Carnegie Mellon University

Displaying 161-200 of 464 results

  • White Papers // Oct 2011

    Reclaiming the White Spaces: Spectrum Efficient Coexistence With Primary Users

    TV white spaces offer an exciting opportunity for increasing spectrum availability, but White Space Devices (WSDs) cannot interfere with primary users, including TV channels and wireless microphones (mics). Mics are particularly challenging because their use is dynamic and it is hard to avoid interference since mic receivers are receive-only devices....

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    The Case for Sleep States in Servers

    While sleep states have existed for mobile devices and workstations for some time, these sleep states have largely not been incorporated into the servers in today's data centers. Chip designers have been unmotivated to design sleep states because data center administrators haven't expressed any desire to have them. High setup...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    Survivable Smart Grid Communication: Smart-Meters Meshes to the Rescue

    Smart grids are critical cyber-physical infrastructures in the world now. Since these infrastructures are prone to large scale outages due to disasters or faults, a resilient and survivable communication architecture is desired. In this paper, the authors propose a resilient and survivable hierarchical communication architecture for the smart grid that...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    Locality-Aware Reduce Task Scheduling for Mapreduce

    MapReduce offers a promising programming model for big data processing. Inspired by functional languages, MapReduce allows programmers to write functional-style code which gets automatically divided into multiple map and/or reduce tasks and scheduled over distributed data across multiple machines. Hadoop, an open source implementation of MapReduce, schedules map tasks in...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    SCION: Scalability, Control, and Isolation on Next-Generation Networks

    The authors present the first Internet architecture designed to provide route control, failure isolation, and explicit trust information for end-to-end communications. SCION separates ASes into groups of independent routing sub-planes, called trust domains, which then interconnect to form complete routes. Trust domains provide natural isolation of routing failures and human...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    I Know Where You Live: Analyzing Privacy Protection in Public Databases

    Policymakers struggle to determine the proper tradeoffs between data accessibility and data-subject privacy as public records move online. For example, Allegheny County, Pennsylvania recently eliminated the ability to search the county property assessment database using property owners' names. The authors conducted a user study to determine whether this strategy provides...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    Clearing the Clouds: A Study of Emerging Workloads on Modern Hardware

    Emerging scale-out cloud applications need extensive amounts of computational resources. However, data centers using modern server hardware face physical constraints in space and power, limiting further expansion and calling for improvements in the computational density per server and in the per-operation energy use. Therefore, continuing to improve the computational resources...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    Design of Heterogeneous On-Chip Networks: An Application Driven Approach

    An on-chip interconnect is a critical shared resource that affects the performance-energy envelope of an entire multicore system. This aspect has led to a plethora of proposals in recent years for efficiently architecting the NoC substrate. However, most of these designs are agnostic to the actual application requirements in that...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms

    Privacy has become a significant concern in modern society as personal information about individuals is increasingly collected, used, and shared, often using digital technologies, by a wide range of organizations. Certain information handling practices of organizations that monitor individuals' activities on the web, data aggregation companies that compile massive databases...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    Collaborating With Executable Content Across Space and Time

    Executable content is of growing importance in many domains. How does one share and archive such content at Internet-scale for spatial and temporal collaboration? Spatial collaboration refers to the classic concept of user collaboration: two or more users who are at different Internet locations performing a task using shared context....

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    Scheduling Heterogeneous Processors Isn't As Easy As You Think

    The authors consider preemptive online scheduling algorithms to minimize the total weighted/unweighted flow time plus energy for speed-scalable heterogeneous multiprocessors. They show that the well-known priority scheduling algorithms highest density first, weighted shortest elapsed time first, and weighted late arrival processor sharing, are not O(1)-speed O(1)-competitive for the objective of...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    Improving Cache Performance Using Victim Tag Stores

    With increasing pressure on memory bandwidth, there have been a number of proposals that improve the cache replacement policy. These mechanisms monitor the cache blocks while they are in the cache and evict blocks that are deemed to have low temporal locality. However, a majority of these mechanisms are agnostic...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    All Your Jammers Belong to Us - Localization of Wireless Sensors Under Jamming Attack

    Accurately determining locations of nodes in mobile wireless network is crucial for a myriad of applications. Unfortunately, most localization techniques are vulnerable to jamming attacks where the adversary attempts to disrupt communication between legitimate nodes in the network. In this paper, the authors propose an approach to localize a wireless...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    A Learning Theory Approach to Non-Interactive Database Privacy

