Association for Computing Machinery

Displaying 321-360 of 6769 results

  • White Papers // Aug 2013

    SoftRAN: Software Defined Radio Access Network

    An important piece of the cellular network infrastructure is the Radio Access Network (RAN) that provides wide-area wireless connectivity to mobile devices. The fundamental problem the RAN solves is figuring out how best to use and manage limited spectrum to achieve this connectivity. In a dense wireless deployment with mobile...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    A General Bootstrap Performance Diagnostic

    As datasets become larger, more complex, and more available to diverse groups of analysts, it would be quite useful to be able to automatically and generically assess the quality of estimates, much as the user are able to automatically train and evaluate predictive models such as classifiers. However, despite the...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    SiGMa: Simple Greedy Matching for Aligning Large Knowledge Bases

    The Internet has enabled the creation of a growing number of large-scale knowledge bases in a variety of domains containing complementary information. Tools for automatically aligning these knowledge bases would make it possible to unify many sources of structured knowledge and answer complex queries. However, the efficient alignment of large-scale...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    Kernel Density Metric Learning

    In this paper, the authors introduce a supervised metric learning algorithm, called Kernel Density Metric Learning (KDML), which is easy to use and provides nonlinear, probability-based distance measures. KDML constructs a direct nonlinear mapping from the original input space into a feature space based on kernel density estimation. The nonlinear...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    CAPRI: A Tool for Mining Complex Line Patterns in Large Log Data

    Log files provide important information for troubleshooting complex systems. However, the structure and contents of the log data and messages vary widely. For automated processing, it is necessary to first understand the layout and the structure of the data, which becomes very challenging when a massive amount of data and...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    Understanding Twitter Data with TweetXplorer

    The term \"Big data\" describes data of a magnitude so large that it requires a change in methodology in order to process. In the era of big data it is increasingly difficult for an analyst to extract meaningful knowledge from a sea of information. The authors present TweetXplorer, a system...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    Big Data Analytics with Small Footprint: Squaring the Cloud

    The motive for the BID data suite is exploratory data analysis. Exploratory analysis involves sifting through data, making hypotheses about structure and rapidly testing them. This paper describes the BID Data Suite, a collection of hardware, software and design patterns that enable fast, large-scale data mining at very low cost....

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    Social Influence Based Clustering of Heterogeneous Information Networks

    Social networks continue to grow in size and the type of information hosted. The authors witness a growing interest in clustering a social network of people based on both their social relationships and their participations in activity based information networks. In this paper, they present a social influence based clustering...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    Cost-Sensitive Online Active Learning with Application to Malicious URL Detection

    Malicious Uniform Resource Locator (URL) detection is an important problem in web search and mining, which plays a critical role in internet security. In literature, many existing studies have attempted to formulate the problem as a regular supervised binary classification task, which typically aims to optimize the prediction accuracy. However,...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    Subsampling for Efficient and Effective Unsupervised Outlier Detection Ensembles

    Outlier detection and ensemble learning are well established research directions in data mining yet the application of ensemble techniques to outlier detection has been rarely studied. Here, the authors propose and study sub-sampling as a technique to induce diversity among individual outlier detectors. They show analytically and experimentally that an...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    SAE: Social Analytic Engine for Large Networks

    The rapid proliferation of online social networks provides rich data for the user to understand the complex mechanism that governs the dynamics of social networks. This has attracted much attention from both academic and industrial communities. For example, SNAP is general purpose network analysis and graph mining library. It is...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    Connecting Users Across Social Media Sites: A Behavioral-Modeling Approach

    People use various social media for different purposes. The information on an individual site is often incomplete. When sources of complementary information are integrated, a better profile of a user can be built to improve online services such as verifying online information. To integrate these sources of information, it is...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    A Tool for Collecting Provenance Data in Social Media

    In recent years, social media sites have provided a large amount of information. Recipients of such information need mechanisms to know more about the received information, including the provenance. Previous paper has shown that some attributes related to the received information provide additional context, so that a recipient can assess...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    AMETHYST: A System for Mining and Exploring Topical Hierarchies of Heterogeneous Data

    In this paper, the authors present AMETHYST, a system for exploring and analyzing a topical hierarchy constructed from a Heterogeneous Information Network (HIN). HINs, composed of multiple types of entities and links are very common in the real world. Many have a text component, and thus can benefit from a...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    EventCube: Multi-Dimensional Search and Mining of Structured and Text Data

