Association for Computing Machinery

Displaying 201-240 of 7141 results

  • White Papers // Oct 2013

    Design of an Active Storage Cluster File System for DAG Workflows

    The last decade has seen rise of new scalable cluster file systems used for storing scientific data and for enabling executing tasks on this data. In fact, creating large storage clusters using commodity hardware has never been easier. Hadoop is perhaps the most popular open source implementation of a scalable...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Detecting Cloud Provisioning Errors Using an Annotated Process Model

    In this paper, the authors demonstrate the feasibility of annotating a process model with assertions to detect errors in cloud provisioning in near real time. Their proposed workflow is: construct a process model of the desired provisioning activities using log data, use the process model to determine appropriate annotation triggers...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Chip-Multiprocessor Hardware Locks for Safety-Critical Java

    Accessing shared resources in multicore systems are usually protected by a software locking mechanism, which itself is implemented through atomic operations. This paper can result in a large synchronization overhead, which, in the context of real-time systems, increases the worst-case execution time and may void a task set's schedulability. In...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    SafeSlinger: Easy-to-Use and Secure Public-Key Exchange

    Users regularly experience a crisis of confidence on the internet. Is that email or instant message truly originating from the claimed individual? Such doubts are commonly resolved through a leap of faith, expressing the desperation and helplessness of users. To establish a secure basis for online communication, the authors propose...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    vTube: Efficient Streaming of Virtual Appliances Over Last-Mile Networks

    Cloud-sourced Virtual Appliances (VAs) have been touted as powerful solutions for many software maintenance, mobility, backward compatibility, and security challenges. In this paper, the authors ask whether it is possible to create a VA cloud service that supports fluid, interactive user experience even over mobile networks. More specifically, they wish...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Hierarchical Scheduling for Diverse Datacenter Workloads

    There has been a recent industrial effort to develop multi-resource hierarchical schedulers. However, the existing implementations have some shortcomings in that they might leave resources unallocated or starve certain jobs. This is because the multi-resource setting introduces new challenges for hierarchical scheduling policies. The authors provide an algorithm, which they...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Memory Footprint Matters: Efficient Equi-Join Algorithms for Main Memory Data Processing

    High-performance analytical data processing systems often run on servers with large amounts of main memory. A common operation in such environments is combining data from two or more sources using some \"Join\" algorithm. The focus of this paper is on studying hash-based and sort-based equi-join algorithms when the data sets...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    FAST: Near Real-time Data Analytics for the Cloud

    Existing cloud storage systems have largely failed to offer an adequate capability for real-time data analytics. Since, the true value of data heavily depends on how efficiently data analytics can be carried out on the data in (near-) real-time, large fractions of data unfortunately end up with their values being...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    VMShadow: Optimizing the Performance of Latency-Sensitive Virtual Desktops in Distributed Clouds

    Distributed clouds offer a choice of data center locations to application providers to host their applications. In this paper the authors consider distributed clouds that host virtual desktops which are then accessed by their users through remote desktop protocols. They argue that virtual desktops that run latency-sensitive applications such as...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Software Support for Atomicity and Persistence in Non-Volatile Memory

    This paper examines the use of byte-addressable persistent memory as a replacement for traditional non-volatile storage in emerging data management applications. Advances in memory technology are promising the availability of byte-addressable persistent memory as an integral component of future computing platforms. This change has significant implications for software that has...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Combined Modeling and Side Channel Attacks on Strong PUFs

    Physical Unclonable Functions (PUFs) have established themselves in the scientific literature, and are also gaining ground in commercial applications. Recently, however, several attacks on PUF core properties have been reported. They concern their physical and digital unclonability, as well as their assumed resilience against invasive or side channel attacks. In...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Methods for Fault Tolerance in Networks-on-Chip

    Networks-on-Chip (NoC) constitute the interconnection architecture of future, massively parallel multiprocessors that assemble hundreds to thousands of processing cores on a single chip. Their integration is enabled by ongoing miniaturization of chip manufacturing technologies following Moore's Law. It comes with the downside of the circuit elements' increased susceptibility to failure....

