North Carolina State University

Displaying 201-240 of 267 results

  • White Papers // Jul 2009

    The Impact Of Exchange Rate Volatility On Plant-level Investment: Evidence From

    The authors estimate the impact of exchange rate volatility on firms' investment decisions in a developing country setting. Employing plant-level panel data from the Colombian Manufacturing Census, they estimate a dynamic investment equation using the system-GMM estimator developed by Arellano and Bover (1995) and Blundell and Bond (1998). They find...

    Provided By North Carolina State University

  • White Papers // Jul 2009

    A Hierarchical Model for Multigranular Optical Networks

    The authors present a hierarchical algorithm for grooming light-paths into wavebands, and routing wavebands over a network of multi-granular switching nodes. This algorithm focuses on lowering the number of wavelengths W and ports over the network while being conceptually simple, scalable, and consistent with the way networks are operated and...

    Provided By North Carolina State University

  • White Papers // Jul 2009

    Business Modeling Via Commitments

    Existing computer science approaches to business modeling offer low-level abstractions such as data and control flows, which fail to capture the business intent underlying the interactions that are central to real-life business models. In contrast, existing management science approaches are high-level but not only are these semiformal, they are also...

    Provided By North Carolina State University

  • White Papers // Jul 2009

    Fault Localization for Firewall Policies

    Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. Ensuring the correctness of firewall policies through testing is important. In firewall policy testing, test inputs are packets and test outputs are decisions. Packets with unexpected (Expected) evaluated decisions are classified as failed...

    Provided By North Carolina State University

  • White Papers // Jul 2009

    Correctness Properties for Multiagent Systems

    What distinguishes multiagent systems from other software systems is their emphasis on the interactions among autonomous, heterogeneous agents. This paper motivates and characterizes correctness properties for multiagent systems. These properties are centered on commitments, and capture correctness at a high level. In contrast to existing approaches, commitments underlie key correctness...

    Provided By North Carolina State University

  • White Papers // Jul 2009

    Core-Selectability in Chip Multiprocessors

    The centralized structures necessary for the extraction of Instruction-Level Parallelism (ILP) are consuming progressively smaller portions of the total die area of Chip Multi-Processors (CMP). The reason for this is that scaling these structures does not enhance general performance as much as scaling the cache and interconnect. However, the fact...

    Provided By North Carolina State University

  • White Papers // Jul 2009

    An Empirical Study of Security Problem Reports in Linux Distributions

    Existing work like focuses primiarily on the analysis of the general category of problem reports or limit their attention to observations on number of security problems reported in open source projects. Existing studies on problem reports in open source projects focus primarily on the analysis of the general category of...

    Provided By North Carolina State University

  • White Papers // Jun 2009

    ReFormat: Automatic Reverse Engineering of Encrypted Messages

    Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in analyzing only plain-text communications wherein the exchanged messages are not encrypted. In this paper, the authors propose ReFormat, a system that aims at deriving the message...

    Provided By North Carolina State University

  • White Papers // Jun 2009

    Towards Well-Behaved Schema Evolution

    The authors study the problem of schema evolution in the RDF data model. RDF and the RDFS schema language are W3C standards for flexibly modeling and sharing data on the web. Although schema evolution has been intensively studied in the database and knowledge-representation communities, only recently has progress been made...

    Provided By North Carolina State University

  • White Papers // Jun 2009

    Super-Diffusive Behavior of Mobile Nodes and Its Impact on Routing Protocol Performance

    Mobility is the most important component in Mobile Ad-hoc NETworks (MANETs) and Delay Tolerant Networks (DTNs). In this paper, the authors first investigate numerous GPS mobility traces of human mobile nodes and observe super-diffusive behavior in all GPS traces, which is characterized by a 'Faster-than-linear' growth rate of the Mean...