    A large portion of real world data is either text or structured (e.g., relational) data. Moreover, such data objects are often linked together (e.g., structured specification of products linking with the corresponding product descriptions and customer comments). Even for text data such as news data, typed entities can be extracted...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    Mining Lines in the Sand: On Trajectory Discovery From Untrustworthy Data in Cyber-Physical System

    A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a context sensitive system that responds intelligently to dynamic changes in real-world situations. The CPS has wide applications in scenarios such as environment monitoring, battlefield surveillance and traffic control. One key research problem of...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    A Phrase Mining Framework for Recursive Construction of a Topical Hierarchy

    A high quality hierarchical organization of the concepts in a dataset at different levels of granularity has many valuable applications such as search, summarization, and con-tent browsing. In this paper, the authors propose an algorithm for recursively constructing a hierarchy of topics from a collection of content-representative documents. They characterize...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    Energy-Efficient Content Retrieval in Mobile Cloud

    Mobile Cloud Computing (MCC) has recently been drawing increased attention in academia as well as industry. Content retrieval is a critical service, for many mobile cloud applications and in turns relies on other resources and tools, e.g., internal storage, content searching and sharing, etc. Previous studies have shown that conventional...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    NLSR: Named-Data Link State Routing Protocol

    In this paper, the authors present the design of the Named-data Link State Routing protocol (NLSR), a routing protocol for Named Data Networking (NDN). Since NDN uses names to identify and retrieve data, NLSR propagates reachability to name prefixes instead of IP prefixes. Moreover, NLSR differs from IP-based link-state routing...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    A Flexible Elastic Control Plane for Private Clouds

    While public cloud computing platforms have become popular in recent years, private clouds - operated by enterprises for their internal use - have also begun gaining traction. The configuration and continuous tuning of a private cloud to meet user demands is a complex task. While private cloud management frameworks provide...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    Autonomously Improving Query Evaluations Over Multidimensional Data in Distributed Hash Tables

    The proliferation of observational devices and sensors with networking capabilities has led to growth in both the rates and sources of data that ultimately contribute to extreme-scale data volumes. Datasets generated in such settings are often multidimensional, with each dimension accounting for a feature of interest. The authors posit that...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    Mobile Social Networking Through Friend-to-Friend Opportunistic Content Dissemination

    The authors focus on dissemination of content for delay tolerant applications, (i.e. content sharing, advertisement propagation, etc.) where users are geographically clustered into communities. They propose a novel architecture that addresses the issues of lack of trust, delivery latency, loss of user control, and privacy-aware distributed mobile social networking by...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2013

    Low-Power, Low-Storage-Overhead Chipkill Correct Via Multi-Line Error Correction

    Due to their large memory capacities, many modern servers require chipkill-correct, an advanced type of memory error detection and correction, to meet their reliability requirements. However, existing chipkill-correct solutions incur high power or storage overheads or both because they use dedicated error-correction resources per codeword to per-form error correction. This...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2013

    Opportunities and pitfalls of multi-core scaling using Hardware Transaction Memory

    Hardware transactional memory, which holds the promise to simplify and scale up multicore synchronization, has recently become available in main stream processors in the form of Intel's Restricted Transactional Memory (RTM). Will RTM be a panacea for multicore scaling? This paper tries to shed some light on this question by...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2013

    Cache-Conscious Performance Optimization for Similarity Search

    All-pairs similarity search can be implemented in two stages. The first stage is to partition the data and group potentially similar vectors. The second stage is to run a set of tasks where each task compares a partition of vectors with other candidate partitions. Because of data sparsity, accessing feature...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2013

    Personal Cloudlets for Privacy and Resource Efficiency in Mobile In-App Advertising

    Mobile in-app ads are the major funding source for free mobile apps which users download from various app markets and install in their Smartphones. However, number researchers have recently pointed out that ad-supported free apps involve hidden costs to the users. Costs are primarily associated with the loss of privacy...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2013

    Automated, Retargetable Back-Annotation for Host Compiled Performance and Power Modeling

    With traditional cycle-accurate or instruction-set simulations of processors often being too slow, host-compiled or source-level software execution approaches have recently become popular. Such high-level simulations can achieve order of magnitude speedups, but approaches that can achieve highly accurate characterization of both power and performance metrics are lacking. In this paper,...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2013

