Georgia Institute of Technology

Displaying 1-40 of 340 results

  • White Papers // Apr 2014

    Improving MapReduce Performance in a Heterogeneous Cloud: A Measurement Study

    Hybrid clouds, geo-distributed cloud and continuous upgrades of computing, storage and networking resources in the cloud have driven datacenters evolving towards heterogeneous clusters. Unfortunately, most of MapReduce implementations are designed for homogeneous computing environments and perform poorly in heterogeneous clusters. Although a fair of research efforts have dedicated to improve...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2014

    Software-Based Techniques for Reducing the Vulnerability of GPU Applications

    As highly-parallel accelerators such as graphics processing units become more important in high-performance computing, so does the need to ensure their reliable operation. In response, research has been directed at several efforts to characterize and understand the hardware vulnerability of GPU micro-architecture structures, as well as to detecting and correcting...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2014

    A Measure of Heterogeneity in Multi-Agent Systems

    Heterogeneous multi-agent systems have previously been studied and deployed to solve a number of different tasks. Despite this, the users still lack a basic understanding of just what \"Heterogeneity\" really is. For example, what makes one team of agents more heterogeneous than another? In this paper, the authors address this...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2014

    Road-Network Aware Trajectory Clustering: Integrating Locality, Flow and Density

    Mining trajectory data has been gaining significant interest in recent years. However, existing approaches to trajectory clustering are mainly based on density and Euclidean distance measures. The authors argue that when the utility of spatial clustering of mobile object trajectories is targeted at road-network aware location-based applications, density and Euclidean...

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2014

    Algorithmic Time, Energy, and Power on Candidate HPC Compute Building Blocks

    The authors conducted a micro-benchmarking study of the time, energy, and power of computation and memory access on several existing platforms. These platforms represent candidate compute-node building blocks of future high-performance computing systems. Their analysis uses the \"Energy roofline\" model, developed in prior work, which they extend in two ways....

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2014

    Manifold: A Parallel Simulation Framework for Multicore Systems

    In this paper the authors present manifold, an open-source parallel simulation framework for multi-core architectures. It consists of a parallel simulation kernel, a set of micro-architecture components, and an integrated library of power, thermal, reliability, and energy models. Using the components as building blocks, users can assemble multi-core architecture simulation...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    Methodical Approximate Hardware Design and Reuse

    Design and reuse of approximate hardware components - digital circuits that may produce inaccurate results - can potentially lead to significant performance and energy improvements. Many emerging error-resilient applications can exploit such designs provided approximation is applied in a controlled manner. This paper provides the design abstractions and semantics for...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    Asymmetry Aware Scheduling Algorithms for Asymmetric Multiprocessors

    Multiprocessor architecture is becoming popular in both desktop processors and mobile processors. Especially asymmetric architecture shows promise in saving energy and power. However, how to design applications and how to schedule applications in asymmetric multiprocessors are still challenging problems. In this paper, the authors evaluate the performance of applications in...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    Hardware Support for Real-Time Embedded Multiprocessor System-on-a-Chip Memory Management

    The aggressive evolution of the semiconductor industry smaller process geometries, higher densities, and greater chip complexity has provided design engineers the means to create complex, high-performance Systems-on-Chip (SoC) designs. Such, SoC designs typically have more than one processor and huge memory, all on the same chip. Dealing with the global...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    Designing 3D Test Wrappers for Prebond and Postbond Test of 3D Embedded Cores

    3D integration is a promising new technology for tightly integrating multiple active silicon layers into a single chip stack. Both the integration of heterogeneous tiers and the partitioning of functional units across tiers leads to significant improvements in functionality, area, performance, and power consumption. Managing the complexity of 3D design...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    An Optimized 3D-Stacked Memory Architecture by Exploiting Excessive, High-Density TSV Bandwidth

    Memory bandwidth has become a major performance bottleneck as more and more cores are integrated onto a single die, demanding more and more data from the system memory. Several prior studies have demonstrated that this memory bandwidth problem can be addressed by employing a 3D-stacked memory architecture, which provides a...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    Smart Refresh: An Enhanced Memory Controller Design for Reducing Energy in Conventional and 3D DieStacked DRAMs

