University of Pitesti

Displaying 1-40 of 77 results

  • White Papers // Feb 2014

    MapReduce Analysis for Cloud-Archived Data

    Public storage clouds have become a popular choice for archiving certain classes of enterprise data - for example, application and infrastructure logs. These logs contain sensitive information like IP addresses or user logins due to which regulatory and security requirements often require data to be encrypted before moved to the...

    Provided By University of Pitesti

  • White Papers // Jan 2014

    Stash Directory: A Scalable Directory for Many-Core Coherence

    Maintaining coherence in large-scale Chip Multi-Processors (CMPs) embodies tremendous design trade-offs in meeting the area, energy and performance requirements. Sparse directory organizations represent the most energy-efficient and scalable approach towards many-core coherence. However, their limited associativity disallows the one-to-one correspondence of directory entries to cached blocks, rendering them inadequate in...

    Provided By University of Pitesti

  • White Papers // Nov 2013

    Semantic-Based Context-Aware Alert Fusion for Distributed Intrusion Detection Systems

    One of the fundamental challenges in real-world Intrusion Detection Systems (IDS) is the large number of redundant, non-relevant false positive alerts that they generate. In this paper, the authors propose an alert fusion approach that incorporates contextual information with the goal of leveraging the benefits of multi-sensor detection while reducing...

    Provided By University of Pitesti

  • White Papers // Sep 2013

    Power of One Bit: Increasing Error Correction Capability with Data Inversion

    Phase-Change Memory (PCM) has emerged as a candidate that overcomes the physical limitations faced by DRAM and NAND flash memory. While PCM has desirable properties in terms of scalability and energy, it suffers from limited endurance. Repeated writes because PCM cells to wear out and get permanently stuck at either...

    Provided By University of Pitesti

  • White Papers // Aug 2013

    PAQO: A Preference-Aware Query Optimizer for PostgreSQL

    Although the declarative nature of SQL provides great utility to database users, its use in distributed database management systems can leave users unaware of which servers in the system are evaluating portions of their queries. By allowing users to merely say what data they are interested in accessing without providing...

    Provided By University of Pitesti

  • White Papers // Aug 2013

    Optimization Strategies for A/B Testing on HADOOP

    In this paper, the authors present a set of techniques that considerably improve the performance of executing concurrent MapReduce jobs. Their proposed solution relies on proper resource allocation for concurrent Hive jobs based on data dependency, inter-query optimization and modeling of Hadoop cluster load. To the best of their knowledge,...

    Provided By University of Pitesti

  • White Papers // Jun 2013

    Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions

    In distributed transactional database systems deployed over cloud servers, entities cooperate to form proofs of authorization that are justified by collections of certified credentials. These proofs and credentials may be evaluated and collected over extended time periods under the risk of having the underlying authorization policies or the user credentials...

    Provided By University of Pitesti

  • White Papers // May 2013

    Negotiating Trust in Identity Metasystem

    Many federated identity management systems have been proposed to solve the problem of authorizing users across security domains. Although these solutions attempt to follow the user-centric design approach to empower users by letting them make important decisions on whether to release sensitive information, they do not provide much help to...

    Provided By University of Pitesti

  • White Papers // May 2013

    OPTWALL: A Hierarchical Traffic-Aware Firewall

    The overall efficiency, reliability, and availability of a firewall is crucial in enforcing and administrating security, especially when the network is under attack. The continuous growth of the Internet, coupled with the increasing sophistication of the attacks, is placing stringent demands on firewall performance. These challenges require new designs, architecture...

    Provided By University of Pitesti

  • White Papers // May 2013

    A Guided Tour Puzzle for Denial of Service Prevention

    Various cryptographic puzzle schemes are proposed as a defense mechanism against denial of service attack. But, all these puzzle schemes face a dilemma when there is a large disparity between the computational power of attackers and legitimate clients: increasing the difficulty of puzzles might unnecessarily restrict legitimate clients too much,...

