Now showing items 94-113 of 193

    • I-Queue: Smart Queues for Service Management 

      Mansour, Mohamed S.; Schwan, Karsten; Abdelaziz, Sameh (Georgia Institute of Technology, 2006)
      Modern enterprise applications and systems are characterized by complex underlying software structures, constantly evolving feature sets, and frequent changes in the data on which they operate. The dynamic nature of these ...
    • ILP-based Supply and Threshold Voltage Assignment For Total Power Minimization 

      Ekpanyapong, Mongkol; Korkmaz, Pinar; Lim, Sung Kyu (Georgia Institute of Technology, 2007)
      In this paper we present an ILP-based method to simultaneously assign supply and threshold voltages to individual gates for dynamic and leakage power minimization. In our three-step approach, low power min-flipflop (FF) ...
    • Impact of Multi-level Clustering on Performance Driven Global Placement 

      Balakrishnan, Karthik; Nanda, Vidit; Ekpanyapong, Mongkol; Lim, Sung Kyu (Georgia Institute of Technology, 2003)
      Delay and wirelength minimization continue to be important objectives in the design of high-performance computing systems. For large-scale circuits, the clustering process becomes essential for reducing the problem size. ...
    • Improving Cache Efficiency via Resizing + Remapping 

      Ramaswamy, Subramanian; Yalamanchili, Sudhakar (Georgia Institute of Technology, 2007)
      In this paper we propose techniques to dynamically downsize or upsize a cache accompanied by cache set/line shutdown to produce efficient caches. Unlike previous approaches, resizing is accompanied by a non-uniform ...
    • Improving Peer to Peer Search With Multi-Tier Capability-Aware Overlay Topologies 

      Srivatsa, Mudhakar; Gedik, Bugra; Liu, Ling (Georgia Institute of Technology, 2003)
      The P2P model has many potential advantages (e.g., large scale, fault-tolerance, low cost of administration and maintenance) due to the design flexibility of overlay networks and the decentralized management of cooperative ...
    • Improving the Classification of Software Behaviors using Ensembles 

      Bowring, James Frederick; Harrold, Mary Jean; Rehg, James Matthew (Georgia Institute of Technology, 2005)
      One approach to the automatic classification of program behaviors is to view these behaviors as the collection of all the program's executions. Many features of these executions, such as branch profiles, can be measured, ...
    • Intelligent Cache Management by Exploiting Dynamic UTI/MTI Behavior 

      Fryman, Joshua Bruce; Huneycutt, Chad Marcus; Snyder, Luke Aron; Loh, Gabriel H.; Lee, Hsien-Hsin Sean (Georgia Institute of Technology, 2005)
      This work addresses the problem of the increasing performance disparity between the microprocessor and memory subsystem. Current L1 caches fabricated in deep submicron processes must either shrink to maintain timing, or ...
    • IQ-Paths: Self-regulating Data Streams across Network Overlays 

      Cai, Zhongtang; Kumar, Vibhore; Schwan, Karsten (Georgia Institute of Technology, 2006)
      Overlay networks have been shown useful for improving the delivery of network and processing resources to applications, in part due to their ability to use alternate or parallel network paths and computational resources. ...
    • IQ-Services: Network-Aware Middleware for Interactive Large-Data Applications 

      Cai, Zhongtang; Eisenhauer, Greg Stephen; He, Qi; Kumar, Vibhore; Schwan, Karsten; Wolf, Matthew (Georgia Institute of Technology, 2004)
      IQ-Services are application-specific, resource-aware code modules executed by data transport middleware. They constitute a 'thin' layer between application components and the underlying computational and communication ...
    • Java Mirrors: Building Blocks for Interacting with High Performance Applications 

      Chen, Yuan; Schwan, Karsten; Rosen, David W. (Georgia Institute of Technology, 2005)
      Mirror objects are the key building blocks in the virtual 'workbenches' and 'portals' for scientific and engineering applications constructed by our group. This paper uses mirror objects in the implementation of the RTTB ...
    • KStreams: Kernel Support for Efficient End-to-End Data Streaming 

