Now showing items 75-94 of 198

    • Execution Environment Support for Many Core Heterogeneous Accelerator Platforms 

      Gupta, Vishakha; Yalamanchili, Sudhakar; Duato, José (Georgia Institute of Technology, 2010)
      We are seeing the advent of large scale, heterogeneous systems comprised of homogeneous general purpose cores intermingled with customized heterogeneous cores and interconnected to diverse memory hierarchies. The presence ...
    • Execution Hijacking: Improving Dynamic Analysis by Flying off Course 

      Tsankov, Petar; Jin, Wei; Orso, Alessandro; Sinha, Saurabh (Georgia Institute of Technology, 2010)
      Typically, dynamic-analysis techniques operate on a small subset of all possible program behaviors, which limits their effectiveness and the representativeness of the computed results. To address this issue, a new ...
    • Exploring the Design Space of Greedy Link Scheduling Algorithms for Wireless Multihop Networks 

      Lertpratchya, Daniel; Blough, Douglas M. (Georgia Institute of Technology, 2011)
      It is known that using a spatial TDMA (STDMA) access scheme can increase the capacity of a wireless network over CSMA/CD access scheme. Modern wireless devices are capable of transmitting at different data rates depending ...
    • Fast and Accurate Link Discovery Integrated with Reliable Multicast in 802.11 

      Lertpratchya, Daniel; Blough, Douglas M.; Riley, George F. (Georgia Institute of Technology, 2013)
      Abstract—Maintaining accurate neighbor information in wireless networks is an important operation upon which many higher layer protocols rely. However, this operation is not supported in the IEEE 802.11 MAC layer, ...
    • Fast, Lightweight Virtual Machine Checkpointing 

      Sun, Michael H.; Blough, Douglas M. (Georgia Institute of Technology, 2010)
      Virtual machine checkpoints provide a clean encapsulation of the full state of an executing system. Due to the large nature of state involved, the process of VM checkpoints can be slow and costly. We describe the ...
    • File-based Race Condition Attacks on Multiprocessors Are Practical Threat 

      Wei, Jinpeng; Pu, Calton (Georgia Institute of Technology, 2006)
      TOCTTOU (Time-of-Check-to-Time-of-Use) attacks exploit race conditions in file systems. Although TOCTTOU attacks have been known for 30 years, they have been considered "low risk" due to their typically low probability of ...
    • A Floorplan-Aware Dynamic Inductive Noise Controller for Reliable 2D and 3D Microprocessors 

      Mohamood, Fayez; Healy, Michael; Lim, Sung Kyu; Lee, Hsien-Hsin Sean (Georgia Institute of Technology, 2006)
      Power delivery is a growing reliability concern in microprocessors as the industry moves toward feature-rich, power-hungrier designs. To battle the ever-aggravating power consumption, modern microprocessor designers or ...
    • Fountain Broadcast for Wireless Sensor Networks 

      Kumar, Rajnish; Paul, Arnab; Ramachandran, Umakishore (Georgia Institute of Technology, 2005)
      Code dissemination in wireless ad hoc network is an important aspect of network deployment. Once deployed, the network nodes may still need software updates to keep up with the changing application demand, thus making ...
    • Generating Perfect Reversals of Simple Linear-Codes 

      Perumalla, Kalyan S. (Georgia Institute of Technology, 2003)
      Bi-directional execution - executing forward as well as in reverse - is useful in many contexts. However, traditional techniques for bi-directional execution are not scalable, as they require infinite storage in the ...
    • GeoCast: An Efficient Overlay System for Multicast Applications 

      Liu, Ling; Pu, Calton; Wang, Yuehua; Zhang, Gong (Georgia Institute of Technology, 2009)
      In this paper, we present GeoCast, a geographical location aware overlay network framework designed for providing efficient group communication services. GeoCast can be seen as an extension to the CAN network in the term ...
    • Global Placement for Quantum-dot Cellular Automata Based Circuits 

