Carnegie Mellon University

Displaying 281-320 of 518 results

  • Webcasts // Nov 2010

    Panel Discussion of the Master of Science in Information Technology-Software Engineering Management

    In today's complex and changing world, the interdependence of business and technology is prevalent throughout all government, non-profit, and commercial sectors. The Master of Science in Information Technology - Software Engineering Management (MSIT-SEM) degree program prepares professionals to manage within this dynamic environment.

    Provided By Carnegie Mellon University

  • Podcasts // Nov 2010

    Virtual Integration Demonstration

    In this podcast, the speaker going to show how an approach called virtual integration has been applied to the development of systems in the aerospace industry. Virtual integration enables architecture-centric system development practice that is model-based, component-based, and proof-based. This approach has been shown to support the early validation of...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Energy-Aware Partitioned Fixed-Priority Scheduling for Multi-Core Processors

    Energy management is becoming an increasingly important problem in application domains ranging from embedded devices to data centers. In many such systems, multi-core processors are projected as a promising technology to achieve improved performance with a lower power envelope. Managing the application power consumption under timing constraints poses significant challenges...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    When Information Improves Information Security

    Users frequently fail to deploy, or upgrade security technologies, or to carefully preserve and backup their valuable data, which leads to considerable monetary losses to both individuals and corporations every year. This paper presents a formal, quantitative evaluation of the impact of bounded-rational security decision-making subject to limited information and...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information

    A common assumption in security research is that more individual expertise unambiguously leads to a more secure overall network. The authors present a game-theoretic model in which this common assumption does not hold. Their findings indicate that expert users can be not only invaluable contributors, but also free-riders, defectors, and...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Impact of Customer Web Portals on Call Center: An Empirical Analysis

    Firms are investing millions to deploy web based self-services at their call centers primarily to reduce operating costs. The rationale is that the firm's cost of interacting with its customers through the web based channel is an order of magnitude cheaper than the assisted channels like telephony. The authors conduct...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Tracking and Sketching Distributed Data Provenance

    Current provenance collection systems typically gather metadata on remote hosts and submit it to a central server. In contrast, several data-intensive scientific applications require a decentralized architecture in which each host maintains an authoritative local repository of the provenance metadata gathered on that host. The latter approach allows the system...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Anubis: An Attestation Protocol for Distributed Context-Aware Applications

    Sharing sensitive context information among multiple distributed components in mobile environments introduces major security concerns. The distributed sensing, processing and actuating components of these applications can be compromised and modified or impersonated to extract private and confidential information or to inject false information. In this paper, the authors present the...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Initial Findings for Provisioning Variation in Cloud Computing

    Cloud computing offers a paradigm shift in management of computing resources for large-scale applications. Using the Infrastructure-as-a-service (IaaS) cloud computing model, users today can request dynamically provisioned, virtualized resources such as CPU, memory, disk, and network access in the form of virtualized resources. The client typically requests resources based on...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Sequential Monte Carlo Pricing Of American-Style Options Under Stochastic Volatility Models

    The authors introduce a new method to price American-style options on underlying investments governed by Stochastic Volatility (SV) models. The method does not require the volatility process to be observed. Instead, it exploits the fact that the optimal decision functions in the corresponding dynamic programming problem can be expressed as...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    A Performance Comparison of On-Demand Multicast Routing Protocols for Ad Hoc Networks

    In this paper, authors present a comparative performance evaluation of three general-purpose ondemand multicast protocols, namely ADMR, MAODV, and ODMRP, focusing on the effects of changes such as increasing number of multicast receivers or sources, application sending pattern, and increasing number of nodes in the network. Authors use mobile networks...

    Provided By Carnegie Mellon University

  • Webcasts // Oct 2010

    Improving Customer Satisfaction: A People CMM Perspective

    Every year organizations in the service industry spend the same amount of money trying to replace one lost customer as they do trying to keep five existing ones. However, many of these organizations focus little time, attention, or money on developing their workforce who are a key contributor to customer...