    DRAMs require periodic refresh for preserving data stored in them. The refresh interval for DRAMs depends on the vendor and the design technology they use. For each refresh in a DRAM row, the stored information in each cell is read out and then written back to itself as each DRAM...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    Noise-Direct: A Technique for Power Supply Noise Aware Floorplanning Using Microarchitecture Profiling

    In this paper, the authors propose Noise-Direct, a design methodology for power integrity aware floorplanning, using microarchitectural feedback to guide module placement. Stringent power constraints have led microprocessor designers to incorporate aggressive power saving techniques such as clock-gating that place a significant burden on the power delivery network. While the...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2014

    DRAM Decay: Using Decay Counters to Reduce Energy Consumption in DRAMs

    Dynamic Random Access Memories (DRAMs) require periodic refresh for preserving data stored in them. The refresh interval for DRAMs depends on the vendor and the de-sign technology they use. For each refresh in a DRAM row, the stored information in each cell is read out and then writ-ten back to...

    Provided By Georgia Institute of Technology

  • White Papers // Sep 2013

    ClusterWatch: Flexible, Lightweight Monitoring for High-end GPGPU Clusters

    The ClusterWatch middleware provides runtime flexibility in what system-level metrics are monitored, how frequently such monitoring is done, and how metrics are combined to obtain reliable information about the current behavior of GPGPU clusters. Interesting attributes of ClusterWatch are the ease with which different metrics can be added to the...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2013

    An Infrastructure for Automating Large-scale Performance Studies and Data Processing

    The cloud has enabled the computing model to shift from traditional data centers to publicly shared computing infrastructure; yet, applications leveraging this new computing model can experience performance and scalability issues, which arise from the hidden complexities of the cloud. The most reliable path for better understanding these complexities is...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2013

    Oncilla: A GAS Runtime for Efficient Resource Allocation and Data Movement in Accelerated Cluster

    Accelerated and in-core implementations of big data applications typically require large amounts of host and accelerator memory as well as efficient mechanisms for transferring data to and from accelerators in heterogeneous clusters. Scheduling for heterogeneous CPU and GPU clusters has been investigated in depth in the High-Performance Computing (HPC) and...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2013

    Oncilla: A GAS Runtime for Efficient Resource Allocation and Data Movement in Accelerated Clusters

    Accelerated and in-core implementations of big data applications typically require large amounts of host and accelerator memory as well as efficient mechanisms for transferring data to and from accelerators in heterogeneous clusters. Scheduling for heterogeneous CPU and GPU clusters has been investigated in depth in the High-Performance Computing (HPC) and...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2013

    Secure Outsourced Garbled Circuit Evaluation for Mobile Devices

    Garbled circuits provide a powerful tool for jointly evaluating functions while preserving the privacy of each user's inputs. While recent research has made the use of this primitive more practical, such solutions generally assume that participants are symmetrically provisioned with massive computing resources. In reality, most people on the planet...

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2013

    Personal Clouds: Sharing and Integrating Networked Resources to Enhance End User Experiences

    End user experiences on mobile devices with their rich sets of sensors are constrained by limited device battery lives and restricted form factors, as well as by the 'scope' of the data available locally. The 'Personal Cloud' distributed software abstractions address these issues by enhancing the capabilities of a mobile...

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2013

    On Symmetric Encryption with Distinguishable Decryption Failures

    The authors propose to relax the assumption that decryption failures are indistinguishable in security models for symmetric encryption. Their main purpose is to build models that better reflect the reality of cryptographic implementations, and to surface the security issues that arise from doing so. They systematically explore the consequences of...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    Take This Personally: Pollution Attacks on Personalized Services

    Modern web services routinely personalize content to appeal to the specific interests, viewpoints, and contexts of individual users. Ideally, personalization allows sites to highlight information uniquely relevant to each of their users, thereby increasing user satisfaction - and, eventually, the service's bottom line. Unfortunately, as the authors demonstrate in this...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    An Automated Approach to Create, Store, and Analyze Large-scale Experimental Data in Clouds

