Association for Computing Machinery

Displaying 201-240 of 6867 results

  • White Papers // Nov 2013

    Exposing and Mitigating Privacy Loss in Crowdsourced Survey Platforms

    Academic and market researchers are increasingly using online platforms for crowd-sourcing survey information from online users. Crowd-sourcing platforms such as Amazon mechanical turk and Google consumer surveys can profile users based on their inputs to online surveys. In this paper the authors first demonstrate how easily user privacy can be...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Distributed Privacy-Preserving Transparency Logging

    The authors present a transparency-enhancing tool in the form of a cryptographic scheme that enables data processors to inform users about the actual data processing that takes place on their personal data. Their proposed solution can handle arbitrary processes while offloading storage and interactions with users to dedicated log servers....

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Using Naive Bayes to Detect Spammy Names in Social Networks

    Many social networks are predicated on the assumption that a member's online information reflects his or her real identity. In such networks, members who fill their name fields with fictitious identities, company names, phone numbers, or just gibberish are violating the terms of service, polluting search results, and degrading the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Optimal Sporadic Location Privacy Preserving Systems in Presence of Bandwidth Constraints

    Various Location Privacy-Preserving Mechanisms (LPPMs) have been proposed in the literature to address the privacy risks derived from the exposure of user locations through the use of Location Based Services (LBSs). LPPMs obfuscate the locations disclosed to the LBS provider using a variety of strategies, which come at a cost...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Bias-Based Modeling and Entropy Analysis of PUFs

    Physical Unclonable Functions (PUFs) are increasingly becoming a well-known security primitive for secure key storage and anti-counterfeiting. For both applications it is imperative that PUFs provide enough entropy. This paper is to propose a new model for binary-output PUFs such as SRAM, DFF, Latch and buskeeper PUFs, and a method...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    On the Limits of Provable Anonymity

    The authors study provably secure anonymity. They begin with rigorous definition of anonymity against wide range of computationally bounded attackers, including eavesdroppers, malicious peers, malicious destinations, and their combinations. Their definition is generic, and captures different notions of anonymity (e.g., un-observability and sender anonymity). They then study the feasibility of...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Exploring Storage Class Memory with Key Value Stores

    In the near future, new Storage-Class Memory (SCM) technologies - such as phase-change memory and memristors - will radically change the nature of long-term storage. These devices will be cheap, non-volatile, byte addressable, and near DRAM density and speed. While SCM offers enormous opportunities, profiting from them will require new...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    InTune: Coordinating Multicore Islands to Achieve Global Policy Objectives

    Multicore platforms are moving from small numbers of homogeneous cores to 'Scale out' designs with multiple tiles or 'Islands' of cores residing on a single chip, each with different resources and potentially controlled by their own resource managers. Applications running on such machines, however, operate across multiple such resource islands,...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Consistent, Durable, and Safe Memory Management for Byte-Addressable Non Volatile Main Memory

    In this paper, the authors present three building blocks for enabling the efficient and safe design of persistent data stores for emerging non-volatile memory technologies. Taking the fullest advantage of the low latency and high bandwidths of emerging memories such as Phase Change Memory (PCM), spin torque, and memristor necessitates...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    An Untold Story of Redundant Clouds: Making Your Service Deployment Truly Reliable

    To enhance the reliability of cloud services, many application providers leverage multiple cloud providers for redundancy. Unfortunately, such techniques fail to recognize that seemingly independent redundant clouds may share third-party infrastructure components, e.g., power sources and Internet routers, which could potentially undermine this redundancy. This paper presents iRec, a cloud...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Bankshot: Caching Slow Storage in Fast Non-Volatile Memory

    Emerging non-volatile storage (e.g., phase change memory and STTRAM) allow access to persistent data at latencies an order of magnitude lower than SSDs. The density and price gap between NVMs and denser storage make NVM economically most suitable as a cache for larger, more conventional storage (i.e., NAND flash-based SSDs...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Fast Dynamic Binary Translation for the Kernel

    Dynamic Binary Translation (DBT) is a powerful technique with several important applications. System-level binary translators have been used for implementing a virtual machine monitor and for instrumentation in the OS kernel. In current designs, the performance overhead of binary translation on kernel-intensive workloads is high. e.g., over 10x slowdowns were...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Disinformation Techniques for Entity Resolution

