University of Miami School of Business Administration

Displaying 1-40 of 69 results

  • White Papers // Apr 2014

    An Architecture for Low-Power High-Performance Embedded Computing

    There are a growing number of systems that require high-performance low-power embedded solutions. Recently the DARPA PERFECT program set forth an efficiency goal of 75 GFLOPS/W to enable embedded computing in Unmanned Aerial Vehicles (UAVs). As a result of analyzing a typical UAV workload, Wide-Angle Motion Imaging (WAMI), the authors...

    Provided By University of Miami School of Business Administration

  • White Papers // Feb 2014

    CPU-GPU Collaboration for Output Quality Monitoring

    Heterogeneous systems that combine both traditional processors with powerful GPUs have become standard in all systems ranging from servers to cell phones. GPUs represent affordable but powerful compute engines that can be used for many of the domains that are amenable to approximation. Approximation is applicable in domains where some...

    Provided By University of Miami School of Business Administration

  • White Papers // Feb 2014

    Refreshing Thoughts on DRAM: Power Saving vs. Data Integrity

    To head-off the trend of increasing power consumption and throughput overheads due to refresh in DRAM, researchers are exploring ways to fine-tune refresh rate. Refresh management proposals range from temperature-aware refresh to partitioning data cells based on volatility, with each partition having its own refresh rate. One hurdle in this...

    Provided By University of Miami School of Business Administration

  • White Papers // Jan 2014

    An Optimal Time-Power Tradeoff for Sorting on a Mesh-Connected Computer with On-Chip Optics

    Energy consumption has become a critical factor constraining the design of massively parallel computers, necessitating the development of new models and energy-efficient algorithms. The primary component of on-chip energy consumption is data movement, and the mesh computer is a natural model of this, explicitly taking distance into account. Unfortunately the...

    Provided By University of Miami School of Business Administration

  • White Papers // Jan 2014

    Unification of Partitioning, Placement and Floorplanning

    Large macro blocks, pre-designed datapaths, embedded memories and analog blocks are increasingly used in ASIC designs. However, robust algorithms for large-scale placement of such designs have only recently been considered in the literature, and improvements by over 10% per paper are still common. Large macros can be handled by traditional...

    Provided By University of Miami School of Business Administration

  • White Papers // Jan 2014

    Software-Based Online Detection of Hardware Defects: Mechanisms, Architectural Support, and Evaluation

    As silicon process technology scales deeper into the nanometer regime, hardware defects are becoming more common. Such defects are bound to hinder the correct operation of future processor systems, unless new online techniques become available to detect and to tolerate them while preserving the integrity of software applications running on...

    Provided By University of Miami School of Business Administration

  • White Papers // Jan 2014

    Operating System Support for Virtual Machines

    A Virtual-Machine Monitor (VMM) is a useful technique for adding functionality below existing operating system and application software. One class of VMMs (called Type II VMMs) builds on the abstractions provided by a host operating system. Type II VMMs are elegant and convenient, but their performance is currently an order...

    Provided By University of Miami School of Business Administration

  • White Papers // Jan 2014

    ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay

    Current system loggers have two problems: they depend on the integrity of the operating system being logged, and they do not save sufficient information to replay and analyze attacks that include any non-deterministic events. ReVirt removes the dependency on the target operating system by moving it into a virtual machine...

    Provided By University of Miami School of Business Administration

  • White Papers // Jan 2014

    Sources of Error in Full-System Simulation

    In this paper, the authors investigate the sources of error in gem5 - a state-of-the-art computer simulator - by validating it against a real hardware platform: the ARM Versatile Express TC2 development board. They design a custom gem5 configuration and make several changes to the simulator itself in order to...

    Provided By University of Miami School of Business Administration

  • White Papers // Jan 2014

    Advances and Insights into Parallel SAT Solving

    The recent improvements in SAT solving algorithms, driven by the quest to solve increasingly complex problem instances, have produced techniques whose objective is to prune large portions of the search space to converge quickly to a solution (for instance, conflict-driven learning). In particular, solutions have been suggested in this area...

