Northwestern University

Displaying 1-40 of 121 results

  • White Papers // Aug 2013

    Scheduled Voltage Scaling for Increasing Lifetime in the Presence of NBTI

    Negative Bias Temperature Instability (NBTI) is a leading reliability concern for Integrated Circuits (ICs). It gradually increases the threshold voltages of PMOS transistors, thereby increasing delay. The authors propose scheduled voltage scaling, a technique that gradually increases the operating voltage of the IC to compensate for NBTI-related performance degradation. Scheduled...

    Provided By Northwestern University

  • White Papers // Apr 2013

    Guarded Execution of Privileged Code in the Guest

    Allowing a guest to have direct, privileged access to hardware can enhance its performance and functionality. Privileged access to hardware and the VMM also enables and improves the performance of virtualization services by allowing portions of their implementations to be hoisted into the guest, even uncooperatively. However, granting such privilege...

    Provided By Northwestern University

  • White Papers // Apr 2013

    Making JavaScript Better By Making It Even Slower

    On mobile devices, such as Smartphones and tablets, client-side JavaScript is a significant contributor to power consumption, and thus battery lifetime. The authors claim that this is partially due to JavaScript interpretation running faster than is necessary to maintain a satisfactory user experience, and they propose that JavaScript implementations include...

    Provided By Northwestern University

  • White Papers // Apr 2013

    VMM-based Emulation of Intel Hardware Transactional Memory

    The authors describe the design, implementation, and evaluation of emulated hardware transactional memory, specifically the Intel Haswell Restricted Transactional Memory (RTM) architectural extensions for x86/64, within a virtual machine monitor (VMM). Their system allows users to investigate RTM on hardware that does not provide it, debug their RTM-based transactional software,...

    Provided By Northwestern University

  • White Papers // Mar 2013

    The Public Safety Broadband Network: A Novel Architecture with Mobile Base Stations

    A nationwide interoperable public safety broadband network is being planned by the United States government. The network will be based on Long Term Evolution (LTE) standards and use recently designated spectrum in the 700 MHz band. The public safety network has different objectives and traffic patterns than commercial wireless networks....

    Provided By Northwestern University

  • White Papers // Mar 2013

    Security Frameworks Design and Implementation for Dynamic Management of Data and Information in Cognitive Radio Networks

    Cognitive radio network is a new innovation wireless technology aiming to improve the utilization of the electromagnetic spectrum. Cognitive radio network consists of several cognitive radio devices which run radio applications software to perform signal processing using the frequency bandwidth. The use of this software enables the device to sense...

    Provided By Northwestern University

  • White Papers // Jan 2013

    Enterprise Social Network Analysis and Modeling: A Tale of Two Graphs

    Like their public counterpart such as Facebook and Twitter, enterprise social networks are poised to revolutionize how people interact in the workplace. There is a pressing need to understand how people are using these social networks. Unlike the public social networks like Facebook or Twitter which are normally characterized using...

    Provided By Northwestern University

  • White Papers // Jan 2013

    AppsPlayground: Automatic Security Analysis of Smartphone Applications

    Today's smartphone application markets host an ever increasing number of applications. The sheer number of applications makes their review a daunting task. The authors propose AppsPlayground, a framework for automatically driving smartphone applications using their user interface characteristics, supporting complex user interactions, including the ability to create and supply login...

    Provided By Northwestern University

  • White Papers // Jan 2013

    Trying Broadband Characterization at Home

    In recent years the quantity and diversity of Internet-enabled consumer devices in the home have increased significantly. These trends complicate device usability and home resource management and have implications for crowdsourced approaches to broadband characterization. The UPnP protocol has emerged as an open standard for device and service discovery to...

    Provided By Northwestern University

  • White Papers // Jan 2013

    Spectrum Markets with Interference Complementarities

    Extensive spectrum markets have the potential to enable more efficient use of this limited resource. Such markets must account for particular properties of the underlying wireless medium. In this paper the authors focus on one such aspect: the role of interference created among different agents who may purchase the right...

