University of Florence

Displaying 1-40 of 61 results

  • White Papers // Nov 2013

    Energy-Efficient Phase-Based Cache Tuning for Multimedia Applications in Embedded Systems

    The proliferation of multimedia applications in embedded systems has led to a research focus on optimizing the energy consumption of these applications without significantly degrading the execution time and adhering to data processing deadline constraints. To maximize optimization potential, phase-based tuning methodologies specialize system configurations to different phases of application...

    Provided By University of Florence

  • White Papers // Oct 2013

    Fast and Flexible High-Level Synthesis from OpenCL using Reconfiguration Contexts

    High-level synthesis from OpenCL has shown significant potential, but current approaches conflict with mainstream OpenCL design methodologies due to orders-of-magnitude longer FPGA compilation times, and limited support for changing or adding kernels after system compilation. In this paper, the authors introduce a backend synthesis approach for potentially any OpenCL tool,...

    Provided By University of Florence

  • White Papers // Oct 2013

    OpenCL for FPGAs: Prototyping a Compiler

    Hardware acceleration using FPGAs has shown orders of magnitude reduction in runtime of computationally-intensive applications in comparison to traditional stand-alone computers. This is possible because on an FPGA many computations can be performed at the same time in a truly-parallel fashion. However, parallel computation at a hard-ware level requires a...

    Provided By University of Florence

  • White Papers // Jun 2013

    ESPN: A Case for Energy-Star Photonic On-Chip Network

    Photonic Network-on-Chips (NoCs) have recently been proposed due to their inherent low latency and high bandwidth. However, the high static power of the photonic components (e.g. laser source, resonators and waveguides) often results in energy-inefficient architectures. In this paper, the authors advocate the Energy-Star Photonic Network (ESPN) architecture that optimizes...

    Provided By University of Florence

  • White Papers // Feb 2013

    Leveraging Phase Change Memory to Achieve Efficient Virtual Machine Execution

    Virtualization technology is being widely adopted by servers and data centers in the cloud computing era to improve resource utilization and energy efficiency. Nevertheless, the heterogeneous memory demands from multiple Virtual Machines (VM) make it more challenging to design efficient memory systems. Even worse, mission critical VM management activities (e.g....

    Provided By University of Florence

  • White Papers // Jan 2013

    Exploring High-Performance and Energy Proportional Interface for Phase Change Memory Systems

    Phase Change Memory (PCM) is emerging as a promising candidate for building up future energy efficient memory systems. To achieve high-performance and energy proportional design, phase change memory devices need to be reorganized so that the relatively long latency of phase change memory devices should be hidden; unnecessary power waste...

    Provided By University of Florence

  • White Papers // Nov 2012

    CPTT: A High-Throughput Coding-Aware Routing Metric for Multi-Hop Wireless Networks

    Network coding is widely recognized as a promising approach to increase the throughput of wireless networks. In order to maximize the benefit of network coding, the consideration of potential coding opportunities is incorporated into the route selection, which is referred to as coding-aware routing. Most of existing coding-aware routing metrics...

    Provided By University of Florence

  • White Papers // Oct 2012

    Self-Organizing-Queue Based Clustering

    In this paper, the authors consider the problem of clustering, given the similarity matrix of a set of data points or nodes; this problem is a.k.a. graph clustering. Spectral clustering techniques are typically used to solve this problem. The performance of the existing spectral clustering techniques is not satisfactory for...

    Provided By University of Florence

  • White Papers // Oct 2012

    MapReduce on Opportunistic Resources Leveraging Resource Availability

    MapReduce is a popular large-scale parallel data processing framework. In the context of MapReduce processing on volunteer computing environments, it is important to devise scheduling and data placement policies that account for characteristics of opportunistic resources. This paper investigates availability characteristics of opportunistic resources with analyses based on log traces...

    Provided By University of Florence

  • White Papers // Sep 2012

    Sliding Mode Based Congestion Control and Scheduling for Multi-Class Traffic Over Per-Link Queueing Wireless Networks

    This paper considers the problem of joint congestion control and scheduling in wireless networks with Quality of Service (QoS) guarantees. Different from per-destination queueing in the existing works, which is not scalable, this work considers per-link queueing at each node, which significantly reduces the number of queues per node. Under...

