{
"00058354250940674c4117796a8f50b492d7879e": {
"authors": [
{
"ids": [
"40458202"
],
"name": "Cristobal Camarero"
},
{
"ids": [
"10678545"
],
"name": "Carmen Mart\u00ednez"
},
{
"ids": [
"1762103"
],
"name": "Ram\u00f3n Beivide"
}
],
"doi": "10.1109/HPCA.2017.26",
"doiUrl": "https://doi.org/10.1109/HPCA.2017.26",
"entities": [
"Assistive technology",
"Clos network",
"Data center",
"Deadlock",
"Equal-cost multi-path routing",
"Experiment",
"Fat tree",
"Fault tolerance",
"Jellyfish.com",
"Multipath routing",
"Randomness",
"Requirement",
"Routing",
"Synthetic data"
],
"id": "00058354250940674c4117796a8f50b492d7879e",
"inCitations": [],
"journalName": "2017 IEEE International Symposium on High Performance Computer Architecture (HPCA)",
"journalPages": "193-204",
"journalVolume": "",
"outCitations": [
"8eda1f2f57c8fe644975f68c9b7cdb591ecf40d5",
"d801135f1085b2b76cc3bd0fb42af943236bbf06",
"47512d99d1a2971f013561dcec1190afa05df703",
"0dd57dbc7e47ed7e27affd8d289585005d4d62a5",
"5b5cb4970038d25423e70b23baa85fc97686d35d",
"5203210d18c94f01169bd50afcebf70cd3284898",
"057a8310124ef6565fbd13ae1ec1412b96dedae8",
"1d912b67ba7cda4d341d834c1c6de96db01888fc",
"552263c8b3e6b23c29a54820f2ebbf9c4ab80804",
"943cf22e168a86fec0381ca380474c1da39e509c",
"06d003643499015f1f1e15d30b24585d8cf82d45",
"1ea6460b290976ec92bbf503c4568d76730a18c4",
"17be90cbff777e45ec4732bed7250566861cf40c",
"0736d68aad2c198a8f6dda851c27bd180421c2aa",
"c321e064fe8ece4d45ae5a76ca032417a98b347a",
"663e064469ad91e6bda345d216504b4c868f537b",
"42e5e97272ad8728749f861ed7a920707e698778",
"4b9618b059e1383ec7ea011fc41f40f5c759bb89",
"d3ffe3303a3735bb34b18cd2b8e771d6d8ee908d",
"f57ac7f53438b2877022125bac957fda2bb2a97b",
"053e39720366429b6a4b76270993b27e7fe2cece",
"5b29cdd10c434fb02eef2fadb0a405c7d09c41f0",
"11a4744f7f0883c4232a9f5aaca8b9d29bfaa762",
"5f8991828def57d2f0cda942566afff56740d150",
"0f8b04cb89e455ceadf0c88fd5dd9f9a7f338ba9",
"413e390f3e36f11cfc3de7e62b370cf530830857",
"491eef9f7adada860abbd274e008e7acb964ef8b",
"cf2dc0cee8e250956ab1c093612d486abb8795ac",
"39f5f9b234659888eaec18d816499996a5d0ccce",
"5885d3525c1789aaa3aacc1740a3a6b51376f1b8",
"18c15c7c6ab7813cfd4f2b68ffe6ecfe86388d61",
"13ab4cd5ec4710672ecf26ffa34a795d27cf0003",
"14b82ab954a85cb8b336e86cf536c5701ca722e9"
],
"paperAbstract": "In datacenter networks, big scale, high performance and fault-tolerance, low-cost, and graceful expandability are pursued features. Recently, random regular networks, as the Jellyfish, have been proposed for satisfying these stringent requirements. However, their completely unstructured design entails several drawbacks. As a related alternative, in this paper we propose Random Folded Clos (RFC) networks. They constitute a compromise between total randomness and maintaining some topological structure. As it will be shown, RFCs preserve important properties of Clos networks that provide a straightforward deadlock-free equal-cost multi-path routing and enough randomness to gracefully expanding. These networks are minutely compared, in topological and cost terms, against fat-trees, orthogonal fat-trees and random regular graphs. Also, experiments are carried out to simulate their performance under synthetic traffics that emulate common loads in datacenters. It is shown that RFCs constitute an interesting alternative to currently deployed networks since they appropriately balance all the important design requirements. Moreover, they do that at much lower cost than the fat-tree, their natural competitor. Being able up to connect the same number of compute nodes, saving up to 95% of the cost, and giving similar performance.",
"pdfUrls": [
"http://doi.ieeecomputersociety.org/10.1109/HPCA.2017.26"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/00058354250940674c4117796a8f50b492d7879e",
"sources": [
"DBLP"
],
"title": "Random Folded Clos Topologies for Datacenter Networks",
"venue": "2017 IEEE International Symposium on High Performance Computer Architecture (HPCA)",
"year": 2017
},
"000f18a98b1a305d5ff07972b2a63849f9b26908": {
"authors": [
{
"ids": [
"2519125"
],
"name": "Taewook Oh"
},
{
"ids": [
"1888818"
],
"name": "Stephen R. Beard"
},
{
"ids": [
"2744545"
],
"name": "Nick P. Johnson"
},
{
"ids": [
"1840375"
],
"name": "Sergiy Popovych"
},
{
"ids": [
"1722513"
],
"name": "David I. August"
}
],
"doi": "10.1109/PACT.2017.28",
"doiUrl": "https://doi.org/10.1109/PACT.2017.28",
"entities": [
"Automatic parallelization",
"Computational science",
"Just-in-time compilation",
"Linear algebra",
"Open-source software",
"Parallel computing",
"Partial evaluation",
"Programmer",
"Scripting language",
"Speculative execution",
"Speedup"
],
"id": "000f18a98b1a305d5ff07972b2a63849f9b26908",
"inCitations": [
"a075f3a381ee3856fda63b006e8f841d003fb354",
"305826910778ccbb0c39d830e90913a1fcef6c57"
],
"journalName": "2017 26th International Conference on Parallel Architectures and Compilation Techniques (PACT)",
"journalPages": "356-369",
"journalVolume": "",
"outCitations": [
"22e775c629ad9d1e1cf6842eae60c5b9b96ce309",
"6074c1108997e0c1f97dc3c199323a162ffe978d",
"304fe263b042cedd3309422292e487f59cf39ffa",
"a22080f1a7f54317b24d4176b8810446665dd8d1",
"183298f38c2a16c4534db3de7c6e5c320b861b75",
"da1df0946c1a0b2be7a265e9158c441c028715ad",
"41d290943f39d23949f88a2ca52f1ebfc62a7090",
"6a2814c9876ca97c99d9edcb204475dfd0bbc2bc",
"9d9d7bc940e17a11bf4738deb3bdff6d5aef2ee2",
"73538f17cbeb45fd0822cb971375ad03c515dbe7",
"b7efe971a34a0f2482e0b2520ffb31062dcdde62",
"20b2421005a95fe747a3f186ada61525a361bfaa",
"a23e6569cafc467cde325c59f69f0d5f3838fce1",
"0d4889a452a9948944f628c3b8147ab2cb9e70f9",
"f0f4757aa2f923a349e8357e73850a78e9b80fee",
"08c10397976e566fb27d984e42a44a75c350d0da",
"40cb40b7812e019c1051e3a457a8643400b81d51",
"0425f1e7e8651b5ba3c9e2eb98a3c50a07146972",
"808b90dadea6426924374633c8c49f78175f04a8",
"a19a7c5e45125a570dcbac018184669b8cab2789",
"09ed565e84057123c15ab12b885c235d1f241aed",
"619fe8f80908a6001c96b606c39137d4ad48802c",
"d1c2ecf0fea4c430633389553f40189d0a23b3a0",
"11e947e6509ecd98c905b44747b3978ac06c2900",
"09cc66777e889e7ba26c5e8265cf4f62e841fd9d",
"131ca2d600bc720343c1a735729a9b4521aed2d2",
"0d281938d3ff2377541704cab6ba1c4408420733",
"4c41353ff2b2acc45a0fd3b35c841f442d11591e",
"4c372083685ab8b8cfc6ff984310c6d078580897",
"6662ad36d052739f19a40a230e9e8afc26d88bc2",
"35c89b2ad35ff57c7006a65a84d05df1f00affbe",
"0856f6f40b889dba559f19654834114e9f469760",
"93bb36b2fa886a808919a93ad13092790a4cca8f",
"d67f67e2a8d2caf5ff04f315c21611571f7779c6",
"5231091fd9fe75115bedf967fa8ed95810ae6ae3",
"2b5d290bc646fb86ed31340c32017f83ffcb5d33",
"58b00f733f75f0dd4fa5236263b5e1a64c5161d7",
"16a74ec035f5cb660e839abf1ac076bea6469989",
"5c6c460e58b72651a60d880c42d7e14b5daf206c",
"2e88cb3f95da0342be347ac3903d50a9c5c95cf3",
"448f4144a1d818754d91d0821ece830501ae6f9f",
"6a2edd2c10e6daaea7ffdc4b0a58f8ad9527ca49",
"159437777bba0139a6b4d6bde460b9201d284500",
"280f49d0bbcc23780d6452f0aae6851f61b012bf",
"2804ca11158d8d5a85d6e4dfd7b226dc1f203403",
"5d00483952d303b9cfd9b9acfc8fd1173d5058c6",
"c85f605689fff6599d55f6f057264b2eb068ea5a",
"2194c3460ab71f3826db00b045b2ae590c753319",
"0560fc4924bbbe7e920122dc25c1ecfc3e59e374",
"28461538e59946bdb9c629629f1afdbfd7afb5aa",
"08a3b7e1aef12dbd2500e65946b98d57b400dbf0",
"72682890677496da1a98f2d4ce9396ad13997e07"
],
"paperAbstract": "Computational scientists are typically not expert programmers, and thus work in easy to use dynamic languages. However, they have very high performance requirements, due to their large datasets and experimental setups. Thus, the performance required for computational science must be extracted from dynamic languages in a manner that is transparent to the programmer. Current approaches to optimize and parallelize dynamic languages, such as just-in-time compilation and highly optimized interpreters, require a huge amount of implementation effort and are typically only effective for a single language. However, scientists in different fields use different languages, depending upon their needs.This paper presents techniques to enable automatic extraction of parallelism within scripts that are universally applicable across multiple different dynamic scripting languages. The key insight is that combining a script with its interpreter, through program specialization techniques, will embed any parallelism within the script into the combined program that can then be extracted via automatic parallelization techniques. Additionally, this paper presents several enhancements to existing speculative automatic parallelization techniques to handle the dependence patterns created by the specialization process. A prototype of the proposed technique, called Partial Evaluation with Parallelization (PEP), is evaluated against two open-source script interpreters with 6 input linear algebra kernel scripts each. The resulting geomean speedup of 5.10× on a 24-core machine shows the potential of the generalized approach in automatic extraction of parallelism in dynamic scripting languages.",
"pdfUrls": [
"http://doi.ieeecomputersociety.org/10.1109/PACT.2017.28",
"http://liberty.princeton.edu/Publications/pact17_pep.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/000f18a98b1a305d5ff07972b2a63849f9b26908",
"sources": [
"DBLP"
],
"title": "A Generalized Framework for Automatic Scripting Language Parallelization",
"venue": "2017 26th International Conference on Parallel Architectures and Compilation Techniques (PACT)",
"year": 2017
},
"002fe9a7c5f0522279974faa4eeadc70838eb862": {
"authors": [
{
"ids": [
"40163311"
],
"name": "Qi Zeng"
},
{
"ids": [
"1759383"
],
"name": "Jih-Kwon Peir"
}
],
"doi": "10.1109/IPDPS.2017.103",
"doiUrl": "https://doi.org/10.1109/IPDPS.2017.103",
"entities": [
"Byte",
"Cache (computing)",
"Hamming distance",
"Magnetoresistive random-access memory",
"Multi-core processor",
"Non-volatile memory",
"Overhead (computing)",
"Performance Evaluation",
"Pseudo-LRU",
"Random-access memory",
"Spectral leakage",
"Volatility"
],
"id": "002fe9a7c5f0522279974faa4eeadc70838eb862",
"inCitations": [
"fbb6409694d23f2322738cc9247735c55959626a"
],
"journalName": "2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"journalPages": "92-101",
"journalVolume": "",
"outCitations": [
"bbd677f51628791eb44d64fb9744ea0e610c357b",
"a95436fb5417f16497d90cd2aeb11a0e2873f55f",
"69f7a1499a9b24caeaa586de5ff9737c04fd0b89",
"17a0a008a276daee5ce7a38b60cac964dea57da9",
"05015f9db9c040d76d026deb4dd2f82ce275cd91",
"5f852bfcf28e6a84723567bd40f247c0a8e7638e",
"a2f3bb40653499eeb33babacf69579b5ea9d20e1",
"df1ed68dba0407cf2d93736af8cfd2dc5cf86918",
"2960c89331eb7afa86584792e2e11dbf6a125820",
"61d16d80cd5e7f79f25785a462ee752d24e3b414",
"5a893d8cab79cf43a1d225f5beaae54cbae13235",
"12bc20a1963859e9f76afb4b308b90ded1cff1fe",
"71c2deb5c3b4b0fd1ed68bdda534ec7ea76e845b",
"7e2a21fb9f63c91c2974ca3d6c74d8c1ee89c228",
"a1e4f4ae16c5a18896fe1718acfe56a26aeca620",
"3e74ae88cdaa33bf89136800258bde97ab397ec9",
"45f92febffdc46540a3cae433a7b4ef48c029a50",
"7ef0940a5e093a7c8c3c7d243bbbbf513b3c3192",
"40b65be7d6e7cae7d530910220182df914103a04",
"0b5e5a2516a49997feea686c434580d9058fd1aa",
"3871446c86963903b087c1616bb1a0887a63f234",
"dd4f901d0e692a4cc17741fc3479a661432b2824",
"4654615ee9187ee1bb784feb6175a47a726d813d",
"1600c3ed12301b06a1107a68c2de84fb3582a918",
"7cd29ed1da71593bfb79b553ba6c5ee39ccf7a7b",
"40eb2f5a97298da40838388700b097f82adff167",
"5d999f4a5567e6f4a54e46bbcd6006f75ab0cbac",
"d1f4ff21631dc8ac85dd39516e22d5e187cd9d5e",
"afd4a9332cb43854b513ebba6ff17a79c388824b"
],
"paperAbstract": "Spin-Transfer Torque Magnetoresistive Random-Access Memory (STT-MRAM) is a promising memory technology, which has high density, fast read speed, low leakage power, and non-volatility, and is suitable for multi-core on-chip last-level caches. However, the high write energy and latency, as well as less-than-desirable write endurance of STT-MRAM remain challenges. This paper proposes a new encoded content-aware cache replacement policy to reduce the total switch bits for write, lower the write energy, and improve write endurance. Instead of replacing the LRU block under the conventional pseudo-LRU replacement policy, we select a replacement block near the LRU position, which has the most similar content to the missed block. The selected replacement block can reduce the switch bits without damaging the cache performance. To avoid fetching and comparing the entire block contents, we present a novel content encoding method to encode 64-byte block using just 8 bits, each bit represents 8-byte content. The encoded bit is determined by the presence of a dominant bit value in the 8 bytes. We measure the content similarity using the Hamming distance between the encoded bits of the missed block and the replaced block. Performance evaluation demonstrates that the proposed simple content encoding method is effective with an average of 20.5% reduction in total switch bits, which results in improvement on write endurance and less write energy consumption. These improvements are accomplished with low overhead and minimum impact on the cache performance.",
"pdfUrls": [
"https://doi.org/10.1109/IPDPS.2017.103"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/002fe9a7c5f0522279974faa4eeadc70838eb862",
"sources": [
"DBLP"
],
"title": "Content-Aware Non-Volatile Cache Replacement",
"venue": "2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"year": 2017
},
"003269cbab91ddf9f86833883fafd6ddaa61b038": {
"authors": [
{
"ids": [
"3451064"
],
"name": "Saumay Dublish"
},
{
"ids": [
"2164782"
],
"name": "Vijay Nagarajan"
},
{
"ids": [
"14984639"
],
"name": "Nigel Topham"
}
],
"doi": "10.1109/ISPASS.2017.7975295",
"doiUrl": "https://doi.org/10.1109/ISPASS.2017.7975295",
"entities": [
"Baseline (configuration management)",
"CPU cache",
"Computer memory",
"Dynamic random-access memory",
"Graphics processing unit",
"High Bandwidth Memory",
"Imperative programming",
"Memory bandwidth",
"Memory hierarchy",
"Speedup",
"Synergy"
],
"id": "003269cbab91ddf9f86833883fafd6ddaa61b038",
"inCitations": [],
"journalName": "2017 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)",
"journalPages": "239-248",
"journalVolume": "",
"outCitations": [
"36e46139ac2d2f3242cfe49469ce09403b5df852",
"35fc951ff2b2bb9784391f3352282980e4c8137e",
"e0857c644b1059323d15ef9d45ffe86f4f3b6a09",
"6c86a995c3454d888713e66948c0d09b1451f0c2",
"1c919013b4b7270927e0a4e5213909bd05e89891",
"1087bbef784e7daecaf13b58bc1480d6dee4929b",
"434fa04db769935ae61bbcf4d9faa602b9a8c730",
"5f3cce1bc739ebfc03e003010d3438bb318efc14",
"4377307d51b459b89e768dc17cd532983766ba9e",
"0edf4ef1b8e09e4abc994f7d450bc090262e2c9b",
"2d6f002477015469075954c6748a1a85af352c94",
"28cc7453c5f3f9ecb9415e631b0829ec9af8a4c3",
"015298cd0df643ad7e3915e97ac14453b183d5df",
"7ea15c138cc72588fa376ff819f4bb8ca0b324da",
"d9b47764db442dc1bc1dad1570c85367002afe4a",
"70c4ef7c1aad74d0fbe362ce4260e94f99fc4aee",
"14505c2bdd3822d7a62385121d28ba3eb36fea1d",
"3b2925fe06b3658950e14241e87b979c4d91a4ef"
],
"paperAbstract": "GPUs are often limited by off-chip memory bandwidth. With the advent of general-purpose computing on GPUs, a cache hierarchy has been introduced to filter the bandwidth demand to the off-chip memory. However, the cache hierarchy presents its own bandwidth limitations in sustaining such high levels of memory traffic. In this paper, we characterize the bandwidth bottlenecks present across the memory hierarchy in GPUs for generalpurpose applications. We quantify the stalls throughout the memory hierarchy and identify the architectural parameters that play a pivotal role in leading to a congested memory system. We explore the architectural design space to mitigate the bandwidth bottlenecks and show that performance improvement achieved by mitigating the bandwidth bottleneck in the cache hierarchy can exceed the speedup obtained by a memory system with a baseline cache hierarchy and High Bandwidth Memory (HBM) DRAM. We also show that addressing the bandwidth bottleneck in isolation at specific levels can be sub-optimal and can even be counter-productive. Therefore, we show that it is imperative to resolve the bandwidth bottlenecks synergistically across different levels of the memory hierarchy. With the insights developed in this paper, we perform a cost-benefit analysis and identify costeffective configurations of the memory hierarchy that effectively mitigate the bandwidth bottlenecks. We show that our final configuration achieves a performance improvement of 29% on average with a minimal area overhead of 1.6%.",
"pdfUrls": [
"http://www.research.ed.ac.uk/portal/files/33199116/PID4694747.pdf",
"http://homepages.inf.ed.ac.uk/s1433370/papers/ispass2017/ispass2017-dublish-slides.pdf",
"https://doi.org/10.1109/ISPASS.2017.7975295",
"http://homepages.inf.ed.ac.uk/vnagaraj/papers/ispass17.pdf",
"https://www.research.ed.ac.uk/portal/files/33199116/PID4694747.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/003269cbab91ddf9f86833883fafd6ddaa61b038",
"sources": [
"DBLP"
],
"title": "Evaluating and mitigating bandwidth bottlenecks across the memory hierarchy in GPUs",
"venue": "2017 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)",
"year": 2017
},
"00388d4a976d40a182b2ad37e05f65b1def0afd1": {
"authors": [
{
"ids": [
"2651748"
],
"name": "Gabriele Tolomei"
},
{
"ids": [
"1753531"
],
"name": "Fabrizio Silvestri"
},
{
"ids": [
"33897206"
],
"name": "Andrew Haines"
},
{
"ids": [
"1684032"
],
"name": "Mounia Lalmas"
}
],
"doi": "10.1145/3097983.3098039",
"doiUrl": "https://doi.org/10.1145/3097983.3098039",
"entities": [
"Algorithm",
"Black box",
"Display resolution",
"Ensemble learning",
"Feature engineering",
"Feature vector",
"Online advertising",
"Random forest",
"Recommender system",
"Tweaking"
],
"id": "00388d4a976d40a182b2ad37e05f65b1def0afd1",
"inCitations": [
"162dc19e3795062292cc78b2f226b2f4bc5245ec",
"382f1ebe6009e580949d5513bc298cb253a1eeda"
],
"journalName": "",
"journalPages": "465-474",
"journalVolume": "",
"outCitations": [
"564985430ff2fbc3a9daa9c2af8997b7f5046da8",
"47d5d824ea75254d5cd789141f702b1289d028de",
"0f64ccff1c1c8ca3a2cd08245305f68a23249c2a",
"6b17827b6e2563f10b53b8b37c95f5af5415c556",
"48caac2f65bce47f6d27400ae4f60d8395cec2f3",
"c4806efffa95a727006d2d6284240f2c181f75ab",
"db5458476f3fd850d9b4c947e3aff04bf8ba3edc",
"90e962c7980c790e5b3ba9d511e13f19b47b622f",
"5636dca44384240ce9aff2b10b78458cd3c2f450",
"8010d66631512f32df94ab7a34b98a53adab962d",
"b093ef7c1bfe6e2beecc20523bb1c65e686b44ad",
"83bfdd6a2b28106b9fb66e52832c45f08b828541",
"33b3d9864a0f776afdc2d57453a4acc0a9f2519e",
"318acfafaa66c5b1f1fe93caaa5c435fb637db9d",
"75e0a740fb375524a9d0fc40a79f2c2442e9aaf1",
"25045b29dd0cfa7abe493fdf1dcf0b488f014065",
"2f991be8d35e4c1a45bfb0d646673b1ef5239a1f",
"cfb2297032401b7cfb2cfed02ee8f957dce68506",
"5f14436636346cfc6d7d4b8145af3d1920fd677e",
"57243e5f22f8224817c4b89fbca1a7b86c4fa42e",
"ae565efa4dc48b03edc2ddcbaeccf8a71267bf59",
"e350acaf6673d240ad2772652f3328246e735342",
"9f47b1ac404bcdd327bedaf34e8a72f127cf5e00"
],
"paperAbstract": "Machine-learned models are often described as \"black boxes\". In many real-world applications however, models may have to sacrifice predictive power in favour of human-interpretability. When this is the case, feature engineering becomes a crucial task, which requires significant and time-consuming human effort. Whilst some features are inherently static, representing properties that cannot be influenced (e.g., the age of an individual), others capture characteristics that could be adjusted (e.g., the daily amount of carbohydrates taken). Nonetheless, once a model is learned from the data, each prediction it makes on new instances is irreversible - assuming every instance to be a static point located in the chosen feature space. There are many circumstances however where it is important to understand (i) why a model outputs a certain prediction on a given instance, (ii) which adjustable features of that instance should be modified, and finally (iii) how to alter such a prediction when the mutated instance is input back to the model.\n In this paper, we present a technique that exploits the internals of a tree-based ensemble classifier to offer recommendations for transforming true negative instances into positively predicted ones. We demonstrate the validity of our approach using an online advertising application. First, we design a Random Forest classifier that effectively separates between two types of ads: low (negative) and high (positive) quality ads (instances). Then, we introduce an algorithm that provides recommendations that aim to transform a low quality ad (negative instance) into a high quality one (positive instance). Finally, we evaluate our approach on a subset of the active inventory of a large ad network, Yahoo Gemini.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3097983.3098039"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/00388d4a976d40a182b2ad37e05f65b1def0afd1",
"sources": [
"DBLP"
],
"title": "Interpretable Predictions of Tree-based Ensembles via Actionable Feature Tweaking",
"venue": "KDD",
"year": 2017
},
"003ee7658359e89867ae41397ccd8490e86f7a9c": {
"authors": [
{
"ids": [
"2098053"
],
"name": "Trinabh Gupta"
},
{
"ids": [
"3215063"
],
"name": "Henrique Fingler"
},
{
"ids": [
"2445753"
],
"name": "Lorenzo Alvisi"
},
{
"ids": [
"1756078"
],
"name": "Michael Walfish"
}
],
"doi": "10.1145/3098822.3098835",
"doiUrl": "https://doi.org/10.1145/3098822.3098835",
"entities": [
"Anti-spam techniques",
"Cryptographic protocol",
"Email",
"Email encryption",
"Encryption",
"End-to-end encryption",
"Plaintext",
"Privacy"
],
"id": "003ee7658359e89867ae41397ccd8490e86f7a9c",
"inCitations": [
"6793a8e3ce9f56f19a381b85af6e22b405b88be9"
],
"journalName": "",
"journalPages": "169-182",
"journalVolume": "",
"outCitations": [
"2e72e467bc4445b697cc825666a341a8ed83b3ab",
"6d6bd93c620885cb5ddd5abfac19efffac132cd5",
"04ce064505b1635583fa0d9cc07cac7e9ea993cc",
"9e487eea9772ba8742c5deee3f6b214ebfb79811",
"37ca60b5a286107985567d90e31b96bfa1251cbb",
"3bec43ace9f6834464bfc1af8e67f9616f2dc757",
"23ec68ed03b485b645478a3f6905615617d905a6",
"1b96e0effa98ffe22a179bc40b54be49ca10593f",
"028ca1ee0709304970cd5ac306ca700c2be1d925",
"4a5cda63e76498f30a0fcb3fa59e9731c9902de9",
"522a16a41c33f8cb0f4a8bf51c9f3cd13cd2f05e",
"24e6cf0796237f21c780a3f0c996817f57b3a1bd",
"4cee8edc1acbbdf5accff10bc1b13370f2c5745e",
"15509fdb7fc7bf065fcdf776b38cf3d72d10c113",
"daf30b656afb032f5da2b9799b34f841dd2f443d",
"ab4cce1ba0939f6944743e46c77f56e7d991ab9f",
"127adf86474103b6f05afcc5bceda45bb5e34a8a",
"10ab1b48b2a55ec9e2920a5397febd84906a7769",
"19e6f3ea035d33590a8598be68ac82e6f00ce518",
"c8619ca909a9ad1cc6cd6ef6089614ca3897e22d",
"9509f45ebc129bd68ea94d55d90fee410afb8143",
"49e78901c274b04a320b2edf6f6a76bc5e8ae9f7",
"3b03935dfc89c0cad63e05976c21fef6c9fb4190",
"469243cc7d80ea0c34702a9652ebb2ab9dad3e7f",
"39bd1f1f75ca061985833f7f1d339ace60047f45",
"895410b9eaf6693217580c1f279ebee33c5d19a6",
"3f40a5b0bcf4401c3f8efdbb539deec2763ad916",
"5e95a469a4bf7a079a517aae76d66b35fa6d84b6",
"69dc0fe412f974a595abe6d7052d8fdf2304ba3b",
"6d7c4a3ced42bc72a0025d329b04a3cfa14e8f0d",
"2905a5c4da8c9a0970f078a211742316ef0ab77d",
"51c16613dc8673ff1f8137badfa39d9891ef6cd0",
"685b3d2aacda1059fdeb6c7c7723f4b3dac94ce5",
"354e28d805afb6891274783a2ea54025df12de0f",
"15964bef0c5a10420ccf44f4e02f4905aa9d85d0",
"2fb3c68ac20704fcda5b6ec91a3e166ec41f6c13",
"db0f82a419f89cda64fcbec2c58137862cd04475",
"21b61061ca2711e2dc66dd799ecd6b9d6dcced36",
"2e918c9ceae2422090951000e40445f04dce818d",
"789708cfa812dd79e5ee0b071979c49b367ab983",
"3a15ad9855bdbaafb687f9b2d9f4b06a068ccabd",
"b42acbbaf7068828fd8581b58f1df4632a192ee6",
"6b9acc1374fe9e5e2e02cfba055bed357468a1b8",
"6ae39779f1273170f8a990d9558d3a248d6907b5",
"18ac49f65f7794f40eb855b7ba0b084a6a5ac156",
"0b9286a010bee710e74362a35f96dd1c6fee0fdb",
"19c3736da5116e0e80a64db35afe421663c4b4a8",
"74b57a54fb755d13082c1598756db7cec9866d8b",
"7844a1f0effa4e1cf75c8f90894437e9c6f2fe1f",
"5a26d6ac6a8e97f0917da3f02c0245f0be6a47ae",
"61a297247f899995789dc6e32bcf3972502374b8",
"c66b6aa41812e00facea7b5de249b9670c602fd3",
"0e0427aedfed65c8dd688c094b181feacf4eaab4",
"57f0a7ef8a11f191ff84e825f9153c254a29b427",
"65a9d492c7ba31df76e86ca0c46d1c4500741385",
"1efbc4c3c66f1dded4cfc626982d2e40a1c5b87b",
"124005cd9102541f62c731ad9b2035ad35b244eb",
"32bb922480593e1856d7223f5abecd0c15d69c6f",
"24c9b0b05c5e957e255b854f947472f9181772a4",
"e1ecc225690f79d1d51202d6772d3c2e0d0aea2a",
"c1d36203276052765afbc8d9cd822ba5d0384627",
"4beef78e9b21611a59237b63d512014e47f32d5e",
"41bcaa2df214711891a78624e26286fda212a970",
"00bbbf3af78f80651e9f955209ee72711fa5d412",
"111df2d8bfae2a06d593317c6aa60f90f9a3e0a4",
"2cf3fd84f30e5cae30dd46a3d7ecc0d63583b1a6",
"1d279a4281d7f05ce8aecb083d5f4ea2e317c66b",
"08026d939ac1f30951ff7f4f7c335bf3fef47be4",
"2abe6b9ea1b13653b7384e9c8ef14b0d87e20cfc",
"107444d65c858555bdb4a93eeeb7b3622a2af1c6",
"f0569efef9069572a2958b59dbf43ba01fe2cfae",
"45f6957cab31e802934cc761380c1a4a37c66208",
"16dcd9dd1a947dc3fe4207d17f84e7e1da2cb236",
"2d2581b990fd8b2df020cea5a6392b15f771bf0a",
"4ea466a79c3fbdfce4d5916481a484aa3e22860b",
"8a7374b98a9d94b8c01e996e72340f86a4327869",
"b259bc404180d24e958859edeee1966a1a62f11a",
"40d68c0011958b9a990c9df65414fcf4fd539c72",
"4ce2e5da422caff5ac6d5164132618de8eead6a9",
"1d75b7e7aac3e54984a8d8c70478482a3fd3067d",
"47dd6b9d9cedbe2526ad22a01ca4fea1025e07d1",
"a09dcece804c6cd11fd3f0025dda7d327121ae67",
"595a00f0975b5d5c28d904ddba1ae5a493316573",
"39a80339844a27e63a2b82ae4f8eb964da787172",
"39a696a77f221ee139fdce8438a0b12224bf67f3",
"6a74a8573cb1bd15c5f4fa4e047613d2340e61b9",
"1d64f2ed0cec2950245154180dd106fb0c5669bc",
"1fc0d824cd3ced24290806c62fae5aa13c961d79"
],
"paperAbstract": "Emails today are often encrypted, but only between mail servers---the vast majority of emails are exposed in plaintext to the mail servers that handle them. While better than no encryption, this arrangement leaves open the possibility of attacks, privacy violations, and other disclosures. Publicly, email providers have stated that default end-to-end encryption would conflict with essential functions (spam filtering, etc.), because the latter requires analyzing email text. The goal of this paper is to demonstrate that there is no conflict. We do so by designing, implementing, and evaluating Pretzel. Starting from a cryptographic protocol that enables two parties to jointly perform a classification task without revealing their inputs to each other, Pretzel refines and adapts this protocol to the email context. Our experimental evaluation of a prototype demonstrates that email can be encrypted end-to-end and providers can compute over it, at tolerable cost: clients must devote some storage and processing, and provider overhead is roughly 5x versus the status quo.",
"pdfUrls": [
"http://arxiv.org/abs/1612.04265",
"http://www.cs.nyu.edu/~mwalfish/papers/pretzel-sigcomm17.pdf",
"https://arxiv.org/pdf/1612.04265v3.pdf",
"https://arxiv.org/pdf/1612.04265v2.pdf",
"http://doi.acm.org/10.1145/3098822.3098835",
"https://arxiv.org/pdf/1612.04265v1.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/003ee7658359e89867ae41397ccd8490e86f7a9c",
"sources": [
"DBLP"
],
"title": "Pretzel: Email encryption and provider-supplied functions are compatible",
"venue": "SIGCOMM",
"year": 2017
},
"004c2345477eda977f12b4485ac24a9e41557439": {
"authors": [
{
"ids": [
"2089711"
],
"name": "Aasheesh Kolli"
},
{
"ids": [
"2077856"
],
"name": "Vaibhav Gogte"
},
{
"ids": [
"2303964"
],
"name": "Ali G. Saidi"
},
{
"ids": [
"2298231"
],
"name": "Stephan Diestelhorst"
},
{
"ids": [
"37845066"
],
"name": "Peter M. Chen"
},
{
"ids": [
"1678884"
],
"name": "Satish Narayanasamy"
},
{
"ids": [
"3334450"
],
"name": "Thomas F. Wenisch"
}
],
"doi": "10.1145/3079856.3080229",
"doiUrl": "https://doi.org/10.1145/3079856.3080229",
"entities": [
"3D XPoint",
"Atomicity (database systems)",
"Baseline (configuration management)",
"Byte",
"Byte addressing",
"C++11",
"Compiler",
"Consistency model",
"Data structure",
"Industry Standard Architecture",
"Persistent data structure",
"Programmer",
"Schedule (computer science)",
"Serializability"
],
"id": "004c2345477eda977f12b4485ac24a9e41557439",
"inCitations": [
"41ea95cc4dca373bf324555b897760054ec4a76e",
"3b6dddd6109b9ff9b339677931ca29d568efdbd9"
],
"journalName": "2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA)",
"journalPages": "481-493",
"journalVolume": "",
"outCitations": [
"129f11028220d87525b37b4605a2c04eb26f3e73",
"24724ad8962a9e04eb496fddaefe9708f6960601",
"42c70d64890726f60556caf3eec3f06e85642dd9",
"19710fa0e64f36616e112c8a7b4e99ba4cb43c74",
"10419c6f4aa50a36ed0b103c9ddb9aec45f133fe",
"15c80ec5104e98d6f84b5ed348ba0276c0739862",
"242cbdc5966fd14ba4a00815ac301fb278d8f544",
"3af216f371069b57c0dca5448384d052fb490fb4",
"512a8925693d5f4b8e4cfde32bcd3c846a14b71e",
"1bb29cdeab20f4f5d739aacbb403e3751ca15f3b",
"85398d5f19157c91bf00da3d36210e72d57887e4",
"5f7c6e456216a2741702ddc2e18cd7f740d5a962",
"94783d113951822195d4ba44599a8fcbdef9d4bf",
"05a1357946de5eca42a477b7b268db4944219a2e",
"33dcafd805a3b44fd64270028633032ff0bb6fac",
"164a2d44033f7003565892a6f10ac86703d6ca7f",
"209c2347a28bc0af9f8ace63ebbdf056729f41dc",
"747ad718761b7d848a12e4f3a82aa0f46117a815",
"10d8afea57c8f159c4eb2664a40c8fb859acefef",
"57c823b3b07b98233394bf15cfbbaed6a84809df",
"157b439116e0dfb349f175d51c3793489355e08c",
"05bd926844ffa89f668237a6836825c59d6377e9",
"d4c5e14e27b45266532c74f6aa0d51a1a4280e7c",
"bf5497e15f22233cbc2a4d0c3cc2c36f26738701",
"d04957ae69caf43707b13fa833e50119724688f1",
"101bcfb23ad622fa5fed78ca627f0ef3fc8e5624",
"03b6a916498fa8591201a2de5f22344609b1e457",
"2bf9bc1bb7386e8a1e0e172ff7b27a805584e3d1",
"05c56f4abc527fbf384ad011dc9c0a613955641a",
"16653666b0005f91060a3e402566659749b84313",
"5bc06f8a33370f46f52f1d0282e5f91057a7192b",
"47b851237f240831abee3971bca6bb8d2a121eb1",
"823116269044ab4c713373c66c7da3fcb495b459",
"425c117685a681c6c6de55e2928dc87066b53fbb",
"0a6c15f75b0b52ea345caffabacd4c3f382b59a4",
"33817456b5263fab036210ff1245dcc96f863101",
"2fc8a439f0f73462f875870c403c90ea1fb99e41",
"a95436fb5417f16497d90cd2aeb11a0e2873f55f",
"67c64f4e676e1996cca7fd0ec50e453d6c698814",
"9aa0d7253574e50fe3a190ccd924433f048997dd",
"0a92088c1cf7463ed5d347d2624976e0126ffced",
"2cc69da629e857dbd7facbcf808a64b10e9db9a7",
"544c1ddf24b90c3dfba7b1934049911b869c99b4",
"0edf4ef1b8e09e4abc994f7d450bc090262e2c9b",
"885c666fbcfd1a10c613496d7a041d01b99c7a39",
"0ab0bc631b29f75118dbcb655df783e9a299d9f0",
"7b2a7ed9ebd0a3c80d186959bced7cf46b02d6f6",
"0645f0f88e9a3cd6e9b1d0c21bc24666a7377666",
"3ede1909bf70d6e4bca46302f474083517b081a3",
"071686697917fd56ae8ace0c4d6bfcf3bef5700a",
"9376a2d69d06e39fd6fd27c9ce2f0817cc1dd4ef",
"23773ffc679a8d9ebfd73810dec3e6fe6aa278ab",
"0204f40221260d00c5ee63646560a40dcd7d97d1",
"277862a906af8489a1d98add2f6516a0e5df1bb1",
"1b9e9bfdc66140d2eb192e4ac8aca9281f0239b8"
],
"paperAbstract": "The commercial release of byte-addressable persistent memories, such as Intel/Micron 3D XPoint memory, is imminent. Ongoing research has sought mechanisms to allow programmers to implement recoverable data structures in these new main memories. Ensuring recoverability requires programmer control of the order of persistent stores; recent work proposes persistency models as an extension to memory consistency to specify such ordering. Prior work has considered persistency models at the abstraction of the instruction set architecture. Instead, we argue for extending the language-level memory model to provide guarantees on the order of persistent writes.\n We explore a taxonomy of guarantees a language-level persistency model might provide, considering both atomicity and ordering constraints on groups of persistent stores. Then, we propose and evaluate Acquire-Release Persistency (ARP), a language-level persistency model for C++11. We describe how to compile code written for ARP to a state-of-the-art ISA-level persistency model. We then consider enhancements to the ISA-level persistency model that can distinguish memory consistency constraints required for proper synchronization but unnecessary for correct recovery. With these optimizations, we show that ARP increases performance by up to 33.2% (19.8% avg.) over coding directly to the baseline ISA-level persistency model for a suite of persistent-write-intensive workloads.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3079856.3080229",
"https://web.eecs.umich.edu/~pmchen/papers/kolli17.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/004c2345477eda977f12b4485ac24a9e41557439",
"sources": [
"DBLP"
],
"title": "Language-level persistency",
"venue": "2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA)",
"year": 2017
},
"005b005eba413972ff1be3f102e229e730e051b0": {
"authors": [
{
"ids": [
"2290932"
],
"name": "Fredrik Kjolstad"
},
{
"ids": [
"2853477"
],
"name": "Shoaib Kamil"
},
{
"ids": [
"29920289"
],
"name": "Stephen Chou"
},
{
"ids": [
"2636191"
],
"name": "David Lugato"
},
{
"ids": [
"1709150"
],
"name": "Saman P. Amarasinghe"
}
],
"doi": "10.1145/3133901",
"doiUrl": "https://doi.org/10.1145/3133901",
"entities": [
"C++",
"Compiler",
"Library (computing)",
"Machine learning",
"Sparse matrix"
],
"id": "005b005eba413972ff1be3f102e229e730e051b0",
"inCitations": [
"d4df38e1c0e4821388946f26a9ee51d3f2b82bed",
"6360c75a753a0a29c4cd194f11b0f939b78e0f0a",
"1731c32f9e644d2ecd4e08395351f01ad25ad579",
"3c6cb1d654509bd43af5f70ebb9ebc06827bfa29",
"904d4c36306db05e902cc2c0050bee9579a34f68",
"db12b1acdf950527ee8eccbdaa99ee9dcf5c1274",
"585cec9677e5cdb04e882cb47cc491c54ecbeb80",
"2465db685bd5694dc00e8ea9d80612aa2ebf7708",
"4cd112d3707eaefddd796204e9f1b64676682ea0",
"0d461ea21db16fed87e53bbef72201708c5f6b7e",
"05f057c34e0fcd05d0067ed504d55671bd9c967f",
"135614db311313e4b12fc2cfec11c1231441f034"
],
"journalName": "PACMPL",
"journalPages": "77:1-77:29",
"journalVolume": "1",
"outCitations": [
"a3b049e2bd96d92bdef3f262b16bcb77140132f5",
"00fc93840f3e3d5421c9b273f70a7410b8961c5a",
"1ef7f02bce931c8e9ef529e095b274132ce4011a",
"2891da32932a45f8b14bb95f7e26b5ae9677f430",
"27f3bb5ef854c0b0e559fb382114ba24891514b0",
"a7f8ec0ecd2d5b07aee99c1707fdf1d7ff99ae12",
"529e1deae0a67b0f8d92fbb256adddced491ea40",
"12f1a2a510a4e86ecd75c8081a78620c71822f99",
"3563be7789459d88bec67844f4dcdf22703eed7b",
"231f97057e1efed073c20ccdf3aa3c5aaf063ffb",
"70da6a5e4b90253cafa917b9824efe034717f47b",
"14fde290a2f08ff1fc7260f717eef16a20cdd994",
"31af4b8793e93fd35e89569ccd663ae8777f0072",
"065f10e40b17fce3a3735f50bd04e2a00fe6c583",
"2ed09ce69ec5e46e55c44e894aed20022bc97772",
"3ac79c19099bebc11dfef2dea017d1e1a159fe7c",
"62b996c8b0845277f1b8a1459ecae454c054cd7c",
"00f581aca4dd370615fa0ea99e730d6dd42fe347",
"0b2522ed3cf20c6e9844dd0cb72481041006e97c",
"9689ba2d4673a39cb9bdfb9802660d6acf427704",
"5c3785bc4dc07d7e77deef7e90973bdeeea760a5",
"4902e83433eb32fa3b18eb820b76894ecbd71702",
"3edef062698ab35fbe4cc5a5ffce633e09f8b6f2",
"892d5068d8200b6d8d7654c1cbe01883cbcb8488",
"53a225f2843e8544ca9c615ecfcc5fad26083e49",
"4fd74b807b47a5975e9b0ab354bfd780e0d921d2",
"0072eb224991ada6fc8a4e2d3465e4a51c0b26bc",
"5672ce28f2927b81b01303e4926643c55a4c8133",
"196006af4361d7a94c55885a7370599aeff21119",
"9bcb7ff601bb96f0de52e460007d1dfeaf0cb5c8",
"f4dff66ba8f2338d118f379f2eff1410feb57ce6",
"5f491a183c71b0322b16e4f5dc69538c50db79e0",
"2489dfa220df07f9a94f4f4fa0f8ec1b2e695c61",
"f17c253c37225094130aa58ab29c1493a59f9432",
"99a1520bc334c111ff84619a1ac376f009d0d3bf",
"430fa1802c54cae3bed1b978fe1c645c35087286"
],
"paperAbstract": "Tensor algebra is a powerful tool with applications in machine learning, data analytics, engineering and the physical sciences. Tensors are often sparse and compound operations must frequently be computed in a single kernel for performance and to save memory. Programmers are left to write kernels for every operation of interest, with different mixes of dense and sparse tensors in different formats. The combinations are infinite, which makes it impossible to manually implement and optimize them all. This paper introduces the first compiler technique to automatically generate kernels for any compound tensor algebra operation on dense and sparse tensors. The technique is implemented in a C++ library called taco. Its performance is competitive with best-in-class hand-optimized kernels in popular libraries, while supporting far more tensor operations.",
"pdfUrls": [
"http://people.csail.mit.edu/fred/tensor-compiler-preprint.pdf",
"http://doi.acm.org/10.1145/3133901",
"http://dspace.mit.edu/bitstream/handle/1721.1/107013/MIT-CSAIL-TR-2017-003.pdf?sequence=1",
"http://groups.csail.mit.edu/commit/papers/2017/kjolstad-oopsla17-tensor-compiler.pdf",
"http://people.csail.mit.edu/fred/tensor-compiler-techreport.pdf",
"http://people.csail.mit.edu/fred/tensor-compiler.pdf",
"http://groups.csail.mit.edu/commit/papers/2017/tensor-compiler-techreport.pdf",
"http://dspace.mit.edu/bitstream/handle/1721.1/107013/tensor-compiler.pdf?sequence=5",
"http://groups.csail.mit.edu/commit/papers/2017/kjolstad-oopsla17-taco.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/005b005eba413972ff1be3f102e229e730e051b0",
"sources": [
"DBLP"
],
"title": "The tensor algebra compiler",
"venue": "PACMPL",
"year": 2017
},
"00949bff493a83be184650c80e94a74b9e238b52": {
"authors": [
{
"ids": [
"1894033"
],
"name": "Sizhuo Zhang"
},
{
"ids": [
"2287352"
],
"name": "Muralidaran Vijayaraghavan"
},
{
"ids": [
"3285866"
],
"name": "Arvind"
}
],
"doi": "10.1109/PACT.2017.29",
"doiUrl": "https://doi.org/10.1109/PACT.2017.29",
"entities": [
"Cache (computing)",
"Cache coherence",
"Central processing unit",
"Circular definition",
"Memory coherence",
"Memory model (programming)",
"Open-source software",
"Operational definition",
"Out-of-order execution",
"RISC-V",
"Time Sharing Option"
],
"id": "00949bff493a83be184650c80e94a74b9e238b52",
"inCitations": [],
"journalName": "2017 26th International Conference on Parallel Architectures and Compilation Techniques (PACT)",
"journalPages": "288-302",
"journalVolume": "",
"outCitations": [
"69e6fb41751ebf0a6b99522a2fabcd3879e8cf2b",
"17e4e843676868b7dd5dcacea945141d7a8e17ee",
"0ed62848d5c9e01f692c0c0b3851848ac7bb0764",
"d4c5e14e27b45266532c74f6aa0d51a1a4280e7c",
"62bd72d7a4160bd1a35191c51137d11cfbe30cf7",
"05a518c3b1a6f5c15d77f8829368677a263ff15d",
"33dcafd805a3b44fd64270028633032ff0bb6fac",
"4bb640b092cbbf55ed4d1de8edb79ba8a79b0ebd",
"3082d9ff0a7356b7414a5c6f0521e43dbcb9b2f8",
"180189c3e8b0f783a8df6a1887a94a5e3f82148b",
"9b117e3188bc7e7aba69d532165c0cceccc78f04",
"a28f4c45ad72a50f56f7f9df13762c739230b646",
"16dc592aa326ecd1f8d46ca7e3485a7311af3dba",
"857726e6c21504e66569e3d61ed6b8710e44db4a",
"13210f969b8b4d1d12d63a9a8361028a6be498bc",
"0c10529346c4d2d5d4462636a0b3a0dd9fb8d25c",
"bbac864f6815762a57ad18bdc3e6c456b7140947",
"47b8b9cd7b064619e6bf25cde95e7af4bf5bc197",
"ad913bd3d95fc9e5f6888974e04726eb441a6fc6",
"413d938109026fb513083a3b3f1c616da005639c",
"9a95cb1f79a8078e47dfb17f695952a6bea92fb5",
"044aa72dd3879d4164094c3c8d32e9a1ba2a4f2e",
"10f1faeec4ee2158b8535b249a20de5419998153",
"1ea33a0ba2ded13492a4afa6817f953eede0e037",
"2cea911044b0b9dc2cee2e2b04915b9aab22f86f",
"e2cd72273908651ea11f9cb45d0dd5d755ca3bd0",
"49f0f6c03f6eec08fe4426706609413fa5fa6f17",
"3eae0271717f6b4d65024abf04e5d98aef41d748",
"c7ae87b4e5952560362e24274a3e9f4e78a666f6",
"3972fee7dbef2c2c1fc695d175faf4a56dcb382b",
"362e9b5afe5934a9d8046d758c17c5bada0652b3",
"5eef609f21fc9327e551ab40425f7f1715c3e200",
"3a850f54e6dea4728aaa6a71ba222b7d612cd2b1",
"101bcfb23ad622fa5fed78ca627f0ef3fc8e5624",
"ae8ee52b076263e1108ac35714bf15c6dd514f11",
"5ae07f575fb2feb1e03d08af9fe29fafe0a306d7",
"0f0046ae34181e08594ad9be7b5bfffdbaeda177",
"51b172edac5e4f60321db6127bd04d9a8931ca1a",
"34d2db88f259d69022e7492225301ffd6e0f55c0",
"4d1e3d20531b7118c50b137715b69926d990d7c6",
"071686697917fd56ae8ace0c4d6bfcf3bef5700a",
"1476bc7362e02995a8869ed6d3703e740284f450",
"bb6cedd67b26fce1f0d8eacb0357658c6831586d",
"1b9e9bfdc66140d2eb192e4ac8aca9281f0239b8",
"3a66a682ee36cde0738824b152a51df2ccbb80fd",
"520f2bb3565ab01a28c35f5c7e506bbbef71ed79",
"1aac5c5e6dda36e455bed8af80dd1fd6bb31321e",
"3e033205357becbb70e0b697134a5fe6fa17da43",
"54fe429f0292ad691daaf923e6bf477788892b3b"
],
"paperAbstract": "The memory model for RISC-V, a newly developed open source ISA, has not been finalized yet and thus, offers an opportunity to evaluate existing memory models. We believe RISC-V should not adopt the memory models of POWER or ARM, because their axiomatic and operational definitions are too complicated. We propose two new weak memory models: WMM and WMM-S, which balance definitional simplicity and implementation flexibility differently. Both allow all instruction reorderings except overtaking of loads by a store. We show that this restriction has little impact on performance and it considerably simplifies operational definitions. It also rules out the out-of-thin-air problem that plagues many definitions. WMM is simple (it is similar to the Alpha memory model), but it disallows behaviors arising due to shared store buffers and shared write-through caches (which are seen in POWER processors). WMM-S, on the other hand, is more complex and allows these behaviors. We give the operational definitions of both models using Instantaneous Instruction Execution (I2E), which has been used in the definitions of SC and TSO. We also show how both models can be implemented using conventional cache-coherent memory systems and out-of-order processors, and encompasses the behaviors of most known optimizations.",
"pdfUrls": [
"https://arxiv.org/pdf/1707.05923v1.pdf",
"http://doi.ieeecomputersociety.org/10.1109/PACT.2017.29",
"http://arxiv.org/abs/1707.05923"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/00949bff493a83be184650c80e94a74b9e238b52",
"sources": [
"DBLP"
],
"title": "Weak Memory Models: Balancing Definitional Simplicity and Implementation Flexibility",
"venue": "2017 26th International Conference on Parallel Architectures and Compilation Techniques (PACT)",
"year": 2017
},
"00be8c5ef2a75a205172d0f2bfb24caabecbdefd": {
"authors": [
{
"ids": [
"3153082"
],
"name": "Aosen Wang"
},
{
"ids": [
"27247854"
],
"name": "Lizhong Chen"
},
{
"ids": [
"2164973"
],
"name": "Wenyao Xu"
}
],
"doi": "10.1145/3079856.3080219",
"doiUrl": "https://doi.org/10.1145/3079856.3080219",
"entities": [
"Analytical Engine",
"Computer",
"Data aggregation",
"Sensor",
"Sensor node",
"Wearable computer",
"Wearable technology"
],
"id": "00be8c5ef2a75a205172d0f2bfb24caabecbdefd",
"inCitations": [
"0691177be59cca292fb488970f3130ffdb22bd85",
"3224f122d199bb24633ff37b398f273b0ff96289"
],
"journalName": "2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA)",
"journalPages": "69-80",
"journalVolume": "",
"outCitations": [
"11d0b69ea185c0c0918e02a78c06014b3b8a6162",
"3b3f4b97ad8b0b07e5aee1edb27b52f1dc720d98",
"1de9458e673c2be4483160f2ba2de478698cf059",
"798548b6995f327440100e0d7382ff2652c17c6f",
"24d9a4b498f67057b758f6501b5f7a792aafa4b2",
"86551e015cbf7bc1721674844b7e3ff7cd7e1190",
"61b1908e796cdc036a028c787cace553de45816f",
"a7588e230f43a349c4d0df5ee45964701a213109",
"58e4491dc48d46f4f47362686e09e6319c01edc0",
"f48bf09555a616592a40b47d13b3956e21d620e8",
"76329cc092b5fdc1b201594cab2788613947a852",
"38febe6b89738ca05095f50f68709e985e14829a",
"ed32d6368e1f46b5642dfc1dade1a3dcfd5ab990",
"3be80a8c6d7fc0219ff0044a93401ca4f563f74e",
"8f6c58c7d343ea2c07f85b5bc403eed6ab72dce2",
"d74203416e555d79304f454a5fd4c99a8db95253",
"7ce87672ebcd5476d43e705d9c84e4b97adb4b1d",
"e88ede2e4eeb7c312722bfae9cbe72a866d56a6e",
"352a8957005dc5519b15ed1870751ec494d66395",
"34bb46fc412a206c7f08a59e9a4fa876955448ab",
"4a310610600bf55085fe883b75a9b141ac4fdae1",
"3c11b4e74086db34430d5381031319cae83ce17a",
"5d5816bf02ea39ab02415e168d6145e5244dc889",
"00f71e2ed7cabaca57c5cd86bae4e76350ed1f70",
"b5b9b82be4154c7a3af17c7551284052903cb55f",
"2d87e9ac2ead16d3a59f1df3ecf3a5d095ccf3f0",
"059bdf296170b030fa9cb3c80efd202472b2f350",
"d8d0d01453c67a52dff2afc7304f4658640a9f99",
"e2682f2a2752cba7a05fd3db1cb43731c1afb002",
"8c59a872972c6a71938f094ae0e27682e165dae4",
"f09274db650ad5acddcde3912f61ee7f7cb82303",
"13f6d32c34e97e746a470d71882a3cfd5d304c6d",
"2eed7e2f120d0f9a2b778b97e684101745997f9a",
"2a96a8edb4433861c619a2ce278a1c6f6465b453",
"37f1c546fd9dc23f077c98997e5d7784e39b7183",
"71278785aeaa9fb41ff0c08182721be2fd058ae1",
"4cd0a064ca8ac519215c82b8d2a5d96e5b72bbcd",
"af4eec9f6258940a90a86d3b450176f439249e17",
"9d08d7ecef81303c0c45172ece892027063b5209",
"3ecc44a209cf712043dc7733e438c9b77efbc2c5",
"67f9d12c1c90dcc31a6c970dc8da3146acf520dd",
"00af79ca91bf0a7e7202efcf610e05b63eee6c9b"
],
"paperAbstract": "Wearable computing systems have spurred many opportunities to continuously monitor human bodies with sensors worn on or implanted in the body. These emerging platforms have started to revolutionize many fields, including healthcare and wellness applications, particularly when integrated with intelligent analytic capabilities. However, a significant challenge that computer architects are facing is how to embed sophisticated analytic capabilities in wearable computers in an energy-efficient way while not compromising system performance. In this paper, we present XPro, a novel cross-end analytic engine architecture for wearable computing systems. The proposed cross-end architecture is able to realize a generic classification design across wearable sensors and a data aggregator with high energy-efficiency. To facilitate the practical use of XPro, we also develop an Automatic XPro Generator that formally generates XPro instances according to specific design constraints. As a proof of concept, we study the design and implementation of XPro with six different health applications. Evaluation results show that, compared with state-of-the-art methods, XPro can increase the battery life of the sensor node by 1.6-2.4X while at the same time reducing system delay by 15.6-60.8% for wearable computing systems.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3079856.3080219",
"https://www.cse.buffalo.edu//~wenyaoxu/papers/conference/xu-isca2017.pdf",
"http://web.engr.oregonstate.edu/~chenliz/publications/2017_ISCA_XProf.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/00be8c5ef2a75a205172d0f2bfb24caabecbdefd",
"sources": [
"DBLP"
],
"title": "XPro: A cross-end processing architecture for data analytics in wearables",
"venue": "2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA)",
"year": 2017
},
"00c8e8242f03a1cdf1b9a71632f42d58cddf3814": {
"authors": [
{
"ids": [
"30307951"
],
"name": "Crefeda Faviola Rodrigues"
},
{
"ids": [
"39609950"
],
"name": "Graham D. Riley"
},
{
"ids": [
"1706226"
],
"name": "Mikel Luj\u00e1n"
}
],
"doi": "10.1109/IISWC.2017.8167764",
"doiUrl": "https://doi.org/10.1109/IISWC.2017.8167764",
"entities": [
"Adobe Streamline",
"Artificial neural network",
"Computer vision",
"Convolutional neural network",
"Deep learning",
"Graphics processing unit",
"Maxwell (microarchitecture)",
"Mobile device",
"Power semiconductor device",
"Server (computing)",
"Tegra"
],
"id": "00c8e8242f03a1cdf1b9a71632f42d58cddf3814",
"inCitations": [],
"journalName": "2017 IEEE International Symposium on Workload Characterization (IISWC)",
"journalPages": "114-115",
"journalVolume": "",
"outCitations": [
"a1543975098f8ec14f4402f761eefb473100beee",
"3ac1df952ffb63abb4231a4410f6f8375ccdfe79",
"305806d53240aa523168d5aa59d902fb0c9a1581",
"52d2a6110e3bc2215d0347a04c421fb094044557",
"c3bd0b86c74a4464173073b1f36fd12d2637c7a8",
"3296a866a88f6be8f9354695cc7a098596f04253",
"1c454ae4e1bbc600791f3a4796fdb6b1ee2ca016",
"0b99d677883883584d9a328f6f2d54738363997a",
"9f1f065bf08cd90431cc051267a708f56436cd82",
"722fcc35def20cfcca3ada76c8dd7a585d6de386",
"adfaf01773c8af859faa5a9f40fb3aa9770a8aa7",
"81b7dcaef4a53daab41658a4d1e97972d04b3384",
"5d6fca1c2dc1bb30b2bfcc131ec6e35a16374df8"
],
"paperAbstract": "Energy-use is a key concern when migrating current deep learning applications onto low power heterogeneous devices such as a mobile device. This is because deep neural networks are typically designed and trained on high-end GPUs or servers and require additional processing steps to deploy them on low power devices. Such steps include the use of compression techniques to scale down the network size or the provision of efficient device-specific software implementations. Migration is further aggravated by the lack of tools and the inability to measure power and performance accurately and consistently across devices. We present a novel evaluation framework for measuring energy and performance for deep neural networks using ARMs Streamline Performance Analyser integrated with standard deep learning frameworks such as Caffe and CuDNNv5. We apply the framework to study the execution behaviour of SqueezeNet on the Maxwell GPU of the NVidia Jetson TX1, on an image classification task (also known as inference) and demonstrate the ability to measure energy of specific layers of the neural network.",
"pdfUrls": [
"https://arxiv.org/pdf/1803.11151v1.pdf",
"http://doi.ieeecomputersociety.org/10.1109/IISWC.2017.8167764"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/00c8e8242f03a1cdf1b9a71632f42d58cddf3814",
"sources": [
"DBLP"
],
"title": "Fine-grained energy profiling for deep convolutional neural networks on the Jetson TX1",
"venue": "2017 IEEE International Symposium on Workload Characterization (IISWC)",
"year": 2017
},
"00caa4dea9216bec01b465f8a69d0e1becc07b7a": {
"authors": [
{
"ids": [
"2598683"
],
"name": "Thanumalayan Sankaranarayana Pillai"
},
{
"ids": [
"31817919"
],
"name": "Ramnatthan Alagappan"
},
{
"ids": [
"2170646"
],
"name": "Lanyue Lu"
},
{
"ids": [
"2002462"
],
"name": "Vijay Chidambaram"
},
{
"ids": [
"1743175"
],
"name": "Andrea C. Arpaci-Dusseau"
},
{
"ids": [
"1703415"
],
"name": "Remzi H. Arpaci-Dusseau"
}
],
"doi": "10.1145/3119897",
"doiUrl": "https://doi.org/10.1145/3119897",
"entities": [
"Benchmark (computing)",
"Best, worst and average case",
"Correctness (computer science)",
"Crash (computing)",
"Eventual consistency",
"Linux",
"Linux",
"Scheduling (computing)"
],
"id": "00caa4dea9216bec01b465f8a69d0e1becc07b7a",
"inCitations": [
"0f4386d4a521e36cb15252b4e908a948a65252ef",
"a377d5f506a411c5d95361188c0b7f500fc2ca09",
"47f645013589f0c3babc505ee846711605f46226",
"4e731dfc4eee0006865d131b384f46b29965f42e",
"e97372229adcf4c015fcf43b3dcf3b51ddc48f2e",
"ade874e837a2a6b9ce67fad0c5dce6f4e3c68d11",
"ad42b4773cd461ba58bda07e1b7b0ff24c4ddba4",
"8d555af4ad0bcb45ac5ce62374fbd23ea429121f",
"41da20c0fb04dd4769f3772e392362acd893af57",
"347e1352fb903b40dce606a1e581e9d601bc289c"
],
"journalName": "TOS",
"journalPages": "19:1-19:29",
"journalVolume": "13",
"outCitations": [
"885c666fbcfd1a10c613496d7a041d01b99c7a39",
"6e90c995cc9caa0f7d9d68d536f5e16e9bcbbcd6",
"05a1357946de5eca42a477b7b268db4944219a2e",
"aed6e488244198d8bd9b882c8a53fff619666e7e",
"13c27125584651329f66461981cbb20fa63e9023",
"8c0573ba5f6aeb5a6391132ef26d613c045e6e1c",
"39e3d058a5987cb643e000bce555676d71be1c80",
"120c8504b4290920309165d48bb032f2c724a161",
"243c522b56809292f1f50117a9915053d32bf4fb",
"08e7d789b23d616c4c04432cf14b1836a73bbb6f",
"0420266f84cc95d6b7a8100e601f67d1118d4965",
"1cbaf27b55717e503284cfe339438c98da3a9867",
"10f1faeec4ee2158b8535b249a20de5419998153",
"3bbcce40cc2b9c848cb98e7ea8cd03a483aaca6c",
"23ee1c97c4a1229618bf6a614b02f33dc678fe6b",
"833da56175762daf644fe42b230917367264208c",
"68a9005a5ec10daece36ca5ecb9cad7be44770b1",
"2be26e8aa238ac37a80e08303f128d8014bb9f3b",
"2b1f67102166434c404e5f0bcd6e3da1c6837363",
"14cb2d4f902544862076519d9e424d071612a15e",
"bee0a31573c37a5808a0af25d39de98e06c385d8",
"265d18ced11e2e64d98afa97b0e86965e68101f7",
"045a975c1753724b3a0780673ee92b37b9827be6",
"acca916dcf29e548a8f3bd53b05acd18380b0f03",
"47b78e7eb12859a141aed6a28a4e301eb0352629",
"075f51b0aeaac7ebed18d5fbf67e64a14c8943f1",
"3492873a8bc6d1d501dcac97e891c43dfecc29c0",
"7e4ecfc13aba74db770378e640d5fbcce7fd3d2e",
"36f49b05d764bf5c10428b082c2d96c13c4203b9",
"00918f711d847f9934b606b9a1d6622ca24fc3ec",
"128c3e04314e6fca8deed005d74a3d1ba36ad293",
"6c2bc356d3abc932d2a15068728261bef5aae69d",
"34ef9c71821bd3ed7fa52c9178e1ee272fedb803",
"088e3e939ad234b6fdd0e321290fb26937dc2553",
"199ac28b6bc68bf05c77645ffae7640df114bca5",
"765e6f4feeb1f7d59d2b3c011e2e38814a958afa",
"036b85d48048b47180058034bde97ae633ba8c28",
"09c0d62190aedb53e820695ccbe98d90f877cc46",
"274e495824827f5a9dc1ba3ab62620445e6b3d4b",
"071686697917fd56ae8ace0c4d6bfcf3bef5700a",
"29357ed9c2b0b6e76dda247bbe90aa1dd39089aa",
"26f820aa9e782f5d6ba8bcb272a31c32094dfd59",
"25a83ec7cc04a5bf22061b78164c9d09a4de21a5"
],
"paperAbstract": "Recent research has shown that applications often incorrectly implement crash consistency. We present the Crash-Consistent File System (ccfs), a file system that improves the correctness of application-level crash consistency protocols while maintaining high performance. A key idea in ccfs is the abstraction of a stream. Within a stream, updates are committed in program order, improving correctness; across streams, there are no ordering restrictions, enabling scheduling flexibility and high performance. We empirically demonstrate that applications running atop ccfs achieve high levels of crash consistency. Further, we show that ccfs performance under standard file-system benchmarks is excellent, in the worst case on par with the highest performing modes of Linux ext4, and in some cases notably better. Overall, we demonstrate that both application correctness and high performance can be realized in a modern file system.",
"pdfUrls": [
"http://research.cs.wisc.edu/wind/Publications/ccfs-tos17.pdf",
"http://research.cs.wisc.edu/adsl/Publications/fast17-pillai.pdf",
"https://www.snia.org/sites/default/files/SDC/2017/presentations/etc/Pillai_Thanu_Application_Crash_Consistency_and_Performance_with_CCFS.pdf",
"http://www.cs.utexas.edu/~vijay/papers/ccfs-fast17-slides.pdf",
"http://research.cs.wisc.edu/adsl/Publications/fast17-thanu-slides.pdf",
"http://www.usenix.org./system/files/conference/fast17/fast17_pillai.pdf",
"http://www.usenix.org./sites/default/files/conference/protected-files/fast17_slides_pillai.pdf",
"http://www.cs.utexas.edu/~vijay/papers/fast17-c2fs.pdf",
"http://doi.acm.org/10.1145/3119897",
"https://www.usenix.org/conference/fast17/technical-sessions/presentation/pillai",
"https://www.usenix.org/sites/default/files/conference/protected-files/fast17_slides_pillai.pdf",
"https://www.usenix.org/system/files/conference/fast17/fast17_pillai.pdf",
"https://www.usenix.org/conference/atc17/technical-sessions/presentation/pillai"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/00caa4dea9216bec01b465f8a69d0e1becc07b7a",
"sources": [
"DBLP"
],
"title": "Application Crash Consistency and Performance with CCFS",
"venue": "FAST",
"year": 2017
},
"00cc482570d739e7b733f45b6f8f1836b24056bd": {
"authors": [
{
"ids": [
"1720084"
],
"name": "Vivek Seshadri"
},
{
"ids": [
"15895903"
],
"name": "Donghyuk Lee"
},
{
"ids": [
"1786530"
],
"name": "Thomas Mullins"
},
{
"ids": [
"40016363"
],
"name": "Hasan Hassan"
},
{
"ids": [
"2675748"
],
"name": "Amirali Boroumand"
},
{
"ids": [
"2512816"
],
"name": "Jeremie Kim"
},
{
"ids": [
"2366265"
],
"name": "Michael A. Kozuch"
},
{
"ids": [
"1734461"
],
"name": "Onur Mutlu"
},
{
"ids": [
"1974678"
],
"name": "Phillip B. Gibbons"
},
{
"ids": [
"1761585"
],
"name": "Todd C. Mowry"
}
],
"doi": "10.1145/3123939.3124544",
"doiUrl": "https://doi.org/10.1145/3123939.3124544",
"entities": [
"AMBIT",
"Amplifier",
"Baseline (configuration management)",
"Bit array",
"Bitmap",
"Bitmap index",
"Bitwise operation",
"Central processing unit",
"Cube",
"Data-intensive computing",
"Database",
"Dynamic random-access memory",
"Field-programmable gate array",
"Graphics processing unit",
"Hybrid Memory Cube",
"In-memory database",
"Memory bandwidth",
"Memory bus",
"Power inverter",
"SIMD",
"Sense amplifier",
"Simulation",
"Throughput",
"Web search engine"
],
"id": "00cc482570d739e7b733f45b6f8f1836b24056bd",
"inCitations": [
"6b6a5f2127b5ffbccd54d4823a9ca3a73969f3d1",
"ecf5efd5fe18860b42a1abd198e94a868dbf944c",
"651ae380b5d500c613770dbf55c175c52576d7da",
"983e87929eeb3f77c2ddb02d17d6efe978c80667",
"7b8c6b2e7652620c037ff4732bc6c7b4ae88da6c",
"2976932bec7334a150e1bb6916b7564bdaa864ea",
"0c4fe1f1a8043e8f4175b21faca1b72bff8033e6",
"1ebdf99bf03787a10d1c37bc9f93e89116e29bd6"
],
"journalName": "",
"journalPages": "273-287",
"journalVolume": "",
"outCitations": [
"430b1fa7fd090f65d063d32911820671288f23e3",
"12b9e924175e4df2cc559ffec5cf9df171453146",
"51db58e17d061db3e03bf43ebec5c9cd6569259f",
"3c761857787b3efe5e65b25bd94c737bf2cd7632",
"e762b1b654798cec0fb9d6000c7f7c777ac0689f",
"0437e781bf22d47f3a13cca1e27eca6ae91d3f41",
"2394c6644efa856f0da160a0f0031d74cd3b5000",
"21bda5f42e92f535c29012746915f6dd06adb97a",
"468035263afa59095614f26a62e0217da4a1aeed",
"a3f41b800e5e3d7a3fecc303cf9edd570d15e5a2",
"34fa41ccb6e548612886623916d502fce17fd3a8",
"85398d5f19157c91bf00da3d36210e72d57887e4",
"10b014e882764f5800ecdcbaba1fa08795d0c54d",
"3c8722737ef9f37b7a1da6ab81b54224a3c64f72",
"99d80987446ecc7fb546826e7bccebb2fdc5fa12",
"1c32ad0a42109fab826eb3054df7cfc33b424125",
"70a0f96171d25e910f7a598e9c9a5b9128699f5d",
