Association for Computing Machinery

Displaying 121-160 of 6579 results

  • White Papers // Jun 2014

    Holistic Data Access Optimization for Analytics Reports

    Object-Relational Mappers (ORMs) enable single language access to both the main memory data and the database data of an application. Unfortunately, they also lead to performance inefficiencies, especially in analytics applications with information-rich reports involving nested and aggregated results over large data volumes. Past database research suggests that a report...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    SpareEye: Enhancing the Safety of Inattentionally Blind Smartphone Users

    Using mobile phones while walking for activities that require continuous focus on the screen, such as texting, has become more and more popular in the last years. To avoid colliding with obstacles, such as lampposts and pedestrians, focus has to be taken off the screen in regular intervals. In this...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Towards Fast Hardware Memory Integrity Checking with Skewed Merkle Trees

    Protection of a computer's memory's integrity is crucial in situations where physical attacks on the computer system are a threat. Such attacks can happen during physical break in into a data center or when a mobile device is lost or stolen. Since the memory modules can be easily removed or...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Memory Bandwidth Reservation in the Cloud to Avoid Information Leakage in the Memory Controller

    Multiple Virtual Machines (VMs) are typically co-scheduled on cloud servers. Each VM experiences different latencies when accessing shared resources, based on contention from other VMs. This introduces timing channels between VMs that can be exploited to launch attacks by an untrusted VM. This paper focuses on trying to eliminate the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Resource Allocation for Hardware Implementations of Map

    The map operation, in which a function is applied independently to each element in a collection to produce a new collection, appears in many settings and is easy to parallelize. While a straight-forward implementation in hardware will consist of multiple functional units with buffers to balance variable execution times, the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Activity-Edge Centric Multi-Label Classification for Mining Heterogeneous Information Networks

    Multi-label classification of heterogeneous information networks has received renewed attention in social network analysis. In this paper, the authors present an activity-edge centric multi-label classification framework for analyzing heterogeneous information networks with three unique features. First, they model a heterogeneous information network in terms of a collaboration graph and multiple...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Cascading Failures in Power Grids - Analysis and Algorithms

    In this paper, the authors focus on cascading line failures in the transmission system of the power grid. Recent large-scale power outages demonstrated the limitations of percolation- and epidemic-based tools in modeling cascades. Hence, they study cascades by using computational tools and a linearized power flow model. They first obtain...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Scaling Up Matrix Computations on Shared-Memory Manycore Systems with 1000 CPU Cores

    While the growing number of cores per chip allows researchers to solve larger scientific and engineering problems, the parallel efficiency of the deployed parallel software starts to decrease. This un-scalability problem happens to both vendor-provided and open-source software and wastes CPU cycles and energy. By expecting CPUs with hundreds of...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Revealing Applications' Access Pattern in Collective I/O for Cache Management

    Collective I/O is a critical I/O strategy on high-performance parallel computing systems that enables programmers to reveal parallel processes' I/O accesses collectively and makes possible for the parallel I/O middleware to carry out I/O requests in a highly efficient manner. Collective I/O has been proven as a core parallel I/O...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    A Framework for Enhancing Data Reuse via Associative Reordering

    The freedom to reorder computations involving associative operators has been widely recognized and exploited in designing parallel algorithms and to a more limited extent in optimizing compilers. In this paper, the authors develop a novel framework utilizing the associativity and commutativity of operations in regular loop computations to enhance register...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    VeriCon: Towards Verifying Controller Programs in Software-Defined Networks

    Software-Defined Networking (SDN) is a new paradigm for operating and managing computer networks. SDN enables logically centralized control over network devices through a \"Controller\" software that operates independently from the network hardware, and can be viewed as the network operating system. Network operators can run both in-house and third-party SDN...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    A Runtime Cloud Efficiency Software Quality Metric

