Carnegie Mellon University

Displaying 321-360 of 522 results

  • White Papers // Aug 2010

    Measurement and Analysis Infrastructure Diagnostic, Version 1.0: Method Definition Document

    Given the importance of measurement and analysis in decision making, organizations need to ensure their data, analyses, and corresponding reports are of high quality and meet the information needs of practitioners and managers. Yet, organizations often have no method for evaluating the quality of their measurement and analysis infrastructure and...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2010

    A Framework for Modeling the Software Assurance Ecosystem: Insights From the Software Assurance Landscape Project

    Today's operational environments are complex and dynamic. User needs and environmental factors are constantly changing, which leads to unanticipated usage, reconfiguration, and continuous evolution of practices and technologies. Operational requirements for software-reliant systems are often ambiguous, incomplete, or incorrect. New defects and vulnerabilities are continually discovered. In environments characterized by...

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2010

    The Next Generation of Process Evolution

    To thrive in today's economy, organizations need high-performance software engineering practices that reduce costs and improve productivity. The challenge is to implement practices that lead to consistent, cost-effective performance while demonstrating rapid benefits and paybacks.

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2010

    Transforming Your Operational Resilience Management Capabilities: CERT's Resilience Management Model

    Organizations can't plan for every disruption. They need to be able to handle stressors in their risk environment at a moment's notice and with a predictable level of performance. Resilience management is a process that helps organizations establish, improve, and sustain the maturity of their operational resilience management system and...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2010

    Speeding Up Finite Element Wave Propagation for Large-Scale Earthquake Simulations

    This paper describes the implementation and performance of a new approach to finite element earthquake simulations that represents a speedup factor of 3x in the total solving time employed by Hercules - the ochre-based earthquake simulator developed by the Quake Group at Carnegie Mellon University. This gain derives from applying...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2010

    Experience With a Wireless Network Testbed Based on Signal Propagation Emulation

    The evaluation of wireless research is challenging because signals traveling through the ether are affected by the physical environment, including movement by people and objects. As a result, testbed experiments are hard to control and are non-repeatable. The authors have developed a wireless networking testbed based on digital signal propagation...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2010

    Algorithms and Models for Problems in Networking

    Many interesting theoretical problems arise from computer networks. In this paper the authors will consider three of them: algorithms and data structures for problems involving distances in networks (in particular compact routing schemes, distance labels, and distance oracles), algorithms for wireless capacity and scheduling problems, and algorithms for optimizing iBGP...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2010

    Higher-Order Representation of Substructural Logics

    The authors present a technique for higher-order representation of sub-structural logics such as linear or modal logic. They show that such logics can be encoded in the (ordinary) Logical Framework, without any linear or modal extensions. Using this encoding, meta-theoretic proofs about such logics can easily be developed in the...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2010

    Polonium: Tera-Scale Graph Mining for Malware Detection

    The authors present Polonium, a scalable and effective technology for detecting malware. They evaluated it with the largest anonymized le submissions dataset ever published, which spans over 60 terabytes of disk space. They formulated the problem of detecting malware as a large-scale graph mining and inference task, for which they...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2010

    More is Less: Denial-of-Service Attacks and Solutions in Many-Core On-Chip Networks

    A many-core system is expected to outperform a traditional single-core system by enabling multiple applications to be executed on separate cores in parallel, given the generous assumption that the execution of an application on one core does not interfere with an application on other cores. Regrettably, this optimistic belief about...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2010

    The Case for Content Search of VM Clouds

    The success of cloud computing can lead to large, centralized collections of Virtual Machine (VM) images. The ability to interactively search these VM images at a high semantic level emerges as an important capability. This paper examines the opportunities and challenges in creating such a search capability, and presents early...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2010

    Challenges in Access Right Assignment for Secure Home Networks

    The proliferation of advanced technologies has been altering the peoples lifestyle and social interactions - the next frontier is the digital home. Although the future of smart homes is promising, many technical challenges must be addressed to achieve convenience and security. In this paper, the authors delineate the unique combination...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2010