    Provided By North Carolina State University

  • White Papers // Jun 2009

    Architecture Support for Improving Bulk Memory Copying and Initialization Performance

    Bulk memory copying and initialization is one of the most ubiquitous operations performed in current computer systems by both user applications and operating systems. While many current systems rely on a loop of loads and stores, there are proposals to introduce a single instruction to perform bulk memory copying. While...

    Provided By North Carolina State University

  • White Papers // Jun 2009

    Authenticated Data Compression in Delay Tolerant Wireless Sensor Networks

    Delay Tolerant Wireless Sensor Networks (DTWSNs) are sensor networks where continuous connectivity between the sensor nodes and their final destinations (e.g., the base station) cannot be guaranteed. Storage constraints are particularly a concern in DTWSNs, since each node may have to store sensed data for a long period of time...

    Provided By North Carolina State University

  • White Papers // Jun 2009

    Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication

    Jamming resistance is crucial for applications where reliable wireless communication is required. Spread spectrum techniques such as Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS) have been used as countermeasures against jamming attacks. Traditional anti-jamming techniques require that senders and receivers share a secret key in order...

    Provided By North Carolina State University

  • White Papers // Jun 2009

    Detection of Multiple-Duty-Related Security Leakage in Access Control Policies

    Access control mechanisms control which subjects (Such as users or processes) has access to which resources. To facilitate managing access control, policy authors increasingly write access control policies in XACML. Access control policies written in XACML could be amenable to multiple-duty-related security leakage, which grants unauthorized access to a user...

    Provided By North Carolina State University

  • White Papers // Jun 2009

    Hybrid Full/Incremental Checkpoint/Restart for MPI Jobs in HPC Environments

    As the number of cores in high-performance computing environments keeps increasing, faults are becoming common place. Checkpointing addresses such faults but captures full process images even though only a subset of the process image changes between checkpoints. The authors have designed a high-performance hybrid disk-based full/incremental checkpointing technique for MPI...

    Provided By North Carolina State University

  • White Papers // Jun 2009

    SHIELDSTRAP: A Secure Bootstrap Architecture

    Many systems may have security requirements such as protecting the privacy of data and code stored in the system, ensuring integrity of computations, or preventing the execution of unauthorized code. It is becoming increasingly difficult to ensure such protections as hardware-based attacks, in addition to software attacks, become more widespread...

    Provided By North Carolina State University

  • White Papers // Jun 2009

    The Role of Internet Service Providers in Cyber Security

    The current level of insecurity of the Internet is a worldwide problem that has resulted in a multitude of costs for businesses, governments, and individuals. Past research (e.g., Frith, 2005; Gallaher, Rowe, Rogozhin, & Link, 2006) suggests that one significant factor in these cyber security problems is the inadequate level...

    Provided By North Carolina State University

  • White Papers // May 2009

    Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks

    Unattended Wireless Sensor Networks (UWSNs) operating in hostile environments face great security and performance challenges due to the lack of continuous real-time communication between senders (sensors) and receivers (e.g., mobile data collectors, static sinks). The lack of real-time communication forces sensors to accumulate the sensed data possibly for long time...

    Provided By North Carolina State University

  • White Papers // May 2009

    Analysis on the Kalman Filter Performance in GPS/INS Integration at Different Noise Levels, Sampling Periods and Curvatures

    Kalman Filters (KF) has been extensively used in the integration of Global Positioning System (GPS) and Inertial Navigation System (INS) data. Often, the GPS data is used as a benchmark to update the INS data. In this paper, an analysis of integration of GPS data with INS data using an...

    Provided By North Carolina State University

  • White Papers // May 2009

    Netset: Automating Network Performance Evaluation

    Performance measurement and comparison is integral to almost any kind of networking research. However, the authors currently lack a general framework under which network-based tests can be carried out. Thus researchers tend to design their tests based on their own ingenuity, making it difficult to repeat these tests and compare...

    Provided By North Carolina State University

  • White Papers // May 2009

    Predictive Control of Multiple UGVs in a NCS With Adaptive Bandwidth Allocation

    In network based path tracking control of systems with multiple Unmanned Ground Vehicles (UGVs), performance can be affected by network constraints including time-varying network delays and bandwidth limitation. Network delay has previously been compensated for using smith predictor based techniques and gain scheduling to limit UGV motion. The predictive gain...

