Now showing items 44-63 of 198

    • The Design and Evaluation of Techniques for Route Diversity in Distributed Hash Tables 

      Harvesf, Cyrus; Blough, Douglas M. (Georgia Institute of Technology, 2007)
      To achieve higher efficiency over their unstructured counterparts, structured peer-to-peer systems hold each node responsible for serving a specified set of keys and correctly routing lookups. Unfortunately, malicious ...
    • The Design and Implementation Ocelot’s Dynamic Binary Translator from PTX to Multi-Core x86 

      Diamos, Gregory (Georgia Institute of Technology, 2009)
      Ocelot is a dynamic compilation framework designed to map the explicitly parallel PTX execution model used by NVIDIA CUDA applications onto diverse many-core architectures. Ocelot includes a dynamic binary translator ...
    • Design of a Secure and Fault Tolerant Environment for Distributed Storage 

      Paul, Arnab; Adhikari, Sameer; Ramachandran, Umakishore (Georgia Institute of Technology, 2004)
      We discuss the design and evaluation of a secure and fault tolerant storage infrastructure for un-trusted distributed computing environments. Previous designs of storage systems for this space have tended to use decoupled ...
    • Design of a Write-Optimized Data Store 

      Amur, Hrishikesh; Andersen, David G.; Kaminsky, Michael; Schwan, Karsten (Georgia Institute of Technology, 2013)
      The WriteBuffer (WB) Tree is a new write-optimized data structure that can be used to implement per-node storage in unordered key-value stores. TheWB Tree provides faster writes than the Log-Structured Merge (LSM) Tree ...
    • Design Space Exploration of On-chip Ring Interconnection for a CPU-GPU Architecture 

      Lee, Jaekyu; Li, Si; Kim, Hyesoon; Yalamanchili, Sudhakar (Georgia Institute of Technology, 2012)
      Future chip multiprocessors (CMP) will only grow in core count and diversity in terms of frequency, power consumption, and resource distribution. Incorporating a GPU architecture into CMP, which is more efficient with ...
    • Detection of Conflicts and Inconsistencies in Taxonomy-based Authorization Policies 

      Mohan, Apurva; Blough, Douglas M.; Kurc, Tahsin; Post, Andrew; Saltz, Joel (Georgia Institute of Technology, 2011)
      The values of data elements stored in biomedical databases often draw from biomedical ontologies. Authorization rules can be defined on these ontologies to control access to sensitive and private data elements in such ...
    • Discovering and Ranking Data Intensive Web Services: A Source-Biased Approach 

      Caverlee, James; Liu, Ling; Rocco, Daniel J. (Daniel John) (Georgia Institute of Technology, 2003)
      This paper presents a novel source-biased approach to automatically discover and rank relevant data intensive web services. It supports a service-centric view of the Web through source-biased probing and source-biased ...
    • Distributed Fault-Tolerance for Event Detection Using Heterogeneous Wireless Sensor Networks 

      Ould-Ahmed-Vall, ElMoustapha; Riley, George F.; Heck, Bonnie S. (Georgia Institute of Technology, 2006)
      Distributed event detection using wireless sensor networks has received growing interest in recent years. In such applications, a large number of inexpensive and unreliable sensor nodes are distributed in a geographical ...
    • Distributed Global Identification for Sensor Networks 

      Ould-Ahmed-Vall, ElMoustapha; Blough, Douglas M.; Heck, Bonnie S.; Riley, George F. (Georgia Institute of Technology, 2005)
      A sensor network consists of a set of battery-powered nodes, which collaborate to perform sensing tasks in a given environment. It may contain one or more base stations to collect sensed data and possibly relay it to a ...
    • Distributed MIMO Interference Cancellation for Interfering Wireless Networks: Protocol and Initial Simulation 

