Association for Computing Machinery

Displaying 201-240 of 7274 results

  • White Papers // Nov 2013

    Bankshot: Caching Slow Storage in Fast Non-Volatile Memory

    Emerging non-volatile storage (e.g., phase change memory and STTRAM) allow access to persistent data at latencies an order of magnitude lower than SSDs. The density and price gap between NVMs and denser storage make NVM economically most suitable as a cache for larger, more conventional storage (i.e., NAND flash-based SSDs...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Fast Dynamic Binary Translation for the Kernel

    Dynamic Binary Translation (DBT) is a powerful technique with several important applications. System-level binary translators have been used for implementing a virtual machine monitor and for instrumentation in the OS kernel. In current designs, the performance overhead of binary translation on kernel-intensive workloads is high. e.g., over 10x slowdowns were...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Consistent, Durable, and Safe Memory Management for Byte-Addressable Non Volatile Main Memory

    In this paper, the authors present three building blocks for enabling the efficient and safe design of persistent data stores for emerging non-volatile memory technologies. Taking the fullest advantage of the low latency and high bandwidths of emerging memories such as Phase Change Memory (PCM), spin torque, and memristor necessitates...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    InTune: Coordinating Multicore Islands to Achieve Global Policy Objectives

    Multicore platforms are moving from small numbers of homogeneous cores to 'Scale out' designs with multiple tiles or 'Islands' of cores residing on a single chip, each with different resources and potentially controlled by their own resource managers. Applications running on such machines, however, operate across multiple such resource islands,...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Exploring Storage Class Memory with Key Value Stores

    In the near future, new Storage-Class Memory (SCM) technologies - such as phase-change memory and memristors - will radically change the nature of long-term storage. These devices will be cheap, non-volatile, byte addressable, and near DRAM density and speed. While SCM offers enormous opportunities, profiting from them will require new...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    UNIK: Unsupervised Social Network Spam Detection

    Social network spam increases explosively with the rapid development and wide usage of various social networks on the Internet. To timely detect spam in large social network sites, it is desirable to discover unsupervised schemes that can save the training cost of supervised schemes. In this paper, the authors first...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    A System-Level Infrastructure for Multidimensional MP-SoC Design Space Co-Exploration

    In this paper, the authors present a flexible and extensible system-level MP-SoC Design Space Exploration (DSE) infrastructure, called NASA. This highly modular framework uses well-defined interfaces to easily integrate different system-level simulation tools as well as different combinations of search strategies in a simple plug-and-play fashion. Moreover, NASA deploys a...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Automated Generation of Polyhedral Process Networks from Affine Nested-Loop Programs with Dynamic Loop Bounds

    The Process Networks (PNs) is a suitable parallel Model of Computation (MoC) used to specify embedded streaming applications in a parallel form facilitating the efficient mapping onto embedded parallel execution platforms. Unfortunately, specifying an application using a parallel MoC is a very difficult and highly error-prone task. To overcome the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Consumer-Centric SLA Manager for Cloud-Hosted Databases

    The authors present an end-to-end framework for consumer-centric SLA management of virtualized database servers. The framework facilitates adaptive and dynamic provisioning of the database tier of the software applications based on application-defined policies for satisfying their own SLA performance requirements, avoiding the cost of any SLA violation and controlling the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Feedback-Driven Multiclass Active Learning for Data Streams

    Active learning is a promising way to efficiently build up training sets with minimal supervision. Most existing methods consider the learning problem in a pool-based setting. However, in a lot of real-world learning tasks, such as crowd-sourcing, the unlabeled samples arrive sequentially in the form of continuous rapid streams. Thus,...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    A Two-Phase Algorithm for Mining Sequential Patterns with Differential Privacy

    Frequent sequential pattern mining is a central task in many fields such as biology and finance. However, release of these patterns is raising increasing concerns on individual privacy. In this paper, the authors study the sequential pattern mining problem under the differential privacy framework which provides formal and provable guarantees...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Content Coverage Maximization on Word Networks for Hierarchical Topic Summarization

