University of Winnipeg

Displaying 1-18 of 18 results

  • White Papers // Jan 2014

    Analysis of HDFS Under HBase: A Facebook Messages Case Study

    The authors present a multilayer study of the Facebook Messages stack, which is based on HBase and HDFS. They collect and analyze HDFS traces to identify potential improvements, which they then evaluate via simulation. Messages represent a new HDFS workload: whereas HDFS was built to store very large files and...

    Provided By University of Winnipeg

  • White Papers // Sep 2013

    Protocol Misidentification Made Easy with Format-Transforming Encryption

    Deep Packet Inspection (DPI) technologies provide much needed visibility and control of network traffic using port independent protocol identification, where a network flow is labeled with its application-layer protocol based on packet contents. In this paper, the authors provide the first comprehensive evaluation of a large set of DPI systems...

    Provided By University of Winnipeg

  • White Papers // Jul 2013

    FIE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution

    Embedded systems increasingly use software-driven low-power microprocessors for security-critical settings, surfacing a need for tools that can audit the security of the software (often called firmware) running on such devices. Despite the fact that firmware programs are often written in C, existing source-code analysis tools do not work well for...

    Provided By University of Winnipeg

  • White Papers // Jun 2013

    Enabling JSON Document Stores in Relational Systems

    In recent years, \"Document store\" NoSQL systems have exploded in popularity, largely driven by the adoption of the JSON data model in Web and mobile applications. The advantages of these NoSQL document store systems (like MongoDB and CouchDB) are tempered by a lack of traditional RDBMS features, notably a sophisticated...

    Provided By University of Winnipeg

  • White Papers // Mar 2013

    An Ensemble of Replication and Erasure Codes for Cloud File Systems

    Geographically distributed storage is an important method of ensuring high data availability in cloud computing and storage systems. With the increasing demand for moving file systems to the cloud, current methods of providing such enterprise-grade resiliency are very inefficient. For example, replication based methods incur large storage cost though they...

    Provided By University of Winnipeg

  • White Papers // Feb 2013

    Power Struggles: Revisiting the RISC vs. CISC Debate on Contemporary ARM and X86 Architectures

    RISC vs. CISC wars raged in the 1980s when chip area and processor design complexity were the primary constraints and desktops and servers exclusively dominated the computing landscape. Today, energy and power are the primary design constraints and the computing landscape is significantly different: growth in tablets and Smartphones running...

    Provided By University of Winnipeg

  • White Papers // Nov 2012

    Delay Constrained Multicast Routing: What Can We Learn From an Exact Approach?

    Delay constrained multicast routing is a typical problem in many emerging applications such as voice over IP, video on demand and teleconferencing, etc. Equivalently referred to as the Delay Constrained Minimum Steiner Tree (DCMST), this problem requires to find a tree spanning a source and a set of destination nodes...

    Provided By University of Winnipeg

  • White Papers // Jun 2012

    Automating Threat Modeling Through the Software Development Life-Cycle

    Fixing software security issues early in the development life-cycle reduces its cost dramatically. Companies doing software development know this reality, and they have introduced risk assessment methodologies in their development processes. Unfortunately, these methodologies require engineers to have deep software security skills to carry out some of the most important...

    Provided By University of Winnipeg

  • White Papers // May 2012

    GRASP-BSMA: A Fast Algorithm for Delay Constrained Multicast Routing

    Constrained MinimumSteiner Tree (CMST) problem is a key issue in multicast routing with Quality of Service (QoS) support. Many heuristics have been developed to solve this NP-complete problem. In recent years, some interesting work has been done to use the Greedy Randomized Adaptive Search Procedure (GRASP) to solve this problem....

    Provided By University of Winnipeg

  • White Papers // Mar 2012

    ECOS: Practical Mobile Application Offloading for Enterprises

    Offloading has emerged as a promising idea to allow handheld devices to access intensive applications without performance or energy costs. This could be particularly useful for enterprises seeking to run line-of business applications on handhelds. However, the authors must address two practical roadblocks in order to make offloading amenable for...

    Provided By University of Winnipeg

  • White Papers // Jan 2012

    Design, Integration and Implementation of the DySER Hardware Accelerator into OpenSPARC

    Accelerators and specialization in various forms are emerging as a way to increase processor performance. Examples include Navigo, Conservation-Cores, BERET, and DySER. While each of these employs different primitives and principles to achieve specialization, they share some common concerns with regards to implementation. Two of these concerns are: how to...

    Provided By University of Winnipeg

  • White Papers // Nov 2011

    Towards Multi-Tenant Performance SLOs

    As traditional and mission-critical relational database workloads migrate to the cloud in the form of Database-as-a-Service (DaaS), there is an increasing motivation to provide performance goals in Service Level Objectives (SLOs). Providing such performance goals is challenging for DaaS providers as they must balance the performance that they can deliver...

