Association for Computing Machinery

Displaying 1-40 of 7083 results

  • White Papers // Jul 2014

    A Methodology for Social BI

    Social BI (SBI) is the emerging discipline that aims at combining corporate data with textual User-Generated Content (UGC) to let decision-makers analyze their business based on the trends perceived from the environment. Despite the increasing diffusion of SBI applications, no specific and organic design methodology is available yet. In this...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Domino: An Incremental Computing Framework in Cloud with Eventual Synchronization

    In recent years, more and more applications in cloud have needed to process large-scale online data sets that evolve over time as entries are added or modified. Several programming frameworks, such as percolator and oolong, are proposed for such incremental data processing and can achieve efficient updates with an event-driven...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Computation and Communication Efficient Graph Processing with Distributed Immutable View

    Cyclops is a new vertex-oriented graph-parallel framework for writing distributed graph analytics. Unlike existing distributed graph computation models, cyclops retains simplicity and computation-efficiency by synchronously computing over a distributed immutable view, which grants a vertex with read-only access to all its neighboring vertices. The view is provided via read-only replication...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    CrowdFill: Collecting Structured Data from the Crowd

    The authors present CrowdFill, a system for collecting structured data from the crowd. While a typical microtask-based approach would pose specific questions to each worker and assemble the answers, Crowd-Fill shows a partially-filled table to all participating workers. Workers contribute by filling in empty cells, as well as upvoting and...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Next Generation Job Management Systems for Extreme-Scale Ensemble Computing

    With the exponential growth of supercomputers in parallelism, applications are growing more diverse, including traditional large-scale HPC MPI jobs, and ensemble workloads such as finer-grained Many-Task Computing (MTC) applications. Delivering high throughput and low latency for both workloads requires developing a distributed job management system that is magnitudes more scalable...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Design and Evaluation of the GeMTC Framework for GPU-enabled Many-Task Computing

    The authors present the design and first performance and usability evaluation of GeMTC, a novel execution model and runtime system that enables accelerators to be programmed with many concurrent and independent tasks of potentially short or variable duration. With GeMTC, a broad class of such \"Many-task\" applications can leverage the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Indexing for Interactive Exploration of Big Data Series

    Numerous applications continuously produce big amounts of data series, and in several time critical scenarios analysts need to be able to query these data as soon as they become available, which is not currently possible with the state-of-the-art indexing methods and for very large data series collections. In this paper,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    H2O: A Hands-Free Adaptive Store

    Modern state-of-the-art database systems are designed around a single data storage layout. This is a fixed decision that drives the whole architectural design of a database system, i.e., row-stores, column-stores. However, none of those choices is a universally good solution; different workloads require different storage layouts and data access methods...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Database Cracking: Fancy Scan, not Poor Man's Sort!

    Database cracking is an appealing approach to adaptive indexing: on every range-selection query, the data is partitioned using the supplied predicates as pivots. The core of database cracking is, thus, pivoted partitioning. While pivoted partitioning, like scanning, requires a single pass through the data it tends to have much higher...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Dynamic Fine-Grained Scheduling for Energy-Efficient Main-Memory Queries

    Power and cooling costs are some of the highest costs in data centers today, which make improvement in energy efficiency crucial. Energy efficiency is also a major design point for chips that power whole ranges of computing devices. One important goal in this area is energy proportionality, arguing that the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    H2RDF+: An Efficient Data Management System for Big RDF Graphs

    The proliferation of data in RDF format has resulted in the emergence of a plethora of specialized management systems. While the ability to adapt to the complexity of a SPARQL query - given their inherent diversity - is crucial, current approaches do not scale well when faced with substantially complex,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Scalable Indexing and Adaptive Querying of RDF Data in the Cloud

    Efficient RDF data management systems are central to the vision of the semantic Web. The enormous increase in both user and machine generated content dictates for scalable solutions in triple data stores. Current systems manage to decentralize some or all the stages of RDF data management, scaling to arbitrarily large...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Accessing Multiple Clouds with Cloudmesh