"72530e9ecc814155608e39ed4e0db7ca3ca7da5e",
"3edacab130540193df4aba07cd07366ffd3600de",
"054e4a6966d54eb9fd207cf0484214201f46424a",
"15a7853875bf29a84b2d4e475029afaa032ccb76",
"174a3d4ad2caba68b55fd3ee863b9471e3786f21",
"43d66433875cb5c4eee68c8575f7be9108682c4b",
"28055aaeb478fd09f5a042408cd6b63cbf707d1e",
"ca0babdd9daba55708e6c83af12bf2872a76987d",
"43355917bdfeecc08c64acfcbc2ea7ddbd1a806b",
"790bbacb2bfe8830bbf03fecc2d7091c316bb3a8",
"160631daa8ecea247014401f5429deb49883d395",
"a6ca37aeeef5911e4f36b904088479bea999cc81",
"a5bd15d203c6aa740aba16776b422db010e66b58",
"85f5b05e7eba438f1fc4bc6e21cc1af00c424fbc",
"0a908373dd5e87446ba85db0e590b3e3004e04f7",
"024157990c0257c454beae3915f83ce5b088d767",
"357e97b04375f09e9f4cfd45c69ecd9d7f0a15e1",
"24b300b2395e4d0b0d2c8b9797fc9f8e735a58ef",
"06902cb95ede2c305db4000852014f276b25c082",
"38790cc347ee3a6e783689cdfae51a14570f5776",
"15509136b2c799bb86e8bd4f5c802f4f5311aee7",
"1dec8f5106d11047aaaf126121110cbf890f17c3",
"094b881edab3f5833c4ff2f38d4ed207af141bcd",
"a95436fb5417f16497d90cd2aeb11a0e2873f55f",
"9d02bfc7bfdfe9b580e1464b1336cb295222dc30",
"e9af96fbbacb4268c3c5ff974cc44990b12294e5",
"2671b7aa02d4e1c837ec6f8bbdbba2e355fbf954",
"bf70d60fc8d1de5fa53e8220a014fe463de4b7e5",
"01e6176d319e3bfecc3667447c5bbaf2d00b9c7c",
"3593269a4bf87a7d0f7aba639a50bc74cb288fb1",
"012d556d67acedc6898930b4c93f54b87aabf5ee",
"4e225fafd104abbf05a1bd0780d53c6763408b18",
"7edb887ed7f15203eccb614095af001ea74bcfb6",
"347b3b154b9283c97908fc8bea42225ee4bbfc8c",
"096ee9c89d43fd03a602aed3a37fdf43dc8e60ae",
"8ca2b3fcf20694f18edde393cd9a5cf4f8c3759b",
"071564baef078867847fc54a3a0b50dd22d29d62",
"4678cdcf7e57c1563379ac7cc344254f01ace572",
"0c6f81e60514edbc6a936a5f8593838f14658653",
"42f174df3876256dd5606bb61b366116e9943beb",
"8b04ea524cb6ced72868c120a00c4679d84be006",
"5906fc1d9cc56d31b9373cdb868cb90aa613d90d",
"7631275e3266f627df6cc29441f69ab9f5f2b1c6",
"02cd807277f9da21daa9ead698348215a9bed094",
"135c49e5543ce41ec8274b270b2ac25e015cabd9",
"5e41307a2f2850f164ad0175f372799ce61e0bf9",
"14cd0daeed8c12db40be03dfd56e446fcc10f32a",
"51a10bc2d3966dfcf82060e9c94fa7436e98023e",
"179f80848143cf109fa6aebae6c3844da03b062c",
"0015d8b6ec47ec2bc4bc0564a11e2f98a3971650",
"1ef38c80b1bc4352ce0df0ef7c05249fb64bf78d",
"0693ff4b3a8d1452b897a876d3ffe6b2074e98e4",
"3c89345bb88a440096f7a057c28857cc4baf3695",
"069eafae5ee9df25ff5c457bb636f73b98d8f6e9",
"1e2c74686d4337113008d148b258e89414e35e20",
"2263e2beda96efcff8ff19efaefcb85f5136aeca",
"9341125876271d46cc25f86dac93f25acb343e8d",
"2fa80c8342dcb349f1d91c102a76400c86dfb042",
"5dfbdcedb7bcb8644b816bab2cc3d3fadd36775b",
"4390f4a06a036b8f04cbb4fe7611fa5af9492797",
"3d92d4a2e886e22b0d4346c74bcac2faa80ea58a",
"5baaeed2b180d8b9886eca113ae0c86196c8bdaf",
"b6a8f2d4f99277f1b7bf3b7f08c61abec4687eb5",
"87f3d7730e190c695c84683830a702cc7dd6e296",
"447f492235719d7c2b061b95d818f928d6cbdac5",
"a0280c69589951383ea0dbcd06f11bc4c595eff1"
],
"paperAbstract": "Many important applications trigger bulk bitwise operations, i.e., bitwise operations on large bit vectors. In fact, recent works design techniques that exploit fast bulk bitwise operations to accelerate databases (bitmap indices, BitWeaving) and web search (BitFunnel). Unfortunately, in existing architectures, the throughput of bulk bitwise operations is limited by the memory bandwidth available to the processing unit (e.g., CPU, GPU, FPGA, processing-in-memory).\n To overcome this bottleneck, we propose Ambit, an Accelerator-in-Memory for bulk bitwise operations. Unlike prior works, Ambit exploits the analog operation of DRAM technology to perform bitwise operations completely inside DRAM, thereby exploiting the full internal DRAM bandwidth. Ambit consists of two components. First, simultaneous activation of three DRAM rows that share the same set of sense amplifiers enables the system to perform bitwise AND and OR operations. Second, with modest changes to the sense amplifier, the system can use the inverters present inside the sense amplifier to perform bitwise NOT operations. With these two components, Ambit can perform any bulk bitwise operation efficiently inside DRAM. Ambit largely exploits existing DRAM structure, and hence incurs low cost on top of commodity DRAM designs (1% of DRAM chip area). Importantly, Ambit uses the modern DRAM interface without any changes, and therefore it can be directly plugged onto the memory bus.\n Our extensive circuit simulations show that Ambit works as expected even in the presence of significant process variation. Averaged across seven bulk bitwise operations, Ambit improves performance by 32X and reduces energy consumption by 35X compared to state-of-the-art systems. When integrated with Hybrid Memory Cube (HMC), a 3D-stacked DRAM with a logic layer, Ambit improves performance of bulk bitwise operations by 9.7X compared to processing in the logic layer of the HMC. Ambit improves the performance of three real-world data-intensive applications, 1) database bitmap indices, 2) BitWeaving, a technique to accelerate database scans, and 3) bit-vector-based implementation of sets, by 3X-7X compared to a state-of-the-art baseline using SIMD optimizations. We describe four other applications that can benefit from Ambit, including a recent technique proposed to speed up web search. We believe that large performance and energy improvements provided by Ambit can enable other applications to use bulk bitwise operations.",
"pdfUrls": [
"https://people.inf.ethz.ch/omutlu/pub/ambit-bulk-bitwise-dram_micro17.pdf",
"http://doi.acm.org/10.1145/3123939.3124544",
"https://www.microsoft.com/en-us/research/wp-content/uploads/2017/09/MICRO-50_347.pdf",
"http://www.pdl.cmu.edu/PDL-FTP/NVM/ambit-bulk-bitwise-dram_micro17.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/00cc482570d739e7b733f45b6f8f1836b24056bd",
"sources": [
"DBLP"
],
"title": "Ambit: in-memory accelerator for bulk bitwise operations using commodity DRAM technology",
"venue": "MICRO",
"year": 2017
},
"00d3d1554166ab1dd91089111dabac7ca456f5be": {
"authors": [
{
"ids": [
"2599242"
],
"name": "Kay Ousterhout"
},
{
"ids": [
"20978225"
],
"name": "Christopher Canel"
},
{
"ids": [
"1699297"
],
"name": "Sylvia Ratnasamy"
},
{
"ids": [
"1753148"
],
"name": "Scott Shenker"
}
],
"doi": "10.1145/3132747.3132766",
"doiUrl": "https://doi.org/10.1145/3132747.3132766",
"entities": [
"Apache Spark",
"Internet bottleneck",
"Jumpstart Our Business Startups Act",
"Systems architecture"
],
"id": "00d3d1554166ab1dd91089111dabac7ca456f5be",
"inCitations": [
"284b7631a9961f69eae1e0bac49438aee34edaa0",
"40dca29aea76ae426791e4c6bf0e24f3ae88e318",
"372a2383891257520ad6dea816d3f14ddff8f003",
"83aaf61e91053745e667427d2132527b8a05ef8a"
],
"journalName": "",
"journalPages": "184-200",
"journalVolume": "",
"outCitations": [
"c5cc6243f070d80f5edef24608694c39195e2d1a",
"88fd5ae53854a26b9edb2eb42ce6dfdd6e186ea5",
"2f88dcf1e9abaa0b0f8c63820548c98b2da61220",
"70ad150169f19d782ac992cbb3da3e7906cb7c66",
"28a9dca6faeead651539c700bef413203b2b876e",
"9da1d06e9afe37b3692a102022f561e2b6b25eaf",
"332f77fd05703c1607e3b57884ad31fb1fad0104",
"43776b15c034076a36b7143d58af8e04715e41d0",
"0162a3f7c5bd29af364fd946db139df1ffa825c4",
"4426abea067d858926f1178ab53dd357fa90f495",
"223159ae070f0b6c270d618f02c5a00e0248022b",
"19b304df6f13798a0745eeaf8f4573b202a43e5f",
"2988e34168fa91398fa397baf823af2063893e9c",
"0558c94a094158ecd64f0d5014d3d9668054fb97",
"6d0b0155303bccf7e2395f0745fcabe3d4474e61",
"0541d5338adc48276b3b8cd3a141d799e2d40150",
"20400945c87f75acbad70f1f9ccfe94f556d2d02",
"26deee037b221bd05ed34461819f5c067b745445",
"463bec3d0298e96e3702e071e241e3898f76eff2",
"f5b31911d960e136e5912a126dcbf6ef819edcf9",
"0254e7809ea94c30adedd5e853bdd0014b6521c9",
"3aed29136db8f1e5c6a89fc22d3ae4b4926a3555",
"53aabc0ab7bdb22c4bb5b508a4db2fc4a2387060",
"133eacaf0ad25b8364cb4510007d9363298e8adf",
"274a6c951c4aa82e6ef6b9f63c11f0ef66722c20",
"0aeb77fb41dc8e863e054fcffea7b8b3011515ce"
],
"paperAbstract": "In today's data analytics frameworks, many users struggle to reason about the performance of their workloads. Without an understanding of what factors are most important to performance, users can't determine what configuration parameters to set and what hardware to use to optimize runtime. This paper explores a system architecture designed to make it easy for users to reason about performance bottlenecks. Rather than breaking jobs into tasks that pipeline many resources, as in today's frameworks, we propose breaking jobs into monotasks: units of work that each use a single resource. We demonstrate that explicitly separating the use of different resources simplifies reasoning about performance without sacrificing performance. Monotasks provide job completion times within 9% of Apache Spark for typical scenarios, and lead to a model for job completion time that predicts runtime under different hardware and software configurations with at most 28% error. Furthermore, separating the use of different resources allows for new optimizations to improve performance.",
"pdfUrls": [
"http://kayousterhout.org/publications/sosp17-final183.pdf",
"http://kayousterhout.org/talks/2017_10_29_SOSP_Monotasks.pdf",
"http://doi.acm.org/10.1145/3132747.3132766"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/00d3d1554166ab1dd91089111dabac7ca456f5be",
"sources": [
"DBLP"
],
"title": "Monotasks: Architecting for Performance Clarity in Data Analytics Frameworks",
"venue": "SOSP",
"year": 2017
},
"00e534fdc29233aef6e44d5b716043d226b7b882": {
"authors": [
{
"ids": [
"2462977"
],
"name": "Kwangsung Oh"
},
{
"ids": [
"1770097"
],
"name": "Abhishek Chandra"
},
{
"ids": [
"1750436"
],
"name": "Jon B. Weissman"
}
],
"doi": "10.1145/3078468.3078485",
"doiUrl": "https://doi.org/10.1145/3078468.3078485",
"entities": [
"Amazon Web Services",
"Cloud computing",
"Cloud storage",
"Clustered file system",
"Computer data storage",
"Consistency model",
"Data center",
"Fault tolerance",
"Integer programming",
"Linear programming",
"Memory hierarchy",
"Microsoft Azure",
"Service-level agreement",
"Thesaurus Linguae Latinae"
],
"id": "00e534fdc29233aef6e44d5b716043d226b7b882",
"inCitations": [],
"journalName": "",
"journalPages": "12:1-12:11",
"journalVolume": "",
"outCitations": [
"73f512de77dad7d0abe8076a856727021b9493d3",
"2f6af58c7905fb8367652fe62fbb1f6ec7e28be0",
"0a4110fda21f0de29824ead1df591d2c5e1da8d0",
"41c43d0a579339ceaaaa5e95b514e8a955389569",
"0a625d2ee9465b0d8e4319f1e187349861f4d2cd",
"7c4cf4515091593106242f169dac0dd2208f9d8b",
"24c9ad0d66f6a05ad41563a7dade60bff6f59106",
"1e987ea60c476bbabbb306e2e795bfb81ecc97aa",
"3bd6bc388dea99b023c6695bd287eac8f5d28c0a",
"1b10ad7ee2ce30703d769ea7abf42938195973a5",
"a6a8313f30420c60e7eaa9f34ea5a41833695af1",
"4a3e73c756ac6fe62e9d728a85000ffe892892e1",
"83389bacf62e6c8513482395838caf7d01339a6b",
"5316ceeadacd161386e1ece5d117b24a3a9344e0",
"418e5e5e58cd9cafe802d8b679651f66160d3728",
"12481927d7d78e6f231c24a708406943fa3f863d",
"33457f49553d918e912c2d8c54b81f4fd8a4c234",
"87b94c2f86b9e8838bf15276fcfe9be0fd293588",
"0558c94a094158ecd64f0d5014d3d9668054fb97",
"9aa0d7253574e50fe3a190ccd924433f048997dd",
"1d5de7a7ed362ecd596ac9ed5b85bf19d5c08ef5"
],
"paperAbstract": "Exploiting the cloud storage hierarchy both within and across data-centers of different cloud providers empowers Internet applications to choose data centers (DCs) and storage services based on storage needs. However, using multiple storage services across multiple data centers brings a complex data placement problem that depends on a large number of factors including, e.g., desired goals, storage and network characteristics, and pricing policies. In addition, dynamics e.g., changing user locations and access patterns, make it impossible to determine the best data placement statically. In this paper, we present TripS, a lightweight system that considers both data center locations and storage tiers to determine the data placement for geo-distributed storage systems. Such systems make use of TripS by providing inputs including SLA, consistency model, fault tolerance, latency information, and cost information. With given inputs, TripS models and solves the data placement problem using mixed integer linear programming (MILP) to determine data placement. In addition, to adapt quickly to dynamics, we introduce the notion of Target Locale List (TLL), a pro-active approach to avoid expensive re-evaluation of the optimal placement. The TripS prototype is running on Wiera, a policy driven geo-distributed storage system, to show how a storage system can easily utilize TripS for data placement. We evaluate TripS/Wiera on multiple data centers of AWS and Azure. The results show that TripS/Wiera can reduce cost 14.96% ∼ 98.1% based on workloads in comparison with other works' approaches and can handle both short- and long-term dynamics to avoid SLA violations.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3078468.3078485",
"https://www-users.cs.umn.edu/~ohxxx222/slides/TripS_SYSTOR2017.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/00e534fdc29233aef6e44d5b716043d226b7b882",
"sources": [
"DBLP"
],
"title": "TripS: automated multi-tiered data placement in a geo-distributed cloud environment",
"venue": "SYSTOR",
"year": 2017
},
"00fdad565f3bb86294580fc01664bdbe862f1b06": {
"authors": [
{
"ids": [
"1710103"
],
"name": "Pedro Silva"
},
{
"ids": [
"37434914"
],
"name": "Christian P\u00e9rez"
}
],
"doi": "10.1007/978-3-319-64203-1_27",
"doiUrl": "https://doi.org/10.1007/978-3-319-64203-1_27",
"entities": [
"Heuristic",
"Software as a service"
],
"id": "00fdad565f3bb86294580fc01664bdbe862f1b06",
"inCitations": [],
"journalName": "",
"journalPages": "372-384",
"journalVolume": "",
"outCitations": [],
"paperAbstract": "",
"pdfUrls": [
"https://doi.org/10.1007/978-3-319-64203-1_27"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/00fdad565f3bb86294580fc01664bdbe862f1b06",
"sources": [
"DBLP"
],
"title": "An Efficient Communication Aware Heuristic for Multiple Cloud Application Placement",
"venue": "Euro-Par",
"year": 2017
},
"011f7f9ba9e6f9bc7f05994271725bc0fc9c3b94": {
"authors": [
{
"ids": [
"38737063"
],
"name": "Dong Deng"
},
{
"ids": [
"34568734"
],
"name": "Raul Castro Fernandez"
},
{
"ids": [
"2034349"
],
"name": "Ziawasch Abedjan"
},
{
"ids": [
"39996718"
],
"name": "Sibo Wang"
},
{
"ids": [
"1695715"
],
"name": "Michael Stonebraker"
},
{
"ids": [
"1740095"
],
"name": "Ahmed K. Elmagarmid"
},
{
"ids": [
"1743316"
],
"name": "Ihab F. Ilyas"
},
{
"ids": [
"2033016"
],
"name": "Samuel Madden"
},
{
"ids": [
"2168047"
],
"name": "Mourad Ouzzani"
},
{
"ids": [
"8669763"
],
"name": "Nan Tang"
}
],
"doi": "",
"doiUrl": "",
"entities": [
"Big data",
"Computation",
"Data science",
"Database",
"End-to-end principle",
"Experience",
"Federation (information technology)",
"Grunt",
"Linkage (software)",
"Merck Index",
"Sputter cleaning",
"Workflow engine"
],
"id": "011f7f9ba9e6f9bc7f05994271725bc0fc9c3b94",
"inCitations": [
"56a1414b337d46e2683c66c777760a4a62af29ee",
"57e979025374da67fae37fbb81bbadecee68cc08",
"1af3118f0d70e2e04b42498d53a1893385689bd6",
"9dce39920dd4d6d62bff9e8632751f8e2d39eb20",
"7f8a1ba888fc4ce551530914d68f23ac54ce265f",
"b904c2cbe34598bf52f82a8da8b2b02fefd791c5",
"da182e52b0c8a95d97bf3088561db466e86247f5",
"1b4f5bb49dc95340a66c75e1c4c719f0f96439c8",
"7c11b349296003d6406c10c96aa223cfa8f5f542",
"3073eda62f8391db0e695acb69bcb8c68b34c7b4",
"ddfd6fec5f784b9b59a24937844b7fef61c46ba1",
"315cd76e4a34b8fe27e20345abcd4fc27c7ee1ab"
],
"journalName": "",
"journalPages": "",
"journalVolume": "",
"outCitations": [
"8584bc6fb5fe616d338d5ae3d20d4848572b5578",
"4cf40a18955e5b79eb256666ee571fafd599b76d",
"9a641e3730fab824e5ff988107794cb0b54943fc",
"6306fbfa8fcde8e98a677cd4a833b8c76c613974",
"31a816f4fef768f29772a003e534b1378611bfe6",
"18c021c9cce95ed5615a060f590b8388b604e7c5",
"5178810be2cc19348ae358920dbd33e93ff2d813",
"73f31354cc9058ddc2e47a1c585b753e1592c1bf",
"09cacb2d068d605e6f8148b173524094a41670d5",
"2762f8b22fa9513a73f6d73205450e144fab3045",
"0964ac250b81a2caa85dd172527f07a9ffc8230b",
"0f1b67d1545299b8ccec4b28afb735ff045e5c1e",
"3f1e54ed3bd801766e1897d53a9fc962524dd3c2",
"0c687d5f26d78f2ba5e66e47af6db721c639f907",
"156b07d3a2d8d744385f1e09ea49a04b09c612a5",
"0f5c9968fe2cdb0f52c55b2d5b3dec7accf91306",
"c4221a899528798105ca94e509027e7210a87d6b",
"1f990d98dcc3941f01bd6bb5405fbda37e00dd6a",
"19f10c75265a43829cf00e619224ab3e481c4fad"
],
"paperAbstract": "In many organizations, it is often challenging for users to find relevant data for specific tasks, since the data is usually scattered across the enterprise and often inconsistent. In fact, data scientists routinely report that the majority of their effort is spent finding, cleaning, integrating, and accessing data of interest to a task at hand. In order to decrease the \u201cgrunt work\u201d needed to facilitate the analysis of data \u201cin the wild\u201d, we present DATA CIVILIZER, an end-to-end big data management system. DATA CIVILIZER has a linkage graph computation module to build a linkage graph for the data and a data discovery module which utilizes the linkage graph to help identify data that is relevant to user tasks. It also uses the linkage graph to discover possible join paths that can then be used in a query. For the actual query execution, we use a polystore DBMS, which federates query processing across disparate systems. In addition, DATA CIVILIZER integrates data cleaning operations into query processing. Because different users need to invoke the above tasks in different orders, DATA CIVILIZER embeds a workflow engine which enables the arbitrary composition of different modules, as well as the handling of data updates. We have deployed our preliminary DATA CIVILIZER system in two institutions, MIT and Merck and describe initial positive experiences that show the system shortens the time and effort required to find, prepare, and analyze data.",
"pdfUrls": [
"http://cidrdb.org/cidr2017/papers/p44-deng-cidr17.pdf",
"http://da.qcri.org/ntang/pubs/cidr2017.pdf",
"http://cs.brown.edu/courses/cs227/papers/data-civilizer.pdf"
],
"pmid": "",
"s2PdfUrl": "http://pdfs.semanticscholar.org/04d5/069f0db8ec5b637c4091c598838096800970.pdf",
"s2Url": "https://semanticscholar.org/paper/011f7f9ba9e6f9bc7f05994271725bc0fc9c3b94",
"sources": [
"DBLP"
],
"title": "The Data Civilizer System",
"venue": "CIDR",
"year": 2017
},
"013ab8df817d07f52167163ce85519d64b85390e": {
"authors": [
{
"ids": [
"1767573"
],
"name": "Nishanth Chandran"
},
{
"ids": [
"1727286"
],
"name": "Juan A. Garay"
},
{
"ids": [
"1773836"
],
"name": "Payman Mohassel"
},
{
"ids": [
"8210582"
],
"name": "Satyanarayana Vusirikala"
}
],
"doi": "10.1145/3133956.3134100",
"doiUrl": "https://doi.org/10.1145/3133956.3134100",
"entities": [
"Mathematical optimization",
"Secure state",
"Software deployment",
"Symmetric-key algorithm"
],
"id": "013ab8df817d07f52167163ce85519d64b85390e",
"inCitations": [],
"journalName": "",
"journalPages": "277-294",
"journalVolume": "",
"outCitations": [
"23ec68ed03b485b645478a3f6905615617d905a6",
"a2a8b5cc914c653730a251cf1a0b3452dac322b3",
"01ae736135f6aa1ec765ffbd6d1d2c991acb2b35",
"31100ccd0867d6d5338612a62b2cde11be75f1b8",
"36250592849fc8dc50b3b5df0a72a8b072ce34e4",
"0ff204bf8854f258f181a249e2dceb1633f910d9",
"a853e0842d74fa3ff146f45ea7f2ed52dac08d1a",
"47b8fd6ee8b07bd14de3c91df515b11180121de9",
"2f9c590bb2df7fe3e4caffaaa709fa6840d02d62",
"04948723dec0e6724777ee56f0d10168cce44921",
"15c76f461543c44a8b9d8b32b2bbd18c595aea52",
"8128c7e13e69c29880b11ed675ecb108e879059a",
"0affd3f06d26de268d81c288454dd7880e518f9e",
"1c07a74467c912602b33f28e90abd6eeaa60af6d",
"5161aa950ec876026dfc24b4cbf69ae1e552c0e6",
"2eb315952f6a2e342b19cf95287c8a0b1f2c36fa",
"13e622fca1a6b52aa85898e260f9455e4ba0d94b",
"5efa700b61efac0b571da693e06d0af085f7344c",
"33148623fc14ea5735e73dd716d030ab17118299",
"3ff4a7bcfa42348102cd49f6bf33c8ca85c94472",
"37d41c44e034a282820f698bb70cf15c2083a9ab",
"13ca5e20283085e1c2854325665bd7fd6497a62c",
"0e0427aedfed65c8dd688c094b181feacf4eaab4",
"411e4ecb35e5385ed0c88a36f0b2821c42af8f70",
"3f40a5b0bcf4401c3f8efdbb539deec2763ad916",
"ab6d858715ea8ecc664e3d41bec87269368e15a4",
"05dfe536310bc0176ad23cc40fdc8e501811f4be",
"1eb0b401e7dbd8a4e638243713b39fffc991fe9f",
"444630ced6bda572461744423ff420106472d5e3",
"01dede4ec077d7495e7dacdac8b584678aca5fc7",
"bb63c68855d42c95623ed9362d0853ea1d4cc858",
"18f5d7663632c92c84f89151823dff2120ae43cf",
"c3b6d1b083f132d6f40f354fce32453410b6f942",
"69dc0fe412f974a595abe6d7052d8fdf2304ba3b",
"19c3736da5116e0e80a64db35afe421663c4b4a8",
"42333e3f231bbfe508f6da6bad2feff9ae223113",
"01ab267578a0f3286425f4b261c7ce6dcec8e407",
"7767c71b09ad63fbc9892d3deb1c07292c9cfbf5",
"e00b72a00f591353e9f13c0127f7006ec9528557",
"61883fbd35396888924520e109355e912337d2b8",
"88915d3d45829e9b929e3c5019dda47985a13b7d",
"3cb55d539b232e309f4a5974148ec6f22afb5888",
"13e5ca27f887c2be2795cdb335201c4c247c60f3",
"b57aec9b611817d5272c8f97ec8211ecd33dca6d",
"e5302edfa2fa077525008333fcb56d9c2f3451ef",
"218bbd0efffc2ee63edffb8c5220f06155e23578",
"a797a0346e106e0d1d1d2db778aa509031c7bf8c",
"7dd5a9a774b96ef8f551ded6418fe8adf28e8952"
],
"paperAbstract": "While the feasibility of constant-round and actively secure MPC has been known for over two decades, the last few years have witnessed a flurry of designs and implementations that make its deployment a palpable reality. To our knowledge, however, existing concretely efficient MPC constructions are only for up to three parties.\n In this paper we design and implement a new actively secure 5PC protocol tolerating two corruptions that requires 8 rounds of interaction, only uses fast symmetric-key operations, and incurs 60% less communication than the passively secure state-of-the-art solution from the work of Ben-Efraim, Lindell, and Omri [CCS 2016]. For example, securely evaluating the AES circuit when the parties are in different regions of the U.S. and Europe only takes 1.8s which is 2.6x faster than the passively secure 5PC in the same environment.\n Instrumental for our efficiency gains (less interaction, only symmetric key primitives) is a new 4-party primitive we call Attested OT, which in addition to Sender and Receiver involves two additional \"assistant parties\" who will attest to the respective inputs of both parties, and which might be of broader applicability in practically relevant MPC scenarios. Finally, we also show how to generalize our construction to n parties with similar efficiency properties where the corruption threshold is t ≈ √n, and propose a combinatorial problem which, if solved optimally, can yield even better corruption thresholds for the same cost.",
"pdfUrls": [
"https://eprint.iacr.org/2017/519.pdf",
"http://eprint.iacr.org/2017/519",
"http://doi.acm.org/10.1145/3133956.3134100",
"https://www.microsoft.com/en-us/research/wp-content/uploads/2017/08/ccs2017.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/013ab8df817d07f52167163ce85519d64b85390e",
"sources": [
"DBLP"
],
"title": "Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case",
"venue": "CCS",
"year": 2017
},
"014b09f5b1872a7aa70ec233c2746ee1cb93f7cd": {
"authors": [
{
"ids": [
"39645110"
],
"name": "Qi Alfred Chen"
},
{
"ids": [
"1898170"
],
"name": "Matthew Thomas"
},
{
"ids": [
"2471594"
],
"name": "Eric Osterweil"
},
{
"ids": [
"2861481"
],
"name": "Yulong Cao"
},
{
"ids": [
"40048308"
],
"name": "Jie You"
},
{
"ids": [
"3895596"
],
"name": "Zhuoqing Morley Mao"
}
],
"doi": "10.1145/3133956.3134084",
"doiUrl": "https://doi.org/10.1145/3133956.3134084",
"entities": [
"Client (computing)",
"Client-side",
"Code injection",
"Collision attack",
"Collision problem",
"Credential",
"Feasible region",
"Intranet",
"Malware",
"Man-in-the-middle attack",
"Name collision",
"namespaces"
],
"id": "014b09f5b1872a7aa70ec233c2746ee1cb93f7cd",
"inCitations": [],
"journalName": "",
"journalPages": "941-956",
"journalVolume": "",
"outCitations": [
"48fc8f1aa0b6d1e4266b8017820ff8770fb67b6f",
"69349684bf61888dc9fe5ff679ff1c7572d2d535",
"0228d21869d7d1e6d1acdaf7d7086d9e7d1327a0",
"e6305e00746f75401fde3f4719f037a9fd183d7c",
"1149fee645180babc05c2565ee86e63402ead90b",
"3dfca21820fb74935b2145be8d37f9dcb1adf2f5",
"1a0ca2cf71616fa492ebe611f1d83261d2ecf052",
"5f60d66221f466ac806828ce068dd24c18b5901e",
"223cfa8cab6f00a9d37af94e87454e82b28fa19b",
"7a1890d288fe3e2dae1add14c12f7b5428686ff7",
"11c5f57419fd0e64b0feb78f7d42c1cb7508c31f",
"2df89af8e95047fa4d0b035366144e5d73a4e368"
],
"paperAbstract": "The recent unprecedented delegation of new generic top-level domains (gTLDs) has exacerbated an existing, but fallow, problem called name collisions. One concrete exploit of such problem was discovered recently, which targets internal namespaces and enables Man in the Middle (MitM) attacks against end-user devices from anywhere on the Internet. Analysis of the underlying problem shows that it is not specific to any single service protocol, but little attention has been paid to understand the vulnerability status and the defense solution space at the service level. In this paper, we perform the first systematic study of the robustness of internal network services under name collision attacks.\n We first perform a measure study and uncover a wide spectrum of services affected by the name collision problem. We then collect their client implementations and systematically analyze their vulnerability status under name collision attacks using dynamic analysis. Out of the 48 identified exposed services, we find that nearly all (45) of them expose vulnerabilities in popular clients. To demonstrate the severity, we construct exploits and find a set of new name collision attacks with severe security implications including MitM attacks, internal or personal document leakage, malicious code injection, and credential theft. We analyze the causes, and find that the name collision problem broadly breaks common security assumptions made in today's service client software. Leveraging the insights from our analysis, we propose multiple service software level solutions, which enables the victim services to actively defend against name collision attacks.",
"pdfUrls": [
"https://acmccs.github.io/papers/p941-chenA.pdf",
"http://web.eecs.umich.edu/~alfchen/alfred_ccs17.pdf",
"http://doi.acm.org/10.1145/3133956.3134084"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/014b09f5b1872a7aa70ec233c2746ee1cb93f7cd",
"sources": [
"DBLP"
],
"title": "Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study",
"venue": "CCS",
"year": 2017
},
"014d28ef6ad36b22c1a4edb43c1b34bc7981b2e3": {
"authors": [
{
"ids": [
"2541035"
],
"name": "Gunjae Koo"
},
{
"ids": [
"3235717"
],
"name": "Yunho Oh"
},
{
"ids": [
"2957310"
],
"name": "Won Woo Ro"
},
{
"ids": [
"1789661"
],
"name": "Murali Annavaram"
}
],
"doi": "10.1145/3079856.3080239",
"doiUrl": "https://doi.org/10.1145/3079856.3080239",
"entities": [
"Baseline (configuration management)",
"CPU cache",
"Cache (computing)",
"Graphics processing unit",
"Locality of reference",
"Simulation",
"Stream (computing)",
"WARP (information security)"
],
"id": "014d28ef6ad36b22c1a4edb43c1b34bc7981b2e3",
"inCitations": [
"fa21c85107516c7f0a341de27856d7ffe4a6c5d9",
"b20230c61d5db7863ba6a12fc18da85be6a35a60"
],
"journalName": "2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA)",
"journalPages": "307-319",
"journalVolume": "",
"outCitations": [
"4308295a2eaef30be423520918ad224dc2f3ffe2",
"0d7ab4003220cc847ae2b5fbf32bfa901da8edde",
"01079a4f0bcac90e8977cbcee2ec50b98d408310",
"b37cdf43ff9c85693e335c04086003819a7aa4f9",
"8e0bace83c69e81cf7c68ce007347c4775204cd0",
"28cc7453c5f3f9ecb9415e631b0829ec9af8a4c3",
"2dc38b527e91f8cfee6f6c7ba4d079087c293471",
"7ea15c138cc72588fa376ff819f4bb8ca0b324da",
"00156e79606084497789662dfaf59c3b54a10722",
"6170a341e38990ac3c3df35f557e149746c9e099",
"f08a5e7a23b44c37a22e011e31843aeeae0ed4e6",
"5670a2391d0c085be2ff5c704cae8e76a80a15fb",
"3d50c803cc715e51d263f5a42b06858be9466c0f",
"792aa5a81ac1d344de450ec59eec339aa0e508aa",
"0e0fb6a3ccbd9da9dc216913ef77d346515936c6",
"60a1389c827f9f706c9dc1639e2584f0f3de878e",
"d410f8128bd4efa6adc886259e5d9de4cd7587bc",
"67bf737ceccf387cdd05c379487da8301f55e93d",
"6f4dfb66fea49a55ad7f2e2312728aa68d9313e3",
"30a6f5a8c2d61421fcef53f66a5c450cd561d378",
"5d79e0c5e4b531f26de469688668c50f8c1069b2",
"1087bbef784e7daecaf13b58bc1480d6dee4929b",
"43260df86b2aaa20824d73eff48e0b49162689cb",
"03d832219a7cf933db0ef1f686fec730c09acd55",
"3ce662e1663456ce2a5b5d240112721c0d0a4582",
"0717371b254df3e466a11d1965c2c9541a43b7a3",
"3364bc50921a9566d61ef8cb73baa82341725e4b",
"0612811b3ed9fc7ef8300e65cb70360613dab01d",
"7bee024cfab6e16be7c57e2ddbe13618d2a2968c",
"5f3cce1bc739ebfc03e003010d3438bb318efc14",
"0ee3a956a67b0d679bf485d60e75abdbdb5d50e7",
"14505c2bdd3822d7a62385121d28ba3eb36fea1d",
"2d6f002477015469075954c6748a1a85af352c94",
"b6659b2af4789a1daaff6310161d850a840fe3d7",
"180b2d793d5a79466d773db05b7652695a8d4671"
],
"paperAbstract": "Long latency of memory operation is a prominent performance bottleneck in graphics processing units (GPUs). The small data cache that must be shared across dozens of warps (a collection of threads) creates significant cache contention and premature data eviction. Prior works have recognized this problem and proposed warp throttling which reduces the number of active warps contending for cache space. In this paper we discover that individual load instructions in a warp exhibit four different types of data locality behavior: (1) data brought by a warp load instruction is used only once, which is classified as streaming data (2) data brought by a warp load is reused multiple times within the same warp, called intra-warp locality (3) data brought by a warp is reused multiple times but across different warps, called inter-warp locality (4) and some data exhibit both a mix of intra- and inter-warp locality. Furthermore, each load instruction exhibits consistently the same locality type across all warps within a GPU kernel. Based on this discovery we argue that cache management must be done using per-load locality type information, rather than applying warp-wide cache management policies. We propose Access Pattern-aware Cache Management (APCM), which dynamically detects the locality type of each load instruction by monitoring the accesses from one exemplary warp. APCM then uses the detected locality type to selectively apply cache bypassing and cache pinning of data based on load locality characterization. Using an extensive set of simulations we show that APCM improves performance of GPUs by 34% for cache sensitive applications while saving 27% of energy consumption over baseline GPU.",
"pdfUrls": [
"http://www-scf.usc.edu/~gunjaeko/pubs/Gunjae_ISCA17.pdf",
"http://doi.acm.org/10.1145/3079856.3080239"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/014d28ef6ad36b22c1a4edb43c1b34bc7981b2e3",
"sources": [
"DBLP"
],
"title": "Access pattern-aware cache management for improving data utilization in GPU",
"venue": "2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA)",
"year": 2017
},
"016bb661e767d8fa2491743d289b11cfc41e3efb": {
"authors": [
{
"ids": [
"4260658"
],
"name": "David Lie"
},
{
"ids": [
"2286904"
],
"name": "Petros Maniatis"
}
],
"doi": "10.1145/3102980.3102996",
"doiUrl": "https://doi.org/10.1145/3102980.3102996",
"entities": [
"Client-side",
"Cloud computing",
"Display resolution",
"GLIMMER",
"Personally identifiable information",
"Quality of service",
"Trust (emotion)",
"Trust metric",
"User-generated content"
],
"id": "016bb661e767d8fa2491743d289b11cfc41e3efb",
"inCitations": [
"0646a88dfd7e7ce7233041eaad62076ccc55624c"
],
"journalName": "",
"journalPages": "94-99",
"journalVolume": "",
"outCitations": [
"3ffc94c7066b4856b1cfae99ab66cd20310e41dd",
"7a6ca8144dbf3331e8ad34c4024670c6ef4ec9be",
"038343c387ed6e39c8d8eee21fee1fef8fe55f72",
"07f0e56d1c37c213cd5c617dbfba5a0549629a19",
"ad13de073252eaf17e437e68d644fac7826edc8a",
"0d3c49f0d6743b03615bfcf546b5d015d32d4035",
"5ff155a684fdae3da603e615095084567dcfc3ea",
"4c60ec65bd28c6637f82ee3f6ad28d6eaa9c4824",
"70a8963eda8fe4567ad434fdf4fe93fa4da10b46",
"6a363d25c6b09b3d48d59ec3683341fedbd030c6",
"3f9ff793f462a36b5d9847f25d5a8c413d48389d",
"226c420178be541d6a061334f3f9760cc683653c",
"01fde8698110cf46ff48a17c65f2658dab4c323c",
"326bb49d3ae9e1e1551028200916192e50004105",
"2a09faed33a1c58bf2f1e827b326bbdc656fd363",
"02bc27c39eaaa6b85d336be81b15ca19f112a950",
"0a289fd7b14345822b1acda6d82750b15d59663e",
"0cf200311921b4a9232a284691ce92b91a05885b",
"561269a24f2f2a06409109723a8ab93a01696efc",
"30f52a79ff53f8969ffcba19013b4a43e629875f"
],
"paperAbstract": "Users today enjoy access to a wealth of services that rely on user-contributed data, such as recommendation services, prediction services, and services that help classify and interpret data. The quality of such services inescapably relies on trustworthy contributions from users. However, validating the trustworthiness of contributions may rely on privacy-sensitive contextual data about the user, such as a user's location or usage habits, creating a conflict between privacy and trust: users benefit from a higher-quality service that identifies and removes illegitimate user contributions, but, at the same time, they may be reluctant to let the service access their private information to achieve this high quality.\n We argue that this conflict can be resolved with a pragmatic Glimmer of Trust, which allows services to validate user contributions in a trustworthy way without forfeiting user privacy. We describe how trustworthy hardware such as Intel's SGX can be used on the client-side---in contrast to much recent work exploring SGX in cloud services---to realize the Glimmer architecture, and demonstrate how this realization is able to resolve the tension between privacy and trust in a variety of cases.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3102980.3102996",
"https://arxiv.org/pdf/1702.07436v1.pdf",
"http://www.eecg.toronto.edu/~lie/papers/lie-glimmer-hotos2017.pdf",
"http://arxiv.org/abs/1702.07436",
"https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/46128.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/016bb661e767d8fa2491743d289b11cfc41e3efb",
"sources": [
"DBLP"
],
"title": "Glimmers: Resolving the Privacy/Trust Quagmire",
"venue": "HotOS",
"year": 2017
},
"016d1541f81655d3c193aafcfb3e9fab64dba2b3": {
"authors": [
{
"ids": [
"39782005"
],
"name": "Nirvan Tyagi"
},
{
"ids": [
"1682067"
],
"name": "Yossi Gilad"
},
{
"ids": [
"39946997"
],
"name": "Derek Leung"
},
{
"ids": [
"1901948"
],
"name": "Matei Zaharia"
},
{
"ids": [
"1789973"
],
"name": "Nickolai Zeldovich"
}
],
"doi": "10.1145/3132747.3132783",
"doiUrl": "https://doi.org/10.1145/3132747.3132783",
"entities": [
"Differential privacy",
"Distributed computing",
"Encryption",
"Information privacy",
"Inter-process communication",
"Limiter",
"Mix network",
"Observable",
"Provable prime",
"Routing",
"Scalability",
"Tor Messenger",
"Traffic analysis"
],
"id": "016d1541f81655d3c193aafcfb3e9fab64dba2b3",
"inCitations": [
"4c18ad6a3819d0de1d8df2f6ba323b175f985a3c"
],
"journalName": "",
"journalPages": "423-440",
"journalVolume": "",
"outCitations": [
"34a9eba074b1439d972541ffcffe70d90bac02aa",
"2bc6a80519543859c1c150d132804d8fd69a9d8c",
"732bf9b3acce10677bc9409edea8864018d46319",
"357af3dd66a8ee994f17c890422fda1b618586d3",
"78e2d6b7a671d8e53f207adff088833fd7606e13",
"557d8b988bca3d0033189723d11102e04c0c67c0",
"9d2c1271f1219522d13f150c2b04123bef300dd9",
"33bcd8da1f6dc589cde6415434175548fd527ef7",
"3cc86ff94309bb58b2125eea173b23ab89f26a3b",
"108747579aef6bf029623639a86070feaf5cad41",
"03a9f96a5e95587ab319fb3bddb931ee84fb648d",
"56dc0aacffd9dc8e9931daa719f78a69b57cfb48",
"bac41b59697da3ca5c80ca08f2bbbc97a3576248",
"8d69c06d48b618a090dd19185aea7a13def894a5",
"b1fa37ec7cf8c76ed30961a86019bb78073f6287",
"90f26c0f0d04b9c4999b454c35ee1c7603ca9e4b",
"a089defc1eea22b4d3afaeccf031ae110d7af459",
"6e8cf181b6e4d759f0416665a3a9f62ad37b316c",
"0efa9ee4557c8b0cc8f0d329a0dab34c53fd55f2",
"9b2c3acc1806ccfdbae67bc0a353692f0ed31091",
"b532099ff8b67049f292cd62700dca37fc2be623",
"2fc986fd942797c0bcbebf01f464b375f1dd464d",
"4c18ad6a3819d0de1d8df2f6ba323b175f985a3c",
"60d6ac52ef063d01cea47601e9b9bde1e3148440",
"02dad9c51e3a2e2117ffc41d624de4a090271d1f",
"18b1c62d6c7fa0e619f0c13172d8852b3d5a71fe",
"1c4906cff8621cc2f240001975d8d956767060f2",
"7f14bca3b6f51d4cfe8084798c2808c08b0214d6",
"2949851ab9827fdd334ecc3b392296df2aacaf92",
"9fcb7035836d98d112e011a7e0d93a4ec8c444d7",
"14d19771bc69f1d41f63052e56e134f9ed569c1e",
"406a37d8ccb6cb1355b7aeded65e50fc00b2977c",
"20ef4778cd48f946bfa63ffb18332199fd3f2ad5",
"3c09b40d5ef5c5558174423b43cb5699e3c26107",
"3047154c1f8f3f1829180ce7e5bd1e4639689339",
"345947186f190649c582204776071ac9a62e8d67",
"1996b2011357fc54f023df344f50d120388daac4",
"03e4f73474351a62abc9abf2fb17ec6277bb064e",
"8750c0b8094957003fd7f681f9ef8af47b86a99d",
"d124c709294733d4273de63755ae29b3ed7fbb00",
"5b566b58184e302e1bd364903010fcc55a226fd3"
],
"paperAbstract": "Private communication over the Internet remains a challenging problem. Even if messages are encrypted, it is hard to deliver them without revealing metadata about which pairs of users are communicating. Scalable anonymity systems, such as Tor, are susceptible to traffic analysis attacks that leak metadata. In contrast, the largest-scale systems with metadata privacy require passing all messages through a small number of providers, requiring a high operational cost for each provider and limiting their deployability in practice.\n This paper presents Stadium, a point-to-point messaging system that provides metadata and data privacy while scaling its work efficiently across hundreds of low-cost providers operated by different organizations. Much like Vuvuzela, the current largest-scale metadata-private system, Stadium achieves its provable guarantees through differential privacy and the addition of noisy cover traffic. The key challenge in Stadium is limiting the information revealed from the many observable traffic links of a highly distributed system, without requiring an overwhelming amount of noise. To solve this challenge, Stadium introduces techniques for distributed noise generation and differentially private routing as well as a verifiable parallel mixnet design where the servers collaboratively check that others follow the protocol. We show that Stadium can scale to support 4x more users than Vuvuzela using servers that cost an order of magnitude less to operate than Vuvuzela nodes.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3132747.3132783",
"http://people.csail.mit.edu/nickolai/papers/tyagi-stadium.pdf",
"https://people.csail.mit.edu/nickolai/papers/tyagi-stadium-eprint.pdf",
"http://people.csail.mit.edu/nickolai/papers/tyagi-stadium-eprint.pdf",
"http://eprint.iacr.org/2016/943.pdf",
"http://eprint.iacr.org/2016/943",
"https://www.cs.cornell.edu/~tyagi/papers/stadium.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/016d1541f81655d3c193aafcfb3e9fab64dba2b3",
"sources": [
"DBLP"
],
"title": "Stadium: A Distributed Metadata-Private Messaging System",
"venue": "SOSP",
"year": 2016
},
"017424c0bd3f3208e109998c54db1d294022fe80": {
"authors": [
{
"ids": [
"2650184"
],
"name": "Feng Chen"
},
{
"ids": [
"2787368"
],
"name": "Baojian Zhou"
},
{
"ids": [
"34265351"
],
"name": "Adil Alim"
},
{
"ids": [
"39164176"
],
"name": "Liang Zhao"
}
],
"doi": "10.1109/ICDM.2017.13",
"doiUrl": "https://doi.org/10.1109/ICDM.2017.13",
"entities": [
"Algorithm",
"Coherence (physics)",
"Feature selection",
"Generic programming",
"Heuristic",
"Matching pursuit",
"Need for Speed: Hot Pursuit",
"Network theory",
"Sparse matrix",
"SuicideGirls",
"Time complexity"
],
"id": "017424c0bd3f3208e109998c54db1d294022fe80",
"inCitations": [],
"journalName": "2017 IEEE International Conference on Data Mining (ICDM)",
"journalPages": "41-50",
"journalVolume": "",
"outCitations": [
"6dc112431fe6db74149d5885f08f896f60d0b0d8",
"95121dc15cc145631137123ec2c0a2d7a82c14f2",
"c1bea7d028c68212554b163f90d5d78065b2e6f1",
"1f41bb748ef6041631b7e282fc42db0b31d9c8ec",
"1c4163fd169b66b671ce0125d356bfe25af9636c",
"5e3fd8ae6061d8067ad1cb5b12a22ceac3187852",
"378b33222bfce367e7adb849066e7adae5d9a59c",
"816d7bff3a6e9a07d2e569d61c7df5dc204176d7",
"76bb50343855980bd451bc16ca2d028e7e70fe10",
"2fb36ecf864f40e84f2e50a5152107e16a03fb21",
"1f142bdabb47238532425ead592cba0537c76b37",
"1326a25a6961a25af5fe49ddff20c98b961985c5",
"1d6320a672b866444737880cee8a980f5cca6864",
"1b348075d02cc532b1a01955e21ba3062e769113",
"0a814be5d4918e0e536bb98d7c01a8f693777a6e",
"6968d5994081068d3eea1f1e1f81f0482145bb5c",
"94f56da3968c15afc2bf0a7e2a738be3876d7f3c",
"00568ab7c7ee96bcf1c5d2ceba1471404c7be2b2",
"67e57fc602e324a7269370345ce03bd3e38384b5",
"b981dc00f4b49f16663f4ce64675db7b9a096606",
"3783fd271a4fa5b65894743c0a6b19a02b268120",
"02e17c55b4c73929a769e99ff9b542ba35bbe1a3",
"4909317c14d7098edb31c2e34c2a812a39a47105",
"8d25720bcc12220c0e0cf5a0168de2c0ad6ef6e8",
"d1be7b6901ce22847843af4a3874fa1b2cfdfb0c",
"025e224cf0f12f772c7efba4f7c6b769a2bf298b",
"344dad92401fd4800b85643de323750e1e65117a",
"56faf302eb810957b7be3b556539be93e2dc9ff0",
"0b476d58458fb1b00a43ea0de4af01fd7655ce90",
"b3523fdf49fe6c841d7174f66abdd8161c14c794",
"4948b089ac744e41a262aa98e89f655b74f47193",
"99ac4b8d3c8790a50a468d8268cff00651cb65b6",
"83188372a74c6b93e50f2e54a0bd2a29bd97e64c",
"a6693adb1f6e15060396fed9e53189266097ee35",
"e0d2861a9022667a93a8a0573d44f238f7c3a027",
"f85c2d9d19e181ee6a18cffd753dd478337fce68",
"78278b8e06729dbebfa060ed4f40788cb9213ba4",
"e0c77c067380cea9e8841cc04a8d3ffd3147db4c"
],
"paperAbstract": "Detection of interesting (e.g., coherent or anomalous) clusters has been studied extensively on plain or univariate networks, with various applications. Recently, algorithms have been extended to networks with multiple attributes for each node in the real-world. In a multi-attributed network, often, a cluster of nodes is only interesting for a subset (subspace) of attributes, andthis type of clusters is called subspace clusters. However, in the current literature, few methods are capable of detecting subspace clusters, which involves concurrent feature selection and network cluster detection. These relevant methods are mostly heuristic-driven and customized for specific application scenarios. In this work, we present a generic and theoretical framework for detection of interesting subspace clusters in large multi-attributed networks. Specifically, we propose a subspace graph-structured matching pursuit algorithm, namely, SG-Pursuit, to address a broad class of such problems for different scorefunctions (e.g., coherence or anomalous functions) and topology constraints (e.g., connected subgraphs and dense subgraphs). We prove that our algorithm 1) runs in nearly-linear time on the network size and the total number of attributes and 2) enjoys rigorous guarantees (geometrical convergence rate and tight error bound) analogous to those of the state-of-the-art algorithms for sparse feature selection problems and subgraph detection problems. As a case study, we specialize SG-Pursuit to optimizea number of well-known score functions for two typical tasks, including detection of coherent dense and anomalous connected subspace clusters in real-world networks. Empirical evidence demonstrates that our proposed generic algorithm SG-Pursuit is superior over state-of-the-art methods that are designed specifically for these two tasks.",
"pdfUrls": [
"https://arxiv.org/pdf/1709.05246v1.pdf",
"http://arxiv.org/abs/1709.05246",
"https://dac.cs.vt.edu/wp-content/uploads/2017/11/a-generic-framework.pdf",
"http://doi.ieeecomputersociety.org/10.1109/ICDM.2017.13"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/017424c0bd3f3208e109998c54db1d294022fe80",
"sources": [
"DBLP"
],
"title": "A Generic Framework for Interesting Subspace Cluster Detection in Multi-attributed Networks",
"venue": "2017 IEEE International Conference on Data Mining (ICDM)",
"year": 2017
},
"017c91abd8adf741a4e8b06daf93a964fc57a820": {
"authors": [
{
"ids": [
"24471056"
],
"name": "Hyun Wook Baek"
},
{
"ids": [
"1746708"
],
"name": "Abhinav Srivastava"
},
{
"ids": [
"2358499"
],
"name": "Jacobus E. van der Merwe"
}
],
"doi": "",
"doiUrl": "",
"entities": [
"Cloud computing",
"FUJITSU Cloud IaaS Trusted Public S5",
"Layer (electronics)",
"Service abstraction"
],
"id": "017c91abd8adf741a4e8b06daf93a964fc57a820",
"inCitations": [],
"journalName": "2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)",
"journalPages": "268-273",
"journalVolume": "",
"outCitations": [
"2dd86a08595948d29568e5de245a0a9b59b28c7b",
"0c4c6eacefe36063d2d564184273a32ca815a958",
"6b81d4b1ef1c5bfce830e798d230561d5608acd9",
"765ee60756583f27322f1316da40696ae72812ac",
"daef64fb7bcdf9bc6eb999c91b8699b926edb50b",
"808fadaaa7d7091e95809f419959917bb6ce4a6d",
"1f367238213ea0fff128fced7e768f19de08ee93",
"6fdf88d5463b64fc8fad6881a56c44517348da67",
"7189769129ded261fc00b1fc66f4461f7d48c97d",
"283ae048d4bd7603bbf7bdae059580079439e1b8",
"53aabc0ab7bdb22c4bb5b508a4db2fc4a2387060",
"10da8673314188dd6ab1f16f73c05358771dd8cf",
"7e02c5b0e83cd6bba4c94c458bdb7079e97c36cd",
"4e2833f3fc24c37bd416ad59ebc914701d6eedb9",
"625150cb2523db4af61281895290b95a946fbea2"
],
"paperAbstract": "Troubleshooting in an infrastructure-as-a-Service (IaaS) cloud platform is an inherently difficult task because it is a multi-player as well as multi-layer environment where tenant and provider effectively share administrative duties. To address these concerns, we present our work on CloudSight in which cloud providers allow tenants greater system-wide visibility through a transparency-as-a-service abstraction. We present the design, implementation, and evaluation of CloudSight in the OpenStack cloud platform. We also develop two example applications that make use of the CloudSight abstraction and use the applications to explore real cloud problems.",
"pdfUrls": [
"http://www.cs.utah.edu/~baekhw/assets/demo_cloudsight.pdf",
"http://dl.acm.org/citation.cfm?id=3101150",
"http://www.flux.utah.edu/download?uid=260",
"http://www2.cs.utah.edu/~baekhw/cloudsight.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/017c91abd8adf741a4e8b06daf93a964fc57a820",
"sources": [
"DBLP"
],
"title": "CloudSight: A Tenant-Oriented Transparency Framework for Cross-Layer Cloud Troubleshooting",
"venue": "2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)",
"year": 2017
},
"01814d50f0a7699f264c21d986ccd1f390b101b2": {
"authors": [
{
"ids": [
"1680465"
],
"name": "Rui Zhang"
},
{
"ids": [
"1757885"
],
"name": "Natalie Stanley"
},
{
"ids": [
"38199747"
],
"name": "Christopher Griggs"
},
{
"ids": [
"3388635"
],
"name": "Andrew Chi"
},
{
"ids": [
"2480778"
],
"name": "Cynthia Sturton"
}
],
"doi": "10.1145/3037697.3037734",
"doiUrl": "https://doi.org/10.1145/3037697.3037734",
"entities": [
"Machine learning",
"Open-source software",
"OpenRISC 1200",
"Toolchain",
"Vulnerability (computing)"
],
"id": "01814d50f0a7699f264c21d986ccd1f390b101b2",
"inCitations": [
"49e88c6bcaea88ddeccd6fb19fee950137819d3e"
],
"journalName": "",
"journalPages": "541-554",
"journalVolume": "",
"outCitations": [
"3c008a42e6b9d627c5a8feac0757403dbff959a3",
"774d50f55cf9268435a2147e92e025c9309e2947",
"b6b07bb0ffd85a090814580de1291ce39182a467",
"d3ca4145bd84d983c6732a354bdb4800ae47cea1",
"b8719183f3579e6f0bdf2d98ee500097a28cb9cf",
"217dd588fc53f4dbe51210145f1b9b2ffe92fbd0",
"9f0c016bb12e1567a1d3a460493957ae135a0d40",
"6465ad714d44d18e50adb9f69b36c24ad6ba83ce",
"551ac1a6b959a911209846c7f9a0c07c69c2bb7b",
"457f7e9363c673e54200378119b533115285209d",
"216b99ebe093c1b363654baf662f592df305d295",
"61d15445ca86bad719ed5d829b984408223c3578",
"3a00c02ea51911170a263f4a75959754b7da66e5",
"19c3578a68605eb06a6dd41c927d56d12b47af45",
"46217f372a75dddc2254fdbc6b9418ba3554e453",
"12789fd5b47542937d1b83ef8b99bdb9c7a70dec",
"49f8e6bc2679d0a7ec4a1e52d2956ff336211bfb",
"889c2c6d08861a078094c724709f8ccac3a86cd1",
"7f84a6906b4aa6734e2e5f9b7cb83786e65de637",
"a5f62c892c2ff4cb283f66c27b655dd0ae14eca3",
"0003ce240eb8c05cee9c56c54e16c0e3b84390dd",
"a282bfe3f936372a6de642dc0396b0fd6e44576b",
"65b6079988ec29ef3c6d62daf88b0f9e2ceee14c",
"34533947ac8274a4757716df754ffe4ff992fb1a",
"6481022b05642727f8425bde6a0717a90065dbe7",
"0c80eb8588fac0a763a15e1b7a33c6d885ce80a4"
],
"paperAbstract": "We present a methodology for identifying security critical properties for use in the dynamic verification of a processor. Such verification has been shown to be an effective way to prevent exploits of vulnerabilities in the processor, given a meaningful set of security properties. We use known processor errata to establish an initial set of security-critical invariants of the processor. We then use machine learning to infer an additional set of invariants that are not tied to any particular, known vulnerability, yet are critical to security.\n We build a tool chain implementing the approach and evaluate it for the open-source OR1200 RISC processor. We find that our tool can identify 19 (86.4%) of the 22 manually crafted security-critical properties from prior work and generates 3 new security properties not covered in prior work.",
"pdfUrls": [
"https://cs.unc.edu/~csturton/SCIFinder/files/ASPLOS17Talk.pdf",
"http://doi.acm.org/10.1145/3037697.3037734",
"http://cs.unc.edu/~csturton/SCIFinder/files/ASPLOS2017.pdf",
"http://cs.unc.edu/~csturton/papers/ASPLOS2017Zhang.pdf",
"http://cs.unc.edu/~csturton/SCIFinder/files/Lightening-7B-RuiZhang.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/01814d50f0a7699f264c21d986ccd1f390b101b2",
"sources": [
"DBLP"
],
"title": "Identifying Security Critical Properties for the Dynamic Verification of a Processor",
"venue": "ASPLOS",
"year": 2017
},
"01cabaadb1da4f5fa0fba62bca31f7d70a9ab939": {
"authors": [
{
"ids": [
"35930993"
],
"name": "Tian Tan"
},
{
"ids": [
"30461535"
],
"name": "Yue Li"
},
{
"ids": [
"38726687"
],
"name": "Jingling Xue"
}
],
"doi": "10.1145/3062341.3062360",
"doiUrl": "https://doi.org/10.1145/3062341.3062360",
"entities": [
"Automaton",
"Call graph",
"Java",
"Pointer analysis"
],
"id": "01cabaadb1da4f5fa0fba62bca31f7d70a9ab939",
"inCitations": [
"ce992c5be70243c83a5faaeea3f314ebd36302a9",
"4defad6c060c69d346f54b8912a2dbe3a8efd79a",
"cf4b581f3622fc177bdcc8d1c936034e531b09c0",
"ba7e09e838fe013b8d8789e4f0313133752b0b6e",
"fb6bf892d3373df6c7d7fea5af40f0a61788b1ed",
"830f6be24ab13dcbc4154bd52469fbb85ff25f0e"
],
"journalName": "",
"journalPages": "278-291",
"journalVolume": "",
"outCitations": [
"a38f20ccaf6369feadb2341109f1857848adfe8b",
"041fb17a8de187528529990e43f14280d420002f",
"fc1de916fa550c35e57ae8ccbc3874f509db0ca7",
"0a980373963ba017fc320148ac4e1bf1259d4ef5",
"8469007f1d62cac7d7188dbe6b67b24d40d46ca4",
"5a2ec85f87d518ff6b6f57aeac1c43bdb35729c8",
"0e7f5980e4083c12011be3783bd23e788e6b2ad2",
"5abd03095061c25ab7c4fab6b33a6ceb999c78e3",
"75e47286fe208102a63775c1e05dc61a5da607d3",
"9ea49abc003a832776df864a92838b3b51f3e55e",
"027eb436c35c7e293e7ebc565163cb54c05fe2e9",
"94d0e8b118efecb9f5b2056d84bf22253a2fb63c",
"3db4291a1a629876516bb06ae798a98475fb0148",
"87ad5767017a8487196257b4ae93a52765f429bf",
"3e6d92ed139f19418c74cce6697fbd2de609138e",
"b7efe971a34a0f2482e0b2520ffb31062dcdde62",
"85ff7e25c39d216bd50ac6eb89e335ca7aef43f4",
"e8af823e0b25acfc8e41b59805e17d9d1b126990",
"6c1fa64a6b5d3565fc4ab9ca97bf530069ce2669",
"068e9f8dd77ecfcc2019fdf3123d163b159fe4eb",
"a578530c785b14f54918720ee4acb672ffe3986e",
"1f32cece629d41929e6913f3b445b93bf2c168ac",
"22999e5ace5fe1ff41bcea18e997a48d1af108e4",
"17f58c906c6f453fc10b1d7e4db0e545b70e27d1",
"30f7824cce02499632d2b04f154bbe70d6ce3118",
"8bfd64fe8f9192a8b3c801c7d91fd46cabfc5319",
"187768583aa8fd7dfe64cc88cb2aa831b6b531db",
"724f15daaf81ef1cd7a9419bc69f59bba19cbe88",
"80a36a56472c4929ea9daf59516f4502320d4764",
"75724ed033e8d7978feb14d5e78fb7fa58bb5ad0",
"153d144f411f7054b0c4bbd6b829a3d8c2b2df31",
"1753d3e97fdbe7799b9625cb873b77eef506a608",
"44daa1fde25be30d21c4a1a32b7af314c9890af8",
"454b06a17e2f6656e65935cb9d36dcf2b2044bf5",
"0ab515c25b8cd689fce64c5c52f8fddb10abba52",
"107ef0cf32ea69f8dd3e8939ac6829524726c2e8",
"3803066162073c027179103dd18de3e9ae378d45",
"042396ba29d59a083366154c29aab7a28dccac37",
"5cb216302bdebaec708f705f83b317eeccf73753",
"5e567cda5999a6dd4e5da4bb30b9033f8d5687c4",
"80af0dfde58a4f1e4f7ff35fa2c882a4ab3bbad2",
"31181e73befea410e25de462eccd0e74ba8fea0b",
"5aed9231774c7742431d79c22de749c79f7e56e2",
"3597bcdb6f9eb154abb80c15368d67ef169bfacf",
"03aacfe8d36a673ecc379d3b76e7df1245a8d9e5"
],
"paperAbstract": "Mainstream points-to analysis techniques for object-oriented languages rely predominantly on the allocation-site abstraction to model heap objects. We present MAHJONG, a novel heap abstraction that is specifically developed to address the needs of an important class of type-dependent clients, such as call graph construction, devirtualization and may-fail casting. By merging equivalent automata representing type-consistent objects that are created by the allocation-site abstraction, MAHJONG enables an allocation-site-based points-to analysis to run significantly faster while achieving nearly the same precision for type-dependent clients. \n MAHJONG is simple conceptually, efficient, and drops easily on any allocation-site-based points-to analysis. We demonstrate its effectiveness by discussing some insights on why it is a better alternative of the allocation-site abstraction for type-dependent clients and evaluating it extensively on 12 large real-world Java programs with five context-sensitive points-to analyses and three widely used type-dependent clients. MAHJONG is expected to provide significant benefits for many program analyses where call graphs are required.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3062341.3062360",
"http://www.cse.unsw.edu.au/~tiantan/papers/pldi2017.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/01cabaadb1da4f5fa0fba62bca31f7d70a9ab939",
"sources": [
"DBLP"
],
"title": "Efficient and precise points-to analysis: modeling the heap by merging equivalent automata",
"venue": "PLDI",
"year": 2017
},
"01d83aa4653f1eefff1ea0f017b30423ff4f818f": {
"authors": [
{
"ids": [
"2861707"
],
"name": "Hamid Reza Faragardi"
},
{
"ids": [
"2905669"
],
"name": "Hossein Fotouhi"
},
{
"ids": [
"2191832"
],
"name": "Thomas Nolte"
},
{
"ids": [
"2627161"
],
"name": "Rahim Rahmani"
}
],
"doi": "10.1109/HPCC-SmartCity-DSS.2017.77",
"doiUrl": "https://doi.org/10.1109/HPCC-SmartCity-DSS.2017.77",
"entities": [
"Algorithm",
"Benchmark (computing)",
"Experiment",
"GRASP",
"Greedy randomized adaptive search procedure",
"Internet of things",
"Limiter",
"Max",
"Reconfigurability",
"Requirement",
"Routing",
"Sensor",
"Sensor node",
"Software deployment",
"Software-defined networking"
],
"id": "01d83aa4653f1eefff1ea0f017b30423ff4f818f",
"inCitations": [],
"journalName": "2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)",
"journalPages": "594-602",
"journalVolume": "",
"outCitations": [
"72a5b2cd900321fe6e0f826dc0e80443971b920e",
"56637368f9e82fdd3fecb2a534b22c799320cfa5",
"19a3606af56b6d2d9a8fc4e922a47550275ec24f",
"0de1204aacb9382651aa569d141820d35a1290f3",
"57ec950e812cbd6b3e00846bb32d2d6a806bd8b6",
"428940fa3f81f8d415c26661de797a77d8af4d43",
"3965bf4d76c1c989781a14a39252d05254822554",
"b0ddeebce9c975a1c1a8576362686ca45eb31316",
"7f66746a864d531abdf13f77ce2826f923d76537",
"7e6a98281b69809a6dad94cafdda20422d1f08a5",
"1154502149a4a00f2d8403e4aabff62e904d7b6b",
"6a6bb873d4131120c5b4f72251426d94e12a72f4",
"8abf04223c6162d07d3d02be48478aa7e5aa82bb",
"6159c68bc6202d99c64a4a9330b1738b50dc4a02",
"bb792c7de9abb8bf96f4c9e499799e797c245a96",
"fdb53266b101ad1b4d106720f5ff98fa8df9acf5",
"a66f79d3e5b9667392bde0d4aebe5b5db1040dba",
"a4955a9a10031cbbf1caa5986d08a00cc022c571"
],
"paperAbstract": "Internet of Things (IoT), one of the key elements of a smart factory, is dubbed as Industrial IoT (IIoT). Software defined networking is a technique that benefits network management in IIoT applications by providing network reconfigurability. In this way, controllers are integrated within the network to advertise routing rules dynamically based on network and link changes. We consider controllers within Wireless Sensor Networks (WSNs) for IIoT applications in such a way to provide reliability and timeliness. Network reliability is addressed for the case of node failure by considering multiple sinks and multiple controllers. Real-time requirements are implicitly applied by limiting the number of hops (maximum path-length) between sensors and sinks/controllers, and by confining the maximum workload on each sink/controller. Deployment planning of sinks should ensure that when a sink or controller fails, the network is still connected. In this paper, we target the challenge of placement of multiple sinks and controllers, while ensuring that each sensor node is covered by multiple sinks (k sinks) and multiple controllers (k′ controllers). We evaluate the proposed algorithm using the benchmark GRASP-MSP through extensive experiments, and show that our approach outperforms the benchmark by lowering the total deployment cost by up to 24%. The reduction of the total deployment cost is fulfilled not only as the result of decreasing the number of required sinks and controllers but also selecting cost-effective sinks/controllers among all candidate sinks/controllers.",