    In this paper, the authors introduce the Cloud Efficiency (CE) metric, a novel runtime metric which assesses how effectively an application uses software-defined infrastructure. The CE metric is computed as the ratio of two functions: a benefit function which captures the current set of benefits derived from the application, and...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Performance Regression Testing Target Prioritization via Performance Risk Analysis

    As software evolves, problematic changes can significantly degrade software performance, i.e., introducing performance regression. Performance regression testing is an effective way to reveal such issues in early stages. Yet because of its high overhead, this activity is usually performed infrequently. Consequently, when performance regression issue is spotted at a certain...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Inductive Verification of Data Model Invariants for Web Applications

    Modern software applications store their data in remote cloud servers. Users interact with these applications using web browsers or thin clients running on mobile devices. A key issue in dependability of these applications is the correctness of the actions that update the data store, which are triggered by user requests....

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Cyber Defenses for Physical Attacks and Insider Threats in Cloud Computing

    In cloud computing, most of the computations and data in the data center do not belong to the cloud provider. This leaves owners of applications and data concerned about cyber and physical attacks which may compromise the confidentiality, integrity or availability of their applications or data. While much work has...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    PROSPECT: Peripheral Proxying Supported Embedded Code Testing

    Embedded systems are an integral part of almost every electronic product today. From consumer electronics to industrial components in SCADA systems, their possible fields of application are manifold. While especially in industrial and critical infrastructures the security requirements are high, recent publications have shown that embedded systems do not cope...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Shades of Gray: A Closer Look at Emails in the Gray Area

    Every day, millions of users spend a considerable amount of time browsing through the messages in their spam folders. With newsletters and automated notifications responsible for 42% of the messages in the user's inboxes, inevitably some important emails get misclassified as spam. Unfortunately, users are often unable to take security...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    On the Effectiveness of Risk Prediction Based on Users Browsing Behavior

    Users are typically the final target of web attacks: criminals are interested in stealing their money, their personal information, or in infecting their machines with malicious code. However, while many aspects of web attacks have been carefully studied by researchers and security companies, the reasons that make certain users more...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    On the Feasibility of Software Attacks on Commodity Virtual Machine Monitors via Direct Device Assignment

    The security of Virtual Machine Monitors (VMMs) is a challenging and active field of research. In particular, due to the increasing significance of hardware virtualization in cloud solutions, it is important to clearly understand existing and arising VMM-related threats. Unfortunately, there is still a lot of confusion around this topic...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    VirtualSwindle: An Automated Attack Against In-App Billing on Android

    "Since its introduction, Android's in-app billing service has quickly gained popularity. The in-app billing service allows users to pay for options, services, subscriptions, and virtual goods from within mobile apps themselves. In-app billing is attractive for developers because it is easy to integrate, and has the advantage that the developer...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Power-Performance Study of Block-Level Monolithic 3D-ICs Considering Inter-Tier Performance Variations

    In this paper, the authors study the power vs. performance tradeoff in block level monolithic 3D IC designs. Their study shows that they can close the power-performance gap between 2D and a theoretical lower bound by up to 50%. They model the inter-tier performance variations caused by a low temperature...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Fast and Accurate Thermal Modeling and Optimization for Monolithic 3D ICs

    In this paper, the authors present a comprehensive study of the unique thermal behavior in monolithic 3D ICs. In particular, they study the impact of the thin Inter-Layer Dielectric (ILD) between the device tiers on vertical thermal coupling. In addition, they develop a fast and accurate compact full-chip thermal analysis...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    On Enhancing Power Benefits in 3D ICs: Block Folding and Bonding Styles Perspective

    Low power is widely considered as a key benefit of 3D ICs, yet there have been few thorough design studies on how to maximize power benefits in 3D ICs. In this paper, the authors present design methodologies to reduce power consumption in 3D ICs using a large-scale commercial-grade microprocessor (OpenSPARCT2)....

