Carnegie Mellon University

Displaying 121-160 of 546 results

  • White Papers // Apr 2012

    Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?

    The authors are now in the post-PC era, yet their mobile devices are insecure. They consider the different stake-holders in today's mobile device ecosystem, and analyze why widely deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. They systematize existing proposals for leveraging such...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2012

    SafeSlinger: An Easy-to-Use and Secure Approach for Human Trust Establishment

    Users regularly experience a crisis of confidence on the Internet. Is that email or instant message truly originating from the claimed individual? Such doubts are commonly resolved through a leap of faith, expressing the desperation of users. To establish a secure basis for Internet communication, the authors propose SafeSlinger, a...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2012

    Towards Understanding Heterogeneous Clouds at Scale: Google Trace Analysis

    With the emergence of large, heterogeneous, shared computing clusters, their efficient use by mixed distributed workloads and tenants remains an important challenge. Unfortunately, little data has been available about such workloads and clusters. This paper analyzes a recent Google release of scheduler request and utilization data across a large (12500+)...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    SAFER: System-Level Architecture for Failure Evasion in Real-Time Applications

    The authors propose a layer called SAFER (System-level Architecture for Failure Evasion in Real-time applications) to incorporate configurable task-level fault-tolerance features such as Hot Standby and Cold Standby in order to tolerate fail-stop processor and task failures for distributed embedded real-time systems. To detect such failures, SAFER monitors the health...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    XIA: Efficient Support for Evolvable Internetworking

    Motivated by limitations in today's host-centric IP network, recent studies have proposed clean-slate network architectures centered around alternate first-class principals, such as content, services, or users. However, much like the host-centric IP design, elevating one principal type above others hinders communication between other principals and inhibits the network's capability to...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    RPT: Re-Architecting Loss Protection for Content-Aware Networks

    The authors revisit the design of redundancy-based loss protection schemes in light of recent advances in content-aware networking. Content-aware networks minimizes the overhead of redundancy, if the redundancy is introduced in a way that the network can understand. With this insight, they propose a new loss protection scheme called Redundant...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    S-SPAN: Secure Smart Posters in Android Using NFC

    Smart posters are a promising new use case for NFC-enabled mobile devices, but to date there has been a general lack of security mechanisms for NFC smart posters. The authors present S-SPAN - a secure smart poster system consisting of three parts: an administrative web interface for managing posters, a...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    Towards Adaptive GPU Resource Management for Embedded Real-Time Systems

    In this paper, the authors present two conceptual frameworks for GPU applications to adjust their task execution times based on total workload. These frameworks enable smart GPU resource management when many applications share GPU resources while the workloads of those applications vary. Application developers can explicitly adjust the number of...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    Identifying Tipping Points in a Decision-Theoretic Model of Network Security

    Although system administrators are frequently urged to protect the machines in their network, the fact remains that the decision to protect is far from universal. To better understand this decision, the authors formulate a decision-theoretic model of a system administrator responsible for a network of size n against an attacker...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    MinBD: Minimally-Buffered Deflection Routing for Energy-Efficient Interconnect

    A conventional Network-on-Chip (NoC) router uses input buffers to store in-flight packets. These buffers improve performance, but consume significant power. It is possible to bypass these buffers when they are empty, reducing dynamic power, but static buffer power, and dynamic power when buffers are utilized, remains. To improve energy efficiency,...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    Adaptive Quality of Service in Ad Hoc Wireless Networks

    In high criticality crisis scenarios, such as disaster management, ad hoc wireless networks are quickly assembled in the field to support decision makers through situational awareness using messaging-, voice-, and video-based applications. These applications cannot afford the luxury of stalling or failing due to overwhelming bandwidth demand on these networks...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    Rhythmic Tasks: A New Task Model With Continually Varying Periods for Cyber-Physical Systems

    Traditional mechanical subsystems in automobiles are being replaced by electronically controlled systems, often with no mechanical backup. This trend towards "Drive-by-wire" systems is becoming increasingly popular. In these cyber-physical systems, a critical task not meeting its timing deadline can lead to a safety violation and damage to life and/or property....