    The flexibility and scalability of computing clouds make them an attractive application migration target; yet, the cloud remains a black-box for the most part. In particular, their opacity impedes the efficient but necessary testing and tuning prior to moving new applications into the cloud. A natural and presumably unbiased approach...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    FlexIO: Location-Flexible Execution of in Situ Data Analytics for Large Scale Scientific Applications

    Increasingly severe I/O bottlenecks on high-end computing machines are prompting scientists to process simulation output data while simulations are running and before placing data on disk - \"In situ\" and/or \"In-transit\". There are several options in placing in-situ data analytics along the I/O path: on compute nodes, on staging nodes...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    I/O Containers: Managing the Data Analytics and Visualization Pipelines of High End Codes

    Lack of I/O scalability is known to cause measurable slowdowns for large-scale scientific applications running on high end machines. This is prompting researchers to devise 'I/O staging' methods in which outputs are processed via online analysis and visualization methods to support desired science outcomes. Organized as online workflows and carried...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    A Study of the Effect of Partitioning on Parallel Simulation of Multicore Systems

    There has been little research that studies the effect of partitioning on parallel simulation of multicore systems. This paper presents their paper of this important problem in the context of null-message-based synchronization algorithm for parallel multicore simulation. This paper focuses on coarse grain parallel simulation where each core and its...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    Cloud Manufacturing: Drivers, Current Status, and Future Trends

    Cloud Manufacturing (CM) refers to a customer-centric manufacturing model that exploits on-demand access to a shared collection of diversified and distributed manufacturing resources to form temporary, reconfigurable production lines which enhance efficiency, reduce product lifecycle costs, and allow for optimal resource loading in response to variable-demand customer generated tasking. The...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Resolution-Aware Network Coded Storage

    In this paper, the authors show that coding can be used in Storage Area Networks (SANs) to improve various Quality of Service metrics under normal SAN operating conditions, without requiring additional storage space. For their analysis, they develop a model which captures modern characteristics such as constrained I/O access bandwidth...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Secure Cloud Storage Service with An Efficient DOKS Protocol

    Storage services based on public clouds provide customers with elastic storage and on-demand accessibility. However, moving data to remote cloud storage also raises privacy concerns. Cryptographic cloud storage and search over encrypted data have attracted attentions from both industry and academics. In this paper, the authors present a new approach...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Software-Controlled Transparent Management of Heterogeneous Memory Resources in Virtualized Systems

    This paper presents a software-controlled technique for managing the heterogeneous memory resources of next generation multicore platforms with fast 3D die-stacked memory and additional slow off-chip memory. Implemented for virtualized server systems, the technique detects the 'Hot' pages critical to program performance in order to then maintain them in the...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Efficient Trajectory Cover Search for Moving Object Trajectories

    Given a set of query locations and a set of query keywords, a Trajectory Cover (CT) query over a repository of mobile trajectories returns a minimal set of trajectories that maximally covers the query keywords and are also spatially close to the query locations. Processing CT queries over mobile trajectories...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Residency-Aware Virtual Machine Communication Optimization: Design Choices and Techniques

    Network I/O workloads are dominating in many data centers and cloud computing environments today. One way to improve inter Virtual Machine (VM) communication efficiency is to support co-resident VM communication by using shared memory based approaches and to resort to the traditional TCP/IP for inter-VM communications between VMs that are...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Performance Overhead Among Three Hypervisors: An Experimental Study using Hadoop Benchmarks

    Hypervisors are widely used in cloud environments and their impact on application performance has been a topic of significant research and practical interest. The authors conduct experimental measurements of several benchmarks using Hadoop MapReduce to evaluate and compare the performance impact of three popular hypervisors: a commercial hypervisor, Xen, and...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2013

    Residency Aware Inter-VM Communication in Virtualized Cloud: Performance Measurement and Analysis

    A known problem for virtualized cloud data centers is the inter-VM communication inefficiency for data transfer between co-resident VMs. Several engineering efforts have been made on building a shared memory based channel between co-resident VMs. The implementations differ in terms of whether user/program transparency, OS kernel transparency or VMM transparency...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2013

    SLIM: A Scalable Location-Sensitive Information Monitoring Service

    Location-sensitive information monitoring services are a centerpiece of the technology for disseminating content-rich information from massive data streams to mobile users. The key challenges for such monitoring services are characterized by the combination of spatial and non-spatial attributes being monitored and the wide spectrum of update rates. A typical example...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2013

    Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road?

