Association for Computing Machinery

Displaying 81-120 of 6704 results

  • White Papers // Jun 2014

    Sinew: A SQL System for Multi-Structured Data

    As applications are becoming increasingly dynamic, the notion that a schema can be created in advance for an application and remain relatively stable is becoming increasingly unrealistic. This has pushed application developers away from traditional relational database systems and away from the SQL interface, despite their many well-established benefits. Instead,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    CrowdFill: Collecting Structured Data from the Crowd

    The authors present CrowdFill, a system for collecting structured data from the crowd. While a typical microtask-based approach would pose specific questions to each worker and assemble the answers, Crowd-Fill shows a partially-filled table to all participating workers. Workers contribute by filling in empty cells, as well as upvoting and...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Domino: An Incremental Computing Framework in Cloud with Eventual Synchronization

    In recent years, more and more applications in cloud have needed to process large-scale online data sets that evolve over time as entries are added or modified. Several programming frameworks, such as percolator and oolong, are proposed for such incremental data processing and can achieve efficient updates with an event-driven...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Computation and Communication Efficient Graph Processing with Distributed Immutable View

    Cyclops is a new vertex-oriented graph-parallel framework for writing distributed graph analytics. Unlike existing distributed graph computation models, cyclops retains simplicity and computation-efficiency by synchronously computing over a distributed immutable view, which grants a vertex with read-only access to all its neighboring vertices. The view is provided via read-only replication...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Explainable Security for Relational Databases

    Companies and organizations collect and use vast troves of sensitive user data whose release must be carefully controlled. In practice, the access policies that govern this data are often fine-grained, complex, poorly documented, and difficult to reason about. As a result, principals frequently request and are granted access to data...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    InsightNotes: Summary-Based Annotation Management in Relational Databases

    In this paper, the authors address the challenges that arise from the growing scale of annotations in scientific databases. On one hand, end-users and scientists are incapable of analyzing and extracting knowledge from the large number of reported annotations, e.g., one tuple may have hundreds of annotations attached to it...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    One DBMS for all: the Brawny Few and the Wimpy Crowd

    Shipments of smartphones and tablets with wimpy CPUs are outpacing brawny PC and server shipments by an ever increasing margin. While high performance database systems have traditionally been optimized for brawny systems, wimpy systems have received only little attention; leading to poor performance and energy inefficiency on such systems. This...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Device Drivers Should Not Do Power Management

    The authors argue that device drivers are not the best place to implement power management policies for components on a System-on-Chip (SoC). They present empirical evidence that device driver developers are inadequately implementing power management and show the information needed for good power management policies is available outside the device...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Draining our Glass: An Energy and Heat Characterization of Google Glass

    The Google Glass is a mobile device designed to be worn as eyeglasses. This form factor enables new use cases, such as hands-free video chat and web search. However, its shape also hampers its potential: battery size, and therefore lifetime, is limited by a need for the device to be...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Accessing Multiple Clouds with Cloudmesh

    The authors present the design of a toolkit that can be employed by users and administrators to manage virtual machines on multi-cloud environments. It can be run by individual users or offered as a service to a shared user community. They have practically demonstrated its use as part of a...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Self Managing Monitoring for Highly Elastic Large Scale Cloud Deployments

    Infrastructure as a service computing exhibits a number of properties, which are not found in conventional server deployments. Elasticity is among the most significant of these properties which has wide reaching implications for applications deployed in cloud hosted VMs. Among the applications a affected by elasticity is monitoring. In this...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Heterogeneity-Conscious Parallel Query Execution: Getting a Better Mileage while Driving Faster

    Physical and thermal restrictions hinder commensurate performance gains from the ever increasing transistor density. While multi-core scaling helped alleviate dimmed or dark silicon for some time, future processors will need to become more heterogeneous. To this end, single Instruction Set Architecture (ISA) heterogeneous processors are a particularly interesting solution that...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Infinite CacheFlow in Software-Defined Networks

    Software-Defined Networking (SDN) enables ne-grained policies for firewalls, load balancers, routers, traffic monitoring, and other functionality. While Ternary Content Address-able Memory (TCAM) enables OpenFlow switches to process packets at high speed based on multiple header fields, today's commodity switches support just thousands to tens of thousands of rules. To realize...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Rio: A System Solution for Sharing I/O Between Mobile Systems