    Preliminary Experiences with the Uintah Framework on Intel Xeon Phi and Stampede

    In this paper, the authors describe their preliminary experiences on the stampede system in the context of the Uintah computational framework. Uintah was developed to provide an environment for solving a broad class of fluid-structure interaction problems on structured adaptive grids. Uintah uses a combination of fluid-flow solvers and particle-based...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2013

    Locality-Aware Task Management for Unstructured Parallelism: A Quantitative Limit Study

    In this paper, the authors increase the number of cores on a processor die, the on-chip cache hierarchies that support these cores are getting larger, deeper, and more complex. As a result, non-uniform memory access effects are now prevalent even on a single chip. To reduce execution time and energy...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2013

    Tri-Level-Cell Phase Change Memory: Toward an Efficient and Reliable Memory System

    There are several emerging memory technologies looming on the horizon to compensate the physical scaling challenges of DRAM. Phase Change Memory (PCM) is one such candidate proposed for being part of the main memory in computing systems. One salient feature of PCM is its Multi-Level-Cell (MLC) property, which can be...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2013

    Griffin: Grouping Suspicious Memory-Access Patterns to Improve Understanding of Concurrency Bugs

    This paper presents Griffin, a new fault-comprehension technique. Griffin provides a way to explain concurrency bugs using additional information over existing fault-localization techniques, and thus, bridges the gap between fault-localization and fault-fixing techniques. Griffin inputs a list of memory-access patterns and a coverage matrix, groups those patterns responsible for the...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2013

    Tutorial: Stream Processing Optimizations

    The authors are living in an increasingly connected and instrumented world, where a large number and variety of data sources are available from various software and hardware sensors. These data sources often take the form of continuous data streams. Examples can be found in several domains, such as live stock...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2013

    StreamHub: A Massively Parallel Architecture for High-Performance Content-Based Publish/Subscribe

    By routing messages based on their content, publish/subscribe (pub/sub) systems remove the need to establish and maintain fixed communication channels. Pub/sub is a natural candidate for designing large-scale systems, composed of applications running in different domains and communicating via middleware solutions deployed on a public cloud. Such pub/sub systems must...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2013

    HSG-LM: Hybrid-Copy Speculative Guest OS Live Migration without Hypervisor

    Current Virtual Machine (VM) live migration mechanisms only focus on providing a high availability service by offering minimal downtime to users. In this paper, the authors present a novel live migration technique called HSG-LM, which also aims to provide short waiting time to whoever is responsible for triggering the VM...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2013

    Linux Block IO: Introducing Multi-Queue SSD Access on Multi-Core Systems

    The IO performance of storage devices has accelerated from hundreds of IOPS five years ago, to hundreds of thousands of IOPS today, and tens of millions of IOPS projected in five years. This sharp evolution is primarily due to the introduction of NAND- ash devices and their data parallel design....

    Provided By Association for Computing Machinery

  • White Papers // Jul 2013

    Autonomic Provisioning With Self-Adaptive Neural Fuzzy Control for Percentile-Based Delay Guarantee

    Autonomic server provisioning for performance assurance is a critical issue in Internet services. It is challenging to guarantee that requests flowing through a multi-tier system will experience an acceptable distribution of delays. The difficulty is mainly due to highly dynamic workloads, the complexity of underlying computer systems, and the lack...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2013

    Precise Memory Leak Detection for Java Software Using Container Profiling

    A memory leak in a Java program occurs when object references that are no longer needed are unnecessarily maintained. Such leaks are difficult to detect because static analysis typically cannot precisely identify these redundant references, and existing dynamic leak detection tools track and report fine-grained information about individual objects, producing...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Data Debugging with Continuous Testing

    Today, systems rely as heavily on data as on the software that manipulates those data. Errors in these systems are incredibly costly, annually resulting in multi-billion dollar losses, and, on multiple occasions, in death. While software debugging and testing have received heavy research attention, less effort has been devoted to...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Auditeur: A Mobile-Cloud Service Platform for Acoustic Event Detection on Smartphones

    Auditeur is a general-purpose, energy-efficient, and context-aware acoustic event detection platform for Smartphones. It enables app developers to have their app register for and get notified on a wide variety of acoustic events. Auditeur is backed by a cloud service to store user contributed sound clips and to generate an...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Exploring Microcontrollers in GPUs

    Recent Graphics Processing Units (GPUs) integrate wimpy microcontrollers on a chip. They are often used to execute firmware code configuring the functional units of GPUs. This paper opens up the programming of these microcontrollers and explores how to utilize them for GPU resource management. The authors' prototype system provides a...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    Engineering Multi-Tenant Software-as-a-Service Systems

