Association for Computing Machinery

Displaying 1-40 of 6704 results

  • White Papers // Mar 2015

    Fast Serializable Multi-Version Concurrency Control for Main-Memory Database Systems

    Multi-Version Concurrency Control (MVCC) is a widely employed concurrency control mechanism, as it allows for execution modes where readers never block writers. However, most systems implement only Snapshot Isolation (SI) instead of full serializability. Adding serializability guarantees to existing SI implementations tends to be prohibitively expensive. The authors present a...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2015

    Sirius: An Open End-to-End Voice and Vision Personal Assistant and Its Implications for Future Warehouse Scale Computers

    As user demand scales for Intelligent Personal Assistants (IPAs) such as Apple's Siri, Google's google now, and Microsoft's Cortana, the authors are approaching the computational limits of current datacenter architectures. It is an open question how future server architectures should evolve to enable this emerging class of applications, and the...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    Compiler Management of Communication and Parallelism for Quantum Computation

    Quantum Computing (QC) offers huge promise to accelerate a range of computationally intensive benchmarks. Quantum computing is limited, however, by the challenges of decoherence: i.e., a quantum state can only be maintained for short windows of time before it decoheres. While quantum error correction codes can protect against decoherence, fast...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    A Symbolic Execution Algorithm for Constraint-Based Testing of Database Programs

    In so-called constraint-based testing, symbolic execution is a common technique used as a part of the process to generate test data for imperative programs. Databases are ubiquitous in software and testing of programs manipulating databases is thus essential to enhance the reliability of software. In this paper, the authors propose...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    CQIC: Revisiting Cross-Layer Congestion Control for Cellular Networks

    With the advent of high-speed cellular access and the overwhelming popularity of Smartphone's, a large percent of today's Internet content is being delivered via cellular links. Due to the nature of long-range wireless signal propagation, the capacity of the last hop cellular link can vary by orders of magnitude within...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    Utility of the OpenAccess Database in Academic Research

    Twenty years ago, there was a common design tool which was free and open-source and satisfied the needs of many academic circuit designers. The proliferation of OpenAccess is opening promising new research opportunities to academic communities. The benefits of adopting an OpenAccess based approach to EDA research are growing, and...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    GRAPHITE: An Extensible Graph Traversal Framework for Relational Database Management Systems

    Graph traversals are a basic but fundamental ingredient for a variety of graph algorithms and graph-oriented queries. To achieve the best possible query performance, they need to be implemented at the core of a database management system that aims at storing, manipulating, and querying graph data. Increasingly, modern business applications...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Uncovering Network Tarpits with Degreaser

    Network tarpits, whereby a single host or appliance can masquerade as many fake hosts on a network and slow network scanners, are a form of defensive cyber-deception. In this paper, the authors develop degreaser, an efficient fingerprinting tool to remotely detect tarpits. In addition to validating their tool in a...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Exploring Big Data with Helix: Finding Needles in a Big Haystack

    While much work has focused on efficient processing of big data, little work considers how to understand them. In this paper, the authors describe Helix, a system for guided exploration of big data. Helix provides a unified view of sources, ranging from spreadsheets and XML files with no schema, all...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Towards Hardware-Driven Design of Low-Energy Algorithms for Data Analysis

    In the era of "Big" data, data analysis algorithms need to be efficient. Traditionally researchers would tackle this problem by considering "Small" data algorithms and investigating how to make them computationally more efficient for big data applications. The main means to achieve computational efficiency would be to revise the necessity...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Foundations of Crowd Data Sourcing

    Crowdsourcing techniques are very powerful when harnessed for the purpose of collecting and managing data. In order to provide sound scientific foundations for crowdsourcing and support the development of efficient crowdsourcing processes, adequate formal models must be defined. In particular, the models must formalize unique characteristics of crowd-based settings, such...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Design-Theoretic Encoding of Deterministic Hypotheses as Constraints and Correlations Into U-Relational Databases

    In view of the paradigm shift that makes science ever more data-driven, in this paper the authors consider deterministic scientific hypotheses as uncertain data. In the form of mathematical equations, hypotheses symmetrically relate aspects of the studied phenomena. For computing predictions, however, deterministic hypotheses are used asymmetrically as functions. They...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Patterns in the Chaos - A Study of Performance Variation and Predictability in Public IaaS Clouds