    Provided By University of Pitesti

  • White Papers // May 2013

    A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks

    Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for security professionals. DDoS flooding attacks are typically explicit attempts to disrupt legitimate users' access to services. Attackers usually gain access to a large number of computers by exploiting their vulnerabilities to set up attack armies (i.e.,...

    Provided By University of Pitesti

  • White Papers // May 2013

    New Approach to Mitigating Distributed Service Flooding Attacks

    Distributed Denial of Service (DDoS) attacks pose great threat to the Internet and its public services. Various computation-based cryptographic puzzle schemes have been proposed to mitigate DDoS attacks when detection is hard or has low accuracy. Yet, existing puzzle schemes have shortcomings that limit their effectiveness in practice. First, the...

    Provided By University of Pitesti

  • White Papers // Apr 2013

    Application-Sensitive Access Control Evaluation Using Parameterized Expressiveness

    Access control schemes come in all shapes and sizes, which make choosing the right one for a particular application a challenge. Yet today's techniques for comparing access control schemes completely ignore the setting in which the scheme is to be deployed. In this paper, the authors present a formal framework...

    Provided By University of Pitesti

  • White Papers // Apr 2013

    Top Location Anonymization for Geosocial Network Datasets

    Geosocial networks such as foursquare have access to users' location information, friendships, and other potentially privacy sensitive information. In this paper, the authors show that an attacker with access to a naively-anonymized geosocial network dataset can breach users' privacy by considering location patterns of the target users. They study the...

    Provided By University of Pitesti

  • White Papers // Mar 2013

    COMeT+: Continuous Online Memory Testing With Mutli-Threading Extension

    Today's computers have gigabytes of main memory due to improved DRAM density. As density increases, smaller bit cells become more susceptible to errors. With an increase in error susceptibility, the need for memory resiliency also increases. Self-testing of memory health can proactively check for errors to improve resiliency. This paper...

    Provided By University of Pitesti

  • White Papers // Mar 2013

    Minimizing Flow Completion Times in Data Centers

    For provisioning large-scale online applications such as web search, social networks and advertisement systems, data centers face extreme challenges in providing low latency for short flows (that result from end-user actions) and high throughput for background flows (that are needed to maintain data consistency and structure across massively distributed systems)....

    Provided By University of Pitesti

  • White Papers // Feb 2013

    SplitBuff: Improving the Interaction of Heterogeneous RTT Flows on the Internet

    Today router buffers are sized according to the well-known Bandwidth-Delay Product (BDP) rule, which uses the average Round-Trip Time (RTT) of flows traversing a router. The BDP rule not only leads to large queueing delays, but also imposes "One (buffer) size fits all" philosophy for flows exhibiting a large variation...

    Provided By University of Pitesti

  • White Papers // Feb 2013

    BLMon: A Loss Differentiation Scheme for 802.11n

    An important problem in 802.11 wireless networks is to accurately differentiate between losses while incurring low overhead. Lack of loss differentiation can result in throughput degradation, which becomes increasingly severe as data rates scale up. This paper presents BLMon, a loss differentiation scheme for 802.11n networks that leverages loss patterns...

    Provided By University of Pitesti

  • White Papers // Jan 2013

    Dynamic Authentication-Key Re-Assignment for Reliable Report Delivery

    Sensor networks deployed in hostile environments are subject to various types of attacks. While multipath routing and en-route authentication schemes have been proposed to defend packet dropping and injection attacks respectively, it is challenging to defend both at the same time. The paper addresses this problem through an annulus based...

    Provided By University of Pitesti

  • White Papers // Jan 2013

    Efficient Group Key Management With Tamper-Resistant ISA Extensions

    The last decade has seen the enormous increase of group oriented applications many of which use secret group keys to secure the sensitive data transmission among scattered group members across the network or even over the Internet. Many group key management algorithms have been proposed to update these keys when...