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Flushing-Enabled Loop Pipelining for High-Level Synthesis

    Loop pipelining is a widely-accepted technique in high-level synthesis to enable pipelined execution of successive loop iterations to achieve high performance. Existing loop pipelining methods provide inadequate support for pipeline flushing. In this paper, the authors study the problem of enabling flushing in pipeline synthesis and examine its implications in...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    System-Level Security for Network Processors with Hardware Monitors

    New attacks are emerging that target the Internet infrastructure. Modern routers use programmable network processors that may be exploited by merely sending suitably crafted data packets into a network. Hardware monitors that are co-located with processor cores can detect attacks that change processor behavior with high probability. In this paper,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    SHiFA: System-Level Hierarchy in Run-Time Fault-Aware Management of Many-Core Systems

    A system-level approach to fault-aware resource management of many-core systems is proposed. The proposed approach, called SHiFA, is able to tolerate run-time faults at system level without any hardware overhead. In contrast to the existing system-level methods, network resources are also considered to be potentially faulty. Accordingly, applications are mapped...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    A Design Methodology for Compositional High-Level Synthesis of Communication-Centric SoCs

    Systems-on-chip are increasingly designed at the system level by combining synthesizable IP components that operate concurrently while interacting through communication channels. CAD-tool vendors support this system-level design approach with high-level synthesis tools and libraries of interface primitives implementing the communication protocols. These interfaces absorb timing differences in the hardware-component implementations,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Protecting SRAM-Based FPGAs Against Multiple Bit Upsets Using Erasure Codes

    Multiple bit upsets due to radiation-induced soft errors are a major concern in nanoscale technology nodes. Once such errors occur in the configuration frames of an FPGA device, they permanently affect the functionality of the mapped design. The combination of error correction schemes and configuration scrubbing is an efficient approach...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Autonomic Resource Provisioning for Cloud-Based Software

    Cloud elasticity provides a software system with the ability to maintain optimal user experience by automatically acquiring and releasing resources, while paying only for what has been consumed. The mechanism for automatically adding or removing resources on the fly is referred to as auto-scaling. The state-of-the practice with respect to...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    The Harvester, the Botmaster, and the Spammer: On the Relations Between the Different Actors in the Spam Landscape

    A spammer needs three elements to run a spam operation: a list of victim email addresses, content to be sent, and a botnet to send it. Each of these three elements are critical for the success of the spam operation: a good email list should be composed of valid email...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    ENORM: An Essential Notation for Object-Relational Mapping

    Despite the growing adoption of object-relational mapping frameworks, UML and its most widespread extensions do not represent these mappings in a platform independent way. Maintaining mappings scattered in the code is difficult and error prone, especially if the schema is large and serves several systems. This paper proposes ENORM, a...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Medusa: A Parallel Graph Processing System on Graphics Processors

    Medusa is a parallel graph processing system on Graphics Processing Units (GPUs). The core design of Medusa is to enable developers to leverage the massive parallelism and other hardware features of GPUs by writing sequential C/C++ code for a small set of APIs. This simplifies the implementation of parallel graph...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Locating Valid SLCAs for XML Keyword Search with NOT Semantics

    Keyword search provides an easy way for users to pose queries against XML documents and it is important to support queries with arbitrary combinations of AND, OR and NOT operators. The previous RELMN algorithm processed such kind of queries by extending the original SLCA (Smallest Lowest Common Ancestor) definition in...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Virtual Ways: Low-Cost Coherence for Instruction Set Extensions with Architecturally Visible Storage

    Instruction Set Extensions (ISEs) improve the performance and energy consumption of application-specific processors. ISEs can use Architecturally Visible Storage (AVS), localized compiler-controlled memories, to provide higher I/O bandwidth than reading data from the processor pipeline. AVS creates coherence and consistence problems with the data cache. Although a hardware coherence protocol...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    OCV-Aware Top-Level Clock Tree Optimization