"pdfUrls": [
"https://doi.org/10.1109/HPCC-SmartCity-DSS.2017.77"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/01d83aa4653f1eefff1ea0f017b30423ff4f818f",
"sources": [
"DBLP"
],
"title": "A Cost Efficient Design of a Multi-sink Multi-controller WSN in a Smart Factory",
"venue": "2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)",
"year": 2017
},
"01d8f75b6382c7534a67637249122de28a780ce9": {
"authors": [
{
"ids": [
"38566150"
],
"name": "Michael Wei"
},
{
"ids": [
"37531541"
],
"name": "Amy Tai"
},
{
"ids": [
"1692790"
],
"name": "Christopher J. Rossbach"
},
{
"ids": [
"1804661"
],
"name": "Ittai Abraham"
},
{
"ids": [
"9773986"
],
"name": "Maithem Munshed"
},
{
"ids": [
"35081828"
],
"name": "Medhavi Dhawan"
},
{
"ids": [
"5170084"
],
"name": "Jim Stabile"
},
{
"ids": [
"1753945"
],
"name": "Udi Wieder"
},
{
"ids": [
"21841246"
],
"name": "Scott Fritchie"
},
{
"ids": [
"1760342"
],
"name": "Steven Swanson"
},
{
"ids": [
"3122063"
],
"name": "Michael J. Freedman"
},
{
"ids": [
"1767467"
],
"name": "Dahlia Malkhi"
}
],
"doi": "",
"doiUrl": "",
"entities": [
"Data store",
"Finite-state machine",
"NoSQL",
"State machine replication",
"Strong consistency"
],
"id": "01d8f75b6382c7534a67637249122de28a780ce9",
"inCitations": [
"340d6db56d94623ac090599cf9ea5287370607ef",
"33f95f238e12e1790ad880ec40cf6c63ea4a70dc",
"797dad570f82414592a87ed7ebdce44f9801e8df"
],
"journalName": "",
"journalPages": "35-49",
"journalVolume": "",
"outCitations": [
"1a133e61010294b0cd77fa851dfeea7292e49439",
"e2c6297a9ad5118dc4a6a0dab6a2af2b83545e3d",
"e4c1d1ad684535bf835475aafb8fcfe5d23b0a93",
"206b20f225fc655dfac733b6f0bd8077ed86215e",
"039f09d49bc408db9e0e8429e6bd92be49c5f72e",
"02ebdcf8200135ec0433e12e4ef2459ac740370b",
"29a05cde1994548e2e9487822248c679626c6241",
"d12d1289d2384c2ce642f01855637b9f0519e189",
"9748241beb02ef1e2d0e6dc877c04b354033a838",
"088e3e939ad234b6fdd0e321290fb26937dc2553",
"5ea7103a1c39de9f96fefe5b02fd9306ae439c9f",
"517e239f97f50079bc557cccf1a6b56aa5736d30",
"a1c5e3904aa14e42e9ffa6f5903229245f1fa067",
"9aa0d7253574e50fe3a190ccd924433f048997dd",
"7062268b78dff4a8819fe3f1e89c6b5344f715a5",
"49af572ef8f7ea89db06d5e7b66e9369c22d7607",
"13f7c5807452ae602046582a385c0fb544ec5de1",
"d0b6d2075a653d60452b6df0fced4ee0ae093dd2",
"be1815b0102d79b62a14ae39867e3ecc8146cfe9",
"7afa08d7c1c6c8758ee1227437c69463d5441d09",
"3702d6e0c78050f3261fdbf0eb1aefbac59fb8cf",
"11d23a3e7b03ef9679bb4cd47c631118f56f67e3",
"5ba9e730afd256ed1138fb563e59c214c6ec9259",
"33457f49553d918e912c2d8c54b81f4fd8a4c234",
"068e59b88a1230d709d99c83a45d3a5b91260810",
"00f7b192212078fc8afcbe504cc8caf57d8f73b5",
"13d6c568c770ff5a070072e720fb34b0037cdab8",
"9f948448e7a5f0cc94cd53656410face8b31b18a",
"09d1a6f5a50a8c3e066fb05a8833bc00663ada0e",
"3784fcc2a0789ee1f0d26a34822b8138895e3340",
"07d847f310d5fa9138f461f0a25c5e0024f1c4af"
],
"paperAbstract": "This paper presents vCorfu, a strongly consistent cloudscale object store built over a shared log. vCorfu augments the traditional replication scheme of a shared log to provide fast reads and leverages a new technique, composable state machine replication, to compose large state machines from smaller ones, enabling the use of state machine replication to be used to efficiently in huge data stores. We show that vCorfu outperforms Cassandra, a popular state-of-the art NOSQL stores while providing strong consistency (opacity, read-own-writes), efficient transactions, and global snapshots at cloud scale.",
"pdfUrls": [
"https://www.usenix.org/system/files/conference/nsdi17/nsdi17-wei-michael.pdf",
"https://www.usenix.org/conference/nsdi17/technical-sessions/presentation/wei-michael",
"http://www.cs.princeton.edu/~mfreed/docs/vcorfu-nsdi17.pdf",
"http://www.usenix.org./system/files/conference/nsdi17/nsdi17-wei-michael.pdf"
],
"pmid": "",
"s2PdfUrl": "http://pdfs.semanticscholar.org/0247/2fb494ab2e19aa0756bed34b9c6ea73baf4b.pdf",
"s2Url": "https://semanticscholar.org/paper/01d8f75b6382c7534a67637249122de28a780ce9",
"sources": [
"DBLP"
],
"title": "vCorfu: A Cloud-Scale Object Store on a Shared Log",
"venue": "NSDI",
"year": 2017
},
"01de7e8a5ec0c5de8c34ea2fc91d82b9db1c2715": {
"authors": [
{
"ids": [
"1720537"
],
"name": "Slawomir Hanczewski"
},
{
"ids": [
"6589337"
],
"name": "Maciej Stasiak"
},
{
"ids": [
"2310025"
],
"name": "Joanna Weissenberg"
}
],
"doi": "10.1109/HPCC-SmartCity-DSS.2017.40",
"doiUrl": "https://doi.org/10.1109/HPCC-SmartCity-DSS.2017.40",
"entities": [
"FIFO (computing and electronics)",
"Queueing theory"
],
"id": "01de7e8a5ec0c5de8c34ea2fc91d82b9db1c2715",
"inCitations": [],
"journalName": "2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)",
"journalPages": "303-308",
"journalVolume": "",
"outCitations": [
"198b7c85c45bffba2801e9cf874196dbc9337ebb",
"d25c5750dcd469c4b3e51e6009b0b0d3618be883",
"01eda83bebb9f9d152ff313c5a8e33acef259300",
"61a8ee5e0efb32d91b6d3fb462f772f88ec346a4",
"79e70288eb694f59b89d6a3d8427f9aac12ef6eb",
"235aaa6eeb29aded47741abf50a4a150d1fb6d34",
"ed9a7ccd585f3cd6d4c21c4189f912c34bdbbff3",
"842c69d58a95392dfb1ba4d4e72da5ac43fa0f7a",
"bb19cbdc3bf25c00811d80e4268a730f08e775d5",
"e8a82f419e80b94e033517dff5c9a9df8875333b",
"06583b13ce4e59a72e8c7efc32fc818f906583a4",
"50768e5420c733ca07ab6b696dfcf504d61d6c18",
"03003cf918171f6c8f4ed42d7903099cccd1dac6",
"fa1c3643b60551314f93ab7bd1d1aec16db4b69a",
"4e3dda4201f8dc26b5ef66efe28e9eb624a91c18",
"27f98925d8eb3447824b7eeea9258dfbdf877925",
"c48e489147cb15b486addfdc9013092f4205caf8"
],
"paperAbstract": "This paper presents a model of a queueing system with multi-service adaptive traffic. This type of low-latency traffic is one of the most dominant type of traffic in modern packet networks. The idea and operation of the model is discussed with the example of a queueing system with the FIFO service discipline.",
"pdfUrls": [
"https://doi.org/10.1109/HPCC-SmartCity-DSS.2017.40"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/01de7e8a5ec0c5de8c34ea2fc91d82b9db1c2715",
"sources": [
"DBLP"
],
"title": "The Model of the Queuing System with Adaptive Traffic",
"venue": "2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)",
"year": 2017
},
"01e1cba36e403c5c620d49e3eda73b29fcfc616b": {
"authors": [
{
"ids": [
"1893193"
],
"name": "Aws Albarghouthi"
},
{
"ids": [
"1806462"
],
"name": "Loris D'Antoni"
},
{
"ids": [
"31638968"
],
"name": "Samuel Drews"
},
{
"ids": [
"34894873"
],
"name": "Aditya V. Nori"
}
],
"doi": "10.1145/3133904",
"doiUrl": "https://doi.org/10.1145/3133904",
"entities": [
"Fairness measure",
"Imperative programming",
"Model checking",
"Program analysis"
],
"id": "01e1cba36e403c5c620d49e3eda73b29fcfc616b",
"inCitations": [
"3f9a733ff17f080a15eab97dd26697652363d933"
],
"journalName": "PACMPL",
"journalPages": "80:1-80:30",
"journalVolume": "1",
"outCitations": [
"1459e3e4242c2590c6875976de4859ea2a58bf6c",
"2f3edee1d3459096ba1de54450fca4d8406d1ed1",
"d80c777a0bbb948c58059d6862aaa28203d68551",
"7cecdf2eee3d4ca7191730ea923a24d8d52acc68",
"ce77c7ed66ea25d51ee09839ed6d38ab5f815857",
"a92d721f22001ecbca87655c5963f048f7d5e013",
"24799da8a19cc41225024310ce9a9655a548516c",
"1c406afc440c357764a4e686f571f52becaaed80",
"4087b4bd8841691b84aa546f16129a49ae2b5c20",
"9809537f4fa24532f45a6f94fd5a41a46217cd46",
"20dbc7f13253f47f31a2d86217fa38a1fcb03a21",
"c3eba5fcba83f9637e83c1ad8be15944f22b15c1",
"a6d2d771e8d6dd16a7da3479dbd0619f2400438c",
"15581e7eca3f1cfe02b148fe307e55f87eafbfc4",
"4556f3f9463166aa3e27b2bec798c0ca7316bd65",
"59684cf4f60456f5eea2991a0d7f90095f37a657",
"a538b05ebb01a40323997629e171c91aa28b8e2f",
"153f586c3b4f3047900f9f5b5ddf61a37309d698",
"89a193c4e9f80122c8b7ae083db4749c65e600fe",
"204dc0986b512a95a66632556d10c3c162caf7b7",
"04282d68a4c3cbeaa5adbc9a62d2a756bdf679f6",
"73062e44e8a4b3d80c0a98e009c9604dc90d3911",
"4adc02e7c7e265bed0d4ba374ac513181bb043b0",
"d000c039374bf46905720d5b140f65761b00f51f",
"2bb7e029b50af446a494cccfb32c482e66fe2365",
"164347c68dc8f901b7bd56890f3beefe0a407111",
"6d6809d45bbfba2d5cd086bda6cc2efb34cb79ff",
"2c536e9401daeede3408f9f614a10b16d2ea77ac",
"3960dda299e0f8615a7db675b8e6905b375ecf8a",
"0b384a6e32db24b4d217b71d5fa18c38f7332788",
"0da7cc27b817a702148b0f0f23aa5f0ad626b502"
],
"paperAbstract": "With the range and sensitivity of algorithmic decisions expanding at a break-neck speed, it is imperative that we aggressively investigate fairness and bias in decision-making programs. First, we show that a number of recently proposed formal definitions of fairness can be encoded as probabilistic program properties. Second, with the goal of enabling rigorous reasoning about fairness, we design a novel technique for verifying probabilistic properties that admits a wide class of decision-making programs. Third, we present FairSquare, the first verification tool for automatically certifying that a program meets a given fairness property. We evaluate FairSquare on a range of decision-making programs. Our evaluation demonstrates FairSquare’s ability to verify fairness for a range of different programs, which we show are out-of-reach for state-of-the-art program analysis techniques.",
"pdfUrls": [
"http://pages.cs.wisc.edu/~aws/papers/oopsla17.pdf",
"http://pages.cs.wisc.edu/~sdrews/slides/oopsla17slides.pdf",
"http://pages.cs.wisc.edu/~sdrews/papers/oopsla17.pdf",
"http://pages.cs.wisc.edu/~loris/papers/oopsla17.pdf",
"http://doi.acm.org/10.1145/3133904"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/01e1cba36e403c5c620d49e3eda73b29fcfc616b",
"sources": [
"DBLP"
],
"title": "FairSquare: probabilistic verification of program fairness",
"venue": "PACMPL",
"year": 2017
},
"01f42436042ddaa48998c87109cbe46cad6e7e52": {
"authors": [
{
"ids": [
"3315868"
],
"name": "Prathmesh Kallurkar"
},
{
"ids": [
"2550384"
],
"name": "Smruti R. Sarangi"
}
],
"doi": "10.1145/3123939.3123984",
"doiUrl": "https://doi.org/10.1145/3123939.3123984",
"entities": [
"Bloom filter",
"Cache (computing)",
"Database server",
"Forth",
"Interrupt handler",
"Kilobyte",
"Network switch",
"Operating system",
"Scheduling (computing)",
"System call",
"Web server",
"Windows Task Scheduler"
],
"id": "01f42436042ddaa48998c87109cbe46cad6e7e52",
"inCitations": [
"622a11843f129452d0c9daeb87a076d02fd2a0f0"
],
"journalName": "",
"journalPages": "612-624",
"journalVolume": "",
"outCitations": [
"1106d3a383899c13c9a63f293ad78c02631ee5ce",
"0abc3e83ccd6e685f8d0299f24f03ae28f4c2459",
"2960c89331eb7afa86584792e2e11dbf6a125820",
"7ff303e7c450aee82b6fff5cc64be54e5604da01",
"0e2ee93bb53d93684d5276a07a582c574770ab53",
"48536fdbbc79ddf163901c7e63bb70b6f64802e0",
"298cc4031c95a634371fa9cfc4fe2f09e579493d",
"5fda732aae5f0d845c8ff2e72f144f3d69e362d9",
"10fede77f843e9eb5ef1768a17543013616d9243",
"158ebe313a72857c5534a313f3ec0e413593b732",
"b8bfce11df38955685c09f408ca3f7828af2a0c1",
"109df0e8e5969ddf01e073143e83599228a1163f",
"17e1036e3681a0da3361ae56cfa77d523ce51d88",
"907e4972815c0fcd484d335a9c3fd4cccc9a081e",
"7932a4597cec5149c575aa2303fe8f12241e4320",
"29c324788b83463aa707784210edbca894694f20",
"fae207eff574ee2994bc70437954ccb0b139ec7b",
"0852a44c86db434e9b51c67704636791e9940487",
"093d1d23500d65e99c7d0cd5569ce0f0d4c37076",
"9acfb20d3e1ef5ad6a3c0361d88f6839fec99fac",
"286b5b80bc76dbb63094a85951bb8e8895ee9f14",
"09bd66ed15985caa6b0bf1d54a36b508141ed128",
"2612541a89857949bc512b6fb2ad7f0c153cb97c",
"00a739b660486ec6468ea53f15fddc84df8b6631",
"43644b8cd34a759e5cda4953c57dba0bb3e25805",
"16aecf8b1a0a97fac8681741febe434be2dc0b28",
"8cfa975a656838356dc4b211b6c2186bc2601a05",
"3593269a4bf87a7d0f7aba639a50bc74cb288fb1",
"44135fd9b5e38cf29e41d675f9eac670455ed860",
"0beb2535d25abcc2101ca7dd5502f610e2a553ab"
],
"paperAbstract": "The execution of workloads such as web servers and database servers typically switches back and forth between different tasks such as user applications, system call handlers, and interrupt handlers. The combined size of the instruction footprints of such tasks typically exceeds that of the i-cache (16--32 KB). This causes a lot of i-cache misses and thereby reduces the application's performance. Hence, we propose SchedTask, a hardware-assisted task scheduler that improves the performance of such workloads by executing tasks with similar instruction footprints on the same core. We start by decomposing the combined execution of the OS and the applications into sequences of instructions called SuperFunctions. We propose a scheme to determine the amount of overlap between the instruction footprints of different SuperFunctions by using Bloom filters. We then use a hierarchical scheduler to execute SuperFunctions with similar instruction footprints on the same core. For a suite of 8 popular OS-intensive workloads, we report an increase in the application's performance of up to 29 percentage points (mean: 11.4 percentage points) over state of the art scheduling techniques.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3123939.3123984",
"http://www.cse.iitd.ernet.in/~srsarangi/files/papers/schedtask.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/01f42436042ddaa48998c87109cbe46cad6e7e52",
"sources": [
"DBLP"
],
"title": "Schedtask: a hardware-assisted task scheduler",
"venue": "MICRO",
"year": 2017
},
"01f660b239de2a7d250315053170ee792a91f4b5": {
"authors": [
{
"ids": [
"2026805"
],
"name": "Robert V. Lim"
},
{
"ids": [
"1763308"
],
"name": "Boyana Norris"
},
{
"ids": [
"1687994"
],
"name": "Allen D. Malony"
}
],
"doi": "10.1109/ICPP.2017.61",
"doiUrl": "https://doi.org/10.1109/ICPP.2017.61",
"entities": [
"Auto-Tune",
"CUDA",
"Compiler",
"Experiment",
"Graphics processing unit",
"Programmer",
"Static program analysis"
],
"id": "01f660b239de2a7d250315053170ee792a91f4b5",
"inCitations": [
"e2bbb648b6312fafce1cfcc72edd90a56ac7ab24"
],
"journalName": "2017 46th International Conference on Parallel Processing (ICPP)",
"journalPages": "523-532",
"journalVolume": "",
"outCitations": [
"478ca7603036efcf3b6a02a6540d6a84351ef23d",
"10d3e0f0648d0a5cfaebb3044ea7b14a52e54466",
"3020f7f8381227c90ac58466ec116f470d0b63ec",
"05d64be0e237c447ebee3ede50106ee4177d6daa",
"1e375b7bd9b02336371dbbb06bee4a94b2a93fc8",
"1f2ff98f9413bb36c641e9edcfa79f7b33eeb80a",
"8c0b0e80514f70b4eef3a274315168c7a5a66335",
"3e5c959b0371e95efb45f7e375801ddba23aa7bb",
"12f9926c247e27f136efdbff0c76f36af75a9291",
"04d54c2219b750371eb4c2f234c6069c1b40971a",
"c4ec5dc7d68d858e141113feca9921c632b3b2d5",
"38dad8ef8d98aa81c9072c905ce851d33916bfca",
"1ac19f434c742202451da7c44591c52ad3f9e9fd",
"035c542402de661b544603d84b7ec45bada14e7f",
"17056314e26434c4e71cf8f30da8926bb858651f",
"3218bbfd89deae4134d6c6d7f8f3ceb5c3a361f7"
],
"paperAbstract": "Optimizing the performance of GPU kernels is challenging for both human programmers and code generators. For example, CUDA programmers must set thread and block parameters for a kernel, but might not have the intuition to make a good choice. Similarly, compilers can generate working code, but may miss tuning opportunities by not targeting GPU models or performing code transformations. Although empirical autotuning addresses some of these challenges, it requires extensive experimentation and search for optimal code variants. This research presents an approach for tuning CUDA kernels based on static analysis that considers fine-grained code structure and the specific GPU architecture features. Notably, our approach does not require any program runs in order to discover near-optimal parameter settings. We demonstrate the applicability of our approach in enabling code autotuners such as Orio to produce competitive code variants comparable with empirical-based methods, without the high cost of experiments.",
"pdfUrls": [
"http://arxiv.org/abs/1701.08547",
"https://arxiv.org/pdf/1701.08547v1.pdf",
"https://arxiv.org/pdf/1701.08547v2.pdf",
"https://arxiv.org/pdf/1701.08547v3.pdf",
"http://doi.ieeecomputersociety.org/10.1109/ICPP.2017.61"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/01f660b239de2a7d250315053170ee792a91f4b5",
"sources": [
"DBLP"
],
"title": "Autotuning GPU Kernels via Static and Predictive Analysis",
"venue": "2017 46th International Conference on Parallel Processing (ICPP)",
"year": 2017
},
"0201403268e3aaa552165dfc53a86534151c3dd9": {
"authors": [
{
"ids": [
"2143124"
],
"name": "Sajal Dash"
},
{
"ids": [
"3447404"
],
"name": "Anshuman Verma"
},
{
"ids": [
"1796013"
],
"name": "Chris North"
},
{
"ids": [
"1688860"
],
"name": "Wu-chun Feng"
}
],
"doi": "10.1109/HPCC-SmartCity-DSS.2017.2",
"doiUrl": "https://doi.org/10.1109/HPCC-SmartCity-DSS.2017.2",
"entities": [
"Algorithm",
"Approximation algorithm",
"Data pre-processing",
"Dimensionality reduction",
"GLIMMER",
"Interactive visualization",
"Multidimensional scaling",
"Real-time data"
],
"id": "0201403268e3aaa552165dfc53a86534151c3dd9",
"inCitations": [],
"journalName": "2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)",
"journalPages": "10-17",
"journalVolume": "",
"outCitations": [
"4f7cfc54caa5db27347f7278d1482de8e761cfc0",
"e47ec3e910c2ba7a33ed1188e88245e54e2b0e1c",
"2b5d8135750899518322491ffd60f12a4789681d",
"755e4ad5468747b31b9d6994885b17ad957dc9d7",
"a75dfa6a77e42f77836e771a679e5902fb43edea",
"00c4db9c5b8b8bb2285a4649de75ba3580cd0e35",
"54c5239b7a293fd4882f043978027a8676a16a26",
"520a10cd9bc944ad5ab14bff46578251ac40828d",
"04d0daf15e6bd3b8b20d96513698d327584ace04",
"47b48ec0877ee09f7c30678dfc128d4c5504db74",
"594d2e123ecb8ec0bc781aec467007d65ab5464d"
],
"paperAbstract": "Projecting a high-dimensional dataset onto a lower dimensional space can improve the efficiency of knowledge discovery and facilitate real-time data analysis. One technique for dimension reduction, weighted multi-dimensional scaling (WMDS), approximately preserves pairwise weighted distances during the transformation; but its O(f(n)d) algorithm impedes real-time performance on large datasets. Thus, we present CLARET, our fast and portable parallel WMDS tool that combines algorithmic concepts adapted and extended from the stochastic force-based MDS (SF-MDS) and Glimmer. To further improve Claret's performance for real-time data analysis, we propose a preprocessing step that computes approximate weighted Euclidean distances by combining a novel data mapping called stretching and Johnson Lindestrauss' lemma in O(log d) time in place of the original O(d) time. This preprocessing step reduces the complexity of WMDS from O(f(n)d) to O(f(n) log d), which for large d is a significant computational gain. Finally, we present a case study of Claret by integrating it into an interactive visualization tool called V2PI to facilitate real-time analytics. To ensure the quality of the projections, we propose a geometric shape matching-based alignment process and a quality metric.",
"pdfUrls": [
"http://synergy.cs.vt.edu/pubs/papers/dash-claret-hpcc17.pdf",
"https://doi.org/10.1109/HPCC-SmartCity-DSS.2017.2"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/0201403268e3aaa552165dfc53a86534151c3dd9",
"sources": [
"DBLP"
],
"title": "Portable Parallel Design of Weighted Multi-Dimensional Scaling for Real-Time Data Analysis",
"venue": "2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)",
"year": 2017
},
"020af9e8d35b7f6ca563397a8e82778dfa7dac7b": {
"authors": [
{
"ids": [
"1706290"
],
"name": "Wen Xu"
},
{
"ids": [
"1909974"
],
"name": "Sanidhya Kashyap"
},
{
"ids": [
"7761504"
],
"name": "Changwoo Min"
},
{
"ids": [
"3254849"
],
"name": "Taesoo Kim"
}
],
"doi": "10.1145/3133956.3134046",
"doiUrl": "https://doi.org/10.1145/3133956.3134046",
"entities": [
"Cloud computing",
"Data center",
"Design pattern",
"Fork (system call)",
"Iteration",
"Multi-core processor",
"Operating system",
"Run time (program lifecycle phase)",
"Scalability",
"Software bug",
"Software design pattern",
"Software testing",
"System call",
"Test suite",
"Throughput",
"Vulnerability (computing)",
"american fuzzy lop"
],
"id": "020af9e8d35b7f6ca563397a8e82778dfa7dac7b",
"inCitations": [],
"journalName": "",
"journalPages": "2313-2328",
"journalVolume": "",
"outCitations": [
"3cae67dde8b20aa58ebd12def02c7fa8ad844de4",
"6f9058b5175aee958e330527aeb55074702dbfd4",
"117025a430aaa984dd260bea97531da221b634a4",
"274e7e576534b3e091f09e801cce807f5fd221c1",
"08b5b8270713bbbc0b5b1a31c8625b0bf87d674d",
"080b1f2c8316dad80d8c385dfcb82335a64a4d29",
"17e1036e3681a0da3361ae56cfa77d523ce51d88",
"32c9b3a4990fdb26da19a4e0817936369a5e91bc",
"0a0bf9e017e05d58b85e793e58148d2946259a74",
"de71e2359995087b4ce7d46e4eb718c341c70ee0",
"093d1d23500d65e99c7d0cd5569ce0f0d4c37076",
"01f21f3aacb36a425aa9213a10ccc543a11659ab",
"08832863bc3f041222f381c8ae143f8a66449059",
"479bf197a3a9c5f6f7b06e64eefa0a90fa0c8b41",
"abf1157c2043274a8d580151db1d4ef5be2c892e",
"5cfc936d12bbd8a0f100687b12b20e406215f30a",
"34e8a2787d737b050afff384ff0befd31c95e3a9",
"1d5ca5dda6526012738276f3e58cd752a30b4652",
"158ebe313a72857c5534a313f3ec0e413593b732",
"5556995fb630c47805bbba560287ea59ce357fa1",
"42685a7f175b44c3365d20f41853e18c7998e2b7",
"36800d797c927b1be9437a789eaa30e90d0b7c87"
],
"paperAbstract": "Fuzzing is a software testing technique that finds bugs by repeatedly injecting mutated inputs to a target program. Known to be a highly practical approach, fuzzing is gaining more popularity than ever before. Current research on fuzzing has focused on producing an input that is more likely to trigger a vulnerability.\n In this paper, we tackle another way to improve the performance of fuzzing, which is to shorten the execution time of each iteration. We observe that AFL, a state-of-the-art fuzzer, slows down by 24x because of file system contention and the scalability of fork() system call when it runs on 120 cores in parallel. Other fuzzers are expected to suffer from the same scalability bottlenecks in that they follow a similar design pattern. To improve the fuzzing performance, we design and implement three new operating primitives specialized for fuzzing that solve these performance bottlenecks and achieve scalable performance on multi-core machines. Our experiment shows that the proposed primitives speed up AFL and LibFuzzer by 6.1 to 28.9x and 1.1 to 735.7x, respectively, on the overall number of executions per second when targeting Google's fuzzer test suite with 120 cores. In addition, the primitives improve AFL's throughput up to 7.7x with 30 cores, which is a more common setting in data centers. Our fuzzer-agnostic primitives can be easily applied to any fuzzer with fundamental performance improvement and directly benefit large-scale fuzzing and cloud-based fuzzing services.",
"pdfUrls": [
"http://iisp.gatech.edu/sites/default/files/images/designing_new_operating_primitives_to_improve_fuzzing_performance_vt.pdf",
"http://doi.acm.org/10.1145/3133956.3134046",
"https://taesoo.kim/pubs/2017/xu:os-fuzz.pdf",
"https://taesoo.kim/pubs/2017/xu:os-fuzz-slides.pdf",
"http://iisp.gatech.edu/sites/default/files/images/wen-ccs2017.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/020af9e8d35b7f6ca563397a8e82778dfa7dac7b",
"sources": [
"DBLP"
],
"title": "Designing New Operating Primitives to Improve Fuzzing Performance",
"venue": "CCS",
"year": 2017
},
"022086e6eebbc7bd7210a5f1217577f384f343a7": {
"authors": [
{
"ids": [
"39483735"
],
"name": "Renqin Cai"
},
{
"ids": [
"1735804"
],
"name": "Chi Wang"
},
{
"ids": [
"31825390"
],
"name": "Hongning Wang"
}
],
"doi": "10.1145/3077136.3080781",
"doiUrl": "https://doi.org/10.1145/3077136.3080781",
"entities": [
"Document",
"Multinomial logistic regression",
"Speech repetition",
"Text corpus",
"Topic model",
"User-generated content"
],
"id": "022086e6eebbc7bd7210a5f1217577f384f343a7",
"inCitations": [],
"journalName": "",
"journalPages": "365-374",
"journalVolume": "",
"outCitations": [
"71aaf59727081880d2833fb76d8f862048ce75dc",
"12082a08377b7051360ef8be5a788adb2c024e98",
"51fec0515b11cabc2be4832eab43ca5f6ff387d1",
"ff02973613c2339f2dfcc95fe3c41cc72f0ca377",
"9bf021126f96dbbf2c3968765003aaba0c826144",
"339817cf189cae4e91b39fb0c3284a72d5e81198",
"952c44bc56e54f64d0fe8247a3a2bd11c2188c61",
"87d907a114409755ecd3c6886585de26a4e17ffe",
"d15c57cb30c38da115e7ca31f2c6e3e5f1815ce0",
"a0628fc3e3324ec8906b09154cfff8b6b664fa7d",
"263f103fd2bfbbd6aeb392c6519d3f590e647c0a",
"dc6b0e6949f806d69f63445985ee8a7a1c551fff",
"a5dc3e018bc45fc707a56ed1bacc08d3cd648b0e",
"0ef311acf523d4d0e2cc5f747a6508af2c89c5f7",
"ef738810711edea9e2aa0aedb9c2eb1470661bf5",
"07bd2985ebe29eaa182569e1fd3e3e0f9df4c14a",
"479effb344518acdc0fc301af393a75cd8bec40b",
"3d74d241af53d85cbc74f73a785fddd675f0e644",
"3dffe882c5447a5b34b25c4892e20bd21a3637da",
"40b7f6cdfbafb9586f77f3796c5343346bd4cac9",
"4ae54170d96423730f12f2f3d30a8820e7250d5c",
"01f3290d6f3dee5978a53d9d2362f44daebc4008",
"495548a800509c65a7bf54b2ddde0f8e44ca84d4",
"5c6de157e19b49ff007f24c04c1f24d91addb6ba"
],
"paperAbstract": "One important way for people to make their voice heard is to comment on the articles they have read online, such as news reports and each other's posts. The user-generated comments together with the commented documents form a unique correspondence structure. Properly modeling the dependency in such data is thus vital for one to obtain accurate insight of people's opinions and attention.\n In this work, we develop a Commented Correspondence Topic Model to model correspondence in commented text data. We focus on two levels of correspondence. First, to capture topic-level correspondence, we treat the topic assignments in commented documents as the prior to their comments' topic proportions. This captures the thematic dependency between commented documents and their comments. Second, to capture word-level correspondence, we utilize the Dirichlet compound multinomial distribution to model topics. This captures the word repetition patterns within the commented data. By integrating these two aspects, our model demonstrated encouraging performance in capturing the correspondence sturcture, which provides improved results in modeling user-generated content, spam comment detection, and sentence-based comment retrieval compared with state-of-the-art topic model solutions for correspondence modeling.",
"pdfUrls": [
"http://www.cs.virginia.edu/~hw5x/paper/p365-cai.pdf",
"http://doi.acm.org/10.1145/3077136.3080781",
"https://www.microsoft.com/en-us/research/wp-content/uploads/2017/05/SIGIR17CCTM.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/022086e6eebbc7bd7210a5f1217577f384f343a7",
"sources": [
"DBLP"
],
"title": "Accounting for the Correspondence in Commented Data",
"venue": "SIGIR",
"year": 2017
},
"022c3fa7794ba53e2d275a7e985f48cd0ee0ed7e": {
"authors": [
{
"ids": [
"1687456"
],
"name": "Jan Hidders"
},
{
"ids": [
"1717880"
],
"name": "Jan Paredaens"
},
{
"ids": [
"1713880"
],
"name": "Jan Van den Bussche"
}
],
"doi": "10.1145/3034786.3056106",
"doiUrl": "https://doi.org/10.1145/3034786.3056106",
"entities": [
"Datalog",
"Deep learning",
"JSON",
"Logical framework",
"Recursion",
"Set packing",
"Tree structure"
],
"id": "022c3fa7794ba53e2d275a7e985f48cd0ee0ed7e",
"inCitations": [
"9312e5efa0dcef1445d45a41771f12e2a8dc6715",
"239869c5679418fe6f35eac3cff5c64dc6fc8c57"
],
"journalName": "",
"journalPages": "137-149",
"journalVolume": "",
"outCitations": [
"879fdd5dd812357b029c595358d5eb2757bea179",
"17ee04f6e12e12509a39d203dbb43aa8e83bc526",
"79b3f8183223aea85dd28a2beb6599252f063f64",
"5465b7b7bf99660cc3a79af3502d84c3f9d8da1a",
"a97b77c8c3f9e8247c497d1b4c27c958a15f3a62",
"8f3d2d6a42785a9d7dc03cba48474bfb623d97e3",
"1526b9c49baf1c7d50a2820f7306f655e81fcfb9",
"610aaf556dd3504496cbec0b8d59c0eff19b5ccd",
"c80a30f0312038c1c1aa238c6662d06f036fae05",
"bec5e2f2f1cda3dd1cb89622b7f00f8cba070dd0",
"8547d1c310b67b0a412de45942c1bae2b4645d22",
"0442845100020f8d2e3970a3180ce918908d57ae",
"407748e97d8d3878535f6371ad324708915bf6d9",
"ceab83f2eed3c6dc3f2771db782e023303cb4141",
"bbfd6c5365cf74c953b2c2b451c4798b7618f3c4",
"0503d5a2d98320c3741b6afedd2cb1e048e6a018",
"7f0e528b8195fab236aac9267f3ae2a79fd2730e",
"65298a45b07dbe81bd7ff297b647688e3322e3b8",
"9c4ac903a419752d0d2948baeb6d3ecad9c67df5",
"512bb4d36cb0ed50890d03b690cb03b789fbbfbb",
"4e7547b3d31b4f9b4b73a958cbe4d1b774d3ba94",
"eb80b83eea907144c111af9d1058c99b6403edeb",
"80cbe343ca73d75647d14149b6c466fac0741654",
"602c518edb66ccbfca2af91850dc2e764fed51a7",
"4b82bcc621c01fc06ae5159051702f5a9ab56975",
"084d297399d6bd9bad1f090933f261d858a31b88",
"172e126a6d0d5760e6802467cd8b1b68f3edc749",
"b27ab73f60c242123e01f95f0d75ba2c2c4ab39d"
],
"paperAbstract": "We propose a logical framework, based on Datalog, to study the foundations of querying JSON data. The main feature of our approach, which we call J-Logic, is the emphasis on paths. Paths are sequences of keys and are used to access the tree structure of nested JSON objects. J-Logic also features \"packing\" as a means to generate a new key from a path or subpath. J-Logic with recursion is computationally complete, but many queries can be expressed without recursion, such as deep equality. We give a necessary condition for queries to be expressible without recursion. Most of our results focus on the deterministic nature of JSON objects as partial functions from keys to values. Predicates defined by J-Logic programs may not properly describe objects, however. Nevertheless we show that every object-to-object transformation in J-Logic can be defined using only objects in intermediate results. Moreover we show that it is decidable whether a positive, nonrecursive J-Logic program always returns an object when given objects as inputs. Regarding packing, we show that packing is unnecessary if the output does not require new keys. Finally, we show the decidability of query containment for positive, nonrecursive J-Logic programs.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3034786.3056106"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/022c3fa7794ba53e2d275a7e985f48cd0ee0ed7e",
"sources": [
"DBLP"
],
"title": "J-Logic: Logical Foundations for JSON Querying",
"venue": "PODS",
"year": 2017
},
"026884b69b3d44c60312d339012e9733d4d631a7": {
"authors": [
{
"ids": [
"35064164"
],
"name": "Talia Ringer"
},
{
"ids": [
"8319903"
],
"name": "Dan Grossman"
},
{
"ids": [
"2832255"
],
"name": "Daniel Schwartz-Narbonne"
},
{
"ids": [
"1797515"
],
"name": "Serdar Tasiran"
}
],
"doi": "10.1145/3133915",
"doiUrl": "https://doi.org/10.1145/3133915",
"entities": [
"Constraint programming",
"Domain-specific language",
"Programmer",
"Random testing",
"Recursion",
"Software bug",
"String (computer science)",
"String generation",
"Test automation"
],
"id": "026884b69b3d44c60312d339012e9733d4d631a7",
"inCitations": [],
"journalName": "PACMPL",
"journalPages": "91:1-91:24",
"journalVolume": "1",
"outCitations": [
"120fcc709955b62fa70807147909be6fa93d9a20",
"1f7e5e582663868ed2f6763f98066ca278177a61",
"34db94bb4e84c9b8ab8a06da82932c24bebdf127",
"4f789439fe5a121e6f47453d8a95ec733baca537",
"decb7c40e12fb4e20f04b2b514704575e4481ff8",
"8ea3d1cf91d2e5fc6f2e5220500e52f4ed9e6689",
"2652e1188e0826572adfd5759d85faa9f39b914e",
"05f0c383c785f168da8e80c903517ec5fdf71d41",
"d99c7937923450664a819cdd2efee7ba698000a4",
"6106f4d972cfd2123621694908442c2eb705cc11",
"a05e223169ab022f800bf9f2664847919844cab9",
"155759e41a8e5b145c78fcc6f53bb60423b5a9cf",
"9171b5d4349fa8a73f846343bdfd978034ba0207",
"1eb890680e4b451117d05c7223cded3fb13812ea",
"464ae8ff0a6cba171fe596d6088969129fb907c4",
"216b98bb3d9221d5f5d261864975612e4d0faaa6"
],
"paperAbstract": "Developing a small but useful set of inputs for tests is challenging. We show that a domain-specific language backed by a constraint solver can help the programmer with this process. The solver can generate a set of test inputs and guarantee that each input is different from other inputs in a way that is useful for testing. \nThis paper presents Iorek: a tool that empowers the programmer with the ability to express to any SMT solver what it means for inputs to be different. The core of Iorek is a rich language for constraining the set of inputs, which includes a novel bounded enumeration mechanism that makes it easy to define and encode a flexible notion of difference over a recursive structure. We demonstrate the flexibility of this mechanism for generating strings. \nWe use Iorek to test real services and find that it is effective at finding bugs. We also build Iorek into a random testing tool and show that it increases coverage.",
"pdfUrls": [
"https://homes.cs.washington.edu/~djg/papers/iorekpaper.pdf",
"http://doi.acm.org/10.1145/3133915"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/026884b69b3d44c60312d339012e9733d4d631a7",
"sources": [
"DBLP"
],
"title": "A solver-aided language for test input generation",
"venue": "PACMPL",
"year": 2017
},
"02700e7e0cdc291e55af704530e181e0da668c1e": {
"authors": [
{
"ids": [
"40026298"
],
"name": "Xin Liang"
},
{
"ids": [
"2506582"
],
"name": "Jieyang Chen"
},
{
"ids": [
"3058378"
],
"name": "Dingwen Tao"
},
{
"ids": [
"3450082"
],
"name": "Sihuan Li"
},
{
"ids": [
"39559311"
],
"name": "Panruo Wu"
},
{
"ids": [
"30299336"
],
"name": "Hongbo Li"
},
{
"ids": [
"9547335"
],
"name": "Kaiming Ouyang"
},
{
"ids": [
"28300153"
],
"name": "Yuanlai Liu"
},
{
"ids": [
"2495855"
],
"name": "Fengguang Song"
},
{
"ids": [
"1756221"
],
"name": "Zizhong Chen"
}
],
"doi": "10.1145/3126908.3126915",
"doiUrl": "https://doi.org/10.1145/3126908.3126915",
"entities": [
"Algorithm",
"Computation",
"FFTW",
"Fast Fourier transform",
"Fastest",
"Fault coverage",
"Fault tolerance",
"Numerical stability",
"Overhead (computing)",
"Soft error"
],
"id": "02700e7e0cdc291e55af704530e181e0da668c1e",
"inCitations": [],
"journalName": "",
"journalPages": "30:1-30:12",
"journalVolume": "",
"outCitations": [
"f8e9b050c93af6dea582563f61b6460b590bc3af",
"729d8aef78a6166e2df15903e9ba3d6ff366417d",
"38884b89254d5ac26cc437dfdd1c5512d0cdf9bd",
"42452be4c840abd3a4a0fa49c4b8d4aeeb3f2f6e",
"5d5ac7167bc5f834173aa4c63821916a1bdf487a",
"1ad1ff28c41c036aed259bd4af1e5c1c42cdc5c7",
"14a0ac48029d823a5aa7e81228af5237395ca2d8",
"79c0062e0eae09d6715054fe7fc46d4164443aba",
"91181ab9d0faf27a996a37fe266c725a0eacea67",
"b295a2e3667b52b900950417c2e9b58b01938f34",
"1c20521112e3bf937e756a28061ad4887f4ad720",
"14e5bbf94dba58ead368cceab1541cff7cbb0170",
"39ef5d362200126497b2f74c33338383dcc9589c",
"450f66cd38a37201759384b33493798d2a82b9f6",
"4ed3a2853506e9ac40d0907f6597da492995b17f",
"02e1fe87b8c30a9d32647c088f97520afa8de181",
"ba6f0ca75f965bc2eca7b4e3850b7394f7f60c3e",
"18992850afed53b60ce696e20374a1e1b3d9da22",
"87a8a7d48205aa864b1269cedf6a39925a3c24f8",
"7027eb880ee4d5a1f71bfc861bb36ae980f781fc",
"920ce1f5e69d34c531ad14bb77b524c100d4a8c2",
"6b8c72e71697d1b680765e227232574ed289eb34",
"4832d118efdf3d9399027bb90082eff1bd8b4abc",
"36480300b1e382c062b78c6bd610d1879efd950e",
"3e99a917b9a4e89497541bbc3bb72079054644c6",
"4d931c6f2b099283552982bb745e5974a67fd8f0",
"73c9a5beceea745330d7e9d952d13233389c453d",
"62ffeb055fb0499a38732bc33193a2ef3b4e1523",
"5c0e8af36e20b8ea213561e8c3d706b4e2f2cc8d",
"ced080a28e76531421c030ddc524780f3236af6f",
"414b0fb3e72689d2148798e15f4df35b5baa62fd",
"ff9e73f9fb2d87b8e65772e447bbf93c5aa0b3e3",
"a2f99528a2dd954f38f6e0bd42b686c165f23403",
"8909b00de4f855eeafc2a09082ee340493818e2d",
"60e90ece1fb2ce7bffedfa2ea4321162c5d9311b"
],
"paperAbstract": "While many algorithm-based fault tolerance (ABFT) schemes have been proposed to detect soft errors offline in the fast Fourier transform (FFT) after computation finishes, none of the existing ABFT schemes detect soft errors online before the computation finishes. This paper presents an online ABFT scheme for FFT so that soft errors can be detected online and the corrupted computation can be terminated in a much more timely manner. We also extend our scheme to tolerate both arithmetic errors and memory errors, develop strategies to reduce its fault tolerance overhead and improve its numerical stability and fault coverage, and finally incorporate it into the widely used FFTW library - one of the today's fastest FFT software implementations. Experimental results demonstrate that: (1) the proposed online ABFT scheme introduces much lower overhead than the existing offline ABFT schemes; (2) it detects errors in a much more timely manner; and (3) it also has higher numerical stability and better fault coverage.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3126908.3126915"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/02700e7e0cdc291e55af704530e181e0da668c1e",
"sources": [
"DBLP"
],
"title": "Correcting soft errors online in fast fourier transform",
"venue": "SC",
"year": 2017
},
"027158a5050a09a0f66188372e2eb1584215fac5": {
"authors": [
{
"ids": [
"3460027"
],
"name": "Yuanshun Yao"
},
{
"ids": [
"3359577"
],
"name": "Zhujun Xiao"
},
{
"ids": [
"2081795"
],
"name": "Bolun Wang"
},
{
"ids": [
"34824488"
],
"name": "Bimal Viswanath"
},
{
"ids": [
"2704852"
],
"name": "Haitao Zheng"
},
{
"ids": [
"1972108"
],
"name": "Ben Y. Zhao"
}
],
"doi": "10.1145/3131365.3131372",
"doiUrl": "https://doi.org/10.1145/3131365.3131372",
"entities": [
"Approximation algorithm",
"Centralisation",
"Feature selection",
"Library",
"Machine learning",
"Network analysis (electrical circuits)",
"Server-side",
"Turnkey",
"User interface"
],
"id": "027158a5050a09a0f66188372e2eb1584215fac5",
"inCitations": [
"83aaf61e91053745e667427d2132527b8a05ef8a"
],
"journalName": "",
"journalPages": "384-397",
"journalVolume": "",
"outCitations": [
"1375c722eee6e58041f9e295042d42e43ac3428c",
"595a00f0975b5d5c28d904ddba1ae5a493316573",
"1fa82596e6e14a082db1413f746605d513e6245e",
"9d42bac176ed5e213afec867f4c04dfe8c201adc",
"9b9607b78ca1896738ec1fbf0633032bc74fbec2",
"2e8f90db603b3a1c2845cc59435d6886fe15abf2",
"acbd73b27937fb53077e89398a8e422c35221779",
"217135d666e8349ba6d7312a37bd1dd166c098ec",
"171ddad7a5ed834ff7313bb614de2f44924ebeb4",
"2a918ea62cf910c6f9548b8baf6b53f34ba879c3",
"011d53f4255899b654d3bd53089fa3eff7cdac08",
"381f43ee885b78ec2b2264c915135e19b7dde8b6",
"929bb4e2e474d7bb4338a82cc708c7b9794567da",
"9f2aefc3821853e963beda011ed770f740385b77",
"36df8d7a778489d565715f273b82ea82acb71b2f",
"21874a977ce807b7d93ace4220b31b2ace6d0d91",
"d91ae788cdf5cf6191ca23b5c38d8dc988503886",
"1d4d86edb87d775739786664db6ac3830a009e0e",
"3b70bb6c268ccd190cc487fede8dce7b076469f9",
"22bc7549801fd359f932bbdc11b8ca24b87baadf",
"04e8dac83e50b0b4a32c9878ddba04446fc6a3f4",
"27db63ab642d9c27601a9311d65b63e2d2d26744",
"0468532d28499ef38287afd7557dd62b802ee85b",
"7fe7e80bf59a112386211b38ef2ea0b71ae76345",
"e25a07384dee2ce73e8426b7f3bff4a38eb7bf5b",
"210b3ccdc5d43ff218f894695a6ee8f1ff71a32f",
"0a248f46e08497f632cb80e0c362ed45e7f317c6",
"3653266b5427295bdd54d6a22bf4caaa8c0b6961",
"4087af703566b50037ea3a68e2514cdd53282e8d",
"38171ef0443ef60c78a861838eccd24f004c22b2",
"7b550425afe75edbfe7058ea4075cbf7a82c98a8",
"2f9bb353e06dd0cafa7e287f9b9415c22878645a",
"3342e60cb8647838fae0765e02fbb77a01df030e",
"199e2a48f36b56f011ba4542721dc47e1b9078aa",
"03d88407c702b6dffaae48b3d55ee716bcaffb8d",
"3fd276e42268111373cc5d669b4d8175c3fe2420",
"0e67bac2937f5f53f310564efa547efd82c0371d",
"d44bb000915594cba0129315d855c28497738319",
"d62813d30199431a44d0b72b41aa1b8ed76117e5",
"1848bf446496df8bce6222d322422fab4e23e94e",
"46f45109ba90ce7ac6068e9c27097949dc3e1c4d",
"04f04c43ed1ed5bfa0706ed087277ef83de7e175",
"24f95cc73758d870706fe8ab590d477b9dd2b791",
"02df5e428a759091ffb9b3eb3f6542e0efab79b0",
"22ba0d428dc3935bb466ef5ae6414473b86327b0",
"1ed982c3846d8ceed3a4bb105bb2dcd5b147ace3",
"052b1d8ce63b07fec3de9dbb583772d860b7c769",
"6f325db30d5b039727715df8ee7f9f37e845c927",
"17c73776942309d8c406df5be6f7dcc17dd90410",
"12e433f6ee70d3037e6eec58ff3f0e61b3d65fa1",
"26f58c28de7469dc6b6846d37953bbbe3f4fc0e9",
"37092f9c79cb6220fd6f01882e9e3c1b41d0750e",
"1c732afc3c057e1ef8cefd22097a14d60d779322",
"89b1b3f9af27fed6ebf9bd8afec6f1cfc7c155de",
"5881189bdcba6907f2e7f7dbb3143ffbab8c5e90",
"ae2d852535803d8b9fb7e9f8aeed0c674b801e15",
"117d089d8eea767e72d5bb800ba4d6e0e15dad93",
"ecffa2745a78d1cffbea3d6b9af3d74131be704f",
"29b88ce334514dcd88efd83476678fb3b42a7bf9",
"d8c71b0710e725cad12e5fc44f5230213f075e46",
"2c47bd8bd699914e3535292b17ba46542800845c",
"334ade0d31485c59cca29018d6baeef8ccf20f05",
"48caac2f65bce47f6d27400ae4f60d8395cec2f3",
"47aa3758c0ac35bfb2a3d2bbeff1e0ac28e623c2",
"9be7e7579fbec5d45e3e6ea1c4465258225a183d",
"29d880dfd7f39b1a91d5f6a66e2a3170b8f62703",
"0363d348cbfba2be71ff95cebcdc9119d4a0183d",
"260368e4b7ddef442bb5c197078e200b3c0ab7b1",
"ea57e9e2d557fa6e944b69bbe4420ef61c122e4c",
"1542da2cf7c4925917d922fc6b317a962afb5dba",
"2ec2352d4009f3953d3322c8b7aaa9f6c8777043",
"02bc27c39eaaa6b85d336be81b15ca19f112a950"
],
"paperAbstract": "Machine learning classifiers are basic research tools used in numerous types of network analysis and modeling. To reduce the need for domain expertise and costs of running local ML classifiers, network researchers can instead rely on centralized Machine Learning as a Service (MLaaS) platforms.\n In this paper, we evaluate the effectiveness of MLaaS systems ranging from fully-automated, turnkey systems to fully-customizable systems, and find that with more user control comes greater risk. Good decisions produce even higher performance, and poor decisions result in harsher performance penalties. We also find that server side optimizations help fully-automated systems outperform default settings on competitors, but still lag far behind well-tuned MLaaS systems which compare favorably to standalone ML libraries. Finally, we find classifier choice is the dominating factor in determining model performance, and that users can approximate the performance of an optimal classifier choice by experimenting with a small subset of random classifiers. While network researchers should approach MLaaS systems with caution, they can achieve results comparable to standalone classifiers if they have sufficient insight into key decisions like classifiers and feature selection.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3131365.3131372",
"https://conferences.sigcomm.org/imc/2017/slides/imc-pdf.pdf",
"https://conferences.sigcomm.org/imc/2017/papers/imc17-final51.pdf",
"http://www.cs.ucsb.edu/~bolunwang/docs/mlaas-imc17.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/027158a5050a09a0f66188372e2eb1584215fac5",
"sources": [
"DBLP"
],
"title": "Complexity vs. performance: empirical analysis of machine learning as a service",
"venue": "IMC",
"year": 2017
},
"027188ede13c9f29bea0710921f7c341f045a75b": {
"authors": [
{
"ids": [
"2061911"
],
"name": "Juan Jos\u00e9 Fumero"
},
{
"ids": [
"1795890"
],
"name": "Michel Steuwer"
},
{
"ids": [
"6503919"
],
"name": "Lukas Stadler"
},
{
"ids": [
"3224333"
],
"name": "Christophe Dubach"
}
],
"doi": "10.1145/3050748.3050761",
"doiUrl": "https://doi.org/10.1145/3050748.3050761",
"entities": [
"Big data",
"Central processing unit",
"Computation",
"Graphics processing unit",
"Heterogeneous computing",
"High- and low-level",
"Just-in-time compilation",
"Library (computing)",
"Low-level programming language",
"Manycore processor",
"OpenCL API",
"Partial evaluation",
"Profiling (information science)",
"Programmer",
"Programming language",
"R language",
"Run time (program lifecycle phase)",
"Uptime"
],
"id": "027188ede13c9f29bea0710921f7c341f045a75b",
"inCitations": [
"fc43b21e3582dee88e364a6dff2441ad366c43f5",
"55c143f5b991501a09a644ab0f39c05951ae4754"
],
"journalName": "",
"journalPages": "60-73",
"journalVolume": "",
"outCitations": [
"d4defe055ddaf9d84e453598ad75529709c64b70",
"5231091fd9fe75115bedf967fa8ed95810ae6ae3",
"3e129f0194279d49056c737e0caa97af25a5f1aa",
"642da427e4fc7a0d62e239c561cc28821c341d50",
"a1be5e4b91ee22100ac946c007d71266a4399502",
"8d19166630b77df25624ba64cfa5dbdc6cd9aba8",
"7e007883306b2d0b8da57ed608f5441dcc30a3e2",
"9ad48bd155815ad662e10e1228557d9ec9846828",
"1850ceb5376a4a14a7d77031789ef3ccb4f87e93",
"14505c2bdd3822d7a62385121d28ba3eb36fea1d",
"4a088b3ef14d19448e77008f852f2e9805ffc1ea",
"2fa4722b81b63c4973ecc7a327f4c827f34d2c5e",
"1f7ad334ee1b933fcd2917f97a1b2eb97c8e44c2",
"a3e88aa2505c1f4e7f176b1afa467c60fd30bdac",
"74a271cc13ccbdb1842f56ddb6faa144046e84d3",
"5d5e1b35dcfbf52299c327baab696568ba0e1d15",
"c17ac40f0fb475c810c70a52b3dd6535454eabf4",
"0f58afdae0b5d40a599d685c81c83f33586c671a",
"26b612d9c0f3c1b88394ebf299a450e73594b5dc",
"53e2b31ad6fea91655ecbe64fe66968b934d0160",
"7521513abd7acae00b3fd89001da47019606cf38"
],
"paperAbstract": "Computer systems are increasingly featuring powerful parallel devices with the advent of many-core CPUs and GPUs. This offers the opportunity to solve computationally-intensive problems at a fraction of the time traditional CPUs need. However, exploiting heterogeneous hardware requires the use of low-level programming language approaches such as OpenCL, which is incredibly challenging, even for advanced programmers.\n On the application side, interpreted dynamic languages are increasingly becoming popular in many domains due to their simplicity, expressiveness and flexibility. However, this creates a wide gap between the high-level abstractions offered to programmers and the low-level hardware-specific interface. Currently, programmers must rely on high performance libraries or they are forced to write parts of their application in a low-level language like OpenCL. Ideally, nonexpert programmers should be able to exploit heterogeneous hardware directly from their interpreted dynamic languages.\n In this paper, we present a technique to transparently and automatically offload computations from interpreted dynamic languages to heterogeneous devices. Using just-in-time compilation, we automatically generate OpenCL code at runtime which is specialized to the actual observed data types using profiling information. We demonstrate our technique using R, which is a popular interpreted dynamic language predominately used in big data analytic. Our experimental results show the execution on a GPU yields speedups of over 150x compared to the sequential FastR implementation and the obtained performance is competitive with manually written GPU code. We also show that when taking into account start-up time, large speedups are achievable, even when the applications run for as little as a few seconds.",
"pdfUrls": [
"http://www.research.ed.ac.uk/portal/files/33009999/vee.pdf",
"http://doi.acm.org/10.1145/3050748.3050761",
"http://eprints.gla.ac.uk/146598/7/146598.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/027188ede13c9f29bea0710921f7c341f045a75b",
"sources": [
"DBLP"
],
"title": "Just-In-Time GPU Compilation for Interpreted Languages with Partial Evaluation",
"venue": "VEE",
"year": 2017
},
"02904a446013931f3f3cd972c177dfcf841d6e16": {
"authors": [
{
"ids": [
"1914988"
],
"name": "Yi Su"
},
{
"ids": [
"1718546"
],
"name": "Dan Feng"
},
{
"ids": [
"40172713"
],
"name": "Yu Hua"
},
{
"ids": [
"7947698"
],
"name": "Zhan Shi"
}
],
"doi": "10.1109/ICPP.2017.33",
"doiUrl": "https://doi.org/10.1109/ICPP.2017.33",
"entities": [
"Baseline (configuration management)",
"Cloud computing",
"Computer data storage",
"Event-driven programming",
"Experience",
"Object storage",
"Programming model",
"Service-level agreement"
],
"id": "02904a446013931f3f3cd972c177dfcf841d6e16",
"inCitations": [],
"journalName": "2017 46th International Conference on Parallel Processing (ICPP)",
"journalPages": "241-250",
"journalVolume": "",
"outCitations": [
"1c7d0f188a8033d8a14ab3ae30662f7e85fa65b6",
"00919d778377ec8e4e037d8ebafc76c9de52db4b",
"045943438dd45f25f0127d97ed9116b3b05914a7",
"806cb3df830e5f58fad7460904c898065cd9357f",
"329eec581160cf7c3f651196bae9e702c1e8647b",
"5ae87dedd95dd5dda85012e1a8f6ebdfb7e575d0",
"3168681722207c86827e596860115a2977ce761f",
"61c2571f6029aba65ec6288881211797c27d5ecc",
"19488ad6103c678a7f5d7a5a149cdbac4663a366",
"c35c524070b829b2e34dc3b952d950e400181430",
"5b97d28248f13ce6ae1a565e6ea06415def1c4c7",
"848fa1f48ad9d3edb24b05667f15cfc633eb8f69",
"e2576ac7fad7a371b0db58c2837a887869f797bc",
"1b3e102739030bd2bdfbd3a02eabba81419ccb8f",
"00fad2ef73cf6841c88b8f76957d382ab9cc88f4",
"8060b97fb8c05ada26afd31e237aa1b3dba4dd39",
"938dd91b211c46e91ae309154fa810f4bef933d2",
"db540eec873ede30f0db6377fe4bf799c17a4fc5",
"09d1a6f5a50a8c3e066fb05a8833bc00663ada0e",
"9c0f244c4fd365f64d15755ed54b92e6dc2d99c6",
"396514fb219879a4a18762cddfae2a6a607f439f",
"55b5f88ba09e4f2f53aec5418835f2a6498cd289"
],
"paperAbstract": "As a fundamental cloud service for modern Web applications, the cloud object storage system stores and retrieves millions or even billions of read-heavy data objects. Serving for a massive amount of requests each day makes the response latency be a vital component of user experiences. Due to the lack of suitable understanding on the response latency distribution, current practice is to use overprovision resources to meet Service Level Agreement (SLA). Hence we build a performance model for the cloud object storage system to predict the percentiles of requests meeting SLA (response latency requirement), in the context of complicated disk operations and event-driven programming model. Furthermore, we find that the waiting time for being accept()-ed at storage servers may introduce significant delay. And we quantify the impacts on system response latency, due to requests waiting for being accept()-ed. In a variety of scenarios, our model reduces the prediction errors by up to 73% compared to baseline models, and the prediction error of our model is 4.44% on average.",
"pdfUrls": [
"http://doi.ieeecomputersociety.org/10.1109/ICPP.2017.33"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/02904a446013931f3f3cd972c177dfcf841d6e16",
"sources": [
"DBLP"
],
"title": "Predicting Response Latency Percentiles for Cloud Object Storage Systems",
"venue": "2017 46th International Conference on Parallel Processing (ICPP)",
"year": 2017
},
"02b045984643113792882d30f28c2245cfbcf0e6": {
"authors": [
{
"ids": [
"1773557"
],
"name": "Omer Subasi"
},
{
"ids": [
"3139819"
],
"name": "Gulay Yalcin"
},
{
"ids": [
"1777868"
],
"name": "Ferad Zyulkyarov"
},
{
"ids": [
"3309458"
],
"name": "Osman S. Unsal"
},
{
"ids": [
"1699563"
],
"name": "Jes\u00fas Labarta"
}
],
"doi": "",
"doiUrl": "",
"entities": [
"Algorithm",
"Distributed computing",
"Fail-stop",
"Fault tolerance"
],
"id": "02b045984643113792882d30f28c2245cfbcf0e6",
"inCitations": [
"8abe342812ee5025755d680977383e4bdf8d6703",
"24f827feddc105dad5659e32ca15ef91ac3b8061",
"a07d0a5f997161adb395a2ed718bf62d4d3106cd"
],
"journalName": "2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)",
"journalPages": "452-457",
"journalVolume": "",
"outCitations": [
"4b2e1b0edbaa3d6d6bf059b89108cadfcbdf5c7b",
"39ef5d362200126497b2f74c33338383dcc9589c",
"4b434f94fafc3ffc76e0c440897ccd222eaa38ac",
"ddfe7c78115c3a610c0ad64691791ce463162282",
"01e499b6cf6b89babe390503e30e20d6628ddc39",
"7c62c7e0b4e026f6b5b027735c99cbf033789ba9",
"18fe996c6f43a8f301cd842507045b679ba3506a",
"1d500b9788ad9608ec3c584c0a22059bbdb0ac9a",
"b35585217d340b78f7a7c1fe7079429ac36fc229",
"243c2d9ce406d82ec24d69e7c473fb99392ebdb6",
"01d62cd850496455ce1616500f491690effa5c98",
"88412b002ee39eb121d93c0a2c11ddbb658e9d6b",
"983eb4473a7de0f7497a5047941c0808fdaf18a8",
"f1eaaccfc03e06c9ea5ec99162c7a6a118eea155",
"0eacd1b47786f740b723d906d46e160f143c0378",
"5ee6d6523a8e7b0fae7539503854a8d3659f126c",
"a5de222d68cbd3ab5dd509744e3a63f2073d734b"
],
"paperAbstract": "Fail-stop errors and Silent Data Corruptions (SDCs) are the most common failure modes for High Performance Computing (HPC) applications. There are studies that address fail-stop errors and studies that address SDCs. However few studies address both types of errors together. In this paper we propose a software-based selective replication technique for HPC applications for both fail-stop errors and SDCs. Since complete replication of applications can be costly in terms of resources, we develop a runtime-based technique for selective replication. Selective replication provides an opportunity to meet HPC reliability targets while decreasing resource costs. Our technique is low-overhead, automatic and completely transparent to the user.",
"pdfUrls": [
"http://dl.acm.org/citation.cfm?id=3101173",
"http://upcommons.upc.edu/bitstream/handle/2117/107497/Designing+and+Modelling.pdf;jsessionid=6D34CF994F2443B75097CD6E43D70142?sequence=3"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/02b045984643113792882d30f28c2245cfbcf0e6",
"sources": [
"DBLP"
],
"title": "Designing and Modelling Selective Replication for Fault-Tolerant HPC Applications",
"venue": "2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)",
"year": 2017
},
"02d5ee5a61cd68cf47ad71a4dd9ae889149a2553": {
"authors": [
{
"ids": [
"1968460"
],
"name": "Min Du"
},
{
"ids": [
"3245752"
],
"name": "Feifei Li"
},
{
"ids": [
"2615075"
],
"name": "Guineng Zheng"
},
{
"ids": [
"3052879"
],
"name": "Vivek Srikumar"
}
],
"doi": "10.1145/3133956.3134015",
"doiUrl": "https://doi.org/10.1145/3133956.3134015",
"entities": [
"Anomaly detection",
"Artificial neural network",
"Data mining",
"Deep learning",
"Failure rate",
"Information source",
"Long short-term memory",
"Natural language",
"Network model",
"Software bug"
],
"id": "02d5ee5a61cd68cf47ad71a4dd9ae889149a2553",
"inCitations": [
"7aaa159e2b762e94da000a1515c2b1cc9b6afa50"
],
"journalName": "",
"journalPages": "1285-1298",
"journalVolume": "",
"outCitations": [
"188e1d54d2c73b0b83e543d9183ec4c413625622",
"b4622086651fcc6e9b4bf87d918668f7579d5954",
"06fd7d924d499fbc62ccbcc2e458fb6c187bcf6f",
"27211ed68a7a00f1df0121fa1890a1b2acdd1a88",
"19d78d8c072b60294792c523742a8609accf3890",
"8de8a4b5193200d332aa4c86956bffbdac758194",
"49e8721bd4821eff0f147d73bea970f2de3aab8a",
"5ba262cc2173e4201df2406cde8c9e1078db7841",
"0da0ce23fccc1b2b84d633526a34bc4b6f2c5679",
"154728875d4668065ca6ba9fa2f5d2a1bcfc4a6e",
"12d4c92f0a3a70538ed609bf6f7b603e44d11abd",
"996ce6a529c3d7652a304ca05bf9d32d3db44e95",
"68bcc7b233ca3ef6b1f6d751c3325e301ebaf2ee",
"8681fa540b786a1858a3d429c0fbcaf3aeeb52ee",
"87bb5be2e9336938450e340e3e24e20f2ef79adf",
"c368e5f5d6390ecd6b431f3b535c707ea8b21993",
"68aeb92287ede815e480c8becc6385f99f20b29a",
"3edfc29b8a4f4fb1e245087cd1c59498f2255fe8",
"6e558f2929ba8d95d55adad44ba89e62762270a0",
"9826daa08e5e4d73a1878fd3383e37472064f23f",
"067bd9d975b132dc668013895a5e4298623feebd",
"233b43f13c17fc5c45d6dd67a46a18d5e7d95d57",
"852094207ef6083d807a5215028e46e50685acbb",
"46166919007b237d1fafb93adb5dd6d288bac84d",
"095aed5a23cb1c807bbc9ffa40d1ae82c6685d43",
"14c5c9f9bb24cb433e156ba8a30a879d84ed49d8",
"1aec04aa64f165bb075cc4ce6ad79d36c89d62b6",
"4aa9f5150b46320f534de4747a2dd0cd7f3fe292",
"03d88407c702b6dffaae48b3d55ee716bcaffb8d",
"47a87c2cbdd928bb081974d308b3d9cf678d257e",
"2c1ed7e32a85d72fb270ebd07a45641acfba02a9",
"7260363c8b9a3e9d8f0b560c67cc49619bf06e56",
"95193d2c016f1ee266b1dbf714678ce6bb1bb2ea",
"350a4b5cecfffb6a0e88c349b84e56df8829da44",
"2ca6f673bfb1e218e8a97763becf2a4a5cf195ae",
"43cf32ba6dad06247bfd6d4869c523e364e43eb3"
],
"paperAbstract": "Anomaly detection is a critical step towards building a secure and trustworthy system. The primary purpose of a system log is to record system states and significant events at various critical points to help debug system failures and perform root cause analysis. Such log data is universally available in nearly all computer systems. Log data is an important and valuable resource for understanding system status and performance issues; therefore, the various system logs are naturally excellent source of information for online monitoring and anomaly detection. We propose DeepLog, a deep neural network model utilizing Long Short-Term Memory (LSTM), to model a system log as a natural language sequence. This allows DeepLog to automatically learn log patterns from normal execution, and detect anomalies when log patterns deviate from the model trained from log data under normal execution. In addition, we demonstrate how to incrementally update the DeepLog model in an online fashion so that it can adapt to new log patterns over time. Furthermore, DeepLog constructs workflows from the underlying system log so that once an anomaly is detected, users can diagnose the detected anomaly and perform root cause analysis effectively. Extensive experimental evaluations over large log data have shown that DeepLog has outperformed other existing log-based anomaly detection methods based on traditional data mining methodologies.",
"pdfUrls": [
"http://www.cs.utah.edu/~lifeifei/papers/dl_ccs.pdf",
"http://doi.acm.org/10.1145/3133956.3134015",
"http://www.flux.utah.edu/download?uid=261",
"http://www.cs.utah.edu/~mind/papers/deepLog_poster.pdf",
"https://people.engr.ncsu.edu/gjin2/Classes/591/Spring2018/deepLog.pdf",
"http://www.cs.utah.edu/~mind/papers/deepLog.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/02d5ee5a61cd68cf47ad71a4dd9ae889149a2553",
"sources": [
"DBLP"
],
"title": "DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning",
"venue": "CCS",
"year": 2017
},
"02e0f4e418638f3edfa037b1aed46c432ab3ac4f": {
"authors": [
{
"ids": [
"3339930"
],
"name": "Maomeng Su"
},
{
"ids": [
"4408986"
],
"name": "Mingxing Zhang"
},
{
"ids": [
"1680073"
],
"name": "Kang Chen"
},
{
"ids": [
"1850900"