    Mobile browsers are increasingly being relied upon to perform security sensitive operations. Like their desktop counterparts, these applications can enable SSL/TLS to provide strong security guarantees for communications over the web. However, the drastic reduction in screen size and the accompanying reorganization of screen real estate significantly changes the use...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2013

    Cloud-Based Information Technology Framework for Data Driven Intelligent Transportation Systems

    The authors present a novel cloud based IT framework, CloudTrack, for data driven intelligent transportation systems. They describe how the proposed framework can be leveraged for real-time fresh food supply tracking and monitoring. Cloud-Track allows efficient storage, processing and analysis of real-time location and sensor data collected from fresh food...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2013

    Optimizing Parallel Simulation of Multicore Systems Using Domain-Specific Knowledge

    In this paper the authors present two optimization techniques for the basic null-message algorithm in the context of parallel simulation of multicore computer architectures. Unlike the general, application-independent optimization methods, these are application-specific optimizations that make use of system properties of the simulation application. They demonstrate in two aspects that...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2013

    OpenCL Performance Evaluation on Modern Multi Core CPUs

    Utilizing heterogeneous platforms for computation has become a general trend making the portability issue important. OpenCL (Open Computing Language) serves the purpose by enabling portable execution on heterogeneous architectures. However, unpredictable performance variation on different platforms has become a burden for programmers who write OpenCL programs. This is especially true...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2013

    The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers

    Much of the attention surrounding mobile malware has focused on the in-depth analysis of malicious applications. While bringing the community valuable information about the methods used and data targeted by malware writers, such work has not yet been able to quantify the prevalence with which mobile devices are actually infected....

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2014

    Improving MapReduce Performance in a Heterogeneous Cloud: A Measurement Study

    Hybrid clouds, geo-distributed cloud and continuous upgrades of computing, storage and networking resources in the cloud have driven datacenters evolving towards heterogeneous clusters. Unfortunately, most of MapReduce implementations are designed for homogeneous computing environments and perform poorly in heterogeneous clusters. Although a fair of research efforts have dedicated to improve...

    Provided By Georgia Institute of Technology

  • White Papers // Sep 2012

    A Fast and Transparent Communication Protocol for Co-Resident Virtual Machines

    Network I/O workloads are dominating in most of the cloud data centers today. One way to improve inter-VM communication efficiency is to support co-resident VM communication using a faster communication protocol than the traditional TCP/IP commonly used for inter-VM communications regardless whether VMs are located on the same physical host...

    Provided By Georgia Institute of Technology

  • White Papers // Oct 2012

    Performance Impact of Virtual Machine Placement in a Datacenter

    Virtualization technology adoption continues to grow in the enterprise segments across all types of workloads such as web hosting, data centers and even desktop computing. The emergence of Chip Multi-Processors (CMP) and the continuous increase in the number of cores in today's CMP architecture provide more hardware parallelism in a...

    Provided By Georgia Institute of Technology

  • White Papers // Sep 2012

    VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security

    Porting browsers to mobile platforms may lead to new vulnerabilities whose solutions require careful balancing between usability and security and might not always be equivalent to those in desktop browsers. In this paper, the authors perform the first large-scale security comparison between mobile and desktop browsers. They focus their efforts...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2013

    Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road?

    Mobile browsers are increasingly being relied upon to perform security sensitive operations. Like their desktop counterparts, these applications can enable SSL/TLS to provide strong security guarantees for communications over the web. However, the drastic reduction in screen size and the accompanying reorganization of screen real estate significantly changes the use...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2013

    Secure Outsourced Garbled Circuit Evaluation for Mobile Devices

    Garbled circuits provide a powerful tool for jointly evaluating functions while preserving the privacy of each user's inputs. While recent research has made the use of this primitive more practical, such solutions generally assume that participants are symmetrically provisioned with massive computing resources. In reality, most people on the planet...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2013

    The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers

    Much of the attention surrounding mobile malware has focused on the in-depth analysis of malicious applications. While bringing the community valuable information about the methods used and data targeted by malware writers, such work has not yet been able to quantify the prevalence with which mobile devices are actually infected....