    The clock trees of high-performance synchronous circuits have many clock logic cells (e.g., clock gating cells, multiplexers and dividers) in order to achieve aggressive clock gating and required performance across a wide range of operating modes and conditions. As a result, clock tree structures have become very complex and difficult...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    A New Methodology for Reduced Cost of Resilience

    Resilient design techniques are used to ensure correct operation under dynamic variations; and improve design performance (e.g., through timing speculation). However, significant overheads (e.g., 17% and 15% energy penalties due to throughput degradation and additional circuits) are incurred by existing resilient design techniques. For instance, resilient designs require additional circuits...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Horizontal Benchmark Extension for Improved Assessment of Physical CAD Research

    The rapid growth in complexity and diversity of IC designs, design flows and methodologies has resulted in a benchmark-centric culture for evaluation of performance and scalability in physical design algorithm research. Landmark papers in the literature present vertical benchmarks that can be used across multiple design flow stages; artificial benchmarks...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Generation of Reduced Analog Circuit Models Using Transient Simulation Traces

    The generation of fast models for device level circuit descriptions is a very active area of research. Model order reduction is an attractive technique for dynamical models size reduction. In this paper, the authors propose an approach based on clustering, curve-fitting, linearization and Krylov space projection to build reduced models...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    A Qualitative Simulation Approach for Verifying PLL Locking Property

    Simulation cannot give a full coverage of Phase Locked Loop (PLL) behavior in presence of process variation, jitter and varying initial conditions. Qualitative Simulation is an attracting method that computes behavior envelopes for dynamical systems over continuous ranges of their parameters. Therefore, this method can be employed to verify PLLs...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    A Semi-Formal Approach for Analog Circuits Behavioral Properties Verification

    The analog circuit design process is becoming very complex and therefore new verification approaches are very much needed. Simulation is the most used technique to compute the behavior of a circuit model. Statistical methods like Monte Carlo rely on repeating numerical simulations for a random sampling of parameters. The authors...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2010

    Q-Clouds: Managing Performance Interference Effects for QoS-Aware Clouds

    Cloud computing offers users the ability to access large pools of computational and storage resources on demand. Multiple commercial clouds already allow businesses to replace, or supplement, privately owned IT assets, alleviating them from the burden of managing and maintaining these facilities. However, there are issues that must be addressed...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Lessons Learned From Bluetooth/Wifi Scanning Deployment in University Campus

    This paper presents the detailed design and implementation of the joint Bluetooth Wi-Fi scanning framework called UIM1, which collects both location information and ad hoc contact of the human movement at the University of Illinois campus using Google Android phones. In particular, this paper present the architecture of UIM and...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    DiskReduce: RAID for Data-Intensive Scalable Computing

    Data-intensive file systems, developed for Internet services and popular in cloud computing, provide high reliability and availability by replicating data, typically three copies of everything. Alternatively high performance computing, which has comparable scale, and smaller scale enterprise storage systems get similar tolerance for multiple failures from lower overhead erasure encoding,...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    Identifying Query Incompatibilities With Evolving XML Schemas

    During the life cycle of an XML application, both schemas and queries may change from one version to another. Schema evolutions may affect query results and potentially the validity of produced data. Nowadays, a challenge is to assess and accommodate the impact of these changes in evolving XML applications. Such...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2010

    Expressiveness and Complexity of XML Schema

    The common abstraction of XML Schema by unranked regular tree languages is not entirely accurate. To shed some light on the actual expressive power of XML Schema, intuitive semantical characterizations of the Element Declarations Consistent (EDC) rule are provided. In particular, it is obtained that schemas satisfying EDC can only...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    Biometrics-Based Identifiers for Digital Identity Management

    This paper presents algorithms to reliably generate biometric identifiers from a user's biometric image which in turn is used for identity verification possibly in conjunction with cryptographic keys. The biometric identifier generation algorithms employ image hashing functions using singular value decomposition and support vector classification techniques. The algorithms capture generic...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2010

    Reliable Clinical Monitoring Using Wireless Sensor Networks: Experiences in a Step-Down Hospital Unit

    This paper presents the design, deployment, and empirical study of a wireless clinical monitoring system that collects pulse and oxygen saturation readings from patients. The primary contribution of this paper is an in-depth clinical trial that assesses the feasibility of wireless sensor networks for patient monitoring in general hospital units....

