Skip to main content
Resilience and fault tolerance are challenging tasks in the field of high performance computing (HPC) and extreme scale systems. Components fail more often in such systems, results in application abort. Adopting faulttolerance techniques... more
    • by  and +1
    •   5  
      Fault ToleranceMPIConsensusParallelism
This paper presents the design philosophy and initial design decisions of Herald: a highly scalable global event notification system that is being designed and built at Microsoft Research. Herald is a distributed system designed to... more
    • by 
    •   11  
      Computer ScienceDistributed SystemMiddlewareDistributed Processing
    • by 
    •   13  
      Social PsychologyComputer SciencePerformanceConfidence
The problem of mobile robot navigation has received a noticeable attention over last few years. Several different approaches were presented, each having major limitations. In this paper a new, agentbased solution the problem of mobile... more
    • by 
    •   14  
      RoboticsArtificial IntelligenceAgent BasedLocalization
In this paper, a novel approach for building synopses is proposed by using a service and message-oriented architecture. The Sain-tEtiQ summarization system initially designed for very large stored databases, by its intrinsic features, is... more
    • by 
    •   10  
      Information RetrievalData MiningSemanticsData Analysis
Topic detection with large and noisy data collections such as social media must address both scalability and accuracy challenges. KeyGraph is an efficient method that improves on current solutions by considering keyword cooccurrence. We... more
    • by 
    •   13  
      Information SystemsAlgorithmsDistributed ComputingPerformance
Static keying Dynamic keying Network life Assumed short-lived Assumed long-lived Key pool Very large pool; static administrative key values. Small size pool; dynamic administrative key values.
    • by 
    •   16  
      Distributed ComputingResilienceWireless Sensor NetworksCryptography
The recognition of symbols in graphic documents is an intensive research activity in the community of pattern recognition and document analysis. A key issue in the interpretation of maps, engineering drawings, diagrams, etc. is the... more
    • by 
    •   12  
      Pattern RecognitionUser InterfacePerformance EvaluationDocument Analysis
    • by 
    •   16  
      EngineeringComputer ScienceTechnologyField-Programmable Gate Arrays
Overlay management systems face the challenges of increased complexity and heterogeneity because of the many elements involved in providing overlay services. In dynamic networks, the challenge and complexity is increased. Service... more
    • by 
    •   16  
      Ubiquitous ComputingComputational ModelingComputer NetworksNetwork Management
    • by 
    •   15  
      Computational ModelingService Oriented ArchitectureSoftware ArchitecturePerformance Model
We present a study of multithreaded implementations of Thorup's algorithm for solving the Single Source Shortest Path (SSSP) problem for undirected graphs. Our implementations leverage the fledgling MultiThreaded Graph Library (MTGL) to... more
    • by 
    •   12  
      Computer ScienceComputer ArchitectureGraph TheoryParallel Processing
The implementation and performance of the multidimensional Fast Fourier Transform (FFT) on a distributed memory Beowulf cluster is examined. We focus on the three-dimensional (3D) real transform, an essential computational component of... more
    • by 
    •   12  
      Cognitive ScienceDistributed ComputingParallel ComputingDistributed Shared Memory System
The technologies, architectures, and methodologies traditionally used to develop distributed applications exhibit a variety of limitations and drawbacks when applied to large scale distributed settings (e.g., the Internet). In particular,... more
    • by 
    •   18  
      Information SystemsObject Oriented ProgrammingComputer NetworksPervasive Computing
The authors present a predictive model for the negative bias temperature instability (NBTI) of PMOS under both short term and long term operation. On the basis of the reaction-diffusion mechanism, this model accurately captures the... more
    • by 
    •   8  
      ReliabilityThermal StressScalabilityAnalysis and Impacts of Negative Bias Temperature Instability (NBTI)
We present two designs (I and II) for IEEE 754 double precision floating point matrix multiplication, optimized for implementation on high-end FPGAs. It forms the kernel in many important tile-based BLAS algorithms, making an excellent... more
    • by 
    •   11  
      Distributed ComputingHigh Performance ComputingParallel ProgrammingFPGA implementation
Over the last 21 years, we’ve spent almost a person-millenium producing Cyc, an axiomatization of general human knowledge. Though still far from complete, Cyc contains over three million axioms. The need to express the range of things a... more
