Carnegie Mellon University

Displaying 281-320 of 514 results

  • White Papers // Nov 2010

    A Comparative Usability Evaluation of Traditional Password Managers

    Proposed in response to the growing number of passwords users have to memorize, password managers allow to store one's credentials, either on a third-party server (online password manager), or on a portable device (portable password manager) such as a mobile phone or a USB key. In this paper, the authors...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2010

    Needed Foundations for Assuring the Desirable Behavior of Software-Reliant Systems

    Future trends and current limitations presage a need for interdisciplinary foundations for designing, constructing, maintaining, adapting, and rapidly deploying software-reliant systems with assured system capabilities at all scales. In general, the ability to rapidly develop and field software-reliant capability is deficient. Part of this deficiency can be attributed to business...

    Provided By Carnegie Mellon University

  • Podcasts // Nov 2010

    Virtual Integration Demonstration

    In this podcast, the speaker going to show how an approach called virtual integration has been applied to the development of systems in the aerospace industry. Virtual integration enables architecture-centric system development practice that is model-based, component-based, and proof-based. This approach has been shown to support the early validation of...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2010

    Panel Discussion of the Master of Science in Information Technology-Software Engineering Management

    In today's complex and changing world, the interdependence of business and technology is prevalent throughout all government, non-profit, and commercial sectors. The Master of Science in Information Technology - Software Engineering Management (MSIT-SEM) degree program prepares professionals to manage within this dynamic environment.

    Provided By Carnegie Mellon University

  • White Papers // Nov 2010

    CMMI for Development, Version 1.3

    CMMI (Capability Maturity Model Integration) models are collections of best practices that help organizations to improve their processes. These models are developed by product teams with members from industry, government, and the Software Engineering Institute (SEI). This model, called CMMI for Development (CMMI-DEV), provides a comprehensive integrated set of guidelines...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2010

    QMAS: Querying, Mining and Summarization of Multi-Modal Databases

    Given a large collection of images, very few of which have labels given a priori, how can the authors automatically assign the labels of the remaining majority, and make suggestion for images that may need brand new labels distinct from existing ones? Popular automatic labeling techniques usually scale super linearly...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2010

    Performance Analysis of WS-Security Mechanisms in SOAP-Based Web Services

    Identity Management (IdM) solutions in web services environments are often compared on the levels of performance and security they provide. Selecting the appropriate IdM solution for a given system or application often requires making tradeoffs between security and performance, while also considering the system's contextual and environmental requirements and constraints....

    Provided By Carnegie Mellon University

  • White Papers // Nov 2010

    A Workshop on Analysis and Evaluation of Enterprise Architectures

    This paper summarizes a workshop on analysis and evaluation of enterprise architectures that was held at the Carnegie Mellon Software Engineering Institute (SEI). The SEI invited accomplished practitioners from government and industry to discuss key issues in analyzing and evaluating enterprise architectures. After several opening talks by individuals who presented...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Energy-Aware Partitioned Fixed-Priority Scheduling for Multi-Core Processors

    Energy management is becoming an increasingly important problem in application domains ranging from embedded devices to data centers. In many such systems, multi-core processors are projected as a promising technology to achieve improved performance with a lower power envelope. Managing the application power consumption under timing constraints poses significant challenges...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information

    A common assumption in security research is that more individual expertise unambiguously leads to a more secure overall network. The authors present a game-theoretic model in which this common assumption does not hold. Their findings indicate that expert users can be not only invaluable contributors, but also free-riders, defectors, and...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    When Information Improves Information Security

    Users frequently fail to deploy, or upgrade security technologies, or to carefully preserve and backup their valuable data, which leads to considerable monetary losses to both individuals and corporations every year. This paper presents a formal, quantitative evaluation of the impact of bounded-rational security decision-making subject to limited information and...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Impact of Customer Web Portals on Call Center: An Empirical Analysis

    Firms are investing millions to deploy web based self-services at their call centers primarily to reduce operating costs. The rationale is that the firm's cost of interacting with its customers through the web based channel is an order of magnitude cheaper than the assisted channels like telephony. The authors conduct...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Tracking and Sketching Distributed Data Provenance

    Current provenance collection systems typically gather metadata on remote hosts and submit it to a central server. In contrast, several data-intensive scientific applications require a decentralized architecture in which each host maintains an authoritative local repository of the provenance metadata gathered on that host. The latter approach allows the system...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Anubis: An Attestation Protocol for Distributed Context-Aware Applications