    Provided By Northwestern University

  • White Papers // Nov 2012

    Multi-Cell Distributed Interference Cancellation for Co-Operative Pico-Cell Clusters

    Alternative wireless topologies, e.g., an underlay network of Pico-cells, are increasingly seen as being necessary to enhance capacity and coverage in next generation wireless systems. Such networks of closely-spaced base-sites have to contend with high interference issues, wherein interference mitigation via power control or interference co-ordination may not be sufficient....

    Provided By Northwestern University

  • White Papers // Oct 2012

    Enhancing Parallelism of Pairwise Statistical Significance Estimation for Local Sequence Alignment

    Pairwise Statistical Significance (PSS) has been found to be able to accurately identify related sequences (homology detection), which is a fundamental step in numerous applications relating to sequence analysis. Although more accurate than database statistical significance, it is both computationally intensive and data intensive to construct the empirical score distribution...

    Provided By Northwestern University

  • White Papers // Sep 2012

    Complexity of Allocation Problems in Spectrum Markets with Interference Complementarities

    Markets are often viewed as a key ingredient in facilitating more efficient dynamic spectrum access. In this paper the authors consider how such spectrum markets are influenced by a key property of the wireless medium: interference. Interference can result in "Complementarities" among the "Spectrum goods" being traded, which complicates the...

    Provided By Northwestern University

  • White Papers // Aug 2012

    Selective Behavior in Online Social Networks

    According to the classical communication theories, known as Gatekeeping and Selective Exposure, individuals tend to have selective behavior when they disseminate and receive information based on their psychological preferences. Selective behavior related to these two theories have been broadly studied separately. While, thanks to the advent of Online Social Networks...

    Provided By Northwestern University

  • White Papers // Jul 2012

    Dynamic Directories: A Mechanism for Reducing On-Chip Interconnect Power in Multicores

    On-chip interconnection networks consume a significant fraction of the chip's power, and the rapidly increasing core counts in future technologies is going to further aggravate their impact on the chip's overall power consumption. A large fraction of the traffic originates not from data messages exchanged between sharing cores, but from...

    Provided By Northwestern University

  • White Papers // Jun 2012

    HAPPE: Human and Application Driven Frequency Scaling for Processor Power Efficiency

    Conventional dynamic voltage and frequency scaling techniques use high CPU utilization as a predictor for user dissatisfaction, to which they react by increasing CPU frequency. In this paper, the authors demonstrate that for many interactive applications, perceived performance is highly-dependent upon the particular user and application, and is not linearly...

    Provided By Northwestern University

  • White Papers // May 2012

    Security of Electrostatic Field Persistent Routing: Attacks and Defense Mechanisms

    Electrostatic Field-based Routing (EFR) is a form of geographical multi-path routing where packets are routed along a collection of electrostatic field lines, defined by electrostatic charges associated with source and sink nodes. EFR provides an efficient and scalable solution to the workload balancing problem. However, it assumes that nodes behave...

    Provided By Northwestern University

  • White Papers // May 2012

    On the Path to Sustainable, Scalable, and Energy-efficient Data Analytics: Challenges, Promises, and Future Directions

    As scientific data is reaching exascale, scalable and energy efficient data analytics is quickly becoming a top notch priority. Yet, a sustainable solution to this problem is hampered by a number of technical challenges that get exacerbated with the emerging hardware and software technology trends. In this paper, the authors...

    Provided By Northwestern University

  • White Papers // Apr 2012

    Wireless MIMO Switching With MMSE Relaying

    A wireless relay which forms a one-to-one mapping from the inputs (uplinks) to the outputs (downlinks) is called a Multiple-Input-Multiple-Output (MIMO) switch. The MIMO switch carries out pre-code-and-forward, where all users send their signals in the uplink and then the MIMO switch pre-codes the received vector signal for broadcasting in...

    Provided By Northwestern University

  • White Papers // Apr 2012

    A Sparse Octree Gravitational N-Body Code That Runs Entirely on the GPU Processor

    The authors present the implementation and performance of a new gravitational N- body tree-code that is specifically designed for the Graphics Processing Unit (GPU). All parts of the tree-code algorithm are executed on the GPU. They present algorithms for parallel construction and traversing of sparse oc-trees. These algorithms are implemented...