    Encountering Stronger Password Requirements: User Attitudes and Behaviors

    Text-based passwords are still the most commonly used authentication mechanism in information systems. The authors took advantage of a unique opportunity presented by a significant change in the Carnegie Mellon University (CMU) computing services password policy that required users to change their passwords. Through the survey of 470 CMU computer...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2010

    Conducting Usable Privacy & Security Studies with Amazon's Mechanical Turk

    Being able to conduct human subject's experiments in a distributed method across the Internet is frequently desirable to support broad tests of usability. Until recently these experiments were commonly advertised in an ad-hoc fashion, using mailing lists, contest sites, and online bulletin boards. Recently Amazon's Mechanical Turk, a service where...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2010

    Constraining Credential Usage in Logic-Based Access Control

    Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owners issue credentials to specify policies, and the consequences of these policies are derived using logical inference rules. Proofs in authorization logics can serve as capabilities for gaining access...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2010

    RT @IWantPrivacy:Widespread Violation of Privacy Settings in the Twitter Social Network

    Twitter is a social network that focuses on creating and sharing short 140 character messages know as tweets. Twitter's sole privacy policy is a binary option that either allows every message a user creates to be publicly available, or allows only a user's followers to see posted messages. As the...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2010

    Formalizing Domains, Ultrametric Spaces and Semantics of Programming Languages

    The use of proof assistants in formalizing language meta-theory and implementing certified tools has grown enormously over the last decade, and is now a major trend in programming language research. Most current work on mechanizing language definitions and safety proofs, certified compilation, proof carrying code, and so on uses fairly...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2010

    Real-Time Software Implementation of an IEEE 802.11a Baseband Receiver on Intel Multicore

    This paper presents a software-only implementation of an IEEE 802.11a (WiFi) receiver optimized for Intel multicore platforms. The receiver is about 50 times faster than a straightforward C implementation, i.e., an implementation that has the same functionality, but leaves optimization completely to the compiler. The hand-optimized implementation achieves real-time for...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2010

    Virus Propagation on Time-Varying Networks: Theory and Immunization Algorithms

    In this paper, the authors analytically studied virus-spreading (specifically the SIS model) on arbitrary, time-varying graphs. Given a set of T alternating graphs, modeling e.g. the day/night pattern of human behavior, they ask: what is the epidemic threshold? And what are the best-k nodes to immunize to defend against an...

    Provided By Carnegie Mellon University

  • Webcasts // Jul 2010

    Software Architecture Fundamentals: Technical, Business, and Social Influences

    In this webcast, the presenter will attend to these questions by discussing the nature of software architecture in terms of architectural structures, the role that software architecture plays in an organization, the technical, business, and social influences on software architectures, and the role of quality attribute requirements in architectural design.

    Provided By Carnegie Mellon University

  • White Papers // Jul 2010

    Diagnosing Performance Changes by Comparing System Behaviours

    The causes of performance changes in a distributed system often elude even its developers. This paper develops a new technique for gaining insight into such changes: comparing system behaviours from two executions (e.g., of two system versions or time periods). Building on end-to-end request flow tracing within and across components,...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2010

    FAWNSort: Energy-efficient Sorting of 10GB

    In this paper, the authors describe the submission for the 2010 10GB JouleSort competition. The system consists of a machine with a low-power server processor and five flash drives, sorting the 10GB dataset in 21.2 seconds (?0.227s) seconds with an average power of 104.9W (?0.8W). This system sorts the 10GB...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2010

    Network-Wide Deployment of Intrusion Detection and Prevention Systems

    Traditional research efforts for scaling NIDS and NIPS systems using parallelization and hardware-assisted acceleration have largely focused on a single-vantage-point view. In this chapter, the authors explore a different design alternative that exploits spatial, network-wide opportunities for distributing NIDS and NIPS functions throughout a network. They present systematic models that...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2010