    Mobile systems are equipped with a diverse collection of I/O devices, including cameras, microphones, sensors, and modems. There exist many novel use cases for allowing an application on one mobile system to utilize I/O devices from another. This paper presents Rio, an I/O sharing solution that supports unmodified applications and...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    SpareEye: Enhancing the Safety of Inattentionally Blind Smartphone Users

    Using mobile phones while walking for activities that require continuous focus on the screen, such as texting, has become more and more popular in the last years. To avoid colliding with obstacles, such as lampposts and pedestrians, focus has to be taken off the screen in regular intervals. In this...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Holistic Data Access Optimization for Analytics Reports

    Object-Relational Mappers (ORMs) enable single language access to both the main memory data and the database data of an application. Unfortunately, they also lead to performance inefficiencies, especially in analytics applications with information-rich reports involving nested and aggregated results over large data volumes. Past database research suggests that a report...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Memory Bandwidth Reservation in the Cloud to Avoid Information Leakage in the Memory Controller

    Multiple Virtual Machines (VMs) are typically co-scheduled on cloud servers. Each VM experiences different latencies when accessing shared resources, based on contention from other VMs. This introduces timing channels between VMs that can be exploited to launch attacks by an untrusted VM. This paper focuses on trying to eliminate the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Resource Allocation for Hardware Implementations of Map

    The map operation, in which a function is applied independently to each element in a collection to produce a new collection, appears in many settings and is easy to parallelize. While a straight-forward implementation in hardware will consist of multiple functional units with buffers to balance variable execution times, the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Activity-Edge Centric Multi-Label Classification for Mining Heterogeneous Information Networks

    Multi-label classification of heterogeneous information networks has received renewed attention in social network analysis. In this paper, the authors present an activity-edge centric multi-label classification framework for analyzing heterogeneous information networks with three unique features. First, they model a heterogeneous information network in terms of a collaboration graph and multiple...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Cascading Failures in Power Grids - Analysis and Algorithms

    In this paper, the authors focus on cascading line failures in the transmission system of the power grid. Recent large-scale power outages demonstrated the limitations of percolation- and epidemic-based tools in modeling cascades. Hence, they study cascades by using computational tools and a linearized power flow model. They first obtain...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Scaling Up Matrix Computations on Shared-Memory Manycore Systems with 1000 CPU Cores

    While the growing number of cores per chip allows researchers to solve larger scientific and engineering problems, the parallel efficiency of the deployed parallel software starts to decrease. This un-scalability problem happens to both vendor-provided and open-source software and wastes CPU cycles and energy. By expecting CPUs with hundreds of...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Revealing Applications' Access Pattern in Collective I/O for Cache Management

    Collective I/O is a critical I/O strategy on high-performance parallel computing systems that enables programmers to reveal parallel processes' I/O accesses collectively and makes possible for the parallel I/O middleware to carry out I/O requests in a highly efficient manner. Collective I/O has been proven as a core parallel I/O...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    A Framework for Enhancing Data Reuse via Associative Reordering

    The freedom to reorder computations involving associative operators has been widely recognized and exploited in designing parallel algorithms and to a more limited extent in optimizing compilers. In this paper, the authors develop a novel framework utilizing the associativity and commutativity of operations in regular loop computations to enhance register...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    VeriCon: Towards Verifying Controller Programs in Software-Defined Networks

    Software-Defined Networking (SDN) is a new paradigm for operating and managing computer networks. SDN enables logically centralized control over network devices through a \"Controller\" software that operates independently from the network hardware, and can be viewed as the network operating system. Network operators can run both in-house and third-party SDN...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    A Runtime Cloud Efficiency Software Quality Metric

    In this paper, the authors introduce the Cloud Efficiency (CE) metric, a novel runtime metric which assesses how effectively an application uses software-defined infrastructure. The CE metric is computed as the ratio of two functions: a benefit function which captures the current set of benefits derived from the application, and...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Performance Regression Testing Target Prioritization via Performance Risk Analysis

    As software evolves, problematic changes can significantly degrade software performance, i.e., introducing performance regression. Performance regression testing is an effective way to reveal such issues in early stages. Yet because of its high overhead, this activity is usually performed infrequently. Consequently, when performance regression issue is spotted at a certain...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Inductive Verification of Data Model Invariants for Web Applications

    Modern software applications store their data in remote cloud servers. Users interact with these applications using web browsers or thin clients running on mobile devices. A key issue in dependability of these applications is the correctness of the actions that update the data store, which are triggered by user requests....