    The authors study the problem of disinformation. They assume that an \"Agent\" has some sensitive information that the \"Adversary\" is trying to obtain. For example, a camera company (the agent) may secretly be developing its new camera model, and a user (the adversary) may want to know in advance the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Consumer-Centric SLA Manager for Cloud-Hosted Databases

    The authors present an end-to-end framework for consumer-centric SLA management of virtualized database servers. The framework facilitates adaptive and dynamic provisioning of the database tier of the software applications based on application-defined policies for satisfying their own SLA performance requirements, avoiding the cost of any SLA violation and controlling the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    A Two-Phase Algorithm for Mining Sequential Patterns with Differential Privacy

    Frequent sequential pattern mining is a central task in many fields such as biology and finance. However, release of these patterns is raising increasing concerns on individual privacy. In this paper, the authors study the sequential pattern mining problem under the differential privacy framework which provides formal and provable guarantees...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    UNIK: Unsupervised Social Network Spam Detection

    Social network spam increases explosively with the rapid development and wide usage of various social networks on the Internet. To timely detect spam in large social network sites, it is desirable to discover unsupervised schemes that can save the training cost of supervised schemes. In this paper, the authors first...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Feedback-Driven Multiclass Active Learning for Data Streams

    Active learning is a promising way to efficiently build up training sets with minimal supervision. Most existing methods consider the learning problem in a pool-based setting. However, in a lot of real-world learning tasks, such as crowd-sourcing, the unlabeled samples arrive sequentially in the form of continuous rapid streams. Thus,...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Automated Generation of Polyhedral Process Networks from Affine Nested-Loop Programs with Dynamic Loop Bounds

    The Process Networks (PNs) is a suitable parallel Model of Computation (MoC) used to specify embedded streaming applications in a parallel form facilitating the efficient mapping onto embedded parallel execution platforms. Unfortunately, specifying an application using a parallel MoC is a very difficult and highly error-prone task. To overcome the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    A System-Level Infrastructure for Multidimensional MP-SoC Design Space Co-Exploration

    In this paper, the authors present a flexible and extensible system-level MP-SoC Design Space Exploration (DSE) infrastructure, called NASA. This highly modular framework uses well-defined interfaces to easily integrate different system-level simulation tools as well as different combinations of search strategies in a simple plug-and-play fashion. Moreover, NASA deploys a...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Content Coverage Maximization on Word Networks for Hierarchical Topic Summarization

    In this paper, the authors explain about the text summarization by extracting hierarchical topics from a given collection of documents. They propose a new approach of text modeling via network analysis. They convert documents into a word influence network, and find the words summarizing the major topics with an efficient...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Fine-Grained Privacy Control for the RFID Middleware of EPCglobal Networks

    The Electronic Product Code (EPC) is a Radio Frequency IDentification (RFID) that offers a new way of automating identification. However, once RFID tags carry more than just an identifier, privacy may be violated. Treating the privacy in early stages helps to master the data view before interpreting and storing it...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Bottle Graphs: Visualizing Scalability Bottlenecks in Multi-Threaded Applications

    Understanding and analyzing multi-threaded program performance and scalability is far from trivial, which severely complicates parallel software development and optimization. In this paper, the authors present bottle graphs, a powerful analysis tool that visualizes multi-threaded program performance, in regards to both per-thread parallelism and execution time. Each thread is represented...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Language Support for Dynamic, Hierarchical Data Partitioning

    Applications written for distributed-memory parallel architectures must partition their data to enable parallel execution. As memory hierarchies become deeper, it is increasingly necessary that the data partitioning also be hierarchical to match. Current language proposals perform this hierarchical partitioning statically, which excludes many important applications where the appropriate partitioning is...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    ProtOLAP: Rapid OLAP Prototyping with On-Demand Data Supply

    The approaches to data warehouse design are based on the assumption that source data are known in advance and available. While this assumption is true in common project situations, in some peculiar contexts it is not. This is the case of the French national project for analysis of energetic agricultural...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Scap: Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks

    Many network monitoring applications must analyze traffic beyond the network layer to allow for connection-oriented analysis, and achieve resilience to evasion attempts based on TCP segmentation. However, existing network traffic capture frameworks provide applications with just raw packets, and leave complex operations like flow tracking and TCP stream reassembly to...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    GamingAnywhere: An Open-Source Cloud Gaming Testbed

