University of Warwick Library

Displaying 1-40 of 49 results

  • White Papers // Feb 2014

    Grappa: A Latency-Tolerant Runtime for Large-Scale Irregular Applications

    Grappa is a runtime system for commodity clusters of multicore computers that presents a massively parallel, single address space abstraction to applications. Grappa's purpose is to enable scalable performance of irregular parallel applications, such as branch and bound optimization, SPICE circuit simulation, and graph processing. Poor data locality, imbalanced parallel...

    Provided By University of Warwick Library

  • White Papers // Feb 2014

    Tuning Approximate Computations with Constraint-Based Type Inference

    Unreliable hardware can lead to great gains in energy efficiency, but it can be difficult to reason about how unreliable each operation in a computation may feasibly be. To make approximate computing viable, the authors need tools that can help programmers derive precision - energy trade-offs for individual fine-grained operations...

    Provided By University of Warwick Library

  • White Papers // Jan 2014

    Low-Level Detection of Language-Level Data Races with LARD

    The researchers have proposed always-on data-race exceptions as a way to avoid the ill effects of data races, but slow performance of accurate dynamic data-race detection remains a barrier to the adoption of always-on data-race exceptions. Proposals for accurate low-level (e.g., hardware) data-race detection have the potential to reduce this...

    Provided By University of Warwick Library

  • White Papers // Jan 2014

    Parallel Application Characterization for Multiprocessor Scheduling Policy Design

    Much of the recent work on multiprocessor scheduling disciplines has used abstract workload models to explore the fundamental, high-level properties of the various alternatives. As continuing work on these policies increases their level of sophistication, however, it is clear that the choice of appropriate policies must be guided at least...

    Provided By University of Warwick Library

  • White Papers // Jan 2014

    XMLTK: An XML Toolkit for Scalable XML Stream Processing

    The authors describe a toolkit for highly scalable XML data processing, consisting of two components. The first is a collection of stand-alone XML tools, sorting, aggregation, nesting, and unnesting, that can be chained to express more complex restructurings. The second is a highly scalable XPath processor for XML streams that...

    Provided By University of Warwick Library

  • White Papers // Nov 2013

    A Parallel Multi-Agent Spatial Simulation Environment for Cluster Systems

    For more than the last two decades, multi-agent simulations have been highlighted to model mega-scale social or biological agents and to simulate their emergent collective behavior that may be difficult only with mathematical and macroscopic approaches. A successful key for simulating megascale agents is to speed up the execution with...

    Provided By University of Warwick Library

  • White Papers // Sep 2013

    Storage Sizing and Placement Through Operational and Uncertainty-Aware Simulations

    As the penetration level of transmission-scale time-intermittent renewable generation resources increases, control of flexible resources will become important to mitigating the fluctuations due to these new renewable resources. Flexible resources may include new or existing synchronous generators as well as new energy storage devices. Optimal placement and sizing of energy...

    Provided By University of Warwick Library

  • White Papers // Aug 2013

    Flat Combining Synchronized Global Data Structures

    The implementation of scalable synchronized data structures is notoriously difficult. Recent work in shared-memory multicores introduced a new synchronization paradigm called flat combining that allows many concurrent accessors to cooperate efficiently to reduce contention on shared locks. In this paper, the authors introduce this paradigm to a domain where reducing...

    Provided By University of Warwick Library

  • White Papers // Jul 2013

    Field-Based Job Dispatch and Migration

    AgentTeamwork-Lite is a mobile-agent-based job scheduling and monitoring framework that has been developed in the concept of field-based job dispatch and migration where agents migrate over a computing-resource field to highest performance computing nodes for executing their user jobs as if they were electrons sliding down on an electric field....

    Provided By University of Warwick Library

  • White Papers // Jul 2013

    Compiled Plans for In-Memory Path-Counting Queries

    Dissatisfaction with relational databases for large-scale graph processing has motivated a new class of graph databases that offer fast graph processing but sacrifice the ability to express basic relational idioms. However, the authors hypothesize that the performance benefits amount to implementation details, not a fundamental limitation of the relational model....