    Benchmarking the performance of public cloud providers is a common research topic. Previous paper has already extensively evaluated the performance of different cloud platforms for different use cases, and under different constraints and experiment setups. In this paper, the authors present a principled, large-scale literature review to collect and codify...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Characterizing Large-Scale Click Fraud in ZeroAccess

    Click fraud is a scam that hits a criminal sweet spot by both tapping into the vast wealth of online advertising and exploiting that ecosystem's complex structure to obfuscate the flow of money to its perpetrators. In this paper, the authors illuminate the intricate nature of this activity through the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    On The Security of Mobile Cockpit Information Systems

    Recent trends in aviation have led many general aviation pilots to adopt the use of iPads (or other tablets) in the cockpit. While initially used to display static charts and documents, uses have expanded to include live data such as weather and traffic information that is used to make flight...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild

    Online accounts are inherently valuable resources - both for the data they contain and the reputation they accrue over time. Unsurprisingly, this value drives criminals to steal, or hijack, such accounts. In this paper, the authors focus on manual account hijacking - account hijacking performed manually by humans instead of...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Search + Seizure: The Effectiveness of Interventions on SEO Campaigns

    Black hat Search Engine Optimization (SEO), the practice of abusively manipulating search results, is an enticing method to acquire targeted user traffic. In turn, a range of interventions - from modifying search results to seizing domains - are used to combat this activity. In this paper, the authors examine the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Challenges in Inferring Internet Interdomain Congestion

    The authors introduce and demonstrate the utility of a method to localize and quantify inter-domain congestion in the Inter-net. Their Time Sequence Latency Probes (TSLP) method depends on two facts: internet traffic patterns are typically diurnal, and queues increase packet delay through a router during periods of adjacent link congestion....

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Computing Multi-Relational Sufficient Statistics for Large Databases

    Databases contain information about which relationships do and do not hold among entities. To make this information accessible for statistical analysis requires computing sufficient statistics that combine information from different database tables. Such statistics may involve any number of positive and negative relationships. With a naive enumeration approach, computing sufficient...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    PixelVault: Using GPUs for Securing Cryptographic Operations

    Protecting the confidentiality of cryptographic keys in the event of partial or full system compromise is crucial for containing the impact of attacks. The Heartbleed vulnerability of April 2014, which allowed the remote leakage of secret keys from HTTPS web servers, is an indicative example. In this paper, the authors...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication

    In an effort to hinder attackers from compromising user accounts, Facebook launched a form of two-factor authentication called Social Authentication (SA), where users are required to identify photos of their friends to complete a log-in attempt. Recent research, however, demonstrated that attackers can bypass the mechanism by employing face recognition...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed

    Central to the secure operation of a Public Key Infrastructure (PKI) is the ability to revoke certificates. While much of users' security rests on this process taking place quickly, in practice, revocation typically requires a human to decide to reissue a new certificate and revoke the old one. Thus, having...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Data Driven Investigation of Faults in HVAC Systems with Model, Cluster and Compare (MCC)

    The complexity of modern HVAC systems leads to device misconfiguration in about 40% of buildings, wasting upto 40% of the energy consumed. Fault detection methods generate excessive alarms leading to operator alert fatigue, faults left unfixed and energy wastage. Sophisticated fault detection techniques developed in the literature are seldom used...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Multiplierless Design of Folded DSP Blocks

    In this paper, the authors address the problem of minimizing the implementation cost of the Time-Multiplexed Constant Multiplication (TMCM) operation that realizes the multiplication of an input variable by a single constant selected from a set of multiple constants at a time. It presents an efficient algorithm, called ORPHEUS that...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    SoftMoW: Recursive and Reconfigurable Cellular WAN Architecture

    The current LTE network architecture is organized into very large regions, each having a core network and a radio access network. The core network contains an Internet edge comprised of Packet data network GateWays (PGWs). The radio network consists of only base stations. There are minimal interactions among regions other...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Sweet Little Lies: Fake Topologies for Flexible Routing

    Link-state routing protocols (e.g., OSPF and IS-IS) are widely used because they are scalable, robust, and based on simple abstractions. Unfortunately, these protocols are also relatively inflexible, since they direct all traffic over shortest paths. In contrast, Software Defined Networking (SDN) offers fine-grained control over routing, at the expense of...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    PRAN: Programmable Radio Access Networks

