Now showing items 144-163 of 193

    • Safe Region Techniques for Fast Spatial Alarm Evaluation 

      Bamba, Bhuvan; Liu, Ling; Iyengar, Arun; Yu, Philip S. (Georgia Institute of Technology, 2008)
      Spatial alarms are personalized location-based triggers installed by mobile users to serve as a reminder of a location of interest to be encountered in their future trips. Unlike continuous spatial queries, spatial ...
    • Scalable Access Control in Content-Based Publish-Subscribe Systems 

      Srivatsa, Mudhakar; Liu, Ling (Georgia Institute of Technology, 2006)
      Content-based publish-subscribe (pub-sub) systems are an emerging paradigm for building a large number of distributed systems. Access control in a pub-sub system refers to secure distribution of events to clients subscribing ...
    • Scalable Parametric Static Analysis 

      Zhang, Xin; Naik, Mayur; Yang, Hongseok (Georgia Institute of Technology, 2012)
      Parametric static analysis allows choosing a parameter value to balance the precision and cost of the instantiated analysis. We propose an efficient approach to either find a cheapest parameter value to prove a given ...
    • Scalable Simulation of Electromagnetic Hybrid Codes 

      Perumalla, Kalyan S.; Dave, Jagrut Durdant; Fujimoto, Richard M.; Karimabadi, Homa; Driscoll, Jonathan; Omelchenko, Yuri (Georgia Institute of Technology, 2005)
      New discrete-event formulations of physics simulation models are emerging that can outperform models based on traditional time-stepped techniques. Detailed simulation of the Earth s magnetosphere, for example, requires ...
    • A Secure Middleware Architecture for Web Services 

      Singaravelu, Lenin; Wei, Jinpeng; Pu, Calton (Georgia Institute of Technology, 2007)
      Current web service platforms (WSPs) often perform all web services related processing, including security-sensitive information handling, in the same protection domain. Consequently, the entire WSP may have access to ...
    • Security Refresh: Prevent Malicious Wear-out and Increase Durability for Phase-Change Memory with Dynamically Randomized Address Mapping 

      Seong, Nak Hee; Woo, Dong Hyuk; Lee, Hsien-Hsin S. (Georgia Institute of Technology, 2009-11)
      Phase-change Random Access Memory (PRAM) is an emerging memory technology for future computing systems. It is nonvolatile and has a faster read latency and potentially higher storage density than other memory alternatives. ...
    • Security vs Performance: Tradeoffs using a Trust Framework 

      Singh, Aameek; Voruganti, Kaladhar; Gopisetty, Sandeep; Pease, David; Duyanovich, Linda; Liu, Ling (Georgia Institute of Technology, 2004)
      We present an architecture of a trust framework that can be utilized to intelligently tradeoff between security and performance in a SAN file system. The primary idea is to differentiate between various clients in the ...
    • Self-Virtualized I/O: High Performance, Scalable I/O Virtualization in Multi-core Systems 

      Raj, Himanshu; Ganev, Ivan Borissov; Schwan, Karsten; Xenidis, Jimi (Georgia Institute of Technology, 2006)
      Virtualizing I/O subsystems and peripheral devices is an integral part of system virtualization. This paper advocates the notion of self-virtualized I/O (S-VIO). Specifically, it proposes a hypervisor-level abstraction ...
    • Shared Address Space I/O: A Novel I/O Approach for System-on-a-Chip Networking 

      Sun, Di-Shi; Blough, Douglas M. (Georgia Institute of Technology, 2004-02-19)
      For real-time system-on-a-chip (SoC) network applications, high-speed and low-latency network I/O is the key to achieve predictable execution and high performance. Existing network I/O approaches are either not directly ...
    • Simultaneous Delay and Power Optimization for Multi-level Partitioning and Floorplanning with Retiming 

