Association for Computing Machinery

Displaying 1-40 of 6312 results

  • White Papers // Apr 2014

    Palette: Enabling Scalable Analytics for Big-Memory, Multicore Machines

    Hadoop and its variants have been widely used for processing large scale analytics tasks in a cluster environment. However, use of a commodity cluster for analytics tasks needs to be reconsidered based on two key observations: in recent years, large memory, multicore machines have become more affordable; and recent studies...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2014

    Maple: Scalable Multi-Dimensional Range Search over Encrypted Cloud Data with Tree-based Index

    Cloud computing promises users massive scale outsourced data storage services with much lower costs than traditional methods. However, privacy concerns compel sensitive data to be stored on the cloud server in an encrypted form. This papers a great challenge for effectively utilizing cloud data, such as executing common SQL queries....

    Provided By Association for Computing Machinery

  • White Papers // Mar 2014

    The Benefit of SMT in the Multi-Core Era: Flexibility Towards Degrees of Thread-Level Parallelism

    The number of active threads in a multi-core processor varies over time and is often much smaller than the number of supported hardware threads. This requires multi-core chip designs to balance core count and per-core performance. Low active thread counts benefit from a few big, high-performance cores, while high active...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2014

    On Quantitative Dynamic Data Flow Tracking

    Information flow tracking can be used to support access and usage control. In order to enforce real-world usage control requirements on data, one must take into account that data exist in multiple representations. The authors present a non-probabilistic model for dynamic quantitative data flow tracking. Estimations of the amount of...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2014

    Scale-Out NUMA

    Emerging datacenter applications operate on vast datasets that are kept in DRAM to minimize latency. The large number of servers needed to accommodate this massive memory footprint requires frequent server-to-server communication in applications such as key-value stores and graph-based applications that rely on large irregular data structures. The fine-grained nature...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2014

    Natural Language Queries over Heterogeneous Linked Data Graphs: A Distributional-Compositional Semantics Approach

    The demand to access large amounts of heterogeneous structured data is emerging as a trend for many users and applications. However, the effort involved in querying heterogeneous and distributed third-party databases can create major barriers for data consumers. At the core of this problem is the semantic gap between the...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2014

    Towards Fair and Efficient SMP Virtual Machine Scheduling

    As multicore processors become prevalent in modern computer systems, there is a growing need for increasing hardware utilization and exploiting the parallelism of such platforms. With virtualization technology, hardware utilization is improved by encapsulating independent workloads into Virtual Machines (VMs) and consolidating them onto the same machine. SMP virtual machines...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2014

    Leveraging Hardware Message Passing for Efficient Thread Synchronization

    As the level of parallelism in manycore processors keeps increasing, providing efficient mechanisms for thread synchronization in concurrent programs is becoming a major concern. On cache-coherent shared-memory processors, synchronization efficiency is ultimately limited by the performance of the underlying cache coherence protocol. This paper studies how hardware support for message...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2014

    Predicting Crowd Behavior with Big Public Data

    With public information becoming widely accessible and shared on today's web, greater insights are possible into crowd actions by citizens and non-state actors such as large protests and cyber activism. The authors present e orts to predict the occurrence, specific timeframe, and location of such actions before they occur based...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2014

    Fusing Data with Correlations

    Many applications rely on Web data and extraction systems to accomplish knowledge-driven tasks. Web information is not curated, so many sources provide inaccurate, or conflicting information. Moreover, extraction systems introduce additional noise to the data. The authors wish to automatically distinguish correct data and erroneous data for creating a cleaner...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2014

    A Computational Field Framework for Collaborative Task Execution in Volunteer Clouds

    The increasing diffusion of cloud technologies offers new opportunities for distributed and collaborative computing. Volunteer clouds are a prominent example, where participants join and leave the platform and collaborate by sharing computational resources. The high complexity, dynamism and unpredictability of such scenarios call for decentralized self-approaches. The authors present in...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2014