    Sharing sensitive context information among multiple distributed components in mobile environments introduces major security concerns. The distributed sensing, processing and actuating components of these applications can be compromised and modified or impersonated to extract private and confidential information or to inject false information. In this paper, the authors present the...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Initial Findings for Provisioning Variation in Cloud Computing

    Cloud computing offers a paradigm shift in management of computing resources for large-scale applications. Using the Infrastructure-as-a-service (IaaS) cloud computing model, users today can request dynamically provisioned, virtualized resources such as CPU, memory, disk, and network access in the form of virtualized resources. The client typically requests resources based on...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Sequential Monte Carlo Pricing Of American-Style Options Under Stochastic Volatility Models

    The authors introduce a new method to price American-style options on underlying investments governed by Stochastic Volatility (SV) models. The method does not require the volatility process to be observed. Instead, it exploits the fact that the optimal decision functions in the corresponding dynamic programming problem can be expressed as...

    Provided By Carnegie Mellon University

  • Webcasts // Oct 2010

    Improving Customer Satisfaction: A People CMM Perspective

    Every year organizations in the service industry spend the same amount of money trying to replace one lost customer as they do trying to keep five existing ones. However, many of these organizations focus little time, attention, or money on developing their workforce who are a key contributor to customer...

    Provided By Carnegie Mellon University

  • Webcasts // Oct 2010

    Securing Information in the Health-Care Industry: Network Security, Incident Management, and Insider Threat

    Many experts in the health-care industry believe that the key success factor in reducing health-care costs, while at the same time improving quality, is the availability of useful medical information. In fact, the Health Information Technology for Economic Clinical Health Act (HITECH), a component of the American Recovery and Reinvestment...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Improving Storage Bandwidth Guarantees with Performance Insulation

    Workloads that share a storage system should achieve predictable, controllable performance despite the activities of other workloads. One desirable way of expressing performance goals is as bandwidth guarantees. Unfortunately, storage bandwidth is difficult to allocate and manage among workloads, because total system capacity depends on both the workloads' access patterns...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    SmartScan: Efficient Metadata Crawl for Storage Management Metadata Querying in Large File Systems

    SmartScan is a metadata crawl tool that exploits patterns in metadata changes to significantly improve the efficiency of support for file-system-wide metadata querying, which is an important tool for administrators. In most environments, support for metadata queries is provided by databases populated and refreshed by calling stat () on every...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Token Attempt: The Misrepresentation of Website Privacy Policies through the Misuse of P3P Compact Policy Tokens

    Platform for Privacy Preferences (P3P) Compact Policies (CPs) are a collection of three-character and four-character tokens that summarize a website's privacy policy pertaining to cookies. User agents, including Microsoft's Internet Explorer (IE) web browser, use CPs to evaluate websites' data collection practices and allow, reject, or modify cookies based on...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    A Performance Comparison of On-Demand Multicast Routing Protocols for Ad Hoc Networks

    In this paper, authors present a comparative performance evaluation of three general-purpose ondemand multicast protocols, namely ADMR, MAODV, and ODMRP, focusing on the effects of changes such as increasing number of multicast receivers or sources, application sending pattern, and increasing number of nodes in the network. Authors use mobile networks...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Scheduling Parallel Real-Time Tasks on Multi-Core Processors

    Massively multi-core processors are rapidly gaining market share with major chip vendors offering an ever increasing number of cores per processor. From a programming perspective, the sequential programming model does not scale very well for such multi-core systems. Parallel programming models such as OpenMP present promising solutions for more effectively...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    EBAWA: Efficient Byzantine Agreement for Wide-Area Networks

    The popularity of wide-area computer services has generated a compelling need for efficient algorithms that provide high reliability. Byzantine Fault-Tolerant (BFT) algorithms can be used with this purpose because they allow replicated systems to continue to provide a correct service even when some of their replicas fail arbitrarily, either accidentally...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Asset Pricing Puzzles Explained By Incomplete Brownian Equilibria

    The authors examine a class of Brownian based models which produce tractable incomplete equilibria. The models are based on finitely many investors with heterogeneous exponential utilities over intermediate consumption who receives partially unspanned income. The investors can trade continuously on a finite time interval in a money market account as...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Anomalies in Optimal Rate-Control and Scheduling Protocols for Cognitive Radio Networks

    Protocols in Cognitive Radio Networks (CRNs) tune the radio and network parameters to utilize the unused frequency spectrum, and thus improve the application performance. Generalized Network Utility Maximization (GNUM) approach has been used to derive optimal algorithms in CRN from a theoretical formulation of the problem. However, there are several...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms

    The authors propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Their primitive is resilient to compromise to provide integrity of the recorded execution trace. They implement XTRec on the AMD platform running the Windows OS. The only software component that is trusted...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Software Engineering Issues for Mobile Application Development

    While application development for mobile devices goes back at least 10 years, there has been exponential growth in mobile application development since the iPhone AppStore opened in July, 2008. Since then, device makers have created outlets for other mobile devices, including Android, BlackBerry, Nokia Ovi, Windows Phone, and more. Industry...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Behavior-Based Problem Localization for Parallel File System

    The authors present a behavior-based problem-diagnosis approach for PVFS that analyzes a novel source of instrumentation - CPU instruction-pointer samples and function-call traces - to localize the faulty server and to enable root-cause analysis of the resource at fault. They validate the approach by injecting realistic storage and network problems...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Bringing the Cloud Down to Earth: Transient PCs Everywhere

    The convergence of cloud computing with mobile computing opens the door to the creation of new applications and services that can be delivered to users at any time and any place. At the heart of this convergence lies a delicate balance between centralization and decentralization. This paper explores the forces...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    dBug: Systematic Evaluation of Distributed Systems

    This paper presents the design, implementation and evaluation of "dBug" - a tool that leverages manual instrumentation for systematic evaluation of distributed and concurrent systems. Specifically, for a given distributed concurrent system, its initial state and a workload, the dBug tool systematically explores possible orders in which concurrent events triggered...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    T-Check in System-of-Systems Technologies: Cloud Computing

    This paper presents the results of applying the T-Check method in an initial investigation of cloud computing. In this report, three hypotheses are examined: an organization can use its existing infrastructure simultaneously with cloud resources with relative ease; cloud computing environments provide ways to continuously update the amount of resources...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Getting Started With Service-Oriented Architecture (SOA) Terminology

    This white paper presents basic terminology related to Service-Oriented Architecture (SOA). The goal of the paper is to establish a baseline of terms for service-oriented systems. Service-Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing systems, in which: Services provide reusable business functionality via well-defined interfaces. There...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Basics About Cloud Computing

    What is cloud computing and how can an organization decide whether to adopt it? Cloud computing is a distributed computing paradigm that focuses on providing a wide range of users with distributed access to scalable, virtualized hardware and/or software infrastructure over the internet. Despite this rather technical definition, cloud computing...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Integrated Measurement and Analysis Framework for Software Security

    In today's business and operational environments, multiple organizations routinely work collaboratively to acquire, develop, deploy, and maintain technical capabilities via a set of interdependent, networked systems. Measurement in these distributed management environments can be an extremely challenging problem. The CERT Program, part of Carnegie Mellon University's Software Engineering Institute (SEI),...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Using TSP Data to Evaluate Your Project Performance

    The Team Software Process (TSP) provides a framework to predictably and effectively build software-intensive products. It relies on data collected by team members to provide insight into how a software project is operating. For this paper, an exploratory data analysis was conducted to investigate other ways that TSP data could...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Suggestions for Documenting SOA-Based Systems

    This paper provides suggestions for documenting service-oriented architecture-based systems based on the Views & Beyond (V&B) software documentation approach. The V&B documentation approach is a lightweight and flexible approach to documenting software architecture developed by Carnegie Mellon University's Software Engineering Institute. This paper also includes an overview of several well-known...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Security Requirements Reusability and the SQUARE Methodology

    Security is an important and complex quality attribute in many software-intensive systems. Unfortunately security is often neglected in the requirements stage of the development life cycle. Security is introduced later, in design and implementation, which results in inadequate analysis, cost overruns, and vulnerabilities costing billions of dollars annually. Even when...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Emerging Technologies for Software-Reliant Systems of Systems

    This paper presents general computation trends and a particular set of emerging technologies to support the trends for software-reliant Systems of Systems (SoSs). Software-reliant SoSs now tend to be highly distributed software systems, formed from constituent software systems that are operated and managed by different organizations. These SoSs are moving...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2010

    Improving Anti-Jamming Capability and Increasing Jamming Impact With Mobility Control

    The impact of a jamming attack on wireless communication depends on a number of physical characteristics and network protocol parameters. In particular, it depends on the relative geometries of the adversarial network of jammers and the network under attack. Hence, changes in network geometry achieved through node and jammer mobility...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2009

    A Hybrid Phish Detection Approach by Identity Discovery and Keywords Retrieval

    Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. This paper, proposes a novel hybrid phish detection method based on information extraction (IE) and information retrieval (IR) techniques. The identity-based component of method detects phishing webpages by directly discovering the inconsistency between their...

