University of Toledo

Displaying 1-40 of 110 results

  • White Papers // Jun 2014

    Sampling-Based Approaches to Accelerate Network-on-Chip Simulation

    Architectural complexity continues to grow as the authors consider the large design space of multiple cores, cache architectures, Network-on-Chip (NoC) and memory controllers. Simulators are growing in complexity to reflect these system components. However, many full-system simulators fail to utilize the underlying hardware resources such as multiple cores; consequently, simulation...

    Provided By University of Toledo

  • White Papers // May 2014

    Evaluating the Memory System Behavior of Smartphone Workloads

    Modern Smartphone's comprise several processing and input/output units that communicate mostly through main memory. As a result, memory represents a critical performance bottleneck for Smartphone's. This paper introduces a set of emerging workloads for Smartphone's and characterizes the performance of several memory controller policies and address mapping schemes for those...

    Provided By University of Toledo

  • White Papers // Apr 2014

    DualTable: A Hybrid Storage Model for Update Optimization in Hive

    Hive is the most mature and prevalent data warehouse tool providing SQL-like interface in the Hadoop ecosystem. It is successfully used in many Internet companies and shows its value for big data processing in traditional industries. However, enterprise big data processing systems as in Smart Grid applications usually come with...

    Provided By University of Toledo

  • White Papers // Apr 2014

    Energy Compensated Cloud Assistance in Mobile Cloud Computing

    The authors consider the scenario where a mobile device requires assistance from nearby devices to forward its computational tasks to a cloud server. They incentivize cooperation by allowing helper devices to conserve computational energy by offloading their own tasks to the source device's cloud, as compensation for the communication energy...

    Provided By University of Toledo

  • White Papers // Mar 2014

    Blind Seer: A Scalable Private DBMS

    Query privacy in secure DBMS is an important feature, although rarely formally considered outside the theoretical community. Because of the high overheads of guaranteeing privacy in complex queries, almost all previous papers addressing practical applications consider limited queries (e.g., just keyword search), or provide a weak guarantee of privacy. In...

    Provided By University of Toledo

  • White Papers // Feb 2014

    BigKernel - High Performance CPU-GPU Communication Pipelining for Big Data-style Applications

    GPUs offer an order of magnitude higher compute power and memory bandwidth than CPUs. GPUs therefore might appear to be well suited to accelerate computations that operate on voluminous data sets in independent ways; e.g., for transformations, filtering, aggregation, partitioning or other \"Big data\" style processing. Yet experience indicates that...

    Provided By University of Toledo

  • White Papers // Feb 2014

    Accelerating Network-on-Chip Simulation Via Sampling

    Architectural complexity continues to grow as the authors consider the large design space of multiple cores, cache architectures, networks-on-chip and memory controllers for emerging architectures. Simulators are growing in complexity to reflect each of these system components. However, many full-system simulators fail to take advantage of the underlying hardware resources...

    Provided By University of Toledo

  • White Papers // Jan 2014

    An Adaptive OpenMP Loop Scheduler for Hyperthreaded SMPs

    Hyper-Threaded (HT) and Simultaneous Multi-Threaded (SMT) processors are now available in commodity workstations and servers. This technology is designed to increase throughput by executing multiple concurrent threads on a single physical processor. These multiple threads share the processor's functional units and on-chip memory hierarchy in an attempt to make better...

    Provided By University of Toledo

  • White Papers // Jan 2014

    Standardizing the Performance Assessment of Reconfigurable Processor Architectures

    Comparing and evaluating the performance of reconfigurable processors is a difficult task. For this research field to progress in a more meaningful and scientific fashion, there needs to be a method of measuring progress between different reconfigurable architectures as well as with respect to traditional computing technologies. This paper presents...

    Provided By University of Toledo

  • White Papers // Jan 2014

    Simplifying the Integration of Processing Elements in Computing Systems Using a Programmable Controller

    As technology sizes decrease and die area increases, designers are creating increasingly complex computing systems using FPGAs. To reduce design time for new products, the reuse of previously designed Intellectual Property (IP) cores is essential. However, since no universally accepted inter-face standards exist for IP cores, there is often a...

