North Carolina State University

Displaying 1-40 of 236 results

  • White Papers // Feb 2014

    Automatic Identification of Application I/O Signatures from Noisy Server-Side Traces

    Competing workloads on a shared storage system cause I/O resource contention and application performance vagaries. This problem is already evident in today's HPC storage systems and is likely to become acute at exascale. The authors need more interaction between application I/O requirements and system software tools to help alleviate the...

    Provided By North Carolina State University

  • White Papers // Jan 2014

    IPSec/VPN Security Policy: Correctness, Conflict Detection and Resolution

    IPSec (Internet Security Protocol suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inefficient and error-prone. An erroneous policy could lead to communication blockade or serious security breach. In addition, even if policies are specified correctly in each domain,...

    Provided By North Carolina State University

  • White Papers // Nov 2013

    PAQO: Preference-Aware Query Optimization for Decentralized Database Systems

    The declarative nature of SQL has traditionally been a major strength. Users simply state what information they are interested in, and the database management system determines the best plan for retrieving it. A consequence of this model is that should a user ever want to specify some aspect of how...

    Provided By North Carolina State University

  • White Papers // Sep 2013

    WHYPER: Towards Automating Risk Assessment of Mobile Applications

    In this paper, the authors present the first step in addressing this challenge. Specifically, they focus on permissions for a given application and examine whether the application description provides any indication for: why the application needs permission. They present WHYPER, a framework using Natural Language Processing (NLP) techniques to identify...

    Provided By North Carolina State University

  • White Papers // Jun 2013

    MetaSymploit: Day-One Defense Against Script-Based Attacks with Security-Enhanced Symbolic Analysis

    In this paper, the authors propose MetaSymploit, the first system of fast attack script analysis and automatic signature generation for a network Intrusion Detection System (IDS). As soon as a new attack script is developed and distributed, MetaSymploit uses security-enhanced symbolic execution to quickly analyze the script and automatically generate...

    Provided By North Carolina State University

  • White Papers // Mar 2013

    Reasonableness Meets Requirements: Regulating Security and Privacy in Software

    Software security and privacy issues regularly grab headlines amid fears of identity theft, data breaches, and threats to security. Policymakers have responded with a variety of approaches to combat such risk. Suggested measures include promulgation of strict rules, enactment of open-ended standards, and, at times, abstention in favor of allowing...

    Provided By North Carolina State University

  • White Papers // Feb 2013

    Taming Hosted Hypervisors With (Mostly) Deprivileged Execution

    Recent years have witnessed increased adoption of hosted hypervisors in virtualized computer systems. By non-intrusively extending commodity OSs, hosted hypervisors can effectively take advantage of a variety of mature and stable features as well as the existing broad user base of commodity OSs. However, virtualizing a computer system is still...

    Provided By North Carolina State University

  • White Papers // Feb 2013

    Directory-Oblivious Capacity Sharing in Tiled CMPs

    In bus-based CMPs with private caches, Capacity Sharing is applied by spilling victim cache blocks from over-utilized caches to under-utilized ones. If a spilled block is needed, it can be retrieved by posting a miss on the bus. Prior work in this domain focused on Capacity Sharing design and put...

    Provided By North Carolina State University

  • White Papers // Jan 2013

    Flexible Capacity Partitioning in Many-Core Tiled CMPs

    Chip Multi-Processors (CMP) have become a mainstream computing platform. As transistor density shrinks and the number of cores increases, more scalable CMP architectures will emerge. Recently, tiled architectures have shown such scalable characteristics and been used in many industry chips. The memory hierarchy in tiled architectures presents interesting design challenges....

    Provided By North Carolina State University

  • White Papers // Jan 2013

    QuickSense: Fast and Energy-Efficient Channel Sensing for Dynamic Spectrum Access Networks

    Spectrum sensing, the task of discovering spectrum usage at a given location, is a fundamental problem in dynamic spectrum access networks. While sensing in narrow spectrum bands is well studied in previous work, wideband spectrum sensing is challenging since a wideband radio is generally too expensive and power consuming for...

