Georgia Institute of Technology

Displaying 1-40 of 360 results

  • White Papers // Apr 2014

    Improving MapReduce Performance in a Heterogeneous Cloud: A Measurement Study

    Hybrid clouds, geo-distributed cloud and continuous upgrades of computing, storage and networking resources in the cloud have driven datacenters evolving towards heterogeneous clusters. Unfortunately, most of MapReduce implementations are designed for homogeneous computing environments and perform poorly in heterogeneous clusters. Although a fair of research efforts have dedicated to improve...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2014

    Software-Based Techniques for Reducing the Vulnerability of GPU Applications

    As highly-parallel accelerators such as graphics processing units become more important in high-performance computing, so does the need to ensure their reliable operation. In response, research has been directed at several efforts to characterize and understand the hardware vulnerability of GPU micro-architecture structures, as well as to detecting and correcting...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2014

    A Measure of Heterogeneity in Multi-Agent Systems

    Heterogeneous multi-agent systems have previously been studied and deployed to solve a number of different tasks. Despite this, the users still lack a basic understanding of just what \"Heterogeneity\" really is. For example, what makes one team of agents more heterogeneous than another? In this paper, the authors address this...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2014

    Road-Network Aware Trajectory Clustering: Integrating Locality, Flow and Density

    Mining trajectory data has been gaining significant interest in recent years. However, existing approaches to trajectory clustering are mainly based on density and Euclidean distance measures. The authors argue that when the utility of spatial clustering of mobile object trajectories is targeted at road-network aware location-based applications, density and Euclidean...

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2014

    Algorithmic Time, Energy, and Power on Candidate HPC Compute Building Blocks

    The authors conducted a micro-benchmarking study of the time, energy, and power of computation and memory access on several existing platforms. These platforms represent candidate compute-node building blocks of future high-performance computing systems. Their analysis uses the \"Energy roofline\" model, developed in prior work, which they extend in two ways....

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2014

    Manifold: A Parallel Simulation Framework for Multicore Systems

    In this paper the authors present manifold, an open-source parallel simulation framework for multi-core architectures. It consists of a parallel simulation kernel, a set of micro-architecture components, and an integrated library of power, thermal, reliability, and energy models. Using the components as building blocks, users can assemble multi-core architecture simulation...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    Methodical Approximate Hardware Design and Reuse

    Design and reuse of approximate hardware components - digital circuits that may produce inaccurate results - can potentially lead to significant performance and energy improvements. Many emerging error-resilient applications can exploit such designs provided approximation is applied in a controlled manner. This paper provides the design abstractions and semantics for...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    Designing 3D Test Wrappers for Prebond and Postbond Test of 3D Embedded Cores

    3D integration is a promising new technology for tightly integrating multiple active silicon layers into a single chip stack. Both the integration of heterogeneous tiers and the partitioning of functional units across tiers leads to significant improvements in functionality, area, performance, and power consumption. Managing the complexity of 3D design...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    An Optimized 3D-Stacked Memory Architecture by Exploiting Excessive, High-Density TSV Bandwidth

    Memory bandwidth has become a major performance bottleneck as more and more cores are integrated onto a single die, demanding more and more data from the system memory. Several prior studies have demonstrated that this memory bandwidth problem can be addressed by employing a 3D-stacked memory architecture, which provides a...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    Smart Refresh: An Enhanced Memory Controller Design for Reducing Energy in Conventional and 3D DieStacked DRAMs

    DRAMs require periodic refresh for preserving data stored in them. The refresh interval for DRAMs depends on the vendor and the design technology they use. For each refresh in a DRAM row, the stored information in each cell is read out and then written back to itself as each DRAM...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    Noise-Direct: A Technique for Power Supply Noise Aware Floorplanning Using Microarchitecture Profiling

    In this paper, the authors propose Noise-Direct, a design methodology for power integrity aware floorplanning, using microarchitectural feedback to guide module placement. Stringent power constraints have led microprocessor designers to incorporate aggressive power saving techniques such as clock-gating that place a significant burden on the power delivery network. While the...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    DRAM Decay: Using Decay Counters to Reduce Energy Consumption in DRAMs

