Association for Computing Machinery

Displaying 1-40 of 7144 results

  • White Papers // Jun 2014

    Domino: An Incremental Computing Framework in Cloud with Eventual Synchronization

    In recent years, more and more applications in cloud have needed to process large-scale online data sets that evolve over time as entries are added or modified. Several programming frameworks, such as percolator and oolong, are proposed for such incremental data processing and can achieve efficient updates with an event-driven...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Computation and Communication Efficient Graph Processing with Distributed Immutable View

    Cyclops is a new vertex-oriented graph-parallel framework for writing distributed graph analytics. Unlike existing distributed graph computation models, cyclops retains simplicity and computation-efficiency by synchronously computing over a distributed immutable view, which grants a vertex with read-only access to all its neighboring vertices. The view is provided via read-only replication...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    CrowdFill: Collecting Structured Data from the Crowd

    The authors present CrowdFill, a system for collecting structured data from the crowd. While a typical microtask-based approach would pose specific questions to each worker and assemble the answers, Crowd-Fill shows a partially-filled table to all participating workers. Workers contribute by filling in empty cells, as well as upvoting and...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Accessing Multiple Clouds with Cloudmesh

    The authors present the design of a toolkit that can be employed by users and administrators to manage virtual machines on multi-cloud environments. It can be run by individual users or offered as a service to a shared user community. They have practically demonstrated its use as part of a...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Infinite CacheFlow in Software-Defined Networks

    Software-Defined Networking (SDN) enables ne-grained policies for firewalls, load balancers, routers, traffic monitoring, and other functionality. While Ternary Content Address-able Memory (TCAM) enables OpenFlow switches to process packets at high speed based on multiple header fields, today's commodity switches support just thousands to tens of thousands of rules. To realize...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Memory Bandwidth Reservation in the Cloud to Avoid Information Leakage in the Memory Controller

    Multiple Virtual Machines (VMs) are typically co-scheduled on cloud servers. Each VM experiences different latencies when accessing shared resources, based on contention from other VMs. This introduces timing channels between VMs that can be exploited to launch attacks by an untrusted VM. This paper focuses on trying to eliminate the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Revealing Applications' Access Pattern in Collective I/O for Cache Management

    Collective I/O is a critical I/O strategy on high-performance parallel computing systems that enables programmers to reveal parallel processes' I/O accesses collectively and makes possible for the parallel I/O middleware to carry out I/O requests in a highly efficient manner. Collective I/O has been proven as a core parallel I/O...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    A Framework for Enhancing Data Reuse via Associative Reordering

    The freedom to reorder computations involving associative operators has been widely recognized and exploited in designing parallel algorithms and to a more limited extent in optimizing compilers. In this paper, the authors develop a novel framework utilizing the associativity and commutativity of operations in regular loop computations to enhance register...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    System-Level Security for Network Processors with Hardware Monitors

    New attacks are emerging that target the Internet infrastructure. Modern routers use programmable network processors that may be exploited by merely sending suitably crafted data packets into a network. Hardware monitors that are co-located with processor cores can detect attacks that change processor behavior with high probability. In this paper,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    SHiFA: System-Level Hierarchy in Run-Time Fault-Aware Management of Many-Core Systems

    A system-level approach to fault-aware resource management of many-core systems is proposed. The proposed approach, called SHiFA, is able to tolerate run-time faults at system level without any hardware overhead. In contrast to the existing system-level methods, network resources are also considered to be potentially faulty. Accordingly, applications are mapped...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2014

    Autonomic Resource Provisioning for Cloud-Based Software

    Cloud elasticity provides a software system with the ability to maintain optimal user experience by automatically acquiring and releasing resources, while paying only for what has been consumed. The mechanism for automatically adding or removing resources on the fly is referred to as auto-scaling. The state-of-the practice with respect to...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    A Semi-Formal Approach for Analog Circuits Behavioral Properties Verification