    Provided By North Carolina State University

  • White Papers // Jan 2013

    Characterizing Link Connectivity for Opportunistic Mobile Networking: Does Mobility Suffice?

    With recent drastic growth in the number of users carrying smart mobile devices, it is not hard to envision opportunistic ad-hoc communications taking place with such devices carried by humans. This leads to, however, a new challenge to the conventional link-level metrics, solely defined based on user mobility, such as...

    Provided By North Carolina State University

  • White Papers // Jan 2013

    Modeling Flexible Business Processes

    Current approaches of designing business processes rely on traditional workflow technologies and thus take a logically centralized view of processes. Processes designed in that manner assume the participants will act as invoked, thus limiting their flexibility or autonomy. Flexibility is in conflict with both reusability and compliance. The authors propose...

    Provided By North Carolina State University

  • White Papers // Jan 2013

    A Semantic Protocol-Based Approach for Developing Business Processes

    A (business) protocol is a modular, public specification of an interaction among different roles that achieves a desired purpose. The authors' model protocols in terms of the commitments of the participating roles. Commitments enable reasoning about actions, thus allowing the participants to comply with protocols while acting flexibly to exploit...

    Provided By North Carolina State University

  • White Papers // Dec 2012

    Scheduling Cloud Capacity for Time-Varying Customer Demand

    As utility computing resources become more ubiquitous, service providers increasingly look to the cloud for an in-full or in-part infrastructure to serve utility computing customers on demand. Given the costs associated with cloud infrastructure, dynamic scheduling of cloud resources can significantly lower costs while providing an acceptable service level. The...

    Provided By North Carolina State University

  • White Papers // Nov 2012

    On the Accurate Identification of Network Service Dependencies in Distributed Systems

    The automated identification of network service dependencies remains a challenging problem in the administration of large distributed systems. Advances in developing solutions for this problem have immediate and tangible benefits to operators in the field. When the dependencies of the services in a network are better-understood, planning for and responding...

    Provided By North Carolina State University

  • White Papers // Oct 2012

    HadISD: A Quality-Controlled Global Synoptic Report Database for Selected Variables at Long-Term Stations From 1973 - 2011

    In this paper, the authors describes the creation of HadISD: an automatically quality-controlled synoptic resolution dataset of temperature, dewpoint temperature, sea-level pressure, wind speed, wind direction and cloud cover from global weather stations for 1973 - 2011. The full dataset consists of over 6000 stations, with 3427 long-term stations deemed...

    Provided By North Carolina State University

  • White Papers // Sep 2012

    Collaborative Assessment of Functional Reliability in Wireless Networks

    Nodes that are part of a multi-hop wireless network, typically deployed in mission critical settings, are expected to perform specific functions. Establishing a notion of reliability of the nodes with respect to each function (referred to as Functional Reliability or FR) is essential for efficient operations and management of the...

    Provided By North Carolina State University

  • White Papers // Sep 2012

    Is Link Signature Dependable for Wireless Security?

    Link signature, which refers to the unique and reciprocal wireless channel between a pair of transceivers, has gained significant attentions recently due to its effectiveness in signal authentication and shared secret construction for various wireless applications. A fundamental assumption of this technique is that the wireless signals received at two...

    Provided By North Carolina State University

  • White Papers // Sep 2012

    An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks

    The authors consider the Virtual Topology and Traffic Routing (VTTR) problem, a sub-problem of traffic grooming that arises as a fundamental network design problem in optical networks. The objective of VTTR is to determine the minimum number of light-paths so as to satisfy a set of traffic demands, and does...

    Provided By North Carolina State University

  • White Papers // Sep 2012

    Scalable Optimal Traffic Grooming in WDM Rings Incorporating Fast RWA Formulation

    The authors present a scalable formulation for the traffic grooming problem in WDM ring networks. Specifically, they modify the ILP formulation to replace the constraints related to Routing and Wavelength Assignment (RWA), typically based on a link approach, with a new set of constraints based on the Maximal Independent Set...