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    PROSPECT: Peripheral Proxying Supported Embedded Code Testing

    Embedded systems are an integral part of almost every electronic product today. From consumer electronics to industrial components in SCADA systems, their possible fields of application are manifold. While especially in industrial and critical infrastructures the security requirements are high, recent publications have shown that embedded systems do not cope...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Shades of Gray: A Closer Look at Emails in the Gray Area

    Every day, millions of users spend a considerable amount of time browsing through the messages in their spam folders. With newsletters and automated notifications responsible for 42% of the messages in the user's inboxes, inevitably some important emails get misclassified as spam. Unfortunately, users are often unable to take security...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    On the Effectiveness of Risk Prediction Based on Users Browsing Behavior

    Users are typically the final target of web attacks: criminals are interested in stealing their money, their personal information, or in infecting their machines with malicious code. However, while many aspects of web attacks have been carefully studied by researchers and security companies, the reasons that make certain users more...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    On the Feasibility of Software Attacks on Commodity Virtual Machine Monitors via Direct Device Assignment

    The security of Virtual Machine Monitors (VMMs) is a challenging and active field of research. In particular, due to the increasing significance of hardware virtualization in cloud solutions, it is important to clearly understand existing and arising VMM-related threats. Unfortunately, there is still a lot of confusion around this topic...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    VirtualSwindle: An Automated Attack Against In-App Billing on Android

    "Since its introduction, Android's in-app billing service has quickly gained popularity. The in-app billing service allows users to pay for options, services, subscriptions, and virtual goods from within mobile apps themselves. In-app billing is attractive for developers because it is easy to integrate, and has the advantage that the developer...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    System-Level Security for Network Processors with Hardware Monitors

    New attacks are emerging that target the Internet infrastructure. Modern routers use programmable network processors that may be exploited by merely sending suitably crafted data packets into a network. Hardware monitors that are co-located with processor cores can detect attacks that change processor behavior with high probability. In this paper,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    SHiFA: System-Level Hierarchy in Run-Time Fault-Aware Management of Many-Core Systems

    A system-level approach to fault-aware resource management of many-core systems is proposed. The proposed approach, called SHiFA, is able to tolerate run-time faults at system level without any hardware overhead. In contrast to the existing system-level methods, network resources are also considered to be potentially faulty. Accordingly, applications are mapped...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    A Design Methodology for Compositional High-Level Synthesis of Communication-Centric SoCs

    Systems-on-chip are increasingly designed at the system level by combining synthesizable IP components that operate concurrently while interacting through communication channels. CAD-tool vendors support this system-level design approach with high-level synthesis tools and libraries of interface primitives implementing the communication protocols. These interfaces absorb timing differences in the hardware-component implementations,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Protecting SRAM-Based FPGAs Against Multiple Bit Upsets Using Erasure Codes

    Multiple bit upsets due to radiation-induced soft errors are a major concern in nanoscale technology nodes. Once such errors occur in the configuration frames of an FPGA device, they permanently affect the functionality of the mapped design. The combination of error correction schemes and configuration scrubbing is an efficient approach...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Autonomic Resource Provisioning for Cloud-Based Software

    Cloud elasticity provides a software system with the ability to maintain optimal user experience by automatically acquiring and releasing resources, while paying only for what has been consumed. The mechanism for automatically adding or removing resources on the fly is referred to as auto-scaling. The state-of-the practice with respect to...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    The Harvester, the Botmaster, and the Spammer: On the Relations Between the Different Actors in the Spam Landscape

    A spammer needs three elements to run a spam operation: a list of victim email addresses, content to be sent, and a botnet to send it. Each of these three elements are critical for the success of the spam operation: a good email list should be composed of valid email...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    ENORM: An Essential Notation for Object-Relational Mapping

    Despite the growing adoption of object-relational mapping frameworks, UML and its most widespread extensions do not represent these mappings in a platform independent way. Maintaining mappings scattered in the code is difficult and error prone, especially if the schema is large and serves several systems. This paper proposes ENORM, a...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Medusa: A Parallel Graph Processing System on Graphics Processors