    Provided By North Carolina State University

  • White Papers // May 2009

    Improving the Availability of Supercomputer Job Input Data Using Temporal Replication

    Storage systems in supercomputers are a major reason for service interruptions. RAID solutions alone cannot provide sufficient protection as 1) growing average disk recovery times make RAID groups increasingly vulnerable to disk failures during reconstruction, and 2) RAID does not help with higher-level faults such failed I/O nodes. This paper...

    Provided By North Carolina State University

  • White Papers // Apr 2009

    Structured Variational Methods for Distributed Inference: Convergence Analysis and Performance-Complexity Tradeoff

    In this paper, the asymptotic performance of a recently proposed distributed inference framework, structured variational methods, is investigated. The authors first distinguish the intra- and inter-cluster inference algorithms as vertex and edge processes respectively. Their difference is illustrated, and convergence rate is derived for the intra-cluster inference procedure which is...

    Provided By North Carolina State University

  • White Papers // Apr 2009

    FREEDM Software Controller Architecture for a Solid State Transformer

    The Future Renewable Electric Energy Delivery and Management (FREEDM) project aims at providing an efficient electric power grid integrating alternative generating sources and storage with existing power systems to facilitate a green energy in a highly distributed and scalable manner. One of the central aspects of the Reliable and Secure...

    Provided By North Carolina State University

  • White Papers // Apr 2009

    The FREEDM Architecture of Fault Tolerant Network Routing through Software Overlays

    Control decisions of intelligent devices in critical infrastructure can have a significant impact on human life and the environment. Insuring that the appropriate data is available is crucial in making informed decisions. Such considerations are becoming increasingly important in today's cyber-physical systems that combine computational decision making on the cyber...

    Provided By North Carolina State University

  • White Papers // Apr 2009

    Remote Attestation to Dynamic System Properties: Towards Providing Complete System Integrity Evidence

    Remote attestation of system integrity is an essential part of trusted computing. However, current remote attestation techniques only provide integrity proofs of static properties of the system. To address this problem the authors present a novel remote dynamic attestation system named ReDAS (Remote Dynamic Attestation System) that provides integrity evidence...

    Provided By North Carolina State University

  • White Papers // Mar 2009

    Selecting Trustworthy Service in Service-Oriented Environments

    Most of current service selection approaches in service-oriented environments fail to capture the dynamic relationships between services or assume the complete knowledge of service composition is known as a prior. In these cases, problems may arise when consumers are not aware of the underlying composition behind services. The authors propose...

    Provided By North Carolina State University

  • White Papers // Mar 2009

    Feedback-Directed Page Placement for CcNUMA Via Hardware-Generated Memory Traces

    Non-Uniform Memory Architectures with cache coherence (ccNUMA) are becoming increasingly common, not just for large-scale high performance platforms but also in the context of multi-cores architectures. Under ccNUMA, data placement may influence overall application performance significantly as references resolved locally to a processor/core impose lower latencies than remote ones. This...

    Provided By North Carolina State University

  • White Papers // Feb 2009

    Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks

    Wireless sensor networks are considered ideal candidates for a wide range of applications. It is desirable and sometimes necessary to reprogram sensor nodes through wireless links after they are deployed to remove bugs or add new functionalities. Several approaches (e.g., Seluge, Sluice) have been proposed recently for secure code dissemination...

    Provided By North Carolina State University

  • White Papers // Feb 2009

    Improving Software Quality Via Code Searching and Mining

    Enormous amount of open source code is available on the Internet and various Code Search Engines (CSE) are available to serve as a means for searching in open source code. However, usage of CSEs is often limited to simple tasks such as searching for relevant code examples. This paper presents...