    Provided By North Carolina State University

  • White Papers // Sep 2012

    Reducing Data Movement Costs Using Energy-Efficient, Active Computation on SSD

    Modern scientific discovery often involves running complex application simulations on supercomputers, followed by a sequence of data analysis tasks on smaller clusters. This offline approach suffers from significant data movement costs such as redundant I/O, storage bandwidth bottleneck, and wasted CPU cycles, all of which contribute to increased energy consumption...

    Provided By North Carolina State University

  • White Papers // Aug 2012

    Network Virtualization: Technologies, Perspectives, and Frontiers

    Network virtualization refers to a broad set of technologies. Commercial solutions have been offered by the industry for years, while more recently the academic community has emphasized virtualization as an enabler for network architecture research, deployment, and experimentation. The authors review the entire spectrum of relevant approaches with the goal...

    Provided By North Carolina State University

  • White Papers // Aug 2012

    A Fast Path-Based ILP Formulation for Offline RWA in Mesh Optical Networks

    RWA is a fundamental problem in the design and control of optical networks. The authors introduce the concept of symmetric RWA solutions and present a new ILP formulation to construct optimally such solutions. The formulation scales to mesh topologies representative of backbone and regional networks. Numerical results demonstrate that the...

    Provided By North Carolina State University

  • White Papers // Jul 2012

    Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations

    JavaScript-based applications are very popular on the web today. However, the lack of effective protection makes various kinds of privacy violation attack possible, including cookie stealing, history sniffing and behavior tracking. There have been studies of the prevalence of such attacks, but the dynamic nature of the JavaScript language makes...

    Provided By North Carolina State University

  • White Papers // Jun 2012

    From Glauber Dynamics to Metropolis Algorithm: Smaller Delay in Optimal CSMA

    Since the seminal work by Tassiulas and Ephremides on throughput-optimal scheduling, referred to as Max-Weight, a huge array of research has been made to develop distributed MAC scheduling with high performance guarantee and low complexity. The tradeoff between complexity and efficiency has been, however, observed in many cases, or even...

    Provided By North Carolina State University

  • White Papers // May 2012

    Geo-Dissemination in Vehicular Ad Hoc Networks

    Vehicular Ad hoc NETworks (VANETs) aim to improve road safety and convenience through vehicle-to-vehicle and vehicle-to-roadside communications. Traffic information and accident warnings are often disseminated to vehicles in certain areas where driving could be affected by hazardous situations. Such message dissemination with destinations confined in specific geographic regions is referred...

    Provided By North Carolina State University

  • White Papers // May 2012

    Balancing Network Connectivity and the Life-Time of Sensors Through Percolation and Consensus

    Due to replacement infeasibility, methods to extend the life-time of sensors have been an issue in Wireless Sensor Networks (WSNs) and these should consider network connectivity simultaneously. Controlling the sleep/awake of sensors is one simple way to reduce their energy consumption. However, this causes a network connectivity degradation by varying...

    Provided By North Carolina State University

  • White Papers // May 2012

    On the Connectivity of Large Multi-Channel Cognitive Radio Networks

    Cognitive Radio Networks (CRNs) have become promising network components to improve spectrum utilization efficiency, where secondary (unlicensed) users exploit spectrum opportunistically without interfering with the coexisting primary users. A challenging yet open question is how to ensure that information can be disseminated to the entire CRN, which is a prerequisite...

    Provided By North Carolina State University

  • White Papers // May 2012

    Communication Theory Perspective on Antenna Selection for Compact Transceivers

    Traditional antenna selection applied to MIMO systems ignores the presence of unselected (or inactive) antennas. However, compact arrays offer a unique advantage in that mutual coupling can be exploited to improve the system performance. Previous studies on selection with coupling have not considered the effects of the inactive-antenna terminations and...

    Provided By North Carolina State University

  • White Papers // May 2012

    Fundamental Capacity Limits on Compact MIMO-OFDM Systems

    The authors undertake an information-theoretic approach to characterize the optimal design of a broadband multi-antenna system in the presence of mutual coupling. It was shown recently that mutual coupling effectively decomposes otherwise spectrally identical spatial modes of an antenna array into spectrally non-identical eigen-modes. They shall use Shannon's information theory...