    The authors present the design of a toolkit that can be employed by users and administrators to manage virtual machines on multi-cloud environments. It can be run by individual users or offered as a service to a shared user community. They have practically demonstrated its use as part of a...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Self Managing Monitoring for Highly Elastic Large Scale Cloud Deployments

    Infrastructure as a service computing exhibits a number of properties, which are not found in conventional server deployments. Elasticity is among the most significant of these properties which has wide reaching implications for applications deployed in cloud hosted VMs. Among the applications a affected by elasticity is monitoring. In this...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Infinite CacheFlow in Software-Defined Networks

    Software-Defined Networking (SDN) enables ne-grained policies for firewalls, load balancers, routers, traffic monitoring, and other functionality. While Ternary Content Address-able Memory (TCAM) enables OpenFlow switches to process packets at high speed based on multiple header fields, today's commodity switches support just thousands to tens of thousands of rules. To realize...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Memory Bandwidth Reservation in the Cloud to Avoid Information Leakage in the Memory Controller

    Multiple Virtual Machines (VMs) are typically co-scheduled on cloud servers. Each VM experiences different latencies when accessing shared resources, based on contention from other VMs. This introduces timing channels between VMs that can be exploited to launch attacks by an untrusted VM. This paper focuses on trying to eliminate the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Resource Allocation for Hardware Implementations of Map

    The map operation, in which a function is applied independently to each element in a collection to produce a new collection, appears in many settings and is easy to parallelize. While a straight-forward implementation in hardware will consist of multiple functional units with buffers to balance variable execution times, the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Activity-Edge Centric Multi-Label Classification for Mining Heterogeneous Information Networks

    Multi-label classification of heterogeneous information networks has received renewed attention in social network analysis. In this paper, the authors present an activity-edge centric multi-label classification framework for analyzing heterogeneous information networks with three unique features. First, they model a heterogeneous information network in terms of a collaboration graph and multiple...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Revealing Applications' Access Pattern in Collective I/O for Cache Management

    Collective I/O is a critical I/O strategy on high-performance parallel computing systems that enables programmers to reveal parallel processes' I/O accesses collectively and makes possible for the parallel I/O middleware to carry out I/O requests in a highly efficient manner. Collective I/O has been proven as a core parallel I/O...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    A Framework for Enhancing Data Reuse via Associative Reordering

    The freedom to reorder computations involving associative operators has been widely recognized and exploited in designing parallel algorithms and to a more limited extent in optimizing compilers. In this paper, the authors develop a novel framework utilizing the associativity and commutativity of operations in regular loop computations to enhance register...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    A Runtime Cloud Efficiency Software Quality Metric

    In this paper, the authors introduce the Cloud Efficiency (CE) metric, a novel runtime metric which assesses how effectively an application uses software-defined infrastructure. The CE metric is computed as the ratio of two functions: a benefit function which captures the current set of benefits derived from the application, and...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    System-Level Security for Network Processors with Hardware Monitors

    New attacks are emerging that target the Internet infrastructure. Modern routers use programmable network processors that may be exploited by merely sending suitably crafted data packets into a network. Hardware monitors that are co-located with processor cores can detect attacks that change processor behavior with high probability. In this paper,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    SHiFA: System-Level Hierarchy in Run-Time Fault-Aware Management of Many-Core Systems

    A system-level approach to fault-aware resource management of many-core systems is proposed. The proposed approach, called SHiFA, is able to tolerate run-time faults at system level without any hardware overhead. In contrast to the existing system-level methods, network resources are also considered to be potentially faulty. Accordingly, applications are mapped...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Autonomic Resource Provisioning for Cloud-Based Software

