Association for Computing Machinery

Displaying 1-40 of 6438 results

  • White Papers // Jun 2015

    Redundant Memory Mappings for Fast Access to Large Memories

    Page-based virtual memory improves programmer productivity, security and memory utilization, but incurs performance overheads due to costly page table walks after TLB (Translation Lookaside Buffer) misses. This overhead can reach 50% for modern workloads that access increasingly vast memory with stagnating TLB sizes. To reduce the overhead of virtual memory,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2015

    Computer Performance Microscopy with SHIM

    Developers and architects spend a lot of time trying to understand and eliminate performance problems. Unfortunately, the root causes of many problems occur at a fine granularity that existing continuous profiling and direct measurement approaches cannot observe. This paper presents the design and implementation of SHIM, a continuous profiler that...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2015

    Verification of Producer-Consumer Synchronization in GPU Programs

    Previous efforts to formally verify code written for GPUs have focused solely on kernels written within the traditional data-parallel GPU programming model. No previous paper has considered the higher performance, but more complex, warp-specialized kernels based on producer-consumer named barriers available on current hardware. In this paper, the authors present...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2015

    Tier-Partitioning for Power Delivery Vs Cooling Tradeoff in 3D VLSI for Mobile Applications

    Power delivery to the tier farthest away from the package in 3D VLSI is challenging. This is because the current provided by the package on the bottom is first used by other tiers before it reaches the top and delivered using extremely small-size intra and inter-tier vias. The authors' solution...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2015

    Design, Packaging, and Architectural Policy Co-Optimization for DC Power Integrity in 3D DRAM

    3D DRAM is the next-generation memory system targeting high bandwidth, low power and small form factor. This paper presents a cross-domain CAD/architectural platform that address DC power noise issues in 3D DRAM targeting stacked DDR3, wide I/O and hybrid memory cube technologies. The authors' design and analysis include both individual...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2015

    Area-Efficient Pipelining for FPGA-Targeted High-Level Synthesis

    Traditional techniques for pipeline scheduling in high-level synthesis for FPGAs assume an additive delay model where each operation incurs a pre-characterized delay. While a good approximation for some operation types, this fails to consider technology mapping, where a group of logic operations can be mapped to a single Look-Up Table...

    Provided By Association for Computing Machinery

  • White Papers // May 2015

    Predicting Program Phases and Defending Against Side-Channel Attacks using Hardware Performance Counters

    Sharing of functional units inside a processor by two applications can lead to information leaks and micro architectural side-channel attacks. Meanwhile, processors now commonly come with hardware performance counters which can count a variety of micro-architectural events, ranging from cache behavior to floating point unit usage. In this paper, the...

    Provided By Association for Computing Machinery

  • White Papers // May 2015

    Analysis of Smartphone Adoption and Usage in a Rural Community Cellular Network

    The smartphone has been touted as the technology of the 21st century. Global smartphone adoption rates are growing rapidly, up to over 24% in 2014, with usage increasing 25% in the last year. However, rural areas are often the last places to benefit from these technological trends. Utilizing cellular network...

    Provided By Association for Computing Machinery

  • White Papers // May 2015

    On the Feasibility of Attribute-Based Encryption on Smartphone Devices

    Attribute-Based Encryption (ABE) is a powerful crypto-graphic tool that allows fine-grained access control over data. Due to its features, ABE has been adopted in several applications, such as encrypted storage or access control systems. Recently, researchers argued about the non-acceptable performance of ABE when implemented on mobile devices. In-deed, the...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2015

    Fast Serializable Multi-Version Concurrency Control for Main-Memory Database Systems

    Multi-Version Concurrency Control (MVCC) is a widely employed concurrency control mechanism, as it allows for execution modes where readers never block writers. However, most systems implement only Snapshot Isolation (SI) instead of full serializability. Adding serializability guarantees to existing SI implementations tends to be prohibitively expensive. The authors present a...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2015