    Provided By University of Winnipeg

  • White Papers // Dec 2010

    Dynamically Specialized Datapaths for Energy Efficient Computing

    Due to limits in technology scaling, energy efficiency of logic devices is decreasing in successive generations. To provide continued performance improvements without increasing power, regardless of the sequential or parallel nature of the application, micro-architectural energy efficiency must improve. The authors propose Dynamically Specialized Datapaths to improve the energy efficiency...

    Provided By University of Winnipeg

  • White Papers // Jan 2010

    Automating Security Mediation Placement

    The authors present a framework that automatically produces resolution placement suggestions for type errors in security-typed programs, enabling legacy code to be retrofit with comprehensive security policy mediation. Resolving such type errors requires selecting a placement of mediation statements that implement runtime security decisions, such as de-classifiers and authorization checks....

    Provided By University of Winnipeg

  • White Papers // Jul 2009

    A Survey on BGP Issues and Solutions

    BGP is the de facto protocol used for inter-autonomous system routing in the Internet. Generally speaking, BGP has been proven to be secure, efficient, scalable, and robust. However, with the rapid evolving of the Internet in the past few decades, there are increasing concerns about BGS's ability to meet the...

    Provided By University of Winnipeg

  • White Papers // Jan 2009

    Sparse Multipath Channels: Modeling and Estimation

    Multipath signal propagation is the defining characteristic of terrestrial wireless channels. Virtually all existing statistical models for wireless channels are implicitly based on the assumption of rich multipath, which can be traced back to the seminal works of Bello and Kennedy on the wide-sense stationary uncorrelated scattering model, and more...

    Provided By University of Winnipeg

  • White Papers // Oct 2008

    Compressed Sensing of Wireless Channels in Time, Frequency, and Space

    Training-based channel estimation involves probing of the channel in time, frequency, and space by the transmitter with known signals, and estimation of channel parameters from the output signals at the receiver. Numerous measurement campaigns have shown, however, that physical multipath channels exhibit a sparse structure in angle-delay-Doppler, especially at large...

    Provided By University of Winnipeg

  • White Papers // May 2008

    Implementing Fast MRI Gridding on GPUs Via CUDA

    Modern Graphics Processing Units (GPUs) have made high-performance SIMD designs available to consumers at commodity prices. This has made them an attractive platform for parallel applications, however developing efficient general-purpose code for graphics-optimized architectures has proven challenging. To explore the challenges and opportunities of exploiting general-purpose GPU processing, the authors...

    Provided By University of Winnipeg

  • White Papers // Nov 2012

    Delay Constrained Multicast Routing: What Can We Learn From an Exact Approach?

    Delay constrained multicast routing is a typical problem in many emerging applications such as voice over IP, video on demand and teleconferencing, etc. Equivalently referred to as the Delay Constrained Minimum Steiner Tree (DCMST), this problem requires to find a tree spanning a source and a set of destination nodes...

    Provided By University of Winnipeg

  • White Papers // Jan 2010

    Automating Security Mediation Placement

    The authors present a framework that automatically produces resolution placement suggestions for type errors in security-typed programs, enabling legacy code to be retrofit with comprehensive security policy mediation. Resolving such type errors requires selecting a placement of mediation statements that implement runtime security decisions, such as de-classifiers and authorization checks....

    Provided By University of Winnipeg

  • White Papers // Feb 2013

    Power Struggles: Revisiting the RISC vs. CISC Debate on Contemporary ARM and X86 Architectures

    RISC vs. CISC wars raged in the 1980s when chip area and processor design complexity were the primary constraints and desktops and servers exclusively dominated the computing landscape. Today, energy and power are the primary design constraints and the computing landscape is significantly different: growth in tablets and Smartphones running...

    Provided By University of Winnipeg

  • White Papers // Jan 2012

    Design, Integration and Implementation of the DySER Hardware Accelerator into OpenSPARC

    Accelerators and specialization in various forms are emerging as a way to increase processor performance. Examples include Navigo, Conservation-Cores, BERET, and DySER. While each of these employs different primitives and principles to achieve specialization, they share some common concerns with regards to implementation. Two of these concerns are: how to...

    Provided By University of Winnipeg

  • White Papers // Dec 2010

    Dynamically Specialized Datapaths for Energy Efficient Computing

    Due to limits in technology scaling, energy efficiency of logic devices is decreasing in successive generations. To provide continued performance improvements without increasing power, regardless of the sequential or parallel nature of the application, micro-architectural energy efficiency must improve. The authors propose Dynamically Specialized Datapaths to improve the energy efficiency...

    Provided By University of Winnipeg

  • White Papers // Jan 2009

    Sparse Multipath Channels: Modeling and Estimation

    Multipath signal propagation is the defining characteristic of terrestrial wireless channels. Virtually all existing statistical models for wireless channels are implicitly based on the assumption of rich multipath, which can be traced back to the seminal works of Bello and Kennedy on the wide-sense stationary uncorrelated scattering model, and more...

