Carnegie Mellon University

Displaying 481-520 of 545 results

  • White Papers // Mar 2009

    A Logic of Secure Systems and Its Application to Trusted Computing

    The authors present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared memory, a simple form of access control on memory, machine resets, cryptographic operations, network communication, and dynamically loading and executing unknown (and...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2009

    Effects of Access-Control Policy Conflict-Resolution Methods on Policy-Authoring Usability

    Access-control policies can be stated more succinctly if they support both rules that grant access and rules that deny access, but this introduces the possibility that multiple rules will give conflicting conclusions for an access. In this paper, the authors compare a new conflict-resolution method, which uses first specificity and...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2009

    FPGA-Based Channel Simulator for a Wireless Network Emulator

    Wireless channel emulators are important tools for testing radio devices, especially in mobile environments. Wireless network emulators give the same accuracy and control for testing radio network systems that traditional channel emulators give to point to point radio links. Network emulators require many more independent channels than traditional channel emulators....

    Provided By Carnegie Mellon University

  • White Papers // Mar 2009

    PowerNap: Eliminating Server Idle Power

    Data center power consumption is undergoing an alarming acceleration. By 2011, U.S. data centers will consume 100 billion kWh at a cost of $7.4 billion per year. Research proves that much of this energy is wasted in idle systems. In typical deployments, server utilization is below 30%, but idle servers...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2009

    CLAMP: Practical Prevention of Large-Scale Data Leaks

    Providing online access to sensitive data makes web servers lucrative targets for attackers. A compromise of any of the web server's scripts, applications, or operating system can leak the sensitive data of millions of customers. Unfortunately, many systems for stopping data leaks require considerable effort from application developers, hindering their...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2009

    Extracting Models of Security-Sensitive Operations Using String-Enhanced White-Box Exploration on Binaries

    Models of security-sensitive code enable reasoning about the security implications of code. In this paper the authors present an approach for extracting models of security-sensitive operations directly from program binaries, which lets third-party analysts reason about a program when the source code is not available. The approach is based on...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2009

    How Do Wireless Chains Behave? the Impact of MAC Interactions

    In a Multi-hop Wireless Networks (MHWN), packets are routed between source and destination using a chain of intermediate nodes; chains are a fundamental communication structure in MHWNs whose behavior must be understood to enable building effective protocols. The behavior of chains is determined by a number of complex and interdependent...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2009

    A Compact Positioning and Velocity RF Sensor for Improved Inertial Navigation

    Navigation in GPS-denied or GPS-inhibited environments such as urban canyons, mountain areas, and indoors is often accomplished with an Inertial Measurement Unit (IMU). For portable navigation, miniaturized IMUs suffer from poor accuracy due to bias, bias drift and noise. The authors propose to use a compact RF motion sensor to...

    Provided By Carnegie Mellon University

  • Webcasts // Mar 2009

    SMART: Analyzing the Feasibility of Migrating Legacy Systems to SOA Environments

    Service-Oriented Architecture (SOA) has become an increasingly popular mechanism for achieving interoperability between systems. Because it has characteristics of loose coupling, published interfaces, and a standard communication model, SOA enables existing legacy systems to expose their functionality as services, presumably without making significant changes to the legacy systems. Migration of...

    Provided By Carnegie Mellon University

  • Webcasts // Mar 2009

    Method Framework for Engineering System Architectures

    To be successful, every system needs a good architecture and that requires the use of a good architecture engineering method. However, systems vary greatly in size, complexity, criticality, domain, operational dependence on other systems, the technology used and its diversity, requirements volatility, required quality characteristics and attributes, and volatility of...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2009

    Techniques for Bandwidth-Efficient Prefetching of Linked Data Structures in Hybrid Prefetching Systems

    This paper proposes a low-cost hardware/software cooperative technique that enables bandwidth-efficient prefetching of linked data structures. The solution has two new components: a compiler guided prefetch filtering mechanism that informs the hardware about which pointer addresses to prefetch, a coordinated prefetcher throttling mechanism that uses run-time feedback to manage the...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2009

    Real-Time Video Surveillance Over IEEE 802.11 Mesh Networks

    In recent years, there has been an increase in video surveillance systems in public and private environments due to a heightened sense of security. The next generation of surveillance systems will be able to annotate video and locally coordinate the tracking of objects while multiplexing hundreds of video streams in...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2009

    Reducing Data Center Energy Consumption Via Coordinated Cooling and Load Management