    Sirius: An Open End-to-End Voice and Vision Personal Assistant and Its Implications for Future Warehouse Scale Computers

    As user demand scales for Intelligent Personal Assistants (IPAs) such as Apple's Siri, Google's google now, and Microsoft's Cortana, the authors are approaching the computational limits of current datacenter architectures. It is an open question how future server architectures should evolve to enable this emerging class of applications, and the...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2015

    A Comprehensive Implementation and Evaluation of Direct Interrupt Delivery

    As the performance overhead associated with CPU (Central Processing Unit) and memory virtualization becomes largely negligible, research efforts are directed toward reducing the I/O (Input/Output) virtualization overhead, which mainly comes from two sources: DMA (Direct Memory Access) setup and payload copy, and interrupt delivery. The advent of SRIOV (Single-Root I/O...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2015

    Mapping-Aware Constrained Scheduling for LUT-Based FPGAs

    Scheduling plays a central role in high-level synthesis as it inserts clock boundaries into the untimed behavioral model and greatly impacts the performance, power and area of the synthesized circuits. While current scheduling techniques can make use of pre-characterized delay values of individual operations, it is difficult to obtain accurate...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2015

    Enhancing Design Space Exploration by Extending CPU/GPU Specifications onto FPGAs

    The design cycle for complex special-purpose computing systems is extremely costly and time-consuming. It involves a multi-parametric design space exploration for optimization, followed by design verification. Designers of special purpose VLSI (Very-Large-Scale Integration) implementations often need to explore parameters, such as optimal bit width and data representation, through time-consuming Monte...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2015

    Libra: Software-Controlled Cell Bit-Density to Balance Wear in NAND Flash

    Hybrid flash storages combine a small Single-Level Cell (SLC) partition with a large MultiLevel Cell (MLC) partition. Compared to MLC-only solutions, the SLC partition exploits fast and short local write updates, while the MLC part brings large capacity. On the whole, hybrid storage achieves a tangible performance improvement for a...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    Compiler Management of Communication and Parallelism for Quantum Computation

    Quantum Computing (QC) offers huge promise to accelerate a range of computationally intensive benchmarks. Quantum computing is limited, however, by the challenges of decoherence: i.e., a quantum state can only be maintained for short windows of time before it decoheres. While quantum error correction codes can protect against decoherence, fast...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    A Symbolic Execution Algorithm for Constraint-Based Testing of Database Programs

    In so-called constraint-based testing, symbolic execution is a common technique used as a part of the process to generate test data for imperative programs. Databases are ubiquitous in software and testing of programs manipulating databases is thus essential to enhance the reliability of software. In this paper, the authors propose...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    CQIC: Revisiting Cross-Layer Congestion Control for Cellular Networks

    With the advent of high-speed cellular access and the overwhelming popularity of Smartphone's, a large percent of today's Internet content is being delivered via cellular links. Due to the nature of long-range wireless signal propagation, the capacity of the last hop cellular link can vary by orders of magnitude within...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    Utility of the OpenAccess Database in Academic Research

    Twenty years ago, there was a common design tool which was free and open-source and satisfied the needs of many academic circuit designers. The proliferation of OpenAccess is opening promising new research opportunities to academic communities. The benefits of adopting an OpenAccess based approach to EDA research are growing, and...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    GRAPHITE: An Extensible Graph Traversal Framework for Relational Database Management Systems

    Graph traversals are a basic but fundamental ingredient for a variety of graph algorithms and graph-oriented queries. To achieve the best possible query performance, they need to be implemented at the core of a database management system that aims at storing, manipulating, and querying graph data. Increasingly, modern business applications...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Uncovering Network Tarpits with Degreaser

    Network tarpits, whereby a single host or appliance can masquerade as many fake hosts on a network and slow network scanners, are a form of defensive cyber-deception. In this paper, the authors develop degreaser, an efficient fingerprinting tool to remotely detect tarpits. In addition to validating their tool in a...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Hot-Hardening: Getting More Out of Your Security Settings