    Provided By North Carolina State University

  • White Papers // May 2012

    Enabling Adaptive Rate and Relay Selection for 802.11 Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANETs) are self-configuring wireless networks that lack permanent infrastructure and are formed among mobile nodes on demand. Rapid node mobility results in dramatic channel variation, or fading, that degrades MANET performance. Employing Channel State Information (CSI) at the transmitter can improve the throughput of routing and...

    Provided By North Carolina State University

  • White Papers // May 2012

    An Algorithm for Joint Guidance and Power Control for Electric Vehicles in the Smart Grid

    A massive amount of energy consumption currently stems from the transportation sector. Therefore, improvements in power usage by commuting vehicles are being studied and becoming an increasingly popular research topic. In particular, there is a growing need to model the envisioned smart infrastructure, including charging stations, some of which might...

    Provided By North Carolina State University

  • White Papers // May 2012

    Understanding the Limits of Capacity Sharing in CMP Private Caches

    Chip Multi Processor (CMP) systems present interesting design challenges at the lower levels of the cache hierarchy. Private L2 caches allow easier processor-cache design reuse, thus scaling better than a system with a shared L2 cache, while offering better performance isolation and lower access latency. While some private cache management...

    Provided By North Carolina State University

  • White Papers // May 2012

    Efficient Intranode Communication in GPU-Accelerated Systems

    Current implementations of MPI are unaware of accelerator memory (i.e., GPU device memory) and require programmers to explicitly move data between memory spaces. This approach is inefficient, especially for intranode communication where it can result in several extra copy operations. In this paper, the authors integrate GPU-awareness into a popular...

    Provided By North Carolina State University

  • White Papers // Apr 2012

    PREPARE: Predictive Performance Anomaly Prevention for Virtualized Cloud Systems

    Virtualized cloud systems are prone to performance anomalies due to various reasons such as resource contentions, software bugs, and hardware failures. In this paper, the authors present a novel PREdictive Performance Anomaly pREvention (PREPARE) system that provides automatic performance anomaly prevention for virtualized cloud computing infrastructures. PREPARE integrates online anomaly...

    Provided By North Carolina State University

  • White Papers // Apr 2012

    Beyond Random Walk and Metropolis-Hastings Samplers: Why You Should Not Backtrack for Unbiased Graph Sampling

    Graph sampling via crawling has been actively considered as a generic and important tool for collecting uniform node samples so as to consistently estimate and uncover various characteristics of complex networks. The so-called Simple Random Walk with re-weighting (SRW-rw) and Metropolis-Hastings (MH) algorithm have been popular in the literature for...

    Provided By North Carolina State University

  • White Papers // Apr 2012

    Advertising Cached Contents in the Control Plane: Necessity and Feasibility

    A key feature of Information-Centric Networking architectures is universal caching where anyone can cache any content and users can obtain the content from anywhere as long as the content itself is intact. This powerful feature benefits the content providers, the Internet Service Providers (ISPs) as well as end users since...

    Provided By North Carolina State University

  • White Papers // Mar 2012

    Inferring Method Specifications From Natural Language API Descriptions

    Application Programming Interface (API) documents are a typical way of describing legal usage of reusable software libraries, thus facilitating software reuse. However, even with such documents, developers often overlook some documents and build software systems that are inconsistent with the legal usage of those libraries. Existing software verification tools require...

    Provided By North Carolina State University

  • White Papers // Mar 2012

    Making Exceptions on Exception Handling

    The exception-handling mechanism has been widely adopted to deal with exception conditions that may arise during program executions. To produce high-quality programs, developers are expected to handle these exception conditions and take necessary recovery or resource-releasing actions. Failing to handle these exception conditions can lead to not only performance degradation,...