    This paper presents a unified approach to data center energy management based on a modeling framework that characterizes the influence of key decision variables on computational performance, thermal generation, and power consumption. Temperature dynamics are modeled by a network of interconnected components reflecting the spatial distribution of servers, Computer Room...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2009

    RAIDE for Engineering Architecture-Based Self-Adaptive Systems

    Rainbow is an approach for engineering self-adaptive systems, with run-time, closed-loop control over target systems to monitor, detect, decide, and act on opportunities for system improvement. RAIDE enables adaptation engineers to customize the Rainbow framework, simulate adaptation behavior, and deploy Rainbow run-time components. Imagine a world where a software engineer...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2009

    The Past, Present and Future of Programming in HCI

    The first computer users were all programmers, and the field of Human-Computer Interaction started, in part, with a focus on improving how programming was done. There was a significant amount of work in the 1980's on this topic, but it mostly died out in the 1990s. Now, there is a...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2009

    R-NUCA: Data Placement in Distributed Shared Caches

    Increases in on-chip communication delay and the large working sets of commercial and scientific workloads complicate the design of the on-chip last-level cache for multicore processors. The large working sets favor a shared cache design that maximizes the aggregate cache capacity and minimizes off-chip memory requests. At the same time,...

    Provided By Carnegie Mellon University

  • Webcasts // Feb 2009

    Recursion and Iteration of CMMI Project Management Practices

    Recursion occurs when a process is applied to successive levels within a structure. When the presenter talks about engineering practices in CMMI, they expect recursion (e.g., requirements must be managed for the product, product component, subcomponents, etc). Although not directly stated in the model, the same expectation should be made...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2009

    An Implementation of the Linux Software Repository Model for Other Operating Systems

    Connectivity in today's enterprise networks is regulated by a combination of complex routing and bridging policies, along with various interdiction mechanisms such as ACLs, packet filters, and other middleboxes that attempt to retrofit access control onto an otherwise permissive network architecture. This leads to enterprise networks that are inflexible, fragile,...

    Provided By Carnegie Mellon University

  • Webcasts // Jan 2009

    Exploring Enterprise, System of Systems, and System and Software Architectures

    As systems grow in complexity in today's software-intensive world, architecture's role becomes crucial at enterprise, system, and software levels. The theme of the SATURN 2009 conference is "Architecture at all scales" exploring the boundary between software, systems, and enterprise architectures. The theme highlights the growing importance of architecture in driving...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2009

    SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks

    One of the fundamental limitations of the Internet is the inability of a packet flow recipient to halt disruptive flows before they consume the recipient's network link resources. Critical infrastructures and businesses alike are vulnerable to DoS attacks or flash-crowds that can incapacitate their networks with traffic floods. Unfortunately, current...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2009

    Program Evolution for Data Mining

    Around the world there are innumerable databases of information. The quantity of information available has created a high demand for automatic methods for searching these databases and extracting specific kinds of information. Unfortunately, the information in these databases increasingly contains signals that have no corresponding classification symbols. Examples include databases...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2008

    Practical Foundations for Programming Languages

    The central organizing principle of the paper is that programming language features may be seen as manifestations of an underlying type structure that governs its syntax and semantics. The emphasis, therefore, is on the concept of type, which codifies and organizes the computational universe in much the same way that...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2008

    REDAC: Distributed, Asynchronous Redundancy in Shared Memory Servers

    The emergence of multi-core architectures - driven by continued technology scaling - has led to concerns about increasing soft- and hard-error rates in commodity designs. Because modern chip designs consist of multiple high-speed clock domains, conventional lockstepped redundant execution is no longer practical. Recent work suggests an asynchronous approach to...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2008

    Usable Key Agreement in Home Networks

    With the rapid emergence of new home networking technologies and proliferation of devices that use them, innovation has focused on rich functionality and largely ignored the associated security threats. The heterogeneous set of home appliances, their varied communication mediums, the lack of any ubiquitous standard to manage the communication across...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2008

    Learning of Protein Interaction Networks

    Protein-Protein Interactions (PPI) play a key role in determining the outcome of most cellular processes. Correctly identifying and characterizing protein interactions and the networks they comprise are critical for understanding the molecular mechanisms within the cell. Large-scale biological experimental methods can directly and systematically detect the set of interacting proteins...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2008

    Time Reversed Ultra-Wideband (UWB) Multiple-Input Multiple-Output (MIMO) Based on Measured Spatial Channels