    Provided By University of Warwick Library

  • White Papers // May 2013

    A General Probabilistic Model for Improving Key Assignment in Wireless Networks

    The authors study the problem of establishing secure communication channels in resource-constrained wireless networks using key pre-distribution. Pairwise communication channels between nodes are secured using link keys which are established as a function of cryptographic seeds pre-distributed to each node. They propose a general model for seed assignment which regulates...

    Provided By University of Warwick Library

  • White Papers // May 2013

    Optimizing VM Checkpointing for Restore Performance in VMware ESXi

    Cloud providers are increasingly looking to use virtual machine checkpointing for new applications beyond fault tolerance. Existing checkpointing systems designed for fault tolerance only optimize for saving checkpointed state, so they cannot support these new applications, which require better restore performance. Improving restore performance requires a predictive technique to reduce...

    Provided By University of Warwick Library

  • White Papers // Mar 2013

    A Battery-Free RFID-Based Indoor Acoustic Localization Platform

    The ability to precisely localize RFID tags with low latency and low cost is desirable for applications such as inventory, asset tracking and robotic-manipulation of tagged items. However, because of multipath propagation effects, traditional RFID positioning methods based on RF Received Signal Strength Indication (RSSI) have limited accuracy (meter-scale) or...

    Provided By University of Warwick Library

  • White Papers // Jan 2013

    Enterprise Information Integration: Successes, Challenges and Controversies

    The vision underlying this industry is to provide tools for integrating data from multiple sources without having to first load all the data into a central warehouse. The goal of EII Systems is to provide uniform access to multiple data sources without having to first loading them into a data...

    Provided By University of Warwick Library

  • White Papers // Nov 2012

    Data Mining Using Clouds: An Experimental Implementation of Apriori Over MapReduce

    Cloud computing has become a viable mainstream solution for data processing, storage and distribution. It promises on demand, scalable, pay-as-you-go compute and storage capacity. To analyze \"Big data\" on clouds, it is very important to research data mining strategies based on cloud computing paradigm from both theoretical and practical views....

    Provided By University of Warwick Library

  • White Papers // Nov 2012

    EnerJ: Approximate Data Types for Safe and General Low-Power Computation

    Energy is increasingly a first-order concern in computer systems. Exploiting energy-accuracy trade-offs is an attractive choice in applications that can tolerate inaccuracies. Recent work has explored exposing this trade-off in programming models. A key challenge, though, is how to isolate parts of the program that must be precise from those...

    Provided By University of Warwick Library

  • White Papers // Oct 2012

    Design Considerations for Asymmetric Magnetically Coupled Resonators Used in Wireless Power Transfer Applications

    Magnetic resonance coupling is a widely used technique for Wireless Power Transfer (WPT) in biomedical and consumer electronics applications. For specific applications, device size limits the overall size of the transmit and receive coils. In this paper, design considerations for an asymmetrical 4-element WPT system are investigated. For either a...

    Provided By University of Warwick Library

  • White Papers // Oct 2012

    Strengthening User Authentication through Opportunistic Cryptographic Identity Assertions

    User authentication systems are at an impasse. The most ubiquitous method - the password - has numerous problems, including susceptibility to unintentional exposure via phishing and cross-site password reuse. Second-factor authentication schemes have the potential to increase security but face usability and deploy ability challenges. For example, conventional second-factor schemes...

    Provided By University of Warwick Library

  • White Papers // Oct 2012

    PassChords: Secure Multi-Touch Authentication for Blind People

    Blind mobile device users face security risks such as inaccessible authentication methods, and aural and visual eavesdropping. The authors interviewed 13 blind Smartphone users and found that most participants were unaware of or not concerned about potential security threats. Not a single participant used optional authentication methods such as a...

    Provided By University of Warwick Library

  • White Papers // Jul 2012

    OONI : Open Observatory of Network Interference

    OONI, the Open Observatory of Network Interference, is a global observation network which aims to collect high quality data using open methodologies, using Free and Open Source Software (FL/OSS) to share observations and open data about the various types, methods, and amounts of network tampering in the world. Furthermore, OONI...