    Applying optimized security settings to applications is a difficult and laborious task. Especially in cloud computing, where virtual servers with various pre-installed software packages are leased, selecting optimized security settings is very difficult. In particular, optimized security settings are not identical in every setup. They depend on characteristics of the...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Exploring Big Data with Helix: Finding Needles in a Big Haystack

    While much work has focused on efficient processing of big data, little work considers how to understand them. In this paper, the authors describe Helix, a system for guided exploration of big data. Helix provides a unified view of sources, ranging from spreadsheets and XML files with no schema, all...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Towards Hardware-Driven Design of Low-Energy Algorithms for Data Analysis

    In the era of "Big" data, data analysis algorithms need to be efficient. Traditionally researchers would tackle this problem by considering "Small" data algorithms and investigating how to make them computationally more efficient for big data applications. The main means to achieve computational efficiency would be to revise the necessity...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Foundations of Crowd Data Sourcing

    Crowdsourcing techniques are very powerful when harnessed for the purpose of collecting and managing data. In order to provide sound scientific foundations for crowdsourcing and support the development of efficient crowdsourcing processes, adequate formal models must be defined. In particular, the models must formalize unique characteristics of crowd-based settings, such...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Design-Theoretic Encoding of Deterministic Hypotheses as Constraints and Correlations Into U-Relational Databases

    In view of the paradigm shift that makes science ever more data-driven, in this paper the authors consider deterministic scientific hypotheses as uncertain data. In the form of mathematical equations, hypotheses symmetrically relate aspects of the studied phenomena. For computing predictions, however, deterministic hypotheses are used asymmetrically as functions. They...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Patterns in the Chaos - A Study of Performance Variation and Predictability in Public IaaS Clouds

    Benchmarking the performance of public cloud providers is a common research topic. Previous paper has already extensively evaluated the performance of different cloud platforms for different use cases, and under different constraints and experiment setups. In this paper, the authors present a principled, large-scale literature review to collect and codify...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Characterizing Large-Scale Click Fraud in ZeroAccess

    Click fraud is a scam that hits a criminal sweet spot by both tapping into the vast wealth of online advertising and exploiting that ecosystem's complex structure to obfuscate the flow of money to its perpetrators. In this paper, the authors illuminate the intricate nature of this activity through the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    On The Security of Mobile Cockpit Information Systems

    Recent trends in aviation have led many general aviation pilots to adopt the use of iPads (or other tablets) in the cockpit. While initially used to display static charts and documents, uses have expanded to include live data such as weather and traffic information that is used to make flight...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild

    Online accounts are inherently valuable resources - both for the data they contain and the reputation they accrue over time. Unsurprisingly, this value drives criminals to steal, or hijack, such accounts. In this paper, the authors focus on manual account hijacking - account hijacking performed manually by humans instead of...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Search + Seizure: The Effectiveness of Interventions on SEO Campaigns

    Black hat Search Engine Optimization (SEO), the practice of abusively manipulating search results, is an enticing method to acquire targeted user traffic. In turn, a range of interventions - from modifying search results to seizing domains - are used to combat this activity. In this paper, the authors examine the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Challenges in Inferring Internet Interdomain Congestion

    The authors introduce and demonstrate the utility of a method to localize and quantify inter-domain congestion in the Inter-net. Their Time Sequence Latency Probes (TSLP) method depends on two facts: internet traffic patterns are typically diurnal, and queues increase packet delay through a router during periods of adjacent link congestion....

