North Carolina State University

Displaying 81-120 of 243 results

  • White Papers // Nov 2011

    Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots

    Honeypots have proven to be an effective tool to capture computer intrusions (or malware infections) and analyze their exploitation techniques. However, forensic analysis of compromised honeypots is largely an ad-hoc and manual process. In this paper, the authors propose Timescope, a system that applies and extends recent advances in deterministic...

    Provided By North Carolina State University

  • White Papers // Oct 2011

    AutoGeneration of Communication Benchmark Traces

    Benchmarks are essential for evaluating HPC hardware and software for petascale machines and beyond. But benchmark creation is a tedious manual process. As a result, benchmarks tend to lag behind the development of complex scientific codes. The authors' paper automates the creation of communication benchmarks. Given an MPI application, they...

    Provided By North Carolina State University

  • White Papers // Sep 2011

    A Tunable, Software-based DRAM Error Detection and Correction Library for HPC

    Proposed exascale systems will present a number of considerable resiliency challenges. In particular, DRAM soft-errors, or bit-flips, are expected to greatly increase due to the increased memory density of these systems. Current hardware-based fault-tolerance methods will be unsuitable for addressing the expected soft error frequency rate. As a result, additional...

    Provided By North Carolina State University

  • White Papers // Sep 2011

    Hybrid Resource Allocation Scheme in Two-Hop Relaying WiMAX Networks

    In this paper, the authors consider resource allocation schemes in two-hop relaying WiMAX networks in order to maximize cell throughput, while serving the Subscriber Stations (SSs) in a fair manner. First they present two well-known schemes, namely, orthogonal and overlapped, according to the frequency reuse during the access zone intervals...

    Provided By North Carolina State University

  • White Papers // Sep 2011

    CloudScale: Elastic Resource Scaling for Multi-Tenant Cloud Systems

    Elastic resource scaling lets cloud systems meet application Service Level Objectives (SLOs) with minimum resource provisioning costs. In this paper, the authors present CloudScale, a system that automates finegrained elastic resource scaling for multi-tenant cloud computing infrastructures. CloudScale employs online resource demand prediction and prediction error handling to achieve adaptive...

    Provided By North Carolina State University

  • White Papers // Aug 2011

    Memory Trace Compression and Replay for SPMD Systems using Extended PRSDs

    Concurrency levels in large-scale supercomputers are rising exponentially, and shared-memory nodes with hundreds of cores and non-uniform memory access latencies are expected within the next decade. However, even current petascale systems with tens of cores per node suffer from memory bottlenecks. As core counts increase, memory issues will become critical...

    Provided By North Carolina State University

  • White Papers // Aug 2011

    Distributed Spectrum-Aware Clustering in Cognitive Radio Sensor Networks

    A novel Distributed Spectrum-Aware Clustering (DSAC) scheme is proposed in the context of Cognitive Radio Sensor Networks (CRSN). DSAC aims at forming energy efficient clusters in a self-organized fashion while restricting interference to Primary User (PU) systems. The spectrum-aware clustered structure is presented where the communications consist of intra-cluster aggregation...

    Provided By North Carolina State University

  • White Papers // Jul 2011

    A Flow-Based Centrality Measure Through Resistance Distances in Smart-Grid Networks

    The authors propose methods to estimate centrality in Smart-Grid Networks (SGNs) from the view of a flow-based approach. In several network categories, centrality metrics, such as degree, closeness and betweenness, have provided ways to investigate the importance or weakness of components. These well-known metrics utilize either non-global or shortest-path information....

    Provided By North Carolina State University

  • White Papers // Jul 2011

    Evaluation of SIP Proxy Server Performance: Packet-Level Measurements and Queuing Model

    The growing number of applications that use the Session Initiation Protocol (SIP) to manage media sessions over IP is placing increasing demands on the SIP Proxy Servers (SPS) that make up the core of the SIP network. In this paper, the authors investigate the performance of OpenSIPS, an open source...