    In this paper, the authors demonstrate that, ignoring computational constraints, it is possible to privately release synthetic databases that are useful for large classes of queries - much larger in size than the database itself. Specifically, they give a mechanism that privately releases synthetic data for a class of queries...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    SAV-V: Securing Anti-Virus with Virtualization

    Today's desktop PCs rely on security software such as anti-virus products and personal firewalls for protection. Unfortunately, malware authors have adapted by specifically targeting and disabling these defenses, a practice exacerbated by the rise in zero-day exploits. In this paper, the authors present the design, implementation, and evaluation of SAV-V,...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    Adaptive Cluster Throttling: Improving High-Load Performance in Bufferless On-Chip Networks

    Higher core counts and increasing focus on energy efficiency in modern Chip Multi-Processors (CMP) have led to renewed interest in simple and energy-efficient Network-on-Chip (NoC) designs. Several recent proposed designs trade off network capacity for efficiency, based on the observation that traditional networks are overprovisioned for many workloads. Bufferless routing...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    A High-Performance Hierarchical Ring On-Chip Interconnect with Low-Cost Routers

    Energy consumption of routers in commonly used mesh-based on-chip networks for chip multiprocessors is an increasingly important concern: these routers consist of a crossbar and complex control logic and can require significant buffers, hence high energy and area consumption. In contrast, an alternative design uses ring-based networks to connect network...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    Row Buffer Locality-Aware Data Placement in Hybrid Memories

    Phase Change Memory (PCM) is a promising alternative to DRAM, though its high latency and energy costs prohibit its adoption as a drop-in DRAM replacement. Hybrid memory systems comprising DRAM and PCM attempt to achieve the low access latencies of DRAM at the large capacities of PCM. However, known solutions...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    Network Fault Localization With Small TCB

    Clear evidence indicates the existence of compromised routers in ISP and enterprise networks. Fault Localization (FL) protocols enable a network to localize specific links of compromised routers sabotaging network data delivery and are recognized as an essential means to enhancing network availability in the face of targeted attacks. However, theoretically...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    Time Boxing Planning: Buffered Moscow Rules

    Time boxing is a management technique which prioritizes schedule over deliverables but time boxes which are merely a self, or an outside, imposed target without agreed partial outcomes and justified certainty are at best, an expression of good will on the part of the team. This paper proposes the use...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2011

    Investigating the Viability of Bufferless NoCs in Modern Chip Multi-Processor Systems

    Chip Multi-Processors (CMP) are quickly growing to dozens and potentially hundreds of cores, and as such the design of the interconnect for on chip resources has become an important field of study. Of the available topologies, tiled mesh networks are an appealing approach in tiled CMPs, as they are relatively...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2011

    Q: Exploit Hardening Made Easy

    Modern operating systems have since enabled address randomization (ASLR), which randomizes the location of libc, making these techniques unusable in practice. However, modern ASLR implementations leave smaller amounts of executable code unrandomized and it has been unclear whether an attacker can use these small code fragments to construct payloads in...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2011

    All Your Droid are Belong to Us: A Survey of Current Android Attacks

    In the past few years, mobile devices (Smartphones, PDAs) have seen both their computational power and their data connectivity rise to a level nearly equivalent to that available on small desktop computers, while becoming ubiquitous. On the downside, these mobile devices are now an extremely attractive target for large-scale security...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2011

    Congestion Control for Scalability in Bufferless On-Chip Networks

    In this paper, the authors present Network-on-Chip (NoC) design and contrast it to traditional network design, highlighting both similarities and differences between NoCs and traditional networks. As an initial case study, they examine network congestion in bufferless NoCs. They show that congestion manifests itself differently in a NoC than in...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2011

    Secure Distributed Data Aggregation

    The authors present a survey of the various families of approaches to secure aggregation in distributed networks such as sensor networks. In their survey, they focus on the important algorithmic features of each approach, and provide an overview of a family of secure aggregation protocols which use resilient distributed estimation...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2011

    Predicting Handoffs in 3G Networks

    Cellular data networks have recently seen an explosion in their usage due to the widespread deployment of 3G technologies and the rapid proliferation of smartphones. People are increasingly using their smartphones on the go and expect always-on, high quality connectivity at all times. A key network primitive that enables continuous...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2011