    Provided By Northwestern University

  • White Papers // Mar 2012

    Virtual-Machine-Based Emulation of Future Generation High-Performance Computing Systems

    In this paper, the authors describe the design of a system to enable research, development, and testing of new software stacks and hardware features for future high-end computing systems. Motivating uses include both small-scale research and development on simulated individual nodes of proposed high-performance computing systems, and large scaling studies...

    Provided By Northwestern University

  • White Papers // Mar 2012

    Uplink Distributed Power and Receiver Optimization Across Multiple Cells

    Interference mitigation approaches in the presence of multiple receive antennas in the uplink of a multi-cell wireless communications system are studied in this paper. A formulation based on interference pricing is proposed, where it is shown that a single price per base-station can be computed and exchanged, in order to...

    Provided By Northwestern University

  • White Papers // Mar 2012

    Characterization of Vision-Aided Indoor Localization and Landmark Routing

    GPS is the premier method of localization and way-finding in outdoor environments. Indoor environments prevent GPS from functioning properly or at all. RF-based solutions have been proposed using varieties of radio triangulation and spectral fingerprinting. Such technically attractive methods have not seen widespread adoption in places where the demand is...

    Provided By Northwestern University

  • White Papers // Mar 2012

    VirtualKnotter: Online Virtual Machine Shuffling for Congestion Resolving in Virtualized Datacenter

    The authors measurements on production datacenter traffic together with recently-reported results suggest that datacenter networks suffer from long-lived congestion caused by core network oversubscription and unbalanced workload placement. In contrast to traditional traffic engineering approaches that optimize flow routing, in this paper, they explore the opportunity to address the continuous...

    Provided By Northwestern University

  • White Papers // Jan 2012

    Supporting Computational Data Model Representation with High-Performance I/O in Parallel NetCDF

    Parallel computational scientific applications have been described by their computation and communication patterns. From a storage and I/O perspective, these applications can also be grouped into separate data models based on the way data is organized and accessed during simulation, analysis, and visualization. Parallel netCDF is a popular library used...

    Provided By Northwestern University

  • White Papers // Jan 2012

    Improving the Average Response Time in Collective I/O

    In collective I/O, MPI processes exchange requests so that the rearranged requests can result in the shortest file system access time. Scheduling the exchange sequence determines the response time of participating processes. Existing implementations that simply follow the increasing order of file offsets do not necessary produce the best performance....

    Provided By Northwestern University

  • White Papers // Jan 2012

    Reliability Constrained Packet-Sizing for Linear Multi-Hop Wireless Networks

    The authors consider optimizing the packet-sizes and the reuse factor to minimize the delay required to send a message between two nodes in a linear multi-hop wireless network subject to a reliability constraint. Initially, assuming no re-use, they give a bound on the required delay. Next, in an infinite system...

    Provided By Northwestern University

  • White Papers // Sep 2011

    Sum-Capacity of a Class of K-user Gaussian Interference Channels within O(K) Bits

    Though the capacity of the 2-user Gaussian interference channel has long eluded information theorists, recent progress has been made by focusing on approximations with provable bounds. However, extensions to a general K-user network has proven to be non-obvious, in particular due to the role of interference alignment in these cases....

    Provided By Northwestern University

  • White Papers // Sep 2011

    Wireless MIMO Switching With Zero-Forcing Relaying

    A wireless relay with multiple antennas is called a Multiple-Input-Multiple-Output (MIMO) switch if it forms a one-to-one mapping from the inputs (uplinks) to the outputs (downlinks). This paper studies the case with N source stations and N destination stations (which may be the same set), so that the mapping is...

    Provided By Northwestern University

  • White Papers // Aug 2011

    Achieving Target MTTF by Duplicating Reliability-Critical Components in High Performance Computing Systems

    Mean Time To failure, MTTF, is a commonly accepted metric for reliability. In this paper, the authors present a novel approach to achieve the desired MTTF with minimum redundancy. They analyze the failure behavior of large scale systems using failure logs collected by Los Alamos National Laboratory. They analyze the...