    Provided By University of Toledo

  • White Papers // Jan 2014

    Designing an FPGA SoC Using a Standardized IP Block Interface

    Designing System-on-Chips (SoCs) is becoming increasingly popular as die sizes increase and technology sizes decrease. The complexity of integrating different types of Processing Elements (PEs) that use different communication protocols and interfaces complicates the system-level design methodology. Recent paper provided a proof of concept demonstrating how a controller could be...

    Provided By University of Toledo

  • White Papers // Nov 2013

    MIMO Broadcast Channel with an Unknown Eavesdropper: Secrecy Degrees of Freedom

    The authors study a multi-antenna broadcast channel with two legitimate receivers and an external eavesdropper. They assume that the channel matrix of the eavesdropper is unknown to the legitimate terminals but satisfies a maximum rank constraint. As their main result they characterize the associated secrecy degrees of freedom for the...

    Provided By University of Toledo

  • White Papers // Oct 2013

    A Study of Pricing for Cloud Resources

    The authors present a study of pricing cloud resources in this position paper. Their objective is to explore and understand the interplay between economics and systems designs proposed by recent research. They develop a general model that captures the resource needs of various applications and usage pricing of cloud computing....

    Provided By University of Toledo

  • White Papers // Sep 2013

    Enabling SDN Applications on Software-Defined Infrastructure

    In this paper the authors discuss how to enable Software-Defined Networking (SDN) applications on Software-Defined Infrastructure (SDI) which is an approach for integrated control and management of converged computing and networking resources. Current separated resource management for computing or networking resources is not sufficient for addressing applications and multimedia services...

    Provided By University of Toledo

  • White Papers // Sep 2013

    Identity Access Management for Multi-tier Cloud Infrastructures

    In this paper the authors present a novel architecture to manage Identity Access Management (IAM) in a multi-tier cloud infrastructure, in which most services are supported by massive-scale data centers over the Internet. Multi-tier cloud infrastructure uses tier-based model from software engineering to provide resources in different tires. In this...

    Provided By University of Toledo

  • White Papers // Aug 2013

    Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous Servers

    The authors study the multi-resource allocation problem in cloud computing systems where the resource pool is constructed from a large number of heterogeneous servers, representing different points in the configuration space of resources such as processing, memory, and storage. They design a multi-resource allocation mechanism, called DRFH that generalizes the...

    Provided By University of Toledo

  • White Papers // Jul 2013

    Revenue Maximization With Dynamic Auctions in IaaS Cloud Markets

    Cloud service pricing plays a pivotal role towards the success of cloud computing. Existing pricing schemes, however, either provide no service guarantees (e.g., Spot Instances in Amazon EC2), or use static on-demand pricing in which the price cannot respond quickly to market dynamics (e.g., On-demand Instances in Amazon EC2). To...

    Provided By University of Toledo

  • White Papers // Jul 2013

    Pipelined Regeneration With Regenerating Codes for Distributed Storage Systems

    Distributed storage systems store a substantial amount of data and maintain data integrity by storing redundancy in a large number of storage nodes. When storage nodes fail, the lost data should be regenerated on replacement nodes. Regenerating codes minimize the volume of network traffic brought by the regeneration process. However,...

    Provided By University of Toledo

  • White Papers // Jul 2013

    Efficient Implementation of Security Applications in OpenFlow Controller with FleXam

    Current OpenFlow specifications provide limited access to packet-level information such as packet content, making it very inefficient, if not impossible, to deploy security and monitoring applications as controller applications. In this paper, the authors propose FleXam, a flexible sampling extension for OpenFlow designed to provide access to packet level information...

    Provided By University of Toledo

  • White Papers // Jul 2013

    DistCL: A Framework for the Distributed Execution of OpenCL Kernels

    GPUs are used to speed up many scientific computations; however, to use several networked GPUs concurrently, the programmer must explicitly partition work and transmit data between devices. The authors propose DistCL, a novel framework that distributes the execution of OpenCL kernels across a GPU cluster. DistCL makes multiple distributed compute...