    While cloud gaming opens new business opportunity, it also poses tremendous challenges as the Internet only provides best-effort service and gamers are hard to please. Although researchers have various ideas to improve cloud gaming systems, existing cloud gaming systems are closed and proprietary, and cannot be used to evaluate these...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Choreo: Network-Aware Task Placement for Cloud Applications

    Cloud computing infrastructures are increasingly being used by network-intensive applications that transfer significant amounts of data between the nodes on which they run. This paper shows that tenants can do a better job placing applications by understanding the underlying cloud network as well as the demands of the applications. To...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Benchmarking Personal Cloud Storage

    Personal cloud storage services are data-intensive applications already producing a significant share of Internet traffic. Several solutions offered by different companies attract more and more people. However, little is known about each service capabilities, architecture and - most of all - performance implications of design choices. This paper presents a...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Next Stop, the Cloud: Understanding Modern Web Service Deployment in EC2 and Azure

    An increasingly large fraction of internet services are hosted on a cloud computing system such as Amazon EC2 or windows Azure. But to date, no in-depth studies about cloud usage by internet services has been performed. The authors provide a detailed measurement study to shed light on how modern web...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Access Privacy and Correctness on Untrusted Storage

    The authors introduce a new practical mechanism for remote data storage with access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted reads, writes, and inserts to a potentially curious and malicious storage service provider, without revealing information or access patterns. The provider is unable...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Network Sampling: From Static to Streaming Graphs

    Network sampling is integral to the analysis of social, information, and biological networks. Since many real-world networks are massive in size, continuously evolving, and/or distributed in nature, the network structure is often sampled in order to facilitate study. For these reasons, a more thorough and complete understanding of network sampling...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    DICE: Monitoring Global Invariants with Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) enable decentralized architectures to monitor the behavior of physical processes and to detect deviations from a specified \"Safe\" behavior, e.g., to check the operation of control loops. Such correct behavior is typically expressed by global invariants over the state of different sensors or actuators. Nevertheless, to...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Energy-Aware Design of Secure Multi-Mode Real-Time Embedded Systems with FPGA Co-Processors

    The authors approach the emerging area of energy efficient, secure real-time embedded systems design. Many modern embedded systems have to fulfill strict security constraints and are often required to meet stringent deadlines in different operation modes, where the number and nature of active tasks vary (dynamic task sets). In this...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Meta-Stars: Multidimensional Modeling for Social Business Intelligence

    Social business intelligence is the discipline of combining corporate data with User-Generated Content (UGC) to let decision-makers improve their business based on the trends perceived from the environment. A key role in the analysis of textual UGC is played by topics, meant as specific concepts of interest within a subject...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    SigMal: A Static Signal Processing Based Malware Triage

    In this paper, the authors propose SigMal, a fast and precise malware detection framework based on signal processing techniques. SigMal is designed to operate with systems that process large amounts of binary samples. It has been observed that many samples received by such systems are variants of previously seen malware,...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    A Mapping-Scheduling Algorithm for Hardware Acceleration on Reconfigurable Platforms

    Reconfigurable platforms are a promising technology that offers an interesting trade-off between flexibility and performance, which many recent embedded system applications demand, especially in fields such as multimedia processing. These applications typically involve multiple ad-hoc tasks for hardware acceleration, which are usually represented using formalisms such as Data Flow Diagrams...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    MyCloud - Supporting User-Configured Privacy Protection in Cloud Computing

    Privacy concern is still one of the major issues that prevent users from moving to public clouds. The root cause of the privacy problem is that the cloud provider has more privileges than it is necessary, which leaves no options for the cloud users to protect their privacy. Due to...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Design of an Active Storage Cluster File System for DAG Workflows

    The last decade has seen rise of new scalable cluster file systems used for storing scientific data and for enabling executing tasks on this data. In fact, creating large storage clusters using commodity hardware has never been easier. Hadoop is perhaps the most popular open source implementation of a scalable...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Detecting Cloud Provisioning Errors Using an Annotated Process Model

    In this paper, the authors demonstrate the feasibility of annotating a process model with assertions to detect errors in cloud provisioning in near real time. Their proposed workflow is: construct a process model of the desired provisioning activities using log data, use the process model to determine appropriate annotation triggers...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Chip-Multiprocessor Hardware Locks for Safety-Critical Java

    Accessing shared resources in multicore systems are usually protected by a software locking mechanism, which itself is implemented through atomic operations. This paper can result in a large synchronization overhead, which, in the context of real-time systems, increases the worst-case execution time and may void a task set's schedulability. In...