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    HadoopDB: An Architectural Hybrid of MapReduce and DBMS Technologies for Analytical Workloads

    The production environment for analytical data management applications is rapidly changing. Many enterprises are shifting away from deploying their analytical databases on high-end proprietary machines, and moving towards cheaper, lower-end, commodity hardware, typically arranged in a shared-nothing MPP architecture, often in a virtualized environment inside public or private "Clouds". At...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    A Demonstration of SciDB: A Science-Oriented DBMS

    In CIDR 2009, the authors presented a collection of requirements for SciDB, a DBMS that would meet the needs of scientific users. These included a nested-array data model, science-specific operations such as regrid, and support for uncertainty, lineage, and named versions. This paper presents an overview of SciDB's key features...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2010

    Building a Native XML-DBMS as a Term Project in a Database Systems Course

    A main goal of the paper was to convince the participants that systems research goes far beyond good programming. Students should get the opportunity to experience success in speeding up query evaluation by several orders of magnitude by using the techniques and algorithms taught in the course. Even though this...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2010

    Migration of Data Mining Preprocessing Into the DBMS

    Nowadays there is a significant amount of data mining work performed outside the DBMS. This paper discusses recommendations to push data mining analysis into the DBMS paying attention to data preprocessing i.e. data cleaning, summarization and transformation, which tends to be the most time-consuming task in data mining projects. This...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Adaptive Distributed Computing Middleware for Computational Finance Applications

    Parallel application programming is becoming increasingly important to researchers and developers who want to leverage hardware advances and compute complex calculations quickly and efficiently in competitive domains, such as financial services. Prior research has focused on high-performance computing and grid computing middleware to support the development of parallel applications. These...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    Not so Creepy Crawler: Easy Crawler Generation With Standard XML Queries

    Web crawlers are increasingly used for focused tasks such as the extraction of data from Wikipedia or the analysis of social networks like last.fm. In these cases, pages are far more uniformly structured than in the general Web and thus crawlers can use the structure of Web pages for more...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Brief Announcement: Locality-Based Aggregate Computation in Wireless Sensor Networks

    A wireless sensor network is abstracted as a connected undirected graph G(V,E) with all the sensor nodes as the set of vertices V, and all the bi-directional wireless communication links as the set of edges E. The total number of sensor nodes is n, i.e., |V | = n. This...

    Provided By Association for Computing Machinery

  • White Papers // May 2010

    A Data Security Protocol for the Trusted Truck System

    Security has become one of the major concerns in the context of Intelligent Transportation Systems (ITS). The Trusted Truck system provides an efficient wireless communication mechanism for safe exchange of messages between moving vehicles (Trucks) and roadside inspection stations. Vehicles and station are equipped with processing units but with different...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2010

    Towards Integrated Runtime Solutions in QoS Aware Middleware

    Future-generation multimedia applications are expected to be highly scalable to a wide variety of heterogeneous devices and highly available across wide-area distributed environments. This demands multiple stages of run-time support in QoS-aware middleware architectures, particularly, probing the performance of QoS parameters, instantiating the initial component configurations, and adapting to on-the-fly...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Message Models and Aggregation in Knowledge Based Middleware for Rich Sensor Systems

    Networked, distributed real world sensing is an increasingly prominent topic in computing and has quickly expanded from resource constrained "Sensor Networks" measuring simple values to "Sensor Webs" of heterogenous networks encompassing many types of services and hosts, processing a wide variety of data and media. This paper presents ongoing work...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    XML-Based RDF Data Management for Efficient Query Processing