    In this paper, the authors explain about the text summarization by extracting hierarchical topics from a given collection of documents. They propose a new approach of text modeling via network analysis. They convert documents into a word influence network, and find the words summarizing the major topics with an efficient...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Disinformation Techniques for Entity Resolution

    The authors study the problem of disinformation. They assume that an \"Agent\" has some sensitive information that the \"Adversary\" is trying to obtain. For example, a camera company (the agent) may secretly be developing its new camera model, and a user (the adversary) may want to know in advance the...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Language Support for Dynamic, Hierarchical Data Partitioning

    Applications written for distributed-memory parallel architectures must partition their data to enable parallel execution. As memory hierarchies become deeper, it is increasingly necessary that the data partitioning also be hierarchical to match. Current language proposals perform this hierarchical partitioning statically, which excludes many important applications where the appropriate partitioning is...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Bottle Graphs: Visualizing Scalability Bottlenecks in Multi-Threaded Applications

    Understanding and analyzing multi-threaded program performance and scalability is far from trivial, which severely complicates parallel software development and optimization. In this paper, the authors present bottle graphs, a powerful analysis tool that visualizes multi-threaded program performance, in regards to both per-thread parallelism and execution time. Each thread is represented...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Fine-Grained Privacy Control for the RFID Middleware of EPCglobal Networks

    The Electronic Product Code (EPC) is a Radio Frequency IDentification (RFID) that offers a new way of automating identification. However, once RFID tags carry more than just an identifier, privacy may be violated. Treating the privacy in early stages helps to master the data view before interpreting and storing it...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    ProtOLAP: Rapid OLAP Prototyping with On-Demand Data Supply

    The approaches to data warehouse design are based on the assumption that source data are known in advance and available. While this assumption is true in common project situations, in some peculiar contexts it is not. This is the case of the French national project for analysis of energetic agricultural...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Analysis of the HTTPS Certificate Ecosystem

    The authors report the results of a large-scale measurement study of the HTTPS certificate ecosystem - the public-key infrastructure that underlies nearly all secure web communications. Using data collected by performing 110 internet-wide scans over 14 months, they gain detailed and temporally fine-grained visibility into this otherwise opaque area of...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Choreo: Network-Aware Task Placement for Cloud Applications

    Cloud computing infrastructures are increasingly being used by network-intensive applications that transfer significant amounts of data between the nodes on which they run. This paper shows that tenants can do a better job placing applications by understanding the underlying cloud network as well as the demands of the applications. To...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    GamingAnywhere: An Open-Source Cloud Gaming Testbed

    While cloud gaming opens new business opportunity, it also poses tremendous challenges as the Internet only provides best-effort service and gamers are hard to please. Although researchers have various ideas to improve cloud gaming systems, existing cloud gaming systems are closed and proprietary, and cannot be used to evaluate these...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Next Stop, the Cloud: Understanding Modern Web Service Deployment in EC2 and Azure

    An increasingly large fraction of internet services are hosted on a cloud computing system such as Amazon EC2 or windows Azure. But to date, no in-depth studies about cloud usage by internet services has been performed. The authors provide a detailed measurement study to shed light on how modern web...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Scap: Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks

    Many network monitoring applications must analyze traffic beyond the network layer to allow for connection-oriented analysis, and achieve resilience to evasion attempts based on TCP segmentation. However, existing network traffic capture frameworks provide applications with just raw packets, and leave complex operations like flow tracking and TCP stream reassembly to...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Benchmarking Personal Cloud Storage

    Personal cloud storage services are data-intensive applications already producing a significant share of Internet traffic. Several solutions offered by different companies attract more and more people. However, little is known about each service capabilities, architecture and - most of all - performance implications of design choices. This paper presents a...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Access Privacy and Correctness on Untrusted Storage