    Provided By North Carolina State University

  • White Papers // Jul 2011

    Optimal Max-Min Fair Resource Allocation in Multihop Relay-Enhanced WiMAX Networks

    In this paper, an optimal resource allocation scheme is proposed for WiMAX networks enhanced with non-transparent Relay Stations (RSs). The authors first focus on two-hop relaying networks, since this scenario has the largest throughput gain. Furthermore, many researchers have proposed different resource allocation schemes in two-hop relaying networks, and, thus,...

    Provided By North Carolina State University

  • White Papers // Jul 2011

    IEEE 802.11 Saturation Throughput Analysis in the Presence of Hidden Terminals

    Due to its usefulness and wide deployment, IEEE 802.11 has been the subject of numerous studies but still lacks a complete analytical model. Hidden terminals are common in IEEE 802.11 and cause the degradation of throughput. Despite the importance of the hidden terminal problem, there have been a relatively small...

    Provided By North Carolina State University

  • White Papers // Jun 2011

    On the Expressiveness of Return-Into-Libc Attacks

    Return-Into-LibC (RILC) is one of the most common forms of code-reuse attacks. In this attack, an intruder uses a buffer overflow or other exploit to redirect control flow through existing (libc) functions within the legitimate program. While dangerous, it is generally considered limited in its expressive power since it only...

    Provided By North Carolina State University

  • White Papers // Jun 2011

    GStream: A General-Purpose Data Streaming Framework on GPU Clusters

    Emerging accelerating architectures, such as GPUs, have proved successful in providing significant performance gains to various application domains. However, their viability to operate on general streaming data is still ambiguous. In this paper, the authors propose GStream, a general-purpose, scalable data streaming framework on GPUs. The contributions of GStream are...

    Provided By North Carolina State University

  • White Papers // Jun 2011

    EMFS: Email-Based Personal Cloud Storage

    Though a variety of cloud storage services have been offered recently, they have not yet provided users with transparent and cost-effective personal data storage. Services like Google Docs offer easy file access and sharing, but tie storage with internal data formats and specific applications. Meanwhile, services like Dropbox offer general-purpose...

    Provided By North Carolina State University

  • White Papers // Jun 2011

    A Fault Observant Real-Time Embedded Design for Network-on-Chip Control Systems

    Performance and time to market requirements cause many real-time designers to consider Components, Off The Shelf (COTS) for real-time systems. Massive multi-core embedded processors with Network-on-Chip (NoC) designs to facilitate core-to-core communication are becoming common in COTS. These architectures benefit real-time scheduling, but they also pose predictability challenges. In this...

    Provided By North Carolina State University

  • White Papers // May 2011

    Detecting Concurrency-Related Problematic Activity Arrangement in WS-BPEL Programs

    A composite web service often interacts with several partner web services hosted in different servers. These partner web services are represented as activities in a WS-BPEL program describing the composite web service. Invoking the maximal number of these activities concurrently is essential for improving its performance. But complex message coupling...

    Provided By North Carolina State University

  • White Papers // Apr 2011

    Static Task Partitioning for Locked Caches in Multi-Core Real-Time Systems

    Massive multi-core architectures with tens of cores are becoming more prevalent in embedded systems. However, their acceptance in the real-time systems domain is rather low due to challenges in system analysis and predictability. Recent real-time systems research has focused on shared cache architectures. In such systems, tasks across all cores...

    Provided By North Carolina State University

  • White Papers // Mar 2011

    RWA in WDM Rings: An Efficient Formulation Based on Maximal Independent Set Decomposition

    WDM rings are now capable of supporting more than 100 wavelengths over a single fiber. Conventional link and path formulations for the RWA problem are inefficient due to the inherent symmetry in wavelength assignment and the fact that the problem size increases fast with the number of wavelengths. Although a...