    UWB technology is envisioned for future wireless high data rate transmission. A UWB system with multiple antennas takes advantage of the rich scattering environment to increase the data rate. On the other hand, given rich multipath, Time Reversal (TR) uses scatters to create space and time focalization at a target...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2008

    A Fault Model for Upgrades in Distributed Systems

    Recent studies, and a large body of anecdotal evidence, suggest that upgrades are unreliable and often end in failure, causing downtime and data-loss. While this is sometimes due to software defects in the new version, most upgrade failures are the result of faults in the upgrade procedure, such as broken...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2008

    Using Articulatory Position Data to Improve Voice Transformation

    Voice transformation (also known as voice conversion or voice morphing) is a name given to techniques which take speech from one speaker as input and attempt to produce speech that sounds like it came from another speaker. One compelling argument for good voice transformation is that it reduces the difficulty...

    Provided By Carnegie Mellon University

  • Webcasts // Dec 2008

    Identifying Program Risks

    It doesn't matter what guide or model one are using for one program's risk management process CMMI RSKM, the Risk Management Guide for DoD Acquisitions, PMI PMBoK, or some other if one don't identify the right risks, everything else one do in risk management is just a waste of time...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2008

    ShatterPlots: Fast Tool for Mining Large Graphs

    Graphs appear in several settings, like social networks, recommendation systems, and numerous more. A deep, recurring question is "How do real graphs look like?" That is, how can one separate real graph from synthetic or real graphs with masked portions? The main contribution of this paper is ShatterPlots, a simple...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2008

    Design Patterns in Separation Logic

    Object-oriented programs are notable for making use of both higher-order abstractions and mutable, aliased state. Either feature alone is challenging for formal verification, and the combination yields very flexible program designs and correspondingly difficult verification problems. In this paper, the authors show how to formally specify and verify programs that...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2008

    Comparing Performance of Solid State Devices and Mechanical Disks

    In terms of performance, solid state devices promise to be superior technology to mechanical disks. This paper investigates performance of several up-to-date high-end consumer and enterprise Flash Solid State Devices (SSDs) and relates their performance to that of mechanical disks. For the purpose of this evaluation, the IOZone benchmark is...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2008

    Room-Level Wi-Fi Location Tracking

    Context-aware applications for indoor intelligent environments require an appropriately accurate and stable interior positioning system to adapt services to the location of a mobile user or mobile device in a building. Different technologies provide a varying mix of resolution, accuracy, stability and challenges. This paper report on the experience using...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2008

    Using the Team Software Process to Improve Performance

    Most process improvement initiatives fail. What makes the Team Software Process (TSP) different? In this web cast, Tim explains what TSP is and how it can relate to CMMI. He will show quantitative results he and others have seen through the use of TSP. Tim will also discuss the people...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2008

    Analysis and Verification Challenges for Cyber-Physical Transportation Systems

    Substantial technological and engineering advances in various disciplines make it possible more than ever before to provide autonomous control choices for cars, trains, and aircraft. Correct automatic control can improve overall safety tremendously. Yet, ensuring a safe operation of those control assistants under all circumstances requires analysis techniques that are...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2008

    Lessons From a Real World Evaluation of Anti-Phishing Training

    Prior laboratory studies have shown that PhishGuru, an embedded training system, is an effective way to teach users to identify phishing scams. PhishGuru users are sent simulated phishing attacks and trained after they fall for the attacks. This paper extends the PhishGuru methodology to train users about spear phishing and...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2008

    Model-Driven Performance Analysis

    Model-Driven Engineering (MDE) is an approach to develop software systems by creating models and applying automated transformations to them to ultimately generate the implementation for a target platform. Although the main focus of MDE is on the generation of code, it is also necessary to support the analysis of the...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2008

    Flexible, Extensible, and Efficient VANET Authentication

    The authentication of VANET messages continues to be an important research challenge. Although much research has been conducted in the area of message authentication in wireless networks, VANETs pose unique challenges, such as real-time constraints, processing limitations, memory constraints, requirements for interoperability with existing standards, extensibility and flexibility for future...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2008

    ASPIER: An Automated Framework for Verifying Security Protocol Implementations

    The authors present ASPIER - the first framework that combines software model checking with a standard protocol security model to analyze authentication and secrecy properties of protocol implementations in an automated manner. ASPIER incorporates a standard symbolic attacker model and provides analogous guarantees about protocol implementations as previous work does...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2008

