Association for Computing Machinery

Displaying 241-280 of 6791 results

  • White Papers // Nov 2013

    Feedback-Driven Multiclass Active Learning for Data Streams

    Active learning is a promising way to efficiently build up training sets with minimal supervision. Most existing methods consider the learning problem in a pool-based setting. However, in a lot of real-world learning tasks, such as crowd-sourcing, the unlabeled samples arrive sequentially in the form of continuous rapid streams. Thus,...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Automated Generation of Polyhedral Process Networks from Affine Nested-Loop Programs with Dynamic Loop Bounds

    The Process Networks (PNs) is a suitable parallel Model of Computation (MoC) used to specify embedded streaming applications in a parallel form facilitating the efficient mapping onto embedded parallel execution platforms. Unfortunately, specifying an application using a parallel MoC is a very difficult and highly error-prone task. To overcome the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    A System-Level Infrastructure for Multidimensional MP-SoC Design Space Co-Exploration

    In this paper, the authors present a flexible and extensible system-level MP-SoC Design Space Exploration (DSE) infrastructure, called NASA. This highly modular framework uses well-defined interfaces to easily integrate different system-level simulation tools as well as different combinations of search strategies in a simple plug-and-play fashion. Moreover, NASA deploys a...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Content Coverage Maximization on Word Networks for Hierarchical Topic Summarization

    In this paper, the authors explain about the text summarization by extracting hierarchical topics from a given collection of documents. They propose a new approach of text modeling via network analysis. They convert documents into a word influence network, and find the words summarizing the major topics with an efficient...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Fine-Grained Privacy Control for the RFID Middleware of EPCglobal Networks

    The Electronic Product Code (EPC) is a Radio Frequency IDentification (RFID) that offers a new way of automating identification. However, once RFID tags carry more than just an identifier, privacy may be violated. Treating the privacy in early stages helps to master the data view before interpreting and storing it...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Bottle Graphs: Visualizing Scalability Bottlenecks in Multi-Threaded Applications

    Understanding and analyzing multi-threaded program performance and scalability is far from trivial, which severely complicates parallel software development and optimization. In this paper, the authors present bottle graphs, a powerful analysis tool that visualizes multi-threaded program performance, in regards to both per-thread parallelism and execution time. Each thread is represented...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Language Support for Dynamic, Hierarchical Data Partitioning

    Applications written for distributed-memory parallel architectures must partition their data to enable parallel execution. As memory hierarchies become deeper, it is increasingly necessary that the data partitioning also be hierarchical to match. Current language proposals perform this hierarchical partitioning statically, which excludes many important applications where the appropriate partitioning is...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    ProtOLAP: Rapid OLAP Prototyping with On-Demand Data Supply

    The approaches to data warehouse design are based on the assumption that source data are known in advance and available. While this assumption is true in common project situations, in some peculiar contexts it is not. This is the case of the French national project for analysis of energetic agricultural...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Scap: Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks

    Many network monitoring applications must analyze traffic beyond the network layer to allow for connection-oriented analysis, and achieve resilience to evasion attempts based on TCP segmentation. However, existing network traffic capture frameworks provide applications with just raw packets, and leave complex operations like flow tracking and TCP stream reassembly to...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    GamingAnywhere: An Open-Source Cloud Gaming Testbed

    While cloud gaming opens new business opportunity, it also poses tremendous challenges as the Internet only provides best-effort service and gamers are hard to please. Although researchers have various ideas to improve cloud gaming systems, existing cloud gaming systems are closed and proprietary, and cannot be used to evaluate these...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Choreo: Network-Aware Task Placement for Cloud Applications

    Cloud computing infrastructures are increasingly being used by network-intensive applications that transfer significant amounts of data between the nodes on which they run. This paper shows that tenants can do a better job placing applications by understanding the underlying cloud network as well as the demands of the applications. To...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Benchmarking Personal Cloud Storage