    Provided By North Carolina State University

  • White Papers // Feb 2009

    An Empirical Study of Testing File-System-Dependent Software With Mock Objects

    Unit testing is a technique of testing a single unit of a program in isolation. The testability of the unit under test can be reduced when the unit interacts with its environment. The construction of high-covering unit tests and their execution require appropriate interactions with the environment such as a...

    Provided By North Carolina State University

  • White Papers // Feb 2009

    Service Performance and Analysis in Cloud Computing

    Cloud computing is a new cost-efficient computing paradigm in which information and computer power can be accessed from a Web browser by customers. Understanding the characteristics of computer service performance has become critical for service applications in cloud computing. For the commercial success of this new computing paradigm, the ability...

    Provided By North Carolina State University

  • White Papers // Feb 2009

    Mining Exception-Handling Rules as Sequence Association Rules

    Programming languages such as Java and C++ provide exception-handling constructs such as try-catch to handle exception conditions that arise during program execution. Under these exception conditions, programs follow paths different from normal execution paths; these additional paths are referred to as exception paths. Applications developed based on these programming languages...

    Provided By North Carolina State University

  • White Papers // Feb 2009

    Test Selection for Result Inspection Via Mining Predicate Rules

    It is labor-intensive to manually verify the outputs of a large set of tests that are not equipped with test oracles. Test selection helps to reduce this cost by selecting a small subset of tests that are likely to reveal faults. A promising approach is to dynamically mine operational models...

    Provided By North Carolina State University

  • White Papers // Feb 2009

    Guided Path Exploration for Regression Test Generation

    Regression test generation aims at generating a test suite that can detect behavioral differences between the original and the modified versions of a program. Regression test generation can be automated by using Dynamic Symbolic Execution (DSE), a state-of-the-art test generation technique, to generate a test suite achieving high structural coverage....

    Provided By North Carolina State University

  • White Papers // Feb 2009

    Using VCL Technology to Implement Distributed Reconfigurable Data Centers and Computational Services for Educational Institutions

    In the context of educational institutions, small distributed data centers and labs are becoming increasingly expensive to provision, support and maintain on their own. This leads to preferences towards centralized and integrated data center resource management and network access to the resources. In turn, the data centers are undergoing a...

    Provided By North Carolina State University

  • White Papers // Jan 2009

    DiffQ: Practical Differential Backlog Congestion Control for Wireless Networks

    Congestion control in wireless multi-hop networks is challenging and complicated because of two reasons. First, interference is ubiquitous and causes loss in the shared medium. Second, wireless multihop networks are characterized by the use of diverse and dynamically changing routing paths. Traditional end point based congestion control protocols are ineffective...

    Provided By North Carolina State University

  • White Papers // Jan 2009

    PFetch: Software Prefetching Exploiting Temporal Predictability of Memory Access Streams

    CPU speeds have increased faster than the rate of improvement in memory access latencies in the recent past. As a result, with programs that suffer excessive cache misses, the CPU will increasingly be stalled waiting for the memory system to provide the requested memory line. Prefetching is a latency hiding...

    Provided By North Carolina State University

  • White Papers // Jan 2009

    Treat-Before-Trick : Free-Riding Prevention for BitTorrent-Like Peer-to-Peer Networks

    In P2P file sharing systems, free-riders who use others' resources without sharing their own cause system-wide performance degradation. Existing techniques to counter free-riders are either complex (and thus not widely deployed), or easy to bypass (and therefore not effective). This paper proposes a simple yet highly effective free-rider prevention scheme...

    Provided By North Carolina State University

  • White Papers // Jan 2009

    Adaptive Quickest Change Detection With Unknown Parameter

    Quickest detection of an abrupt distribution change with an unknown time varying parameter is considered. A novel adaptive approach is proposed to tackle this problem, which is shown to outperform the celebrated Parallel CUSUM Test. Performance is evaluated through theoretical analysis and numerical simulations. Quickest detection is a technique to...

