Association for Computing Machinery

Displaying 1-40 of 6514 results

  • White Papers // May 2015

    Predicting Program Phases and Defending Against Side-Channel Attacks using Hardware Performance Counters

    Sharing of functional units inside a processor by two applications can lead to information leaks and micro architectural side-channel attacks. Meanwhile, processors now commonly come with hardware performance counters which can count a variety of micro-architectural events, ranging from cache behavior to floating point unit usage. In this paper, the...

    Provided By Association for Computing Machinery

  • White Papers // May 2015

    Analysis of Smartphone Adoption and Usage in a Rural Community Cellular Network

    The smartphone has been touted as the technology of the 21st century. Global smartphone adoption rates are growing rapidly, up to over 24% in 2014, with usage increasing 25% in the last year. However, rural areas are often the last places to benefit from these technological trends. Utilizing cellular network...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2015

    Fast Serializable Multi-Version Concurrency Control for Main-Memory Database Systems

    Multi-Version Concurrency Control (MVCC) is a widely employed concurrency control mechanism, as it allows for execution modes where readers never block writers. However, most systems implement only Snapshot Isolation (SI) instead of full serializability. Adding serializability guarantees to existing SI implementations tends to be prohibitively expensive. The authors present a...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2015

    Sirius: An Open End-to-End Voice and Vision Personal Assistant and Its Implications for Future Warehouse Scale Computers

    As user demand scales for Intelligent Personal Assistants (IPAs) such as Apple's Siri, Google's google now, and Microsoft's Cortana, the authors are approaching the computational limits of current datacenter architectures. It is an open question how future server architectures should evolve to enable this emerging class of applications, and the...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2015

    Enhancing Design Space Exploration by Extending CPU/GPU Specifications onto FPGAs

    The design cycle for complex special-purpose computing systems is extremely costly and time-consuming. It involves a multi-parametric design space exploration for optimization, followed by design verification. Designers of special purpose VLSI (Very-Large-Scale Integration) implementations often need to explore parameters, such as optimal bit width and data representation, through time-consuming Monte...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    Compiler Management of Communication and Parallelism for Quantum Computation

    Quantum Computing (QC) offers huge promise to accelerate a range of computationally intensive benchmarks. Quantum computing is limited, however, by the challenges of decoherence: i.e., a quantum state can only be maintained for short windows of time before it decoheres. While quantum error correction codes can protect against decoherence, fast...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    A Symbolic Execution Algorithm for Constraint-Based Testing of Database Programs

    In so-called constraint-based testing, symbolic execution is a common technique used as a part of the process to generate test data for imperative programs. Databases are ubiquitous in software and testing of programs manipulating databases is thus essential to enhance the reliability of software. In this paper, the authors propose...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    CQIC: Revisiting Cross-Layer Congestion Control for Cellular Networks

    With the advent of high-speed cellular access and the overwhelming popularity of Smartphone's, a large percent of today's Internet content is being delivered via cellular links. Due to the nature of long-range wireless signal propagation, the capacity of the last hop cellular link can vary by orders of magnitude within...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    Utility of the OpenAccess Database in Academic Research

    Twenty years ago, there was a common design tool which was free and open-source and satisfied the needs of many academic circuit designers. The proliferation of OpenAccess is opening promising new research opportunities to academic communities. The benefits of adopting an OpenAccess based approach to EDA research are growing, and...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    GRAPHITE: An Extensible Graph Traversal Framework for Relational Database Management Systems

    Graph traversals are a basic but fundamental ingredient for a variety of graph algorithms and graph-oriented queries. To achieve the best possible query performance, they need to be implemented at the core of a database management system that aims at storing, manipulating, and querying graph data. Increasingly, modern business applications...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Uncovering Network Tarpits with Degreaser

    Network tarpits, whereby a single host or appliance can masquerade as many fake hosts on a network and slow network scanners, are a form of defensive cyber-deception. In this paper, the authors develop degreaser, an efficient fingerprinting tool to remotely detect tarpits. In addition to validating their tool in a...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Hot-Hardening: Getting More Out of Your Security Settings

    Applying optimized security settings to applications is a difficult and laborious task. Especially in cloud computing, where virtual servers with various pre-installed software packages are leased, selecting optimized security settings is very difficult. In particular, optimized security settings are not identical in every setup. They depend on characteristics of the...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Exploring Big Data with Helix: Finding Needles in a Big Haystack