    Provided By Northwestern University

  • White Papers // Jul 2011

    An Efficient FPGA Implementation of Principle Component Analysis Based Network Intrusion Detection System

    Modern Network Intrsuion Detection Systems (NIDSs) use anomaly detection to capture malicious attacks. Since such connections are described by large set of dimensions, processing these huge amounts of network data becomes extremely slow. To solve this time-efficiency problem, statistical methods like Principal Component Analysis (PCA) can be used to reduce...

    Provided By Northwestern University

  • White Papers // Jul 2011

    Evaluating Voltage Islands in CMPs under Process Variations

    Parameter variations are a major factor causing power-performance asymmetry in chip multiprocessors. In this paper, the authors analyze the effects of With-In-Die (WID) process variations on chip multicore processors and then apply a variable voltage island scheme to minimize power dissipation. Their idea is based on the observation that due...

    Provided By Northwestern University

  • White Papers // Jul 2011

    Exploring I/O Strategies for Parallel Sequence-Search Tools with S3aSim

    Parallel sequence-search tools are rising in popularity among computational biologists. With the rapid growth of sequence databases, database segmentation is the trend of the future for such search tools. While I/O currently is not a significant bottleneck for parallel sequence-search tools, future technologies including faster processors, customized computational hardware such...

    Provided By Northwestern University

  • White Papers // Jul 2011

    Challenges for Parallel I/O in Grid Computing

    With virtually limitless resources, GRID computing has the potential to solve large-scale scientific problems that eclipse even applications that run on the largest computing clusters today. The architecture of a computing GRID simply consists of a heterogeneous network infrastructure connecting heterogeneous machines presumed to be larger than most clusters of...

    Provided By Northwestern University

  • White Papers // Jul 2011

    VNET/P: Bridging the Cloud and High Performance Computing Through Fast Overlay Networking

    Overlay networking with a layer 2 abstraction provides a powerful model for virtualized wide-area distributed computing resources, including for High Performance Computing (HPC) on collections of Virtual Machines (VMs). With the emergence of cloud computing, it is now possible to allow VMs hosting tightly-coupled HPC applications to seamlessly migrate between...

    Provided By Northwestern University

  • White Papers // Jul 2011

    Medium Access Control for Wireless Networks With Peer-to-Peer State Exchange

    Distributed Medium Access Control (MAC) protocols are proposed for wireless networks assuming that one-hop peers can periodically exchange a small amount of state information. Each station maintains a state and makes state transitions and transmission decisions based on its state and recent state information collected from its one-hop peers. A...

    Provided By Northwestern University

  • White Papers // Jul 2011

    Delay Performance of CSMA in Networks With Bounded Degree Conflict Graphs

    The authors analyze packet delay in CSMA-based random access schemes in networks under the protocol interference model. Using a stochastic coupling argument they identify a subset of the throughput-region where queue lengths can be bounded uniformly for all network sizes. This conclusion provides a throughput-region of interest for delay sensitive...

    Provided By Northwestern University

  • White Papers // Jun 2011

    High Performance Data Mining Using R on Heterogeneous Platforms

    The exponential increase in the generation and collection of data has led users in a new era of data analysis and information extraction. Conventional systems based on general-purpose processors are unable to keep pace with the heavy computational requirements of data mining techniques. High performance coprocessors like GPUs and FPGAs...

    Provided By Northwestern University

  • White Papers // Jun 2011

    Learning and Leveraging the Relationship Between Architecture-Level Measurements and Individual User Satisfaction

    The ultimate goal of computer design is to satisfy the end-user. In particular computing domains, such as interactive applications, there exists a variation in user expectations and user satisfaction relative to the performance of existing computer systems. In this paper, the authors leverage this variation to develop more efficient architectures...

    Provided By Northwestern University

  • White Papers // Jun 2011

    Understanding Crowds' Migration on the Web

    Consider a network where nodes are websites and the weight of a link that connects two nodes corresponds to the average number of users that visits both of the two websites over longer timescales. Such user-driven Web network is not only invaluable for understanding how crowds' interests collectively spread on...