    A Transparently-Scalable Metadata Service for the Ursa Minor Storage System

    The metadata service of the Ursa Minor distributed storage system scales metadata throughput as metadata servers are added. While doing so, it correctly handles operations that involve metadata served by different servers, consistently and atomically updating such metadata. Unlike previous systems, Ursa Minor does so by reusing existing metadata migration...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2010

    Topology-Aware Quality-of-Service Support in Highly Integrated Chip Multiprocessors

    Current design complexity trends, poor wire scalability, and power limitations argue in favor of highly modular on-chip systems. Today's state-of-the-art CMPs already feature up to a hundred discrete cores. With increasing levels of integration, CMPs with hundreds of cores, cache tiles, and specialized accelerators are anticipated in the near future....

    Provided By Carnegie Mellon University

  • White Papers // Jun 2010

    Scheduling in Wireless Networks Under Uncertainties: A Greedy Primal-Dual Approach

    This paper proposes a dynamic primal-dual type algorithm to solve the optimal scheduling problem in wireless networks subject to uncertain parameters, which are generated by stochastic network processes such as random packet arrivals, channel fading, and node mobilities. The algorithm is a generalization of the well-known max-weight scheduling algorithm proposed...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2010

    Mobile Computing: the Next Decade

    Information at the fingertips anywhere, anytime has been the driving vision of mobile computing for the past two decades. Through relentless pursuit of this vision, spurring innovations in wireless technology, energy-efficient portable hardware and adaptive software, we have now largely attained this goal. Ubiquitous email and Web access is a...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2010

    Bootstrapping Trust in Commodity Computers

    Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. The authors examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g.,...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2010

    An Access Network Architecture for Neighborhood-scale Multimedia Delivery

    Internet Service Providers (ISPs) are in a constant race to meet the bandwidth demands of their subscribers. Access link upgrades, however, are expensive and take years to deploy. Many ISPs are looking for alternative solutions to reduce the need for continuous and expensive infrastructure expansion. This paper shows that there...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2010

    Competitive Responses Of Pricing, Advertising And Product Premium To Consumer Reviews

    Consumer product reviews, one of the earliest forms of online user generated contents, play a very significant role in consumer buying decisions as they help consumers resolve or reduce uncertainties about product features and qualities before their purchases. The authors provide a game-theoretic model to study as to how consumer...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2010

    Best Practices for National Cyber Security: Building a National Computer Security Incident Management Capability

    Managing cyber security through a national strategy is a necessity common to all national governments in the 21st century. Critical infrastructure in most nations, from transportation and power generation to food supply and hospitals, depends on Information and Communications Technology (ICT). The reliance on complex and constantly evolving technology is...

    Provided By Carnegie Mellon University

  • Webcasts // Jun 2010

    Securing Global Software Supply Chains

    The increasingly global nature of software development has raised concerns that global supply chains could be compromised, allowing malicious code to be inserted into a delivered software product during development, or enabling a compromised product to be substituted during delivery or installation. However, the intentional exploitation of software vulnerabilities inadvertently...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2010

    Zzyzx: Scalable Fault Tolerance Through Byzantine Locking

    Zzyzx is a Byzantine fault-tolerant replicated state machine protocol that outperforms prior approaches and provides near-linear throughput scaling. Using a new technique called Byzantine Locking, Zzyzx allows a client to extract state from an underlying replicated state machine and access it via a second protocol specialized for use by a...

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    The Case for Energy-Oriented Partial Desktop Migration

    Office and home environments are increasingly crowded with personal computers. Even though these computers see little use in the course of the day, they often remain powered, even when idle. Leaving idle PCs running is not only wasteful, but with rising energy costs it is increasingly more expensive. Authors propose...

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    SplitScreen: Enabling Efficient, Distributed Malware Detection

    The authors present the design and implementation of a novel anti-malware system called SplitScreen. SplitScreen performs an additional screening step prior to the signature matching phase found in existing approaches. The screening step filters out most non-infected files (90%) and also identifies malware signatures that are not of interest (99%)....