    Provided By University of Miami School of Business Administration

  • White Papers // Dec 2013

    Architecting an Lte Base Station With Graphics Processing Units

    Due to the rapid growth of mobile communication, wireless base stations are becoming a significant consumer of computational resources. Historically, base stations have been built from ASICs, DSP processors, or FPGAs. This paper studies the feasibility of building wireless base stations from commercial Graphics Processing Units (GPUs). GPUs are attractive...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2013

    Small is Better: Avoiding Latency Traps in Virtualized Data Centers

    Public clouds have become a popular platform for building internet-scale applications. Using virtualization, public cloud services grant customers full control of guest operating systems and applications, while service providers still retain the management of their host infrastructure. Because applications built with public clouds are often highly sensitive to response time,...

    Provided By University of Miami School of Business Administration

  • White Papers // Aug 2013

    Properties of and Improvements to Time-Domain Dynamic Thermal Analysis Algorithms

    Temperature has a strong influence on Integrated Circuit (IC) performance, power consumption, and reliability. Accurate and fast thermal analysis can therefore benefit IC design and control. Thermal analysis can be separated into two sub-problems: steady-state thermal analysis and dynamic thermal analysis. Steady-state thermal analysis determines the thermal profile as time...

    Provided By University of Miami School of Business Administration

  • White Papers // Aug 2013

    Direction-Preserving Trajectory Simplification

    Trajectories of moving objects are collected in many applications. Raw trajectory data is typically very large, and has to be simplified before use. In this paper, the authors introduce the notion of direction preserving trajectory simplification, and show both analytically and empirically that it can support a broader range of...

    Provided By University of Miami School of Business Administration

  • White Papers // Aug 2013

    Memory Access Aware On-Line Voltage Control for Performance and Energy Optimization

    In this paper, the authors describe an off-chip memory access-aware runtime DVFS control technique that minimizes energy consumption subject to constraints on application execution times. They consider application phases and the implications of changing cache miss rates on the ideal power control state. They first propose a two-stage DVFS algorithm...

    Provided By University of Miami School of Business Administration

  • White Papers // Aug 2013

    Detecting Traditional Packers, Decisively

    Many important decidability results in malware analysis are based on turing machine models of computation. The authors exhibit computational models that use more realistic assumptions about machine and attacker resources. While seminal results such as remain true for turing machines, they show that under more realistic assumptions important tasks are...

    Provided By University of Miami School of Business Administration

  • White Papers // Aug 2013

    Illuminating the Security Issues Surrounding Lights-Out Server Management

    Out-of-band, lights-out management has become a standard feature on many servers, but while this technology can be a boon for system administrators, it also presents a new and interesting vector for attack. This paper examines the security implications of the Intelligent Platform Management Interface (IPMI), which is implemented on server...

    Provided By University of Miami School of Business Administration

  • White Papers // Jul 2013

    Transparent CPU-GPU Collaboration for Data-Parallel Kernels on Heterogeneous Systems

    Heterogeneous computing on CPUs and GPUs has traditionally used fixed roles for each device: the GPU handles data parallel work by taking advantage of its massive number of cores while the CPU handles non data-parallel work, such as the sequential code or data transfer management. Unfortunately, this work distribution can...

    Provided By University of Miami School of Business Administration

  • White Papers // Jun 2013

    Adoption of Business Intelligence & Analytics in Organizations - An Empirical Study of Antecedents

    Although Business Intelligence& Analytics (BIA) systems are increasingly seen as a source of competitive advantage, limited research, to the authors' knowledge, has examined the factors driving their organizational adoption. Drawing on Technology-Organization-Environment framework, they present a theoretical model of factors associated with the extent of organizational adoption of BIA technologies...

    Provided By University of Miami School of Business Administration

  • White Papers // May 2013

    Leveraging It for Business Innovation: Does the Role of the CIO Matter?