    Provided By University of Warwick Library

  • White Papers // May 2012

    Non-Coherent ToA Estimation for UWB Multipath Channels Using Max-Eigenvalue Detection

    Due to the fine delay resolution in Ultra-WideBand (UWB) wireless propagation channels, a large number of Multi-Path Components (MPC) can be resolved; and the first arriving MPC might not be the strongest one. This makes Time-of-Arrival (ToA) estimation, which essentially depends on determining the arrival time of the first MPC,...

    Provided By University of Warwick Library

  • White Papers // May 2012

    Collaborative Downloading in VANET Using Network Coding

    Data downloading on the fly is the base of commercial data services in vehicular networks, such as office-on-wheels and entertainment-on-wheels. Due to the sparse special distribution of roadside Base Stations (BS) along the road, downloading through Roadside-To-Vehicle (R2V) connections is intermittent. When multiple vehicles with geographical proximity have a common...

    Provided By University of Warwick Library

  • White Papers // May 2012

    System Design and Implementation of Broadband In-Band On-Channel Digital Radio

    In this paper, the authors present an In-Band On-Channel (IBOC) broadcasting system suitable for digital audio and data broadcasting in FM and AM channels. The new system utilizes a combination of frequency hopping, LDPC coding, hierarchical modulation and band aggregation techniques to increase the data rate, improve spectrum efficiency, and...

    Provided By University of Warwick Library

  • White Papers // Apr 2012

    Sonora: A Platform for Continuous Mobile-Cloud Computing

    This paper presents Sonora, a platform for mobile-cloud computing. Sonora is designed to support the development and execution of continuous mobile-cloud services. To this end, Sonora provides developers with stream-based programming interfaces that coherently integrate a broad range of existing techniques from mobile, database, and distributed systems. These range from...

    Provided By University of Warwick Library

  • White Papers // Apr 2012

    Non-Malleable Extractors, Two-Source Extractors and Privacy Amplification

    The broad area of randomness extraction studies the problem of converting a weakly random source into a distribution that is close to the uniform distribution in statistical distance. Over the past decades extensive research has been conducted in this area. Besides its original motivation in computing with imperfect random sources,...

    Provided By University of Warwick Library

  • White Papers // Mar 2012

    So You Want to Take Over a Botnet

    Computer criminals regularly construct large distributed attack networks comprised of many thousands of compromised computers around the globe. Once constituted, these attack networks are used to perform computer crimes, creating yet other sets of victims of secondary computer crimes, such as denial of service attacks, spam delivery, theft of personal...

    Provided By University of Warwick Library

  • White Papers // Mar 2012

    A Two-Stage Approach for Network Monitoring

    A goal of network tomography is to infer the status (e.g., delay) of congested links internal to a network, through end-to-end measurements at boundary nodes (end-hosts) via insertion of probe signals. Because, probing constitutes traffic overhead, and in any typical scenario, the number of congested links is a small fraction...

    Provided By University of Warwick Library

  • White Papers // Mar 2012

    A Design Space for Self-Adaptive Systems

    Self-adaptive systems research is expanding as systems professionals recognize the importance of automation for managing the growing complexity, scale, and scope of software systems. The current approach to designing such systems is ad hoc, varied, and fractured, often resulting in systems with parts of multiple, sometimes poorly compatible designs. In...

    Provided By University of Warwick Library

  • White Papers // Jan 2012

    Quantifying the Impact of Efficient Cross-Layer Jamming Attacks Via Network Traffic Flows

    The authors investigate a class of coordinated jamming attacks in which multiple jammers collaboratively apply knowledge about the network layer functionality to efficiently reduce the throughput of network traffic. They show how a constrained optimization framework can be used to characterize coordinated jamming attacks and allow the impact of the...