    SOFT GRID - Big Data Analytics for Smart Grid

    The people live in an information rich society, where the amount of information in the world is presently doubling every year. Therefore, the greatest challenge of their period is data Handling. Big Data Analytics (BDA) has achieved its current prominence within utility domain in this context. As the power grid...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2014

    Authenticated Data Structures, Generically

    An Authenticated Data Structure (ADS) is a data structure whose operations can be carried out by an untrusted prover, the results of which a verifier can efficiently check as authentic. This paper has the prover produce a compact proof that the verifier can check along with each operation's result. ADSs...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2013

    Cloud Adoption: Prioritizing Obstacles and Obstacles Resolution Tactics Using AHP

    The enormous potential of cloud computing for improved and cost-effective service has generated unprecedented interest in its adoption. However, a potential cloud user faces numerous risks regarding service requirements, cost implications of failure and uncertainty about cloud providers' ability to meet service level agreements. These risks hinder the adoption of...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2013

    Seeking Anonymity in an Internet Panopticon

    In today's \"Big Data\" internet, users often need to assume that, by default, their every statement or action online is monitored and tracked; moreover, statements and actions are linked with detailed user profiles built by entities ranging from commercial vendors and advertisers to state surveillance agencies to online stalkers and...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2013

    Subverting System Authentication with Context-Aware, Reactive Virtual Machine Introspection

    Recent advances in bridging the semantic gap between Virtual Machines (VMs) and their guest processes have a dark side: they can be abused to subvert and compromise VM file system images and process images. To demonstrate this alarming capability, a context aware, reactive VM Introspection (VMI) instrument is presented and...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2013

    SHIFT: Shared History Instruction Fetch for Lean-Core Server Processors

    In server workloads, large instruction working sets result in high L1 instruction cache miss rates. Fast access requirements preclude large instruction caches that can accommodate the deep software stacks prevalent in server applications. Prefetching has been a promising approach to mitigate instruction-fetch stalls by relying on recurring instruction streams of...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2013

    Meet the Walkers: Accelerating Index Traversals for In-Memory Databases

    The explosive growth in digital data and its growing role in real-time decision support motivate the design of high-performance DataBase Management Systems (DBMSs). Meanwhile, slowdown in supply voltage scaling has stymied improvements in core performance and ushered an era of power-limited chips. These developments motivate the design of DBMS accelerators...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2013

    RowClone: Fast and Energy-Efficient In-DRAM Bulk Data Copy and Initialization

    Several system-level operations trigger bulk data copy or initialization. Even though these bulk data operations do not require any computation, current systems transfer a large quantity of data back and forth on the memory channel to perform such operations. As a result, bulk data operations consume high latency, bandwidth, and...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2013

    Linearly Compressed Pages: A Low-Complexity, Low-Latency Main Memory Compression Framework

    Data compression is a promising approach for meeting the increasing memory capacity demands expected in future systems. Unfortunately, existing compression algorithms do not translate well when directly applied to main memory because they require the memory controller to perform non-trivial computation to locate a cache line within a compressed memory...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2013

    Utilizing Domain-Specific Keywords for Discovering Public SPARQL Endpoints: A Life-Sciences Use-Case

    The LOD cloud comprises of billions of facts covering hundreds of datasets. In accordance with the linked data principles, these datasets are connected by a variety of typed links, forming an interlinked \"Web of data\". The growing diversity of the web of data makes it more and more challenging for...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2013

    Cyber-Secure Communication Architecture for Active Power Distribution Networks

    Active power distribution networks require sophisticated monitoring and control strategies for efficient energy management and automatic adaptive reconfiguration of the power infrastructure. Such requirements are realized by deploying a large number of various electronic automation and communication field devices, such as Phasor Measurement Units (PMUs) or Intelligent Electronic Devices (IEDs),...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2013

    Smartphones as Practical and Secure Location Verification Tokens for Payments

    The authors propose a novel location-based second-factor authentication solution for modern Smartphones. They demonstrate their solution in the context of point of sale transactions and show how it can be effectively used for the detection of fraudulent transactions caused by card theft or counterfeiting. Their scheme makes use of Trusted...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2013