    The authors introduce a new practical mechanism for remote data storage with access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted reads, writes, and inserts to a potentially curious and malicious storage service provider, without revealing information or access patterns. The provider is unable...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Network Sampling: From Static to Streaming Graphs

    Network sampling is integral to the analysis of social, information, and biological networks. Since many real-world networks are massive in size, continuously evolving, and/or distributed in nature, the network structure is often sampled in order to facilitate study. For these reasons, a more thorough and complete understanding of network sampling...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Meta-Stars: Multidimensional Modeling for Social Business Intelligence

    Social business intelligence is the discipline of combining corporate data with User-Generated Content (UGC) to let decision-makers improve their business based on the trends perceived from the environment. A key role in the analysis of textual UGC is played by topics, meant as specific concepts of interest within a subject...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Energy-Aware Design of Secure Multi-Mode Real-Time Embedded Systems with FPGA Co-Processors

    The authors approach the emerging area of energy efficient, secure real-time embedded systems design. Many modern embedded systems have to fulfill strict security constraints and are often required to meet stringent deadlines in different operation modes, where the number and nature of active tasks vary (dynamic task sets). In this...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Invasive Tightly-Coupled Processor Arrays: A Domain-Specific Architecture/Compiler Co-Design Approach

    The authors introduce a novel class of massively parallel processor architectures called invasive Tightly-Coupled Processor Arrays (TCPAs). The presented processor class is a highly parameterizable template, which can be tailored before run-time to fulfill costumers' requirements such as performance, area cost, and energy efficiency. These programmable accelerators are well suited...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    MyCloud - Supporting User-Configured Privacy Protection in Cloud Computing

    Privacy concern is still one of the major issues that prevent users from moving to public clouds. The root cause of the privacy problem is that the cloud provider has more privileges than it is necessary, which leaves no options for the cloud users to protect their privacy. Due to...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    SigMal: A Static Signal Processing Based Malware Triage

    In this paper, the authors propose SigMal, a fast and precise malware detection framework based on signal processing techniques. SigMal is designed to operate with systems that process large amounts of binary samples. It has been observed that many samples received by such systems are variants of previously seen malware,...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    A Mapping-Scheduling Algorithm for Hardware Acceleration on Reconfigurable Platforms

    Reconfigurable platforms are a promising technology that offers an interesting trade-off between flexibility and performance, which many recent embedded system applications demand, especially in fields such as multimedia processing. These applications typically involve multiple ad-hoc tasks for hardware acceleration, which are usually represented using formalisms such as Data Flow Diagrams...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Detecting Cloud Provisioning Errors Using an Annotated Process Model

    In this paper, the authors demonstrate the feasibility of annotating a process model with assertions to detect errors in cloud provisioning in near real time. Their proposed workflow is: construct a process model of the desired provisioning activities using log data, use the process model to determine appropriate annotation triggers...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Design of an Active Storage Cluster File System for DAG Workflows

    The last decade has seen rise of new scalable cluster file systems used for storing scientific data and for enabling executing tasks on this data. In fact, creating large storage clusters using commodity hardware has never been easier. Hadoop is perhaps the most popular open source implementation of a scalable...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Chip-Multiprocessor Hardware Locks for Safety-Critical Java

    Accessing shared resources in multicore systems are usually protected by a software locking mechanism, which itself is implemented through atomic operations. This paper can result in a large synchronization overhead, which, in the context of real-time systems, increases the worst-case execution time and may void a task set's schedulability. In...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    SafeSlinger: Easy-to-Use and Secure Public-Key Exchange

    Users regularly experience a crisis of confidence on the internet. Is that email or instant message truly originating from the claimed individual? Such doubts are commonly resolved through a leap of faith, expressing the desperation and helplessness of users. To establish a secure basis for online communication, the authors propose...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    FAST: Near Real-time Data Analytics for the Cloud

    Existing cloud storage systems have largely failed to offer an adequate capability for real-time data analytics. Since, the true value of data heavily depends on how efficiently data analytics can be carried out on the data in (near-) real-time, large fractions of data unfortunately end up with their values being...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    vTube: Efficient Streaming of Virtual Appliances Over Last-Mile Networks