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    Enabling Efficient and Scalable Hybrid Memories Using Fine-Granularity DRAM Cache Management

    Hybrid main memories composed of DRAM as a cache to scalable non-volatile memories such as Phase-Change Memory (PCM) can provide much larger storage capacity than traditional main memories. A key challenge for enabling high-performance and scalable hybrid memories, though, is efficiently managing the metadata (e.g., tags) for data cached in...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms

    Text-based passwords remain the dominant authentication method in computer systems, despite significant advancement in attackers' capabilities to perform password cracking. In response to this threat, password composition policies have grown increasingly complex. However, there is insufficient research defining metrics to characterize password strength and using them to evaluate password-composition policies....

    Provided By Carnegie Mellon University

  • White Papers // Feb 2012

    Provable De-Anonymization of Large Datasets With Sparse Dimensions

    There is a significant body of empirical work on statistical de-anonymization attacks against databases containing micro-data about individuals, e.g., their preferences, movie ratings, or transaction data. The authors' goal is to analytically explain why such attacks work. Specifically, they analyze a variant of the Narayanan-Shmatikov algorithm that was used to...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2012

    A Toolbox to Explore the Interaction of Adaptive Jamming and Anti-Jamming

    Jamming has long been a problem in wireless communications. Recently, adaptive jamming and anti-jamming techniques have been proposed which aim to use feedback to better perform their task. For an anti-jamming receiver this means detecting jamming and adapting its protocol appropriately. For a jammer this means using feedback from the...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2012

    Jamming-Resistant Distributed Path Selection on Wireless Mesh Networks

    Wireless mesh network is an emerging network architecture which have been actively standardized for the last few years. Because of its flexible network architecture, wireless mesh network can provide alternative paths even when some of wireless links are broken by node failures or intended attacks. Among various types of mesh...

    Provided By Carnegie Mellon University

  • Webcasts // Feb 2012

    SEI Technologies Forum: Software, Security, and Resiliency

    In this webcast, the presenter going to explain about the opening remarks at the SEI technologies forum. The presenter will explain how the SEI technologies can help the organizations applied and improved in their software technologies.

    Provided By Carnegie Mellon University

  • White Papers // Feb 2012

    Near-Real-Time Inference of File-Level Mutations from Virtual Disk Writes

    The authors describe a new mechanism for cloud computing enabling near-real-time monitoring of virtual disk write streams across an entire cloud. Their solution has low IO overhead for the guest VM, low latency to file-level mutation notification, and a layered design for scalability. They achieve low IO overhead by duplicating...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2012

    How Close Is Close Enough ? Understanding the Role of Cloudlets in Supporting Display Appropriation by Mobile Users

    Transient use of displays by mobile users was prophesied two decades ago. Today, convergence of a range of technologies enables the realization of this vision. For researchers in this space, one key question is where to physically locate the application for which the display has been appropriated. The emergence of...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2012

    D-ADMM: A Distributed Algorithm for Compressed Sensing and Other Separable Optimization Problems

    The authors propose a distributed, decentralized algorithm for solving separable optimization problems over a connected network of compute nodes. In a separable problem, each node has its own private function and its own private constraint set. Private means that no other node has access to it. The goal is to...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2012

    ZZFS: A Hybrid Device and Cloud File System for Spontaneous Users

    A good execution of data placement, caching and consistency policies across a user's personal devices has always been hard. Unpredictable networks, capricious user behavior with leaving devices on or off and non-uniform energy-saving policies constantly interfere with the good intentions of a storage system's policies. This paper's contribution is to...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2012

    PCOMPATS: Period-Compatible Task Allocation and Splitting on Multi-Core Processors