    The analog circuit design process is becoming very complex and therefore new verification approaches are very much needed. Simulation is the most used technique to compute the behavior of a circuit model. Statistical methods like Monte Carlo rely on repeating numerical simulations for a random sampling of parameters. The authors...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Generation of Reduced Analog Circuit Models Using Transient Simulation Traces

    The generation of fast models for device level circuit descriptions is a very active area of research. Model order reduction is an attractive technique for dynamical models size reduction. In this paper, the authors propose an approach based on clustering, curve-fitting, linearization and Krylov space projection to build reduced models...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    A Qualitative Simulation Approach for Verifying PLL Locking Property

    Simulation cannot give a full coverage of Phase Locked Loop (PLL) behavior in presence of process variation, jitter and varying initial conditions. Qualitative Simulation is an attracting method that computes behavior envelopes for dynamical systems over continuous ranges of their parameters. Therefore, this method can be employed to verify PLLs...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Towards Topic Modeling for Big Data

    Latent Dirichlet Allocation (LDA) is a popular topic modeling technique in academia but less so in industry, especially in large-scale applications involving search engines and on-line advertisement systems. A main underlying reason is that the topic models used have been too small in scale to be useful; for example, some...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Resolving Conflicts in Heterogeneous Data by Truth Discovery and Source Reliability Estimation

    In many applications, one can obtain descriptions about the same objects or events from a variety of sources. As a result, this will inevitably lead to data or information conflicts. One important problem is to identify the true information (i.e., the truths) among conflicting sources of data. It is intuitive...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    NewsNetExplorer: Automatic Construction and Exploration of News Information Networks

    News data is one of the most abundant and familiar data sources. News data can be systematically utilized and explored by database, data mining and NLP information retrieval researchers to demonstrate to the general public the power of advanced information technology. In the authors view, news data contains rich, inter-related...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Imprecise Datapath Design: An Overclocking Approach

    In this paper, the authors describe an alternative circuit design methodology when considering trade-offs between accuracy, performance and silicon area. They compare two different approaches that could trade accuracy for performance. One is the traditional approach where the precision used in the datapath is limited to meet target latency. The...

    Provided By Association for Computing Machinery

  • White Papers // May 2014

    Explore-by-Example: An Automatic Query Steering Framework for Interactive Data Exploration

    Interactive Data Exploration (IDE) is a key ingredient of a diverse set of discovery-oriented applications, including ones from scientific computing and evidence-based medicine. In these applications, data discovery is a highly ad hoc interactive process where users execute numerous exploration queries using varying predicates aiming to balance the trade-off between...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Reconfiguration-Assisted Charging in Large-Scale Lithium-Ion Battery Systems

    Large-scale Lithium-ion batteries are widely adopted in many systems such as electric vehicles and energy backup in power grids. Due to factors such as manufacturing difference and heterogeneous discharging conditions, cells in the battery system may have different statuses such as diverse voltage levels. This cell diversity is commonly known...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Reconciling High Server Utilization and Sub-Millisecond Quality-of-Service

    The simplest strategy to guarantee good Quality-of-Service (QoS) for a latency-sensitive workload with sub-millisecond latency in a shared cluster environment is to never run other workloads concurrently with it on the same server. Unfortunately, this inevitably leads to low server utilization, reducing both the capability and cost effectiveness of the...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Using Restricted Transactional Memory to Build a Scalable In-Memory Database

    The recent availability of Intel Haswell processors marks the transition of hardware transactional memory from research toys to mainstream reality. DBX is an in-memory database that uses Intel's Restricted Transactional Memory (RTM) to achieve high performance and good scalability across multicore machines. The main limitation (and also key to practicality)...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Snapify: Capturing Snapshots of Offload Applications on Xeon Phi Manycore Processors