    The Semantic Web, which represents a web of knowledge, offers new opportunities to search for knowledge and information. To harvest such search power requires robust and scalable data repositories that can store RDF data and support efficient evaluation of SPARQL queries. Most of the existing RDF storage techniques rely on...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    cs219/ee202b Project Report ESP Framework :: A Middleware Architecture for Heterogeneous Sensor Networks

    Sensor networks are quickly becoming flexible, inexpensive, and reliable platform to provide solutions for a wide variety of applications in real-world settings. For instance, sensor systems have been used for medical monitoring, detection and classification for defense purposes, and to per-form environmental monitoring. The increase in the proliferation of sensor...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2009

    XML Data Management and XPath Evaluation in Wireless Sensor Networks

    XML is the defacto standard for data exchange applications like those in the WWW. However, due to the limited hardware resources, wireless sensor networks abstain from using verbose data formats like XML. Nevertheless, XML as a standardized data exchange format in wireless sensor networks is a means to support more...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Framework Based Development and Evaluation of Cost Based Native XML Query Optimization Techniques

    Reflecting on the history of database management systems reveals that cost-based query optimization has been the dominating method for effectively answering complex queries on large documents. Native XML database management systems provide an efficient infrastructure for storing, indexing, and querying large XML documents. Even though such systems can choose from...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2009

    Lightweight Tracing for Wireless Sensor Networks Debugging

    Wireless Sensor Networks(WSNs) are being increasingly deployed in the real world to monitor the environment and large industrial infrastructures. The extreme resource constraints inherent to WSNs, the in situ deployment in harsh environments and the lack of run-time support tools make debugging and maintaining WSN applications very challenging. In particular,...

    Provided By Association for Computing Machinery

  • White Papers // May 2010

    Joint Bluetooth/Wifi Scanning Framework for Characterizing and Leveraging People Movement on University Campus

    Collecting the real human movement has drawn significant attention from research community since a better understanding of human movement could provide new insights in network protocol design and network management for wireless networks. However, previous projects have only collected either location trace or the ad hoc contact trace. A comprehensive...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2010

    Enabling Java for High-Performance Computing: Exploiting Distributed Shared Memory and Remote Method Invocation

    Java has become increasingly popular as a general-purpose programming language. Current Java implementations mainly focus on portability and interoperability, which is required for Internet-centric client/server computing. Key to Java's success is its intermediate "Bytecode" representation that can be exchanged and executed by Java Virtual Machines (JVMs) on almost any computing...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Anonymous Credentials on a Standard Java Card

    Secure identity tokens such as Electronic IDentity (elD) cards are emerging everywhere. At the same time user-centric identity management gains acceptance. Anonymous credential schemes are the optimal realization of user centricity. However, on inexpensive hardware platforms, typically used for elD cards, these schemes could not be made to meet the...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    QoS-Aware Channel Scheduling for Multi-Radio/Multi-Channel Wireless Mesh Networks

    In non-static multi-radio/multi-channel wireless mesh networks architectures such as Net-X, mesh nodes need to switch channels in order to communicate with different neighbors. Present channel schedulers do not consider the requirements of real time traffic such as voice over IP. Thus the resulting quality is low. Authors propose a novel...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    OctoMag: An Electromagnetic System for 5-DOF Wireless Micromanipulation

    Authors demonstrate five-Degree-Of-Freedom (5-DOF) wireless magnetic control of a fully untethered microrobot (3- DOF position, 2-DOF pointing orientation). The microrobot can move through a large workspace, and is completely unrestrained in the rotation degrees of freedom. They accomplish this level of wireless control with an electromagnetic system that authors call...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    Aggregate Queries for Discrete and Continuous Probabilistic XML

    Sources of data uncertainty and imprecision are numerous. A way to handle this uncertainty is to associate probabilistic annotations to data. Many such probabilistic database models have been proposed, both in the relational and in the semi-structured setting. The latter is particularly well adapted to the management of uncertain data...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2009