    Cloud elasticity provides a software system with the ability to maintain optimal user experience by automatically acquiring and releasing resources, while paying only for what has been consumed. The mechanism for automatically adding or removing resources on the fly is referred to as auto-scaling. The state-of-the practice with respect to...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Horizontal Benchmark Extension for Improved Assessment of Physical CAD Research

    The rapid growth in complexity and diversity of IC designs, design flows and methodologies has resulted in a benchmark-centric culture for evaluation of performance and scalability in physical design algorithm research. Landmark papers in the literature present vertical benchmarks that can be used across multiple design flow stages; artificial benchmarks...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    A New Methodology for Reduced Cost of Resilience

    Resilient design techniques are used to ensure correct operation under dynamic variations; and improve design performance (e.g., through timing speculation). However, significant overheads (e.g., 17% and 15% energy penalties due to throughput degradation and additional circuits) are incurred by existing resilient design techniques. For instance, resilient designs require additional circuits...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    OCV-Aware Top-Level Clock Tree Optimization

    The clock trees of high-performance synchronous circuits have many clock logic cells (e.g., clock gating cells, multiplexers and dividers) in order to achieve aggressive clock gating and required performance across a wide range of operating modes and conditions. As a result, clock tree structures have become very complex and difficult...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Neural Network-Based Accelerators for Transcendental Function Approximation

    The general-purpose approximate nature of Neural Network (NN) based accelerators has the potential to sustain the historic energy and performance improvements of computing systems. The authors propose the use of NN-based accelerators to approximate mathematical functions in the GNU C Library (glibc) that commonly occur in application benchmarks. Using their...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    A Semi-Formal Approach for Analog Circuits Behavioral Properties Verification

    The analog circuit design process is becoming very complex and therefore new verification approaches are very much needed. Simulation is the most used technique to compute the behavior of a circuit model. Statistical methods like Monte Carlo rely on repeating numerical simulations for a random sampling of parameters. The authors...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Generation of Reduced Analog Circuit Models Using Transient Simulation Traces

    The generation of fast models for device level circuit descriptions is a very active area of research. Model order reduction is an attractive technique for dynamical models size reduction. In this paper, the authors propose an approach based on clustering, curve-fitting, linearization and Krylov space projection to build reduced models...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    A Qualitative Simulation Approach for Verifying PLL Locking Property

    Simulation cannot give a full coverage of Phase Locked Loop (PLL) behavior in presence of process variation, jitter and varying initial conditions. Qualitative Simulation is an attracting method that computes behavior envelopes for dynamical systems over continuous ranges of their parameters. Therefore, this method can be employed to verify PLLs...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Towards Topic Modeling for Big Data

    Latent Dirichlet Allocation (LDA) is a popular topic modeling technique in academia but less so in industry, especially in large-scale applications involving search engines and on-line advertisement systems. A main underlying reason is that the topic models used have been too small in scale to be useful; for example, some...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Wireless Scheduling Algorithms in Complex Environments

    Efficient spectrum use in wireless sensor networks through spatial reuse requires effective models of packet reception at the physical layer in the presence of interference. Despite recent progress in analytic and simulations research into worst-case behavior from interference effects, these efforts generally assume geometric path loss and isotropic transmission, assumptions...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Resolving Conflicts in Heterogeneous Data by Truth Discovery and Source Reliability Estimation

    In many applications, one can obtain descriptions about the same objects or events from a variety of sources. As a result, this will inevitably lead to data or information conflicts. One important problem is to identify the true information (i.e., the truths) among conflicting sources of data. It is intuitive...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    NewsNetExplorer: Automatic Construction and Exploration of News Information Networks

    News data is one of the most abundant and familiar data sources. News data can be systematically utilized and explored by database, data mining and NLP information retrieval researchers to demonstrate to the general public the power of advanced information technology. In the authors view, news data contains rich, inter-related...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Imprecise Datapath Design: An Overclocking Approach