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Computing Multi-Relational Sufficient Statistics for Large Databases

    Databases contain information about which relationships do and do not hold among entities. To make this information accessible for statistical analysis requires computing sufficient statistics that combine information from different database tables. Such statistics may involve any number of positive and negative relationships. With a naive enumeration approach, computing sufficient...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed

    Central to the secure operation of a Public Key Infrastructure (PKI) is the ability to revoke certificates. While much of users' security rests on this process taking place quickly, in practice, revocation typically requires a human to decide to reissue a new certificate and revoke the old one. Thus, having...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    PixelVault: Using GPUs for Securing Cryptographic Operations

    Protecting the confidentiality of cryptographic keys in the event of partial or full system compromise is crucial for containing the impact of attacks. The Heartbleed vulnerability of April 2014, which allowed the remote leakage of secret keys from HTTPS web servers, is an indicative example. In this paper, the authors...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication

    In an effort to hinder attackers from compromising user accounts, Facebook launched a form of two-factor authentication called Social Authentication (SA), where users are required to identify photos of their friends to complete a log-in attempt. Recent research, however, demonstrated that attackers can bypass the mechanism by employing face recognition...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Taking Authenticated Range Queries to Arbitrary Dimensions

    In this paper, the authors study the problem of authenticated multi-dimensional range queries over outsourced databases, where an owner outsources its database to an untrusted server, which maintains it and answers queries to clients. Previous schemes either scale exponentially in the number of query dimensions, or rely on heuristic data...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Data Driven Investigation of Faults in HVAC Systems with Model, Cluster and Compare (MCC)

    The complexity of modern HVAC systems leads to device misconfiguration in about 40% of buildings, wasting upto 40% of the energy consumed. Fault detection methods generate excessive alarms leading to operator alert fatigue, faults left unfixed and energy wastage. Sophisticated fault detection techniques developed in the literature are seldom used...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Multiplierless Design of Folded DSP Blocks

    In this paper, the authors address the problem of minimizing the implementation cost of the Time-Multiplexed Constant Multiplication (TMCM) operation that realizes the multiplication of an input variable by a single constant selected from a set of multiple constants at a time. It presents an efficient algorithm, called ORPHEUS that...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Plug&Chip: A Framework for Supporting Rapid Prototyping of 3D Hybrid Virtual SoCs

    In the embedded system domain there is a continuous demand towards providing higher flexibility for application development. This trend strives for virtual prototyping solutions capable of performing fast system simulation. Among other benefits, such a solution supports concurrent hardware/software system design by enabling to start developing, testing and validating the...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Adaptive Routing in Mobile Opportunistic Networks

    In this paper, authors study how to adapt the routing according to dynamic network conditions in wireless ad hoc networks. Authors present a method that dynamically chooses routing agent between Ad hoc On-demand Distance Vector routing protocol (AODV) with TCP (endto-end transport) and Delay-Tolerant Networking (DTN) routing and bundle protocol...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Virtual Machine Power Metering and Provisioning

    Virtualization is often used in cloud computing platforms for its several advantages in efficiently managing resources. However, virtualization raises certain additional challenges, and one of them is lack of power metering for Virtual Machines (VMs). Power management requirements in modern data centers have led to most new servers providing power...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2010

    VOLARE: Context-Aware Adaptive Cloud Service Discovery for Mobile Systems

    With the recent widespread use of smart mobile devices, as well as the increasing availability of fast and reliable wireless Internet connections for mobile devices, there is increased interest in mobile applications where the majority of the processing occurs on the server side. The flexibility, stability and scalability offered by...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    ConMem: Detecting Severe Concurrency Bugs Through an Effect-Oriented Approach

    Multicore technology is making concurrent programs increasingly pervasive. Unfortunately, it is difficult to deliver reliable concurrent programs, because of the huge and non-deterministic interleaving space. In reality, without the resources to thoroughly check the interleaving space, critical concurrency bugs can slip into production runs and cause failures in the field....