    Dynamic Random Access Memories (DRAMs) require periodic refresh for preserving data stored in them. The refresh interval for DRAMs depends on the vendor and the de-sign technology they use. For each refresh in a DRAM row, the stored information in each cell is read out and then writ-ten back to...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    Asymmetry Aware Scheduling Algorithms for Asymmetric Multiprocessors

    Multiprocessor architecture is becoming popular in both desktop processors and mobile processors. Especially asymmetric architecture shows promise in saving energy and power. However, how to design applications and how to schedule applications in asymmetric multiprocessors are still challenging problems. In this paper, the authors evaluate the performance of applications in...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    Hardware Support for Real-Time Embedded Multiprocessor System-on-a-Chip Memory Management

    The aggressive evolution of the semiconductor industry smaller process geometries, higher densities, and greater chip complexity has provided design engineers the means to create complex, high-performance Systems-on-Chip (SoC) designs. Such, SoC designs typically have more than one processor and huge memory, all on the same chip. Dealing with the global...

    Provided By Georgia Institute of Technology

  • White Papers // Sep 2013

    ClusterWatch: Flexible, Lightweight Monitoring for High-end GPGPU Clusters

    The ClusterWatch middleware provides runtime flexibility in what system-level metrics are monitored, how frequently such monitoring is done, and how metrics are combined to obtain reliable information about the current behavior of GPGPU clusters. Interesting attributes of ClusterWatch are the ease with which different metrics can be added to the...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2013

    An Infrastructure for Automating Large-scale Performance Studies and Data Processing

    The cloud has enabled the computing model to shift from traditional data centers to publicly shared computing infrastructure; yet, applications leveraging this new computing model can experience performance and scalability issues, which arise from the hidden complexities of the cloud. The most reliable path for better understanding these complexities is...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2013

    Oncilla: A GAS Runtime for Efficient Resource Allocation and Data Movement in Accelerated Clusters

    Accelerated and in-core implementations of big data applications typically require large amounts of host and accelerator memory as well as efficient mechanisms for transferring data to and from accelerators in heterogeneous clusters. Scheduling for heterogeneous CPU and GPU clusters has been investigated in depth in the High-Performance Computing (HPC) and...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2013

    Oncilla: A GAS Runtime for Efficient Resource Allocation and Data Movement in Accelerated Cluster

    Accelerated and in-core implementations of big data applications typically require large amounts of host and accelerator memory as well as efficient mechanisms for transferring data to and from accelerators in heterogeneous clusters. Scheduling for heterogeneous CPU and GPU clusters has been investigated in depth in the High-Performance Computing (HPC) and...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2013

    Secure Outsourced Garbled Circuit Evaluation for Mobile Devices

    Garbled circuits provide a powerful tool for jointly evaluating functions while preserving the privacy of each user's inputs. While recent research has made the use of this primitive more practical, such solutions generally assume that participants are symmetrically provisioned with massive computing resources. In reality, most people on the planet...

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2013

    Personal Clouds: Sharing and Integrating Networked Resources to Enhance End User Experiences

    End user experiences on mobile devices with their rich sets of sensors are constrained by limited device battery lives and restricted form factors, as well as by the 'scope' of the data available locally. The 'Personal Cloud' distributed software abstractions address these issues by enhancing the capabilities of a mobile...

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2013

    On Symmetric Encryption with Distinguishable Decryption Failures

    The authors propose to relax the assumption that decryption failures are indistinguishable in security models for symmetric encryption. Their main purpose is to build models that better reflect the reality of cryptographic implementations, and to surface the security issues that arise from doing so. They systematically explore the consequences of...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    Take This Personally: Pollution Attacks on Personalized Services

    Modern web services routinely personalize content to appeal to the specific interests, viewpoints, and contexts of individual users. Ideally, personalization allows sites to highlight information uniquely relevant to each of their users, thereby increasing user satisfaction - and, eventually, the service's bottom line. Unfortunately, as the authors demonstrate in this...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    An Automated Approach to Create, Store, and Analyze Large-scale Experimental Data in Clouds