    XLynx - An FPGA-Based XML Filter for Hybrid XQuery Processing

    While offering unique performance and energy saving advantages, the use of Field-Programmable Gate Arrays (FPGAs) for database acceleration has demanded major concessions from system designers. Either the programmable chips have been used for very basic application tasks (such as implementing a rigid class of selection predicates), or their circuit definition...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    A Flexible Framework for Detecting IPv6 Vulnerabilities

    Security has recently become a very important concern for entities using IPv6 networks. This is especially true with the recent news reports where governments and companies have admitted to credible cyber attacks against them in which confidential information and the security of data have been compromised. In this paper, the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Go with the Flow: Toward Workflow-Oriented Security Assessment

    In this paper, the authors advocate the use of workflow-describing how a system provides its intended functionality-as a pillar of cybersecurity analysis and propose a holistic workflow-oriented assessment framework. While workflow models are currently used in the area of performance and reliability assessment, these approaches are designed neither to assess...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Supporting End-to-End Social Media Data Analysis with the IndexedHBase Platform

    As data intensive applications evolve, many research projects involving big data require efficient extraction and analysis of specific data subsets, rather than the whole dataset. Social media data analysis is one such example. While social media platforms such as Twitter provide tremendous data about all kinds of social activities, most...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Efficient and Customizable Data Partitioning Framework for Distributed Big RDF Data Processing in the Cloud

    Big data business can leverage and benefit from the clouds; the most optimized, shared, automated, and virtualized computing infrastructures. One of the important challenges in processing big data in the clouds is how to effectively partition the big data to ensure efficient distributed processing of the data. In this paper...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Efficient Data Partitioning Model for Heterogeneous Graphs in the Cloud

    As the size and variety of information networks continue to grow in many scientific and engineering domains, the authors witness a growing demand for efficient processing of large heterogeneous graphs using a cluster of compute nodes in the cloud. One open issue is how to effectively partition a large graph...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Using Automated Performance Modeling to Find Scalability Bugs in Complex Codes

    Many parallel applications suffer from latent performance limitations that may prevent them from scaling to larger machine sizes. Often, such scalability bugs manifest themselves only when an attempt to scale the code is actually being made - a point where remediation can be difficult. However, creating analytical performance models that...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Using Simulation to Explore Distributed Key-Value Stores for Extreme-Scale System Services

    Owing to the significant high rate of component failures at extreme scales, system services will need to be failure-resistant, adaptive and self-healing. A majority of HPC services are still designed around a centralized paradigm and hence are susceptible to scaling issues. Peer-To-Peer (P2P) services have proved themselves at scale for...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Cost-Aware Cloud Bursting for Enterprise Applications

    The high cost of provisioning resources to meet peak application demands has led to the widespread adoption of pay-as-you-go cloud computing services to handle workload fluctuations. Some enterprises with existing IT infrastructure employ a hybrid cloud model where the enterprise uses its own private resources for the majority of its...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Asynchronous Object Storage with QoS for Scientific and Commercial Big Data

    In this paper, the authors present their design for an asynchronous object storage system intended for use in scientific and commercial big data workloads. Use cases from the target workload do-mains are used to motivate the key abstractions used in the Application Programming Interface (API). The architecture of the Scalable...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Supporting Complex Queries and Access Policies for Multi-user Encrypted Databases

    Cloud computing is an emerging paradigm offering companies (virtually) unlimited data storage and computation at attractive costs. It is a cost-effective model because it does not require deployment and maintenance of any dedicated IT infrastructure. Despite its benefits, it introduces new challenges for protecting the confidentiality of the data. Sensitive...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    OASIS: On Achieving a Sanctuary for Integrity and Secrecy on Untrusted Platforms

    Currently, Trusted Platform Module (TPM) based solutions have not reached wide-spread application in security-sensitive contexts, perhaps because TCG solutions lack protection against a more resourceful adversary, lack sufficient properties for end-to-end application protection, lack architectural safeguards against supply-chain compromises, or concerns over poor performance. OASIS offers a stronger degree of...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    AppIntent: Analyzing Sensitive Data Transmission in Android for Privacy Leakage Detection