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    On Sparse Nonparametric Conditional Covariance Selection

    The authors develop a penalized kernel smoothing method for the problem of selecting nonzero elements of the conditional precision matrix, known as conditional covariance selection. This problem has a key role in many modern applications such as finance and computational biology. However, it has not been properly addressed. The estimator...

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    Critical Vulnerability in Browser Security Metrics

    Every time a browser vendor releases a patch for a critical vulnerability, the popular news media publishes a slew of negative press paper detailing the security holes that have been announced in the product. Users who read these papers often decide to switch to a "Safer" browser. The negative press...

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    The Path Forward: Specialized Computing in the Datacenter

    Popular belief holds that the cores on chip will grow at an exponential rate, following Moore's Law, with a commensurate increase in performance. However, by exploring the design space of multicore chips across technologies under a large array of design parameters, the authors observe that physical constraints in power and...

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    Java Concurrency Guidelines

    An essential element of secure coding in the Java programming language is well-documented and enforceable coding standards. Coding standards encourage programmers to follow a uniform set of guidelines determined by the requirements of the project and organization, rather than by the programmer's familiarity or preference. Once established, these standards can...

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    Reusing Migration to Simply and Efficiently Implement Multi-Server Operations in Transparently Scalable Storage Systems

    Distributed file systems that scale by partitioning files and directories among a collection of servers inevitably encounter multi-server operations. A common example is a RENAME that moves a file from a directory managed by one server to a directory managed by another. Transparently scalable systems (those that provide the same...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2012

    Street-Level Trust Semantics for Attribute Authentication

    The problem of determining whether a receiver may safely accept attributes (e.g., identity, credentials, location) of unknown senders in various online social protocols is a special instance of a more general problem of establishing trust in interactive protocols. The authors introduce the notion of interactive trust protocols to illustrate the...

    Provided By Carnegie Mellon University

  • White Papers // May 2012

    Saving Cash by Using Less Cache

    With the advent of cloud computing, web service providers have the ability to dynamically scale their computing infrastructures to match demand. Further, because cloud resources are often priced per-use, web service providers have a monetary incentive to minimize the number of resources consumed while still meeting the Service Level Agreements...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2012

    RAIDR: Retention-Aware Intelligent DRAM Refresh

    Dynamic Random-Access Memory (DRAM) is the building block of modern main memory systems. DRAM cells must be periodically refreshed to prevent loss of data. These refresh operations waste energy and degrade system performance by interfering with memory accesses. The negative effects of DRAM refresh increase as DRAM device capacity increases....

    Provided By Carnegie Mellon University

  • White Papers // Apr 2012

    A Case for Exploiting Subarray-Level Parallelism (SALP) in DRAM

    Modern DRAMs have multiple banks to serve multiple memory requests in parallel. However, when two requests go to the same bank, they have to be served serially, exacerbating the high latency of off-chip memory. Adding more banks to the system to mitigate this problem incurs high system cost. The authors'...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2012

    Staged Memory Scheduling: Achieving High Performance and Scalability in Heterogeneous Systems

    When multiple processor (CPU) cores and a GPU integrated together on the same chip share the off-chip main memory, requests from the GPU can heavily interfere with requests from the CPU cores, leading to low system performance and starvation of CPU cores. Unfortunately, state-of-the-art application-aware memory scheduling algorithms are ineffective...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    MinBD: Minimally-Buffered Deflection Routing for Energy-Efficient Interconnect

    A conventional Network-on-Chip (NoC) router uses input buffers to store in-flight packets. These buffers improve performance, but consume significant power. It is possible to bypass these buffers when they are empty, reducing dynamic power, but static buffer power, and dynamic power when buffers are utilized, remains. To improve energy efficiency,...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2012

    How Close Is Close Enough ? Understanding the Role of Cloudlets in Supporting Display Appropriation by Mobile Users