    Medusa is a parallel graph processing system on Graphics Processing Units (GPUs). The core design of Medusa is to enable developers to leverage the massive parallelism and other hardware features of GPUs by writing sequential C/C++ code for a small set of APIs. This simplifies the implementation of parallel graph...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Detailed Diagnosis of Performance Anomalies in Sensornets

    This paper addresses the problem of analysing performance anomalies in sensor networks. This paper proposes an approach that uses the local flash storage of the motes for logging system data, in combination with online statistical analysis. The results show not only that this is a feasible method but that the...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    Debugging Standard Document Formats

    The paper presents a tool for helping XML schema designers to obtain a high quality level for their specifications. The tool allows one to analyze relations between classes of XML documents and formally prove them. For instance, the tool can be used to check forward and backward compatibilities of recommendations....

    Provided By Association for Computing Machinery

  • White Papers // Aug 2010

    Heapviz: Interactive Heap Visualization for Program Understanding and Debugging

    Understanding the data structures in a program is crucial to understanding how the program works, or why it doesn't work. Inspecting the code that implements the data structures, however, is an arduous task and often fails to yield insights into the global organization of a program's data. Inspecting the actual...

    Provided By Association for Computing Machinery

  • White Papers // May 2010

    BPGen: An Automated Breakpoint Generator for Debugging

    During debugging processes, breakpoints are frequently used to inspect and understand runtime behaviors of programs. Although most development environments offer convenient breakpoint facilities, the use of these environments usually requires considerable human e orts in order to generate useful breakpoints. Before setting breakpoints or typing break-point conditions, developers usually have...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2010

    A Visual Interactive Debugger Based on Symbolic Execution

    The paper presents the concepts, usage, and prototypic implementation of a new kind of visual debugging tool based on symbolic execution of Java source code called visual symbolic state debugger. It allows to start debugging of source code at any code location without the need to write a fixture as...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Debugging in the (Very) Large: Ten Years of Implementation and Experience

    Windows Error Reporting (WER) is a distributed system that automates the processing of error reports coming from an installed base of a billion machines. WER has collected billions of error reports in ten years of operation. It collects error data automatically and classifies errors into buckets, which are used to...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    Helios: A Hybrid Electrical/Optical Switch Architecture for Modular Data Centers

    The basic building block of ever larger data centers has shifted from a rack to a modular container with hundreds or even thousands of servers. Delivering scalable bandwidth among such containers is a challenge. A number of recent efforts promise full bisection bandwidth between all servers, though with significant cost,...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2010

    How Green is IP-Telephony?

    With constantly increasing costs of energy, authors ask themselves what they can say about the energy efficiency of existing VoIP systems. To answer that question, authors gather information about the existing client-server and peer-to-peer VoIP systems, build energy models for these systems, and evaluate their power consumption and relative energy...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Market Design & Analysis for a P2P Backup System

    This paper presents the design and theoretical analysis of a P2P resource exchange market, a novel application of markets to the domain of P2P backup. While the long-term goal is an open market using real money, here the paper considers a system where monetary transfers are prohibited. The paper first...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Unified Telecom and Web Services Composition: Problem Definition and Future Directions

    In the domain of web applications, the Service-Oriented Architecture (SOA) promotes the composition of coarse-grained web services to build more complex web applications using standards such as WS-BPEL. This paradigm encourages software modularity and re-use, language and platform independence, distributions, and integration across enterprise boundaries. At the same time, in...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2010

    On-Line Consistent Backup in Transactional File Systems

    A consistent backup, preserving data integrity across files in a file system, is of utmost importance for the purpose of correctness and minimizing system downtime during the process of data recovery. With the present day demand for continuous access to data, backup has to be taken of an active file...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Automating Database Schema Evolution in Information System Upgrades

    The complexity, cost, and down-time currently created by the database schema evolution process is the source of incessant problems in the life of information systems and a major stumbling block that prevent graceful upgrades. Furthermore, the studies shows that the serious problems encountered by traditional information systems are now further...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    What Would Other Programmers Do?: Suggesting Solutions to Error Messages

    Interpreting compiler errors and exception messages is challenging for novice programmers. Presenting examples of how other programmers have corrected similar errors may help novices understand and correct such errors. This paper introduces HelpMeOut, a social recommender system that aids the debugging of error messages by suggesting solutions that peers have...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2010

    capDL: A Language for Describing Capability-Based Systems

    Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the security provided by such systems it is necessary to verify that their capability distributions do in fact fulfill requirements relating to...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    Dynamic and Graphical Web Page Breakpoints