    Provided By North Carolina State University

  • White Papers // Apr 2009

    The FREEDM Architecture of Fault Tolerant Network Routing through Software Overlays

    Control decisions of intelligent devices in critical infrastructure can have a significant impact on human life and the environment. Insuring that the appropriate data is available is crucial in making informed decisions. Such considerations are becoming increasingly important in today's cyber-physical systems that combine computational decision making on the cyber...

    Provided By North Carolina State University

  • White Papers // Mar 2010

    Time-Based Intrusion Detection in Cyber-Physical Systems

    Embedded systems, particularly real-time systems with temporal constraints, are increasingly deployed in every day life. Such systems that interact with the physical world are also referred to as Cyber-Physical Systems (CPS). These systems commonly find use in critical infrastructure from transportation to health care. While security in CPS-based real-time embedded...

    Provided By North Carolina State University

  • White Papers // Aug 2009

    Towards a Unifying Approach in Understanding Security Problems

    To evaluate security in the context of software reliability engineering, it is necessary to analyze security problems, actual exploits, and their relationship with an understanding of the operational behavior of the system. That can be done in terms of the effort involved in security exploits, through classic reliability factors such...

    Provided By North Carolina State University

  • White Papers // Jul 2009

    An Empirical Study of Security Problem Reports in Linux Distributions

    Existing work like focuses primiarily on the analysis of the general category of problem reports or limit their attention to observations on number of security problems reported in open source projects. Existing studies on problem reports in open source projects focus primarily on the analysis of the general category of...

    Provided By North Carolina State University

  • White Papers // Apr 2007

    Information Security with Real-Time Operation: Performance Assessment for Next Generation Wireless Distributed Networked-Control-Systems

    Distributed Network-Control-Systems (D-NCS) are a multidisciplinary effort whose aim is to produce a network structure and components that are capable of integrating sensors, actuators, communication, and control algorithms in a manner to suit real-time applications. They have been gaining popularity due to their high potential in widespread applications and becoming...

    Provided By North Carolina State University

  • White Papers // Sep 2012

    Is Link Signature Dependable for Wireless Security?

    Link signature, which refers to the unique and reciprocal wireless channel between a pair of transceivers, has gained significant attentions recently due to its effectiveness in signal authentication and shared secret construction for various wireless applications. A fundamental assumption of this technique is that the wireless signals received at two...

    Provided By North Carolina State University

  • White Papers // Jul 2008

    Performance Assessment and Compensation for Secure Networked Control Systems

    Network-Control-Systems (NCS) have been gaining popularity due to their high potential in widespread applications and becoming realizable due to the rapid advancements in embedded systems, wireless communication technologies. This paper addresses the issue of NCS information security as well its time-sensitive performance and their trade-off. A PI controller implemented on...

    Provided By North Carolina State University

  • White Papers // Apr 2007

    Conformance Checking of Access Control Policies Specified in XACML

    Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to which resources in a system. To facilitate managing and maintaining access control, access control policies are increasingly written in specification languages such as...

    Provided By North Carolina State University

  • White Papers // Jun 2006

    A Framework for Identifying Compromised Nodes in Sensor Networks

    Sensor networks are often subject to physical attacks. Once a node's cryptographic key is compromised, an attacker may completely impersonate it, and introduce arbitrary false information into the network. Basic cryptographic security mechanisms are often not effective in this situation. Most techniques to address this problem focus on detecting and...

    Provided By North Carolina State University

  • White Papers // Jun 2011

    EMFS: Email-Based Personal Cloud Storage

    Though a variety of cloud storage services have been offered recently, they have not yet provided users with transparent and cost-effective personal data storage. Services like Google Docs offer easy file access and sharing, but tie storage with internal data formats and specific applications. Meanwhile, services like Dropbox offer general-purpose...

    Provided By North Carolina State University

  • White Papers // Dec 2012

    Scheduling Cloud Capacity for Time-Varying Customer Demand

    As utility computing resources become more ubiquitous, service providers increasingly look to the cloud for an in-full or in-part infrastructure to serve utility computing customers on demand. Given the costs associated with cloud infrastructure, dynamic scheduling of cloud resources can significantly lower costs while providing an acceptable service level. The...