    Provided By Carnegie Mellon University

  • White Papers // May 2009

    Automatic Detection of Firewall Misconfigurations Using Firewall and Network Routing Policies

    Firewalls are the most prevalent and important means of enforcing security policies inside networks and across organizational boundaries. However, effective and fault free firewall management in large and fast growing networks becomes increasingly more challenging. Firewall security policies are complex and their interaction with routing policies and applications further complicates...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2009

    I Just Found 10 Million SSNs

    The threat originates from the interaction of three (individually innocuous) trends: greater (self) publication of personal information; well-meaning government attempts to prevent SSN fraud (which backfires); and the increasing automation of SSN assignment systems (which introduces regularities attackers can exploit). An attacker could exploit these trends by analyzing publicly available...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2009

    LSM-Based Secure System Monitoring Using Kernel Protection Schemes

    Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In the case of the Linux kernel 2.6, a set of hook functions called the Linux Security Module (LSM) has been implemented in order to...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Modeling TCP-Vegas Under On/Off Traffic

    There has been a significant amount of research toward modeling variants of the Transmission Control Protocol (TCP) in order to understand the impact of this protocol on file transmission times and network utilization. Analytical models have emerged as a way to reduce the time required for evaluation when compared with...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2009

    Online and Stochastic Survivable Network Design

    This paper discusses online and stochastic network design while taking into consideration the edge-connectivity survivable network design problem where a graph with edge costs and edge-connectivity requirements for different sets of vertices finds a minimum-cost network that provides the required connectivity. This problem has been known to admit good approximation...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2009

    PowerNap: Eliminating Server Idle Power

    Data center power consumption is undergoing an alarming acceleration. By 2011, U.S. data centers will consume 100 billion kWh at a cost of $7.4 billion per year. Research proves that much of this energy is wasted in idle systems. In typical deployments, server utilization is below 30%, but idle servers...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2009

    Effects of Access-Control Policy Conflict-Resolution Methods on Policy-Authoring Usability

    Access-control policies can be stated more succinctly if they support both rules that grant access and rules that deny access, but this introduces the possibility that multiple rules will give conflicting conclusions for an access. In this paper, the authors compare a new conflict-resolution method, which uses first specificity and...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2009

    Efficient Proving for Practical Distributed Access-Control Systems

    The authors present a new technique for generating a formal proof that an access request satisfies access-control policy, for use in logic-based access-control frameworks. The approach is tailored to settings where credentials needed to complete a proof might need to be obtained from, or reactively created by, distant components in...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2009

    High Dimensional Consensus in Large-Scale Networks: Theory and Applications

    In this paper, the authors develop the theory of High Dimensional Consensus (HDC), a general class of distributed algorithms in large-scale networks. HDC relies only on local information, local communication, and low-order computation, and, hence, is ideally suited to implement network tasks under resource constraints, e.g., in sparse networks with...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    A Statistical Approach to Contention Modeling for High-Level Heterogeneous Multiprocessor Simulation

    Single chip systems featuring multiple heterogeneous processors and a variety of communication and memory architectures have emerged to satisfy the demand for networking, handheld computing, and other custom devices. The complex interactions between applications, schedulers, and processor resources, along with the resulting contention delays for shared busses and memories, are...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2009

    Predicting Memory Activity Using Spatial Correlation

    The memory wall continues to pose a performance bottleneck for computer systems - studies show that modern servers spend up to two-thirds of execution time stalled on memory accesses. Although recent trends forecast growth in processor clock frequencies to be minimal, improvements to memory access latencies are correspondingly slow. Traditional...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2009

    A Narrow Waist for Multipath Routing

    Many applications can use multipath routing to improve reliability or throughput, and many multipath routing protocols exist. Despite this diversity of mechanisms and applications, no common interface exists to allow an application to select these paths. This paper presents a design for such a common interface, called path bits. Path...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Here Are My Data Files. Here Are My Queries. Where Are My Results?