    Provided By University of Warwick Library

  • White Papers // Aug 2011

    Design of a Random Access Network for Compressed Sensing

    For networks that are deployed for long-term monitoring of environmental phenomena, it is of crucial importance to design an efficient data gathering scheme that prolongs the lifetime of the network. To this end, the authors exploit the sparse nature of the monitored field and consider a Random Access Compressed Sensing...

    Provided By University of Warwick Library

  • White Papers // Jul 2011

    Operations-Based Planning for Placement and Sizing of Energy Storage in a Grid With a High Penetration of Renewables

    As the penetration level of transmission-scale time-intermittent renewable generation resources increases, control of flexible resources will become important to mitigating the fluctuations due to these new renewable resources. Flexible resources may include new or existing synchronous generators as well as new energy storage devices. The addition of energy storage, if...

    Provided By University of Warwick Library

  • White Papers // May 2011

    A Design of Flexible Data Channels for Sensor-Cloud Integration

    The recent popularity of sensor networks and cloud computing has brought new opportunities of sensor-cloud integration that facilitates users to immediately forecast the future status of what they are observing. The main challenge is how to establish a series of elastic data channels from sensors to mobile users through data-analyzing...

    Provided By University of Warwick Library

  • White Papers // May 2011

    Towards a Statistical Framework for Source Anonymity in Sensor Networks

    In certain applications, the locations of events reported by a sensor network need to remain anonymous. That is, unauthorized observers must be unable to detect the origin of such events by analyzing the network traffic. Known as the source anonymity problem, this problem has emerged as an important topic in...

    Provided By University of Warwick Library

  • White Papers // Apr 2011

    Supply Chain Design and Analysis: Models and Methods

    For years, researchers and practitioners have primarily investigated the various processes within manufacturing supply chains individually. Recently, however, there has been increasing attention placed on the performance, design, and analysis of the supply chain as a whole. This attention is largely a result of the rising costs of manufacturing, the...

    Provided By University of Warwick Library

  • White Papers // Apr 2011

    GeM-REM: Generative Model-Driven Resource Efficient ECG Monitoring in Body Sensor Networks

    With recent advances in smartphones and wearable sensors, Body Sensor Networks (BSNs) have been proposed for use in continuous, remote ElectroCardioGram (ECG) monitoring. In such systems, sampling the ECG at clinically recommended rates (250 Hz) and wireless transmission of the collected data incurs high energy consumption at the energy-constrained body...

    Provided By University of Warwick Library

  • White Papers // Mar 2011

    An Energy Framework for the Network Simulator 3 (ns-3)

    The network simulator-3 (ns-3) is rapidly developing into a flexible and easy-to-use tool suitable for wireless network simulation. Since energy consumption is a key issue for wireless devices, wireless network researchers often need to investigate the energy consumption at a battery powered node or in the overall network, while running...

    Provided By University of Warwick Library

  • White Papers // Mar 2011

    Efficient Authentication for Mobile and Pervasive Computing

    With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In this paper, the authors propose a novel technique for authenticating...

    Provided By University of Warwick Library

  • White Papers // Jan 2011

    Dense Approximate Storage in Phase-Change Memory

    Multi-level Phase-Change Memory (PCM) stores bits by quantizing the resistance value of each cell. For example, a PCM cell with four distinct resistance levels can store two bits. By dramatically increasing this granularity, high density can be achieved at the cost of storage reliability. Many applications those that deal with...

    Provided By University of Warwick Library

  • White Papers // Aug 2010

    WHY SO? or WHY NO? Functional Causality for Explaining Query Answers

    When analyzing uncertain data sets, users are often interested in explanations for their observations. Explaining the causes of surprising query results allows users to better understand their data, and identify possible errors in data or queries. In this paper, the authors propose causality as a unified framework to explain query...

    Provided By University of Warwick Library

  • White Papers // Mar 2010

    Minimizing Energy Consumption in Body Sensor Networks Via Convex Optimization

    Body Sensor Networks (BSNs) consist of miniature sensors deployed on or implanted into the human body for health monitoring. Conserving the energy of these sensors, while guaranteeing a required level of performance, is a key challenge in BSNs. In terms of communication protocols, this translates to minimizing energy consumption while...