    Personal cloud storage services are data-intensive applications already producing a significant share of Internet traffic. Several solutions offered by different companies attract more and more people. However, little is known about each service capabilities, architecture and - most of all - performance implications of design choices. This paper presents a...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Next Stop, the Cloud: Understanding Modern Web Service Deployment in EC2 and Azure

    An increasingly large fraction of internet services are hosted on a cloud computing system such as Amazon EC2 or windows Azure. But to date, no in-depth studies about cloud usage by internet services has been performed. The authors provide a detailed measurement study to shed light on how modern web...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Access Privacy and Correctness on Untrusted Storage

    The authors introduce a new practical mechanism for remote data storage with access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted reads, writes, and inserts to a potentially curious and malicious storage service provider, without revealing information or access patterns. The provider is unable...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Network Sampling: From Static to Streaming Graphs

    Network sampling is integral to the analysis of social, information, and biological networks. Since many real-world networks are massive in size, continuously evolving, and/or distributed in nature, the network structure is often sampled in order to facilitate study. For these reasons, a more thorough and complete understanding of network sampling...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Energy-Aware Design of Secure Multi-Mode Real-Time Embedded Systems with FPGA Co-Processors

    The authors approach the emerging area of energy efficient, secure real-time embedded systems design. Many modern embedded systems have to fulfill strict security constraints and are often required to meet stringent deadlines in different operation modes, where the number and nature of active tasks vary (dynamic task sets). In this...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Meta-Stars: Multidimensional Modeling for Social Business Intelligence

    Social business intelligence is the discipline of combining corporate data with User-Generated Content (UGC) to let decision-makers improve their business based on the trends perceived from the environment. A key role in the analysis of textual UGC is played by topics, meant as specific concepts of interest within a subject...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    SigMal: A Static Signal Processing Based Malware Triage

    In this paper, the authors propose SigMal, a fast and precise malware detection framework based on signal processing techniques. SigMal is designed to operate with systems that process large amounts of binary samples. It has been observed that many samples received by such systems are variants of previously seen malware,...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    A Mapping-Scheduling Algorithm for Hardware Acceleration on Reconfigurable Platforms

    Reconfigurable platforms are a promising technology that offers an interesting trade-off between flexibility and performance, which many recent embedded system applications demand, especially in fields such as multimedia processing. These applications typically involve multiple ad-hoc tasks for hardware acceleration, which are usually represented using formalisms such as Data Flow Diagrams...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    MyCloud - Supporting User-Configured Privacy Protection in Cloud Computing

    Privacy concern is still one of the major issues that prevent users from moving to public clouds. The root cause of the privacy problem is that the cloud provider has more privileges than it is necessary, which leaves no options for the cloud users to protect their privacy. Due to...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Design of an Active Storage Cluster File System for DAG Workflows

    The last decade has seen rise of new scalable cluster file systems used for storing scientific data and for enabling executing tasks on this data. In fact, creating large storage clusters using commodity hardware has never been easier. Hadoop is perhaps the most popular open source implementation of a scalable...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Detecting Cloud Provisioning Errors Using an Annotated Process Model

    In this paper, the authors demonstrate the feasibility of annotating a process model with assertions to detect errors in cloud provisioning in near real time. Their proposed workflow is: construct a process model of the desired provisioning activities using log data, use the process model to determine appropriate annotation triggers...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Chip-Multiprocessor Hardware Locks for Safety-Critical Java

    Accessing shared resources in multicore systems are usually protected by a software locking mechanism, which itself is implemented through atomic operations. This paper can result in a large synchronization overhead, which, in the context of real-time systems, increases the worst-case execution time and may void a task set's schedulability. In...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    ArgosV2: A Flexible Many-Antenna Research Platform

    Many-antenna base stations are a rapidly growing field in wireless research. A plethora of new theoretical techniques have been recently proposed for many-antenna base stations and networks. However, without experimental validation, it is difficult or impossible to predict the practicality and performance of these techniques in real hardware, under complex,...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    FAST: Near Real-time Data Analytics for the Cloud