    While much work has focused on efficient processing of big data, little work considers how to understand them. In this paper, the authors describe Helix, a system for guided exploration of big data. Helix provides a unified view of sources, ranging from spreadsheets and XML files with no schema, all...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Towards Hardware-Driven Design of Low-Energy Algorithms for Data Analysis

    In the era of "Big" data, data analysis algorithms need to be efficient. Traditionally researchers would tackle this problem by considering "Small" data algorithms and investigating how to make them computationally more efficient for big data applications. The main means to achieve computational efficiency would be to revise the necessity...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Foundations of Crowd Data Sourcing

    Crowdsourcing techniques are very powerful when harnessed for the purpose of collecting and managing data. In order to provide sound scientific foundations for crowdsourcing and support the development of efficient crowdsourcing processes, adequate formal models must be defined. In particular, the models must formalize unique characteristics of crowd-based settings, such...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Design-Theoretic Encoding of Deterministic Hypotheses as Constraints and Correlations Into U-Relational Databases

    In view of the paradigm shift that makes science ever more data-driven, in this paper the authors consider deterministic scientific hypotheses as uncertain data. In the form of mathematical equations, hypotheses symmetrically relate aspects of the studied phenomena. For computing predictions, however, deterministic hypotheses are used asymmetrically as functions. They...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Patterns in the Chaos - A Study of Performance Variation and Predictability in Public IaaS Clouds

    Benchmarking the performance of public cloud providers is a common research topic. Previous paper has already extensively evaluated the performance of different cloud platforms for different use cases, and under different constraints and experiment setups. In this paper, the authors present a principled, large-scale literature review to collect and codify...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Characterizing Large-Scale Click Fraud in ZeroAccess

    Click fraud is a scam that hits a criminal sweet spot by both tapping into the vast wealth of online advertising and exploiting that ecosystem's complex structure to obfuscate the flow of money to its perpetrators. In this paper, the authors illuminate the intricate nature of this activity through the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    On The Security of Mobile Cockpit Information Systems

    Recent trends in aviation have led many general aviation pilots to adopt the use of iPads (or other tablets) in the cockpit. While initially used to display static charts and documents, uses have expanded to include live data such as weather and traffic information that is used to make flight...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild

    Online accounts are inherently valuable resources - both for the data they contain and the reputation they accrue over time. Unsurprisingly, this value drives criminals to steal, or hijack, such accounts. In this paper, the authors focus on manual account hijacking - account hijacking performed manually by humans instead of...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Search + Seizure: The Effectiveness of Interventions on SEO Campaigns

    Black hat Search Engine Optimization (SEO), the practice of abusively manipulating search results, is an enticing method to acquire targeted user traffic. In turn, a range of interventions - from modifying search results to seizing domains - are used to combat this activity. In this paper, the authors examine the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Challenges in Inferring Internet Interdomain Congestion

    The authors introduce and demonstrate the utility of a method to localize and quantify inter-domain congestion in the Inter-net. Their Time Sequence Latency Probes (TSLP) method depends on two facts: internet traffic patterns are typically diurnal, and queues increase packet delay through a router during periods of adjacent link congestion....

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Computing Multi-Relational Sufficient Statistics for Large Databases

    Databases contain information about which relationships do and do not hold among entities. To make this information accessible for statistical analysis requires computing sufficient statistics that combine information from different database tables. Such statistics may involve any number of positive and negative relationships. With a naive enumeration approach, computing sufficient...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    PixelVault: Using GPUs for Securing Cryptographic Operations

    Protecting the confidentiality of cryptographic keys in the event of partial or full system compromise is crucial for containing the impact of attacks. The Heartbleed vulnerability of April 2014, which allowed the remote leakage of secret keys from HTTPS web servers, is an indicative example. In this paper, the authors...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication

    In an effort to hinder attackers from compromising user accounts, Facebook launched a form of two-factor authentication called Social Authentication (SA), where users are required to identify photos of their friends to complete a log-in attempt. Recent research, however, demonstrated that attackers can bypass the mechanism by employing face recognition...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed

    Central to the secure operation of a Public Key Infrastructure (PKI) is the ability to revoke certificates. While much of users' security rests on this process taking place quickly, in practice, revocation typically requires a human to decide to reissue a new certificate and revoke the old one. Thus, having...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Data Driven Investigation of Faults in HVAC Systems with Model, Cluster and Compare (MCC)