    Provided By University of Toledo

  • White Papers // Jul 2013

    Certificateless Public Auditing for Data Integrity in the Cloud

    Due to the existence of security threats in the cloud, many mechanisms have been proposed to allow a user to audit data integrity with the public key of the data owner before utilizing cloud data. The correctness of choosing the right public key in previous mechanisms depends on the security...

    Provided By University of Toledo

  • White Papers // Jun 2013

    Toward Scalable Transaction Processing

    Designing scalable transaction processing systems on modern multicore hardware has been a challenge for almost a decade. The typical characteristics of transaction processing workloads lead to a high degree of unbounded communication on multicores for conventional system designs. In this paper, the authors initially present a systematic way of eliminating...

    Provided By University of Toledo

  • White Papers // Jun 2013

    Large-Scale Malware Classification Using Random Projections and Neural Networks

    Automatically generated malware is a significant problem for computer users. Analysts are able to manually investigate a small number of unknown files, but the best large-scale defense for detecting malware is automated malware classification. Malware classifiers often use sparse binary features, and the number of potential features can be on...

    Provided By University of Toledo

  • White Papers // May 2013

    Designing Secure Socio-Technical Systems with STS-ml

    A Socio-Technical System (STS) is interplay of humans, organizations and technical systems. STSs consist of interacting actors, which depend on one another to achieve their objectives. In previous paper, they have proposed STS-ml, a security requirements modelling language for the design of secure STSs. STS-ml represents security requirements as constraints...

    Provided By University of Toledo

  • White Papers // May 2013

    To Reserve or Not to Reserve: Optimal Online Multi-Instance Acquisition in IaaS Clouds

    Infrastructure-as-a-Service (IaaS) clouds offer diverse instance purchasing options. A user can either run instances on demand or pay only for what it uses, or it can prepay to reserve instances for a long period, during which a usage discount is entitled. An important problem facing a user is how these...

    Provided By University of Toledo

  • White Papers // May 2013

    Artificial-Noise Alignment for Secure Multicast using Multiple Antennas

    The authors propose an artificial-noise alignment scheme for multicasting a common-confidential message to a group of legitimate receivers. Their scheme transmits a superposition of information and noise symbols. At each legitimate receiver, the noise symbols are aligned in such a way that the information symbols can be decoded with high...

    Provided By University of Toledo

  • White Papers // May 2013

    BIM-Tool: Modeling and Reasoning Support for Strategic Business Models

    The BIM-Tool provides graphical modeling and analysis support for the Business Intelligence Model (BIM). BIM-Tool is a standalone application built on top of Eclipse. The tool supports two kinds of automated reasoning: bottom-up \"What-if\" analysis: given input labels about some elements of a BIM model (for example, success/failure for leaf...

    Provided By University of Toledo

  • White Papers // May 2013

    Multi-Resource Generalized Processor Sharing for Packet Processing

    Middleboxes have found widespread adoption in today's networks. They perform a variety of network functions such as WAN optimization, intrusion detection, and network-level firewalls. Processing packets to serve these functions often require multiple middlebox resources, e.g., CPU and link bandwidth. Furthermore, different packet traffic flows may consume significantly different amounts...

    Provided By University of Toledo

  • White Papers // Apr 2013

    Anticipatory Buffer Control and Resource Allocation for Wireless Video Streaming

    In this paper, the authors describe a new approach for allocating resources to video streaming traffic. Assuming that the future channel state can be predicted for a certain time, they minimize the fraction of the bandwidth consumed for smooth streaming by jointly allocating wireless channel resources and play-out buffer size....

    Provided By University of Toledo

  • White Papers // Apr 2013

    On Fairness-Efficiency Tradeoffs for Multi-Resource Packet Processing

    Middleboxes are widely deployed in today's datacenter networks. They perform a variety of network functions, each requiring multiple hardware resources, such as CPU cycles and link bandwidth. Depending on the functions they go through, packet processing of different traffic flows may consume a vastly different amount of hardware resources. An...