    Extensive research is underway to build chips with potentially hundreds of cores. In this paper, the authors consider the problem of scheduling periodic real-time tasks on multi-core processors. They develop a task partitioning algorithm called period-COMPatible-Allocation and Task-Splitting (pCOMPATS) for fixed-priority scheduling of preemptive hard real-time tasks where the utilization...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2012

    Mitigation of Periodic Jamming in a Spread Spectrum System by Adaptive Filter Selection

    Jamming has long been a problem in wireless communication systems. Traditionally, defense techniques have looked to raise the cost of mounting an equally effective jamming attack. One technique to raise the cost of jamming is Direct Sequence Spread Spectrum (DSSS) which spreads data over a wider bandwidth and has built-in...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2012

    On Configuring BGP Route Reflectors

    The Border Gateway Protocol (BGP) is the standard protocol for exchanging routing information between border routers of Autonomous Systems (ASes) in today's Internet. Within an AS, border routers exchange externally-learned BGP route advertisements via Internal-BGP (I-BGP) peerings. Naive solutions for these I-BGP peering sessions (e.g., based on full-mesh topologies) simply...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2012

    A Comparative Study of Location-sharing Privacy Preferences in the U.S. and China

    While prior studies have provided users with an initial understanding of people's location-sharing privacy preferences, they have been limited to Western countries and have not investigated the impact of the granularity of location disclosures on people's privacy preferences. The authors report findings of a three-week comparative study collecting location traces...

    Provided By Carnegie Mellon University

  • Podcasts // Jan 2012

    Measuring Operational Resilience

    In this podcast, the speaker going to show traditional operational security metrics such as number of machines patched, vulnerability scan results, number of incidents, and number of staff trained are easy to collect and can be useful.

    Provided By Carnegie Mellon University

  • White Papers // Dec 2011

    DynRBLA: A High-Performance and Energy-Efficient Row Buffer Locality-Aware Caching Policy for Hybrid Memories

    Multi-programmed workloads on Chip Multi-Processors (CMPs) require large amounts of main memory to support the working sets of many concurrently executing threads. Today, this demand is increasing as the number of cores on a chip continues to increase, and applications become more data-intensive. The main memory in modern computers is...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2011

    ShortMAC: Efficient Data-Plane Fault Localization

    The rising demand for high-quality online services requires reliable packet delivery at the network layer. Data-plane fault localization is recognized as a promising means to this end, since it enables a source node to localize faulty links, find a fault-free path, and enforce contractual obligations among network nodes. Existing fault...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2011

    Statistical Learning for File-Type Identification

    File-Type Identification (FTI) is an important problem in digital forensics, intrusion detection, and other related fields. Using state-of-the-art classification techniques to solve FTI problems has begun to receive research attention; however, general conclusions have not been reached due to the lack of thorough evaluations for method comparison. This paper presents...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2011

    ACComplice: Location Inference Using Accelerometers on Smartphones

    The security and privacy risks posed by smartphone sensors such as microphones and cameras have been well documented. However, the importance of accelerometers have been largely ignored. The authors show that accelerometer readings can be used to infer the trajectory and starting point of an individual who is driving. This...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2011

    Achieving Both Valid and Secure Logistic Regression Analysis on Aggregated Data from Different Private Sources

    Preserving the privacy of individual databases when carrying out statistical calculations has a long history in statistics and had been the focus of much recent attention in machine learning In this paper, the authors present a protocol for computing logistic regression when the data are held by separate parties without...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2011

    Votus: A Flexible and Scalable Monitoring Framework for Virtualized Clusters

    Large-scale distributed processing frameworks such as Hadoop are currently enjoying wide popularity for big data computation. Performance Analysis and monitoring under these frameworks are inherently difficult especially in a virtualized environment. Existing distributed monitoring tools can only report virtual resource usage. Such reported information might be insufficient for developers and...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2011