    Provided By Carnegie Mellon University

  • Webcasts // Oct 2010

    Securing Information in the Health-Care Industry: Network Security, Incident Management, and Insider Threat

    Many experts in the health-care industry believe that the key success factor in reducing health-care costs, while at the same time improving quality, is the availability of useful medical information. In fact, the Health Information Technology for Economic Clinical Health Act (HITECH), a component of the American Recovery and Reinvestment...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Improving Storage Bandwidth Guarantees with Performance Insulation

    Workloads that share a storage system should achieve predictable, controllable performance despite the activities of other workloads. One desirable way of expressing performance goals is as bandwidth guarantees. Unfortunately, storage bandwidth is difficult to allocate and manage among workloads, because total system capacity depends on both the workloads' access patterns...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    SmartScan: Efficient Metadata Crawl for Storage Management Metadata Querying in Large File Systems

    SmartScan is a metadata crawl tool that exploits patterns in metadata changes to significantly improve the efficiency of support for file-system-wide metadata querying, which is an important tool for administrators. In most environments, support for metadata queries is provided by databases populated and refreshed by calling stat () on every...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Token Attempt: The Misrepresentation of Website Privacy Policies through the Misuse of P3P Compact Policy Tokens

    Platform for Privacy Preferences (P3P) Compact Policies (CPs) are a collection of three-character and four-character tokens that summarize a website's privacy policy pertaining to cookies. User agents, including Microsoft's Internet Explorer (IE) web browser, use CPs to evaluate websites' data collection practices and allow, reject, or modify cookies based on...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Scheduling Parallel Real-Time Tasks on Multi-Core Processors

    Massively multi-core processors are rapidly gaining market share with major chip vendors offering an ever increasing number of cores per processor. From a programming perspective, the sequential programming model does not scale very well for such multi-core systems. Parallel programming models such as OpenMP present promising solutions for more effectively...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    EBAWA: Efficient Byzantine Agreement for Wide-Area Networks

    The popularity of wide-area computer services has generated a compelling need for efficient algorithms that provide high reliability. Byzantine Fault-Tolerant (BFT) algorithms can be used with this purpose because they allow replicated systems to continue to provide a correct service even when some of their replicas fail arbitrarily, either accidentally...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Asset Pricing Puzzles Explained By Incomplete Brownian Equilibria

    The authors examine a class of Brownian based models which produce tractable incomplete equilibria. The models are based on finitely many investors with heterogeneous exponential utilities over intermediate consumption who receives partially unspanned income. The investors can trade continuously on a finite time interval in a money market account as...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Anomalies in Optimal Rate-Control and Scheduling Protocols for Cognitive Radio Networks

    Protocols in Cognitive Radio Networks (CRNs) tune the radio and network parameters to utilize the unused frequency spectrum, and thus improve the application performance. Generalized Network Utility Maximization (GNUM) approach has been used to derive optimal algorithms in CRN from a theoretical formulation of the problem. However, there are several...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms

    The authors propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Their primitive is resilient to compromise to provide integrity of the recorded execution trace. They implement XTRec on the AMD platform running the Windows OS. The only software component that is trusted...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Software Engineering Issues for Mobile Application Development

    While application development for mobile devices goes back at least 10 years, there has been exponential growth in mobile application development since the iPhone AppStore opened in July, 2008. Since then, device makers have created outlets for other mobile devices, including Android, BlackBerry, Nokia Ovi, Windows Phone, and more. Industry...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Behavior-Based Problem Localization for Parallel File System

    The authors present a behavior-based problem-diagnosis approach for PVFS that analyzes a novel source of instrumentation - CPU instruction-pointer samples and function-call traces - to localize the faulty server and to enable root-cause analysis of the resource at fault. They validate the approach by injecting realistic storage and network problems...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Bringing the Cloud Down to Earth: Transient PCs Everywhere

    The convergence of cloud computing with mobile computing opens the door to the creation of new applications and services that can be delivered to users at any time and any place. At the heart of this convergence lies a delicate balance between centralization and decentralization. This paper explores the forces...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    dBug: Systematic Evaluation of Distributed Systems

    This paper presents the design, implementation and evaluation of "dBug" - a tool that leverages manual instrumentation for systematic evaluation of distributed and concurrent systems. Specifically, for a given distributed concurrent system, its initial state and a workload, the dBug tool systematically explores possible orders in which concurrent events triggered...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Integrated Measurement and Analysis Framework for Software Security

    In today's business and operational environments, multiple organizations routinely work collaboratively to acquire, develop, deploy, and maintain technical capabilities via a set of interdependent, networked systems. Measurement in these distributed management environments can be an extremely challenging problem. The CERT Program, part of Carnegie Mellon University's Software Engineering Institute (SEI),...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Using TSP Data to Evaluate Your Project Performance