    With the continued exponential growth of mobile traffic and the rise of diverse applications, the current LTE Radio Access Network (RAN) architecture of cellular operators faces mounting challenges. Current RAN suffers from insufficient radio resource coordination, inefficient infrastructure utilization, and inflexible data paths. The authors present the high level design...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Tango: Simplifying SDN Control with Automatic Switch Property Inference, Abstraction, and Optimization

    A major benefit of Software-Defined Networking (SDN) over traditional networking is simpler and easier control of network devices. The diversity of SDN switch implementation properties, which include both diverse switch hardware capabilities and diverse control-plane software behaviors, however, can make it difficult to understand and/or to control the switches in...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Blender: Upgrading Tenant-based Data Center Networking

    In this paper, the authors present Blender, a framework that enables network operators to improve tenant performance by tailoring the network's behavior to tenant needs. Tenants may upgrade their provisioned portion of the network with specific features, such as multi-path routing, isolation, and failure recovery, without modifying hosted application code....

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Automatic Custom Instruction Identification in Memory Streaming Algorithms

    Application-Specific Instruction Set Processors (ASIPs) extend the instruction set of a general purpose processor by dedicated Custom Instructions (CIs). In the last decade, reconfigurable processors advanced this concept towards runtime reconfiguration to increase the efficiency and adaptivity. Compiler support for automatic identification and implementation of ASIP CIs exists commercially and...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    System-Level Memory Optimization for High-Level Synthesis of Component-Based SoCs

    The design of specialized accelerators is essential to the success of many modern systems-on-chip. Electronic system-level design methodologies and high-level synthesis tools are critical for the efficient design and optimization of an accelerator. Still, these methodologies and tools offer only limited support for the optimization of the memory structures, which...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Timing Analysis of Erroneous Systems

    Erroneous systems allow timing errors to occur during execution, but use measures to ensure continued operation through changes in operating parameters (voltage and frequency), error correction at various levels of the system, or ensuring controlled occurrence of errors to perform approximate computing. In this paper, the authors are interested in...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    SenseGlass: Using Google Glass to Sense Daily Emotions

    Emotions play a very important role in everyone's daily life. For over a century, scientists have studied human emotions in laboratory settings. However, these emotions have been largely contrived - elicited by movies or fake "Lab" stimuli, which tend not to matter to the participants in the studies, at least...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Measurement and Analysis of OSN Ad Auctions

    Advertising is ubiquitous on the web; numerous ad networks serve billions of ads daily via keyword or search term auctions. Recently, Online Social Networks (OSNs) such as Facebook have created site-specific ad services that differ from traditional ad networks by letting advertisers bid on users rather than keywords. With Facebook's...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Beyond CPM and CPC: Determining the Value of Users on OSNs

    Not all of the over one billion users of Online Social Networks (OSNs) are equally valuable to the OSNs. The current business model of monetizing advertisements targeted to users does not appear to be based on any visible grouping of the users. The primary metrics remain CPM (Cost Per Mille...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks

    Intrusion detection, traffic classification, and other network monitoring applications need to analyze the captured traffic beyond the network layer to allow for connection-oriented analysis, and achieve resilience to evasion attempts based on TCP segmentation. Existing network traffic capture frameworks, however, provide applications with raw packets and leave complex operations like...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    On the Role of Routing in Named Data Networking

    A unique feature of Named Data Networking (NDN) is that its forwarding plane can detect and recover from network faults on its own, enabling each NDN router to handle network failures locally without relying on global routing convergence. This new feature prompts the authors to re-examine the role of routing...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    VIP: A Framework for Joint Dynamic Forwarding and Caching in Named Data Networks

    Emerging information-centric networking architectures seek to optimally utilize both bandwidth and storage for efficient content distribution. This highlights the need for joint design of traffic engineering and caching strategies, in order to optimize network performance in view of both current traffic loads and future traffic demands. The authors present a...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Kite: A Mobility Support Scheme for NDN

    Named Data Networking (NDN) natively supports the mobility of data consumers through its data-centric design and stateful forwarding plane. However, the mobility support for data producers remains open in the original proposal. In this paper, the authors introduce Kite, a design of mobility support for NDN. Kite leverages the state...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Poster - iSync: A High Performance and Scalable Data Synchronization Protocol for Named Data Networking