],
"name": "Zhenyu Guo"
},
{
"ids": [
"1725574"
],
"name": "Yongwei Wu"
}
],
"doi": "10.1145/3064176.3064189",
"doiUrl": "https://doi.org/10.1145/3064176.3064189",
"entities": [
"Attribute\u2013value pair",
"Data center",
"Data structure",
"Direct memory access",
"In-memory database",
"Key-value database",
"Programming paradigm",
"Remote direct memory access",
"Remote procedure call",
"Request for proposal",
"Server (computing)",
"USB flash drive"
],
"id": "02e0f4e418638f3edfa037b1aed46c432ab3ac4f",
"inCitations": [
"2dc3d8536a8fa4660c6e842ef17c2d1553fceea6"
],
"journalName": "",
"journalPages": "1-15",
"journalVolume": "",
"outCitations": [
"0e6b0665e0fc3c0c152885869f6c0d339aba06a1",
"1dd353938063795c06ef21d8b0b3ef3b45a2fdc1",
"1594118f2696b573f08510cf837f3b37db87face",
"514a5c15e8cf3f681febecad954a4508d9189c99",
"3cc2336cb701ab40273d0b5603064a70a209b4c6",
"4ab775b9811a8b9f0ff24fa06b535986149e51e3",
"d842578a10648c9cb1a7e87bd1f8de30246d5a51",
"28f13ebe8e17fdb4c2500c515759a3ee0c2783ce",
"ef9d9821df55442f039b128bb5cef2b41ab2cadc",
"5f948207acb92e6f4e09aa5f5a2cf7cdf2d80ba5",
"29a1148d75878671dc3663bf480e33d7bd91597d",
"898634f0e693cb521ad2dd4a7432c11381e6df60",
"0401a8c1feeb489f3fa011fe50e00e91a8fd7903",
"408b8d34b7467c0b25b27fdafa77ee241ce7f4c4",
"3cb34f7a770836bcfeef28f844d670b8a014ffa8",
"8318fa48ed23f9e8b9909385d3560f029c623171",
"3702d6e0c78050f3261fdbf0eb1aefbac59fb8cf",
"66ede69aec0e37e0851464076e1719cd8036998e",
"b4087345c63a7b2412eeb31066b5e4bceadbbcb2",
"0276440f721b17ff77165f2b1ed24e029b9a2432",
"10ca6fc3a9adf282073defda372355bfd668b31e",
"daf0cd0076b388712ea12ec4105572997fc50cdf",
"433207f45ac2c9dbe3876ab53af28ed569e94da9",
"12078fd9bee79fd2e9fae055c4cc33db382272af",
"2ab305079385594badd4233ebb9512d52ecaccfb",
"205cf007cf77bbf81e55b74635017087585f7b7c",
"184687c92c6890743a663a7cdb0216d04f8e9fbf",
"01094798b20e96e1d029d6874577167f2214c7b6",
"9aa0d7253574e50fe3a190ccd924433f048997dd",
"21474d50689bb4b4af6399c4bae2cb612f382713",
"742c641506ac9efc3281af2effb31f2fb31b2dd4"
],
"paperAbstract": "Remote Direct Memory Access (RDMA) has been widely deployed in modern data centers. However, existing usages of RDMA lead to a dilemma between performance and redesign cost. They either directly replace socket-based send/receive primitives with the corresponding RDMA counterpart (server-reply), which only achieves moderate performance improvement; or push performance further by using one-sided RDMA operations to totally bypass the server (server-bypass), at the cost of redesigning the software.\n In this paper, we introduce two interesting observations about RDMA. First, RDMA has asymmetric performance characteristics, which can be used to improve server-reply's performance. Second, the performance of server-bypass is not as good as expected in many cases, because more rounds of RDMA may be needed if the server is totally bypassed. We therefore introduce a new RDMA paradigm called Remote Fetching Paradigm (RFP). Although RFP requires users to set several parameters to achieve the best performance, it supports the legacy RPC interfaces and hence avoids the need of redesigning application-specific data structures. Moreover, with proper parameters, it can achieve even higher IOPS than that of the previous paradigms.\n We have designed and implemented an in-memory key-value store based on RFP to evaluate its effectiveness. Experimental results show that RFP improves performance by 1.6×~4× compared with both server-reply and server-bypass paradigms.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3064176.3064189"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/02e0f4e418638f3edfa037b1aed46c432ab3ac4f",
"sources": [
"DBLP"
],
"title": "RFP: When RPC is Faster than Server-Bypass with RDMA",
"venue": "EuroSys",
"year": 2017
},
"02e770fe56cc33834c8e81e35ed39074471997f7": {
"authors": [
{
"ids": [
"2142614"
],
"name": "Xinyu Wang"
},
{
"ids": [
"1714075"
],
"name": "Isil Dillig"
},
{
"ids": [
"37493633"
],
"name": "Rishabh Singh"
}
],
"doi": "10.1145/3133886",
"doiUrl": "https://doi.org/10.1145/3133886",
"entities": [
"Algorithm",
"Computation",
"Data science",
"Database",
"Digital subscriber line",
"Domain-specific language",
"Fault tree analysis",
"Missing data",
"Relational database",
"Sketch",
"Spreadsheet",
"Table (information)",
"Tree automaton",
"Version space learning"
],
"id": "02e770fe56cc33834c8e81e35ed39074471997f7",
"inCitations": [
"791714728fefcb067fb6b56c7f4de093d536cf00",
"33de4502da805dd10769d2412fd04ba5ad7867f7"
],
"journalName": "PACMPL",
"journalPages": "62:1-62:26",
"journalVolume": "1",
"outCitations": [
"54ed970d56ce4343a3d3fa29fb6080572255f26d",
"2eda52d7a1723df6eee46d69496fd576e5787575",
"426a2eb44a8f947edf9a92288e80fd0d6b515de2",
"05c8103e1b77437875a4c69c6258be988ab2946b",
"74da2a29ffef4636e581a777dcddaa44e2bf069f",
"49d5f1340aad43d48bbb3b9df58eb5a250a57396",
"020e287d79d0d96abc5026b9af4a4f8820fc0b1d",
"00c08861cfb438d5ff209dfadc2d839641cd3ca9",
"208e7934d900055b43b8b60e4a807ac00674ec4a",
"67d18339ed72b7fc2152cb42b63362b570c11946",
"157bc8409146eb82230637dce86d19829ee45a83",
"011a0f193a4ad6e118abd5a36f705618071891ba"
],
"paperAbstract": "In application domains that store data in a tabular format, a common task is to fill the values of some cells using values stored in other cells. For instance, such data completion tasks arise in the context of missing value imputation in data science and derived data computation in spreadsheets and relational databases. Unfortunately, end-users and data scientists typically struggle with many data completion tasks that require non-trivial programming expertise. This paper presents a synthesis technique for automating data completion tasks using programming-by-example (PBE) and a very lightweight sketching approach. Given a formula sketch (e.g., <pre>AVG</pre>(<pre>?</pre>1, <pre>?</pre>2)) and a few input-output examples for each hole, our technique synthesizes a program to automate the desired data completion task. Towards this goal, we propose a domain-specific language (DSL) that combines spatial and relational reasoning over tabular data and a novel synthesis algorithm that can generate DSL programs that are consistent with the input-output examples. The key technical novelty of our approach is a new version space learning algorithm that is based on finite tree automata (FTA). The use of FTAs in the learning algorithm leads to a more compact representation that allows more sharing between programs that are consistent with the examples. We have implemented the proposed approach in a tool called DACE and evaluate it on 84 benchmarks taken from online help forums. We also illustrate the advantages of our approach by comparing our technique against two existing synthesizers, namely Prose and Sketch.",
"pdfUrls": [
"http://www.cs.utexas.edu/~xwang/pubs/oopsla17.pdf",
"http://doi.acm.org/10.1145/3133886",
"https://www.cs.utexas.edu/~xwang/pubs/oopsla17.pdf",
"http://arxiv.org/abs/1707.01469",
"http://export.arxiv.org/pdf/1707.01469",
"https://arxiv.org/pdf/1707.01469v1.pdf",
"http://www.cs.utexas.edu/users/isil/dace.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/02e770fe56cc33834c8e81e35ed39074471997f7",
"sources": [
"DBLP"
],
"title": "Synthesis of data completion scripts using finite tree automata",
"venue": "PACMPL",
"year": 2017
},
"02f036c820c1432a254895088a0d01abd4605449": {
"authors": [
{
"ids": [
"4762647"
],
"name": "James Larisch"
},
{
"ids": [
"2450059"
],
"name": "David R. Choffnes"
},
{
"ids": [
"36147319"
],
"name": "Dave Levin"
},
{
"ids": [
"1711252"
],
"name": "Bruce M. Maggs"
},
{
"ids": [
"1729928"
],
"name": "Alan Mislove"
},
{
"ids": [
"35497150"
],
"name": "Christo Wilson"
}
],
"doi": "10.1109/SP.2017.17",
"doiUrl": "https://doi.org/10.1109/SP.2017.17",
"entities": [
"Byte",
"Certificate Transparency",
"Client-side",
"Data structure",
"Download",
"Firefox",
"OCSP stapling",
"Online Certificate Status Protocol",
"Poor posture",
"Public key infrastructure",
"Server (computing)",
"Server-side",
"Transport Layer Security"
],
"id": "02f036c820c1432a254895088a0d01abd4605449",
"inCitations": [
"67b1bfd459a70990d2894dfd115e2633e927bb59",
"36e81b745b1122de2440be3a25920860f8287147"
],
"journalName": "2017 IEEE Symposium on Security and Privacy (SP)",
"journalPages": "539-556",
"journalVolume": "",
"outCitations": [
"15ca5943844e12f676555a53e9faeeb80f4738e4",
"201b0a185dda51629d7b6fdef3b380a0beaba455",
"1688c9bb957395bf7ac05098537c736cfd076382",
"3593269a4bf87a7d0f7aba639a50bc74cb288fb1",
"08fabacc44f1f7d3b968fa41e52e350a24e02abc",
"46cd7e1d4231e47873f3eb4e26ab73187deb5437",
"3586b5f06ad646441406c8a9706c869067f54fa4",
"1eea9f527d7902748b14b807e7d544d933734ce6",
"bf7b79513e5ca9e037964c9fd0b9a63e50ea4833",
"1ee169e1161fbaaea334bd99759015cebe506764",
"806c8e1cb853e38dc90ea592b3c2e62f844069aa",
"6e4480275887464a483cf85ada0fff26514b1313",
"3d049eb62dd331b066df3cd455287ec487a745bb",
"0641830054d30adf5c115adc0fd369f3ecdc6d73",
"08e9542de3cbfe791bf86a0dee6ba5e83bc29ea7",
"06c87865bc8f19df60db5c37e504146b0735255a",
"ee9001b8649ecc3e731018214d852e532d2bd5bd",
"563239b0eaa3aa7003e8e8e66ba3e789f7cee265",
"f0cfdd16edb45182ab227400d75b6f736aafb0a0",
"3a2f37d3648592ffb42155c28f71894ad61937fe",
"828cc4f5f736e2d5ef555ef052e2a99f754e401a",
"23567eb140757d026cb3f5d25419386b52a5623b",
"2050a16b0d5272b49fa03c8c4d32cacb08cc800a",
"a58e5388358da913ede1ac7ca0807c66fb871f00",
"1113664b038d0390b061afb80ee214b09a207fc9",
"43e632540fa490c2352a03546a20d53850953626",
"2bebf168f3eab1dadc44106977fc5c0f8703967d",
"1f13b5ad5c07daee56537aad44c4cd0fc3ea5bd5",
"487fb1ea0bbf53bdee927c7ceb8319095d37c42c",
"48fc8f1aa0b6d1e4266b8017820ff8770fb67b6f",
"6c86e80f902b264cb3e0bb7088490ba2c3df2106",
"8bb584dd12dd82b9041b819b8f25633eadf1c5d5",
"00f220ea0951673d80137215fa3fd0f005a02789",
"3837b80bc3ec48e71ca44a5d6a7b97b5fc3136a7",
"1f0665485f7fbc06675c981866efab2c4ccbcdd4",
"bdfd34769911b3fb40eadf71bfb34a0ec98fe160",
"5ad285efff1151af53ccae1ce9c836bf2b9d8e49",
"582d62de1236dbb7ed5416941f818e88bd10b059",
"4c30ca01698083bb6afcecfb2f99ec995705498a",
"588c404fa3f64c58facb178ca957ed4697aa622c",
"182f32790af12408a5656e59356e4ce6873e2066",
"b409f82579d9775ce51ae4cfe93b0abe69612565",
"208ed7512ea84f22a004920ea0b4c475bc836abc",
"54e08c0ee320cc8e20d3517dc29276974eb2a26c",
"8cdbab26fa0dee8f165b6680e59e8966679fd068",
"f79063dbcfc3e5e1d50c006d64eb0c94264e63e2",
"27a8f66219047eb41900f12bd5813b4f52b829e1",
"bb52ff840b1b6e2144268e57c72118a49460d6f4",
"197f0b31f4088c7a7301e4e3079b43be2eae3dc3",
"943718810d6f0b21406bebebe26b498c9ca97e01",
"3591be0ccd08c80c0048ebaa0e7005556f49cf5e",
"185d057d3bce4ea115c4fbe39da65a43b1cc1a0c",
"0563bbbf980fffcd0091dc429c157e874bd5c542",
"6c5395868a818c6f414c653a30376461240bd366",
"4e33e9d1aa91aa78819ec9700d1024e0f0cdef6c"
],
"paperAbstract": "Currently, no major browser fully checks for TLS/SSL certificate revocations. This is largely due to the fact that the deployed mechanisms for disseminating revocations (CRLs, OCSP, OCSP Stapling, CRLSet, and OneCRL) are each either incomplete, insecure, inefficient, slow to update, not private, or some combination thereof. In this paper, we present CRLite, an efficient and easily-deployable system for proactively pushing all TLS certificate revocations to browsers. CRLite servers aggregate revocation information for all known, valid TLS certificates on the web, and store them in a space-efficient filter cascade data structure. Browsers periodically download and use this data to check for revocations of observed certificates in real-time. CRLite does not require any additional trust beyond the existing PKI, and it allows clients to adopt a fail-closed security posture even in the face of network errors or attacks that make revocation information temporarily unavailable. We present a prototype of name that processes TLS certificates gathered by Rapid7, the University of Michigan, and Google's Certificate Transparency on the server-side, with a Firefox extension on the client-side. Comparing CRLite to an idealized browser that performs correct CRL/OCSP checking, we show that CRLite reduces latency and eliminates privacy concerns. Moreover, CRLite has low bandwidth costs: it can represent all certificates with an initial download of 10 MB (less than 1 byte per revocation) followed by daily updates of 580 KB on average. Taken together, our results demonstrate that complete TLS/SSL revocation checking is within reach for all clients.",
"pdfUrls": [
"http://www.ccs.neu.edu/home/cbw/static/pdf/larisch-oakland17.pdf",
"https://obj.umiacs.umd.edu/papers_for_stories/crlite_oakland17.pdf",
"https://doi.org/10.1109/SP.2017.17"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/02f036c820c1432a254895088a0d01abd4605449",
"sources": [
"DBLP"
],
"title": "CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers",
"venue": "2017 IEEE Symposium on Security and Privacy (SP)",
"year": 2017
},
"02f34709c626b3076c9fac5c0a4f9cf8d7ecdeb5": {
"authors": [
{
"ids": [
"31251390"
],
"name": "Maxime C. Cohen"
},
{
"ids": [
"38694262"
],
"name": "Philipp W. Keller"
},
{
"ids": [
"1728881"
],
"name": "Vahab S. Mirrokni"
},
{
"ids": [
"1724391"
],
"name": "Morteza Zadimoghaddam"
}
],
"doi": "10.1145/3078505.3078530",
"doiUrl": "https://doi.org/10.1145/3078505.3078530",
"entities": [
"Algorithm",
"Bin packing problem",
"Cloud computing",
"Data center",
"Experiment",
"Jumpstart Our Business Startups Act",
"Memory overcommitment",
"Online algorithm",
"Requirement",
"Risk aversion",
"Risk management",
"Schedule (project management)",
"Scheduling (computing)",
"Set packing",
"Submodular set function"
],
"id": "02f34709c626b3076c9fac5c0a4f9cf8d7ecdeb5",
"inCitations": [
"35b347c57e8765ae46b0ccb0fd0639214d0f7c0e"
],
"journalName": "",
"journalPages": "7",
"journalVolume": "",
"outCitations": [
"c4db59cfebfb97d119fa6f96fc251d4cb1bb25db",
"81966368cc3f2aed2581e726590d7a52cec3bc96",
"cc34846754a3cc95384bac736e91e35ae7f0d374",
"6d8610a87f190985f508372f2f981aeddbbebc4d",
"2fc51f5f8dfa03d736cbd6960a08615522e19eaa",
"172fc53432c0b1b8bd3d0da1be6f9363f27cfaa9",
"8d56d4bc69a8c562434b9a129542bb79e9d6f1d6",
"ffb9ba598fab24edf5e143901e246804137114b2",
"610f5e505a94544edf774d28f89558670bcc2318",
"61b370c44b85cb06a36219343471e180e20a235e",
"09f6c6f9d630774e707b5ffe060158cc7def4b89",
"0cebc93d088750083be23d59a7f10ce9e0f9324c",
"1fa5edc36a127ccf496a8d2e5189b2c22e1693d4",
"05705bf8ab08bde69a2918bf69cf794eb1948124"
],
"paperAbstract": "This paper considers a traditional problem of resource allocation, scheduling jobs on machines. One such recent application is cloud computing, where jobs arrive in an online fashion with capacity requirements and need to be immediately scheduled on physical machines in data centers. It is often observed that the requested capacities are not fully utilized, hence offering an opportunity to employ an overcommitment policy, i.e., selling resources beyond capacity. Setting the right overcommitment level can induce a significant cost reduction for the cloud provider, while only inducing a very low risk of violating capacity constraints. We introduce and study a model that quantifies the value of overcommitment by modeling the problem as a bin packing with chance constraints. We then propose an alternative formulation that transforms each chance constraint into a submodular function. We show that our model captures the risk pooling effect and can guide scheduling and overcommitment decisions. We also develop a family of online algorithms that are intuitive, easy to implement and provide a constant factor guarantee from optimal. Finally, we calibrate our model using realistic workload data, and test our approach in a practical setting. Our analysis and experiments illustrate the benefit of overcommitment in cloud services, and suggest a cost reduction of 1.5% to 17% depending on the provider's risk tolerance.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3078505.3078530",
"http://arxiv.org/abs/1705.09335",
"https://arxiv.org/pdf/1705.09335v1.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/02f34709c626b3076c9fac5c0a4f9cf8d7ecdeb5",
"sources": [
"DBLP"
],
"title": "Overcommitment in Cloud Services Bin packing with Chance Constraints",
"venue": "SIGMETRICS",
"year": 2017
},
"02fd71524e15de535d5e7aa6f79743352cac3992": {
"authors": [
{
"ids": [
"2784940"
],
"name": "Tim Ruffing"
},
{
"ids": [
"2970940"
],
"name": "Pedro Moreno-Sanchez"
},
{
"ids": [
"1828965"
],
"name": "Aniket Kate"
}
],
"doi": "",
"doiUrl": "",
"entities": [
"Best, worst and average case",
"Bitcoin",
"Communications protocol",
"Crypto-anarchism",
"De-anonymization",
"Dining cryptographers problem",
"Formal verification",
"Malware",
"P2P caching",
"Peer-to-peer",
"Pseudonymity"
],
"id": "02fd71524e15de535d5e7aa6f79743352cac3992",
"inCitations": [
"9d5d3fa5bc48de89c398042236b85566f433eb5c",
"4e12417ac7138f4e898cfbe35c7fd7c4e5e13b45",
"aad038f478194173c181782e187a9370b95d0180",
"01e1d63eb9f23163458f0364dc92377c9a17b466",
"b5d8f9196dcf75fb4736b83c7bff228f83353757",
"24f036498862dba97036df9c26de066c75e843c2",
"6c39f2c252d095ab9d4a398fa66706c901387683",
"f234f428eb552b94435683e7e784e805c201d309",
"5f0db49bc309c6f82dec7368a1adb9bde4363b1c"
],
"journalName": "IACR Cryptology ePrint Archive",
"journalPages": "824",
"journalVolume": "2016",
"outCitations": [
"9d2c1271f1219522d13f150c2b04123bef300dd9",
"17a3c5593f159d3180b256e18498bb11eb14b9e8",
"10336cdef674893f41bf4824d44c4156be5e9ca2",
"6747887cc328764781b21b543cd11b953efe7519",
"c8e275e627757d3c090afd9db367be000e401d01",
"139cfb65d375bba4ca59acc19efb0b7ac99247dc",
"4123e9fecfc01c3cf32fb3d59ed1566ee0856874",
"c27762257f068fdbb2ad34e8f787d8af13fac7d1",
"557d8b988bca3d0033189723d11102e04c0c67c0",
"331be37d467f4e630cea0ea689697945698caab9",
"1993c3ee54425aa9fa7486c82aeb56d22f77b14f",
"049e2c54fe8a35cd941937ba592e07bbc2dda591",
"03cee43dcbb978f663db5dd3e658e0e0f4dacfbe",
"5ae4e852d333564923e1b6caf6b009729df6ca6a",
"bac41b59697da3ca5c80ca08f2bbbc97a3576248",
"b32836684d504afc8e33dcc41d77336e51e27fc5",
"244ddba27efef35bac9b01d5b1780922f5f33ec4",
"1ed7234e9de7b8e3a6e8078e70ae8cec0020c06b",
"7f17ee37b9cc8dbf5de6363c863d9e3c49768400",
"0871f3b37652edfa2dfb4689512eaf0b4ecff889",
"73041923fcdc4141d9269a5df16f24a587070d31",
"3624eaf7c2f05612429ed1579cc82102c11f4d65",
"06f1f0da373de40493a819bc8eedbfe2e9edec39",
"0706225eeac0f855b19c365313db61252ecde0d7",
"19bab496d5d7f60d3e5b9217739b9cf7fedaf44b",
"02dad9c51e3a2e2117ffc41d624de4a090271d1f",
"c773c64ab52f702ae0aaba8c35b72dde471ea04a",
"a9267bc516da5940740d95664c562b6fa14d4b34",
"15167da8d35184d062b988b5a6807e0fa72cd77f",
"14829636fee5a1cf8dee9737849a8e2bdaf9a91f",
"09af9108cb5c196d5c15a6f3d26e604434203bea",
"2949851ab9827fdd334ecc3b392296df2aacaf92",
"1d1d1d72f226ffec5468dc9cb28ea804cd7864fa",
"05f84e7e8f53e39d84a9e41c799ef56c35b217ab",
"02573d72bff8dd5f7dc68334ffb5a337a474d839",
"12b66f7180072dd8d5ac1c935b12df381d71ad81",
"67af8bf83dc4354d1513b6f60b13df60f694c5b3"
],
"paperAbstract": "Starting with Dining Cryptographers networks (DC-net), several peer-to-peer (P2P) anonymous communication protocols have been proposed. Despite their strong anonymity guarantees none of those has been employed in practice so far: Most fail to simultaneously handle the crucial problems of slot collisions and malicious peers, while the remaining ones handle those with a significant increased latency (communication rounds) linear in the number of participating peers in the best case, and quadratic in the worst case. We conceptualize these P2P anonymous communication protocols as P2P mixing, and present a novel P2P mixing protocol, DiceMix, that only requires constant (i.e., four) communication rounds in the best case, and 4 + 2f rounds in the worst case of f malicious peers. As every individual malicious peer can prevent a protocol run from success by omitting his messages, we find DiceMix with its worst-case linear-round complexity to be an optimal P2P mixing solution. On the application side, we find DiceMix to be an ideal privacy-enhancing primitive for crypto-currencies such as Bitcoin. The public verifiability of their pseudonymous transactions through publicly available ledgers (or blockchains) makes these systems highly vulnerable to a variety of linkability and deanonymization attacks. DiceMix can allow pseudonymous users to make their transactions unlinkable to each other in a manner fully compatible with the existing systems. We demonstrate the efficiency of DiceMix with a proof-of-concept implementation. In our evaluation, DiceMix requires less than 8 seconds to mix 50 messages (160 bits, i.e., Bitcoin addresses), while the best protocol in the literate requires almost 3 minutes in a very similar setting. As a representative example, we use DiceMix to define a protocol for creating unlinkable Bitcoin transactions. Finally, we discover a generic attack on P2P mixing protocols that exploits the implicit unfairness of a protocol with a dishonest majority to break anonymity. Our attack uses the attacker\u2019s realworld ability to omit some communication from a honest peer to deanonymize her input message. We also discuss how this attack is resolved in our application to crypto-currencies by employing uncorrelated input messages across different protocol runs.",
"pdfUrls": [
"http://eprint.iacr.org/2016/824",
"https://www.internetsociety.org/sites/default/files/ndss2017_01-4_Ruffing_paper.pdf",
"http://crypsys.mmci.uni-saarland.de/projects/FastDC/draft-paper.pdf",
"https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/p2p-mixing-and-unlinkable-bitcoin-transactions/",
"http://diyhpl.us/~bryan/papers2/bitcoin/P2P%20mixing%20and%20unlinkable%20p2p%20transactions%20-%20Anonymity%20of%20the%20people,%20by%20the%20people,%20and%20for%20the%20people%20-%202016.pdf",
"http://eprint.iacr.org/2016/824.pdf"
],
"pmid": "",
"s2PdfUrl": "http://pdfs.semanticscholar.org/c95c/c001a8b93059d24c0ea4f458acb583e43b21.pdf",
"s2Url": "https://semanticscholar.org/paper/02fd71524e15de535d5e7aa6f79743352cac3992",
"sources": [
"DBLP"
],
"title": "P2P Mixing and Unlinkable Bitcoin Transactions",
"venue": "NDSS",
"year": 2016
},
"02ff04aca88c6c27ea24fe727e7c66d1482d46ec": {
"authors": [
{
"ids": [
"30521811"
],
"name": "Hosein Mohammadi Makrani"
},
{
"ids": [
"1747542"
],
"name": "Houman Homayoun"
}
],
"doi": "10.1109/IISWC.2017.8167763",
"doiUrl": "https://doi.org/10.1109/IISWC.2017.8167763",
"entities": [
"Apache Hadoop",
"Big data",
"Commodity computing",
"Computational resource",
"Computer data storage",
"Dynamic random-access memory",
"Machine learning",
"Message Passing Interface",
"SPARK",
"Server (computing)"
],
"id": "02ff04aca88c6c27ea24fe727e7c66d1482d46ec",
"inCitations": [],
"journalName": "2017 IEEE International Symposium on Workload Characterization (IISWC)",
"journalPages": "112-113",
"journalVolume": "",
"outCitations": [
"6b1146e51b2c4d5b8433d4d9c6dbf87c6c484196",
"1c437e8220d4122476d3a1ea0ca2debc4871aa76"
],
"paperAbstract": "Emerging big data frameworks requires computational resources and memory subsystems that can naturally scale to manage massive amounts of diverse data. Given the large size and heterogeneity of the data, it is currently unclear whether big data frameworks such as Hadoop, Spark, and MPI will require high performance and large capacity memory to cope with this change and exactly what role main memory subsystems will play; particularly in terms of energy efficiency. The primary purpose of this study is to answer these questions through empirical analysis of different memory configurations available on commodity hardware and to assess the impact of these configurations on the performance and power of these well-established frameworks. Our results reveal that while for Hadoop there is no major demand for high-end DRAM, Spark and MPI iterative tasks (e.g. machine learning) are benefiting from a high-end DRAM; in particular high frequency and large numbers of channels. Among the configurable parameters, our results indicate that increasing the number of DRAM channels reduces DRAM power and improves the energy-efficiency across all three frameworks.",
"pdfUrls": [
"http://doi.ieeecomputersociety.org/10.1109/IISWC.2017.8167763",
"http://ece.gmu.edu/~hhomayou/files/iiswc2017-2017-Hosein-1.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/02ff04aca88c6c27ea24fe727e7c66d1482d46ec",
"sources": [
"DBLP"
],
"title": "Memory requirements of hadoop, spark, and MPI based big data applications on commodity server class architectures",
"venue": "2017 IEEE International Symposium on Workload Characterization (IISWC)",
"year": 2017
},
"031048fe96d408fb5b0a245ebf2e313b51e4c90a": {
"authors": [
{
"ids": [
"3284944"
],
"name": "Stratos Dimopoulos"
},
{
"ids": [
"1713536"
],
"name": "Chandra Krintz"
},
{
"ids": [
"1682591"
],
"name": "Richard Wolski"
}
],
"doi": "10.1109/CLUSTER.2017.52",
"doiUrl": "https://doi.org/10.1109/CLUSTER.2017.52",
"entities": [
"Apache Hadoop",
"Big data",
"Enterprise resource planning",
"Fair-share scheduling",
"Fairness measure",
"MapleStory",
"Resource contention",
"Simulation",
"Trace-based simulation"
],
"id": "031048fe96d408fb5b0a245ebf2e313b51e4c90a",
"inCitations": [],
"journalName": "2017 IEEE International Conference on Cluster Computing (CLUSTER)",
"journalPages": "233-244",
"journalVolume": "",
"outCitations": [
"20244961dbba619d38e9115dfc63ebd90676d224",
"4a0bb4eece00f3e9445d1a0d933422aa408ce8d1",
"3000e77ed7282d9fb27216f3e862a3769119d89e",
"8dd9dca858d1c21e495aeb5135e6ff7b9c18f37c",
"02953ffd49d51b2d8a00520e42d852c241c3ddd1",
"a43dfb040d60d0df3dbe66a52b920e05a1ac3083",
"85c058c445cbabe1dab281ec8792e8f154fa2e61",
"29571c68067f483deb833c4eaa70f9f78cd9470f",
"0b5105bbe6635b55d8a0677071b44e4000f2f6d4",
"9da1d06e9afe37b3692a102022f561e2b6b25eaf",
"980773ca869fc17562e4fbcf4202a8f21893b114",
"0b95a8628f90a78909447c4cfee2dce7cb92dd52",
"e995899e0b4c8d3ad46af9083c120daeac4110dc",
"f42e1c4556034d8955a101079e514ef7b72481d7",
"8ae47a914915a4a9071662eaf504ddc9bc0c3194",
"2a7d3b967a356c2a42f729048b0d3511b0005351",
"114019f734b28125525756cc15810cc23dc1297a",
"08f13e484e7e51831ec13076d14570ced91a50fb",
"0d868efa67bf06b1f784d60769c082fd9a58893e",
"09d7a6126120458d3988676d4f0a1ffada7d0a55",
"afa2aa72e82ea97f4c98e0d6adb26b9be3dbf5df",
"207ea0115bf4388d11f0ab4ddbfd9fd00de5e8d1",
"0ecad2b630fce029c1b7b577ed56e18fbba001ce",
"2988e34168fa91398fa397baf823af2063893e9c",
"1591168514e17936199d57f5724a960315988b58",
"c1baed1ddf0be06370d52a2a6d7014faf0226e60",
"43f68c6b38dae2b6f5403362ecd96a5183c3aeab",
"287f2a6b29574197551d80c69455b51b7a7d3c9a",
"090599a2caf4591c87699ad850c75554cd712937",
"830840a01bd03b0f7812a10bece54d5682c9714b",
"5341bdf934b3a99af6685b5564af8e03d1b780a7",
"2b5e2bf1d05cf358e5d9b5c85a96a74b145dc5a3",
"090bbaf22ba20bf032e38770a5379e25d52a1bd4",
"4d22a82681bd58e959ed2f3544bba7495701b7f2",
"6344369772fe18c032944d7a317b87588308fd3d",
"2997435fe9f0e646e6a37d9783b520b9cdbdd38b",
"f207de5d870ab3851df841def8b962ddb428f865",
"488e3c0b5935c0f82b3044962f0d32fba3eb4a8c",
"7c7a10ed39d58ce65711465ef10e89b16df6e35d",
"5f9305096c8bdb47b146a6a2ec0c9569513d8a16",
"bbc2a698c2fb2b76e256cc51a9d7c37765ab51b6",
"0ea4380ff8bb30e6bd5fd888268d6f8f38229fb7",
"676e50a4d2141ae66a0d2aafcf79c8c989fcce33",
"998df69751b93679888449d3327c2e47acbaaaa3",
"45e2dd9fe949025ff7f82d888e5be8693dbd317d",
"6fddb6690a6aaca1e42fbac7ef9b9fb18ac31590",
"184014795c3c2bbf23f3959f6d8b1ab8bc03aea8"
],
"paperAbstract": "In this paper, we present Justice, a fair-share deadline-aware resource allocator for big data cluster managers. In resource constrained environments, where resource contention introduces significant execution delays, Justice outperforms the popular existing fair-share allocator that is implemented as part of Mesos and YARN. Justice uses deadline information supplied with each job and historical job execution logs to implement admission control. It automatically adapts to changing workload conditions to assign enough resources for each job to meet its deadline "just in time." We use trace-based simulation of production YARN workloads to evaluate Justice under different deadline formulations. We compare Justice to the existing fair-share allocation policy deployed on cluster managers like YARN and Mesos and find that in resource-constrained settings, Justice improves fairness, satisfies significantly more deadlines, and utilizes resources more efficiently.",
"pdfUrls": [
"http://doi.ieeecomputersociety.org/10.1109/CLUSTER.2017.52",
"http://www.cs.ucsb.edu/~ckrintz/papers/cluster17.pdf",
"http://cs.ucsb.edu/~stratos/documents/justice.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/031048fe96d408fb5b0a245ebf2e313b51e4c90a",
"sources": [
"DBLP"
],
"title": "Justice: A Deadline-Aware, Fair-Share Resource Allocator for Implementing Multi-Analytics",
"venue": "2017 IEEE International Conference on Cluster Computing (CLUSTER)",
"year": 2017
},
"0327efc1d7628328c44b81f452f808d4fe05d955": {
"authors": [
{
"ids": [
"3393459"
],
"name": "Gal Yehuda"
},
{
"ids": [
"33438590"
],
"name": "Daniel Keren"
},
{
"ids": [
"2379080"
],
"name": "Islam Akaria"
}
],
"doi": "10.1109/IPDPS.2017.123",
"doiUrl": "https://doi.org/10.1109/IPDPS.2017.123",
"entities": [
"Algorithm",
"Centralisation",
"Graph property",
"Linear function (calculus)",
"Local variable",
"Mathematical optimization",
"Nonlinear system",
"Online and offline",
"Spectral clustering",
"Vertex (geometry)"
],
"id": "0327efc1d7628328c44b81f452f808d4fe05d955",
"inCitations": [
"782079770e60b2ef266dcf3de861a81f97baa985"
],
"journalName": "2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"journalPages": "2-11",
"journalVolume": "",
"outCitations": [
"4716de48821d4669a08f97e94493c5253c907e0f",
"86fb6d3152a9849444f2301c91ddce5b97ce611b",
"4f8298d9932393b0fdd73576715c0818b4083292",
"24259d92169e287c55abd3bd6cc5b2da50a88c4b",
"3df7d6f56bcf9d4741409b439b418f4217cdcd2c",
"41d7a4cb6c804945a7c6a0976a3dd85b9fe37677",
"3ea5e18d3da3c72212aeccca74e28a2c8d9449cc",
"121e53ccc22cbf6aa453a221fcde294b1fcffe60",
"4ebc5082dc41cf6fdc80533d44dfc5db35ffa94f",
"7c6d51677ffff060ac04e0a61ce2cf9cb2437709",
"011c8ce97e4481e92e3e6cdb989247a8881a7f2f",
"63d567b512fca70f84aef4a59bc0e2aafaaebb56",
"0967bd75632d959541ee4afef35a5ef37c805cc7",
"aa6ad058dffedcaa0b614b23a7508562a4652855",
"01169e6900a3bb555d45b55ba674fc3b342d31c9",
"015d2bee5968ceecdbec6cb4a9328ad04c9efe6c",
"6d248d20660602f34b87b2e9a597dbc3be06cd3a",
"59dd507247fd03a93437288b015d55e337807247"
],
"paperAbstract": "The following is a very common question in numerous theoretical and application-related domains: given a graph G, does it satisfy some given property? For example, is G connected? Is its diameter smaller than a given threshold? Is its average degree larger than a certain threshold? Traditionally, algorithms to quickly answer such questions were developed for static and centralized graphs (i.e. G is stored in a central server and the list of its vertices and edges is static and quickly accessible). Later, as dictated by practical considerations, a great deal of attention was given to on-line algorithms for dynamic graphs (where vertices and edges can be added and deleted); the focus of research was to quickly decide whether the new graph still satisfies the given property. Today, a more difficult version of this problem, referred to as the distributed monitoring problem, is becoming increasingly important: large graphs are not only dynamic, but also distributed, that is, G is partitioned between a few servers, none of which "sees" G in its entirety. The question is how to define local conditions, such that as long as they hold on the local graphs, it is guaranteed that the desired property holds for the global G. Such local conditions are crucial for avoiding a huge communication overhead. While defining local conditions for linear properties (e.g. average degree) is relatively easy, they are considerably more difficult to derive for non-linear functions over graphs. We propose a solution and a general definition of solution optimality, and demonstrate how to apply it to two important graph properties – the spectral gap and the number of triangles. We also define an absolute lower bound on the communication overhead for distributed monitoring, and compare our algorithm to it, with excellent results. Last but not least, performance improves as the graph becomes larger and denser – that is, when distributing it is more important.",
"pdfUrls": [
"http://www.cs.haifa.ac.il/~dkeren/ipdps17.pdf",
"http://www.weizmann.ac.il/math/printpdf/seminar/monitoring-properties-large-distributed-dynamic-graphs",
"https://doi.org/10.1109/IPDPS.2017.123"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/0327efc1d7628328c44b81f452f808d4fe05d955",
"sources": [
"DBLP"
],
"title": "Monitoring Properties of Large, Distributed, Dynamic Graphs",
"venue": "2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"year": 2017
},
"0330b64dff62e2d537f3bbb5b5a882194066a481": {
"authors": [
{
"ids": [
"1736081"
],
"name": "Amit Sabne"
},
{
"ids": [
"33727877"
],
"name": "Xiao Wang"
},
{
"ids": [
"3039737"
],
"name": "Sherman J. Kisner"
},
{
"ids": [
"1745655"
],
"name": "Charles A. Bouman"
},
{
"ids": [
"1682337"
],
"name": "Anand Raghunathan"
},
{
"ids": [
"1697585"
],
"name": "Samuel P. Midkiff"
}
],
"doi": "10.1145/3018743.3018765",
"doiUrl": "https://doi.org/10.1145/3018743.3018765",
"entities": [
"Algorithm",
"Central processing unit",
"Coordinate descent",
"Gradient descent",
"Graphics processing unit",
"Image quality",
"Iterative reconstruction",
"Medical imaging",
"Multi-core processor",
"Parallel computing",
"Speedup",
"Test case",
"Tomography"
],
"id": "0330b64dff62e2d537f3bbb5b5a882194066a481",
"inCitations": [
"15ac663677324fa0c352efd11f00efa5b488658c",
"2e67dfdb5435a7c903ade7a7bad50cba09968048",
"c82033a0c15c1c64852c63a2379d50ddc8554aaa"
],
"journalName": "",
"journalPages": "207-220",
"journalVolume": "",
"outCitations": [
"2c1a16f01b85bfd397676db1128a664e42400861",
"773f5a0299f0f772fd698f4a54030827ba9b2c2d",
"c6dc80c832d6760f8a5d6a01678474e534c0258b",
"1333fc35045fd7897e9fa8d9d29a395c6230fda3",
"0eb7a0f1d9f6ca2627294b52d1ef601363885262",
"23234ac0c65caa0eb8fb300d3b7e19ccfffc323c",
"6feac7b4129a7e507aa0204080f6b5bc4ef5896b",
"0059cfac9c5b7811866f0729d0917b7478148fc5",
"87660a2538ffb49960e12a07cb09e85acbbab35e",
"00f38163ddfddb5ad34c1db1711dd6845a4de855",
"a68be42bd90645ef53d14ba0ccfb95176db2c258",
"637643b4eeab8feaffbca9f00936f96ccf1838ac",
"0389a414c5d0ef50e06fe0c15f6102f374ce1b04",
"aac43d8c33362f6de537d7b7f87191a64efd37d4",
"90eb72b10cd337af115b84014a0933d0760f3d1f",
"5c3fe5e8439287ea6c0695207a20b16fb85a3290",
"4d650e2a74dea2f99683d058ee5f09ca951a5661",
"cc260dc356514090eb82becd5c3cce3fbd9a5306",
"ba09ff8f71930605287fc478ea47864c818e42e1",
"1e4abfa6c323bb7ad7a62f94f088104e515cd1be",
"79b33b94477515a1c005ac2ce3169c4dec142938",
"4bc9181d19257301c57d280d440061df4092fe15",
"0c77cac3243697964103a35686ea2379137bc5e9",
"1afaa6fa1906292e0bf6fcedf27f04722d2d86e3",
"0f922c6d696a26f7d4eb1e508afcc7982cdb2c4d",
"5d205292cfe87909f7a50419a18652f0d813f4b7",
"0555761dbfdcb65fb60386f5d715046c737e42f7",
"4aba22b139d432b394f4beaa8b0ddae991bbee8f",
"1e100b3e990b23a33c2dfb76e4fa044b2055e946",
"9ebb76086d51702204828ba01b3164a4ccefef38",
"04f0a6e8f86e5e5c2af236e1460109414f45c6e7",
"378096ff5a43e294489efdcb191d3aeee566ad5d",
"7a7f08c789f3d1e6359cae01d30e90ce18429c0b",
"707c82501c0ad8356ccc5d6f3fbf03c9b1b92f4b"
],
"paperAbstract": "Computed Tomography (CT) Image Reconstruction is an important technique used in a variety of domains, including medical imaging, electron microscopy, non-destructive testing and transportation security. Model-based Iterative Reconstruction (MBIR) using Iterative Coordinate Descent (ICD) is a CT algorithm that produces state-of-the-art results in terms of image quality. However, MBIR is highly computationally intensive and challenging to parallelize, and has traditionally been viewed as impractical in applications where reconstruction time is critical. We present the first GPU-based algorithm for ICD-based MBIR. The algorithm leverages the recently-proposed concept of SuperVoxels, and efficiently exploits the three levels of parallelism available in MBIR to better utilize the GPU hardware resources. We also explore data layout transformations to obtain more coalesced accesses and several GPU-specific optimizations for MBIR that boost performance. Across a suite of 3200 test cases, our GPU implementation obtains a geometric mean speedup of 4.43X over a state-of-the-art multi-core implementation on a 16-core iso-power CPU.",
"pdfUrls": [
"https://engineering.purdue.edu/~bouman/publications/orig-pdf/PPoPP-2017.pdf",
"http://dl.acm.org/citation.cfm?id=3018765"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/0330b64dff62e2d537f3bbb5b5a882194066a481",
"sources": [
"DBLP"
],
"title": "Model-based Iterative CT Image Reconstruction on GPUs",
"venue": "PPOPP",
"year": 2017
},
"033492cf9e4fdd36380065d7e6f31817ba561e57": {
"authors": [
{
"ids": [
"9545854"
],
"name": "Chathuri Gunawardhana"
},
{
"ids": [
"2248998"
],
"name": "Manuel Bravo"
},
{
"ids": [
"1741342"
],
"name": "Lu\u00eds E. T. Rodrigues"
}
],
"doi": "",
"doiUrl": "",
"entities": [
"Concurrency (computer science)",
"Kinetic Void",
"Limiter",
"Microsequencer",
"Requirement",
"Riak",
"Serialization",
"Throughput",
"Windows Update"
],
"id": "033492cf9e4fdd36380065d7e6f31817ba561e57",
"inCitations": [
"efb351341158c8cb92ea6f479021c05e8e2e6120",
"8fe5d6bb93d046c4c1ff3a075225b8acf147584f",
"c1447c4c07721e4e444aaa7ad5bb6a661c742bd2"
],
"journalName": "",
"journalPages": "83-95",
"journalVolume": "",
"outCitations": [
"00f7b192212078fc8afcbe504cc8caf57d8f73b5",
"d12d1289d2384c2ce642f01855637b9f0519e189",
"740ee3de6f8ca734797d7a808c956e303f4a5730",
"200adc5e9ca486f6919bc194415cec28e986df2d",
"55bef5db971deed1358bcb2b375d6832b9ba6a1b",
"34d269619576cd827b9842581755c06dac344b16",
"71c0dd6bd1dd57716b6797043e9f09b951c88a22",
"1eb6ffee1f322412d9d76190fc76b3dcc6546cee",
"e9af96fbbacb4268c3c5ff974cc44990b12294e5",
"ed2e39973435a4b53da760ad9837237ddce2eda5"
],
"paperAbstract": "In this paper we propose a novel approach to manage the throughput vs latency tradeoff that emerges when managing updates in geo-replicated systems. Our approach consists in allowing full concurrency when processing local updates and using a deferred local serialisation procedure before shipping updates to remote datacenters. This strategy allows to implement inexpensive mechanisms to ensure system consistency requirements while avoiding intrusive effects on update operations, a major performance limitation of previous systems. We have implemented our approach as a variant of Riak KV. Our extensive evaluation shows that we outperform sequencer-based approaches by almost an order of magnitude in the maximum achievable throughput. Furthermore, unlike previous sequencer-free solutions, our approach reaches nearly optimal remote update visibility latencies without limiting throughput.",
"pdfUrls": [
"https://www.usenix.org/system/files/conference/atc17/atc17-gunawardhana.pdf",
"http://www.gsd.inesc-id.pt/~ler/reports/cgunawardhanamsc.pdf",
"http://arxiv.org/abs/1702.01786",
"https://arxiv.org/pdf/1702.01786v1.pdf",
"https://www.usenix.org/conference/atc17/technical-sessions/presentation/gunawardhana",
"https://www.usenix.org/sites/default/files/conference/protected-files/atc17_slides_rodrigues.pdf",
"http://www.gsd.inesc-id.pt/~ler/reports/cgunawardhanaea.pdf"
],
"pmid": "",
"s2PdfUrl": "http://pdfs.semanticscholar.org/0334/92cf9e4fdd36380065d7e6f31817ba561e57.pdf",
"s2Url": "https://semanticscholar.org/paper/033492cf9e4fdd36380065d7e6f31817ba561e57",
"sources": [
"DBLP"
],
"title": "Unobtrusive Deferred Update Stabilization for Efficient Geo-Replication",
"venue": "USENIX Annual Technical Conference",
"year": 2017
},
"033a16554eca0961d0f7002d0ef9515a01b18896": {
"authors": [
{
"ids": [
"1745614"
],
"name": "Liu Yang"
},
{
"ids": [
"1728602"
],
"name": "Susan T. Dumais"
},
{
"ids": [
"2142374"
],
"name": "Paul N. Bennett"
},
{
"ids": [
"1977489"
],
"name": "Ahmed Hassan Awadallah"
}
],
"doi": "10.1145/3077136.3080782",
"doiUrl": "https://doi.org/10.1145/3077136.3080782",
"entities": [
"Archive",
"Baseline (configuration management)",
"Dyadic transformation",
"Email",
"Experiment",
"Gmail",
"Next-generation network",
"Organizational behavior",
"Personally identifiable information"
],
"id": "033a16554eca0961d0f7002d0ef9515a01b18896",
"inCitations": [
"9fed5aad11e9bd45a02b05168284a22d79f06b62",
"35fe602bc3e47e1d96e2a51bda7ed7228831952f",
"c557fd527e77d65cd4e59f8c312fd59bfe5e6c58",
"9bc6b6402ac136d97c49344cf5eaf0f8f64771f5",
"ab565ded025579f450b1688923b21feef8fb8570"
],
"journalName": "",
"journalPages": "235-244",
"journalVolume": "",
"outCitations": [
"c32e8187d7a575432eee831294b5e2f67962d441",
"c7ba25074ab7b03f304d11aa9810341925922b4b"
],
"paperAbstract": "Email is still among the most popular online activities. People spend a significant amount of time sending, reading and responding to email in order to communicate with others, manage tasks and archive personal information. Most previous research on email is based on either relatively small data samples from user surveys and interviews, or on consumer email accounts such as those from Yahoo! Mail or Gmail. Much less has been published on how people interact with enterprise email even though it contains less automatically generated commercial email and involves more organizational behavior than is evident in personal accounts. In this paper, we extend previous work on predicting email reply behavior by looking at enterprise settings and considering more than dyadic communications. We characterize the influence of various factors such as email content and metadata, historical interaction features and temporal features on email reply behavior. We also develop models to predict whether a recipient will reply to an email and how long it will take to do so. Experiments with the publicly-available Avocado email collection show that our methods outperform all baselines with large gains. We also analyze the importance of different features on reply behavior predictions. Our findings provide new insights about how people interact with enterprise email and have implications for the design of the next generation of email clients.",
"pdfUrls": [
"http://maroo.cs.umass.edu/pub/web/getpdf.php?id=1270",
"http://www.cs.cmu.edu/~pbennett/papers/SIGIR17-EmailReply-yang-et-al.pdf",
"http://doi.acm.org/10.1145/3077136.3080782",
"http://ciir-publications.cs.umass.edu/pub/web/getpdf.php?id=1270"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/033a16554eca0961d0f7002d0ef9515a01b18896",
"sources": [
"DBLP"
],
"title": "Characterizing and Predicting Enterprise Email Reply Behavior",
"venue": "SIGIR",
"year": 2017
},
"0343ae9ab99d0cbd719baf0d2cc1b82425f3664a": {
"authors": [
{
"ids": [
"2906275"
],
"name": "Berkin Ilbeyi"
},
{
"ids": [
"27019192"
],
"name": "Carl Friedrich Bolz-Tereick"
},
{
"ids": [
"3206189"
],
"name": "Christopher Batten"
}
],
"doi": "10.1109/IISWC.2017.8167760",
"doiUrl": "https://doi.org/10.1109/IISWC.2017.8167760",
"entities": [
"Benchmark (computing)",
"Compiled language",
"Compiler",
"Dynamic programming",
"High- and low-level",
"High-level programming language",
"Interpreter (computing)",
"Just-in-time compilation",
"Meta-process modeling",
"Microarchitecture",
"Programming language",
"Python",
"Racket",
"Virtual machine"
],
"id": "0343ae9ab99d0cbd719baf0d2cc1b82425f3664a",
"inCitations": [],
"journalName": "2017 IEEE International Symposium on Workload Characterization (IISWC)",
"journalPages": "97-107",
"journalVolume": "",
"outCitations": [
"add350d0c5605c98d285b87493fc77c1d68281df",
"3c3f311b4877a0aa49800c10d71ecd136de941c9",
"7baa3d0ba24ed8b8e7b91a512fe7fc8fda25ae07",
"04a15cb22777cb22048502204c83175253fb15a0",
"1d4c0211549a8fe259a273da88c63e8f00fef463",
"0d281938d3ff2377541704cab6ba1c4408420733",
"0ff7e33a637f0a228501f8c29880e7e8d84a31e8",
"6662d518878d3eee218462ee4d8b389c64e1b6f7",
"0c03c044f10c2d165468afeb0cb5718953c315ac",
"5d5e1b35dcfbf52299c327baab696568ba0e1d15",
"b73572f4bce2a14e9f9c023766dab7feec2d5f6c",
"5878301fb9bcd3e6ca30e644670955bf07696607",
"40b491d7b820783a79cfaa77f15b9400c72e54a7",
"7fddc2242e5e96eefc9502e150971564b84f66da",
"7521513abd7acae00b3fd89001da47019606cf38",
"cf058a45de72a537d0588d38a3fe4ff6244d5e7a",
"2f28a633862812674aae9366ba603f0e40b439c2",
"3b0569a1bbac66166a8b9d724c6c6fc190951298",
"a3f3d0f41d0f914f0a7edaccb3d80cc69388cb59",
"3bc180e00cb21933223785f70abc5509852dfa00",
"1e52c603d66a7604ade572c6525a4eb73aec0e3f",
"53e2b31ad6fea91655ecbe64fe66968b934d0160",
"1f8549b87e2b0a16e5785a9c4013f28bc4e9ef35",
"ea8acbcecd906e840c2f03246cd686b3e88fd318",
"d32d4ff33b1b2665d6081194eb6acdc3c7dd6891",
"104a9057b97b50d053a01e7a36c0de46480a1948",
"2e942fb549eff96fda39cb1bef44b7eca3f4fcf1",
"333ea43ab30ae453d6bd847360cd475275e0acbf",
"160ad871b437c95e2f5d89b649a8392ad711cf8c",
"0653e2ed9f683868cb4539eb8718551242834f6b",
"f8b29de9130a9c7e0d2373b57abcb37f0efe3c7a",
"38a3f26f2981ae9e7532c37f7bf32dd07e9f0323"
],
"paperAbstract": "Dynamic programming languages are becoming increasingly popular, and this motivates the need for just-in-time (JIT) compilation to close the productivity/performance gap. Unfortunately, developing custom JIT-optimizing virtual machines (VMs) requires significant effort. Recent work has shown the promiseofmeta-JITframeworks, which abstract the language definition from the VM internals. Meta-JITs can enable automatic generation of high-performance JIT-optimizing VMs from high-level language specifications. This paper provides a detailed workload characterization of meta-tracing JITs for two different dynamic programming languages: Python and Racket. We propose a new cross-layer methodology, and then we use this methodology to characterize a diverse selection of benchmarks at the application, framework, interpreter, JIT-intermediate-representation, and microarchitecture level. Our work is able to provide initial answers to important questions about meta-tracing JITs including the potential performance improvement over optimized interpreters, the source of various overheads, and the continued performance gap between JIT-compiled code and statically compiled languages.",
"pdfUrls": [
"http://www.csl.cornell.edu/~cbatten/pdfs/ilbeyi-mtwc-iiswc2017.pdf",
"http://doi.ieeecomputersociety.org/10.1109/IISWC.2017.8167760"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/0343ae9ab99d0cbd719baf0d2cc1b82425f3664a",
"sources": [
"DBLP"
],
"title": "Cross-layer workload characterization of meta-tracing JIT VMs",
"venue": "2017 IEEE International Symposium on Workload Characterization (IISWC)",
"year": 2017
},
"0359692cf53e0b484f1c2e7048c15cc7f3b5f605": {
"authors": [
{
"ids": [
"39109639"
],
"name": "Victor B. F. Gomes"
},
{
"ids": [
"3272157"
],
"name": "Martin Kleppmann"
},
{
"ids": [
"34791251"
],
"name": "Dominic P. Mulligan"
},
{
"ids": [
"2619693"
],
"name": "Alastair R. Beresford"
}
],
"doi": "10.1145/3133933",
"doiUrl": "https://doi.org/10.1145/3133933",
"entities": [
"Algorithm",
"Computer",
"Computer Networks (journal)",
"Conflict-free replicated data type",
"Correctness (computer science)",
"Distributed computing",
"Dynamic array",
"Eventual consistency",
"Formal system",
"HOL (proof assistant)",
"Increment and decrement operators",
"Interactive proof system",
"Isabelle",
"Network model",
"Proof assistant",
"Replication (computing)",
"Verification and validation",
"XACML"
],
"id": "0359692cf53e0b484f1c2e7048c15cc7f3b5f605",
"inCitations": [],
"journalName": "PACMPL",
"journalPages": "109:1-109:28",
"journalVolume": "1",
"outCitations": [
"d4b133c946a9105dde49c820a09216dcce8f1130",
"a3bea602dc20a1aa20ed1d8ed46325750d6f2b7e",
"7f26c079f1bcddfcb5f6a87ae1f8bc055520404a",
"32581fc444da1dc63c457eff347915bb177d6f09",
"322fe70408d33e72403d67f1aee6ac2772793390",
"2f9a41495f7eb27f22b43ccf24901a2b39c2d9b9",
"23346a18e78062e586cab22195819eb0f18ffc66",
"a1109cb113db04d9fd0eb2ec3c5daefb0d5d9df3",
"16c35dcacb9f1517769dac709e7a1ca4d80dcb46",
"09d1a6f5a50a8c3e066fb05a8833bc00663ada0e",
"078a991394551a1881d11beef0351887bb8ddb1d",
"17243e42e572c1a823eb0a7c9c3b871eb2136137",
"172514edf345a2aa62143e4a6e99f49eb795ba88",
"06e04a7a24100dbc0f72f22bc8e6dde4b2a27d8b",
"8470ae40470235604f40382aea4747275a6f6eef",
"7e8348f39f019817d4cf5389111974bc0e31245f",
"047a91395070abb5c75de446883aa18c52eb3274",
"2478af7c3aa8dd0f2c22bb3ca136ef892931ff75",
"03864c9e57d8975efeea20094b561bc37df229f3",
"0b86da5fba3491f5c07f671097d548aecb6f8776",
"4d4f8e9f721f191b76cfa6c6a9b1e5b5739b0526",
"0dff42b9d6b3444c3405cdb93a83345ff2f8831d",
"7536e9d7d8976093bb92445fac782e9bfaca7191",
"0ea5ac1eb04bcf16a8856d886be45ec90044a4c3",
"b66b109a3e63c548a1c8285b7262f7d48e87a90e",
"b35a1bb41a364b1b39722b533c39776a978c646a",
"838ea5698990157359168d4b97c1bc3b053269fb",
"f82c25d2b79a37664c9c6fc92a446572f4e407cf",
"369c52d8214b73a86b1e3f31d287823ea91884d6",
"45b07b0a3d4f1dc7f1be523889097be072d5f0ec",
"6a313d12c90b01efae531e70f8d0cd1d1e8565ae",
"028aefb5dc972111e95cb126df67791545895ae1",
"dc2d652bc6ba61a7e90a7921e1e4f813af8c3814",
"1a8a74c22941f90df6350aed258867a196753f1d",
"afe0c966797f9d362b9b77482061e1a90fd9e075",
"0478670e9c2be6a2fb7f017e94e21579ab7a570d",
"1d9538531ee7457e356e089004f9f570eb84cc0d",
"a81ffabb32f6ce1f70d25c625da27d3138412c3a",
"3e8396d977df0996a4461fe7477bc5661a2058a7",
"7b3533216d5064660458d3754a18fc69f8fbeba0",
"54666a6fefb37de6146b58ae732abcf4a2351975",
"d8df9824072e8c0368fff82c85c61498870465ca",
"f8ab904126cd5f0e1f407069f9b6e522d4156007",
"639a13b45b39be8ecabe2d49040a1f502384913e",
"372736b3d94837e91fd0b19369e5104873b6d77d",
"a2e51e20bf78f26524b112b5c8420aca42cfaeab",
"272b90fb84bcffc5b1634d048fda9e355f15e6f5",
"6f164cc777efdf08748c96e5be185f69a8f01cd8",
"1f6226cad38c791e91fa1bff905c66e7d421847a",
"fe2cfc28b4872fd057669f28b9e8a5d8f4d8b704",
"0804ed47a40fbe6deb5ce93efe551086695ae393",
"1936d49c95cf6454c159262da89851cdf5f9588d",
"6983eec030b05bd4825ede9049094f351d880b92",
"efc501b37b9993945f395abc816befceb569a434"
],
"paperAbstract": "Data replication is used in distributed systems to maintain up-to-date copies of shared data across multiple computers in a network. However, despite decades of research, algorithms for achieving consistency in replicated systems are still poorly understood. Indeed, many published algorithms have later been shown to be incorrect, even some that were accompanied by supposed mechanised proofs of correctness. In this work, we focus on the correctness of Conflict-free Replicated Data Types (CRDTs), a class of algorithm that provides strong eventual consistency guarantees for replicated data. We develop a modular and reusable framework in the Isabelle/HOL interactive proof assistant for verifying the correctness of CRDT algorithms. We avoid correctness issues that have dogged previous mechanised proofs in this area by including a network model in our formalisation, and proving that our theorems hold in all possible network behaviours. Our axiomatic network model is a standard abstraction that accurately reflects the behaviour of real-world computer networks. Moreover, we identify an abstract convergence theorem, a property of order relations, which provides a formal definition of strong eventual consistency. We then obtain the first machine-checked correctness theorems for three concrete CRDTs: the Replicated Growable Array, the Observed-Remove Set, and an Increment-Decrement Counter. We find that our framework is highly reusable, developing proofs of correctness for the latter two CRDTs in a few hours and with relatively little CRDT-specific code.",
"pdfUrls": [
"https://www.cl.cam.ac.uk/research/dtg/www/files/publications/public/mk428/oopsla.pdf",
"https://arxiv.org/pdf/1707.01747v3.pdf",
"http://martin.kleppmann.com/papers/crdt-isabelle-oopsla17.pdf",
"http://dominic-mulligan.co.uk/wp-content/uploads/2017/10/oopsla.pdf",
"https://arxiv.org/pdf/1707.01747v1.pdf",
"https://arxiv.org/pdf/1707.01747v2.pdf",
"http://arxiv.org/abs/1707.01747",
"http://doi.acm.org/10.1145/3133933"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/0359692cf53e0b484f1c2e7048c15cc7f3b5f605",
"sources": [
"DBLP"
],
"title": "Verifying strong eventual consistency in distributed systems",
"venue": "PACMPL",
"year": 2017
},
"036a89c1652d47ccdde91a5296de7c83042dbac5": {
"authors": [
{
"ids": [
"32434924"
],
"name": "Gunnar Hartung"
},
{
"ids": [
"32299356"
],
"name": "Max Hoffmann"
},
{
"ids": [
"40330664"
],
"name": "Matthias Nagel"
},
{
"ids": [
"35135100"
],
"name": "Andy Rupp"
}
],
"doi": "10.1145/3133956.3134071",
"doiUrl": "https://doi.org/10.1145/3133956.3134071",
"entities": [
"Authentication and Key Agreement (protocol)",
"Circular definition",
"Cryptography",
"Hall effect",
"Privacy",
"Reputation system",
"Smartphone",
"Universal instantiation",
"Usability"
],
"id": "036a89c1652d47ccdde91a5296de7c83042dbac5",
"inCitations": [],
"journalName": "",
"journalPages": "1925-1942",
"journalVolume": "",
"outCitations": [
"02dc2a93a48d38deae9f1369d5b33ce98af2a3f2",
"135e48980bc7c942ae8b2c73f16e5f0d892d140a",
"2fb12422f6caa8ef7acf6e0ad5ac4d300cd01dfe",
"0326080fe13d3c41037434f89868a69e11d15580",
"22a0fdd14ec069733d15ef7caf7145150e7c32b5",
"887eae50cef6fd228c59d47b80887b35782a9a2a",
"2a7ca2ed7ff59689af8bd9d9b93b6a9974413c9b",
"2e84d658c77869341a5b439f216476607c3f8fea",
"0d526d3ed49943b302bbbe6747dd3484c7d706af",
"76ff3f01a258575d70cd8bf7646e0daf87c4ebf5",
"0aeb21de164e5c4567bfaa7f787fff8b42670429",
"38cc07e87baf5600a3301f37f4cdef423c30eb45",
"259424f10f76729aa5bd18977f8b92a44a09b308",
"dd85a3178c93cdad7102b524f15355a9cc928b00",
"2b26cf1eab78d9f9c687073af36769e72aa3cc8b",
"09645ab4f68291faf6a79107cdcb6da7f5a9a159",
"1c4a5b630bc4e13bd0714132c9d22923c81d5108",
"06bcae889904556263b47847080531a848febd73",
"83c6e0c91a5e1ca8becb32fdd9bdd95997495535",
"06a1d8fe505a4ee460e24ae3cf2e279e905cc9b0",
"8405ddb312b09905dfe1a7f54f2d846cc34c9abb",
"14ee6a52b24d2f6160865871284421a2fbcbb497",
"32cc3fd437950a098d6e93ae755fc6571554a955",
"1144078fe05a113c02d068962be9d17d0f2b9e53",
"751ada5a83c0dc6e5dfc527fff0786b1ffda8a67"
],
"paperAbstract": "Black-box accumulation (BBA) has recently been introduced as a building-block for a variety of user-centric protocols such as loyalty, refund, and incentive systems. Loosely speaking, this building block may be viewed as a cryptographic \"piggy bank\" that allows a user to collect points (aka incentives, coins, etc.) in an anonymous and unlinkable way. A piggy bank may be \"robbed\" at some point by a user, letting her spend the collected points, thereby only revealing the total amount inside the piggy bank and its unique serial number.\n In this paper we present BBA+, a definitional framework extending the BBA model in multiple ways: (1) We support offline systems in the sense that there does not need to be a permanent connection to a serial number database to check whether a presented piggy bank has already been robbed. (2) We enforce the collection of \"negative points\" which users may not voluntarily collect, as this is, for example, needed in pre-payment or reputation systems. (3) The security property formalized for \\bbap schemes is stronger and more natural than for BBA: Essentially, we demand that the amount claimed to be inside a piggy bank must be exactly the amount legitimately collected with this piggy bank. As piggy bank transactions need to be unlinkable at the same time, defining this property is highly non-trivial. (4) We also define a stronger form of privacy, namely forward and backward privacy. Besides the framework, we show how to construct a BBA+ system from cryptographic building blocks and present the promising results of a smartphone-based prototypical implementation. They show that our current instantiation may already be useable in practice, allowing to run transactions within a second---while we have not exhausted the potential for optimizations.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3133956.3134071",
"https://homepage.ruhr-uni-bochum.de/andy.rupp/papers/bbap_ccs17.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/036a89c1652d47ccdde91a5296de7c83042dbac5",
"sources": [
"DBLP"
],
"title": "BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection",
"venue": "CCS",
"year": 2017
},
"037070f1e362b008254f45467c861db0b7406b04": {
"authors": [
{
"ids": [
"17853037"
],
"name": "Ryan G. Scott"
},
{
"ids": [
"8517341"
],
"name": "Omar S. Navarro Leija"
},
{
"ids": [
"1739688"
],
"name": "Joseph Devietti"
},
{
"ids": [
"31778078"
],
"name": "Ryan Newton"
}
],
"doi": "10.1145/3133897",
"doiUrl": "https://doi.org/10.1145/3133897",
"entities": [
"Batch processing",
"Binary file",
"Bioinformatics",
"Bioinformatics",
"Central processing unit",
"Entry point",
"Haskell",
"Monad (functional programming)",
"Parallel computing",
"Pipeline (computing)",
"Process (computing)",
"Sandbox (computer security)",
"Scheduling (computing)",
"Shared memory",
"Software build",
"Software system",
"System call",
"Type system",
"Xojo"
],
"id": "037070f1e362b008254f45467c861db0b7406b04",