    Provided By Association for Computing Machinery

  • White Papers // Apr 2009

    Multi-Aspect Profiling of Kernel Rootkit Behavior

    Kernel rootkits, malicious software designed to compromise a running operating system kernel, are difficult to analyze and profile due to their elusive nature, the variety and complexity of their behavior, and the privilege level at which they run. However, a comprehensive kernel rootkit profile that reveals key aspects of the...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2011

    ConSeq: Detecting Concurrency Bugs Through Sequential Errors

    Concurrency bugs are caused by non-deterministic inter-leavings between shared memory accesses. Their effects propagate through data and control dependences until they cause software to crash, hang, produce incorrect output, etc. The lifecycle of a bug thus consists of three phases: triggering, propagation, and failure. Traditional techniques for detecting concurrency bugs...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    Addressing Burstiness for Reliable Communication and Latency Bound Generation in Wireless Sensor Networks

    As wireless sensor networks mature, they are increasingly being used in real-time applications. Many of these applications require reliable transmission within latency bounds. Achieving this goal is very difficult because of link burstiness and interference. Based on significant empirical evidence of 21 days and over 3,600,000 packets transmission per link,...

    Provided By Association for Computing Machinery

  • White Papers // May 2010

    Unit Testing for Wireless Sensor Networks

    Unit testing is a software verification technique that validates software components in isolation of each other based on a test specification. Unit testing can be used at several different granularities, including individual functions, objects, or subsystems. In Wireless Sensor Networks (WSNs), the process of unit testing is complicated by several...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    On the Effectiveness of Secret Key Extraction From Wireless Signal Strength in Real Environments

    Secret key establishment is a fundamental requirement for private communication between two entities. Currently, the most common method for establishing a secret key is by using public key cryptography. However, public key cryptography consumes significant amount of computing resources and power which might not be available in certain scenarios (e.g.,...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    SNUPI: Sensor Nodes Utilizing Powerline Infrastructure

    A persistent concern of wireless sensors is the power consumption required for communication, which presents a significant adoption hurdle for practical ubiquitous computing applications. This work explores the use of the home powerline as a large distributed antenna capable of receiving signals from ultra-low-power wireless sensor nodes and thus allowing...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    A Spotlight on Security and Privacy Risks With Future Household Robots: Attacks and Lessons

    Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household robots will offer numerous benefits, they also have the potential to introduce new security and privacy vulnerabilities into the home. The research consists of...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Bonfire: A Nomadic System for Hybrid Laptop-Tabletop Interaction

    The authors present Bonfire, a self-contained mobile computing system that uses two laptop-mounted laser micro-projectors to project an interactive display space to either side of a laptop keyboard. Coupled with each micro-projector is a camera to enable hand gesture tracking, object recognition, and information transfer within the projected space. Thus,...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Evaluation of Body Sensor Network Platforms: A Design Space and Benchmarking Analysis

    Body Sensor Networks (BSNs) consist of sensor nodes deployed on the human body for health monitoring. Each sensor node is implemented by interfacing a physiological sensor with a sensor platform consisting of components such as microcontroller, radio and memory. Diverse needs of BSN applications require customized platform development for optimizing...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Classroom Projects to Support e-Learning in Computer Networks and Security

    This paper presents some projects in the area of network security suitable for online and/or in-class delivery in relevant courses. The developed projects consider the E-Learning environment and provide support to allow distance learning without requiring the students and professor to be in the same physical location. Visualization of network...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2010

    Practice-Centered e-Science: A Practice Turn Perspective on Cyberinfrastructure Design

    Cyberinfrastructure is a rapidly growing area of global research and funding with a history of emphasizing the role technology will play in changing scientific work practices. This paper proposes a practice-theoretic perspective that is informative to cyberinfrastructure research and design. To illustrate the relevancy of a practice-theoretic perspective to cyberinfrastructure,...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    What Is Cyberinfrastructure?