    Provided By Northwestern University

  • Case Studies // Jan 2003

    Communication Measurement as a Diagnostic Tool: A McDonald's Restaurant Systems Case Study

    Traditional employee communication surveys offer benchmarks and measure progress, but generally do not provide diagnostic information for identifying how to improve results nor do they pinpoint how to encourage employees to accept accountability for their role in the communication process. This case study explores how to make communication research more...

    Provided By Northwestern University

  • White Papers // Jan 2010

    Modeling and Taming Parallel TCP on the Wide Area Network

    Parallel TCP flows are broadly used in the high performance distributed computing community to enhance network throughput, particularly for large data transfers. Previous research has studied the mechanism by which parallel TCP improves aggregate throughput, but there doesn't exist any practical mechanism to predict its throughput. In this work, authors...

    Provided By Northwestern University

  • White Papers // Dec 2009

    EmNet: Satisfying the Individual User Through Empathic Home Networks

    The authors consider optimizing the control of the wide-area link of home routers based on the needs of individual users instead of assuming a canonical user. A careful user study clearly demonstrates that measured end-user satisfaction with a given set of home network conditions is highly variable - user perception...

    Provided By Northwestern University

  • White Papers // Apr 2010

    Palacios and Kitten: New High Performance Operating Systems for Scalable Virtualized and Native Supercomputing

    Palacios is a new open-source VMM under development at Northwestern University and the University of New Mexico that enables applications executing in a virtualized environment to achieve scalable high performance on large machines. Palacios functions as a modularized extension to Kitten, a high performance operating system being developed at Sandia...

    Provided By Northwestern University

  • White Papers // May 2010

    SureCall: Towards Glitch-Free Real-Time Audio/Video Conferencing

    Global enterprises are increasingly adopting unified communication solutions over traditional telephone systems. Such solutions provide integrated audio/video conferencing and messaging services, and enable flexible working environments by allowing mobile and dispersed users to communicate and collaborate easily and efficiently. The ultimate goal of unified communications is to ensure a smooth...

    Provided By Northwestern University

  • White Papers // Apr 2010

    Evaluating the Impact of Data Center Network Architectures on Application Performance in Virtualized Environments

    In recent years, Data Center Network (DCN) architectures (e.g., DCell, FiConn, BCube, FatTree, and VL2) received a surge of interest from both the industry and academia. However, none of existing efforts provide an in-depth understanding of the impact of these architectures on application performance in practical multi-tier systems under realistic...

    Provided By Northwestern University

  • White Papers // Jun 2010

    How To Improve Your Google Ranking: Myths And Reality

    Search engines have greatly influenced the way people access information on the Internet as such engines provide the preferred entry point to billions of pages on the Web. Therefore, highly ranked web pages generally have higher visibility to people and pushing the ranking higher has become the top priority for...

    Provided By Northwestern University

  • White Papers // Oct 2009

    A Single-Letter Characterization of Optimal Noisy Compressed Sensing

    Compressed sensing deals with the reconstruction of a high-dimensional signal from far fewer linear measurements, where the signal is known to admit a sparse representation in a certain linear space. The asymptotic scaling of the number of measurements needed for reconstruction as the dimension of the signal increases has been...

    Provided By Northwestern University

  • White Papers // Jan 2011

    Joint Source-Channel Coding and Power Allocation for Energy Efficient Wireless Video Communications

    The authors consider an energy-efficient video streaming system where source coding, channel coding, and transmission power allocation are jointly designed to compensate for channel errors. The focus is on streaming applications with relatively strict delay constraints; for such applications, Forward Error Correction (FEC) is the preferred channel coding technique to...

    Provided By Northwestern University

  • White Papers // Oct 2010

    Market-Based Loss Mitigation Practices For Troubled Mortgages Following The Financial Crisis

    The meltdown in residential real-estate prices that commenced in 2006 resulted in unprecedented mortgage delinquency rates. Until mid-2009, lenders and servicers pursued their own individual loss mitigation practices without being significantly influenced by government intervention. Using a unique dataset that precisely identifies loss mitigation actions, the authors study these methods...