    The Team Software Process (TSP) provides a framework to predictably and effectively build software-intensive products. It relies on data collected by team members to provide insight into how a software project is operating. For this paper, an exploratory data analysis was conducted to investigate other ways that TSP data could...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Suggestions for Documenting SOA-Based Systems

    This paper provides suggestions for documenting service-oriented architecture-based systems based on the Views & Beyond (V&B) software documentation approach. The V&B documentation approach is a lightweight and flexible approach to documenting software architecture developed by Carnegie Mellon University's Software Engineering Institute. This paper also includes an overview of several well-known...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Security Requirements Reusability and the SQUARE Methodology

    Security is an important and complex quality attribute in many software-intensive systems. Unfortunately security is often neglected in the requirements stage of the development life cycle. Security is introduced later, in design and implementation, which results in inadequate analysis, cost overruns, and vulnerabilities costing billions of dollars annually. Even when...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Emerging Technologies for Software-Reliant Systems of Systems

    This paper presents general computation trends and a particular set of emerging technologies to support the trends for software-reliant Systems of Systems (SoSs). Software-reliant SoSs now tend to be highly distributed software systems, formed from constituent software systems that are operated and managed by different organizations. These SoSs are moving...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    T-Check in System-of-Systems Technologies: Cloud Computing

    This paper presents the results of applying the T-Check method in an initial investigation of cloud computing. In this report, three hypotheses are examined: an organization can use its existing infrastructure simultaneously with cloud resources with relative ease; cloud computing environments provide ways to continuously update the amount of resources...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Getting Started With Service-Oriented Architecture (SOA) Terminology

    This white paper presents basic terminology related to Service-Oriented Architecture (SOA). The goal of the paper is to establish a baseline of terms for service-oriented systems. Service-Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing systems, in which: Services provide reusable business functionality via well-defined interfaces. There...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Basics About Cloud Computing

    What is cloud computing and how can an organization decide whether to adopt it? Cloud computing is a distributed computing paradigm that focuses on providing a wide range of users with distributed access to scalable, virtualized hardware and/or software infrastructure over the internet. Despite this rather technical definition, cloud computing...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2010

    Improving Anti-Jamming Capability and Increasing Jamming Impact With Mobility Control

    The impact of a jamming attack on wireless communication depends on a number of physical characteristics and network protocol parameters. In particular, it depends on the relative geometries of the adversarial network of jammers and the network under attack. Hence, changes in network geometry achieved through node and jammer mobility...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2010

    The Cognitive Virtues of Dynamic Networks

    For the most part, studies in the network science literature tend to focus on networks whose functional connectivity is largely invariant with respect to some episode of collective information processing. In the real world, however, networks with highly dynamic functional topologies tend to be the norm. In order to improve...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2010

    Challenges in Anticipatory Information Management Under Network Constraints

    As various militaries move towards a vision of network centric warfare and network centric operations, multiple issues regarding information acquisition and presentation arise as one tries to use the full potential of a networked environment while overcoming the limitations imposed by the realities faced by the warfighter. In such an...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2010

    This is Your Data on Drugs: Lessons Computer Security Can Learn from the Drug War

    Researchers have recently begun to study the economics of the markets for illicit digital goods to better understand how to invest resources in the most effective mitigations. This line of paper in security economics can greatly benefit from data gathering methodologies used for the study of another underground economy, which...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2010

    Effective Network Management Via System-Wide Coordination and Optimization

    As networked systems grow and traffic patterns evolve, management applications are increasing in complexity and functionality. To address the requirements of these management applications, equipment vendors and administrators today depend on incremental solutions that increase the complexity of network elements and deployment costs for operators. Despite this increased complexity and...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2010

    The Manna Plug-In Architecture for Content-Based Search of VM Clouds

    As cloud computing becomes more popular, collections of Virtual Machine (VM) images are growing in size. Management of VM collections requires the ability to inspect and search data stored within VM images. The authors present a plug-in-based architecture, called Manna, for efficiently searching state within VM images through both index...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2010

    Software Assurance Curriculum Project Volume I: Master of Software Assurance Reference Curriculum