    Provided By North Carolina State University

  • White Papers // Mar 2012

    Isolating Failure-Inducing Combinations in Combinatorial Testing Using Test Augmentation and Classification

    Combinatorial Testing (CT) is a systematic way of sampling input parameters of the Software Under Test (SUT). A t-way combinatorial test set can exercise all behaviors of the SUT caused by interactions between t input parameters or less. Although combinatorial testing can provide fault detection capability, it is often desirable...

    Provided By North Carolina State University

  • White Papers // Sep 2012

    Reducing Data Movement Costs Using Energy-Efficient, Active Computation on SSD

    Modern scientific discovery often involves running complex application simulations on supercomputers, followed by a sequence of data analysis tasks on smaller clusters. This offline approach suffers from significant data movement costs such as redundant I/O, storage bandwidth bottleneck, and wasted CPU cycles, all of which contribute to increased energy consumption...

    Provided By North Carolina State University

  • White Papers // Nov 2012

    On the Accurate Identification of Network Service Dependencies in Distributed Systems

    The automated identification of network service dependencies remains a challenging problem in the administration of large distributed systems. Advances in developing solutions for this problem have immediate and tangible benefits to operators in the field. When the dependencies of the services in a network are better-understood, planning for and responding...

    Provided By North Carolina State University

  • White Papers // Jan 2013

    Characterizing Link Connectivity for Opportunistic Mobile Networking: Does Mobility Suffice?

    With recent drastic growth in the number of users carrying smart mobile devices, it is not hard to envision opportunistic ad-hoc communications taking place with such devices carried by humans. This leads to, however, a new challenge to the conventional link-level metrics, solely defined based on user mobility, such as...

    Provided By North Carolina State University

  • White Papers // Jun 2012

    From Glauber Dynamics to Metropolis Algorithm: Smaller Delay in Optimal CSMA

    Since the seminal work by Tassiulas and Ephremides on throughput-optimal scheduling, referred to as Max-Weight, a huge array of research has been made to develop distributed MAC scheduling with high performance guarantee and low complexity. The tradeoff between complexity and efficiency has been, however, observed in many cases, or even...

    Provided By North Carolina State University

  • White Papers // Sep 2012

    Scalable Optimal Traffic Grooming in WDM Rings Incorporating Fast RWA Formulation

    The authors present a scalable formulation for the traffic grooming problem in WDM ring networks. Specifically, they modify the ILP formulation to replace the constraints related to Routing and Wavelength Assignment (RWA), typically based on a link approach, with a new set of constraints based on the Maximal Independent Set...

    Provided By North Carolina State University

  • White Papers // Sep 2012

    An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks

    The authors consider the Virtual Topology and Traffic Routing (VTTR) problem, a sub-problem of traffic grooming that arises as a fundamental network design problem in optical networks. The objective of VTTR is to determine the minimum number of light-paths so as to satisfy a set of traffic demands, and does...

    Provided By North Carolina State University

  • White Papers // Jul 2011

    Evaluation of SIP Proxy Server Performance: Packet-Level Measurements and Queuing Model

    The growing number of applications that use the Session Initiation Protocol (SIP) to manage media sessions over IP is placing increasing demands on the SIP Proxy Servers (SPS) that make up the core of the SIP network. In this paper, the authors investigate the performance of OpenSIPS, an open source...

    Provided By North Carolina State University

  • White Papers // Jan 2013

    Flexible Capacity Partitioning in Many-Core Tiled CMPs

    Chip Multi-Processors (CMP) have become a mainstream computing platform. As transistor density shrinks and the number of cores increases, more scalable CMP architectures will emerge. Recently, tiled architectures have shown such scalable characteristics and been used in many industry chips. The memory hierarchy in tiled architectures presents interesting design challenges....

    Provided By North Carolina State University

  • White Papers // Feb 2012

    Evaluating Dynamics and Bottlenecks of Memory Collaboration in Cluster Systems

    With the fast development of highly-integrated distributed systems (cluster systems), designers face interesting memory hierarchy design choices while attempting to avoid the notorious disk swapping. Swapping to the free remote memory through Memory Collaboration has demonstrated its cost-effectiveness compared to over-provisioning the cluster for peak load requirements. Recent memory collaboration...