    Intel Xeon Phi coprocessors provide excellent performance acceleration for highly parallel applications and have been deployed in several top-ranking supercomputers. One popular approach of programming the Xeon Phi is the offload model, where parallel code is executed on the Xeon Phi, while the host system executes the sequential code. However,...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Excalibur: An Autonomic Cloud Architecture for Executing Parallel Applications

    IaaS providers often allow the users to specify many requirements for their applications. However, users without advanced technical knowledge usually do not provide a good specification of the cloud environment, leading to low performance and/or high monetary cost. In this context, the users face the challenges of how to scale...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Ariadne: Managing Fine-Grained Provenance on Data Streams

    Managing fine-grained provenance is a critical requirement for Data Stream Management Systems (DSMS), not only to address complex applications that require diagnostic capabilities and assurance, but also for providing advanced functionality such as revision processing or query debugging. This paper introduces a novel approach that uses operator instrumentation, i.e., modifying...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    A Hybrid Task Mapping Algorithm for Heterogeneous MPSoCs

    The application workloads in modern MPSoC-based embedded systems are becoming increasingly dynamic. Different applications concurrently execute and contend for resources in such systems, which could cause serious changes in the intensity and nature of the workload demands over time. To cope with the dynamism of application workloads at run time...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    GDM: Device Memory Management for GPGPU Computing

    GPGPUs are evolving from dedicated accelerators towards mainstream commodity computing resources. During the transition, the lack of system management of device memory space on GPGPUs has become a major hurdle. In existing GPGPU systems, device memory space is still managed explicitly by individual applications, which not only increases the burden...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    An Online Auction Framework for Dynamic Resource Provisioning in Cloud Computing

    Auction mechanisms have recently attracted substantial attention as an efficient approach to pricing and resource allocation in cloud computing. This work, to the authors' knowledge, represents the first online combinatorial auction designed in the cloud computing paradigm, which is general and expressive enough to both optimize system efficiency across the...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Scalable Performance Analysis of ExaScale MPI Programs through Signature-Based Clustering Algorithms

    Extreme-scale computing poses a number of challenges to application performance. Developers need to study application behavior by collecting detailed information with the help of tracing toolsets to determine shortcomings. But not only applications are \"Scalability challenged\", current tracing toolsets also fall short of exascale requirements for low back-ground overhead since...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Mining Latent Entity Structures from Massive Unstructured and Interconnected Data

    The \"Big data\" era is characterized by an explosion of information in the form of digital data collections, ranging from scientific knowledge, to social media, news, and everyone's daily life. Examples of such collections include scientific publications, enterprise logs, news articles, social media and general web pages. Valuable knowledge about...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Major Technical Advancements in Apache Hive

    Apache Hive is a widely used data warehouse system for Apache Hadoop, and has been adopted by many organizations for various big data analytics applications. Closely working with many users and organizations, the authors have identified several shortcomings of Hive in its file formats, query planning, and query execution, which...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    CGPA: Coarse-Grained Pipelined Accelerators

    High-Level Synthesis (HLS) tools dramatically reduce the nonrecurring engineering cost of creating specialized hardware accelerators. Existing HLS tools are successful in synthesizing efficient accelerators for program kernels with regular memory accesses and simple control flows. For other programs, however, these tools yield poor performance because they invoke computation units for...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    PSelInv - A Distributed Memory Parallel Algorithm for Selected Inversion : the Symmetric Case

    The authors describe an efficient parallel implementation of the selected inversion algorithm for distributed memory computer systems, which they call PSelInv. The PSelInv method computes selected elements of a general sparse matrix A that can be decomposed as A = LU, where L is lower triangular and U is upper...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2014

    Palette: Enabling Scalable Analytics for Big-Memory, Multicore Machines

    Hadoop and its variants have been widely used for processing large scale analytics tasks in a cluster environment. However, use of a commodity cluster for analytics tasks needs to be reconsidered based on two key observations: in recent years, large memory, multicore machines have become more affordable; and recent studies...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2014

    Maple: Scalable Multi-Dimensional Range Search over Encrypted Cloud Data with Tree-based Index

    Cloud computing promises users massive scale outsourced data storage services with much lower costs than traditional methods. However, privacy concerns compel sensitive data to be stored on the cloud server in an encrypted form. This papers a great challenge for effectively utilizing cloud data, such as executing common SQL queries....