    The evolving role of Information Technology (IT) in business innovation places increasing emphasis on the role of the Chief Information Officer (CIO). Yet, the role of the CIO in business innovation is understudied in the extant literature. Drawing on organizational theory of boundary spanning leadership, the authors posit that the...

    Provided By University of Miami School of Business Administration

  • White Papers // Apr 2013

    Global EDF Schedulability Analysis for Synchronous Parallel Tasks on Multicore Platforms

    The trend towards multi-core/many-core architectures is well underway. It is therefore becoming very important to develop software in ways that take advantage of such parallel architectures. This particularly entails a shift in programming paradigms towards fine-grained, thread-parallel computing. Many parallel programming models have been introduced targeting such intra-task thread-level parallelism....

    Provided By University of Miami School of Business Administration

  • White Papers // Mar 2013

    Minimizing Remote Accesses in MapReduce Clusters

    MapReduce, in particular Hadoop, is a popular framework for the distributed processing of large datasets on clusters of relatively inexpensive servers. Although Hadoop clusters are highly scalable and ensure data availability in the face of server failures, their efficiency is poor. The authors study data placement as a potential source...

    Provided By University of Miami School of Business Administration

  • White Papers // Mar 2013

    CogWnet: A Resource Management Architecture for Cognitive Wireless Networks

    With the increasing adoption of wireless communication technologies, there is a need to improve management of existing radio resources. Cognitive radio is a promising technology to improve the utilization of wireless spectrum. Its operating principle is based on building an integrated hardware and software architecture that configures the radio to...

    Provided By University of Miami School of Business Administration

  • White Papers // Feb 2013

    Bobtail: Avoiding Long Tails in the Cloud

    Highly modular data center applications such as Bing, Facebook, and Amazon's retail platform are known to be susceptible to long tails in response times. Services such as Amazon's EC2 have proven attractive platforms for building similar applications. Unfortunately, virtualization used in such platforms exacerbates the long tail problem by factors...

    Provided By University of Miami School of Business Administration

  • White Papers // Feb 2013

    Enabling Secure Database as a Service Using Fully Homomorphic Encryption: Challenges and Opportunities

    The database community, at least for the last decade, has been grappling with querying encrypted data, which would enable secure database as a service solution. A recent breakthrough in the cryptographic community (in 2009) related to Fully Homomorphic Encryption (FHE) showed that arbitrary computation on encrypted data is possible. Successful...

    Provided By University of Miami School of Business Administration

  • White Papers // Dec 2012

    Clear and Present Data: Opaque Traffic and Its Security Implications for the Future

    Opaque traffic, i.e., traffic that is compressed or encrypted, incurs particularly high overhead for deep packet inspection engines and often yields little or no useful information. The authors' experiments indicate that an astonishing 89% of payload-carrying TCP packets - and 86% of bytes transmitted - are opaque, forcing them to...

    Provided By University of Miami School of Business Administration

  • White Papers // Dec 2012

    Characterization of Blacklists and Tainted Network Traffic

    Threats to the security and availability of the network have contributed to the use of Real-time Black hole Lists (RBLs) as an attractive method for implementing dynamic filtering and blocking. While RBLs have received considerable study, little is known about the impact of these lists in practice. A variety of...

    Provided By University of Miami School of Business Administration

  • White Papers // Nov 2012

    Composite Cores: Pushing Heterogeneity into a Core

    Heterogeneous multicore systems - comprised of multiple cores with varying capabilities, performance, and energy characteristics - have emerged as a promising approach to increasing energy efficiency. Such systems reduce energy consumption by identifying phase changes in an application and migrating execution to the most efficient core that meets its current...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2012

    Toward Software-Defined Cellular Networks

    Existing cellular networks suffer from inflexible and expensive equipment, complex control-plane protocols, and vendor-specific configuration interfaces. In this position paper, the authors argue that Software Defined Networking (SDN) can simplify the design and management of cellular data networks, while enabling new services. However, supporting many subscribers, frequent mobility, fine-grained measurement...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2012

    X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software

    Troubleshooting the performance of production software is challenging. Most existing tools, such as profiling, tracing, and logging systems, reveal what events occurred during performance anomalies. However, users of such tools must infer why these events occurred; e.g., that their execution was due to a root cause such as a specific...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2012

    Safeguarding Academic Accounts and Resources With the University Credential Abuse Auditing System

    Whether it happens through malware or through phishing, loss of one's online identity is a real and present danger. While many attackers seek credentials to realize financial gain, an analysis of the compromised accounts at their own institutions reveals that perpetrators often steal university credentials to gain free and unfettered...

