Association for Computing Machinery

Displaying 321-360 of 6992 results

  • White Papers // Jun 2013

    RetroSkeleton: Retrofitting Android Apps

    An obvious asset of the android platform is the tremendous number and variety of available apps. There is a less obvious, but potentially even more important, benefit to the fact that nearly all apps are developed using a common platform. The authors can leverage the relatively uniform nature of android...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    ProtectMyPrivacy: Detecting and Mitigating Privacy Leaks on iOS Devices Using Crowdsourcing

    In this paper the authors present the design and implementation of ProtectMyPrivacy (PMP), a system for iOS devices to detect access to private data and protect users by substituting anonymized data in its place if users decide. They developed a novel crowd-sourced recommendation engine driven by users who contribute their...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Timeline Index: A Unified Data Structure for Processing Queries on Temporal Data in SAP HANA

    Managing temporal data is becoming increasingly important for many applications. Several database systems already support the time dimension, but provide only few temporal operators, which also often exhibit poor performance characteristics. On the academic side, a large number of algorithms and data structures have been proposed, but they often address...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Bolt-on Causal Consistency

    The authors consider the problem of separating consistency-related safety properties from availability and durability in distributed data stores via the application of a \"Bolt-on\" shim layer that upgrades the safety of an underlying general-purpose data store. This shim provides the same consistency guarantees atop a wide range of widely deployed...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Shark: SQL and Rich Analytics at Scale

    Shark is a new data analysis system that marries query processing with complex analytics on large clusters. It leverages a novel distributed memory abstraction to provide a unified engine that can run SQL queries and sophisticated analytics functions (e.g., iterative machine learning) at scale, and efficiently recovers from failures mid-query....

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Query Processing on Smart SSDs: Opportunities and Challenges

    Data storage devices are getting \"Smarter.\" Smart flash storage devices (a.k.a. \"Smart SSD\") are on the horizon and will package CPU processing and DRAM storage inside a Smart SSD, and make that available to run user programs inside a Smart SSD. The focus of this paper is on exploring the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    BitWeaving: Fast Scans for Main Memory Data Processing

    In this paper, the authors focus on running scans in a main memory data processing system at \"Bare metal\" speed. Essentially, this means that the system must aim to process data at or near the speed of the processor (the fastest component in most system configurations). Scans are common in...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Die-Stacked DRAM Caches for Servers

    Recent research advocates using large die-stacked DRAM caches to break the memory bandwidth wall. Existing DRAM cache designs fall into one of two categories - block-based and page based. The former organize data in conventional blocks (e.g., 64B), ensuring low off-chip bandwidth utilization, but co-locate tags and data in the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Less Watts, More Performance: An Intelligent Storage Engine for Data Appliances

    Modern data appliances such as IBM's Netezza and Oracle's Exadata are moving toward architectures with widespread query off-loading to different elements of the system. The goal is both to speed up query processing and to reduce data movement since the network bandwidth is still one of the dominant bottlenecks in...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    DBMS Metrology: Measuring Query Time

    It is surprisingly hard to obtain accurate and precise measurements of the time spent executing a query. The authors review relevant process and overall measures obtainable from the Linux kernel and introduce a structural causal model relating these measures. A thorough correlational analysis provides strong support for this model. Using...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Learning and Verifying Quantified Boolean Queries by Example

    To help a user specify and verify quantified queries - a class of database queries known to be very challenging for all but the most expert users - one can question the user on whether certain data objects are answers or non-answers to their intended query. In this paper, the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    FAST: Differentially Private Real-Time Aggregate Monitor with Filtering and Adaptive Sampling

    Sharing aggregate statistics of private data can be of great value when data mining can be performed in real-time to understand important phenomena such as influenza outbreaks or traffic congestion. However, to this date there have been no tools for releasing real-time aggregated data with differential privacy, a strong and...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    LinkIT: Privacy Preserving Record Linkage and Integration via Transformations

    The authors propose to demonstrate an open-source tool, LinkIT, for privacy preserving record Linkage and Integration via data Transformations. LinkIT implements novel algorithms that support data transformations for linking sensitive attributes, and is designed to work with their previously developed tool, FRIL (Fine-grained Record Integration and Linkage), to provide a...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Microarchitectural Mechanisms to Exploit Value Structure in SIMT Architectures

