Georgia Institute of Technology

Displaying 1-40 of 324 results

  • White Papers // Oct 2014

    CAMEO:A Two-Level Memory Organization with Capacity of Main Memory and Flexibility of Hardware-Managed Cache

    In this paper, the authors analyze the trade-offs in architecting stacked DRAM either as part of main memory or as a hardware-managed cache. Using stacked DRAM as part of main memory increases the effective capacity, but obtaining high performance from such a system requires Operating System (OS) support to migrate...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2014

    Improving MapReduce Performance in a Heterogeneous Cloud: A Measurement Study

    Hybrid clouds, geo-distributed cloud and continuous upgrades of computing, storage and networking resources in the cloud have driven datacenters evolving towards heterogeneous clusters. Unfortunately, most of MapReduce implementations are designed for homogeneous computing environments and perform poorly in heterogeneous clusters. Although a fair of research efforts have dedicated to improve...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2014

    Software-Based Techniques for Reducing the Vulnerability of GPU Applications

    As highly-parallel accelerators such as graphics processing units become more important in high-performance computing, so does the need to ensure their reliable operation. In response, research has been directed at several efforts to characterize and understand the hardware vulnerability of GPU micro-architecture structures, as well as to detecting and correcting...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2014

    A Measure of Heterogeneity in Multi-Agent Systems

    Heterogeneous multi-agent systems have previously been studied and deployed to solve a number of different tasks. Despite this, the users still lack a basic understanding of just what \"Heterogeneity\" really is. For example, what makes one team of agents more heterogeneous than another? In this paper, the authors address this...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2014

    Road-Network Aware Trajectory Clustering: Integrating Locality, Flow and Density

    Mining trajectory data has been gaining significant interest in recent years. However, existing approaches to trajectory clustering are mainly based on density and Euclidean distance measures. The authors argue that when the utility of spatial clustering of mobile object trajectories is targeted at road-network aware location-based applications, density and Euclidean...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2014

    Research Needs for TSV-Based 3D IC Architectural Floorplanning

    In this paper, the authors present key research needs in Three-Dimensional Integrated Circuit (3D IC) architectural floorplanning. Architectural floorplaning is done at a very early stage of 3D IC design process, where the goal is to quickly evaluate architectural designs described in Register-Transfer Level (RTL) in terms of power, performance...

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2014

    Algorithmic Time, Energy, and Power on Candidate HPC Compute Building Blocks

    The authors conducted a micro-benchmarking study of the time, energy, and power of computation and memory access on several existing platforms. These platforms represent candidate compute-node building blocks of future high-performance computing systems. Their analysis uses the \"Energy roofline\" model, developed in prior work, which they extend in two ways....

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2014

    Manifold: A Parallel Simulation Framework for Multicore Systems

    In this paper the authors present manifold, an open-source parallel simulation framework for multi-core architectures. It consists of a parallel simulation kernel, a set of micro-architecture components, and an integrated library of power, thermal, reliability, and energy models. Using the components as building blocks, users can assemble multi-core architecture simulation...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    Methodical Approximate Hardware Design and Reuse

    Design and reuse of approximate hardware components - digital circuits that may produce inaccurate results - can potentially lead to significant performance and energy improvements. Many emerging error-resilient applications can exploit such designs provided approximation is applied in a controlled manner. This paper provides the design abstractions and semantics for...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    Asymmetry Aware Scheduling Algorithms for Asymmetric Multiprocessors

    Multiprocessor architecture is becoming popular in both desktop processors and mobile processors. Especially asymmetric architecture shows promise in saving energy and power. However, how to design applications and how to schedule applications in asymmetric multiprocessors are still challenging problems. In this paper, the authors evaluate the performance of applications in...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    Hardware Support for Real-Time Embedded Multiprocessor System-on-a-Chip Memory Management

    The aggressive evolution of the semiconductor industry smaller process geometries, higher densities, and greater chip complexity has provided design engineers the means to create complex, high-performance Systems-on-Chip (SoC) designs. Such, SoC designs typically have more than one processor and huge memory, all on the same chip. Dealing with the global...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    Smart Refresh: An Enhanced Memory Controller Design for Reducing Energy in Conventional and 3D DieStacked DRAMs