    Provided By University of Toledo

  • White Papers // Apr 2013

    Distributed Ranked Data Dissemination in Social Networks

    The amount of content served on social networks can overwhelm users, who must sift through the data for relevant information. To facilitate users, the authors develop and implement dissemination of ranked data in social networks. Although top-k computation can be performed centrally at the user, the size of the event...

    Provided By University of Toledo

  • White Papers // Apr 2013

    Adapting to Uncertain and Evolving Enterprise Requirements

    Information systems today are expected to function in an increasingly dynamic world with many uncertainties. System development is seldom a linear progression from well defined, fully-specified requirements to finished products that fully meet the initial requirements. More likely, there are ongoing cycles of exploration, design and implementation, taking into account...

    Provided By University of Toledo

  • White Papers // Mar 2013

    Secure and Efficient Context Data Collection Using Content-Centric Networking

    Context data collection is a fundamental and important process for realizing context-aware recommender or personalization systems. The existing context data collection approaches are based-on traditional TCP/IP that has several disadvantages such as lack of mobility and security. On the other hand, Content-Centric Networking (CCN) provides advantages in terms of mobility,...

    Provided By University of Toledo

  • White Papers // Mar 2013

    Software-Defined Infrastructure and the Future Central Office

    In this paper the authors discuss the role of virtualization and Software-Defined Infrastructure (SDI) in the design of future application platforms, and in particular the future Central Office (CO). A multi-tier computing cloud is presented in which resources in the smart edge of the network play a crucial role in...

    Provided By University of Toledo

  • White Papers // Mar 2013

    Rethinking Definitions of Security for Session Key Agreement

    The authors consider Session Key Agreement (SKA) protocols operating in a public key infrastructure, with pre-specified peers that take no session ID as input, and output only a session key. Despite much work on SKA, they argue that there is no good definition of security for this (very natural) protocol...

    Provided By University of Toledo

  • White Papers // Feb 2013

    Performance Analysis of Broadcasting Algorithms on the Intel Single-Chip Cloud Computer

    Efficient broadcasting is essential for good performance on distributed or multiprocessor systems. Broadcasts are commonly used to implement message passing synchronization primitives, such as barriers, and also appear frequently in the set up stage of scientific applications. The Intel Single-Chip Cloud computer (SCC), an experimental processor, uses synchronous message passing...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Core-Selecting Combinatorial Auction Design for Secondary Spectrum Markets

    In a secondary spectrum market, the utility of a secondary user often depends on not only whether it wins, but also which channels it wins. Combinatorial auctions are a natural fit here to allow secondary users to bid for combinations of channels. In this paper, the VCG mechanism constitutes a...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Paradigm-Based Adaptive Provisioning in Virtualized Data Centers

    Virtualized data centers host multiple applications with distinct objectives in a shared infrastructure. Accommodating several dynamic applications in virtual data centers is a challenging task for cloud providers. Current provisioning solutions focus on a limited set of objectives that may not be suited for the increasing number of applications deployed...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Joint Request Mapping and Response Routing for Geo-distributed Cloud Services

    Many cloud services are running on geographically distributed datacenters for better reliability and performance. The authors consider the emerging problem of joint request mapping and response routing with distributed datacenters in this paper. They formulate the problem as a general workload management optimization. A utility function is used to capture...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Implementation Issues for High-Bandwidth Field-Programmable Analog Arrays

    This paper is a tutorial introduction to field-programmable analog arrays, as well as a review of existing field-programmable analog array architectures, of both educational and industrial origin. Circuit issues relevant to the development of high-bandwidth FPAAs are presented. A current conveyor-based architecture, which promises to achieve video bandwidths, is described....

    Provided By University of Toledo

  • White Papers // Jan 2013

    Joint Request Mapping and Response Routing for Geo-distributed Cloud Services

    Many cloud services are running on geographically distributed datacenters for better reliability and performance. The authors consider the emerging problem of joint request mapping and response routing with distributed datacenters in this paper. They formulate the problem as a general workload management optimization. A utility function is used to capture...