    Provided By University of Pitesti

  • White Papers // Jan 2013

    Locating Compromised Sensor Nodes Through Incremental Hashing Authentication

    While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, the authors propose COOL, a COmpromised nOde Locating protocol for detecting and locating compromised nodes once they misbehave in the sensor network. They exploit a proven collision-resilient incremental...

    Provided By University of Pitesti

  • White Papers // Nov 2012

    Predicting Coherence Communication by Tracking Synchronization Points at Run Time

    Predicting target processors that a coherence request must be delivered to can improve the miss handling latency in shared memory systems. In directory coherence protocols, directly communicating with the predicted processors avoids costly indirection to the directory. In snooping protocols, prediction relaxes the high bandwidth requirements by replacing broadcast with...

    Provided By University of Pitesti

  • White Papers // Nov 2012

    FPB: Fine-Grained Power Budgeting to Improve Write Throughput of Multi-Level Cell Phase Change Memory

    As a promising nonvolatile memory technology, Phase Change Memory (PCM) has many advantages over traditional DRAM. Multi-Level Cell PCM (MLC) has the benefit of increased memory capacity with low fabrication cost. Due to high per-cell write power and long write latency, MLC PCM requires careful power management to ensure write...

    Provided By University of Pitesti

  • White Papers // Oct 2012

    Gaming the Game: Honeypot Venues Against Cheaters in Location-Based Social Networks

    The proliferation of Location-Based Social Networks (LBSNs) has provided the community with an abundant source of information that can be exploited and used in many different ways. LBSNs offer a number of conveniences to its participants, such as - but not limited to - a list of places in the...

    Provided By University of Pitesti

  • White Papers // Sep 2012

    On Achieving Low Latency in Data Centers

    Today's data centers face extreme challenges in providing low latency for online services such as web search, social networking, and recommendation systems. Achieving low latency is important as it impacts user experience, which in turn impacts operator revenue. However, most current congestion control protocols approximate Processor Sharing (PS), which is...

    Provided By University of Pitesti

  • White Papers // Sep 2012

    VICO: A Framework for Configuring Indoor Visible Light Communication Networks

    Visible Light Communications (VLC) are gaining popularity and may provide an alternative means of communications in indoor settings. However, to date, there is very little research on the deployment or higher layer protocol design for VLC. In this paper, the authors first perform channel measurements using a physical layer testbed...

    Provided By University of Pitesti

  • White Papers // Sep 2012

    Confidentiality-Preserving and Fault-Tolerant In-Network Aggregation for Collaborative WSNs

    In collaborative WSNs, sensing devices are owned and operated by different stakeholders with incentive to preserve the confidentiality of their individual sensors readings while contributing to statistics computed by the group. In such systems, in-network data processing presents high efficiency for energy and bandwidth, but unfortunately introduces several challenges related...

    Provided By University of Pitesti

  • White Papers // Jul 2012

    Characterizing Machines and Workloads on a Google Cluster

    Cloud computing offers high scalability, flexibility and cost-effectiveness to meet emerging computing requirements. Understanding the characteristics of real workloads on a large production cloud cluster benefits not only cloud service providers but also researchers and daily users. This paper studies a large-scale Google cluster usage trace dataset and characterizes how...

    Provided By University of Pitesti

  • White Papers // Jul 2012

    Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing as an Interactive Practice

    Rapid growth in the usage of location-aware mobile phones has enabled mainstream adoption of Location-Sharing Services (LSS). Integration with Social-Networking Services (SNS) has further accelerated this trend. To uncover how these developments have shaped the evolution of LSS usage, the authors conducted an online study (N = 362) aimed at...

    Provided By University of Pitesti

  • White Papers // Jun 2012

    A Theoretical Design for SSD Texture Storage

    Modern video games are approaching the limits of textures that can be stored in VRAM. Since these textures contribute a great deal to the perceived quality of the final image, it is important to not limit the size of these textures. Large textures are becoming ubiquitous in \"Good graphics\". Modern...