    Provided By Association for Computing Machinery

  • White Papers // Mar 2014

    A Probabilistic Model for Linking Named Entities in Web Text with Heterogeneous Information Networks

    Heterogeneous information networks that consist of multi-type, interconnected objects are becoming ubiquitous and increasingly popular, such as social media networks and bibliographic networks. The task to link named entity mentions detected from the unstructured Web text with their corresponding entities existing in a heterogeneous information network is of practical importance...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2014

    Model Selection for Semi-Supervised Clustering

    Although there is a large and growing literature that tackles the semi-supervised clustering problem (i.e., using some labeled objects or cluster-guiding constraints like \"Must-link\" or \"Cannot-link\"), the evaluation of semi-supervised clustering approaches has rarely been discussed. The application of cross-validation techniques, for example, is far from straightforward in the semi-supervised...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2014

    Stochastic Computation

    Stochastic computation, as presented in this paper, exploits the statistical nature of application-level performance metrics, and matches it to the statistical attributes of the underlying device and circuit fabrics. Nanoscale circuit fabrics are viewed as noisy communication channels/networks. Communications-inspired design techniques based on estimation and detection theory are proposed. Stochastic...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2014

    Optimization Method for Request Admission Control to Guarantee Performance Isolation

    Software-as-a-Service (SaaS) often shares one single application instance among different tenants to reduce costs. However, sharing potentially leads to undesired influence from one tenant onto the performance observed by the others. Furthermore, providing one tenant additional resources to support its increasing demands without increasing the performance of tenants who do...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2014

    Host-Compiled Multi-Core System Simulation for Early Real-Time Performance Evaluation

    With increasing complexity and software content, modern embedded platforms employ a heterogeneous mix of multi-core processors along with hardware accelerators in order to provide high performance in limited power budgets. To evaluate real-time performance and other constraints, full-system simulations are essential. With traditional approaches being either slow or inaccurate, so-called...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2013

    Intel \"Big Data\" Science and Technology Center Vision and Execution Plan

    This paper has described the newest Intel ISTC focused on big data. As the authors explained, they are working on both big volume and big velocity issues, leaving big variety as a future topic. Their approach is to develop and leverage DBMS technology, as opposed to file systems. In all...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2012

    A Cross-Protocol Attack on the TLS Protocol

    This paper describes a cross-protocol attack on all versions of TLS; it can be seen as an extension of the Wagner and Schneier attack on SSL 3.0. The attack presents valid explicit elliptic curve Diffie-Hellman parameters signed by a server to a client that incorrectly interprets these parameters as valid...

    Provided By Association for Computing Machinery

  • White Papers // May 2011

    Rethinking Passwords to Adapt to Constrained Keyboards

    The authors describe and analyze a variant of the traditional password scheme. This is designed to take advantage of standard error-correcting methods of the types used to facilitate text entry on handsets. They call the new approach fastwords to emphasize their primary feature compared to regular passwords. Compared with passwords,...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2008

    Love and Authentication

    Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security practitioners have battled with the dilemma of how to authenticate people who have forgotten their passwords. Existing approaches suffer from high false positive...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2013

    A Framework of N-Screen Services Based on PVR and Named Data Networking in Cloud Computing

    The authors develop architecture of a new N-Screen Service which enables application streaming based on N-Screen services using Personal Video Recorder (PVR) and Named Data Networking (NDN) in cloud computing environment. In particular, they propose a framework of N-Screen Services called \"ShopMark\" based on PVR and NDN technology in cloud...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    OASIS: On Achieving a Sanctuary for Integrity and Secrecy on Untrusted Platforms