    Android phones often carry personal information, attracting malicious developers to embed code in Android applications to steal sensitive data. With known techniques in the literature, one may easily determine if sensitive data is being transmitted out of an Android phone. However, transmission of sensitive data in itself does not necessarily...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    POSTER - TRIPLEX: Verifying Data Minimisation in Communication Systems

    The main idea behind the TRIPLEX framework is to analyze relevant privacy aspects of privacy-enhancing protocols in a specified scenario that may involve several actors and protocol instances (of different protocols). Systems dealing with personal information are legally required to satisfy the principle of data minimization. Privacy-enhancing protocols use cryptographic...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Secure Data Deletion From Persistent Media

    Secure deletion is the task of deleting data irrecoverably from a physical medium. In this paper, the authors present a general approach to the design and analysis of secure deletion for persistent storage that relies on encryption and key wrapping. They define a key disclosure graph that models the adversarial...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Impact of Integrity Attacks on Real-Time Pricing in Smart Grids

    Modern information and communication technologies used by smart grids are subject to cyber security threats. This paper studies the impact of integrity attacks on Real-Time Pricing (RTP), a key feature of smart grids that uses such technologies to improve system efficiency. Recent studies have shown that RTP creates a closed...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    HIFS: History Independence for File Systems

    Ensuring complete irrecoverability of deleted data is difficult to achieve in modern systems. Simply overwriting data or deploying encryption with ephemeral keys is not sufficient. The mere (previous) existence of deleted records impacts the current system state implicitly at all layers. This can be used as an oracle to derive...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2013

    ScreenPass: Secure Password Entry on Touchscreen Devices

    Users routinely access cloud services through third-party apps on Smartphones by giving apps login credentials (i.e., a username and password). Unfortunately, users have no assurance that their apps will properly handle this sensitive information. In this paper, the authors describe the design and implementation of ScreenPass, which significantly improves the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2007

    Designer-Controlled Generation of Parallel and Flexible Heterogeneous MPSoC Specification

    Programming Multi-Processor Systems-on-Chip (MPSoC) involves partitioning and mapping of sequential reference code onto multiple parallel processing elements. The immense potential available through MPSoC architectures depends heavily on the effectiveness of this programming. Existing automatic parallelizing techniques, though effective on shared memory architectures, are insufficient for MPSoCs, which are typically characterized...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2007

    Pointer Re-Coding for Creating Definitive MPSoC Models

    Today's MPSoC synthesis and exploration design flows start from an abstract input specification model captured in a system level design language. Usually this model is created from a C reference code by encapsulating the computation and the communication using behaviors and channels. However, often pointers in the reference code hamper...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Exploiting Just-Enough Parallelism When Mapping Streaming Applications in Hard Real-Time Systems

    Embedded streaming applications specified using parallel Models of Computation (MoC) often contain ample amount of parallelism which can be exploited using Multi-Processor System-on-Chip (MPSoC) platforms. It has been shown that the various forms of parallelism in an application should be explored to achieve the maximum system performance. However, if more...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2008

    Daedalus: Toward Composable Multimedia MP-SoC Design

    Daedalus is a system-level design flow for the design of Multi-Processor System-on-Chip (MP-SoC) based embedded multimedia systems. It offers a fully integrated tool-flow in which Design Space Exploration (DSE), system-level synthesis, application mapping, and system prototyping of MP-SoCs are highly automated. In this paper, the authors describe their first industrial...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2012

    Managing Latency in Embedded Streaming Applications Under Hard-Real-Time Scheduling

    In this paper, the authors consider the problem of hard-real-time scheduling of embedded streaming applications, modeled using data flow graphs, while minimizing the application latency. Recently, it has been shown that the actors in an acyclic Cyclo-Static Data Flow (CSDF) graph can be scheduled as a set of implicit-deadline periodic...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2007

    An Embedded Multi-Resolution AMBA Trace Analyzer for Microprocessor-Based SoC Integration