    Provided By University of Florence

  • White Papers // Sep 2012

    Secure Wide Area Network Access to CMS Analysis Data Using the Lustre Filesystem

    This paper reports the design and implementation of a secure, wide area network, distributed filesystem by the ExTENCI project, based on the lustre filesystem. The system is used for remote access to analysis data from the CMS experiment at the large hadron collider, and from the Lattice Quantum Chromo-Dynamics (LQCD)...

    Provided By University of Florence

  • White Papers // Aug 2012

    An Efficient Spectral Bound for Link Vulnerability Assessment in Large-scale Networks

    Simultaneous attacks can cause devastating damage, breaking down communication networks into small fragments. To mitigate the risk and develop proactive responses, it is essential to assess the robustness of network in the worst-case scenarios. In this paper, the authors propose a spectral lower-bound on the number of removed links to...

    Provided By University of Florence

  • White Papers // Jul 2012

    FPGA-Based Reconfigurable Computing for Pricing Multi-Asset Barrier Options

    Multi-asset barrier contracts are path-dependent exotic options consisting of two or more underlying assets. As the dimensions of an option increase, so does the mathematical complexity of a closed form solution. Monte Carlo (MC) methods offer an attractive solution under such conditions. MC methods have an O(n-1/2) convergence rate irrespective...

    Provided By University of Florence

  • White Papers // Jul 2012

    CloudBay: Enabling an Online Resource Market Place for Open Clouds

    In this paper, the authors present CloudBay, an online resource trading and leasing platform for multi-party resource sharing. Following a market-oriented design principle, CloudBay provides an abstraction of a shared virtual resource space across multiple administration domains, and features enhanced functionalities for scalable and automatic resource management and efficient service...

    Provided By University of Florence

  • White Papers // May 2012

    Optimizing Network Topology to Reduce Aggregate Traffic in a System of Mobile Robots Under an Energy Constraint

    Autonomous mobile robots, such as unmanned aerial or ground vehicles, will play important roles in future military and commercial applications. Future systems will require the robots to communicate with each other on a peer-to-peer basis over a wireless link and are able to form a networked system such as an...

    Provided By University of Florence

  • White Papers // May 2012

    A Dynamic Proof of Retrievability (PoR) Scheme With O(logn) Complexity

    Cloud storage has been gaining popularity because its elasticity and pay-as-you-go manner. However, this new type of storage model also brings security challenges. This paper studies the problem of ensuring data integrity in cloud storage. In the Proof of Retrievability (PoR) model, after outsourcing the preprocessed data to the server,...

    Provided By University of Florence

  • White Papers // May 2012

    Weight Based Dominating Set Clustering Algorithm for Small Satellite Networks

    Due to the size and density of Small Satellite Networks (SSNs), the traditional clustering algorithms of large monolithic satellite networks are often limited. This paper proposes a novel distributed weight-based dominating set clustering algorithm to address the clustering problems in the stochastically deployed SSNs. Considering the unique features of small...

    Provided By University of Florence

  • White Papers // May 2012

    An Incrementally Deployable Path Address Scheme

    The research community has proposed numerous network security solutions, each dealing with a specific problem such as address spoofing, denial-of-service attacks, denial-of-quality attacks, reflection attacks, viruses, or worms. However, due to the lack of fundamental support from the Internet, individual solutions often share little common ground in their design, which...

    Provided By University of Florence

  • White Papers // Apr 2012

    Survey of Security Issues in Cloud Computing

    Cloud computing has quickly become one of the most prominent buzzwords in the IT world due to its revolutionary model of computing as a utility. It promises increased flexibility, scalability, and reliability, while promising decreased operational and support costs. However, many potential cloud users are reluctant to move to cloud...