    In this paper, the authors describe an alternative circuit design methodology when considering trade-offs between accuracy, performance and silicon area. They compare two different approaches that could trade accuracy for performance. One is the traditional approach where the precision used in the datapath is limited to meet target latency. The...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Explore-by-Example: An Automatic Query Steering Framework for Interactive Data Exploration

    Interactive Data Exploration (IDE) is a key ingredient of a diverse set of discovery-oriented applications, including ones from scientific computing and evidence-based medicine. In these applications, data discovery is a highly ad hoc interactive process where users execute numerous exploration queries using varying predicates aiming to balance the trade-off between...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Autonomous Soft-error Tolerance of FPGA Configuration Bits

    Field Programmable Gate Arrays (FPGAs) are increasingly susceptible to radiation-induced Single Event Upsets (SEUs). These upsets are predominant in space environment; however, with increasing use of Static RAM (SRAM) in modern FPGAs, these SEUs are gaining prominence even in terrestrial environment. SEUs can flip SRAM bits of FPGA, potentially altering...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Reconfiguration-Assisted Charging in Large-Scale Lithium-Ion Battery Systems

    Large-scale Lithium-ion batteries are widely adopted in many systems such as electric vehicles and energy backup in power grids. Due to factors such as manufacturing difference and heterogeneous discharging conditions, cells in the battery system may have different statuses such as diverse voltage levels. This cell diversity is commonly known...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Reconciling High Server Utilization and Sub-Millisecond Quality-of-Service

    The simplest strategy to guarantee good Quality-of-Service (QoS) for a latency-sensitive workload with sub-millisecond latency in a shared cluster environment is to never run other workloads concurrently with it on the same server. Unfortunately, this inevitably leads to low server utilization, reducing both the capability and cost effectiveness of the...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2011

    Authenticating Location with Femtocells

    Providers of location-based services seek new methods to authenticate the location of their clients. The authors propose a novel, intelligent infrastructure-based solution that provides spontaneous and transaction-oriented, collusion-resistant mobile device location authentication via an integrated 802.11x wireless access point and 3G femtocell access system. By simply making a voice call...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2011

    Discovering Interesting Sub-paths in Spatiotemporal Datasets: A Summary of Results

    Given a SpatioTemporal (ST) dataset and a path in its embedding spatiotemporal framework, the goal is to identify all interesting sub-paths defined by an interest measure. Sub-path discovery is of fundamental importance for understanding climate changes, agriculture, and many other application. However, this problem is computationally challenging due to the...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2012

    Understanding Human Movement Semantics: A Point of Interest Based Approach

    The recent availability of human mobility traces has driven a new wave of research - on human movement - with straight-forward applications in wireless/cellular network algorithmic problems. In this paper, the authors revisit the human mobility problem with new assumptions. They believe that human movement is not independent of the...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    Analyzing Content-Level Properties of the Web Adversphere

    Advertising has become an integral and inseparable part of the World Wide Web. However, neither public auditing nor monitoring mechanisms still exist in this emerging area. In this paper, the authors present their initial efforts on building a content-level auditing service for web-based ad networks. Their content-level measurements - understanding...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2012

    Content Delivery and the Natural Evolution of DNS

    Content Delivery Networks (CDNs) rely on the Domain Name System (DNS) for replica server selection. DNSbased server selection builds on the assumption that, in the absence of information about the client's actual network location, the location of a client's DNS resolver provides a good approximation. The recent growth of remote...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2012

    namehelp: Intelligent Client-Side DNS Resolution

    The Domain Name System (DNS) is a fundamental component of today's Internet. Recent years have seen radical changes to DNS with increases in usage of remote DNS and public DNS services such as OpenDNS. Given the close relationship between DNS and Content Delivery Networks (CDNs) and the pervasive use of...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2012

    Crowd (Soft) Control: Moving Beyond The Opportunistic

    A number of novel wireless networked services, ranging from participatory sensing to social networking, leverage the increasing capabilities of mobile devices and the movements of the individuals carrying them. For many of these systems, their effectiveness fundamentally depends on coverage and the particular mobility patterns of the participants. Given the...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2011

