Now showing items 21-40 of 193

    • Efficient End to End Data Exchange Using Configurable Compression 

      Wiseman, Yair; Schwan, Karsten; Widener, Patrick M. (Patrick McCall) (Georgia Institute of Technology, 2003)
      We explore the use of compression methods to improve the middleware-based exchange of information in interactive or collaborative distributed applications. In such applications, good compression factors must be accompanied ...
    • Automatic Verification of Safety and Liveness for XScale-Like Processor Models Using WEB-Refinements 

      Manolios, Panagiotis; Srinivasan, Sudarshan Kumar (Georgia Institute of Technology, 2003)
      We show how to automatically verify that a complex XScale-like pipelined machine model is a WEB-refinement of an instruction set architecture model, which implies that the machines satisfy the same safety and liveness ...
    • Supporting Cache Coherence in Heterogeneous Multiprocessor Systems 

      Suh, Taeweon; Blough, Douglas M.; Lee, Hsien-Hsin Sean (Georgia Institute of Technology, 2003)
      In embedded system-on-a-chip (SoC) applications, the need for integrating heterogeneous processors in a single chip is increasing. An important issue in integrating heterogeneous processors is how to maintain the coherence ...
    • Energy Efficient Network Memory for Ubiquitous Devices 

      Fryman, Joshua Bruce; Huneycutt, Chad Marcus; Lee, Hsien-Hsin Sean; Mackenzie, Kenneth M.; Schimmel, D. E. (David E.) (Georgia Institute of Technology, 2003)
      This paper explores the energy and delay issues that occur when some or all of the local storage is moved out of the embedded device, and into a remote network server. We demonstrate using the network to access remote ...
    • Synthesizing Representative I/O Workloads Using Iterative Distillation 

      Kurmas, Zachary Alan; Keeton, Kimberly; Mackenzie, Kenneth M. (Georgia Institute of Technology, 2003)
      Storage systems designers are still searching for better methods of obtaining representative I/O workloads to drive studies of I/O systems. Traces of production workloads are very accurate, but inflexible and difficult ...
    • Congestion-Driven Global Placement for Three Dimensional VLSI Circuits 

      Nanda, Vidit; Balakrishnan, Karthik; Ekpanyapong, Mongkol; Lim, Sung Kyu (Georgia Institute of Technology, 2003)
      The recent popularity of 3D IC technology stems from its enhanced performance capabilities and reduced wiring length. However, the problem of thermal dissipation is magnified due to the nature of these layered technologies. ...
    • Profile-Guided Microarchitectural Floorplanning for Deep Submicron Processor Design 

      Ekpanyapong, Mongkol; Minz, Jacob Rajkumar; Watewai, Thaisiri; Lee, Hsien-Hsin Sean; Lim, Sung Kyu (Georgia Institute of Technology, 2003)
      As process technology migrates to deep submicron with feature size less than 100nm, global wire delay is becoming a major hindrance in keeping the latency of intra-chip communication within a single cycle, thus decaying ...
    • Improving Peer to Peer Search With Multi-Tier Capability-Aware Overlay Topologies 

      Srivatsa, Mudhakar; Gedik, Bugra; Liu, Ling (Georgia Institute of Technology, 2003)
      The P2P model has many potential advantages (e.g., large scale, fault-tolerance, low cost of administration and maintenance) due to the design flexibility of overlay networks and the decentralized management of cooperative ...
    • SoftCache: A Technique for Power and Area Reduction in Embedded Systems 

      Fryman, Joshua Bruce; Lee, Hsien-Hsin Sean; Huneycutt, Chad Marcus; Farooqui, Naila F.; Mackenzie, Kenneth M.; Schimmel, D. E. (David E.) (Georgia Institute of Technology, 2003)
      Explicitly software managed cache systems are postulated as a solution for power considerations in computing devices. The savings expected in a SoftCache lies in the removal of tag storage, associativity logic, comparators, ...
    • Generating Perfect Reversals of Simple Linear-Codes 