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Adaptive Virtual Channel Partitioning for Network-on-Chip in Heterogeneous Architectures

    Current heterogeneous Chip Multi-Processors (CMPs) integrate a GPU architecture on a die. However, the heterogeneity of this architecture inevitably exerts different pressures on shared resource management due to differing characteristics of CPU and GPU cores. The authors consider how to efficiently share on-chip resources between cores within the heterogeneous system,...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    Interest-Based Cloud-Facilitated Opportunistic Networking

    Opportunistic networking requires timely discovery of locally available peers with an incentive to communicate, i.e., that share an interest in an application or content. To over-come the absence of mobile OS support for incorporation of interests in peer discovery, the authors propose ICON, an integrated mobile cloud solution that discovers...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    Actor Scheduling for Multicore Hierarchical Memory Platforms

    Erlang applications are present in several mission-critical systems. These systems demand substantial computing resources that are usually provided by multiprocessor and multi-core platforms. Hierarchical memory platforms, or Non-Uniform Memory Access (NUMA) architectures, account for an important share of these platforms. Yet, the research on the suitability of the current Virtual...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    Typed Syntactic Meta-Programming

    The authors present a novel set of meta-programming primitives for use in a dependently-typed functional language. The types of their meta-programs provide strong and precise guarantees about their termination, correctness and completeness. Their system supports type-safe construction and analysis of terms, types and typing contexts. Unlike alternative approaches, they are...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    A Practical Theory of Language-Integrated Query

    Language-integrated query is receiving renewed attention, in part because of its support through Microsoft's LINQ framework. The authors present a practical theory of language-integrated query based on quotation and normalization of quoted terms. Their technique supports join queries, abstraction over values and predicates, composition of queries, dynamic generation of queries,...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    Mio: A High-Performance Multicore IO Manager for GHC

    Haskell threads provide a key, lightweight concurrency abstraction to simplify the programming of important network applications such as web servers and Software-Defined Network (SDN) controllers. The flagship Glasgow Haskell Compiler (GHC) introduces a Run-Time System (RTS) to achieve a high-performance multicore implementation of Haskell threads, by introducing effective components such...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    Hardware Design Space Exploration Using HercuLeS HLS

    Current VLSI technology allows the design of sophisticated digital systems with ever-growing requirements in performance and power/energy consumption. HercuLeS is an extensible High-Level Synthesis (HLS) environment. It removes significant human effort by automatically mapping algorithms to hardware, providing a valuable design assist to software-oriented developers. To enable accessibility and easiness...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    HypeBIOS: Enforcing VM Isolation with Minimized and Decomposed Cloud TCB

    Virtualization has made cloud computing a popular trend by virtue of its elastic \"Data anywhere\" and \"Computing anywhere\". However, traditional virtualization architectures usually have three drawbacks: being vulnerable to many known attacks targeting at the large software stacks; endowing too much power to cloud providers, who can fully control the...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    NeuCloud: Enabling Privacy-Preserving Monitoring in Cloud Computing

    Cloud computing has changed how services are provided and supported through the computing infrastructure. However, the lack of trust from both sides - the client and the cloud provider, is still a major obstacle to prevent many users from using the cloud, especially for users who are very concerned about...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    A Secure Channel for Attribute-Based Credentials

    Attribute-Based Credentials (ABCs) are building blocks for user-centric identity management. They enable the disclosure of a minimum amount of information about their owner to a verifier, typically a service provider, to authorize the credential owner for some service, application, or resource. By directly applying attribute-disclosure protocols, the data is revealed...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    UbiKiMa: Ubiquitous Authentication Using a Smartphone, Migrating from Passwords to Strong Cryptography

    Passwords are the only ubiquitous form of authentication currently available on the web. Unfortunately, passwords are insecure. In this paper the authors therefore propose the use of strong cryptography, using the fact that users increasingly own a Smartphone that can perform the required cryptographic operations on their behalf. This is...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    Improving Collective I/O Performance by Pipelining Request Aggregation and File Access

    In this paper, the authors propose a multi-buffer pipelining approach to improve collective I/O performance by overlapping the dominant request aggregation phases with the I/O phase in the two-phase I/O implementation. Their pipelining method first divides the collective buffer into a group of small size buffers for an individual collective...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    deDacota: Toward Preventing Server-Side XSS Via Automatic Code and Data Separation

    Web applications are constantly under attack. They are popular, typically accessible from anywhere on the Internet, and they can be abused as malware delivery systems. Cross-site scripting flaws are one of the most common types of vulnerabilities that are leveraged to compromise a web application and its users. A large...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    The CompSOC Design Flow for Virtual Execution Platforms

    Designing a SoC for applications with mixed time-criticality is a complex and time-consuming task. Even when SoCs are built from components with known real-time properties, they still have to be combined and configured correctly to assert that these properties hold for the complete system, which is non trivial. Furthermore, applications...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    CacheKeeper: A System-Wide Web Caching Service for Smartphones