    • by 
    •   6  
      Computer ScienceArtificial IntelligenceScaling upScalability
Sensor networks for environmental data acquisition will play an important role in the development of future large data acquisition systems, particularly in oceanographic observation and operational oceanography. Within these scenarios,... more
    • by 
    •   15  
      Computer ArchitectureEmbedded SystemsDistributed SystemDistributed Systems
A new image compression algorithm is proposed, based on independent Embedded Block Coding with Optimized Truncation of the embedded bit-streams (EBCOT). The algorithm exhibits state-of-the-art compression performance while producing a... more
    • by 
    •   19  
      PsychologyCognitive ScienceData CompressionImage compression
A number of parallel formulations of dense matrix multiplication algorithm have been developed. For arbitrarily large number of processors, any of these algorithms or their variants can provide near linear speedup for sufficiently large... more
    • by 
    •   8  
      Computer ScienceParallel AlgorithmsParallel ProcessingSparse Matrices
Interconnects based on Networks-on-Chip are an appealing solution to address future microprocessor designs where, very likely, hundreds of cores will be connected on a single chip. A fundamental role in highly parallelized applications... more
    • by 
    •   9  
      SynchronizationEfficiencyMessage PassingNoC
Cloud computing is an emerging technology that is still unclear to many security problems and user authentication, access control, and ensuring the security of stored data in cloud servers are the most challenging issues in cloud-based... more
    • by 
    •   8  
      Information TechnologyInformation SecurityComputer SecurityCryptography
Abstract: ASP .NET web applications typically employ server controls to provide dynamic web pages, and data-bound server controls to display and maintain database data. Most developers use default properties of ASP .NET server controls... more
    • by 
    •   4  
      SortingScalabilityWeb PagesIndexes
Re-occurrence of the same problem is very common in many large software products. By matching the symptoms of a new problem to those in a database of known problems, automated diagnosis and even selfhealing for re-occurrences can be... more
    • by 
    •   7  
      AlgorithmsDatabasesIndexingAutonomic System
A crucial challenge for scientific workflow management systems is to support the efficient and scalable storage and querying of large provenance datasets that record the history of in silico experiments. As new provenance management... more
    • by 
    •   11  
      XMLPerformance MeasurementPerformanceExperiment
    • by 
    •   8  
      Distributed ComputingQuality of ServiceAccelerationasynchronous Transfer Mode
Safety critical software requires integrating verification techniques in software development methods. Software architectures must guarantee that developed systems will meet safety requirements and safety analyses are frequently used in... more
    • by 
    •   92  
      Software EngineeringObject Oriented ProgrammingType TheorySoftware Maintenance
For distributed applications requiring collaboration, responsive and transparent interactivity is highly desired. Though such interactivity can be achieved with optimistic replication, maintaining replica consistency is difficult. To... more
    • by 
    •   13  
      Distributed ComputingDistributed SystemCooperationData Structure
The Joint Photographic Experts Group (JPEG) committee is a joint working group of the International Standardization Organization (ISO) and the International Electrotechnical Commission (IEC). The word "Joint" in JPEG however does not... more
    • by 
    •   8  
      Image ProcessingStandardizationImage compressionWavelet Transforms
Often, in the real world, entities have two or more representations in databases. Duplicate records do not share a common key and/or they contain errors that make duplicate matching a difficult task. Errors are introduced as the result of... more
    • by 
    •   18  
      Data MiningFuzzy LogicEntity ResolutionInformation Integration
First version of the latest video coding standard, High Efficiency Video Coding (HEVC), only supports coding of video in YUV 4:2:0 chroma format. An extension of the standard that will support other chroma formats is currently under... more
    • by 
    • Scalability
    • by 
    •   20  
      AlgebraComputer ScienceParallel AlgorithmsComputer Architecture
Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles. This communication supports latency-critical applications for improved safety and maybe optimized traffic. However, V2V... more
    • by 
    •   5  
      PrivacyCryptographyAuthenticationVANETs