    Provided By University of Toledo

  • White Papers // Nov 2012

    Adaptive Partitioned Interference Management in Cellular Networks

    This paper proposes an adaptive and scalable approach to resource allocation in cellular networks. The authors introduce an adaptive strategy to form clusters of coordinating base stations, referred to as Scheduling Cells (SCs), based on the local traffic demand. A system parameter is proposed which adjusts the level of coordination...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Paradigm-Based Adaptive Provisioning in Virtualized Data Centers

    Virtualized data centers host multiple applications with distinct objectives in a shared infrastructure. Accommodating several dynamic applications in virtual data centers is a challenging task for cloud providers. Current provisioning solutions focus on a limited set of objectives that may not be suited for the increasing number of applications deployed...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Core-Selecting Combinatorial Auction Design for Secondary Spectrum Markets

    In a secondary spectrum market, the utility of a secondary user often depends on not only whether it wins, but also which channels it wins. Combinatorial auctions are a natural fit here to allow secondary users to bid for combinations of channels. In this paper, the VCG mechanism constitutes a...

    Provided By University of Toledo

  • White Papers // Jul 2013

    Pipelined Regeneration With Regenerating Codes for Distributed Storage Systems

    Distributed storage systems store a substantial amount of data and maintain data integrity by storing redundancy in a large number of storage nodes. When storage nodes fail, the lost data should be regenerated on replacement nodes. Regenerating codes minimize the volume of network traffic brought by the regeneration process. However,...

    Provided By University of Toledo

  • White Papers // Jul 2013

    Revenue Maximization With Dynamic Auctions in IaaS Cloud Markets

    Cloud service pricing plays a pivotal role towards the success of cloud computing. Existing pricing schemes, however, either provide no service guarantees (e.g., Spot Instances in Amazon EC2), or use static on-demand pricing in which the price cannot respond quickly to market dynamics (e.g., On-demand Instances in Amazon EC2). To...

    Provided By University of Toledo

  • White Papers // Sep 2007

    A Building Block for Coarse-Grain Optimizations in the On-Chip Memory Hierarchy

    Current on-chip block-centric memory hierarchies exploit access patterns at the fine-grain scale of small blocks. Several recently proposed memory hierarchy enhancements for coherence traffic reduction and prefetching suggest that additional useful patterns emerge with a macroscopic, coarse-grain view. This paper presents RegionTracker, a dual-grain, on-chip cache design that exposes coarse-grain...

    Provided By University of Toledo

  • White Papers // Feb 2006

    RegionTracker: A Case for Dual-Grain Tracking in the Memory System

    In this paper the authors propose area, power and latency efficient implementations of memory hierarchy lookup structures aimed primarily at higher-level, relatively large on-chip caches. The mechanisms proposed provide location information for a large fraction of cache references eliminating the corresponding accesses to a much larger, slower and power demanding...

    Provided By University of Toledo

  • White Papers // Sep 2010

    Design Space Exploration of Instruction Schedulers for Out-of-Order Soft Processors

    In this paper, the authors explore instruction scheduler designs for single-issue, out-of-order soft processors targeting irregular workloads. It shows the effect of scheduler size, scheduling policy and back-to-back scheduling on performance, area, and frequency. It is shown that for a modern, high-end FPGA (Altera Stratix III) the best performance is...

    Provided By University of Toledo

  • White Papers // Sep 2007

    A Framework for Coarse-Grain Optimizations in the On-Chip Memory Hierarchy

    Current on-chip block-centric memory hierarchies exploit access patterns at the fine-grain scale of small blocks. Several recently proposed techniques for coherence traffic reduction and prefetching suggest that further useful patterns emerge with a macroscopic, coarse-grain view. To exploit coarse-grain behavior, previous paper extended conventional caches with additional coarse-grain tracking and...