    Provided By North Carolina State University

  • White Papers // Feb 2014

    Automatic Identification of Application I/O Signatures from Noisy Server-Side Traces

    Competing workloads on a shared storage system cause I/O resource contention and application performance vagaries. This problem is already evident in today's HPC storage systems and is likely to become acute at exascale. The authors need more interaction between application I/O requirements and system software tools to help alleviate the...

    Provided By North Carolina State University

  • White Papers // Sep 2012

    Reducing Data Movement Costs Using Energy-Efficient, Active Computation on SSD

    Modern scientific discovery often involves running complex application simulations on supercomputers, followed by a sequence of data analysis tasks on smaller clusters. This offline approach suffers from significant data movement costs such as redundant I/O, storage bandwidth bottleneck, and wasted CPU cycles, all of which contribute to increased energy consumption...

    Provided By North Carolina State University

  • White Papers // Nov 2012

    On the Accurate Identification of Network Service Dependencies in Distributed Systems

    The automated identification of network service dependencies remains a challenging problem in the administration of large distributed systems. Advances in developing solutions for this problem have immediate and tangible benefits to operators in the field. When the dependencies of the services in a network are better-understood, planning for and responding...

    Provided By North Carolina State University

  • White Papers // Jan 2013

    Characterizing Link Connectivity for Opportunistic Mobile Networking: Does Mobility Suffice?

    With recent drastic growth in the number of users carrying smart mobile devices, it is not hard to envision opportunistic ad-hoc communications taking place with such devices carried by humans. This leads to, however, a new challenge to the conventional link-level metrics, solely defined based on user mobility, such as...

    Provided By North Carolina State University

  • White Papers // Jun 2012

    From Glauber Dynamics to Metropolis Algorithm: Smaller Delay in Optimal CSMA

    Since the seminal work by Tassiulas and Ephremides on throughput-optimal scheduling, referred to as Max-Weight, a huge array of research has been made to develop distributed MAC scheduling with high performance guarantee and low complexity. The tradeoff between complexity and efficiency has been, however, observed in many cases, or even...

    Provided By North Carolina State University

  • White Papers // Sep 2012

    Scalable Optimal Traffic Grooming in WDM Rings Incorporating Fast RWA Formulation

    The authors present a scalable formulation for the traffic grooming problem in WDM ring networks. Specifically, they modify the ILP formulation to replace the constraints related to Routing and Wavelength Assignment (RWA), typically based on a link approach, with a new set of constraints based on the Maximal Independent Set...

    Provided By North Carolina State University

  • White Papers // Sep 2012

    An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks

    The authors consider the Virtual Topology and Traffic Routing (VTTR) problem, a sub-problem of traffic grooming that arises as a fundamental network design problem in optical networks. The objective of VTTR is to determine the minimum number of light-paths so as to satisfy a set of traffic demands, and does...

    Provided By North Carolina State University

  • White Papers // Jul 2011

    Evaluation of SIP Proxy Server Performance: Packet-Level Measurements and Queuing Model

    The growing number of applications that use the Session Initiation Protocol (SIP) to manage media sessions over IP is placing increasing demands on the SIP Proxy Servers (SPS) that make up the core of the SIP network. In this paper, the authors investigate the performance of OpenSIPS, an open source...

    Provided By North Carolina State University

  • White Papers // Jan 2013

    Flexible Capacity Partitioning in Many-Core Tiled CMPs

    Chip Multi-Processors (CMP) have become a mainstream computing platform. As transistor density shrinks and the number of cores increases, more scalable CMP architectures will emerge. Recently, tiled architectures have shown such scalable characteristics and been used in many industry chips. The memory hierarchy in tiled architectures presents interesting design challenges....