    Rate-Harmonized Scheduling for Saving Energy

    Energy consumption continues to be a major concern in multiple application domains including power hungry data centers, portable and wearable devices, mobile communication devices and wireless sensor networks. While energy-constrained, many such applications must meet timing and QoS constraints for sensing, actuation or multimedia data processing. Many modern power-aware processors...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2010

    Virus Propagation on Time-Varying Networks: Theory and Immunization Algorithms

    In this paper, the authors analytically studied virus-spreading (specifically the SIS model) on arbitrary, time-varying graphs. Given a set of T alternating graphs, modeling e.g. the day/night pattern of human behavior, they ask: what is the epidemic threshold? And what are the best-k nodes to immunize to defend against an...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Illicit Cyber Activity Involving Fraud

    In this webcast, the presenter going to explain about illicit cyber activity involving fraud from the virtual event managing the insider threat. the presenters aim is to assist organizations in improving their security posture and incident response capability by researching technical threat areas, developing and conducting information security assessments, and...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Engineering Realistic Synthetic Insider Threat (Cyber-Social) Test Data

    Access to data remains a significant impediment to advancing the science of insider threat research. In this webcast, the presenter going to explain about engineering realistic synthetic about the insider threat test data from the virtual event who manages the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Emerging Trends

    An emerging trend to pay attention to is the malicious outsider taking advantage of an inadvertent insider. In this webcast, the presenter going to explain about emerging trends in insider threat research from the virtual event managing the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Best Practices and Controls for Mitigating Insider Threats

    Threats can stem from simple activities like uploading, emailing, and posting sensitive data, etc. In this webcast, the presenter will explain about best practices and controls for mitigating insider threats from the virtual event of how to manage the insider threat.

    Provided By Carnegie Mellon University

  • Podcasts // Nov 2013

    Overview of the Threat Posed by Insiders to Critical Assets

    Insiders pose a substantial threat by virtue of their knowledge of and access to the users systems and/or their databases. In this webcast, the presenter will give an overview of the threat posed by insiders to critical assets.

    Provided By Carnegie Mellon University

  • White Papers // Sep 2013

    Secure Two-Party Computation with Reusable Bit-Commitments, via A Cut-and-Choose with Forge-and-Lose Technique

    A Secure Two-Party Computation (S2PC) protocol allows two parties to compute over their combined private inputs, as if inter-mediated by a trusted third party. In the active model, security is maintained even if one party is malicious, deviating from the protocol specification. For example, an honest party retains privacy of...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2014

    Predictable Coherent Caching with Incoherent Caches

    Caches are a well known hardware construct for improving energy consumption and average performance by keeping frequently-used data near processing resources. Yet, at the same time, they form a major hurdle for worst-case execution time analyses, in particular if they are shared between multiple cores. Exploiting that most shared data...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2007

    Field Deployment of IMBuddy: A Study of Privacy Control and Feedback Mechanisms for Contextual IM

    The authors describe the design of privacy controls and feedback mechanisms for contextual IM, an instant messaging service for disclosing contextual information. They tested their designs on IMBuddy, a contextual IM service they developed that discloses contextual information; including interruptibility, location, and the current window in focus (a proxy for...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2007

    End-User Privacy in Human-Computer Interaction

    This paper is twofold: first the authors summarize research on the topic of privacy in Human - Computer Interaction (HCI), outlining current approaches, results, and trends. Practitioners and researchers can draw upon this review when working on topics related to privacy in the context of HCI and CSCW. The second...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2010

    A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection

    Phishing attacks are a significant threat to users of the internet, causing tremendous economic loss every year. In combating phish, industry relies heavily on manual verification to achieve a low false positive rate, which, however, tends to be slow in responding to the huge volume of unique phishing URLs created...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2010

    Conducting Usable Privacy & Security Studies with Amazon's Mechanical Turk

    Being able to conduct human subject's experiments in a distributed method across the Internet is frequently desirable to support broad tests of usability. Until recently these experiments were commonly advertised in an ad-hoc fashion, using mailing lists, contest sites, and online bulletin boards. Recently Amazon's Mechanical Turk, a service where...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2013

    Policy-Based Secure Deletion

    Securely deleting data from storage systems has become difficult today. Most storage space is provided as a virtual resource and traverses many layers between the user and the actual physical storage medium. Operations to properly erase data and wipe out all its traces are typically not foreseen. This paper introduces...