      Nguyen, Jean; Ravichandran, Ramprasad; Lim, Sung Kyu; Niemier, Michael Thaddeus (Georgia Institute of Technology, 2003)
      Quantum Cellular Automata (QCA) has been proposed as an alternative architecture to CMOS and in principle should permit the implementation of ultra lower-power, nano-scale logic circuitry working at teraflop frequency. QCA ...
    • Global Routing for Three Dimensional Packaging 

      Minz, Jacob Rajkumar; Lim, Sung Kyu (Georgia Institute of Technology, 2003)
      Three dimensional packaging is becoming a popular concept because of the numerous advantages it has to offer over the existing conventional technologies. System on Packages (SOP) is an example of three dimensional packaging. ...
    • Global Routing Paradigm for System-on-Package 

      Minz, Jacob Rajkumar; Pathak, Mohit; Lim, Sung Kyu (Georgia Institute of Technology, 2003)
      The true potential of three dimensional System-On-Package (SOP) technology lies in its capability to integrate both active and passive components into a single high speed/density multi-layer packaging substrate. We propose ...
    • GRUBJOIN: An Adaptive Multi-Way Windowed Stream Join with Time Correlation-Aware CPU Load Shedding 

      Gedik, Bugra; Wu, Kun-Lung; Yu, Philip S.; Liu, Ling (Georgia Institute of Technology, 2005)
      Dropping tuples has been commonly used for load shedding. However, tuple dropping generally is inadequate to shed load for multiway windowed stream joins. The output rate can be unnecessarily and severely degraded because ...
    • GT ShareStreams Industry Products Addendum 

      Krishnamurthy, Rajaram B. (Georgia Institute of Technology, 2003)
      This report provides information on industry products used in the ShareStreams research project from Jan 2000 - May 2003 at Georgia Tech. This addendum is used with papers and reports pertaining to the ShareStreams research ...
    • Hardware Supported Anomaly Detection: down to the Control Flow Level 

      Zhang, Tao; Zhuang, Xiaotong; Pande, Santosh; Lee, Wenke (Georgia Institute of Technology, 2004-03-10)
      Modern computer systems are plagued with security flaws, making them vulnerable to various malicious attacks. Intrusion detection systems have been proposed to protect computer systems from unauthorized penetration. Detecting ...
    • HIDE: Hardware-support for Leakage-Immune Dynamic Execution 

      Zhuang, Xiaotong; Zhang, Tao; Pande, Santosh; Lee, Hsien-Hsin Sean (Georgia Institute of Technology, 2003)
      Secure processors have been recently introduced, which enable new applications involving software anti-piracy, program execution certification, and secure mobile agents. Secure processors have built-in hardware support for ...
    • High Speed Memory Centric Protection on Software Execution Using One-Time-Pad Prediction 

      Shi, Weidong; Lee, Hsien-Hsin Sean; Lu, Chenghuai; Ghosh, Mrinmoy (Georgia Institute of Technology, 2004-07-23)
      This paper presents a new security model for protecting software confidentiality. Different from the previous process-centric systems designed for the same purpose, the new model ties cryptographic properties and security ...
    • High-Fidelity Modeling of Computer Network Worms 

      Perumalla, Kalyan S.; Sundaragopalan, Srikanth (Georgia Institute of Technology, 2004-06-23)
      Abstract modeling, such as using epidemic models, has been the general method of choice for understanding and analyzing the high-level effects of worms. However, high-fidelity models, such as packet-level models, are ...
    • A Hybrid Access Model for Storage Area Networks 

      Singh, Aameek; Voruganti, Kaladhar; Gopisetty, Sandeep; Pease, David; Liu, Ling (Georgia Institute of Technology, 2004)
      We present HSAN - a hybrid storage area network, which uses both in-band (like NFS) and out-of-band virtualization (like SAN FS) access models. Using hybrid servers that can serve as both metadata and NAS servers, HSAN ...