    SCARAB: A Single Cycle Adaptive Routing and Bufferless Network

    As technology scaling drives the number of processor cores upward, current on-chip routers consume substantial portions of chip area and power budgets. Since existing research has greatly reduced router latency overheads and capitalized on available on-chip bandwidth, power constraints dominate interconnection network design. Recently research has proposed bufferless routers as...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Order Matters: Transmission Reordering in Wireless Networks

    Modern wireless interfaces support a physical layer capability called Message in Message (MIM). Briefly, MIM allows a receiver to disengage from an ongoing reception, and engage onto a stronger incoming signal. Links that otherwise conflict with each other, can be made concurrent with MIM. However, the concurrency is not immediate,...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    MODA: Automated Test Generation for Database Applications Via Mock Objects

    Software testing has been commonly used in assuring the quality of database applications. It is often prohibitively expensive to manually write quality tests for complex database applications. Automated test generation techniques, such as Dynamic Symbolic Execution (DSE), have been proposed to reduce human efforts in testing database applications. However, such...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    Improving the Requirements Process by Visualizing End-User Documents as Tag Clouds

    The process of requirements gathering has been a much-discussed subject in computer science for years. It seems difficult to incorporate end-users in this process. Although there have been numerous papers devoted to this problem, it remains unsolved. The paper proposes to ease this process by describing tools and methods to...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2010

    Tool Support for Code Generation From a UMLsec Property

    Security requirements can be made explicit on the design level, such as annotations on a UML model. UMLsec extends UML to allow one to express security properties on a model, but it is still the developer's responsibility to implement the code that will actually enforce those properties. This process can...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2009

    Enhanced Wireless Roaming Security Using Three-Party Authentication and Tunnels

    Many organizations and many home users have deployed WiFi networks permitting external users to connect to the Internet through their networks. Such WiFi sharing poses many security risks for the visited network as well as for the visiting user. This paper focuses on the recently introduced concept for tunneled WiFi...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Fast Networking With Socket-Outsourcing in Hosted Virtual Machine Environments

    This paper proposes a novel method of achieving fast networking in hosted Virtual Machine (VM) environments. This method, called socket-outsourcing, replaces the socket layer in a guest Operating System (OS) with the socket layer of the host OS. Socket-outsourcing increases network performance by eliminating duplicate message copying in both the...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2010

    Privacy-Preserving Outsourcing Support Vector Machines With Random Transformation

    Outsourcing the training of Support Vector Machines (SVM) to external service providers benefits the data owner who is not familiar with the techniques of the SVM or has limited computing resources. In outsourcing, the data privacy is a critical issue for some legal or commercial reasons since there may be...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2010

    Alibi Framework for Identifying Reactive Jamming Nodes in Wireless LAN

    Reactive jamming nodes are the nodes of the network that get compromised and become the source of jamming attacks. They assume to know any shared secrets and protocols used in the networks. Thus, they can jam very effectively and are very stealthy. This paper proposes a novel approach to identifying...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    Multi-Focal Learning and Its Application to Customer Service Support

    In this paper, the authors formalize a multi-focal learning problem, where training data are partitioned into several different focal groups and the prediction model will be learned within each focal group. The multi-focal learning problem is motivated by numerous real-world learning applications. For instance, for the same type of problems...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2010

    Energy-Efficient Storage in Virtual Machine Environments

    Current trends in increasing storage capacity and virtualization of resources combined with the need for energy efficiency put a challenging task in front of system designers. Previous studies have suggested many approaches to reduce hard disk energy dissipation in native OS environments; however, those mechanisms do not perform well in...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    A Business Driven Cloud Optimization Architecture

    This paper discusses several facets of optimization in cloud computing, the corresponding challenges and propose an architecture for addressing those challenges. The paper considers a layered cloud where various cloud layers virtualize parts of the cloud infrastructure. The architecture takes into account different stakeholders in the cloud (infrastructure providers, platform...

    Provided By Association for Computing Machinery