    Provided By University of Toledo

  • White Papers // Sep 2007

    L-CBF: A Low-Power, Fast Counting Bloom Filter Architecture

    An increasing number of architectural techniques rely on hardware Counting Bloom Filters (CBFs) to improve upon the energy, delay and complexity of various processor structures. CBFs improve the energy and delay of membership tests by maintaining an imprecise and compact representation of a large set to be searched. This paper...

    Provided By University of Toledo

  • White Papers // Jun 2009

    Towards a Viable Out-of-Order Soft Core: Copy-Free, Checkpointed Register Renaming

    Embedded systems increasingly exploit the cost effectiveness and flexibility of FPGAs. Such FPGA-based systems often include soft processors for several reasons; for example, certain tasks are best, cost- or performance-wise, implemented in processors, whereas processor-based implementations can be faster and easier to develop, and debug than custom accelerators. As a...

    Provided By University of Toledo

  • White Papers // Apr 2009

    A Physical-Level Study of the Compacted Matrix Instruction Scheduler for Dynamically Scheduled Superscalar Processors

    In this paper, the authors study hardware complexity (physical level characteristics) of the recently proposed compacted matrix instruction scheduler for dynamically scheduled, superscalar processors. Previous paper focused on the matrix scheduler's architecture and argued in support of its speed and scalability advantages; however, neither actual physical-level investigations nor models were...

    Provided By University of Toledo

  • White Papers // Oct 2013

    A Study of Pricing for Cloud Resources

    The authors present a study of pricing cloud resources in this position paper. Their objective is to explore and understand the interplay between economics and systems designs proposed by recent research. They develop a general model that captures the resource needs of various applications and usage pricing of cloud computing....

    Provided By University of Toledo

  • White Papers // Oct 2007

    Turbo-ROB: A Low Cost Checkpoint/Restore Accelerator

    Modern processors use speculative execution to improve performance. However, speculative execution requires a checkpoint/restore mechanism to repair the machine's state whenever speculation fails. Existing checkpoint/restore mechanisms do not scale well for processors with relatively large windows (i.e., 128 or more). This paper presents turbo-ROB, a checkpoint/restore recovery accelerator that can...

    Provided By University of Toledo

  • White Papers // May 2008

    Phantom-BTB: Improving Branch Target Buffer Performance by Leveraging the On-Chip Memory Hierarchy

    Modern processors use Branch Target Buffers (BTB) to predict the target address of branches so that they can fetch ahead in the instruction stream increasing concurrency and performance. Ideally, BTBs would be large enough to capture the entire working set of the application and small enough for fast access and...

    Provided By University of Toledo

  • White Papers // Oct 2010

    An Efficient Non-Blocking Data Cache for Soft Processors

    Soft processors often use data caches to reduce the gap between processor and main memory speeds. To achieve high efficiency, simple, blocking caches are used. Such caches are not appropriate for processor designs such as run-ahead and out-of-order execution that require non-blocking caches to tolerate main memory latencies. Conventional non-blocking...

    Provided By University of Toledo

  • White Papers // Mar 2014

    Blind Seer: A Scalable Private DBMS

    Query privacy in secure DBMS is an important feature, although rarely formally considered outside the theoretical community. Because of the high overheads of guaranteeing privacy in complex queries, almost all previous papers addressing practical applications consider limited queries (e.g., just keyword search), or provide a weak guarantee of privacy. In...

    Provided By University of Toledo

  • White Papers // Apr 2012

    Inspection Resistant Memory: Architectural Support for Security from Physical Examination

    The ability to safely keep a secret in memory is central to the vast majority of security schemes, but storing and erasing these secrets is a difficult problem in the face of an attacker who can obtain unrestricted physical access to the underlying hardware. Depending on the memory technology, the...

    Provided By University of Toledo

  • White Papers // May 2010

    On-demand Replication for Highly Available Content-based Publish/Subscribe Messaging

    Content-based publish/subscribe overlays offer a scalable messaging substrate for various event-based distributed systems. In an enterprise environment where service level agreements are strictly enforced, maintaining high availability of the broker overlay is critical. To meet this requirement, protocols are developed to replace or load-balance a broker that misbehaves - perhaps...