    Provided By North Carolina State University

  • White Papers // Mar 2011

    From Jammer to Gambler: Modeling and Detection of Jamming Attacks Against Time-Critical Traffic

    Time-critical wireless applications in emerging network systems, such as e-healthcare and smart grids, have been drawing increasing attention in both industry and academia. The broadcast nature of wireless channels unavoidably exposes such applications to jamming attacks. However, existing methods to characterize and detect jamming attacks cannot be applied directly to...

    Provided By North Carolina State University

  • White Papers // Mar 2011

    Probabilistic Communication and I/O Tracing With Deterministic Replay at Scale

    With today's petascale supercomputers, applications often exhibit low efficiency, such as poor communication and I/O performance that can be diagnosed by analysis tools. However, these tools either produce extremely large trace files that complicate performance analysis, or sacrifice accuracy to collect high-level statistical information using crude averaging. This work contributes...

    Provided By North Carolina State University

  • White Papers // Feb 2011

    Self-Sustaining, Efficient and Forward-Secure Cryptographic Constructions for Unattended Wireless Sensor Networks

    Unattended Wireless Sensor Networks (UWSNs) operating in hostile environments face great security and performance challenges due to the lack of continuous real-time communication with the final data receivers (e.g., mobile data collectors). The lack of real-time communication forces sensors to accumulate sensed data possibly for long time periods, along with...

    Provided By North Carolina State University

  • White Papers // Feb 2011

    Hybrid FRR/p-Cycle MPLS Link Protection Design

    Survivable MPLS technologies are crucial in ensuring reliable communication services. The Fast ReRoute (FRR) mechanism has been standardized to achieve fast local repair of Label Switched Paths (LSPs). The authors present a hybrid survivability scheme for MPLS networks that combines the well-known p-cycle method with FRR technology. While with pure...

    Provided By North Carolina State University

  • White Papers // Feb 2011

    Exploiting Heterogeneity to Prolong the Lifetime of Large-Scale Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs), sensor nodes are typically power-constrained with limited lifetime, and thus it is necessary to know how long the network sustains its networking operations. The authors consider the network lifetime as the time until that a majority of functional nodes remains connected of one another, forming...

    Provided By North Carolina State University

  • White Papers // Feb 2011

    Transmission Throughput of Decentralized Overlaid Networks With Outage Constraints

    Overlaid networks, typically composed of primary and secondary networks, are emerging as a viable candidate to resolve the conflict between increasing demand for spectrum and spectrum shortage. The essential purpose of overlaid networks is to improve the network spectrum efficiency, which, however, may not be achieved if the secondary network...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    Time-Ordered Event Traces: A New Debugging Primitive for Concurrency Bugs

    Non-determinism makes concurrent bugs extremely difficult to reproduce and to debug. In this paper, the authors propose a new debugging primitive to facilitate the debugging process by exposing this non-deterministic behavior to the programmer. The key idea is to generate a time-ordered trace of events such as function calls/returns and...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    HAQu: Hardware-Accelerated Queueing for Fine-Grained Threading on a Chip Multiprocessor

    Queues are commonly used in multithreaded programs for synchronization and communication. However, because software queues tend to be too expensive to support fine grained parallelism, hardware queues have been proposed to reduce overhead of communication between cores. Hardware queues require modifications to the processor core and need a custom interconnect....

    Provided By North Carolina State University

  • White Papers // Jan 2011

    Eigen-Inference for Multi-Source Power Estimation

    At a time when radio resources become scarce, the alternative offered by flexible radios is gaining more and more interest. This paper introduces a new method to estimate the power transmitted by multiple signal sources, when the number of sensing devices and the available samples are sufficiently large compared to...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    Smart Sleep: Sleep More to Reduce Delay in Duty-Cycled Wireless Sensor Networks

    A Simple Random Walk (SRW) has been considered as an effective forwarding method for many applications in Wireless Sensor Networks (WSNs) due to its desirable properties. However, a critical downside of SRW - slow diffusion or exploration over the space, typically leads to longer packet delay and undermines its own...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    Impact of Data Sharing on CMP Design: A Study Based on Analytical Modeling