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2011

    A Queueing-based Model for Performance Management on Cloud

    Cloud computing is a new trend for computing resource provision. Many public clouds are available for developers to transfer or build web applications on cloud. As a result, the computing resource scheduling and performance managing have been ones of the most important aspects of clouding computing. In this paper, the...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2014

    Road-Network Aware Trajectory Clustering: Integrating Locality, Flow and Density

    Mining trajectory data has been gaining significant interest in recent years. However, existing approaches to trajectory clustering are mainly based on density and Euclidean distance measures. The authors argue that when the utility of spatial clustering of mobile object trajectories is targeted at road-network aware location-based applications, density and Euclidean...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2013

    SLIM: A Scalable Location-Sensitive Information Monitoring Service

    Location-sensitive information monitoring services are a centerpiece of the technology for disseminating content-rich information from massive data streams to mobile users. The key challenges for such monitoring services are characterized by the combination of spatial and non-spatial attributes being monitored and the wide spectrum of update rates. A typical example...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2013

    An Infrastructure for Automating Large-scale Performance Studies and Data Processing

    The cloud has enabled the computing model to shift from traditional data centers to publicly shared computing infrastructure; yet, applications leveraging this new computing model can experience performance and scalability issues, which arise from the hidden complexities of the cloud. The most reliable path for better understanding these complexities is...

    Provided By Georgia Institute of Technology

  • White Papers // May 2012

    Accelerating Multi-threaded Application Simulation Through Barrier-Interval Time-Parallelism

    In the last decade, the microprocessor industry has undergone a dramatic change, ushering in the new era of multi-/manycore processors. As new designs incorporate increasing core counts, simulation technology has not matched pace, resulting in simulation times that increasingly dominate the design cycle. Complexities associated with the execution of code...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2011

    Energy Efficient Phase Change Memory Based Main Memory for Future High Performance Systems

    Phase Change Memory (PCM) has recently attracted a lot of attention as a scalable alternative to DRAM for main memory systems. As the need for high-density memory increases, DRAM has proven to be less attractive from the point of view of scaling and energy consumption. PCM-only memories suffer from latency...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2009

    Length Adaptive Processors: A Solution for the Energy/Performance Dilemma in Embedded Systems

    Embedded-handheld devices are the predominant computing platform today. These devices are required to perform complex tasks yet run on batteries. Some architects use ASICs to combat this energy-performance dilemma. Even though they are efficient in solving this problem, ASICs are very inflexible. Thus, it is necessary for a general purpose...

    Provided By Georgia Institute of Technology

  • White Papers // Oct 2012

    Designing Configurable, Modifiable And Reusable Components for Simulation of Multicore Systems

    A simulation system for modern multicore architectures is composed of various component models. For such a system to be useful for research purposes, modifiability is a key quality attribute. Users, when building a simulation model, need to have the capability to adjust various aspects of a component, or even replace...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2013

    High-Speed Formal Verification of Heterogeneous Coherence Hierarchies

    As more heterogeneous architecture solutions continue to emerge, coherence solutions tailored for these architectures will become mandatory. Coherence hierarchies will likely continue to be prevalent in future large-scale shared memory architectures. However, past experience has shown that hierarchical coherence protocol design is a non-trivial problem, especially when considering the verification...

    Provided By Georgia Institute of Technology

  • White Papers // May 2012

    Extrapolation Pitfalls When Evaluating Limited Endurance Memory

    Many new non-volatile memory technologies have been considered as a future scalable alternative to DRAM. Memory technologies such as MRAM, FeRAM, PCM have emerged as the most viable alternatives. But these memories have limited wear endurance. Practically realizable main memory systems employing these memory technologies are possible only if the...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2006

    M-TREE:A High Efficiency Security Architecture for Protecting Integrity and Privacy of Software

    Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing environments that are immune to both physical and software attacks. Despite a number of secure processor designs have been proposed, they typically made trade-offs between security...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2012

    Trust No One Else: Detecting MITM Attacks Against SSL/TLS Without Third-Parties

    The security guarantees provided by SSL/TLS depend on the correct authentication of servers through certificates signed by a trusted authority. However, as recent incidents have demonstrated, trust in these authorities is not well placed. Increasingly, certificate authorities (by coercion or compromise) have been creating forged certificates for a range of...