    Resource Sharing in GPU-Accelerated Windowing Systems

    Recent windowing systems allow graphics applications to directly access the Graphics Processing Unit (GPU) for fast rendering. However, application tasks that render frames on the GPU contend heavily with the windowing server that also accesses the GPU to blit the rendered frames to the screen. This resource-sharing nature of direct...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2011

    A Loadable Task Execution Recorder for Hierarchical Scheduling in Linux

    In this paper, the authors present a Hierarchical Scheduling Framework (HSF) recorder for Linux-based operating systems. The HSF recorder is a loadable kernel module that is capable of recording tasks and servers without requiring any kernel modifications. Hence, it complies with the reliability and stability requirements in the area of...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2011

    TFP During A Credit Crunch

    The financial crisis of 2008 was followed by sharp contractions in aggregate output and employment and an unusual increase in aggregate Total Factor Productivity (TFP). This paper attempts to explain these facts by modeling the creation and destruction of jobs in the presence of heterogeneity in firm productivity and frictional...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2011

    Lucy in the Sky Without Diamonds: Stealing Confidential Data in the Cloud

    Cloud computing is a recent paradigm that is creating high expectations about benefits such as the pay-per-use model and elasticity of resources. However, with this optimism come also concerns about security. In a public cloud, the user's data storage and processing is no longer done inside its premises, but in...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2011

    The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study

    Although online retailers detail their privacy practices in online privacy policies, this information often remains invisible to consumers, who seldom make the effort to read and understand those policies. This paper reports on research undertaken to determine whether a more prominent display of privacy information will cause consumers to incorporate...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Towards Secure Multi-Path Routing for Wireless Mobile Ad-Hoc Networks: A Cross-Layer Strategy

    Multi-path routing establishes multiple paths between a source and destination node in a network. This helps in achieving reliability in Mobile Ad-hoc NETworks (MANETs). To achieve efficient, secure and reliable multi-path routing for MANETs, the authors propose a routing mechanism that uses cross-layer strategies. The cross-layer strategy involves incorporating feedback...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    A Proof-Carrying File System With Revocable and Use-Once Certificates

    The authors present the design and implementation of a file system which allows authorizations dependent on revocable and use-once policy certificates. Authorizations require explicit proof objects, combining ideas from previous authorization logics and Girard's linear logic. Use-once certificates and revocations lists are maintained in a database that is consulted during...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    New Modalities for Access Control Logics: Permission, Control and Ratification

    The authors present a new modal access control logic ACL+ to specify, reason about and enforce access control policies. The logic includes new modalities for permission, control, and ratification to overcome some limits of current access control logics. They present a Hilbert-style proof system for ACL+ and a sound and...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Application-to-Core Mapping Policies to Reduce Interference in On-Chip Networks

    As the industry moves toward many-core processors, Network-on-Chips (NoCs) will likely become the communication backbone of future microprocessor designs. The NoC is a critical shared resource and its effective utilization is essential for improving overall system performance and fairness. In this paper, the authors propose application-to-core mapping policies to reduce...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Traffic Information Systems: Efficient Message Dissemination Via Adaptive Beaconing

    Traffic Information Systems (TIS) are one of the key non-safety application areas of Vehicular Ad Hoc NETworks (VANETs). As such, TIS are much less delay sensitive compared to safety applications, which have recently attracted a lot of attention in VANET research. The authors propose a new message dissemination protocol, Adaptive...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Exertion-Based Billing for Cloud Storage Access

    Charging for cloud storage must account for two costs: the cost of the capacity used and the cost of access to that capacity. For the cost of access, current systems focus on the paper requested, such as data transferred or I/O operations completed, rather than the exertion (i.e., effort/resources expended)...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Privacy-Sensitive VM Retrospection

    The success of cloud computing leads to large centralized collections of Virtual Machine (VM) images. The ability to retrospect (examine the historical state of) these images at a high semantic level can be valuable in many aspects of IT management such as debugging and troubleshooting, software quality control, legal establishment...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Curbing Android Permission Creep

    The Android platform has about 130 application level permissions that govern access to resources. The determination of which permissions to request is left solely to the application developer. Users are prompted to approve all application permissions at install time, and permissions are silently enforced at execution time. Although many applications...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    A Picture IsWorth a ThousandWords: Improving Usability and Robustness of Online Recommendation Systems