    Over the past few years, Chip Multi Processor (CMP) architecture has become the dominating hardware architecture across a spectrum of computing machinery - personal computing devices, workstations, commercial and scientific servers, and warehouse scale computers. The sheer complexity involved in the design and verification of each unit in a CMP...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    ExMin: A Routing Metric for True Opportunity Gain in Delay Tolerant Networks

    DTNs have emerged as an attractive networking paradigm for mobile networks where transmission links among mobile nodes are dynamically established or torn down and communication is accomplished through multi-hop message relaying. Such environments are becoming increasingly prevalent due to the rapid growth of heterogeneous mobile devices and delay-insensitive applications. A...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    Optimal Resource Allocation in Multihop Relay-Enhanced WiMAX Networks

    Multihop relaying in WiMAX networks is considered an increasingly attractive technology for providing throughput enhancement, coverage extension, or both. In this paper, the authors consider deploying non-transparent Relay Stations (RSs) that transmit on the same carrier frequency as the Base Station (BS) for the purpose of coverage extension. Since it...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    Retrofitting Unit Tests for Parameterized Unit Testing

    Recent advances in software testing introduced Parameterized Unit Tests (PUT), which accept parameters, unlike Conventional Unit Tests (CUT), which do not accept parameters. PUTs are more beneficial than CUTs with regards to fault detection capability, since PUTs help describe the behaviors of methods under test for all test arguments. In...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    PRESS: PRedictive Elastic ReSource Scaling for Cloud Systems

    Cloud systems require elastic resource allocation to minimize resource provisioning costs while meeting Service Level Objectives (SLOs). In this paper, the authors present a novel PRedictive Elastic reSource Scaling (PRESS) scheme for cloud systems. PRESS unobtrusively extracts fine-grained dynamic patterns in application resource demands and adjusts their resource allocations automatically....

    Provided By North Carolina State University

  • White Papers // Jan 2011

    Asymmetric Multiprocessing for Simultaneous Multithreading Processors

    Simultaneous Multithreading (SMT) has become common in commercially available processors with hardware support for dual contexts of execution. However, performance of SMT systems has been disappointing for many applications. Consequently, many SMT systems are operated in a single-context configuration to achieve better average throughput, depending on the application domain. This...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    Challenges for Cyber-Physical Systems: Security, Timing Analysis and Soft Error Protection

    The power grid represents a distributed cyber-physical system that is essential to the every-day life. Larger-scale black-outs are known to have a severe economic and safety impact, as historical events have shown. The severity in impact of power outage on the life is increasing continuously as the power distribution grid...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    Design and Applications of a Smooth Mobility Model for Mobile Ad Hoc Networks

    Existing mobility models used in the simulation tools have two major limitations. First, these models invoke unrealistic moving behaviors, such as sudden stop and sharp turn during the simulation. Hence, the study of Mobile Ad-hoc NETworks (MANETs) based on these models could lead to wrong conclusions. Second, because the node...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks

    A distributed sensor network usually consists of one or several computationally powerful nodes called base stations and a large amount of inexpensive, low capacity nodes called sensors (or sensor nodes). The nodes in a distributed sensor network communicate through wireless communication, which is usually limited in bandwidth. Distributed sensor networks...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    Topology Stability Analysis and Its Application in Hierarchical Mobile Ad Hoc Networks

    The hierarchical architecture has been proven effective for solving the scalability problems in large-scale ad hoc networks. The stability of the hierarchical architecture is a key factor in determining the network performance. Although many solutions have been proposed to construct stable clusters, the maximum stability achievable in the mobile environments...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    ART: An Asymmetric and Reliable Transport Mechanism for Wireless Sensor Networks

    Many applications developed for Wireless Sensor Networks (WSNs) demand for Reliable communication service, since majority of these applications are event-critical applications. There has been a vast body of knowledge on reliable data transfer in wireless networks; however, many of those solutions are not applicable to WSNs due to the fact...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    Trustworthy Service Caching: Cooperative Search in P2P Information Systems

    The authors are developing an approach for P2P information systems, where the peers are modeled as autonomous agents. Agents provide services or give referrals to one another to help find trustworthy services. They consider the important case of information services that can be cached. Agents request information services through high-level...