    Provided By University of Winnipeg

  • White Papers // Oct 2008

    Compressed Sensing of Wireless Channels in Time, Frequency, and Space

    Training-based channel estimation involves probing of the channel in time, frequency, and space by the transmitter with known signals, and estimation of channel parameters from the output signals at the receiver. Numerous measurement campaigns have shown, however, that physical multipath channels exhibit a sparse structure in angle-delay-Doppler, especially at large...

    Provided By University of Winnipeg

  • White Papers // Jul 2009

    A Survey on BGP Issues and Solutions

    BGP is the de facto protocol used for inter-autonomous system routing in the Internet. Generally speaking, BGP has been proven to be secure, efficient, scalable, and robust. However, with the rapid evolving of the Internet in the past few decades, there are increasing concerns about BGS's ability to meet the...

    Provided By University of Winnipeg

  • White Papers // May 2012

    GRASP-BSMA: A Fast Algorithm for Delay Constrained Multicast Routing

    Constrained MinimumSteiner Tree (CMST) problem is a key issue in multicast routing with Quality of Service (QoS) support. Many heuristics have been developed to solve this NP-complete problem. In recent years, some interesting work has been done to use the Greedy Randomized Adaptive Search Procedure (GRASP) to solve this problem....

    Provided By University of Winnipeg

  • White Papers // Jun 2013

    Enabling JSON Document Stores in Relational Systems

    In recent years, \"Document store\" NoSQL systems have exploded in popularity, largely driven by the adoption of the JSON data model in Web and mobile applications. The advantages of these NoSQL document store systems (like MongoDB and CouchDB) are tempered by a lack of traditional RDBMS features, notably a sophisticated...

    Provided By University of Winnipeg

  • White Papers // Nov 2011

    Towards Multi-Tenant Performance SLOs

    As traditional and mission-critical relational database workloads migrate to the cloud in the form of Database-as-a-Service (DaaS), there is an increasing motivation to provide performance goals in Service Level Objectives (SLOs). Providing such performance goals is challenging for DaaS providers as they must balance the performance that they can deliver...

    Provided By University of Winnipeg

  • White Papers // Jan 2014

    Analysis of HDFS Under HBase: A Facebook Messages Case Study

    The authors present a multilayer study of the Facebook Messages stack, which is based on HBase and HDFS. They collect and analyze HDFS traces to identify potential improvements, which they then evaluate via simulation. Messages represent a new HDFS workload: whereas HDFS was built to store very large files and...

    Provided By University of Winnipeg

  • White Papers // Jul 2013

    FIE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution

    Embedded systems increasingly use software-driven low-power microprocessors for security-critical settings, surfacing a need for tools that can audit the security of the software (often called firmware) running on such devices. Despite the fact that firmware programs are often written in C, existing source-code analysis tools do not work well for...

    Provided By University of Winnipeg

  • White Papers // Sep 2013

    Protocol Misidentification Made Easy with Format-Transforming Encryption

    Deep Packet Inspection (DPI) technologies provide much needed visibility and control of network traffic using port independent protocol identification, where a network flow is labeled with its application-layer protocol based on packet contents. In this paper, the authors provide the first comprehensive evaluation of a large set of DPI systems...

    Provided By University of Winnipeg

  • White Papers // May 2008

    Implementing Fast MRI Gridding on GPUs Via CUDA

    Modern Graphics Processing Units (GPUs) have made high-performance SIMD designs available to consumers at commodity prices. This has made them an attractive platform for parallel applications, however developing efficient general-purpose code for graphics-optimized architectures has proven challenging. To explore the challenges and opportunities of exploiting general-purpose GPU processing, the authors...

    Provided By University of Winnipeg

  • White Papers // Mar 2013

    An Ensemble of Replication and Erasure Codes for Cloud File Systems

    Geographically distributed storage is an important method of ensuring high data availability in cloud computing and storage systems. With the increasing demand for moving file systems to the cloud, current methods of providing such enterprise-grade resiliency are very inefficient. For example, replication based methods incur large storage cost though they...

    Provided By University of Winnipeg

  • White Papers // Jun 2012

    Automating Threat Modeling Through the Software Development Life-Cycle

    Fixing software security issues early in the development life-cycle reduces its cost dramatically. Companies doing software development know this reality, and they have introduced risk assessment methodologies in their development processes. Unfortunately, these methodologies require engineers to have deep software security skills to carry out some of the most important...

    Provided By University of Winnipeg

  • White Papers // Mar 2012

    ECOS: Practical Mobile Application Offloading for Enterprises

    Offloading has emerged as a promising idea to allow handheld devices to access intensive applications without performance or energy costs. This could be particularly useful for enterprises seeking to run line-of business applications on handhelds. However, the authors must address two practical roadblocks in order to make offloading amenable for...

    Provided By University of Winnipeg