    Provided By University of Miami School of Business Administration

  • White Papers // Aug 2012

    Embedded Way Prediction for Last-Level Caches

    In this paper, the authors investigate embedded way prediction for large Last-Level Caches (LLCs): an architecture and circuit design to provide the latency of parallel tag-data access at substantial energy savings. Existing way prediction approaches for L1 caches are compromised by the high associativity and filtered temporal locality of LLCs....

    Provided By University of Miami School of Business Administration

  • White Papers // Jul 2012

    Learning From Early Attempts to Measure Information Security Performance

    The rapid evolution of threat ecosystems and the shifting focus of adversarial actions complicate efforts to assure security of an organization's computer networks. Efforts to build a rigorous science of security, one consisting of sound and reproducible empirical evaluations, start with measures of these threats, their impacts, and the factors...

    Provided By University of Miami School of Business Administration

  • White Papers // Jun 2012

    Cyberinfrastructure Enabling Personalized Production

    The Internet has facilitated the development of e-businesses using web-based services leveraging back-end database systems, inventory systems and payment processing systems. Online retail businesses can be set up in a relatively short period of time. In contrast, set-up of a manufacturing system takes much longer; the system design involves various...

    Provided By University of Miami School of Business Administration

  • White Papers // Jun 2012

    PicoServer Revisited: On the Profitability of Eliminating Intermediate Cache Levels

    The confluence of 3D stacking, emerging dense memory technologies, and low-voltage throughput-oriented many-core processors has sparked interest in single-chip servers as building blocks for scalable data-centric system design. These chips encapsulate an entire memory hierarchy within a 3D-stacked multi-die package. Stacking alters key assumptions of conventional hierarchy design, drastically increasing...

    Provided By University of Miami School of Business Administration

  • White Papers // Jun 2012

    Reevaluating Fast Dual-Voltage Power Rail Switching Circuitry

    Several recent papers have been published proposing the use of dual-voltage rails and fast switching circuitry to address bottlenecks or overcome process variation in near-threshold computing systems. The published results yield boosting transition times of 7-10ns, which, in some cases, is needed for the architectural contributions to be justified. However,...

    Provided By University of Miami School of Business Administration

  • White Papers // May 2012

    Exploiting Interference Locality in Coordinated Multi-Point Transmission Systems

    Coordinated Multi-Point (CoMP) transmission is emerging as a concept that can substantially suppress interference, thus improving the capacity of multi-cell wireless networks. However, existing CoMP techniques either require sharing of data and Channel State Information (CSI) for all links in the network, or have limited capability of interference suppression. In...

    Provided By University of Miami School of Business Administration

  • White Papers // May 2012

    Average Delay SLAs in Cloud Computing

    In this paper, the authors conduct feasibility studies on the average delay space for Cloud computing, and they propose a heuristic method to control the vector of average delays, subject to predefined delay constraints. Their work is strongly motivated by the fact that delay control plays a critical role to...

    Provided By University of Miami School of Business Administration

  • White Papers // May 2012

    An Interpretation of the Cover and Leung Capacity Region for the MAC With Feedback Through Stochastic Control

    The authors consider the problem of communication over a Multiple Access Channel (MAC) with noiseless feedback. A single-letter characterization of the capacity of this channel is not currently known in general. They formulate the MAC with feedback capacity problem as a stochastic control problem for a special class of channels...