    Provided By University of Warwick Library

  • White Papers // Apr 2011

    GeM-REM: Generative Model-Driven Resource Efficient ECG Monitoring in Body Sensor Networks

    With recent advances in smartphones and wearable sensors, Body Sensor Networks (BSNs) have been proposed for use in continuous, remote ElectroCardioGram (ECG) monitoring. In such systems, sampling the ECG at clinically recommended rates (250 Hz) and wireless transmission of the collected data incurs high energy consumption at the energy-constrained body...

    Provided By University of Warwick Library

  • White Papers // May 2011

    Towards a Statistical Framework for Source Anonymity in Sensor Networks

    In certain applications, the locations of events reported by a sensor network need to remain anonymous. That is, unauthorized observers must be unable to detect the origin of such events by analyzing the network traffic. Known as the source anonymity problem, this problem has emerged as an important topic in...

    Provided By University of Warwick Library

  • White Papers // Mar 2011

    An Energy Framework for the Network Simulator 3 (ns-3)

    The network simulator-3 (ns-3) is rapidly developing into a flexible and easy-to-use tool suitable for wireless network simulation. Since energy consumption is a key issue for wireless devices, wireless network researchers often need to investigate the energy consumption at a battery powered node or in the overall network, while running...

    Provided By University of Warwick Library

  • White Papers // Mar 2011

    Efficient Authentication for Mobile and Pervasive Computing

    With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In this paper, the authors propose a novel technique for authenticating...

    Provided By University of Warwick Library

  • White Papers // Mar 2010

    Minimizing Energy Consumption in Body Sensor Networks Via Convex Optimization

    Body Sensor Networks (BSNs) consist of miniature sensors deployed on or implanted into the human body for health monitoring. Conserving the energy of these sensors, while guaranteeing a required level of performance, is a key challenge in BSNs. In terms of communication protocols, this translates to minimizing energy consumption while...

    Provided By University of Warwick Library

  • White Papers // Jan 2010

    A Metric for Quantifying Vulnerability in Wireless Sensor Networks

    Wireless sensor networks are often used in applications where message confidentiality, integrity, and authentication are required. Cryptography is a common mechanism for meeting these security requirements. The use of cryptography requires that nodes share secret keys, which are typically assigned to each node according to key distribution schemes. Given a...

    Provided By University of Warwick Library

  • White Papers // Jan 2012

    Quantifying the Impact of Efficient Cross-Layer Jamming Attacks Via Network Traffic Flows

    The authors investigate a class of coordinated jamming attacks in which multiple jammers collaboratively apply knowledge about the network layer functionality to efficiently reduce the throughput of network traffic. They show how a constrained optimization framework can be used to characterize coordinated jamming attacks and allow the impact of the...

    Provided By University of Warwick Library

  • White Papers // Apr 2009

    Unconditionally Secure Authenticated Encryption With Shorter Keys

    Confidentiality and integrity are two main objectives of security systems and the literature of cryptography is rich with proposed techniques to achieve them. To satisfy the requirements of a wide range of applications, a variety of techniques with different properties and performances have appeared in the literature. In this paper,...

    Provided By University of Warwick Library

  • White Papers // Apr 2012

    Non-Malleable Extractors, Two-Source Extractors and Privacy Amplification

    The broad area of randomness extraction studies the problem of converting a weakly random source into a distribution that is close to the uniform distribution in statistical distance. Over the past decades extensive research has been conducted in this area. Besides its original motivation in computing with imperfect random sources,...

    Provided By University of Warwick Library

  • White Papers // Mar 2012

    A Design Space for Self-Adaptive Systems

    Self-adaptive systems research is expanding as systems professionals recognize the importance of automation for managing the growing complexity, scale, and scope of software systems. The current approach to designing such systems is ad hoc, varied, and fractured, often resulting in systems with parts of multiple, sometimes poorly compatible designs. In...