    Provided By Association for Computing Machinery

  • White Papers // May 2010

    Class Properties for Security Review in an Object-Capability Subset of Java

    In designing code for security review, it is helpful to make it easy to characterize the properties of objects in a program. A sufficiently rich type system can help with this goal: programmers can document the properties of objects through annotations on their types, and an appropriately constructed static code...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2009

    Bit Vector Algorithms Enabling High-Speed and Memory-Efficient Firewall Blacklisting

    In a world of increasing Internet connectivity coupled with increasing computer security risks, security conscious network applications implementing blacklisting technology are becoming very prevalent because it provides the ability to prevent information exchange from known malicious sources. Current technology implementing blacklisting does so at the application level. However, there are...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    Weaver: Integrating Distributed Computing Abstractions Into Scientific Workflows Using Python

    Weaver is a high-level framework that enables researchers to integrate distributed computing abstractions into their scientific workflows. Rather than develop a new workflow language, the authors built Weaver on top of the Python programming language. As such, Weaver takes advantage of users' familiarity with Python, minimizes barriers to adoption, and...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2011

    A Capacity Planning Process for Performance Assurance of Component-Based Distributed Systems

    For service providers of multi-tiered component-based applications, such as web portals, assuring high performance and availability to their customers without impacting revenue requires effective and careful capacity planning that aims at minimizing the number of resources, and utilizing them efficiently while simultaneously supporting a large customer base and meeting their...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Scalable and Systematic Detection of Buggy Inconsistencies in Source Code

    Software developers often duplicate source code to replicate functionality. This practice can hinder the maintenance of a software project: bugs may arise when two identical code segments are edited inconsistently. This paper presents a highly scalable system for detecting these general syntactic inconsistency bugs. The operates in two phases. Given...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2010

    A Study of the Uniqueness of Source Code

    This paper presents the results of the first study of the uniqueness of source code. The authors define the uniqueness of a unit of source code with respect to the entire body of written software, which they approximate with a corpus of 420 million lines of source code. The high-level...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2010

    Perturbing Numerical Calculations for Statistical Analysis of Floating-Point Program (In)Stability

    Writing reliable software is difficult. It becomes even more difficult when writing scientific software involving floating-point numbers. Computers provide numbers with limited precision; when confronted with a real whose precision exceeds that limit, they introduce approximation and error. Numerical analysts have developed sophisticated mathematical techniques for performing error and stability...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2010

    Automatic Detection of Unsafe Component Loadings

    Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is critical for reliable and secure software execution, however, programming mistakes may lead to unintended or even malicious components to be resolved and loaded. In particular, dynamic...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Translation Caching: Skip, Don't Walk (the Page Table)

    This paper explores the design space of MMU caches that accelerate virtual-to-physical address translation in processor architectures, such as x86-64, that use a radix tree page table. In particular, these caches accelerate the page table walk that occurs after a miss in the Translation Lookaside Buffer. This paper shows that...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2009

    An Experience Report on the Design and Delivery of Two New Software Design Courses

    In this paper, the authors report on the experience in designing and delivering two new software design courses in the Informatics major at UC Irvine. When the major was created in 2004, it explicitly contained slots for two software design courses to be created from the ground up. The authors...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2009

    Multi-Site Evaluation of SimSE

    In this paper, the authors describe a multi-site evaluation of SimSE, an educational software engineering simulation game. This study was designed to build on the previous experience of evaluating SimSE in courses and controlled lab settings at UC Irvine, in order to validate the findings and discover any factors that...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2008

    Empirical Evidence of the Benefits of Workspace Awareness in Software Configuration Management

    In this paper, the authors present results from the empirical evaluations of a workspace awareness tool that they designed and implemented to augment the functionality of software configuration management systems. Particularly, they performed two user experiments directed at understanding the effectiveness of a workspace awareness tool in improving coordination and...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2011

    PNFS/PVFS2 Over InfiniBand: Early Experiences

    The computing power of clusters has been rapidly growing up towards petascale capability, which requires petascale I/O systems to provide data in a sustained high-throughput manner. Network File System (NFS), a ubiquitous standard used in most existing clusters, has shown performance bottleneck associated with the single server model. pNFS, a...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    Expressive and Extensible Parameter Passing for Distributed Object Systems