    Provided By North Carolina State University

  • White Papers // Feb 2012

    Data Sharing in MultiThreaded Applications and Its Impact on Chip Design

    Analytical modeling is becoming an increasingly important technique used in the design of chip multiprocessors. Most such models assume multi-programmed workload mixes and either ignore or oversimplify the behavior of multi-threaded applications. In particular, data sharing observed in multi-threaded applications, and its impact on chip design decisions, has not been...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    Impact of Data Sharing on CMP Design: A Study Based on Analytical Modeling

    Over the past few years, Chip Multi Processor (CMP) architecture has become the dominating hardware architecture across a spectrum of computing machinery - personal computing devices, workstations, commercial and scientific servers, and warehouse scale computers. The sheer complexity involved in the design and verification of each unit in a CMP...

    Provided By North Carolina State University

  • White Papers // Dec 2010

    Architectural Framework for Supporting Operating System Survivability

    The ever increasing size and complexity of Operating System (OS) kernel code bring an inevitable increase in the number of security vulnerabilities that can be exploited by attackers. A successful security attack on the kernel has a profound impact that may affect all processes running on it. In this paper,...

    Provided By North Carolina State University

  • White Papers // Dec 2009

    Defining Anomalous Behavior for Phase Change Memory

    Traditional memory systems based on memory technologies such as DRAM are fast approaching their cost and power limits. Alternative memory technologies such as Phase Change Memory (PCM) are being widely researched as a scalable, cost- and power-efficient alternative for DRAM. However, a PCM memory cell has a limited endurance of...

    Provided By North Carolina State University

  • White Papers // May 2012

    Understanding the Limits of Capacity Sharing in CMP Private Caches

    Chip Multi Processor (CMP) systems present interesting design challenges at the lower levels of the cache hierarchy. Private L2 caches allow easier processor-cache design reuse, thus scaling better than a system with a shared L2 cache, while offering better performance isolation and lower access latency. While some private cache management...

    Provided By North Carolina State University

  • White Papers // Aug 2009

    SHIELDSTRAP: Making Secure Processors Truly Secure

    Many systems may have security requirements such as protecting the privacy of data and code stored in the system, ensuring integrity of computations, or preventing the execution of unauthorized code. It is becoming increasingly difficult to ensure such protections as hardware-based attacks, in addition to software attacks, become more widespread...

    Provided By North Carolina State University

  • White Papers // Sep 2009

    Memory Management Thread for Heap Allocation Intensive Sequential Applications

    Dynamic memory management is one of the most ubiquitous and expensive operations in many C/C++ applications. Some C/C++ programs might spend up to one third of their execution time in dynamic memory management routines. With multicore processors as a mainstream architecture, it is important to investigate how dynamic memory management...

    Provided By North Carolina State University

  • White Papers // Jun 2009

    SHIELDSTRAP: A Secure Bootstrap Architecture

    Many systems may have security requirements such as protecting the privacy of data and code stored in the system, ensuring integrity of computations, or preventing the execution of unauthorized code. It is becoming increasingly difficult to ensure such protections as hardware-based attacks, in addition to software attacks, become more widespread...

    Provided By North Carolina State University

  • White Papers // Apr 2012

    Advertising Cached Contents in the Control Plane: Necessity and Feasibility

    A key feature of Information-Centric Networking architectures is universal caching where anyone can cache any content and users can obtain the content from anywhere as long as the content itself is intact. This powerful feature benefits the content providers, the Internet Service Providers (ISPs) as well as end users since...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    Optimal Resource Allocation in Multihop Relay-Enhanced WiMAX Networks

    Multihop relaying in WiMAX networks is considered an increasingly attractive technology for providing throughput enhancement, coverage extension, or both. In this paper, the authors consider deploying non-transparent Relay Stations (RSs) that transmit on the same carrier frequency as the Base Station (BS) for the purpose of coverage extension. Since it...