    Modern society is deeply and irreversibly dependent on software systems of remarkable scope and complexity in areas including defense, government, energy, communication, transportation, manufacturing, and finance. The security and correct functionality of these systems are absolutely vital; poor or absent security and incorrect functionality can have devastating consequences including loss...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2010

    A Transparently-Scalable Metadata Service for the Ursa Minor Storage System

    The metadata service of the Ursa Minor distributed storage system scales metadata throughput as metadata servers are added. While doing so, it correctly handles operations that involve metadata served by different servers, consistently and atomically updating such metadata. Unlike previous systems, Ursa Minor does so by reusing existing metadata migration...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2010

    Zzyzx: Scalable Fault Tolerance Through Byzantine Locking

    Zzyzx is a Byzantine fault-tolerant replicated state machine protocol that outperforms prior approaches and provides near-linear throughput scaling. Using a new technique called Byzantine Locking, Zzyzx allows a client to extract state from an underlying replicated state machine and access it via a second protocol specialized for use by a...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2010

    File System Virtual Appliances: Portable File System Implementations

    File System Virtual Appliances (FSVAs) address the portability headaches that plague File System (FS) developers. By packaging their FS implementation in a VM, separate from the VM that runs user applications, they can avoid the need to port the file system to each OS and OS version. A small FS-agnostic...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2010

    Diagnosing Performance Problems by Visualizing and Comparing System Behaviours

    Spectroscope is a new toolset aimed at assisting developers with the long-standing challenge of performance debugging in distributed systems. To do so, it mines end-to-end traces of request processing within and across components. Using Spectroscope, developers can visualize and compare system behaviours between two periods or system versions, identifying and...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2010

    Black-Box Problem Diagnosis in Parallel File Systems

    The authors focus on automatically diagnosing different performance problems in parallel file systems by identifying, gathering and analyzing OS-level, black-box performance metrics on every node in the cluster. The peer-comparison diagnosis approach compares the statistical attributes of these metrics across I/O servers, to identify the faulty node. The authors develop...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2010

    ATLAS: A Scalable and High-Performance Scheduling Algorithm for Multiple Memory Controllers

    Modern Chip MultiProcessor (CMP) systems employ multiple memory controllers to control access to main memory. The scheduling algorithm employed by these memory controllers has a significant effect on system throughput, so choosing an efficient scheduling algorithm is important. The scheduling algorithm also needs to be scalable - as the number...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2009

    Approximate Triangle Counting

    Triangle counting is an important problem in graph mining. Clustering coefficients of vertices and the transitivity ratio of the graph are two metrics often used in complex network analysis. Furthermore, triangles have been used successfully in several real-world applications. However, exact triangle counting is an expensive computation. In this paper...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Feasibility, Efficiency, and Effectiveness of Self-Optimizing Storage Systems

    Recent work has proposed making intelligent use of data access patterns for building self-optimizing storage systems. However, despite the continued increase in the CPU-I/O performance gap, such systems are far from wide adoption. The authors argue that the key reason for the lack of real systems adopting this novel idea...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2009

    An Economic Model for Self-Tuned Cloud Caching

    Cloud computing, the new trend for service infrastructures requires user multi-tenancy as well as minimal capital expenditure. In a cloud that services large amounts of data that are massively collected and queried, such as scientific data, users typically pay for query services. The cloud supports caching of data in order...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Performance Analysis of IPSec and IKE for Mobile IP on Wireless Environments

    The Mobile IP protocol enables a node to change its point of attachment to an internet without changing its IP address. Mobile users are likely to take advantage of this protocol to obtain the services as if they were connected to their home network. In many cases these users will...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    A Protocol Family Approach to Survivable Storage Infrastructures

    A protocol family supports a variety of fault models with a single client-server protocol and a single server implementation. Protocol families shift the decision of which types of faults to tolerate from system design time to data creation time. With a protocol family based on a common survivable storage infrastructure,...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2009

    Data Management Mechanisms for Embedded System Gateways

    It is becoming increasingly common to connect traditional embedded system networks to the Internet for remote monitoring, high-level control and integration. It is necessary to protect each part of the interconnected system from faults and attacks which propagate from the other side. One architectural approach is to add a gateway...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2009

    Computer Generation of Efficient Software Viterbi Decoders

    This paper presents a program generator for fast software Viterbi decoders for arbitrary convolutional codes. The input to the generator is a specification of the code and a single-instruction multiple-data (SIMD) vector length. The output is an optimized C implementation of the decoder that uses explicit Intel SSE vector instructions....

