Now showing items 1-20 of 193

    • Adaptive Cache Placement for Scientific Computation 

      Ramaswamy, Subramanian; Yalamanchili, Sudhakar (Georgia Institute of Technology, 2007)
      The central data structures for many applications in scientific computing are large multidimensional arrays. These arrays dominate memory accesses and are often accessed with strides that vary across orthogonal dimensions ...
    • Adaptive Load Shedding for Windowed Stream Joins 

      Gedik, Bugra; Wu, Kun-Lung; Yu, Philip S.; Liu, Ling (Georgia Institute of Technology, 2005)
      We present an adaptive load shedding approach for windowed stream joins. In contrast to the conventional approach of dropping tuples from the input streams, we explore the concept of selective processing for load shedding, ...
    • Adaptive Transaction Scheduling for Transactional Memory Systems 

      Yoo, Richard M.; Lee, Hsien-Hsin Sean (Georgia Institute of Technology, 2007)
      Transactional memory systems are expected to enable parallel programming at lower programming complexity, while delivering improved performance over traditional lock-based systems. Nonetheless, we observed that there are ...
    • Agyaat: Providing Mutually Anonymous Services over Structured P2P Networks 

      Singh, Aameek; Liu, Ling (Georgia Institute of Technology, 2004-03-23)
      In the modern era of ubiquitous computing, privacy is one of the most critical user concerns. To prevent their privacy, users typically, try to remain anonymous to the service provider. This is especially true for decentralized ...
    • The AM-Bench: An Android Multimedia Benchmark Suite 

      Lee, Chayong; Kim, Euna; Kim, Hyesoon (Georgia Institute of Technology, 2012)
      Despite the significant evolution of mobile devices and the increased use of mobile devices, not many mobile benchmarks have been studied. Even though mobile applications share similar characteristics with traditional ...
    • Analysis of a Redactable Signature Scheme on Data With Dependencies 

      Bauer, David; Blough, Douglas M. (Georgia Institute of Technology, 2009)
      Storage of personal information by service providers risks privacy loss from data breaches. Our prior work on minimal disclosure credentials presented a mechanism to limit the amount of personal information provided. ...
    • Applying Aggressive Propagation-based Strategies for Testing Changes 

      Santelices, Raul; Harrold, Mary Jean (Georgia Institute of Technology, 2010)
      Test-suite augmentation for evolving software— the process of augmenting a test suite to adequately test software changes—is necessary for any program that undergoes modifications as part of its development and ...
    • An Approach for Fault Tolerant and Secure Data Storage in Collaborative Work Environments 

      Subbiah, Arun; Blough, Douglas M. (Georgia Institute of Technology, 2005)
      We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments. In such environments, sensitive data must be accessible only to a select group of people, whose ...
    • An Approach Towards Enabling Intelligent Networking Services for Distributed Multimedia Applications 

      Sundaragopalan, Srikanth; Gavrilovska, Ada; Kumar, Sanjay; Schwan, Karsten (Georgia Institute of Technology, 2005)
      An increase in network speeds and addition of new services in the Internet has increased the demand for intelligence and flexibility in network systems. This paper explores the extent to which an emergent class of programmable ...
    • Architecture Support for High Speed Protection of Memory Integrity and Confidentiality in Symmetric Multiprocessor Systems 

      Shi, Weidong; Lee, Hsien-Hsin Sean; Ghosh, Mrinmoy; Lu, Chenghuai; Zhang, Tao (Georgia Institute of Technology, 2004-06-01)
      Recently there is a growing interest in both the architecture and the security community to create a hardware based solution for authenticating system memory. As shown in the previous work, such silicon based memory ...
    • Authentication of Freshness for OutsourcedMulti-Version Key-Value Stores 