    The bus tracing is used to catch related signals for further investigation and analysis. However, the trace size of cycle-accurate tracing is large and the trace cycle is shallow unless using a proper compression mechanism. In this paper, the authors propose an embedded multi-resolution AMBA trace analyzer that provides the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2008

    A Multi-Resolution AHB Bus Tracer for Real-Time Compression of Forward/Backward Traces in a Circular Buffer

    The forward/backward trace refers to the trace captured after/before a target point is reached, respectively. Real time compression of the backward trace in a circular buffer is a challenging problem since the initial state of the trace currently under compression might be overwritten when wrapping around occurs. This paper presents...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2011

    Perfctr-Xen: A Framework for Performance Counter Virtualization

    Virtualization is a powerful technique used for variety of application domains, including emerging cloud environments that provide access to virtual machines as a service. Because of the interaction of virtual machines with multiple underlying software and hardware layers, the analysis of the performance of applications running in virtualized environments has...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2009

    Entropy: a Consolidation Manager for Clusters

    Clusters provide powerful computing environments, but in practice much of this power goes to waste, due to the static allocation of tasks to nodes, regardless of their changing computational requirements. Dynamic consolidation is an approach that migrates tasks within a cluster as their computational requirements change, both to reduce the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Decentralized Deduplication in SAN Cluster File Systems

    File systems hosting virtual machines typically contain many duplicated blocks of data resulting in wasted storage space and increased storage array cache footprint. Deduplication addresses these problems by storing a single instance of each unique data block and sharing it between all original sources of that data. While deduplication is...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Utility-Function-Driven Energy-Efficient Cooling in Data Centers

    The sharp rise in energy usage in data centers, fueled by increased IT workload and high server density, and coupled with a concomitant increase in the cost and volatility of the energy supply, have triggered urgent calls to improve data center energy efficiency. In response, researchers have developed energy-aware IT...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Probabilistic Performance Modeling of Virtualized Resource Allocation

    Virtualization technologies enable organizations to dynamically flex their IT resources based on workload fluctuations and changing business needs. However, only through a formal understanding of the relationship between application performance and virtualized resource allocation can over-provisioning or over-loading of physical IT resources be avoided. In this paper, the authors examine...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    A Distributed Control Framework for Performance Management of Virtualized Computing Environments

    In this paper, the authors develop a distributed cooperative control framework to manage the performance of virtualized computing environments. They consider a server cluster hosting multiple enterprise applications on a set of Virtual Machines (VMs) in which the system must dynamically optimize the CPU capacity provided to each VM in...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2007

    Proactive Replication in Distributed Storage Systems Using Machine Availability Estimation

    Distributed storage systems provide data availability by means of redundancy. To assure a given level of availability in case of node failures, new redundant fragments need to be introduced. Since node failures can be either transient or permanent, deciding when to generate new fragments is non-trivial. An additional difficulty is...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Stochastic Approximation Control of Power and Tardiness in a Three-Tier Web-Hosting Cluster

    Large-scale web-hosting and data centers are increasingly challenged to reduce power consumption while maintaining a minimum quality of service. Dynamic voltage and frequency scaling provides one technique to curb power consumption by limiting the power supply and/or frequency of the CPU at the expense of lower execution speed. Model-based approaches...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2012

    OpenCL and the 13 Dwarfs: A Work in Progress

    In the past, evaluating the architectural innovation of parallel computing devices relied on a benchmark suite based on existing programs, e.g., EEMBC or SPEC. However, with the growing ubiquity of parallel computing devices, the authors argue that it is unclear how best to express parallel computation, and hence, a need...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2013

    Autonomic Provisioning With Self-Adaptive Neural Fuzzy Control for Percentile-Based Delay Guarantee

    Autonomic server provisioning for performance assurance is a critical issue in Internet services. It is challenging to guarantee that requests flowing through a multi-tier system will experience an acceptable distribution of delays. The difficulty is mainly due to highly dynamic workloads, the complexity of underlying computer systems, and the lack...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2014