    Cyberinfrastructure consists of computing systems, data storage systems, advanced instruments and data repositories, visualization environments, and people, all linked together by software and high performance networks to improve research productivity and enable breakthroughs not otherwise possible. A second definition, more inclusive of scholarship generally and educational activities, has also been...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Experience With Adapting a WS-BPEL Runtime for eScience Workflows

    Scientists believe in the concept of collective intelligence and are increasingly collaborating with their peers, sharing data and simulation techniques. These collaborations are made possible by building eScience infrastructures. eScience infrastructures build and assemble various scientific workflow and data management tools which provide rich end user functionality while abstracting the...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    Run Time Assurance of Application-Level Requirements in Wireless Sensor Networks

    Continuous and reliable operation of WSNs is notoriously difficult to guarantee due to hardware degradation and environmental changes. This paper proposes and demonstrates a methodology for Run-Time Assurance (RTA), in which the authors validates at run time that a WSN will function correctly, despite any changes to the operating conditions...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    Groupthink: Usability of Secure Group Association for Wireless Devices

    A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (And Their Devices) have no prior association, a new security context must be established. In order to prevent potential attacks, the initial context (Association) establishment...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Efficient Provable Data Possession for Hybrid Clouds

    Provable data possession is a technique for ensuring the integrity of data in outsourcing storage service. In this paper, the authors propose a cooperative provable data possession scheme in hybrid clouds to support scalability of service and data migration, in which they consider the existence of multiple cloud service providers...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Venus: Verification for Untrusted Cloud Storage

    This paper presents Venus, a service for securing user interaction with untrusted cloud storage. Specifically, Venus guarantees integrity and consistency for applications accessing a key-based object store service, without requiring trusted components or changes to the storage provider. Venus completes all operations optimistically, guaranteeing data integrity. It then verifies operation...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Cloud-TM: Harnessing the Cloud With Distributed Transactional Memories

    One of the main challenges to harness the potential of Cloud computing is the design of programming models that simplify the development of large-scale parallel applications and that allow ordinary programmers to take full advantage of the computing power and the storage provided by the Cloud, both of which made...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    Towards Elastic Transactional Cloud Storage With Range Query Support

    Cloud storage is an emerging infrastructure that offers Platforms as a Service (PaaS). On such platforms, storage and compute power are adjusted dynamically, and therefore it is important to build a highly scalable and reliable storage that can elastically scale on demand with minimal startup cost. This paper proposes ecStore...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    Multi-Tenant SaaS Applications: Maintenance Dream or Nightmare?

    Multi-tenancy is a relatively new software architecture principle in the realm of the Software as a Service (SaaS) business model. It allows to make full use of the economy of scale, as multiple customers - "Tenants" - share the same application and database instance. All the while, the tenants enjoy...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    Stratus: Energy-Efficient Mobile Communication Using Cloud Support

    Cellular radio communication is a significant contributor to battery energy drain on smartphones, in some cases inflating the energy cost by a factor of 5 or more compared to the energy cost of the base device. Stratus is a system to reduce this energy consumption by leveraging cloud resources to...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2010

    CloudCmp: Comparing Public Cloud Providers

    While many public cloud providers offer pay-as-one-go computing, their varying approaches to infrastructure, virtualization, and software services lead to a problem of plenty. To help customers pick a cloud that fits their needs, the authors develop CloudCmp, a systematic comparator of the performance and cost of cloud providers. CloudCmp measures...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2010

    The Case for Crowd Computing

    The authors introduce and motivate crowd computing, which combines mobile devices and social interactions to achieve large-scale distributed computation. An opportunistic network of mobile devices offers substantial aggregate bandwidth and processing power. In this paper, they analyse encounter traces to place an upper bound on the amount of computation that...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    Network I/O Fairness in Virtual Machines

    The authors present a mechanism for achieving network I/O fairness in virtual machines, by applying flexible rate limiting mechanisms directly to virtual network interfaces. Conventional approaches achieve this fairness by implementing rate limiting either in the virtual machine monitor or hypervisor, which generates considerable CPU interrupt and instruction overhead for...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    VMTorrent: Virtual Appliances On-Demand