    Currently, Trusted Platform Module (TPM) based solutions have not reached wide-spread application in security-sensitive contexts, perhaps because TCG solutions lack protection against a more resourceful adversary, lack sufficient properties for end-to-end application protection, lack architectural safeguards against supply-chain compromises, or concerns over poor performance. OASIS offers a stronger degree of...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    SafeSlinger: Easy-to-Use and Secure Public-Key Exchange

    Users regularly experience a crisis of confidence on the internet. Is that email or instant message truly originating from the claimed individual? Such doubts are commonly resolved through a leap of faith, expressing the desperation and helplessness of users. To establish a secure basis for online communication, the authors propose...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    AppIntent: Analyzing Sensitive Data Transmission in Android for Privacy Leakage Detection

    Android phones often carry personal information, attracting malicious developers to embed code in Android applications to steal sensitive data. With known techniques in the literature, one may easily determine if sensitive data is being transmitted out of an Android phone. However, transmission of sensitive data in itself does not necessarily...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    Attacking Software-Defined Networks: A First Feasibility Study

    In this paper, the authors introduce a new fingerprinting attack against SDN networks, and they also show its feasibility with real world experimental data. To the best of their knowledge, the proposed attack scenario is the first realistic attack case to a SDN network that can be conducted by a...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2013

    Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors

    Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One paradigm to achieve data privacy is to use tamper-resistant processors, inside which users' private data is decrypted and computed upon. These processors need to interact with untrusted external memory. Even if the authors encrypt...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2009

    Security and Privacy for Geospatial Data: Concepts and Research Directions

    Geospatial data play a key role in a wide spectrum of critical data management applications, such as disaster and emergency management, environmental monitoring, land and city planning, and military operations, often requiring the coordination among diverse organizations, their data repositories, and users with different responsibilities. Although a variety of models...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    POSTER - TRIPLEX: Verifying Data Minimisation in Communication Systems

    The main idea behind the TRIPLEX framework is to analyze relevant privacy aspects of privacy-enhancing protocols in a specified scenario that may involve several actors and protocol instances (of different protocols). Systems dealing with personal information are legally required to satisfy the principle of data minimization. Privacy-enhancing protocols use cryptographic...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    Perceived Risk Assessment

    In the last years, IT systems play a more and more fundamental role in human activities and, in particular, in critical activities such as the management of Air Traffic Control and Nuclear Power Plant. This has spurred several researchers to develop models, metrics, and methodologies for analyzing and measuring the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2007

    How to Capture, Model, and Verify the Knowledge of Legal, Security, and Privacy Experts: A Pattern-Based Approach

    Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary security measures. Several frameworks have been proposed to deal with this issue. For instance, purpose-based access control is normally considered a good solution for...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2011

    Trust-Based Anonymous Communication: Adversary Models and Routing Algorithms

    The authors introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. They focus on anonymous communication, and in particular onion routing, although they expect the approach to apply more broadly. This paper provides two main...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    AS-Awareness in Tor Path Selection

    Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an anonymity network grows, it becomes more secure against a given observer because the observer will see less of the network. In particular, as...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2011

    A Peel of Onion

    Onion routing was invented more than fifteen years ago to separate identification from routing in network communication. Since that time there has been much design, analysis and deployment of onion routing systems. This has been accompanied by much confusion about what these systems do, what security they provide, how they...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2007

    Probabilistic Analysis of Onion Routing in a Black-Box Model

    The authors perform a probabilistic analysis of onion routing. The analysis is presented in a black-box model of anonymous communication that abstracts the essential properties of onion routing in the presence of an active adversary that controls a portion of the network and knows all a priori distributions on user...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2007

    On Interdomain Routing Security and Pretty Secure BGP (psBGP)