    Provided By University of Toledo

  • White Papers // Sep 2009

    View Maintenance in Web Data Platforms

    Modern Web Data Platforms (WDPs) handle large amount of data and activity through massively distributed infrastructures. To achieve performance and availability at Internet scale, WDPs restrict querying capability, and provide weaker consistency guarantees than traditional ACID transactions. The sheer volume of parallel processing without ACID transaction guarantees, and the large...

    Provided By University of Toledo

  • White Papers // Apr 2013

    Distributed Ranked Data Dissemination in Social Networks

    The amount of content served on social networks can overwhelm users, who must sift through the data for relevant information. To facilitate users, the authors develop and implement dissemination of ranked data in social networks. Although top-k computation can be performed centrally at the user, the size of the event...

    Provided By University of Toledo

  • White Papers // Jul 2012

    Community Clustering for Distributed Publish/Subscribe Systems

    Optimized placement of clients in a distributed publish/subscribe system is an important technique to improve overall system efficiency. Current methods, like interest clustering or publisher placement, treat a client as, either a pure publisher, or subscriber, but not as both. Also, the cost of client movement is usually ignored. However,...

    Provided By University of Toledo

  • White Papers // Nov 2011

    Multi-Query Stream Processing on FPGAs

    The need for efficient real-time data analytics is an integral part of a growing number of data management technologies such as intrusion detection, algorithmic trading, and (complex) event processing. What are common among all these scenarios are a predefined set of continuous queries and an unbounded event stream of incoming...

    Provided By University of Toledo

  • White Papers // Oct 2011

    Big Data Challenges in Application Performance Management

    Many web companies deal with enormous data sizes and request rates beyond the capabilities of traditional database systems. This has led to the development of modern Web Data Platforms (WDPs). WDPs handle large amounts of data and activity through massively distributed infrastructures. To achieve performance and availability at Internet scale,...

    Provided By University of Toledo

  • White Papers // Apr 2010

    Content-based XML Data Dissemination

    XML data dissemination, publish/subscribe, publications, subscriptions, advertisements, covering, merging XML-based data dissemination networks are rapidly gaining momentum. In these networks XML content is routed from data producers to data consumers throughout an overlay network of content-based routers. Routing decisions are based on XPath Expressions (XPEs) stored at each router. To...

    Provided By University of Toledo

  • White Papers // May 2014

    Evaluating the Memory System Behavior of Smartphone Workloads

    Modern Smartphone's comprise several processing and input/output units that communicate mostly through main memory. As a result, memory represents a critical performance bottleneck for Smartphone's. This paper introduces a set of emerging workloads for Smartphone's and characterizes the performance of several memory controller policies and address mapping schemes for those...

    Provided By University of Toledo

  • White Papers // Jul 2013

    DistCL: A Framework for the Distributed Execution of OpenCL Kernels

    GPUs are used to speed up many scientific computations; however, to use several networked GPUs concurrently, the programmer must explicitly partition work and transmit data between devices. The authors propose DistCL, a novel framework that distributes the execution of OpenCL kernels across a GPU cluster. DistCL makes multiple distributed compute...

    Provided By University of Toledo

  • White Papers // Feb 2013

    Performance Analysis of Broadcasting Algorithms on the Intel Single-Chip Cloud Computer

    Efficient broadcasting is essential for good performance on distributed or multiprocessor systems. Broadcasts are commonly used to implement message passing synchronization primitives, such as barriers, and also appear frequently in the set up stage of scientific applications. The Intel Single-Chip Cloud computer (SCC), an experimental processor, uses synchronous message passing...

    Provided By University of Toledo

  • White Papers // Nov 2011

    Exploration of Temperature Constraints for Thermal Aware Mapping of 3D Networks on Chip

    In this paper, the authors propose three ILP-based static thermal-aware mapping algorithms for 3D Network-on-Chip (NoC) to explore the thermal constraints and their effects on temperature and performance. Through complexity analysis, they show that the first algorithm, an optimal one, is not suitable for 3D NoC. Therefore, they develop two...