    Provided By University of Warwick Library

  • White Papers // Apr 2009

    Towards Community Standards for Ethical Behavior in Computer Security Research

    Modern threats such as Denial of Service Attacks, Worms, Viruses, Phishing, and Botnets underscore the need for security research in an increasingly networked and computation-ally reliant society. Unfortunately, as the authors' understanding of these phenomenon have grown, so has the uncertainty in the computer science security research community on the...

    Provided By University of Warwick Library

  • White Papers // Mar 2013

    A Battery-Free RFID-Based Indoor Acoustic Localization Platform

    The ability to precisely localize RFID tags with low latency and low cost is desirable for applications such as inventory, asset tracking and robotic-manipulation of tagged items. However, because of multipath propagation effects, traditional RFID positioning methods based on RF Received Signal Strength Indication (RSSI) have limited accuracy (meter-scale) or...

    Provided By University of Warwick Library

  • White Papers // Oct 2012

    Design Considerations for Asymmetric Magnetically Coupled Resonators Used in Wireless Power Transfer Applications

    Magnetic resonance coupling is a widely used technique for Wireless Power Transfer (WPT) in biomedical and consumer electronics applications. For specific applications, device size limits the overall size of the transmit and receive coils. In this paper, design considerations for an asymmetrical 4-element WPT system are investigated. For either a...

    Provided By University of Warwick Library

  • White Papers // Aug 2011

    Design of a Random Access Network for Compressed Sensing

    For networks that are deployed for long-term monitoring of environmental phenomena, it is of crucial importance to design an efficient data gathering scheme that prolongs the lifetime of the network. To this end, the authors exploit the sparse nature of the monitored field and consider a Random Access Compressed Sensing...

    Provided By University of Warwick Library

  • White Papers // May 2013

    Optimizing VM Checkpointing for Restore Performance in VMware ESXi

    Cloud providers are increasingly looking to use virtual machine checkpointing for new applications beyond fault tolerance. Existing checkpointing systems designed for fault tolerance only optimize for saving checkpointed state, so they cannot support these new applications, which require better restore performance. Improving restore performance requires a predictive technique to reduce...

    Provided By University of Warwick Library

  • White Papers // Apr 2011

    Supply Chain Design and Analysis: Models and Methods

    For years, researchers and practitioners have primarily investigated the various processes within manufacturing supply chains individually. Recently, however, there has been increasing attention placed on the performance, design, and analysis of the supply chain as a whole. This attention is largely a result of the rising costs of manufacturing, the...

    Provided By University of Warwick Library

  • White Papers // Dec 2008

    Scientific Computing in the Cloud

    The authors investigate the feasibility of high performance scientific computation using cloud computers as an alternative to traditional computational tools. The availability of these large, virtualized pools of compute resources raises the possibility of a new compute paradigm for scientific research with many advantages. For research groups, cloud computing provides...

    Provided By University of Warwick Library

  • White Papers // Jan 2013

    Enterprise Information Integration: Successes, Challenges and Controversies

    The vision underlying this industry is to provide tools for integrating data from multiple sources without having to first load all the data into a central warehouse. The goal of EII Systems is to provide uniform access to multiple data sources without having to first loading them into a data...

    Provided By University of Warwick Library

  • White Papers // Oct 2012

    PassChords: Secure Multi-Touch Authentication for Blind People

    Blind mobile device users face security risks such as inaccessible authentication methods, and aural and visual eavesdropping. The authors interviewed 13 blind Smartphone users and found that most participants were unaware of or not concerned about potential security threats. Not a single participant used optional authentication methods such as a...

    Provided By University of Warwick Library

  • White Papers // Oct 2012

    Strengthening User Authentication through Opportunistic Cryptographic Identity Assertions

    User authentication systems are at an impasse. The most ubiquitous method - the password - has numerous problems, including susceptibility to unintentional exposure via phishing and cross-site password reuse. Second-factor authentication schemes have the potential to increase security but face usability and deploy ability challenges. For example, conventional second-factor schemes...