    Provided By Northwestern University

  • White Papers // May 2010

    Analyzing Regression-Discontinuity Designs With Multiple Assignment Variables: A Comparative Study Of Four Estimation Methods

    In a traditional Regression-Discontinuity Design (RDD), units are assigned to treatment on the basis of a cutoff score and a continuous assignment variable. The treatment effect is measured at a single cutoff location along the assignment variable. A more flexible conceptualization of RDD, however, allows researchers to examine effects along...

    Provided By Northwestern University

  • White Papers // May 2010

    Lawyers In National Policymaking

    Previous research on lawyers engaged in politics analyzed a sample of those who represented conservative or libertarian organizations in the late 1990s. The data examined here deal with organizations and lawyers drawn from the full range of American politics - right, left, and center - and focus on a set...

    Provided By Northwestern University

  • White Papers // Jul 2010

    Tobin Meets Oates: Solidarity And The Optimal Fiscal Federal Structure

    The authors explore the implications for the optimal degree of fiscal decentralization when people's preferences for goods and services, which classic treatments of fiscal federalism place in the purview of local governments, exhibit specific egalitarianism, or solidarity. They find that a system in which the central government provides a common...

    Provided By Northwestern University

  • White Papers // Sep 2010

    Policy Analysis With Incredible Certitude

    Analyses of public policy regularly express certitude about the consequences of alternative policy choices. Yet policy predictions often are fragile, with conclusions resting on critical unsupported assumptions or leaps of logic. Then the certitude of policy analysis is not credible. Manski develops a typology of incredible analytical practices and gives...

    Provided By Northwestern University

  • White Papers // Dec 2010

    Bias In Political Communication Experiments

    Research on political communication effects has enjoyed great progress over the past 20 years. A key ingredient underlying these advances is the increased usage of experiments that demonstrate how communications influence opinions and behaviors. A potential problem with nearly all of these studies, however, concerns the lack of attention to...

    Provided By Northwestern University

  • White Papers // Jul 2010

    An Analysis Of The Neighborhood Impacts Of A Mortgage Assistance Program: A Spatial Hedonic Model

    Down payment or closing cost assistance is an effective program in addressing the wealth constraints of low- and moderate-income homebuyers. However, the spillover effect of such programs on the neighborhood is unknown. This paper estimates the impact of the City of Dallas Mortgage Assistance Program (MAP) on nearby home values...

    Provided By Northwestern University

  • White Papers // Dec 2009

    Evaluating Potential Routing Diversity for Internet Failure Recovery

    As the Internet becomes a critical infrastructure component of the global information-based society, any interruption to its availability can have significant economical and societal impacts. Although many researches tried to improve the resilience through the BGP policy-compliant paths, it has been demonstrated that the Internet is still highly vulnerable when...

    Provided By Northwestern University

  • White Papers // Jan 2011

    WebProphet: Automating Performance Prediction for Web Services

    Today, large-scale web services run on complex systems, spanning multiple data centers and content distribution networks, with performance depending on diverse factors in end systems, networks, and infrastructure servers. Web service providers have many options for improving service performance, varying greatly in feasibility, cost and benefit, but have few tools...

    Provided By Northwestern University

  • White Papers // Dec 2009

    Measurement and Diagnosis of Address Misconfigured P2P Traffic

    Misconfigured P2P traffic caused by bugs in volunteer-developed P2P software or by attackers is prevalent. It influences both end users and ISPs. In this paper, the authors discover and study address-misconfigured P2P traffic, a major class of such misconfiguration. P2P address misconfiguration is a phenomenon in which a large number...

    Provided By Northwestern University

  • White Papers // Apr 2010

    A Case for Alternative Nested Paging Models for Virtualized Systems

    Address translation often emerges as a critical performance bottleneck for virtualized systems and has recently been the impetus for hardware paging mechanisms. These mechanisms apply similar translation models for both guest and host address translations. The authors make an important observation that the model employed to translate from Guest Physical...