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    Intra-Car Wireless Sensor Networks

    Modern vehicles incorporate tens of sensors to provide vital sensor information such as temperature, air quality, tire pressure, distances to nearby objects, etc., for the Electronic Control Units (ECUs). The ECUs in vehicles then utilize the sensor information for various control functions and applications. In the current architecture, the sensors...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2009

    A Flexible Approach to Embedded Network Multicast Authentication

    Distributed embedded systems are becoming increasingly vulnerable to attack as they are connected to external networks. Unfortunately, they often have no built-in authentication capability. Multicast authentication mechanisms required to secure embedded networks must function within the unique constraints of these systems, making it difficult to apply previously proposed schemes. The...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Optimal Pricing for Integrated-Services Networks With Guaranteed Quality of Service

    Integrating multiple services into a single network is becoming increasingly common in today's telecommunications industry. Driven by the emergence of new applications, many of these services will be offered with guaranteed quality of service. While there are extensive studies of the engineering problems of designing integrated services networks with guaranteed...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Mmdump: A Tool for Monitoring Internet Multimedia Traffic

    Internet multimedia traffic is increasing as applications like streaming media and packet telephony grow in popularity. It is important to monitor the volume and characteristics of this traffic, particularly because its behavior in the face of network congestion differs from that of the currently dominant TCP traffic. In order to...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense

    Today's Internet hosts are threatened by large scale Distributed Denial-of-Service (DDoS) attacks. The Path Identification (Pi) DDoS defense scheme has been recently proposed as a deterministic packet marking scheme that allows a DDoS victim to filter out attack packets on a per packet basis with high accuracy after only a...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Voice Over Sensor Networks

    Wireless sensor networks have traditionally focused on low duty-cycle applications where sensor data are reported periodically in the order of seconds or even longer. This is due to typically slow changes in physical variables, the need to keep node costs low and the goal of extending battery lifetime. However, there...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Early Experience With an Internet Broadcast System Based on Overlay Multicast

    In this paper, the authors report on experience in building and deploying an operational Internet broadcast system based on Overlay Multicast. In over a year, the system has been providing a cost-effective alternative for Internet broadcast, used by over 3600 users spread across multiple continents in home, academic and commercial...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    R-MAT: A Recursive Model for Graph Mining

    The goal of this paper was to create a simple, parsimonious graph model to describe real graphs. The R-MAT model is exactly a step in this direction: the authors illustrate experimentally that several, diverse real graphs can be well approximated by an R-MAT model with the appropriate choice of parameters....

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Efficient Security Mechanisms for Routing Protocols

    As the economy and critical infrastructure increasingly rely on the Internet, securing routing protocols becomes of critical importance. In this paper, the authors present four new mechanisms as tools for securing distance vector and path vector routing protocols. For securing distance vector protocols, the hash tree chain mechanism forces a...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2008

    Analysis and Verification Challenges for Cyber-Physical Transportation Systems

    Substantial technological and engineering advances in various disciplines make it possible more than ever before to provide autonomous control choices for cars, trains, and aircraft. Correct automatic control can improve overall safety tremendously. Yet, ensuring a safe operation of those control assistants under all circumstances requires analysis techniques that are...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2010

    Simulation of Network Attacks on SCADA Systems

    Network security is a major issue affecting SCADA systems designed and deployed in the last decade. Simulation of network attacks on a SCADA system presents certain challenges, since even a simple SCADA system is composed of models in several domains and simulation environments. Here the authors demonstrate the use of...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Understanding Route Redistribution

    Route Redistribution (RR) has become an integral part of IP network design as the result of a growing need for disseminating certain routes across routing protocol boundaries. While RR is widely used and resembles BGP in several nontrivial aspects, surprisingly, the safety of RR has not been systematically studied by...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    On Static Reachability Analysis of IP Networks

    The primary purpose of a network is to provide reachability between applications running on end hosts. This paper describes how to compute the reachability a network provides from a snapshot of the configuration state from each of the routers. The primary contribution is the precise definition of the potential reachability...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Basics About Cloud Computing

    What is cloud computing and how can an organization decide whether to adopt it? Cloud computing is a distributed computing paradigm that focuses on providing a wide range of users with distributed access to scalable, virtualized hardware and/or software infrastructure over the internet. Despite this rather technical definition, cloud computing...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Enforcing Context-Sensitive Policies in Collaborative Business Environments