    Cloud-sourced Virtual Appliances (VAs) have been touted as powerful solutions for many software maintenance, mobility, backward compatibility, and security challenges. In this paper, the authors ask whether it is possible to create a VA cloud service that supports fluid, interactive user experience even over mobile networks. More specifically, they wish...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Hierarchical Scheduling for Diverse Datacenter Workloads

    There has been a recent industrial effort to develop multi-resource hierarchical schedulers. However, the existing implementations have some shortcomings in that they might leave resources unallocated or starve certain jobs. This is because the multi-resource setting introduces new challenges for hierarchical scheduling policies. The authors provide an algorithm, which they...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Memory Footprint Matters: Efficient Equi-Join Algorithms for Main Memory Data Processing

    High-performance analytical data processing systems often run on servers with large amounts of main memory. A common operation in such environments is combining data from two or more sources using some \"Join\" algorithm. The focus of this paper is on studying hash-based and sort-based equi-join algorithms when the data sets...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    VMShadow: Optimizing the Performance of Latency-Sensitive Virtual Desktops in Distributed Clouds

    Distributed clouds offer a choice of data center locations to application providers to host their applications. In this paper the authors consider distributed clouds that host virtual desktops which are then accessed by their users through remote desktop protocols. They argue that virtual desktops that run latency-sensitive applications such as...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    EventCube: Multi-Dimensional Search and Mining of Structured and Text Data

    A large portion of real world data is either text or structured (e.g., relational) data. Moreover, such data objects are often linked together (e.g., structured specification of products linking with the corresponding product descriptions and customer comments). Even for text data such as news data, typed entities can be extracted...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    AMETHYST: A System for Mining and Exploring Topical Hierarchies of Heterogeneous Data

    In this paper, the authors present AMETHYST, a system for exploring and analyzing a topical hierarchy constructed from a Heterogeneous Information Network (HIN). HINs, composed of multiple types of entities and links are very common in the real world. Many have a text component, and thus can benefit from a...

    Provided By Association for Computing Machinery

  • White Papers // May 2013

    Mining Collective Intelligence in Diverse Groups

    Collective intelligence, which aggregates the shared information from large crowds, is often negatively impacted by unreliable information sources with the low quality data. This becomes a barrier to the effective use of collective intelligence in a variety of applications. In order to address this issue, the authors propose a probabilistic...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2012

    User Guided Entity Similarity Search Using Meta-Path Selection in Heterogeneous Information Networks

    With the emergence of web-based social and information applications, entity similarity search in information networks, aiming to find entities with high similarity to a given query entity, has gained wide attention. However, due to the diverse semantic meanings in heterogeneous information networks, which contain multi-typed entities and relationships, similarity measurement...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2012

    Building Enriched Web Page Representations using Link Paths

    Anchor text has a history of enriching documents for a variety of tasks within the World Wide Web (WWW). Anchor texts are useful because they are similar to typical web queries, and because they express the document's context. Therefore, it is a common practice for web search engines to incorporate...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2012

    Parallel Field Ranking

    Recently, ranking data with respect to the intrinsic geometric structure (manifold ranking) has received considerable attentions, with encouraging performance in many applications in pattern recognition, information retrieval and recommendation systems. Most of the existing manifold ranking methods focus on learning a ranking function that varies smoothly along the data manifold....