    Efficient web caching in mobile apps eliminates unnecessary network traffic, reduces web accessing latency, and improves Smartphone battery life. However, recent research has indicated that current mobile apps suffer from poor implementations of web caching. In this paper, the authors first conducted a comprehensive survey of over 1000 Android apps...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    Principles of Authentication

    In this paper, the authors do authentication hundreds of times a day with little e ort and strong confidence. They believe that the digital world can and should catch up. The focus of this paper is about authentication for critical applications. Specifically, it is about the fundamentals for evaluating whether...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    6LoWPAN Security: Adding Compromise Resilience to the 802.15.4 Security Sublayer

    6LoWPAN stands for \"IPv6 over Low-power Wireless Personal Area Networks\". Low-power Wireless Personal Area Networks (LoWPANs) are much like Wireless Sensor Networks (WSNs). Both consist of battery-powered and computationally-restricted nodes. 6LoWPAN is a protocol stack for seamlessly integrating 802.15.4- based wireless sensor networks with IPv6 networks. The security of 6LoWPAN...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    An Architecture for Concurrent Execution of Secure Environments in Clouds

    The authors propose an architecture that enables the creation and management of multiple, concurrent secure execution environments on multi-core systems. Their architecture is suitable for use in cloud settings where each user may require an independent secure environment within which he can run his sensitive applications. Their solution effectively scales...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    Hardware Architectural Support for Control Systems and Sensor Processing

    The field of modern control theory and the systems used to implement these controls has shown rapid development over the last 50 years. It was often the case that those developing control algorithms could assume the computing medium was solely dedicated to the task of controlling a plant, for example,...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    Secure Enrollment and Practical Migration for Mobile Trusted Execution Environments

    Smartphone's can implement various security services from mobile banking to security tokens used for physical access control. System-wide Trusted Execution Environments (TEEs), like ARM TrustZone, allow implementation of these services that withstand malware and operating system com-promise. While researchers and developers have focused on secure storage and processing of credentials...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    Static NBTI Reduction Using Internal Node Control

    Negative Bias Temperature Instability (NBTI) is a significant reliability concern for nanoscale CMOS circuits. Its effects on circuit timing can be especially pronounced for circuits with standby-mode equipped functional units, because these units can be subjected to static NBTI stress for extended periods of time. This paper proposes Internal Node...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    ASIST: Architectural Support for Instruction Set Randomization

    Code injection attacks continue to pose a threat to today's computing systems, as they exploit software vulnerabilities to inject and execute arbitrary, malicious code. Instruction Set Randomization (ISR) is able to protect a system against remote machine code injection attacks by randomizing the instruction set of each process. This way,...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking

    Dynamic Data Flow Tracking (DFT) is a technique broadly used in a variety of security applications that, unfortunately, exhibits poor performance, preventing its adoption in production systems. The authors present ShadowReplica, a new and efficient approach for accelerating DFT and other shadow memory-based analyses, by decoupling analysis from execution and...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    i2MapReduce: Incremental Iterative MapReduce

    Iterative computations are widely used in cloud intelligence applications, such as the well-known PageRank algorithm in web search engines, gradient descent algorithm for optimization, and many other iterative algorithms for applications including recommender systems and link prediction. Cloud intelligence applications often perform iterative computations (e.g., PageRank) on constantly changing data...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    Bloofi: A Hierarchical Bloom Filter Index with Applications to Distributed Data Provenance

    Bloom filters are probabilistic data structures that have been successfully used for approximate membership problems in many areas of computer science (networking, distributed systems, databases, etc.). With the huge increase in data size and distribution of data, problems arise where a large number of Bloom filters are available, and all...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    Identity, Location, Disease and More: Inferring Your Secrets from Android Public Resources

    The design of Android is based on a set of unprotected shared resources, including those inherited from Linux (e.g., Linux public directories). However, the dramatic development in Android applications (app for short) makes available a large amount of public background information (e.g., social networks, public online services), which can potentially...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages

    The web is one of the most popular vectors to spread malware. Attackers lure victims to visit compromised web pages or entice them to click on malicious links. These victims are redirected to sites that exploit their browsers or trick them into installing malicious software using social engineering. In this...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    SAuth: Protecting User Accounts from Password Database Leaks

    Password-based authentication is the dominant form of access control in web services. Unfortunately, it proves to be more and more inadequate every year. Even if users choose long and complex passwords, vulnerabilities in the way they are managed by a service may leak them to an attacker. Recent incidents in...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Enhancing a Data Cleaning Process Using Repairs