    In modern distributed object systems, reference parameters to a remote method are passed ac-cording to their runtime type. This design choice limits the expressiveness, readability, and maintainability of distributed applications. Further, to extend the built-in set of parameter passing semantics of a distributed object system, the programmer has to understand...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Language Design for Distributed Objects

    The fundamental ideas of distributed objects have changed little in the last 20 years. Existing languages are retrofitted with transparent distribution mechanisms based on proxies. Experiments with mobile code demonstrate its power but have little impact on practice. The problems with transparency and mobile code have been well known since...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    MSWAT: Low-Cost Hardware Fault Detection and Diagnosis for Multicore Systems

    Continued technology scaling is resulting in systems with billions of devices. Unfortunately, these devices are prone to failures from various sources, resulting in even commodity systems being affected by the growing reliability threat. Thus, traditional solutions involving high redundancy or piecemeal solutions targeting specific failure modes will no longer be...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2009

    Low-Cost Hardware Fault Detection and Diagnosis for Multicore Systems

    Continued technology scaling is resulting in systems with billions of devices. Consequently, these devices are prone to failures from various sources resulting in a growing reliability threat. As this reliability problem is expected to affect the broad computing market, traditional solutions involving high redundancy, or piecemeal solutions targeting specific failure...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Google Fusion Tables: Web-Centered Data Management and Collaboration

    It has long been observed that database management systems focus on traditional business applications, and that few people use a database management system outside their workplace. Many have wondered what it will take to enable the use of data management technology by a broader class of users and for a...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Lazy-Adaptive Tree: An Optimized Index Structure for Flash Devices

    In this paper, the authors present the Lazy-Adaptive Tree (LATree), a novel index structure that is designed to minimize accesses to flash, thereby minimizing response time. The LA-tree has three key contributions: it amortizes the cost of node reads and writes by performing update operations in a lazy manner using...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2009

    Finding Canonical Behaviors in User Protocols

    While the collection of behavioral protocols has been common practice in human-computer interaction research for many years, the analysis of large protocol data sets is often extremely tedious and time-consuming, and automated analysis methods have been slow to develop. This paper proposes an automated method of protocol analysis to find...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2009

    Looking Into the Past to Better Classify Web Spam

    Web spamming techniques aim to achieve undeserved rankings in search results. Research has been widely conducted on identifying such spam and neutralizing its influence. However, existing spam detection work only considers current information. The authors argue that historical web page information may also be important in spam classification. In this...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2009

    A Study of Link Farm Distribution and Evolution Using a Time Series of Web Snapshots

    In this paper, the authors study the overall link-based spam structure and its evolution which would be helpful for the development of robust analysis tools and research for Web spamming as a social activity in the cyber space. First, the authors use Strongly Connected Component (SCC) decomposition to separate many...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2009

    An Empirical Study on Selective Sampling in Active Learning for Splog Detection

    This paper studies how to reduce the amount of human supervision for identifying splogs / authentic blogs in the context of continuously updating splog data sets year by year. Following the previous works on active learning, against the task of splog / authentic blog detection, this paper empirically examines several...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Classifying Tags Using Open Content Resources

    Tagging has emerged as a popular means to annotate on-line objects such as bookmarks, photos and videos. Tags vary in semantic meaning and can describe different aspects of a media object. Tags describe the content of the media as well as locations, dates, people and other associated meta-data. Being able...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Clustering the Tagged Web

    Automatically clustering web pages into semantic groups promises improved search and browsing on the web. In this paper, the authors demonstrate how user-generated tags from large scale social bookmarking websites such as del.icio.us can be used as a complementary data source to page text and anchor text for improving automatic...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2011

    Integrating Linked Open Data with Unstructured Text for Intelligence Gathering Tasks

    The authors present techniques for uncovering links between terror incidents, organizations, and people involved with these incidents. The methods involve performing shallow NLP tasks to extract entities of interest from documents and using linguistic pattern matching and filtering techniques to assign specific relations to the entities discovered. They also gather...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Eliminating False Phase Interactions to Reduce Optimization Phase Order Search Space

    Compiler optimization phase ordering is a longstanding problem, and is of particular relevance to the performance-oriented and cost-constrained domain of embedded systems applications. Optimization phases are known to interact with each other, enabling and disabling opportunities for successive phases. Therefore, varying the order of applying these phases often generates distinct...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2010