    Provided By University of Toledo

  • White Papers // Feb 2014

    Accelerating Network-on-Chip Simulation Via Sampling

    Architectural complexity continues to grow as the authors consider the large design space of multiple cores, cache architectures, networks-on-chip and memory controllers for emerging architectures. Simulators are growing in complexity to reflect each of these system components. However, many full-system simulators fail to take advantage of the underlying hardware resources...

    Provided By University of Toledo

  • White Papers // Jul 2010

    DART: Fast and Flexible NoC Simulation Using FPGAs

    A packet-switched Network-on-Chip (NoC) is becoming a more compelling choice for the communication backbone in next-generation multicores and systems-on-chip. NoC designs are sensitive to many parameters such as topology, buffer sizes, routing algorithms, and flow control mechanisms. Hence, system architects and researchers must include detailed NoC simulation as part of...

    Provided By University of Toledo

  • White Papers // Jun 2014

    Sampling-Based Approaches to Accelerate Network-on-Chip Simulation

    Architectural complexity continues to grow as the authors consider the large design space of multiple cores, cache architectures, Network-on-Chip (NoC) and memory controllers. Simulators are growing in complexity to reflect these system components. However, many full-system simulators fail to utilize the underlying hardware resources such as multiple cores; consequently, simulation...

    Provided By University of Toledo

  • White Papers // Oct 2012

    Anchor: A Versatile and Efficient Framework for Resource Management in the Cloud

    The authors present Anchor, a general resource management architecture that uses the stable matching framework to decouple policies from mechanisms when mapping virtual machines to physical servers. In Anchor, clients and operators are able to express a variety of distinct resource management policies as they deem fit, and these policies...

    Provided By University of Toledo

  • White Papers // Apr 2012

    Practical Scrubbing: Getting to the Bad Sector at the Right Time

    Latent Sector Errors (LSEs) are a common hard disk failure mode, where disk sectors become inaccessible while the rest of the disk remains unaffected. To protect against LSEs, commercial storage systems use scrubbers: background processes verifying disk data. The efficiency of different scrubbing algorithms in detecting LSEs has been studied...

    Provided By University of Toledo

  • White Papers // Jul 2012

    Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks

    Groups are becoming one of the most compelling features in both online social networks and Twitter-like micro-blogging services. A stranger outside of an existing group may have the need to find out more information about attributes of current members in the group, in order to make a decision to join....

    Provided By University of Toledo

  • White Papers // Dec 2009

    Two Is A Crowd? A Black-Box Separation Of One-Wayness and Security Under Correlated Inputs

    A family of trapdoor functions is one-way under correlated inputs if no efficient adversary can invert it even when given the value of the function on multiple correlated inputs. This powerful primitive was introduced at TCC 2009 by the researchers, who use it in an elegant black box construction of...

    Provided By University of Toledo

  • White Papers // Mar 2013

    Rethinking Definitions of Security for Session Key Agreement

    The authors consider Session Key Agreement (SKA) protocols operating in a public key infrastructure, with pre-specified peers that take no session ID as input, and output only a session key. Despite much work on SKA, they argue that there is no good definition of security for this (very natural) protocol...

    Provided By University of Toledo

  • White Papers // May 2010

    Protecting Cryptographic Keys Against Continual Leakage

    Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, the authors address the problem of storing cryptographic keys and computing on them in a manner that preserves security even when the adversary is able to obtain information leakage during the...

    Provided By University of Toledo

  • White Papers // May 2013

    Designing Secure Socio-Technical Systems with STS-ml

    A Socio-Technical System (STS) is interplay of humans, organizations and technical systems. STSs consist of interacting actors, which depend on one another to achieve their objectives. In previous paper, they have proposed STS-ml, a security requirements modelling language for the design of secure STSs. STS-ml represents security requirements as constraints...

    Provided By University of Toledo