    DRAMs require periodic refresh for preserving data stored in them. The refresh interval for DRAMs depends on the vendor and the design technology they use. For each refresh in a DRAM row, the stored information in each cell is read out and then written back to itself as each DRAM...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    Noise-Direct: A Technique for Power Supply Noise Aware Floorplanning Using Microarchitecture Profiling

    In this paper, the authors propose Noise-Direct, a design methodology for power integrity aware floorplanning, using microarchitectural feedback to guide module placement. Stringent power constraints have led microprocessor designers to incorporate aggressive power saving techniques such as clock-gating that place a significant burden on the power delivery network. While the...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    Designing 3D Test Wrappers for Prebond and Postbond Test of 3D Embedded Cores

    3D integration is a promising new technology for tightly integrating multiple active silicon layers into a single chip stack. Both the integration of heterogeneous tiers and the partitioning of functional units across tiers leads to significant improvements in functionality, area, performance, and power consumption. Managing the complexity of 3D design...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    An Optimized 3D-Stacked Memory Architecture by Exploiting Excessive, High-Density TSV Bandwidth

    Memory bandwidth has become a major performance bottleneck as more and more cores are integrated onto a single die, demanding more and more data from the system memory. Several prior studies have demonstrated that this memory bandwidth problem can be addressed by employing a 3D-stacked memory architecture, which provides a...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    DRAM Decay: Using Decay Counters to Reduce Energy Consumption in DRAMs

    Dynamic Random Access Memories (DRAMs) require periodic refresh for preserving data stored in them. The refresh interval for DRAMs depends on the vendor and the de-sign technology they use. For each refresh in a DRAM row, the stored information in each cell is read out and then writ-ten back to...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    TSV Stress-Aware Full-Chip Mechanical Reliability Analysis and Optimization for 3D IC

    Three-Dimensional Integrated Circuit (3D IC) with Through-Silicon-Via (TSV) is believed to offer new levels of efficiency, power, performance and form-factor advantages over the conventional 2D IC. However, 3D IC involves disruptive manufacturing technologies compared to conventional 2D IC. TSVs cause significant thermomechanical stress that may seriously affect performance, leakage and...

    Provided By Georgia Institute of Technology

  • White Papers // Sep 2013

    ClusterWatch: Flexible, Lightweight Monitoring for High-end GPGPU Clusters

    The ClusterWatch middleware provides runtime flexibility in what system-level metrics are monitored, how frequently such monitoring is done, and how metrics are combined to obtain reliable information about the current behavior of GPGPU clusters. Interesting attributes of ClusterWatch are the ease with which different metrics can be added to the...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2013

    An Infrastructure for Automating Large-scale Performance Studies and Data Processing

    The cloud has enabled the computing model to shift from traditional data centers to publicly shared computing infrastructure; yet, applications leveraging this new computing model can experience performance and scalability issues, which arise from the hidden complexities of the cloud. The most reliable path for better understanding these complexities is...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2013

    Oncilla: A GAS Runtime for Efficient Resource Allocation and Data Movement in Accelerated Cluster

    Accelerated and in-core implementations of big data applications typically require large amounts of host and accelerator memory as well as efficient mechanisms for transferring data to and from accelerators in heterogeneous clusters. Scheduling for heterogeneous CPU and GPU clusters has been investigated in depth in the High-Performance Computing (HPC) and...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2013

    Oncilla: A GAS Runtime for Efficient Resource Allocation and Data Movement in Accelerated Clusters

    Accelerated and in-core implementations of big data applications typically require large amounts of host and accelerator memory as well as efficient mechanisms for transferring data to and from accelerators in heterogeneous clusters. Scheduling for heterogeneous CPU and GPU clusters has been investigated in depth in the High-Performance Computing (HPC) and...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2013

    Secure Outsourced Garbled Circuit Evaluation for Mobile Devices

    Garbled circuits provide a powerful tool for jointly evaluating functions while preserving the privacy of each user's inputs. While recent research has made the use of this primitive more practical, such solutions generally assume that participants are symmetrically provisioned with massive computing resources. In reality, most people on the planet...