    Provided By University of Florence

  • White Papers // Dec 2011

    Spectrum Clouds: ASession Based Spectrum Trading System for Multi-hop Cognitive Radio Networks

    Spectrum trading creates more accessing opportunities for Secondary Users (SUs) and economically benefits the Primary Users (PUs). However, it is challenging to implement spectrum trading in multi-hop Cognitive Radio Networks (CRNs) due to harsh Cognitive Radio (CR) requirements on SUs' devices and complex conflict and competition relationship among different CR...

    Provided By University of Florence

  • White Papers // Sep 2011

    A Quantitative Analysis of Cooling Power in Container-Based Data Centers

    Cooling power is often represented as a single taxed cost on the total energy consumption of the data center. Some estimates go as far as 50% of the total energy demand. However, this view is rather simplistic in the presence of a multitude of cooling options and optimizations. In response...

    Provided By University of Florence

  • White Papers // Sep 2011

    Analyzing Soft-Error Vulnerability on GPGPU Microarchitecture

    The General-Purpose computation on Graphic Processing Units (GPGPU) becomes increasingly popular due to their high computational throughput for data parallel applications. Modern GPU architectures have limited capability for error detection and tolerance since they are originally designed for graphics processing. However, the rigorous execution correctness is required for general-purpose applications....

    Provided By University of Florence

  • White Papers // May 2011

    Helmet: A Resistance Drift Resilient Architecture for Multi-Level Cell Phase Change Memory System

    Phase Change Memory (PCM) is emerging as a promising solution for future memory systems and disk caches. As a type of resistive memory, PCM relies on the electrical resistance of Ge2Sb2Te5 (GST) to represent stored information. With the adoption of multi-level programming PCM devices, unwanted resistance drift is becoming an...

    Provided By University of Florence

  • White Papers // Apr 2011

    Ontology-centric Source Selection for Meta-querier Customization

    With an increasing number of semi-structured data sources, meta-queriers are introduced to facilitate effective information retrieval from multiple data sources that are accessible through query forms. However, a one-size-fitsall meta-querier cannot cater for various individual needs. In meta-querier customization, source selection is arguably one of the most critical problems. This...

    Provided By University of Florence

  • White Papers // Apr 2011

    Secret-Sharing LDPC Codes for the BPSK-Constrained Gaussian Wiretap Channel

    The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a destination intend to share secret information over a Gaussian channel in the presence of a wiretapper who observes the transmission through another Gaussian channel. Two constraints are imposed on the source-to-destination channel; namely, the...

    Provided By University of Florence

  • White Papers // Mar 2011

    SolarCore: Solar Energy Driven Multi-core Architecture Power Management

    The global energy crisis and environmental concerns have driven the IT community into the green computing era. Of clean, renewable energy sources, solar power is the most promising. While efforts have been made to improve the performance-per-watt, conventional architecture power management schemes incur significant solar energy loss since they are...

    Provided By University of Florence

  • White Papers // Feb 2011

    Cloud Computing - The Business Perspective

    The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing. However, if cloud computing is to achieve its potential, there needs to be a clear understanding of the various issues involved, both from the perspectives of the providers...

    Provided By University of Florence

  • White Papers // Feb 2011

    Enhancements for Accurate and Timely Streaming Prefetcher

    In this paper, the authors describe several enhancement techniques to improve the state-of-the-art stream prefetcher. The enhanced stream prefetcher takes streams with long stride into consideration to avoid wasteful prefetches. Accessing a node in a tree or graph structure may have a different direction than the traversal direction through the...

    Provided By University of Florence

  • White Papers // Jan 2011

    Parallel Processing Framework on a P2P System Using Map and Reduce Primitives

    This paper presents a parallel processing framework for structured Peer-To-Peer (P2P) networks. A parallel processing task is expressed using Map and Reduce primitives inspired by functional programming models. The Map and Reduce tasks are distributed to a subset of nodes within a P2P network for execution by using a self-organizing...

    Provided By University of Florence

  • White Papers // Jan 2011

    Economic Integration, Inequality And Growth: Latin America Vs. The European Economies In Transition

    This paper presents a simple theoretical framework to explain variations in income inequality over time and between countries. It also analyses the factors responsible for the widespread rise in inequality during the neo-liberal reforms of 1980-2000 in the fields of trade, Foreign Direct Investment (FDI) and capital flows, and the...