    Recent statistics show that the number of online shoppers are increasing where the majority of them use online recommendation systems for product/service reviews. Although online reviews are becoming increasingly important, consumers face two major challenges of usability and robustness when they make purchase decisions based on the available reviews. More...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2009

    Tree Embeddings for Two-Edge-Connected Network Design

    The group Steiner problem is a classical network design problem where the authors are given a graph and a collection of groups of vertices, and want to build a min-cost subgraph that connects the root vertex to at least one vertex from each group. What if they wanted to build...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Routing Design in Operational Networks: A Look from the Inside

    By constructing the collective distributed routing state, routing protocols create the network-wide intelligence that transforms a collection of individual links and routers into an IP network. A network's routing design is embodied in the configuration of these protocols. Creating a routing design is in practice a policy driven design task...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2010

    Kahuna: Problem Diagnosis for MapReduce-Based Cloud Computing Environments

    The authors present Kahuna, an approach that aims to diagnose performance problems in Map Reduce systems. Central to Kahuna's approach is the insight on peer-similarity, that nodes behave alike in the absence of performance problems, and that a node that behaves differently is the likely culprit of a performance problem....

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Configuring Your Web Browser and Using WebISO

    To be compatible with the Carnegie Mellon Web Portal and services provided by Administrative Computing, Computing Services and the Office of Technology for Education, your web browser must meet the following requirements: 1)The browser must be configured to accept cookies. 2) The browser must be configured to run JavaScript. 3)...

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    The Case for Energy-Oriented Partial Desktop Migration

    Office and home environments are increasingly crowded with personal computers. Even though these computers see little use in the course of the day, they often remain powered, even when idle. Leaving idle PCs running is not only wasteful, but with rising energy costs it is increasingly more expensive. Authors propose...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2009

    When and How to Change Quorums on Wide Area Networks

    In wide-area settings, unpredictable events, such as flash crowds caused by nearly instantaneous popularity of services, can cause servers that are expected to respond quickly to instead suddenly respond slowly. This presents a problem for achieving consistently good performance in quorum-based distributed systems, in which clients must choose which quorums...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Dynamic Source Routing in Ad Hoc Wireless Networks

    An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. In such an environment, it may be necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its...

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    On Sparse Nonparametric Conditional Covariance Selection

    The authors develop a penalized kernel smoothing method for the problem of selecting nonzero elements of the conditional precision matrix, known as conditional covariance selection. This problem has a key role in many modern applications such as finance and computational biology. However, it has not been properly addressed. The estimator...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Physical Layer-Constrained Routing in Ad-hoc Wireless Networks: A Modified AODV Protocol with Power Control

    Routing in Ad Hoc wireless networks is not only a problem of finding a route with shortest length, but it is also a problem of finding a stable and good quality communication route in order to avoid any unnecessary packet loss. In this paper, authors propose a modified ad hoc...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    BASIL: Automated IO Load Balancing Across Storage Devices

    Live migration of virtual hard disks between storage arrays has long been possible. However, there is a dearth of online tools to perform automated virtual disk placement and IO load balancing across multiple storage arrays. This problem is quite challenging because the performance of IO workloads depends heavily on their...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Anomalies in Optimal Rate-Control and Scheduling Protocols for Cognitive Radio Networks

    Protocols in Cognitive Radio Networks (CRNs) tune the radio and network parameters to utilize the unused frequency spectrum, and thus improve the application performance. Generalized Network Utility Maximization (GNUM) approach has been used to derive optimal algorithms in CRN from a theoretical formulation of the problem. However, there are several...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Measurement and Analysis of Link Quality in Wireless Networks: An Application Perspective

    Estimating the quality of wireless link is vital to optimize several protocols and applications in wireless networks. In realistic wireless networks, link quality is generally predicted by measuring received signal strength and error rates. Understanding the temporal properties of these parameters is essential for the measured values to be representative,...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2012

    What if Routers Were Social? Analyzing Wireless Mesh Networks From a Social Networks Perspective

    Wireless Mesh Networks (WMNs) consist of radio nodes organized in a mesh topology for serving wireless mesh clients to communicate with one another or to connect to the Internet. Nodes in a mesh network can communicate with each other either directly or through one or more intermediate nodes, similar to...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2010

    Topology-Aware Quality-of-Service Support in Highly Integrated Chip Multiprocessors

    Current design complexity trends, poor wire scalability, and power limitations argue in favor of highly modular on-chip systems. Today's state-of-the-art CMPs already feature up to a hundred discrete cores. With increasing levels of integration, CMPs with hundreds of cores, cache tiles, and specialized accelerators are anticipated in the near future....

