Now showing items 139-158 of 193

    • Rate Control for Threads in Streaming Applications 

      Mandviwala, Hasnain A.; Harel, Nissim; Ramachandran, Umakishore; Knobe, Kathleen (Georgia Institute of Technology, 2004-04-06)
      A large emerging class of interactive multimedia streaming applications can be represented as a coarse-grain, pipelined, dataflow graph. Such applications are ideal candidates for execution on a high-performance cluster. ...
    • Reasoning about Time, Location, and Identity in Distributed Pervasive Computing 

      Adhikari, Sameer; Ramachandran, Umakishore (Georgia Institute of Technology, 2004)
      To become a reality Pervasive Computing, among other things, needs new kinds of middleware. In this paper we present an important middleware that helps pervasive computing applications reason about events using time, ...
    • A Recovery Conscious Framework for Fault Resilient Storage Systems 

      Seshadri, Sangeetha; Liu, Ling; Chiu, Lawrence; Constantinescu, Cornel; Balachandran, Subashini (Georgia Institute of Technology, 2007)
      In this paper we present a recovery-conscious framework for improving the fault resiliency and recovery efficiency of highly concurrent embedded storage software systems. Our framework consists of a three-tier architecture ...
    • Redactable Signatures on Data with Dependencies 

      Bauer, David; Blough, Douglas M.; Mohan, Apurva (Georgia Institute of Technology, 2009)
      The storage of personal information by service providers entails a significant risk of privacy loss due to data breaches. One way to mitigate this problem is to limit the amount of personal information that is provided. ...
    • Reliable End System Multicasting with a Heterogeneous Overlay Network 

      Zhang, Jianjun; Liu, Ling; Pu, Calton; Ammar, Mostafa H. (Mostafa Hamed) (Georgia Institute of Technology, 2004-05-03)
      This paper presents PeerCast, a reliable and self-configurable peer to peer system for End System Multicast (ESM). Our approach has three unique features compared with existing approaches to application-level multicast ...
    • Safe Region Techniques for Fast Spatial Alarm Evaluation 

      Bamba, Bhuvan; Liu, Ling; Iyengar, Arun; Yu, Philip S. (Georgia Institute of Technology, 2008)
      Spatial alarms are personalized location-based triggers installed by mobile users to serve as a reminder of a location of interest to be encountered in their future trips. Unlike continuous spatial queries, spatial ...
    • Scalable Access Control in Content-Based Publish-Subscribe Systems 

      Srivatsa, Mudhakar; Liu, Ling (Georgia Institute of Technology, 2006)
      Content-based publish-subscribe (pub-sub) systems are an emerging paradigm for building a large number of distributed systems. Access control in a pub-sub system refers to secure distribution of events to clients subscribing ...
    • Scalable Parametric Static Analysis 

      Zhang, Xin; Naik, Mayur; Yang, Hongseok (Georgia Institute of Technology, 2012)
      Parametric static analysis allows choosing a parameter value to balance the precision and cost of the instantiated analysis. We propose an efficient approach to either find a cheapest parameter value to prove a given ...
    • Scalable Simulation of Electromagnetic Hybrid Codes 

      Perumalla, Kalyan S.; Dave, Jagrut Durdant; Fujimoto, Richard M.; Karimabadi, Homa; Driscoll, Jonathan; Omelchenko, Yuri (Georgia Institute of Technology, 2005)
      New discrete-event formulations of physics simulation models are emerging that can outperform models based on traditional time-stepped techniques. Detailed simulation of the Earth s magnetosphere, for example, requires ...
    • A Secure Middleware Architecture for Web Services 

      Singaravelu, Lenin; Wei, Jinpeng; Pu, Calton (Georgia Institute of Technology, 2007)
      Current web service platforms (WSPs) often perform all web services related processing, including security-sensitive information handling, in the same protection domain. Consequently, the entire WSP may have access to ...
    • Security Refresh: Prevent Malicious Wear-out and Increase Durability for Phase-Change Memory with Dynamically Randomized Address Mapping 