    Towards a Software Framework for Automatic Business Process Redesign

    A key element to the success of any organization is the ability to continuously improve its business process performance. Efficient Business Process Redesign (BPR) methodologies are needed to allow organizations to face the changing business conditions. For a long time, practices for BPR were done case-by-case and were based on...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2011

    Active Disk Meets Flash: A Case for Intelligent SSDs

    The intelligent Solid-State Drives (iSSDs) allow execution of limited application functions (e.g., data filtering or aggregation) on their internal hardware resources, exploiting SSD characteristics and trends to provide large and growing performance and energy efficiency benefits. Most notably, internal flash media bandwidth can be significantly (2 - 4 or more)...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2011

    Efficient Exploratory Testing of Concurrent Systems

    In the authors' experience, exploratory testing has reached a level of maturity that makes it a practical and often the most cost-effective approach to testing. Notably, previous paper has demonstrated that exploratory testing is capable of finding bugs even in well-tested systems. However, the number of bugs found gives little...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    Reclaiming the White Spaces: Spectrum Efficient Coexistence With Primary Users

    TV white spaces offer an exciting opportunity for increasing spectrum availability, but White Space Devices (WSDs) cannot interfere with primary users, including TV channels and wireless microphones (mics). Mics are particularly challenging because their use is dynamic and it is hard to avoid interference since mic receivers are receive-only devices....

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    The Case for Sleep States in Servers

    While sleep states have existed for mobile devices and workstations for some time, these sleep states have largely not been incorporated into the servers in today's data centers. Chip designers have been unmotivated to design sleep states because data center administrators haven't expressed any desire to have them. High setup...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    Survivable Smart Grid Communication: Smart-Meters Meshes to the Rescue

    Smart grids are critical cyber-physical infrastructures in the world now. Since these infrastructures are prone to large scale outages due to disasters or faults, a resilient and survivable communication architecture is desired. In this paper, the authors propose a resilient and survivable hierarchical communication architecture for the smart grid that...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    Locality-Aware Reduce Task Scheduling for Mapreduce

    MapReduce offers a promising programming model for big data processing. Inspired by functional languages, MapReduce allows programmers to write functional-style code which gets automatically divided into multiple map and/or reduce tasks and scheduled over distributed data across multiple machines. Hadoop, an open source implementation of MapReduce, schedules map tasks in...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Size-Based Scheduling to Improve Web Performance

    Is it possible to reduce the expected response time of every request at a web server, simply by changing the order in which people schedule the requests? That is the question the authors ask in this paper. This paper proposes a method for improving the performance of web servers servicing...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Evaluation of Task Assignment Policies for Supercomputing Servers: The Case for Load Unbalancing and Fairness

    While the MPP is still the most common architecture in supercomputer centers today, a simpler and cheaper machine configuration is growing increasingly common. This alternative setup may be described simply as a collection of multiprocessors or a distributed server system. This collection of multiprocessors is fed by a single common...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Sequential Monte Carlo Pricing Of American-Style Options Under Stochastic Volatility Models

    The authors introduce a new method to price American-style options on underlying investments governed by Stochastic Volatility (SV) models. The method does not require the volatility process to be observed. Instead, it exploits the fact that the optimal decision functions in the corresponding dynamic programming problem can be expressed as...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Asset Pricing Puzzles Explained By Incomplete Brownian Equilibria

    The authors examine a class of Brownian based models which produce tractable incomplete equilibria. The models are based on finitely many investors with heterogeneous exponential utilities over intermediate consumption who receives partially unspanned income. The investors can trade continuously on a finite time interval in a money market account as...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2009

    A Supervised Factorial Acoustic Model for Simultaneous Multiparticipant Vocal Activity Detection in Close-Talk Microphone Recordings of Meetings

    The authors have implemented a supervised acoustic model for VAD in conversations with an arbitrary number of participants, and analyzed its performance with respect to the unsupervised AM baseline. Analysis consisted of a broad exploration of several parameters, two of which (inclusion of NLED features and decoding constraints on the...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2009