    Provided By University of Warwick Library

  • White Papers // Jul 2012

    OONI : Open Observatory of Network Interference

    OONI, the Open Observatory of Network Interference, is a global observation network which aims to collect high quality data using open methodologies, using Free and Open Source Software (FL/OSS) to share observations and open data about the various types, methods, and amounts of network tampering in the world. Furthermore, OONI...

    Provided By University of Warwick Library

  • White Papers // Mar 2012

    So You Want to Take Over a Botnet

    Computer criminals regularly construct large distributed attack networks comprised of many thousands of compromised computers around the globe. Once constituted, these attack networks are used to perform computer crimes, creating yet other sets of victims of secondary computer crimes, such as denial of service attacks, spam delivery, theft of personal...

    Provided By University of Warwick Library

  • White Papers // Jan 2009

    A Case for A Collaborative Query Management System

    Over the past 40 years, DataBase Management Systems (DBMSs) have evolved to provide a sophisticated variety of data management capabilities. At the same time, tools for managing queries over the data have remained relatively primitive. One reason for this is that queries are typically issued through applications. They are thus...

    Provided By University of Warwick Library

  • White Papers // May 2013

    A General Probabilistic Model for Improving Key Assignment in Wireless Networks

    The authors study the problem of establishing secure communication channels in resource-constrained wireless networks using key pre-distribution. Pairwise communication channels between nodes are secured using link keys which are established as a function of cryptographic seeds pre-distributed to each node. They propose a general model for seed assignment which regulates...

    Provided By University of Warwick Library

  • White Papers // Sep 2013

    Storage Sizing and Placement Through Operational and Uncertainty-Aware Simulations

    As the penetration level of transmission-scale time-intermittent renewable generation resources increases, control of flexible resources will become important to mitigating the fluctuations due to these new renewable resources. Flexible resources may include new or existing synchronous generators as well as new energy storage devices. Optimal placement and sizing of energy...

    Provided By University of Warwick Library

  • White Papers // Jul 2011

    Operations-Based Planning for Placement and Sizing of Energy Storage in a Grid With a High Penetration of Renewables

    As the penetration level of transmission-scale time-intermittent renewable generation resources increases, control of flexible resources will become important to mitigating the fluctuations due to these new renewable resources. Flexible resources may include new or existing synchronous generators as well as new energy storage devices. The addition of energy storage, if...

    Provided By University of Warwick Library

  • White Papers // Jan 2014

    Parallel Application Characterization for Multiprocessor Scheduling Policy Design

    Much of the recent work on multiprocessor scheduling disciplines has used abstract workload models to explore the fundamental, high-level properties of the various alternatives. As continuing work on these policies increases their level of sophistication, however, it is clear that the choice of appropriate policies must be guided at least...

    Provided By University of Warwick Library

  • White Papers // Aug 2010

    WHY SO? or WHY NO? Functional Causality for Explaining Query Answers

    When analyzing uncertain data sets, users are often interested in explanations for their observations. Explaining the causes of surprising query results allows users to better understand their data, and identify possible errors in data or queries. In this paper, the authors propose causality as a unified framework to explain query...

    Provided By University of Warwick Library

  • White Papers // Jul 2013

    Compiled Plans for In-Memory Path-Counting Queries

    Dissatisfaction with relational databases for large-scale graph processing has motivated a new class of graph databases that offer fast graph processing but sacrifice the ability to express basic relational idioms. However, the authors hypothesize that the performance benefits amount to implementation details, not a fundamental limitation of the relational model....

    Provided By University of Warwick Library

  • White Papers // Mar 2006

    Area-Performance Trade-offs in Tiled Dataflow Architectures

    To address a set of critical problems in processor design, including design complexity, wire delay, and fabrication reliability, many computer architects are beginning to shift their focus away from today's complex, monolithic, high-performance processors. Tiled architectures, such as RAW, SmartMemories, TRIPS, and WaveScalar, promise to address several issues facing conventional...

