Now showing items 76-95 of 193

    • Fast and Accurate Link Discovery Integrated with Reliable Multicast in 802.11 

      Lertpratchya, Daniel; Blough, Douglas M.; Riley, George F. (Georgia Institute of Technology, 2013)
      Abstract—Maintaining accurate neighbor information in wireless networks is an important operation upon which many higher layer protocols rely. However, this operation is not supported in the IEEE 802.11 MAC layer, ...
    • Fast, Lightweight Virtual Machine Checkpointing 

      Sun, Michael H.; Blough, Douglas M. (Georgia Institute of Technology, 2010)
      Virtual machine checkpoints provide a clean encapsulation of the full state of an executing system. Due to the large nature of state involved, the process of VM checkpoints can be slow and costly. We describe the ...
    • File-based Race Condition Attacks on Multiprocessors Are Practical Threat 

      Wei, Jinpeng; Pu, Calton (Georgia Institute of Technology, 2006)
      TOCTTOU (Time-of-Check-to-Time-of-Use) attacks exploit race conditions in file systems. Although TOCTTOU attacks have been known for 30 years, they have been considered "low risk" due to their typically low probability of ...
    • A Floorplan-Aware Dynamic Inductive Noise Controller for Reliable 2D and 3D Microprocessors 

      Mohamood, Fayez; Healy, Michael; Lim, Sung Kyu; Lee, Hsien-Hsin Sean (Georgia Institute of Technology, 2006)
      Power delivery is a growing reliability concern in microprocessors as the industry moves toward feature-rich, power-hungrier designs. To battle the ever-aggravating power consumption, modern microprocessor designers or ...
    • Fountain Broadcast for Wireless Sensor Networks 

      Kumar, Rajnish; Paul, Arnab; Ramachandran, Umakishore (Georgia Institute of Technology, 2005)
      Code dissemination in wireless ad hoc network is an important aspect of network deployment. Once deployed, the network nodes may still need software updates to keep up with the changing application demand, thus making ...
    • Generating Perfect Reversals of Simple Linear-Codes 

      Perumalla, Kalyan S. (Georgia Institute of Technology, 2003)
      Bi-directional execution - executing forward as well as in reverse - is useful in many contexts. However, traditional techniques for bi-directional execution are not scalable, as they require infinite storage in the ...
    • GeoCast: An Efficient Overlay System for Multicast Applications 

      Liu, Ling; Pu, Calton; Wang, Yuehua; Zhang, Gong (Georgia Institute of Technology, 2009)
      In this paper, we present GeoCast, a geographical location aware overlay network framework designed for providing efficient group communication services. GeoCast can be seen as an extension to the CAN network in the term ...
    • Global Placement for Quantum-dot Cellular Automata Based Circuits 

      Nguyen, Jean; Ravichandran, Ramprasad; Lim, Sung Kyu; Niemier, Michael Thaddeus (Georgia Institute of Technology, 2003)
      Quantum Cellular Automata (QCA) has been proposed as an alternative architecture to CMOS and in principle should permit the implementation of ultra lower-power, nano-scale logic circuitry working at teraflop frequency. QCA ...
    • Global Routing for Three Dimensional Packaging 

      Minz, Jacob Rajkumar; Lim, Sung Kyu (Georgia Institute of Technology, 2003)
      Three dimensional packaging is becoming a popular concept because of the numerous advantages it has to offer over the existing conventional technologies. System on Packages (SOP) is an example of three dimensional packaging. ...
    • Global Routing Paradigm for System-on-Package 

      Minz, Jacob Rajkumar; Pathak, Mohit; Lim, Sung Kyu (Georgia Institute of Technology, 2003)
      The true potential of three dimensional System-On-Package (SOP) technology lies in its capability to integrate both active and passive components into a single high speed/density multi-layer packaging substrate. We propose ...
    • GRUBJOIN: An Adaptive Multi-Way Windowed Stream Join with Time Correlation-Aware CPU Load Shedding 