    As enterprises seek to engage in increasingly rich and agile forms of collaboration, they are turning towards service-oriented architectures that enable them to selectively expose different levels of functionality to both existing and prospective business partners. This includes enforcing access control policies whose elements are tied to changing contractual relationships...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    On the Benefits of Work Stealing in Shared-Memory Multiprocessors

    Load balancing is one of the key techniques exploited to improve the performance of parallel programs. However, load balancing is a difficult task for the programmer. Work stealing is an architectural mechanism that provides improved performance by instantaneously balancing the load among processors in a multiprocessor system. In this work,...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    SAAR: A Shared Control Plane for Overlay Multicast

    Many cooperative overlay multicast systems of diverse designs have been implemented and deployed. In this paper, the authors explore a new architecture for overlay multicast: they factor out the control plane into a separate overlay that provides a single primitive: a configurable anycast for peer selection. This separation of control...

    Provided By Carnegie Mellon University

  • White Papers // May 2009

    Theory and New Primitives for Interconnecting Routing Protocol Instances

    Recent studies have shown that the primitives, that govern the interactions between routing protocol instances, are pervasively deployed in enterprise networks and the Internet but are extremely vulnerable to routing anomalies, including route oscillations and forwarding loops. This paper proposes a general theory for reasoning about routing properties across multiple...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2010

    Securing Their Future? Entry and Survival in the Information Security Industry

    Studies of industry evolution conclude that established firms tend to outperform startups. A variety of possible sources of advantage have been identified. Established firms are larger, endowed with complementary assets like distribution and marketing networks, better management capabilities, and even perhaps superior technology. The relative importance of these factors in...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Self-Management in Chaotic Wireless Deployments

    Over the past few years, wireless networking technologies have made vast forays into the daily lives. Today, one can find 802.11 hardware and other personal wireless technology employed at homes, shopping malls, coffee shops and airports. Present-day wireless network deployments bear two important properties: they are unplanned, with most Access...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    The Software Quality Profile

    The software community has been slow to use data to measure software quality. This paper discusses the reasons for this problem and describes a way to use process measurements to assess product quality. The basic process measures are time, size, and defects. When these data are gathered for every engineer...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2012

    A Case for Scaling HPC Metadata Performance Through De-Specialization

    Lack of a highly scalable and parallel metadata service is the Achilles heel for many cluster file system deployments in both the HPC world and the Internet services world. This is because most cluster file systems have focused on scaling the data path, i.e. providing high bandwidth parallel I/O to...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2012

    Theia: Visual Signatures for Problem Diagnosis in Large Hadoop Clusters

    Diagnosing performance problems in large distributed systems can be daunting as the copious volume of monitoring information available can obscure the root-cause of the problem. Automated diagnosis tools help narrow down the possible root-causes - however, these tools are not perfect thereby motivating the need for visualization tools that allow...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2012

    Transparent System Call Based Performance Debugging for Cloud Computing

    Problem diagnosis and debugging in distributed environments such as the cloud and popular distributed systems frameworks has been a hard problem. The authors explore an evaluation of a novel way of debugging distributed systems, such as the MapReduce framework, by using system calls. Performance problems in such systems can be...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2011

    Statistical Learning for File-Type Identification

    File-Type Identification (FTI) is an important problem in digital forensics, intrusion detection, and other related fields. Using state-of-the-art classification techniques to solve FTI problems has begun to receive research attention; however, general conclusions have not been reached due to the lack of thorough evaluations for method comparison. This paper presents...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2012

    Street-Level Trust Semantics for Attribute Authentication

    The problem of determining whether a receiver may safely accept attributes (e.g., identity, credentials, location) of unknown senders in various online social protocols is a special instance of a more general problem of establishing trust in interactive protocols. The authors introduce the notion of interactive trust protocols to illustrate the...

    Provided By Carnegie Mellon University

  • White Papers // May 2012

    Saving Cash by Using Less Cache

    With the advent of cloud computing, web service providers have the ability to dynamically scale their computing infrastructures to match demand. Further, because cloud resources are often priced per-use, web service providers have a monetary incentive to minimize the number of resources consumed while still meeting the Service Level Agreements...

    Provided By Carnegie Mellon University