      Tang, Yuzhe; Wang, Ting; Hu, Xin; Jang, Jiyong; Liu, Ling; Pietzuch, Peter (Georgia Institute of Technology, 2014)
      Data outsourcing offers cost-effective computing power to manage massive data streams and reliable access to data. For example, data owners can forward their data to clouds, and the clouds provide data mirroring, backup, ...
    • Authentication Protocols Making Use of Context Free Grammar: Guessing Strings 

      Singh, Abhishek; Dagon, David; Dos Santos, Andre Luiz Moura (Georgia Institute of Technology, 2004-07-13)
      Until now context free grammars (CFG) have been used mainly for the design of programming languages. There have been several studies, which demonstrate the relationship between learning theory and number theory. This paper ...
    • Automated Concolic Testing of Smartphone Apps 

      Anand, Saswat; Naik, Mayur; Yang, Hongseok; Harrold, Mary Jean (Georgia Institute of Technology, 2012)
      We present an algorithm and a system for generating input events to exercise smartphone apps. Our approach is based on concolic testing and generates sequences of events automatically and systematically. It alleviates ...
    • Automatic Placement for Quantum Cell Automata 

      Ravichandran, Ramprasad; Ladiwala, Nihal Sanjay; Nguyen, Jean; Lim, Sung Kyu; Niemier, Michael Thaddeus (Georgia Institute of Technology, 2003)
      Quantum-dot Cellular Automata (QCA) is a novel computing mechanism that can represent binary information based on spatial distribution of electron charge configuration in chemical molecules. It has the potential to allow ...
    • Automatic Verification of Safety and Liveness for XScale-Like Processor Models Using WEB-Refinements 

      Manolios, Panagiotis; Srinivasan, Sudarshan Kumar (Georgia Institute of Technology, 2003)
      We show how to automatically verify that a complex XScale-like pipelined machine model is a WEB-refinement of an instruction set architecture model, which implies that the machines satisfy the same safety and liveness ...
    • Automating Provisioning of Complete Software Stack in a Grid Environment 

      Agarwalla, Bikash; Talwar, Vanish; Basu, Sujoy; Kumar, Rajnish (Georgia Institute of Technology, 2004-07-18)
      With scaling of data centers, clusters, and grids, it is going to be increasingly difficult to download, configure, install, update, and manage the software stack on the constituent nodes. Automation of this process is ...
    • Autonomic Information Flows 

      Schwan, Karsten; Cooper, Brian F.; Eisenhauer, Greg Stephen; Gavrilovska, Ada; Wolf, Matthew; Abbasi, Hasan; Agarwala, Sandip; Cai, Zhongtang; Kumar, Vibhore; Lofstead, Jay; Mansour, Mohamed S.; Seshasayee, Balasubramanian; Widener, Patrick M. (Patrick McCall) (Georgia Institute of Technology, 2005)
      Today's enterprise systems and applications implement functionality that is critical to the ability of society to function. These complex distributed applications, therefore, must meet dynamic criticality objectives even ...
    • BugRedux: Reproducing Field Failures for In-house Debugging 

      Jin, Wei; Orso, Alessandro (Georgia Institute of Technology, 2011)
      When a software system fails in the field, on a user machine, and the failure is reported to the developers, developers in charge of debugging the failure must be able to reproduce the failing behavior in house. ...
    • Camouflage: Automated Sanitization of Field Data 

      Clause, James; Orso, Alessandro (Georgia Institute of Technology, 2009)
      Privacy and security concerns have adversely affected the usefulness of many types of techniques that leverage information gathered from deployed applications. To address this issue, we present a new approach for ...
    • CCM: Scalable, On-Demand Compute Capacity Management for Cloud Datacenters 

      Kesavan, Mukil; Ahmad, Irfan; Krieger, Orran; Soundararajan, Ravi; Gavrilovska, Ada; Schwan, Karsten (Georgia Institute of Technology, 2013)
      We present CCM (Cloud Capacity Manager) – a prototype system, and, methods for dynamically multiplexing the compute capacity of cloud datacenters at scales of thousands of machines, for diverse workloads with variable ...