    It is well-known that the Border Gateway Protocol (BGP), the IETF standard inter-domain routing protocol, is vulnerable to a variety of attacks, and that a single mis-configured or malicious BGP speaker could result in large scale service disruption. In this paper, the authors present pretty secure BGP (psBGP) - a...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2006

    On Countering Online Dictionary Attacks with Login Histories and Humans-in-the-Loop

    Automated Turing Tests (ATTs), also known as human-in-the-loop techniques, were recently employed in a login protocol to protect against online password-guessing attacks. The authors present modifications providing a new history-based login protocol with ATTs, which uses failed-login counts. Analysis indicates that the new protocol offers opportunities for improved security and...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Hobbes: Composition and Virtualization as the Foundations of an Extreme-scale OS/R

    In this paper, the authors describe their vision for Hobbes, an Operating System and Runtime (OS/R) framework for extreme-scale systems. The Hobbes design explicitly supports application composition, which is emerging as a key approach for applications to address scalability and power concerns anticipated with coming extreme-scale architectures. They make use...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2012

    Better than Native: Using Virtualization to Improve Compute Node Performance

    Modified variants of Linux are likely to be the underlying operating systems for future exascale platforms. Despite the many advantages of this approach, a subset of applications exist in which a LightWeight Kernel (LWK) based OS is needed and/or preferred. The authors contend that virtualization is capable of supporting LWKs...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Virtual TCP Offload: Optimizing Ethernet Overlay Performance on Advanced Interconnects

    Ethernet overlay networks are a powerful tool for virtualizing networked applications. Their performance suffers on advanced interconnects such as Infiniband, however, be-cause of differences between the semantics of Ethernet and the underlying network. In this paper, the authors demonstrate that providing a virtual TCP offload Ethernet device to the guest...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2012

    Shifting GEARS to Enable Guest-Context Virtual Services

    The authors argue that the implementation of VMM-based virtual services for a guest should extend into the guest itself, even without its cooperation. Placing service components directly into the guest OS or application can reduce implementation complexity and increase performance. In this paper, they show that the set of tools...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2012

    A Case for Tracking and Exploiting Inter-Node and Intra-Node Memory Content Sharing in Virtualized Large-Scale Parallel Systems

    In virtualized large-scale parallel systems scientific workloads consist of numerous processes running across many virtual nodes. Their memory footprint is massive, and this has consequences for services that enhance performance, reliability, or power. The authors argue that a service that dynamically tracks the sharing of memory content, both within individual...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2012

    ADEL: An Automatic Detector of Energy Leaks for Smartphone Applications

    Energy leaks occur when applications use energy to perform useless tasks, a surprisingly common occurrence. They are particularly important for mobile applications running on Smartphones due to their energy constraints. Energy leaks are difficult to detect and isolate because their negative consequences are often far removed from their causes. Few...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2012

    Understanding the Impact of Laptop Power Saving Options on User Satisfaction Using Physiological Sensors

    Several techniques are available to save power consumption in laptop computers. However, their effect on user satisfaction has not been well studied. The authors analyze how user satisfaction is affected by these techniques and show that, within a fixed power budget, some techniques cause more dissatisfaction than others. Second, they...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Sonar-based Measurement of User Presence and Attention

    The authors describe a technique to detect the presence of computer users. This technique relies on sonar using hardware that already exists on commodity laptop computers and other electronic devices. It leverages the fact that human bodies have a different effect on sound waves than air and other objects. They...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2012

    Virtualization Challenges: A View From Server Consolidation Perspective

    Server consolidation, by running multiple virtual machines on top of a single platform with virtualization, provides an efficient solution to parallelism and utilization of modern multi-core processors system. However, the performance and scalability of server consolidation solution on modern massive advanced server is not well addressed. In this paper, the...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2012