    Provided By University of Pitesti

  • White Papers // Jun 2012

    Data Dependent Sparing to Manage Better-Than-Bad Blocks

    The authors forecast that proper handling of unreliable storage blocks (e.g., \"Bad block management\" in solid-state drives) will remain critical for future systems built with advanced and emerging memory technologies. This paper argues that the conventional block retirement and sparing approach - a block is retired as soon as it...

    Provided By University of Pitesti

  • White Papers // May 2012

    Improving Performance of Router-Assisted Transport Protocols Over Variable Capacity Links

    Many promising congestion control protocols use explicit feedback from the network to achieve high performance. These protocols often use congestion signals whose computation requires an estimate of link capacity. Such estimates are not available in networks where capacity varies over time. This paper studies the impact of inaccurate capacity estimates...

    Provided By University of Pitesti

  • White Papers // Apr 2012

    Semantic-Based Policy Management for Cloud Computing Environments

    Cloud computing environments do not allow use of a single access control mechanism, single policy language or single policy management tool for various cloud services. Currently, users must use diverse access control solutions available for each cloud service provider to secure their data. In this paper, the authors introduce a...

    Provided By University of Pitesti

  • White Papers // Feb 2012

    Power-Aware Manhattan Routing on Chip Multiprocessors

    The authors investigate the routing of communications in Chip Multi-Processors (CMPs). The goal is to find a valid routing in the sense that the amount of data routed between two neighboring cores does not exceed the maximum link bandwidth while the power dissipated by communications is minimized. Their position is...

    Provided By University of Pitesti

  • White Papers // Jan 2012

    Improving Write Operations in MLC Phase Change Memory

    Phase Change Memory (PCM) recently has emerged as a promising technology to meet the fast growing demand for large capacity memory in modern computer systems. In particular, Multi-Level Cell (MLC) PCM that stores multiple bits in a single cell, offers high density with low per-byte fabrication cost. However, despite many...

    Provided By University of Pitesti

  • White Papers // Sep 2011

    Real-Time Scheduling for Phase Change Main Memory Systems

    Multi-core processors are effective for reducing energy consumption in computer systems, since modern multicore chips allow for power management of individual cores. However, multiple cores impose higher demand on the memory subsystem, which is extremely power hungry. In addition to the small steps towards managing power in DRAMs, Phase-Change Memory...

    Provided By University of Pitesti

  • White Papers // Sep 2011

    COMeT: Continuous Online Memory Test

    For several decades, DRAM has remained the best choice for main memory due to its relatively low cost, aggressive scalability, low power and good performance. Continued decreases in bit cell size have led to exceptionally large main memories - a laptop can be purchased with several gigabytes, while a server...

    Provided By University of Pitesti

  • White Papers // Aug 2011

    A Dynamic Optimization Model for Power and Performance Management of Virtualized Clusters

    An increasing number of large-scale server clusters are being deployed in data centers for supporting many different web-based application services in a seamless fashion. In this scenario, the rising energy costs for keeping up those web clusters are becoming an important concern for many business. In this paper, the authors...

    Provided By University of Pitesti

  • White Papers // Jul 2011

    MRAC: A Memristor-Based Reconfigurable Framework for Adaptive Cache Replacement

    Memristor, a long postulated yet missing circuit element, has recently emerged as a promising device in non-volatile memory technologies. However, beyond its use as memory cell, it is challenging to integrate memristor in modern architectures for general purpose computation. In this paper, the authors propose a non-conventional use of memristor...

    Provided By University of Pitesti

  • White Papers // Jul 2011

    Eyeing Your Exposure: Quantifying and Controlling Information Sharing for Improved Privacy

    A large body of research has focused on disclosure policies for controlling information release in social sharing (e.g., location-based) applications. However, less work has considered how exposed these policies actually leave users; i.e., to what extent are disclosures in compliance with these policies actually being made? For instance, consider a...

