Now showing items 65-84 of 193

    • Energy Efficient Network Memory for Ubiquitous Devices 

      Fryman, Joshua Bruce; Huneycutt, Chad Marcus; Lee, Hsien-Hsin Sean; Mackenzie, Kenneth M.; Schimmel, D. E. (David E.) (Georgia Institute of Technology, 2003)
      This paper explores the energy and delay issues that occur when some or all of the local storage is moved out of the embedded device, and into a remote network server. We demonstrate using the network to access remote ...
    • Energy Introspector: Coordinated Architecture-Level Simulation of Processor Physics 

      Song, William J.; Mukhopadhyay, Saibal; Rodrigues, Arun; Yalamanchili, Sudhakar (Georgia Institute of Technology, 2013)
      Increased power and heat dissipation in microprocessors impose limitations on performance scaling. Power and thermal management techniques coupled with workload dynamics cause increasing spatiotemporal variations in ...
    • Energy-Aware Data Collection in Sensor Networks: A Localized Selective Sampling Approach 

      Gedik, Bugra; Liu, Ling (Georgia Institute of Technology, 2005)
      One of the most prominent and comprehensive ways of data collection in sensor networks is to periodically extract raw sensor readings. This way of data collection enables complex analysis of data, which may not be possible ...
    • Energy-aware Mobile Service Overlays: Cooperative Dynamic Power Management in Distributed Mobile Systems 

      Seshasayee, Balasubramanian; Nathuji, Ripal; Schwan, Karsten (Georgia Institute of Technology, 2007)
      With their increasingly powerful computational resources and high-speed wireless communications, future mobile systems will have the ability to run sophisticated applications on collections of cooperative end devices. ...
    • Energy-Efficient Device Scheduling through Contextual Timeouts 

      Seshasayee, Balasubramanian; Schwan, Karsten (Georgia Institute of Technology, 2005)
      Handheld and embedded hardware platforms are operating with an increasing number of internal and external devices, potentially increasing energy consumption and more importantly, motivating the need for energy management ...
    • Enforcing Configurable Trust in Client-side Software Stacks by Splitting Information Flow 

      Singaravelu, Lenin; Kauer, Bernhard; Boettcher, Alexander; Härtig, Hermann; Pu, Calton; Jung, Gueyoung; Weinhold, Carsten (Georgia Institute of Technology, 2007)
      Current client-server applications such as online banking employ the same client-side software stack to handle information with differing security and functionality requirements, thereby increasing the size and complexity ...
    • Eraser: An Exploit - Specific Monitor to Prevent Malicious Communication Channel 

      Singh, Abhishek (Georgia Institute of Technology, 2004)
      Prevention of malicious communication channel has been an important issue in building secure networked systems. Malicious Communication channel can be established by using header fields which follow particular semantics ...
    • Evaluating Scalability of Multi-threaded Applications on a Many-core Platform 

      Gupta, Vishal; Kim, Hyesoon; Schwan, Karsten (Georgia Institute of Technology, 2012)
      Multicore processors have been effective in scaling application performance by dividing computation among multiple threads running in parallel. However, application performance does not necessarily improve as more cores ...
    • Execution Environment Support for Many Core Heterogeneous Accelerator Platforms 

      Gupta, Vishakha; Yalamanchili, Sudhakar; Duato, José (Georgia Institute of Technology, 2010)
      We are seeing the advent of large scale, heterogeneous systems comprised of homogeneous general purpose cores intermingled with customized heterogeneous cores and interconnected to diverse memory hierarchies. The presence ...
    • Execution Hijacking: Improving Dynamic Analysis by Flying off Course 

      Tsankov, Petar; Jin, Wei; Orso, Alessandro; Sinha, Saurabh (Georgia Institute of Technology, 2010)
      Typically, dynamic-analysis techniques operate on a small subset of all possible program behaviors, which limits their effectiveness and the representativeness of the computed results. To address this issue, a new ...
    • Exploring the Design Space of Greedy Link Scheduling Algorithms for Wireless Multihop Networks 

