Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2021
Understanding and Resolving Performance Degradation in Deep Graph Convolutional Networks
CIKM '21: Proceedings of the 30th ACM International Conference on Information & Knowledge ManagementPages 2728–2737https://doi.org/10.1145/3459637.3482488A Graph Convolutional Network (GCN) stacks several layers and in each layer performs a PROPagation operation~(PROP) and a TRANsformation operation~(TRAN) for learning node representations over graph-structured data. Though powerful, GCNs tend to suffer ...
- research-articleAugust 2020
Outage analysis of MIMO NLOS‐UV communication systems over atmospheric turbulence channels
IET Communications (CMU2), Volume 14, Issue 14Pages 2294–2302https://doi.org/10.1049/iet-com.2020.0068Rich scattering of the signals in the ultraviolet (UV) band of electromagnetic spectrum enables non‐line‐of‐sight (NLOS) outdoor wireless connectivity. It eliminates the line‐of‐sight requirement of the links which are using the signals in the infra‐red ...
Contention-aware application performance prediction for disaggregated memory systems
CF '20: Proceedings of the 17th ACM International Conference on Computing FrontiersPages 49–59https://doi.org/10.1145/3387902.3392625Disaggregated memory has recently been proposed as a way to allow flexible and fine-grained allocation of memory capacity to compute jobs. This paper makes an important step towards effective resource allocation on disaggregated memory systems. ...
- research-articleMay 2019
Adjust: runtime mitigation of resource abusing third-party online ads
ICSE '19: Proceedings of the 41st International Conference on Software EngineeringPages 1005–1015https://doi.org/10.1109/ICSE.2019.00105Online advertising is the most critical revenue stream for many Internet companies. However, showing ads on websites comes with a price tag. Since website contents and third-party ads are blended together, third-party ads may compete with the publisher ...
Mitigating inter-job interference using adaptive flow-aware routing
- Staci A. Smith,
- Clara E. Cromey,
- David K. Lowenthal,
- Jens Domke,
- Nikhil Jain,
- Jayaraman J. Thiagarajan,
- Abhinav Bhatele
SC '18: Proceedings of the International Conference for High Performance Computing, Networking, Storage, and AnalysisArticle No.: 27, Pages 1–15https://doi.org/10.1109/SC.2018.00030On most high performance computing platforms, concurrently executing jobs share network resources. This sharing can lead to inter-job network interference, which can have a significant impact on the performance of communication-intensive applications. No ...
-
Mitigating inter-job interference using adaptive flow-aware routing
- Staci A. Smith,
- Clara E. Cromey,
- David K. Lowenthal,
- Jens Domke,
- Nikhil Jain,
- Jayaraman J. Thiagarajan,
- Abhinav Bhatele
SC '18: Proceedings of the International Conference for High Performance Computing, Networking, Storage, and AnalysisArticle No.: 27, Pages 1–15On most high performance computing platforms, concurrently executing jobs share network resources. This sharing can lead to inter-job network interference, which can have a significant impact on the performance of communication-intensive applications. No ...
- ArticleAugust 2017
Constant-time callees with variable-time callers
Side-channel attacks are a serious threat to security-critical software. To mitigate remote timing and cachetiming attacks, many ubiquitous cryptography software libraries feature constant-time implementations of cryptographic primitives. In this work, ...
- research-articleApril 2017
Hit by the Bus: QoS Degradation Attack on Android
ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications SecurityPages 716–727https://doi.org/10.1145/3052973.3053028Mobile apps need optimal performance and responsiveness to rise amongst numerous rivals on the market. Further, some apps like media streaming or gaming apps cannot even function properly with a performance below a certain threshold. In this work, we ...
- research-articleNovember 2016
Energy‐efficient power allocation algorithm in cognitive radio networks
IET Communications (CMU2), Volume 10, Issue 17Pages 2445–2451https://doi.org/10.1049/iet-com.2016.0274Most of traditional power allocation algorithms are often based on maximum capacity technology (MCT) in cognitive radio networks (CRNs) at the expense of higher energy consumption. The optimisation of energy efficiency power allocation schemes are ...
- articleOctober 2016
Optimizing guest swapping using elastic and transparent memory provisioning on virtualization platform
Frontiers of Computer Science: Selected Publications from Chinese Universities (FCS), Volume 10, Issue 5Pages 908–924https://doi.org/10.1007/s11704-016-5217-zOn virtualization platforms, peak memory demand caused by hotspot applications often triggers page swapping in guest OS, causing performance degradation inside and outside of this virtual machine (VM). Even though host holds sufficient memory pages, ...