    Data cleaning aims at converting erroneous, incomplete, duplicate and inconsistent data into high-quality data. There is an extensive list of commercial data cleaning tools available and a significant number of data cleaning projects reported in the literature. Typically, a data cleaning process is modeled as a directed-graph of data transformations,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Efficient Similarity Search on Distribution Data

    Distribution data naturally arise in countless domains, such as meteorology, biology, geology, industry and economics. However, relatively little attention has been paid to data mining for large distribution sets. Given n distributions of multiple categories and a query distribution Q, the authors want to find similar clouds (i.e., distributions), to...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Goal-Driven Autonomous Database Tuning Supported by a System Model

    Fast growing volumes of data, typical for today's database applications, require efficient and low-cost management to guarantee reliable processing and high throughputs. Although administrative costs for skilled DBAs are noticeable, it is often done manually due to the lack of available online tuning utilities. Typical operating goals for a database...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Keyword and Natural Language Query Processing for Semi-Structured Data Sources

    The unprecedentedly large volume of semi-structured data has exacerbated the need for an easy-to-use query interface for semi-structured data sources. Natural language interfaces and keyword search techniques that take advantage of the data set structure make it very easy for ordinary users to access the data. In this paper, the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Achieving High Output Utility Under Limited Resources Through Structure-Based Shedding and Spilling in XML Streams

    Because of high volumes and unpredictable arrival rates, stream processing systems are not always able to keep up with input data streams - resulting in buffer overflow and uncontrolled loss of data. Load shedding and spilling are two core techniques proposed to solve this overflow problem. While load shedding simply...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Asynchronous Object Storage with QoS for Scientific and Commercial Big Data

    In this paper, the authors present their design for an asynchronous object storage system intended for use in scientific and commercial big data workloads. Use cases from the target workload do-mains are used to motivate the key abstractions used in the Application Programming Interface (API). The architecture of the Scalable...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Using Automated Performance Modeling to Find Scalability Bugs in Complex Codes

    Many parallel applications suffer from latent performance limitations that may prevent them from scaling to larger machine sizes. Often, such scalability bugs manifest themselves only when an attempt to scale the code is actually being made - a point where remediation can be difficult. However, creating analytical performance models that...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Massively Parallel Loading

    Dynamic linking has many advantages for managing large code bases, but dynamically linked applications have not typically scaled well on high performance computing systems. Splitting a monolithic executable into many Dynamic Shared Object (DSO) files decreases compile time for large codes, reduces runtime memory requirements by allowing modules to be...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Space-Efficient Time-Series Call-Path Profiling of Parallel Applications

    The performance behavior of parallel simulations often changes considerably as the simulation progresses - with potentially process-dependent variations of temporal patterns. While call-path profiling is an established method of linking a performance problem to the context in which it occurs, call paths reveal only little information about the temporal evolution...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Scalable Massively Parallel I/O to Task-Local Files

    Parallel applications often store data in multiple task-local files, for example, to remember checkpoints, to circumvent memory limitations, or to record performance data. When operating at very large processor configurations, such applications often experience scalability limitations when the simultaneous creation of thousands of files causes metadata server contention or simply...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2012

    Accelerating Throughput-Aware Run-Time Mapping for Heterogeneous MPSoCs

    Modern embedded systems need to support multiple time-constrained multimedia applications that often employ Multi-Processor-Systems-on-Chip (MPSoCs). Such systems need to be optimized for resource usage and energy consumption. It is well understood that a design-time approach cannot provide timing guarantees for all the applications due to its inability to cater for...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Energy Optimization by Exploiting Execution Slacks in Streaming Applications on Multiprocessor Systems

    Dynamic Voltage and Frequency Scaling (DVFS) offers great potential for optimizing the energy efficiency of Multi-Processor System-on-Chips (MPSoCs). The conventional approaches for processor voltage and frequency adjustment are not suitable for streaming multimedia applications due to the cyclic nature of dependencies in the executing tasks which can potentially violate the...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2013

    Geolocation of Data in the Cloud

    The authors introduce and analyze a general framework for authentically binding data to a location while providing strong assurances against cloud storage providers that (either accidentally or maliciously) attempt to re-locate cloud data. They then evaluate a preliminary solution in this framework that combines constraint-based host geolocation with proofs of...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Supporting Complex Queries and Access Policies for Multi-user Encrypted Databases