    SIMT architectures improve performance and efficiency by exploiting control and memory-access structure across data-parallel threads. Value structure occurs when multiple threads operate on values that can be compactly encoded, e.g., by using a simple function of the thread index. The authors characterize the availability of control, memory-access, and value structure...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Continuous Outlier Detection in Data Streams: An Extensible Framework and State-Of-The-Art Algorithms

    Anomaly detection is an important data mining task, aiming at the discovery of elements that show significant diversion from the expected behavior; such elements are termed as outliers. One of the most widely employed criteria for determining whether an element is an outlier is based on the number of neighboring...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    DBalancer: Distributed Load Balancing for NoSQL Data-Stores

    Unanticipated load spikes or skewed data access patterns may lead to severe performance degradation in data serving applications, a typical problem of distributed NoSQL data-stores. In these cases, load balancing is a necessary operation. In this paper, the authors present the DBalancer, a generic distributed module that can be installed...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    COCCUS: Self-Configured Cost-Based Query Services in the Cloud

    Recently, a large number of pay-as-you-go data services are offered over cloud infrastructures. Data service providers need appropriate and flexible query charging mechanisms and query optimization that take into consideration cloud operational expenses, pricing strategies and user preferences. Yet, existing solutions are static and non-configurable. The authors demonstrate COCCUS a...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Understanding and Mitigating Refresh Overheads in High-Density DDR4 DRAM Systems

    Recent DRAM specifications exhibit increasing refresh latencies. A refresh command blocks a full rank, decreasing available parallelism in the memory subsystem significantly, thus decreasing performance. Fine Granularity Refresh (FGR) is a feature recently announced as part of JEDEC's DDR4 DRAM specification that attempts to tackle this problem by creating a...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    BigBench: Towards an Industry Standard Benchmark for Big Data Analytics

    There is a tremendous interest in big data by academia, industry and a large user base. Several commercial and open source providers unleashed a variety of products to support big data storage and processing. As these products mature, there is a need to evaluate and compare the performance of these...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Maximizing SIMD Resource Utilization in GPGPUs with SIMD Lane Permutation

    Current GPUs maintain high programmability by abstracting the SIMD nature of the hardware as independent concur-rent threads of control with hardware responsible for generating predicate masks to utilize the SIMD hardware for different flows of control. This dynamic masking leads to poor utilization of SIMD resources when the control of...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Integrating Scale Out and Fault Tolerance in Stream Processing Using Operator State Management

    As users of \"Big data\" applications expect fresh results, the authors witness a new breed of Stream Processing Systems (SPS) that are designed to scale to large numbers of cloud-hosted machines. Such systems face new challenges: to benefit from the \"Pay-as-you-go\" model of cloud computing, they must scale out on...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Optimal Splitters for Temporal and Multi-Version Databases

    Temporal and multi-version databases are ideal candidates for a distributed store, which offers large storage space, and parallel and distributed processing power from a cluster of machines. A key challenge is to achieve a good load balancing algorithm for storage and processing of these data, which is done by partitioning...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Quality and Efficiency in Kernel Density Estimates for Large Data

    Kernel density estimates are important for a broad variety of applications. Their construction has been well-studied, but existing techniques are expensive on massive datasets and/or only provide heuristic approximations without theoretical guarantees. The authors propose randomized and deterministic algorithms with quality guarantees which are orders of magnitude more efficient than...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    PBS at Work: Advancing Data Management with Consistency Metrics

    A large body of recent work has proposed analytical and empirical techniques for quantifying the data consistency properties of distributed data stores. In this paper, the authors begin to explore the wide range of new database functionality they enable, including dynamic query tuning, consistency SLAs, monitoring, and administration. Their demonstration...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Trust Management of Services in Cloud Environments: Obstacles and Solutions

    Trust management is one of the most challenging issues in the emerging cloud computing area. Over the past few years, many studies have proposed different techniques to address trust management issues. In this paper, the authors present an overview of the cloud service models and they survey the main techniques...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    An Energy-Efficient and Scalable EDRAM-Based Register File Architecture for GPGPU

    The heavily-threaded data processing demands of Streaming Multiprocessors (SM) in a GPGPU require a large Register File (RF). The fast increasing size of the RF makes the area cost and power consumption unaffordable for traditional SRAM designs in the future technologies. In this paper, the authors propose to use embedded-DRAM...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    OLTP in Wonderland