    Provided By North Carolina State University

  • White Papers // Sep 2011

    Hybrid Resource Allocation Scheme in Two-Hop Relaying WiMAX Networks

    In this paper, the authors consider resource allocation schemes in two-hop relaying WiMAX networks in order to maximize cell throughput, while serving the Subscriber Stations (SSs) in a fair manner. First they present two well-known schemes, namely, orthogonal and overlapped, according to the frequency reuse during the access zone intervals...

    Provided By North Carolina State University

  • White Papers // Feb 2010

    Parallel All Pairs Similarity Search

    In this paper, the authors present the first scalable parallel solution for the All Pairs Similarity Search (APSS) problem, which involves finding all pairs of data records that have a similarity score above the specified threshold. With exponentially growing datasets and modern multi-processor/multi-core system architectures, serial nature of all existing...

    Provided By North Carolina State University

  • White Papers // Oct 2012

    HadISD: A Quality-Controlled Global Synoptic Report Database for Selected Variables at Long-Term Stations From 1973 - 2011

    In this paper, the authors describes the creation of HadISD: an automatically quality-controlled synoptic resolution dataset of temperature, dewpoint temperature, sea-level pressure, wind speed, wind direction and cloud cover from global weather stations for 1973 - 2011. The full dataset consists of over 6000 stations, with 3427 long-term stations deemed...

    Provided By North Carolina State University

  • White Papers // Sep 2011

    CloudScale: Elastic Resource Scaling for Multi-Tenant Cloud Systems

    Elastic resource scaling lets cloud systems meet application Service Level Objectives (SLOs) with minimum resource provisioning costs. In this paper, the authors present CloudScale, a system that automates finegrained elastic resource scaling for multi-tenant cloud computing infrastructures. CloudScale employs online resource demand prediction and prediction error handling to achieve adaptive...

    Provided By North Carolina State University

  • White Papers // Oct 2009

    Social Distance Aware Resource Allocation in Wireless Networks

    Social connectivity networks and the associated socio-technical context are an important determinant of a user's resource requirements. Despite the recent attention on wireless network design, little quantitative work has been done in order to combine purely technical design methods with explicit dependencies on the social or business connectivity and utility...

    Provided By North Carolina State University

  • White Papers // Jul 2011

    A Flow-Based Centrality Measure Through Resistance Distances in Smart-Grid Networks

    The authors propose methods to estimate centrality in Smart-Grid Networks (SGNs) from the view of a flow-based approach. In several network categories, centrality metrics, such as degree, closeness and betweenness, have provided ways to investigate the importance or weakness of components. These well-known metrics utilize either non-global or shortest-path information....

    Provided By North Carolina State University

  • White Papers // Jan 2011

    Eigen-Inference for Multi-Source Power Estimation

    At a time when radio resources become scarce, the alternative offered by flexible radios is gaining more and more interest. This paper introduces a new method to estimate the power transmitted by multiple signal sources, when the number of sensing devices and the available samples are sufficiently large compared to...

    Provided By North Carolina State University

  • White Papers // Aug 2010

    Abstracting and Applying Business Modeling Patterns from RosettaNet

    RosettaNet is a leading industry effort that creates standards for business interactions among the participants in a supply chain. The RosettaNet standard defines over 100 Partner Interface Processes (PIPs) through which the participants can exchange business documents necessary to enact a supply chain. However, each PIP specifies the business interactions...

    Provided By North Carolina State University

  • White Papers // Feb 2013

    Directory-Oblivious Capacity Sharing in Tiled CMPs

    In bus-based CMPs with private caches, Capacity Sharing is applied by spilling victim cache blocks from over-utilized caches to under-utilized ones. If a spilled block is needed, it can be retrieved by posting a miss on the bus. Prior work in this domain focused on Capacity Sharing design and put...

    Provided By North Carolina State University

  • White Papers // Jul 2012

    Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations

    JavaScript-based applications are very popular on the web today. However, the lack of effective protection makes various kinds of privacy violation attack possible, including cookie stealing, history sniffing and behavior tracking. There have been studies of the prevalence of such attacks, but the dynamic nature of the JavaScript language makes...