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2014

    Algorithmic Time, Energy, and Power on Candidate HPC Compute Building Blocks

    The authors conducted a micro-benchmarking study of the time, energy, and power of computation and memory access on several existing platforms. These platforms represent candidate compute-node building blocks of future high-performance computing systems. Their analysis uses the \"Energy roofline\" model, developed in prior work, which they extend in two ways....

    Provided By Georgia Institute of Technology

  • White Papers // Nov 2008

    Qilin: Exploiting Parallelism on Heterogeneous Multiprocessors with Adaptive Mapping

    Heterogeneous multiprocessors are growingly important in the multi-core era due to their potential for high performance and energy efficiency. In order for software to fully realize this potential, the step that maps computations to processing elements must be as automated as possible. However, the state-of-the-art approach is to rely on...

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2011

    Synthetic Workload Generation for Cloud Computing Applications

    In this paper, the authors present techniques for characterization, modeling and generation of workloads for cloud computing applications. Methods for capturing the workloads of cloud computing applications in two different models - benchmark application and workload models are described. They give the design and implementation of a synthetic workload generator...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2013

    Cloud Implications on Software Network Structure and Security Risks

    By software vendors offering, via the cloud, Software-as-a-Service (SaaS) versions of traditionally on-premises products, security risks associated with software usage become more diversified which can greatly increase the value associated with network software. In an environment where negative security externalities are present and users make complex consumption and patching decisions,...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2014

    A Measure of Heterogeneity in Multi-Agent Systems

    Heterogeneous multi-agent systems have previously been studied and deployed to solve a number of different tasks. Despite this, the users still lack a basic understanding of just what \"Heterogeneity\" really is. For example, what makes one team of agents more heterogeneous than another? In this paper, the authors address this...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2013

    Cloud-Based Information Technology Framework for Data Driven Intelligent Transportation Systems

    The authors present a novel cloud based IT framework, CloudTrack, for data driven intelligent transportation systems. They describe how the proposed framework can be leveraged for real-time fresh food supply tracking and monitoring. Cloud-Track allows efficient storage, processing and analysis of real-time location and sensor data collected from fresh food...

    Provided By Georgia Institute of Technology

  • White Papers // Nov 2011

    Efficient Oblivious Computation Techniques for Privacy-Preserving Mobile Applications

    The growth of Smartphone capability has led to an explosion of new applications. Many of the most useful apps use context-sensitive data, such as GPS location or social network information. In this paper, the authors take this concept to its logical extreme with Efficient Mobile Oblivious Computation (EMOC), a technique...

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2011

    Aircraft Proximity Maps Based on Data-Driven Flow Modeling

    With the forecast increase in air traffic demand over the next decades, it is imperative to develop tools to provide traffic flow managers with the information required to support decision making. In particular, decision-support tools for traffic flow management should aid in limiting controller workload and complexity, while supporting increases...

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2012

    Under New Management: Practical Attacks on SNMPv3

    Network monitoring is a necessity for both reducing downtime and ensuring rapid response in the case of software or hardware failure. Unfortunately, one of the most widely used protocols for monitoring networks, the Simple Network Management Protocol (SNMPv3), does not offer an acceptable level of confidentiality or integrity for these...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    Cloud Manufacturing: Drivers, Current Status, and Future Trends

    Cloud Manufacturing (CM) refers to a customer-centric manufacturing model that exploits on-demand access to a shared collection of diversified and distributed manufacturing resources to form temporary, reconfigurable production lines which enhance efficiency, reduce product lifecycle costs, and allow for optimal resource loading in response to variable-demand customer generated tasking. The...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    Take This Personally: Pollution Attacks on Personalized Services

    Modern web services routinely personalize content to appeal to the specific interests, viewpoints, and contexts of individual users. Ideally, personalization allows sites to highlight information uniquely relevant to each of their users, thereby increasing user satisfaction - and, eventually, the service's bottom line. Unfortunately, as the authors demonstrate in this...