    For several decades, online transaction processing has been one of the main applications that drives innovations in the data management ecosystem, and in turn the database and computer architecture communities. Despite the novel approaches from industry and various research proposals from academia, recent studies emphasize that OLTP workloads still cannot...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Rapid Development of Data Generators Using Meta Generators in PDGF

    Generating data sets for the performance testing of database systems on a particular hardware configuration and application domain is a very time consuming and tedious process. It is time consuming, because of the large amount of data that needs to be generated and tedious, because new data generators might need...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Reversing Statistics for Scalable Test Databases Generation

    Testing the performance of database systems is commonly accomplished using synthetic data and workload generators such as TPCH and TPC-DS. Customer data and workloads are hard to obtain due to their sensitive nature and prohibitively large sizes. As a result, oftentimes the data management systems are not properly tested before...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Issues in Big Data Testing and Benchmarking

    The academic community and industry are currently researching and building next generation data management systems. These systems are designed to analyze data sets of high volume with high data ingest rates and short response times executing complex data analysis algorithms on data that does not adhere to relational data models....

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Using Similarity Distance for Performance Prediction of the Query Optimization Process

    Query optimization is a sophisticated process whose resource consumption and quality of the best execution plan depends on the query complexity, available resources of the RDBMS server, and the current instance of the database. For a self-managing RDBMS such as SAP SQL Anywhere, the query optimizer must adapt each optimization...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Scaling Up Analytical Queries With Column-Stores

    As data analytics is used by an increasing number of applications, data analytics engines are required to execute workloads with increased concurrency, i.e., an increasing number of clients submitting queries. Data management systems designed for data analytics - a market dominated by column-stores - however, were initially optimized for single...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Improving Memory Scheduling via Processor-Side Load Criticality Information

    The authors hypothesize that performing processor-side analysis of load instructions, and providing this pre-digested information to memory schedulers judiciously, can increase the sophistication of memory decisions while maintaining a lean memory controller that can take scheduling actions quickly. This is increasingly important as DRAM frequencies continue to increase relative to...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Leveraging Flexible Data Management with Graph Databases

    Integrating up-to-date information into databases from different heterogeneous data sources is still a time-consuming and mostly manual job that can only be accomplished by skilled experts. For this reason, enterprises often lack information regarding the current market situation, preventing a holistic view that is needed to conduct sound data analysis...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Multi-Objective Optimization of Data Flows in a Multi-Cloud Environment

    As cloud-based solutions have become one of the main choices for intensive data analysis both for business decision making and scientific purposes, users face the problem of choosing among different cloud providers. In this paper, the authors deal with data analysis flows that can be split in stages, and each...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    A Vision for Personalized Service Level Agreements in the Cloud

    Public Clouds today provide a variety of services for data analysis such as Amazon Elastic MapReduce and Google BigQuery. Each service comes with a pricing model and Service Level Agreement (SLA). Today's pricing models and SLAs are described at the level of compute resources (instance-hours or gigabytes processed). They are...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Terra: A Multi-Stage Language for High-Performance Computing

    High-performance computing applications, such as auto-tuners and domain-specific languages, rely on generative programming techniques to achieve high performance and portability. However, these systems are often implemented in multiple disparate languages and perform code generation in a separate process from program execution, making certain optimizations difficult to engineer. The authors leverage...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Policy-by-Example for Online Social Networks

    The authors introduce two approaches for improving privacy policy management in online social networks. First, they introduce a mechanism using proven clustering techniques that assists users in grouping their friends for group based policy management approaches. Second, they introduce a policy management approach that leverages a user's memory and opinion...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Virtual TCP Offload: Optimizing Ethernet Overlay Performance on Advanced Interconnects

    Ethernet overlay networks are a powerful tool for virtualizing networked applications. Their performance suffers on advanced interconnects such as Infiniband, however, be-cause of differences between the semantics of Ethernet and the underlying network. In this paper, the authors demonstrate that providing a virtual TCP offload Ethernet device to the guest...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Stochastic Modeling of Large-Scale Solid-State Storage Systems: Analysis, Design Tradeoffs and Optimization

    Solid State Drives (SSDs) have seen wide deployment in mobiles, desktops, and data centers due to their high I/O performance and low energy consumption. As SSDs write data out-of-place, Garbage Collection (GC) is required to erase and reclaim space with invalid data. However, GC poses additional writes that hinder the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Secure File System Services for Web 2.0 Applications