    Existing cloud storage systems have largely failed to offer an adequate capability for real-time data analytics. Since, the true value of data heavily depends on how efficiently data analytics can be carried out on the data in (near-) real-time, large fractions of data unfortunately end up with their values being...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    vTube: Efficient Streaming of Virtual Appliances Over Last-Mile Networks

    Cloud-sourced Virtual Appliances (VAs) have been touted as powerful solutions for many software maintenance, mobility, backward compatibility, and security challenges. In this paper, the authors ask whether it is possible to create a VA cloud service that supports fluid, interactive user experience even over mobile networks. More specifically, they wish...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Hierarchical Scheduling for Diverse Datacenter Workloads

    There has been a recent industrial effort to develop multi-resource hierarchical schedulers. However, the existing implementations have some shortcomings in that they might leave resources unallocated or starve certain jobs. This is because the multi-resource setting introduces new challenges for hierarchical scheduling policies. The authors provide an algorithm, which they...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Memory Footprint Matters: Efficient Equi-Join Algorithms for Main Memory Data Processing

    High-performance analytical data processing systems often run on servers with large amounts of main memory. A common operation in such environments is combining data from two or more sources using some \"Join\" algorithm. The focus of this paper is on studying hash-based and sort-based equi-join algorithms when the data sets...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    VMShadow: Optimizing the Performance of Latency-Sensitive Virtual Desktops in Distributed Clouds

    Distributed clouds offer a choice of data center locations to application providers to host their applications. In this paper the authors consider distributed clouds that host virtual desktops which are then accessed by their users through remote desktop protocols. They argue that virtual desktops that run latency-sensitive applications such as...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Software Support for Atomicity and Persistence in Non-Volatile Memory

    This paper examines the use of byte-addressable persistent memory as a replacement for traditional non-volatile storage in emerging data management applications. Advances in memory technology are promising the availability of byte-addressable persistent memory as an integral component of future computing platforms. This change has significant implications for software that has...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Combined Modeling and Side Channel Attacks on Strong PUFs

    Physical Unclonable Functions (PUFs) have established themselves in the scientific literature, and are also gaining ground in commercial applications. Recently, however, several attacks on PUF core properties have been reported. They concern their physical and digital unclonability, as well as their assumed resilience against invasive or side channel attacks. In...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Methods for Fault Tolerance in Networks-on-Chip

    Networks-on-Chip (NoC) constitute the interconnection architecture of future, massively parallel multiprocessors that assemble hundreds to thousands of processing cores on a single chip. Their integration is enabled by ongoing miniaturization of chip manufacturing technologies following Moore's Law. It comes with the downside of the circuit elements' increased susceptibility to failure....

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Adaptive Virtual Channel Partitioning for Network-on-Chip in Heterogeneous Architectures

    Current heterogeneous Chip Multi-Processors (CMPs) integrate a GPU architecture on a die. However, the heterogeneity of this architecture inevitably exerts different pressures on shared resource management due to differing characteristics of CPU and GPU cores. The authors consider how to efficiently share on-chip resources between cores within the heterogeneous system,...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    Actor Scheduling for Multicore Hierarchical Memory Platforms

    Erlang applications are present in several mission-critical systems. These systems demand substantial computing resources that are usually provided by multiprocessor and multi-core platforms. Hierarchical memory platforms, or Non-Uniform Memory Access (NUMA) architectures, account for an important share of these platforms. Yet, the research on the suitability of the current Virtual...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    A Practical Theory of Language-Integrated Query

    Language-integrated query is receiving renewed attention, in part because of its support through Microsoft's LINQ framework. The authors present a practical theory of language-integrated query based on quotation and normalization of quoted terms. Their technique supports join queries, abstraction over values and predicates, composition of queries, dynamic generation of queries,...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    Typed Syntactic Meta-Programming