- research-articleSeptember 2016
Single channel steepest descent algorithm for the correction of cycle frequency error
IET Communications (CMU2), Volume 10, Issue 14Pages 1829–1838https://doi.org/10.1049/iet-com.2015.1235The beneficial characteristics of signal cyclostationarity have been widely exploited in varied domains. However, one common problem is that algorithms adopting cyclostationarity would suffer from severe performance degradation when there is an error or ...
- research-articleMay 2016
Area-energy tradeoffs of logic wear-leveling for BTI-induced aging
CF '16: Proceedings of the ACM International Conference on Computing FrontiersPages 37–44https://doi.org/10.1145/2903150.2903171Ensuring operational reliability in the presence of Bias Temperature Instability (BTI) effects often results in a compromise either in the form of lower performance and/or higher energy-consumption. This is due to the performance degradation over time ...
- articleJune 2015
Design modification supporting method based on product usage data in closed-loop PLM
International Journal of Computer Integrated Manufacturing (IJCIM), Volume 28, Issue 6Pages 551–568https://doi.org/10.1080/0951192X.2014.900866Thanks to recent technology related to product monitoring and data communication, it is now possible for a company to gather various kinds of product usage data during its operation in a ubiquitous way. However, the application of the newly gathered ...
- research-articleJune 2015
Low‐latency low‐complexity heap‐based extended min‐sum algorithms for non‐binary low‐density parity‐check codes
IET Communications (CMU2), Volume 9, Issue 9Pages 1191–1198https://doi.org/10.1049/iet-com.2014.1107The extended min‐sum (EMS) and improved EMS (I‐EMS) algorithms for non‐binary low‐density parity‐check codes over GF(q) significantly reduce the decoding complexity with an acceptable performance degradation, but they suffer from high latency because of ...
- research-articleJanuary 2014
A survey of software aging and rejuvenation studies
ACM Journal on Emerging Technologies in Computing Systems (JETC), Volume 10, Issue 1Article No.: 8, Pages 1–34https://doi.org/10.1145/2539117Software aging is a phenomenon plaguing many long-running complex software systems, which exhibit performance degradation or an increasing failure rate. Several strategies based on the proactive rejuvenation of the software state have been proposed to ...
- research-articleSeptember 2013
Joint detection/decoding algorithms for non‐binary low‐density parity‐check codes over inter‐symbol interference channels
IET Communications (CMU2), Volume 7, Issue 14Pages 1522–1531https://doi.org/10.1049/iet-com.2012.0616This study is concerned with the application of non‐binary low‐density parity‐check (NB‐LDPC) codes to binary input inter‐symbol interference channels. Two low‐complexity joint detection/decoding algorithms are proposed. One is referred to as max‐log‐MAP/...
- articleDecember 2012
Novel fault detection criteria based on linear quadratic control performances
International Journal of Applied Mathematics and Computer Science (IJAMCS), Volume 22, Issue 4Pages 929–938https://doi.org/10.2478/v10006-012-0069-7This paper proposes a new approach to designing a relatively simple algorithmic fault detection system that is potentially applicable in embedded diagnostic structures. The method blends the LQ control principle with checking and evaluating unavoidable ...
- ArticleAugust 2012
Memory-access optimization of parallel molecular dynamics simulation via dynamic data reordering
Euro-Par'12: Proceedings of the 18th international conference on Parallel ProcessingPages 781–792https://doi.org/10.1007/978-3-642-32820-6_78Dynamic irregular applications such as molecular dynamics (MD) simulation often suffer considerable performance deterioration during execution. To address this problem, an optimal data-reordering schedule has been developed for runtime memory-access ...
- ArticleMay 2012
Impact of Usage Duration on Mobile Phones EMI Characteristics
CSNT '12: Proceedings of the 2012 International Conference on Communication Systems and Network TechnologiesPages 558–562https://doi.org/10.1109/CSNT.2012.126This communication presents a study showing that mobile phone usage duration have got a significant effect on the EMI characteristics. This is because the long-time operation (transmitting and receiving) of the mobile phone cause their hardware to worn-...
- articleMay 2012
Increasing Utilization in Modern Warehouse-Scale Computers Using Bubble-Up
Precisely predicting performance degradation due to colocating multiple executing applications on a single machine is critical for improving utilization in modern warehouse-scale computers (WSCs). Bubble-Up is the first mechanism for such precise ...