    The authors present a design for a file system that provides a secure file storage service for Web 2.0 applications. Currently, each Web application stores its own user data. This not only burdens the applications with storing, managing, and securing user data but also deprives users from controlling their own...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    Multi-Party Off-the-Record Messaging

    Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation is no less important than secrecy and authenticity. For whistleblowers, informants, political dissidents and journalists to name a few it is most important to have means...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Defending Against Sensor-Sniffing Attacks on Mobile Phones

    Modern mobile phones possess three types of capabilities: computing, communication, and sensing. While these capabilities enable a variety of novel applications, they also raise serious privacy concerns. The authors explore the vulnerability where attackers snoop on users by sniffing on their mobile phone sensors, such as the microphone, camera, and...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    Directing JavaScript With Arrows

    JavaScript programmers make extensive use of event-driven programming to help build responsive web applications. However, standard approaches to sequencing events are messy, and often lead to code that is difficult to understand and maintain. The authors have found that arrows, a generalization of monads, are an elegant solution to this...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    Path Projection for User-Centered Static Analysis Tools

    The research and industrial communities have made great strides in developing sophisticated defect detection tools based on static analysis. To date most of the work in this area has focused on developing novel static analysis algorithms, but has neglected study of other aspects of static analysis tools, particularly user interfaces....

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Large-Scale Malware Indexing Using Function-Call Graphs

    A major challenge of the Anti-Virus (AV) industry is how to effectively process the huge influx of malware samples they receive every day. One possible solution to this problem is to quickly determine if a new malware sample is similar to any previously-seen malware program. This paper designs, implements and...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2008

    An Empirical Comparison of Throughput-Maximizing Wireless Mesh Routing Protocols

    Communication quality of wireless network links is heavily dependent on various external factors such as physical geometry of environmental objects and interference among radio signal sources. As a result, the radio channel quality of real-world wireless networks tends to exhibit both short-term and long-term temporal variations that are in general...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Finding Bugs in Exceptional Situations of JNI Programs

    Software flaws in native methods may defeat Java's guarantees of safety and security. One common kind of flaws in native methods results from the discrepancy on how exceptions are handled in Java and in native methods. Unlike exceptions in Java, exceptions raised in the native code through the Java Native...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Robusta: Taming the Native Beast of the JVM

    Java applications often need to incorporate native-code components for efficiency and for reusing legacy code. However, it is well known that the use of native code defeats Java's security model. The authors describe the design and implementation of Robusta, a complete framework that provides safety and security to native code...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2009

    Automating Analysis of Large-Scale Botnet Probing Events

    Botnets dominate today's attack landscape. This work investigates ways to analyze collections of malicious probing traffic in order to understand the significance of large-scale "Botnet probes". In such events, an entire collection of remote hosts together probes the address space monitored by a sensor in some sort of coordinated fashion....

    Provided By Association for Computing Machinery

  • White Papers // Nov 2008

    Programming Languages in a Liberal Arts Education

    Liberal arts curricula emphasize breadth of a student's educational experience, critical reasoning, and intellectual discourse to a greater degree than pre-professional training or engineering programs. This substantially impacts how the topic of programming languages (and the computer science in general) is taught. The authors highlight some key aspects of teaching...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2008

    Programming Languages as Part of Core Computer Science

    The authors argue that the need for a programming languages course has not diminished, but instead increased, especially as people move into an era of many-core computing. The programming language course has played, and will continue to play, an important role in the education of undergraduates. As such, it should...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    Test Generation to Expose Changes in Evolving Programs

    Software constantly undergoes changes throughout its life cycle, and thereby it evolves. As changes are introduced into a code base, the authors need to make sure that the effect of the changes is thoroughly tested. For this purpose, it is important to generate test cases that can stress the effect...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    Performance Debugging of Esterel Specifications

    Synchronous languages like Esterel have been widely adopted for designing reactive systems in safety-critical domains such as avionics. Specifications written in Esterel are based on the underlying "Synchrony hypothesis", where the computation/communication associated with the processing of all events occurring within the same "Clock tick" are assumed to happen instantaneously...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    Scratchpad Allocation for Concurrent Embedded Software