    Provided By University of Miami School of Business Administration

  • White Papers // May 2012

    On the Optimal Number of Hops in Relay Networks

    In this paper, the authors investigate the bandwidth (throughput) and energy efficiency considering both the physical layer and the Medium Access Control (MAC) layer in multi-hop relay wireless networks. For a given distance between the source and the destination, as the number of relays increases the overhead necessary to operate...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2012

    X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software

    Troubleshooting the performance of production software is challenging. Most existing tools, such as profiling, tracing, and logging systems, reveal what events occurred during performance anomalies. However, users of such tools must infer why these events occurred; e.g., that their execution was due to a root cause such as a specific...

    Provided By University of Miami School of Business Administration

  • White Papers // Feb 2013

    Bobtail: Avoiding Long Tails in the Cloud

    Highly modular data center applications such as Bing, Facebook, and Amazon's retail platform are known to be susceptible to long tails in response times. Services such as Amazon's EC2 have proven attractive platforms for building similar applications. Unfortunately, virtualization used in such platforms exacerbates the long tail problem by factors...

    Provided By University of Miami School of Business Administration

  • White Papers // Dec 2012

    Characterization of Blacklists and Tainted Network Traffic

    Threats to the security and availability of the network have contributed to the use of Real-time Black hole Lists (RBLs) as an attractive method for implementing dynamic filtering and blocking. While RBLs have received considerable study, little is known about the impact of these lists in practice. A variety of...

    Provided By University of Miami School of Business Administration

  • White Papers // Dec 2012

    Clear and Present Data: Opaque Traffic and Its Security Implications for the Future

    Opaque traffic, i.e., traffic that is compressed or encrypted, incurs particularly high overhead for deep packet inspection engines and often yields little or no useful information. The authors' experiments indicate that an astonishing 89% of payload-carrying TCP packets - and 86% of bytes transmitted - are opaque, forcing them to...

    Provided By University of Miami School of Business Administration

  • White Papers // Jul 2012

    Learning From Early Attempts to Measure Information Security Performance

    The rapid evolution of threat ecosystems and the shifting focus of adversarial actions complicate efforts to assure security of an organization's computer networks. Efforts to build a rigorous science of security, one consisting of sound and reproducible empirical evaluations, start with measures of these threats, their impacts, and the factors...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2012

    Safeguarding Academic Accounts and Resources With the University Credential Abuse Auditing System

    Whether it happens through malware or through phishing, loss of one's online identity is a real and present danger. While many attackers seek credentials to realize financial gain, an analysis of the compromised accounts at their own institutions reveals that perpetrators often steal university credentials to gain free and unfettered...

    Provided By University of Miami School of Business Administration

  • White Papers // Jul 2011

    Censorship and Co-Option of the Internet Infrastructure

    Over a few short years, the Internet has grown to play an integral part of daily economic, social, and political life in most countries. From the Egyptian "Velvet Revolution" to the last US presidential campaign, Internet communication shapes public opinion and fosters social change. But despite its immense social importance,...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2010

    CANVuS: Context-Aware Network Vulnerability Scanning

    Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of network devices and the services they are running. Traditional vulnerability scanning systems meet these requirements by periodically probing target networks to discover hosts and the services...

    Provided By University of Miami School of Business Administration

  • White Papers // Jan 2010

    Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation

    Unsolicited Bulk E-mail (UBE) or spam constitutes a significant fraction of all e-mail connection attempts and routinely frustrates users, consumes resources, and serves as an infection vector for malicious software. In an effort to scalably and effectively reduce the impact of these e-mails, e-mail system designers have increasingly turned to...

    Provided By University of Miami School of Business Administration

  • White Papers // Dec 2009

    A Framework for Understanding and Applying Ethical Principles in Network and Security Research

    Current information and communications technology poses a variety of ethical challenges for researchers. In this paper, the authors present an intellectual framework for understanding and applying ethical principles in networking and security research rooted in the guidance suggested by an ongoing Department of Homeland Security working group on ethics. By...