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2013

    Personal Clouds: Sharing and Integrating Networked Resources to Enhance End User Experiences

    End user experiences on mobile devices with their rich sets of sensors are constrained by limited device battery lives and restricted form factors, as well as by the 'scope' of the data available locally. The 'Personal Cloud' distributed software abstractions address these issues by enhancing the capabilities of a mobile...

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2013

    On Symmetric Encryption with Distinguishable Decryption Failures

    The authors propose to relax the assumption that decryption failures are indistinguishable in security models for symmetric encryption. Their main purpose is to build models that better reflect the reality of cryptographic implementations, and to surface the security issues that arise from doing so. They systematically explore the consequences of...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    Take This Personally: Pollution Attacks on Personalized Services

    Modern web services routinely personalize content to appeal to the specific interests, viewpoints, and contexts of individual users. Ideally, personalization allows sites to highlight information uniquely relevant to each of their users, thereby increasing user satisfaction - and, eventually, the service's bottom line. Unfortunately, as the authors demonstrate in this...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    An Automated Approach to Create, Store, and Analyze Large-scale Experimental Data in Clouds

    The flexibility and scalability of computing clouds make them an attractive application migration target; yet, the cloud remains a black-box for the most part. In particular, their opacity impedes the efficient but necessary testing and tuning prior to moving new applications into the cloud. A natural and presumably unbiased approach...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    A Study of the Effect of Partitioning on Parallel Simulation of Multicore Systems

    There has been little research that studies the effect of partitioning on parallel simulation of multicore systems. This paper presents their paper of this important problem in the context of null-message-based synchronization algorithm for parallel multicore simulation. This paper focuses on coarse grain parallel simulation where each core and its...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    FlexIO: Location-Flexible Execution of in Situ Data Analytics for Large Scale Scientific Applications

    Increasingly severe I/O bottlenecks on high-end computing machines are prompting scientists to process simulation output data while simulations are running and before placing data on disk - \"In situ\" and/or \"In-transit\". There are several options in placing in-situ data analytics along the I/O path: on compute nodes, on staging nodes...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    I/O Containers: Managing the Data Analytics and Visualization Pipelines of High End Codes

    Lack of I/O scalability is known to cause measurable slowdowns for large-scale scientific applications running on high end machines. This is prompting researchers to devise 'I/O staging' methods in which outputs are processed via online analysis and visualization methods to support desired science outcomes. Organized as online workflows and carried...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    Cloud Manufacturing: Drivers, Current Status, and Future Trends

    Cloud Manufacturing (CM) refers to a customer-centric manufacturing model that exploits on-demand access to a shared collection of diversified and distributed manufacturing resources to form temporary, reconfigurable production lines which enhance efficiency, reduce product lifecycle costs, and allow for optimal resource loading in response to variable-demand customer generated tasking. The...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Resolution-Aware Network Coded Storage

    In this paper, the authors show that coding can be used in Storage Area Networks (SANs) to improve various Quality of Service metrics under normal SAN operating conditions, without requiring additional storage space. For their analysis, they develop a model which captures modern characteristics such as constrained I/O access bandwidth...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Variations in Performance Measurements of Multi-Core Processors: A Study of n-Tier Applications

    The prevalence of multi-core processors has raised the question of whether applications can use the increasing number of cores efficiently in order to provide predictable Quality of Service (QoS). In this paper, the authors study the horizontal scalability of n-tier application performance within a Multi-Core Processor (MCP). Through extensive measurements...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Secure Cloud Storage Service with An Efficient DOKS Protocol

    Storage services based on public clouds provide customers with elastic storage and on-demand accessibility. However, moving data to remote cloud storage also raises privacy concerns. Cryptographic cloud storage and search over encrypted data have attracted attentions from both industry and academics. In this paper, the authors present a new approach...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Software-Controlled Transparent Management of Heterogeneous Memory Resources in Virtualized Systems

    This paper presents a software-controlled technique for managing the heterogeneous memory resources of next generation multicore platforms with fast 3D die-stacked memory and additional slow off-chip memory. Implemented for virtualized server systems, the technique detects the 'Hot' pages critical to program performance in order to then maintain them in the...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Efficient Trajectory Cover Search for Moving Object Trajectories