    Provided By Association for Computing Machinery

  • White Papers // Aug 2012

    Integrating Community Matching and Outlier Detection for Mining Evolutionary Community Outliers

    Temporal datasets, in which data evolves continuously, exist in a wide variety of applications, and identifying anomalous or outlying objects from temporal datasets is an important and challenging task. Different from traditional outlier detection, which detects objects that have quite different behavior compared with the other objects, temporal outlier detection...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2011

    Latent Community Topic Analysis: Integration of Community Discovery with Topic Modeling

    In this paper, the authors study the problem of latent community topic analysis in text-associated graphs. With the development of social media, a lot of user-generated content is available with user networks. Along with rich information in networks, user graphs can be extended with text information associated with nodes. Topic...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2007

    The Effect of Temperature on Cache Size Tuning for Low Energy Embedded Systems

    Energy consumption is a major concern in embedded computing systems. Several studies have shown that cache memories account for about 40% or more of the total energy consumed in these systems. In older technology nodes, active power was the primary contributor to total power dissipation of a CMOS design. However,...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Resolving Conflicts in Heterogeneous Data by Truth Discovery and Source Reliability Estimation

    In many applications, one can obtain descriptions about the same objects or events from a variety of sources. As a result, this will inevitably lead to data or information conflicts. One important problem is to identify the true information (i.e., the truths) among conflicting sources of data. It is intuitive...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2013

    Accelerating an Application Domain with Specialized Functional Units

    Hardware specialization has received renewed interest recently as chips are hitting power limits. Chip designers of traditional processor architectures have primarily focused on general-purpose computing, partially due to time-to-market pressure and simpler design processes. But new power limits require some chip specialization. Although hardware configured for a specific application yields...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2012

    Creating Portable, Repeatable, Realistic Benchmarks for Embedded Systems and the Challenges Thereof

    To appreciate the challenges of analyzing embedded processor behavior, step back in time to understand the evolution of embedded processors. Only a few decades ago, embedded processors were relatively simple devices (compared to today), represented by a host of 8- and 16-bit microcontrollers, and 32-bit microprocessors, with minimal integration. Today,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2012

    Efficiently Parallelizing Instruction Set Simulation of Embedded Multi-Core Processors Using Region-Based Just-in-Time Dynamic Binary Translation

    Embedded systems, as typified by modern mobile phones, are already seeing a drive toward using multi-core processors. The number of cores will likely increase rapidly in the future. Engineers and researchers need to be able to simulate systems, as they are expected to be in a few generations time, running...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2006

    Adaptive Reorder Buffers for SMT Processors

    In SMT processors, the complex interplay between private and shared datapath resources needs to be considered in order to realize the full performance potential. In this paper, the authors show that blindly increasing the size of the per-thread reorder buffers to provide a larger number of in-flight instructions don't result...

    Provided By Association for Computing Machinery

  • White Papers // May 2011

    SIFT: A Low-Overhead Dynamic Information Flow Tracking Architecture for SMT Processors

    Dynamic Information Flow Tracking (DIFT) is a powerful technique that can protect unmodified binaries from a broad range of vulnerabilities such as buffer over flow and code injection attacks. Software DIFT implementations in-cur very high performance overhead, while comprehensive hardware implementations add substantial complexity to the microarchitecture, making it unlikely...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2009

    Hill-Climbing SMT Processor Resource Distribution

    The key to high performance in Simultaneous Multi-Threaded (SMT) processors lies in optimizing the distribution of shared resources to active threads. Existing resource distribution techniques optimize performance only indirectly. They infer potential performance bottlenecks by observing indicators, like instruction occupancy or cache miss counts, and take actions to try to...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2013

    DeNovoND: Efficient Hardware Support for Disciplined Non-Determinism

    Recent work has shown that disciplined shared-memory programming models that provide deterministic-by-default semantics can simplify both parallel software and hardware. Specifically, the De-Novo hardware system has shown that the software guarantees of such models can enable simpler, higher performance, and more energy-efficient hardware than the current state-of-the-art for deterministic programs....