    Provided By University of Miami School of Business Administration

  • White Papers // Jul 2009

    If It Ain't Broke, Don't Fix It: Challenges and New Directions for Inferring the Impact of Software Patches

    Software patches are designed to have a positive effect on the operation of software systems. However, these patches may cause incompatibilities, regressions, and other unintended negative impact on the reliability, performance, and security of software. In this paper, the authors propose PatchAdvisor, a technique to improve the manageability of the...

    Provided By University of Miami School of Business Administration

  • White Papers // Jul 2009

    PolyPack: An Automated Online Packing Service for Optimal Antivirus Evasion

    Packers have long been a valuable tool in the toolbox of offensive users for evading the detection capabilities of signature-based antivirus engines. However, selecting the packer that results in the most effective evasion of antivirus engines may not be a trivial task due to diversity in the capabilities of both...

    Provided By University of Miami School of Business Administration

  • White Papers // Mar 2009

    One Size Does Not Fit All: 10 Years of Applying Context-Aware Security

    Defenders of today's critical cyber-infrastructure (e.g., the Internet) are equipped with a wide array of security techniques including network-based Intrusion Detection Systems (IDS), host-based Anti-Virus systems (AV), and decoy or reconnaissance systems such as host-based honeypots or network-based telescopes. While effective at detecting and mitigating some of the threats posed...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2008

    Shades of Grey: On the Effectiveness of Reputation-Based "Blacklists"

    Malicious code, or malware, executed on compromised hosts provides a platform for a wide variety of attacks against the availability of the network and the privacy and confidentiality of its users. Unfortunately, the most popular techniques for detecting and preventing malware have been shown to be significantly flawed, and it...

    Provided By University of Miami School of Business Administration

  • White Papers // Mar 2013

    CogWnet: A Resource Management Architecture for Cognitive Wireless Networks

    With the increasing adoption of wireless communication technologies, there is a need to improve management of existing radio resources. Cognitive radio is a promising technology to improve the utilization of wireless spectrum. Its operating principle is based on building an integrated hardware and software architecture that configures the radio to...

    Provided By University of Miami School of Business Administration

  • White Papers // Oct 2008

    Small Bandwidth Asymptotics for Density-Weighted Average Derivatives

    In this paper, the authors propose (apparently) novel standard error formulas for the density-weighted average derivative estimator of Powell, Stock, and Stoker (1989). Asymptotic validity of the standard errors developed in this paper does not require the use of higher-order kernels and the standard errors are "Robust" in the sense...

    Provided By University of Miami School of Business Administration

  • White Papers // Dec 2009

    Making the Case for Random Access Scheduling in Wireless Multi-Hop Networks

    This paper formally establishes that random access scheduling schemes, and, more specifically CSMA-CA, yields exceptionally good performance in the context of wireless multi-hop networks. While it is believed that CSMA-CA performs significantly worse than optimal, this belief is usually based on experiments that use rate allocation mechanisms which grossly underutilize...

    Provided By University of Miami School of Business Administration

  • White Papers // Feb 2013

    Enabling Secure Database as a Service Using Fully Homomorphic Encryption: Challenges and Opportunities

    The database community, at least for the last decade, has been grappling with querying encrypted data, which would enable secure database as a service solution. A recent breakthrough in the cryptographic community (in 2009) related to Fully Homomorphic Encryption (FHE) showed that arbitrary computation on encrypted data is possible. Successful...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2011

    Towards Improved Scalability in Smart Grid Modeling: Simplifying Generator Dynamics Analysis Via Spectral Graph Sparsification

    Smart-grid technologies focus on the complex interactions between different components of the electricity grid, together with the computing, control and communication functionalities that will bring together this future smarter infrastructure. Investigating these complex dynamic interactions is crucial for the efficiency and robustness of the emerging smart grid. In particular, it...

    Provided By University of Miami School of Business Administration

  • White Papers // May 2013

    Leveraging It for Business Innovation: Does the Role of the CIO Matter?

    The evolving role of Information Technology (IT) in business innovation places increasing emphasis on the role of the Chief Information Officer (CIO). Yet, the role of the CIO in business innovation is understudied in the extant literature. Drawing on organizational theory of boundary spanning leadership, the authors posit that the...