    The authors present a novel set of meta-programming primitives for use in a dependently-typed functional language. The types of their meta-programs provide strong and precise guarantees about their termination, correctness and completeness. Their system supports type-safe construction and analysis of terms, types and typing contexts. Unlike alternative approaches, they are...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    Mio: A High-Performance Multicore IO Manager for GHC

    Haskell threads provide a key, lightweight concurrency abstraction to simplify the programming of important network applications such as web servers and Software-Defined Network (SDN) controllers. The flagship Glasgow Haskell Compiler (GHC) introduces a Run-Time System (RTS) to achieve a high-performance multicore implementation of Haskell threads, by introducing effective components such...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    Incorporating Change Detection in Network Coordinate Systems for Large Data Transfers

    The performance of large scale applications, such as those enabled by service-oriented, grid and cloud technologies, heavily relies on aspects related to the network topology and latency. As such, predicting the actual communication latencies is of high interest. The current state-of-the-art solutions to the problem of estimating the latency among...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    Hardware Design Space Exploration Using HercuLeS HLS

    Current VLSI technology allows the design of sophisticated digital systems with ever-growing requirements in performance and power/energy consumption. HercuLeS is an extensible High-Level Synthesis (HLS) environment. It removes significant human effort by automatically mapping algorithms to hardware, providing a valuable design assist to software-oriented developers. To enable accessibility and easiness...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2013

    A Secure Channel for Attribute-Based Credentials

    Attribute-Based Credentials (ABCs) are building blocks for user-centric identity management. They enable the disclosure of a minimum amount of information about their owner to a verifier, typically a service provider, to authorize the credential owner for some service, application, or resource. By directly applying attribute-disclosure protocols, the data is revealed...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2009

    Efficient Provenance Storage Over Nested Data Collections

    Scientific workflow systems are increasingly used to automate complex data analyses, largely due to their benefits over traditional approaches for workflow design, optimization, and provenance recording. Many workflow systems employ a simple dependency model to represent the provenance of data produced by workflow runs. Although commonly adopted, this model does...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Performance Enhancement With Speculative Execution Based Parallelism for Processing Large-Scale XML-Based Application Data

    This paper presents the design and implementation of a toolkit for processing large-scale XML datasets that utilizes the capabilities for parallelism that are available in the emerging multi-core architectures. Multi-core processors are expected to be widely available in research clusters and scientific desktops, and it is critical to harness the...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    On the Leakage of Personally Identifiable Information Via Online Social Networks

    For purposes of this paper, the authors define "Personally Identifiable Information" (PII) as information which can be used to distinguish or trace an individual's identity either alone or when combined with other information that is linkable to a specific individual. The popularity of Online Social Networks (OSN) has accelerated the...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2009

    Privacy Diffusion on the Web: A Longitudinal Perspective

    For the last few years the authors have studied the diffusion of private information about users as they visit various Web sites triggering data gathering aggregation by third parties. This paper reports on the longitudinal study consisting of multiple snapshots of the examination of such diffusion over four years. They...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2009

    On Reconciling Patches and Aspects

    In previous work, the authors presented a domain-specific enhancement to C, called C4, that lets developers manage program extensions leveraging techniques inspired by the AOSD model as an alternative to the conventional patch approach. The goal is to offer: Tool compatibility letting programmers develop, integrate, modify, and debug C4-based extensions...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Debug All Your Code: Portable Mixed-Environment Debugging

    Programmers build large-scale systems with multiple languages to reuse legacy code and leverage languages best suited to their problems. For instance, the same program may use Java for ease-of-programming and C to interface with the operating system. These programs pose significant debugging challenges, because programmers need to understand and control...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Jinn: Synthesizing Dynamic Bug Detectors for Foreign Language Interfaces