    Provided By North Carolina State University

  • White Papers // Apr 2009

    FREEDM Software Controller Architecture for a Solid State Transformer

    The Future Renewable Electric Energy Delivery and Management (FREEDM) project aims at providing an efficient electric power grid integrating alternative generating sources and storage with existing power systems to facilitate a green energy in a highly distributed and scalable manner. One of the central aspects of the Reliable and Secure...

    Provided By North Carolina State University

  • White Papers // May 2010

    Fault Tolerant Network Routing Through Software Overlays for Intelligent Power Grids

    Control decisions of intelligent devices in critical infrastructure can have a significant impact on human life and the environment. Insuring that the appropriate data is available is crucial in making informed decisions. Such considerations are becoming increasingly important in today's cyber-physical systems that combine computational decision making on the cyber...

    Provided By North Carolina State University

  • White Papers // Sep 2010

    Hybrid Checkpointing for MPI Jobs in HPC Environments

    As the core count in high-performance computing systems keeps increasing, faults are becoming common place. Checkpointing addresses such faults but captures full process images even though only a subset of the process image changes between checkpoints. The authors have designed a hybrid checkpointing technique for MPI tasks of high-performance applications....

    Provided By North Carolina State University

  • White Papers // Jan 2010

    Large-Scale Multi-Dimensional Document Clustering on GPU Clusters

    Document clustering plays an important role in data mining systems. Recently, a flocking-based document clustering algorithm has been proposed to solve the problem through simulation resembling the flocking behavior of birds in nature. This method is superior to other clustering algorithms, including k-means, in the sense that the outcome is...

    Provided By North Carolina State University

  • White Papers // May 2009

    Improving the Availability of Supercomputer Job Input Data Using Temporal Replication

    Storage systems in supercomputers are a major reason for service interruptions. RAID solutions alone cannot provide sufficient protection as 1) growing average disk recovery times make RAID groups increasingly vulnerable to disk failures during reconstruction, and 2) RAID does not help with higher-level faults such failed I/O nodes. This paper...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    Asymmetric Multiprocessing for Simultaneous Multithreading Processors

    Simultaneous Multithreading (SMT) has become common in commercially available processors with hardware support for dual contexts of execution. However, performance of SMT systems has been disappointing for many applications. Consequently, many SMT systems are operated in a single-context configuration to achieve better average throughput, depending on the application domain. This...

    Provided By North Carolina State University

  • White Papers // Mar 2011

    Probabilistic Communication and I/O Tracing With Deterministic Replay at Scale

    With today's petascale supercomputers, applications often exhibit low efficiency, such as poor communication and I/O performance that can be diagnosed by analysis tools. However, these tools either produce extremely large trace files that complicate performance analysis, or sacrifice accuracy to collect high-level statistical information using crude averaging. This work contributes...

    Provided By North Carolina State University

  • White Papers // Apr 2011

    Static Task Partitioning for Locked Caches in Multi-Core Real-Time Systems

    Massive multi-core architectures with tens of cores are becoming more prevalent in embedded systems. However, their acceptance in the real-time systems domain is rather low due to challenges in system analysis and predictability. Recent real-time systems research has focused on shared cache architectures. In such systems, tasks across all cores...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    Challenges for Cyber-Physical Systems: Security, Timing Analysis and Soft Error Protection

    The power grid represents a distributed cyber-physical system that is essential to the every-day life. Larger-scale black-outs are known to have a severe economic and safety impact, as historical events have shown. The severity in impact of power outage on the life is increasing continuously as the power distribution grid...