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    The Path Forward: Specialized Computing in the Datacenter

    Popular belief holds that the cores on chip will grow at an exponential rate, following Moore's Law, with a commensurate increase in performance. However, by exploring the design space of multicore chips across technologies under a large array of design parameters, the authors observe that physical constraints in power and...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2009

    R-NUCA: Data Placement in Distributed Shared Caches

    Increases in on-chip communication delay and the large working sets of commercial and scientific workloads complicate the design of the on-chip last-level cache for multicore processors. The large working sets favor a shared cache design that maximizes the aggregate cache capacity and minimizes off-chip memory requests. At the same time,...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2007

    Usability Challenges in Security and Privacy Policy-Authoring Interfaces

    Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of authoring methods has received limited treatment from usability experts. With the rise in networked applications, distributed data storage, and pervasive computing, authoring comprehensive and accurate...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2010

    Dependable Connection Setup for Network Capabilities

    Network-layer capabilities offer strong protection against link flooding by authorizing individual flows with unforgeable credentials (i.e., capabilities). However, the capability setup channel is vulnerable to flooding attacks that prevent legitimate clients from acquiring capabilities; i.e., in Denial of Capability (DoC) attacks. Based on the observation that the distribution of attack...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2013

    ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets

    Many commodity operating systems and applications become infested with malicious software over time, primarily due to exploits that take advantage of software flaws and operator errors. In this paper, the authors present the salient features of a system design which allows remote-device authentication by a verifier, reaching malware-free system states,...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2013

    GeoPKI: Converting Spatial Trust into Certificate Trust

    The goal of GeoPKI is to enable secure certificate validation (without user interaction) for situations in which a user interacts with an online entity associated with the physical space where the user trusts (and usually is currently located). GeoPKI enables the owner of a space to associate a certificate with...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2013

    RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication

    The authors consider the specific problem of how users can securely authenticate online identities (e.g., associate a Facebook ID with its owner). Based on prior social science research demonstrating that the social tie strength is a useful indicator of trust in many real-world relationships, they explore how tie strength can...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2011

    RelationGrams: Tie-Strength Visualization for User-Controlled Online Identity Authentication

    Users experience a crisis of confidence for online activities in the current internet. Unfortunately, the symptom of this crisis of confidence manifests itself through online attacks, where adversaries con users to extract money or valuable sensitive information. Instead of addressing the symptom, the authors investigate how to address the underlying...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2012

    Transparent Key Integrity (TKI): A Proposal for a Public-Key Validation Infrastructure

    Recent trends in public-key infrastructure research explore the tradeoff between decreased trust in Certificate Authorities (CAs), the level of security achieved, the communication overhead (bandwidth and latency) for setting up a secure connection (e.g., verified via SSL/ TLS), and the availability with respect to verifiability of public key information. In...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2012

    Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?

    The authors are now in the post-PC era, yet their mobile devices are insecure. They consider the different stake-holders in today's mobile device ecosystem, and analyze why widely deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. They systematize existing proposals for leveraging such...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2007

    PROTOFLEX: FPGA-Accelerated Hybrid Functional Simulation

    After years of focus on uniprocessor performance, the \"Power wall\" has overnight driven the microprocessor hardware and software industry down the multicore path. This abrupt transition has left everyone at a loss about the designs of future multi-core and multiprocessor hardware and software. Recently, full-system multiprocessor simulators have emerged as...

    Provided By Carnegie Mellon University

  • Podcasts // Jan 2012

    Measuring Operational Resilience

    In this podcast, the speaker going to show traditional operational security metrics such as number of machines patched, vulnerability scan results, number of incidents, and number of staff trained are easy to collect and can be useful.

    Provided By Carnegie Mellon University

  • Podcasts // Nov 2010

    Virtual Integration Demonstration

    In this podcast, the speaker going to show how an approach called virtual integration has been applied to the development of systems in the aerospace industry. Virtual integration enables architecture-centric system development practice that is model-based, component-based, and proof-based. This approach has been shown to support the early validation of...

    Provided By Carnegie Mellon University

  • Podcasts // Jun 2007

    Getting Program Decision-Makers to Use and Be Part of Risk Management Process

    In this podcast, the speaker going to explain about the risk management process in order to make program decision-makers to use on it. The speaker also explained the problem of risk management were the real risks aren't in the risk repository.