    Programming language specifications mandate static and dynamic analyses to preclude syntactic and semantic errors. Although individual languages are usually well-specified, composing languages is not, and this poor specification is a source of many errors in multilingual programs. For example, virtually all Java programs compose Java and C using the Java...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    Analyzing Multicore Dumps to Facilitate Concurrency Bug Reproduction

    Debugging concurrent programs is difficult. This is primarily because the inherent non-determinism that arises because of scheduler interleavings makes it hard to easily reproduce bugs that may manifest only under certain interleavings. The problem is exacerbated in multi-core environments where there are multiple schedulers, one for each core. In this...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Partial Memoization of Concurrency and Communication

    Memoization is a well-known optimization technique used to eliminate redundant calls for pure functions. If a call to a function f with argument v yields result r, a subsequent call to f with v can be immediately reduced to r without the need to re-evaluate f's body. Understanding memoization in...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2010

    Analyzing Concurrency Bugs Using Dual Slicing

    Recently, there has been much interest in developing analyzes to detect concurrency bugs that arise because of data races, atomicity violations, execution omission, etc. How-ever, determining whether reported bugs are in fact real, and understanding how these bugs lead to incorrect behavior, remains a labor-intensive process. This paper proposes a...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Semantics-Aware Trace Analysis

    As computer systems continue to become more powerful and complex, so do programs. High-level abstractions introduced to deal with complexity in large programs, while simplifying human reasoning, can often obfuscate salient program properties gleaned from automated source-level analysis through subtle (often nonlocal) interactions. Consequently, understanding the effects of program changes...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2011

    Modular Reasoning for Deterministic Parallelism

    Weaving a concurrency control protocol into a program is difficult and error-prone. One way to alleviate this burden is deterministic parallelism. In this well-studied approach to parallelization, a sequential program is annotated with sections that can execute concurrently, with automatically injected control constructs used to ensure observable behaviour consistent with...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2011

    Relaxed-Memory Concurrency and Verified Compilation

    In this paper, the authors consider the semantic design and verified compilation of a C-like programming language for concurrent shared memory computation above x86 multiprocessors. The design of such a language is made surprisingly subtle by several factors: the relaxed-memory behaviour of the hardware, the effects of compiler optimisation on...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    A Scalable, Predictable Join Operator for Highly Concurrent Data Warehouses

    Conventional data warehouses employ the query-at-a-time model, which maps each query to a distinct physical plan. When several queries execute concurrently, this model introduces contention, because the physical plans - unaware of each other - compete for access to the underlying I/O and computation resources. As a result, while modern...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Autocompletion for Mashups

    A mashup is a Web application that integrates data, computation and UI elements provided by several components into a single tool. The concept originated from the understanding that there is an increasing number of applications available on the Web and a growing need to combine them in order to meet...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2009

    TuG Synopses for Approximate Query Answering

    This paper introduces the Tuple Graph (TuG) synopses, a new class of data summaries that enable accurate approximate answers for complex relational queries. The proposed summarization framework adopts a "semi-structured" view of the relational database, modeling a relational data set as a graph of tuples and join queries as graph...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Recommender Systems for the Conference Paper Assignment Problem

    The authors present a recommender systems approach to conference paper assignment, i.e., the task of assigning paper submissions to reviewers. They address both the modeling of reviewer paper preferences (which can be cast as a learning problem) and the optimization of reviewing assignments to satisfy global conference criteria (which can...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2010

    Diagnosing Memory Leaks Using Graph Mining on Heap Dumps

    Memory leaks are caused by software programs that prevent the reclamation of memory that is no longer in use. They can cause significant slowdowns, exhaustion of available storage space and, eventually, application crashes. Detecting memory leaks is challenging because real-world applications are built on multiple layers of software frameworks, making...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Structuring Ordered Nominal Data for Event Sequence Discovery

    This work investigates using n-gram processing and a temporal relation encoding to providing relational information about events extracted from media streams. The event information is temporal and nominal in nature being categorized by a descriptive label or symbolic means and can be difficult to relationally compare and give ranking metrics....