    Distributed Systems and Natural Disasters - BitTorrent as a Global Witness

    Peer-To-Peer (P2P) systems represent some of the largest distributed systems in today's Internet. Among P2P systems, BitTorrent is the most popular, potentially accounting for 20-50% of P2P file-sharing traffic. In this paper, the authors argue that this popularity can be leveraged to monitor the impact of natural disasters and political...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2011

    Crowdsourcing ISP Characterization to The Network Edge

    Evaluating and characterizing Internet Service Providers (ISPs) is critical to subscribers shopping for alternative ISPs, companies providing reliable Internet services, and governments surveying the coverage of broadband services to its citizens. Ideally, ISP characterization should be done at scale, continuously, and from end users. While there has been significant progress...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2011

    On Blind Mice and the Elephant - Understanding the Network Impact of a Large Distributed System

    A thorough understanding of the network impact of emerging large-scale distributed systems - where traffic flows and what it costs - must encompass users' behavior, the traffic they generate and the topology over which that traffic flows. In the case of BitTorrent, however, previous studies have been limited by narrow...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Symbolic Crosschecking of Floating-Point and SIMD Code

    The authors present an effective technique for crosschecking an IEEE 754 floating-point program and its SIMD-vectorized version, implemented in KLEE-FP, an extension to the KLEE symbolic execution tool that supports symbolic reasoning on the equivalence between floating-point values. The key insight behind their approach is that floating-point values are only...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Feature Consistency in Compile-Time - Configurable System Software

    Much system software can be configured at compile time to tailor it with respect to a broad range of supported hardware architectures and application domains. A good example is the Linux kernel, which provides more than 10,000 configurable features, growing rapidly. From the maintenance point of view, compile-time configurability imposes...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Database Engines on Multicores, Why Parallelize When You Can Distribute?

    Multicore computers pose a substantial challenge to infrastructure software such as operating systems or databases. Such software typically evolves slower than the underlying hardware, and with multicore it faces structural limitations that can be solved only with radical architectural changes. In this paper, the authors argue that, as has been...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Finding Complex Concurrency Bugs in Large Multi-Threaded Applications

    Parallel software is increasingly necessary to take advantage of multi-core architectures, but it is also prone to concurrency bugs which are particularly hard to avoid, find, and fix, since their occurrence depends on specific thread inter-leavings. In this paper, the authors propose a concurrency bug detector that automatically identifies when...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Fine-Grained Power Modeling for Smartphones Using System Call Tracing

    The authors propose a new, system-call-based power modeling approach which gracefully encompasses both utilization-based and non-utilization-based power behavior. They present the detailed design of such a power modeling scheme and its implementation on Android and Windows Mobile. Their experimental results using a diverse set of applications confirm that the new...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    A Case for Scaling Applications to Many-Core with OS Clustering

    In this paper, the authors propose an approach to scaling UNIX-like operating systems for many cores in a backward-compatible way, which still enjoys common wisdom in new operating system designs. The proposed system, called Cerberus, mitigates contention on many shared data structures within OS kernels by clustering multiple commodity operating...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Parallel Symbolic Execution for Automated Real-World Software Testing

    In this paper, the authors introduce Cloud9, a platform for automated testing of real-world software. Their main contribution is the scalable parallelization of symbolic execution on clusters of commodity hardware, to help cope with path explosion. Cloud9 provides a systematic interface for writing "Symbolic tests" that concisely specify entire families...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    SRM-Buffer: An OS Buffer Management Technique to Prevent Last Level Cache From Thrashing in Multicores

    In this paper, the authors propose a buffer cache design called Selected Region Mapping Buffer (SRM-Buffer) for multicore systems to effectively address the cache pollution problem caused by OS buffer. SRM-buffer improves existing OS buffer management with an enhanced page allocation policy that carefully selects mapping physical pages upon buffer...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Scheduling Large Jobs by Abstraction Refinement

    The static scheduling problem often arises as a fundamental problem in real-time systems and grid computing. The authors consider the problem of statically scheduling a large job expressed as a task graph on a large number of computing nodes, such as a data center. This paper solves the large-scale static...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Is Co-Scheduling Too Expensive for SMP VMs?