    DataBase Management Systems (DBMS) provide incredible flexibility and performance when it comes to query processing, scalability and accuracy. To fully exploit DBMS features, however, the user must define a schema, load the data, tune the system for the expected workload, and answer several questions. Should the database use a column-store,...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Size-Based Scheduling to Improve Web Performance

    Is it possible to reduce the expected response time of every request at a web server, simply by changing the order in which people schedule the requests? That is the question the authors ask in this paper. This paper proposes a method for improving the performance of web servers servicing...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Evaluation of Task Assignment Policies for Supercomputing Servers: The Case for Load Unbalancing and Fairness

    While the MPP is still the most common architecture in supercomputer centers today, a simpler and cheaper machine configuration is growing increasingly common. This alternative setup may be described simply as a collection of multiprocessors or a distributed server system. This collection of multiprocessors is fed by a single common...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Sequential Monte Carlo Pricing Of American-Style Options Under Stochastic Volatility Models

    The authors introduce a new method to price American-style options on underlying investments governed by Stochastic Volatility (SV) models. The method does not require the volatility process to be observed. Instead, it exploits the fact that the optimal decision functions in the corresponding dynamic programming problem can be expressed as...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Asset Pricing Puzzles Explained By Incomplete Brownian Equilibria

    The authors examine a class of Brownian based models which produce tractable incomplete equilibria. The models are based on finitely many investors with heterogeneous exponential utilities over intermediate consumption who receives partially unspanned income. The investors can trade continuously on a finite time interval in a money market account as...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2009

    A Supervised Factorial Acoustic Model for Simultaneous Multiparticipant Vocal Activity Detection in Close-Talk Microphone Recordings of Meetings

    The authors have implemented a supervised acoustic model for VAD in conversations with an arbitrary number of participants, and analyzed its performance with respect to the unsupervised AM baseline. Analysis consisted of a broad exploration of several parameters, two of which (inclusion of NLED features and decoding constraints on the...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2010

    Zzyzx: Scalable Fault Tolerance Through Byzantine Locking

    Zzyzx is a Byzantine fault-tolerant replicated state machine protocol that outperforms prior approaches and provides near-linear throughput scaling. Using a new technique called Byzantine Locking, Zzyzx allows a client to extract state from an underlying replicated state machine and access it via a second protocol specialized for use by a...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2010

    File System Virtual Appliances: Portable File System Implementations

    File System Virtual Appliances (FSVAs) address the portability headaches that plague File System (FS) developers. By packaging their FS implementation in a VM, separate from the VM that runs user applications, they can avoid the need to port the file system to each OS and OS version. A small FS-agnostic...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2010

    Diagnosing Performance Problems by Visualizing and Comparing System Behaviours

    Spectroscope is a new toolset aimed at assisting developers with the long-standing challenge of performance debugging in distributed systems. To do so, it mines end-to-end traces of request processing within and across components. Using Spectroscope, developers can visualize and compare system behaviours between two periods or system versions, identifying and...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2010

    Black-Box Problem Diagnosis in Parallel File Systems

    The authors focus on automatically diagnosing different performance problems in parallel file systems by identifying, gathering and analyzing OS-level, black-box performance metrics on every node in the cluster. The peer-comparison diagnosis approach compares the statistical attributes of these metrics across I/O servers, to identify the faulty node. The authors develop...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2010

    ATLAS: A Scalable and High-Performance Scheduling Algorithm for Multiple Memory Controllers

    Modern Chip MultiProcessor (CMP) systems employ multiple memory controllers to control access to main memory. The scheduling algorithm employed by these memory controllers has a significant effect on system throughput, so choosing an efficient scheduling algorithm is important. The scheduling algorithm also needs to be scalable - as the number...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2009

    Approximate Triangle Counting

    Triangle counting is an important problem in graph mining. Clustering coefficients of vertices and the transitivity ratio of the graph are two metrics often used in complex network analysis. Furthermore, triangles have been used successfully in several real-world applications. However, exact triangle counting is an expensive computation. In this paper...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Feasibility, Efficiency, and Effectiveness of Self-Optimizing Storage Systems

    Recent work has proposed making intelligent use of data access patterns for building self-optimizing storage systems. However, despite the continued increase in the CPU-I/O performance gap, such systems are far from wide adoption. The authors argue that the key reason for the lack of real systems adopting this novel idea...

    Provided By Carnegie Mellon University

  • Webcasts // Mar 2011

    Empower Your Smart Grid Transformation

    Around the globe, progressive utilities see the inevitability of adopting a smart grid that uses digital technology to modernize the power grid. More than meters and mobility, the smart grid represents a whole new framework for improved management of electricity generation, transmission and distribution. Embarking on a smart grid journey...