    Increasingly, Software-as-a-Service (SaaS) is becoming a dominant mechanism for the consumption of software by end users. From a vendor's perspective, the benefits of SaaS arise from leveraging economies of scale, by serving a large number of customers ("Tenants") through a shared instance of a centrally hosted software service. Consequently, a...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Modeling Shared Cache and Bus in Multi-Cores for Timing Analysis

    Timing analysis of concurrent programs running on multi-core platforms is currently an important problem. The key to solving this problem is to accurately model the timing effects of shared resources in multi-cores, namely shared cache and bus. In this paper, the authors provide an integrated timing analysis framework that captures...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2011

    Sequential Cost-Sensitive Decision Making With Reinforcement Learning

    Recently, there has been increasing interest in the issues of cost-sensitive learning and decision making in a variety of applications of data mining. A number of approaches have been developed that are effective at optimizing cost-sensitive decisions when each decision is considered in isolation. However, the issue of sequential decision...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2010

    An Empirical Study of Low-Power Wireless

    This paper presents empirical measurements of the packet delivery performance of the latest sensor platforms: Micaz and Telos motes. In this paper the authors present observations that have implications to a set of common assumptions protocol designers make while designing sensornet protocols - specifically - the MAC and network layer...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Experiences With a High-Fidelity Wireless Building Energy Auditing Network

    This paper describes the design, deployment, and experience with a wireless sensor network for high-fidelity monitoring of electrical usage in buildings. A network of 38 mote-class AC meters, 6 light sensors, and 1 vibration sensor is used to determine and audit the energy envelope of an active laboratory. Classic WSN...

    Provided By Association for Computing Machinery

  • White Papers // May 2010

    Software Development for a Novel WSN Platform

    This work-in-progress paper introduces a new hardware platform for wireless sensor networks, summarizes the new challenges it creates for software development and describes a toolchain being developed to meet those challenges. The hardware platform is based on a low-power FPGA as opposed to a traditional microcontroller. The FPGA configuration includes...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Scalable Onion Routing With Torsk

    The authors introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of the popular Tor anonymity network, that decreases the bandwidth cost of relay selection and maintenance from quadratic to quasilinear while introducing no new attacks on...

    Provided By Association for Computing Machinery

  • White Papers // May 2009

    Energy Efficient Sampling for Event Detection in Wireless Sensor Networks

    Compressive Sensing (CS) is a recently developed mechanism that allows signal acquisition and compression to be performed in one inexpensive step so that the sampling process itself produces a compressed version of the signal. This significantly improves systemic energy efficiency because the average sampling rate can be considerably reduced and...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    DieHarder: Securing the Heap

    Heap-based attacks depend on a combination of memory management errors and an exploitable memory allocator. Many allocators include ad hoc countermeasures against particular exploits, but their effectiveness against future exploits has been uncertain. This paper presents the first formal treatment of the impact of allocator design on security. It analyzes...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Medium Access Control for Underwater Acoustic Sensor Networks With MIMO Links

    The requirements of multimedia underwater monitoring applications with heterogeneous traffic demands in terms of bandwidth and end-to-end reliability are considered in this paper. To address these requirements, a new medium access control protocol named UMIMO-MAC is proposed. UMIMO-MAC is designed to - adaptively leverage the tradeoff between multiplexing and diversity...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2011

    Privacy Preserving Spam Filtering

    This paper presents an approach to training a binary logistic regression classifier in the setting where the training data needs to be kept private. The authors provide a theoretical analysis of the security of this procedure and experimental results for the problem of large scale spam detection. High performance spam...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Skip-and-Prune: Cosine-Based Top-K Query Processing for Efficient Context-Sensitive Document Retrieval

    Keyword search and ranked retrieval together emerged as popular data access paradigms for various kinds of data, from web pages to XML and relational databases. A user can submit keywords without knowing much (sometimes nothing) about the complex structure underlying a data collection, yet the system can identify, rank, and...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2009

    Efficient Overlap and Content Reuse Detection in Blogs and Online News Articles

    The use of blogs to track and comment on real world (political, news, entertainment) events is growing. Similarly, as more individuals start relying on the Web as their primary information source and as more traditional media outlets try reaching consumers through alternative venues, the number of news sites on the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Exploring Path Query Results Through Relevance Feedback

    Feedback driven data exploration schemes have been implemented for non-structured data (such as text) and document-centric XML collections where formulating precise queries is often impossible. In this paper, the authors study the problem of enabling exploratory access, through ranking, to data-centric XML. Given a path query and a set of...