    Provided By Northwestern University

  • White Papers // Nov 2009

    Using the Crowd to Monitor the Cloud: Network Event Detection From Edge Systems

    The authors believe that the most effective way to detect service-level events is by monitoring the end systems where the services are used. This paper describes an implementation of this approach for BitTorrent called NEWS (Network Early Warning System), a system that provides real-time detection of network events impacting the...

    Provided By Northwestern University

  • White Papers // Dec 2010

    Wireless Peer-to-Peer Mutual Broadcast Via Sparse Recovery

    Consider a problem frequently seen in wireless peer-to-peer networks: every node has messages to broadcast to its peers, namely, all nodes within one hop. Conventional schemes allow only one transmission to succeed at a time in a two-hop neighborhood, because simultaneous transmissions in the neighborhood collide, and affordable radio is...

    Provided By Northwestern University

  • White Papers // Oct 2009

    Isotropic MIMO Interference Channels Without CSIT: The Loss of Degrees of Freedom

    This paper studies two-user MIMO interference channel with isotropic fading. The authors assume that users are equipped with arbitrary number of antennas and the Channel State Information (CSI) is available at receivers only. An outer bound is obtained for the degree of freedom region, which suggests the loss of degrees...

    Provided By Northwestern University

  • White Papers // May 2012

    Security of Electrostatic Field Persistent Routing: Attacks and Defense Mechanisms

    Electrostatic Field-based Routing (EFR) is a form of geographical multi-path routing where packets are routed along a collection of electrostatic field lines, defined by electrostatic charges associated with source and sink nodes. EFR provides an efficient and scalable solution to the workload balancing problem. However, it assumes that nodes behave...

    Provided By Northwestern University

  • White Papers // Sep 2011

    Wireless MIMO Switching With Zero-Forcing Relaying

    A wireless relay with multiple antennas is called a Multiple-Input-Multiple-Output (MIMO) switch if it forms a one-to-one mapping from the inputs (uplinks) to the outputs (downlinks). This paper studies the case with N source stations and N destination stations (which may be the same set), so that the mapping is...

    Provided By Northwestern University

  • White Papers // Apr 2012

    Wireless MIMO Switching With MMSE Relaying

    A wireless relay which forms a one-to-one mapping from the inputs (uplinks) to the outputs (downlinks) is called a Multiple-Input-Multiple-Output (MIMO) switch. The MIMO switch carries out pre-code-and-forward, where all users send their signals in the uplink and then the MIMO switch pre-codes the received vector signal for broadcasting in...

    Provided By Northwestern University

  • White Papers // Feb 2010

    Queue Based Compression in a Two-Way Relay Network

    The authors consider the problem of joint rate scheduling and lossy data compression in a two-way relay network with distortion-sensitive stochastic packet traffic. A relay node facilitates exchanging packets between the two sources. Network coding at the relay improves energy efficiency at the expense of additional packet delay. In addition,...

    Provided By Northwestern University

  • White Papers // Mar 2013

    The Public Safety Broadband Network: A Novel Architecture with Mobile Base Stations

    A nationwide interoperable public safety broadband network is being planned by the United States government. The network will be based on Long Term Evolution (LTE) standards and use recently designated spectrum in the 700 MHz band. The public safety network has different objectives and traffic patterns than commercial wireless networks....

    Provided By Northwestern University

  • White Papers // Nov 2012

    Multi-Cell Distributed Interference Cancellation for Co-Operative Pico-Cell Clusters

    Alternative wireless topologies, e.g., an underlay network of Pico-cells, are increasingly seen as being necessary to enhance capacity and coverage in next generation wireless systems. Such networks of closely-spaced base-sites have to contend with high interference issues, wherein interference mitigation via power control or interference co-ordination may not be sufficient....

    Provided By Northwestern University

  • White Papers // Jul 2012

    Dynamic Directories: A Mechanism for Reducing On-Chip Interconnect Power in Multicores

    On-chip interconnection networks consume a significant fraction of the chip's power, and the rapidly increasing core counts in future technologies is going to further aggravate their impact on the chip's overall power consumption. A large fraction of the traffic originates not from data messages exchanged between sharing cores, but from...