    Provided By University of Florence

  • White Papers // Dec 2010

    Mercury: A Fast and Energy-Efficient Multi-level Cell based Phase Change Memory System

    Phase Change Memory (PCM) is one of the most promising technologies among emerging non-volatile memories. PCM stores data in crystalline and amorphous phases of the GST material using large differences in their electrical resistivity. Although it is possible to design a high capacity memory system by storing multiple bits at...

    Provided By University of Florence

  • White Papers // Oct 2010

    Exploring GPGPU Workloads: Characterization Methodology, Analysis and Microarchitecture Evaluation Implications

    The GPUs are emerging as a general-purpose high-performance computing device. Growing GPGPU research has made numerous GPGPU workloads available. However, a systematic approach to characterize these benchmarks and analyze their implication on GPU microarchitecture design evaluation is still lacking. In this paper, the authors propose a set of microarchitecture agnostic...

    Provided By University of Florence

  • White Papers // Aug 2010

    Time As Process And Time As Product In Business Networks

    This paper analyses the role of time in the interactions within business network. The main aim of the paper is to examine the relation between different concepts of time. To address this topic different time perspectives are investigated. Clock time and social time are reviewed in the literature. In this...

    Provided By University of Florence

  • White Papers // Apr 2010

    Architecting Reliable Multi-Core Network-on-Chip for Small Scale Processing Technology

    The trend towards multi/many-core design has made Network-on-Chip (NoC) a crucial component of future microprocessors. With CMOS processing technologies continuously scaling down to the nanometer regime, effects such as Process Variation (PV) and Negative Bias Temperature Instability (NBTI) significantly decrease hardware reliability and lifetime. Therefore, it is imperative for multi-core...

    Provided By University of Florence

  • White Papers // Nov 2009

    Thermal Design Space Exploration of 3D Die Stacked Multi-Core Processors Using Geospatial-Based Predictive Models

    In this paper, the author's present novel 2D geospatial-based predictive models for exploring the complex thermal spatial behavior of Three-Dimensional (3D) die stacked multi-core processors at the early design stage. Unlike other analytical techniques, their predictive models can forecast the location, size and temperature of thermal hotspots. They evaluate the...

    Provided By University of Florence

  • White Papers // Oct 2009

    An Efficient Storage Utilization for High-Quality Content Distribution in a PVR-Based Community

    High-quality content can be distributed and shared efficiently in community networks by the advantages of the geographical coverage and the connected community members. Recently, the authors have proposed a Personal Video Recorder (PVR)-based community network employing the multiple-loop Fiber Channel Arbitration Loop (FC-AL) connection, which can provide the scalability without...

    Provided By University of Florence

  • White Papers // Sep 2009

    Network Creativity And Place Marketing

    The purpose of this paper is to outline the features of network creativity within place marketing approach. Empirically the paper presents a preliminary verification of the theoretical hypotheses through an analysis of the Florentine area. The paper analyzes network creativity which is composed by relationships between businesses which are based...

    Provided By University of Florence

  • White Papers // Sep 2009

    Precise Data Race Detection in a Relaxed Memory Model using Model Checking

    Most approaches to reasoning about multithreaded programs, including model checking, make the implicit assumption that the system being considered is sequentially consistent. This is not a valid assumption for most current multiprocessor/core systems and this fact is exposed to the programmer for many concurrent programming languages in the form a...

    Provided By University of Florence

  • White Papers // Sep 2009

    On the (Dis)similarity of Transactional Memory Workloads

    Transactional Memory (TM) simplifies parallel programming by providing atomic execution for an arbitrarily large block of code. Programming to exploit the resources in a multicore system remains a major obstacle for both computer and software engineers. Transactional memory offers an attractive alternative to traditional concurrent programming but implementations emerged before...