    Provided By Association for Computing Machinery

  • White Papers // Jul 2010

    Unifying Dependent Clustering and Disparate Clustering for Non-Homogeneous Data

    Modern data mining settings involve a combination of attribute valued descriptors over entities as well as specified relationships between these entities. The authors present an approach to cluster such non-homogeneous datasets by using the relationships to impose either dependent clustering or disparate clustering constraints. Unlike prior work that views constraints...

    Provided By Association for Computing Machinery

  • White Papers // May 2010

    Extracting Temporal Signatures for Comprehending Systems Biology Models

    Systems biology has made massive strides in recent years, with capabilities to model complex systems including cell division, stress response, energy metabolism, and signaling pathways. Concomitant with their improved modeling capabilities, however, such biochemical network models have also become notoriously complex for humans to comprehend. The authors propose network comprehension...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2009

    Modular Implementation of Adaptive Decisions in Stochastic Simulations

    The authors present a modular approach to implement adaptive decisions with existing scientific codes. Using a sophisticated system software tool based on the function call interception technique, an external code module is transparently combined with the given program without altering the original code structure, resulting in a newly composed application...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2009

    Capturing Truthiness: Mining Truth Tables in Binary Datasets

    The authors introduce a new data mining problem: mining truth tables in binary datasets. Given a matrix of objects and the properties they satisfy, a truth table identifies a subset of properties that exhibit maximal variability (and hence, complete independence) in occurrence patterns over the underlying objects. This problem is...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Quality of Experience in Distributed Interactive Multimedia Environments: Toward a Theoretical Framework

    The past decades have witnessed a rapid growth of Distributed Interactive Multimedia Environments (DIMEs). Despite their intensity of user-involved interaction, the existing evaluation frameworks remain very much system-centric. As a step toward the human-centric paradigm, the authors present a conceptual framework of Quality of Experience (QoE) in DIMEs, to model,...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2011

    SyncCast: Synchronized Dissemination in Multi-Site Interactive 3D Tele-Immersion

    An ideal interactive 3D Tele-Immersion (3DTI) system is expected to disseminate and synchronize multi-streams with a shortest-possible latency among participating sites, achieve inter-stream synchronization, and bound both inter-sender and inter-receiver skews. This is, however, a key challenge because of the coexistence of multi-modal, correlated, bandwidth-savvy streams from multiple source media,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    TSync: A New Synchronization Framework for Multi-Site 3D Tele-Immersion

    Synchronization is a challenge in the multi-site 3D tele-immersion (3DTI) because it is complicated by the coexistence of highly correlated heterogenous streams from multiple sources, and the need for multi-stream resynchronization when user views change. To address the problems, the authors present TSync: a new multi-tier synchronization framework for 3DTI...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2009

    Enabling Multi-Party 3D Tele-Immersive Environments With ViewCast

    Three-Dimensional Tele-Immersive (3DTI) environments have great potential to promote collaborative work among geographically distributed users. However, most existing 3DTI systems work with only two sites due to the huge demand of resources and the lack of a simple yet powerful networking model to handle connectivity, scalability, and Quality-of-Service (QoS) guarantees....

    Provided By Association for Computing Machinery

  • White Papers // Aug 2010

    RaPTEX: Rapid Prototyping Tool for Embedded Communication Systems

    Advances in microprocessors, memory, and radio technology have enabled the emergence of embedded systems that rely on communication systems to exchange information and coordinate their activities in spatially distributed applications. However, developing embedded communication systems that satisfy specific application requirements is a challenge due to the many tradeoffs imposed by...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Privacy Aware Data Sharing: Balancing the Usability and Privacy of Datasets

    Existing models of privacy assume that the set of data to be held confidential is immutable. Unfortunately, that is often not the case. The need for privacy is balanced against the need to use the data, and the benefits that will accrue from the use of the data. The authors...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    The Security and Privacy Implications of Using Social Networks to Deliver Healthcare

    Healthcare technologies have tended to focus on electronic health records and devices (e.g., devices within the home for patients or handheld devices for nurses and physicians), and the interaction between the two. However, no one to date has investigated how social networking technologies might be used to provide an assistive...