    Provided By North Carolina State University

  • White Papers // Feb 2013

    Taming Hosted Hypervisors With (Mostly) Deprivileged Execution

    Recent years have witnessed increased adoption of hosted hypervisors in virtualized computer systems. By non-intrusively extending commodity OSs, hosted hypervisors can effectively take advantage of a variety of mature and stable features as well as the existing broad user base of commodity OSs. However, virtualizing a computer system is still...

    Provided By North Carolina State University

  • White Papers // Mar 2012

    Dissecting Android Malware: Characterization and Evolution

    The popularity and adoption of Smartphones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. In light of their rapid growth, there is a pressing need to develop effective solutions. However, their defense capability is largely constrained by the limited understanding of these...

    Provided By North Carolina State University

  • White Papers // Jan 2012

    Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets

    In this paper, the authors present a systematic study for the detection of malicious applications (or apps) on popular Android Markets. To this end, they first propose a permission-based behavioral foot-printing scheme to detect new samples of known Android malware families. Then they apply a heuristics-based filtering scheme to identify...

    Provided By North Carolina State University

  • White Papers // Nov 2011

    Systematic Detection of Capability Leaks in Stock Android Smartphones

    Recent years have witnessed a meteoric increase in the adoption of Smartphones. To manage information and features on such phones, Android provides a permission-based security model that requires each application to explicitly request permissions before it can be installed to run. In this paper, the authors analyze eight popular Android...

    Provided By North Carolina State University

  • White Papers // Nov 2011

    Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots

    Honeypots have proven to be an effective tool to capture computer intrusions (or malware infections) and analyze their exploitation techniques. However, forensic analysis of compromised honeypots is largely an ad-hoc and manual process. In this paper, the authors propose Timescope, a system that applies and extends recent advances in deterministic...

    Provided By North Carolina State University

  • White Papers // Sep 2012

    Collaborative Assessment of Functional Reliability in Wireless Networks

    Nodes that are part of a multi-hop wireless network, typically deployed in mission critical settings, are expected to perform specific functions. Establishing a notion of reliability of the nodes with respect to each function (referred to as Functional Reliability or FR) is essential for efficient operations and management of the...

    Provided By North Carolina State University

  • White Papers // Jun 2011

    On the Expressiveness of Return-Into-Libc Attacks

    Return-Into-LibC (RILC) is one of the most common forms of code-reuse attacks. In this attack, an intruder uses a buffer overflow or other exploit to redirect control flow through existing (libc) functions within the legitimate program. While dangerous, it is generally considered limited in its expressive power since it only...

    Provided By North Carolina State University

  • White Papers // Jan 2013

    QuickSense: Fast and Energy-Efficient Channel Sensing for Dynamic Spectrum Access Networks

    Spectrum sensing, the task of discovering spectrum usage at a given location, is a fundamental problem in dynamic spectrum access networks. While sensing in narrow spectrum bands is well studied in previous work, wideband spectrum sensing is challenging since a wideband radio is generally too expensive and power consuming for...

    Provided By North Carolina State University

  • White Papers // Jan 2010

    Distributed Network Decomposition: A Probabilistic Greedy Approach

    In this paper, the authors propose a novel distributed network decomposition algorithm with the aid of the factor graph model and the max-product algorithm, which aims to achieve minimum cut weight. Its effectiveness is testified for general graph partition as well as distributed inference in wireless networks. Their algorithm is...

    Provided By North Carolina State University

  • White Papers // Aug 2009

    Towards Efficient Designs for In-Network Computing With Noisy Wireless Channels

    In this paper, the authors study distributed function computation in a noisy multi-hop wireless network, in which n nodes are uniformly and independently distributed in a unit square. Each node holds an m-bit integer per instance and the computation is started after each node collects N readings. The goal is...

    Provided By North Carolina State University

  • White Papers // Jun 2009

    Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication

    Jamming resistance is crucial for applications where reliable wireless communication is required. Spread spectrum techniques such as Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS) have been used as countermeasures against jamming attacks. Traditional anti-jamming techniques require that senders and receivers share a secret key in order...

    Provided By North Carolina State University