    In this paper, the authors present a high performance synchronization protocol for Named Data Networking (NDN). The protocol, called iSync, uses a two-level Invertible Bloom Filter (IBF) structure to support efficient data reconciliation. Multiple differences can be found by subtracting a remote IBF from a local IBF, and therefore, from...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2003

    Computing Equilibrium Strategies in Infinite Games of Incomplete Information

    This paper describes an algorithm for computing best-response strategies in a class of infinite games of incomplete information (of which various auctions are prime examples). Under certain conditions, this algorithm can be used to automatically compute Bayes-Nash equilibria. The predominant game-solving algorithms generally address finite games and approximate infinite games...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Delegating Network Security With More Information

    Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be able to cope, the administrator needs to delegate some control back to end-hosts and users, a...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    No Bull, No Spin: A Comparison of Tags With Other Forms of User Metadata

    User-contributed tags have shown promise as a means of indexing multimedia collections by harnessing the combined efforts and enthusiasm of online communities. But tags are only one way of describing multimedia items. In this study, the author compares the characteristics of public tags with other forms of descriptive metadata -...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Differentially Private Recommender Systems: Building Privacy Into the Netflix Prize Contenders

    The paper considers the problem of producing recommendations from collective user behavior while simultaneously providing guarantees of privacy for these users. Specifically, the paper considers the Netflix Prize data set, and its leading algorithms, adapted to the framework of differential privacy. Unlike prior privacy work concerned with cryptographically securing the...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Helios: Heterogeneous Multiprocessing With Satellite Kernels

    Helios is an operating system designed to simplify the task of writing, deploying, and tuning applications for heterogeneous platforms. Helios introduces satellite kernels, which export a single, uniform set of OS abstractions across CPUs of disparate architectures and performance characteristics. Access to I/O services such as file systems are made...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Locking Key Ranges With Unbundled Transaction Services

    To adapt database technology to new environments like cloud platforms or multi-core hardware, or to try anew to provide an extensible database platform, it is useful to separate transaction services from data management elements that need close physical proximity to data. With "Generic" transactional services of concurrency control and recovery...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    De-Anonymizing the Internet Using Unreliable IDs

    Today's Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable. This paper, presents a system called HostTracker that tracks dynamic bindings between hosts and IP addresses by leveraging application-level data with unreliable IDs. Using a month-long...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    Biorthogonality, Step-Indexing and Compiler Correctness

    This paper defines logical relations between the denotational semantics of a simply typed functional language with recursion and the operational behaviour of low-level programs in a variant SECD machine. The relations, which are defined using biorthogonality and step-indexing, capture what it means for a piece of low-level code to implement...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    DARWIN: An Approach for Debugging Evolving Programs

    Debugging refers to the laborious process of finding causes of program failures. Often, such failures are introduced when a program undergoes changes and evolves from a stable version to a new, modified version. This paper proposes an automated approach for debugging evolving programs. Given two programs (a reference, stable program...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    DebugAdvisor: A Recommender System for Debugging

    In large software development projects, when a programmer is assigned a bug to x, she typically spends a lot of time searching (in an ad-hoc manner) for instances from the past where similar bugs have been debugged, analyzed and resolved. Systematic search tools that allow the programmer to express the...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Detailed Diagnosis in Enterprise Networks

    By studying trouble tickets from small enterprise networks, the paper concludes that their operators need detailed fault diagnosis. That is, the diagnostic system should be able to diagnose not only generic faults (e.g., performance-related) but also application specific faults (e.g., error codes). It should also identify culprits at a fine...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    BCube: A High Performance, Server-Centric Network Architecture for Modular Data Centers

    This paper presents BCube, a new network architecture specifically designed for shipping-container based, modular data centers. At the core of the BCube architecture is its server-centric network structure, where servers with multiple network ports connect to multiple layers of COTS (commodity o-the-shelf) mini-switches. Servers act as not only end hosts,...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Predicting User Interests From Contextual Information

    Search and recommendation systems must include contextual information to effectively model users' interests. This paper presents a systematic study of the effectiveness of five variant sources of contextual information for user interest modeling. Post-query navigation and general browsing behaviors far outweigh direct search engine interaction as an information-gathering activity. Therefore...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    White Space Networking With Wi-Fi Like Connectivity

    Networking over UHF white spaces is fundamentally different from conventional Wi-Fi along three axes: spatial variation, temporal variation, and fragmentation of the UHF spectrum. Each of these differences gives rise to new challenges for implementing a wireless network in this band. The paper presents the design and implementation of WhiteFi,...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Why Should We Integrate Services, Servers, and Networking in a Data Center?