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Traffic Information Systems: Efficient Message Dissemination Via Adaptive Beaconing

    Traffic Information Systems (TIS) are one of the key non-safety application areas of Vehicular Ad Hoc NETworks (VANETs). As such, TIS are much less delay sensitive compared to safety applications, which have recently attracted a lot of attention in VANET research. The authors propose a new message dissemination protocol, Adaptive...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Exertion-Based Billing for Cloud Storage Access

    Charging for cloud storage must account for two costs: the cost of the capacity used and the cost of access to that capacity. For the cost of access, current systems focus on the paper requested, such as data transferred or I/O operations completed, rather than the exertion (i.e., effort/resources expended)...

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    Critical Vulnerability in Browser Security Metrics

    Every time a browser vendor releases a patch for a critical vulnerability, the popular news media publishes a slew of negative press paper detailing the security holes that have been announced in the product. Users who read these papers often decide to switch to a "Safer" browser. The negative press...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2010

    RT @IWantPrivacy:Widespread Violation of Privacy Settings in the Twitter Social Network

    Twitter is a social network that focuses on creating and sharing short 140 character messages know as tweets. Twitter's sole privacy policy is a binary option that either allows every message a user creates to be publicly available, or allows only a user's followers to see posted messages. As the...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Curbing Android Permission Creep

    The Android platform has about 130 application level permissions that govern access to resources. The determination of which permissions to request is left solely to the application developer. Users are prompted to approve all application permissions at install time, and permissions are silently enforced at execution time. Although many applications...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Talking to Yourself for Fun and Profit

    Browsers limit how web sites can access the network. Historically, the web platform has limited web sites to HTTP, but HTTP is inefficient for a number of applications - including chat and multiplayer games - for which raw socket access is more appropriate. Java, Flash Player, and HTML5 provide socket...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Disks Are Like Snowflakes: No Two Are Alike

    Gone are the days of homogeneous sets of disks. Even disks of a given batch, of the same make and model, will have significantly different bandwidths. This paper describes the disk technology trends responsible for the now-inherent heterogeneity of multi-disk systems and disk-based clusters, provides measurements quantifying it, and discusses...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2011

    Applying Simple Performance Models to Understand Inefficiencies in Data-Intensive Computing

    New programming frameworks for scale-out parallel analysis, such as MapReduce and Hadoop, have become a cornerstone for exploiting large datasets. However, there has been little analysis of how these systems perform relative to the capabilities of the hardware on which they run. This paper describes a simple analytical model that...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    Row Buffer Locality-Aware Data Placement in Hybrid Memories

    Phase Change Memory (PCM) is a promising alternative to DRAM, though its high latency and energy costs prohibit its adoption as a drop-in DRAM replacement. Hybrid memory systems comprising DRAM and PCM attempt to achieve the low access latencies of DRAM at the large capacities of PCM. However, known solutions...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2011

    Principles of Operation for Shingled Disk Devices

    A leading strategy for driving the areal density of magnetic disk drives through 1 - 10 terabit/inch (the coming decade) is to shingle (partially overlap) adjacent tracks, imposing significant restrictions on where data can be written without incurring multi-track read-modify-write penalties. These restrictions and penalties can be fully hidden from...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    Improving Cache Performance Using Victim Tag Stores

    With increasing pressure on memory bandwidth, there have been a number of proposals that improve the cache replacement policy. These mechanisms monitor the cache blocks while they are in the cache and evict blocks that are deemed to have low temporal locality. However, a majority of these mechanisms are agnostic...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    A Learning Theory Approach to Non-Interactive Database Privacy

    In this paper, the authors demonstrate that, ignoring computational constraints, it is possible to privately release synthetic databases that are useful for large classes of queries - much larger in size than the database itself. Specifically, they give a mechanism that privately releases synthetic data for a class of queries...

    Provided By Carnegie Mellon University

  • White Papers // May 2012

    QoS Aware Path Selection in Content Centric Networks

    With the availability of higher network bandwidths, greater computing power, and a shift to more content centric use of the internet, researchers are revisiting the Internet architecture. One such effort is the Content Centric Networking (CCN) project where content driven data, rather than nodes, is primarily used for enabling communications....