    Provided By Association for Computing Machinery

  • White Papers // Nov 2008

    A Remotely Accessible Network Processor-Based Router for Network Experimentation

    Over the last decade, programmable Network Processors (NPs) have become widely used in Internet routers and other network components. NPs enable rapid development of complex packet processing functions as well as rapid response to changing requirements. In the network research community, the use of NPs has been limited by the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2008

    Efficient Regular Expression Evaluation: Theory to Practice

    Efficient regular expression evaluation is a critical mechanism in modern network security. While deep packet inspection will never be a comprehensive security solution, it is the standard technique for detecting malicious patterns in network traffic. Several algorithms and techniques have been proposed recently to accelerate regular expression matching and enable...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2008

    Extending Finite Automata to Efficiently Match Perl-Compatible Regular Expressions

    Regular expression matching is a crucial task in several networking applications. Current implementations are based on one of two types of finite state machines. Non-deterministic Finite Automata (NFAs) have minimal storage demand but have high memory bandwidth requirements. Deterministic Finite Automata (DFAs) exhibit low and deterministic memory bandwidth requirements at...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Kepler + Hadoop : A General Architecture Facilitating Data-Intensive Applications in Scientific Workflow Systems

    MapReduce provides a parallel and scalable programming model for data-intensive business and scientific applications. MapReduce and its de facto open source project, called Hadoop, support parallel processing on large datasets with capabilities including automatic data partitioning and distribution, load balancing, and fault tolerance management. Meanwhile, scientific workflow management systems, e.g.,...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2012

    Optimizing Bandwidth and Power of Graphics Memory with Hybrid Memory Technologies and Adaptive Data Migration

    While GPUs are designed to hide memory latency with massive multithreading, the tremendous demands for memory bandwidth and power consumption constrain the system performance scaling. In this paper, the authors propose a hybrid graphics memory architecture with different memory technologies (DRAM, STT-RAM, and RRAM), to improve the memory bandwidth and...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Cost-Aware Three-Dimensional (3D) Many-Core Multiprocessor Design

    The emerging Three-Dimensional Integrated Circuit (3D IC) is beneficial for various applications from both area and performance perspectives. While the general trend in processor design has been shifting from multi-core to many-core, questions such as whether 3D integration should be adopted, and how to choose among various design options must...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2013

    Kiln: Closing the Performance Gap Between Systems With and Without Persistence Support

    Persistent memory is an emerging technology which allows in-memory persistent data objects to be updated at much higher throughput than when using disks as persistent storage. Previous persistent memory designs use logging or copy-on-write mechanisms to update persistent data, which unfortunately reduces the system performance to roughly half that of...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2011

    Configurable Memory Security in Embedded Systems

    System security is an increasingly important design criterion for many embedded systems. These systems are often portable and more easily attacked than traditional desktop and server computing systems. Key requirements for system security include defenses against physical attacks and lightweight support in terms of area and power consumption. The authors'...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    Tetris-XL:A Performance-Driven Spill Reduction Technique for Embedded VLIW Processors

    As technology has advanced, the application space of Very Long Instruction Word (VLIW) processors has grown to include a variety of embedded platforms. Due to cost and power consumption constraints, many embedded VLIW processors contain limited resources, including registers. As a result, a VLIW compiler that maximizes Instruction Level Parallelism...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Feng Shui of Supercomputer Memory: Positional Effects in DRAM and SRAM Faults

    Several recent publications confirm that faults are common in high-performance computing systems. Therefore, further attention to the faults experienced by such computing systems is warranted. In this paper, the authors present a study of DRAM and SRAM faults in large high-performance computing systems. Their goal is to understand the factors...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2012

    Timing Effects of DDR Memory Systems in Hard Real-Time Multicore Architectures: Issues and Solutions

    Multicore processors are an effective solution to cope with the performance requirements of real-time embedded systems due to their good performance-per-watt ratio and high performance capabilities. Unfortunately, their use in integrated architectures such as IMA or AUTOSAR is limited by the fact that multicores do not guarantee a time composable...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2006

    Privacy-Preserving SVM using Nonlinear Kernels on Horizontally Partitioned Data

    Traditional data mining and knowledge discovery algorithms assume free access to data, either at a centralized location or in federated form. Increasingly, privacy and security concerns restrict this access, thus derailing data mining projects. What is required is distributed knowledge discovery that is sensitive to this problem. The key is...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    CooMR: Cross-Task Coordination for Efficient Data Management in MapReduce Programs