    The complexity of modern HVAC systems leads to device misconfiguration in about 40% of buildings, wasting upto 40% of the energy consumed. Fault detection methods generate excessive alarms leading to operator alert fatigue, faults left unfixed and energy wastage. Sophisticated fault detection techniques developed in the literature are seldom used...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Multiplierless Design of Folded DSP Blocks

    In this paper, the authors address the problem of minimizing the implementation cost of the Time-Multiplexed Constant Multiplication (TMCM) operation that realizes the multiplication of an input variable by a single constant selected from a set of multiple constants at a time. It presents an efficient algorithm, called ORPHEUS that...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Plug&Chip: A Framework for Supporting Rapid Prototyping of 3D Hybrid Virtual SoCs

    In the embedded system domain there is a continuous demand towards providing higher flexibility for application development. This trend strives for virtual prototyping solutions capable of performing fast system simulation. Among other benefits, such a solution supports concurrent hardware/software system design by enabling to start developing, testing and validating the...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    SoftMoW: Recursive and Reconfigurable Cellular WAN Architecture

    The current LTE network architecture is organized into very large regions, each having a core network and a radio access network. The core network contains an Internet edge comprised of Packet data network GateWays (PGWs). The radio network consists of only base stations. There are minimal interactions among regions other...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Sweet Little Lies: Fake Topologies for Flexible Routing

    Link-state routing protocols (e.g., OSPF and IS-IS) are widely used because they are scalable, robust, and based on simple abstractions. Unfortunately, these protocols are also relatively inflexible, since they direct all traffic over shortest paths. In contrast, Software Defined Networking (SDN) offers fine-grained control over routing, at the expense of...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    PRAN: Programmable Radio Access Networks

    With the continued exponential growth of mobile traffic and the rise of diverse applications, the current LTE Radio Access Network (RAN) architecture of cellular operators faces mounting challenges. Current RAN suffers from insufficient radio resource coordination, inefficient infrastructure utilization, and inflexible data paths. The authors present the high level design...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Tango: Simplifying SDN Control with Automatic Switch Property Inference, Abstraction, and Optimization

    A major benefit of Software-Defined Networking (SDN) over traditional networking is simpler and easier control of network devices. The diversity of SDN switch implementation properties, which include both diverse switch hardware capabilities and diverse control-plane software behaviors, however, can make it difficult to understand and/or to control the switches in...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Blender: Upgrading Tenant-based Data Center Networking

    In this paper, the authors present Blender, a framework that enables network operators to improve tenant performance by tailoring the network's behavior to tenant needs. Tenants may upgrade their provisioned portion of the network with specific features, such as multi-path routing, isolation, and failure recovery, without modifying hosted application code....

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Automatic Custom Instruction Identification in Memory Streaming Algorithms

    Application-Specific Instruction Set Processors (ASIPs) extend the instruction set of a general purpose processor by dedicated Custom Instructions (CIs). In the last decade, reconfigurable processors advanced this concept towards runtime reconfiguration to increase the efficiency and adaptivity. Compiler support for automatic identification and implementation of ASIP CIs exists commercially and...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    System-Level Memory Optimization for High-Level Synthesis of Component-Based SoCs

    The design of specialized accelerators is essential to the success of many modern systems-on-chip. Electronic system-level design methodologies and high-level synthesis tools are critical for the efficient design and optimization of an accelerator. Still, these methodologies and tools offer only limited support for the optimization of the memory structures, which...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Timing Analysis of Erroneous Systems

    Erroneous systems allow timing errors to occur during execution, but use measures to ensure continued operation through changes in operating parameters (voltage and frequency), error correction at various levels of the system, or ensuring controlled occurrence of errors to perform approximate computing. In this paper, the authors are interested in...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    SenseGlass: Using Google Glass to Sense Daily Emotions

    Emotions play a very important role in everyone's daily life. For over a century, scientists have studied human emotions in laboratory settings. However, these emotions have been largely contrived - elicited by movies or fake "Lab" stimuli, which tend not to matter to the participants in the studies, at least...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Measurement and Analysis of OSN Ad Auctions

    Advertising is ubiquitous on the web; numerous ad networks serve billions of ads daily via keyword or search term auctions. Recently, Online Social Networks (OSNs) such as Facebook have created site-specific ad services that differ from traditional ad networks by letting advertisers bid on users rather than keywords. With Facebook's...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Beyond CPM and CPC: Determining the Value of Users on OSNs