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2013

    Technical Support and Service Demand: Evidence From the Cloud

    The authors study how a provider's technical support influences service demand in a business-to-business setting. The provider offers two levels of support, basic and full, reflecting its involvement with the buyer in co-producing the service. Using a unique nano-data set on public cloud infrastructure services consumption by 20,298 firms from...

    Provided By Georgia Institute of Technology

  • White Papers // Sep 2012

    Net-Cohort: Detecting and Managing VM Ensembles in Virtualized Data Centers

    Bi-section bandwidth is a critical resource in today's data centers because of the high cost and limited bandwidth of higher-level network switches and routers. This problem is aggravated in virtualized environments where a set of virtual machines, jointly implementing some service, may run across multiple L2 hops. Since data center...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2013

    User Controllable Security and Privacy for Mobile Mashups

    A new paradigm in the domain of mobile applications is 'Mobile mashups', where Web content rendered on a mobile browser is amalgamated with data and features available on the device, such as user location, calendar information and camera. Although a number of frameworks exist that enable creation and execution of...

    Provided By Georgia Institute of Technology

  • White Papers // Sep 2013

    ClusterWatch: Flexible, Lightweight Monitoring for High-end GPGPU Clusters

    The ClusterWatch middleware provides runtime flexibility in what system-level metrics are monitored, how frequently such monitoring is done, and how metrics are combined to obtain reliable information about the current behavior of GPGPU clusters. Interesting attributes of ClusterWatch are the ease with which different metrics can be added to the...

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2012

    Efficient Relational Algebra Algorithms and Data Structures for GPU

    Relational databases remain an important application domain for organizing and analyzing the massive volume of data generated as sensor technology, retail and inventory transactions, social media, computer vision, and new fields continue to evolve. At the same time, processor architectures are beginning to shift towards hierarchical and parallel architectures employing...

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2013

    Personal Clouds: Sharing and Integrating Networked Resources to Enhance End User Experiences

    End user experiences on mobile devices with their rich sets of sensors are constrained by limited device battery lives and restricted form factors, as well as by the 'scope' of the data available locally. The 'Personal Cloud' distributed software abstractions address these issues by enhancing the capabilities of a mobile...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    FlexIO: Location-Flexible Execution of in Situ Data Analytics for Large Scale Scientific Applications

    Increasingly severe I/O bottlenecks on high-end computing machines are prompting scientists to process simulation output data while simulations are running and before placing data on disk - \"In situ\" and/or \"In-transit\". There are several options in placing in-situ data analytics along the I/O path: on compute nodes, on staging nodes...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    I/O Containers: Managing the Data Analytics and Visualization Pipelines of High End Codes

    Lack of I/O scalability is known to cause measurable slowdowns for large-scale scientific applications running on high end machines. This is prompting researchers to devise 'I/O staging' methods in which outputs are processed via online analysis and visualization methods to support desired science outcomes. Organized as online workflows and carried...

    Provided By Georgia Institute of Technology

  • White Papers // Sep 2012

    VScope: Middleware for Troubleshooting Time-Sensitive Data Center Applications

    Data-intensive infrastructures are increasingly used for on-line processing of live data to guide operations and decision making. VScope is a flexible monitoring and analysis middleware for trouble-shooting such large-scale, time-sensitive, multi-tier applications. With VScope, lightweight anomaly detection and interaction tracking methods can be run continuously throughout an application's execution. The...

    Provided By Georgia Institute of Technology

  • White Papers // Dec 2008

    A HyperTransport-Enabled Global Memory Model for Improved Memory Efficiency

    Modern and emerging data centers are presenting unprecedented demands in terms of cost and energy consumption, far outpacing architectural advances related to economies of scale. Consequently, blade designs exhibit significant cost and power inefficiencies, particularly in the memory system. For example, the authors observe that modern blades are often over-provisioned...

    Provided By Georgia Institute of Technology