    Provided By Carnegie Mellon University

  • White Papers // Feb 2011

    A Spatial-Epistemic Logic for Reasoning About Security Protocols

    Reasoning about security properties involves reasoning about where the information of a system is located, and how it evolves over time. While most security analysis techniques need to cope with some notions of information locality and knowledge propagation, usually they do not provide a general language for expressing arbitrary properties...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2012

    TVR - Tall Vehicle Relaying in Vehicular Networks

    Vehicle-to-Vehicle (V2V) communication is a core technology for enabling safety and non-safety applications in next generation Intelligent Transportation Systems. Recently, several studies have shown that line of sight conditions have a direct influence on V2V link quality. Line of sight is influenced by both topographic features and vehicles located between...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2012

    STIR-Ing the Wireless Medium With Self-Tuned, Inference-Based, Real-Time Jamming

    Jamming, broadcasting to intentionally interfere with wireless reception has long been a problem for wireless systems. Recent research demonstrates numerous advances in jamming techniques that increase attack efficiency or reduce the probability an attack will be detected by choosing attack parameters based on a system's configuration. In this paper, the...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Tracking and Sketching Distributed Data Provenance

    Current provenance collection systems typically gather metadata on remote hosts and submit it to a central server. In contrast, several data-intensive scientific applications require a decentralized architecture in which each host maintains an authoritative local repository of the provenance metadata gathered on that host. The latter approach allows the system...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    Adaptive Quality of Service in Ad Hoc Wireless Networks

    In high criticality crisis scenarios, such as disaster management, ad hoc wireless networks are quickly assembled in the field to support decision makers through situational awareness using messaging-, voice-, and video-based applications. These applications cannot afford the luxury of stalling or failing due to overwhelming bandwidth demand on these networks...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    A Multilingual Screen Reader In Indian Languages

    Screen reader is a form of assistive technology to help visually impaired people to use or access the computer and Internet. So far, it has remained expensive and within the domain of English (and some foreign) language computing. For Indian languages this development is limited by: availability of Text-To-Speech (TTS)...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    Identifying Tipping Points in a Decision-Theoretic Model of Network Security

    Although system administrators are frequently urged to protect the machines in their network, the fact remains that the decision to protect is far from universal. To better understand this decision, the authors formulate a decision-theoretic model of a system administrator responsible for a network of size n against an attacker...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2011

    Achieving Both Valid and Secure Logistic Regression Analysis on Aggregated Data from Different Private Sources

    Preserving the privacy of individual databases when carrying out statistical calculations has a long history in statistics and had been the focus of much recent attention in machine learning In this paper, the authors present a protocol for computing logistic regression when the data are held by separate parties without...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2012

    How Close Is Close Enough ? Understanding the Role of Cloudlets in Supporting Display Appropriation by Mobile Users

    Transient use of displays by mobile users was prophesied two decades ago. Today, convergence of a range of technologies enables the realization of this vision. For researchers in this space, one key question is where to physically locate the application for which the display has been appropriated. The emergence of...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    Enabling Efficient and Scalable Hybrid Memories Using Fine-Granularity DRAM Cache Management

    Hybrid main memories composed of DRAM as a cache to scalable non-volatile memories such as Phase-Change Memory (PCM) can provide much larger storage capacity than traditional main memories. A key challenge for enabling high-performance and scalable hybrid memories, though, is efficiently managing the metadata (e.g., tags) for data cached in...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    MinBD: Minimally-Buffered Deflection Routing for Energy-Efficient Interconnect

    A conventional Network-on-Chip (NoC) router uses input buffers to store in-flight packets. These buffers improve performance, but consume significant power. It is possible to bypass these buffers when they are empty, reducing dynamic power, but static buffer power, and dynamic power when buffers are utilized, remains. To improve energy efficiency,...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    Collaborating With Executable Content Across Space and Time

    Executable content is of growing importance in many domains. How does one share and archive such content at Internet-scale for spatial and temporal collaboration? Spatial collaboration refers to the classic concept of user collaboration: two or more users who are at different Internet locations performing a task using shared context....

    Provided By Carnegie Mellon University

  • White Papers // May 2012

    Saving Cash by Using Less Cache

    With the advent of cloud computing, web service providers have the ability to dynamically scale their computing infrastructures to match demand. Further, because cloud resources are often priced per-use, web service providers have a monetary incentive to minimize the number of resources consumed while still meeting the Service Level Agreements...

    Provided By Carnegie Mellon University