North Carolina State University

Displaying 241-258 of 258 results

  • White Papers // Jan 2009

    Structured Variational Methods for Distributed Inference in Wireless Ad Hoc and Sensor Networks

    In this paper, a variational message passing framework is proposed for Markov random fields, which is computationally more efficient and admits wider applicability compared to the belief propagation algorithm. Based on this framework, structured variational methods are explored to take advantage of both the simplicity of variational approximation (for inter-cluster...

    Provided By North Carolina State University

  • White Papers // Jan 2009

    ERONs: Dynamic Lightpath Networking Via Overlay Control of Static Optical Connections

    To bridge the gap between the current practice of setting up expensive, dedicated, lightpath connections (i.e., static topologies), and the distant future vision of inexpensive access to dynamically switched end-to-end lightpaths the authors propose a medium term solution in the form of Edge-Reconfigurable Optical Networks (ERONs). An ERON is an...

    Provided By North Carolina State University

  • White Papers // Jan 2009

    Modeling System Calls for Intrusion Detection With Dynamic Window Sizes

    It extends prior research on system call anomaly detection modeling methods for intrusion detection by incorporating dynamic window sizes. The window size is the length of the subsequence of a system call trace which is used as the basic unit for modeling program or process behavior. This paper incorporates dynamic...

    Provided By North Carolina State University

  • White Papers // Sep 2008

    Merging State and Preserving Timing Anomalies in Pipelines of High-End Processors

    Many embedded systems are subject to temporal constraints that require advance guarantees on meeting deadlines. Such systems rely on static analysis to safely bound Worst-Case Execution Time (WCET) bounds of tasks. Designers of these systems are forced to avoid state-of-the-art processors due to their inherent architectural complexity (such as out-of-order...

    Provided By North Carolina State University

  • White Papers // Aug 2008

    Security-Aware Resource Optimization in Distributed Service Computing

    In this paper, the authors consider a set of computer resources used by a service provider to host enterprise applications for customer services subject to a Service Level Agreement (SLA). The SLA defines three QoS metrics, namely, trustworthiness, percentile response time and availability. They first give an overview of current...

    Provided By North Carolina State University

  • White Papers // Jul 2008

    Dynamic Thread Assignment on Heterogeneous Multiprocessor Architectures

    In a multi-programmed computing environment, threads of execution exhibit different runtime characteristics and hardware resource requirements. Not only do the behaviors of distinct threads differ, but each thread may also present diversity in its performance and resource usage over time. A heterogeneous Chip Multi-Processor (CMP) architecture consists of processor cores...

    Provided By North Carolina State University

  • White Papers // Jul 2008

    Performance Assessment and Compensation for Secure Networked Control Systems

    Network-Control-Systems (NCS) have been gaining popularity due to their high potential in widespread applications and becoming realizable due to the rapid advancements in embedded systems, wireless communication technologies. This paper addresses the issue of NCS information security as well its time-sensitive performance and their trade-off. A PI controller implemented on...

    Provided By North Carolina State University

  • White Papers // Jul 2008

    Exploiting Locality to Ameliorate Packet Queue Contention and Serialization

    Packet processing systems maintain high throughput despite relatively high memory latencies by exploiting the coarse-grained parallelism available between packets. In particular, multiple processors are used to overlap the processing of multiple packets. Packet queuing - the fundamental mechanism enabling packet scheduling, differentiated services, and traffic isolation - requires a read-modify-write...

    Provided By North Carolina State University

  • White Papers // Mar 2008

    Hybrid Timing Analysis of Modern Processor Pipelines via Hardware/Software Interactions

    Embedded systems are often subject to constraints that require determinism to ensure that task deadlines are met. Such systems are referred to as real-time systems. Schedulability analysis provides a firm basis to ensure that tasks meet their deadlines for which knowledge of Worst-Case Execution Time (WCET) bounds is a critical...

    Provided By North Carolina State University

  • White Papers // Nov 2007

    Worst-Case Execution Time Analysis of Security Policies for Deeply Embedded Real-Time Systems

    Deeply embedded systems often have unique constraints because of their small size and vital roles in critical infrastructure. Problems include limitations on code size, limited access to the actual hardware, etc. These problems become more critical in real-time systems where security policies must not only work within the above limitations...

    Provided By North Carolina State University

  • White Papers // Apr 2007

    Conformance Checking of Access Control Policies Specified in XACML

    Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to which resources in a system. To facilitate managing and maintaining access control, access control policies are increasingly written in specification languages such as...

    Provided By North Carolina State University

  • White Papers // Apr 2007

    Information Security with Real-Time Operation: Performance Assessment for Next Generation Wireless Distributed Networked-Control-Systems

    Distributed Network-Control-Systems (D-NCS) are a multidisciplinary effort whose aim is to produce a network structure and components that are capable of integrating sensors, actuators, communication, and control algorithms in a manner to suit real-time applications. They have been gaining popularity due to their high potential in widespread applications and becoming...