    Symmetric MultiProcessing (SMP) Virtual Machines (VMs) allow users to take advantage of a multiprocessor infrastructure. Despite the advantage, SMP VMs can cause synchronization latency to increase significantly, depending on task scheduling. In this paper, the authors show that even if a SMP VM runs non-concurrent applications, the synchronization latency problem...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Refuse to Crash with Re-FUSE

    The authors introduce Re-FUSE, a framework that provides support for restartable user-level file systems. Re-FUSE monitors the user-level file-system and on a crash transparently restarts the file system and restores its state; the restart process is completely transparent to applications. Re-FUSE provides transparent recovery through a combination of novel techniques,...

    Provided By Association for Computing Machinery

  • White Papers // May 2011

    Run-Time Energy Management of Manycore Systems Through Reconfigurable Interconnects

    In this paper, the authors propose a novel, low-cost method to reconfigure the network channel width at run time to maximize energy efficiency of applications. They analyze the effect of channel width choices for two commonly used cache hierarchies, private and distributed caches, on many core systems with an underlying...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2012

    Providing Fault-Tolerant Execution of Web-Service-Based Workflows within Clouds

    With a variety of services rapidly evolving at all architectural levels of cloud computing, there is an increasing demand for a standardized way to coordinate their interactions. Business process management, that is, more general, the management of Web-service-based workflows, could satisfy this demand and, indeed, first corresponding offerings have gained...

    Provided By Association for Computing Machinery

  • White Papers // May 2009

    Fault-Tolerant BPEL Workflow Execution via Cloud-Aware Recovery Policies

    BPEL is the de facto standard for business process modeling in today's enterprises and is a promising candidate for the integration of business and scientific applications that run in Grid or Cloud environments. In these distributed infrastructures, the occurrence of faults is quite likely. Without sophisticated fault handling, workflows are...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2013

    Security, Fault Tolerance and Modeling of Grid Workflows in BPEL4Grid

    BPEL is the de facto standard for business process modeling in today's enterprises and is a promising candidate for the integration of business and scientific applications that run in Grid or Cloud environments. In this paper, selected components of BPEL4Grid, a scientific workflow system for developing service-oriented Grid applications based...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2012

    FaCETa: Backward and Forward Recovery for Execution of Transactional Composite WS

    In distributed software contexts, Web Services (WSs) that provide transactional properties are useful to guarantee reliable Transactional Composite WSs (TCWSs) execution and to ensure the whole system consistent state even in presence of failures. Fails during the execution of a TCWS can be repaired by forward or backward recovery processes,...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2010

    Low Overhead Container Format for Adaptive Streaming

    Current segmented HTTP streaming systems provide scalable and quality adaptive video delivery services to a huge number of users. In this paper, the authors present an appropriate way of coding the segments and a simple multimedia container format that is optimized for adaptive streaming and video composition over HTTP. They...

    Provided By Association for Computing Machinery

  • White Papers // May 2012

    An Intermittent Energy Internet Architecture

    If the people had a tenth the energy to run the Internet, and if that energy were ten times as volatile, how might they rethink the Internet's design? Recent studies indicate that energy costs will rise substantially over the coming decades, due primarily to the increasing difficulty of locating and...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Video Streaming into Virtual Worlds: The Effects of Virtual Screen Distance and Angle on Perceived Quality

    There is an increasing trend to include streamed video data in 3D environments. Such environments allow potentially several concurrently visible videos on a single display device, and consequently, network and processing bottlenecks. As a first step towards an avoidance of such problems, the authors have performed subjective assessments using a...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2013