    Transient use of displays by mobile users was prophesied two decades ago. Today, convergence of a range of technologies enables the realization of this vision. For researchers in this space, one key question is where to physically locate the application for which the display has been appropriated. The emergence of...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    Enabling Efficient and Scalable Hybrid Memories Using Fine-Granularity DRAM Cache Management

    Hybrid main memories composed of DRAM as a cache to scalable non-volatile memories such as Phase-Change Memory (PCM) can provide much larger storage capacity than traditional main memories. A key challenge for enabling high-performance and scalable hybrid memories, though, is efficiently managing the metadata (e.g., tags) for data cached in...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    Collaborating With Executable Content Across Space and Time

    Executable content is of growing importance in many domains. How does one share and archive such content at Internet-scale for spatial and temporal collaboration? Spatial collaboration refers to the classic concept of user collaboration: two or more users who are at different Internet locations performing a task using shared context....

    Provided By Carnegie Mellon University

  • White Papers // Jul 2012

    STIR-Ing the Wireless Medium With Self-Tuned, Inference-Based, Real-Time Jamming

    Jamming, broadcasting to intentionally interfere with wireless reception has long been a problem for wireless systems. Recent research demonstrates numerous advances in jamming techniques that increase attack efficiency or reduce the probability an attack will be detected by choosing attack parameters based on a system's configuration. In this paper, the...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2012

    A Comparative Study of Location-sharing Privacy Preferences in the U.S. and China

    While prior studies have provided users with an initial understanding of people's location-sharing privacy preferences, they have been limited to Western countries and have not investigated the impact of the granularity of location disclosures on people's privacy preferences. The authors report findings of a three-week comparative study collecting location traces...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2012

    So Near, and Yet so Far: Managing "far-Away" Interferers in Dense Femto-Cell Networks

    The authors expect femto-cells to be massively and densely deployed in the future. Numerous existing works on femto-cell interference management assume that the local topology of interfering femto-cells can be sufficiently approximated through sensing, if not already known in advance. They show that this assumption results in poor throughput performance...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2012

    Chronological Examination of Insider Threat Sabotage: Preliminary Observations

    An employee of a telecommunications company, when asked to resign, responded by sabotaging company IT systems, shutting down their telecommunication system and blocking 911 services in four major cities. A disgruntled former employee, upset that he was not hired for a full-time position, remotely accessed SCADA systems for a sewage...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Initial Findings for Provisioning Variation in Cloud Computing

    Cloud computing offers a paradigm shift in management of computing resources for large-scale applications. Using the Infrastructure-as-a-service (IaaS) cloud computing model, users today can request dynamically provisioned, virtualized resources such as CPU, memory, disk, and network access in the form of virtualized resources. The client typically requests resources based on...

    Provided By Carnegie Mellon University

  • White Papers // May 2012

    Center-of-Gravity Reduce Task Scheduling to Lower MapReduce Network Traffic

    MapReduce is by far one of the most successful realizations of large-scale data-intensive cloud computing platforms. MapReduce automatically parallelizes computation by running multiple map and/or reduce tasks over distributed data across multiple machines. Hadoop is an open source implementation of MapReduce. When Hadoop schedules reduce tasks, it neither exploits data...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    Locality-Aware Reduce Task Scheduling for Mapreduce

    MapReduce offers a promising programming model for big data processing. Inspired by functional languages, MapReduce allows programmers to write functional-style code which gets automatically divided into multiple map and/or reduce tasks and scheduled over distributed data across multiple machines. Hadoop, an open source implementation of MapReduce, schedules map tasks in...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2009

    A Hybrid Phish Detection Approach by Identity Discovery and Keywords Retrieval

    Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. This paper, proposes a novel hybrid phish detection method based on information extraction (IE) and information retrieval (IR) techniques. The identity-based component of method detects phishing webpages by directly discovering the inconsistency between their...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2009

    SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks

    One of the fundamental limitations of the Internet is the inability of a packet flow recipient to halt disruptive flows before they consume the recipient's network link resources. Critical infrastructures and businesses alike are vulnerable to DoS attacks or flash-crowds that can incapacitate their networks with traffic floods. Unfortunately, current...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2009

    Program Evolution for Data Mining

    Around the world there are innumerable databases of information. The quantity of information available has created a high demand for automatic methods for searching these databases and extracting specific kinds of information. Unfortunately, the information in these databases increasingly contains signals that have no corresponding classification symbols. Examples include databases...