    Breakpoints are perhaps the quintessential feature of a de-bugger: they allow a developer to stop time and study the program state. Breakpoints are typically specified by selecting a line of source code. For large, complex, web pages with multiple developers, the relevant source line for a given user interface problem...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Opportunities for Concurrent Dynamic Analysis With Explicit Inter-Core Communication

    Multicore is now the dominant processor trend, and the number of cores is rapidly increasing. The paradigm shift to multicore forces the redesign of the software stack, which includes dynamic analysis. Dynamic analyses provide rich features to software in various areas, such as debugging, testing, optimization, and security. However, these...

    Provided By Association for Computing Machinery

  • White Papers // May 2010

    Digging Into UML Models to Remove Performance Antipatterns

    Performance antipatterns have been informally defined and characterized as bad practices in software design that can originate performance problems. Such special type of patterns can involve static and dynamic aspects of software as well as deployment features. It has been shown that quite often the inability to meet performance requirements...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Preserving Privacy and Fairness in Peer-to-Peer Data Integration

    Peer-to-peer data integration - a.k.a. Peer Data Management Systems (PDMSs) - promises to extend the classical data integration approach to the Internet scale. Unfortunately, some challenges remain before realizing this promise. One of the biggest challenges is preserving the privacy of the exchanged data while passing through several intermediate peers....

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    The Benefits of the Interaction Between Data Warehouses and Question Answering

    Business Intelligence (BI) applications allow their users to query, understand, and analyze existing data within their organizations in order to acquire useful knowledge, thus making better decisions. The core of BI applications is a Data Warehouse (DW) which integrates several heterogeneous data sources, mainly structured transactional databases. However, a new...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    Model Driven Development of Secure XML Data Warehouses: A Case Study

    Data Warehouses (DWs) are currently considered to be the cornerstone of Business Intelligence (BI) systems. Security is a key issue in DWs since the business information that they manage is crucial and highly sensitive, and should be carefully protected. However, the increasing amount of data available on the Web signifies...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Using IM and SMS for Emergency Text Communications

    Currently, text communication cannot be used to ask for help in emergency situations. Even in the Next Generation 9-1-1 system, an IP/SIP-based emergency communication system, there has been no investigation into how text communications such as Instant Messaging (IM) and Short Message Service (SMS) can be integrated. The authors identify...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    SMS-Based Contextual Web Search

    SMS-based web search is different from traditional web search in that the final response to a search query is limited to a very small number of bytes typically 1-2 SMS messages, 140 bytes each. SMS-based web search is also a non-interactive search problem where the user has to specify a...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    The Cat Is Out of the Bag: Cortical Simulations With 109 Neurons, 1013 Synapses

    In the quest for cognitive computing, the authors have built a massively parallel cortical simulator, C2, which incorporates a number of innovations in computation, memory, and communication. Using C2 on LLNL's Dawn Blue Gene/P supercomputer with 147; 456 CPUs and 144 TB of main memory, the authors report two cortical...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Active GSM Cell-ID Tracking: "Where Did You Disappear?"

    Location-based services are mobile network applications of growing importance and variability. The space of location technologies and applications has not yet been fully explored, perhaps omitting some important practical uses. In this work the authors present the prototype SS7Tracker platform, an active, non-intrusive, GSM Cell-ID-based solution to network-based location tracking,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    An Intra-Chip Free-Space Optical Interconnect

    Continued device scaling enables microprocessors and other Systems-on-Chip (SoCs) to increase their performance, functionality, and hence, complexity. Simultaneously, relentless scaling, if uncompensated, degrades the performance and signal integrity of on-chip metal interconnects. These systems have therefore become increasingly communications-limited. The communications-centric nature of future high performance computing devices demands a...