    Provided By Carnegie Mellon University

  • White Papers // Apr 2013

    RowClone: Fast and Efficient In-DRAM Copy and Initialization of Bulk Data

    Many programs initialize or copy large amounts of memory data. Initialization and copying are forms of memory operations that do not require computation in order to derive their data-values - they either deals with known data-values or simply move data-values that already exist elsewhere in memory. Therefore, initialization/copying can potentially...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2010

    Thread Cluster Memory Scheduling: Exploiting Differences in Memory Access Behavior

    In a modern Chip Multi-Processor (CMP) system, memory is a shared resource among multiple concurrently executing threads. The memory scheduling algorithm should resolve memory contention by arbitrating memory access in such a way that competing threads progress at a relatively fast and even pace, resulting in high system throughput and...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2007

    Fingerprinting Across On-Chip Memory Interconnects

    Pairs of cores in a Chip Multi-Processor (CMP) can execute programs redundantly to detect and recover from soft errors. Prior work assumes dedicated cross-core buses to compare the redundant cores' outputs for error detection. In this paper, the authors investigate using the CMP's existing on-chip memory interconnect for comparing hashes...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2011

    DynRBLA: A High-Performance and Energy-Efficient Row Buffer Locality-Aware Caching Policy for Hybrid Memories

    Multi-programmed workloads on Chip Multi-Processors (CMPs) require large amounts of main memory to support the working sets of many concurrently executing threads. Today, this demand is increasing as the number of cores on a chip continues to increase, and applications become more data-intensive. The main memory in modern computers is...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    Design of Heterogeneous On-Chip Networks: An Application Driven Approach

    An on-chip interconnect is a critical shared resource that affects the performance-energy envelope of an entire multicore system. This aspect has led to a plethora of proposals in recent years for efficiently architecting the NoC substrate. However, most of these designs are agnostic to the actual application requirements in that...

    Provided By Carnegie Mellon University

  • White Papers // May 2013

    Techniques for Data Mapping and Buffering to Exploit Asymmetry in Multi-Level Cell (Phase Change) Memory

    Phase Change Memory (PCM) is a promising alternative to DRAM to achieve high memory capacity at low cost per bit. Adding to its better projected scalability, PCM can also store multiple bits per cell (called Multi-Level Cell, MLC), offering higher bit density. However, MLC requires precise sensing and control of...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2012

    HiRD: A Low-Complexity, Energy-Efficient Hierarchical Ring Interconnect

    Energy consumption and design simplicity are paramount concerns in on-chip interconnects for Chip Multi-Processors (CMPs). Several proposed and a few implemented many-core on-chip interconnects are mesh or torus-based. These designs offer good scalability. However, most mainstream commercial Chip Multi-Processors (CMPs) use rings, in which each network node has relatively simpler...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    A High-Performance Hierarchical Ring On-Chip Interconnect with Low-Cost Routers

    Energy consumption of routers in commonly used mesh-based on-chip networks for chip multiprocessors is an increasingly important concern: these routers consist of a crossbar and complex control logic and can require significant buffers, hence high energy and area consumption. In contrast, an alternative design uses ring-based networks to connect network...

    Provided By Carnegie Mellon University

  • White Papers // May 2014

    Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost Via Heterogeneous-Reliability Memory

    Memory devices represent a key component of datacenter Total Cost of Ownership (TCO), and techniques used to reduce errors that occur on these devices increase this cost. Existing approaches to providing reliability for memory devices pessimistically treat all data as equally vulnerable to memory errors. The authors' key insight is...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    Adaptive Cluster Throttling: Improving High-Load Performance in Bufferless On-Chip Networks

    Higher core counts and increasing focus on energy efficiency in modern Chip Multi-Processors (CMP) have led to renewed interest in simple and energy-efficient Network-on-Chip (NoC) designs. Several recent proposed designs trade off network capacity for efficiency, based on the observation that traditional networks are overprovisioned for many workloads. Bufferless routing...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2008

    Development of a Decision-Making Strategy to Improve the Efficiency of BPR

    To support the efficient appraisal of and selection from a list of generic business process improvement principles, this paper proposes a strategy for the implementation of Business Process Redesign (BPR). Its backbone is formed by the Analytic Hierarchy Process (AHP) multi-criteria method and the authors' earlier research into the popularity...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2010

    A Comparative Usability Evaluation of Traditional Password Managers

    Proposed in response to the growing number of passwords users have to memorize, password managers allow to store one's credentials, either on a third-party server (online password manager), or on a portable device (portable password manager) such as a mobile phone or a USB key. In this paper, the authors...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2011

    Towards a Software Framework for Automatic Business Process Redesign

    A key element to the success of any organization is the ability to continuously improve its business process performance. Efficient Business Process Redesign (BPR) methodologies are needed to allow organizations to face the changing business conditions. For a long time, practices for BPR were done case-by-case and were based on...

    Provided By Carnegie Mellon University