Now showing items 1-10 of 590
Holistic System Design for Deterministic Replay.
(2013)
Deterministic replay systems record and reproduce the execution of a hardware or software system. While it is well known how to replay uniprocessor systems, it is much harder to provide deterministic replay of shared memory ...
Security Hazards when Law is Code.
(2016)
As software continues to eat the world, there is an increasing pressure to
automate every aspect of society, from self-driving cars, to algorithmic trading
on the stock market. As this pressure manifests into software ...
Not All Gestures Are Created Equal: Gesture and Visual Feedback in Interaction Spaces.
(2015)
As multi-touch mobile computing devices and open-air gesture sensing technology become increasingly commoditized and affordable, they are also becoming more widely adopted. It became necessary to create new interaction ...
Computational Discovery of Metal-Organic Frameworks for Carbon Capture and Natural Gas Storage.
(2014)
Metal-organic frameworks (MOFs) have recently emerged as promising materials for the capture of carbon dioxide (CO2) and the storage of alternative fuels such as methane (CH4). Amongst the many possible MOFs, metal-substituted ...
Datacenter Design for Future Cloud Radio Access Network.
(2016)
Cloud radio access network (C-RAN), an emerging cloud service that combines the traditional radio access network (RAN) with cloud computing technology, has been proposed as a solution to handle the growing energy consumption ...
Resource-Efficient Replication and Migration of Virtual Machines.
(2015)
Continuous replication and live migration of Virtual Machines (VMs) are two vital tools in a virtualized environment, but they are resource-expensive. Continuously replicating a VM's checkpointed state to a backup host ...
On the Provision of Public Goods on Networks: Incentives, Exit Equilibrium, and Applications to Cyber .
(2016)
Attempts to improve the state of cyber-security have been on the rise over the past years. The importance of incentivizing better security decisions by users in the current landscape is two-fold: it not only helps users ...
A Safety-First Approach to Memory Models.
(2016)
Sequential consistency (SC) is arguably the most intuitive behavior for a shared-memory multithreaded program. It is widely accepted that language-level SC could significantly improve programmability of a multiprocessor ...
Non-Hierarchical Networks for Censorship-Resistant Personal Communication.
(2014)
The Internet promises widespread access to the world’s collective information and fast communication among people, but common government censorship and spying undermines this potential. This censorship is facilitated by ...
Information Extraction on Para-Relational Data.
(2016)
Para-relational data (such as spreadsheets and diagrams) refers to a type of nearly
relational data that shares the important qualities of relational data but does not
present itself in a relational format. Para-relational ...