      Cortes-Pena, Luis Miguel; Blough, Douglas M. (Georgia Institute of Technology, 2013-02)
      In this report, the problem of interference in dense wireless network deployments is addressed. Two example scenarios are: 1) overlapping basic service sets (OBSSes) in wireless LAN deployments, and 2) interference among ...
    • Dominant Variance Characterization 

      Kumar, Tushar; Pande, Santosh (Georgia Institute of Technology, 2010)
      There are a whole range of program analysis techniques that characterize different aspects of an application’s performance: hot-spots, distinct phases of behavior, code segments that could potentially run in parallel, ...
    • Dynamic Differential Data Protection for High Performance and Pervasive Applications 

      Widener, Patrick M. (Patrick McCall); Schwan, Karsten (Georgia Institute of Technology, 2004)
      Modern distributed applications are long-lived, are expected to provide flexible and adaptive data services, and must meet the functionality and scalability challenges posed by dynamically changing user communities in ...
    • Dynamic Management of Cooperating Peers in Wireless Embedded Systems: An Approach Driven by Information Quality 

      Robinson, David Alexander; Schwan, Karsten (Georgia Institute of Technology, 2003)
      Data-intensive applications like remote sensing or peer-to-peer communications are increasingly prevalent on wireless-connected, pervasive systems platforms. Since resource limitations make it infeasible to deliver all ...
    • A Dynamic, Partitioned Global Address Space Model for High Performance Clusters 

      Yalamanchili, Sudhakar; Young, Jeff; Duato, José; Silla, Federico (Georgia Institute of Technology, 2008)
      Memory-to-memory latency is a critical performance determinant of scalable computing systems. The use of modern interconnect fabrics tightly coupled to the processor-memory hierarchy such as AMD’s HyperTransportTM (HT) ...
    • Dynodroid: An Input Generation System for Android Apps 

      MacHiry, Aravind; Tahiliani, Rohan; Naik, Mayur (Georgia Institute of Technology, 2012)
      We present a system Dynodroid for generating relevant inputs to unmodified Android apps. Dynodroid views an app as an event-driven program that interacts with its environment by means of a sequence of events through the ...
    • e-SAFE: An Extensible Secure and Fault Tolerant Storage System 

      Paul, Arnab; Agarwala, Sandip; Ramachandran, Umakishore (Georgia Institute of Technology, 2005)
      With the rapidly falling price of hardware, and increasingly available bandwidth, storage technology is seeing a paradigm shift from centralized and managed mode to distributed and unmanaged configurations. The key issues ...
    • E2EProf: Automated End-to-End Performance Management for Enterprise Systems 

      Agarwala, Sandip; Alegre, Fernando; Schwan, Karsten; Mehalingham, Jegannathan (Georgia Institute of Technology, 2007)
      Distributed systems are becoming increasingly complex, caused by the prevalent use of web services, multi-tier architectures, and grid computing, where dynamic sets of components interact with each other across distributed ...
    • Efficient and Secure Search of Enterprise File Systems 

      Singh, Aameek; Srivatsa, Mudhakar; Liu, Ling (Georgia Institute of Technology, 2007)
      With fast paced growth of enterprise data, quickly locating relevant content has become a critical IT capability. Research has shown that nearly 85% of enterprise data lies in flat filesystems [12] that allow multiple ...
    • Efficient End to End Data Exchange Using Configurable Compression 

      Wiseman, Yair; Schwan, Karsten; Widener, Patrick M. (Patrick McCall) (Georgia Institute of Technology, 2003)
      We explore the use of compression methods to improve the middleware-based exchange of information in interactive or collaborative distributed applications. In such applications, good compression factors must be accompanied ...
    • Efficient Relational Algebra Algorithms and Data Structures for GPU 

      Diamos, Gregory Frederick; Wu, Haicheng; Lele, Ashwin; Wang, Jin (Georgia Institute of Technology, 2012-02-01)
      Relational databases remain an important application domain for organizing and analyzing the massive volume of data generated as sensor technology, retail and inventory transactions, social media, computer vision, and ...