      Kong, Jiantao; Schwan, Karsten (Georgia Institute of Technology, 2004)
      Technology advances are enabling increasingly data-intensive applications, ranging from peer-to-peer file sharing, to multimedia, to remote graphics and data visualization. One outcome is the considerable memory pressure ...
    • Layer Assignment for System on Packages 

      Minz, Jacob Rajkumar; Lim, Sung Kyu (Georgia Institute of Technology, 2003)
      The routing environment for the new emerging mixed-signal System-on-Package (SOP) technology is more advanced than that of the conventional PCB or MCM technology - pins are located at all layers of SOP packaging substrate ...
    • LIRA: Lightweight, Region-aware Load Shedding in Mobile CQ Systems 

      Gedik, Bugra; Liu, Ling; Wu, Kun-Lung; Yu, Philip S. (Georgia Institute of Technology, 2006)
      Position updates and query re-evaluations are two predominant, costly components of processing location-based, continual queries (CQs) in mobile systems. To obtain high-quality query results, the query processor usually ...
    • M-Channels and M-Brokers: New Abstractions for Co-ordinated Management in Virtualized Systems 

      Kumar, Sanjay; Nathuji, Ripal; Schwan, Karsten; Talwar, Vanish; Ranganathan, Partha (Georgia Institute of Technology, 2007)
      Management and automation are important issues in enterprise environments, often consuming the largest fraction of the overall IT budget. A key challenge here is co-ordination across multiple management solutions deployed ...
    • Matching Test Cases for Effective Fault Localization 

      Baah, George K.; Podgurski, Andy; Harrold, Mary Jean (Georgia Institute of Technology, 2011)
      Finding the cause of a program’s failure from a causal-analysis perspective requires, for each statement, tests that cover the statement and tests that do not cover the statement. However, in practice the composition ...
    • Memory-Efficient GroupBy-Aggregate using Compressed Buffer Trees 

      Amur, Hrishikesh; Richter, Wolfgang; Andersen, David G.; Kaminsky, Michael; Schwan, Karsten; Balachandran, Athula; Zawadzki, Erik (Georgia Institute of Technology, 2012)
      Memory is rapidly becoming a precious resource in many data processing environments. This paper introduces a new data structure called a Compressed Buffer Tree (CBT). Using a combination of buffering, compression, and ...
    • Middleware Guidelines for Future Sensor Networks 

      Wolenetz, Matthew David; Kumar, Rajnish; Shin, Junsuk; Ramachandran, Umakishore (Georgia Institute of Technology, 2004)
      In the near future, we envision sensor networks to transport high bandwidth, low latency streaming data from a variety of sources, such as cameras and microphones. Sensor networks will be called upon to perform sophisticated ...
    • Minimum Information Disclosure with Efficiently Verifiable Credentials 

      Bauer, David; Blough, Douglas M.; Cash, David (Georgia Institute of Technology, 2007)
      Public-key based certificates provide a standard way to prove one's identity, as certified by some certificate authority (CA). However, standard certificates provide a binary identification: either the whole identity of ...
    • Mobile Identity Management: Concepts, Issues, and Techniques 

      Li, Yun; Liu, Ling (Georgia Institute of Technology, 2009)
      This paper takes a systematic approach to examining the basic concepts, the research issues and the state of art technologies in mobile identity management. We examine the concept of mobile identity and argue that mobile ...
    • Mondrian Tree: Efficient Indexing Structure for Scalable Spatial Triggers Processing over Mobile Environment 

      Doo, Myungcheol; Liu, Ling; Narasimhan, Nitya; Vasudevan, Venu (Georgia Institute of Technology, 2010)
      Spatial Alarms are reminders for mobile users upon their arrival of certain spatial location of interest. Spatial alarm processing requires meeting two demanding objectives: high accuracy, which ensures zero or very low ...