    Modeling Content From Human-Verified Blacklists for Accurate Zero-Hour Phish Detection

    Phishing attacks are a significant security threat to users of the Internet, causing tremendous economic loss every year. Past work in academia has not been adopted by industry in part due to concerns about liability over false positives. However, blacklist-based methods heavily used in industry are slow in responding to...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2008

    Using Articulatory Position Data to Improve Voice Transformation

    Voice transformation (also known as voice conversion or voice morphing) is a name given to techniques which take speech from one speaker as input and attempt to produce speech that sounds like it came from another speaker. One compelling argument for good voice transformation is that it reduces the difficulty...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2008

    Learning of Protein Interaction Networks

    Protein-Protein Interactions (PPI) play a key role in determining the outcome of most cellular processes. Correctly identifying and characterizing protein interactions and the networks they comprise are critical for understanding the molecular mechanisms within the cell. Large-scale biological experimental methods can directly and systematically detect the set of interacting proteins...

    Provided By Carnegie Mellon University

  • Webcasts // May 2011

    Introduction to the SOA Architect Professional Certificate With Grace Lewis

    In this video the presenter discusses why the SEI is offering the SOA certificate and the importance of knowing how the service-oriented architectural style affects a system's quality attributes (e.g., security, performance, and modifiability). She talks about her primary goals in teaching the SOA courses, the three main takeaways SOA...

    Provided By Carnegie Mellon University

  • Webcasts // May 2011

    Introduction to the SOA Architect Professional Certificate With Dennis Smith

    In this video, the presenter, SOA course instructor and lead of the SEI System-of-Systems Performance team, discusses why the SEI is offering the SOA certificate and why basic architecture principles and practices are even more important to effective SOA adoption than to single system development. He also explains his primary...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2009

    Talking Architects With Len Bass

    In this webcast, the presenter talks with Len Bass, co-author of Software Architecture in Practice, about how quality attributes (non-functional requirements) could be considered as "First class citizens" of a project in an agile development environment (20 minutes, 15 seconds).

    Provided By Carnegie Mellon University

  • White Papers // Apr 2011

    Local Isomorphism to Solve the Pre-Image Problem in Kernel Methods

    Kernel methods have been popular over the last decade to solve many computer vision, statistics and machine learning problems. An important, both theoretically and practically, open problem in kernel methods is the pre-image problem. The pre-image problem consists of finding a vector in the input space whose mapping is known...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2008

    ASPIER: An Automated Framework for Verifying Security Protocol Implementations

    The authors present ASPIER - the first framework that combines software model checking with a standard protocol security model to analyze authentication and secrecy properties of protocol implementations in an automated manner. ASPIER incorporates a standard symbolic attacker model and provides analogous guarantees about protocol implementations as previous work does...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2009

    The Coremelt Attack

    Over the past two decades, the Internet has become of critical importance for social, business, and government activities. Corporations depend on Internet availability to facilitate sales and the transfer of data to make timely decisions. SCADA networks often use the Internet to enable coordination between physical systems. Unfortunately, malicious parties...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2009

    PCAL: Language Support for Proof-Carrying Authorization Systems

    By shifting the burden of proofs to the user, a Proof-Carrying Authorization (PCA) system can automatically enforce complex access control policies. Unfortunately, managing those proofs can be a daunting task for the user. In this paper, the authors develop a Bash-like language, PCAL that can automate correct and efficient use...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2010

    Dissecting One Click Frauds

    One Click Fraud is an online confidence scam that has been plaguing an increasing number of Japanese Internet users, in spite of new laws and the mobilization of police task forces. In this scam, the victim clicks on a link presented to them, only to be informed that they just...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2009

    Online and Stochastic Survivable Network Design

    This paper discusses online and stochastic network design while taking into consideration the edge-connectivity survivable network design problem where a graph with edge costs and edge-connectivity requirements for different sets of vertices finds a minimum-cost network that provides the required connectivity. This problem has been known to admit good approximation...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2009

