There are minimal interactions among regions other...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    PRAN: Programmable Radio Access Networks

    With the continued exponential growth of mobile traffic and the rise of diverse applications, the current LTE Radio Access Network (RAN) architecture of cellular operators faces mounting challenges. Current RAN suffers from insufficient radio resource coordination, inefficient infrastructure utilization, and inflexible data paths. The authors present the high level design...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Sweet Little Lies: Fake Topologies for Flexible Routing

    Link-state routing protocols (e.g., OSPF and IS-IS) are widely used because they are scalable, robust, and based on simple abstractions. Unfortunately, these protocols are also relatively inflexible, since they direct all traffic over shortest paths. In contrast, Software Defined Networking (SDN) offers fine-grained control over routing, at the expense of...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Tango: Simplifying SDN Control with Automatic Switch Property Inference, Abstraction, and Optimization

    A major benefit of Software-Defined Networking (SDN) over traditional networking is simpler and easier control of network devices. The diversity of SDN switch implementation properties, which include both diverse switch hardware capabilities and diverse control-plane software behaviors, however, can make it difficult to understand and/or to control the switches in...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Blender: Upgrading Tenant-based Data Center Networking

    In this paper, the authors present Blender, a framework that enables network operators to improve tenant performance by tailoring the network's behavior to tenant needs. Tenants may upgrade their provisioned portion of the network with specific features, such as multi-path routing, isolation, and failure recovery, without modifying hosted application code....

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    System-Level Memory Optimization for High-Level Synthesis of Component-Based SoCs

    The design of specialized accelerators is essential to the success of many modern systems-on-chip. Electronic system-level design methodologies and high-level synthesis tools are critical for the efficient design and optimization of an accelerator. Still, these methodologies and tools offer only limited support for the optimization of the memory structures, which...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Beyond CPM and CPC: Determining the Value of Users on OSNs

    Not all of the over one billion users of Online Social Networks (OSNs) are equally valuable to the OSNs. The current business model of monetizing advertisements targeted to users does not appear to be based on any visible grouping of the users. The primary metrics remain CPM (Cost Per Mille...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Measurement and Analysis of OSN Ad Auctions

    Advertising is ubiquitous on the web; numerous ad networks serve billions of ads daily via keyword or search term auctions. Recently, Online Social Networks (OSNs) such as Facebook have created site-specific ad services that differ from traditional ad networks by letting advertisers bid on users rather than keywords. With Facebook's...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks

    Intrusion detection, traffic classification, and other network monitoring applications need to analyze the captured traffic beyond the network layer to allow for connection-oriented analysis, and achieve resilience to evasion attempts based on TCP segmentation. Existing network traffic capture frameworks, however, provide applications with raw packets and leave complex operations like...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Security and QoS Tradeoff Recommendation System (SQT-RS) for Dynamic Assessing CPRM-based Systems

    Context-based Parametric Relationship Models (CPRM) defines complex dependencies between different types of parameters. In particular, security and QoS relationships that may occur at different levels of abstraction are easily identified using CPRM. However, the growing number of parameters and relationships, typically due to the heterogeneous scenarios of future networks, increase...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    On the Role of Routing in Named Data Networking

    A unique feature of Named Data Networking (NDN) is that its forwarding plane can detect and recover from network faults on its own, enabling each NDN router to handle network failures locally without relying on global routing convergence. This new feature prompts the authors to re-examine the role of routing...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Consumer-Producer API for Named Data Networking

    As a new architecture, NDN requires a new API. Today's socket API cannot be reused for NDN communication because its foundational concept is point-to-point virtual channel that does not exist in NDN. This paper presents a new network programming interface to NDN communication protocols and architectural modules. This new API...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    VIP: A Framework for Joint Dynamic Forwarding and Caching in Named Data Networks

    Emerging information-centric networking architectures seek to optimally utilize both bandwidth and storage for efficient content distribution. This highlights the need for joint design of traffic engineering and caching strategies, in order to optimize network performance in view of both current traffic loads and future traffic demands. The authors present a...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Kite: A Mobility Support Scheme for NDN

    Named Data Networking (NDN) natively supports the mobility of data consumers through its data-centric design and stateful forwarding plane. However, the mobility support for data producers remains open in the original proposal. In this paper, the authors introduce Kite, a design of mobility support for NDN. Kite leverages the state...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Poster - iSync: A High Performance and Scalable Data Synchronization Protocol for Named Data Networking

    In this paper, the authors present a high performance synchronization protocol for Named Data Networking (NDN). The protocol, called iSync, uses a two-level Invertible Bloom Filter (IBF) structure to support efficient data reconciliation. Multiple differences can be found by subtracting a remote IBF from a local IBF, and therefore, from...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Automatic Verification of Interactions in Asynchronous Systems with Unbounded Buffers

