Search
Search Results
-
Near-Data Prediction Based Speculative Optimization in a Distribution Environment
Apache Hadoop is an open source software framework that supports data-intensive distributed applications and is distributed under the Apache 2.0... -
Trusted Execution Environment
A trusted execution environment (TEE) means a secure area which can guarantee the confidentiality and integrity of the code and data inside of this... -
DynQ: a dynamic query engine with query-reuse capabilities embedded in a polyglot runtime
Language-integrated query (LINQ) frameworks offer a convenient programming abstraction for processing in-memory collections of data, allowing...
-
Toward High-Performance Delta-Based Iterative Processing with a Group-Based Approach
Many systems have been built to employ the delta-based iterative execution model to support iterative algorithms on distributed platforms by...
-
Efficient Concurrent Execution of Smart Contracts in Blockchains Using Object-Based Transactional Memory
Several popular blockchains such as Ethereum execute complex transactions through user-defined scripts. A block of the chain typically consists of... -
Many-BSP: an analytical performance model for CUDA kernels
The unknown behavior of GPUs and the differing characteristics among their generations present a serious challenge in the analysis and optimization...
-
Software Mitigation of RISC-V Spectre Attacks
Speculative attacks are still an active threat today that, even if initially focused on the x86 platform, reach across all modern hardware... -
An Efficient Fault Tolerance Strategy for Multi-task MapReduce Models Using Coded Distributed Computing
MapReduce is a programming framework designed for processing and analyzing large volumes of data in a distributed computing environment. Despite its... -
Gras** AI: experiential exercises for designers
Artificial intelligence (AI) and machine learning (ML) are increasingly integrated into the functioning of physical and digital products, creating...
-
Proactive Task Offloading for Load Balancing in Iterative Applications
Load imbalance is often a challenge for applications in parallel systems. Static cost models and pre-partitioning algorithms distribute the load at... -
Improving quantum-to-classical data decoding using optimized quantum wavelet transform
One of the challenges facing current noisy-intermediate-scale-quantum devices is achieving efficient quantum circuit measurement or readout. The...
-
ATConf: auto-tuning high dimensional configuration parameters for big data processing frameworks
To support various application scenarios, big data processing frameworks (BDPFs) such as Spark usually provide users with a large number of...
-
NoC-based hardware software co-design framework for dataflow thread management
Applications running in a large and complex manycore system can significantly benefit from adopting the dataflow model of computation. In a dataflow...
-
Verifying Secure Speculation in Isabelle/HOL
Secure speculation is an information flow security hyperproperty that prevents transient execution attacks such as Spectre, Meltdown and Foreshadow.... -
Recognizing MapReduce Straggler Tasks in Big Data Infrastructures Using Artificial Neural Networks
MapReduce framework is used for the distribution and parallelization of large-scale data processing. This framework breaks a job into several...
-
Deep Hawkes process for high-frequency market making
High-frequency market making is a liquidity-providing trading strategy that simultaneously generates many bids and asks for a security at ultra-low...
-
Detection of Intrusions and Malware, and Vulnerability Assessment 18th International Conference, DIMVA 2021, Virtual Event, July 14–16, 2021, Proceedings
This book constitutes the proceedings of the 18th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment,... -
Subresultant Chains Using Bézout Matrices
Subresultant chains over rings of multivariate polynomials are calculated using a speculative approach based on the Bézout matrix. Our experimental... -
Computer-Aided Reverse Engineering of Protected Software
Reverse engineering is undoing or circumventing the protections deployed on a code region. Software crackers perform this to remove license checks in... -
A classification of hadoop job schedulers based on performance optimization approaches
Job scheduling in MapReduce plays a vital role in Hadoop performance. In recent years, many researchers have presented job scheduler algorithms to...