    Provided By North Carolina State University

  • White Papers // Feb 2007

    The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information

    In 2005, there was a significant increase in the number of security and privacy breaches disclosed to the public. Leading the charge was ChoicePoint, a data broker that suffered fraudulent access to its vast databases of personal information. ChoicePoint and other data brokers exist in a largely unregulated environment, in...

    Provided By North Carolina State University

  • White Papers // Jan 2007

    Using Deception to Hide Things from Hackers: Processes, Principles, and Techniques

    Deception offers one means of hiding things from an adversary. This paper introduces a model for understanding, comparing and developing methods of deceptive hiding. The model characterizes deceptive hiding in terms of how it defeats the underlying processes that an adversary uses to discover the hidden thing. An adversary's process...

    Provided By North Carolina State University

  • White Papers // Aug 2006

    The State of ZettaRAM

    Computer architectures are heavily influenced by parameters imposed by memory technologies. Memory hierarchies, virtual memory, prefetching, multithreading, and large-window processors are some well-known examples of architectural innovations influenced by memory constraints. This paper surveys ZettaRAM, a nascent memory technology based on molecular electronics. From patents and papers, the authors distill...

    Provided By North Carolina State University

  • White Papers // Aug 2006

    Assertion-Based Microarchitecture Design for Improved Fault Tolerance

    Protection against transient faults is an important constraint in high-performance processor design. One strategy for achieving efficient reliability is to apply targeted fault checking/masking techniques to different units within an overall reliability regimen. In this paper, the authors propose a novel class of targeted fault checks that verify the functioning...

    Provided By North Carolina State University

  • White Papers // Jun 2006

    A Framework for Identifying Compromised Nodes in Sensor Networks

    Sensor networks are often subject to physical attacks. Once a node's cryptographic key is compromised, an attacker may completely impersonate it, and introduce arbitrary false information into the network. Basic cryptographic security mechanisms are often not effective in this situation. Most techniques to address this problem focus on detecting and...

    Provided By North Carolina State University

  • White Papers // Jan 2006

    Non-Uniform Program Analysis & Repeatable Execution Constraints: Exploiting Out-of-Order Processors in Real-Time Systems

    In this paper the authors enable easy, tight, and safe timing analysis of contemporary complex processors. They exploit the fact that out-of-order processors can be analyzed via simulation in the absence of variable control-flow. In their first technique, Non-Uniform Program Analysis (NUPA), program segments with a single flow of control...

    Provided By North Carolina State University

  • White Papers // Nov 2013

    PAQO: Preference-Aware Query Optimization for Decentralized Database Systems

    The declarative nature of SQL has traditionally been a major strength. Users simply state what information they are interested in, and the database management system determines the best plan for retrieving it. A consequence of this model is that should a user ever want to specify some aspect of how...

    Provided By North Carolina State University

  • White Papers // Apr 2007

    Information Security with Real-Time Operation: Performance Assessment for Next Generation Wireless Distributed Networked-Control-Systems

    Distributed Network-Control-Systems (D-NCS) are a multidisciplinary effort whose aim is to produce a network structure and components that are capable of integrating sensors, actuators, communication, and control algorithms in a manner to suit real-time applications. They have been gaining popularity due to their high potential in widespread applications and becoming...

    Provided By North Carolina State University

  • White Papers // Aug 2009

    Towards a Unifying Approach in Understanding Security Problems

    To evaluate security in the context of software reliability engineering, it is necessary to analyze security problems, actual exploits, and their relationship with an understanding of the operational behavior of the system. That can be done in terms of the effort involved in security exploits, through classic reliability factors such...

    Provided By North Carolina State University

  • White Papers // Jan 2007

    Using Deception to Hide Things from Hackers: Processes, Principles, and Techniques

    Deception offers one means of hiding things from an adversary. This paper introduces a model for understanding, comparing and developing methods of deceptive hiding. The model characterizes deceptive hiding in terms of how it defeats the underlying processes that an adversary uses to discover the hidden thing. An adversary's process...

    Provided By North Carolina State University

  • White Papers // Mar 2013

    Reasonableness Meets Requirements: Regulating Security and Privacy in Software

    Software security and privacy issues regularly grab headlines amid fears of identity theft, data breaches, and threats to security. Policymakers have responded with a variety of approaches to combat such risk. Suggested measures include promulgation of strict rules, enactment of open-ended standards, and, at times, abstention in favor of allowing...

    Provided By North Carolina State University

  • White Papers // Feb 2007

    The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information

    In 2005, there was a significant increase in the number of security and privacy breaches disclosed to the public. Leading the charge was ChoicePoint, a data broker that suffered fraudulent access to its vast databases of personal information. ChoicePoint and other data brokers exist in a largely unregulated environment, in...