    Asynchronous communication requires message queues to store the messages that are yet to be consumed. Verification of interactions in asynchronously communicating systems is challenging since the sizes of these queues can grow arbitrarily large during execution. In fact, behavioral models for asynchronously communicating systems typically have in finite state spaces,...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Combating Inter-cell Interference in 802.11ac-based Multi-user MIMO Networks

    In an 802.11ac-based MU-MIMO network comprised of multiple cells, inter-cell interference allows only a single AP to serve its clients at the same time, significantly limiting the network capacity. In this paper, the authors overcome this limitation by letting the APs and clients in interfering cells coordinately cancel the inter-cell...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Rethink Energy Accounting with Cooperative Game Theory

    Energy accounting determines how much a software principal contributes to the total system energy consumption. It is the foundation for evaluating software and for operating system based energy management. While various energy accounting policies have been tried, there is no known way to evaluate them directly simply because it is...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Proximity-Based Wireless Access Control through Considerate Jamming

    As diverse types of wireless devices emerge, it becomes difficult to apply the existing wireless security measures to them without efforts. Those devices lack conventional user interfaces or they are resource-constrained to process the security protocols. Meanwhile, many of them are used within a geographical boundary to access to the...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Enfold: Downclocking OFDM in WiFi

    Dynamic Voltage and Frequency Scaling (DVFS) has long been used as a technique to save power in a variety of computing domains but typically not in communications devices. A fundamental limit that prevents decreasing the clock frequency is the Nyquist (-Shannon) sampling theorem, which states that the sampling rate must...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Cutting the Cord: a Robust Wireless Facilities Network for Data Centers

    Today's network control and management traffic are limited by their reliance on existing data networks. Fate sharing in this paper, is highly undesirable, since control traffic has very different availability and traffic delivery requirements. In this paper, the authors explore the feasibility of building a dedicated wireless facilities network for...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Overheard ACK with Token Passing: An Optimization to 802.11 MAC Protocol

    Distributed Coordination Function (DCF) is defined in IEEE 802.11 standard, which is widely used in practice. Despite of its wide use, it has several limitations. Because of the idle and collision times, it suffers from poor channel utilization. Besides, the control packets, particularly, ACKnowledgement (ACK), consume non-trivial amount of bandwidth....

    Provided By Association for Computing Machinery

  • White Papers // Aug 2014

    Knock It Off: Profiling the Online Storefronts of Counterfeit Merchandise

    The authors describe an automated system for the large-scale monitoring of Web sites that serve as online storefronts for spam-advertised goods. Their system is developed from an extensive crawl of black-market Web sites that deal in illegal pharmaceuticals, replica luxury goods, and counterfeit software. The operational goal of the system...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2014

    OpenNF: Enabling Innovation in Network Function Control

    Network Functions Virtualization (NFV) together with Software Defined Networking (SDN) has the potential to help operators satisfy tight service level agreements, accurately monitor and manipulate network traffic, and minimize operating expenses. However, in scenarios that require packet processing to be redistributed across a collection of Network Function (NF) instances, simultaneously...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2014

    Pratyaastha: An Efficient Elastic Distributed SDN Control Plane

    Several distributed SDN controller architectures have been proposed to mitigate the risks of overload and failure. However, since they statically assign switches to controller instances and store state in distributed data stores (which doubles flow setup latency), they hinder operators' ability to minimize both flow setup latency and controller resource...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2014

    Dynamic Scheduling of Network Updates

    The authors present Dionysus, a system for fast, consistent network updates in software-defined networks. Dionysus encodes as a graph the consistency-related dependencies among updates at individual switches, and it then dynamically schedules these updates based on runtime differences in the update speeds of different switches. This dynamic scheduling is the...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2014

    LTE Radio Analytics Made Easy and Accessible

    Despite the rapid growth of next-generation cellular networks, researchers and end-users today have limited visibility into the performance and problems of these networks. As LTE deployments move towards femto and pico cells, even operators struggle to fully understand the propagation and interference patterns affecting their service, particularly indoors. This paper...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2014

    Compiling Minimum Incremental Update for Modular SDN Languages

    Measurement results show that updating rules on switches poses major latency overhead during the course of the policy update. However, current SDN policy compilers do not handle policy updates well and generate large amount of redundant rule updates, most of which modify only the priority field. The authors' analysis shows...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2013