    Provided By University of Pitesti

  • White Papers // Dec 2008

    Development Approaches And Strategic Movements Within The Mobile Telecommunication Field

    In February 2000, when Vodafone took control of the British operator Orange, they had to split, because Vodafone owned two mobile telephony licenses in the same country - Great Britain - fact that was interdicted by the European legislation. So, on 30th of May 2000, France Telecom announced the purchase...

    Provided By University of Pitesti

  • White Papers // Jul 2011

    The Cost Of Bank Credit Financing

    Although the credit is a conventional financing method used by any company, this tool is by far a very significant issue. The range of credits, that a bank provides, and the current policy customize this tool in order to meet the typical financing needs of the enterprises that demands it....

    Provided By University of Pitesti

  • White Papers // Apr 2010

    Monetary Transmission Channels In Romania - The Credit Channel

    The theoretical-intuitive analysis applied to the segment of monetary transmission evidences the fact that forming the traditional monetary impulses transmission channels are in a starting phase due to the long financial non-intermediary process which Romanian economy had known. In these conditions, the exchange rate channel, and also NBR currency purchases...

    Provided By University of Pitesti

  • White Papers // Jul 2011

    Investment In Education, The Way For Romania To Succeed

    The new economical approach highlights more and more the importance of human capital. Presented as giving a big contribution to the social wealth, the accent is putted over the fact that the investment in this direction is one of the most important. Under these circumstances the authors are analyzing the...

    Provided By University of Pitesti

  • White Papers // Jun 2010

    Data Warehouse And Data Mining - Neccessity Or Useless Investment

    The organization has optimized databases which are used in current operations and also used as a part of decision support. What is the next step? Data Warehouses and Data Mining are indispensable and inseparable parts for modern organization. Organizations will create data warehouses in order for them to be used...

    Provided By University of Pitesti

  • White Papers // Oct 2012

    Gaming the Game: Honeypot Venues Against Cheaters in Location-Based Social Networks

    The proliferation of Location-Based Social Networks (LBSNs) has provided the community with an abundant source of information that can be exploited and used in many different ways. LBSNs offer a number of conveniences to its participants, such as - but not limited to - a list of places in the...

    Provided By University of Pitesti

  • White Papers // Jan 2011

    A Measurement Driven Anti-Jamming System for 802.11 Networks

    Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Now-a-days, jammers can be portable devices that transmit intermittently at low power in order to conserve energy. In this paper, the authors first conduct extensive experiments on an indoor 802.11 network to assess the ability of...

    Provided By University of Pitesti

  • White Papers // May 2012

    Improving Performance of Router-Assisted Transport Protocols Over Variable Capacity Links

    Many promising congestion control protocols use explicit feedback from the network to achieve high performance. These protocols often use congestion signals whose computation requires an estimate of link capacity. Such estimates are not available in networks where capacity varies over time. This paper studies the impact of inaccurate capacity estimates...

    Provided By University of Pitesti

  • White Papers // Oct 2009

    Improving the Topological Resilience of Mobile Ad Hoc Networks

    In order to effectively deploy survivability techniques to improve the resilience of mobile ad hoc networks, one must be able to identify all the weak points of the network topology. The weak or critical points of the topology are those links and nodes whose failure results in partitioning of the...

    Provided By University of Pitesti

  • White Papers // Jan 2012

    Improving Write Operations in MLC Phase Change Memory

    Phase Change Memory (PCM) recently has emerged as a promising technology to meet the fast growing demand for large capacity memory in modern computer systems. In particular, Multi-Level Cell (MLC) PCM that stores multiple bits in a single cell, offers high density with low per-byte fabrication cost. However, despite many...

    Provided By University of Pitesti

  • White Papers // Nov 2012

    FPB: Fine-Grained Power Budgeting to Improve Write Throughput of Multi-Level Cell Phase Change Memory

    As a promising nonvolatile memory technology, Phase Change Memory (PCM) has many advantages over traditional DRAM. Multi-Level Cell PCM (MLC) has the benefit of increased memory capacity with low fabrication cost. Due to high per-cell write power and long write latency, MLC PCM requires careful power management to ensure write...