"inCitations": [],
"journalName": "PACMPL",
"journalPages": "73:1-73:26",
"journalVolume": "1",
"outCitations": [
"452b7f1eb4899fb83d6bc21a180643c4433684bb",
"1f33e83905ee40dfeeacd6c04f64c1af71c2b7fb",
"1d15930cd9e4ececf22fd96bf9ba52f12dc0665e",
"3b62c1f19254820c75dd0011f038d7aae04b3414",
"a49c9057fc3912d3e9bea3d6e2cd39e57561cec3",
"97a236836489b48b76b0fe455dcbe6978c8e5a4a",
"0fb659af82f2277c8a62ac888f4bfd01570e5470",
"217fa6474533b7ca0981aaa8600543afb308ab66",
"771b52e7c7d0a4ac8b8ee0cdeed209d1c4114480",
"7e40209617935569a12a104c354eabf029a3b537",
"8723e38978fe1e48c9c219cd6e9bd88d5cd237a8",
"5ac46b7c320aabe83eacb1a91c055939c1941dac",
"146a0ef96c41beb15182e7e3f48e8d7c25d70b62",
"233087525268aa2353b7feb77054a7d5905042c7",
"3313e04736e4245abf018fc0799002031fcb7764",
"0a8d3007ce2fbd15ee15e7c4440526ad326adcb6",
"be7536d9baaef7ccdbff845f8e98c136b4c80bb3",
"7021ff3efab9bdfeda591f78e42f54b1482fb39e",
"ab2d1fd9a27039cb4dcdf91422ca54e6ca38dbaf",
"50edb17bb311757206a60801a25dd56ca2b342dd",
"feb5db279d43f6affb474398f96bb5c910aa2340",
"498bb6d4bbff79b97695cd65b03a787bf8c4388a",
"23affb01412312341fb336943756800c0bf2468c",
"2a85b683073c2c8b762079c52a0d54392b243afb",
"11fb91cf78700428342aa3ed6636f655bb97ca33",
"8a0af8ae748210ef571d074362b552af571e6d33",
"127b35b01f4d1186a0707aed4fdd50eb00ae2ea2",
"03ad81f6276792a78312471429fc9495b89a1ffc",
"1d9e276dc901978f5e0bc6f6d9898b5777d1b86a",
"984d45494026f7a2fc9c4193ee65b5ef35d937ad",
"023e3bcd1c1d374f894836dc7dce688bdb406817",
"13f6ddd72bcf62dcc13cf4515be29d48948b9693",
"0065c8c9bf4961d637a69e26a8045074929a8cd3",
"63c46be541fa2f18022d00c3cf15eb5342b00b01",
"0d69f96cf1927ea2993608f839752de0314c0347",
"55edf8d36576d63851d8f5739e8d0b6b094fe5cf",
"060c491cff220d6ad73b6bb9e09e261ca508d7e0",
"fcae2fcef595059529ebe553431ab41b44062ae4",
"49f3ef5baf15bc044d79c96e3ef19ecf952169ac",
"b44a4cfd880ecd47978fda1738479179651304f8",
"ca80639f3309251ab3b626da37cc2d700430e1e5",
"02f1d9f5ec925dee3f5d483585f6beab0660aa0f",
"0db9636ace0830b8b5e86b031a7a86d621446bd9",
"7f66a291f885617b1c975c0cae7ad0eb978f2aa5",
"f4e10c197040252beeabcd3393c81062e60e7475",
"08a7ace62570baad1cb40807c71e7347508ebabf"
],
"paperAbstract": "Achieving determinism on real software systems remains difficult. Even a batch-processing job, whose task is to map input bits to output bits, risks nondeterminism from thread scheduling, system calls, CPU instructions, and leakage of environmental information such as date or CPU model. In this work, we present a system for achieving low-overhead deterministic execution of batch-processing programs that read and write the file system—turning them into pure functions on files. \n We allow multi-process executions where a permissions system prevents races on the file system. Process separation enables different processes to enforce permissions and enforce determinism using distinct mechanisms. Our prototype, DetFlow, allows a statically-typed coordinator process to use shared-memory parallelism, as well as invoking process-trees of sandboxed legacy binaries. DetFlow currently implements the coordinator as a Haskell program with a restricted I/O type for its main function: a new monad we call DetIO. Legacy binaries launched by the coordinator run concurrently, but internally each process schedules threads sequentially, allowing dynamic determinism-enforcement with predictably low overhead. \n We evaluate DetFlow by applying it to bioinformatics data pipelines and software build systems. DetFlow enables determinizing these data-processing workflows by porting a small amount of code to become a statically-typed coordinator. This hybrid approach of static and dynamic determinism enforcement permits freedom where possible but restrictions where necessary.",
"pdfUrls": [
"http://ryanglscott.github.io/talk-slides/mcdpbp-wonks.pdf",
"http://doi.acm.org/10.1145/3133897",
"http://ryanglscott.github.io/talk-slides/mcdpbp-oopsla.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/037070f1e362b008254f45467c861db0b7406b04",
"sources": [
"DBLP"
],
"title": "Monadic composition for deterministic, parallel batch processing",
"venue": "PACMPL",
"year": 2017
},
"0378a60ebb240f3de23e763ebabe4daef3f02fe8": {
"authors": [
{
"ids": [
"2871106"
],
"name": "Xiaoen Ju"
},
{
"ids": [
"2704919"
],
"name": "Hani Jamjoom"
},
{
"ids": [
"1730051"
],
"name": "Kang G. Shin"
}
],
"doi": "10.1145/3084446",
"doiUrl": "https://doi.org/10.1145/3084446",
"entities": [
"Abstraction layer",
"Algorithm",
"Computation",
"Graph (abstract data type)",
"Graph state",
"Speedup",
"Unified Extensible Firmware Interface",
"Vertex (graph theory)",
"Vertex separator"
],
"id": "0378a60ebb240f3de23e763ebabe4daef3f02fe8",
"inCitations": [
"d1407cc4a56515e135187a62f934e1156642e568"
],
"journalName": "",
"journalPages": "5",
"journalVolume": "",
"outCitations": [
"1521d39088b203ddac981d10d214f463449ae95b",
"b1cd460c000d5e9a37f2f4732428d3cf16ff9ffd",
"2b0cc03aa4625a09958c20dc721f4e0a52c13fd0",
"1e8c283cedbbceb2a56bf962bc0a86fd40f1cea6",
"2138776f89bccc9362b239a6d33018ca2a847960",
"7b44ab10de53f89890580f0f68717e92ff3225cf",
"0521af8f07ba4105a6eebbebd0057a2159c83e2c",
"1156f60e40548096df49528b1342bb3e88b0f378",
"0e3253e5ca318e70d4968a45f8d41f88dbffd9e3",
"0ad8e89091eed09217e66adc98136126addc2619",
"2ae3ac3f7463f838c38e6ca250ca294e813529f2",
"141004dee9e799b40bfaf50b4a72618613137250",
"4e4d17113a179174d2711a7b07c6fba0c4fe1c05",
"3726c60552263e648c6856679e672de2e1c110e5",
"6de3915df2b9927a78f213629f3bcb052ec21e8b",
"9359fa64a59105e93dd6ca9f5aa35e0d9f9055be",
"423befa4222b5b54cf63f0879e99243b0e5139b0",
"24e8be45a2b2a30a01b7e9f1502e7bd6a7870e7a",
"6a888f3dd0a17b0241be61daa378ba6caffa6617",
"2b9e6181502369199bd89691a27f89bdbaac36e4",
"09031aa6d6743bebebc695955cd77c032cd9192f",
"080f44d89bf6f4404f476ffec8d2f8ad3f60e07d",
"ef9d9821df55442f039b128bb5cef2b41ab2cadc",
"272550f6745acba4da9a10ab29ba738cb2c19d3b",
"4dc578364f357b993b5554b9181c90c84aa6b4d1",
"b78c04c7f29ddaeaeb208d4eae684ffccd71e04f",
"047565a5b15fbebc78e0bc7d8ca823237dac9de2",
"0546fa6622b8b8db8527be777a692d88c5c037b0",
"3486aeaf540c48952120fe853d672af984f40a6a",
"0706356c9ab6014d6b04577d38289ea8328291a5",
"87f931f4d8aad3b71b8261703bbcfa18c1293181",
"04ab17e6944d8d3abf113cdf5495701c6c358448",
"0de0c3240bda7972bd0a3c8369ebc4b4f2e4f9c2",
"95141db914fb1074304d4075d61ca79c037b771f",
"0f014693b25d9846025219b88f8ca480fac68b0a",
"22e98d48c4cb573adec6fa875d18d14955113456"
],
"paperAbstract": "Despite their widespread adoption, large-scale graph processing systems do not fully decouple computation and communication, often yielding suboptimal performance. Locally-sufficient computation-computation that relies only on the graph state local to a computing host-can mitigate the effects of this coupling. In this paper, we present Compute-Sync-Merge (CSM), a new programming abstraction that achieves efficient locally-sufficient computation. CSM enforces local sufficiency at the programming abstraction level and enables the activation of vertex-centric computation on all vertex replicas, thus supporting vertex-cut partitioning. We demonstrate the simplicity of expressing several fundamental graph algorithms in CSM. Hieroglyph-our implementation of a graph processing system with CSM support-outperforms state of the art by up to 53x, with a median speedup of 3.5x and an average speedup of 6x across a wide range of datasets.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3084446",
"https://kabru.eecs.umich.edu/wordpress/wp-content/uploads/hieroglyph_sigmetrics17.pdf",
"http://doi.acm.org/10.1145/3078505.3078589"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/0378a60ebb240f3de23e763ebabe4daef3f02fe8",
"sources": [
"DBLP"
],
"title": "Hieroglyph: Locally-Sufficient Graph Processing via Compute-Sync-Merge",
"venue": "SIGMETRICS",
"year": 2017
},
"0387a5caf19b887046473cc7dd317da0ea1378a6": {
"authors": [
{
"ids": [
"28130536"
],
"name": "Martin B\u00e4ttig"
},
{
"ids": [
"1735078"
],
"name": "Thomas R. Gross"
}
],
"doi": "10.1145/3018743.3018747",
"doiUrl": "https://doi.org/10.1145/3018743.3018747",
"entities": [
"Benchmark (computing)",
"Concurrency (computer science)",
"Concurrency control",
"DACAPO",
"Database transaction",
"Lock (computer science)",
"Naivety",
"Overhead (computing)",
"Programmer",
"Programming language",
"Secure by design",
"Shared memory",
"Side effect (computer science)",
"Smart Battery",
"Software transactional memory",
"Static program analysis",
"Transactional memory"
],
"id": "0387a5caf19b887046473cc7dd317da0ea1378a6",
"inCitations": [
"e45dea6588d1de0a23618e019031e67eedeeee26"
],
"journalName": "",
"journalPages": "299-312",
"journalVolume": "",
"outCitations": [
"4b328006a699106fa809cc610b799a2d03bc77a4",
"6756d3e0669430fa6e006754aecb46084818d6b6",
"23b0d41c138979705494222035cd07fc95a5faf8",
"2bf4940710deb2571e93b1c922e8e7452e854afd",
"6850ed761f8c2c796019b6359b6190fe6b2d2b42",
"d2268a9ae1607965c0cd6a85da6194e630cb9496",
"e6961c43facdd83f3efa7bc77bfcb76ac2b1553a",
"280b2b0bc4172756001ceda89cd102ba4afbbfe3",
"171695dfdb42ea09ea3207f0f5fd11985c02e671",
"a10fde829f83a5e5c101de85dd78e330c9c33d1b",
"100671bc2d560d42d85f75bdf5deb124cb79d2e2",
"5987b948677c5528a061890f4df507c85a5a97b5",
"2295c028bb44dfdbf185876d04a0d37fa14a89d8",
"023ba3dff9e17a15ae8448ec6cacc3e9a5ff116a",
"2ac3c4537be12b52f9e60d140ccf5621dc43cb75",
"0065c8c9bf4961d637a69e26a8045074929a8cd3",
"0f1042350e2c97117620d9f5182f94262f1f5ac0",
"ab3f531f3c6e4920c9ba4b437d997c0ce797f5b0",
"00aee6e171c40e54ec7eb2240192820871ca5ded",
"13e8df0a6afd8565ef644c87f4cb94aa183bc113",
"7e40209617935569a12a104c354eabf029a3b537",
"a7b5b9d048572577c82461ce3c9330f1875bfaf9",
"09ed565e84057123c15ab12b885c235d1f241aed",
"34a97a016e6c419eb4b1005a7306d45a775a407b",
"4adadc82e4f6db798164438ca655d0fc0252cf17",
"76057a3c7b489290afd4a4dccf09b623502619fd",
"13f7c5807452ae602046582a385c0fb544ec5de1",
"f1e8792d102b260c0b6e2808d416df286121c574",
"264cd229ac4bbdf655d5e7b44563bf84bd846364",
"46e61ad29ab20618fb551afbc00ebb8eb4e9be21",
"25883553e5315e32194614676f11bb012db6dafd",
"6f705b791b4b951a273f0c3ced886a52daa8f5aa",
"027eb436c35c7e293e7ebc565163cb54c05fe2e9"
],
"paperAbstract": "We explore a programming approach for concurrency that synchronizes all accesses to shared memory by default. Synchronization takes place by ensuring that all program code runs inside atomic sections even if the program code has external side effects. Threads are mapped to atomic sections that a programmer must explicitly split to increase concurrency.\n A naive implementation of this approach incurs a large amount of overhead. We show how to reduce this overhead to make the approach suitable for realistic application programs on existing hardware. We present an implementation technique based on a special-purpose software transactional memory system. To reduce the overhead, the technique exploits properties of managed, object-oriented programming languages as well as intraprocedural static analyses and uses field-level granularity locking in combination with transactional I/O to provide good scaling properties.\n We implemented the synchronized-by-default (SBD) approach for the Java language and evaluate its performance for six programs from the DaCapo benchmark suite. The evaluation shows that, compared to explicit synchronization, the SBD approach has an overhead between 0.4% and 102% depending on the benchmark and the number of threads, with a mean (geom.) of 23.9%.",
"pdfUrls": [
"http://dl.acm.org/citation.cfm?id=3018747"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/0387a5caf19b887046473cc7dd317da0ea1378a6",
"sources": [
"DBLP"
],
"title": "Synchronized-by-Default Concurrency for Shared-Memory Systems",
"venue": "PPOPP",
"year": 2017
},
"038ec03e66ec8ed2593a4a7481b64e8f2bf1e9df": {
"authors": [
{
"ids": [
"3029699"
],
"name": "Chaoshun Zuo"
},
{
"ids": [
"40097032"
],
"name": "Qingchuan Zhao"
},
{
"ids": [
"34472423"
],
"name": "Zhiqiang Lin"
}
],
"doi": "10.1145/3133956.3134089",
"doiUrl": "https://doi.org/10.1145/3133956.3134089",
"entities": [
"Access control",
"Authentication",
"Authorization",
"Best practice",
"E-services",
"Login",
"Mobile app",
"Online service provider",
"Server (computing)",
"Traffic analysis",
"User profile",
"Vulnerability (computing)"
],
"id": "038ec03e66ec8ed2593a4a7481b64e8f2bf1e9df",
"inCitations": [
"1961c82250cf02079c34d3f4b990ae8f81c06e15"
],
"journalName": "",
"journalPages": "799-813",
"journalVolume": "",
"outCitations": [
"9b8b6ad7c3bbbdec2cb41d95fc8262138607abe2",
"23cbb38a3da69c710ea630c417db7e8256ff183a",
"129570333e7631456c70354113a43fe6eb193329",
"101245256e1a36736045ac9010b0cb5c058ea04f",
"587358f81630929d7c03da065cb0804756fc3b6d",
"17138b471f2dade960cd3969db0c08b623b33797",
"6c57b758334576abb98c703eb013ddb36888fa7f",
"9d4ae199975439acb943b3635c7fdb0c6a382910",
"81a502b52485e52713ccab6d260f15871c2acdcb",
"2be20b92cd27c47c11ad5b8ecf451db84cd768ad",
"13e185c42cf59a3ca4db0e47564d17b8f5801a3e",
"32bd7b680830b3e168795ccfe650ceeb0edf7878",
"2f35c2bf57242f5a755ac82635605100c14319da",
"2c5a5a2ab4f7b63523981ac790399c3ef2f08014",
"479949999394d7db736d7088a746e5159bee5894",
"3c7cf150b5fbbdce6d937eccc1ab05aeb77d0566",
"1370b7ec6cb56b0ff25f512bd673acbab214708c",
"c285f9f186a68f30dba6274166419a72a810421e",
"94d0e8b118efecb9f5b2056d84bf22253a2fb63c",
"0b7f62a2ac217e035e0cd9cb73d2de4fb6135af5",
"0fd2467de521b52805eea902edc9587c87818276",
"16b2d6f76febe56ac1fed2a9dc266b2409bfb7ed",
"56c6ed3ea8eaaa12052636ec37b283d6c797bcbf",
"590b1fda209259f3502018bb2dfc4b80191c842e",
"51e53b7148cf7387d90f3048f14f721367e283f5",
"a73f2dab1e9caae57bbbffe551dcefdf00e43f3e",
"482e01ba5d29de96842c3e3daebcbad29945e4c0",
"845bdb47a01b5dcb42e3f0a8b57a672e49c813a2",
"30af8702c6c9f69a64d176d61784b4d313eb3e26",
"03f628dbb91c226011fa11a964025177da7824ad",
"2e61fc82bcbdeaa0f8778d51c166e904c04ed34e",
"1a7160058a87a2a7dedd2f6e95f25892ec4f3d35",
"d5f8c9b83c05e258f1a6b5e2ec3e7687bd5348f0",
"4333b14ecaf8cd2b6fcb7f1a8c881ccc104c3778",
"313274e8a6ad34c7c24b35979ccea03ce145bfd1",
"06edea3041bf20833b8c71396c46357247dc08d8",
"1c126c0ddc80c1fa177adb9ef32bdf84e0306846"
],
"paperAbstract": "When accessing online private resources (e.g., user profiles, photos, shopping carts) from a client (e.g., a desktop web-browser or a mobile app), the service providers must implement proper access control, which typically involves both authentication and authorization. However, not all of the service providers follow the best practice, resulting in various access control vulnerabilities. To understand such a threat in a large scale, and identify the vulnerable access control implementations in online services, this paper introduces AuthScope, a tool that is able to automatically execute a mobile app and pinpoint the vulnerable access control implementations, particularly the vulnerable authorizations, in the corresponding online service. The key idea is to use differential traffic analysis to recognize the protocol fields and then automatically substitute the fields and observe the server response. One of the key challenges for a large scale study lies in how to obtain the post-authentication request-and-response messages for a given app. We have thus developed a targeted dynamic activity explorer to perform an in-context analysis and drive the app execution to automatically log in the service. We have tested AuthScope with 4,838 popular mobile apps from Google Play, and identified 597 0-day vulnerable authorizations that map to 306 apps.",
"pdfUrls": [
"http://www.utdallas.edu/~zxl111930/file/CCS17a.pdf",
"http://www.utdallas.edu/~zhiqiang.lin/file/CCS17a-slides.pdf",
"http://doi.acm.org/10.1145/3133956.3134089"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/038ec03e66ec8ed2593a4a7481b64e8f2bf1e9df",
"sources": [
"DBLP"
],
"title": "AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services",
"venue": "CCS",
"year": 2017
},
"03a6e24e5423b4edbd1684779c60f3f70b57a7bb": {
"authors": [
{
"ids": [
"1709007"
],
"name": "Meng Jin"
},
{
"ids": [
"1683855"
],
"name": "Yuan He"
},
{
"ids": [
"1747903"
],
"name": "Xin Meng"
},
{
"ids": [
"4050884"
],
"name": "Yilun Zheng"
},
{
"ids": [
"2068791"
],
"name": "Dingyi Fang"
},
{
"ids": [
"2466164"
],
"name": "Xiaojiang Chen"
}
],
"doi": "10.1145/3117811.3117828",
"doiUrl": "https://doi.org/10.1145/3117811.3117828",
"entities": [
"Data rate units",
"Denial-of-service attack",
"Experiment",
"Flip graph",
"Graphical model",
"Mathematical optimization",
"Throughput"
],
"id": "03a6e24e5423b4edbd1684779c60f3f70b57a7bb",
"inCitations": [],
"journalName": "",
"journalPages": "275-287",
"journalVolume": "",
"outCitations": [
"760e8ea2cbe5750db0aee37ca36925955e8bef79",
"05fe031e53dd8990e7076a91277cb2b74e22b811",
"498d2ed40427eeb78799fa96ac0f5a58c6648d05",
"5a0e84b72d161ce978bba66bfb0e337b80ea1708",
"05eca7b08c495020d499716fb90a37ba0715f7ff",
"644e1494176c0ff33fba8f745087a56cafa1ecaf",
"03ca2b2494aa4977bfef1d30d314490feb68760c",
"1413b78c713429ea00dbd70a49e0d2e606a82be9",
"2b3aabf4173e515a6e9bbc3410cd5dd9c87549ba",
"1c581311f18c251a5c39ac195e6265e52d639bfe",
"0847978726acaaa27aca91f2053350b818f1fe53",
"82802e411495bbad77fa2415c6d4633dde180764",
"3c3a0a0ef5ff52d9de1e45b88e9228d0972d2b45",
"2d12b6189a0681b933f9a96b8ab14daac2bcfd73",
"015ce3f823dac9e78ab3ff1f63e67e5a00145ac6",
"0c9b68449b6241478ba38c2af220b393db86e206",
"1879bf3d2e843155056344a8f6a6cd27b10e0668",
"9c84d7af3db4fc90e872556c936953aae48ea1a1",
"61276c0d646510e4665246ff7504d98d257cbbc2",
"a361f606d62e0be40df91b143f7f7086d0b249d4",
"4618dc76f77c3d09510f0530f1805dd7702f5b5c"
],
"paperAbstract": "With parallel decoding for backscatter communication, tags are allowed to transmit concurrently and more efficiently. Existing parallel decoding mechanisms, however, assume that signals of the tags are highly stable, and hence may not perform optimally in the naturally dynamic backscatter systems. This paper introduces FlipTracer, a practical system that achieves highly reliable parallel decoding even in hostile channel conditions. FlipTracer is designed with a key insight: although the collided signal is time-varying and irregular, transitions between signals' combined states follow highly stable probabilities, which offers important clues for identifying the collided signals, and provides us with an opportunity to decode the collided signals without relying on stable signals. Motivated by this observation, we propose a graphical model, called one-flip-graph (OFG), to capture the transition pattern of collided signals, and design a reliable approach to construct the OFG in a manner robust to the diversity in backscatter systems. Then FlipTracer can resolve the collided signals by tracking the OFG. We have implemented FlipTracer and evaluated its performance with extensive experiments across a wide variety of scenarios. Our experimental results have shown that FlipTracer achieves a maximum aggregated throughput that approaches 2 Mbps, which is 6x higher than the state-of-the-art.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3117811.3117828"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/03a6e24e5423b4edbd1684779c60f3f70b57a7bb",
"sources": [
"DBLP"
],
"title": "FlipTracer: Practical Parallel Decoding for Backscatter Communication",
"venue": "MobiCom",
"year": 2017
},
"03a7ecb0a3f1eff43ef7db66991ca37c7189d81c": {
"authors": [
{
"ids": [
"1898809"
],
"name": "Shaizeen Aga"
},
{
"ids": [
"1678884"
],
"name": "Satish Narayanasamy"
}
],
"doi": "10.1145/3079856.3080232",
"doiUrl": "https://doi.org/10.1145/3079856.3080232",
"entities": [
"Cryptographic primitive",
"Cryptography",
"Encryption",
"Memory bandwidth",
"Memory bus",
"Merkle tree",
"Oblivious ram",
"Overhead (computing)",
"Processor design",
"Random-access memory",
"Replay attack",
"Side-channel attack",
"Timing channel"
],
"id": "03a7ecb0a3f1eff43ef7db66991ca37c7189d81c",
"inCitations": [
"9d0c7a61c47d0db3181408ffdde5f140a5e07c0f",
"56ad278ca41d14386d558f259f6a8b98ae6e86d1",
"fcf8efb59680ef79bcca894947aa46578d2bbd8c",
"d9a6cfad15c6268b30da1f5b45f720b96ead1805",
"0d8952e0a65caf480228ede7e632201d5420e7b7",
"a6994ee043e174871983386d6a78a3f3be6c09da"
],
"journalName": "2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA)",
"journalPages": "94-106",
"journalVolume": "",
"outCitations": [
"5c40cdb6386021d68288e7158e1330ad3b8c223e",
"8c47b8884af7798ece246b9c561a35c5425aae2d",
"44d886f89cdbd4fdf5dd25d83b2d37deb7541bf7",
"8f1247646e29e07dddbec698f281d06cee87acbe",
"2b004e0484f4940fca341fa97ecb8ac94fe780a5",
"2200640161a8fe6ce3a03c7bad586e890f10679f",
"67f881ebc6df47f140dbf99308f1846851a9b434",
"487e6a85d55c3adbffcd3ce8032b150e90a25bf0",
"07b0b5d59ef09f33a40f30d3a2dec880029a5002",
"ec79422e0bfdb61d8b6d2a6ec5b2dfbcab970852",
"00ab25c6582d543932fccbb0f15fe93445f95d61",
"24706cbf8c48414ed66db6fbf223c47452f7cbdc",
"708a3c03556b5bc20b5bd8e58ef2f47f6a9fc7d2",
"4ce02fb69245a84d3ffceae20e596dcf0497508d",
"06bf84f98e7dd39be8d96eb67bafbf56d61bc715",
"56ad278ca41d14386d558f259f6a8b98ae6e86d1",
"72dfed87d3549369ae93dbbbfd371f88c4e344c8",
"3c4e907c07944cd55e800b4e55918adf8cb2a683",
"1d08bb92568d98319634fe2409a9eab085d68b60",
"2835808d700c88459ff21ce31ba3c4ef02778ddb",
"078b855c40fefabd766a09f23280c59feef21634",
"352a8957005dc5519b15ed1870751ec494d66395",
"114a4222c53f1a6879f1a77f1bae2fc0f8f55348",
"104eb3716d8b2d7e6d69805357d5b7fb87caff3e",
"570466e82fce883daef38047ff694c084fdcadec",
"3e74ae88cdaa33bf89136800258bde97ab397ec9",
"8a41c198449d0f30de5427fe753c6b10bbb7255d",
"5481a090d11f655a3b240dbcdb4f2133f4028c14",
"0eed5ca9fa62cf2008fa6e1bb0d729e510363a9a",
"a6cc2def07a1880a81003449e0f0f901da597b18",
"07272e31fb957e026a6bc36d55e412de26843c7f",
"6f45ab51391f1f0010ad54c06a47abaf208a2396",
"3b03935dfc89c0cad63e05976c21fef6c9fb4190",
"2b3cdf37bff57e29fb5aecc136603f16c855366b",
"8b04ea524cb6ced72868c120a00c4679d84be006",
"201213b124452451cd6f4f06bb94523aa861a60c",
"43dcd30e653b6a66efe18b78a9eed9c3bdeaaf23",
"a52945840b980adfef34466cb4186c7cda3b61e6",
"da42f505e5d9bf6e932adfe24677f12457da22f3",
"19218913ef99ba9acd2491d8bab1d154cb375fa3",
"92eaba06af12761b5c64b84e6028d21cd05af9dd",
"3ca369fa2cadb403db7ac5e75deefd9acbb10723",
"0a679d9d08231b2856fe648e6b331d8e6e46a1fa",
"5e4e0daea223658f8c96d7728bd32398680ebef3",
"4e8505919eb22265f107ebbeeee3fa78bf6d893a",
"21ddf1f7ab7e2cd2ae07073bf3238ce46314bac9",
"8f91eafaab7bd4803e0d064280a86df693674011",
"5ac7a4dca5509c9dee49d96b4c3c62cc1d0bb9dd",
"2065450d96aca38c79cad5172b58660765533650",
"0be09034895068cd359e93e0fbf4f61d6189974c"
],
"paperAbstract": "A practically feasible low-overhead hardware design that provides strong defenses against memory bus side channel remains elusive. This paper observes that smart memory, memory with compute capability and a packetized interface, can dramatically simplify this problem. InvisiMem expands the trust base to include the logic layer in the smart memory to implement cryptographic primitives, which aid in addressing several memory bus side channel vulnerabilities efficiently. This allows the secure host processor to send encrypted addresses over the untrusted memory bus, and thereby eliminates the need for expensive address obfuscation techniques based on Oblivious RAM (ORAM). In addition, smart memory enables efficient solutions for ensuring freshness without using expensive Merkle trees, and mitigates memory bus timing channel using constant heart-beat packets. We demonstrate that InvisiMem designs have one to two orders of magnitude of lower overheads for performance, space, energy, and memory bandwidth, compared to prior solutions.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3079856.3080232"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/03a7ecb0a3f1eff43ef7db66991ca37c7189d81c",
"sources": [
"DBLP"
],
"title": "InvisiMem: Smart memory defenses for memory bus side channel",
"venue": "2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA)",
"year": 2017
},
"03a97821f3f77490f1c775501762985f10cd7be8": {
"authors": [
{
"ids": [
"1933752"
],
"name": "Christoffer Dall"
},
{
"ids": [
"2175344"
],
"name": "Shih-Wei Li"
},
{
"ids": [
"1700208"
],
"name": "Jason Nieh"
}
],
"doi": "",
"doiUrl": "",
"entities": [
"ARM architecture",
"Architecture of Windows NT",
"Hypervisor",
"Kernel (operating system)",
"Linux",
"Linux",
"Multiplexing",
"Operating system",
"Protection ring",
"Virtual machine",
"X86",
"X86 virtualization",
"z/OS"
],
"id": "03a97821f3f77490f1c775501762985f10cd7be8",
"inCitations": [
"a027a5a5d021f8236678d730c74a71ab43ffebd3"
],
"journalName": "",
"journalPages": "221-233",
"journalVolume": "",
"outCitations": [
"905b27d6fe624a28fd6fdd04cf7139333e052030",
"067c7857753e21e7317b556c86e30be60aa7cac0",
"611cce8f8236c1de04c3217f4341c9e03cd8a1eb",
"0852a44c86db434e9b51c67704636791e9940487",
"71a2d8c473f13d0c664f751db97e81128281b1eb",
"7de2ed992aae322333c14e4ffad5b347f7a7016a",
"5016dedcbc51faec5f0aa0b5303a4e96c6e669de",
"07ebe9df86f0e6eb19fcdd03bbe9dd7f64ff887f",
"44d666999ca078e0fce6b5f2642a1c3e72ac87a1",
"0e003ed084cf22fff2cbb2d1a1b57894b7415a0c",
"423455ad8afb9b2534c0954a5e61c95bea611801",
"0b0422b5864ca1a25d6af274bad11c1b2fef1ed5",
"5e7567dc5c9922527e7ce5e4fd62981488a09829",
"73bded14fb8c3b4bd5c2ae554d704d3ad3ff907e",
"5b09fc2403507383e4000139ab845c67cf549675",
"17f1ff82aca7a592a8815e8169b6e2210bf6ae7a"
],
"paperAbstract": "Modern hypervisor designs for both ARM and x86 virtualization rely on running an operating system kernel, the hypervisor OS kernel, to support hypervisor functionality. While x86 hypervisors effectively leverage architectural support to run the kernel, existing ARM hypervisors map poorly to the virtualization features of the ARM architecture, resulting in worse performance. We identify the key reason for this problem is the need to multiplex kernel mode state between the hypervisor and virtual machines, which each run their own kernel. To address this problem, we take a fundamentally different approach to hypervisor design that runs the hypervisor together with its OS kernel in a separate CPU mode from kernel mode. Using this approach, we redesign KVM/ARM to leverage a separate ARM CPU mode for running both the hypervisor and its OS kernel. We show what changes are required in Linux to implement this on current ARM hardware as well as how newer ARM architectural support can be used to support this approach without any changes to Linux other than to KVM/ARM itself. We show that our redesign and optimizations can result in an order of magnitude performance improvement for KVM/ARM, and can provide faster performance than x86 on key hypervisor operations. As a result, many aspects of our design have been successfully merged into mainline Linux.",
"pdfUrls": [
"http://www.cs.columbia.edu/~cdall/pubs/atc17-dall.pdf",
"https://www.usenix.org/conference/atc17/technical-sessions/presentation/dall",
"https://www.usenix.org/sites/default/files/conference/protected-files/atc17_slides_dall.pdf",
"https://www.usenix.org/system/files/conference/atc17/atc17-dall.pdf"
],
"pmid": "",
"s2PdfUrl": "http://pdfs.semanticscholar.org/03a9/7821f3f77490f1c775501762985f10cd7be8.pdf",
"s2Url": "https://semanticscholar.org/paper/03a97821f3f77490f1c775501762985f10cd7be8",
"sources": [
"DBLP"
],
"title": "Optimizing the Design and Implementation of the Linux ARM Hypervisor",
"venue": "USENIX Annual Technical Conference",
"year": 2017
},
"03b95c1c6859ce4f792ac6995137a6cfab60670c": {
"authors": [
{
"ids": [
"2388951"
],
"name": "Rajiv Nishtala"
},
{
"ids": [
"2410518"
],
"name": "Paul M. Carpenter"
},
{
"ids": [
"1771770"
],
"name": "Vinicius Petrucci"
},
{
"ids": [
"1767107"
],
"name": "Xavier Martorell"
}
],
"doi": "10.1109/HPCA.2017.13",
"doiUrl": "https://doi.org/10.1109/HPCA.2017.13",
"entities": [
"64-bit computing",
"ARM architecture",
"ARM big.LITTLE",
"Data center",
"Dynamic frequency scaling",
"Dynamic voltage scaling",
"Experiment",
"Frequency scaling",
"Heuristic",
"Memcached",
"Quality of service",
"Reinforcement learning",
"Task manager"
],
"id": "03b95c1c6859ce4f792ac6995137a6cfab60670c",
"inCitations": [
"b6263576b4477fe3b5a86b1f18ec0949b8f52517"
],
"journalName": "2017 IEEE International Symposium on High Performance Computer Architecture (HPCA)",
"journalPages": "409-420",
"journalVolume": "",
"outCitations": [
"0831a5baf38c9b3d43c755319a602b15fc01c52d",
"41b380539d15a733e78c2b29388ffa8bef4bb370",
"08632fe2b934ed15d3499e7321282c81adc2c390",
"3000e77ed7282d9fb27216f3e862a3769119d89e",
"00919d778377ec8e4e037d8ebafc76c9de52db4b",
"da94b4bf79fcb32a3e24da9b152c1fd7efb199f5",
"72ee099a3b228972d6abba328ce9100892daf151",
"2c9b77a063a3459ed8f3be0c0066724a38e225e5",
"362d884ff43d8c7cd6bce184944cfc04cdd57c18",
"15dc663b6761d53e90415427d5a24cce1e0e38da",
"590bd345ef4b8f274af3363a52b7d8f518cdc08a",
"27f8ac77b89986f7a24f929b200b6a358b8f7d01",
"8b10b13fb495101d1e4eb768907cff05e3bd9315",
"3cb34f7a770836bcfeef28f844d670b8a014ffa8",
"0d683085618e654a173b3590c4d2b431569cbfb6",
"053825c0a1c111e76c18f28b6d8ae13b414f3bed",
"2db9bcd369e59837278be7e6ffb4c4a96b24fc35",
"17f820491ffb223d553a9efb73933abfd3db67c1",
"345803a2146d4906f3f3808841e8af136e5f38e8",
"3e74ae88cdaa33bf89136800258bde97ab397ec9",
"7a978f2902460e732c50c36a171deb11733df1fc",
"0a8cfe6bf63530d9ee402a6a6e1a7666008e43b7",
"45ee540d3b9b16ed9b5ad6ee034f3779b9561a73",
"2ea6e3243c9aa5d9910cf44c4f0e18002bf01638",
"0a80e3dce25d865e9fdf69da4d09cc8ac3398ff4",
"28f13ebe8e17fdb4c2500c515759a3ee0c2783ce",
"88dfee10842bbfd2ebc74980ab64c1cac5753883",
"2d8450ec56926a34fe1c25180f0b303c5cc67f2d",
"27c66ba59c76e737f863ba05b7099ad5788af836",
"23265cad4d3f6dd2db1d0f5e58286f3ea98175af",
"f125b540d7453eb58d38f933588f4b80c80959f2",
"1d035d1d445f5ae5457db98af49ce1b87be1ebd5",
"30c5b89ef93b564781b9a7b8f03be0056d926876",
"54754cbd5011c059af8358b162ffd9ffbcb51f39",
"1ecd36058e48734213c81728f42ff798a2c52833",
"3c0bc4e9d30719269b0048d4f36752ab964145dd",
"269c24a4aad9be622b609a0860f5df80688c2f93",
"0e7148699994155cf8afae0ed943812fbb4f4b7f",
"31fb2b92f92968fcd60112f86b2201e874cfba19",
"167c651a235cf567ee8ca19b8d0e4d2f19e01b42",
"64e7cbb46ecb25f8c00fc58b5b4ab4e4091369b6"
],
"paperAbstract": "In 2013, U. S. data centers accounted for 2.2% of the country's total electricity consumption, a figure that is projected to increase rapidly over the next decade. Many important workloads are interactive, and they demand strict levels of quality-of-service (QoS) to meet user expectations, making it challenging to reduce power consumption due to increasing performance demands. This paper introduces Hipster, a technique that combines heuristics and reinforcement learning to manage latency-critical workloads. Hipster's goal is to improve resource efficiency in data centers while respecting the QoS of the latency-critical workloads. Hipster achieves its goal by exploring heterogeneous multi-cores and dynamic voltage and frequency scaling (DVFS). To improve data center utilization and make best usage of the available resources, Hipster can dynamically assign remaining cores to batch workloads without violating the QoS constraints for the latency-critical workloads. We perform experiments using a 64-bit ARM big.LITTLE platform, and show that, compared to prior work, Hipster improves the QoS guarantee for Web-Search from 80% to 96%, and for Memcached from 92% to 99%, while reducing the energy consumption by up to 18%.",
"pdfUrls": [
"http://doi.ieeecomputersociety.org/10.1109/HPCA.2017.13",
"http://upcommons.upc.edu/bitstream/handle/2117/105074/Hipster+Hybrid+Task+Manager+for+Latency-Critical+Cloud+Workloads.pdf;jsessionid=B0D19B7F4661035B229E059813DA7945?sequence=1"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/03b95c1c6859ce4f792ac6995137a6cfab60670c",
"sources": [
"DBLP"
],
"title": "Hipster: Hybrid Task Manager for Latency-Critical Cloud Workloads",
"venue": "2017 IEEE International Symposium on High Performance Computer Architecture (HPCA)",
"year": 2017
},
"03c7a20c919dd3b6996124a96b199b0b2836d462": {
"authors": [
{
"ids": [
"12898292"
],
"name": "Thang Cao"
},
{
"ids": [
"1730584"
],
"name": "Wei Huang"
},
{
"ids": [
"40498718"
],
"name": "Yuan He"
},
{
"ids": [
"1683736"
],
"name": "Masaaki Kondo"
}
],
"doi": "10.1109/IPDPS.2017.19",
"doiUrl": "https://doi.org/10.1109/IPDPS.2017.19",
"entities": [
"Computer cooling",
"Java HotSpot Virtual Machine",
"Job scheduler",
"Jumpstart Our Business Startups Act",
"Location awareness",
"Next-generation network",
"Scheduling (computing)",
"Simulation",
"Supercomputer",
"Throughput"
],
"id": "03c7a20c919dd3b6996124a96b199b0b2836d462",
"inCitations": [
"d206e9a132b7eb00840b47da84e2960b720065e3"
],
"journalName": "2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"journalPages": "728-737",
"journalVolume": "",
"outCitations": [
"9ba533adf4776c0a708d2f5a2431ce2ab35bf915",
"3583241ac041f60b845395b13ce0d90caf41f49f",
"bb58f3858c937d6769ea8a3b6fc02e04a6521e82",
"239e046347d5075b3eeef5439050e9f2ca760b7b",
"075cac76a487db1c11751f340ada8cd59e1e2017",
"8303554a48d900acf0a432fe06e48d48c5962601",
"7d21404a90d7bf9b75c140bc0b6546551bd91979",
"4c059a8900d24058c9cb27b85df96cc430a79970",
"30a001817f503fa9aa46b01e6dbde887e94cfc3d",
"208a5e499a2836effd9d15c2ff867cf5697796ac",
"494c4c60ab265415d29fd378583e1e295f20bcfe",
"6318fbbde6eb3cc0175b7fb1856b7dd116b8b710",
"2ca6b56fd65b4fa486d754af55e19771f56a3b60",
"3b43f4fca2fcfd7f351ccd78076032b312b52221",
"35e646293776581b01700c1d2d5ac4885a9d56b9"
],
"paperAbstract": "Limited power budget is becoming one of the most crucial challenges in developing supercomputer systems. Hardware overprovisioning which installs a larger number of nodes beyond the limitations of the power constraint is an attractive way to design next generation supercomputers. In air cooled HPC centers, about half of the total power is consumed by cooling facilities. Reducing cooling power and effectively utilizing power resource for computing nodes are important challenges. It is known that the cooling power depends on the hotspot temperature of the node inlets. Therefore, if we minimize the hotspot temperature, performance efficiency of the HPC system will be increased. One of the ways to reduce the hotspot temperature is to allocate power-hungry jobs to compute nodes whose effect on the hotspot temperature is small. It can be accomplished by optimizing job-to-node mapping in the job scheduler. In this paper, we propose a cooling and node location-aware job scheduling strategy which tries to optimize job-to-node mapping while improving the total system throughput under the constraint of total system (compute nodes and cooling facilities) power consumption. Experimental results with the job scheduling simulation show that our scheduling scheme achieves 1.49X higher total system throughput than the conventional scheme.",
"pdfUrls": [
"https://doi.org/10.1109/IPDPS.2017.19"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/03c7a20c919dd3b6996124a96b199b0b2836d462",
"sources": [
"DBLP"
],
"title": "Cooling-Aware Job Scheduling and Node Allocation for Overprovisioned HPC Systems",
"venue": "2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"year": 2017
},
"03db8959fce80db50c3ed7f7c3b30ff750cdc870": {
"authors": [
{
"ids": [
"1689181"
],
"name": "Yong Li"
},
{
"ids": [
"2674237"
],
"name": "Sven Sch\u00e4ge"
}
],
"doi": "10.1145/3133956.3134006",
"doiUrl": "https://doi.org/10.1145/3133956.3134006",
"entities": [
"Cognitive dimensions of notations",
"Cryptographic hash function",
"Cryptographic primitive",
"Cryptography",
"Denial-of-service attack",
"Key exchange",
"Standard-definition television"
],
"id": "03db8959fce80db50c3ed7f7c3b30ff750cdc870",
"inCitations": [],
"journalName": "IACR Cryptology ePrint Archive",
"journalPages": "818",
"journalVolume": "2017",
"outCitations": [
"f2bfed32c28b25076ceaa4a8897f050932ea9c88",
"2eab52ed3761f8946a3adc368c9de3560743ede9",
"6bc308af54fe8c71993d08c9d796947eb2cfc6f2",
"1a79a3efec3d4a177bae7326dd75e33cf362120d",
"3b84eb981b8940147a2fdad8a95ffa92b1ed8674",
"41cce5971ffad66f1c6dd7353e0b5a5763f80b0e",
"3a5352992cf04969557477bebecdaeaf23d5b730",
"851cd7f2924bf302e93c7aebfed0469954704cd2",
"e143f19ae0423e82564afb41ecf51bf8dc17cc1f",
"683c8f5c60916751bb23f159c86c1f2d4170e43f",
"5426706f5c9ec33d4df9fabce473d4aaaa175e67",
"9682341a91f0ea73f3dd9b3548c1e113d7a7f61d",
"27c4eefbdc3ecee1238807ee454a3bcfbdc3b694",
"d030862b5ab53b3fad21e1f48733b78d4a6e35b2",
"1668d381aafb2c23ebe84c3e91517f6af369d5ae",
"021fe0d3dd74fdd2db57c2af510d99ddf7a59d10",
"3cb2009ebfa2c83ab0e26bd8c0e8e7855e535a08",
"48cfd40ed728f6c33d177e670c51b436225500f6",
"ab39ac59408ad25186d0c1854ba7cf0e0ca69c36",
"0a45dc987c8265115bedb2fccf574f38e04d4ca6",
"74e0e22cdefb11a49dac487c3151dcc19deca0cb",
"14b6054c19faa224e40b4987eaac7518f8f76955",
"0439891cdb1eb280b83c910e27b3a3be9192e902",
"1471e355a9ed0857687bda13e7694d5353f9715e",
"b42ae750455f7ced510cdfc82d6b2694a065ac3a",
"233e3eb23bb3e882d221474e992afe944f1787d5",
"380d4e7d272f1682d699cb3058094a56b9e76b66",
"2d8a132fd622b6b8e46507911f7ab24cbd37e667",
"2abb585d8263d6048d04fc00ed2782c79722b50c",
"bde332de7397463a2c641c9983eead2267a2143c",
"54113d65b26940b290c1fe3f6324e012b3ae77d6",
"ade75bd84df51da989efef5a5cd20f9c0fa18b74",
"4de5bb864c8f7dc3896ec2d0a9991a65b7bec831",
"5b269f67ca847ab27392063f6959917a1f22560c",
"d0078077f100e27516af114e33a9d375fcfeee9a",
"43c046c3f3b78bec2b528d45b3ded4bb0046d426",
"de9dc621472717950511cee953f6a94736f3c177",
"517d4d45013e3b040cec89ba1cffbd4a7eb0122d",
"c3ebbc2e3ac42b5bdf97f67a22ba4b656593a0a4",
"4b2dab634a6af740eb41e792cea3d04c1a3542b1",
"a28ec078e8414d6bb509cc90db7a5c5f47a97c46",
"2e149d969293bef42eb113af644c898c8531dc06",
"fe022d3fe9366a495ebd73cce3a3e9a214c157a3",
"4e055184f0d2362bd649880146e942ef41fb47f9"
],
"paperAbstract": "An essential cornerstone of the definition of security for key exchange protocols is the notion of partnering. The de-facto standard definition of partnering is that of (partial) matching conversations (MC), which essentially states that two processes are partnered if every message sent by the first is actually received by the second and vice versa. We show that proving security under MC-based definitions is error-prone. To this end, we introduce no-match attacks, a new class of attacks that renders many existing security proofs invalid. We show that no-match attacks are often hard to avoid in MC-based security definitions without a) modifications of the original protocol or b) resorting to the use of cryptographic primitives with special properties. Finally, we show several ways to thwart no-match attacks. Most notably and as one of our major contributions, we provide a conceptually new definition of partnering that circumvents the problems of a MC-based partnering notion while preserving all its advantages. Our new notion of partnering not only makes security definitions for key exchange model practice much more closely. In contrast to many other security notions of key exchange it also adheres to the high standards of good cryptographic definitions: it is general, supports cryptographic intuition, allows for efficient falsification, and provides a fundamental composition property that MC-based notions lack.",
"pdfUrls": [
"http://eprint.iacr.org/2017/818",
"http://doi.acm.org/10.1145/3133956.3134006",
"https://eprint.iacr.org/2017/818.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/03db8959fce80db50c3ed7f7c3b30ff750cdc870",
"sources": [
"DBLP"
],
"title": "No-Match Attacks and Robust Partnering Definitions - Defining Trivial Attacks for Security Protocols is Not Trivial",
"venue": "IACR Cryptology ePrint Archive",
"year": 2017
},
"03df9cfd3eb3c4f8a4230c8ee389ccd74dcb8ac9": {
"authors": [
{
"ids": [
"2580938"
],
"name": "Ivy Bo Peng"
},
{
"ids": [
"1695375"
],
"name": "Roberto Gioiosa"
},
{
"ids": [
"1746771"
],
"name": "Gokcen Kestor"
},
{
"ids": [
"1758463"
],
"name": "Erwin Laure"
},
{
"ids": [
"2279799"
],
"name": "Stefano Markidis"
}
],
"doi": "10.1109/ICPP.2017.9",
"doiUrl": "https://doi.org/10.1109/ICPP.2017.9",
"entities": [
"Admissible numbering",
"Cray XC40",
"Dataflow",
"Dataflow programming",
"Decoupling (electronics)",
"Memory-mapped I/O",
"Parallel computing",
"Performance Evaluation",
"Pipeline (computing)",
"Programming paradigm",
"Scalability",
"Speedup",
"Supercomputer"
],
"id": "03df9cfd3eb3c4f8a4230c8ee389ccd74dcb8ac9",
"inCitations": [],
"journalName": "2017 46th International Conference on Parallel Processing (ICPP)",
"journalPages": "1-10",
"journalVolume": "",
"outCitations": [
"14e0d2bdfb3fca202b3fc0e19a12d3082f81b931",
"4721ad0db596f3f78ddb31b4305ddbde35f8f181",
"cbf8acf187297b22bf189cd057b9495f90bd973b",
"721c5be47c923d9c0303a3eefd3d42a57e0add03",
"0606b9b2bedb67039eb1615f8ef5b13f42f8339a",
"050b6a5f0e650a12223c27fb133eb5e398df8480",
"843851b2f836537d627cb318416c688e88613339",
"d42a29e6977c28f7bf23d63b00c48f2e9100403e",
"1614a2964f0d655e840399e3d458a8836b700ad9",
"275d613b52965edcb20483a5d3fc6a5122d6e4fb",
"27f942d376a3e25f46ddd236b3deef1653cf737e",
"0541d5338adc48276b3b8cd3a141d799e2d40150",
"d157f24150fa5ffe5a065418331cf8951dbe8910",
"0c205f91402984905e1bcf5f05f973c5588c1325",
"cb11f346bb41adf8c5d89d91ad106beb3091ffb1",
"08937c92f31895e16af48de1c7d18eeceef11f6f",
"5e50ffa96fa021c85ccedb1bb8b84b59ee268de8",
"52e684dbec39ec87883cb1e16b8e1ca15cbcacdc",
"71a4bacd57f43f927f0b9dc07b9e53b0f166fe67",
"34a86b7b24d4a93dbb249fc05f0b7c0f48f90aff",
"94ff8cd9e59ec747bdad91835f089a33819c0cb5",
"1f2ff98f9413bb36c641e9edcfa79f7b33eeb80a"
],
"paperAbstract": "Production-quality parallel applications are often a mixture of diverse operations, such as computation- and communication-intensive, regular and irregular, tightly coupled and loosely linked operations. In conventional construction of parallel applications, each process performs all the operations, which might result inefficient and seriously limit scalability, especially at large scale. We propose a decoupling strategy to improve the scalability of applications running on large-scale systems. Our strategy separates application operations onto groups of processes and enables a dataflow processing paradigm among the groups. This mechanism is effective in reducing the impact of load imbalance and increases the parallel efficiency by pipelining multiple operations. We provide a proof-of-concept implementation using MPI, the de-facto programming system on current supercomputers. We demonstrate the effectiveness of this strategy by decoupling the reduce, particle communication, halo exchange and I/O operations in a set of scientific and data-analytics applications. A performance evaluation on 8,192 processes of a Cray XC40 supercomputer shows that the proposed approach can achieve up to 4x performance improvement.",
"pdfUrls": [
"https://arxiv.org/pdf/1708.01304v1.pdf",
"http://arxiv.org/abs/1708.01304",
"http://doi.ieeecomputersociety.org/10.1109/ICPP.2017.9"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/03df9cfd3eb3c4f8a4230c8ee389ccd74dcb8ac9",
"sources": [
"DBLP"
],
"title": "Preparing HPC Applications for the Exascale Era: A Decoupling Strategy",
"venue": "2017 46th International Conference on Parallel Processing (ICPP)",
"year": 2017
},
"03e82961baf648be80bfe8406660377b0b1feca7": {
"authors": [
{
"ids": [
"1775574"
],
"name": "Mario Alviano"
},
{
"ids": [
"1786782"
],
"name": "Michael Morak"
},
{
"ids": [
"1771740"
],
"name": "Andreas Pieris"
}
],
"doi": "10.1145/3034786.3034794",
"doiUrl": "https://doi.org/10.1145/3034786.3034794",
"entities": [
"Analysis of algorithms",
"Chase (algorithm)",
"Directed acyclic graph",
"Existential quantification",
"Logic programming",
"Negation as failure",
"Operational semantics",
"Polynomial",
"Polynomial hierarchy",
"Query language",
"Skolem normal form",
"Stable model semantics",
"Tuple-generating dependency"
],
"id": "03e82961baf648be80bfe8406660377b0b1feca7",
"inCitations": [
"9ddcca5760ad3885ea3053df78519494c04eee2f"
],
"journalName": "",
"journalPages": "377-388",
"journalVolume": "",
"outCitations": [
"09c1d67941c6f59e9d31f5a1cdbbc2538c572992",
"a59c55fb92e4563392c9a8231d08626a95ed3980",
"9377d3c17d7b76294928b5249f8fa065ed19ea06",
"5351ee12cf6b2f13c4baee30ab9137b1977c00f9",
"18679988622767cefb123d63219b42e4bd1e4b9b",
"d23fafd9586a759729e134134fd311fef0dbdde9",
"4de92b8695ef75d438344b60a73fea0ffa56de1a",
"5fddfb7234b8e6ea4fb17c3efb70bc3eb31ac098",
"b49a3aa915ac2d21262406bbe1d3c0071fe39372",
"304c5b3b9bb0bb1791a17bef37aebf46e238bcba",
"07952e90071960db663d05513b9490b9df9f98f3",
"4cdf3930fabf148fae7b82a9676bd03660372023",
"10c54b46651cb25bf57ff20d779c98eb8d393130",
"5e6f3a3b472d7abf4783c1714f44a14395190571",
"f7011491210da1400d46e04f9704dc4f9f9568bc",
"08fce40b11fc943d41a8d06f164d0c99a3f6fd18",
"0d491b3378ceebddaf6f76b123d2a103a342e88d",
"af21def975d12de6bf3d92570f487235c89966e5",
"466a0b7cffa32a62ca3fe8db8fd65f363a3a6463",
"21df57c55c00d44b8ab235c230d58b17a6637466",
"205b5fb66c8d38420595ab0769c3e00a1910486b",
"88d4caf8a32673af4d810e17f9fd912cb4687867",
"100883322e86a09a7b66c9e291e44fce2074c126",
"0637102d5c918e2496c7607155c896321a3218ca",
"930f85b466412d3447dd84e1b9db0f5eb7f2b733",
"1ccbe32f1f4de198c204b9786809e079f500fc5d",
"2bc7bac7f7cdf20816758fd794909176cc97ed92",
"65298a45b07dbe81bd7ff297b647688e3322e3b8",
"c7d39887aa9283e61ffaa5827244525dee598c96",
"2e29ef2217a27c088f390579bfe0d3cf2878fe1b"
],
"paperAbstract": "Normal tuple-generating dependencies (NTGDs) are TGDs enriched with default negation, a.k.a. negation as failure. Query answering under NTGDs, where negation is interpreted according to the stable model semantics, is an intriguing new problem that gave rise to flourishing research activity in the database and KR communities. So far, all the existing works that investigate this problem, except for one recent paper that adopts an operational semantics based on the chase, follow the so-called logic programming (LP) approach. According to the LP approach, the existentially quantified variables are first eliminated via Skolemization, which leads to a normal logic program, and then the standard stable model semantics for normal logic programs is applied. However, as we discuss in the paper, Skolemization is not appropriate in the presence of default negation since it fails to capture the intended meaning of NTGDs, while the operational semantics mentioned above fails to overcome the limitations of the LP approach. This reveals the need to adopt an alternative approach to stable model semantics that is directly applicable to NTGDs with existentially quantified variables. We propose such an approach based on a recent characterization of stable models in terms of second-order logic, which indeed overcomes the limitations of the LP approach. We then perform an in-depth complexity analysis of query answering under prominent classes of NTGDs based on the main decidability paradigms for TGDs, namely weak-acyclicity, guardedness and stickiness. Interestingly, weakly-acyclic NTGDs give rise to robust and highly expressive query languages that allow us to solve in a declarative way problems in the second level of the polynomial hierarchy.",
"pdfUrls": [
"http://www.research.ed.ac.uk/portal/files/31832886/PODS_17_1.pdf",
"http://doi.acm.org/10.1145/3034786.3034794"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/03e82961baf648be80bfe8406660377b0b1feca7",
"sources": [
"DBLP"
],
"title": "Stable Model Semantics for Tuple-Generating Dependencies Revisited",
"venue": "PODS",
"year": 2017
},
"03e89626cbb864fb1243b4ee8b4037020a9250eb": {
"authors": [
{
"ids": [
"2661057"
],
"name": "Andrew Ferraiuolo"
},
{
"ids": [
"1919355"
],
"name": "Andrew Baumann"
},
{
"ids": [
"3095589"
],
"name": "Chris Hawblitzel"
},
{
"ids": [
"2291514"
],
"name": "Bryan Parno"
}
],
"doi": "10.1145/3132747.3132782",
"doiUrl": "https://doi.org/10.1145/3132747.3132782",
"entities": [
"ARM architecture",
"Address space",
"Assembly language",
"Concurrent computing",
"Confidentiality",
"Correctness (computer science)",
"Encryption",
"High- and low-level",
"Komodo Edit",
"Microcode",
"Microkernel",
"Operating system",
"Protection ring",
"Software deployment",
"User space",
"X86"
],
"id": "03e89626cbb864fb1243b4ee8b4037020a9250eb",
"inCitations": [
"8569785f80712b5787e12b86a3870a28c0182b2c",
"85f1cbe69b6dc7a78b04fe62d8ce821714326652",
"55eab01bb2d10a2fdc38fa4a7403c0c96f66e5cd",
"788b9e288c8db9decbbb2668fdee3737e386e143"
],
"journalName": "",
"journalPages": "287-305",
"journalVolume": "",
"outCitations": [
"07fa3cf4e7be333b8a862c8859e36ea4ff42a8e0",
"30f52a79ff53f8969ffcba19013b4a43e629875f",
"78b872aa7453aeaa8803d1fef9f110387ee23420",
"69b7456f3d47fed3745239b5f67996a0b9a1a5c9",
"4c891cc807e701ba31a378a1e672d26bbac22cdc",
"7a5cf32d06c3b2e4f27bee372a53bdc2e8fcfbce",
"4ce02fb69245a84d3ffceae20e596dcf0497508d",
"05b85222bd229a7fc6774fc687ffddacf6445780",
"194f7d8647009dea5f4867ae27d340c84c46f51b",
"d296252ddf0e2c6b7422008d703843c1863bd15b",
"42e5216f57b17bb7dba13a2b73e36b4c057a6c96",
"24706cbf8c48414ed66db6fbf223c47452f7cbdc",
"5ac7a4dca5509c9dee49d96b4c3c62cc1d0bb9dd",
"0a35c32ebc233556d11c2038f5a4362f2c40b2a9",
"1fb49ae43195232f0b3d1c9d534a5aa03bdd8f26",
"4a21b985d8c33977876968359de7d361ba55e208",
"06bf84f98e7dd39be8d96eb67bafbf56d61bc715",
"07f0e56d1c37c213cd5c617dbfba5a0549629a19",
"693770a65bf0183c9bca10e5fde5e3848bbbb40c",
"3133c223a3ae8a740dee4a47363231d3c3160b16",
"109c2e2a5d61c22b7c00c543c18a5252da130c3d",
"9dcb7c2ba8d55629c854f0bf89c759ad656a9088",
"104eb3716d8b2d7e6d69805357d5b7fb87caff3e",
"eeb5ec8d23124c4b352aa4168cb03f87f9480c92",
"3367eaf02789f5dcf741318fcc18c0dea8fcbb76",
"3c4e907c07944cd55e800b4e55918adf8cb2a683",
"30ba0dd406a6f22e2ff30a0bfd7d1377e672c1ba",
"41c2c11acde144ccf62cb6eff30731195d22775b",
"01fde8698110cf46ff48a17c65f2658dab4c323c",
"5693c2a2c52f4905638559b2fc2b76c975806175",
"9396371baa0f755a6e766c12eb102a97a3bc5562",
"36222f8eb2ccf21ca345e15186cea64506581543",
"7c5d25c73dddcb8ad07c7d29f3a2d97437a3123c",
"17f19d9ec093ef82a10f1276fc53c10d4667836d",
"04c9a788aaafe449680e85f90a65540913e13275",
"3457738844208e1b4aeb2f1a0971ec39216e3000",
"477bbcb5655a9c64893207bb49032e87c06a05f2",
"1bd2d9fb62832737735d011154834b7c80c7e50a",
"0c10529346c4d2d5d4462636a0b3a0dd9fb8d25c",
"0d3c49f0d6743b03615bfcf546b5d015d32d4035",
"b4b7f7a6c668be9d966567a2de9a50eb83986fd5",
"15aaa56f06eca80760943e47f1781591209f2860",
"8e3270ef5a0afc293021f8d594979ed059e29d5e",
"2b3cdf37bff57e29fb5aecc136603f16c855366b",
"08c2649dee7ba1ab46106425a854ca3af869c2f0",
"2b004e0484f4940fca341fa97ecb8ac94fe780a5",
"0cff564ecbf954a61327a944f605019ae38a0da5",
"4271680ae4d95b130426e165ad9e9d9b81d938cd",
"3ffc94c7066b4856b1cfae99ab66cd20310e41dd",
"17886b4911ffd50d7e02a574caad34a286458b3a",
"7aaede70f5efcb1542a80707c1f0f8b01955a7d2",
"ec79422e0bfdb61d8b6d2a6ec5b2dfbcab970852",
"04d6f78e14a92fa72bcefc206c24b2df7b27e5e6",
"c5dc96463e5ad4378277550f95aa86ee070d93ef",
"b0ac2616034f56ab1469afb935b55fe7e37f8f41",
"080c336698f5d7a15169e5ad98fa62a0bbf6085c",
"2817df10c4ffe29482928cb97b8ee89d8560b4cd",
"082a3d4886a28e046c92796f86dd7ec7f7e77d25",
"3f6f619fea4e9241d9fa5d39be4e985757e571de",
"0a289fd7b14345822b1acda6d82750b15d59663e",
"c9d48b2ad9ae24d1028a6d7be22e66d867788a3c",
"c75f723c4a55bd30ee64f7c0d65560011c7b2f95",
"6c725d2a7e88515c5f7c877936f90b0184c4fe8f",
"2b6df21137f30d25494bb58521a6062f93e915f8",
"4c60ec65bd28c6637f82ee3f6ad28d6eaa9c4824"
],
"paperAbstract": "Intel SGX promises powerful security: an arbitrary number of user-mode enclaves protected against physical attacks and privileged software adversaries. However, to achieve this, Intel extended the x86 architecture with an isolation mechanism approaching the complexity of an OS microkernel, implemented by an inscrutable mix of silicon and microcode. While hardware-based security can offer performance and features that are difficult or impossible to achieve in pure software, hardware-only solutions are difficult to update, either to patch security flaws or introduce new features.\n Komodo illustrates an alternative approach to attested, on-demand, user-mode, concurrent isolated execution. We decouple the core hardware mechanisms such as memory encryption, address-space isolation and attestation from the management thereof, which Komodo delegates to a privileged software monitor that in turn implements enclaves. The monitor's correctness is ensured by a machine-checkable proof of both functional correctness and high-level security properties of enclave integrity and confidentiality. We show that the approach is practical and performant with a concrete implementation of a prototype in verified assembly code on ARM TrustZone. Our ultimate goal is to achieve security equivalent to or better than SGX while enabling deployment of new enclave features independently of CPU upgrades.\n The Komodo specification, prototype implementation, and proofs are available at https://github.com/Microsoft/Komodo.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3132747.3132782",
"https://www.sigops.org/sosp/sosp17/slides/komodo-sosp17-slides.pdf",
"https://people.ece.cornell.edu/af433/pdf/ferraiuolo-sosp-17.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/03e89626cbb864fb1243b4ee8b4037020a9250eb",
"sources": [
"DBLP"
],
"title": "Komodo: Using verification to disentangle secure-enclave hardware from software",
"venue": "SOSP",
"year": 2017
},
"03ff19babea1e67d2aba21e996af3695bbc87d0e": {
"authors": [
{
"ids": [
"2874809"
],
"name": "George M. Slota"
},
{
"ids": [
"1750699"
],
"name": "Sivasankaran Rajamanickam"
},
{
"ids": [
"1782490"
],
"name": "Karen D. Devine"
},
{
"ids": [
"2421239"
],
"name": "Kamesh Madduri"
}
],
"doi": "10.1109/IPDPS.2017.95",
"doiUrl": "https://doi.org/10.1109/IPDPS.2017.95",
"entities": [
"Computation",
"Display resolution",
"Distributed memory",
"End-to-end principle",
"Run time (program lifecycle phase)",
"Scalability",
"Sparse matrix",
"Time complexity"
],
"id": "03ff19babea1e67d2aba21e996af3695bbc87d0e",
"inCitations": [
"13e388ab3495d313ae6838b26e8d34517a67e698",
"771610413f3654b8e4f38aab4dd970a481c7196f"
],
"journalName": "2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"journalPages": "646-655",
"journalVolume": "",
"outCitations": [
"4dc578364f357b993b5554b9181c90c84aa6b4d1",
"c0e5583357f80b884a033346aa6580c149378803",
"420a0e5fc398f197bca3dfe40291a82b2c65655a",
"1a907f453ad42e68247c3dc3ea9f88e157fd0235",
"190983c95e49a0fbde080d8a92bca0270e0eb968",
"4714cd9a2c38a4590ca6802a076009a09e49f7e9",
"4410f0c48f982f960a54500df7bd88e4cab88927",
"0d06de003e8ca949b3b39f9a51750c050addb997",
"65250c893b60e86360352d239842e6c37967b2fb",
"16c83e37be3a423a8eefaa483e7a4cffe8cd3a70",
"2512c72dcf83e13cc2c5543ff310dc75652f4bad",
"0be9827857bfd79a00a9b1e64d59e8c34534362c",
"9e6a3bc9a1bd5fe34a989c7d7d718db50970a31c",
"58ba34f71bafffcd120112f97a55cebb656b8bab",
"141e35263ab810983c90d47ad62eb4fab5e51717",
"141004dee9e799b40bfaf50b4a72618613137250",
"1ef7f02bce931c8e9ef529e095b274132ce4011a",
"052715e9292df2bb62e95616ac6486fba7cbf72f",
"2d1d0ee6e21c288d96577b24656cd3398082f857",
"1521d39088b203ddac981d10d214f463449ae95b",
"08c64461c57f2bcc9cb63003d5acf613943fb705",
"0371f9e3efbcd4829b5ffbff585155746ef05284",
"70ef942ceda757cea71ee2c53f7deb4f09b0df7b",
"01c1f0e97ce5c74c714dc7aa43cb064f45cc3b04",
"c3fbbd9c1fc5e53c6a9e3fe27e1bfce4755c8ef3",
"cf507e064919656fbbf5174257de81a90e8bfcf5",
"1f0612de1f191abadf250b78cd78f884203cca5e",
"7f1d9bda4324068355e23f5b1413b2e068903407",
"1ad8410d0ded269af4a0116d8b38842a7549f0ae",
"308002cca6afdfd4f751a382357b027dd94d2de4",
"64a513b60ad89c4eee81a186e53c8d5c8773acac"
],
"paperAbstract": "We introduce XtraPuLP, a new distributed-memory graph partitioner designed to process trillion-edge graphs. XtraPuLP is based on the scalable label propagation community detection technique, which has been demonstrated as a viable means to produce high quality partitions with minimal computation time. On a collection of large sparse graphs, we show that XtraPuLP partitioning quality is comparable to state-of-the-art partitioning methods. We also demonstrate that XtraPuLP can produce partitions of real-world graphs with billion+ vertices in minutes. Further, we show that using XtraPuLP partitions for distributed-memory graph analytics leads to significant end-to-end execution time reduction.",
"pdfUrls": [
"http://www.sandia.gov/~srajama/publications/PuLP-IPDPS17.pdf",
"https://arxiv.org/pdf/1610.07220v1.pdf",
"https://doi.org/10.1109/IPDPS.2017.95",
"http://arxiv.org/abs/1610.07220"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/03ff19babea1e67d2aba21e996af3695bbc87d0e",
"sources": [
"DBLP"
],
"title": "Partitioning Trillion-Edge Graphs in Minutes",
"venue": "2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"year": 2017
},
"040e9e2ed720af8822080a6c3826172ad72e0c3e": {
"authors": [
{
"ids": [
"39131579"
],
"name": "Bin Dong"
},
{
"ids": [
"1773743"
],
"name": "Kesheng Wu"
},
{
"ids": [
"1749233"
],
"name": "Surendra Byna"
},
{
"ids": [
"1685638"
],
"name": "Jialin Liu"
},
{
"ids": [
"3083209"
],
"name": "Weijie Zhao"
},
{
"ids": [
"2289824"
],
"name": "Florin Rusu"
}
],
"doi": "10.1145/3078597.3078599",
"doiUrl": "https://doi.org/10.1145/3078597.3078599",
"entities": [
"Big data",
"Computation",
"Data access",
"Database",
"Locality of reference",
"Programmer",
"SciDB",
"Time series",
"Universal Disk Format",