    Provided By Carnegie Mellon University

  • Webcasts // Mar 2010

    Emerging Technologies for Software-Reliant Systems

    Software-reliant Systems of Systems (SoS) now tend to be highly distributed software systems, formed from constituent software systems that are operated and managed by different organizations. These SoS are moving from a directed management structure (in which constituent systems are integrated and built for a specific purpose) to a virtual...

    Provided By Carnegie Mellon University

  • Webcasts // Feb 2011

    Architectural Knowledge Management: Decision Guidance in Service-Oriented Architecture Design

    Architectural decisions are design decisions that are hard to make and costly to change. Hence, mature software engineering and architecture design methods emphasize the importance of architectural decision making and capturing. However, inhibitors such as a lack of immediate benefits often prevent decisions from being captured.

    Provided By Carnegie Mellon University

  • Webcasts // Jan 2011

    Capability Maturity Model Integration V1.3 and Architecture-Centric Engineering

    Architecture modeling is an established practice for the realization of high-quality software. A significant change to the CMMI V1.3 models is the new emphasis on the role of architecture in the design process. This webinar will address the basics of architecture-centric engineering, and where and how these practices are now...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2010

    Panel Discussion of the Master of Science in Information Technology-Software Engineering Management

    In today's complex and changing world, the interdependence of business and technology is prevalent throughout all government, non-profit, and commercial sectors. The Master of Science in Information Technology - Software Engineering Management (MSIT-SEM) degree program prepares professionals to manage within this dynamic environment.

    Provided By Carnegie Mellon University

  • Webcasts // Oct 2010

    Improving Customer Satisfaction: A People CMM Perspective

    Every year organizations in the service industry spend the same amount of money trying to replace one lost customer as they do trying to keep five existing ones. However, many of these organizations focus little time, attention, or money on developing their workforce who are a key contributor to customer...

    Provided By Carnegie Mellon University

  • Webcasts // Oct 2010

    Securing Information in the Health-Care Industry: Network Security, Incident Management, and Insider Threat

    Many experts in the health-care industry believe that the key success factor in reducing health-care costs, while at the same time improving quality, is the availability of useful medical information. In fact, the Health Information Technology for Economic Clinical Health Act (HITECH), a component of the American Recovery and Reinvestment...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2009

    Towards Generating High Coverage Vulnerability-Based Signatures With Protocol-Level Constraint-Guided Exploration

    Signature-based input filtering is an important and widely deployed defense. But current signature generation methods have limited coverage and the generated signatures often can be easily evaded by an attacker with small variations of the exploit message. In this paper, the authors propose protocol-level constraint-guided exploration, a new approach towards...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2010

    TIE: Principled Reverse Engineering of Types in Binary Programs

    A recurring problem in security is reverse engineering binary code to recover high-level language data abstractions and types. High-level programming languages have data abstractions such as buffers, structures, and local variables that all help programmers and program analyses reason about programs in a scalable manner. During compilation, these abstractions are...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2011

    Q: Exploit Hardening Made Easy

    Modern operating systems have since enabled address randomization (ASLR), which randomizes the location of libc, making these techniques unusable in practice. However, modern ASLR implementations leave smaller amounts of executable code unrandomized and it has been unclear whether an attacker can use these small code fragments to construct payloads in...

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    SplitScreen: Enabling Efficient, Distributed Malware Detection

    The authors present the design and implementation of a novel anti-malware system called SplitScreen. SplitScreen performs an additional screening step prior to the signature matching phase found in existing approaches. The screening step filters out most non-infected files (90%) and also identifies malware signatures that are not of interest (99%)....

    Provided By Carnegie Mellon University

  • White Papers // Mar 2010

    All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)

    Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analysis. Example applications of dynamic taint analysis and forward symbolic execution include malware analysis, input filter generation, test case generation, and vulnerability discovery. Despite the widespread usage of these two techniques, there has been little effort...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2009

    A Contractual Anonymity System

    The authors propose, develop, and implement techniques for achieving contractual anonymity. In contractual anonymity, a user and service provider enter into an anonymity contract. The user is guaranteed anonymity and message unlinkability from the contractual anonymity system unless she breaks the contract. The service provider is guaranteed that it can...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2009

    A Language for Large Ensembles of Independently Executing Nodes

    The authors address how to write programs for distributed computing systems in which the network topology can change dynamically. Examples of such systems, which they call ensembles, include programmable sensor networks (where the network topology can change due to failures in the nodes or links) and modular robotics systems (whose...

    Provided By Carnegie Mellon University