A Scalable Destination-Oriented MulticastProtocol with Incremental Deployability
In this paper, we develop a scalable destination-oriented multicast (DOM) protocol for computer networks where the routers have enhanced intelligence to process packets. The basic idea of DOM is that each multicast data packet carries explicit ...
A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns
Host-based anomaly intrusion detection system design is very challenging due to the notoriously high false alarm rate. This paper introduces a new host-based anomaly intrusion detection methodology using discontiguous system call patterns, in an attempt ...
An Efficient Non-Linear Cost Compression Algorithm for Multi Level Cell Memory
This paper defines a non-linear cost compression problem, proposes an efficient algorithm, and applies it to a real application of multi level cell memory to minimize energy consumption and latency. The non-linear cost compression problem extends the ...
Automatic Generation of Miniaturized Synthetic Proxies for Target Applications to Efficiently Design Multicore Processors
Prohibitive simulation time with pre-silicon design models and unavailability of proprietary target applications make microprocessor design very tedious. The framework proposed in this paper is the first attempt to automatically generate synthetic ...
Booting Time Minimization for Real-Time Embedded Systems with Non-Volatile Memory
Minimizing the booting time of an embedded system has become a major technical issue for the success of many consumer electronics. In this paper, the booting time minimization problem for real-time embedded systems with the joint consideration of DRAM ...
CACC: A Cooperative Approachto Cache Consistency in WMNs
Cooperative caching is a desirable approach to achieve efficient data access in multi-hop wireless networks. Existing cooperative caching algorithms mostly focus on cache placement. Another key issue, cache consistency, has not been adequately ...
Cache Friendliness-Aware Managementof Shared Last-Level Caches for HighPerformance Multi-Core Systems
To achieve high efficiency and prevent destructive interference among multiple divergent workloads, the last-level cache of Chip Multiprocessors has to be carefully managed. Previously proposed cache management schemes suffer from inefficient cache ...
Coordinating Garbage Collectionfor Arrays of Solid-State Drives
Although solid-state drives (SSDs) offer significant performance improvements over hard disk drives (HDDs) for a number of workloads, they can exhibit substantial variance in request latency and throughput as a result of garbage collection (GC). When GC ...
Design and Analysis of a Highly User-Friendly, Secure, Privacy-Preserving, and Revocable Authentication Method
A large portion of system breaches are caused by authentication failure, either during the login process or in the post-authentication session; these failures are themselves related to the limitations associated with existing authentication methods. ...
FLOTT—A Fast, Low Memory T-TransformAlgorithm for Measuring String Complexity
This paper presents flott, a fast, low memory T-transform algorithm which can be used to compute the string complexity measure T-complexity. The algorithm uses approximately one third of the memory of its predecessor while reducing the running time by ...
HRT-PLRU: A New Paging Schemefor Executing Hard Real-Time Programson NAND Flash Memory
For advanced features of next generation vehicles, the real-time programs in automotive embedded systems are dramatically increasing. For such large volume program codes, this paper proposes a novel framework to use high-density and low-cost nonvolatile ...
Identity-Based Secure DistributedData Storage Schemes
Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver without the necessity of knowing the ...
Improving MapReduce Performance Using Smart Speculative Execution Strategy
MapReduce is a widely used parallel computing framework for large scale data processing. The two major performance metrics in MapReduce are job execution time and cluster throughput. They can be seriously impacted by straggler machines—machines on which ...
MuSA: Multivariate Sampling Algorithmfor Wireless Sensor Networks
A wireless sensor network can be used to collect and process environmental data, which is often of multivariate nature. This work proposes a multivariate sampling algorithm based on component analysis techniques in wireless sensor networks. To improve ...
Schedulability Analysis of DeferrableScheduling Algorithms for MaintainingReal-Time Data Freshness
Although the deferrable scheduling algorithm for fixed priority transactions ( DS-FP) has been shown to provide a better performance compared with the More-Less (ML) method, there is still a lack of any comprehensive studies on the necessary and ...
Single Disk Failure Recovery for X-Code-Based Parallel Storage Systems
In modern parallel storage systems (e.g., cloud storage and data centers), it is important to provide data availability guarantees against disk (or storage node) failures via redundancy coding schemes. One coding scheme is X-code, which is double-fault ...
Using Branch Predictors and Variable Encoding for On-the-Fly Program Tracing
Unobtrusive capturing of program execution traces in real-time is crucial for debugging many embedded systems. However, tracing even limited program segments is often cost-prohibitive, requiring wide trace ports and large on-chip trace buffers. This ...
Where the Sidewalk Ends: Extending theInternet AS Graph Using Traceroutesfrom P2P Users
An accurate Internet topology graph is important in many areas of networking, from understanding ISP business relationships to diagnosing network anomalies. Most Internet mapping efforts have derived the network structure, at the level of interconnected ...
A Note on EDF Schedulingfor Real-Time Energy Harvesting Systems
Energy harvesting is the capture of ambient energy, its conversion into a usable form, and its storage for immediate or future use. Interest in energy harvesting has increased over the last decade because of its environmental friendliness and its ...
Fast Inversion in ${\schmi{GF(2^m)}}$ with Normal Basis Using Hybrid-Double Multipliers
Fast inversion in finite fields is crucial for high-performance cryptography and codes. We present techniques to exploit the recently proposed hybrid-double multipliers for fast inversions in binary fields $GF(2^m)$ with normal bases. A hybrid-double ...
Sharing Logic for Built-In Generationof Functional Broadside Tests
When built-in test generation is used for a design that can be partitioned into logic blocks, it is advantageous to identify groups of blocks whose tests have similar characteristics, and use the same built-in test generation logic for the blocks in ...
Comments on “Algorithmic Aspectsof Hardware/Software Partitioning: 1D Search Algorithms”
In this paper, the work in is analyzed. An error in its theoretical description part is pointed out and illustrated by a simple example. A modification suggestion is proposed to make the theoretical description of the work more deliberate and thus being ...