    Provided By North Carolina State University

  • White Papers // May 2010

    Making DRAM Refresh Predictable

    Embedded control systems with hard real-time constraints require that deadlines are met at all times or the system may malfunction with potentially catastrophic consequences. Schedulability theory can assure deadlines for a given task set when periods and Worst-Case Execution Times (WCETs) of tasks are known. While periods are generally derived...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    Design and Applications of a Smooth Mobility Model for Mobile Ad Hoc Networks

    Existing mobility models used in the simulation tools have two major limitations. First, these models invoke unrealistic moving behaviors, such as sudden stop and sharp turn during the simulation. Hence, the study of Mobile Ad-hoc NETworks (MANETs) based on these models could lead to wrong conclusions. Second, because the node...

    Provided By North Carolina State University

  • White Papers // Jun 2009

    Towards Well-Behaved Schema Evolution

    The authors study the problem of schema evolution in the RDF data model. RDF and the RDFS schema language are W3C standards for flexibly modeling and sharing data on the web. Although schema evolution has been intensively studied in the database and knowledge-representation communities, only recently has progress been made...

    Provided By North Carolina State University

  • White Papers // May 2009

    Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks

    Unattended Wireless Sensor Networks (UWSNs) operating in hostile environments face great security and performance challenges due to the lack of continuous real-time communication between senders (sensors) and receivers (e.g., mobile data collectors, static sinks). The lack of real-time communication forces sensors to accumulate the sensed data possibly for long time...

    Provided By North Carolina State University

  • White Papers // Feb 2011

    Self-Sustaining, Efficient and Forward-Secure Cryptographic Constructions for Unattended Wireless Sensor Networks

    Unattended Wireless Sensor Networks (UWSNs) operating in hostile environments face great security and performance challenges due to the lack of continuous real-time communication with the final data receivers (e.g., mobile data collectors). The lack of real-time communication forces sensors to accumulate sensed data possibly for long time periods, along with...

    Provided By North Carolina State University

  • White Papers // Oct 2009

    BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems

    Audit logs, providing information about the current and past states of systems, are one of the most important parts of modern computer systems. Providing security for audit logs on an untrusted machine in a large distributed system is a challenging task, especially in the presence of active adversaries. In such...

    Provided By North Carolina State University

  • White Papers // Aug 2009

    Predictive Constrained Gain Scheduling for UGV Path Tracking in a Networked Control System

    This paper presents a predictive gain scheduler for path tracking control in a networked control system with variable delay. The controller uses the plant model to predict future position and find the amount of travel possible with the global path as a constraint. Based on variable network conditions and vehicle...

    Provided By North Carolina State University

  • White Papers // May 2009

    Analysis on the Kalman Filter Performance in GPS/INS Integration at Different Noise Levels, Sampling Periods and Curvatures

    Kalman Filters (KF) has been extensively used in the integration of Global Positioning System (GPS) and Inertial Navigation System (INS) data. Often, the GPS data is used as a benchmark to update the INS data. In this paper, an analysis of integration of GPS data with INS data using an...

    Provided By North Carolina State University

  • White Papers // Jun 2009

    The Role of Internet Service Providers in Cyber Security

    The current level of insecurity of the Internet is a worldwide problem that has resulted in a multitude of costs for businesses, governments, and individuals. Past research (e.g., Frith, 2005; Gallaher, Rowe, Rogozhin, & Link, 2006) suggests that one significant factor in these cyber security problems is the inadequate level...

    Provided By North Carolina State University

  • White Papers // Sep 2009

    SigLM: Signature-Driven Load Management for Cloud Computing Infrastructures

    Cloud computing has emerged as a promising platform that grants users with direct yet shared access to computing resources and services without worrying about the internal complex infrastructure. Unlike traditional batch service model, cloud service model adopts a pay-as-you-go form, which demands explicit and precise resource control. This paper, presents...