    The flexibility and scalability of computing clouds make them an attractive application migration target; yet, the cloud remains a black-box for the most part. In particular, their opacity impedes the efficient but necessary testing and tuning prior to moving new applications into the cloud. A natural and presumably unbiased approach...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    FlexIO: Location-Flexible Execution of in Situ Data Analytics for Large Scale Scientific Applications

    Increasingly severe I/O bottlenecks on high-end computing machines are prompting scientists to process simulation output data while simulations are running and before placing data on disk - \"In situ\" and/or \"In-transit\". There are several options in placing in-situ data analytics along the I/O path: on compute nodes, on staging nodes...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    I/O Containers: Managing the Data Analytics and Visualization Pipelines of High End Codes

    Lack of I/O scalability is known to cause measurable slowdowns for large-scale scientific applications running on high end machines. This is prompting researchers to devise 'I/O staging' methods in which outputs are processed via online analysis and visualization methods to support desired science outcomes. Organized as online workflows and carried...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    A Study of the Effect of Partitioning on Parallel Simulation of Multicore Systems

    There has been little research that studies the effect of partitioning on parallel simulation of multicore systems. This paper presents their paper of this important problem in the context of null-message-based synchronization algorithm for parallel multicore simulation. This paper focuses on coarse grain parallel simulation where each core and its...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    Cloud Manufacturing: Drivers, Current Status, and Future Trends

    Cloud Manufacturing (CM) refers to a customer-centric manufacturing model that exploits on-demand access to a shared collection of diversified and distributed manufacturing resources to form temporary, reconfigurable production lines which enhance efficiency, reduce product lifecycle costs, and allow for optimal resource loading in response to variable-demand customer generated tasking. The...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Resolution-Aware Network Coded Storage

    In this paper, the authors show that coding can be used in Storage Area Networks (SANs) to improve various Quality of Service metrics under normal SAN operating conditions, without requiring additional storage space. For their analysis, they develop a model which captures modern characteristics such as constrained I/O access bandwidth...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Secure Cloud Storage Service with An Efficient DOKS Protocol

    Storage services based on public clouds provide customers with elastic storage and on-demand accessibility. However, moving data to remote cloud storage also raises privacy concerns. Cryptographic cloud storage and search over encrypted data have attracted attentions from both industry and academics. In this paper, the authors present a new approach...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Software-Controlled Transparent Management of Heterogeneous Memory Resources in Virtualized Systems

    This paper presents a software-controlled technique for managing the heterogeneous memory resources of next generation multicore platforms with fast 3D die-stacked memory and additional slow off-chip memory. Implemented for virtualized server systems, the technique detects the 'Hot' pages critical to program performance in order to then maintain them in the...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Efficient Trajectory Cover Search for Moving Object Trajectories

    Given a set of query locations and a set of query keywords, a Trajectory Cover (CT) query over a repository of mobile trajectories returns a minimal set of trajectories that maximally covers the query keywords and are also spatially close to the query locations. Processing CT queries over mobile trajectories...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Residency-Aware Virtual Machine Communication Optimization: Design Choices and Techniques

    Network I/O workloads are dominating in many data centers and cloud computing environments today. One way to improve inter Virtual Machine (VM) communication efficiency is to support co-resident VM communication by using shared memory based approaches and to resort to the traditional TCP/IP for inter-VM communications between VMs that are...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Performance Overhead Among Three Hypervisors: An Experimental Study using Hadoop Benchmarks

    Hypervisors are widely used in cloud environments and their impact on application performance has been a topic of significant research and practical interest. The authors conduct experimental measurements of several benchmarks using Hadoop MapReduce to evaluate and compare the performance impact of three popular hypervisors: a commercial hypervisor, Xen, and...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2013

    Residency Aware Inter-VM Communication in Virtualized Cloud: Performance Measurement and Analysis

    A known problem for virtualized cloud data centers is the inter-VM communication inefficiency for data transfer between co-resident VMs. Several engineering efforts have been made on building a shared memory based channel between co-resident VMs. The implementations differ in terms of whether user/program transparency, OS kernel transparency or VMM transparency...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2013

    SLIM: A Scalable Location-Sensitive Information Monitoring Service

    Location-sensitive information monitoring services are a centerpiece of the technology for disseminating content-rich information from massive data streams to mobile users. The key challenges for such monitoring services are characterized by the combination of spatial and non-spatial attributes being monitored and the wide spectrum of update rates. A typical example...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2013

    Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road?