"User-defined function",
"rasdaman"
],
"id": "040e9e2ed720af8822080a6c3826172ad72e0c3e",
"inCitations": [],
"journalName": "",
"journalPages": "53-64",
"journalVolume": "",
"outCitations": [
"62ea7fbdc3349f4fe8f12f098f1ce4a746faa5db",
"d827cdb49d3abb23405ee03e070c5a42c07d28ea",
"0b99088a6579e29776382978899748fee98ca589",
"a2ff5117ccd1eb3e42c6a606b8cecb4358d3ec84",
"24679ccb0586642553a21e9fcd8aa5a57f97cabe",
"a296d522b6b02ee1829fd35e0f9dc7f13fb07ac4",
"6955de9b4c6554a0d8a1ce8c7c06bfad7b4d1918",
"1e7be30c6b2cd522083183913a0ca820a036342c",
"3512434abce0c19fa3eff0126000279b3d1cb059",
"06c28afd00805ff76f25e89ada90fe8ef66a3a45",
"5c3785bc4dc07d7e77deef7e90973bdeeea760a5",
"7ec028ace29244cb74c105327a7e4177a34aa6bd",
"80fe4d2f309f2d4d9026fe2fdd53ee74f4fd25cd",
"058224ac7b9bc0a0b82e62257656c7a6df62219e",
"267ed9139427b2d30b17cfc91880b04fb910983a",
"d21d261eca404e60fb3edd2a489694ca4cbda537",
"3c4776e5f96ebe8a6de1a855f523a28c687eb994",
"2900ebddc2dfb1e4bb7d7eac7384d7f4512b2b9a",
"32455f131e1eb9fa88db2e991be69b59e73f525c",
"153703ab30c7cb56a49718991f6bc450f0c2273f",
"99b8440905bd77d3ea46b47479ae967e33eb05ee",
"9d62a4187b126111aef25a10e6691df9ca66835f",
"3851430bb53b09f78880bb3480f835c22ca81a94",
"0541d5338adc48276b3b8cd3a141d799e2d40150",
"4ac29283ea51b3987caeaa165fc2e2366cf17738",
"05d21a0984a92310131917ed22c255ff29a93b6c",
"32c1ece816a8b5efa08e3ddd339345f88326be28",
"9ee76efb171dbc1264ab4b22933e3deedfd7fde8",
"7982bdb498c5efeafddd2ffaf9810a7f0712f162",
"2e0e331f92982ee5693d315821655c3583983c6c",
"11e512701c7a2a5cd48d5435e8d42f292161ceca",
"9d67f52469f24f65f661e3842774fc4b7f5cb77b",
"eea2ea1d4a7ae945046986f5674f437e0187e184",
"6474100a17b82d028e7131e8e0769cbc4e110914",
"b1ff5308c6c6da7317f8d7649f884be701a72a0b"
],
"paperAbstract": "User-Defined Functions (UDF) allow application programmers to specify analysis operations on data, while leaving the data management tasks to the system. This general approach enables numerous custom analysis functions and is at the heart of the modern Big Data systems. Even though the UDF mechanism can theoretically support arbitrary operations, a wide variety of common operations -- such as computing the moving average of a time series, the vorticity of a fluid flow, etc., -- are hard to express and slow to execute. Since these operations are traditionally performed on multi-dimensional arrays, we propose to extend the expressiveness of structural locality for supporting UDF operations on arrays. We further propose an in situ UDF mechanism, called ArrayUDF, to implement the structural locality. ArrayUDF allows users to define computations on adjacent array cells without the use of join operations and executes the UDF directly on arrays stored in data files without requiring to load their content into a data management system. Additionally, we present a thorough theoretical analysis of the data access cost to exploit the structural locality, which enables ArrayUDF to automatically select the best array partitioning strategy for a given UDF operation. In a series of performance evaluations on large scientific datasets, we have observed that -- using the generic UDF interface -- ArrayUDF consistently outperforms Spark, SciDB, and RasDaMan.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3078597.3078599",
"http://crd.lbl.gov/assets/Uploads/hpdc02.pdf",
"http://faculty.ucmerced.edu/frusu/Papers/Conference/2017-hpdc-array-udf.pdf",
"http://faculty.ucmerced.edu/frusu/Talks/2017-06-hpdc-array-udf.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/040e9e2ed720af8822080a6c3826172ad72e0c3e",
"sources": [
"DBLP"
],
"title": "ArrayUDF: User-Defined Scientific Data Analysis on Arrays",
"venue": "HPDC",
"year": 2017
},
"0418905a962864523b9d0283e5b1dfa940038cfe": {
"authors": [
{
"ids": [
"26388047"
],
"name": "Willian Barreiros"
},
{
"ids": [
"2711977"
],
"name": "George Teodoro"
},
{
"ids": [
"1753288"
],
"name": "Tahsin M. Kur\u00e7"
},
{
"ids": [
"1711386"
],
"name": "Jun Kong"
},
{
"ids": [
"1771683"
],
"name": "Alba Cristina Magalhaes Alves de Melo"
},
{
"ids": [
"1735710"
],
"name": "Joel H. Saltz"
}
],
"doi": "10.1109/CLUSTER.2017.28",
"doiUrl": "https://doi.org/10.1109/CLUSTER.2017.28",
"entities": [
"Algorithm",
"Anatomic Node",
"Central processing unit",
"Computation",
"Hybrid system",
"Image analysis",
"Image resolution",
"Image segmentation",
"Quantitation",
"Reuse (action)",
"Socket Device Component",
"Speedup",
"Value (ethics)",
"algorithm",
"cellular targeting"
],
"id": "0418905a962864523b9d0283e5b1dfa940038cfe",
"inCitations": [],
"journalName": "2017 IEEE International Conference on Cluster Computing (CLUSTER)",
"journalPages": "25-35",
"journalVolume": "",
"outCitations": [
"8630c01e55b4025ad30f857c0218f392facb8f21",
"791c8b4e7538cfd542e20dd1a27d0a78b33bed6f",
"b9d5572f70e5b3c4287b17ba23c223e9515d3714",
"6b9f7f1e8a602ff83126d087c5a08aa9c8c12f16",
"3fddfe82fbd1866cccd9eb6f3577533521bfe0b0",
"b10145f7fc3d07e43607abc2a148e58d24ced543",
"b6fdeb0c962a7e0b24480b20a044cb925f15f077",
"0f5de500a6bfdd7c0c7ff40a9717af3a56fdefc2",
"09045f55ef18cfb6bb97934857bc5906f0f14c70",
"8fc52ce413863e5b9d78f884912858cd8a1f4ad9",
"2566acc500a8f013610d306bea7a8f548930dfed",
"03daf2d17337f000538d9d4727fa49d52bdb922c",
"7b0569980ca59e6b7d5c1f9dea97464640149b84",
"061e80ca3bc302b1f5031d0065e563423dafb12e",
"bf9cdf51852562e5f09a3ddbd6c93b12abbc152a",
"0a756312d6a6dfcf0a9e27f91affce6412833a9f",
"d119a886aa6a2062038567b6f840f843930e1f1f"
],
"paperAbstract": "We investigate efficient sensitivity analysis (SA) of algorithms that segment and classify image features in a large dataset of high-resolution images. Algorithm SA is the process of evaluating variations of methods and parameter values to quantify differences in the output. A SA can be very compute demanding because it requires re-processing the input dataset several times with different parameters to assess variations in output. In this work, we introduce strategies to efficiently speed up SA via runtime optimizations targeting distributed hybrid systems and reuse of computations from runs with different parameters. We evaluate our approach using a cancer image analysis workflow on a hybrid cluster with 256 nodes, each with an Intel Phi and a dual socket CPU. The SA attained a parallel efficiency of over 90% on 256 nodes. The cooperative execution using the CPUs and the Phi available in each node with smart task assignment strategies resulted in an additional speedup of about 2×. Finally, multi-level computation reuse lead to an additional speedup of up to 2.46× on the parallel version. The level of performance attained with the proposed optimizations will allow the use of SA in large-scale studies.",
"pdfUrls": [
"http://doi.ieeecomputersociety.org/10.1109/CLUSTER.2017.28"
],
"pmid": "29081725v1",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/0418905a962864523b9d0283e5b1dfa940038cfe",
"sources": [
"Medline",
"DBLP"
],
"title": "Parallel and Efficient Sensitivity Analysis of Microscopy Image Segmentation Workflows in Hybrid Systems",
"venue": "2017 IEEE International Conference on Cluster Computing (CLUSTER)",
"year": 2017
},
"041b0d961c61265ba5529787d6c53ac2e9ec4b89": {
"authors": [
{
"ids": [
"1828907"
],
"name": "He Sun"
},
{
"ids": [
"2838505"
],
"name": "Luca Zanetti"
}
],
"doi": "10.1145/3087556.3087569",
"doiUrl": "https://doi.org/10.1145/3087556.3087569",
"entities": [
"Algorithm",
"Algorithm design",
"Big data",
"Cluster analysis",
"Computational problem",
"Convex function",
"Convex optimization",
"Data mining",
"Distributed algorithm",
"Distributed computing",
"Load balancing (computing)",
"Machine learning",
"Mathematical optimization",
"P (complexity)",
"Social network",
"Stochastic process"
],
"id": "041b0d961c61265ba5529787d6c53ac2e9ec4b89",
"inCitations": [
"96b584f90af556c51440d7d27dbd078c8984bc8d"
],
"journalName": "",
"journalPages": "163-171",
"journalVolume": "",
"outCitations": [
"cc9a34806690d2278c06c2242ed761f0e9592dd2",
"aedc1fbd8902e6a6a7abb09b6d53c36ff8f47497",
"2d115ae720872e61bdb55dd18343b83f24c415a6",
"3b98975b82441a4ed2d2a1404e2767afff38502f",
"dd174e56a7fb404369cbc8bccfa0de6328749297",
"24259d92169e287c55abd3bd6cc5b2da50a88c4b",
"bbc0895ebeb90fa3f48a2a26a71ad15fd44caf8e",
"d1d462ae220a79480347070a3dbab8863bfc58be",
"13dff6a28d24e4fe443161fcb7d96b68a085a3d4",
"173c7a0ed002d1d694380469e251515a2b516888",
"13f008360c48e279afbaa9335155a4ea54b9da31",
"45e8546d3272ee05329ec8c9eedeb8952a8e879b",
"4c256085f2b76aa5554e8fc47fa8c42cf076a428",
"0f8dd25d69691636b6d3206572271d292e9a37e6",
"37030e618f7caa7a8c3fec3454fb0d43915002a4",
"6f8c546b574ff16a800d202d51900cc1e56e4e94",
"097b0fc37ebe626414835e990ed0c7af9b31796c",
"66549f785d13a44171fcc21899802325e7d923cd",
"08e666907929fd29dae3fd52e66143b0a9e45ce1",
"49f2214fa494c034106e050ab6d140cc6d215c15",
"1102b9cd97b8b368e47c44d687f1000997757d36",
"64ad3e977678d7034a66fe89df5ce60ab764cf99",
"0aaaab026edf97470d3401d4e2390c508f828209",
"24d484a36928362ce1c61331870ca0bef6f96480",
"1c7e0a76c8a5d2b14fa73d639af6ad79da6cf059",
"7423137dd23b0044698fe9f3554fea8a6beb776a",
"0197a437cebc4a759fc3b9d577622f2475f548af",
"34f084c531faf6131f0540a41cfd81ae7e7830aa",
"95b251202e1f5ff7d7f41dda553a38e395ecf555",
"042ee2af87fabc6ce71035d887b8e866815c10bd",
"5928dd51e1d7d940d528ffc0455cab8248c551bc",
"18f3f55f67d6b487e369be8ae1362cc621b9fe6c"
],
"paperAbstract": "Graph clustering is a fundamental computational problem with a number of applications in algorithm design, machine learning, data mining, and analysis of social networks. Over the past decades, researchers have proposed a number of algorithmic design methods for graph clustering. However, most of these methods are based on complicated spectral techniques or convex optimisation, and cannot be applied directly for clustering many networks that occur in practice, whose information is often collected on different sites. Designing a simple and distributed clustering algorithm is of great interest, and has wide applications for processing big datasets. In this paper we present a simple and distributed algorithm for graph clustering: for a wide class of graphs that are characterised by a strong cluster-structure, our algorithm finishes in a poly-logarithmic number of rounds, and recovers a partition of the graph close to an optimal partition. The main component of our algorithm is an application of the random matching model of load balancing, which is a fundamental protocol in distributed computing and has been extensively studied in the past 20 years. Hence, our result highlights an intrinsic and interesting connection between graph clustering and load balancing.\n At a technical level, we present a purely algebraic result characterising the early behaviours of load balancing processes for graphs exhibiting a cluster-structure. We believe that this result can be further applied to analyse other gossip processes, such as rumour spreading and averaging processes.",
"pdfUrls": [
"http://seis.bris.ac.uk/~hs15417/SPAA17.pdf",
"https://arxiv.org/pdf/1607.04984v1.pdf",
"http://arxiv.org/pdf/1607.04984v1.pdf",
"http://arxiv.org/abs/1607.04984",
"https://arxiv.org/pdf/1607.04984v2.pdf",
"http://doi.acm.org/10.1145/3087556.3087569"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/041b0d961c61265ba5529787d6c53ac2e9ec4b89",
"sources": [
"DBLP"
],
"title": "Distributed Graph Clustering by Load Balancing",
"venue": "SPAA",
"year": 2017
},
"04376a241d021461eb55b6a8a1391679a73cfa6e": {
"authors": [
{
"ids": [
"35067898"
],
"name": "Sepehr Assadi"
}
],
"doi": "10.1145/3034786.3056116",
"doiUrl": "https://doi.org/10.1145/3034786.3056116",
"entities": [
"Algorithm",
"Approximation",
"Approximation algorithm",
"Computation",
"Computational complexity theory",
"DSPACE",
"Independent set (graph theory)",
"Maximum coverage problem",
"Set cover problem",
"Time complexity"
],
"id": "04376a241d021461eb55b6a8a1391679a73cfa6e",
"inCitations": [
"265422784efe15311b28116c16c82a4d27dc0d79",
"3ab135880738545f69e03028746fd7715ce8a036",
"2b248b8eff815a1061459bcd34e50c105642ee64",
"7e0695d65ad3aedaa30bb7aaf28edc432ac711e7",
"59975447afa0b00f7336139ae300964715cf92ca"
],
"journalName": "",
"journalPages": "321-335",
"journalVolume": "",
"outCitations": [
"2c74cac7f8171f9e6aec986c12b38025359c105a",
"1e0c2bbba98c3a6970eb88f3250a328e6893be66",
"379ef18377d803d87859314c0e110cdf64f2ea73",
"02f7b61d3d557da6de3c26178530179492e8f574",
"88e222dc82e4323b4515908e72b2bcbd678e51f8",
"d921036a6cb7e340b019afa557a19bc65586a1ad",
"5811dbdd522970f2393d54d3fcea9e4b856f8fbc",
"033df0fa41a945d135406e911eeb97d34c325e9d",
"39d1814c2820ec53c24362e34ff1e000c6982822",
"0df3980457291b7425e37eb686a6fd7b3eb94abe",
"30a0bd3e7446fe2f42d3c8f46fc6c49b7637135e",
"202a3630d9bea2a61a7b026bf395993c0f637caa",
"ab2c3eacd12d9d37b2cc9d05c8580e7b3b78d63c",
"7e4cb3ca74b9e0d83cb53340d4ead2331cc8328c",
"b50e429252a5c3135977000c67f977ba222a8c59",
"69b6a42ad7068962363687c038c6ae2e0760867a",
"06e7ec1b1a018225fb632c1b7d029b74151b4730",
"072baa4481eb75e73187b40b7c87a93db2c76659",
"4d080825ac4bfcca1804abc5fcb6404dd1a2ae94",
"28dd94325f1fe6a8ea5787abe3bbdf7dfea71259",
"07917775e85ed02803f405b2fbf9d57a240e156e",
"bf2e2f7fe2c4cf965127229574d20681ebcc3d0e",
"215aad1520ec1b087ab2ba4043f5e0ecc32e7482",
"16b816afe64f4525c0ba4a7a803655d50c05f706",
"04ee1c7ed1b22ce513ce2672b89eb3b2ea371258",
"1ddc56eca40a5730cedabb26815053c1ddab0832",
"2ca183874427200496f8e642b96f6e90c8321a4f",
"59975447afa0b00f7336139ae300964715cf92ca",
"0371825bda41874cfa458055c93c132f0da3e04e",
"c82276f525ab37cda42025714134b496cdad9988",
"6094392d07d36c086a988493686b73ebca39169b",
"67762ce2c7a85dbf55cdf86fedee2610229d91eb",
"0b2ab31ecb350ad53db236622c9e8d5ff180be37",
"ec411455675508e1751d45aa9e20dd72e3d61faa",
"46b51960a073a759e1d55b41c75b6bb3e5273be8",
"bed65c0c0a54d28508efb64ae79fb2537bb9f6f8",
"1de6abd76b02bdc6e42a0a2d24fffcd967318e54",
"1719b6402f6ad8014959018832f564ee3835efe8",
"5e493ab3e938d34aeca99d463463d58a863ee97e",
"054c5374c74d33dc3a65c3140315eafeb3d62604",
"b7772296ffeef6897b7be4e36af296d920a7acf4",
"9bd101ad8faba5ff0ff1f625be773ce0acb697fc",
"159a7a03ccb0ef751db1870be1de4d26a02470f3",
"bde7cc85837836fab6c1f946a6e77189ac9d9eed",
"843f186c7f38f5d434f46ca55b6dea7d5f14deef",
"9202a76c3b53d385f1b715d3a75e18c053232c32"
],
"paperAbstract": "We study the classic set cover problem in the streaming model: the sets that comprise the instance are revealed one by one in a stream and the goal is to solve the problem by making one or few passes over the stream while maintaining a sublinear space o(mn) in the input size; here m denotes the number of the sets and n is the universe size. Notice that in this model, we are mainly concerned with the space requirement of the algorithms and hence do not restrict their computation time.\n Our main result is a resolution of the space-approximation tradeoff for the streaming set cover problem: we show that any α-approximation algorithm for the set cover problem requires Ω(mn1/α) space, even if it is allowed polylog(n) passes over the stream, and even if the sets are arriving in a random order in the stream. This space-approximation tradeoff matches the best known bounds achieved by the recent algorithm of Har-Peled et.al. (PODS 2016) that requires only O(α) passes over the stream in an adversarial order, hence settling the space complexity of approximating the set cover problem in data streams in a quite robust manner. Additionally, our approach yields tight lower bounds for the space complexity of (1- ε)-approximating the streaming maximum coverage problem studied in several recent works.",
"pdfUrls": [
"https://arxiv.org/pdf/1703.01847v1.pdf",
"http://www.seas.upenn.edu/~sassadi/stuff/papers/multipass-streaming-setcover.pdf",
"http://www.seas.upenn.edu/~sassadi/stuff/presentations/scmp-pods.pdf",
"https://arxiv.org/pdf/1703.01847.pdf",
"http://doi.acm.org/10.1145/3034786.3056116",
"http://arxiv.org/abs/1703.01847"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/04376a241d021461eb55b6a8a1391679a73cfa6e",
"sources": [
"DBLP"
],
"title": "Tight Space-Approximation Tradeoff for the Multi-Pass Streaming Set Cover Problem",
"venue": "PODS",
"year": 2017
},
"04379477b31622586b3a632a5ac528c664f88d7a": {
"authors": [
{
"ids": [
"1708510"
],
"name": "Juan G\u00f3mez-Luna"
},
{
"ids": [
"3077499"
],
"name": "Izzat El Hajj"
},
{
"ids": [
"1709430"
],
"name": "Li-Wen Chang"
},
{
"ids": [
"21242411"
],
"name": "Victor Garcia-Flores"
},
{
"ids": [
"2192182"
],
"name": "Simon Garcia De Gonzalo"
},
{
"ids": [
"2550847"
],
"name": "Thomas B. Jablin"
},
{
"ids": [
"24636606"
],
"name": "Antonio J. Pe\u00f1a"
},
{
"ids": [
"1723122"
],
"name": "Wen-mei W. Hwu"
}
],
"doi": "10.1109/ISPASS.2017.7975269",
"doiUrl": "https://doi.org/10.1109/ISPASS.2017.7975269",
"entities": [
"Benchmark (computing)",
"C++ AMP",
"CUDA",
"Central processing unit",
"Embodied energy",
"Graphics processing unit",
"Heterogeneous computing",
"Memory coherence",
"OpenCL API",
"Programmer",
"Programming language",
"Task allocation and partitioning of social insects"
],
"id": "04379477b31622586b3a632a5ac528c664f88d7a",
"inCitations": [
"ce992c5be70243c83a5faaeea3f314ebd36302a9",
"d55df4e557a56ea969a99ce9f1b3164bd21c0b1d",
"d9fe07044fc80f6b84301d3d6fc088a3c6730242",
"36ad8fb17b210f4a82ede242469d32ca07b44c7d",
"46122831f2f1aea6b5f45025b8791ca29c239679",
"bac4a0e99c98fac6fa231e9ed21e8f643674200a",
"95288f5fff01bcd3fe03a090a65cadef2e87b06d"
],
"journalName": "2017 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)",
"journalPages": "43-54",
"journalVolume": "",
"outCitations": [
"5e5da2a57395b0ca6888f1bbd7de5d27e33b5a81",
"aa6e7660056a641440bdda478e38aace44bd29d1",
"08104146873817cc35cbd96d7ca3e5169cb72296",
"6ac0c44e4e56583914de316346977c8461716141",
"00156e79606084497789662dfaf59c3b54a10722",
"347a08cd9ada1cee83713d24ec84ed49ab121987",
"54acbdadf00cc793eb3e0a2962746ae5a849c4ee",
"b62430598576f433ed7b4c5c3d44000c236feab0",
"ae5bd68d29d0b9b8a2a85cede82bd9ab8229e73d",
"d410f8128bd4efa6adc886259e5d9de4cd7587bc",
"9defbe70576ac91f13a9bd02e93cb86539f0bbd5",
"5f3cce1bc739ebfc03e003010d3438bb318efc14",
"ab8405e56fc4dc9b3f7842e4fa0909fc61283e82",
"26362bc38c0c3ffe27e3424ea82704678fe09eb0",
"8314e43f15c26a5824333687e672a71afb415940",
"681c5784c26ef6e5779ab4259eec6c351ea36631",
"0ce8199bb276f6c540cfbfc3248bc2f7a1469819",
"5db195c9157a8178c89e69d413d08c1725a11267",
"5236710748ceb864a91e9fb4efac905114d8f1ef",
"31864e13a9b3473ebb07b4f991f0ae3363517244",
"f632d67c13a113fd468d910078b4be180f92127f",
"14505c2bdd3822d7a62385121d28ba3eb36fea1d",
"8a313a96288fa94b67b8a7aa690e2daecefabfe9",
"4ad495b07abc0d7080c020dd563d9406e1753d65",
"63af4355721f417bc405886f383af096fbfe51b2",
"10a0ab781e94a75fdcbde819f3f4cddcab768bbd"
],
"paperAbstract": "Heterogeneous system architectures are evolving towards tighter integration among devices, with emerging features such as shared virtual memory, memory coherence, and systemwide atomics. Languages, device architectures, system specifications, and applications are rapidly adapting to the challenges and opportunities of tightly integrated heterogeneous platforms. Programming languages such as OpenCL 2.0, CUDA 8.0, and C++ AMP allow programmers to exploit these architectures for productive collaboration between CPU and GPU threads. To evaluate these new architectures and programming languages, and to empower researchers to experiment with new ideas, a suite of benchmarks targeting these architectures with close CPU-GPU collaboration is needed. In this paper, we classify applications that target heterogeneous architectures into generic collaboration patterns including data partitioning, fine-grain task partitioning, and coarse-grain task partitioning. We present Chai, a new suite of 14 benchmarks that cover these patterns and exercise different features of heterogeneous architectures with varying intensity. Each benchmark in Chai has seven different implementations in different programming models such as OpenCL, C++ AMP, and CUDA, and with and without the use of the latest heterogeneous architecture features. We characterize the behavior of each benchmark with respect to varying input sizes and collaboration combinations, and evaluate the impact of using the emerging features of heterogeneous architectures on application performance.",
"pdfUrls": [
"http://impact.crhc.illinois.edu/shared/Papers/chai-ispass17.pdf",
"http://elhajj2.web.engr.illinois.edu/docs/paper-chai-ispass17.pdf",
"https://doi.org/10.1109/ISPASS.2017.7975269"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/04379477b31622586b3a632a5ac528c664f88d7a",
"sources": [
"DBLP"
],
"title": "Chai: Collaborative heterogeneous applications for integrated-architectures",
"venue": "2017 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)",
"year": 2017
},
"0443f873f3b3a12bdb7819d16e45ae99cd616e86": {
"authors": [
{
"ids": [
"3112463"
],
"name": "Yang You"
},
{
"ids": [
"2238795"
],
"name": "Aydin Bulu\u00e7"
},
{
"ids": [
"1700326"
],
"name": "James Demmel"
}
],
"doi": "10.1145/3126908.3126912",
"doiUrl": "https://doi.org/10.1145/3126908.3126912",
"entities": [
"Algorithm",
"Artificial neural network",
"Avid Elastic Reality",
"Central processing unit",
"Deep learning",
"Graphics processing unit",
"Hardware acceleration",
"ImageNet",
"Knights",
"Scalability",
"Speedup",
"System on a chip",
"Xeon Phi"
],
"id": "0443f873f3b3a12bdb7819d16e45ae99cd616e86",
"inCitations": [
"a7e9f6c55c1118c9947c6ef63bddd11764b85d33",
"d0556be65e8564ab8bb3e26b6a0146a62027bc40"
],
"journalName": "",
"journalPages": "9:1-9:12",
"journalVolume": "",
"outCitations": [
"838c9137e6fd807c871c80976b4f75c8c8bfcffc",
"a058935fd019c2367fd32c16cd1ce6983a29aafb",
"6435805ebe3abd7c02fae390edad37c1a5c7c5a6",
"235fa2b1983eff9f13b27c620cda389359126bf4",
"36f49b05d764bf5c10428b082c2d96c13c4203b9",
"0de0c3240bda7972bd0a3c8369ebc4b4f2e4f9c2",
"193fa681987603bd5c672ff7344966625fcaf54a",
"09f72f02083830c1881b86e6016e1fe3fe41f65f",
"5d90f06bb70a0a3dced62413346235c02b1aa086",
"b7cf49e30355633af2db19f35189410c8515e91f",
"8ecc044d920df247fbd455b752fd7cc0f7363ad7",
"160e1a787a3364a10ea89a9a8c04238cd468d1a4",
"3f1c1427b175140e7f725a155096a4e73c1b8509",
"01fcae344d2edb715bcc63a40b6052c0331741bd",
"38211dc39e41273c0007889202c69f841e02248a",
"0760550d3830230a05191766c635cec80a676b7e",
"60f22ad725f041fff81d6371242485bbe5c3ebb6",
"3439a127e45fb763881f03ef3ec735a1db0e0ccc",
"0af203b0112a8564c730a596fe5cf35556537e2e",
"0b99d677883883584d9a328f6f2d54738363997a",
"7a4092f170a3ed058a64f3156248d9c4e32c4d48",
"09b8120cbc52e7df46122e8e608146289fddbdfa",
"061356704ec86334dbbc073985375fe13cd39088"
],
"paperAbstract": "Training neural networks has become a big bottleneck. For example, training ImageNet dataset on one Nvidia K20 GPU needs 21 days. To speed up the training process, the current deep learning systems heavily rely on the hardware accelerators. However, these accelerators have limited on-chip memory compared with CPUs.\n We use both self-host Intel Knights Landing (KNL) clusters and multi-GPU clusters as our target platforms. From the algorithm aspect, we focus on Elastic Averaging SGD (EASGD) to design algorithms for HPC clusters.\n We redesign four efficient algorithms for HPC systems to improve EASGD's poor scaling on clusters. Async EASGD, Async MEASGD, and Hogwild EASGD are faster than existing counter-part methods (Async SGD, Async MSGD, and Hogwild SGD) in all comparisons. Sync EASGD achieves 5.3X speedup over original EASGD on the same platform. We achieve 91.5% weak scaling efficiency on 4253 KNL cores, which is higher than the state-of-the-art implementation.",
"pdfUrls": [
"https://people.eecs.berkeley.edu/~youyang/publications/sc2017.pdf",
"http://doi.acm.org/10.1145/3126908.3126912",
"https://people.eecs.berkeley.edu/~youyang/publications/imagenet_minutes.pdf",
"https://arxiv.org/pdf/1708.02983v1.pdf",
"http://gauss.cs.ucsb.edu/~aydin/sc2017_deep_learning.pdf",
"http://arxiv.org/abs/1708.02983"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/0443f873f3b3a12bdb7819d16e45ae99cd616e86",
"sources": [
"DBLP"
],
"title": "Scaling deep learning on GPU and knights landing clusters",
"venue": "SC",
"year": 2017
},
"044d4f949759b602332d7d2408fb003108422e21": {
"authors": [
{
"ids": [
"39531773"
],
"name": "Yi Cao"
},
{
"ids": [
"3371087"
],
"name": "Javad Nejati"
},
{
"ids": [
"9223428"
],
"name": "Muhammad Wajahat"
},
{
"ids": [
"2187214"
],
"name": "Aruna Balasubramanian"
},
{
"ids": [
"2044504"
],
"name": "Anshul Gandhi"
}
],
"doi": "10.1145/3084443",
"doiUrl": "https://doi.org/10.1145/3084443",
"entities": [
"Experiment",
"High- and low-level",
"Mobile device",
"Program optimization",
"Web page"
],
"id": "044d4f949759b602332d7d2408fb003108422e21",
"inCitations": [
"0457c76af0aa3d0586e3fdd6ece7ea6fda65b7da"
],
"journalName": "",
"journalPages": "68",
"journalVolume": "",
"outCitations": [
"cf64cdc889a4edaf641a307aa2b11d89d4d10a09",
"1733b454eb643f4c534e81f6089a85e63cfd2629",
"143481d55d9f9d25e53f06a6afaf15feb7430c62",
"0495641c590874be9e09c3743d0d15c536cd3f4e",
"086699da0528ed47463cea3108851bd3dc5ba715",
"5430dfef92fb67ec887e365208477226f0cddb10",
"0b6ea07d2d7ea0f95969f9e223d362c2e6aa79b4",
"1e126cee4c1bddbfdd4e36bf91b8b1c2fe8d44c2",
"1cadb267720b8723fa417840003ac51ec56d7aa5",
"8d78b035469b2c0c8238c2b4c85460b04aa6d4ef",
"06d4deb6e116578eb3ce6c2c228ee99cad3718da",
"1aaea3bf77dfa69605cf7d243fc6a8255d11aae9",
"111cc5261a6034612ca543bc3c15b9bf25cb2ec3",
"45f43abc49a8a60e6b43ddbda5af9fc6c88d663d",
"84fdccb41f31247dfb86aadba6f2b4d75538767f",
"0b369ac8bd9e0c618e4ea3568ebaa944f460c454",
"16d0a8ee484f4a34e1cdcda8a0c2453e2e962ada",
"0507b04c131f2244524fda97cd1707af5760216e",
"2cac6e84d3d7fed13ec9a5d39fd2bd6e75423578",
"20d0b7473429464fc2f9bfd59d513d63c844551c",
"17fd49a20b1fd914ec6dde6c835edc852826dede",
"430cd2b1c08aa86bb4aef152ee2ca764c5342c3e",
"b4074a1b276afb37d103b934773071ff176a1b9d",
"24dcf23f4aeb146b1323b8e9f559f17f6282fdd7"
],
"paperAbstract": "Modeling the energy consumption of applications on mobile devices is an important topic that has received much attention in recent years. However, there has been very little research on modeling the energy consumption of the mobile Web. This is primarily due to the short-lived yet complex page load process that makes it infeasible to rely on coarse-grained resource monitoring for accurate power estimation.\n We present RECON, a modeling approach that accurately estimates the energy consumption of any Web page load and deconstructs it into the energy contributions of individual page load activities. Our key intuition is to leverage low-level application semantics in addition to coarse-grained resource utilizations for modeling the page load energy consumption. By exploiting fine-grained information about the individual activities that make up the page load, RECON enables fast and accurate energy estimations without requiring complex models. Experiments across 80 Web pages and under four different optimizations show that RECON can estimate the energy consumption for a Web page load with an average error of less than 7%. Importantly, RECON helps to analyze and explain the energy effects of an optimization on the individual components of Web page loads.",
"pdfUrls": [
"https://davycao.github.io/sigm17_paper16.pdf",
"http://www3.cs.stonybrook.edu/~anshul/sigm17_recon.pdf",
"http://doi.acm.org/10.1145/3084443",
"http://doi.acm.org/10.1145/3078505.3078587",
"http://netsys.cs.stonybrook.edu/sites/netsys.cs.stonybrook.edu/files/sigm17_paper16_0.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/044d4f949759b602332d7d2408fb003108422e21",
"sources": [
"DBLP"
],
"title": "Deconstructing the Energy Consumption of the Mobile Page Load",
"venue": "SIGMETRICS",
"year": 2017
},
"044ef9a2b3f12a36cf4c01ff45b57fe6b414f2d9": {
"authors": [
{
"ids": [
"24553949"
],
"name": "Dongyu Meng"
},
{
"ids": [
"1721849"
],
"name": "Hao Chen"
}
],
"doi": "10.1145/3133956.3134057",
"doiUrl": "https://doi.org/10.1145/3133956.3134057",
"entities": [
"Approximation algorithm",
"Artificial neural network",
"Cryptography",
"Deep learning",
"Randomness"
],
"id": "044ef9a2b3f12a36cf4c01ff45b57fe6b414f2d9",
"inCitations": [
"69092affc3461a38eb05cf7982f104eb30b0492c",
"15285d8ae6d2fef3dfecaeacbf5a246bfc7b3137",
"5a5e6395ea614e392089516b9e68caa8fabab4e2",
"a91fd02ed2231ead51078e3e1f055d8be7828d02",
"a0c90e89d81469d5ab9ed93af5a020a94fa05188",
"7b5e12f7784f8d5cecd3f2bd73c35860de2b21f8",
"f16d1c0dbff12aa9c05feae542cca7878e625b51",
"dd215b777c1c251b61ebee99592250f44073d4c0",
"6b327af674145a34597986ec60f2a49cff7ed155",
"ec2df1a2b46279bfd658746c9ab0dcdcbca3177c",
"5ce1cdd95b3977e66a5c22fb6cab577a8a65597d",
"d9716a34853188061ee5365d84677bfae635229d",
"1e77822d88d1064317d0e5d229b536820cc8df81",
"66d5ec7a71a8b92d0c9563edda94ca62d39f96be",
"57126589b3fe62c35a36a2646dac3045d095ecf5",
"4a6025ac9fa969846ab0ee32a6d8792734383105",
"0939b060ba4832420a7be317806768fc40f13cc3",
"956272153ce970d99d182d99919c7c471cf48166",
"8e4808e71c9b9f852dc9558d7ef41566639137f3",
"ea0eaaece0f4e0c3760d87850f65fb42df980c3c",
"a2d19828c435a48aaa0b9c2a08112f6a023b2df9",
"1f70bbe8099daea2adccf4e9120e453fa935eefd",
"21dc8ebc3b8373c233e66031dead3ed5a0024a5f",
"70f646b21115a896300d2ae5a1decf0cce5cdb82",
"04d2fe52b97ad769974650b76e47fb50842fed8f",
"9bec5e3292a6ca7cea5fb37a7f6719b1149b2bb0",
"23f97a0a6ce0c54b024213e200315be1ba391932",
"1c71e653f86b06eb7d5b1d92694f34e6f57173de",
"533892babde5b8390b3a02336c9a6a293378eb1d",
"3d0a8a8e01625fd2c668364c1ee31f3dc9098f39",
"29176632807b17bf3da444713763b4b2b568306c",
"29f712156b5c216fe00c2ec8fa115bdfcce6bbf3",
"7e17e21c3e48e5432c38d6a9f635f9708357d273",
"83a8235a231540e07743d67c9f127c2bee4389ae",
"f820c05024b75959199dcfba59ec6cfc7f162994",
"039df729edbc7c20085fda50599241ea626d20f0",
"19c53c3ddf90c6ede05a6ac670083e238ba4589f",
"48185257697b84c4ebfb137b44cf2e2bce182174"
],
"journalName": "",
"journalPages": "135-147",
"journalVolume": "",
"outCitations": [
"83bfdd6a2b28106b9fb66e52832c45f08b828541",
"24529bffa95f07c01ccf6f02eb4dc9d859430159",
"8f92b4ea04758df2acfb49bd46a4cde923c3ddcb",
"0e03189871cd303b3438743f90232514dfa7885e",
"5d90f06bb70a0a3dced62413346235c02b1aa086",
"4115569538e2d71aa96389b01aa5ca1b8b30f8dd",
"74fc396d0b8ec548d600395182f12c9b06cc84e9",
"9b618fa0cd834f7c4122c8e53539085e06922f8c",
"0f84a81f431b18a78bd97f59ed4b9d8eda390970",
"0e34fa5ec5476ea801021fb082fd3089a62f0aff",
"55b3410a9025f7547d68d59ea899ff391d555953",
"f2c20cb6ebd2ad704c5bcae4eb8b942d3c62f8e0",
"1beea702eecb426474794c43faf1364463ab0ec0",
"20f28af7a5f14c994b5c62315f215d95939de18a",
"7ab0f0da686cd4094fd96f5a30e0b6072525fd09",
"46f74231b9afeb0c290d6d550043c55045284e5f",
"16aa01ca0834a924c25faad5d8bfef3fd1acfcfe",
"04ee77ef1143af8b19f71c63b8c5b077c5387855",
"15b4017d6f295accd02adc04494e854c9cf4434d",
"046a1302079f56b94c81457bf7fd21c3417a9f72",
"49e77b981a0813460e2da2760ff72c522ae49871",
"010719cd94f8fea13b78f998d220499e6174e9c7",
"e2b7f37cd97a7907b1b8a41138721ed06a0b76cd",
"7cdf6882ac4562b680cbf679dea5d60e110ce771",
"35734e8724559fb0d494e5cba6a28ad7a3d5dd4d",
"31868290adf1c000c611dfc966b514d5a34e8d23",
"1439e05971a053c2368e6dee6d484b43c833d43c",
"0e3cc46583217ec81e87045a4f9ae3478a008227",
"169e0f340ed880b0c2d288bc8f3c8753fe7b0cfb",
"01fcae344d2edb715bcc63a40b6052c0331741bd",
"3b2bf65ebee91249d1045709200a51d157b0176e"
],
"paperAbstract": "Deep learning has shown impressive performance on hard perceptual problems. However, researchers found deep learning systems to be vulnerable to small, specially crafted perturbations that are imperceptible to humans. Such perturbations cause deep learning systems to mis-classify adversarial examples, with potentially disastrous consequences where safety or security is crucial. Prior defenses against adversarial examples either targeted specific attacks or were shown to be ineffective.\n We propose MagNet, a framework for defending neural network classifiers against adversarial examples. MagNet neither modifies the protected classifier nor requires knowledge of the process for generating adversarial examples. MagNet includes one or more separate detector networks and a reformer network. The detector networks learn to differentiate between normal and adversarial examples by approximating the manifold of normal examples. Since they assume no specific process for generating adversarial examples, they generalize well. The reformer network moves adversarial examples towards the manifold of normal examples, which is effective for correctly classifying adversarial examples with small perturbation. We discuss the intrinsic difficulties in defending against whitebox attack and propose a mechanism to defend against graybox attack. Inspired by the use of randomness in cryptography, we use diversity to strengthen MagNet. We show empirically that MagNet is effective against the most advanced state-of-the-art attacks in blackbox and graybox scenarios without sacrificing false positive rate on normal examples.",
"pdfUrls": [
"https://arxiv.org/pdf/1705.09064v1.pdf",
"http://arxiv.org/abs/1705.09064",
"http://doi.acm.org/10.1145/3133956.3134057",
"http://web.cs.ucdavis.edu/~hchen/paper/meng2017.pdf",
"https://arxiv.org/pdf/1705.09064v2.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/044ef9a2b3f12a36cf4c01ff45b57fe6b414f2d9",
"sources": [
"DBLP"
],
"title": "MagNet: A Two-Pronged Defense against Adversarial Examples",
"venue": "CCS",
"year": 2017
},
"0450987faf2baf11df986a6bf6d477c6ce4e9d93": {
"authors": [
{
"ids": [
"11019105"
],
"name": "Katherine Q. Ye"
},
{
"ids": [
"38436509"
],
"name": "Matthew Green"
},
{
"ids": [
"24010074"
],
"name": "Naphat Sanguansin"
},
{
"ids": [
"2722085"
],
"name": "Lennart Beringer"
},
{
"ids": [
"2059700"
],
"name": "Adam Petcher"
},
{
"ids": [
"1804502"
],
"name": "Andrew W. Appel"
}
],
"doi": "10.1145/3133956.3133974",
"doiUrl": "https://doi.org/10.1145/3133956.3133974",
"entities": [
"Compiler",
"Compiler correctness",
"Coq (software)",
"Correctness (computer science)",
"Cryptography",
"Dual EC DRBG",
"End-to-end principle",
"Formal verification",
"Functional specification",
"Hash-based message authentication code",
"Machine code",
"Proof assistant",
"Pseudorandom number generator",
"Pseudorandomness"
],
"id": "0450987faf2baf11df986a6bf6d477c6ce4e9d93",
"inCitations": [
"18307d7fea0fed1067a5704f9aa13c93541e0142"
],
"journalName": "",
"journalPages": "2007-2020",
"journalVolume": "",
"outCitations": [
"614f3b72660eed2ce7b62970fa73ba8eae4d278b",
"2638a939cd8f4bbdd927dbe8a277569c0d202e93",
"49565dd40c89680fdf9d6958f721eabcdfb89c22",
"5513593daa8b8a52c5808590f0975e4c80c5c71a",
"043a2dc8bddc2af1b03b320c1b9aef1f7ca01568",
"2977e30243c4a93462cdb466d97abff4bcd638d2",
"3c338bb3dcc10b7c840b4dbf3ad32e8256313ee3",
"280250adda984a6464eddf98beac56f8e302fe07",
"92ed7e6a20e5c91191f424b9ac9e129b621612d3",
"0e8816a796a977f7729099bc21c5473c7c582ff3",
"3dbde4c3ebeb5c52aeee28b98e80e405b2a5ebb0",
"04402122e2fb065ed1280000981f7626496f0afb",
"57adf20f0fa575a43609937c8f1a695a444a0ae0",
"615168555150d80752a1c195229642acbe6fb3d9",
"57f0a7ef8a11f191ff84e825f9153c254a29b427",
"db0d1f3ed4a418e126d0281d5b3aadd1fd45c982",
"1038b389bb18f87faed387364a696b01f60d5e7e",
"400251fab502adf5a8ecdf6e5ba7d522bfe5cf1a",
"265f7bdcb3e6bb6d32146113e3929e2365bbd5af",
"afb91cb334aa5892e1ae567e016ba9de63738575",
"11bce56b9d86954f627209bd2ca3786f66a35fee",
"e9022113d566e75fa2c1f86f5e72d33361d45bf9",
"136e9214b3637a84b9accb32f7b6176f047c403a"
],
"paperAbstract": "We have formalized the functional specification of HMAC-DRBG (NIST 800-90A), and we have proved its cryptographic security-that its output is pseudorandom--using a hybrid game-based proof. We have also proved that the mbedTLS implementation (C program) correctly implements this functional specification. That proof composes with an existing C compiler correctness proof to guarantee, end-to-end, that the machine language program gives strong pseudorandomness. All proofs (hybrid games, C program verification, compiler, and their composition) are machine-checked in the Coq proof assistant. Our proofs are modular: the hybrid game proof holds on any implementation of HMAC-DRBG that satisfies our functional specification. Therefore, our functional specification can serve as a high-assurance reference.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3133956.3133974",
"https://www.cs.cmu.edu/~kqy/resources/HMAC_DRBG_CCS17.pdf",
"https://arxiv.org/pdf/1708.08542v1.pdf",
"http://www.cs.princeton.edu/~appel/papers/verified-hmac-drbg.pdf",
"https://www.cs.cmu.edu/~kqy/resources/Verified-HMAC-DRBG.pdf",
"http://arxiv.org/abs/1708.08542"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/0450987faf2baf11df986a6bf6d477c6ce4e9d93",
"sources": [
"DBLP"
],
"title": "Verified Correctness and Security of mbedTLS HMAC-DRBG",
"venue": "CCS",
"year": 2017
},
"045ed48ce9ab08cd8d89995ec6f61655be37f827": {
"authors": [
{
"ids": [
"3175379"
],
"name": "Friedrich Steimann"
},
{
"ids": [
"30468313"
],
"name": "Marcus Frenkel"
},
{
"ids": [
"1733990"
],
"name": "Markus V\u00f6lter"
}
],
"doi": "10.1145/3136014.3136034",
"doiUrl": "https://doi.org/10.1145/3136014.3136034",
"entities": [
"Conformance testing",
"Metamodeling",
"Programmer",
"Structure editor",
"Whole Earth 'Lectronic Link"
],
"id": "045ed48ce9ab08cd8d89995ec6f61655be37f827",
"inCitations": [],
"journalName": "",
"journalPages": "79-90",
"journalVolume": "",
"outCitations": [
"188426f3339b555dda2740ae59a1b9f8a0af17c8",
"07616ac5872d581b93a82bbcfce1760812fbe506",
"83c349c4f10fedd52179e6c55b5ffb97c125ab39",
"3fa29135a4382a9f2378dc1cb75aa34f84113116",
"52baaf6d23c305fffaff4a82f4943c0395a36e05",
"486639cf03fc0e08fc876e992647501fca611890",
"1e688be9f4554aa981fe3db9e2a66388b05bd167",
"895cc0b69c42290d1164cc25403e7c4e70db23c8",
"c19e228c99443d508d4d799dbeec7b056441bf18",
"c957b66fc39e88546fc08c6cfae782c6c7cb6796",
"0083d6b5c9d4b18c452b453cda36c00bbb985252",
"0467a3b0e4afca0712b42f6e96cd879e2b274522",
"a7f2702767e16b03a860d50f19fefd709c695f80",
"b82d1190197f0f7f513974808ed6913714c3dd80",
"4b697347a0c3bb777507afb2f16dde238e71df10",
"df473e1cbce6bbd51e2a0ba88fdafd7b1270b54c",
"c4e62cf795d5c5e34ba5e1ed3f511d74e9161fcb",
"b60f8b0b67a321defb3ac511bbfd8afb53b929f7",
"8ea209607f0febfd98ae4050fad1c6a15f04f923",
"2793a6772afdfeac0c80f3f2c1834c930dcd4abd",
"37db876b401b5578765e376be6bed962ca4e63ba",
"034cb3e63c4a9a47e450137ded08da1d301e81cf",
"7423cca7880932040c6d1c72c8524159510becda",
"df88dc427082e216a632f7dff9813a1c94acbe5c",
"54a18c597d5d72536f396673ebf5d4fc7649e671",
"60c56908f5aeca7b641344390446cfc580a89dca",
"b5558429b89d35dda86f0e5546d3b204a4b364ff",
"3960dda299e0f8615a7db675b8e6905b375ecf8a",
"460ea25534755bce9517f615446efc9f6c508359"
],
"paperAbstract": "While contemporary projectional editors make sure that the edited programs conform to the programming languageâ\u0080\u0099s metamodel, they do not enforce that they are also well-formed, that is, that they obey the well-formedness rules defined for the language. We show how, based on a constraint-based capture of well-formedness, projectional editors can be empowered to enforce well-formedness in much the same way they enforce conformance with the metamodel. The resulting robust edits may be more complex than ordinary, well-formedness breaking edits, and hence may require more user involvement; yet, maintaining well-formedness at all times ensures that necessary corrections of a program are linked to the edit that necessitated them, and that the projectional editorâ\u0080\u0099s services are never compromised by inconsistent programs. Robust projectional editing is not a straitjacket, however: If a programmer prefers to work without it, its constraint-based capture of well-formedness will still catch all introduced errors â\u0080\u0094 unlike many other editor services, well-formedness checking and robust editing are based on the same implementation, and are hence guaranteed to behave consistently.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3136014.3136034"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/045ed48ce9ab08cd8d89995ec6f61655be37f827",
"sources": [
"DBLP"
],
"title": "Robust projectional editing",
"venue": "SLE",
"year": 2017
},
"0460cd7935008dff7178a69b96bff952110bb6ad": {
"authors": [
{
"ids": [
"1775185"
],
"name": "Kubilay Atasu"
},
{
"ids": [
"3023587"
],
"name": "Thomas P. Parnell"
},
{
"ids": [
"3372321"
],
"name": "Celestine D\u00fcnner"
},
{
"ids": [
"1699100"
],
"name": "Michail Vlachos"
},
{
"ids": [
"2004009"
],
"name": "Haralampos Pozidis"
}
],
"doi": "10.1109/ICPP.2017.46",
"doiUrl": "https://doi.org/10.1109/ICPP.2017.46",
"entities": [
"Algorithm",
"Analysis of algorithms",
"Central processing unit",
"Computer cluster",
"Graphics processing unit",
"Load balancing (computing)",
"Machine learning",
"Non-negative matrix factorization",
"Recommender system"
],
"id": "0460cd7935008dff7178a69b96bff952110bb6ad",
"inCitations": [],
"journalName": "2017 46th International Conference on Parallel Processing (ICPP)",
"journalPages": "372-381",
"journalVolume": "",
"outCitations": [
"21613f3a8ed001065023064befcaf7447268b45d",
"8c6d84f60c953eecafa20b5989b3f697ac10cbf9",
"ce4e206cbe1aaef0c2381d2fc62ab147c42c40db",
"6676fbd502bf19fbe751eafafd25be7370216e7e",
"8e39f9ec05e058e727ece3067abb541f65c6b11e",
"9aa88a8a354f1d322e242376d27d0474e50252f8",
"ae89b64bb83848d6deb54bb5f91161afa6e5c935",
"672b341f7373feafc02ae3d8b3421d2777e32be1",
"c7e8886244d505714897375b2146cebcf72863c8",
"9eea2012abde8f692982e85236c24b2aba29e73b",
"0c07d26f82f3c84371bfd18f8327ce0a2d00da81",
"5d06f630188a5ec9c05c4961eddbf9f24e2e6916",
"ddce2f41414d35592dda0d12ea33bfac29fe983f",
"87f8d6d13c30b5abeb260f8375f325bcb7dd965f",
"876014931b26abf9b87a911d394d25beab674bbe",
"327fb5ed6d2057c98c485e3c7ff7c55e87095e50",
"6b3e40a330650eaf1fbcdd15b6ef8d4acc49b245",
"f0ce902c99bf26197c86921f0d2b5effab83748e",
"749521b5fc9791c242ac3acb26d0db64499ec2fe",
"2f85322125e793057933cd21e7e7ba238fbd8154"
],
"paperAbstract": "Recommender systems are becoming the crystal ball of the Internet because they can anticipate what the users may want, even before the users know they want it. However, the machine-learning algorithms typically involved in the training of such systems can be computationally expensive, and often may require several days for retraining. Here, we present a distributed approach for load-balancing the training of a recommender system based on state-of-art non-negative matrix factorization principles. The approach can exploit the presence of a cluster of mixed CPUs and GPUs, and results in a 466-fold performance improvement compared with the serial CPU implementation, and a 15-fold performance improvement compared with the best previously reported results for the popular Netflix data set.",
"pdfUrls": [
"http://doi.ieeecomputersociety.org/10.1109/ICPP.2017.46"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/0460cd7935008dff7178a69b96bff952110bb6ad",
"sources": [
"DBLP"
],
"title": "High-Performance Recommender System Training Using Co-Clustering on CPU/GPU Clusters",
"venue": "2017 46th International Conference on Parallel Processing (ICPP)",
"year": 2017
},
"0467df50312601c78569a82da5a39344351da983": {
"authors": [
{
"ids": [
"31606525"
],
"name": "Yu Shi"
},
{
"ids": [
"19277495"
],
"name": "Po-Wei Chan"
},
{
"ids": [
"39371343"
],
"name": "Honglei Zhuang"
},
{
"ids": [
"2286096"
],
"name": "Huan Gui"
},
{
"ids": [
"1722175"
],
"name": "Jiawei Han"
}
],
"doi": "10.1145/3097983.3097990",
"doiUrl": "https://doi.org/10.1145/3097983.3097990",
"entities": [
"Algorithm",
"Experiment",
"Generative model",
"PowerPC Reference Platform",
"Programming paradigm",
"Relevance",
"Text mining",
"Type system"
],
"id": "0467df50312601c78569a82da5a39344351da983",
"inCitations": [
"873bb1d992e55afca552e27d9c58afd329220c7f"
],
"journalName": "",
"journalPages": "425-434",
"journalVolume": "",
"outCitations": [
"221b59a2a6bc19302bac89abaf42c531f4dc4cf8",
"054ba27fe5cc6085d20ea2707de886db6865dbed",
"40150a1f67a5ebfa78a9ac99f998b39fa34bc9ba",
"1c96cdb6bc0029b8ca4cd578aca5e939b359e578",
"86979d8b19914284d376e1981319b762702797b4",
"07bd2985ebe29eaa182569e1fd3e3e0f9df4c14a",
"d822f61bc8b6a6625e939a2445ba74180f53c829",
"13c40b32b9f35c8d24a5c00ec16a88382aaf07fe",
"71413d837edfb2e6d7f4685476158bcc70cf9d9d",
"2cbe0ba73d02aabbeefedf841203219796a551b7",
"1970a644bc8a9fa7340f04785f8b19e9d33778e1",
"63d440eb606c7aa4ee3c7fcd94d65af3f5c92c96",
"7f2968ecdf3bb966fbbb605a4f24733c22937fab",
"1871ea4cf23441d0297c99d9115f664a6ba0efda",
"5abf1c0ff7dc9157aedd9dfa021f8d3dcc647d9b",
"20dc1890ca65e01856f31edf10126c2ad67e9d04",
"02e0bc77460469aefec5bd794ee6c4efc15e6adb",
"a4e3b552fda3d6dab61ef6ddb75944bfd38248ab",
"65f8e3d819786754fecc6085ee5ded94c7c0b142",
"009dbf3187862352aac542bf7d61e27bce6b27f5",
"1c8c9a7713395e9a176c42e49bc80574a013f89f",
"0d1e2c2ae657895c7532ed26e3f09f140ad84afb"
],
"paperAbstract": "As a powerful representation paradigm for networked and multi-typed data, the heterogeneous information network (HIN) is ubiquitous. Meanwhile, defining proper relevance measures has always been a fundamental problem and of great pragmatic importance for network mining tasks. Inspired by our probabilistic interpretation of existing path-based relevance measures, we propose to study HIN relevance from a probabilistic perspective. We also identify, from real-world data, and propose to model cross-meta-path synergy, which is a characteristic important for defining path-based HIN relevance and has not been modeled by existing methods. A generative model is established to derive a novel path-based relevance measure, which is data-driven and tailored for each HIN. We develop an inference algorithm to find the maximum a posteriori (MAP) estimate of the model parameters, which entails non-trivial tricks. Experiments on two real-world datasets demonstrate the effectiveness of the proposed model and relevance measure.",
"pdfUrls": [
"http://yushi2.web.engr.illinois.edu/kdd17.pdf",
"https://arxiv.org/pdf/1706.01177v1.pdf",
"http://shichuan.org/hin/topic/Similarity%20Measure/2017.%20KDD2017%20PReP%20Path-Based%20Relevance%20from%20a%20Probabilistic%20Perspective%20in%20Heterogeneous%20Information%20Networks.pdf",
"http://yushi2.web.engr.illinois.edu/kdd17_slides.pdf",
"http://arxiv.org/abs/1706.01177",
"http://hanj.cs.illinois.edu/pdf/kdd17_yshi.pdf",
"http://doi.acm.org/10.1145/3097983.3097990"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/0467df50312601c78569a82da5a39344351da983",
"sources": [
"DBLP"
],
"title": "PReP: Path-Based Relevance from a Probabilistic Perspective in Heterogeneous Information Networks",
"venue": "KDD",
"year": 2017
},
"046a2418b45d8e4db8b42bc55f36f2f9331645b1": {
"authors": [
{
"ids": [
"39322919"
],
"name": "Ravindra Babu Ganapathi"
},
{
"ids": [
"27099044"
],
"name": "Aravind Gopalakrishnan"
},
{
"ids": [
"27021998"
],
"name": "Russell W. McGuire"
}
],
"doi": "10.1109/HOTI.2017.12",
"doiUrl": "https://doi.org/10.1109/HOTI.2017.12",
"entities": [
"Algorithm",
"Experiment",
"Input/output",
"Memory-mapped I/O",
"Message Passing Interface",
"Network switch",
"Networking hardware",
"Omni-Path",
"Operating system",
"PCI Express",
"Partitioned global address space",
"Processor affinity",
"Programmer",
"Programming model",
"Selection algorithm",
"Telephone number"
],
"id": "046a2418b45d8e4db8b42bc55f36f2f9331645b1",
"inCitations": [],
"journalName": "2017 IEEE 25th Annual Symposium on High-Performance Interconnects (HOTI)",
"journalPages": "80-86",
"journalVolume": "",
"outCitations": [
"7605fe626c3598ee68fefaf1f4e1d21fcd2cb3d4",
"bb65ddf274ef42e05da09bfb080a97d035876cff",
"4f7d60be860184511a71f2e6475a3947adf45372",
"5f464ae0f3faf0e80b3653a49011bd5ba233edfd",
"adb98e9965ac4303b7457af34b2f352df359bdc1",
"00a0ce824021313ee63c72e7bf05a4c708233cb0",
"4f08b68a94563a247f092effbdd46281f82a6b9a",
"9e4d3d6b74affd06329a7f72d647016868312728",
"6a4b87b53654f1a63323c9ec294bcd9eb18e1bbc",
"637074c9c400cddb4797e6ca353c35edd83f4c38",
"7421d28428e041c271fe6370c331353f4a3fa974"
],
"paperAbstract": "High Performance Computing(HPC) applications are highly optimized to maximize allocated resources for the job such as compute resources, memory and storage. Optimal performance for MPI applications requires the best possible affinity across all the allocated resources. Typically, setting process affinity to compute resources is well defined, i.e MPI processes on a compute node have processor affinity set for one to one mapping between MPI processes and the physical processing cores. Several well defined methods exist to efficiently map MPI processes to a compute node. With the growing complexity of HPC systems, platforms are designed with complex compute and I/O subsystems. Capacity of I/O devices attached to a node are expanded with PCIe switches resulting in large numbers of PCIe endpoint devices. With a lot of heterogeneity in systems, applications programmers are forced to think harder about affinitizing processesas it affects performance based on not only compute but also NUMA placement of IO devices. Mapping of process to processor cores and the closest IO device(s) is not straightforward. While operating systems do a reasonable job of trying to keep a process physically located near the processor core(s) and memory, they lack the application developer's knowledge of process workflow and optimal IO resource allocation when more than one IO device is connected to the compute node.In this paper we look at ways to assuage the problems of affinity choices by abstracting the device selection algorithm from MPI application layer. MPI continues to be the dominant programming model for HPC and hence our focus in this paper is limited to providing a solution for MPI based applications. Our solution can be extended to other HPC programming modelssuch as Partitioned Global Address Space(PGAS) or a hybrid MPI and PGAS based applications. We propose a solution to solve NUMA effects at the MPI runtime level independent of MPI applications. Our experiments are conducted on a two node system where each node consists of two socket Intel® Xeon® servers, attached with up to four Intel® Omni-Path fabric devices connected over PCIe. The performance benefits seen by MPI applications by affinitizing MPI processes with best possible network device is evident from the results where we notice up to 40% improvement in uni-directional bandwidth, 48% bi-directional bandwidth, 32% improvement in latency measurements and finally up to 40% improvement in message rate.",
"pdfUrls": [
"http://doi.ieeecomputersociety.org/10.1109/HOTI.2017.12"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/046a2418b45d8e4db8b42bc55f36f2f9331645b1",
"sources": [
"DBLP"
],
"title": "MPI Process and Network Device Affinitization for Optimal HPC Application Performance",
"venue": "2017 IEEE 25th Annual Symposium on High-Performance Interconnects (HOTI)",
"year": 2017
},
"049a1ac1c022f7b800b185d313239ccb9b60bfed": {
"authors": [
{
"ids": [
"3448436"
],
"name": "Stephen Roberts"
},
{
"ids": [
"40431102"
],
"name": "Steven A. Wright"
},
{
"ids": [
"3450002"
],
"name": "Suhaib A. Fahmy"
},
{
"ids": [
"1690561"
],
"name": "Stephen A. Jarvis"
}
],
"doi": "10.1007/978-3-319-58667-0_22",
"doiUrl": "https://doi.org/10.1007/978-3-319-58667-0_22",
"entities": [
"Computational science",
"Experiment",
"Limiter",
"Mathematical optimization",
"Program optimization",
"Requirement"
],
"id": "049a1ac1c022f7b800b185d313239ccb9b60bfed",
"inCitations": [],
"journalName": "",
"journalPages": "413-430",
"journalVolume": "",
"outCitations": [
"429d28998216da5648f40248bf4bc9e508edd2fd",
"08db6c20a034bfdb119e2eb3a049cccccb7e1fc0",
"260d0adfad93dfd02c7a945dee48c60f8fb938e1",
"8c12c4ff57e1992d1e3a926a2e75d3d4d9279c96",
"3d044d4f708b8803ca2323ede66ba5f303ac1fba",
"54cb190135885898a5fd780253ff14a821ff71cf",
"b1479a44735a4d93a99c3c1572acc6b752046c04",
"56e4263251aa8d1888ca5840e0bf187af043f49c",
"3fdd691621d41ddabdd225878536e4c75223971d",
"b83c318632affb34e58dbe847b26f491baf6653b",
"28e34059176c36934de116e138dd53cf4ee1dff0",
"db365cd0e6c42278fd091a1f3b710e443c2555a4",
"9d5b5e0e1547f172c3f0d75a78aa7d2894590520",
"02ebdcf8200135ec0433e12e4ef2459ac740370b",
"60f41423b70cd2ae454ae5802ad4e4927aeb9d6f",
"751ee769767a70b6dc1ac2dc57e8957d28308686",
"f4a91972bf1a05b195bce06a24dc33960bff1151",
"52d4b916fe76401dc0477e4a00528103cdae4625",
"6e0607664ee56a9c3404b9b5a570665b4d26a3a0",
"e17e7bffaa7bdda0dcdec8eb4d200a13e4e156a4"
],
"paperAbstract": "Energy consumption is rapidly becoming a limiting factor in scientific computing. As a result, hardware manufacturers increasingly prioritise energy efficiency in their processor designs. Performance engineers are also beginning to explore software optimisation and hardware/software co-design as a means to reduce energy consumption. Energy efficiency metrics developed by the hardware community are often re-purposed to guide these software optimisation efforts. In this paper we argue that established metrics, and in particular those in the Energy Delay Product (Et) family, are unsuitable for energy-aware software optimisation. A good metric should provide meaningful values for a single experiment, allow fair comparison between experiments, and drive optimisation in a sensible direction. We show that Et metrics are unable to fulfil these basic requirements and present suitable alternatives for guiding energy-aware software optimisation. We finish with a practical demonstration of the utility of our proposed metrics.",
"pdfUrls": [
"http://wrap.warwick.ac.uk/87287/13/WRAP-metrics-energy-aware-software-optimisation-Roberts-2017.pdf",
"https://doi.org/10.1007/978-3-319-58667-0_22",
"http://wrap.warwick.ac.uk/87287/7/WRAP_Wright_paper.pdf"
],
"pmid": "",
"s2PdfUrl": "http://pdfs.semanticscholar.org/dc80/59bb1d5aa7745b86cd7e3441d60c516b0b86.pdf",
"s2Url": "https://semanticscholar.org/paper/049a1ac1c022f7b800b185d313239ccb9b60bfed",
"sources": [
"DBLP"
],
"title": "Metrics for Energy-Aware Software Optimisation",
"venue": "ISC",
"year": 2017
},
"04a1566de1fab63e4d5f4c3de2444189b2fffe3c": {
"authors": [
{
"ids": [
"34825854"
],
"name": "Haitao Yuan"
},
{
"ids": [
"2344116"
],
"name": "Jing Bi"
},
{
"ids": [
"2424969"
],
"name": "Jia Zhang"
},
{
"ids": [
"2700163"
],
"name": "Wei Tan"
},
{
"ids": [
"1746012"
],
"name": "Keman Huang"
}
],
"doi": "10.1109/CLOUD.2017.12",
"doiUrl": "https://doi.org/10.1109/CLOUD.2017.12",
"entities": [
"Data center",
"Expectation\u2013maximization algorithm",
"OpenVMS",
"Revenue sharing",
"Routing",
"Scheduling (computing)",
"Software-defined networking",
"Virtual machine"
],
"id": "04a1566de1fab63e4d5f4c3de2444189b2fffe3c",
"inCitations": [
"625115a88a1676e8319ec38ad309b1cd4646829f"
],
"journalName": "2017 IEEE 10th International Conference on Cloud Computing (CLOUD)",
"journalPages": "18-25",
"journalVolume": "",
"outCitations": [
"5617533e3b9b0602ca20f5eafdf8168ad149f328",
"4329fab4771dd4cf50694804d4bafca8f40dbbab",
"49fc32e00629c062279d8347a6189fb751fe0b11",
"2aea898e1ffa6704561dca05c5bf90b29d0d2b7c",
"e3a0e3cc6ec566981abe53bf91347a503cd7090a",
"2ec4022eb4b34617e5281331d90a242e60a2a28b",
"411f70a6a3bf0ad6efc3c06546de41aaada4aec4",
"bca2c862d05a00c471221da78e44a759499f4f79",
"d47bca3f9f8c86506ba842533990c2d6f2b91658",
"1f3497afec11f21b60b615513353157b2891b76b",
"27109339ffd9b93cce0f885ab6cd26014fd79f1c",
"5020fc196002bc22b90d14459fa331ae321f3c8b",
"0394a93e0bae94671ca18d9ecc35e4c250309bf4",
"016ca0cee16190907a911d874e98fbc6dfa5a36c",
"21616ede4fbcf03484d653901d0a051a05cde223",
"e90cf0903a00a575dbb46089186b06ae4af3699d",
"9ce279778579fc150e4ddc72ea30706f1bb38a94",
"eb66fa5d216adb3a1eb59395386a83ddf00d1212",
"cc2b975d42bfffa7f534d2a9ad574214064c90da",
"2a628e4a9c5f78bc6dcdf16514353336547846cc",
"134aff4476875a386cefa81c57b18e9897ab3e3f",
"1c4887952889c95973e017409f1d39587636532a"
],
"paperAbstract": "Nowadays many companies and organizations choose to deploy their applications in data centers to leverage resource sharing. The increase in tasks of multiple applications, however, makes it challenging for a data center provider to maximize its revenue by intelligently scheduling tasks in software-defined networking (SDN)-enabled data centers. Existing SDN controllers only reduce network latency while ignoring virtual machine (VM) latency, thus may lead to revenue loss. In the context of SDN-enabled data centers, this paper presents a workload-aware revenue maximization (WARM) approach to maximize the revenue from a data center provider's perspective. The core idea is to jointly consider the optimal combination of VMs and routing paths for tasks of each application. Comparing with state-of-the-art methods, the experimental results show that WARM yields the best schedules that not only increase the revenue but also reduce the round-trip time of tasks of all applications.",
"pdfUrls": [
"https://doi.org/10.1109/CLOUD.2017.12"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/04a1566de1fab63e4d5f4c3de2444189b2fffe3c",
"sources": [
"DBLP"
],
"title": "Workload-Aware Revenue Maximization in SDN-Enabled Data Center",
"venue": "2017 IEEE 10th International Conference on Cloud Computing (CLOUD)",
"year": 2017
},