    Provided By University of Pitesti

  • White Papers // Jul 2011

    MRAC: A Memristor-Based Reconfigurable Framework for Adaptive Cache Replacement

    Memristor, a long postulated yet missing circuit element, has recently emerged as a promising device in non-volatile memory technologies. However, beyond its use as memory cell, it is challenging to integrate memristor in modern architectures for general purpose computation. In this paper, the authors propose a non-conventional use of memristor...

    Provided By University of Pitesti

  • White Papers // Nov 2009

    Simple Virtual Channel Allocation for High Throughput and High Frequency On-Chip Routers

    Technology scaling has led to the integration of many cores into a single chip. As a result, on-chip interconnection networks start to play a more and more important role in determining the performance and power of the entire chip. Packet-switched Network-on-Chip (NoC) has provided a scalable solution to the communications...

    Provided By University of Pitesti

  • White Papers // Mar 2009

    MCP: An Energy-Efficient Code Distribution Protocol for Multi-Application WSNs

    In this paper, the authors study the code distribution problem in Multi-Application Wireless Sensor Networks (MA-WSNs), i.e., sensor networks that can support multiple applications. While MA-WSNs have many advantages over traditional WSNs, they tend to require frequent code movements in the network, and thus here new challenges for designing energy...

    Provided By University of Pitesti

  • White Papers // Jan 2009

    Frequent Value Compression in Packet-Based NoC Architectures

    The proliferation of Chip Multi-Processors (CMPs) has led to the integration of large on-chip caches. For scalability reasons, a large on-chip cache is often divided into smaller banks that are interconnected through packet-based Network-on-Chip (NoC). With increasing number of cores and cache banks integrated on a single die, the on-chip...

    Provided By University of Pitesti

  • White Papers // Jul 2009

    Towards Update-Conscious Compilation for Energy-Efficient Code Dissemination in WSNs

    Post-deployment code dissemination in Wireless Sensor Networks (WSN) is challenging as the code has to be transmitted via energy-expensive wireless communication. In this paper, the authors propose novel Update-Conscious Compilation (UCC) techniques to achieve energy efficiency. By integrating the compilation decisions in generating the old binary, an update-conscious compiler strives...

    Provided By University of Pitesti

  • White Papers // Jan 2013

    Dynamic Authentication-Key Re-Assignment for Reliable Report Delivery

    Sensor networks deployed in hostile environments are subject to various types of attacks. While multipath routing and en-route authentication schemes have been proposed to defend packet dropping and injection attacks respectively, it is challenging to defend both at the same time. The paper addresses this problem through an annulus based...

    Provided By University of Pitesti

  • White Papers // Jan 2013

    Efficient Group Key Management With Tamper-Resistant ISA Extensions

    The last decade has seen the enormous increase of group oriented applications many of which use secret group keys to secure the sensitive data transmission among scattered group members across the network or even over the Internet. Many group key management algorithms have been proposed to update these keys when...

    Provided By University of Pitesti

  • White Papers // Jan 2013

    Locating Compromised Sensor Nodes Through Incremental Hashing Authentication

    While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, the authors propose COOL, a COmpromised nOde Locating protocol for detecting and locating compromised nodes once they misbehave in the sensor network. They exploit a proven collision-resilient incremental...

    Provided By University of Pitesti

  • White Papers // Sep 2012

    VICO: A Framework for Configuring Indoor Visible Light Communication Networks

    Visible Light Communications (VLC) are gaining popularity and may provide an alternative means of communications in indoor settings. However, to date, there is very little research on the deployment or higher layer protocol design for VLC. In this paper, the authors first perform channel measurements using a physical layer testbed...

