Scalability
4,073 Followers
Recent papers in Scalability
This paper presents the design philosophy and initial design decisions of Herald: a highly scalable global event notification system that is being designed and built at Microsoft Research. Herald is a distributed system designed to... more
The problem of mobile robot navigation has received a noticeable attention over last few years. Several different approaches were presented, each having major limitations. In this paper a new, agentbased solution the problem of mobile... more
In this paper, a novel approach for building synopses is proposed by using a service and message-oriented architecture. The Sain-tEtiQ summarization system initially designed for very large stored databases, by its intrinsic features, is... more
Topic detection with large and noisy data collections such as social media must address both scalability and accuracy challenges. KeyGraph is an efficient method that improves on current solutions by considering keyword cooccurrence. We... more
Static keying Dynamic keying Network life Assumed short-lived Assumed long-lived Key pool Very large pool; static administrative key values. Small size pool; dynamic administrative key values.
The recognition of symbols in graphic documents is an intensive research activity in the community of pattern recognition and document analysis. A key issue in the interpretation of maps, engineering drawings, diagrams, etc. is the... more
Overlay management systems face the challenges of increased complexity and heterogeneity because of the many elements involved in providing overlay services. In dynamic networks, the challenge and complexity is increased. Service... more
We present a study of multithreaded implementations of Thorup's algorithm for solving the Single Source Shortest Path (SSSP) problem for undirected graphs. Our implementations leverage the fledgling MultiThreaded Graph Library (MTGL) to... more
The implementation and performance of the multidimensional Fast Fourier Transform (FFT) on a distributed memory Beowulf cluster is examined. We focus on the three-dimensional (3D) real transform, an essential computational component of... more
The technologies, architectures, and methodologies traditionally used to develop distributed applications exhibit a variety of limitations and drawbacks when applied to large scale distributed settings (e.g., the Internet). In particular,... more
The authors present a predictive model for the negative bias temperature instability (NBTI) of PMOS under both short term and long term operation. On the basis of the reaction-diffusion mechanism, this model accurately captures the... more
We present two designs (I and II) for IEEE 754 double precision floating point matrix multiplication, optimized for implementation on high-end FPGAs. It forms the kernel in many important tile-based BLAS algorithms, making an excellent... more
Over the last 21 years, we’ve spent almost a person-millenium producing Cyc, an axiomatization of general human knowledge. Though still far from complete, Cyc contains over three million axioms. The need to express the range of things a... more
Sensor networks for environmental data acquisition will play an important role in the development of future large data acquisition systems, particularly in oceanographic observation and operational oceanography. Within these scenarios,... more
A new image compression algorithm is proposed, based on independent Embedded Block Coding with Optimized Truncation of the embedded bit-streams (EBCOT). The algorithm exhibits state-of-the-art compression performance while producing a... more
A number of parallel formulations of dense matrix multiplication algorithm have been developed. For arbitrarily large number of processors, any of these algorithms or their variants can provide near linear speedup for sufficiently large... more
Interconnects based on Networks-on-Chip are an appealing solution to address future microprocessor designs where, very likely, hundreds of cores will be connected on a single chip. A fundamental role in highly parallelized applications... more
Cloud computing is an emerging technology that is still unclear to many security problems and user authentication, access control, and ensuring the security of stored data in cloud servers are the most challenging issues in cloud-based... more
Abstract: ASP .NET web applications typically employ server controls to provide dynamic web pages, and data-bound server controls to display and maintain database data. Most developers use default properties of ASP .NET server controls... more
Re-occurrence of the same problem is very common in many large software products. By matching the symptoms of a new problem to those in a database of known problems, automated diagnosis and even selfhealing for re-occurrences can be... more
A crucial challenge for scientific workflow management systems is to support the efficient and scalable storage and querying of large provenance datasets that record the history of in silico experiments. As new provenance management... more
Safety critical software requires integrating verification techniques in software development methods. Software architectures must guarantee that developed systems will meet safety requirements and safety analyses are frequently used in... more
For distributed applications requiring collaboration, responsive and transparent interactivity is highly desired. Though such interactivity can be achieved with optimistic replication, maintaining replica consistency is difficult. To... more
The Joint Photographic Experts Group (JPEG) committee is a joint working group of the International Standardization Organization (ISO) and the International Electrotechnical Commission (IEC). The word "Joint" in JPEG however does not... more
Often, in the real world, entities have two or more representations in databases. Duplicate records do not share a common key and/or they contain errors that make duplicate matching a difficult task. Errors are introduced as the result of... more
First version of the latest video coding standard, High Efficiency Video Coding (HEVC), only supports coding of video in YUV 4:2:0 chroma format. An extension of the standard that will support other chroma formats is currently under... more
Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles. This communication supports latency-critical applications for improved safety and maybe optimized traffic. However, V2V... more
We propose a framework for a secure RSU-to-OBU message broadcasting in VANETs using proxy signatures. We consider a VANET infrastructure for which the network assumptions are similar to the current standards of VANET communications. The... more
Different trust models have been developed for dealing with possible dishonest behavior and attacks from malicious peer Intrusion Detection Systems (IDSs) in a collaborative Intrusion Detection Network (IDN). For evaluating and comparing... more
Simultaneous multithreading (SMT) increases CPU utilization and application performance in many circumstances, but it can be detrimental when performance is limited by application scalability or when there is significant contention for... more
S e p t e m b e r / O c t o b e r 2 0 0 3 I E E E S O F T W A R E 1 0 3 BOOKSHELF cal inference principles, and various optimizing techniques from operations research. Otherwise, Quality Software Project Management is an excellent... more
Data mining is an active field of research and development aiming to automatically extract "knowledge" from analyzing data sets. Knowledge can be defined in different ways such as discovering (structured, frequent, approximate, etc.)... more
In petabyte-scale distributed file systems that decouple read and write from metadata operations, behavior of the metadata server cluster will be critical to overall system performance and scalability. We present a dynamic subtree... more
Information technology fields are now more dominated by artificial intelligence, as it is playing a key role in terms of providing better services. The inherent strengths of artificial intelligence are driving the companies into a modern,... more
Computational methods for protein structure prediction allow us to determine a three-dimensional structure of a protein based on its pure amino acid sequence. These methods are a very important alternative to costly and slow experimental... more
We present a novel dynamic analysis technique that finds real deadlocks in multi-threaded programs. Our technique runs in two stages. In the first stage, we use an imprecise dynamic analysis technique to find potential deadlocks in a... more
Cloud computing is a set of Information Technology services offered to users over the web on a rented base. Such services enable the organizations to scale-up or scale-down their in-house foundations. Generally, cloud services are... more
This paper provides a performance analysis of the Scalable Video Coding (SVC) extension of H.264/AVC. A short overview presenting the main functionalities of SVC is given and main issues in encoder control and bit stream extraction are... more
Multi-degree implementations of the reconfigurable optical add-drop multiplexer (ROADM) are analyzed in terms of in-band crosstalk performance with an emphasis on the reduction in the number of wavelength selective switches used in the... more
Recommender Systems (RS) are software tools which can be used in making useful predictions of items to users. RS has been an important research area since the mid-1990s, and there are a lot of RS tools built since then to improve user... more
Wireless Sensor Networks (WSN) are formed by a large number of networked sensing nodes. It is rather complex, or even unfeasible, to model analytically a WSN and it usually leads to oversimplified analysis with limited confidence.... more