    DVM: Towards a Datacenter-Scale Virtual Machine

    As cloud-based computation becomes increasingly important, providing a general computational interface to support datacenter-scale programming has become an imperative research agenda. Many cloud systems use existing Virtual Machine Monitor (VMM) technologies, such as Xen, VMware, and Windows Hypervisor, to multiplex a physical host into multiple virtual hosts and isolate computation...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2012

    Towards a Pluralist Internet Using a Virtual Machine Server for Network Customization

    The Internet success is frequently credited to its basic pillars, the end-to-end argument and the TCP/IP protocol stack. Nevertheless, this simple architecture does not facilitate the addition of new services such as mobility, security, and quality of service support. As a consequence, virtual networks are often being used as a...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2011

    Performance and Energy Modeling for Live Migration of Virtual Machines

    Live migration of Virtual Machine (VM) provides a significant benefit for virtual server mobility without disrupting service. It is widely used for system management in virtualized data centers. However, migration costs may vary significantly for different workloads due to the variety of VM configurations and workload characteristics. To take into...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2011

    Enhancement of Xen's Scheduler for MapReduce Workloads

    As the trends move towards data outsourcing and cloud computing, the efficiency of distributed data centers increases in importance. Cloud-based services such as Amazon's EC2 rely on Virtual Machines (VMs) to host MapReduce clusters for large data processing. However, current VM scheduling does not provide adequate support for MapReduce workloads,...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2013

    To Hardware Prefetch or Not to Prefetch?

    Most hardware and software venders suggest disabling hardware prefetching in virtualized environments. They claim that prefetching is detrimental to application performance due to inaccurate prediction caused by workload diversity and VM interference on shared cache. However, no comprehensive or quantitative measurements to support this belief have been performed. This paper...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2012

    OS-SOMMELIER: Memory-Only Operating System Fingerprinting in the Cloud

    Precise fingerprinting of an Operating System (OS) is critical to many security and Virtual Machine (VM) management applications in the cloud, such as VM introspection, penetration testing, guest OS administration (e.g., kernel update), kernel dump analysis, and memory forensics. The existing OS fingerprinting techniques primarily inspect network packets or CPU...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2012

    Securing Untrusted Code Via Compiler-Agnostic Binary Rewriting

    Binary code from untrusted sources remains one of the primary vehicles for malicious software attacks. This paper presents REINS, a new, more general, and lighter-weight binary rewriting and in-lining system to tame and secure untrusted binary programs. Unlike traditional monitors, REINS requires no cooperation from code-producers in the form of...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2013

    EXTERIOR: Using Dual-VM Based External Shell for Guest-OS Introspection, Configuration, and Recovery

    This paper presents EXTERIOR, a dual-VM architecture based external shell that can be used for trusted, timely out-of-VM management of guest-OS such as introspection, configuration, and recovery. Inspired by recent advances in Virtual Machine Introspection (VMI), EXTERIOR leverages an isolated, Secure Virtual Machine (SVM) to introspect the kernel state of...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    ElasticSwitch: Practical Work-Conserving Bandwidth Guarantees for Cloud Computing

    While cloud computing providers offer guaranteed allocations for resources such as CPU and memory, they do not offer any guarantees for network resources. The lack of network guarantees prevents tenants from predicting lower bounds on the performance of their applications. The research community has recognized this limitation but, unfortunately, prior...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2012

    On the Exploitation of Process Mining for Security Audits: The Conformance Checking Case

    Process mining stands for a set of techniques to analyze business process models and logs. However, the extent to which it can be used for security auditing has not been investigated. Focusing on conformance checking and its support in ProM, this paper reports on a case-study in the financial sector...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2006

    Generating Correct EPCs from Configured C-EPCs

    Process reference models play an important role for the alignment and configuration of commercial off-the-shelf Enterprise Systems to requirements of an organization. Recently, Configurable Event-driven Process Chains (C-EPCs) have been proposed as a language to support the model-driven configuration of such Enterprise Systems. While some problems of generating correct EPCs...

    Provided By Association for Computing Machinery