    Provided By North Carolina State University

  • White Papers // Jun 2009

    Authenticated Data Compression in Delay Tolerant Wireless Sensor Networks

    Delay Tolerant Wireless Sensor Networks (DTWSNs) are sensor networks where continuous connectivity between the sensor nodes and their final destinations (e.g., the base station) cannot be guaranteed. Storage constraints are particularly a concern in DTWSNs, since each node may have to store sensed data for a long period of time...

    Provided By North Carolina State University

  • White Papers // Apr 2010

    DARTS: Techniques and Tools for Predictably Fast Memory Using Integrated Data Allocation and Real-Time Task Scheduling

    Hardware-managed caches introduce large amounts of timing variability, complicating real-time system design. One alternative is a memory system with scratchpad memories which improve system performance while eliminating such timing variability. Prior work introduced the DARTS approach, which combines static allocation of data into scratchpad memories, with task scheduling for preemptive...

    Provided By North Carolina State University

  • White Papers // Apr 2010

    Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques

    Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine these outcomes within a more continuous space. In this paper, the authors develop a formal model that allows them to quantitatively reason about the...

    Provided By North Carolina State University

  • White Papers // May 2010

    Informative Middleman Service, Variety-Expansion And Long Run Growth

    In reality, the intermediate firms not only conduct R&D but also provide informative middleman services to overcome the information cost generated by technological advancements. The author incorporates the informative middleman services such as consulting, advertising, technical supporting, repair and maintenance into a variety-expansion model. The author finds that: Activities of...

    Provided By North Carolina State University

  • White Papers // May 2010

    Schumpeterian Growth, Trade, And Dynamic Comparative Advantage

    The authors study the effects of trade on economic growth in a Schumpeterian framework. The model excludes scale effects and technology transfer, the two usual channels in the literature through which trade affects growth, leaving only comparative advantage. Comparative advantage and the trading pattern are determined endogenously. Endogeneity of production...

    Provided By North Carolina State University

  • White Papers // Sep 2012

    Collaborative Assessment of Functional Reliability in Wireless Networks

    Nodes that are part of a multi-hop wireless network, typically deployed in mission critical settings, are expected to perform specific functions. Establishing a notion of reliability of the nodes with respect to each function (referred to as Functional Reliability or FR) is essential for efficient operations and management of the...

    Provided By North Carolina State University

  • White Papers // Jul 2012

    Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations

    JavaScript-based applications are very popular on the web today. However, the lack of effective protection makes various kinds of privacy violation attack possible, including cookie stealing, history sniffing and behavior tracking. There have been studies of the prevalence of such attacks, but the dynamic nature of the JavaScript language makes...

    Provided By North Carolina State University

  • White Papers // Feb 2013

    Taming Hosted Hypervisors With (Mostly) Deprivileged Execution

    Recent years have witnessed increased adoption of hosted hypervisors in virtualized computer systems. By non-intrusively extending commodity OSs, hosted hypervisors can effectively take advantage of a variety of mature and stable features as well as the existing broad user base of commodity OSs. However, virtualizing a computer system is still...

    Provided By North Carolina State University

  • White Papers // Mar 2012

    Dissecting Android Malware: Characterization and Evolution

    The popularity and adoption of Smartphones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. In light of their rapid growth, there is a pressing need to develop effective solutions. However, their defense capability is largely constrained by the limited understanding of these...

    Provided By North Carolina State University

  • White Papers // Jan 2012

    Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets

    In this paper, the authors present a systematic study for the detection of malicious applications (or apps) on popular Android Markets. To this end, they first propose a permission-based behavioral foot-printing scheme to detect new samples of known Android malware families. Then they apply a heuristics-based filtering scheme to identify...

    Provided By North Carolina State University

  • White Papers // Nov 2011

    Systematic Detection of Capability Leaks in Stock Android Smartphones

    Recent years have witnessed a meteoric increase in the adoption of Smartphones. To manage information and features on such phones, Android provides a permission-based security model that requires each application to explicitly request permissions before it can be installed to run. In this paper, the authors analyze eight popular Android...