    Mobile browsers are increasingly being relied upon to perform security sensitive operations. Like their desktop counterparts, these applications can enable SSL/TLS to provide strong security guarantees for communications over the web. However, the drastic reduction in screen size and the accompanying reorganization of screen real estate significantly changes the use...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2013

    Cloud-Based Information Technology Framework for Data Driven Intelligent Transportation Systems

    The authors present a novel cloud based IT framework, CloudTrack, for data driven intelligent transportation systems. They describe how the proposed framework can be leveraged for real-time fresh food supply tracking and monitoring. Cloud-Track allows efficient storage, processing and analysis of real-time location and sensor data collected from fresh food...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2013

    Optimizing Parallel Simulation of Multicore Systems Using Domain-Specific Knowledge

    In this paper the authors present two optimization techniques for the basic null-message algorithm in the context of parallel simulation of multicore computer architectures. Unlike the general, application-independent optimization methods, these are application-specific optimizations that make use of system properties of the simulation application. They demonstrate in two aspects that...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2013

    OpenCL Performance Evaluation on Modern Multi Core CPUs

    Utilizing heterogeneous platforms for computation has become a general trend making the portability issue important. OpenCL (Open Computing Language) serves the purpose by enabling portable execution on heterogeneous architectures. However, unpredictable performance variation on different platforms has become a burden for programmers who write OpenCL programs. This is especially true...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2013

    Cloud Implications on Software Network Structure and Security Risks

    By software vendors offering, via the cloud, Software-as-a-Service (SaaS) versions of traditionally on-premises products, security risks associated with software usage become more diversified which can greatly increase the value associated with network software. In an environment where negative security externalities are present and users make complex consumption and patching decisions,...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2011

    A Floorplan-Aware Dynamic Inductive Noise Controller for Reliable 2D and 3D Microprocessors

    In this paper, the authors propose a new dynamic inductive-noise controlling mechanism at the microarchitectural level that will limit the on-die current demand within predefined bounds, regardless of the native power and current characteristics of running applications. By dynamically monitoring the access patterns of microarchitectural modules, the mechanism can effectively...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2011

    Energy-Aware Mobile Service Overlays: Cooperative Dynamic Power Management in Distributed Mobile Systems

    With their increasingly powerful computational resources and high-speed wireless communications, future mobile systems will have the ability to run sophisticated applications on collections of cooperative end devices. Mobility, however, requires dynamic management of these platforms' distributed resources, and such management can also be used to meet application quality requirements and...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2011

    CubeCache: Efficient and Scalable Processing of OLAP Aggregation Queries in a Peer-to-Peer Network

    Peer-To-Peer (P2P) data sharing systems are emerging as a promising infrastructure for collaborative data sharing among multiple geographically distributed data centers within a large enterprise. This paper presents CubeCache, a peer-to-peer system for efficiently serving OLAP queries and data cube aggregations in a distributed data warehouse system. CubeCache combines multiple...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2009

    Translating GPU Binaries to Tiered SIMD Architectures With Ocelot

    Parallel Thread EXecution ISA (PTX) is a virtual instruction set used by NVIDIA GPUs that explicitly expresses hierarchical MIMD and SIMD style parallelism in an application. In such a programming model, the programmer and compiler are left with the not trivial, but not impossible, task of composing applications from parallel...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2009

    Thermal Field Management for Many-Core Processors

    This paper first presents an analysis of the global thermal field in many core processors in deep nanometer (to 16nm) nodes under power and thermal budget. The authors show that the thermal field can have significant spatiotemporal non-uniformity along with high maximum temperature. They propose spatiotemporal power multiplexing as a...