"04aed47b71fd3a07a9a9d04ec9c9429a242299a6": {
"authors": [
{
"ids": [
"2950127"
],
"name": "Xi He"
},
{
"ids": [
"2357165"
],
"name": "Ashwin Machanavajjhala"
},
{
"ids": [
"24440615"
],
"name": "Cheryl J. Flynn"
},
{
"ids": [
"1704011"
],
"name": "Divesh Srivastava"
}
],
"doi": "10.1145/3133956.3134030",
"doiUrl": "https://doi.org/10.1145/3133956.3134030",
"entities": [
"Algorithm",
"Angular defect",
"Computation",
"Database",
"Differential privacy",
"Distributed Proofreaders",
"End-to-end encryption",
"End-to-end principle",
"Linkage (software)",
"Pattern Recognition Letters",
"Privacy",
"Secure multi-party computation",
"Virtual private network"
],
"id": "04aed47b71fd3a07a9a9d04ec9c9429a242299a6",
"inCitations": [],
"journalName": "",
"journalPages": "1389-1406",
"journalVolume": "",
"outCitations": [
"332c3587b73140517993d478db923357e2144531",
"b5065bb03ee4ccba956488ac49431db915e0d9e4",
"684cbdc64df41f30e0f6ba4f9b442285519f605b",
"36a3904938efc22427af7baf1a5655a75c35afd3",
"38ccbd4097a16f062f8dbd4095e4873a95f387f5",
"33ac1d455b62b96f189579b99bd734f987598b38",
"185c811f94c6526c50dcf3da0aff78fe032a27f7",
"0761ae9a1884c8e2a168845e155e114c0fe828a8",
"02b8e2b9301f83005f0b284fec7ee2468ffc2cba",
"3713b16c8ef53f6acf2374a9e73e46b057e365f0",
"1dabd2515b0f87e077c3d78979b5d57eb5ebfc84",
"09378d09d4026c21c8c80f291f4afa3bcb4956ff",
"03c1711090d76cc9163e238686786a71c028377e",
"8392fa13e5013073b617e947b0229bf1734990ac",
"d1b82ba92fa74343d3c743cd1d12411195f52a1d",
"9007444b29df5383aec43e6a68322d2ae26bd216",
"0dcaa37bbdd620f25ce459529796d00d912c242c",
"cf64ed742ab694d8a0ebed6c96a6f8709b9e8705",
"663f4f32b643376f36b5bcbee65cc32cb9f11de4",
"323174074f4353a7b9d6a92eb45959ef862f347c",
"4f553ee2246dd617d89c487f260d77388177e1c4",
"283ecc8622694c070fa53aee7a1c37dadc603f8d",
"913a6223e266297d34bbf63d08e6e7ed9f01de5b",
"2b926454d20a57d57befcec245917d1614a4c3d2",
"6223684e14778e4d7948e994d2169ebf38e0a95f",
"fe38ee9944077cd14a0f6f1813af2d3d4b59ce43",
"a9d07270be6e48448ef17b348f3455d76ea1d68f",
"1c799eca7983c62f7815ac5f41787b3e552567b6",
"b1a25851dac53b6b0bc3238564a2bea5b0f57bf6",
"9407fda128b185bdb0ced615ad8107381b831071",
"b532099ff8b67049f292cd62700dca37fc2be623"
],
"paperAbstract": "Private record linkage (PRL) is the problem of identifying pairs of records that are similar as per an input matching rule from databases held by two parties that do not trust one another. We identify three key desiderata that a PRL solution must ensure: (1) perfect precision and high recall of matching pairs, (2) a proof of end-to-end privacy, and (3) communication and computational costs that scale subquadratically in the number of input records. We show that all of the existing solutions for PRL? including secure 2-party computation (S2PC), and their variants that use non-private or differentially private (DP) blocking to ensure subquadratic cost -- violate at least one of the three desiderata. In particular, S2PC techniques guarantee end-to-end privacy but have either low recall or quadratic cost. In contrast, no end-to-end privacy guarantee has been formalized for solutions that achieve subquadratic cost. This is true even for solutions that compose DP and S2PC: DP does not permit the release of any exact information about the databases, while S2PC algorithms for PRL allow the release of matching records.\n In light of this deficiency, we propose a novel privacy model, called output constrained differential privacy, that shares the strong privacy protection of DP, but allows for the truthful release of the output of a certain function applied to the data. We apply this to PRL, and show that protocols satisfying this privacy model permit the disclosure of the true matching records, but their execution is insensitive to the presence or absence of a single non-matching record. We find that prior work that combine DP and S2PC techniques even fail to satisfy this end-to-end privacy model. Hence, we develop novel protocols that provably achieve this end-to-end privacy guarantee, together with the other two desiderata of PRL. Our empirical evaluation also shows that our protocols obtain high recall, scale near linearly in the size of the input databases and the output set of matching pairs, and have communication and computational costs that are at least 2 orders of magnitude smaller than S2PC baselines.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3133956.3134030",
"https://arxiv.org/pdf/1702.00535v1.pdf",
"http://www.research.att.com/export/sites/att_labs/techdocs/TD_101822.pdf",
"https://arxiv.org/pdf/1702.00535v3.pdf",
"https://arxiv.org/pdf/1702.00535v4.pdf",
"https://arxiv.org/pdf/1702.00535v2.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/04aed47b71fd3a07a9a9d04ec9c9429a242299a6",
"sources": [
"DBLP"
],
"title": "Composing Differential Privacy and Secure Computation: A Case Study on Scaling Private Record Linkage",
"venue": "CCS",
"year": 2017
},
"04cceeb42618da0ebc534afba74ddc366885e82a": {
"authors": [
{
"ids": [
"1679961"
],
"name": "Chao Li"
},
{
"ids": [
"1724566"
],
"name": "Balaji Palanisamy"
}
],
"doi": "10.1109/CLOUD.2017.13",
"doiUrl": "https://doi.org/10.1109/CLOUD.2017.13",
"entities": [
"Adversary (cryptography)",
"Big data",
"Centralisation",
"Cloud storage",
"Computer data storage",
"Denial-of-service attack",
"Discrete Hartley transform",
"Distributed computing",
"Distributed hash table",
"Emergence",
"Encryption",
"Hash table",
"Information privacy",
"Key (cryptography)",
"Routing"
],
"id": "04cceeb42618da0ebc534afba74ddc366885e82a",
"inCitations": [],
"journalName": "2017 IEEE 10th International Conference on Cloud Computing (CLOUD)",
"journalPages": "26-33",
"journalVolume": "",
"outCitations": [
"8125fa009f3eeba20464704a7324f92cfa3b83e4",
"74879c098d285c5a5b08789bd737b2991fbea178",
"8145d731f22373de07c0268a8f90689fbcabf3ae",
"35516916cd8840566acc05d0226f711bee1b563b",
"7769c3c2a3f03486d621125dede17b8b8adf397c",
"0a76f32d90a4ed3036482511d351b6db12a34083",
"c3651e31b54d74d593141e870f272d28a26da597",
"035b44ba1dcfb780df810176059df8b027dbc922",
"962777a87e23ad5135bd24d013d2109504e16fcf",
"5f680c8ac6a80f02488237c949e95b7fc35cc8ef",
"3ea6c9ef1884e8724b909b20aa5219406873d312",
"2e42da64d50df21803ed7424041316675669dc9e",
"abb9f5f32eafc414688e02f29abbf353c975992f",
"25e5d5a046afa5fcde7be23d087ae69f4b438e13",
"10473de8f36c463c48152fcd0e09d7e20d00e671",
"6b47f482784022b5c3cd2aefde6d433d32f43746",
"025ce0e02392fc24e9b15ad5444b67cd705a945d",
"03e4f73474351a62abc9abf2fb17ec6277bb064e",
"0368d2445d3ee4205ee73da933cb8b810a89091c",
"4b49d374c9306b929743e7d213c28cd47fc2d4fc",
"2280274c05d578b24205b1af0aebfa552d51c132"
],
"paperAbstract": "In the age of Big Data, advances in distributed technologies and cloud storage services provide highly efficient and cost-effective solutions to large scale data storage and management. Supporting self-emerging data using clouds is a challenging problem. While straight-forward centralized approaches provide a basic solution to the problem, unfortunately they are limited to a single point of trust. Supporting attack-resilient timed release of encrypted data stored in clouds requires new mechanisms for self emergence of data encryption keys that enables encrypted data to become accessible at a future point in time. Prior to the release time, the encryption key remains undiscovered and unavailable in a secure distributed system, making the private data unavailable. In this paper, we propose Emerge, a self-emerging timed data release protocol for securely hiding data encryption keys of private encrypted data in a large-scale Distributed Hash Table (DHT) network that makes the data available and accessible only at the defined release time. We develop a suite of erasure-coding-based routing path construction schemes for securely storing and routing encryption keys in DHT networks that protect an adversary from inferring the encryption key prior to the release time (release-ahead attack) or from destroying the key altogether (drop attack). Through extensive experimental evaluation, we demonstrate that the proposed schemes are resilient to both release-ahead attack and drop attack as well as to attacks that arise due to traditional churn issues in DHT networks.",
"pdfUrls": [
"http://d-scholarship.pitt.edu/32727/1/cloud-2017.pdf",
"https://doi.org/10.1109/CLOUD.2017.13",
"http://www.sis.pitt.edu/bpalan/papers/Emerge-cloud-2017.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/04cceeb42618da0ebc534afba74ddc366885e82a",
"sources": [
"DBLP"
],
"title": "Emerge: Self-Emerging Data Release Using Cloud Data Storage",
"venue": "2017 IEEE 10th International Conference on Cloud Computing (CLOUD)",
"year": 2017
},
"04ce88ca257c62db651478d02afbfd04187b568d": {
"authors": [
{
"ids": [
"3224069"
],
"name": "Xenofon Foukas"
},
{
"ids": [
"1712068"
],
"name": "Mahesh K. Marina"
},
{
"ids": [
"1758370"
],
"name": "Kimon P. Kontovasilis"
}
],
"doi": "10.1145/3117811.3117831",
"doiUrl": "https://doi.org/10.1145/3117811.3117831",
"entities": [
"Access network",
"End-to-end principle",
"Network architecture",
"Over-the-top content",
"Radio access network",
"Requirement",
"Software deployment"
],
"id": "04ce88ca257c62db651478d02afbfd04187b568d",
"inCitations": [
"1ca46f1ea039cd4167f8cce3de0e1f1a2af042e4"
],
"journalName": "",
"journalPages": "127-140",
"journalVolume": "",
"outCitations": [
"7c2e35c0298de36336f1533c8ce737c9a6e92b66",
"23732086a0f61758e2d0a83cc1f08fa8940b9794",
"57cfb44be82575569275dc58e887acbca4ad7fa8",
"25e6612d7700c76a460ba3bfc55e463a11393acd",
"a1d6a88bdceb70107c0be1a9599aa8190530af53",
"8f078271d8bd6b9ff21818de0dc3b4294e5fac12",
"98061392ea59145c415deafab37400f3e9ebac15",
"151af2a0704c13a429db67ed7d9020c84ae89cba",
"0b77241145e21a9ef804b9198372521100044cfd",
"00a328fbab90c024f30c2237e6761ea801872750",
"ea13ed9b14c2d49d1b32db9e1d4807bd6316c7ee",
"a7ec60be77f1e06e73d3f2c3b0165de5ce97e3e7",
"917365d6d19ab2495c2af068a49c1c3c73a117f3",
"6800646e8de9b08e6a2174a927b50bb0e28fbb76",
"0955cb0fde62c786985001e95d8de7b84ced604f",
"f643179599c0b9ca8b817ff9c475cf4166821cc2",
"3ec22dfebf1312740e2c59ce8cb8270627b0544c",
"62fc9a3972bc3e82a4e75248105570446d30d64f",
"3525a3688eef9dec048f2e15b7ac495abe15f208",
"0d4c17bfb68d4d16364b3992ecaff0966affbe19",
"4f28b348747d133b638e257c8215f8f9be5b2434",
"3574657705475722b6c398c266805f758268778b",
"24e13c33e8ac68f6eae9784052e8e1ee70feff98",
"692f891e2dda71ab47a331f8ec2b0bafa9e5854d",
"83f45dc4c48e9307dbceb80a187039300166f8d8",
"643be8f5591c6cbdfc6828eb960ce1fab332d75b",
"4888eae6bc2f50fea1cd2b6c5a5dc5fda9b49d0e",
"64f3a81fff495ac336dccdd63136d451852eb1c9",
"2486d901a041a8a3048d66ab4bf505cf19244a2e",
"32e033c46c731d41cd24082618491d65ad5840d8",
"58b5a4db6d88c355909fa251e63e05efad3b8b7e",
"da71ca4877de496ed243e5b84373e2a426275e1b",
"7954790a779742daf992e533cdaec23e7ffdf60a",
"c924617a9feabc742bbd5f66bf2273b413e7c15c",
"8ea67ce6e59151bfea56fff377b88fa7258641cd",
"28f2ae875b37ce38d5e6c7209e6a705a39a53a47",
"02c76f7d61f1ff47609a19f46aec3e6d0c8a9425",
"58d92176f017f99f0ae623e34fa9303af77cd70b",
"b941a2011b95d09e7858c2d910216cd9ac010f76",
"236c0e3ee64a4dafcfc99a2cc4d9450698dfbf0a",
"d3934ebdf84561799b869173607ef547089b67c7",
"05f66ed2940454c397a279bcb80732f641e94d96",
"859af9a05d8392507d44f13523a867b17c416377",
"2f97728a8d357a3e4c3dd3bd7eeb68757e913604",
"053dafac667c8c36e88cf141ca9a63695f6637c1"
],
"paperAbstract": "Emerging 5G mobile networks are envisioned to become multi-service environments, enabling the dynamic deployment of services with a diverse set of performance requirements, accommodating the needs of mobile network operators, verticals and over-the-top (OTT) service providers. Virtualizing the mobile network in a flexible way is of paramount importance for a cost-effective realization of this vision. While virtualization has been extensively studied in the case of the mobile core, virtualizing the radio access network (RAN) is still at its infancy. In this paper, we present Orion, a novel RAN slicing system that enables the dynamic on-the-fly virtualization of base stations, the flexible customization of slices to meet their respective service needs and which can be used in an end-to-end network slicing setting. Orion guarantees the functional and performance isolation of slices, while allowing for the efficient use of RAN resources among them. We present a concrete prototype implementation of Orion for LTE, with experimental results, considering alternative RAN slicing approaches, indicating its efficiency and highlighting its isolation capabilities. We also present an extension to Orion for accommodating the needs of OTT providers.",
"pdfUrls": [
"http://www.research.ed.ac.uk/portal/files/42138372/orion_final_version_2.pdf",
"http://doi.acm.org/10.1145/3117811.3117831"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/04ce88ca257c62db651478d02afbfd04187b568d",
"sources": [
"DBLP"
],
"title": "Orion: RAN Slicing for a Flexible and Cost-Effective Multi-Service Mobile Network Architecture",
"venue": "MobiCom",
"year": 2017
},
"04dbddadc9b5e947a18cedd5e757829d958483ad": {
"authors": [
{
"ids": [
"36816914"
],
"name": "Peter Snyder"
},
{
"ids": [
"32873584"
],
"name": "Periwinkle Doerfler"
},
{
"ids": [
"3110399"
],
"name": "Chris Kanich"
},
{
"ids": [
"1703426"
],
"name": "Damon McCoy"
}
],
"doi": "10.1145/3131365.3131385",
"doiUrl": "https://doi.org/10.1145/3131365.3131385",
"entities": [
"4chan",
"Cyberstalking",
"Doxing",
"Information sensitivity",
"Social network"
],
"id": "04dbddadc9b5e947a18cedd5e757829d958483ad",
"inCitations": [
"3b28b1fc9109e4d50535f332dfd42a2b1b296e70"
],
"journalName": "",
"journalPages": "432-444",
"journalVolume": "",
"outCitations": [
"09b54aa33fbc7b81b1c2b3c573de3c40c4db46e4",
"713ae236445593ba194ad77a40042e0553179b4a",
"4a7204431900338877c738c8f56b10a71a52e064",
"039cfab52407e5bb3f3e0b16dfd99d7a72479d12",
"14ddd0288f1b29bbb5b6a0166bd6a12cca7bec20",
"e39b586e561b36a3b71fa3d9ee7cb15c35d84203",
"9a4b30f220486992319e026c9a2f56b51956a922",
"9ae976f82e11f7ecc3fd9f8d17a2744582cb22e8",
"0f279b97e9e318b6db58da8da66a565505a0fab6",
"12a3a703aa37d79ba296a83669257a25fcc86bf5",
"716d50c5e55cbb1f9b3b3932ccef9ad4346f922e",
"f53790142d5fa509591f29458d61642e29185b80",
"ab0aab05dc001e75961f7ca138fd0be335be3223",
"87e5931dee6988d95e950837c27a5d59c2536b40",
"2aab45ffcd28f3945f2b3bda34887ccdd14adfc3",
"52c3248151e1d1bee68eb1d9507bf4edcffff0bb",
"4d1aaca480d3bef07f5a6686bfc8af6c3065baec",
"b9895c47cc273d2cd78c9f6320da937497ad0351",
"c9948f7213167d65db79b60381d01ea71d438f94"
],
"paperAbstract": "Doxing is online abuse where a malicious party harms another by releasing identifying or sensitive information. Motivations for doxing include personal, competitive, and political reasons, and web users of all ages, genders and internet experience have been targeted. Existing research on doxing is primarily qualitative. This work improves our understanding of doxing by being the first to take a quantitative approach. We do so by designing and deploying a tool which can detect dox files and measure the frequency, content, targets, and effects of doxing on popular dox-posting sites.\n This work analyzes over 1.7 million text files posted to paste-bin.com, 4chan.org and 8ch.net, sites frequently used to share doxes online, over a combined period of approximately thirteen weeks. Notable findings in this work include that approximately 0.3% of shared files are doxes, that online social networking accounts mentioned in these dox files are more likely to close than typical accounts, that justice and revenge are the most often cited motivations for doxing, and that dox files target males more frequently than females.\n We also find that recent anti-abuse efforts by social networks have reduced how frequently these doxing victims closed or restricted their accounts after being attacked. We also propose mitigation steps, such a service that can inform people when their accounts have been shared in a dox file, or law enforcement notification tools to inform authorities when individuals are at heightened risk of abuse.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3131365.3131385",
"https://conferences.sigcomm.org/imc/2017/slides/IMC%202017.pdf",
"https://www.cs.uic.edu/~psnyder/static/papers/fifteen-minutes.pdf",
"https://conferences.sigcomm.org/imc/2017/papers/imc17-final109.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/04dbddadc9b5e947a18cedd5e757829d958483ad",
"sources": [
"DBLP"
],
"title": "Fifteen minutes of unwanted fame: detecting and characterizing doxing",
"venue": "IMC",
"year": 2017
},
"04f0650ab41af3aad8c0476a9b06826c55356b99": {
"authors": [
{
"ids": [
"40361678"
],
"name": "Sidharth Kumar"
},
{
"ids": [
"1732339"
],
"name": "Duong Hoang"
},
{
"ids": [
"8808472"
],
"name": "Steve Petruzza"
},
{
"ids": [
"1870103"
],
"name": "John Edwards"
},
{
"ids": [
"1685087"
],
"name": "Valerio Pascucci"
}
],
"doi": "10.1109/HiPC.2017.00034",
"doiUrl": "https://doi.org/10.1109/HiPC.2017.00034",
"entities": [
"Data aggregation",
"Domain model",
"Fastest",
"Hierarchical database model",
"Internet bottleneck",
"Network congestion",
"Overhead projector",
"Simulation",
"Span and div",
"Speedup",
"Supercomputer"
],
"id": "04f0650ab41af3aad8c0476a9b06826c55356b99",
"inCitations": [],
"journalName": "2017 IEEE 24th International Conference on High Performance Computing (HiPC)",
"journalPages": "223-232",
"journalVolume": "",
"outCitations": [
"176d712d084112b2e65e385e8220e4679c24f28a",
"05e0dd9ba23f99acf5537b51f3a3263d3febe6dc",
"2da4ab6c02d97fe47b589ddd450a5c41f2b47bb9",
"18ff47d4024f9ba7fdb7c21c6c49ffbe9a6ed99f",
"0b1d26613dc0bd12da5c3f9d637d5e8571621395",
"57eb0364d4c545a077ec7d66a067b0426962dda2",
"34e64b546a37df201ecb29cad0248df029a71adb",
"409ed5839cf6d0ba246d91f82d1ac33cbe600c27",
"dcba56ee1fa047e1c983336ecb4099dab46cd749",
"bd3d50ea47c6073d1dcd0582e49e01c3df702b23",
"59a902d3a87001aaf091752773e8b4679651499c",
"8de993e56cc95df26171741d8f33ae3d83f3261d",
"058224ac7b9bc0a0b82e62257656c7a6df62219e",
"2680e43fff9b16200106702e0c5165685312d52d",
"25d5f7757ebd0b7a5cde7bf64c83ad0020318f39",
"547014986afdf86ced23cdcce4583ee04f464160",
"c750b9288ed25777e5b7129139e01c143177324c",
"a7c58954468de7113ac1e1588a3efa6683add7f3",
"4468833a27f2641d15eee8335bc4263abc6d26ea",
"36033cc275f927d2835bce6d19ec727fdb1a2fb4",
"155f59e40f1ad2467e004dfcb4bb9ccf5522d1d1",
"1f1ddb2c47b45653f759e69fabdbf21aab7656f9",
"1103f46b77bed0f597e7289ee54073d5190853a9",
"919f9b4c78e1af2ba4c343ec504bc6193709ed77",
"c0c56908d343d52669e1aee072dd611681dc831f",
"12e7574576be81bcc9827754ec1593ed3e75d14a"
],
"paperAbstract": "Hierarchical data representations have been shown to be effective tools for coping with large-scale scientific data. Writing hierarchical data on supercomputers, however, is challenging as it often involves all-to-one communication during aggregation of low-resolution data which tends to span the entire network domain, resulting in several bottlenecks. We introduce the concept of indexing templates, which succinctly describe data organization and can be used to alter movement of data in beneficial ways. We present two techniques, domain partitioning and localized aggregation, that leverage indexing templates to alleviate congestion and synchronization overheads during data aggregation. We report experimental results that show significant I/O speedup using our proposed schemes on two of today's fastest supercomputers, Mira and Shaheen II, using the Uintah and S3D simulation frameworks.",
"pdfUrls": [
"http://doi.ieeecomputersociety.org/10.1109/HiPC.2017.00034",
"http://www.sci.utah.edu/publications/Kum2017a/HiPC_2017_IEEE.pdf",
"http://www.cs.utah.edu/~sikumar/papers/HiPC_2017.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/04f0650ab41af3aad8c0476a9b06826c55356b99",
"sources": [
"DBLP"
],
"title": "Reducing Network Congestion and Synchronization Overhead During Aggregation of Hierarchical Data",
"venue": "2017 IEEE 24th International Conference on High Performance Computing (HiPC)",
"year": 2017
},
"0518cb9b83f94125cc3e7e617dad996ec139ed53": {
"authors": [
{
"ids": [
"32051146"
],
"name": "Amit A. Levy"
},
{
"ids": [
"4290484"
],
"name": "Bradford Campbell"
},
{
"ids": [
"2260383"
],
"name": "Branden Ghena"
},
{
"ids": [
"2234849"
],
"name": "Daniel B. Giffin"
},
{
"ids": [
"3302895"
],
"name": "Pat Pannuto"
},
{
"ids": [
"1735731"
],
"name": "Prabal Dutta"
},
{
"ids": [
"1721681"
],
"name": "Philip Levis"
}
],
"doi": "10.1145/3132747.3132786",
"doiUrl": "https://doi.org/10.1145/3132747.3132786",
"entities": [
"Computer multitasking",
"Concurrency (computer science)",
"Dependability",
"Embedded system",
"Fault detection and isolation",
"Low-power broadcasting",
"Memory management",
"Memory protection",
"Microcontroller",
"Operating system",
"Programming language",
"Rust",
"Type safety"
],
"id": "0518cb9b83f94125cc3e7e617dad996ec139ed53",
"inCitations": [
"090448627c52f2586816277cd97fc2c13b1e07c6",
"5bb6dfc59e7206f9845ea7bf8ae3985a71b35318",
"08002ccb91de1dc63dbfaa8c34f25cfffd68f6bc"
],
"journalName": "",
"journalPages": "234-251",
"journalVolume": "",
"outCitations": [
"139448e4bcf8e4a4c2563e2efc97af36e1753ee8",
"2074c9bb69a75b6c83e3b9f842d444c6cf4da3e5",
"16a455aeacd14529bee92b0c197619fa2d173151",
"0d3453d2de7ff2acdd0f0b841f138228553edb6d",
"2530079d98f216a88dd5d91be12a48c6e39d143e",
"06a5e486828fc79018f3d2889d6475aeb2692523",
"332e1f6b86760a02e17c0c98abc5b89bae9088a6",
"a98d7af52fe5ba44a5c8b0a3dceb95109bc4c339",
"57e6335af738f8051746c0d6af58bc0afb008c04",
"11c6a5905966c437055dcf7f11ae80401a18d0dd",
"642da8b5b22adac15a2613d4f813c0d2637e93d9",
"0ce5f33c20d686f414b0d91665a73d2e5b1fbc78",
"5d5190477e22977b3c286558bc5fe3a27ab375d3",
"adc1da0f52501b60a28e79c9233e9bd23f308c24",
"9b1485630ffaaa543acff16741343437cdaae08a",
"066add40724f1022011ef4e17a39c7d66c88397c",
"4f5b7cd8d57a314851f5daa395b6eb178ad582ed",
"77f69dd05370d7829c7aeb8457df9b58751d9d80",
"50eba68089cf51323d95631c2f59ff916848863f",
"43fb7b102ea54ce51b6fcd42005698ae1399e25e",
"15aaa56f06eca80760943e47f1781591209f2860",
"b6741f7862be64a5435d2625ea46f0508b9d3fee",
"94ac53e5e7e4eeda742c1df3c46c1edec9bea4a4",
"0f091484790fc7a4807c3bf4d6019db63d1d4097",
"33b85ea9b4fb28ac893167c29529d62d355c06a5",
"09ccf9a6f0d890a156731db6899225eadea1df5d",
"28ece685d21306453e257bd39d8d94bc142e81c5",
"5e105f04394d59fd29f62d0c8f303011ce63805b",
"58683a098aee33ed6755d1fc4b950127ddee969d",
"2d09016fa20fbaf3bb2a419a93c14d4363bc4db3",
"089895ef5f96bdb7eed9dd54f482c22350c2f30d",
"0f04a0b658f00f329687d8ba94d9fca25269b4b7",
"8af2c2056a8cbd6eba90cd4e4f9911a19d03d4cc"
],
"paperAbstract": "Low-power microcontrollers lack some of the hardware features and memory resources that enable multiprogrammable systems. Accordingly, microcontroller-based operating systems have not provided important features like fault isolation, dynamic memory allocation, and flexible concurrency. However, an emerging class of embedded applications are software platforms, rather than single purpose devices, and need these multiprogramming features. Tock, a new operating system for low-power platforms, takes advantage of limited hardware-protection mechanisms as well as the type-safety features of the Rust programming language to provide a multiprogramming environment for microcontrollers. Tock isolates software faults, provides memory protection, and efficiently manages memory for dynamic application workloads written in any language. It achieves this while retaining the dependability requirements of long-running applications.",
"pdfUrls": [
"https://lab11.eecs.umich.edu/content/pubs/levy17multiprogramming.pdf",
"http://amitlevy.com/papers/tock-sosp2017.pdf",
"https://sing.stanford.edu/site/publications/levy17-tock.pdf",
"http://doi.acm.org/10.1145/3132747.3132786",
"http://web.eecs.umich.edu/~prabal/pubs/papers/levy17tock.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/0518cb9b83f94125cc3e7e617dad996ec139ed53",
"sources": [
"DBLP"
],
"title": "Multiprogramming a 64kB Computer Safely and Efficiently",
"venue": "SOSP",
"year": 2017
},
"051961468e3e7a3855eaff8ac9ec35e0235a4a38": {
"authors": [
{
"ids": [
"36816914"
],
"name": "Peter Snyder"
},
{
"ids": [
"38044867"
],
"name": "Cynthia Taylor"
},
{
"ids": [
"3110399"
],
"name": "Chris Kanich"
}
],
"doi": "10.1145/3133956.3133966",
"doiUrl": "https://doi.org/10.1145/3133956.3133966",
"entities": [
"Application programming interface",
"Browser extension",
"Browser security",
"Hypermedia",
"Privacy",
"Source lines of code",
"Web API",
"Web application"
],
"id": "051961468e3e7a3855eaff8ac9ec35e0235a4a38",
"inCitations": [
"e766cb4ebdaaadb6e1d4c9022bedbc4100f91506"
],
"journalName": "",
"journalPages": "179-194",
"journalVolume": "",
"outCitations": [
"40d41c8c94e71d76ad84bc2a7154800cb2693fdd",
"89d1633f0019ff2d561132a29fa5a9ab549fa8bd",
"38528fada34bad059cbbe1e424f12497ba6f8bb8",
"9b5f6b2b56a698a8d56dd3d7847d0821daf18bca",
"c274145195b73ea6b6f57f7bc4a88460dbacf045",
"18c48a28a0d97496651e8c966b5dbc3983a15b28",
"284f2732a9ce5507d171a0821f6c2e7264021ed8",
"01dbc5466cce6abd567cc5b34a481f5c438fb15a",
"fe2f4faec5cf209ae7d8a73100db9cce46ce53d4",
"9a3c791067911d17a79918b1b0b5826beaeb2fe1",
"b3dc76e3478f97b2c5bced80f4ebaa587f146b53",
"aeb3fc01c0c834b9d64c3cf5c3a1e0e499326dbb",
"282df29b34f3fde19480c39daf7b44bf703b4649",
"9a2934caacf51e28030b9c60cfd4671ddeb4128e",
"a329abfdd35fb908cbf35d2a26327f704a4f7a17",
"66a6b8b5086454d2f511089ed3c157075239eb7d",
"268be1a8339965aa7cfaa5fe113ed34fe1b7be16",
"48b5dd4b43e403a17c3a94688efa666b554b8882",
"0d939c3826455ca42310a92d5c00a956c4630b0e",
"8db5fd6c8b016d3dfc3d2e8761ceb65e14cd2405",
"598848aaa4aa40bb6b7ab51490821a173cf18800",
"a155264f143aafd380f40fd0167c9b7960f64ea2",
"06cd648c3b90aaa66305af9a41714aa5ded54dd8",
"31c4320abb49b83f68b09ce355df708a3c3be363",
"18c1a15663d568e865a639980c846f37708ebb09",
"482fcc1057c6ed9ea21f71c990088eeb092ec243",
"0c0b65e6f9ff235b62b1dec87ab905c54fc13d96",
"3188dc28042effbd519005ec18c07e7afa51c975",
"0d2f693901fba451ede4d388724b0e3f57029cd3"
],
"paperAbstract": "Modern web browsers have accrued an incredibly broad set of features since being invented for hypermedia dissemination in 1990. Many of these features benefit users by enabling new types of web applications. However, some features also bring risk to users' privacy and security, whether through implementation error, unexpected composition, or unintended use. Currently there is no general methodology for weighing these costs and benefits. Restricting access to only the features which are necessary for delivering desired functionality on a given website would allow users to enforce the principle of lease privilege on use of the myriad APIs present in the modern web browser.\n However, security benefits gained by increasing restrictions must be balanced against the risk of breaking existing websites. This work addresses this problem with a methodology for weighing the costs and benefits of giving websites default access to each browser feature. We model the benefit as the number of websites that require the feature for some user-visible benefit, and the cost as the number of CVEs, lines of code, and academic attacks related to the functionality. We then apply this methodology to 74 Web API standards implemented in modern browsers. We find that allowing websites default access to large parts of the Web API poses significant security and privacy risks, with little corresponding benefit.\n We also introduce a configurable browser extension that allows users to selectively restrict access to low-benefit, high-risk features on a per site basis. We evaluated our extension with two hardened browser configurations, and found that blocking 15 of the 74 standards avoids 52.0% of code paths related to previous CVEs, and 50.0% of implementation code identified by our metric, without affecting the functionality of 94.7% of measured websites.",
"pdfUrls": [
"https://arxiv.org/pdf/1708.08510v1.pdf",
"https://csaw.engineering.nyu.edu/application/files/9915/0825/7322/CSAW17_paper_42.pdf",
"https://www.cs.uic.edu/~psnyder/static/papers/most-websites-don-t-need-to-vibrate.pdf",
"https://arxiv.org/pdf/1708.08510v2.pdf",
"http://arxiv.org/abs/1708.08510",
"https://www.cs.uic.edu/~cynthiat/pubs/ccs17.pdf",
"http://doi.acm.org/10.1145/3133956.3133966"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/051961468e3e7a3855eaff8ac9ec35e0235a4a38",
"sources": [
"DBLP"
],
"title": "Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security",
"venue": "CCS",
"year": 2017
},
"05313e1290182beb7e06f6f527d144cf70e77cdb": {
"authors": [
{
"ids": [
"2185243"
],
"name": "Mohammad Noormohammadpour"
},
{
"ids": [
"1756733"
],
"name": "Cauligi S. Raghavendra"
},
{
"ids": [
"40282073"
],
"name": "Sriram Rao"
},
{
"ids": [
"1741860"
],
"name": "Srikanth Kandula"
}
],
"doi": "",
"doiUrl": "",
"entities": [
"Algorithm",
"Cloud computing",
"Data center",
"Experiment",
"Load balancing (computing)",
"Overhead (computing)",
"Point-to-multipoint communication",
"Simulation",
"Telecommunications link",
"The Coroner's Toolkit"
],
"id": "05313e1290182beb7e06f6f527d144cf70e77cdb",
"inCitations": [
"9bbd5be2829e49b1fac7f034baf7499cb069db95",
"c73eb48e66fe4541bc16e9d75e4966d111acd830",
"63bb7501faa99154efee231efeb294f3deccf70e",
"890dae1eda8b9ba83912611128286cd762e8955e",
"983153b0d5883ea42eb18ba5fe29b7fdc2418bfd"
],
"journalName": "CoRR",
"journalPages": "",
"journalVolume": "abs/1707.02096",
"outCitations": [
"c92eb7d492ce6b4e471c33a2b2cf7ce9f30e4b55",
"82cb824eb340c7b6e9230af4c2a22093393fea29",
"2a628e4a9c5f78bc6dcdf16514353336547846cc",
"c2825bd36ccb5e231baad9fe329a299c12cea8e4",
"d40fc1b77a453ed004a7ea0d0f4f31f1263165ca",
"0e482d54f234766f0792707479dd8719f86cb17e",
"098cb3139059c6c8b51da998a5df585d6552c475",
"18f3787b4eaf0ca00ede2e783ba043b250116a41",
"2de63b0c867b290d4f7217459c968aa98e5ad39d",
"6428d17dc46e10e4e0458d606c4ba6b26106dd3b",
"1edb070e3530f1a02ecd76f6621f7719d13b2109",
"626434a07a56c0a127d122e8fb6b7c0d17f1c608",
"8d8b8e90077f9906dff0e760dc51394863e462a5",
"b49121b0834ba418a1926e91d85e29040a481f45",
"190abe965d98de2e9dcd26e501fce2516acd8bab",
"3470547c5d91da6e51e30626d3fc35c9bbc4d1e0",
"6bb153f0decfe3ca5e4d13a4fe8472837d750788",
"610ca25419e47a3e1b088e944277acadc2ecf6b5",
"3d76026cdced10c764453d6b8f0a32fd074d1995",
"233c7b2aa05ed9b5e18302bad6bf2425766a51f1",
"085abcc5a0ec77b2560c1a34391401d06489e059",
"0aabcfbbd125ca095a08292aeb56a6d281648615",
"1c2122e6e140301f5d9e56f8bae476105bc01fcb",
"aebe75efbdade65e22f05b6b8c2386af8fc2b8ff",
"4e046da90c233bcfc128921f65b7bd27df226330",
"235da9c0f828b60300f7e5cfa2ca6aaa116dd14c",
"7b1701e8d3d8636b7c9e1dd5d1b48e3ace62af5d",
"9ec3c21756d88abd6ec4b2b50cf2f529564ebcb0",
"4687fdf3c77ef00700fdf1399f7dd81bfe87ef97",
"2e8a322666a89adf83e8e0e7cbc5142fba5e7b01",
"065465ac37607a347186ea50873fc63d17cd2c79",
"2053f512ab4fd5e5f0f08e3fbf64927a844ee2a5",
"068e59b88a1230d709d99c83a45d3a5b91260810",
"140e387b9268681e1379ecf4c5a6e21c96da8e5d",
"908f7931de8768786d9ef7d64f5a8156860709dd",
"22dba54ce93c528bb4d8ebeef7f0fcc9e9ae2e05",
"4592090c7283a8e49ceddcdb0f9d87c1be1056c1",
"65503e174262d82c8a03278fa576da23a4bcdf2b",
"2e3cc2d55770aac26d3ce0cb6ddd96dbbcfec4cc",
"1cafaac11664e48bd121695ac1be06b0930d00a5"
],
"paperAbstract": "Using multiple datacenters allows for higher availability, load balancing and reduced latency to customers of cloud services. To distribute multiple copies of data, cloud providers depend on inter-datacenter WANs that ought to be used efficiently considering their limited capacity and the ever-increasing data demands. In this paper, we focus on applications that transfer objects from one datacenter to several datacenters over dedicated inter-datacenter networks. We present DCCast, a centralized Point to Multi-Point (P2MP) algorithm that uses forwarding trees to efficiently deliver an object from a source datacenter to required destination datacenters. With low computational overhead, DCCast selects forwarding trees that minimize bandwidth usage and balance load across all links. With simulation experiments on Google\u2019s GScale network, we show that DCCast can reduce total bandwidth usage and tail Transfer Completion Times (TCT) by up to 50% compared to delivering the same objects via independent point-to-point (P2P) transfers.",
"pdfUrls": [
"https://arxiv.org/pdf/1707.02096v1.pdf",
"http://arxiv.org/abs/1707.02096",
"https://www.usenix.org/conference/hotcloud17/program/presentation/noormohammadpour",
"https://www.usenix.org/system/files/conference/hotcloud17/hotcloud17-paper-noormohammadpour.pdf"
],
"pmid": "",
"s2PdfUrl": "http://pdfs.semanticscholar.org/0531/3e1290182beb7e06f6f527d144cf70e77cdb.pdf",
"s2Url": "https://semanticscholar.org/paper/05313e1290182beb7e06f6f527d144cf70e77cdb",
"sources": [
"DBLP"
],
"title": "DCCast: Efficient Point to Multipoint Transfers Across Datacenters",
"venue": "HotCloud",
"year": 2017
},
"053dc612683a45783efd672f7a6803cce07372ef": {
"authors": [
{
"ids": [
"2038661"
],
"name": "Bogdan Ghit"
},
{
"ids": [
"1776848"
],
"name": "Dick H. J. Epema"
}
],
"doi": "10.1145/3078597.3078600",
"doiUrl": "https://doi.org/10.1145/3078597.3078600",
"entities": [
"Apache Hadoop",
"Application checkpointing",
"Failure rate",
"Fault tolerance",
"In-memory database",
"Jumpstart Our Business Startups Act",
"Load (computing)",
"Simulation",
"Spark"
],
"id": "053dc612683a45783efd672f7a6803cce07372ef",
"inCitations": [
"3105cd78fb5f9c62ccf0346e061579e2bcd130c6"
],
"journalName": "",
"journalPages": "105-116",
"journalVolume": "",
"outCitations": [
"18baeaa09ce028fb3044a89430a4939f270bc480",
"0c83169bf4ebb29979bfe47708cb6b79b6e28755",
"9c378565a0b510890b474df039caab1f2d58bded",
"2997dfa7fea0c32c9438b7576c4509923fe8d457",
"2870353565e86f26a3f1459a4d063467b609933a",
"4bf59b4d21968de33020e78cd8f20306eac2c247",
"f2f3f15dbf10cc68503713cfc77d13f274019d54",
"045a50ec31973fee15ff967f18e016fae77fd1f3",
"0d3533cc0aa6feed97c294a37cd06cd887d354d2",
"5568df48a03cd16e286025c812f1912a7d1c1766",
"aabf5c0907f2eaeed488127dcd5fd1b4149cae02",
"12635bdd3bd32f09c85a9070977a281fcb32ff61",
"06230d13e276bd871a378ca932a41b5cff94e29f",
"3aa0e9578b2d8a482e4720f4a5ff08f78b487a52",
"168b8cbbbacd234f23b70b952ef58b5b56e67529",
"6906ffdd7d5448ed52f3a28c9092739e76c79691",
"fb35b5bc1e02de4d9b31176c39247ee9ad6c3290",
"3e257f01e3ee71545d824a1615c35659525b856a",
"981058ba0c417be6377823bed3b204e6a85a61e6",
"7e74ea151efcdcfecffdbeaec0728f9ac1f80389"
],
"paperAbstract": "Providing fault-tolerance is of major importance for data analytics frameworks such as Hadoop and Spark, which are typically deployed in large clusters that are known to experience high failures rates. Unexpected events such as compute node failures are in particular an important challenge for in-memory data analytics frameworks, as the widely adopted approach to deal with them is to recompute work already done. Recomputing lost work, however, requires allocation of extra resource to re-execute tasks, thus increasing the job runtimes. To address this problem, we design a checkpointing system called Panda that is tailored to the intrinsic characteristics of data analytics frameworks. In particular, Panda employs fine-grained checkpointing at the level of task outputs and dynamically identifies tasks that are worthwhile to be checkpointed rather than be recomputed. As has been abundantly shown, tasks of data analytics jobs may have very variable runtimes and output sizes. These properties form the basis of three checkpointing policies which we incorporate into Panda.\n We first empirically evaluate Panda on a multicluster system with single data analytics applications under space-correlated failures, and find that Panda is close to the performance of a fail-free execution in unmodified Spark for a large range of concurrent failures. Then we perform simulations of complete workloads, mimicking the size and operation of a Google cluster, and show that Panda provides significant improvements in the average job runtime for wide ranges of the failure rate and system load.",
"pdfUrls": [
"https://pure.tudelft.nl/portal/files/29539984/HPDC2017_Ghit_Epema.pdf",
"http://pure.tudelft.nl/ws/files/29539984/HPDC2017_Ghit_Epema.pdf",
"http://doi.acm.org/10.1145/3078597.3078600"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/053dc612683a45783efd672f7a6803cce07372ef",
"sources": [
"DBLP"
],
"title": "Better Safe than Sorry: Grappling with Failures of In-Memory Data Analytics Frameworks",
"venue": "HPDC",
"year": 2017
},
"053f06b15e59aaec4cbb4ae56694590f0206ed12": {
"authors": [
{
"ids": [
"1736809"
],
"name": "Kartik Nayak"
},
{
"ids": [
"2012099"
],
"name": "Christopher W. Fletcher"
},
{
"ids": [
"35584790"
],
"name": "Ling Ren"
},
{
"ids": [
"1767573"
],
"name": "Nishanth Chandran"
},
{
"ids": [
"1685076"
],
"name": "Satyanarayana V. Lokam"
},
{
"ids": [
"1726246"
],
"name": "Elaine Shi"
},
{
"ids": [
"1707396"
],
"name": "Vipul Goyal"
}
],
"doi": "",
"doiUrl": "",
"entities": [
"Benchmark (computing)",
"Black box",
"Computer simulation",
"Context switch",
"Cryptography",
"Field-programmable gate array",
"Gate array",
"Hop",
"Instruction scheduling",
"Obfuscation (software)",
"Oblivious ram",
"Processor design",
"Provable security",
"Random-access memory",
"Scheduling (computing)",
"Scratchpad memory",
"Simulation"
],
"id": "053f06b15e59aaec4cbb4ae56694590f0206ed12",
"inCitations": [
"2c74b71b0ef24c20fc959c7bd82fa82097187327",
"50ba271c1e0ddd814b6e79348a8963c788d9ddf9",
"53f7a3697e3e5c620f5413b77e86488d7bf089a9",
"4da6fa9a83e74d42e04a78d1da73716f64b21578",
"7557e87f01563f1c37b771d6bce82ae69fa27343",
"50f7cdbd2d99641dbbb6bb706e37b011508af28a",
"210fadeda1d9f109e0fd333a2afdd1509f0f5d51"
],
"journalName": "",
"journalPages": "",
"journalVolume": "",
"outCitations": [
"3181b9ce21265bbf8175314714e1535f75b3d80f",
"24706cbf8c48414ed66db6fbf223c47452f7cbdc",
"3ca369fa2cadb403db7ac5e75deefd9acbb10723",
"98cccb17fbefc01a6310574f25e591ab9d2586e2",
"51e2b3d61d5af53ef9d8f3e5ae98d20bf9d4b084",
"6d6bd93c620885cb5ddd5abfac19efffac132cd5",
"ec9f42a034a35a8fb7b3be212dab1dad947b47d9",
"3c4e907c07944cd55e800b4e55918adf8cb2a683",
"8a41c198449d0f30de5427fe753c6b10bbb7255d",
"21cbabb34e3004823005e8181044c65b20519d06",
"20b63210954f7c5a70664f301dcd7196856ccfa7",
"d7980c5ee4614b258f7326b05ccd5efa5cf391d8",
"05c49820bb35d0b8d7a2168a9124e506a0334b57",
"4c7b9c8cd1057ff24cf3e14c3d8de22ecf49762f",
"ec79422e0bfdb61d8b6d2a6ec5b2dfbcab970852",
"12b06d1555b07926b5691aabd6308ef3b452f53a",
"19f7caf88ba1e30eb85bdab58b092e46b1a054c0",
"0101445aec81d2dec8562a83e656ac6ccd633ee2",
"565ed53f4a40a98b18a389a3790a7fe62a525f58",
"304c2b0b6e8e1cc746117a14257dbc024d5135e9",
"42333e3f231bbfe508f6da6bad2feff9ae223113",
"9af882e9b6002731eb93110e654dd413e43887c8",
"2f9a90ce5c67e7601f5110f212d81176137517b7",
"0e7c0199bbb4533e8f074d914a45351d80e5cb55",
"2fe30c45b16da9cdbdbb4462c857a68f2f4dd54d",
"0541d5338adc48276b3b8cd3a141d799e2d40150",
"8a37efc82e54353d387cfb073f9379c053988aef",
"37e5f1f2415fbb7a5b24d9493ad5ac1086c4bd30",
"7622200b9459a8c0e25e74ce7316c2402862e919",
"5d0d384f9ba8b8e2fe0785be3e888c481114f811",
"92eaba06af12761b5c64b84e6028d21cd05af9dd",
"386c5e8f9e2f289c5c1df458e9043c04475cfdc5",
"4eb80db02471e09bc70baa83720fc21604cc6f58",
"724787ea1a4fedd69e961b8ec1c352f4b77bb1b0",
"0003c342fd0b3e48a483901bd3b731b974fc1f37",
"b10cb04fd45f968d29ce0bdc17c4d29d12e05b67",
"076e9f5d5b3e813b0cfa5dd3e47f1b8591136bf2",
"3e565182551bf91cddd6676f1292fc1c601019e9",
"078b855c40fefabd766a09f23280c59feef21634",
"cdbef43013d6849806ff9be354eb51f7e42dcd74",
"8f1247646e29e07dddbec698f281d06cee87acbe",
"2b004e0484f4940fca341fa97ecb8ac94fe780a5",
"fd78630a003dbb1a40d438d7326593e79a87ad95",
"07ceee8590b93f1d0d19a163c597dc844c313f40",
"2065450d96aca38c79cad5172b58660765533650",
"1debdeea67b3e0825ea4bec811f299563645a24f",
"9875abbef7a859c5a276dca9274e2a296d1998de",
"059045328e385abafd145593b0d8067ea4e2ec99",
"4c60ec65bd28c6637f82ee3f6ad28d6eaa9c4824",
"7ebde6e808ddb9f29287f26718da4b4fd159f4bf"
],
"paperAbstract": "Program obfuscation is a central primitive in cryptography, and has important real-world applications in protecting software from IP theft. However, well known results from the cryptographic literature have shown that software only virtual black box (VBB) obfuscation of general programs is impossible. In this paper we propose HOP, a system (with matching theoretic analysis) that achieves simulation-secure obfuscation for RAM programs, using secure hardware to circumvent previous impossibility results. To the best of our knowledge, HOP is the first implementation of a provably secure VBB obfuscation scheme in any model under any assumptions. HOP trusts only a hardware single-chip processor. We present a theoretical model for our complete hardware design and prove its security in the UC framework. Our goal is both provable security and practicality. To this end, our theoretic analysis accounts for all optimizations used in our practical design, including the use of a hardware Oblivious RAM (ORAM), hardware scratchpad memories, instruction scheduling techniques and context switching. We then detail a prototype hardware implementation of HOP. The complete design requires 72% of the area of a V7485t Field Programmable Gate Array (FPGA) chip. Evaluated on a variety of benchmarks, HOP achieves an overhead of 8\u00d7 \u223c 76\u00d7 relative to an insecure system. Compared to all prior (not implemented) work that strives to achieve obfuscation, HOP improves performance by more than three orders of magnitude. We view this as an important step towards deploying obfuscation technology in practice.",
"pdfUrls": [
"https://www.internetsociety.org/sites/default/files/ndss2017_07-4_Nayak_paper.pdf",
"http://www.cs.umd.edu/~kartik/papers/10_hop.pdf",
"https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/hop-hardware-makes-obfuscation-practical/",
"http://dimacs.rutgers.edu/Workshops/RAM/Slides/nayak.pdf",
"https://www.microsoft.com/en-us/research/wp-content/uploads/2016/11/hop-slides.pdf"
],
"pmid": "",
"s2PdfUrl": "http://pdfs.semanticscholar.org/fc2b/a97178e665c25b99381aac8bc6249a4ceed0.pdf",
"s2Url": "https://semanticscholar.org/paper/053f06b15e59aaec4cbb4ae56694590f0206ed12",
"sources": [
"DBLP"
],
"title": "HOP: Hardware makes Obfuscation Practical",
"venue": "NDSS",
"year": 2017
},
"0550ea9c4fe35fe005cdbcf8b63ae18ae310960d": {
"authors": [
{
"ids": [
"3607439"
],
"name": "Liming Dong"
},
{
"ids": [
"21618914"
],
"name": "Weidong Liu"
},
{
"ids": [
"23213997"
],
"name": "Renchuan Li"
},
{
"ids": [
"1690784"
],
"name": "Tiejun Zhang"
},
{
"ids": [
"1752014"
],
"name": "Weiguo Zhao"
}
],
"doi": "10.1007/978-3-319-64203-1_22",
"doiUrl": "https://doi.org/10.1007/978-3-319-64203-1_22",
"entities": [
"Algorithm",
"Branch and bound",
"IBM Tivoli Storage Productivity Center",
"Medoid",
"Parallel database",
"Partition (database)",
"Plan",
"Relational database management system",
"SQL"
],
"id": "0550ea9c4fe35fe005cdbcf8b63ae18ae310960d",
"inCitations": [],
"journalName": "",
"journalPages": "303-316",
"journalVolume": "",
"outCitations": [
"1e557937f418accc13f9c5edb33a3d48259d80e5",
"71c1a0fc681a7a62cdd1c6a533e5f581e2287781",
"f010eef368d69d6ef80c473012aa83b49e7ee0e8",
"9a11bbaf9af5ce7988386e6da8d6d3acb587f5ef",
"d1c21c34936f587779c216ed79ca33883845caa1",
"461cad26f0d3d2e76405e02791d3797c723b4d73",
"8de7bef0ebfa65889fbb4751d09017d63a9cd3d9",
"229467e56c6093cb1f5927f8ffeddd51ac012934",
"006b89abc356c1c3bf2dfa35f47c0601c39dce38",
"9fc1d0e4da751a09b49f5b0f7e61eb71d587c20f",
"39ac2e0fc4ec63753306f99e71e0f38133e58ead",
"347920406c9a9a3846adf485e2b864d4523a0652",
"3112be4824d8e385d62e6c54a7da497d7b25e8ac"
],
"paperAbstract": "In parallel database systems, data is partitioned and replicated across multiple independent nodes to improve system performance and increase robustness. In current practice of database partitioning design, all replicas are uniformly partitioned, however, different statements may prefer contradictory partitioning plans, so a single plan cannot achieve the overall optimal performance for the workload. In this paper, we propose a novel approach of replica-aware data partitioning design to address the contradictions. According to the access graph of SQL statements, we use the k -medoids algorithm to classify workload into statement clusters, then we use the branch-and-bound algorithm to search for the optimal partitioning plan for each cluster. Finally, we organize replicas with these plans, and route statements to their preferred replicas. We use TPC-E, TPC-H and National College and University Enrollment System (NACUES) to evaluate our approach. The evaluation results demonstrate that our approach improves system performance by up to 4x over the current practice of partitioning design.",
"pdfUrls": [
"https://doi.org/10.1007/978-3-319-64203-1_22"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/0550ea9c4fe35fe005cdbcf8b63ae18ae310960d",
"sources": [
"DBLP"
],
"title": "Replica-Aware Partitioning Design in Parallel Database Systems",
"venue": "Euro-Par",
"year": 2017
},
"055359bf3807f067db7b3518540b719759df2388": {
"authors": [
{
"ids": [
"1690745"
],
"name": "Johannes Hofmann"
},
{
"ids": [
"1694080"
],
"name": "Georg Hager"
},
{
"ids": [
"1708441"
],
"name": "Gerhard Wellein"
},
{
"ids": [
"1798887"
],
"name": "Dietmar Fey"
}
],
"doi": "10.1007/978-3-319-58667-0_16",
"doiUrl": "https://doi.org/10.1007/978-3-319-58667-0_16",
"entities": [
"Benchmark (computing)",
"Broadwell (microarchitecture)",
"CPU cache",
"Clock rate",
"Graph500",
"HPCG benchmark",
"Haswell (microarchitecture)",
"Ivy Bridge (microarchitecture)",
"Memory hierarchy",
"Sandy Bridge",
"Throughput",
"Uncore",
"snoop"
],
"id": "055359bf3807f067db7b3518540b719759df2388",
"inCitations": [
"43c75b376612800639bd9b23797690be44add6f6"
],
"journalName": "",
"journalPages": "294-314",
"journalVolume": "",
"outCitations": [
"044c1f0bcda1af4a5eb98074e46d847507a8384f",
"8ca9b31b957a8bf45b27d9caeb93b91437d50571",
"55512fc0be51166c06fbde0eda8c1e4cdccd298c",
"67cf1189c859d66bac309f9438df434fb651f97a",
"7c0c02245f6704a00800a43ecf7d87f0e977ff7e",
"9849a9a60d05c79e5cb757ef784982744ebab679",
"0f9080d297fc22dcf24dfd8ffcd3de5cea04c689",
"7caf696ceedc1d47c1cb54b1f0fcbf6c67a44613",
"2636777505e35452269dce101a6e4bc3577bccef",
"a62f4f774b8d473211fc5fdd2d54841107d5940a",
"d8d7a9c16c49b4456ef304f71ff91ee6e3039be6",
"aba0621a287a1aa2161d577ba81281864f3fcf3d",
"377175d109126aea51714e8ef0e4324d28eb6fcc",
"c793f23187645bfbc7424645e8b5e306f354807a",
"7f864cfdde0a6f92e90ac53a73079f4bea884d85",
"561dcca4267f105e7308751ee73a9273810f8079",
"092217c2267f6e0673590aa151d811e579ff7760"
],
"paperAbstract": "This paper presents a survey of architectural features among four generations of Intel server processors (Sandy Bridge, Ivy Bridge, Haswell, and Broadwell) with a focus on performance with floating point workloads. Starting on the core level and going down the memory hierarchy we cover instruction throughput for floating-point instructions, L1 cache, address generation capabilities, core clock speed and its limitations, L2 and L3 cache bandwidth and latency, the impact of Cluster on Die (CoD) and cache snoop modes, and the Uncore clock speed. Using microbenchmarks we study the influence of these factors on code performance. This insight can then serve as input for analytic performance models. We show that the energy efficiency of the LINPACK and HPCG benchmarks can be improved considerably by tuning the Uncore clock speed without sacrificing performance, and that the Graph500 benchmark performance may profit from a suitable choice of cache snoop mode settings.",
"pdfUrls": [
"https://arxiv.org/pdf/1702.07554v1.pdf",
"http://arxiv.org/abs/1702.07554",
"https://doi.org/10.1007/978-3-319-58667-0_16"
],
"pmid": "",
"s2PdfUrl": "http://pdfs.semanticscholar.org/0553/59bf3807f067db7b3518540b719759df2388.pdf",
"s2Url": "https://semanticscholar.org/paper/055359bf3807f067db7b3518540b719759df2388",
"sources": [
"DBLP"
],
"title": "An Analysis of Core- and Chip-Level Architectural Features in Four Generations of Intel Server Processors",
"venue": "ISC",
"year": 2017
},
"055c7900c4ccaa621ebed2d946510849b98ad6f1": {
"authors": [
{
"ids": [
"2484837"
],
"name": "Debadatta Mishra"
},
{
"ids": [
"9516817"
],
"name": "Prashanth"
},
{
"ids": [
"1749860"
],
"name": "Purushottam Kulkarni"
}
],
"doi": "10.1145/3135974.3135992",
"doiUrl": "https://doi.org/10.1145/3135974.3135992",
"entities": [
"Algorithm",
"Best, worst and average case",
"Cache (computing)",
"Centralisation",
"Experiment",
"Floor and ceiling functions",
"Holism",
"Hypervisor",
"Memory management",
"Non-volatile memory",
"Operating system",
"P2P caching",
"Provisioning",
"Requirement",
"Solid-state drive",
"Virtual machine",
"Volatile memory",
"Web container"
],
"id": "055c7900c4ccaa621ebed2d946510849b98ad6f1",
"inCitations": [],
"journalName": "",
"journalPages": "235-247",
"journalVolume": "",
"outCitations": [
"0935bb723e4071ccd4c2334d3b6d728faa111d11",
"0b43a722d2ca43752750e4976f3056a006990143",
"6111f1a9ab657910f5a11a95de117b3c5181565a",
"a3de178c43b990b5755be4d640a7525f97ce2f33",
"f8aa33900f552f8112d6186d78bc845d2dfc0007",
"5fe4eb1749a823469950456a123c77530e33ad73",
"0ba9924ac38a425a9484dbc0a50cb71858ce416d",
"9aa0d7253574e50fe3a190ccd924433f048997dd",
"4fbdef00d80ed26ee01e4624c92465d4bea38aac",
"86337138bb6dfabef8e1d45ec3c4e30d64c3ce36",
"242b5b545bb17879a73161134bc84d5ba3e3cf35",
"11bbc477d14d1c945f203f1a83a530856a89d28f",
"d55d9c3caff8131bc01468bc73b274da07c237f6",
"28b212a7c0354aa8b866b9459aa64eac12c2b370",
"876fe387dedd14c364bf9e41fcdc25c6dfc1ddc3",
"170a81df3ff2076fe9a3f2fdee0755a7310c2c41",
"07042865b10297ca4fc9164829d6330db2f60b4c",
"4b7b45aa74d84f5b86ef3d8bc8bf460602e97d38",
"24dc8d1de7e78ab100d2d83cbdf1390ddb9234c9",
"03bf5d2bc45794e241f53aecf8880c26c712933d",
"38fd918de20b0613cb07de8794fe6713d48f86d4",
"1b6262f0533c202c1f140e60053ee3c72f216687",
"984ab13ce54a8deadf0f30d00ee7b7951852da60",
"2ee01ab9aca4163d391bd29c2123d9be44b0e986",
"13a6d31c1cbefb36b6ceacd99f058bc96b8a4673",
"43cf61960c85339deeeeeb2b75cdf9595565afa8",
"3574657705475722b6c398c266805f758268778b",
"47419c7d160fd05f9be712b876c292cb6241228d",
"0abc3e83ccd6e685f8d0299f24f03ae28f4c2459",
"3a03957218eda9094858087538e9668ab0db503b"
],
"paperAbstract": "Derivative clouds, light weight application containers provisioned in virtual machines, are becoming viable and cost-effective options for infrastructure and software-based services. Ubiquitous dynamic memory management techniques in virtualized systems are centralized at the hypervisor and are ineffective in nested derivative cloud setups. In this paper, we highlight the challenges in management of memory resources in derivative cloud systems. Hypervisor caching, an enabler of centralized disk cache management, provides flexible memory or non-volatile memory management at the hypervisor to improve the resource usage efficiency and performance of applications. Existing hypervisor caching solutions have limited effectiveness in nested setups due to their nesting agnostic design, centralized management model and lack of holistic view of memory management. We propose DoubleDecker, a decentralized disk caching framework, realized through guest OS and hypervisor cooperation, with support for efficient memory management in derivative clouds. The DoubleDecker hypervisor caching framework, an integral part of our proposed solution, provides interfaces for differentiated cache partitioning and management in nested setups and is equipped to handle both memory and SSD based caching stores. We demonstrate the flexibility of DoubleDecker to handle dynamic and changing memory provisioning requirements and its capability to simultaneously provision memory across multiple levels. Such multi-level configurations cannot be explored by centralized designs and are a key feature of DoubleDecker. Our experimentation with DoubleDecker demonstrates that application performance can be consistently improved due to the flexible policy framework for disk caching. With our setup, we report an average performance improvement of 4x and a maximum of 11x.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3135974.3135992"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/055c7900c4ccaa621ebed2d946510849b98ad6f1",
"sources": [
"DBLP"
],
"title": "DoubleDecker: a cooperative disk caching framework for derivative clouds",
"venue": "Middleware",
"year": 2017
},
"05759b8b70b51f3fe0c302bf29c4f2d5315bcae5": {
"authors": [
{
"ids": [
"2910441"
],
"name": "Aleksandar Prokopec"
}
],
"doi": "10.1007/978-3-319-64203-1_13",
"doiUrl": "https://doi.org/10.1007/978-3-319-64203-1_13",
"entities": [
"Speculative execution"
],
"id": "05759b8b70b51f3fe0c302bf29c4f2d5315bcae5",
"inCitations": [],
"journalName": "",
"journalPages": "177-191",
"journalVolume": "",
"outCitations": [],
"paperAbstract": "",
"pdfUrls": [
"https://doi.org/10.1007/978-3-319-64203-1_13"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/05759b8b70b51f3fe0c302bf29c4f2d5315bcae5",
"sources": [
"DBLP"
],
"title": "Accelerating by Idling: How Speculative Delays Improve Performance of Message-Oriented Systems",
"venue": "Euro-Par",
"year": 2017
},
"0590d539e980c1b9dc33abb5c97e68cb6c39c3f9": {
"authors": [
{
"ids": [
"1782674"
],
"name": "Bo Mao"
},
{
"ids": [
"9280383"
],
"name": "Hong Jiang"
},
{
"ids": [
"8175008"
],
"name": "Suzhen Wu"
},
{
"ids": [
"3154422"
],
"name": "Yaodong Yang"
},
{
"ids": [
"1769287"
],
"name": "Zaifa Xi"
}
],
"doi": "10.1109/IPDPS.2017.64",
"doiUrl": "https://doi.org/10.1109/IPDPS.2017.64",
"entities": [
"Algorithm",
"Data compression",
"Error detection and correction",
"Experiment",
"Flash memory",
"Memory-mapped I/O"
],
"id": "0590d539e980c1b9dc33abb5c97e68cb6c39c3f9",
"inCitations": [
"e087ed99f88d00c32cff2f9c3b7a8788594aec0d"
],
"journalName": "2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"journalPages": "1109-1118",
"journalVolume": "",
"outCitations": [
"15bb9232bc05e27c114d12811a67330863958b9e",
"d4e153d0ff33cb15cd6c13570599c6c36cc78db5",
"31ee28ad7207eb9e3f558488786a888a42bbb907",
"b220199029253cda0744b3b39a876ca007a5f12b",
"e8524d6388505eede28665e36cd1b5da811ab50e",
"33b36e79f7e82907b656177d31069a36efa6e6a9",
"6f6252aaa0fc4bc9e35d6e7b4691a99ba49206a7",
"27cc332571aa00e892d7e094a3ee7b9e44b12c75",
"1029c647d5a3906bc1cada451bffea7e6da72ee3",
"009d8914ca7ca1ec459f6c35a772f85c602eb052",
"0c279813f1dba545c50c237f69b89c6496117015",
"3e8e43f61b3af63c6a8bb981b5d085c8afb1b9e2",
"0e216e95f17f64ff18cd50463dd8ec023aa08248",
"32e43b28f78908314a77c23edd3f089363c2d2b2",
"12d6da762b2a5d512d383f3b587bd30c23c3df97",
"92bc53a3a28a2cc02e02d959c439c80fce1846f1",
"d616765a381d0a43996a5b3ed33ae57e4f126918",
"4749be82e7320b4c8b2f31ca38c4a939027cf1e4",
"189aa2eaae5502e63ccca293d2c3dc1de1bfc8a1",
"424a0f460b4f261b386787bdec37a2b01347a930",
"75e74a0f013e9028c69df3addc0d161ef35d0c51",
"9f83ef5f08ffcfc56ddd8ca67f7efd99aadfc94a",
"403e4f2aa66e789ea8e01dc9b8b96d9fcdab4ae1",
"e087ed99f88d00c32cff2f9c3b7a8788594aec0d",
"581ddd1d36483f1c6fa66292bf85bf0eeff2efb6",
"1820a34042d6371a9e20484b0c63b698eb522a6c",
"0918495eb01aa8f6a3700fb37e5b781492d66920",
"c07810339203898aeb485611e615f02f2fd22443",
"70ce10f47aafa0994627a9575565b5c98af58d98",
"1d05f17a575a4536f53645a099474cddf96c3c63",
"d4e5801efdfb30ac9ca93096995fcb32c06f4e29",
"070fe0f510d9c8335528b7103ea7fd81b62e4695"
],
"paperAbstract": "Data compression has become a commodity feature for space efficiency and reliability in flash-based storage systems by reducing write traffic and space capacity demand. However, it introduces noticeable processing overheads on the critical I/O path, which degrades the system performance significantly. Existing data compression schemes for flash-based storage systems use fixed compression algorithms for all the incoming write data, failing to recognize and exploit the significant diversity in compressibility and access patterns of data and missing an opportunity to improve the system performance, the space efficiency or both. To achieve a reasonable trade-off between these two important design objectives, in this paper we introduce an Elastic Data Compression scheme, called EDC, which exploits the data compressibility and access intensity characteristics by judiciously matching data of different compressibility with different compression algorithms while leveraging the access idleness. Specifically, for compressible data blocks EDC exploits the compression diversity of the workload, and employs algorithms of higher compression rate in periods of lower system utilization and algorithms of lower compression rate in periods of higher system utilization. For non-compressible (or very lowly compressible) data blocks, it will write them through to the flash storage directly without any compression. The experiments conducted on our lightweight prototype implementation of the EDC system show that EDC saves storage space by up to 38.7%, with an average of 33.7%. In addition, it significantly outperforms the fixed compression schemes in the I/O performance measure by up to 61.4%, with an average of 36.7%.",
"pdfUrls": [