    Context-Sensitive Analysis of Obfuscated X86 Executables

    A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipulate stack instead of using native call and ret instructions to achieve equivalent behavior. Since definition of context-sensitivity and algorithms for context-sensitive analysis have thus...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    IDEA: Integrated Distributed Energy Awareness for Wireless Sensor Networks

    Energy in sensor networks is a distributed, non-transferable resource. Over time, differences in energy availability are likely to arise. Protocols like routing trees may concentrate energy usage at certain nodes. Differences in energy harvesting arising from environmental variations, such as if one node is in the sun and another is...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2008

    Lance: Optimizing High-Resolution Signal Collection in Wireless Sensor Networks

    An emerging class of sensor networks focuses on reliable collection of high-resolution signals from across the network. In these applications, the system is capable of acquiring more data than can be delivered to the base station, due to severe limits on radio bandwidth and energy. Moreover, these systems are unable...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Tanagra: A Mixed-Initiative Level Design Tool

    Tanagra is a prototype mixed-initiative design tool for 2D plat-former level design, in which a human and computer can work together to produce a level. The human designer can place constraints on a continuously running level generator, in the form of exact geometry placement and manipulation of the level's pacing....

    Provided By Association for Computing Machinery

  • White Papers // May 2010

    Runtime Repair of Software Faults Using Event-Driven Monitoring

    In software with emergent properties, despite the best e orts to remove faults before execution, there is a high likelihood that faults will occur during runtime. These faults can lead to unacceptable program behavior during execution, even leading to the program terminating unexpectedly. Using a distributed event-driven runtime software-fault monitor...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Design Patterns in FPS Levels

    Level designers create gameplay through geometry, AI scripting, and item placement. There is little formal understanding of this process, but rather a large body of design lore and rules of thumb. As a result, there is no accepted common language for describing the building blocks of level design and the...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2011

    Finding and Understanding Bugs in C Compilers

    Compilers should be correct. To improve the quality of C compilers, the authors created Csmith, a randomized test-case generation tool, and spent three years using it to find compiler bugs. During this period they reported more than 325 previously unknown bugs to compiler developers. Every compiler they tested was found...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    T-Check: Bug Finding for Sensor Networks

    Sensor nodes are resource poor and failure-prone. Sensor networks are composed of many such nodes that are often hard to physically reach and that are connected by unreliable wireless links. Together, these factors make sensor network debugging into a challenging activity, and in fact it is not uncommon for a...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Eliminating the Call Stack to Save RAM

    Most programming languages support a call stack in the programming model and also in the runtime system. The authors show that for applications targeting low-power embedded microcontrollers (MCUs), RAM usage can be significantly decreased by partially or completely eliminating the runtime callstack. They present flattening, a transformation that absorbs a...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2009

    A New Approach to Secure Logging

    The need for secure logging is well-understood by the security professionals, including both re-searchers and practitioners. The ability to efficiently verify all (or some) log entries is important to any application employing secure logging techniques. In this paper, the authors begin by examining state-of-the-art in secure logging and identify some...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2008

    Hardware-Accelerated RNA Secondary-Structure Alignment

    The search for homologous RNA molecules - sequences of RNA that might behave similarly due to similarity in their physical (secondary) structure - is currently a computationally intensive task. Moreover, RNA sequences are populating genome databases at a pace unmatched by gains in standard processor performance. While software tools such...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2009

    Extending the Effectiveness of 3D-Stacked DRAM Caches With an Adaptive Multi-Queue Policy

    3D-integration is a promising technology to help combat the "MemoryWall" in future multi-core processors. Past work has considered using 3D-stacked DRAM as a large last-level cache (LLC). While significant performance benefits can be gained with such an approach, there remain additional opportunities beyond the simple integration of commodity DRAM chips....

    Provided By Association for Computing Machinery

  • White Papers // Mar 2011

    Capping the Electricity Cost of Cloud-Scale Data Centers With Impacts on Power Markets

    In this paper, the authors propose a novel electricity cost capping algorithm that not only minimizes the electricity cost of operating cloud-scale data centers, but also enforces a cost budget on the monthly electricity bill. The solution first explicitly models the impacts of power demands on electricity prices and the...

    Provided By Association for Computing Machinery