    Given a set of query locations and a set of query keywords, a Trajectory Cover (CT) query over a repository of mobile trajectories returns a minimal set of trajectories that maximally covers the query keywords and are also spatially close to the query locations. Processing CT queries over mobile trajectories...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Residency-Aware Virtual Machine Communication Optimization: Design Choices and Techniques

    Network I/O workloads are dominating in many data centers and cloud computing environments today. One way to improve inter Virtual Machine (VM) communication efficiency is to support co-resident VM communication by using shared memory based approaches and to resort to the traditional TCP/IP for inter-VM communications between VMs that are...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Performance Overhead Among Three Hypervisors: An Experimental Study using Hadoop Benchmarks

    Hypervisors are widely used in cloud environments and their impact on application performance has been a topic of significant research and practical interest. The authors conduct experimental measurements of several benchmarks using Hadoop MapReduce to evaluate and compare the performance impact of three popular hypervisors: a commercial hypervisor, Xen, and...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2013

    Residency Aware Inter-VM Communication in Virtualized Cloud: Performance Measurement and Analysis

    A known problem for virtualized cloud data centers is the inter-VM communication inefficiency for data transfer between co-resident VMs. Several engineering efforts have been made on building a shared memory based channel between co-resident VMs. The implementations differ in terms of whether user/program transparency, OS kernel transparency or VMM transparency...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2013

    SLIM: A Scalable Location-Sensitive Information Monitoring Service

    Location-sensitive information monitoring services are a centerpiece of the technology for disseminating content-rich information from massive data streams to mobile users. The key challenges for such monitoring services are characterized by the combination of spatial and non-spatial attributes being monitored and the wide spectrum of update rates. A typical example...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2013

    Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road?

    Mobile browsers are increasingly being relied upon to perform security sensitive operations. Like their desktop counterparts, these applications can enable SSL/TLS to provide strong security guarantees for communications over the web. However, the drastic reduction in screen size and the accompanying reorganization of screen real estate significantly changes the use...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2010

    A Novel Multicast Scheduling Scheme for Multimedia Servers With Variable Access Patterns

    Analysis of server logs from multimedia servers, a FTP server, and a web server suggest that irrespective of the content type and protocol used to retrieve it, the small percentage of files that account for the most loads on the server exhibit a very dynamic popularity behavior. This observation has...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2011

    PROPHET: Goal-Oriented Provisioning for Highly Tunable Multicore Processors in Cloud Computing

    As multicore and future many-core processors emerge with more complex optimization features, how to achieve optimal efficiency in terms of energy, power, and performance when running parallel workloads poses a new challenge to both large-scale system administrators and networked machines used by individuals. Unlike traditional high performance computing systems which...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2011

    Overlay?-Friendly Native Network: A Contradiction in Terms?

    It is a widely accepted notion that the native layer of the current Internet has begun to stagnate in terms of the services offered. Consequently, overlay networks have gained attention as a viable alternative to over? come functionality limitations of the Internet. A common approach to overlay network design holds...

    Provided By Georgia Institute of Technology

  • White Papers // Dec 2009

    Performance Evaluation of Hadoop on Virtual Machines

    MapReduce is a popular programming framework that is intended for automatical paralellization of computation in the cloud. MapReduce deals with data intensive applications; huge amount of data is first loaded from remote DFS, then copied as intermediate results from Mapper to Reducer, and finally written back to DFS. Along with...

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2010

    3D Reconstruction of Underwater Structures

    Environmental change is a growing international concern, calling for the regular monitoring, studying and preserving of detailed information about the evolution of underwater ecosystems. For example, fragile coral reefs are exposed to various sources of hazards and potential destruction, and need close observation. Computer vision offers promising technologies to build...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2010

    Combining Computational Analyses and Interactive Visualization to Enhance Information Retrieval

    Exploratory search and information-seeking support systems attempt to go beyond simple information retrieval and assist people with exploration, investigation, learning and understanding activities on document collections. In this work the authors integrate several computational text analysis techniques, including document summarization, document similarity, document clustering, and sentiment analysis, within the interactive...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2010

    Hybrid Generative/Discriminative Learning for Automatic Image Annotation

    Automatic Image Annotation (AIA) raises tremendous challenges to machine learning as it requires modeling of data that are both ambiguous in input and output, e.g., images containing multiple objects and labeled with multiple semantic tags. Even more challenging is that the number of candidate tags is usually huge (As large...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2011

    Agyaat: Providing Mutually Anonymous Services Over Structured P2P Networks

    In the modern era of ubiquitous computing, privacy is one of the most critical user concerns. To prevent their privacy, users typically, try to remain anonymous to the service provider. This is especially true for decentralized Peer-To-Peer (P2P) systems, where common users act both as clients and as service providers....