    Provided By University of Pitesti

  • White Papers // Feb 2013

    SplitBuff: Improving the Interaction of Heterogeneous RTT Flows on the Internet

    Today router buffers are sized according to the well-known Bandwidth-Delay Product (BDP) rule, which uses the average Round-Trip Time (RTT) of flows traversing a router. The BDP rule not only leads to large queueing delays, but also imposes "One (buffer) size fits all" philosophy for flows exhibiting a large variation...

    Provided By University of Pitesti

  • White Papers // Sep 2012

    On Achieving Low Latency in Data Centers

    Today's data centers face extreme challenges in providing low latency for online services such as web search, social networking, and recommendation systems. Achieving low latency is important as it impacts user experience, which in turn impacts operator revenue. However, most current congestion control protocols approximate Processor Sharing (PS), which is...

    Provided By University of Pitesti

  • White Papers // Mar 2013

    Minimizing Flow Completion Times in Data Centers

    For provisioning large-scale online applications such as web search, social networks and advertisement systems, data centers face extreme challenges in providing low latency for short flows (that result from end-user actions) and high throughput for background flows (that are needed to maintain data consistency and structure across massively distributed systems)....

    Provided By University of Pitesti

  • White Papers // Feb 2013

    BLMon: A Loss Differentiation Scheme for 802.11n

    An important problem in 802.11 wireless networks is to accurately differentiate between losses while incurring low overhead. Lack of loss differentiation can result in throughput degradation, which becomes increasingly severe as data rates scale up. This paper presents BLMon, a loss differentiation scheme for 802.11n networks that leverages loss patterns...

    Provided By University of Pitesti

  • White Papers // Apr 2012

    Semantic-Based Policy Management for Cloud Computing Environments

    Cloud computing environments do not allow use of a single access control mechanism, single policy language or single policy management tool for various cloud services. Currently, users must use diverse access control solutions available for each cloud service provider to secure their data. In this paper, the authors introduce a...

    Provided By University of Pitesti

  • White Papers // Sep 2013

    Power of One Bit: Increasing Error Correction Capability with Data Inversion

    Phase-Change Memory (PCM) has emerged as a candidate that overcomes the physical limitations faced by DRAM and NAND flash memory. While PCM has desirable properties in terms of scalability and energy, it suffers from limited endurance. Repeated writes because PCM cells to wear out and get permanently stuck at either...

    Provided By University of Pitesti

  • White Papers // Mar 2013

    COMeT+: Continuous Online Memory Testing With Mutli-Threading Extension

    Today's computers have gigabytes of main memory due to improved DRAM density. As density increases, smaller bit cells become more susceptible to errors. With an increase in error susceptibility, the need for memory resiliency also increases. Self-testing of memory health can proactively check for errors to improve resiliency. This paper...

    Provided By University of Pitesti

  • White Papers // Nov 2012

    Predicting Coherence Communication by Tracking Synchronization Points at Run Time

    Predicting target processors that a coherence request must be delivered to can improve the miss handling latency in shared memory systems. In directory coherence protocols, directly communicating with the predicted processors avoids costly indirection to the directory. In snooping protocols, prediction relaxes the high bandwidth requirements by replacing broadcast with...

    Provided By University of Pitesti

  • White Papers // Jul 2012

    Characterizing Machines and Workloads on a Google Cluster

    Cloud computing offers high scalability, flexibility and cost-effectiveness to meet emerging computing requirements. Understanding the characteristics of real workloads on a large production cloud cluster benefits not only cloud service providers but also researchers and daily users. This paper studies a large-scale Google cluster usage trace dataset and characterizes how...

    Provided By University of Pitesti

  • White Papers // Jun 2012

    A Theoretical Design for SSD Texture Storage

    Modern video games are approaching the limits of textures that can be stored in VRAM. Since these textures contribute a great deal to the perceived quality of the final image, it is important to not limit the size of these textures. Large textures are becoming ubiquitous in \"Good graphics\". Modern...