    Provided By North Carolina State University

  • White Papers // Nov 2011

    Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots

    Honeypots have proven to be an effective tool to capture computer intrusions (or malware infections) and analyze their exploitation techniques. However, forensic analysis of compromised honeypots is largely an ad-hoc and manual process. In this paper, the authors propose Timescope, a system that applies and extends recent advances in deterministic...

    Provided By North Carolina State University

  • White Papers // Sep 2012

    Scalable Optimal Traffic Grooming in WDM Rings Incorporating Fast RWA Formulation

    The authors present a scalable formulation for the traffic grooming problem in WDM ring networks. Specifically, they modify the ILP formulation to replace the constraints related to Routing and Wavelength Assignment (RWA), typically based on a link approach, with a new set of constraints based on the Maximal Independent Set...

    Provided By North Carolina State University

  • White Papers // Sep 2012

    An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks

    The authors consider the Virtual Topology and Traffic Routing (VTTR) problem, a sub-problem of traffic grooming that arises as a fundamental network design problem in optical networks. The objective of VTTR is to determine the minimum number of light-paths so as to satisfy a set of traffic demands, and does...

    Provided By North Carolina State University

  • White Papers // Jul 2011

    Evaluation of SIP Proxy Server Performance: Packet-Level Measurements and Queuing Model

    The growing number of applications that use the Session Initiation Protocol (SIP) to manage media sessions over IP is placing increasing demands on the SIP Proxy Servers (SPS) that make up the core of the SIP network. In this paper, the authors investigate the performance of OpenSIPS, an open source...

    Provided By North Carolina State University

  • White Papers // Jan 2013

    Flexible Capacity Partitioning in Many-Core Tiled CMPs

    Chip Multi-Processors (CMP) have become a mainstream computing platform. As transistor density shrinks and the number of cores increases, more scalable CMP architectures will emerge. Recently, tiled architectures have shown such scalable characteristics and been used in many industry chips. The memory hierarchy in tiled architectures presents interesting design challenges....

    Provided By North Carolina State University

  • White Papers // Feb 2012

    Evaluating Dynamics and Bottlenecks of Memory Collaboration in Cluster Systems

    With the fast development of highly-integrated distributed systems (cluster systems), designers face interesting memory hierarchy design choices while attempting to avoid the notorious disk swapping. Swapping to the free remote memory through Memory Collaboration has demonstrated its cost-effectiveness compared to over-provisioning the cluster for peak load requirements. Recent memory collaboration...

    Provided By North Carolina State University

  • White Papers // Feb 2012

    Data Sharing in MultiThreaded Applications and Its Impact on Chip Design

    Analytical modeling is becoming an increasingly important technique used in the design of chip multiprocessors. Most such models assume multi-programmed workload mixes and either ignore or oversimplify the behavior of multi-threaded applications. In particular, data sharing observed in multi-threaded applications, and its impact on chip design decisions, has not been...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    Impact of Data Sharing on CMP Design: A Study Based on Analytical Modeling

    Over the past few years, Chip Multi Processor (CMP) architecture has become the dominating hardware architecture across a spectrum of computing machinery - personal computing devices, workstations, commercial and scientific servers, and warehouse scale computers. The sheer complexity involved in the design and verification of each unit in a CMP...

    Provided By North Carolina State University

  • White Papers // Dec 2010

    Architectural Framework for Supporting Operating System Survivability

    The ever increasing size and complexity of Operating System (OS) kernel code bring an inevitable increase in the number of security vulnerabilities that can be exploited by attackers. A successful security attack on the kernel has a profound impact that may affect all processes running on it. In this paper,...

    Provided By North Carolina State University

  • White Papers // Dec 2009

    Defining Anomalous Behavior for Phase Change Memory

    Traditional memory systems based on memory technologies such as DRAM are fast approaching their cost and power limits. Alternative memory technologies such as Phase Change Memory (PCM) are being widely researched as a scalable, cost- and power-efficient alternative for DRAM. However, a PCM memory cell has a limited endurance of...

    Provided By North Carolina State University