    Provided By Carnegie Mellon University

  • Case Studies // Dec 2004

    Overview and Cryptanalysis of the DVD Contents Scrambling System and DeCSS

    This paper presents an overview of DVD's Contents Scrambling System. The purpose of this overview is to then construct an attack tree [14] of the attacks used, which could be used for developing a tool to test other proprietary (unknown) encryption algorithms. The CSS was put in place to prevent...

    Provided By Carnegie Mellon University

  • White Papers // May 2009

    Automatic Detection of Firewall Misconfigurations Using Firewall and Network Routing Policies

    Firewalls are the most prevalent and important means of enforcing security policies inside networks and across organizational boundaries. However, effective and fault free firewall management in large and fast growing networks becomes increasingly more challenging. Firewall security policies are complex and their interaction with routing policies and applications further complicates...

    Provided By Carnegie Mellon University

  • White Papers // May 2004

    ScamSlam: An Architecture for Learning the Criminal Relations Behind Scam Spam

    This white paper introduces Scam Slam, a software system designed to learn the underlying number criminal cells perpetrating a particular type of scam, as well as to identify which scam spam messages were written by which cell. The system consists of two main components; a filtering mechanism based on a...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2009

    Real-Time Video Surveillance Over IEEE 802.11 Mesh Networks

    In recent years, there has been an increase in video surveillance systems in public and private environments due to a heightened sense of security. The next generation of surveillance systems will be able to annotate video and locally coordinate the tracking of objects while multiplexing hundreds of video streams in...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2004

    Sentiment Extraction From Unstructured Text Using Tabu Search-Enhanced Markov Blanket

    This white paper proposes a two-stage Bayesian algorithm that is able to capture the dependencies among words, and, at the same time, finds a vocabulary that is efficient for the purpose of extracting sentiments. It also reveals that experimental results on the Movie Reviews data set show that the algorithm...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2001

    Understanding Popout: Pre-attentive Segmentation Through Non-Directional Repulsion

    This white paper document identifies two measures which are to mark conspicuous image locations such as region boundaries, smooth contours and pop out targets against backgrounds, with attraction and non-directional repulsion, and unifies the dual processes of association by attraction and segregation by repulsion in one grouping framework. The paper...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2009

    I Just Found 10 Million SSNs

    The threat originates from the interaction of three (individually innocuous) trends: greater (self) publication of personal information; well-meaning government attempts to prevent SSN fraud (which backfires); and the increasing automation of SSN assignment systems (which introduces regularities attackers can exploit). An attacker could exploit these trends by analyzing publicly available...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2003

    Attribute-Based Prediction of File Properties

    This paper presents the evidence that attributes that are known to the file system when a file is created, such as its name, permission mode, and owner, are often strongly related to future properties of the file such as its ultimate size, lifespan, and access pattern. More importantly, it shows...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2009

    LSM-Based Secure System Monitoring Using Kernel Protection Schemes

    Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In the case of the Linux kernel 2.6, a set of hook functions called the Linux Security Module (LSM) has been implemented in order to...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2004

    Toward Automatic Context-Based Attribute Assignment for Semantic File Systems

    Semantic file systems enable users to search for files based on attributes rather than just pre-assigned names. This paper develops and evaluates several new approaches to automatically generating file attributes based on context, complementing existing approaches based on content analysis. Based on this study of ten systems over four months,...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Modeling TCP-Vegas Under On/Off Traffic

    There has been a significant amount of research toward modeling variants of the Transmission Control Protocol (TCP) in order to understand the impact of this protocol on file transmission times and network utilization. Analytical models have emerged as a way to reduce the time required for evaluation when compared with...

