Now showing items 184-203 of 488

    • Half-Baked Cookies: Client Authentication on the Modern Web 

      Mundada, Yogesh; Feamster, Nick; Krishnamurthy, Balachander; Guha, Saikat; Levin, Dave (Georgia Institute of Technology, 2014)
      Modern websites set multiple authentication cookies during the login process to allow users to remain authenticated over the duration of a web session. Web applications use cookie-based authentication to provide different ...
    • Hardware/Software Deadlock Detection Algorithm and Implementation 

      Shiu, Pun Hang (Georgia Institute of Technology, 2002)
      This report introduces a new theorem and its proof about the problem of deadlock detection. First, we examine how to represent the problem of deadlock with a directed graph. Then, translation from a directed graph into a ...
    • Hashing-Based Traffic Splitting Algorithms for Internet Load Balancing 

      Cao, Zhiruo; Wang, Zheng; Zegura, Ellen W. (Georgia Institute of Technology, 1999)
      Replication of resources is a key technique for improving Internet performance. Effective use of replicated resources requires good load distribution schemes. We study the performance of several hashing schemes for ...
    • Hello, Are You Human? 

      Xu, Jun; Essa, Irfan A.; Lipton, Richard J. (Georgia Institute of Technology, 2000)
      In this paper, we propose the concept of a humanizer and explore its applications in network security and E-commerce. A humanizer is a novel authentication scheme that asks the question "are you human?" (instead of ...
    • Hierarchical Power Management in Disruption Tolerant Networks with Traffic-Aware Optimization 

      Jun, Hyewon; Ammar, Mostafa H. (Mostafa Hamed); Corner, Mark D.; Zegura, Ellen W. (Georgia Institute of Technology, 2006)
      Disruption tolerant networks (DTNs) are wireless mobile networks that are characterized by frequent partitions and long delays. Such networks can be used in highly-challenged environment in which energy resources are ...
    • Hierarchical Power Optimization for System-on-a-Chip (SoC)through CMOS Technology Scaling 

      Choi, Kyu-Won; Chatterjee, Abhijit (Georgia Institute of Technology, 2002)
      This report describes an efficient hierarchical design and optimization approach for ultra-low power and minimum area CMOS logic circuits in a system-on-a-chip (SoC) design environment. For state of the art systems, ...
    • Horizon-based Value Iteration 

      Zang, Peng; Irani, Arya; Isbell, Charles Lee, Jr. (Georgia Institute of Technology, 2007)
      We present a horizon-based value iteration algorithm called Reverse Value Iteration (RVI). Empirical results on a variety of domains, both synthetic and real, show RVI often yields speedups of several orders of magnitude. ...
    • How Changes Are Reflected in a Software Architecture 

      Busse, Dave (Georgia Institute of Technology, 1995)
      This paper briefly explores what happens to a Software Architecture during maintenance. Or more specifically, when changes are made to an existing system that have a system wide impact, are these changes always reflected ...
    • How to Lease the Internet in Your Spare Time 

      Feamster, Nick; Gao, Lixin; Rexford, Jennifer (Georgia Institute of Technology, 2006)
      Today's Internet Service Providers (ISPs) serve two roles: managing their network infrastructure and providing (arguably limited) services to end users. We argue that coupling these roles impedes the deployment of new ...
    • HPerf: A Lightweight Profiler for Task Distribution on CPU+GPU Platforms 

      Lee, Joo Hwan; Nigania, Nimit; Kim, Hyesoon; Brett, Bevin (Georgia Institute of Technology, 2015)
      Heterogeneous computing has emerged as one of the major computing platforms in many domains. Although there have been several proposals to aid programming for heterogeneous computing platforms, optimizing applications on ...
    • I Own, I Provide, I Decide: Generalized User-Centric Access Control Framework for Web Applications 

      Singh, Kapil; Erete, Ikpeme; Lee, Wenke (Georgia Institute of Technology, 2010)
      With the rapid growth of Web 2.0 technologies, users are contributing more and more content on the Internet, in the form of user profiles, blogs, reviews, etc. With this increased sharing comes a pressing need for access ...
    • IC-Cloud: Computation Offloading to an Intermittently-Connected Cloud 

      Shi, Cong; Pandurangan, Pranesh; Ni, Kangqi; Yang, Juyuan; Ammar, Mostafa; Naik, Mayur; Zegura, Ellen (Georgia Institute of Technology, 2013)
      Offloading computation-intensive components of mobile applications to the cloud is of great potential to speedup the execution and reduce the energy consumption for mobile devices. The gain from computation offloading ...
    • ICCCN '96 published/short version Increasing Demultiplexing Efficiency in TCP/IP Network Servers 

      Dixon, Joseph T.; Calvert, Kenneth L. (Georgia Institute of Technology, 1996)
      This paper shows how software caches and hashing to multiple PCB (protocol control block) lists can increase demultiplexing efficiency in TCP/IP network server hosts. We implemented six algorithms and ...
    • Illustration, Explanation and Navigation of Physical Devices and Design Processes 

      Grue, Nathalie (Georgia Institute of Technology, 1994)
      This work addresses three issues in intelligent tutoring systems. First, how to explain and illustrate the functioning of physical devices. This capability is useful for understanding and using past designs. The second ...
    • Image Mining: A New Approach for Data Mining 

      Ordońẽz, Carlos; Omiecinski, Edward Robert (Georgia Institute of Technology, 1998)
      We introduce a new focus for data mining, which is concerned with knowledge discovery in image databases. We expect all aspects of data mining to be relevant to image mining but in this first work we concentrate on the ...
    • The Impact Of Data Placement Strategies On Reorganization Costs In Parallel Databases 

      Achyutuni, Kiran Jyotsna; Omiecinski, Edward Robert; Navathe, Shamkant B. (Georgia Institute of Technology, 1995)
      In this paper, we study the data placement problem from a reorganization point of view. Effective placement of the declustered fragments of a relation is crucial to the performance of parallel database systems having ...
    • Implementation of Scalable Blocking Locks using an Adaptative Thread Scheduler 

      Mukherjee, Bodhisattwa; Schwan, Karsten (Georgia Institute of Technology, 1993)
      Blocking locks are commonly used in parallel programs to improve application performance and system throughput. However, most implementations of such locks suffer from two major problems -- latency and scalability. In ...
    • Implementing and Programming Weakly Consistent Memories 

      John, Ranjit (Georgia Institute of Technology, 1995)
      A distributed operating system should provide abstractions that make it easy to program applications, provide good performance and allow applications to scale. Operating systems structured around message passing kernels ...
    • Implementing Protocols in Java: The Price of Portability 

      Krupczak, Bobby; Ammar, Mostafa H. (Mostafa Hamed) (Georgia Institute of Technology, 1997)
      As the number and variety of Web- and network-based applications continues to increase, so does the need for flexible communication protocols and services to support them. Traditionally, a major impediment to deployment of ...
    • Implicit Quality Channels (IQC): Distributed Quality Management for Multi-Party Real-Time Applications 

      Poellabauer, Christian; Schwan, Karsten (Georgia Institute of Technology, 2001)
      Multi-party, interactive multimedia (MIM) applications pose challenges for resource management due to their simultaneous use of multiple media and their heterogeneous, distributed, and potentially large numbers ...