    Virtual Appliances (VAs) are Virtual Machines (VMs) geared towards a specific set of tasks. They require little or no configuration, working out-of-the-box. VAs fit neatly into the Cloud Computing paradigm - many copies of an identical machine can be launched in a data center, or home/business users can grab the...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    CloudPolice: Taking Access Control Out of the Network

    Cloud computing environments impose new challenges on access control techniques due to multi-tenancy, the growing scale and dynamicity of hosts within the cloud infrastructure, and the increasing diversity of cloud network architectures. The majority of existing access control techniques were originally designed for enterprise environments that do not share these...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2010

    Virtualizing the Network Forwarding Plane

    Modern system design often employs virtualization to decouple the system service model from its physical realization. Two common examples are the virtualization of computing resources through the use of virtual machines and the virtualization of disks by presenting logical volumes as the storage interface. The insertion of these abstraction layers...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    A Network in a Laptop: Rapid Prototyping for Software-Defined Networks

    Mininet is a system for rapidly prototyping large networks on the constrained resources of a single laptop. The lightweight approach of using OS-level virtualization features, including processes and network namespaces, allows it to scale to hundreds of nodes. Experiences with the initial implementation suggest that the ability to run, poke,...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    Adaptive Virtual Network Provisioning

    In the future, virtual networks will be allocated, maintained and managed much like clouds offering flexibility, extensibility and elasticity with resources acquired for a limited time and even on a lease basis. Adaptive provisioning is required to maintain virtual network topologies, comply with established contracts, expand initial allocations on demand,...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    Virtual Basestation: Architecture for an Open Shared WiMAX Framework

    This paper presents the architecture and performance evaluation of a virtualized wide-area "4G" cellular wireless network. Specifically, it addresses the challenges of virtualization of resources in a cellular base station to enable shared use by multiple independent slice users (Experimenters or mobile virtual network operators), each with possibly distinct flow...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2010

    Introducing Standby Capabilities Into Next-Generation Network Devices

    In this contribution, the main objective is to introduce and to support standby modes in next-generation devices for backbone networks. The main idea consists of periodically reconfiguring nodes and links to meet incoming traffic volumes and operational constraints of real-world networks, such as reliability, stability, quality of service, and re-convergence...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2009

    Virtually Eliminating Router Bugs

    Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semantics, rendering traditional failure detection and recovery techniques ineffective. Handling router bugs is an increasingly important problem as new applications demand higher availability, and networks become...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    Exploring Potential Vulnerabilities in Data Center Network

    In this paper, the authors study the potential security issues in Data Center Networks (DCN). They focus on TCP and propose a synchronized Denial of Service (SDoS) attack model. In SDoS, malicious tenants may employ multiple Virtual Machines (VM) as attackers and launch a low-rate synchronized DoS attack to VMs...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2010

    Should Specific Values Be Embedded in the Internet Architecture?

    A fundamental disagreement in the Future Internet debate concerns architecture design and value. Should an architecture incorporate inherent values that have been widely accepted through societal debate or be adaptable once deployed to a wider range of stakeholder values put forward within an evolving societal context? This disagreement is reflected...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2010

    Evaluating the Suitability of Server Network Cards for Software Routers

    The advent of multicore CPUs has led to renewed interest in software routers built from commodity PC hardware. The typical approach to scaling network processing in these systems is to distribute packets, or rather flows of packets, across multiple cores that process them in parallel. However, the traffic arriving (Departing)...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2010

    Distributed Runtime Load-Balancing for Software Routers on Homogeneous Many-Core Processors

    With the advent of diversifie network services and programmability deployed in the network infrastructure, the functionality of the data path in network systems has moved from "Store-And-Forward" toward "Store-Process-Forward." However, the processing performance of many contemporary software routers does not scale with the increasing number of processor cores that are...

    Provided By Association for Computing Machinery