    Hadoop is a widely adopted open source implementation of MapReduce programming model for big data processing. It represents system resources as available map and reduces slots and assigns them to various tasks. This execution model gives little regard to the need of cross-task coordination on the use of shared system...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2011

    CPPC: Correctable Parity Protected Cache

    Due to shrinking feature sizes processors are becoming more vulnerable to soft errors. Write-back caches are particularly vulnerable since they hold dirty data that do not exist in other memory levels. While conventional error correcting codes can protect write-back caches, it has been shown that they are expensive in terms...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Autonomic Resource Provisioning for Cloud-Based Software

    Cloud elasticity provides a software system with the ability to maintain optimal user experience by automatically acquiring and releasing resources, while paying only for what has been consumed. The mechanism for automatically adding or removing resources on the fly is referred to as auto-scaling. The state-of-the practice with respect to...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2008

    Extracting Coarse-Grain Parallelism in General-Purpose Programs

    While the Chip Multi-Processor (CMP) has quickly become the predominant processor architecture, its continuing success largely depends on the parallelizability of complex programs. In the early 1990s great successes were obtained to extract parallelism from the inner loops of scientific computations. In this paper, the authors show that significant amounts...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    Leveraging On-Chip Networks for Data Cache Migration in Chip Multiprocessors

    Recently, Chip Multi-Processors (CMPs) have arisen as the de facto design for modern high-performance processors, with increasing core counts. An important property of CMPs is that remote, but on-chip, L2 cache accesses are less costly than off-chip accesses; this is in contrast to earlier chip-to-chip or board-to-board multiprocessors, where an...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2011

    The ReNoC Reconfigurable Network-on-Chip: Architecture, Configuration Algorithms, and Evaluation

    In this paper, the authors present a reconfigurable network-on-chip architecture called ReNoC, which is intended for use in general-purpose multiprocessor system-on-chip platforms, and which enables application-specific logical NoC topologies to be configured, thus providing both efficiency and flexibility. The paper presents three novel algorithms that synthesize an application-specific NoC topology,...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2013

    Traffic Management: A Holistic Approach to Memory Placement on NUMA Systems

    NUMA systems are characterized by Non-Uniform Memory Access times, where accessing data in a remote node takes longer than a local access. NUMA hardware has been built since the late 80's, and the operating systems designed for it were optimized for access locality. They co-located memory pages with the threads...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2011

    A Case for Heterogeneous On-Chip Interconnects for CMPs

    Network-on-Chip (NoC) has become a critical shared resource in the emerging Chip Multi-Processor (CMP) era. Most prior NoC designs have used the same type of router across the entire network. While this homogeneous network design eases the burden on a network designer, partitioning the resources equally among all routers across...

    Provided By Association for Computing Machinery

  • White Papers // May 2013

    A Fast and Scalable Multi-Dimensional Multiple-Choice Knapsack Heuristic

    Many combinatorial optimization problems in the embedded systems and design automation domains involve decision making in multi-dimensional spaces. The Multi-dimensional Multiple-choice Knapsack Problem (MMKP) is among the most challenging of the encountered optimization problems. MMKP problem instances appear for example in chip multiprocessor run-time resource management and in global routing...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2008

    System Scenario Based Design of Dynamic Embedded Systems

    In the past decade, real-time embedded systems have become much more complex due to the introduction of a lot of new functionality in one application, and due to running multiple applications concurrently. This increases the dynamic nature of today's applications and systems, and tightens the requirements for their constraints in...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2013

    Selecting Representative Benchmark Inputs for Exploring Microprocessor Design Spaces

    The design process of a microprocessor requires representative workloads to steer the search process toward an optimum design point for the target application domain. However, considering a broad set of workloads to cover the large space of potential workloads is infeasible given how time-consuming design space exploration typically is. Hence,...

    Provided By Association for Computing Machinery