    Provided By Carnegie Mellon University

  • White Papers // May 2000

    Real Time Automated Transcription of Live Music Into Sheet Music using Common Music Notation

    This document reports on a project, whose objective is to implement a system on the C67 EVM board that will accept live music through a microphone, detect the notes, and transcribe them into sheet music in real time. Past projects have only attempted the transcription of recorded music, while this...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2011

    Votus: A Flexible and Scalable Monitoring Framework for Virtualized Clusters

    Large-scale distributed processing frameworks such as Hadoop are currently enjoying wide popularity for big data computation. Performance Analysis and monitoring under these frameworks are inherently difficult especially in a virtualized environment. Existing distributed monitoring tools can only report virtual resource usage. Such reported information might be insufficient for developers and...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2011

    Teaching the Cloud

    Cloud computing is a disruptive technology, one that embodies a major conceptual shift and is rapidly changing the way users, developers, and organizations work with computing infrastructure. Carnegie Mellon University in Qatar offered a one-semester undergraduate course to introduce students to cloud computing. In this paper, the authors describe their...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2012

    D-ADMM: A Distributed Algorithm for Compressed Sensing and Other Separable Optimization Problems

    The authors propose a distributed, decentralized algorithm for solving separable optimization problems over a connected network of compute nodes. In a separable problem, each node has its own private function and its own private constraint set. Private means that no other node has access to it. The goal is to...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2011

    Cooperative Convex Optimization in Networked Systems: Augmented Lagrangian Algorithms With Directed Gossip Communication

    Recently, there has been increased interest in large scale networked systems including networks of agents, wireless ad-hoc networks, and Wireless Sensor Networks (WSNs.) Typically, these systems lack a central unit, and the inter-node communication is prone to random failures (e.g., random packet dropouts in WSNs.) In this paper, the authors...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2012

    TACHYON: Tandem Execution for Efficient Live Patch Testing

    The vast number of security incidents are caused by exploits against vulnerabilities for which a patch is already available, but that users simply did not install. Patch installation is often delayed because patches must be tested manually to make sure they do not introduce problems, especially at the enterprise level....

    Provided By Carnegie Mellon University

  • White Papers // Jun 2012

    How Does Your Password Measure Up? the Effect of Strength Meters on Password Creation

    To help users create stronger text-based passwords, many web sites have deployed password meters that provide visual feedback on password strength. Although these meters are in wide use, their effects on the security and usability of passwords have not been well studied. The authors present a 2,931-subject study of password...

    Provided By Carnegie Mellon University

  • White Papers // May 2013

    Geometry-Based Vehicle-to-Vehicle Channel Modeling for Large-Scale Simulation

    Large-scale Vehicular Ad Hoc NETwork (VANET) simulators by and large employ simple statistical channel models. By design, such models do not account for specific objects in the region of interest when estimating the channel. While computationally efficient, these models were shown to be unable to provide satisfactory accuracy on a...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2013

    KISS: "Key It Simple and Secure" Corporate Key Management

    Deploying a corporate key management system faces fundamental challenges, such as fine-grained key usage control and secure system administration. None of the current commercial systems (either based on software or hardware security modules) or research proposals adequately address both challenges with small and simple Trusted Computing Base (TCB). This paper...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2013

    Design, Implementation and Verification of an EXtensible and Modular Hypervisor Framework

    The authors present the design, implementation, and verification of XMHF - an eXtensible and Modular Hypervisor Framework. XMHF is designed to achieve three goals - modular extensibility, automated verification, and high performance. XMHF includes a core that provides functionality common to many hypervisor-based security architectures and supports extensions that augment...

    Provided By Carnegie Mellon University