    Provided By North Carolina State University

  • White Papers // Feb 2012

    Evaluating Dynamics and Bottlenecks of Memory Collaboration in Cluster Systems

    With the fast development of highly-integrated distributed systems (cluster systems), designers face interesting memory hierarchy design choices while attempting to avoid the notorious disk swapping. Swapping to the free remote memory through Memory Collaboration has demonstrated its cost-effectiveness compared to over-provisioning the cluster for peak load requirements. Recent memory collaboration...

    Provided By North Carolina State University

  • White Papers // Feb 2012

    Data Sharing in MultiThreaded Applications and Its Impact on Chip Design

    Analytical modeling is becoming an increasingly important technique used in the design of chip multiprocessors. Most such models assume multi-programmed workload mixes and either ignore or oversimplify the behavior of multi-threaded applications. In particular, data sharing observed in multi-threaded applications, and its impact on chip design decisions, has not been...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    Impact of Data Sharing on CMP Design: A Study Based on Analytical Modeling

    Over the past few years, Chip Multi Processor (CMP) architecture has become the dominating hardware architecture across a spectrum of computing machinery - personal computing devices, workstations, commercial and scientific servers, and warehouse scale computers. The sheer complexity involved in the design and verification of each unit in a CMP...

    Provided By North Carolina State University

  • White Papers // Dec 2010

    Architectural Framework for Supporting Operating System Survivability

    The ever increasing size and complexity of Operating System (OS) kernel code bring an inevitable increase in the number of security vulnerabilities that can be exploited by attackers. A successful security attack on the kernel has a profound impact that may affect all processes running on it. In this paper,...

    Provided By North Carolina State University

  • White Papers // Dec 2009

    Defining Anomalous Behavior for Phase Change Memory

    Traditional memory systems based on memory technologies such as DRAM are fast approaching their cost and power limits. Alternative memory technologies such as Phase Change Memory (PCM) are being widely researched as a scalable, cost- and power-efficient alternative for DRAM. However, a PCM memory cell has a limited endurance of...

    Provided By North Carolina State University

  • White Papers // May 2012

    Understanding the Limits of Capacity Sharing in CMP Private Caches

    Chip Multi Processor (CMP) systems present interesting design challenges at the lower levels of the cache hierarchy. Private L2 caches allow easier processor-cache design reuse, thus scaling better than a system with a shared L2 cache, while offering better performance isolation and lower access latency. While some private cache management...

    Provided By North Carolina State University

  • White Papers // Aug 2009

    SHIELDSTRAP: Making Secure Processors Truly Secure

    Many systems may have security requirements such as protecting the privacy of data and code stored in the system, ensuring integrity of computations, or preventing the execution of unauthorized code. It is becoming increasingly difficult to ensure such protections as hardware-based attacks, in addition to software attacks, become more widespread...

    Provided By North Carolina State University

  • White Papers // Sep 2009

    Memory Management Thread for Heap Allocation Intensive Sequential Applications

    Dynamic memory management is one of the most ubiquitous and expensive operations in many C/C++ applications. Some C/C++ programs might spend up to one third of their execution time in dynamic memory management routines. With multicore processors as a mainstream architecture, it is important to investigate how dynamic memory management...

    Provided By North Carolina State University

  • White Papers // Jun 2009

    SHIELDSTRAP: A Secure Bootstrap Architecture

    Many systems may have security requirements such as protecting the privacy of data and code stored in the system, ensuring integrity of computations, or preventing the execution of unauthorized code. It is becoming increasingly difficult to ensure such protections as hardware-based attacks, in addition to software attacks, become more widespread...

    Provided By North Carolina State University

  • White Papers // Feb 2013

    Directory-Oblivious Capacity Sharing in Tiled CMPs

    In bus-based CMPs with private caches, Capacity Sharing is applied by spilling victim cache blocks from over-utilized caches to under-utilized ones. If a spilled block is needed, it can be retrieved by posting a miss on the bus. Prior work in this domain focused on Capacity Sharing design and put...