    Cloud computing is an emerging paradigm offering companies (virtually) unlimited data storage and computation at attractive costs. It is a cost-effective model because it does not require deployment and maintenance of any dedicated IT infrastructure. Despite its benefits, it introduces new challenges for protecting the confidentiality of the data. Sensitive...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2010

    Predicting the Performance of Application-Specific NoCs Implemented on FPGAs

    Modern FPGAs are able to implement complex systems such as Systems-on-Chips (SoCs) and Networks-on-Chips (NoCs). Appropriate NoC topology choices for ASICs have been investigated and typically topologies that can be easily mapped to a two-dimensional fabric are used to reduce chip area and ensure electrical characteristics. However, for FPGAs, each...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2014

    Scale-Out NUMA

    Emerging datacenter applications operate on vast datasets that are kept in DRAM to minimize latency. The large number of servers needed to accommodate this massive memory footprint requires frequent server-to-server communication in applications such as key-value stores and graph-based applications that rely on large irregular data structures. The fine-grained nature...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Netrace: Dependency-Driven Trace-Based Network-on-Chip Simulation

    Chip Multi-Processors (CMPs) and Systems-On-Chip (SOCs) are expected to grow in core count from a few today to hundreds or more. Since efficient on-chip communication is a primary factor in the performance of large core-count systems, the research community has directed substantial attention to Networks-On-Chip (NOCs). Current NOC evaluation methodologies...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2011

    Early Experience with the Distributed Nebula Cloud

    Current cloud infrastructures are important for their ease of use and performance. However, they suffer from several shortcomings. The main problem is inefficient data mobility due to the centralization of cloud resources. The authors believe such clouds are highly unsuited for dispersed-data-intensive applications, where the data may be spread at...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2011

    Making a Case for Distributed File Systems at Exascale

    Exascale computers will enable the unraveling of significant scientific mysteries. Predictions are that 2019 will be the year of exascale, with millions of compute nodes and billions of threads of execution. The current architecture of high-end computing systems is decades-old and has persisted as the authors scaled from gigascales to...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2008

    Accelerating Large-Scale Data Exploration through Data Diffusion

    Data-intensive applications often require exploratory analysis of large datasets. If analysis is performed on distributed resources, data locality can be crucial to high throughput and performance. The authors propose a \"Data diffusion\" approach that acquires compute and storage resources dynamically, replicates data in response to demand, and schedules computations close...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Palette: Enabling Scalable Analytics for Big-Memory, Multicore Machines

    Hadoop and its variants have been widely used for processing large scale analytics tasks in a cluster environment. However, use of a commodity cluster for analytics tasks needs to be reconsidered based on two key observations: in recent years, large memory, multicore machines have become more affordable; and recent studies...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2011

    SkimpyStash: RAM Space Skimpy Key-Value Store on Flash-Based Storage

    A broad range of server-side applications need an underlying, often persistent, key-value store to function. Examples include state maintenance in Internet applications like online multi-player gaming and inline storage deduplication (as described in Section 3). A high throughput persistent key-value store can help to improve the performance of such applications....

    Provided By Association for Computing Machinery

  • White Papers // Jul 2012

    XML Query-Update Independence Analysis Revisited

    XML transformations can be resource-costly in particular when applied to very large XML documents and document sets. Those transformations usually involve lots of XPath queries and may not need to be entirely re-executed following an update of the input document. In this paper, a given query is said to be...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    From Templates to Schemas: Bridging the Gap Between Free Editing and Safe Data Processing

    In this paper the authors present tools that provide an easy way to edit XML content directly on the web, with the usual benefit of valid XML content. These tools make it possible to create content targeted for lightweight web applications. Their approach uses the XTiger template language, the AXEL...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    A Low-Cost Global Network for Data Collection and Query

    In this paper the authors present two complementary research ideas and a proto-type framework based on these ideas. The first idea is that by using semantic URIs, Xquery and XML data models, HTTP responses with embedded URIs, it should be possible to construct easily rich web services over SMS for...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    On the Analysis of Queries with Counting Constraints

    The authors study the analysis problem of XPath expressions with counting constraints. Such expressions are commonly used in document transformations or programs in which they select portions of documents subject to transformations. They explore how recent results on the static analysis of navigational aspects of XPath can be extended to...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Using Simulation to Explore Distributed Key-Value Stores for Extreme-Scale System Services