    Since the early days of networks, a basic principle has been that endpoints treat the network as a black box. An end-point injects a packet with a destination address and the network delivers the packet. This principle has served one well, and allowed one to scale the Internet to billions...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Buffer Management for Colored Packets With Deadlines

    The paper considers buffer management of unit packets with deadlines for a multi-port device with reconfiguration overhead. The goal is to maximize the throughput of the device, i.e., the number of packets delivered by their deadline. For a single port or with free reconfiguration, the problem reduces to the well-known...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Understanding Data Center Traffic Characteristics

    As data centers become more and more central in Internet communications, both research and operations communities have begun to explore how to better design and manage them. This paper presents a preliminary empirical study of end-to-end traffic patterns in data center networks that can inform and help evaluate research and...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Matchmaking for Online Games and Other Latency-Sensitive P2P Systems

    The latency between machines on the Internet can dramatically affect users' experience for many distributed applications. Particularly, in multiplayer online games, players seek to cluster themselves so that those in the same session have low latency to each other. A system that predicts latencies between machine pairs allows such matchmaking...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    VL2: A Scalable and Flexible Data Center Network

    To be agile and cost effective, data centers should allow dynamic resource allocation across large server pools. In particular, the data center network should enable any server to be assigned to any service. To meet these goals, the paper presentsVL2, a practical network architecture that scales to support huge data...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Change Is Hard: Adapting Dependency Graph Models for Unified Diagnosis in Wired/Wireless Networks

    Organizations world-wide are adopting wireless networks at an impressive rate, and a new industry has sprung up to provide tools to manage these networks. Unfortunately, these tools do not integrate cleanly with traditional wired network management tools, leading to unsolved problems and frustration among the IT staff. The paper explores...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    CAFE: A Configurable PAcket Forwarding Engine for Data Center Networks

    Recently, Data Center Networking (DCN) has attracted many research attentions and innovative DCN designs have been proposed. All these designs need specialized packet forwarding engines due to their special routing algorithms, which are either based on commonly used packet headers or self-defined ones. Although programmable forwarding devices are available, it...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Your Botnet Is My Botnet: Analysis of a Botnet Takeover

    Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophisticated and insidious type of bot is Torpig, a malware program that is designed to harvest sensitive information (such as bank account and...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Consistency Rationing in the Cloud: Pay Only When It Matters

    Cloud storage solutions promise high scalability and low cost. Existing solutions, however, differ in the degree of consistency they provide. Its experience using such systems indicates that there is a non-trivial trade-off between cost, consistency and availability. High consistency implies high cost per transaction and, in some situations, reduced availability....

    Provided By Association for Computing Machinery

  • White Papers // May 2009

    WaterCooler: Exploring an Organization Through Enterprise Social Media

    As organizations scale up, their collective knowledge increases, and the potential for serendipitous collaboration between members grows dramatically. However, finding people with the right expertise or interests becomes much more difficult. Semi-structured social media, such as blogs, forums, and bookmarking, present a viable platform for collaboration - if enough people...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Sustainable Operation and Management of Data Center Chillers Using Temporal Data Mining

    Data centers are a critical component of modern IT infrastructure but are also among the worst environmental offenders through their increasing energy usage and the resulting large carbon footprints. Efficient management of data centers, including power management, networking, and cooling infrastructure, is hence crucial to sustainability. In the absence of...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-Based Single Sign-on for Google Apps

    Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by different companies. The OASIS Security Assertion Markup Language (SAML) 2.0 Web Browser SSO Profile is the emerging standard in this context. This...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2009

    Semi-Supervised Co-Training and Active Learning Based Approach for Multi-View Intrusion Detection

    Although there is immense data available from networks and hosts, a very small proportion of this data is labeled due to the cost of obtaining expert labels. This proves to be a significant bottle-neck for developing supervised intrusion detection systems that rely solely on labeled data. In spite of the...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    Anti-Phishing Based on Automated Individual White-List