    Provided By Association for Computing Machinery

  • White Papers // May 2009

    A Practical Joint Network-Channel Coding Scheme for Reliable Communication in Wireless Networks

    In this paper, THE AUTHORS propose a practical scheme, called Non-Binary Joint Network-Channel Decoding (NB-JNCD) for reliable communication in wireless networks. It seamlessly couples channel coding and network coding, and can effectively combat the detrimental effect of fading of wireless channels, especially in large networks. On a high order Galois...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2010

    Performance Comparison of 3G and Metro-Scale WiFi for Vehicular Network Access

    The authors perform a head-to-head comparison of the performance characteristics of a 3G network operated by a nation-wide provider and a metro-scale Wi-Fi network operated by a commercial ISP, from the perspective of vehicular network access. The experience shows that over a wide geographic region and under vehicular mobility, these...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Predictive Methods for Improved Vehicular WiFi Access

    With the proliferation of Wi-Fi technology, many Wi-Fi networks are accessible from vehicles on the road making vehicular Wi-Fi access realistic. However, several challenges exist: long latency to establish connection to a Wi-Fi Access Point (AP), lossy link performance, and frequent disconnections due to mobility. The authors argue that people...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    GrassRoots: Socially-Driven Web Sites for the Masses

    Large, socially-driven Web 2.0 sites such as Facebook and Youtube have seen significant growth in popularity. However, strong demand also exists for socially-driven web sites specialized to companies and knowledge domains. Unfortunately, existing tools for building such sites only provide low-level functionality to address recurring search and organization patterns. Further,...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2009

    BUFFALO: Bloom Filter Forwarding Architecture for Large Organizations

    In enterprise and data center networks, the scalability of the data plane becomes increasingly challenging as forwarding tables and link speeds grow. Simply building switches with larger amounts of faster memory is not appealing, since high-speed memory is both expensive and power hungry. Implementing hash tables in SRAM is not...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    Scalable Flow-Based Networking With DIFANE

    Ideally, enterprise administrators could specify fine-grain policies that drive how the underlying switches forward, drop, and measure traffic. However, existing techniques for flow-based networking rely too heavily on centralized controller software that installs rules reactively, based on the first packet of each flow. In this paper, the authors propose DIFANE,...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    Accelerating SQL Database Operations on a GPU With CUDA

    Prior work has shown dramatic acceleration for various data-base operations on GPUs, but only using primitives that are not part of conventional database languages such as SQL. This paper implements a subset of the SQLite command processor directly on the GPU. This dramatically reduces the e ort required to achieve...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    Federation: Boosting Per-Thread Performance of Throughput-Oriented Manycore Architectures

    Manycore architectures designed for parallel workloads are likely to use simple, highly multi-threaded, in-order cores. This maximizes throughput, but only with enough threads to keep hardware utilized. For applications or phases with more limited parallelism, the authors describe creating an out-of-order processor on the fly, by federating two neighboring in-order...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Increasing Memory Miss Tolerance for SIMD Cores

    Manycore processors with wide SIMD cores are becoming a popular choice for the next generation of throughput oriented architectures. The authors introduce a hardware technique called "Diverge on miss" that allows SIMD cores to better tolerate memory latency for workloads with non-contiguous memory access patterns. Individual threads within a SIMD...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    Back-Pressure Routing and Rate Control for ICNs

    The authors study a network composed of multiple clusters of wireless nodes. Within each cluster, nodes can communicate directly using the wireless links; however, these clusters are far away such that direct communication between the clusters is impossible except through "Mobile" contact nodes. These mobile contact nodes are data carriers...

    Provided By Association for Computing Machinery