    Provided By Georgia Institute of Technology

  • White Papers // Sep 2009

    DDT: Design and Evaluation of a Dynamic Program Analysis for Optimizing Data Structure Usage

    Data structures define how values being computed are stored and accessed within programs. By recognizing what data structures are being used in an application, tools can make applications more robust by enforcing data structure consistency properties, and developers can better understand and more easily modify applications to suit the target...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2009

    State Of The Art Survey Of Commercial Software For Supply Chain Design

    The excellence of supply chain management is vital not only to obtain high operational efficiency but also to survive in the global competition. In supporting decision makers to make rational and sophisticated plan with huge number of parameters and their complicated trade-off relations, supply chain design software has played a...

    Provided By Georgia Institute of Technology

  • White Papers // Nov 2010

    Establishing Theoretical Foundations and Building Experimental Systemsfor smart wireless networks

    The internet is becoming an increasing part of people's lives. A great revolution in the internet is underway and is characterized by two dominant trends: First, the demand for wireless and mobile technologies is increasing at an explosive rate. The need for any-time any-where connectivity and social networking have fueled...

    Provided By Georgia Institute of Technology

  • White Papers // Sep 2009

    A New Perspective on Experimental Analysis of N-Tier Systems: Evaluating Database Scalability, Multi-Bottlenecks, and Economical Operation

    Economical configuration planning, component performance evaluation, and analysis of bottleneck phenomena in N-tier applications are serious challenges due to design requirements such as non-stationary workloads, complex non-modular relationships, and global consistency management when replicating database servers, for instance. The authors have conducted an extensive experimental evaluation of N-tier applications, which...

    Provided By Georgia Institute of Technology

  • White Papers // Nov 2010

    Promoting West African Ownership Of The Power Sector: Alternative Financing For Distributed Generation Of Renewable Electricity

    Due to the high cost of building large power plants, several electric utilities around the world are looking for alternative business models for the power sector. Nevertheless, centralized generation remains the prevailing approach to electrification in West Africa, and the current reforms of its electricity sector depend on massive loans...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2010

    A Split-Driver Approach to SoC Virtualization - Challenges and Opportunities

    Embedded platforms are becoming increasingly more resource-rich (e.g., processing speeds, number of cores, memory, and communication rates). As a result, they are being transformed from 'closed', fixed-function devices to programmable and flexible platforms capable of supporting diverse types of services. One approach to enabling service diversity jointly with proper isolation...

    Provided By Georgia Institute of Technology

  • White Papers // Nov 2010

    Virtualization Services: Accelerated I/O Support in Multi-Core Systems

    Virtualization services permit I/O subsystems and peripheral devices to be virtualized by placing select functionality on specialized cores and/or on cores situated 'closer' to devices. The approach is used to implement Self-Virtualized I/O (SVIO), which off-loads certain virtualization functionality onto the cores available on the I/O device, accelerating I/O functions,...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2010

    Automated Lookahead Data Migration in SSD-Enabled Multi-Tiered Storage System

    The significant IO improvements of Solid State Disks (SSD) over traditional rotational hard disks makes it an attractive approach to integrate SSDs in tiered storage systems for performance enhancement. However, to integrate SSD into multi-tiered storage system effectively, automated data migration between SSD and HDD plays a critical role. In...

    Provided By Georgia Institute of Technology

  • White Papers // Nov 2009

    Voting Systems With Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses

    With the popularity of voting systems in cyberspace, there is growing evidence that current voting systems can be manipulated by fake votes. This problem has attracted many researchers working on guarding voting systems in two areas: relieving the effect of dishonest votes by evaluating the trust of voters, and limiting...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2010

    Output Privacy in Data Mining

    Privacy has been identified as a vital requirement in designing and implementing data mining systems. In general, privacy preservation in data mining demands protecting both input and output privacy: the former refers to sanitizing the raw data itself before performing mining; while the latter refers to preventing the mining output...