    Provided By North Carolina State University

  • White Papers // Jul 2012

    Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations

    JavaScript-based applications are very popular on the web today. However, the lack of effective protection makes various kinds of privacy violation attack possible, including cookie stealing, history sniffing and behavior tracking. There have been studies of the prevalence of such attacks, but the dynamic nature of the JavaScript language makes...

    Provided By North Carolina State University

  • White Papers // Jul 2009

    Core-Selectability in Chip Multiprocessors

    The centralized structures necessary for the extraction of Instruction-Level Parallelism (ILP) are consuming progressively smaller portions of the total die area of Chip Multi-Processors (CMP). The reason for this is that scaling these structures does not enhance general performance as much as scaling the cache and interconnect. However, the fact...

    Provided By North Carolina State University

  • White Papers // Jan 2014

    Fair Caching in a Chip Multiprocessor Architecture

    In this paper, the authors present a detailed study of fairness in cache sharing between threads in a Chip Multi-Processor (CMP) architecture. Prior work in CMP architectures has only studied throughput optimization techniques for a shared cache. The issue of fairness in cache sharing, and its relation to throughput, has...

    Provided By North Carolina State University

  • White Papers // Mar 2012

    Low Contention Mapping of Real-Time Tasks onto a TilePro 64 Core Processor

    Predictability of task execution is paramount for real-time systems so that upper bounds of execution times can be determined via static timing analysis. Static timing analysis on Network-on-Chip (NoC) processors may result in unsafe underestimations when the underlying communication paths are not considered. This stems from contention on the underlying...

    Provided By North Carolina State University

  • White Papers // Nov 2009

    CHOP: Adaptive Filter-Based DRAM Caching for CMP Server Platforms

    As manycore architectures enable a large number of cores on the die, a key challenge that emerges is the availability of memory bandwidth with conventional DRAM solutions. To address this challenge, integration of large DRAM caches that provide as much as 5

    Provided By North Carolina State University

  • White Papers // Jan 2011

    HAQu: Hardware-Accelerated Queueing for Fine-Grained Threading on a Chip Multiprocessor

    Queues are commonly used in multithreaded programs for synchronization and communication. However, because software queues tend to be too expensive to support fine grained parallelism, hardware queues have been proposed to reduce overhead of communication between cores. Hardware queues require modifications to the processor core and need a custom interconnect....

    Provided By North Carolina State University

  • White Papers // Jun 2009

    Architecture Support for Improving Bulk Memory Copying and Initialization Performance

    Bulk memory copying and initialization is one of the most ubiquitous operations performed in current computer systems by both user applications and operating systems. While many current systems rely on a loop of loads and stores, there are proposals to introduce a single instruction to perform bulk memory copying. While...

    Provided By North Carolina State University

  • White Papers // Jul 2008

    Exploiting Locality to Ameliorate Packet Queue Contention and Serialization

    Packet processing systems maintain high throughput despite relatively high memory latencies by exploiting the coarse-grained parallelism available between packets. In particular, multiple processors are used to overlap the processing of multiple packets. Packet queuing - the fundamental mechanism enabling packet scheduling, differentiated services, and traffic isolation - requires a read-modify-write...

    Provided By North Carolina State University

  • White Papers // Jul 2008

    Dynamic Thread Assignment on Heterogeneous Multiprocessor Architectures

    In a multi-programmed computing environment, threads of execution exhibit different runtime characteristics and hardware resource requirements. Not only do the behaviors of distinct threads differ, but each thread may also present diversity in its performance and resource usage over time. A heterogeneous Chip Multi-Processor (CMP) architecture consists of processor cores...

    Provided By North Carolina State University

  • White Papers // Aug 2011

    Memory Trace Compression and Replay for SPMD Systems using Extended PRSDs

    Concurrency levels in large-scale supercomputers are rising exponentially, and shared-memory nodes with hundreds of cores and non-uniform memory access latencies are expected within the next decade. However, even current petascale systems with tens of cores per node suffer from memory bottlenecks. As core counts increase, memory issues will become critical...

    Provided By North Carolina State University