    Software-controlled scratchpad memory is increasingly employed in embedded systems as it offers better timing predictability compared to caches. Previous scratchpad allocation algorithms typically consider single process applications. But embedded applications are mostly multi-tasking with real-time constraints, where the scratchpad memory space has to be shared among interacting processes that may...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Context-Sensitive Timing Analysis of Esterel Programs

    Traditionally, synchronous languages, such as Esterel, have been compiled into hardware, where timing analysis is relatively easy. When compiled into software - e.g., into sequential C code - very conservative estimation techniques have been used, where the focus has only been on obtaining safe timing estimates and not on the...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    Cache-Aware Optimization of BAN Applications

    Body-Area sensor network or BAN-based health monitoring is increasingly becoming a popular alternative to traditional wired bio-monitoring techniques. However, most bio-monitoring applications need continuous processing of large volumes of data, as a result of which both power consumption and computation bandwidth turn out to be serious constraints for sensor network...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    Power Routing: Dynamic Power Provisioning in the Data Center

    Data center power infrastructure incurs massive capital costs, which typically exceed energy costs over the life of the facility. To squeeze maximum value from the infrastructure, researchers have proposed over-subscribing power circuits, relying on the observation that peak loads are rare. To ensure availability, these proposals employ power capping, which...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Application Containers Without Virtual Machines

    This paper introduces lightweight Cryptographic Jails (CryptoJails) that protect the privacy of application data by intercepting write accesses and redirecting them to encrypted application containers. CryptoJails ensure that application data (for example, cached emails or web pages) cannot be read or undetectably altered by other applications. Unlike existing approaches, CryptoJails...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    OMash: Enabling Secure Web Mashups via Object Abstractions

    The current security model used by web browsers, the Same Origin Policy (SOP), does not support secure cross-domain communication desired by web mashup developers. The developers have to choose between no trust, where no communication is allowed, and full trust, where third-party content runs with the full privilege of the...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2010

    CCMP: A Novel Standard Protocol for Conference Management in the XCON Framework

    This paper presents the design and implementation of CCMP, a conference management protocol currently under standardization within the IETF, conceived at the outset as a lightweight protocol allowing conferencing clients to access and manipulate objects describing a centralized conference. The CCMP is a state-less, XML-based, client-server protocol carrying in its...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    Using Conference Servers for SIP-Based Vertical Handoff Between IP and Cellular Networks

    The Session Initiation Protocol (SIP) is the preferred signaling protocol for creating and terminating multimedia sessions in an IP network. Also, voice over IP is becoming the favored means of voice communication mainly because of its low cost when compared to voice communication over traditional networks like cellular and PSTN....

    Provided By Association for Computing Machinery

  • White Papers // Aug 2010

    The Impact of TLS on SIP Server Performance

    Securing VoIP is a crucial requirement for its successful adoption. A key component of this is securing the signaling path, which is performed by SIP. Securing SIP is accomplished by using TLS instead of UDP as the transport protocol. However, using TLS for SIP is not yet widespread, perhaps due...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    MIMO Rate Adaptation in 802.11n Wireless Networks

    This paper studies MIMO based Rate Adaptation (RA) in 802.11n wireless networks. The case study shows that existing RA algorithms offer much lower throughput than even a fixed-rate scheme. The fundamental problem is that, all such algorithms are MIMO oblivious; they do not consider the characteristics of diversity-oriented, single-stream mode...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Point&Connect: Intention-Based Device Pairing for Mobile Phone Users

    Point&Connect (P&C) offers an intuitive and resilient device pairing solution on standard mobile phones. Its operation follows the simple sequence of point-and-connect: when a user plans to pair her mobile phone with another device nearby, she makes a simple hand gesture that points her phone towards the intended target. The...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Managing Tenants in a Multi-Tenant SaaS

    A multi-tenant Software as a Service (SaaS) system has to meet the needs of several tenant organizations, which connect to the system to utilize its services. To leverage economies of scale through reuse, a SaaS vendor would, in general, like to drive commonality amongst the requirements across tenants. However, many...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Generating Test Programs to Cover Pipeline Interactions

    Functional validation of a processor design through execution of a suite of test programs is common industrial practice. In this paper, the authors develop a high-level architectural specification driven methodology for systematic test-suite generation. The primary contribution is an automated test-suite generation methodology that covers all possible processor pipeline interactions....