    Provided By Georgia Institute of Technology

  • White Papers // May 2010

    Understanding Performance Interference of I/O Workload in Virtualized Cloud Environments

    Server virtualization offers the ability to slice large, underutilized physical servers into smaller, parallel Virtual Machines (VMs), enabling diverse applications to run in isolated environments on a shared hardware platform. Effective management of virtualized cloud environments introduces new and unique challenges, such as efficient CPU scheduling for virtual machines, effective...

    Provided By Georgia Institute of Technology

  • White Papers // Sep 2010

    Modeling the Performance and Energy of Storage Arrays

    This paper proposes a novel framework for evaluating techniques for power optimization in storage. Given an arbitrary trace of disk requests, the authors split it into short time intervals, extract a set of simple statistics for each interval, and apply an analytical model to those statistics to obtain accurate information...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2010

    An Utility-Driven Routing Scheme for Scaling Multicast Applications

    Multicast is a common platform for supporting group communication applications, such as IPTV, multimedia content delivery, and location-based advertisements. Distributed Hash Table (DHT) based overlay networks such as Chord and CAN presents a popular distributed computing architecture for multicast applications. However, existing research efforts have been mostly dedicated to efficient...

    Provided By Georgia Institute of Technology

  • White Papers // Nov 2009

    Monitoring Continuous State Violation in Datacenters: Exploring the Time Dimension

    Monitoring global states of an application deployed over distributed nodes becomes prevalent in today's datacenters. State monitoring requires not only correct monitoring results but also minimum communication cost for efficiency and scalability. Most existing work adopts an instantaneous state monitoring approach, which triggers state alerts whenever a constraint is violated....

    Provided By Georgia Institute of Technology

  • White Papers // May 2010

    Scalable and Reliable IPTV Service Through Collaborative Request Dispatching

    IPTV has emerged as the future standard of television and drawn enormous attentions from both industry and research communities. Among different IPTV services, on-demand services are the most popular ones due to their convenience and rich content. However, supporting scalable and reliable on-demand IPTV ser-vices remains to be an important...

    Provided By Georgia Institute of Technology

  • White Papers // May 2010

    Security Models and Requirements for Healthcare Application Clouds

    With the widespread use of Electronic Health Record (EHR), building a secure EHR sharing environment has attracted a lot of attention in both healthcare industry and academic community. Cloud computing paradigm is one of the popular health IT infrastructure for facilitating EHR sharing and EHR integration. In this paper the...

    Provided By Georgia Institute of Technology

  • White Papers // Dec 2009

    Online Detection of Utility Cloud Anomalies Using Metric Distributions

    The online detection of anomalies is a vital element of operations in data centers and in utility clouds like Amazon EC2. Given ever-increasing data center sizes coupled with the complexities of systems software, applications, and workload patterns, such anomaly detection must operate automatically, at runtime, and without the need for...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2010

    Performance and Availability Aware Regeneration for Cloud Based Multitier Applications

    Virtual machine technology enables agile system deployments in which software components can be cheaply moved, replicated, and allocated hardware resources in a controlled fashion. This paper examines how these facilities can be used to provide enhanced solutions to the classic problem of ensuring high availability while maintaining performance. By regenerating...

    Provided By Georgia Institute of Technology

  • White Papers // Dec 2009

    Study on Performance Management and Application Behavior in Virtualized Environment

    Control theory has been utilized in recent years to manage the resources in virtualized environment for applications with time-varying resource demand. The systems under control, including the servers and the applications, are taken as black-boxes, and the controllers are generally expected to be adaptive to the underline systems. However, little...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2010

    Mistral: Dynamically Managing Power, Performance, and Adaptation Cost in Cloud Infrastructures

    Server consolidation based on virtualization is a key ingredient for improving power efficiency and resource utilization in cloud computing infrastructures. However, to provide satisfactory performance in such scenarios under changing application workloads, dynamic management of the consolidated resource pool is critical. Unfortunately, this type of management is also challenging in...

