Now showing items 61-80 of 198

    • Efficient and Secure Search of Enterprise File Systems 

      Singh, Aameek; Srivatsa, Mudhakar; Liu, Ling (Georgia Institute of Technology, 2007)
      With fast paced growth of enterprise data, quickly locating relevant content has become a critical IT capability. Research has shown that nearly 85% of enterprise data lies in flat filesystems [12] that allow multiple ...
    • Efficient End to End Data Exchange Using Configurable Compression 

      Wiseman, Yair; Schwan, Karsten; Widener, Patrick M. (Patrick McCall) (Georgia Institute of Technology, 2003)
      We explore the use of compression methods to improve the middleware-based exchange of information in interactive or collaborative distributed applications. In such applications, good compression factors must be accompanied ...
    • Efficient Relational Algebra Algorithms and Data Structures for GPU 

      Diamos, Gregory Frederick; Wu, Haicheng; Lele, Ashwin; Wang, Jin (Georgia Institute of Technology, 2012-02-01)
      Relational databases remain an important application domain for organizing and analyzing the massive volume of data generated as sensor technology, retail and inventory transactions, social media, computer vision, and ...
    • End-to-end Estimation of the Available Bandwidth Variation Range 

      Jain, Manish; Dovrolis, Constantinos (Georgia Institute of Technology, 2005)
      The available bandwidth (avail-bw) of a network path is an important performance metric and its end-to-end estimation has recently received significant attention. Previous work focused on the estimation of the average ...
    • A Energy Efficient Approach to Processing Spatial Alarms on Mobile Clients 

      Murugappan, Anand; Liu, Ling (Georgia Institute of Technology, 2008)
      Many on a daily basis use time based alarms. Spatial alarms extend the very same idea to location-based triggers, which are fired whenever a mobile user enters the spatial region of the location alarms. Spatial alarms ...
    • Energy Efficient Exact kNN Search in Wireless Broadcast Environments 

      Gedik, Bugra; Singh, Aameek; Liu, Ling (Georgia Institute of Technology, 2004-05-24)
      The advances in wireless communication and decreasing costs of mobile devices have enabled users to access desired information at any time. Coupled with positioning technologies like GPS, this opens up an exciting domain ...
    • Energy Efficient Network Memory for Ubiquitous Devices 

      Fryman, Joshua Bruce; Huneycutt, Chad Marcus; Lee, Hsien-Hsin Sean; Mackenzie, Kenneth M.; Schimmel, D. E. (David E.) (Georgia Institute of Technology, 2003)
      This paper explores the energy and delay issues that occur when some or all of the local storage is moved out of the embedded device, and into a remote network server. We demonstrate using the network to access remote ...
    • Energy Introspector: Coordinated Architecture-Level Simulation of Processor Physics 

      Song, William J.; Mukhopadhyay, Saibal; Rodrigues, Arun; Yalamanchili, Sudhakar (Georgia Institute of Technology, 2013)
      Increased power and heat dissipation in microprocessors impose limitations on performance scaling. Power and thermal management techniques coupled with workload dynamics cause increasing spatiotemporal variations in ...
    • Energy-Aware Data Collection in Sensor Networks: A Localized Selective Sampling Approach 

      Gedik, Bugra; Liu, Ling (Georgia Institute of Technology, 2005)
      One of the most prominent and comprehensive ways of data collection in sensor networks is to periodically extract raw sensor readings. This way of data collection enables complex analysis of data, which may not be possible ...
    • Energy-aware Mobile Service Overlays: Cooperative Dynamic Power Management in Distributed Mobile Systems 

      Seshasayee, Balasubramanian; Nathuji, Ripal; Schwan, Karsten (Georgia Institute of Technology, 2007)
      With their increasingly powerful computational resources and high-speed wireless communications, future mobile systems will have the ability to run sophisticated applications on collections of cooperative end devices. ...
    • Energy-Efficient Device Scheduling through Contextual Timeouts 

      Seshasayee, Balasubramanian; Schwan, Karsten (Georgia Institute of Technology, 2005)
      Handheld and embedded hardware platforms are operating with an increasing number of internal and external devices, potentially increasing energy consumption and more importantly, motivating the need for energy management ...
    • Enforcing Configurable Trust in Client-side Software Stacks by Splitting Information Flow 

      Singaravelu, Lenin; Kauer, Bernhard; Boettcher, Alexander; Härtig, Hermann; Pu, Calton; Jung, Gueyoung; Weinhold, Carsten (Georgia Institute of Technology, 2007)
      Current client-server applications such as online banking employ the same client-side software stack to handle information with differing security and functionality requirements, thereby increasing the size and complexity ...
    • Eraser: An Exploit - Specific Monitor to Prevent Malicious Communication Channel 

      Singh, Abhishek (Georgia Institute of Technology, 2004)
      Prevention of malicious communication channel has been an important issue in building secure networked systems. Malicious Communication channel can be established by using header fields which follow particular semantics ...
    • Evaluating Scalability of Multi-threaded Applications on a Many-core Platform 

      Gupta, Vishal; Kim, Hyesoon; Schwan, Karsten (Georgia Institute of Technology, 2012)
      Multicore processors have been effective in scaling application performance by dividing computation among multiple threads running in parallel. However, application performance does not necessarily improve as more cores ...
    • Execution Environment Support for Many Core Heterogeneous Accelerator Platforms 

      Gupta, Vishakha; Yalamanchili, Sudhakar; Duato, José (Georgia Institute of Technology, 2010)
      We are seeing the advent of large scale, heterogeneous systems comprised of homogeneous general purpose cores intermingled with customized heterogeneous cores and interconnected to diverse memory hierarchies. The presence ...
    • Execution Hijacking: Improving Dynamic Analysis by Flying off Course 

      Tsankov, Petar; Jin, Wei; Orso, Alessandro; Sinha, Saurabh (Georgia Institute of Technology, 2010)
      Typically, dynamic-analysis techniques operate on a small subset of all possible program behaviors, which limits their effectiveness and the representativeness of the computed results. To address this issue, a new ...
    • Exploring the Design Space of Greedy Link Scheduling Algorithms for Wireless Multihop Networks 

      Lertpratchya, Daniel; Blough, Douglas M. (Georgia Institute of Technology, 2011)
      It is known that using a spatial TDMA (STDMA) access scheme can increase the capacity of a wireless network over CSMA/CD access scheme. Modern wireless devices are capable of transmitting at different data rates depending ...
    • Fast and Accurate Link Discovery Integrated with Reliable Multicast in 802.11 

      Lertpratchya, Daniel; Blough, Douglas M.; Riley, George F. (Georgia Institute of Technology, 2013)
      Abstract—Maintaining accurate neighbor information in wireless networks is an important operation upon which many higher layer protocols rely. However, this operation is not supported in the IEEE 802.11 MAC layer, ...
    • Fast, Lightweight Virtual Machine Checkpointing 

      Sun, Michael H.; Blough, Douglas M. (Georgia Institute of Technology, 2010)
      Virtual machine checkpoints provide a clean encapsulation of the full state of an executing system. Due to the large nature of state involved, the process of VM checkpoints can be slow and costly. We describe the ...
    • File-based Race Condition Attacks on Multiprocessors Are Practical Threat 

      Wei, Jinpeng; Pu, Calton (Georgia Institute of Technology, 2006)
      TOCTTOU (Time-of-Check-to-Time-of-Use) attacks exploit race conditions in file systems. Although TOCTTOU attacks have been known for 30 years, they have been considered "low risk" due to their typically low probability of ...