    MPRTP: Multipath Considerations for Real-Time Media

    The Internet infrastructure often supports multiple routes between two communicating hosts and, today, especially mobile hosts usually offer multiple network interfaces, so that disjoint paths between the hosts can be constructed. Having a number of (partly or fully) disjoint paths available may allow applications to distribute their traffic, aggregate capacity...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2012

    Reducing Server and Network Load With Shared Buffering

    Today, content replication methods are common ways of reducing the network and servers load. Present content replication solutions have different problems, including the need for pre-planning and management, and they are ineffective in case of sudden traffic spikes. In spite of these problems, content replication methods are more popular today...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2012

    SCAMPI Application Platform

    The development and deployment of opportunistic networking applications on real consumer devices has been slow. This is in large part due to the lack of suitable frameworks and software stacks on popular consumer mobile device platforms. In this paper, the authors demonstrate an application platform architecture and implementation that allows...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2012

    Enabling Ad-Hoc-Style Communication in Public WLAN Hot-Spots

    Opportunistic networking between mobile devices relies on the capabilities of those devices to establish ad-hoc communication among each other. While the two dominant wireless interface technologies, IEEE 802.11 wireless LAN and Bluetooth, offer such capabilities in theory, limitations of the protocol specification, chipsets, and operating systems in mobile devices render...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2012

    Opportunistic Content Sharing Applications

    Opportunistic communication between mobile nodes allows for asynchronous content sharing within groups. Limiting the spread of information to a geographic area creates an infrastructure-less variant of digital graffiti, a social network with coupling in space and limited decoupling in time. Due to its nature, this kind of a communication network...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2012

    Supporting Wireless Access Markets With a User-Centric QoE-Based Geo-Database

    This paper presents the u-map, a novel user-centric geo-database for wireless access markets that enables clients to upload information about their profile, their Quality-of-Experience (QoE) feedback for a service, traffic demand, network/spectrum conditions (e.g., interference, coverage), providers, and their position (e.g., GPS-based measurements) in a spatio-temporal geo-database. To evaluate the...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2012

    Security Asset Elicitation for Collaborative Models

    Building secure systems is a difficult job for most engineers since it requires in-depth understanding of security aspects. This task, however, can be assisted by capturing security knowledge in a particular domain and reusing the knowledge when designing applications. The authors use this strategy and employ information security ontology to...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    InstantLeap: Fast Neighbor Discovery in P2P VoD Streaming

    A fundamental challenge in Peer-To-Peer (P2P) Video-on-Demand (VoD) streaming is to quickly locate new supplying peers whenever a VCR command is issued, in order to achieve smooth viewing experiences. For most existing commercial systems which resort to tracking servers for such neighbor discovery, the increasing scale of P2P VoD systems...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2010

    Exploiting Memory Usage Patterns to Improve Garbage Collections in Java

    Copying-based garbage collectors are currently widely employed in JVM systems, as they provide not only cheap allocations but also fast collections. Comparing to their compacting-based counterparts, copying-based collectors trade space for time: they conservatively reserve half of the available heap for the purpose of copying live objects. It is a...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2011

    Modeling and Synthesizing Task Placement Constraints in Google Compute Clusters

    Evaluating the performance of large compute clusters requires benchmarks with representative workloads. At Google, performance benchmarks are used to obtain performance metrics such as task scheduling delays and machine resource utilizations to assess changes in application codes, machine configurations, and scheduling algorithms. Existing approaches to workload characterization for high performance...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2013

    Experimental Analysis of Task-Based Energy Consumption in Cloud Computing Systems

    Cloud computing delivers IT solutions as a utility to users. One consequence of this model is that large cloud data centres consume large amounts of energy and produce significant carbon footprints. A common objective of cloud providers is to develop resource provisioning and management solutions that minimise energy consumption while...

    Provided By Association for Computing Machinery