    Provided By Association for Computing Machinery

  • White Papers // May 2009

    Multicasting in Delay Tolerant Networks: A Social Network Perspective

    Node mobility and end-to-end disconnections in Delay Tolerant Networks (DTNs) greatly impair the effectiveness of data dissemination. Although social-based approaches can be used to address the problem, most existing solutions only focus on forwarding data to a single destination. In this paper, the authors are the first to study multicast...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2010

    Online Non-Intrusive Diagnosis of One-Way RTP Faults in VoIP Networks Using Cooperation

    The authors address the well-known issue of one-way RTP flows in VoIP communications. They investigate the main causes that usually lead to this type of fault, and the authors propose a methodology allowing for their automated online detection and diagnosis. The envisaged approach exploits node cooperation and is based on...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    Interfaces First (and Foremost) With Java

    Abstraction is a critical concept that underlies many topics in computing science. For example, in software engineering, the distinction between a component's behavior and its implementation is fundamental. Java provides two constructs that correspond to precisely this distinction: A Java interface is a client's abstract view of a component's behavior,...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2010

    On TCP-Based SIP Server Overload Control

    The Session Initiation Protocol (SIP) server overload management has attracted interest since SIP is being widely deployed in the Next Generation Networks (NGN) as a core signaling protocol. Yet all existing SIP overload control work is focused on SIP-over-UDP, despite the fact that TCP is increasingly seen as the more...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2009

    Exploiting Dynamicity in Graph-Based Traffic Analysis: Techniques and Applications

    Network traffic can be represented by a Traffic Dispersion Graph (TDG) that contains an edge between two nodes that send a particular type of traffic (e.g., DNS) to one another. TDGs have recently been proposed as an alternative way to interpret and visualize network traffic. Previous studies have focused on...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2010

    Featherweight X10: A Core Calculus for Async-Finish Parallelism

    The authors present a core calculus with two of X10's key constructs for parallelism, namely async and finish. The calculus forms a convenient basis for type systems and static analyses for languages with async-finish parallelism, and for tractable proofs of correctness. For example, the authors give a short proof of...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2011

    Communicating Memory Transactions

    Many concurrent programming models enable both transactional memory and message passing. For such models, researchers have built increasingly efficient implementations and defined reasonable correctness criteria, while it remains an open problem to obtain the best of both worlds. The authors present a programming model that is the first to have...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2011

    The Essence of Compiling With Traces

    The technique of trace-based Just-In-Time (JIT) compilation was introduced by Bala et al. and was further developed by Gal et al. It currently enjoys success in Mozilla Firefox's JavaScript engine. A trace-based JIT compiler leverages run-time profiling to optimize frequently-executed paths while enabling the optimized code to "Bail out" to...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    From OO to FPGA: Fitting Round Objects Into Square Hardware?

    Consumer electronics today such as cell phones often have one or more low-power FPGAs to assist with energy intensive operations in order to reduce overall energy consumption and increase battery life. However, current techniques for programming FPGAs require people to be specially trained to do so. Ideally, software engineers can...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Contracts for First-Class Classes

    First-class classes add expressive power to class-based object-oriented languages. Most importantly, programmers can abstract over common scenarios with first-class classes. When it comes to behavioral software contracts, however, first-class classes pose significant challenges. In this paper, the authors present the first contract system for a programming language with first-class classes....

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    Fortifying Macros

    Existing macro systems force programmers to make a choice between clarity of specification and robustness. If they choose clarity, they must forgo validating significant parts of the specification and thus produce low-quality language extensions. If they choose robustness, they must write in a style that mingles the implementation with the...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    Logical Types for Untyped Languages

    Programmers reason about their programs using a wide variety of formal and informal methods. Programmers in untyped languages such as Scheme or Erlang are able to use any such method to reason about the type behavior of their programs. The type system for Scheme accommodates common reasoning methods by assigning...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2010

    Adding Types to Untyped Languages

    Over the last 15 years, the authors have experienced a programming language renaissance. Numerous scripting languages have become widely used in industrial and open-source projects. They have supplemented the existing mainstream languages - C++ and Java - and, in contexts such as systems administration and web programming, they have started...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    Introduction to Object-Oriented Discrete Event Simulation With the OOSIML Language