    Provided By North Carolina State University

  • White Papers // Mar 2012

    Low Contention Mapping of Real-Time Tasks onto a TilePro 64 Core Processor

    Predictability of task execution is paramount for real-time systems so that upper bounds of execution times can be determined via static timing analysis. Static timing analysis on Network-on-Chip (NoC) processors may result in unsafe underestimations when the underlying communication paths are not considered. This stems from contention on the underlying...

    Provided By North Carolina State University

  • White Papers // Jan 2014

    Fair Caching in a Chip Multiprocessor Architecture

    In this paper, the authors present a detailed study of fairness in cache sharing between threads in a Chip Multi-Processor (CMP) architecture. Prior work in CMP architectures has only studied throughput optimization techniques for a shared cache. The issue of fairness in cache sharing, and its relation to throughput, has...

    Provided By North Carolina State University

  • White Papers // Jan 2013

    A Semantic Protocol-Based Approach for Developing Business Processes

    A (business) protocol is a modular, public specification of an interaction among different roles that achieves a desired purpose. The authors' model protocols in terms of the commitments of the participating roles. Commitments enable reasoning about actions, thus allowing the participants to comply with protocols while acting flexibly to exploit...

    Provided By North Carolina State University

  • White Papers // Jan 2011

    HAQu: Hardware-Accelerated Queueing for Fine-Grained Threading on a Chip Multiprocessor

    Queues are commonly used in multithreaded programs for synchronization and communication. However, because software queues tend to be too expensive to support fine grained parallelism, hardware queues have been proposed to reduce overhead of communication between cores. Hardware queues require modifications to the processor core and need a custom interconnect....

    Provided By North Carolina State University

  • White Papers // Jan 2013

    Modeling Flexible Business Processes

    Current approaches of designing business processes rely on traditional workflow technologies and thus take a logically centralized view of processes. Processes designed in that manner assume the participants will act as invoked, thus limiting their flexibility or autonomy. Flexibility is in conflict with both reusability and compliance. The authors propose...

    Provided By North Carolina State University

  • White Papers // Nov 2009

    CHOP: Adaptive Filter-Based DRAM Caching for CMP Server Platforms

    As manycore architectures enable a large number of cores on the die, a key challenge that emerges is the availability of memory bandwidth with conventional DRAM solutions. To address this challenge, integration of large DRAM caches that provide as much as 5

    Provided By North Carolina State University

  • White Papers // Jul 2009

    Core-Selectability in Chip Multiprocessors

    The centralized structures necessary for the extraction of Instruction-Level Parallelism (ILP) are consuming progressively smaller portions of the total die area of Chip Multi-Processors (CMP). The reason for this is that scaling these structures does not enhance general performance as much as scaling the cache and interconnect. However, the fact...

    Provided By North Carolina State University

  • White Papers // Jul 2008

    Exploiting Locality to Ameliorate Packet Queue Contention and Serialization

    Packet processing systems maintain high throughput despite relatively high memory latencies by exploiting the coarse-grained parallelism available between packets. In particular, multiple processors are used to overlap the processing of multiple packets. Packet queuing - the fundamental mechanism enabling packet scheduling, differentiated services, and traffic isolation - requires a read-modify-write...

    Provided By North Carolina State University

  • White Papers // Jul 2008

    Dynamic Thread Assignment on Heterogeneous Multiprocessor Architectures

    In a multi-programmed computing environment, threads of execution exhibit different runtime characteristics and hardware resource requirements. Not only do the behaviors of distinct threads differ, but each thread may also present diversity in its performance and resource usage over time. A heterogeneous Chip Multi-Processor (CMP) architecture consists of processor cores...

    Provided By North Carolina State University

  • White Papers // Feb 2014

    Tools for Simulation and Benchmark Generation at Exascale

    The path to exascale High-Performance Computing (HPC) poses several challenges related to power, performance, resilience, productivity, programmability, data movement, and data management. Investigating the performance of parallel applications at scale on future architectures and the performance impact of different architecture choices is an important component of HPC hardware/software co-design. Simulations...

    Provided By North Carolina State University

  • White Papers // Jun 2013

    MetaSymploit: Day-One Defense Against Script-Based Attacks with Security-Enhanced Symbolic Analysis

    In this paper, the authors propose MetaSymploit, the first system of fast attack script analysis and automatic signature generation for a network Intrusion Detection System (IDS). As soon as a new attack script is developed and distributed, MetaSymploit uses security-enhanced symbolic execution to quickly analyze the script and automatically generate...

    Provided By North Carolina State University

  • White Papers // Sep 2013

    WHYPER: Towards Automating Risk Assessment of Mobile Applications

    In this paper, the authors present the first step in addressing this challenge. Specifically, they focus on permissions for a given application and examine whether the application description provides any indication for: why the application needs permission. They present WHYPER, a framework using Natural Language Processing (NLP) techniques to identify...

    Provided By North Carolina State University