    Provided By University of Florence

  • White Papers // Jun 2009

    Exploring Phase Change Memory and 3D Die-Stacking for Power/Thermal Friendly, Fast and Durable Memory Architectures

    Dynamic Random Access Memory (DRAM) has been used as the main memory in computer systems for decades due to its high-density, high-performance and low-cost. However, DRAM technologies are facing both scalability and power issues. DRAM is difficult to scale down beyond 50nm due to various limitations associated with device leakages...

    Provided By University of Florence

  • White Papers // Sep 2012

    Secure Wide Area Network Access to CMS Analysis Data Using the Lustre Filesystem

    This paper reports the design and implementation of a secure, wide area network, distributed filesystem by the ExTENCI project, based on the lustre filesystem. The system is used for remote access to analysis data from the CMS experiment at the large hadron collider, and from the Lattice Quantum Chromo-Dynamics (LQCD)...

    Provided By University of Florence

  • White Papers // Sep 2012

    Sliding Mode Based Congestion Control and Scheduling for Multi-Class Traffic Over Per-Link Queueing Wireless Networks

    This paper considers the problem of joint congestion control and scheduling in wireless networks with Quality of Service (QoS) guarantees. Different from per-destination queueing in the existing works, which is not scalable, this work considers per-link queueing at each node, which significantly reduces the number of queues per node. Under...

    Provided By University of Florence

  • White Papers // Oct 2012

    Self-Organizing-Queue Based Clustering

    In this paper, the authors consider the problem of clustering, given the similarity matrix of a set of data points or nodes; this problem is a.k.a. graph clustering. Spectral clustering techniques are typically used to solve this problem. The performance of the existing spectral clustering techniques is not satisfactory for...

    Provided By University of Florence

  • White Papers // Nov 2012

    CPTT: A High-Throughput Coding-Aware Routing Metric for Multi-Hop Wireless Networks

    Network coding is widely recognized as a promising approach to increase the throughput of wireless networks. In order to maximize the benefit of network coding, the consideration of potential coding opportunities is incorporated into the route selection, which is referred to as coding-aware routing. Most of existing coding-aware routing metrics...

    Provided By University of Florence

  • White Papers // Oct 2009

    An Efficient Storage Utilization for High-Quality Content Distribution in a PVR-Based Community

    High-quality content can be distributed and shared efficiently in community networks by the advantages of the geographical coverage and the connected community members. Recently, the authors have proposed a Personal Video Recorder (PVR)-based community network employing the multiple-loop Fiber Channel Arbitration Loop (FC-AL) connection, which can provide the scalability without...

    Provided By University of Florence

  • White Papers // Apr 2011

    Ontology-centric Source Selection for Meta-querier Customization

    With an increasing number of semi-structured data sources, meta-queriers are introduced to facilitate effective information retrieval from multiple data sources that are accessible through query forms. However, a one-size-fitsall meta-querier cannot cater for various individual needs. In meta-querier customization, source selection is arguably one of the most critical problems. This...

    Provided By University of Florence

  • White Papers // Jun 2009

    Using Analog Network Coding to Improve the RFID Reading Throughput

    RFID promises to revolutionize the inventory management in large warehouses, retail stores, hospitals, transportation systems, etc. Periodically reading the IDs of the tags is an important function to guard against administration error, vendor fraud and employee theft. Given the low-speed communication channel in which a RFID system operates, the reading...

    Provided By University of Florence

  • White Papers // Aug 2012

    An Efficient Spectral Bound for Link Vulnerability Assessment in Large-scale Networks

    Simultaneous attacks can cause devastating damage, breaking down communication networks into small fragments. To mitigate the risk and develop proactive responses, it is essential to assess the robustness of network in the worst-case scenarios. In this paper, the authors propose a spectral lower-bound on the number of removed links to...

    Provided By University of Florence

  • White Papers // Feb 2011

    Cloud Computing - The Business Perspective

    The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing. However, if cloud computing is to achieve its potential, there needs to be a clear understanding of the various issues involved, both from the perspectives of the providers...

    Provided By University of Florence

  • White Papers // Apr 2012

    Survey of Security Issues in Cloud Computing

    Cloud computing has quickly become one of the most prominent buzzwords in the IT world due to its revolutionary model of computing as a utility. It promises increased flexibility, scalability, and reliability, while promising decreased operational and support costs. However, many potential cloud users are reluctant to move to cloud...