    PowerNap: Eliminating Server Idle Power

    Data center power consumption is undergoing an alarming acceleration. By 2011, U.S. data centers will consume 100 billion kWh at a cost of $7.4 billion per year. Research proves that much of this energy is wasted in idle systems. In typical deployments, server utilization is below 30%, but idle servers...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Database Servers on Chip Multiprocessors: Limitations and Opportunities

    Database management systems are a multibillion dollar industry with high-end database servers employing state-of-the-art processors to maximize performance. Recent studies show that processors are far from realizing their maximum performance. Research also indicates that adverse memory access patterns in database workloads result in poor cache locality and overall performance. Database...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Routing Design in Operational Networks: A Look from the Inside

    By constructing the collective distributed routing state, routing protocols create the network-wide intelligence that transforms a collection of individual links and routers into an IP network. A network's routing design is embodied in the configuration of these protocols. Creating a routing design is in practice a policy driven design task...

    Provided By Carnegie Mellon University

  • White Papers // May 2009

    Blockwise Coordinate Descent Procedures For The Multi-Task Lasso, With Applications To Neural Semantic Basis Discovery

    This paper develops a cyclical blockwise coordinate descent algorithm for the multi-task Lasso that efficiently solves problems with thousands of features and tasks. The main result shows that a closed-form Winsorization operator can be obtained for the sup-norm penalized least squares regression. This allows the algorithm to find solutions to...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2010

    Kahuna: Problem Diagnosis for MapReduce-Based Cloud Computing Environments

    The authors present Kahuna, an approach that aims to diagnose performance problems in Map Reduce systems. Central to Kahuna's approach is the insight on peer-similarity, that nodes behave alike in the absence of performance problems, and that a node that behaves differently is the likely culprit of a performance problem....

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Configuring Your Web Browser and Using WebISO

    To be compatible with the Carnegie Mellon Web Portal and services provided by Administrative Computing, Computing Services and the Office of Technology for Education, your web browser must meet the following requirements: 1)The browser must be configured to accept cookies. 2) The browser must be configured to run JavaScript. 3)...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2009

    Tree Embeddings for Two-Edge-Connected Network Design

    The group Steiner problem is a classical network design problem where the authors are given a graph and a collection of groups of vertices, and want to build a min-cost subgraph that connects the root vertex to at least one vertex from each group. What if they wanted to build...

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    The Case for Energy-Oriented Partial Desktop Migration

    Office and home environments are increasingly crowded with personal computers. Even though these computers see little use in the course of the day, they often remain powered, even when idle. Leaving idle PCs running is not only wasteful, but with rising energy costs it is increasingly more expensive. Authors propose...

    Provided By Carnegie Mellon University

  • White Papers // May 2009

    NSF Awards Millions For Cloud Computing Research

    Today, the National Science Foundation (NSF) announced it has awarded nearly $5 million in grants to 14 universities through its Cluster Exploratory (CLuE) program to participate in the IBM/Google Cloud Computing University Initiative. The initiative will provide the computing infrastructure for leading-edge research projects that could help people better understand...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2009

    When and How to Change Quorums on Wide Area Networks

    In wide-area settings, unpredictable events, such as flash crowds caused by nearly instantaneous popularity of services, can cause servers that are expected to respond quickly to instead suddenly respond slowly. This presents a problem for achieving consistently good performance in quorum-based distributed systems, in which clients must choose which quorums...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Dynamic Source Routing in Ad Hoc Wireless Networks

    An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. In such an environment, it may be necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Physical Layer-Constrained Routing in Ad-hoc Wireless Networks: A Modified AODV Protocol with Power Control

    Routing in Ad Hoc wireless networks is not only a problem of finding a route with shortest length, but it is also a problem of finding a stable and good quality communication route in order to avoid any unnecessary packet loss. In this paper, authors propose a modified ad hoc...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2009