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2010

    Intelligent Management of Virtualized Resources for Database Systems in Cloud Environment

    In a cloud computing environment, resources are shared among different clients. Intelligently managing and allocating resources among various clients is important for system providers, whose business model relies on managing the infrastructure resources in a cost-effective manner while satisfying the client Service Level Agreements (SLAs). In this paper, the authors...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2009

    Combining Quality of Service and Social Information for Ranking Services

    In service-oriented computing, multiple services often exist to perform similar functions. In these situations, it is essential to have good ways for qualitatively ranking the services. In this paper, the authors present a new ranking method, ServiceRank, which considers quality of service aspects (Such as response time and availability) as...

    Provided By Georgia Institute of Technology

  • White Papers // May 2010

    Adaptive Data Migration in Multi-Tiered Storage Based Cloud Environment

    Multi-tiered storage systems today are integrating Solid State Disks (SSD) on top of traditional rotational hard disks for performance enhancement due to the significant IO improvements in SSD technology. It is widely recognized that automated data migration between SSD and HDD plays a critical role in effective integration of SSD...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2011

    Creating Efficient Execution Platforms With V(irtualized)Services

    Virtualization is creating new opportunities for innovative uses of middleware technologies. In this paper, the authors present such opportunities for mobile or pervasive environments, where virtualization efforts face challenges that include the diversity of platforms and devices present in these domains, dynamic device and resource behaviors, and the efficient use...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2011

    Implementing Register Files for High-Performance Microprocessors in a Die-Stacked (3D) Technology

    3D integration is a new technology that will greatly increase transistor density while providing faster on-chip communication. 3D integration stacks multiple die connected with a very high-density and low-latency interface which provides increased device density and the ability to place and route in the third dimension. While past studies have...

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2011

    Physical-Layer Security Over Correlated Erasure Channels

    This paper explores the additional security obtained by noise at the physical layer in a wiretap channel model setting. Security enhancements at the physical layer have been proposed recently using a secrecy metric based on the degrees of freedom that an attacker has with respect to the sent ciphertext. Prior...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2011

    A MAC Protocol for Delay-Bounded Applications in Wireless Sensor Networks

    The problem of scheduling packet transmissions for data gathering in wireless sensor networks is studied in this paper. A scenario is considered where different sources contemporarily sense an event and signal the acquired information to a sink. Energy-latency tradeoffs for data gathering in sensor networks are explored by means of...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2010

    Subverting Linux On-the-Fly Using Hardware Virtualization Technology

    In this paper, the authors address the problem faced by modern operating systems due to the exploitation of Hardware-Assisted Full-Virtualization technology by attackers. Virtualization technology has been of growing importance these days. With the help of such a technology, multiple operating systems can be run on a single piece of...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2011

    Optimization Problems Involving Collections of Dependent Objects

    The authors describe a class of problems motivated by numerous real-world applications where there is a collection of objects that have both a cost and a value, but where some of those objects depend upon other objects to obtain their full value. Applications include finding an optimal order for transferring...

    Provided By Georgia Institute of Technology

  • White Papers // May 2010

    Performance Measurements and Analysis of Network I/O Applications in Virtualized Cloud

    Virtualization is a key technology for cloud based data centers to implement the vision of Infrastructure As A Service (IaaS) and to promote effective server consolidation and application consolidation. However, current implementation of virtual machine monitor does not provide sufficient performance isolation to guarantee the effectiveness of resource sharing, especially...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2011

    A Utility-Aware Middleware Architecture for Decentralized Group Communication Applications

    The success of Internet telephony services like Skype illustrates the feasibility of utilizing unstructured Peer-to-Peer (P2P) networks as an economical platform for supporting group communication applications. However, the ad-hoc nature of these networks poses significant challenges to the efficiency and scalability of the group communication services. This paper presents the...

    Provided By Georgia Institute of Technology

  • White Papers // May 2010

    Look Who's Talking: Discovering Dependencies Between Virtual Machines Using CPU Utilization

    A common problem experienced in datacenters and utility clouds is the lack of knowledge about the mappings of the services being offered to or run by external users to the sets of Virtual Machines (VMs) realizing them. This makes it difficult to manage VM ensembles to attain provider goals like...

    Provided By Georgia Institute of Technology