    Provided By University of Florence

  • White Papers // Jul 2012

    CloudBay: Enabling an Online Resource Market Place for Open Clouds

    In this paper, the authors present CloudBay, an online resource trading and leasing platform for multi-party resource sharing. Following a market-oriented design principle, CloudBay provides an abstraction of a shared virtual resource space across multiple administration domains, and features enhanced functionalities for scalable and automatic resource management and efficient service...

    Provided By University of Florence

  • White Papers // Apr 2009

    WiMAX Networking Security

    The possible usage scenarios of a WiMax service network are extremely various. The network can support static and mobile users roaming in a metropolitan area, the kind of traffic can be the typical Internet browsing or real-time traffic with stringent QoS constraints. The components of a WiMax network must assure...

    Provided By University of Florence

  • White Papers // Jan 2011

    Economic Integration, Inequality And Growth: Latin America Vs. The European Economies In Transition

    This paper presents a simple theoretical framework to explain variations in income inequality over time and between countries. It also analyses the factors responsible for the widespread rise in inequality during the neo-liberal reforms of 1980-2000 in the fields of trade, Foreign Direct Investment (FDI) and capital flows, and the...

    Provided By University of Florence

  • White Papers // Oct 2012

    MapReduce on Opportunistic Resources Leveraging Resource Availability

    MapReduce is a popular large-scale parallel data processing framework. In the context of MapReduce processing on volunteer computing environments, it is important to devise scheduling and data placement policies that account for characteristics of opportunistic resources. This paper investigates availability characteristics of opportunistic resources with analyses based on log traces...

    Provided By University of Florence

  • White Papers // Jan 2011

    Parallel Processing Framework on a P2P System Using Map and Reduce Primitives

    This paper presents a parallel processing framework for structured Peer-To-Peer (P2P) networks. A parallel processing task is expressed using Map and Reduce primitives inspired by functional programming models. The Map and Reduce tasks are distributed to a subset of nodes within a P2P network for execution by using a self-organizing...

    Provided By University of Florence

  • White Papers // May 2012

    Optimizing Network Topology to Reduce Aggregate Traffic in a System of Mobile Robots Under an Energy Constraint

    Autonomous mobile robots, such as unmanned aerial or ground vehicles, will play important roles in future military and commercial applications. Future systems will require the robots to communicate with each other on a peer-to-peer basis over a wireless link and are able to form a networked system such as an...

    Provided By University of Florence

  • White Papers // May 2012

    A Dynamic Proof of Retrievability (PoR) Scheme With O(logn) Complexity

    Cloud storage has been gaining popularity because its elasticity and pay-as-you-go manner. However, this new type of storage model also brings security challenges. This paper studies the problem of ensuring data integrity in cloud storage. In the Proof of Retrievability (PoR) model, after outsourcing the preprocessed data to the server,...

    Provided By University of Florence

  • White Papers // May 2012

    Weight Based Dominating Set Clustering Algorithm for Small Satellite Networks

    Due to the size and density of Small Satellite Networks (SSNs), the traditional clustering algorithms of large monolithic satellite networks are often limited. This paper proposes a novel distributed weight-based dominating set clustering algorithm to address the clustering problems in the stochastically deployed SSNs. Considering the unique features of small...

    Provided By University of Florence

  • White Papers // Apr 2011

    Secret-Sharing LDPC Codes for the BPSK-Constrained Gaussian Wiretap Channel

    The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a destination intend to share secret information over a Gaussian channel in the presence of a wiretapper who observes the transmission through another Gaussian channel. Two constraints are imposed on the source-to-destination channel; namely, the...

    Provided By University of Florence

  • White Papers // Feb 2013

    Leveraging Phase Change Memory to Achieve Efficient Virtual Machine Execution

    Virtualization technology is being widely adopted by servers and data centers in the cloud computing era to improve resource utilization and energy efficiency. Nevertheless, the heterogeneous memory demands from multiple Virtual Machines (VM) make it more challenging to design efficient memory systems. Even worse, mission critical VM management activities (e.g....