    Towards Fair and Efficient SMP Virtual Machine Scheduling

    As multicore processors become prevalent in modern computer systems, there is a growing need for increasing hardware utilization and exploiting the parallelism of such platforms. With virtualization technology, hardware utilization is improved by encapsulating independent workloads into Virtual Machines (VMs) and consolidating them onto the same machine. SMP virtual machines...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2012

    AROMA: Automated Resource Allocation and Configuration of MapReduce Environment in the Cloud

    Distributed data processing framework MapReduce is increasingly deployed in clouds to leverage the pay-per-usage cloud computing model. Popular Hadoop MapReduce environment expects that end users determine the type and amount of cloud resources for reservation as well as the configuration of Hadoop parameters. However, such resource reservation and job provisioning...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2007

    Frequency-Aware Energy Optimization for Real-Time Periodic and Aperiodic Tasks

    Energy efficiency is an important factor in embedded systems design. The authors consider an embedded system with a Dynamic Voltage Scaling (DVS) capable processor and its system-wide power consumption is dominated by the processor and memory. They present speed assignment polices for a set of periodic/aperiodic tasks that minimize the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    On the Efficacy of GPU-Integrated MPI for Scientific Applications

    Scientific computing applications are quickly adapting to leverage the massive parallelism of GPUs in large-scale clusters. However, the current hybrid programming models require application developers to explicitly manage the disjointed host and GPU memories, thus reducing both efficiency and productivity. Consequently, GPU-integrated MPI solutions, such as MPI-ACC andMVAPICH2- GPU, have...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Injecting Realistic Burstiness to a Traditional Client-Server Benchmark

    The design of autonomic systems often relies on representative benchmarks for evaluating system performance and scalability. Despite the fact that experimental observations have established that burstiness is a common workload characteristic that has deleterious effects on user-perceived performance, existing client-server benchmarks do not provide mechanisms for injecting burstiness into the...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2008

    Impact of Dynamic Voltage Frequency Scaling on the Architectural Vulnerability of GALS Architectures

    Aggressive technology scaling is increasing the impact of soft errors on microprocessor reliability. Dynamic Voltage Frequency Scaling (DFVS) algorithms are conventionally studied from a performance per watt basis. But applying DVFS impacts reliability as well. Since DVFS affects the occupancy of different pipeline structures, they impact the soft error masking...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2008

    Evaluating the Usefulness of Content Addressable Storage for High-Performance Data Intensive Applications

    Content Addressable Storage (CAS) is a data representation technique that operates by partitioning a given data-set into non-intersecting units called chunks and then employing techniques to efficiently recognize chunks occurring multiple times. This allows CAS to eliminate duplicate instances of such chunks, resulting in reduced storage space compared to conventional...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2006

    Thermal Issues in Disk Drive Design: Challenges and Possible Solutions

    The importance of pushing the performance envelope of disk drives continues to grow in the enterprise storage market. One of the most fundamental factors impacting disk drive design is heat dissipation, since it directly affects drive reliability. Until now, drive manufacturers have continued to meet the 40% annual growth target...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2011

    Dynamic Adaptive Scheduling for Virtual Machines

    With multi-core processors becoming popular, exploiting their computational potential becomes an urgent matter. The functionality of multiple standalone computer systems can be aggregated into a single hardware computer by virtualization, giving efficient usage of the hardware and decreased cost for power. Some principles of operating systems can be applied directly...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2007

    Mechanisms for Bounding Vulnerabilities of Processor Structures

    Concern for the increasing susceptibility of processor structures to transient errors has led to several recent research efforts that propose architectural techniques to enhance reliability. However, real systems are typically required to satisfy hard reliability budgets, and barring expensive full-redundancy approaches, none of the proposed solutions treat any reliability budgets...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2006

    SlicK: Slice-Based Locality Exploitation for Efficient Redundant Multithreading

    Transient faults are expected a be a major design consideration in future microprocessors. Recent proposals for transient fault detection in processor cores have revolved around the idea of redundant threading, which involves redundant execution of a program across multiple execution contexts. This paper presents a new approach to redundant threading...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2006