    A First Look at IPv4 Transfer Markets

    "The Internet Assigned Numbers Authority (IANA) exhausted its free pool of IPv4 addresses and the Regional Internet Registries (RIRs) have started to run out of IPv4 addresses as well. As RIRs have started rationing allocations

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Speedtrap: Internet-Scale IPv6 Alias Resolution

    "Impediments to resolving IPv6 router aliases have precluded understanding the emerging router-level IPv6 Internet topology. In this paper

    Provided By Association for Computing Machinery

  • White Papers // Apr 2006

    Handling Inverted Temperature Dependence in Static Timing Analysis

    In digital circuit design, it is typically assumed that cell delay increases with decreasing voltage and increasing temperature. This assumption is the basis of the cornering approach with cell libraries in Static Timing Analysis (STA). However, this assumption breaks down at low supply voltages because cell delay can decrease with...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2006

    Automatic Run-Time Extraction of Communication Graphs From Multithreaded Applications

    Embedded system synthesis, multiprocessor synthesis, and thread assignment policy design all require detailed knowledge of the runtime communication patterns among different threads or processes. Researchers have commonly relied on manual estimation, compile-time analysis, or synthetic benchmarks when developing and evaluating synthesis algorithms and thread assignment policies. In a more ideal...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    NoC Topology Synthesis for Supporting Shutdown of Voltage Islands in SoCs

    In many System-on-Chips (SoCs), the cores are clustered in to voltage islands. When cores in an island are unused, the entire island can be shutdown to reduce the leakage power consumption. However, today, the interconnect architecture is a bottleneck in allowing the shutdown of the islands. In this paper, the...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2006

    High-Performance Operating System Controlled Memory Compression

    In this paper, the authors describe a new software-based on-line memory compression algorithm for embedded systems and present a method of adaptively managing the uncompressed and compressed memory regions during application execution. The primary goal of this work is to save memory in disk-less embedded systems, resulting in greater functionality,...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    State Space Abstraction for Parameterized Self-Stabilizing Embedded Systems

    Self-stabilizing systems are systems that automatically recover from any transient fault. Proving the correctness of a parameterized self-stabilizing system, i.e., a system composed of an arbitrary number of processes, is a challenging task. For the verification of parameterized systems the method of control abstraction has been developed. However, control abstraction...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2007

    Towards An Ultra-Low-Power Architecture Using Single-Electron Tunneling Transistors

    Minimizing power consumption is vitally important in embedded system design; power consumption determines battery lifespan. Ultralow-power designs may even permit embedded systems to operate without batteries, e.g., by scavenging energy from the environment. Moreover, managing power dissipation is now a key factor in integrated circuit packaging and cooling. As a...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2006

    HybDTM: A Coordinated Hardware-Software Approach for Dynamic Thermal Management

    With ever-increasing power density and cooling costs in modern high-performance systems, Dynamic Thermal Management (DTM) has emerged as an effective technique for guaranteeing thermal safety at run-time. While past works on DTM have focused on different techniques in isolation, they fail to consider a synergistic mechanism using both hardware and...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2008

    Full-System Chip Multiprocessor Power Evaluations Using FPGA-Based Emulation

    The design process for Chip Multi-Processors (CMPs) requires extremely long simulation times to explore performance, power, and thermal issues, particularly when Operating System (OS) effects are included. In response, the authors' novel FPGA-based emulation methodology models a full CMP design including applications and an OS. Activity counters programmed into the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    VirtuOS: An Operating System With Kernel Virtualization

    Most operating systems provide protection and isolation to user processes, but not to critical system components such as device drivers or other system code. Consequently, failures in these components often lead to system failures. VirtuOS is an operating system that exploits a new method of decomposition to protect against such...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Buffer Minimization in Earliest-Deadline First Scheduling of Dataflow Graphs

    Dataflow models of computation are commonly used in embedded system design to describe stream processing or control applications. Their simplicity allows waiving part of the difficult and error-prone tasks of programming real-time schedules for computations and communications from the engineering process by implementing automated code generation techniques. Symbolic schedulability analysis...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2014

    Sapper: A Language for Hardware-Level Security Policy Enforcement

    Privacy and integrity are important security concerns. These concerns are addressed by controlling information flow, i.e., restricting how information can flow through a system. Most proposed systems that restrict information flow make the implicit assumption that the hardware used by the system is fully \"Correct\" and that the hardware's instruction...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2011

    Information Flow Isolation in I2C and USB

    Flight control, banking, medical, and other high assurance systems have a strict requirement on correct operation. Fundamental to this is the enforcement of non-interference where particular subsystems should not affect one another. In an effort to help guarantee this policy, recent work has emerged with tracking information flows at the...