    Not all of the over one billion users of Online Social Networks (OSNs) are equally valuable to the OSNs. The current business model of monetizing advertisements targeted to users does not appear to be based on any visible grouping of the users. The primary metrics remain CPM (Cost Per Mille...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2011

    Energy Management in Mobile Devices With the Cinder Operating System

    The authors argue that controlling energy allocation is an increasingly useful and important feature for operating systems, especially on mobile devices. They present two new low-level abstractions in the Cinder operating system, reserves and taps, which store and distribute energy for application use. They identify three key properties of control...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2011

    Permission-Based Programming Languages (NIER Track)

    Linear permissions have been proposed as a lightweight way to specify how an object may be aliased, and whether those aliases allow mutation. Prior work has demonstrated the value of permissions for addressing many software engineering concerns, including information hiding, protocol checking, concurrency, security, and memory management. The authors propose...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2011

    Exploring Circuit Timing-Aware Languages and Compilation

    By adjusting the design of the ISA and enabling circuit timing-sensitive optimizations in a compiler, the authors can more effectively exploit timing speculation. While there has been growing interest in systems that leverage circuit-level timing speculation to improve the performance and power-efficiency of processors, most of the innovation has been...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2011

    Heat-Seeking Honeypots: Design and Experience

    Many malicious activities on the Web today make use of compromised Web servers, because these servers often have high pageranks and provide free resources. Attackers are therefore constantly searching for vulnerable servers. In this work, the authors aim to understand how attackers find, compromise, and misuse vulnerable servers. Specifically, they...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    Scribble: Closing the Book on Ad Hoc Documentation Tools

    Scribble is a system for writing library documentation, user guides, and tutorials. It builds on PLT Scheme's technology for language extension, and at its heart is a new approach to connecting prose references with library bindings. Besides the base system, the authors have built Scribble libraries for JavaDoc-style API documentation,...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    FAWN: A Fast Array of Wimpy Nodes

    This paper presents a new cluster architecture for low-power data-intensive computing. FAWN couples low-power embedded CPUs to small amounts of local flash storage, and balances computation and I/O capabilities to enable efficient, massively parallel access to data. The key contributions of this paper are the principles of the FAWN architecture...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2009

    Networking Named Content

    Network use has evolved to be dominated by content distribution and retrieval, while networking technology still speaks only of connections between hosts. Accessing content and services requires mapping from the what that users care about to the network's where. The authors present Content-Centric Networking (CCN) which treats content as a...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Typestate-Oriented Programming

    Objects model the world, and state is fundamental to a faithful modeling. Engineers use state machines to understand and reason about state transitions, but programming languages provide little support for reasoning about or implementing these state machines, causing software defects and lost productivity when objects are misused. The authors propose...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    A Case for Information-Bound Referencing

    Links and content references form the foundation of the way that users interact today. Unfortunately, the links used today (URLs) are fragile since they tightly specify a protocol, host, and filename. Some past efforts have decoupled this binding to a certain degree; e.g., creating links that bind to byte-level data....

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    C-Through: Part-Time Optics in Data Centers

    Data-intensive applications that operate on large volumes of data have motivated a fresh look at the design of data center networks. The first wave of proposals focused on designing pure packet-switched networks that provide full bisection bandwidth. However, these proposals significantly increase network complexity in terms of the number of...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    iTuned: A Tool for Configuring and Visualizing Database Parameters

    iTuned is a tool that takes a SQL workload as input and recommends good settings for database configuration parameters such as buffer pool sizes, multi-programming level, and number of I/O daemons. iTuned also provides response-surface and sensitivity analysis plots that help database users analyze the impact of each parameter. iTuned...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    DIADS: A Problem Diagnosis Tool for Databases and Storage Area Networks

    Many enterprise environments have databases running on network-attached storage infrastructure (referred to as Storage Area Networks or SANs). Both the database and the SAN are complex subsystems that are managed by separate teams of administrators. As often as not, database administrators have limited understanding of SAN configuration and behavior, and...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2011

    Inter-Core Prefetching for Multicore Processors Using Migrating Helper Threads

    Multicore processors have become ubiquitous in today's systems, but exploiting the parallelism they offer remains difficult, especially for legacy application and applications with large serial components. The challenge, then, is to develop techniques that allow multiple cores to work in concert to accelerate a single thread. This paper describes inter-core...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Managing the Cost, Energy Consumption, and Carbon Footprint of Internet Services