    Design, Implementation and Evaluation of Security in ISCSI-Based Network Storage Systems

    In this paper, the authors described the performance and security aspects of the iSCSI protocol in a network storage based system. Ethernet speeds have been improving rapidly and network throughput is no longer considered a bottleneck when compared to Fibre-channel based storage area networks. However, when security of the data...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2013

    Virtualizing Power Distribution in Datacenters

    Power infrastructure contributes to a significant portion of datacenter expenditures. Overbooking this infrastructure for a high percentile of the needs is becoming more attractive than for occasional peaks. There exist several computing knobs to cap the power draw within such under-provisioned capacity. Recently, batteries and other energy storage devices have...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2008

    QDSL: A Queuing Model for Systems With Differential Service Levels

    A feature exhibited by many modern computing systems is their ability to improve the quality of output they generate for a given input by spending more computing resources on processing it. Often this improvement comes at the price of degraded performance in the form of reduced throughput or increased response...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Characterizing the Soft Error Vulnerability of Multicores Running Multithreaded Applications

    Multicores have become the platform of choice across all market segments. Cost-effective protection against soft errors is important in these environments, due to the need to move to lower technology generations and the exploding number of transistors on a chip. While multicores offer the flexibility of varying the number of...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2009

    The Hybrid Scheduling Framework for Virtual Machine Systems

    The virtualization technology makes it feasible that multiple guest operating systems run on a single physical machine. It is the virtual machine monitor that dynamically maps the virtual CPU of virtual machines to physical CPUs according to the scheduling strategy. The scheduling strategy in Xen schedules virtual CPUs of a...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2013

    Kernel Density Metric Learning

    In this paper, the authors introduce a supervised metric learning algorithm, called Kernel Density Metric Learning (KDML), which is easy to use and provides nonlinear, probability-based distance measures. KDML constructs a direct nonlinear mapping from the original input space into a feature space based on kernel density estimation. The nonlinear...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2013

    Interference and Locality-Aware Task Scheduling for MapReduce Applications in Virtual Clusters

    MapReduce emerges as an important distributed programming paradigm for large-scale applications. Running MapReduce applications in clouds presents an attractive usage model for enterprises. In a virtual MapReduce cluster, the interference between Virtual Machines (VMs) causes performance degradation of map and reduce tasks and renders existing data locality-aware task scheduling policy,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2008

    Multithreaded Simulation for Synchronous Dataflow Graphs

    Synchronous DataFlow (SDF) has been successfully used in design tools for system-level simulation of wireless communication systems. Modern wireless communication standards involve large complexity and highly-multirate behavior, and typically result in long simulation time. The traditional approach for simulating SDF graphs is to compute and execute static single-processor schedules. Now-a-days,...

    Provided By Association for Computing Machinery

  • White Papers // May 2006

    Energy-Efficient Embedded Software Implementation on Multiprocessor System-on-Chip with Multiple Voltages

    Performance guarantee and energy efficiency are becoming increasingly important for the implementation of embedded software. Traditionally, the Worst-Case Execution Time (WCET) is considered to provide performance guarantee, however, this often leads to overdesigning the system. This paper develops energy-driven completion ratio guaranteed scheduling techniques for the implementation of embedded software...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2012

    VSim: Simulating Multi-Server Setups at Near Native Hardware Speed

    Simulating contemporary computer systems is a challenging endeavor, especially when it comes to simulating high-end setups involving multiple servers. The simulation environment needs to run complete software stacks, including operating systems, middleware, and application software, and it needs to simulate network and disk activity next to CPU performance. In addition,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2012

    Probabilistic Modeling for Job Symbiosis Scheduling on SMT Processors

    Symbiotic job scheduling improves Simultaneous Multi-Threading (SMT) processor performance by coscheduling jobs that have \"Compatible\" demands on the processor's shared resources. Existing approaches however require a sampling phase, evaluate a limited number of possible coschedules, use heuristics to gauge symbiosis, are rigid in their optimization target, and do not preserve...

    Provided By Association for Computing Machinery