    Provided By Georgia Institute of Technology

  • White Papers // May 2009

    Analysis of a Redactable Signature Scheme on Data With Dependencies

    Storage of personal information by service providers risk privacy loss from data breaches. The prior work on minimal disclosure credentials presented a mechanism to limit the amount of personal information provided. In that work, personal data was broken into individual claims, which can be released in arbitrary subsets while still...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2009

    Consistency in Real-Time Collaborative Editing Systems Based on Partial Persistent Sequences

    In real-time collaborative editing systems, users create a shared document by issuing insert, delete, and undo operations on their local replica anytime and anywhere. Data consistency issues arise due to concurrent editing conflicts. Traditional consistency models put restrictions on editing operations updating different portions of a shared document, which is...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2009

    SPA: Symbolic Program Approximation for Scalable Path-Sensitive Analysis

    Symbolic execution is a static-analysis technique that has been used for applications such as test-input generation and change analysis. Symbolic execution's path sensitivity makes scaling it difficult. Despite recent advances that reduce the number of paths to explore, the scalability problem remains. Moreover, there are applications that require the analysis...

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2009

    Cosmos: A Wiki Data Management System

    Wiki applications are becoming increasingly important for knowledge sharing between large numbers of users. To prevent against vandalism and recover from destructive edits, Wiki applications need to maintain the revision histories of all documents. Due to the large amounts of data and traffic, a Wiki application needs to store the...

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2009

    Power-And Area-Efficient Single SISO Architecture of Turbo Decoder

    In this paper, the authors propose a power- and area-efficient architecture of Turbo decoder. In order to improve the nonfunctional performance metrics such as power consumption and area, they use the trade-off method between Bit Error Rate (BER) performance and the two non-functional performance metrics. The proposed architecture shows about...

    Provided By Georgia Institute of Technology

  • White Papers // Sep 2009

    Speculative Execution on Multi-GPU Systems

    The lag of parallel programming models and languages behind the advance of heterogeneous many-core processors has left a gap between the computational capability of modern systems and the ability of applications to exploit them. Emerging programming models, such as CUDA and OpenCL, force developers to explicitly partition applications into components...

    Provided By Georgia Institute of Technology

  • White Papers // Dec 2009

    Camouflage: Automated Sanitization of Field Data

    In this paper, the authors presented a novel technique for sanitizing inputs that cause failures. Given a failure-inducing input, the technique identifies an input set that includes this input together with other inputs that induce the same failure and selects an input different from the initial one from this set....

    Provided By Georgia Institute of Technology

  • White Papers // Oct 2009

    GeoCast: An Efficient Overlay System for Multicast Applications

    In this paper, the authors have presented GeoCast, a middleware architecture for supporting multicast group communication applications in a geographical overlay network. The approach has two unique features. First, one novel routinglist construction and maintenance strategy on the concept of enclosing zone is dedicatedly designed to allow the applications based...

    Provided By Georgia Institute of Technology

  • White Papers // Dec 2009

    The Design and Implementation Ocelot's Dynamic Binary Translator From PTX to Multi-Core X86

    Ocelot is a dynamic compilation framework designed to map the explicitly parallel PTX execution model used by NVIDIA CUDA applications onto diverse many-core architectures. Ocelot includes a dynamic binary translator from PTX to many-core processors that leverages the LLVM code generator to target x86. The binary translator is able to...

    Provided By Georgia Institute of Technology

  • White Papers // Dec 2009

    Virtualized Approach Towards Achieving Seamless Mobility

    The advent of the genre of personal computing and its gradual evolution into the 'State of the art' pervasive and ubiquitous computing era has resulted in the general user having access to a multitude of computing devices (PCs, Laptops, PDAs and cell phones). And with the increase in computing and...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2009

    Task Scheduling for Control Oriented Requirements for Cyber-Physical Systems

    The wide applications of Cyber-Physical Systems (CPS) call for effective design strategies that optimize the performance of both computing units and physical plants. The authors study the task scheduling problem for a class of CPS whose behaviors are regulated by feedback control laws. They co-design the control law and the...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2009

    User-Centric Handling of Identity Agent Compromise

    Digital identity credentials are a key enabler for important online services, but widespread theft and misuse of such credentials poses serious risks for users. The authors believe that an Identity Management System (IdMS) that empowers users to become aware of how and when their identity credentials are used is critical...