    This paper provides an overview of object-oriented modeling principles and an introduction to developing object oriented simulation models using the OOSimL. The focus is on early introduction to simulation in the computing curriculum. This approach to simulation emphasizes and exploits object-oriented modeling and programming in the large to develop models...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2010

    GreenCoop: Cooperative Green Routing With Energy-Efficient Servers

    Energy-efficient communication has recently become a key challenge for both researchers and industries. This paper proposes a new model in which a Content Provider and an Internet Service Provider cooperate to reduce the total power consumption. The authors solve the problem optimally and compare it with a classic formulation, whose...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    Model-Driven Engineering: Raising the Abstraction Level Through Domain-Specific Modeling

    Model-Driven Engineering (MDE) has emerged as a promising paradigm in software engineering by emphasizing the use of models not just for documentation and communication purposes, but as first-class artifacts to be transformed into other work products (e.g., other models, source code, and test scripts). MDE supports full-scale round-trip engineering, from...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    How to Tell an Airport From a Home: Techniques and Applications

    Today's Internet services increasingly use IP-based geo-location to specialize the content and service provisioning for each user. However, these systems focus almost exclusively on the current position of users and do not attempt to infer or exploit any qualitative context about the location's relationship with the user (e.g., is the...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    ConcJUnit: Unit Testing for Concurrent Programs

    In test-driven development, tests are written for each program unit before the code is written, ensuring that the code has a comprehensive unit testing harness. Unfortunately, unit testing is much less effective for concurrent programs than for conventional sequential programs, partly because extant unit testing frameworks provide little help in...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Application-Aware NoC Design for Efficient SDRAM Access

    In many-core processors based on Networks-on-Chip (NoC), memory Quality-of-Service (QoS) becomes one of the most important issues since both memory and on-chip network are critical shared resources. However, the improvement of memory performance aided by a memory subsystem independently working with an on-chip network is severely limited. Therefore, memory-aware NoC...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    O-Router: An Optical Routing Framework for Low Power On-Chip Silicon Nano-Photonic Integration

    This paper presents a new optical routing framework, O-Router for future low-power on-chip optical interconnect integration utilizing silicon compatible nano-photonic devices. The authors formulate the optical layer routing problem as the minimization of total on-chip optical modulator cost (Laser power consumption) with Integer Linear Programming technique under various detection constraints....

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    An SDRAM-Aware Router for Networks-on-Chip

    This paper presents a NoC (Networks-on-Chip) router with an SDRAM-aware flow control. Based on a priority-based arbitration, it schedules packets to improve memory utilization and reduce memory latency. Moreover, the multi-scheduling scheme performed by the multiple SDRAM-aware routers helps to achieve better SDRAM performance and save the hardware cost of...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    Accounting for Defect Characteristics in Evaluations of Testing Techniques

    As new software-testing techniques are developed, and before they can achieve widespread acceptance, their effectiveness at detecting defects must be evaluated. The most common way to evaluate testing techniques is with empirical studies, in which one or more techniques are tried out on software with known defects. However, the defects...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    Ad Hoc Networking Via Named Data

    The design of the Internet protocol stack, with IP at the waist of the hourglass, mandates that packet delivery is governed by the destination IP address. This design has enabled explosive growth of the wired Internet, but faces two basic issues when applied to mobile environments. First, many mobile networks,...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Patterns and Statistical Analysis for Understanding Reduced Resource Computing

    The authors present several general, broadly applicable mechanisms that enable computations to execute with reduced resources, typically at the cost of some loss in the accuracy of the result they produce. They identify several general computational patterns that interact well with these resource reduction mechanisms, present a concrete manifestation of...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Malware Detection Using Statistical Analysis of Byte-Level File Content

    Commercial anti-virus software are unable to provide protection against newly launched (a.k.a "Zero-Day") malware. In this paper, the authors propose a novel malware detection technique which is based on the analysis of byte-level file content. The novelty of the approach, compared with existing content based mining schemes, is that it...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2009

    ROMA-Miner: A Data Mining Framework for Malware Detection Using Byte-Level File Content

    Commercial-off-the-shelf antivirus software are unable to successfully protect against increasingly sophisticated malware specially on the day of launch known as "Zero Day" malware detection. In this paper, the authors present a novel malware detection scheme, ROMA-Miner, which is based on the analysis of byte-level file content. The novelty of the...

    Provided By Association for Computing Machinery