    Provided By Association for Computing Machinery

  • White Papers // Nov 2010

    Golden Implementation Driven Software Debugging

    The presence of a functionally correct golden implementation has a significant advantage in the software development life cycle. Such a golden implementation is exploited for software development in several domains, including embedded software - a low resource consuming version of the golden implementation. The golden implementation gives the functionality that...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2011

    Mining Message Sequence Graphs

    Dynamic specification mining involves discovering software behavior from traces for the purpose of program comprehension and bug detection. However, mining program behavior from execution traces is difficult for concurrent/distributed programs. Specifically, the inherent partial order relationships among events occurring across processes pose a big challenge to specification mining. In this...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    Engineering Multi-Tenant Software-as-a-Service Systems

    Increasingly, Software-as-a-Service (SaaS) is becoming a dominant mechanism for the consumption of software by end users. From a vendor's perspective, the benefits of SaaS arise from leveraging economies of scale, by serving a large number of customers ("Tenants") through a shared instance of a centrally hosted software service. Consequently, a...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Modeling Shared Cache and Bus in Multi-Cores for Timing Analysis

    Timing analysis of concurrent programs running on multi-core platforms is currently an important problem. The key to solving this problem is to accurately model the timing effects of shared resources in multi-cores, namely shared cache and bus. In this paper, the authors provide an integrated timing analysis framework that captures...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2011

    Sequential Cost-Sensitive Decision Making With Reinforcement Learning

    Recently, there has been increasing interest in the issues of cost-sensitive learning and decision making in a variety of applications of data mining. A number of approaches have been developed that are effective at optimizing cost-sensitive decisions when each decision is considered in isolation. However, the issue of sequential decision...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2010

    An Empirical Study of Low-Power Wireless

    This paper presents empirical measurements of the packet delivery performance of the latest sensor platforms: Micaz and Telos motes. In this paper the authors present observations that have implications to a set of common assumptions protocol designers make while designing sensornet protocols - specifically - the MAC and network layer...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Experiences With a High-Fidelity Wireless Building Energy Auditing Network

    This paper describes the design, deployment, and experience with a wireless sensor network for high-fidelity monitoring of electrical usage in buildings. A network of 38 mote-class AC meters, 6 light sensors, and 1 vibration sensor is used to determine and audit the energy envelope of an active laboratory. Classic WSN...

    Provided By Association for Computing Machinery

  • White Papers // May 2010

    Software Development for a Novel WSN Platform

    This work-in-progress paper introduces a new hardware platform for wireless sensor networks, summarizes the new challenges it creates for software development and describes a toolchain being developed to meet those challenges. The hardware platform is based on a low-power FPGA as opposed to a traditional microcontroller. The FPGA configuration includes...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Scalable Onion Routing With Torsk

    The authors introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of the popular Tor anonymity network, that decreases the bandwidth cost of relay selection and maintenance from quadratic to quasilinear while introducing no new attacks on...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2008

    Poster Abstract: Application-Specific Trace Compression for Low Bandwidth Trace Logging

    This poster introduces an application-specific trace log compression mechanism targeted for execution on wireless sensor network nodes. Trace logs capture sequences of significant events executed on a node to provide visibility into the system. The application-specific compression mechanism exploits static program control flow knowledge to automate insertion of trace statements...

    Provided By Association for Computing Machinery

  • White Papers // May 2009

    Energy Efficient Sampling for Event Detection in Wireless Sensor Networks

    Compressive Sensing (CS) is a recently developed mechanism that allows signal acquisition and compression to be performed in one inexpensive step so that the sampling process itself produces a compressed version of the signal. This significantly improves systemic energy efficiency because the average sampling rate can be considerably reduced and...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    DieHarder: Securing the Heap

    Heap-based attacks depend on a combination of memory management errors and an exploitable memory allocator. Many allocators include ad hoc countermeasures against particular exploits, but their effectiveness against future exploits has been uncertain. This paper presents the first formal treatment of the impact of allocator design on security. It analyzes...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Medium Access Control for Underwater Acoustic Sensor Networks With MIMO Links

    The requirements of multimedia underwater monitoring applications with heterogeneous traffic demands in terms of bandwidth and end-to-end reliability are considered in this paper. To address these requirements, a new medium access control protocol named UMIMO-MAC is proposed. UMIMO-MAC is designed to - adaptively leverage the tradeoff between multiplexing and diversity...

    Provided By Association for Computing Machinery