      Seong, Nak Hee; Woo, Dong Hyuk; Lee, Hsien-Hsin S. (Georgia Institute of Technology, 2009-11)
      Phase-change Random Access Memory (PRAM) is an emerging memory technology for future computing systems. It is nonvolatile and has a faster read latency and potentially higher storage density than other memory alternatives. ...
    • Security vs Performance: Tradeoffs using a Trust Framework 

      Singh, Aameek; Voruganti, Kaladhar; Gopisetty, Sandeep; Pease, David; Duyanovich, Linda; Liu, Ling (Georgia Institute of Technology, 2004)
      We present an architecture of a trust framework that can be utilized to intelligently tradeoff between security and performance in a SAN file system. The primary idea is to differentiate between various clients in the ...
    • Self-Virtualized I/O: High Performance, Scalable I/O Virtualization in Multi-core Systems 

      Raj, Himanshu; Ganev, Ivan Borissov; Schwan, Karsten; Xenidis, Jimi (Georgia Institute of Technology, 2006)
      Virtualizing I/O subsystems and peripheral devices is an integral part of system virtualization. This paper advocates the notion of self-virtualized I/O (S-VIO). Specifically, it proposes a hypervisor-level abstraction ...
    • Shared Address Space I/O: A Novel I/O Approach for System-on-a-Chip Networking 

      Sun, Di-Shi; Blough, Douglas M. (Georgia Institute of Technology, 2004-02-19)
      For real-time system-on-a-chip (SoC) network applications, high-speed and low-latency network I/O is the key to achieve predictable execution and high performance. Existing network I/O approaches are either not directly ...
    • Simultaneous Delay and Power Optimization for Multi-level Partitioning and Floorplanning with Retiming 

      Ekpanyapong, Mongkol; Lim, Sung Kyu (Georgia Institute of Technology, 2003)
      Delay minimization and power minimization are two important objectives in the design of the high-performance, portable, and wireless computing and communication systems. Retiming is a very effective way for delay optimization ...
    • The Sleepy Keeper Approach: Methodology, Layout and Power Results for a 4-bit Adder 

      Kim, Se Hun; Mooney, Vincent John, III (Georgia Institute of Technology, 2006)
      For the most recent CMOS feature sizes (e.g., 90nm and 65nm), leakage power dissipation has become an overriding concern for VLSI circuit designers. ITRS reports that leakage power dissipation may come to dominate total ...
    • SOAP-binQ: High Performance SOAP with Continuous Quality Management 

      Seshasayee, Balasubramanian; Schwan, Karsten; Widener, Patrick M. (Patrick McCall) (Georgia Institute of Technology, 2003)
      There is substantial interest in using SOAP (Simple Object Access Protocol) in distributed applications' inter-process communications due to its promise of universal interoperability. The utility of SOAP is limited, however, ...
    • Socket Buffer Auto-Sizing for High-Performance Data Transfers 

      Prasad, Ravi S.; Jain, Manish; Dovrolis, Constantinos (Georgia Institute of Technology, 2004)
      It is often claimed that TCP is not a suitable transport protocol for data intensive Grid applications in high-performance networks. We argue that this is not necessarily the case. Without changing the TCP protocol, ...
    • SoftCache: A Technique for Power and Area Reduction in Embedded Systems 

      Fryman, Joshua Bruce; Lee, Hsien-Hsin Sean; Huneycutt, Chad Marcus; Farooqui, Naila F.; Mackenzie, Kenneth M.; Schimmel, D. E. (David E.) (Georgia Institute of Technology, 2003)
      Explicitly software managed cache systems are postulated as a solution for power considerations in computing devices. The savings expected in a SoftCache lies in the removal of tag storage, associativity logic, comparators, ...
    • SoftCache: Dynamic Optimizations for Power and Area Reduction in Embedded Systems (II) 

      Fryman, Joshua Bruce; Lee, Hsien-Hsin Sean; Huneycutt, Chad Marcus (Georgia Institute of Technology, 2005)
      We propose a SoftCache for low-power and reduced die area while providing application flexibility. Our implementations demonstrate that the network is a power efficient means for accessing remote memory. The impact of this ...