    The large amount of energy consumed by Internet services represents significant and fast-growing financial and environmental costs. This paper introduces a general, optimization-based framework and several request distribution policies that enable multi-data-center services to manage their brown energy consumption and leverage green energy, while respecting their Service-Level Agreements (SLAs) and...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2010

    MLeXAI: A Project-Based Application-Oriented Model

    The approach to teaching introductory Artificial Intelligence (AI) unifies its diverse core topics through a theme of machine learning, and emphasizes how AI relates more broadly with computer science. The work, funded by a grant from the National Science Foundation, involves the development, implementation, and testing of a suite of...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    Data Center TCP (DCTCP)

    Cloud data centers host diverse applications, mixing workloads that require small predictable latency with others requiring large sustained throughput. In this environment, today's state-of-the-art TCP protocol falls short. The authors present measurements of a 6000 server production cluster and reveal impairments that lead to high application latencies, rooted in TCP's...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Interaction-Based Programming Towards Translucent Clouds

    Today's cloud computing platforms are typically "Opaque": Amazon EC2 users only receive virtual units of CPU and memory, and physical details of the platform are hidden. Such opacity prevents programs from online optimizations and deployment adjustment, and is penalizing the very applications cloud computing attempts to attract: high-performance software. On...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2010

    Language-Based Verification Will Change the World

    Generations have passed since the early days of verification and formal methods, and one could be excused for thinking that the at-times acrimonious debate is over: Formal methods can provide strong guarantees about the functional correctness of software, some might concede, but they are too costly for mainstream use. If...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2010

    Resource Typing in Guru

    This paper presents a resource typing framework for the Guru verified-programming language, in which abstractions for various kinds of program resources can be defined. Implemented examples include reference-counted data, mutable arrays, and heap-allocated mutable aliased data. The approach enables efficient, type-safe programming with mutable and aliased data structures, with explicit...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    A Functional I/O System

    Functional programming languages ought to play a central role in mathematics education for middle schools. After all, functional programming is a form of algebra and programming is a creative activity about problem solving. Introducing it into mathematics courses would make pre-algebra course come alive. If input and output were invisible,...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Randomized Testing in PLT Redex

    This paper presents new support for randomized testing in PLT Redex, a domain-specific language for formalizing operational semantics. In keeping with the overall spirit of Redex, the testing support is as lightweight as possible Redex programmers simply write down predicates that correspond to facts about their calculus and the tool...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    Would a "Cyber Warrior" Protect Us? Exploring Trade-Offs Between Attack and Defense of Information Systems

    As information security shifts from the realm of computer science to national security, the priority for safe and secure systems will be balanced against the appeal of using information insecurity as a strategic asset. In "Cyber war", those tasked with defending friendly computer networks are also expected to exploit enemy...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Online Application Upgrade Using Edition-Based Redefinition

    Many database applications have a very High Availability (HA) requirement. Examples include electrical and telecommunication utility management systems. Those systems must be available all the time to manage the systems; for electrical utility system, it includes adjusting production, or energy trading. Another example is global customer support system for companies...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Efficient Systematic Testing for Dynamically Updatable Software

    Recent years have seen significant advances in Dynamic Software Updating (DSU) systems, which allow programs to be patched on the fly. However, a significant challenge remains: How can the authors ensure the act of applying a patch does not itself introduce errors? In this paper, they address this problem by...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Cooperative Update: A New Model for Dependable Live Update

    Many real-world systems require continuous operation. Downtime is ill-affordable and scheduling maintenance for regular software updates is a tremendous challenge for system administrators. For this reason, live update is a potential solution as it allows running software to be replaced by a newer version without stopping the system. The vast...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Migrating Protocols in Multi-Threaded Message-Passing Systems

    Dynamic software update is a technique by which a running program can be updated with new code and data without interrupting its execution. Often the authors will want to preserve properties of programs across update boundaries. Preserving simple typing across update boundaries for single-threaded programs is well studied. There are...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    On Performance of Delegation in Java

    Delegation is an important design concept in object-oriented languages. In contrast to inheritance, which relates classes to each other, delegation operates on the level of objects and thus provides more flexibility. It is well known, that usage of delegation imposes performance penalties in the sense of delayed execution. But delegation...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Dynamic Software Updates for Real-Time Systems