    Provided By Association for Computing Machinery

  • White Papers // May 2011

    Inferring Packet Dependencies to Improve Trace Based Simulation of On-Chip Networks

    With the advent of large scale chip-level multiprocessors, there is a growing interest in the design and analysis of on-chip networks. The use of full system simulation is the most accurate way to perform such an analysis, but unfortunately it is very slow and thus limits design space exploration. In...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2011

    Preventing PCM Banks From Seizing Too Much Power

    Widespread adoption of Phase Change Memory (PCM) requires solutions to several problems recently addressed in the literature, including limited endurance, increased write latencies, and system-level changes required to exploit non-volatility. One important difference between PCM and DRAM that has received less attention is the increased need for write power management....

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    netShip: A Networked Virtual Platform for Large-Scale Heterogeneous Distributed Embedded Systems

    From a single SoC to a network of embedded devices communicating with a backend cloud-computing server, emerging classes of embedded systems feature an increasing number of heterogeneous components that operate concurrently in a distributed environment. As the scale and complexity of these systems continues to grow, there is a critical...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Modeling and Implementation of Energy Neutral Sensing Systems

    Energy Neutral Sensing Systems (ENSSys) achieve long-time operation by combining energy-harvesting hardware with software that regulates energy saving and spending. However, simply managing the energy resources is not the goal in itself. The authors present the modeling, implementation, and evaluation of a single wireless sensor network that executes energy-harvesting algorithms...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2014

    Locality-Oblivious Cache Organization Leveraging Single-Cycle Multi-Hop NoCs

    Locality has always been a critical factor in on-chip data placement on Chip Multi-Processors (CMPs) as accessing further-away caches has in the past been more costly than accessing nearby ones. Substantial research on locality-aware designs have thus focused on keeping a copy of the data private. However, this complicates the...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2011

    Towards the Ideal On-Chip Fabric for 1-to-Many and Many-to-1 Communication

    The prevalence of multicore architectures has accentuated the need for scalable cache coherence solutions. Many of the proposed designs use a mix of 1-to-1, 1-to-Many (1-to-M), and Many-to-1 (M-to-1) communication to maintain data coherence and consistency. The on-chip network is the communication backbone that needs to handle all these flows...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2012

    Approaching the Theoretical Limits of a Mesh NoC with a 16-Node Chip Prototype in 45nm SOI

    In this paper, the authors present a case study of their chip prototype of a 16-node 4x4 mesh NoC fabricated in 45nm SOI CMOS that aims to simultaneously optimize energy-latency-throughput for unicasts, multicasts and broadcasts. They first define and analyze the theoretical limits of a mesh NoC in latency, throughput...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2013

    SurfNoC: A Low Latency and Provably Non-Interfering Approach to Secure Networks-On-Chip

    As multicore processors find increasing adoption in domains such as aerospace and medical devices where failures have the potential to be catastrophic, strong performance isolation and security become first-class design constraints. When cores are used to run separate pieces of the system, strong time and space partitioning can help provide...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2007

    Improving File System Reliability with I/O Shepherding

    The authors introduce a new reliability infrastructure for file systems called I/O shepherding. I/O shepherding allows a file system developer to craft nuanced reliability policies to detect and recover from a wide range of storage system failures. They incorporate shepherding into the Linux ext3 file system through a set of...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2006

    Geiger: Monitoring the Buffer Cache in a Virtual Machine Environment

    Virtualization is increasingly being used to address server management and administration issues like flexible resource allocation, service isolation and workload migration. In a virtualized environment, the Virtual Machine Monitor (VMM) is the primary resource manager and is an attractive target for implementing system features like scheduling, caching, and monitoring. However,...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2008

    VMM-based Hidden Process Detection and Identification Using Lycosid

    Use of stealth rootkit techniques to hide long-lived malicious processes is a current and alarming security issue. In this paper, the authors describe, implement, and evaluate a novel VMM-based hidden process detection and identification service called Lycosid that is based on the cross-view validation principle. Like previous VMM- based security...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2007

    The Effects of Metadata Corruption on NFS

    Distributed file systems need to be robust in the face of failures. In this paper, the authors study the failure handling and recovery mechanisms of a widely used distributed file system, Linux NFS. They study the behavior of NFS under corruption of important metadata through fault injection. They find that...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Aerie: Flexible File-System Interfaces to Storage-Class Memory

    Storage-class memory technologies such as phase-change memory and memristors present a radically different interface to storage than existing block devices. As a result, they provide a unique opportunity to re-examine storage architectures. The authors find that the existing kernel-based stack of components, well suited for disks, unnecessarily limits the design...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2013

    Fine-Grained Fault Tolerance using Device Checkpoints

    Recovering faults in drivers is difficult compared to other code because their state is spread across both memory and a device. Existing driver fault-tolerance mechanisms either restart the driver and discard its state, which can break applications, or require an extensive logging mechanism to replay requests and recreate driver state....