    Provided By University of Florence

  • White Papers // May 2012

    An Incrementally Deployable Path Address Scheme

    The research community has proposed numerous network security solutions, each dealing with a specific problem such as address spoofing, denial-of-service attacks, denial-of-quality attacks, reflection attacks, viruses, or worms. However, due to the lack of fundamental support from the Internet, individual solutions often share little common ground in their design, which...

    Provided By University of Florence

  • White Papers // Aug 2008

    Network Security: History, Importance, and Future

    Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The internet structure itself allowed for many security threats to...

    Provided By University of Florence

  • White Papers // Dec 2011

    Spectrum Clouds: ASession Based Spectrum Trading System for Multi-hop Cognitive Radio Networks

    Spectrum trading creates more accessing opportunities for Secondary Users (SUs) and economically benefits the Primary Users (PUs). However, it is challenging to implement spectrum trading in multi-hop Cognitive Radio Networks (CRNs) due to harsh Cognitive Radio (CR) requirements on SUs' devices and complex conflict and competition relationship among different CR...

    Provided By University of Florence

  • White Papers // Jun 2007

    AID: A Global Anti-DoS Service

    Distributed Denial of Service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is extremely difficult to realize, considering that the Internet consists of a very large number of autonomous systems with routers from different vendors...

    Provided By University of Florence

  • White Papers // Feb 2006

    OS-Aware Tuning: Improving Instruction Cache Energy Efficiency on System Workloads

    Low power has been considered as an important issue in Instruction cache (I-cache) designs. Several studies have shown that the I-cache can be tuned to reduce power. These techniques, however, exclusively focus on user-level applications, even though there is evidence that many commercial and emerging workloads often involve heavy use...

    Provided By University of Florence

  • White Papers // May 2009

    Enhancing Fault / Intrusion Tolerance Through Design and Configuration Diversity

    Fault/intrusion tolerance is usually the only viable way of improving the system dependability and security in the presence of continuously evolving threats. Many of the solutions in the literature concern a specific snapshot in the production or deployment of a fault-tolerant system and no immediate considerations are made about how...

    Provided By University of Florence

  • White Papers // Aug 2010

    Time As Process And Time As Product In Business Networks

    This paper analyses the role of time in the interactions within business network. The main aim of the paper is to examine the relation between different concepts of time. To address this topic different time perspectives are investigated. Clock time and social time are reviewed in the literature. In this...

    Provided By University of Florence

  • White Papers // Sep 2009

    Network Creativity And Place Marketing

    The purpose of this paper is to outline the features of network creativity within place marketing approach. Empirically the paper presents a preliminary verification of the theoretical hypotheses through an analysis of the Florentine area. The paper analyzes network creativity which is composed by relationships between businesses which are based...

    Provided By University of Florence

  • White Papers // Feb 2007

    Memory Performance and Scalability of Intel's and AMD's Dual-Core Processors: A Case Study

    As Chip Multi-Processor (CMP) has become the mainstream in processor architectures, Intel and AMD have introduced their dual-core processors to the PC market. In this paper, performance studies on an Intel Core 2 Duo, an Intel Pentium D and an AMD Athlon 64X2 processor are reported. According to the design...

    Provided By University of Florence

  • White Papers // Apr 2010

    Architecting Reliable Multi-Core Network-on-Chip for Small Scale Processing Technology

    The trend towards multi/many-core design has made Network-on-Chip (NoC) a crucial component of future microprocessors. With CMOS processing technologies continuously scaling down to the nanometer regime, effects such as Process Variation (PV) and Negative Bias Temperature Instability (NBTI) significantly decrease hardware reliability and lifetime. Therefore, it is imperative for multi-core...

    Provided By University of Florence

  • White Papers // Mar 2011

    SolarCore: Solar Energy Driven Multi-core Architecture Power Management

    The global energy crisis and environmental concerns have driven the IT community into the green computing era. Of clean, renewable energy sources, solar power is the most promising. While efforts have been made to improve the performance-per-watt, conventional architecture power management schemes incur significant solar energy loss since they are...