    Seamlessly updating software in running systems has recently gained momentum. Dynamically updating the software of real-time embedded systems, however, still poses numerous challenges: such systems must meet hard deadlines, cope with limited resources, and adhere to high safety standards. This paper presents a solution for updating component-based cyclic embedded systems...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Classifying Tags Using Open Content Resources

    Tagging has emerged as a popular means to annotate on-line objects such as bookmarks, photos and videos. Tags vary in semantic meaning and can describe different aspects of a media object. Tags describe the content of the media as well as locations, dates, people and other associated meta-data. Being able...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Clustering the Tagged Web

    Automatically clustering web pages into semantic groups promises improved search and browsing on the web. In this paper, the authors demonstrate how user-generated tags from large scale social bookmarking websites such as del.icio.us can be used as a complementary data source to page text and anchor text for improving automatic...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Tanagra: A Mixed-Initiative Level Design Tool

    Tanagra is a prototype mixed-initiative design tool for 2D plat-former level design, in which a human and computer can work together to produce a level. The human designer can place constraints on a continuously running level generator, in the form of exact geometry placement and manipulation of the level's pacing....

    Provided By Association for Computing Machinery

  • White Papers // May 2010

    Runtime Repair of Software Faults Using Event-Driven Monitoring

    In software with emergent properties, despite the best e orts to remove faults before execution, there is a high likelihood that faults will occur during runtime. These faults can lead to unacceptable program behavior during execution, even leading to the program terminating unexpectedly. Using a distributed event-driven runtime software-fault monitor...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Design Patterns in FPS Levels

    Level designers create gameplay through geometry, AI scripting, and item placement. There is little formal understanding of this process, but rather a large body of design lore and rules of thumb. As a result, there is no accepted common language for describing the building blocks of level design and the...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2010

    Activity Recognition Using Cell Phone Accelerometers

    Mobile devices are becoming increasingly sophisticated and the latest generation of smart cell phones now incorporates many diverse and powerful sensors. These sensors include GPS sensors, vision sensors (i.e., Cameras), audio sensors (i.e., Microphones), light sensors, temperature sensors, direction sensors (i.e., Magnetic compasses), and acceleration sensors (i.e., Accelerometers). The availability...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2010

    Spam Mitigation Using Spatio-Temporal Reputations From Blacklist History

    IP blacklists are a spam filtering tool employed by a large number of email providers. Centrally maintained and well regarded, blacklists can filter 80+% of spam without having to perform computationally expensive content-based filtering. However, spammers can vary which hosts send spam (Often in intelligent ways), and as a result,...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Sonifying Performance Data to Facilitate Tuning of Complex Systems

    In the modern computing landscape, the challenge of tuning software systems is exacerbated by the necessity to accommodate multiple divergent execution environments and stakeholders. Achieving optimal performance requires a different configuration for every combination of hardware setups and business requirements. In addition, the state of the art in system tuning...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    To Upgrade or Not to Upgrade

    Online software upgrades are often plagued by runtime behaviors that are poorly understood and difficult to ascertain. For example, the interactions among multiple versions of the software expose the system to race conditions that can introduce latent errors or data corruption. Moreover, industry trends suggest that online upgrades are currently...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    Expressive and Extensible Parameter Passing for Distributed Object Systems

    In modern distributed object systems, reference parameters to a remote method are passed ac-cording to their runtime type. This design choice limits the expressiveness, readability, and maintainability of distributed applications. Further, to extend the built-in set of parameter passing semantics of a distributed object system, the programmer has to understand...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2011

    PNFS/PVFS2 Over InfiniBand: Early Experiences

    The computing power of clusters has been rapidly growing up towards petascale capability, which requires petascale I/O systems to provide data in a sustained high-throughput manner. Network File System (NFS), a ubiquitous standard used in most existing clusters, has shown performance bottleneck associated with the single server model. pNFS, a...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    MSWAT: Low-Cost Hardware Fault Detection and Diagnosis for Multicore Systems

    Continued technology scaling is resulting in systems with billions of devices. Unfortunately, these devices are prone to failures from various sources, resulting in even commodity systems being affected by the growing reliability threat. Thus, traditional solutions involving high redundancy or piecemeal solutions targeting specific failure modes will no longer be...

    Provided By Association for Computing Machinery