      Ekpanyapong, Mongkol; Lim, Sung Kyu (Georgia Institute of Technology, 2003)
      Delay minimization and power minimization are two important objectives in the design of the high-performance, portable, and wireless computing and communication systems. Retiming is a very effective way for delay optimization ...
    • The Sleepy Keeper Approach: Methodology, Layout and Power Results for a 4-bit Adder 

      Kim, Se Hun; Mooney, Vincent John, III (Georgia Institute of Technology, 2006)
      For the most recent CMOS feature sizes (e.g., 90nm and 65nm), leakage power dissipation has become an overriding concern for VLSI circuit designers. ITRS reports that leakage power dissipation may come to dominate total ...
    • SOAP-binQ: High Performance SOAP with Continuous Quality Management 

      Seshasayee, Balasubramanian; Schwan, Karsten; Widener, Patrick M. (Patrick McCall) (Georgia Institute of Technology, 2003)
      There is substantial interest in using SOAP (Simple Object Access Protocol) in distributed applications' inter-process communications due to its promise of universal interoperability. The utility of SOAP is limited, however, ...
    • Socket Buffer Auto-Sizing for High-Performance Data Transfers 

      Prasad, Ravi S.; Jain, Manish; Dovrolis, Constantinos (Georgia Institute of Technology, 2004)
      It is often claimed that TCP is not a suitable transport protocol for data intensive Grid applications in high-performance networks. We argue that this is not necessarily the case. Without changing the TCP protocol, ...
    • SoftCache: A Technique for Power and Area Reduction in Embedded Systems 

      Fryman, Joshua Bruce; Lee, Hsien-Hsin Sean; Huneycutt, Chad Marcus; Farooqui, Naila F.; Mackenzie, Kenneth M.; Schimmel, D. E. (David E.) (Georgia Institute of Technology, 2003)
      Explicitly software managed cache systems are postulated as a solution for power considerations in computing devices. The savings expected in a SoftCache lies in the removal of tag storage, associativity logic, comparators, ...
    • SoftCache: Dynamic Optimizations for Power and Area Reduction in Embedded Systems (II) 

      Fryman, Joshua Bruce; Lee, Hsien-Hsin Sean; Huneycutt, Chad Marcus (Georgia Institute of Technology, 2005)
      We propose a SoftCache for low-power and reduced die area while providing application flexibility. Our implementations demonstrate that the network is a power efficient means for accessing remote memory. The impact of this ...
    • Software Behavior: Automatic Classification and its Applications 

      Bowring, James Frederick; Rehg, James Matthew; Harrold, Mary Jean (Georgia Institute of Technology, 2003)
      A program's behavior is ultimately the collection of all its executions. This collection is diverse, unpredictable, and generally unbounded. Thus it is especially suited to statistical analysis and machine learning techniques. ...
    • SPA: Symbolic Program Approximation for Scalable Path-sensitive Analysis 

      Harrold, Mary Jean; Santelices, Raul (Georgia Institute of Technology, 2009)
      Symbolic execution is a static-analysis technique that has been used for applications such as test-input generation and change analysis. Symbolic execution’s path sensitivity makes scaling it difficult. Despite recent ...
    • Spatial Alarm Processing and Algorithms 

      Doo, Myungcheol; Liu, Ling (Georgia Institute of Technology, 2011)
      One of the most challenging problems in scaling spatial alarm processing is to compute alarm free regions (AFR) such that mobile objects traveling within an AFR can safely hibernate the alarm evaluation process until ...
    • A SpatioTemporal Placement Model for Caching Location Dependent Queries 

      Murugappan, Anand; Liu, Ling (Georgia Institute of Technology, 2007)
      Client side caching of location dependent queries is an important technique for improving performance of location-based services. Most of the existing research in this area has focused on cache replacement and invalidation ...
    • Speculative Execution on Multi-GPU Systems 

      Diamos, Gregory; Yalamanchili, Sudhakar (Georgia Institute of Technology, 2009)
      The lag of parallel programming models and languages behind the advance of heterogeneous many-core processors has left a gap between the computational capability of modern systems and the ability of applications to ...