    In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The traditional blacklist approach for anti-phishing is partially effective due to its partial list of global phishing sites. This paper presents a novel anti-phishing approach...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Recognizing Daily Activities With RFID-Based Sensors

    This paper explores a dense sensing approach that uses RFID sensor network technology to recognize human activities. In the setting, everyday objects are instrumented with UHF RFID tags called WISPs that are equipped with accelerometers. RFID readers detect when the objects are used by examining this sensor data, and daily...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Automated Control in Cloud Computing: Challenges and Opportunities

    With advances in virtualization technology, virtual machine services offered by cloud utility providers are becoming increasingly powerful, anchoring the ecosystem of cloud services. Virtual computing services are attractive in part because they enable customers to acquire and release computing resources for guest applications adaptively in response to load surges and...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Architectural Considerations for Distributed RFID Tracking and Monitoring

    This paper discusses architectural challenges in designing a distributed, scalable system for RFID tracking and monitoring. The paper argues for the need to combine inference and query processing techniques into a single system and consider several architectural choices for building such a system. Key research challenges in designing the system...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Towards a Zero-Configuration Wireless Sensor Network Architecture for Smart Buildings

    Offlate buildings account for a large fraction of energy consumption. In an effort to economize scarce fossil fuels on earth, sensor networks are a valuable tool to increase the energy efficiency of buildings without severely reducing quality of life. Within a smart building many sensors and actuators are interconnected to...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    BlueMonarch: A System for Evaluating Bluetooth Applications in the Wild

    Despite Bluetooth's popularity, low cost, and low power requirements, Bluetooth applications remain remarkably unsophisticated. Although the research community and industry have designed games, cell-phone backup and contextual advertising systems with Bluetooth, few such applications have been prototyped or evaluated on a large scale. Evaluating Bluetooth applications requires recruiting devices in...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    SPATE: Small-Group PKI-Less Authenticated Trust Establishment

    Establishing trust between a group of individuals remains a difficult problem. Prior works assume trusted infrastructure, require an individual to trust unknown entities, or provide relatively low probabilistic guarantees of authenticity (95% for realistic settings). This work presents SPATE, a primitive that allows users to establish trust via device mobility...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Time Series Shapelets: A New Primitive for Data Mining

    Classification of time series has been attracting great interest over the past decade. Recent empirical evidence has strongly suggested that the simple nearest neighbor algorithm is very difficult to beat for most time series problems. While this may be considered good news, given the simplicity of implementing the nearest neighbor...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Beyond Blacklists: Learning to Detect Malicious Web Sites From Suspicious URLs

    Malicious Web sites are a cornerstone of Internet criminal activities. As a result, there has been broad interest in developing systems to prevent the end user from visiting such sites. This paper describes an approach to this problem based on automated URL classification, using statistical methods to discover the tell-tale...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2010

    Harvesting Collective Intelligence

    When harvesting collective intelligence, a user wishes to maximize the accuracy and value of the acquired information without spending too much time collecting it. The author empirically studies how people behave when facing these conflicting objectives using data from Yahoo Answers, a community driven question-and-answer site. The paper takes two...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Wifi-Reports: Improving Wireless Network Selection With Collaboration

    Wi-Fi clients can obtain much better performance at some commercial hotspots than at others. Unfortunately, there is currently no way for users to determine which hotspot Access Points (APs) will be sufficient to run their applications before purchasing access. To address this problem, this paper presents Wifi-Reports, a collaborative service...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Playout Buffer and Rate Optimization for Streaming Over IEEE 802.11 Wireless Networks

    Most streaming rate selection and buffer optimization algorithms are developed for wired networks and can perform poorly over wireless networks. WirelessMAClayer behavior, such as rate adaptation, retransmissions, and medium sharing, can significantly degrade the effectiveness of current streaming algorithms. This paper presents the Buffer and Rate Optimization for Streaming (BROS)...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    3G and 3.5G Wireless Network Performance Measured From Moving Cars and High-Speed Trains

    In recent years, the world has witnessed the deployment of several 3G and 3.5G wireless networks based on technologies such as CDMA 1x EVolution Data-Only (EVDO), High-Speed Downlink Packet Access (HSDPA), and mobile WiMax (e.g., WiBro). Although 3G and 3.5G wireless networks support enough bandwidth for typical Internet applications, their...

    Provided By Association for Computing Machinery