    Owing to the significant high rate of component failures at extreme scales, system services will need to be failure-resistant, adaptive and self-healing. A majority of HPC services are still designed around a centralized paradigm and hence are susceptible to scaling issues. Peer-To-Peer (P2P) services have proved themselves at scale for...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Transparently Consistent Asynchronous Shared Memory

    The advent of many-core processors is imposing many changes on the operating system. The resources that are under contention have changed; previously, CPU cycles were the resource in demand and required fair and precise sharing. Now compute cycles are plentiful, but the memory per core is decreasing. In the past,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2012

    Comparing High-Performance Multi-Core Web-Server Architectures

    One of the biggest problems for many Internet companies is handling huge volumes of traffic resulting from a large number of users. In this paper, the authors study how web-server architecture and implementation affect performance when trying to obtain high throughput on a 4-core system servicing static content. They focus...

    Provided By Association for Computing Machinery

  • White Papers // May 2013

    A Cloud-Based Consumer-Centric Architecture for Energy Data Analytics

    With the advent of utility-owned smart meters and smart appliances, the amount of data generated and collected about consumer energy consumption has rapidly increased. Energy usage data is of immense practical use for consumers for audits, analytics, and automation. Currently, utility companies collect, use, share, and discard usage data at...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2008

    Group Unicast for the Real World

    Kernel-based group unicast has been suggested as an efficient mechanism for transmitting the same data to multiple recipients. In this paper, the authors present a new system call, sendgroup (), which also supports per-recipient private data, but only uses a single in kernel copy of the shared data. They assess...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2007

    Comparing the Performance of Web Server Architectures

    In this paper, the authors extensively tune and then compare the performance of web servers based on three different server architectures. The ╬╝server utilizes an event-driven architecture, Knot uses the highly-efficient Capriccio thread library to implement a thread-per-connection model, and WatPipe uses a hybrid of events and threads to implement...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2013

    Improving the Scalability of a Multi-core Web Server

    Improving the performance and scalability of web servers enhances user experiences and reduces the costs of providing web-based services. The advent of multi-core technology motivates new studies to understand how efficiently web servers utilize such hardware. This paper presents a detailed performance study of a web server application deployed on...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2013

    Meet the Walkers: Accelerating Index Traversals for In-Memory Databases

    The explosive growth in digital data and its growing role in real-time decision support motivate the design of high-performance DataBase Management Systems (DBMSs). Meanwhile, slowdown in supply voltage scaling has stymied improvements in core performance and ushered an era of power-limited chips. These developments motivate the design of DBMS accelerators...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    Mio: A High-Performance Multicore IO Manager for GHC

    Haskell threads provide a key, lightweight concurrency abstraction to simplify the programming of important network applications such as web servers and Software-Defined Network (SDN) controllers. The flagship Glasgow Haskell Compiler (GHC) introduces a Run-Time System (RTS) to achieve a high-performance multicore implementation of Haskell threads, by introducing effective components such...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2011

    Design and Evaluation of Main Memory Hash Join Algorithms for Multi-core CPUs

    The focus of this paper is on investigating efficient hash join algorithms for modern multi-core processors in main memory environments. This paper dissects each internal phase of a typical hash join algorithm and considers different alternatives for implementing each phase, producing a family of hash join algorithms. Then, the authors...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    BitWeaving: Fast Scans for Main Memory Data Processing

    In this paper, the authors focus on running scans in a main memory data processing system at \"Bare metal\" speed. Essentially, this means that the system must aim to process data at or near the speed of the processor (the fastest component in most system configurations). Scans are common in...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Query Processing on Smart SSDs: Opportunities and Challenges

    Data storage devices are getting \"Smarter.\" Smart flash storage devices (a.k.a. \"Smart SSD\") are on the horizon and will package CPU processing and DRAM storage inside a Smart SSD, and make that available to run user programs inside a Smart SSD. The focus of this paper is on exploring the...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2014

    Maple: Scalable Multi-Dimensional Range Search over Encrypted Cloud Data with Tree-based Index

    Cloud computing promises users massive scale outsourced data storage services with much lower costs than traditional methods. However, privacy concerns compel sensitive data to be stored on the cloud server in an encrypted form. This papers a great challenge for effectively utilizing cloud data, such as executing common SQL queries....

    Provided By Association for Computing Machinery

  • White Papers // May 2010

    Constraint-based Test Database Generation for SQL Queries

    Populating test databases with meaningful test data is a difficult task as it involves generating data for many joined tables that must be diverse enough to be able to reveal faults and small enough to make the testing process efficient. This paper proposes an approach for the automatic generation of...

    Provided By Association for Computing Machinery