    Provided By University of Miami School of Business Administration

  • White Papers // Jun 2013

    Adoption of Business Intelligence & Analytics in Organizations - An Empirical Study of Antecedents

    Although Business Intelligence& Analytics (BIA) systems are increasingly seen as a source of competitive advantage, limited research, to the authors' knowledge, has examined the factors driving their organizational adoption. Drawing on Technology-Organization-Environment framework, they present a theoretical model of factors associated with the extent of organizational adoption of BIA technologies...

    Provided By University of Miami School of Business Administration

  • White Papers // Oct 2009

    HC-BGP: A Light-Weight and Flexible Scheme for Securing Prefix Ownership

    The Border Gateway Protocol (BGP) is a fundamental building block of the Internet infrastructure. However, due to the implicit trust assumption among networks, Internet routing remains quite vulnerable to various types of mis-configuration and attacks. Prefix hijacking is one such misbehavior where an attacker AS injects false routes to the...

    Provided By University of Miami School of Business Administration

  • White Papers // Feb 2007

    Supporting Privacy Policies in a Publish-Subscribe Substrate for Pervasive Environments

    A location tracking sensor network is being deployed in several buildings at the University of Michigan to help explore issues in design of pervasive environments. Managing privacy is expected to be a significant concern for acceptance of such pervasive environments. This paper outlines an initial design of a publish-subscribe communication...

    Provided By University of Miami School of Business Administration

  • White Papers // Aug 2013

    Detecting Traditional Packers, Decisively

    Many important decidability results in malware analysis are based on turing machine models of computation. The authors exhibit computational models that use more realistic assumptions about machine and attacker resources. While seminal results such as remain true for turing machines, they show that under more realistic assumptions important tasks are...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2013

    Small is Better: Avoiding Latency Traps in Virtualized Data Centers

    Public clouds have become a popular platform for building internet-scale applications. Using virtualization, public cloud services grant customers full control of guest operating systems and applications, while service providers still retain the management of their host infrastructure. Because applications built with public clouds are often highly sensitive to response time,...

    Provided By University of Miami School of Business Administration

  • White Papers // Jan 2014

    Operating System Support for Virtual Machines

    A Virtual-Machine Monitor (VMM) is a useful technique for adding functionality below existing operating system and application software. One class of VMMs (called Type II VMMs) builds on the abstractions provided by a host operating system. Type II VMMs are elegant and convenient, but their performance is currently an order...

    Provided By University of Miami School of Business Administration

  • White Papers // Jan 2014

    ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay

    Current system loggers have two problems: they depend on the integrity of the operating system being logged, and they do not save sufficient information to replay and analyze attacks that include any non-deterministic events. ReVirt removes the dependency on the target operating system by moving it into a virtual machine...

    Provided By University of Miami School of Business Administration

  • White Papers // Aug 2013

    Direction-Preserving Trajectory Simplification

    Trajectories of moving objects are collected in many applications. Raw trajectory data is typically very large, and has to be simplified before use. In this paper, the authors introduce the notion of direction preserving trajectory simplification, and show both analytically and empirically that it can support a broader range of...

    Provided By University of Miami School of Business Administration

  • White Papers // Nov 2007

    Scalable Rule-Based Gene Expression Data Classification

    Current state-of-the-art association rule-based classifiers for gene expression data operate in two phases: association rule mining from training data followed by classification of query data using the mined rules. In the worst case, these methods require an exponential search over the subset space of the training data set's samples and/or...

    Provided By University of Miami School of Business Administration

  • White Papers // Jan 2014

    Sources of Error in Full-System Simulation

    In this paper, the authors investigate the sources of error in gem5 - a state-of-the-art computer simulator - by validating it against a real hardware platform: the ARM Versatile Express TC2 development board. They design a custom gem5 configuration and make several changes to the simulator itself in order to...