    Provided By Georgia Institute of Technology

  • White Papers // Oct 2009

    Leveraging Cellular Infrastructure to Improve Fraud Prevention

    The relationship between physical security and critical infrastructure has traditionally been unidirectional - the former being necessary to sustain the latter. However, certain pieces of critical infrastructure hold the potential to significantly improve the security of individuals and their most sensitive information. In this paper, the authors develop a pair...

    Provided By Georgia Institute of Technology

  • White Papers // May 2010

    Proxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP Networks

    Authentication is an important mechanism for the reliable operation of any Voice over IP (VoIP) infrastructure. Digest authentication has become the most widely adopted VoIP authentication protocol due to its simple properties. However, even this lightweight protocol can have a significant impact on the performance and scalability of a VoIP...

    Provided By Georgia Institute of Technology

  • White Papers // Oct 2010

    Characterizing the Security Implications of Third-Party Emergency Alert Systems Over Cellular Text Messaging Services

    Cellular text messaging services are increasingly being relied upon to disseminate critical information during emergencies. Accordingly, a wide range of organizations including colleges, universities and large metropolises now partner with third-party providers that promise to improve physical security by rapidly delivering such messages. Unfortunately, these products do not work as...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2011

    A Probabilistic Predictive Multicast Algorithm in Ad Hoc Networks (PPMA)

    Ad hoc networks are collections of mobile nodes communicating using wireless media, without any fixed infrastructure. Existing multicast protocols fall short in a harsh ad hoc mobile environment because node mobility causes conventional multicast trees to rapidly become outdated. The amount of bandwidth resources required for building up a multicast...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2011

    Information Capacity of Pulse-Based Wireless Nanosensor Networks

    Nanotechnology is enabling the development of sensing devices just a few hundreds of nanometers in size, which are able to measure new types of events in the nanoscale by exploiting the properties of novel nanomaterials. Wireless communication among these nanosensors will boost the range of applications of nanotechnology in the...

    Provided By Georgia Institute of Technology

  • White Papers // Dec 2010

    Realizing High Performance Multi-Radio 802.11n Wireless Networks

    The authors explore the design of a high capacity multi-radio wireless network using commercial 802.11n hardware. They first use extensive real-life experiments to evaluate the performance of closely located 802.11n radios. They discover that even when tuned to orthogonal channels, co-located 802.11n radios interfere with each other and achieve significantly...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2011

    On Attractant Scheduling in Networks Based on Bacterial Communication

    In this paper, the authors explore the problem of attractant scheduling in networks based on bacterial communication. Bacterial communication is a communication paradigm between biological cells which involve the physical motion of flagellated bacteria such as E. coli from the transmitter to the receiver using chemical attractants. Although bacterial communication...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2011

    Adaptive Flow Control for TCP on Mobile Phones

    The focus of this paper is to study the efficacy of TCP's flow control algorithm on mobile phones. Specifically, the authors identify the design limitations of the algorithm when operating in environments, such as mobile phones, where flow control assumes greater importance because of device resource limitations. They then propose...

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2011

    On Link Rate Adaptation in 802.11n WLANs

    The IEEE 802.11n standard is gaining popularity to achieve high throughput in wireless LANs. In this paper, the authors explore link adaptation in practical 802.11n systems using experiments with off-the-shelf hardware. The experiments reveal several non-trivial insights. Specifically, trivial extensions of algorithms developed for 802.11g provide minimal benefits in 802.11n...

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2010

    Practical Multi-Antenna Spatial Reuse in WLANs

    Smart antennas can improve spatial reuse in a wireless network through interference suppression. However, interference suppression requires support from clients in the form of channel estimation, which existing clients do not support. In this paper, the authors explore practical solutions to obtain spatial reuse with smart antennas without requiring hardware...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2010

    The Myth of Spatial Reuse With Directional Antennas in Indoor Wireless Networks

    Interference among co-channel users is a fundamental problem in wireless networks, which prevents nearby links from operating concurrently. Directional antennas allow the radiation patterns of wireless transmitters to be shaped to form directed beams. Conventionally, such beams are assumed to improve the spatial reuse (i.e. concurrency) in indoor wireless networks....

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2011

    A Framework for Characterizing the Wireless and Mobile Network Continuum

    The vast majority of research in Wireless And Mobile (WAM) networking falls in the MANET (Mobile Ad Hoc NETwork) category, where end-to-end paths are the norm. More recently, research has focused on a different Disruption Tolerant Network (DTN) paradigm, where end-to-end paths are the exception and intermediate nodes may store...