    Provided By Association for Computing Machinery

  • White Papers // May 2010

    Impact of Home Networks on End-to-End Performance: Controlled Experiments

    This paper performs controlled experiments to analyze the performance of home networks. The authors show that the home network has a significant impact on end-to-end performance. For example, watching TV can double the time to download a file; and deploying a wireless network significantly increases round-trip times. Despite its impact...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    Exploring the Suitability of 60GHz Radio for Building In-Home Networks

    60GHz radio technology is highly promising since it can offer multi-Gbps data rate for short range wireless communication. Hence it is able to support in-home wireless multimedia applications such as high-definition video streaming, ultra high speed content downloads, etc. Hitherto, the main research efforts have been on 60GHz physical layer...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    UbiPay: Minimizing Transaction Costs With Smart Mobile Payments

    Implementing an electronic payment system involves striking a balance between usability and security. Systems that allow payments to be completed with little effort on the part of the consumer, such as smart cards, carry a higher probability of incorrect payments. Systems that eliminate the possibility of incorrect payments by requiring...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2009

    HAIR: Hierarchical Architecture for Internet Routing

    In the light of recent interest in re-designing the Internet, authors introduce HAIR, a routing architecture that tackles the problem of routing table growth, restricts the visibility of routing updates, and inherently supports traffic engineering, mobility, and multipath. HAIR separates locators from identifiers. The routing and mapping system rely on...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2010

    Scalable Network Virtualization Using FPGAs

    Recent virtual network implementations have shown the capability to implement multiple network data planes using a shared hardware substrate. In this project, a new scalable virtual networking data plane is demonstrated which combines the performance efficiency of FPGA hardware with the flexibility of software running on a commodity PC. Multiple...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2010

    A Scalable, Robust Network for Parallel Computing

    CX, a network-based computational exchange, is presented. The system's design integrates variations of ideas from other researchers, such as work stealing, non-blocking tasks, eager scheduling, and space-based coordination. The object-oriented API is simple, compact, and cleanly separates application logic from the logic that supports interprocess communication and fault tolerance. Computations,...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    Sharing Conversation and Sharing Life: Video Conferencing in the Home

    Video conferencing is a technology that families and friends use to connect with each other over distance. However, even with such technology readily available, one still does not have a good understanding of how video conferencing systems are used by people as a part of their domestic communication practices. For...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    mFerio: The Design and Evaluation of a Peer-to-Peer Mobile Payment System

    In this paper, authors present the design and evaluation of a near-field communication-based mobile p2p payment application, called mFerio that is designed to replace cash-based transactions. Authors first identify design criteria that payment systems should satisfy and then explain how mFerio, relative to those criteria, improves on the limitations of...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    ODBIS: Towards a Platform for On-Demand Business Intelligence Services

    Off late, Software-as-a-Service (SaaS) is gaining momentum with more and more successful adoptions. Several companies including some well known names have embraced this new model for software distribution. This paper present ODBIS, an open source infrastructure to build and deliver On-Demand Business Intelligence Services. The ODBIS platform constitutes a future...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2009

    An Architecture for Network Management

    As is becoming increasingly understood, in extending the Internet architecture into the future, network management is a key challenge. The current approach has been to provide a set of weakly integrated tools to network managers of each enterprise or other network. This paper argued the position that a single architecture...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    OneBusAway: Results From Providing Real-Time Arrival Information for Public Transit

    Public transit systems play an important role in combating traffic congestion, reducing carbon emissions, and promoting compact, sustainable urban communities. The usability of public transit can be significantly enhanced by providing good traveler information systems. The paper describes OneBus-Away, a set of transit tools focused on providing real-time arrival information...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    Test-First Java Concurrency for the Classroom

    Concurrent programming is becoming more important due to the growing dominance of multi-core processors and the prevalence of Graphical User Interfaces (GUIs). To prepare students for the concurrent future, instructors have begun to address concurrency earlier in their curricula. Unfortunately, test-driven development, which enables students and practitioners to quickly develop...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google Talk, and MSN Messenger

    VoIP playout buffer dimensioning has long been a challenging optimization problem, as the buffer size must maintain a balance between conversational interactivity and speech quality. The conversational quality may be affected by a number of factors, some of which may change over time. Although a great deal of research effort...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Making Microsoft Excel Accessible: Multimodal Presentation of Charts

    Several solutions, based on aural and haptic feedback, have been developed to enable access to complex on-line information for people with visual impairments. Nevertheless, there are several components of widely used software applications that are still beyond the reach of screen readers and Braille displays. This paper investigates the non-visual...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Fusing Data Management Services With File Systems

    File systems are the backbone of large-scale data processing for scientific applications. Motivated by the need to provide an extensible and flexible framework beyond the abstractions provided by API libraries for files to manage and analyze large-scale data, the authors' are developing Damasc, an enhanced file system where rich data...

    Provided By Association for Computing Machinery