    Provided By Association for Computing Machinery

  • White Papers // Mar 2013

    Predictability for Timing and Temperature in Multiprocessor System-on-Chip Platforms

    High computational performance in Multi-Processor System-on-Chips (MPSoCs) is constrained by the ever increasing power densities in integrated circuits, so that nowadays MPSoCs face various thermal issues. For instance, high chip temperatures may lead to long-term reliability concerns and short-term functional errors. Therefore, the new challenge in designing embedded real-time MPSoCs...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2011

    Thermal-Aware System Analysis and Software Synthesis for Embedded Multi-Processors

    Now-a-days, the reliability and performance of modern embedded multiprocessor systems is threaten by the ever-increasing power densities in integrated circuits, and a new additional goal of software synthesis is to reduce the peak temperature of the system. However, in order to perform thermal-aware mapping optimization, the timing and thermal characteristics...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2012

    PRO3D - Programming for Future 3D Manycore Architectures

    The shift to parallel architectures is not at all the consequence of a scientific breakthrough. It is a consequence of hitting technology walls that prevented from pushing forward the efficient implementation of traditional uniprocessor designs. PRO3D tackles two 3D technologies and their consequences on stacked architectures and software stack: Through...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2012

    Embedding Formal Performance Analysis into the Design Cycle of MPSoCs for Real-Time Streaming Applications

    Modern real-time streaming applications are increasingly implemented on Multi-Processor System-on-Chip (MPSoC). The implementation, as well as the verification of real-time applications executing on MPSoCs, are difficult tasks, however. A major challenge is the performance analysis of MPSoCs, which is required for early design space exploration and final system verification. Simulation-based...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Optimizing Read Convoys in Main-Memory Query Processing

    Concurrent read-only scans of memory-resident fact tables can form convoys, which generally help performance because cache misses are amortized over several members of the convoy. Nevertheless, the authors identify two performance hazards for such convoys. One hazard is underutilization of the memory bandwidth because all members of the convoy hit...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Cache-Conscious Buffering for Database Operators with State

    Database processes must be cache-efficient to effectively utilize modern hardware. In this paper, the authors analyze the importance of temporal locality and the resultant cache behavior in scheduling database operators for in-memory, block oriented query processing. They demonstrate how the overall performance of a workload of multiple database operators is...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2006

    Realizing Parallelism in Database Operations: Insights from a Massively Multithreaded Architecture

    A new trend in processor design is increased on-chip support for multithreading in the form of both chip multiprocessors and simultaneous multithreading. Recent research in database systems has begun to explore increased thread-level parallelism made possible by these new multicore and multithreaded processors. The question of how best to use...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2008

    Fast Scans and Joins using Flash Drives

    As access times to main memory and disks continue to diverge, faster non-volatile storage technologies become more attractive for speeding up data analysis applications. NAND flash is one such promising substitute for disks. Flash offers faster random reads than disk, consumes less power than disk, and is cheaper than DRAM....

    Provided By Association for Computing Machinery

  • White Papers // Jun 2008

    Modeling the Performance of Algorithms on Flash Memory Devices

    NAND flash memory is fast becoming popular as a component of large scale storage devices. For workloads requiring many random I/Os, flash devices can provide two orders of magnitude increased performance relative to magnetic disks. Flash memory has some unusual characteristics. In particular, general updates require a page write, while...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2008

    CAM Conscious Integrated Answering of Frequent Elements and Top-k Queries over Data Streams

    Frequent elements and top-k queries constitute an important class of queries for data stream analysis applications. Certain applications require answers for both frequent elements and top-k queries on the same stream. In addition, the ever increasing data rates call for pro-viding fast answers to the queries, and researchers have been...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Avoiding Version Redundancy for High Performance Reads in Temporal DataBases

    A major performance bottleneck for database systems is the memory hierarchy. The performance of the memory hierarchy is directly related to how the content of disk pages maps to the L2 cache lines, i.e. to the organization of data within a disk page, called the page layout. The prevalent page...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Join Processing for Flash SSDs: Remembering Past Lessons

    Flash Solid State Drives (SSDs) provide an attractive alternative to traditional magnetic Hard Disk Drives (HDDs) for DBMS applications. Naturally there is substantial interest in redesigning critical database internals, such as join algorithms, for flash SSDs. However, the authors must carefully consider the lessons that they have learnt from over...

    Provided By Association for Computing Machinery