      Gedik, Bugra; Wu, Kun-Lung; Yu, Philip S.; Liu, Ling (Georgia Institute of Technology, 2005)
      Dropping tuples has been commonly used for load shedding. However, tuple dropping generally is inadequate to shed load for multiway windowed stream joins. The output rate can be unnecessarily and severely degraded because ...
    • GT ShareStreams Industry Products Addendum 

      Krishnamurthy, Rajaram B. (Georgia Institute of Technology, 2003)
      This report provides information on industry products used in the ShareStreams research project from Jan 2000 - May 2003 at Georgia Tech. This addendum is used with papers and reports pertaining to the ShareStreams research ...
    • Hardware Supported Anomaly Detection: down to the Control Flow Level 

      Zhang, Tao; Zhuang, Xiaotong; Pande, Santosh; Lee, Wenke (Georgia Institute of Technology, 2004-03-10)
      Modern computer systems are plagued with security flaws, making them vulnerable to various malicious attacks. Intrusion detection systems have been proposed to protect computer systems from unauthorized penetration. Detecting ...
    • HIDE: Hardware-support for Leakage-Immune Dynamic Execution 

      Zhuang, Xiaotong; Zhang, Tao; Pande, Santosh; Lee, Hsien-Hsin Sean (Georgia Institute of Technology, 2003)
      Secure processors have been recently introduced, which enable new applications involving software anti-piracy, program execution certification, and secure mobile agents. Secure processors have built-in hardware support for ...
    • High Speed Memory Centric Protection on Software Execution Using One-Time-Pad Prediction 

      Shi, Weidong; Lee, Hsien-Hsin Sean; Lu, Chenghuai; Ghosh, Mrinmoy (Georgia Institute of Technology, 2004-07-23)
      This paper presents a new security model for protecting software confidentiality. Different from the previous process-centric systems designed for the same purpose, the new model ties cryptographic properties and security ...
    • High-Fidelity Modeling of Computer Network Worms 

      Perumalla, Kalyan S.; Sundaragopalan, Srikanth (Georgia Institute of Technology, 2004-06-23)
      Abstract modeling, such as using epidemic models, has been the general method of choice for understanding and analyzing the high-level effects of worms. However, high-fidelity models, such as packet-level models, are ...
    • A Hybrid Access Model for Storage Area Networks 

      Singh, Aameek; Voruganti, Kaladhar; Gopisetty, Sandeep; Pease, David; Liu, Ling (Georgia Institute of Technology, 2004)
      We present HSAN - a hybrid storage area network, which uses both in-band (like NFS) and out-of-band virtualization (like SAN FS) access models. Using hybrid servers that can serve as both metadata and NAS servers, HSAN ...
    • A HyperTransport-Enabled Global Memory Model For Improved Memory Efficiency 

      Young, Jeffrey; Yalamanchili, Sudhakar; Silla, Federico; Duato, José (Georgia Institute of Technology, 2008)
      Modern and emerging data centers are presenting unprecedented demands in terms of cost and energy consumption, far outpacing architectural advances related to economies of scale. Consequently, blade designs exhibit ...
    • I-Queue: Smart Queues for Service Management 

      Mansour, Mohamed S.; Schwan, Karsten; Abdelaziz, Sameh (Georgia Institute of Technology, 2006)
      Modern enterprise applications and systems are characterized by complex underlying software structures, constantly evolving feature sets, and frequent changes in the data on which they operate. The dynamic nature of these ...
    • ILP-based Supply and Threshold Voltage Assignment For Total Power Minimization 

      Ekpanyapong, Mongkol; Korkmaz, Pinar; Lim, Sung Kyu (Georgia Institute of Technology, 2007)
      In this paper we present an ILP-based method to simultaneously assign supply and threshold voltages to individual gates for dynamic and leakage power minimization. In our three-step approach, low power min-flipflop (FF) ...