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2009

    Pushing Enterprise Security Down the Network Stack

    Network security is typically reactive: Networks provide connectivity and subsequently alter this connectivity according to various security policies, as implemented in middle-boxes, or at higher layers. This approach gives rise to complicated interactions between protocols and systems that can cause incorrect behavior and slow response to attacks. This paper proposes...

    Provided By Georgia Institute of Technology

  • White Papers // Sep 2009

    MyMANET: A Customizable Mobile Ad Hoc Network

    This paper presents MyMANET, a kernel module that provides a framework for ad hoc communication using commodity hardware. It exposes network measurements and provides an interface for inserting a routing protocol. MyMANET is based on a Layer 2.5 approach, which one calls the Wireless Decision Layer (WDL). Such a system...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2009

    Securing Wireless Data Networks Against Eavesdropping Using Smart Antennas

    This paper focuses on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas. While conventional cryptography based approaches focus on hiding the meaning of the information being communicated from the eavesdropper, the paper considers a complimentary class of strategies that limit knowledge of the existence of the...

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2009

    Security and Trust Management in Self-Organizing Wireless Adhoc Networks

    Ubiquitous connectivity and pervasive use of smart devices, powered by the emergence of cloud computing, are changing the way one live's and work in the 20th century. This paper increasingly depends on the Internet, the computing infrastructure and the data networks for just about every aspect of one's daily life....

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2009

    Reversing and Exploiting an Apple Firmware Update

    The security posture of a computer can be adversely affected by poorly-designed devices on its USB bus. Many modern embedded devices permit firmware to be upgraded in the field and the use of low-cost microcontrollers in these devices can make it difficult to perform the mathematical operations needed to verify...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2009

    New Security Models and Provably-Secure Schemes for Basic Query Support in Outsourced Databases

    This paper takes a closer look at the security of outsourced databases (aka Database-as-the-Service or DAS), a topic of emerging importance. DAS allows users to store sensitive data on a remote, untrusted server and retrieve desired parts of it on request. At first it focus on basic, exact-match query functionality,...

    Provided By Georgia Institute of Technology

  • White Papers // May 2009

    Performance Aware Regeneration in Virtualized Multitier Applications

    Virtual machine technology enables highly agile system deployments in which components can be cheaply moved, cloned, and allocated controlled hardware resources. This paper examines in the context of multitier Enterprise applications, how these facilities can be used to provide enhanced solutions to the classic problem of ensuring high availability without...

    Provided By Georgia Institute of Technology

  • White Papers // Dec 2009

    A Fill-Rate Service Level Model for Integrated Network Design and Inventory Allocation Problem

    Today's global economy relies heavily on transportation and warehousing to deliver goods. Outsourcing has made the distribution networks complex with several layers of National (import) Distribution Centers (NDCs) and Regional Distribution Centers (RDCs) between suppliers and retailers. More distribution nodes in the supply chain also means more inventory stockpiles. The...

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2010

    Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces

    This paper presents a novel network-level behavioral malware clustering system. The paper focuses on the analysis of structural similarities among malicious HTTP traffic traces generated by executing HTTP-based malware. The work is motivated by the need to provide quality input to algorithms that automatically generate network signatures. Accordingly, the paper...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2010

    On Disk I/O Scheduling in Virtual Machines

    Disk I/O schedulers are an essential part of most modern operating systems, with objectives such as improving disk utilization, and achieving better application performance and performance isolation. Current scheduler designs for OSs are based heavily on assumptions made about the latency characteristics of the underlying disk technology like electromechanical disks,...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2009

    Cloud Computing: A Taxonomy of Platform and Infrastructure-Level Offerings

    Cloud computing is a buzzword and umbrella term applied to several nascent trends in the turbulent landscape of information technology. Computing in the "cloud" alludes to ubiquitous and inexhaustible on-demand IT resources accessible through the Internet. Practically every new Internet-based service from Gmail to Amazon Web Services to Microsoft Online...

    Provided By Georgia Institute of Technology