    Provided By University of Pitesti

  • White Papers // Jun 2012

    Data Dependent Sparing to Manage Better-Than-Bad Blocks

    The authors forecast that proper handling of unreliable storage blocks (e.g., \"Bad block management\" in solid-state drives) will remain critical for future systems built with advanced and emerging memory technologies. This paper argues that the conventional block retirement and sparing approach - a block is retired as soon as it...

    Provided By University of Pitesti

  • White Papers // Jun 2008

    TPTS: A Novel Framework for Very Fast Manycore Processor Architecture Simulation

    The slow speed of conventional execution-driven architecture simulators is a serious impediment to obtaining desirable research productivity. This paper proposes and evaluates a fast manycore processor simulation framework called Two-Phase Trace-driven Simulation (TPTS), which splits detailed timing simulation into a trace generation phase and a trace simulation phase. Much of...

    Provided By University of Pitesti

  • White Papers // Feb 2014

    MapReduce Analysis for Cloud-Archived Data

    Public storage clouds have become a popular choice for archiving certain classes of enterprise data - for example, application and infrastructure logs. These logs contain sensitive information like IP addresses or user logins due to which regulatory and security requirements often require data to be encrypted before moved to the...

    Provided By University of Pitesti

  • White Papers // Mar 2009

    Bayesian Bot Detection Based on DNS Traffic Similarity

    Bots often are detected by their communication with a Command & Control (C&C) infrastructure. To evade detection, botmasters are increasingly obfuscating C&C communications, e.g., by using fastflux or peer-to-peer protocols. However, commands tend to elicit similar actions in bots of a same botnet. The authors propose and evaluate a Bayesian...

    Provided By University of Pitesti

  • White Papers // Nov 2007

    Comparison of Global and Partitioning Schemes for Scheduling Rate Monotonic Tasks on a Multiprocessor

    In this paper, the authors study GRMS, a global scheduling scheme for rate monotonic tasks on a multiprocessor. Several admission control algorithms for GRMS are presented, both for hard and soft real-time tasks. The average performance of these admission control algorithms is compared with the performance of known partitioning schemes....

    Provided By University of Pitesti

  • White Papers // Jan 2009

    Towards Continuous Workflow Enactment Systems

    Traditional workflow enactment systems and workflow design processes view the workflow as a one-time interaction with the various data sources, executing a series of steps once, whenever the workflow results are requested. The fundamental underlying assumption has been that data sources are passive and all interactions are structured along the...

    Provided By University of Pitesti

  • White Papers // Aug 2013

    PAQO: A Preference-Aware Query Optimizer for PostgreSQL

    Although the declarative nature of SQL provides great utility to database users, its use in distributed database management systems can leave users unaware of which servers in the system are evaluating portions of their queries. By allowing users to merely say what data they are interested in accessing without providing...

    Provided By University of Pitesti

  • White Papers // Aug 2013

    Optimization Strategies for A/B Testing on HADOOP

    In this paper, the authors present a set of techniques that considerably improve the performance of executing concurrent MapReduce jobs. Their proposed solution relies on proper resource allocation for concurrent Hive jobs based on data dependency, inter-query optimization and modeling of Hadoop cluster load. To the best of their knowledge,...

    Provided By University of Pitesti

  • White Papers // Nov 2013

    Semantic-Based Context-Aware Alert Fusion for Distributed Intrusion Detection Systems

    One of the fundamental challenges in real-world Intrusion Detection Systems (IDS) is the large number of redundant, non-relevant false positive alerts that they generate. In this paper, the authors propose an alert fusion approach that incorporates contextual information with the goal of leveraging the benefits of multi-sensor detection while reducing...

    Provided By University of Pitesti

  • White Papers // Sep 2011

    Real-Time Scheduling for Phase Change Main Memory Systems

    Multi-core processors are effective for reducing energy consumption in computer systems, since modern multicore chips allow for power management of individual cores. However, multiple cores impose higher demand on the memory subsystem, which is extremely power hungry. In addition to the small steps towards managing power in DRAMs, Phase-Change Memory...

    Provided By University of Pitesti