We propose a framework for a secure RSU-to-OBU message broadcasting in VANETs using proxy signatures. We consider a VANET infrastructure for which the network assumptions are similar to the current standards of VANET communications. The... more
    • by 
    •   11  
      Computer ScienceTransportationBroadcastingAd Hoc Networks
Different trust models have been developed for dealing with possible dishonest behavior and attacks from malicious peer Intrusion Detection Systems (IDSs) in a collaborative Intrusion Detection Network (IDN). For evaluating and comparing... more
    • by 
    •   13  
      Computer ScienceComputational ModelingIntrusion Detection SystemsStability
Simultaneous multithreading (SMT) increases CPU utilization and application performance in many circumstances, but it can be detrimental when performance is limited by application scalability or when there is significant contention for... more
    • by 
    •   9  
      HardwareMeasurementPipelinesScalability
S e p t e m b e r / O c t o b e r 2 0 0 3 I E E E S O F T W A R E 1 0 3 BOOKSHELF cal inference principles, and various optimizing techniques from operations research. Otherwise, Quality Software Project Management is an excellent... more
    • by 
    •   10  
      Information SystemsDisaster ManagementSafetyProgramming
Data mining is an active field of research and development aiming to automatically extract "knowledge" from analyzing data sets. Knowledge can be defined in different ways such as discovering (structured, frequent, approximate, etc.)... more
    • by 
    •   5  
      Data MiningMemory ManagementBig DataScalability
In petabyte-scale distributed file systems that decouple read and write from metadata operations, behavior of the metadata server cluster will be critical to overall system performance and scalability. We present a dynamic subtree... more
    • by 
    •   15  
      LanguagesComputer ArchitectureDesignPerformance
Information technology fields are now more dominated by artificial intelligence, as it is playing a key role in terms of providing better services. The inherent strengths of artificial intelligence are driving the companies into a modern,... more
    • by 
    •   6  
      Artificial IntelligenceCloud ComputingReliabilitySoftware defined networking
Computational methods for protein structure prediction allow us to determine a three-dimensional structure of a protein based on its pure amino acid sequence. These methods are a very important alternative to costly and slow experimental... more
    • by 
    •   10  
      BioinformaticsComputational BiologyProtein Structure PredictionStructural Bioinformatics
We present a novel dynamic analysis technique that finds real deadlocks in multi-threaded programs. Our technique runs in two stages. In the first stage, we use an imprecise dynamic analysis technique to find potential deadlocks in a... more
    • by 
    •   50  
      LanguagesAlgorithmsType TheoryUsability
Cloud computing is a set of Information Technology services offered to users over the web on a rented base. Such services enable the organizations to scale-up or scale-down their in-house foundations. Generally, cloud services are... more
    • by 
    •   5  
      Computer ScienceCloud ComputingInfrastructureData Security
This paper provides a performance analysis of the Scalable Video Coding (SVC) extension of H.264/AVC. A short overview presenting the main functionalities of SVC is given and main issues in encoder control and bit stream extraction are... more
    • by 
    •   8  
      Video CodingPerformanceComparative StudyOptimization
| In this paper, recent progress of phase change memory (PCM) is reviewed. The electrical and thermal properties of phase change materials are surveyed with a focus on the scalability of the materials and their impact on device design.... more
    • by  and +1
    •   13  
      Biomedical EngineeringThermal conduction in NanomaterialsReliabilityPhase Change Material
Multi-degree implementations of the reconfigurable optical add-drop multiplexer (ROADM) are analyzed in terms of in-band crosstalk performance with an emphasis on the reduction in the number of wavelength selective switches used in the... more
    • by 
    •   10  
      OpticsModular Systems (Architecture)Performance AnalysisMultiplexer
Recommender Systems (RS) are software tools which can be used in making useful predictions of items to users. RS has been an important research area since the mid-1990s, and there are a lot of RS tools built since then to improve user... more
    • by 
    •   6  
      Machine LearningRecommender SystemsInformation OverloadCold Start
Wireless Sensor Networks (WSN) are formed by a large number of networked sensing nodes. It is rather complex, or even unfeasible, to model analytically a WSN and it usually leads to oversimplified analysis with limited confidence.... more
    • by 
    •   16  
      Computer ScienceWireless CommunicationsComparative StudyNetwork