    An Open Agent Environment for Context-Aware mCommerce

    In this paper, authors introduce MyCampus, an agent-based environment for contextaware mobile services, which authors are in the process of developing and validating on Carnegie Mellon University's campus. The environment revolves around a growing collection of customizable agents capable of (semi-) automatically discovering and accessing Intranet and Internet services as...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2009

    An Empirical Analysis of Mobile Voice and SMS Service: A Structural Model

    In addition to wireless telephony boom, a similar exponential increasing trend in wireless data service -for example, Short Message Service (SMS) - is visible as technology advances. The authors develop a structural model to examine user demand for voice and SMS services. Specifically, they measure the own- and the cross-price...

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    On Sparse Nonparametric Conditional Covariance Selection

    The authors develop a penalized kernel smoothing method for the problem of selecting nonzero elements of the conditional precision matrix, known as conditional covariance selection. This problem has a key role in many modern applications such as finance and computational biology. However, it has not been properly addressed. The estimator...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    BASIL: Automated IO Load Balancing Across Storage Devices

    Live migration of virtual hard disks between storage arrays has long been possible. However, there is a dearth of online tools to perform automated virtual disk placement and IO load balancing across multiple storage arrays. This problem is quite challenging because the performance of IO workloads depends heavily on their...

    Provided By Carnegie Mellon University

  • White Papers // May 2009

    Software Engineering Education at Carnegie Mellon University: One University; Programs Taught in Two Places

    Teaching Software Engineering to professional master's students is a challenging endeavor, and arguably for the past 20 years, Carnegie Mellon University has been quite successful. Although CMU teaches Software Engineering at sites world-wide and uses different pedagogies, the goal of the curriculum - to produce world-class software engineers - remains...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2009

    Reducing Data Center Energy Consumption Via Coordinated Cooling and Load Management

    This paper presents a unified approach to data center energy management based on a modeling framework that characterizes the influence of key decision variables on computational performance, thermal generation, and power consumption. Temperature dynamics are modeled by a network of interconnected components reflecting the spatial distribution of servers, Computer Room...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Software Engineering Issues for Mobile Application Development

    While application development for mobile devices goes back at least 10 years, there has been exponential growth in mobile application development since the iPhone AppStore opened in July, 2008. Since then, device makers have created outlets for other mobile devices, including Android, BlackBerry, Nokia Ovi, Windows Phone, and more. Industry...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2010

    Hermes: a Context-Aware Application Development Framework for the Mobile Environment

    This paper describes a next generation software toolkit which provides a framework, including security and intelligibility support, for developing more powerful context-aware applications for the modern mobile environment. Modern mobile computing environments, with reasonable connectivity, processing power and sensing capabilities on portable devices provide a means of achieving truly ubiquitous...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    On the Approximability of Some Network Design Problems

    Approximation algorithms have had much success in the area of network design, with both combinatorial and linear-programming based techniques leading to many constant factor approximation algorithms. Despite these successes, several basic network design problems have eluded the quest for constant-factor approximations, with the current best approximation guarantees being logarithmic or...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Impact of Customer Web Portals on Call Center: An Empirical Analysis

    Firms are investing millions to deploy web based self-services at their call centers primarily to reduce operating costs. The rationale is that the firm's cost of interacting with its customers through the web based channel is an order of magnitude cheaper than the assisted channels like telephony. The authors conduct...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2009

    Techniques for Bandwidth-Efficient Prefetching of Linked Data Structures in Hybrid Prefetching Systems

    This paper proposes a low-cost hardware/software cooperative technique that enables bandwidth-efficient prefetching of linked data structures. The solution has two new components: a compiler guided prefetch filtering mechanism that informs the hardware about which pointer addresses to prefetch, a coordinated prefetcher throttling mechanism that uses run-time feedback to manage the...

    Provided By Carnegie Mellon University