    Provided By University of Florence

  • White Papers // Jun 2009

    Accurate, Scalable and Informative Design Space Exploration for Large and Sophisticated Multi-core Oriented Architectures

    As microprocessors become more complex, early design space exploration plays an essential role in reducing the time to market and post-silicon surprises. The trend toward multi/many-core processors will result in sophisticated large-scale architecture substrates that exhibit increasingly complex and heterogeneous behavior. While conventional analytical modeling techniques can be used to...

    Provided By University of Florence

  • White Papers // Sep 2011

    A Quantitative Analysis of Cooling Power in Container-Based Data Centers

    Cooling power is often represented as a single taxed cost on the total energy consumption of the data center. Some estimates go as far as 50% of the total energy demand. However, this view is rather simplistic in the presence of a multitude of cooling options and optimizations. In response...

    Provided By University of Florence

  • White Papers // May 2008

    Managing Multi-Core Soft-Error Reliability Through Utility-Driven Cross Domain Optimization

    As semiconductor processing technology continues to scale down, managing reliability becomes an increasingly difficult challenge in high-performance microprocessor design. Transient faults, also known as soft errors, corrupt program data at the circuit level and cause incorrect program execution and system crashes. Future processors will consist of billions of transistors organized...

    Provided By University of Florence

  • White Papers // Jun 2009

    Exploring Phase Change Memory and 3D Die-Stacking for Power/Thermal Friendly, Fast and Durable Memory Architectures

    Dynamic Random Access Memory (DRAM) has been used as the main memory in computer systems for decades due to its high-density, high-performance and low-cost. However, DRAM technologies are facing both scalability and power issues. DRAM is difficult to scale down beyond 50nm due to various limitations associated with device leakages...

    Provided By University of Florence

  • White Papers // Sep 2009

    On the (Dis)similarity of Transactional Memory Workloads

    Transactional Memory (TM) simplifies parallel programming by providing atomic execution for an arbitrarily large block of code. Programming to exploit the resources in a multicore system remains a major obstacle for both computer and software engineers. Transactional memory offers an attractive alternative to traditional concurrent programming but implementations emerged before...

    Provided By University of Florence

  • White Papers // Jul 2008

    Using Analytical Models to Efficiently Explore Hardware Transactional Memory and Multi-Core Co-Design

    Transactional memory is emerging as a parallel programming paradigm for multi-core processors. Despite the recent interest in transactional memory, there has been no study to characterize the interaction between Hardware Transactional Memory (HTM) design dimensions and multi-core microarchitecture configuration. In this paper, the authors investigate the use of analytical modeling...

    Provided By University of Florence

  • White Papers // Jul 2008

    Accelerating Multi-core Processor Design Space Evaluation Using Automatic Multi-threaded Workload Synthesis

    The design and evaluation of microprocessor architectures is a difficult and time-consuming task. Although small, hand-coded micro-benchmarks can be used to accelerate performance evaluation, these programs lack the complexity to stress increasingly complex architecture designs. Larger and more complex real-world workloads should be employed to measure the performance of a...

    Provided By University of Florence

  • White Papers // Jun 2009

    TransPlant: A Parameterized Methodology For Generating Transactional Memory Workloads

    Transactional memory provides a means to bridge the discrepancy between programmer productivity and the difficulty in exploiting thread-level parallelism gains offered by emerging chip multiprocessors. Because the hardware has outpaced the software, there are very few modern multithreaded benchmarks available and even fewer for transactional memory researchers. This hurdle must...

    Provided By University of Florence

  • White Papers // Nov 2009

    Thermal Design Space Exploration of 3D Die Stacked Multi-Core Processors Using Geospatial-Based Predictive Models

    In this paper, the author's present novel 2D geospatial-based predictive models for exploring the complex thermal spatial behavior of Three-Dimensional (3D) die stacked multi-core processors at the early design stage. Unlike other analytical techniques, their predictive models can forecast the location, size and temperature of thermal hotspots. They evaluate the...

    Provided By University of Florence