      Lertpratchya, Daniel; Blough, Douglas M. (Georgia Institute of Technology, 2011)
      It is known that using a spatial TDMA (STDMA) access scheme can increase the capacity of a wireless network over CSMA/CD access scheme. Modern wireless devices are capable of transmitting at different data rates depending ...
    • Fast and Accurate Link Discovery Integrated with Reliable Multicast in 802.11 

      Lertpratchya, Daniel; Blough, Douglas M.; Riley, George F. (Georgia Institute of Technology, 2013)
      Abstract—Maintaining accurate neighbor information in wireless networks is an important operation upon which many higher layer protocols rely. However, this operation is not supported in the IEEE 802.11 MAC layer, ...
    • Fast, Lightweight Virtual Machine Checkpointing 

      Sun, Michael H.; Blough, Douglas M. (Georgia Institute of Technology, 2010)
      Virtual machine checkpoints provide a clean encapsulation of the full state of an executing system. Due to the large nature of state involved, the process of VM checkpoints can be slow and costly. We describe the ...
    • File-based Race Condition Attacks on Multiprocessors Are Practical Threat 

      Wei, Jinpeng; Pu, Calton (Georgia Institute of Technology, 2006)
      TOCTTOU (Time-of-Check-to-Time-of-Use) attacks exploit race conditions in file systems. Although TOCTTOU attacks have been known for 30 years, they have been considered "low risk" due to their typically low probability of ...
    • A Floorplan-Aware Dynamic Inductive Noise Controller for Reliable 2D and 3D Microprocessors 

      Mohamood, Fayez; Healy, Michael; Lim, Sung Kyu; Lee, Hsien-Hsin Sean (Georgia Institute of Technology, 2006)
      Power delivery is a growing reliability concern in microprocessors as the industry moves toward feature-rich, power-hungrier designs. To battle the ever-aggravating power consumption, modern microprocessor designers or ...
    • Fountain Broadcast for Wireless Sensor Networks 

      Kumar, Rajnish; Paul, Arnab; Ramachandran, Umakishore (Georgia Institute of Technology, 2005)
      Code dissemination in wireless ad hoc network is an important aspect of network deployment. Once deployed, the network nodes may still need software updates to keep up with the changing application demand, thus making ...
    • Generating Perfect Reversals of Simple Linear-Codes 

      Perumalla, Kalyan S. (Georgia Institute of Technology, 2003)
      Bi-directional execution - executing forward as well as in reverse - is useful in many contexts. However, traditional techniques for bi-directional execution are not scalable, as they require infinite storage in the ...
    • GeoCast: An Efficient Overlay System for Multicast Applications 

      Liu, Ling; Pu, Calton; Wang, Yuehua; Zhang, Gong (Georgia Institute of Technology, 2009)
      In this paper, we present GeoCast, a geographical location aware overlay network framework designed for providing efficient group communication services. GeoCast can be seen as an extension to the CAN network in the term ...
    • Global Placement for Quantum-dot Cellular Automata Based Circuits 

      Nguyen, Jean; Ravichandran, Ramprasad; Lim, Sung Kyu; Niemier, Michael Thaddeus (Georgia Institute of Technology, 2003)
      Quantum Cellular Automata (QCA) has been proposed as an alternative architecture to CMOS and in principle should permit the implementation of ultra lower-power, nano-scale logic circuitry working at teraflop frequency. QCA ...
    • Global Routing for Three Dimensional Packaging 

      Minz, Jacob Rajkumar; Lim, Sung Kyu (Georgia Institute of Technology, 2003)
      Three dimensional packaging is becoming a popular concept because of the numerous advantages it has to offer over the existing conventional technologies. System on Packages (SOP) is an example of three dimensional packaging. ...