    Provided By University of Warwick Library

  • White Papers // Jan 2014

    XMLTK: An XML Toolkit for Scalable XML Stream Processing

    The authors describe a toolkit for highly scalable XML data processing, consisting of two components. The first is a collection of stand-alone XML tools, sorting, aggregation, nesting, and unnesting, that can be chained to express more complex restructurings. The second is a highly scalable XPath processor for XML streams that...

    Provided By University of Warwick Library

  • White Papers // Jan 2006

    Theory of Answering Queries Using Views

    The problem of answering queries using views is to find efficient methods of answering a query using a set of previously materialized views over the database, rather than accessing the database relations. The problem has recently received significant attention because of its relevance to a wide variety of data management...

    Provided By University of Warwick Library

  • White Papers // Feb 2014

    Grappa: A Latency-Tolerant Runtime for Large-Scale Irregular Applications

    Grappa is a runtime system for commodity clusters of multicore computers that presents a massively parallel, single address space abstraction to applications. Grappa's purpose is to enable scalable performance of irregular parallel applications, such as branch and bound optimization, SPICE circuit simulation, and graph processing. Poor data locality, imbalanced parallel...

    Provided By University of Warwick Library

  • White Papers // Aug 2013

    Flat Combining Synchronized Global Data Structures

    The implementation of scalable synchronized data structures is notoriously difficult. Recent work in shared-memory multicores introduced a new synchronization paradigm called flat combining that allows many concurrent accessors to cooperate efficiently to reduce contention on shared locks. In this paper, the authors introduce this paradigm to a domain where reducing...

    Provided By University of Warwick Library

  • White Papers // Jun 2009

    Dynamic Concurrency Discovery for Very Large Windows of Execution

    Dynamically finding parallelism in sequential applications with hardware mechanisms is typically limited to short windows of execution due to resource limitations. This is because precisely keeping track of memory dependences is too expensive. The authors propose trading off precision for efficiency. The key idea is to encode a superset of...

    Provided By University of Warwick Library

  • White Papers // Jan 2011

    Dense Approximate Storage in Phase-Change Memory

    Multi-level Phase-Change Memory (PCM) stores bits by quantizing the resistance value of each cell. For example, a PCM cell with four distinct resistance levels can store two bits. By dramatically increasing this granularity, high density can be achieved at the cost of storage reliability. Many applications those that deal with...

    Provided By University of Warwick Library

  • White Papers // Nov 2012

    EnerJ: Approximate Data Types for Safe and General Low-Power Computation

    Energy is increasingly a first-order concern in computer systems. Exploiting energy-accuracy trade-offs is an attractive choice in applications that can tolerate inaccuracies. Recent work has explored exposing this trade-off in programming models. A key challenge, though, is how to isolate parts of the program that must be precise from those...

    Provided By University of Warwick Library

  • White Papers // Jan 2014

    Low-Level Detection of Language-Level Data Races with LARD

    The researchers have proposed always-on data-race exceptions as a way to avoid the ill effects of data races, but slow performance of accurate dynamic data-race detection remains a barrier to the adoption of always-on data-race exceptions. Proposals for accurate low-level (e.g., hardware) data-race detection have the potential to reduce this...

    Provided By University of Warwick Library

  • White Papers // Feb 2014

    Tuning Approximate Computations with Constraint-Based Type Inference

    Unreliable hardware can lead to great gains in energy efficiency, but it can be difficult to reason about how unreliable each operation in a computation may feasibly be. To make approximate computing viable, the authors need tools that can help programmers derive precision - energy trade-offs for individual fine-grained operations...

    Provided By University of Warwick Library

  • White Papers // Nov 2013

    A Parallel Multi-Agent Spatial Simulation Environment for Cluster Systems

    For more than the last two decades, multi-agent simulations have been highlighted to model mega-scale social or biological agents and to simulate their emergent collective behavior that may be difficult only with mathematical and macroscopic approaches. A successful key for simulating megascale agents is to speed up the execution with...

    Provided By University of Warwick Library