    Provided By University of Miami School of Business Administration

  • White Papers // Dec 2013

    Architecting an Lte Base Station With Graphics Processing Units

    Due to the rapid growth of mobile communication, wireless base stations are becoming a significant consumer of computational resources. Historically, base stations have been built from ASICs, DSP processors, or FPGAs. This paper studies the feasibility of building wireless base stations from commercial Graphics Processing Units (GPUs). GPUs are attractive...

    Provided By University of Miami School of Business Administration

  • White Papers // Jun 2012

    PicoServer Revisited: On the Profitability of Eliminating Intermediate Cache Levels

    The confluence of 3D stacking, emerging dense memory technologies, and low-voltage throughput-oriented many-core processors has sparked interest in single-chip servers as building blocks for scalable data-centric system design. These chips encapsulate an entire memory hierarchy within a 3D-stacked multi-die package. Stacking alters key assumptions of conventional hierarchy design, drastically increasing...

    Provided By University of Miami School of Business Administration

  • White Papers // Oct 2011

    Flexible Product Code-Based Ecc Schemes for MLC Nand Flash Memories

    Flash memories have high storage density and are used in memory cards, USB flash drives, and solid-state drives. The authors focus on Multi-Level Cell (MLC) Flash memories which store 2 or more bits per cell by supporting 4 or more voltage states. These have even greater storage density and are...

    Provided By University of Miami School of Business Administration

  • White Papers // Oct 2008

    What Does Control Theory Bring to Systems Research?

    Feedback mechanisms can help today's increasingly complex computer systems adapt to changes in workloads or operating conditions. Control theory offers a principled way for designing feedback loops to deal with unpredictable changes, uncertainties, and disturbances in systems. The authors provide an overview of the joint research at HP Labs and...

    Provided By University of Miami School of Business Administration

  • White Papers // May 2012

    Exploiting Interference Locality in Coordinated Multi-Point Transmission Systems

    Coordinated Multi-Point (CoMP) transmission is emerging as a concept that can substantially suppress interference, thus improving the capacity of multi-cell wireless networks. However, existing CoMP techniques either require sharing of data and Channel State Information (CSI) for all links in the network, or have limited capability of interference suppression. In...

    Provided By University of Miami School of Business Administration

  • White Papers // May 2012

    Average Delay SLAs in Cloud Computing

    In this paper, the authors conduct feasibility studies on the average delay space for Cloud computing, and they propose a heuristic method to control the vector of average delays, subject to predefined delay constraints. Their work is strongly motivated by the fact that delay control plays a critical role to...

    Provided By University of Miami School of Business Administration

  • White Papers // May 2012

    An Interpretation of the Cover and Leung Capacity Region for the MAC With Feedback Through Stochastic Control

    The authors consider the problem of communication over a Multiple Access Channel (MAC) with noiseless feedback. A single-letter characterization of the capacity of this channel is not currently known in general. They formulate the MAC with feedback capacity problem as a stochastic control problem for a special class of channels...

    Provided By University of Miami School of Business Administration

  • White Papers // May 2012

    On the Optimal Number of Hops in Relay Networks

    In this paper, the authors investigate the bandwidth (throughput) and energy efficiency considering both the physical layer and the Medium Access Control (MAC) layer in multi-hop relay wireless networks. For a given distance between the source and the destination, as the number of relays increases the overhead necessary to operate...

    Provided By University of Miami School of Business Administration

  • White Papers // Jun 2010

    A 1.07 Tbit/s 128

    Single Instruction Multiple Data (SIMD) engines are becoming common in modern processors to handle computationally intensive applications like video/image processing. Such processors require swizzle networks to permute data between compute stages. Existing circuit topologies for such networks do not scale well due to significant area and energy overhead imposed by...

    Provided By University of Miami School of Business Administration

  • White Papers // Apr 2011

    Reconfigurable Energy Efficient Near Threshold Cache Architectures

    Battery life is an important concern for modern embedded processors. Supply voltage scaling techniques can provide an order of magnitude reduction in energy. Current commercial memory technologies have been limited in the degree of supply voltage scaling that can be performed if they are to meet yield and reliability constraints....

    Provided By University of Miami School of Business Administration