    Provided By Northwestern University

  • White Papers // Jan 2012

    Supporting Computational Data Model Representation with High-Performance I/O in Parallel NetCDF

    Parallel computational scientific applications have been described by their computation and communication patterns. From a storage and I/O perspective, these applications can also be grouped into separate data models based on the way data is organized and accessed during simulation, analysis, and visualization. Parallel netCDF is a popular library used...

    Provided By Northwestern University

  • White Papers // Jan 2012

    Improving the Average Response Time in Collective I/O

    In collective I/O, MPI processes exchange requests so that the rearranged requests can result in the shortest file system access time. Scheduling the exchange sequence determines the response time of participating processes. Existing implementations that simply follow the increasing order of file offsets do not necessary produce the best performance....

    Provided By Northwestern University

  • White Papers // Jun 2011

    High Performance Data Mining Using R on Heterogeneous Platforms

    The exponential increase in the generation and collection of data has led users in a new era of data analysis and information extraction. Conventional systems based on general-purpose processors are unable to keep pace with the heavy computational requirements of data mining techniques. High performance coprocessors like GPUs and FPGAs...

    Provided By Northwestern University

  • White Papers // Feb 2011

    Accelerating Data Mining Workloads: Current Approaches and Future Challenges in System Architecture Design

    Conventional systems based on general-purpose processors cannot keep pace with the exponential increase in the generation and collection of data. It is therefore important to explore alternative architectures that can provide the computational capabilities required to analyze ever-growing datasets. Programmable Graphics Processing Units (GPUs) offer computational capabilities that surpass even...

    Provided By Northwestern University

  • White Papers // Mar 2011

    Voice of the Customers: Mining Online Customer Reviews for Product Feature-Based Ranking

    Increasingly large numbers of customers are choosing online shopping because of its convenience, reliability, and cost. As the number of products being sold online increases, it is becoming increasingly difficult for customers to make purchasing decisions based on only pictures and short product descriptions. On the other hand, customer reviews,...

    Provided By Northwestern University

  • White Papers // Mar 2011

    pFANGS: Parallel High Speed Sequence Mapping for Next Generation 454-Roche Sequencing Reads

    Millions of DNA sequences (reads) are generated by Next Generation Sequencing machines every day. There is a need for high performance algorithms to map these sequences to the reference genome to identify single nucleotide polymorphisms or rare transcripts to fulfill the dream of personalized medicine. In this paper, the authors...

    Provided By Northwestern University

  • White Papers // Mar 2011

    Detecting/Preventing Information Leakage on the Memory Bus due to Malicious Hardware

    An increasing concern amongst designers and integrators of military and defense-related systems is the underlying security of the individual microprocessor components that make up these systems. Malicious circuitry can be inserted and hidden at several stages of the design process through the use of third-party Intellectual Property (IP), design tools,...

    Provided By Northwestern University

  • White Papers // Mar 2012

    VirtualKnotter: Online Virtual Machine Shuffling for Congestion Resolving in Virtualized Datacenter

    The authors measurements on production datacenter traffic together with recently-reported results suggest that datacenter networks suffer from long-lived congestion caused by core network oversubscription and unbalanced workload placement. In contrast to traditional traffic engineering approaches that optimize flow routing, in this paper, they explore the opportunity to address the continuous...

    Provided By Northwestern University

  • White Papers // Jan 2013

    Trying Broadband Characterization at Home

    In recent years the quantity and diversity of Internet-enabled consumer devices in the home have increased significantly. These trends complicate device usability and home resource management and have implications for crowdsourced approaches to broadband characterization. The UPnP protocol has emerged as an open standard for device and service discovery to...

    Provided By Northwestern University

  • White Papers // Aug 2012

    Selective Behavior in Online Social Networks

    According to the classical communication theories, known as Gatekeeping and Selective Exposure, individuals tend to have selective behavior when they disseminate and receive information based on their psychological preferences. Selective behavior related to these two theories have been broadly studied separately. While, thanks to the advent of Online Social Networks...

    Provided By Northwestern University