      Perumalla, Kalyan S. (Georgia Institute of Technology, 2003)
      Bi-directional execution - executing forward as well as in reverse - is useful in many contexts. However, traditional techniques for bi-directional execution are not scalable, as they require infinite storage in the ...
    • GT ShareStreams Industry Products Addendum 

      Krishnamurthy, Rajaram B. (Georgia Institute of Technology, 2003)
      This report provides information on industry products used in the ShareStreams research project from Jan 2000 - May 2003 at Georgia Tech. This addendum is used with papers and reports pertaining to the ShareStreams research ...
    • Dynamic Differential Data Protection for High Performance and Pervasive Applications 

      Widener, Patrick M. (Patrick McCall); Schwan, Karsten (Georgia Institute of Technology, 2004)
      Modern distributed applications are long-lived, are expected to provide flexible and adaptive data services, and must meet the functionality and scalability challenges posed by dynamically changing user communities in ...
    • KStreams: Kernel Support for Efficient End-to-End Data Streaming 

      Kong, Jiantao; Schwan, Karsten (Georgia Institute of Technology, 2004)
      Technology advances are enabling increasingly data-intensive applications, ranging from peer-to-peer file sharing, to multimedia, to remote graphics and data visualization. One outcome is the considerable memory pressure ...
    • Middleware Guidelines for Future Sensor Networks 

      Wolenetz, Matthew David; Kumar, Rajnish; Shin, Junsuk; Ramachandran, Umakishore (Georgia Institute of Technology, 2004)
      In the near future, we envision sensor networks to transport high bandwidth, low latency streaming data from a variety of sources, such as cameras and microphones. Sensor networks will be called upon to perform sophisticated ...
    • Socket Buffer Auto-Sizing for High-Performance Data Transfers 

      Prasad, Ravi S.; Jain, Manish; Dovrolis, Constantinos (Georgia Institute of Technology, 2004)
      It is often claimed that TCP is not a suitable transport protocol for data intensive Grid applications in high-performance networks. We argue that this is not necessarily the case. Without changing the TCP protocol, ...
    • Processing Moving Queries over Moving Objects Using Motion Adaptive Indexes 

      Gedik, Bugra; Wu, Kun-Lung; Yu, Philip S.; Liu, Ling (Georgia Instiute of Technology, 2004)
      This paper describes a motion adaptive indexing scheme for efficient evaluation of moving queries (MQs) over moving objects. It uses the concept of motion-sensitive bounding boxes to model the dynamic behavior of both ...
    • Topk Queries across Multiple Private Databases 

      Xiong, Li; Chitti, Subramanyam B.; Liu, Ling (Georgia Institute of Technology, 2004)
      Advances in distributed service-oriented computing and global communications have formed a strong technology push for large scale data integration among organizations and enterprises. It is widely observed that multiple ...
    • Towards the Issues in Architectural Support for Protection of Software Execution 

      Shi, Weidong; Lee, Hsien-Hsin Sean; Lu, Chenghuai; Ghosh, Mrinmoy (Georgia Institute of Technology, 2004)
      Recently, there is a growing interest in the research community to employ tamper-resistant processors for software protection. Many of these proposed systems rely on a specially tailored secure processor to prevent 1) ...
    • Design of a Secure and Fault Tolerant Environment for Distributed Storage 

      Paul, Arnab; Adhikari, Sameer; Ramachandran, Umakishore (Georgia Institute of Technology, 2004)
      We discuss the design and evaluation of a secure and fault tolerant storage infrastructure for un-trusted distributed computing environments. Previous designs of storage systems for this space have tended to use decoupled ...
    • Eraser: An Exploit - Specific Monitor to Prevent Malicious Communication Channel 

      Singh, Abhishek (Georgia Institute of Technology, 2004)
      Prevention of malicious communication channel has been an important issue in building secure networked systems. Malicious Communication channel can be established by using header fields which follow particular semantics ...