"https://doi.org/10.1109/IPDPS.2017.64"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/0590d539e980c1b9dc33abb5c97e68cb6c39c3f9",
"sources": [
"DBLP"
],
"title": "Elastic Data Compression with Improved Performance and Space Efficiency for Flash-Based Storage Systems",
"venue": "2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"year": 2017
},
"05a1b746b03b729aa9c0679d6657a96382843159": {
"authors": [
{
"ids": [
"3108945"
],
"name": "Haoyu Zhang"
},
{
"ids": [
"35428741"
],
"name": "Qin Zhang"
}
],
"doi": "10.1145/3097983.3098003",
"doiUrl": "https://doi.org/10.1145/3097983.3098003",
"entities": [
"Algorithm",
"Bioinformatics",
"Bioinformatics",
"Collaborative filtering",
"Edit distance",
"Experiment",
"Natural language processing",
"Relational database management system",
"String (computer science)"
],
"id": "05a1b746b03b729aa9c0679d6657a96382843159",
"inCitations": [
"0b47e24b7aa12b2ec65abf76b70984d9836c3635",
"bb3707a6ffe8e0dd7208930bdcc4230bf95cebb9",
"712ee1f295cc473d5126abe9c6221986f25116c7",
"37188150ca9d4698a67803039d3e3d95923ed7f9",
"947729c7e627bc1e0109896b91effcaeab112867"
],
"journalName": "",
"journalPages": "585-594",
"journalVolume": "",
"outCitations": [
"1822530792a1f6ca526ecee49505387a3421a4bc",
"998c23f747271c297f8c6a8acd645ff5a9f8d880",
"124f6f240ba622cd74a9a0ea554ec2a5011eaadf",
"4d99e622a1166960723c3874cc62e0cee9e7d4ba",
"1b3c2bf25ddc8c70d8d5058df6c7fe35a644855d",
"c9f76e451e460bc3bc3e5b3d02ecc88e6c361790",
"703c8586a6aa49f58266112321a1b03716059a10",
"8f3f63773aa801b2cdcfa2e5699e3abb9aed7443",
"50c9a75513a4da3446642d6e6a397081c97baac2",
"a07c0717d3f259ee8a5d33a3b70a331d7a807d7d",
"1df4d83bd44ac0baaeb5dcec2f9b7834afe39d14",
"051546f9d417c9ec82f71abead211be679703bc0",
"b1e867a9efc1c294e201c8434d0dac32c30131c9",
"7d66ff645cd7a0f0b655860d07e9e89308384e29",
"3ea209b0486b2b17543b7a7fa17189768ac99612",
"3ac024ec80dc0efd56b6ed5ef3caf5aaf4312f7b",
"42e84c4c1ec0bed9c1436ff1b5d6ecfe07981615",
"01ce408d53d1fd6660ad11d6980a28c4892e1fc9",
"a5f782739f4647100edab7158b3ea9f1ee9c84a4",
"152ae230ea49aba046aaa1dcefd7f7e4be0185b5",
"530f4487992599b3598bd4bb45d74de8436fc3fc",
"92ce82b6047040004a8484e20aab4fb88c9d50ab",
"1c799eca7983c62f7815ac5f41787b3e552567b6",
"00af4d7a9de6f01b9b4e468bd8d63c4d5da6bebd",
"cbd45b97b5332e4b955cd54f090baed9d2ec5a72",
"24c48b97725d84246f6dbd39c055648a305e1df4",
"1eeb85014348bd1d52c7dfdb71c93e73af180ba1"
],
"paperAbstract": "We study the problem of edit similarity joins, where given a set of strings and a threshold value K, we want to output all pairs of strings whose edit distances are at most K. Edit similarity join is a fundamental problem in data cleaning/integration, bioinformatics, collaborative filtering and natural language processing, and has been identified as a primitive operator for database systems. This problem has been studied extensively in the literature. However, we have observed that all the existing algorithms fall short on long strings and large distance thresholds.\n In this paper we propose an algorithm named EmbedJoin which scales very well with string length and distance threshold. Our algorithm is built on the recent advance of metric embeddings for edit distance, and is very different from all of the previous approaches. We demonstrate via an extensive set of experiments that EmbedJoin significantly outperforms the previous best algorithms on long strings and large distance thresholds.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3097983.3098003",
"https://arxiv.org/pdf/1702.00093v2.pdf",
"https://arxiv.org/pdf/1702.00093v3.pdf",
"https://arxiv.org/pdf/1702.00093v1.pdf",
"http://arxiv.org/abs/1702.00093"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/05a1b746b03b729aa9c0679d6657a96382843159",
"sources": [
"DBLP"
],
"title": "EmbedJoin: Efficient Edit Similarity Joins via Embeddings",
"venue": "KDD",
"year": 2017
},
"05a1bad1ef2341339e18d636d78594226d4ee8e6": {
"authors": [
{
"ids": [
"36937479"
],
"name": "Jian Huang"
},
{
"ids": [
"1783539"
],
"name": "Anirudh Badam"
},
{
"ids": [
"9725581"
],
"name": "Laura Caulfield"
},
{
"ids": [
"39496676"
],
"name": "Suman Nath"
},
{
"ids": [
"1690586"
],
"name": "Sudipta Sengupta"
},
{
"ids": [
"39807362"
],
"name": "Bikash Sharma"
},
{
"ids": [
"1740036"
],
"name": "Moinuddin K. Qureshi"
}
],
"doi": "",
"doiUrl": "",
"entities": [
"Die (integrated circuit)",
"Experiment",
"Flash memory",
"Multitenancy",
"Parallel computing",
"Solid-state drive"
],
"id": "05a1bad1ef2341339e18d636d78594226d4ee8e6",
"inCitations": [
"2971948a9229ed61604778b76e03d5a31328a7cb",
"65c43d1b70985054907e08fddb4a9907244b0801",
"40dc09f5fbd3776c3f34adedc7a4718307ace0d6",
"226ca798b529c13605a2aa7fe75d58f4188f850a",
"40f196e21a289394c4354961116587b8accba45e",
"0da73832dee2c9b3d4c0d039d8e714e6ff098e40",
"55318fe320d8217fdc0e1359f04ac79844222c8e",
"1d08d231ec66645ec56d2210c1a7c6b44c6ff041"
],
"journalName": "",
"journalPages": "375-390",
"journalVolume": "",
"outCitations": [
"27cb0c2229299a82cf767d19dcc68aa1e5f0f233",
"84127db83f5ce3a3f92f2f114a10a65a4a342b06",
"40f04909aaa24b09569863aa71e76fe3d284cdb0",
"26a88fcaf621270af5f5786fdb2df376a2bc00aa",
"088e3e939ad234b6fdd0e321290fb26937dc2553",
"01438abf044c42f90de0591e08fe33461908c6cd",
"438c51040ee6ccf9198e52d105c47e75d615b29c",
"3c0bc4e9d30719269b0048d4f36752ab964145dd",
"13d6c568c770ff5a070072e720fb34b0037cdab8",
"0e5c646909bb762da0cd325e084655c12445578f",
"33438b1148a84d6e5bf2cad70bf7754d546ca5d7",
"dc7f57cf92f8aa87c33853a724a3fa19c7ba12ce",
"490d862480cf30949dce90e832aa292c498ac768",
"4ba4613eab33cddc53bec9e14e50d03fa66270ca",
"81b761ea5c679b452f4a78fa176b8e2d608e77ac",
"72722e7602138e3896e5576d3f3ef730e7b7c4b4",
"2e46f9074bd81ea4ec29ecec7e0231c16fb2e8db",
"7f713eeef50a87ec595c64832fdaf25ffa38b5bd",
"b45e1f16cf2b6f735013e9f279e45bf8b7a8d5db",
"03543f75c4fe0c49f81af789a1c7293ff0e4e107",
"5909192b374eac0cda4df7c986ebc997cdcd6002",
"726099036bb32c3fbaf1650d5900eeaa2ecc8fd9",
"2269889c9085ff518ee9e7f5b2f92e4599dd3ff2",
"38a9120f780602521af9744e31d80ef5cd9593a7",
"1820a34042d6371a9e20484b0c63b698eb522a6c",
"3cf9039fa2fc01f711870e33d868669caf5c4df4",
"389b618c42c0d5d32a569b9cbaa02a7ff77c6be6",
"65a2cb8a02795015b398856327bdccc36214cdc6",
"6d44790b6d952eff28f302998e8121f90786e3ff",
"131e1e1d163a0f49881d7b5ac092892093391015",
"13b925352e4ee3066a6d38ef9f16efdfa967cabb",
"3e8e43f61b3af63c6a8bb981b5d085c8afb1b9e2",
"61977858b3eea4f5a6d81393301e7298ade7a2d8",
"19ffc4f5129ed9d39f498f4eb901024c514263c7",
"2451dc6bb08d2668f4a876ce94d0c15227ccab7a",
"9aa0d7253574e50fe3a190ccd924433f048997dd",
"5c06564087db9e53a72ef1eb5865696b0dddd8ca",
"8969f883979ac45fe24cecde39c15ddc4bd756d3",
"151fe4cd7d0c788b3e362636d5c31a4c13f90a9a",
"26e72340c47b7348e1b1de285f89dd96cc925b27",
"8c9a91b774fcc126db7ce7c67bd97d1d16143932",
"d67adb456a315aee244babf4f20e318cc14d13f3",
"7fb6b53bdc81f06fd34d5d9c2dd00f6e38cfd98b",
"4251f331db37a1c2c16c2e0c4daa729074c99110",
"0da73832dee2c9b3d4c0d039d8e714e6ff098e40",
"dbcdb4c402756b2b5ac910b9eb17ddb412290d16",
"061944ca83bb46fac511394dca642f7af2d2858a",
"d137b83c3e43d4953cc389cb0a50619cc7be5319",
"05961fc1d02ca30653dd0b4c906113db796df941"
],
"paperAbstract": "A longstanding goal of SSD virtualization has been to provide performance isolation between multiple tenants sharing the device. Virtualizing SSDs, however, has traditionally been a challenge because of the fundamental tussle between resource isolation and the lifetime of the device \u2013 existing SSDs aim to uniformly age all the regions of flash and this hurts isolation. We propose utilizing flash parallelism to improve isolation between virtual SSDs by running them on dedicated channels and dies. Furthermore, we offer a complete solution by also managing the wear. We propose allowing the wear of different channels and dies to diverge at fine time granularities in favor of isolation and adjusting that imbalance at a coarse time granularity in a principled manner. Our experiments show that the new SSD wears uniformly while the 99th percentile latencies of storage operations in a variety of multi-tenant settings are reduced by up to 3.1x compared to software isolated virtual SSDs.",
"pdfUrls": [
"http://www.cc.gatech.edu/grads/j/jhuang95/papers/flashblox-fast17.pdf",
"http://www.usenix.org./system/files/conference/fast17/fast17_huang.pdf",
"https://www.usenix.org/sites/default/files/conference/protected-files/fast17_slides_huang.pdf",
"http://www.cc.gatech.edu/~jhuang95/papers/flashblox-fast17.pdf",
"https://www.usenix.org/conference/fast17/technical-sessions/presentation/huang",
"http://www.usenix.org./sites/default/files/conference/protected-files/fast17_slides_huang.pdf",
"http://www.cc.gatech.edu/grads/j/jhuang95/papers/fast17_slides_huang.pdf",
"https://www.usenix.org/system/files/conference/fast17/fast17_huang.pdf"
],
"pmid": "",
"s2PdfUrl": "http://pdfs.semanticscholar.org/4a85/7d84a1f410b5264683a3d2d1d959d2085e44.pdf",
"s2Url": "https://semanticscholar.org/paper/05a1bad1ef2341339e18d636d78594226d4ee8e6",
"sources": [
"DBLP"
],
"title": "FlashBlox: Achieving Both Performance Isolation and Uniform Lifetime for Virtualized SSDs",
"venue": "FAST",
"year": 2017
},
"05a1dfc881760b4dd7a059b21afa753f198459ea": {
"authors": [
{
"ids": [
"1699746"
],
"name": "Jie Liu"
},
{
"ids": [
"1685323"
],
"name": "Xin Li"
},
{
"ids": [
"1682058"
],
"name": "Hao Zhang"
},
{
"ids": [
"1859741"
],
"name": "Chengcheng Liu"
},
{
"ids": [
"40651849"
],
"name": "Lei Dou"
},
{
"ids": [
"39350835"
],
"name": "Lei Ju"
}
],
"doi": "10.1109/HPCC-SmartCity-DSS.2017.32",
"doiUrl": "https://doi.org/10.1109/HPCC-SmartCity-DSS.2017.32",
"entities": [
"Artificial neural network",
"Automatic number plate recognition",
"Convolutional neural network",
"Distortion",
"Pixel",
"TensorFlow",
"Test set",
"Video game localization"
],
"id": "05a1dfc881760b4dd7a059b21afa753f198459ea",
"inCitations": [],
"journalName": "2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)",
"journalPages": "246-253",
"journalVolume": "",
"outCitations": [],
"paperAbstract": "Automatic number plate recognition (ANPR) is a significant part in intelligent traffic system. At present, there are many traditional approaches that have achieved a rather high accuracy to solve this problem, almost all of which are separated into three steps of localization, segmentation and recognition. However, these approaches, especially in segmentation progress, are limited to some specific conditions including light intensity, orientations, rotation and distortion angle of plates, etc. In this paper, distinct from traditional approaches, a network including a convolutional neural network(CNN) that operates directly on the image pixels is employed as a substitute of the integration of segmentation and recognition. The network works on the TensorFlow framework. Evaluation of this training network is characters' recognition accuracy on a test set of 796 number plate pictures. In result, we achieve a 88.61% accuracy with a training set of only 7396 photographs that are expanded from 3041 different number plate pictures, which is a relatively high accuracy, especially for a deep CNN that usually needs a great number of samples. We also demonstrate one possible way to enrich data set and make a test using a even simpler network, which results in a 90.07% accuracy on a test set.",
"pdfUrls": [
"https://doi.org/10.1109/HPCC-SmartCity-DSS.2017.32"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/05a1dfc881760b4dd7a059b21afa753f198459ea",
"sources": [
"DBLP"
],
"title": "An Implementation of Number Plate Recognition without Segmentation Using Convolutional Neural Network",
"venue": "2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)",
"year": 2017
},
"05acdf395981f7c04957b0f7583d34b6b172b883": {
"authors": [
{
"ids": [
"28262989"
],
"name": "Th\u00e9ophile Terraz"
},
{
"ids": [
"21555557"
],
"name": "Alejandro Rib\u00e9s"
},
{
"ids": [
"2316659"
],
"name": "Yvan Fournier"
},
{
"ids": [
"3148002"
],
"name": "Bertrand Iooss"
},
{
"ids": [
"2583571"
],
"name": "Bruno Raffin"
}
],
"doi": "10.1145/3126908.3126922",
"doiUrl": "https://doi.org/10.1145/3126908.3126922",
"entities": [
"Fault tolerance",
"Hexahedron",
"High-resolution scheme",
"Image resolution",
"Numerical analysis",
"Server (computing)",
"Simulation",
"Supercomputer",
"Terabyte"
],
"id": "05acdf395981f7c04957b0f7583d34b6b172b883",
"inCitations": [],
"journalName": "",
"journalPages": "61:1-61:14",
"journalVolume": "",
"outCitations": [
"f7a8d8df3251d28561791cd83ebdef00c771af19",
"1a69fd58d883049e24ec734529ad5caf9f850620",
"3519add893934bac5cf334d0719d953746136513",
"a03d6ee4ea70eb7feaa65ab046ffc2232d76b0f0",
"1e52da6571efc3fbc979afb5a07e44d381b730e7",
"c46427857446a7534ae883e89cc4b3d0044dde59",
"d225032c36cfae444c010427af88026bf85e5253",
"159e4774e3254d944c6463f10de07fc60ae81a11",
"d164091af9c60edee0bda14a828b6797145a8062",
"0011e3ac148971c8df1fe560c70692a5261375d2",
"4224374796da64e17fce96033d4cd42240d80eaf",
"6fa9035d3c8b450071bae8dbb6d2c1d3f829e16a",
"eb399f6ae21f78e231d8d98c231194891b2bc5a9",
"04856a5a8c24b7e259730bb2096c31cd2929cd08",
"5b5dfbfffeade87035fca8fadca1a7f27f8a72fe",
"c73a30210e1a777bb176382a86ec70e822ea98c0",
"4fe2bf624e18d71d87ae36824606c42c64446562",
"41c97a6b41aefc6b0e0a3c702db080fd5aeef6f5",
"eb11fa122dd73d516ce29172720575d3d41ed9d0",
"a6606bb5fbe5815bc1d740a60334d0b2b189167f",
"55582978748505a665b044e61995d701c2139902",
"15c0356be4fa9566269b912278aca5a2d10d6d16"
],
"paperAbstract": "Global sensitivity analysis is an important step for analyzing and validating numerical simulations. One classical approach consists in computing statistics on the outputs from well-chosen multiple simulation runs. Simulation results are stored to disk and statistics are computed postmortem. Even if supercomputers enable to run large studies, scientists are constrained to run low resolution simulations with a limited number of probes to keep the amount of intermediate storage manageable. In this paper we propose a file avoiding, adaptive, fault tolerant and elastic framework that enables high resolution global sensitivity analysis at large scale. Our approach combines iterative statistics and in transit processing to compute Sobol' indices without any intermediate storage. Statistics are updated on-the-fly as soon as the in transit parallel server receives results from one of the running simulations. For one experiment, we computed the Sobol' indices on 10M hexahedra and 100 timesteps, running 8000 parallel simulations executed in 1h27 on up to 28672 cores, avoiding 48TB of file storage.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3126908.3126922"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/05acdf395981f7c04957b0f7583d34b6b172b883",
"sources": [
"DBLP"
],
"title": "Melissa: large scale in transit sensitivity analysis avoiding intermediate files",
"venue": "SC",
"year": 2017
},
"05b073c44188946aeb9c410c1447262cbdf77b6d": {
"authors": [
{
"ids": [
"1773836"
],
"name": "Payman Mohassel"
},
{
"ids": [
"3092404"
],
"name": "Yupeng Zhang"
}
],
"doi": "10.1109/SP.2017.12",
"doiUrl": "https://doi.org/10.1109/SP.2017.12",
"entities": [
"Artificial neural network",
"C++",
"Computation",
"Experiment",
"Gradient",
"Gradient descent",
"Image processing",
"Information privacy",
"Linear function (calculus)",
"Logistic regression",
"Machine learning",
"Nonlinear system",
"Optical character recognition",
"Predictive modelling",
"Privacy",
"Secure two-party computation",
"Server (computing)",
"Sigmoid function",
"Softmax function",
"Stochastic gradient descent",
"Two-phase commit protocol"
],
"id": "05b073c44188946aeb9c410c1447262cbdf77b6d",
"inCitations": [
"5603325eee0f5d70176860d8cc77a9a9c89289a7",
"f954cf9bc02645778421a2423af5278126d757fb",
"2c4cc18223fec4b06cb8ea50dae1e6b2ebce0971",
"3a40f10445a6ad415ac7dc6968a7295dc384eb0e",
"7b24bea661e4ab8fddd5e2c76d307ffa6e0a4aa5",
"0faf801e0511cfce8953b4766523c771d156cdb4",
"a55c8e5fa3c937414b458af2072ff195e9882e14",
"4b09e01cb21b26d4120077301b359d88aa206b28",
"44a97f4eaaefaf5338f8aed2913d5debb2459f7e",
"8e3f04c9936949d13b9b1157857e66dd291c45d5",
"a46fdcae60e683b9fbca3a76530b00f69ad0aa82",
"74c279b0dc37df611e2ad165ce5735913cb8ad72",
"08e2db0c2f79b7a807747f19707ab3e96d3541a0",
"29b14b6f0aee8cb3ea6da4a5b08a21aaa868bba1",
"530a4ab0308bc98995ffd64207135ca0ae36db7f",
"eec0bc4c3fddbaf78feb0872a195fb3aeb01010e",
"6cefb70f4668ee6c0bf0c18ea36fd49dd60e8365",
"d75fddd91657543260e1e839f81a71bb7f8485be",
"0257f30d01eaf774681f6266edd9c38973ac99e1",
"e479d7cb1b2622b42282d0b7ac0f6a35cba02ca6"
],
"journalName": "2017 IEEE Symposium on Security and Privacy (SP)",
"journalPages": "19-38",
"journalVolume": "",
"outCitations": [
"588972fccb475cfaafdbb6efeef592eacadbe5f0",
"0eefa33a1ad9118ba91a2e4a88e555b453a952f1",
"6a3ab165f52ff39959e527990ee629a4d7dbd16d",
"31100ccd0867d6d5338612a62b2cde11be75f1b8",
"15fc5f92da22ecb1761be6adccd7c858288c40ab",
"8fa56ecfb46b8dadf8a4dd063d15da5b975c83f1",
"0166c8b5c6445043b94fc7b62d145d0c3c8b6483",
"37bbe6d64cb4ff9ad546bfa36b0512f580bc6bf8",
"63569d8b7e3171174fce91443e10fededbad4ac7",
"27e9745fc94ccf6039dd1804cbb99760544fc59b",
"316d5642b39ba001efc8949cb87ed83eba1def95",
"61a297247f899995789dc6e32bcf3972502374b8",
"42333e3f231bbfe508f6da6bad2feff9ae223113",
"11ccb00bd3ff98e3f46a51cca059241c70954d4f",
"6154ce8c02375184f7928e41c4fae532500f7175",
"b14dea76cafede81c6ff5478d4221fce3aec9284",
"20b5b5c25e2b56693b38fe7f69caddca78872085",
"19e6f3ea035d33590a8598be68ac82e6f00ce518",
"6db00c7de3c9c13b7fd1c0078eefdbe506d054cd",
"6764845d03fa22e5dc51234d07ae0b2901cdfd25",
"8c13af62501337bd4281d2b9498590feadfa368b",
"0d8abe14b8f8c166f97165f03424af2193bf41c6",
"18b7880edc5dead10795105ae600ca19ba15f8c5",
"5de068c94fbe9976a7017ce0451c05941a2fe70a",
"7ffe3790234f977caee2f4850ad2c33734d24827",
"a09dcece804c6cd11fd3f0025dda7d327121ae67",
"12893121d4a467d5dae188b8cc8e3a67e4c69750",
"23ec68ed03b485b645478a3f6905615617d905a6",
"032d59d75b26872d40081fb40d7a81c894455d91",
"d24c81f1e2904ba6ec3f341161865ef93247855b",
"0e0427aedfed65c8dd688c094b181feacf4eaab4",
"012b8a941e96594783fb10d3a785e91f13384413",
"326bb49d3ae9e1e1551028200916192e50004105",
"362246709de205ec0ac5b34e07306839c38d5a3a"
],
"paperAbstract": "Machine learning is widely used in practice to produce predictive models for applications such as image processing, speech and text recognition. These models are more accurate when trained on large amount of data collected from different sources. However, the massive data collection raises privacy concerns. In this paper, we present new and efficient protocols for privacy preserving machine learning for linear regression, logistic regression and neural network training using the stochastic gradient descent method. Our protocols fall in the two-server model where data owners distribute their private data among two non-colluding servers who train various models on the joint data using secure two-party computation (2PC). We develop new techniques to support secure arithmetic operations on shared decimal numbers, and propose MPC-friendly alternatives to non-linear functions such as sigmoid and softmax that are superior to prior work. We implement our system in C++. Our experiments validate that our protocols are several orders of magnitude faster than the state of the art implementations for privacy preserving linear and logistic regressions, and scale to millions of data samples with thousands of features. We also implement the first privacy preserving system for training neural networks.",
"pdfUrls": [
"http://eprint.iacr.org/2017/396",
"https://eprint.iacr.org/2017/396.pdf",
"https://doi.org/10.1109/SP.2017.12",
"https://obj.umiacs.umd.edu/papers_for_stories/SecureML_Zhang.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/05b073c44188946aeb9c410c1447262cbdf77b6d",
"sources": [
"DBLP"
],
"title": "SecureML: A System for Scalable Privacy-Preserving Machine Learning",
"venue": "2017 IEEE Symposium on Security and Privacy (SP)",
"year": 2017
},
"05b493cac86ef358ee4990429aaa1095a1315054": {
"authors": [
{
"ids": [
"2919642"
],
"name": "Maciej Besta"
},
{
"ids": [
"19322066"
],
"name": "Florian Marending"
},
{
"ids": [
"2880213"
],
"name": "Edgar Solomonik"
},
{
"ids": [
"1713648"
],
"name": "Torsten Hoefler"
}
],
"doi": "10.1109/IPDPS.2017.93",
"doiUrl": "https://doi.org/10.1109/IPDPS.2017.93",
"entities": [
"512-bit",
"64-bit computing",
"Algorithm",
"Automatic vectorization",
"Breadth-first search",
"Central processing unit",
"Graph (abstract data type)",
"Graph500",
"Graphics processing unit",
"Haswell (microarchitecture)",
"Knights",
"List of algorithms",
"Load balancing (computing)",
"Manycore processor",
"Multi-core processor",
"Nvidia Tesla",
"SIMD",
"Sparse matrix",
"Xeon Phi"
],
"id": "05b493cac86ef358ee4990429aaa1095a1315054",
"inCitations": [
"232e641a8b5f550c436af6336ee63e1cd771e073",
"37050d37c793f4eee3874840fa60a58ca03c3fb0"
],
"journalName": "2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"journalPages": "32-41",
"journalVolume": "",
"outCitations": [
"af6d5dd24498e0ce9aa7cbee8a7f6356079f5dfa",
"0a791a760dd883342c8b8456a3e7cb75fb996ef4",
"3e426349f0cf3a65b502be05ebca23e693ec03fd",
"2984638090457cf02d82715d9834314448efa878",
"0a7bcfcb0ddc167de4b456504600806e18690d02",
"259e93de2f10d395a1bdfb2dc6da72b6a3998572",
"175d795f44037ef60dd9df341701cd5fdc449f1f",
"4c77e5650e2328390995f3219ec44a4efd803b84",
"0624ec3adb8d9f785935746534d4041c2e0802dc",
"40eb1f990ac292b14b56ea06e61d9aeb9bfa28c3",
"ae18b99bfa8940f7a17b7f77eb7177d953a5d9f5",
"947c6bf534ccd620044f77c3bd6068f633b421fb",
"5b975248796c2ee3f65b2f4430fd3be4d7e6191e",
"0c9a56eb4f45d3969943e8cff74593e9c6c5f549",
"3983fe131eb3902f9923f35060c56546bbdc951e",
"47a6a274c648aeb5ff02eb09aff7ea310eae122e",
"5a3cd8c65ffcc25bef346174d1f0bc3f83c5cbbb",
"1156f60e40548096df49528b1342bb3e88b0f378",
"477a2e92d2fd2ca56fd989d42de58248f1ce04ae",
"3ef02548615246e74b88808af811f1557b57fa75",
"ce8190de5cac2b583667079502c130888783303f",
"141e35263ab810983c90d47ad62eb4fab5e51717",
"189f76a7501666386809bd280ffe2f0c3acd7cb0",
"a5aad5abb32f6b15f31b92312bb3b0f7b6470977",
"31181e73befea410e25de462eccd0e74ba8fea0b",
"17ad1361dfabc1c50b506813d0f5d54df159fc36",
"87ee99d4cc4e0601cbb519f6ddbac85772bdc49e",
"d7f449c199ce86d3b8039899caabb31b54ced7f2"
],
"paperAbstract": "Vectorization and GPUs will profoundly change graph processing. Traditional graph algorithms tuned for 32- or 64-bit based memory accesses will be inefficient on architectures with 512-bit wide (or larger) instruction units that are already present in the Intel Knights Landing (KNL) manycore CPU. Anticipating this shift, we propose SlimSell: a vectorizable graph representation to accelerate Breadth-First Search (BFS) based on sparse-matrix dense-vector (SpMV) products. SlimSell extends and combines the state-of-the-art SIMD-friendly Sell-C-σ matrix storage format with tropical, real, boolean, and sel-max semiring operations. The resulting design reduces the necessary storage (by up to 50%) and thus pressure on the memory subsystem. We augment SlimSell with the SlimWork and SlimChunk schemes that reduce the amount of work and improve load balance, further accelerating BFS. We evaluate all the schemes on Intel Haswell multicore CPUs, the state-of-the-art Intel Xeon Phi KNL manycore CPUs, and NVIDIA Tesla GPUs. Our experiments indicate which semiring offers highest speedups for BFS and illustrate that SlimSell accelerates a tuned Graph500 BFS code by up to 33%. This work shows that vectorization can secure high-performance in BFS based on SpMV products; the proposed principles and designs can be extended to other graph algorithms.",
"pdfUrls": [
"https://doi.org/10.1109/IPDPS.2017.93",
"https://htor.inf.ethz.ch/publications/img/slimsell.pdf",
"https://people.csail.mit.edu/jshun/6886-s18/papers/BMSH17.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/05b493cac86ef358ee4990429aaa1095a1315054",
"sources": [
"DBLP"
],
"title": "SlimSell: A Vectorizable Graph Representation for Breadth-First Search",
"venue": "2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"year": 2017
},
"05b68f826366be34c52b7ab69e740d6845768080": {
"authors": [
{
"ids": [
"2395665"
],
"name": "Dixin Tang"
},
{
"ids": [
"1786139"
],
"name": "Hao Jiang"
},
{
"ids": [
"1787375"
],
"name": "Aaron J. Elmore"
}
],
"doi": "",
"doiUrl": "",
"entities": [
"Algorithm",
"Central processing unit",
"Concurrency (computer science)",
"Concurrency control",
"Database",
"In-memory database",
"Load balancing (computing)",
"Multi-core processor",
"Project Looking Glass"
],
"id": "05b68f826366be34c52b7ab69e740d6845768080",
"inCitations": [],
"journalName": "",
"journalPages": "",
"journalVolume": "",
"outCitations": [
"98cca67dfd0320d56030dd6637a733436d2b521e",
"13875088254a585cd0b050f3bc27c1af9ada690f",
"35f751e46799e3a91425267819f40dce273abec1",
"13e6aa5f61267b2814fa9b32f47c17c0fcdef2d5",
"22c74d8be071084ce8812af19548e7bf2bf0c8b6",
"28ecdc50beb098d9176d992fed80eb2bac5963a4",
"3abca96006f8a6c014635b6a111368f459110e83",
"a53e550b1c9282dc79ae920c12b62358bdb6e193",
"0acc31039de608f2ac51f59b6848a48d50c919a5",
"92c661404330dd1bc9ad9b6cdfc25ebd782999aa",
"9aa0d7253574e50fe3a190ccd924433f048997dd",
"96d197be2253f5c853edce37b59c186915160ce0",
"0c5656c5ffe5fb092791deff10e919b209bb8004",
"095a3cee30d64d3a6f22caadd58c45c5cd0b83e9",
"19cadcb4e7439bc525c604771ab4872ec93a5b53",
"412a9e54bbb31e12d008a9579994e009c5b40b46",
"56f6aec0132e56769e2036bbeff791dfa137d107",
"040d45e995ab920588607ebc6977ea19dc781923",
"1e557937f418accc13f9c5edb33a3d48259d80e5",
"10eb9cfb2cea0d6a256e436becd8f0f5494dc5a0",
"3ae8993ebc28dd9b99d415d04d2b766dc99212d9"
],
"paperAbstract": "Use of transactional multicore main-memory databases is growing due to dramatic increases in memory size and CPU cores available for a single machine. To leverage these resources, recent concurrency control protocols have been proposed for main-memory databases, but are largely optimized for specific workloads. Due to shifting and unknown access patterns, workloads may change and one specific algorithm cannot dynamically fit all varied workloads. Thus, it is desirable to choose the right concurrency control protocol for a given workload. To address this issue we present adaptive concurrency control (ACC), that dynamically clusters data and chooses the optimal concurrency control protocol for each cluster. ACC addresses three key challenges: i) how to cluster data to minimize cross-cluster access and maintain load-balancing, ii) how to model workloads and perform protocol selection accordingly, and iii) how to support mixed concurrency control protocols running simultaneously. In this paper, we outline these challenges and present preliminary results.",
"pdfUrls": [
"http://cidrdb.org/cidr2017/papers/p63-tang-cidr17.pdf"
],
"pmid": "",
"s2PdfUrl": "http://pdfs.semanticscholar.org/05b6/8f826366be34c52b7ab69e740d6845768080.pdf",
"s2Url": "https://semanticscholar.org/paper/05b68f826366be34c52b7ab69e740d6845768080",
"sources": [
"DBLP"
],
"title": "Adaptive Concurrency Control: Despite the Looking Glass, One Concurrency Control Does Not Fit All",
"venue": "CIDR",
"year": 2017
},
"05bcf2245c8ee80fdf8d0e1d3e85bbe68fcf11a0": {
"authors": [
{
"ids": [
"19170117"
],
"name": "Amrita Mazumdar"
},
{
"ids": [
"34862953"
],
"name": "Thierry Moreau"
},
{
"ids": [
"1732259"
],
"name": "Sung Kim"
},
{
"ids": [
"37270394"
],
"name": "Meghan Cowan"
},
{
"ids": [
"1698528"
],
"name": "Armin Alaghi"
},
{
"ids": [
"1717411"
],
"name": "Luis Ceze"
},
{
"ids": [
"1723213"
],
"name": "Mark Oskin"
},
{
"ids": [
"11816328"
],
"name": "Visvesh Sathe"
}
],
"doi": "10.1109/IISWC.2017.8167775",
"doiUrl": "https://doi.org/10.1109/IISWC.2017.8167775",
"entities": [
"Authentication",
"Central processing unit",
"Cloud computing",
"Computation",
"Computer vision",
"Data rate units",
"Field-programmable gate array",
"Graphics processing unit",
"Image processing",
"Image sensor",
"Low-power broadcasting",
"Microprocessor",
"Program optimization",
"Radio-frequency identification",
"Real-time computing",
"System on a chip",
"Time complexity",
"Virtual camera system",
"Virtual reality"
],
"id": "05bcf2245c8ee80fdf8d0e1d3e85bbe68fcf11a0",
"inCitations": [
"7b9339d3b359310ddbaf6caae13d3a65f657bf04",
"d1be7f6de75dbe350d8d45bb0997e294fd58a985"
],
"journalName": "2017 IEEE International Symposium on Workload Characterization (IISWC)",
"journalPages": "177-186",
"journalVolume": "",
"outCitations": [
"3aee096770f4b2e3a9e2c7110f088b453b6d98ab",
"26e0521cc30b47bc6eefa14afd92fa756b223c12",
"19bf895220e4d3d23488b34074a47bebc04589a8",
"2fd1c99edbb3d22cec4adc9ba9319cfc2360e903",
"59485d6bccefcbc09dcbb4235e977ef0a9c801e3",
"4a2d7bf9937793a648a43c93029353ade10e64da",
"14ce7635ff18318e7094417d0f92acbec6669f1c",
"e5b301ee349ba8e96ea6c71782295c4f06be6c31",
"006662a19c6383e8ee15616c90be206cd08867f0",
"154898f34460e95aef932bec5615bbd995824cad",
"370b5757a5379b15e30d619e4d3fb9e8e13f3256",
"0959ba9874c9225cef08de110be7300715a2b792",
"71bd0af2eb95061d43acb61d32ae72038b36c821",
"039071c7dda82fa03a8cddc14a8a86871f502037",
"ca71db3905d3fb2d970bcdaaa79993058560f9f7",
"609e71d1d648f6e0795913ceab2153a5b35b80bc",
"0028eb8a82cfabb162243852040aa39d3edb7a14",
"127dd6bd7d1284c2b28403075515747299df6d53",
"df3d657eb009bcd0ea1f199d7dd53a3a700619bb",
"28f1f0292fc2821cfcfadca59c91fba4c262e829",
"6ebc80909632da6f41c499d7d50c4c8a757605dc",
"961a5d5750f18e91e28a767b3cb234a77aac8305",
"3ba74755c530347f14ec8261996dd9eae896e383",
"04fa47f1d3983bacfea1e3c838cf868f9b73dc58",
"29c7d959f322f7006186e3c344ddb9e41e3a8d1f",
"30bda171168f229749e39ca2f9c3fbfdc33003a8",
"9e691bad16f46f89c9b379f7ba0c6b6492d1ae66",
"4f4ba5c28b5f7b519979264f42a3336e363bd910",
"58e4491dc48d46f4f47362686e09e6319c01edc0",
"9f3cc03b1c9fc9c3e080e42a0ddd34cdd24a20fb",
"13b4c25333158f630025b2b2db72efa102f9cf46",
"3d49bd7f7c2eff701b4df211f53a9cae694cb572",
"0cde0252eb8ce6d34b514043979393babf86f2a1"
],
"paperAbstract": "Cameras are the defacto sensor. The growing demand for real-time and low-power computer vision, coupled with trends towards high-efficiency heterogeneous systems, has given rise to a wide range of image processing acceleration techniques at the camera node and in the cloud. In this paper, we characterize two novel camera systems that use acceleration techniques to push the extremes of energy and performance scaling, and explore the computation-communication tradeoffs in their design. The first case study targets a camera system designed to detect and authenticate individual faces, running solely on energy harvested from RFID readers. We design a multi-accelerator SoC design operating in the sub-mW range, and evaluate it with real-world workloads to show performance and energy efficiency improvements over a general purpose microprocessor. The second camera system supports a 16-camera rig processing over 32 Gb/s of data to produce real-time 3D-360° virtual reality video. We design a multi-FPGA processing pipeline that outperforms CPU and GPU configurations by up to 10× in computation time, producing panoramic stereo video directly from the camera rig at 30 frames per second. We find that an early data reduction step, either before complex processing or offloading, is the most critical optimization for in-camera systems.",
"pdfUrls": [
"http://doi.ieeecomputersociety.org/10.1109/IISWC.2017.8167775",
"https://arxiv.org/pdf/1706.03864v2.pdf",
"https://homes.cs.washington.edu/~amrita/papers/iiswc17.pdf",
"http://psylab.ee.washington.edu/documents/near_sensor_camera_arxiv.pdf",
"http://arxiv.org/abs/1706.03864",
"https://arxiv.org/pdf/1706.03864v1.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/05bcf2245c8ee80fdf8d0e1d3e85bbe68fcf11a0",
"sources": [
"DBLP"
],
"title": "Exploring computation-communication tradeoffs in camera systems",
"venue": "2017 IEEE International Symposium on Workload Characterization (IISWC)",
"year": 2017
},
"05bd926844ffa89f668237a6836825c59d6377e9": {
"authors": [
{
"ids": [
"1984554"
],
"name": "Arpit Joshi"
},
{
"ids": [
"2164782"
],
"name": "Vijay Nagarajan"
},
{
"ids": [
"1699540"
],
"name": "Stratis Viglas"
},
{
"ids": [
"1687142"
],
"name": "Marcelo Cintra"
}
],
"doi": "10.1109/HPCA.2017.50",
"doiUrl": "https://doi.org/10.1109/HPCA.2017.50",
"entities": [
"Atom",
"Atom",
"Baseline (configuration management)",
"Byte",
"Byte addressing",
"Critical path method",
"Durability (database systems)",
"IBM Tivoli Storage Productivity Center",
"Non-volatile memory",
"Redo log",
"Undo",
"Volatile memory"
],
"id": "05bd926844ffa89f668237a6836825c59d6377e9",
"inCitations": [
"19eba1cfdecdd9a918f22880bc3599ca461c6454",
"81e4324b8047463961692d38af9b0da881fe44e2",
"41ea95cc4dca373bf324555b897760054ec4a76e",
"20f1081cf001f716037e20d9cff147f5ac50632a",
"004c2345477eda977f12b4485ac24a9e41557439",
"5716db825bbd2c39836a2d6fa22e7f313fc12ccf",
"aa0fb8802532106dcb78c62065258b8e4683ec94"
],
"journalName": "2017 IEEE International Symposium on High Performance Computer Architecture (HPCA)",
"journalPages": "361-372",
"journalVolume": "",
"outCitations": [
"05a1357946de5eca42a477b7b268db4944219a2e",
"16653666b0005f91060a3e402566659749b84313",
"885c666fbcfd1a10c613496d7a041d01b99c7a39",
"15c80ec5104e98d6f84b5ed348ba0276c0739862",
"9376a2d69d06e39fd6fd27c9ce2f0817cc1dd4ef",
"3af216f371069b57c0dca5448384d052fb490fb4",
"10d8afea57c8f159c4eb2664a40c8fb859acefef",
"10419c6f4aa50a36ed0b103c9ddb9aec45f133fe",
"34a97a016e6c419eb4b1005a7306d45a775a407b",
"47b851237f240831abee3971bca6bb8d2a121eb1",
"544c1ddf24b90c3dfba7b1934049911b869c99b4",
"7631275e3266f627df6cc29441f69ab9f5f2b1c6",
"7a9abc36f336750f4c0679f0b4ef87c9dc12133c",
"0645f0f88e9a3cd6e9b1d0c21bc24666a7377666",
"5a49c1c694028fd6ca7acc6af601c0f54efa0700",
"3ede1909bf70d6e4bca46302f474083517b081a3",
"0204f40221260d00c5ee63646560a40dcd7d97d1",
"42c70d64890726f60556caf3eec3f06e85642dd9",
"2ef08ccb970632bb8ada93ea70078eac54ce92d3",
"2b625353fe50e219412e18b6d50b5d8de0538a60",
"578667cbc39c6bfc1c89fe6a54506643c3b097f8",
"a95436fb5417f16497d90cd2aeb11a0e2873f55f",
"94783d113951822195d4ba44599a8fcbdef9d4bf",
"39e3d058a5987cb643e000bce555676d71be1c80",
"823116269044ab4c713373c66c7da3fcb495b459",
"2621b8f63247ea5af03f4ea0e83c3b528238c4a1",
"2b26821287fa20ca9924326e08c4041880171ebf",
"4bad51c7685254155733ee8def6a1294378aa1af",
"2e663c1047ff14ddc2416229459922757a20edfb",
"277862a906af8489a1d98add2f6516a0e5df1bb1",
"5fbdf47c120d1c23a7715f5a5fec3d67b616ba99",
"57c823b3b07b98233394bf15cfbbaed6a84809df",
"a7592cb0c6f59211a2b48c3ed5c65a27a3f5cf12"
],
"paperAbstract": "Non-volatile memory (NVM) is emerging as a fast byte-addressable alternative for storing persistent data. Ensuring atomic durability in NVM requires logging. Existing techniques have proposed software logging either by using streaming stores for an undo log, or, by relying on the combination of clflush and mfence for a redo log. These techniques are suboptimal because they waste precious execution cycles to implement logging, which is fundamentally a data movement operation. We propose ATOM, a hardware log manager based on undo logging that performs the logging operation out of the critical path. We present the design principles behind ATOM and two techniques to optimize its performance. Our results show that ATOM achieves an improvement of 27% to 33% for micro-benchmarks and 60% for TPC-C over a baseline undo log design.",
"pdfUrls": [
"https://doi.org/10.1109/HPCA.2017.50",
"http://www.research.ed.ac.uk/portal/files/29957991/hpca17a.pdf",
"http://homepages.inf.ed.ac.uk/vnagaraj/papers/hpca17a.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/05bd926844ffa89f668237a6836825c59d6377e9",
"sources": [
"DBLP"
],
"title": "ATOM: Atomic Durability in Non-volatile Memory through Hardware Logging",
"venue": "2017 IEEE International Symposium on High Performance Computer Architecture (HPCA)",
"year": 2017
},
"05be45c608ec0c6b6f2700188e28f55f1ea910a4": {
"authors": [
{
"ids": [
"1867677"
],
"name": "Stuart Byma"
},
{
"ids": [
"12888874"
],
"name": "Sam Whitlock"
},
{
"ids": [
"20647943"
],
"name": "Laura Flueratoru"
},
{
"ids": [
"32324156"
],
"name": "Ethan Tseng"
},
{
"ids": [
"1700331"
],
"name": "Christoforos E. Kozyrakis"
},
{
"ids": [
"1678618"
],
"name": "Edouard Bugnion"
},
{
"ids": [
"1752633"
],
"name": "James R. Larus"
}
],
"doi": "",
"doiUrl": "",
"entities": [
"Algorithm",
"Analysis of algorithms",
"Biobank",
"Bioinformatics",
"Bioinformatics",
"Computation",
"Computer data storage",
"Distributed computing",
"End-to-end principle",
"High-throughput computing",
"Monolithic kernel",
"Mozilla Persona",
"Scalability",
"Sequence alignment",
"Server (computing)",
"Software system",
"Sorting",
"Throughput",
"Whole genome sequencing"
],
"id": "05be45c608ec0c6b6f2700188e28f55f1ea910a4",
"inCitations": [
"d7c2187f04a950b9588a3189aef73e40f6509b8c"
],
"journalName": "",
"journalPages": "153-165",
"journalVolume": "",
"outCitations": [
"5c3785bc4dc07d7e77deef7e90973bdeeea760a5",
"0b72a5e4bec54e9f0a4d77db5b484d27886b49fe",
"9c465b7d37024f6afe8a7063590c38fb69ec815c",
"0831a5baf38c9b3d43c755319a602b15fc01c52d",
"25f017efd2905c6d0c6a92f2dfe19113ee42938e",
"2228b4208c5ea6754df6edcae805038f3e47857c",
"4ee0bf51012960c9aa55a2f3f913b22d0fd9a8ed",
"2aff3d6ad3cd61928a0c0c66eff3270ff1c112b0",
"cddfb34a35924b2958950deac3a6075f450e4519",
"3ee0eec0553ca719f602b777f2b600a7aa5c31aa",
"4cad8f2a31b3c72742a761fe90a372d4a4717ebf",
"eaa398d58b7712a9bbc25b177a93624a7029ed29",
"3a587f10ac804442c7236fcc63615a5f73930a2f",
"3b3d2dd633f46b9040d726bc63e12df4ba2cb14c",
"3979cf5a013063e98ad0caf2e7110c2686cf1640",
"29f68a9512a16c6db526fb166a6433be72ad005c",
"196514ca53f505dec7a8a2b446fc599e8de3f0cc",
"2765bde8275938f89e9418d85befbbf03fcbb5fe",
"04d8fd856dfff162a6e52e89f7967e378d8889f5",
"2da760f90c3d2bf6598becdde9063093f488548c",
"76e02e51eb7e529f5665356dc9a914946e247453",
"5c8146845a1aac387ba4377ba6198d6b1c0626a3",
"584856e3e85c7c02a8b9c1acdd0f961b7ee10a14",
"04ecc752b775f934ca04a09e9bbc67bbb5f31c27",
"40c5441aad96b366996e6af163ca9473a19bb9ad",
"0d77bb6ef2bb6d165f58bf0251bf3d7cf29f1491",
"652854487b655289fce13f88b7d1569e09b242fe",
"b7ec915ecd1260433529153405c1b68692573217",
"3605a786a96ad9e392c484e7eb7b036063ae8d0c",
"6fd3aa67f07e5df43f5079ada6997b88e6c904ff",
"27174cf4ffd83e2044549df0f2872608b73a6ef6"
],
"paperAbstract": "Next-generation genome sequencing technology has reached a point at which it is becoming cost-effective to sequence all patients. Biobanks and researchers are faced with an oncoming deluge of genomic data, whose processing requires new and scalable bioinformatics architectures and systems. Processing raw genetic sequence data is computationally expensive and datasets are large. Current software systems can require many hours to process a single genome and generally run only on a single computer. Common file formats are monolithic and roworiented, a barrier to distributed computation. To address these challenges, we built Persona, a cluster-scale, high-throughput bioinformatics framework. Persona currently supports paired-read alignment, sorting, and duplicate marking using well-known algorithms and techniques. Persona can significantly reduce end-to-end processing times for bioinformatics computations. A new Aggregate Genomic Data (AGD) format unifies sample data and analysis results, while enabling efficient distributed computation and I/O. In a case study on sequence alignment, Persona sustains 1.353 gigabases aligned per second with 101 base pair reads on a 32-node cluster and can align a full genome in \u223c16.7 seconds using the SNAP algorithm. Our results demonstrate that: (1) alignment computation with Persona scales linearly across servers with no measurable completion-time imbalance and negligible framework overheads; (2) on a single server, sorting with Persona and AGD is up to 2.3\u00d7 faster than commonly used tools, while duplicate marking is 3\u00d7 faster; (3) with AGD, a 7 node COTS network storage system can service up to 60 alignment compute nodes; (4) server cost dominates for a balanced system running Persona, while long-term data storage dwarfs the cost of computation. \u2217EPFL \u2020U. Politehnica of Bucharest (work done during EPFL internship) \u2021Carnegie Mellon University (work done during EPFL internship) \u00a7Stanford University",
"pdfUrls": [
"https://www.usenix.org/conference/atc17/technical-sessions/presentation/byma",
"https://infoscience.epfl.ch/record/229429/files/atc17-byma_1.pdf",
"https://infoscience.epfl.ch/record/229429/files/paper.pdf",
"https://icservices.epfl.ch/edic/down.asp?ID=2767&pid=2659",
"https://www.usenix.org/sites/default/files/conference/protected-files/atc17_slides_byma.pdf",
"http://csl.stanford.edu/~christos/publications/2017.persona.atc.pdf"
],
"pmid": "",
"s2PdfUrl": "http://pdfs.semanticscholar.org/8753/d965c13633918ac0451dee25cb6bca981bf1.pdf",
"s2Url": "https://semanticscholar.org/paper/05be45c608ec0c6b6f2700188e28f55f1ea910a4",
"sources": [
"DBLP"
],
"title": "Persona: A High-Performance Bioinformatics Framework",
"venue": "USENIX Annual Technical Conference",
"year": 2017
},
"05c9330f261ed3f5aecbca28004206d9a029656d": {
"authors": [
{
"ids": [
"3032988"
],
"name": "Ariful Azad"
},
{
"ids": [
"2238795"
],
"name": "Aydin Bulu\u00e7"
}
],
"doi": "10.1109/IPDPS.2017.76",
"doiUrl": "https://doi.org/10.1109/IPDPS.2017.76",
"entities": [
"Algorithm",
"Breadth-first search",
"Column (database)",
"Data structure",
"Independent set (graph theory)",
"Ivy Bridge (microarchitecture)",
"Manycore processor",
"Maximal independent set",
"Multi-core processor",
"Multiplication algorithm",
"Shared memory",
"Sparse matrix",
"Speedup",
"The Matrix",
"Thread (computing)"
],
"id": "05c9330f261ed3f5aecbca28004206d9a029656d",
"inCitations": [
"79ad275569d313354c203623eb321817542de819",
"652640d1226131fbeb66aba6eab681196c2d5222"
],
"journalName": "2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"journalPages": "688-697",
"journalVolume": "",
"outCitations": [
"f7f4136512d2d40ba455f161e64a31cdb099b9ae",
"09b11dd581fd9d00c3a55d4a49f83660bd7c3d9a",
"2d7bf91ca184def17e15bf515532651fd5fe5f01",
"7ff0fa0958783397fa8db7125205bd6ee65b4c01",
"5f491a183c71b0322b16e4f5dc69538c50db79e0",
"0f16f6f478b5c788dce466eb50e36c612273c36e",
"3153364f8255458ac808a800bc54989000caa94f",
"05af27768c4bf59dc2cc8d6b681bc5438523e587",
"66549f785d13a44171fcc21899802325e7d923cd",
"4c6c7694fcd56da6a2f75e4437eb86b1462f464b",
"1ef7f02bce931c8e9ef529e095b274132ce4011a",
"5a3cd8c65ffcc25bef346174d1f0bc3f83c5cbbb",
"0a791a760dd883342c8b8456a3e7cb75fb996ef4",
"1b348075d02cc532b1a01955e21ba3062e769113",
"24c9b0b05c5e957e255b854f947472f9181772a4",
"ac9caa876f6f17dd7802447e061f4809f9f4731f",
"3edef062698ab35fbe4cc5a5ffce633e09f8b6f2",
"3983fe131eb3902f9923f35060c56546bbdc951e",
"7655853a1346aa3299663c6073c322e324e60a4e",
"b513711621e81d0abd042e0877ca751581a993f5"
],
"paperAbstract": "We design and develop a work-efficient multithreaded algorithm for sparse matrix-sparse vector multiplication (SpMSpV) where the matrix, the input vector, and the output vector are all sparse. SpMSpV is an important primitive in the emerging GraphBLAS standard and is the workhorse of many graph algorithms including breadth-first search, bipartite graph matching, and maximal independent set. As thread counts increase, existing multithreaded SpMSpV algorithms can spend more time accessing the sparse matrix data structure than doing arithmetic. Our shared-memory parallel SpMSpV algorithm is work efficient in the sense that its total work is proportional to the number of arithmetic operations required. The key insight is to avoid each thread individually scan the list of matrix columns. Our algorithm is simple to implement and operates on existing column-based sparse matrix formats. It performs well on diverse matrices and vectors with heterogeneous sparsity patterns. A high-performance implementation of the algorithm attains up to 15x speedup on a 24-core Intel Ivy Bridge processor and up to 49x speedup on a 64-core Intel KNL manycore processor. In contrast to implementations of existing algorithms, the performance of our algorithm is sustained on a variety of different input types include matrices representing scale-free and high-diameter graphs.",
"pdfUrls": [
"https://crd.lbl.gov/assets/Uploads/SpMSpV-ipdps17.pdf",
"http://arxiv.org/abs/1610.07902",
"https://doi.org/10.1109/IPDPS.2017.76",
"http://crd.lbl.gov/assets/Uploads/SpMSpV-ipdps17.pdf",
"https://arxiv.org/pdf/1610.07902v1.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/05c9330f261ed3f5aecbca28004206d9a029656d",
"sources": [
"DBLP"
],
"title": "A Work-Efficient Parallel Sparse Matrix-Sparse Vector Multiplication Algorithm",
"venue": "2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"year": 2017
},
"05d6a284a55c07434325f8554e67741860e38c30": {
"authors": [
{
"ids": [
"37224490"
],
"name": "Bhushan Jain"
},
{
"ids": [
"2104538"
],
"name": "Chia-che Tsai"
},
{
"ids": [
"1755646"
],
"name": "Donald E. Porter"
}
],
"doi": "10.1145/3102980.3102991",
"doiUrl": "https://doi.org/10.1145/3102980.3102991",
"entities": [
"Application security",
"Common Vulnerabilities and Exposures",
"Machine learning",
"Open-source software",
"Software development process",
"Source lines of code",
"Static program analysis",
"Trusted Computing",
"Trusted computing base",
"Unified Model",
"Usability",
"Vulnerability (computing)"
],
"id": "05d6a284a55c07434325f8554e67741860e38c30",
"inCitations": [
"334ec6e57110ece9f482f9ec2e85412b0be8072a"
],
"journalName": "",
"journalPages": "62-68",
"journalVolume": "",
"outCitations": [
"0be708acdf4fccbc706fd3f03bc74fad783b28a4",
"57f406f355daae96c32f5deae0f9381c53147dac",
"3366770807828bc508cc34ecbc07ff0406ee48c9",
"36222f8eb2ccf21ca345e15186cea64506581543",
"10b9a084eca0003b91bb4c7ca59cbd0139ba0131",
"23bfb1a07e2fe2abeb4af58e360ac6278269c31b",
"ae2f1716884e061fd0bcd06f59e1c27234677da0",
"1544a52f31e1475af848ff59a5fccabff56f3355",
"97e05df49bdfdfc05bdb39eefc900d6393e1d61f",
"8206a7e3e4b0c02b3a53c7a08b944de413a58413",
"268be1a8339965aa7cfaa5fe113ed34fe1b7be16",
"a60d00ba42a4bed7adb3dc40cd1c32cbaffda5df",
"0b93657965e506dfbd56fbc1c1d4b9666b1d01c8",
"883a595fd76cb4dc0509a1005040286b31610059",
"2dbf2b8182af61a07c2448579a0753b5b5783c8e",
"03b1932785190d0fce2e3fc0384b7bd6f5efbc5c",
"67ef51e20cdfa7b257c0ece9f44a75058e65a00a",
"a799a3ba98a6d0706cf0345026c4ce0cc6076562",
"2d0571bfecc007dfa96befea14d5a2cc94860f18",
"46507bbd01d73196f848a81ea6166146e32aa42f",
"14b750a0fd5a13f7494e4abf9b97718ff558f508",
"41b099fde4c6d38bef7329c7e0f3beceac065202",
"17886b4911ffd50d7e02a574caad34a286458b3a",
"16c5e4b3dbb699b47523a5882ed7a3b6adac962b",
"bb7eaa951de5ff3106d4380a6a6b79efa4574bac",
"0baa8313c5fa39d9e81a4c7fed7e9e2118f2f08e",
"87558eedbbf4753d2cc3ead7b0a164ce684073b2",
"65f4d0bf8e2cced14603bd46f67c16f65e985b50",
"2f187265b02511b92cd6ea28c6b689a6bc1ea573",
"3f93a67887191069cf67034ef904f781ec2d4fe6",
"b33d4c821b7c38a256cc970cbbd837157477554f",
"71691ee2dbe001d599334e5389d80dd32c44a74e",
"181ab946b3370034a2bc3bfa7953a7e907515631",
"ec993a8dc344970f1c8b992df2fdd74a91148025",
"1b12eb42a9e04af626c7ed266b2e299d7f6f96a3",
"9b9d17da57e83272a53292850b5e956643a94a4d",
"a1bbfcd8f2ca07d671cd940b5971efad1064d9fc",
"089895ef5f96bdb7eed9dd54f482c22350c2f30d",
"55edf8d36576d63851d8f5739e8d0b6b094fe5cf",
"b929be2068e9bc81701b9065b16401c77bebea48",
"5fbf739032dd548c1ff189e7333f05e215906a1b",
"01fde8698110cf46ff48a17c65f2658dab4c323c",
"91f81ebaffe183cf413423e0c189567321e6f517",
"04bc01bbcfa93f72f7ea958911de3aedd7320936",
"37071d0a1ff7efbd6c5eb303f8f9f105f1449bbc"
],
"paperAbstract": "Nearly all modern software has security flaws---either known or unknown by the users. However, metrics for evaluating software security (or lack thereof) are noisy at best. Common evaluation methods include counting the past vulnerabilities of the program, or comparing the size of the Trusted Computing Base (TCB), measured in lines of code (LoC) or binary size. Other than deleting large swaths of code from project, it is difficult to assess whether a code change decreased the likelihood of a future security vulnerability. Developers need a practical, constructive way of evaluating security.\n This position paper argues that we actually have all the tools needed to design a better, empirical method of security evaluation. We discuss related work that estimates the severity and vulnerability of certain attack vectors based on code properties that can be determined via static analysis. This paper proposes a grand, unified model that can predict the risk and severity of vulnerabilities in a program. Our prediction model uses machine learning to correlate these code features of open-source applications with the history of vulnerabilities reported in the CVE (Common Vulnerabilities and Exposures) database. Based on this model, one can incorporate an analysis into the standard development cycle that predicts whether the code is becoming more or less prone to vulnerabilities.",
"pdfUrls": [
"http://cs.unc.edu/~porter/pubs/hotos17-final38.pdf",
"http://doi.acm.org/10.1145/3102980.3102991",
"http://www.chiachetsai.com/files/hotos17.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/05d6a284a55c07434325f8554e67741860e38c30",
"sources": [
"DBLP"
],
"title": "A Clairvoyant Approach to Evaluating Software (In)Security",
"venue": "HotOS",
"year": 2017
},
"05dacaee4f019fc54bd08de950bdbe97bda377ee": {
"authors": [
{
"ids": [
"2546078"
],
"name": "Noah Wolfe"
},
{
"ids": [
"2383364"
],
"name": "Misbah Mubarak"
},
{
"ids": [
"1812494"
],
"name": "Nikhil Jain"
},
{
"ids": [
"2300557"
],
"name": "Jens Domke"
},
{
"ids": [
"1823585"
],
"name": "Abhinav Bhatele"
},
{
"ids": [
"1759102"
],
"name": "Christopher D. Carothers"
},
{
"ids": [
"40211322"
],
"name": "Robert B. Ross"
}
],
"doi": "",
"doiUrl": "",
"entities": [
"Fat tree",
"Network analysis (electrical circuits)",
"Network model",
"Profiling (computer programming)",
"Routing",
"Scalability",
"Simulation",
"Tree network"
],
"id": "05dacaee4f019fc54bd08de950bdbe97bda377ee",
"inCitations": [
"867155b2db9e329794ad1ebb69f709a6756ce496"
],
"journalName": "2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)",
"journalPages": "258-261",
"journalVolume": "",
"outCitations": [
"0a9c8fef61634e392f9de6f34361cc1c690f7a00",
"7e06d6922e32d30bd6f7e86ae660ed7bf2e99fd2",
"1fe8c9894a79f22d2edfeea0020995e714f83c38",
"121b1445260daa67c5da3b94e41e8304fc81ef60",
"10f3fa67bcb56322427d12f81abf49ed10198247",
"296efa02ff08ad3533b1d37c79f0d8a8a963eefb",
"5203210d18c94f01169bd50afcebf70cd3284898",
"8cf9e252c8314e26f20b619acb6392d52abac647",
"251544e7c508771ab34cb2d6b97800960cde1f1e",
"a86eb622eaaae24053a158a857624470af790bb6",
"491eef9f7adada860abbd274e008e7acb964ef8b",
"c39c26d510c1a965c5f132edc989a598ca92b700"
],
"paperAbstract": "Among the low-diameter, high-radix networks beingdeployed in next-generation HPC systems, dual-rail fat-treenetworks are a promising approach. Adding additional injectionconnections (rails) to one or more network planes allows multirailfat-tree networks to alleviate communication bottlenecks. These multi-rail networks necessitate new design considerations, such as routing choices, job placements, and scalability of rails. We extend our fat-tree network model in the CODES parallelsimulation framework to support multi-rail and multi-planeconfigurations in addition to different types of static routing, resulting in a powerful research vehicle for fat-tree network analysis. Our detailed packet-level simulations use communicationtraces from real applications to make performance predictionsand to evaluate the impact of single-and multi-rail networks inconjunction with schemes for injection rail selection and intraplane routing.",
"pdfUrls": [
"http://dl.acm.org/citation.cfm?id=3101147"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/05dacaee4f019fc54bd08de950bdbe97bda377ee",
"sources": [
"DBLP"
],
"title": "Preliminary Performance Analysis of Multi-rail Fat-Tree Networks",
"venue": "2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)",
"year": 2017
},
"05f44cddc0884c5ae7ce6502a247c502d63c922f": {
"authors": [
{
"ids": [
"2731972"
],
"name": "Fumin Shen"
},
{
"ids": [
"40501686"
],
"name": "Yadong Mu"
},
{
"ids": [
"1708973"
],
"name": "Yang Yang"
},
{
"ids": [
"1722649"
],
"name": "Wei Liu"
},
{
"ids": [
"1746030"
],
"name": "Li Liu"
},
{
"ids": [
"2346105"
],
"name": "Jingkuan Song"
},
{
"ids": [
"1724393"
],
"name": "Heng Tao Shen"
}
],
"doi": "10.1145/3077136.3080767",
"doiUrl": "https://doi.org/10.1145/3077136.3080767",
"entities": [
"BQP",
"Benchmark (computing)",
"Binary code",
"Computer vision",
"Experiment",
"Hamming space",
"Hash function",
"Linear programming",
"Local optimum",
"Loss function",
"Optimization problem",
"Program optimization",
"Quadratic programming",
"Software deployment",
"Test set",
"Time complexity"
],
"id": "05f44cddc0884c5ae7ce6502a247c502d63c922f",
"inCitations": [
"26f753a7d8304922dff1f1b52f8f5fc30451497a",
"2411270f111a160c9289d56132651c896a5738f6",
"b4ef86ba93ff26a73eb1069caa6789a2d5eb43f0",
"9478a6df6e845d88f660e5b141aeab7d12f0a8ba"
],
"journalName": "",
"journalPages": "595-604",
"journalVolume": "",
"outCitations": [
"3e69456017e04b9a0ee915e815216d314383068c",
"1721d05db7f9ea7eee6730150676563f65a8fb38",
"1d9b302a5a004e279b984f35d01190cb59658c50",
"91fd133adf2bd15ab814351b3a9e9f13f2951e38",
"0756d1e7ed9e0d20f0c6e7cfbebfc7153db8d3a1",
"5a26ec6568152731ce1667a426307ebccff5a50e",
"0413a801810739b1c7ed8211607dc1c7eb5ed7b8",
"310b203a7754959df711056a617634bc10ed1d9a",
"07f64c359a48f865f6d0dcc767425f1e2e0beb96",
"52c89ca39a9fcad716e1e43c0bd4e40101c15d64",
"7458f8bfffecb1baf72e32590a1da5ca8ba923d5",
"4fdaea2654512d2dfe4fa9b1a6673668c686fe65",
"348605f50474c955c91c344f701a13989e81ff57",
"24c9b0b05c5e957e255b854f947472f9181772a4",
"877d083b2a3a75cc1bb25f770a9c5684bf5f6f44",
"0e730f8ed7cfdeb458cab36e8495e2cc0ee6d6a6",
"9952d4d5717afd4a27157ed8b98b0ee3dcb70d6c",
"52c0876b25a5721c4c6930d94d5308f0779734ec",
"383a58de852715c8544abe60fa64d29fb7ea5688",
"5ff8c048a042d37a99a9f9c5acb0d82972a45ad0",
"2e72c8aa2acf362ab98667a2e2c49f6b52b656ee",
"0cd032a93890d61b9bd187119abee0d6aeb899f7",
"2ad9a338d81340b7b02510e7f9e390f9202ca72d",
"0bc288f4e7097cc05ed8709149aa75c740e5de3c",
"1ddacefa549de21f734f43016115ce7d54ab3d94",
"6184ddbe780cb934f036b04dd1d28226b6bcbcce",
"47f54a7953b3d167c6d94f2e8e035c2e798b3f18",
"12f15d23e6e3a5b89d5872961a66106cc316f347",
"236a1facf2bbd96608763363390f7acff9dd764a",
"1c0c670162391106a78e601fe9ed83c814d604d4",
"03488b77ec21c586a151249289f517a8e954bc30",
"227db8b8d02040ca0d8853d52716be06d87c40b7",
"031854648e0688c1bfc991e7597e54947928fb74",
"02657848c16f9571e5f0369658023007575eac58",
"313c782f18bb01933668dce56003553b49d1fc44",
"0ffbef76c6ac74d6e14878484c86b60f38d016dc",
"17a41aa18b8987ed87d6fc19b87d36faf8a4240c",
"1379ad7fe27fa07419b7f6956af754bdb6d49558",
"1c799eca7983c62f7815ac5f41787b3e552567b6",
"7573ff84d71de19fe7d387bb4a6de73cb28402f4",
"16a651ad4a558d428c18fa92094433de89dbd7fc",
"1dac961cbf1d5a01ccd09d5a3668abc3c5a1edec",
"8c4fae5e494fe27d44138e790e632bbff8a68ba6",
"026050f71175d235f3f91ca0e99e994c00f9b5a6",
"61181e71ca1b899b5fdaaac24daac2463b3e6c96",
"0e72a9c87c320093b77f941e95abcb93e7dc1f08",
"df112f4e83dd6ce1898237e0aabdb790b6b51597",
"03fcaa855332fdd11d5b9ac8f369aa904347d577",
"38211dc39e41273c0007889202c69f841e02248a",
"d062a4995298ba64e8c8061afacf069edee0c879",
"2a88541448be2eb1b953ac2c0c54da240b47dd8a",
"12d0c11d546d91e776a170898ebf3a38c010695c",
"954ec02492cecbf8a4fc1c8e37179fae613dbfc9"
],
"paperAbstract": "This paper proposes a generic formulation that significantly expedites the training and deployment of image classification models, particularly under the scenarios of many image categories and high feature dimensions. As the core idea, our method represents both the images and learned classifiers using binary hash codes, which are simultaneously learned from the training data. Classifying an image thereby reduces to retrieving its nearest class codes in the Hamming space. Specifically, we formulate multiclass image classification as an optimization problem over binary variables. The optimization alternatingly proceeds over the binary classifiers and image hash codes. Profiting from the special property of binary codes, we show that the sub-problems can be efficiently solved through either a binary quadratic program (BQP) or a linear program. In particular, for attacking the BQP problem, we propose a novel bit-flipping procedure which enjoys high efficacy and a local optimality guarantee. Our formulation supports a large family of empirical loss functions and is, in specific, instantiated by exponential and linear losses. Comprehensive evaluations are conducted on several representative image benchmarks. The experiments consistently exhibit reduced computational and memory complexities of model training and deployment, without sacrificing classification accuracy.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3077136.3080767",
"http://www.ee.columbia.edu/~wliu/SIGIR17_binarizing.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/05f44cddc0884c5ae7ce6502a247c502d63c922f",
"sources": [
"DBLP"
],
"title": "Classification by Retrieval: Binarizing Data and Classifiers",
"venue": "SIGIR",
"year": 2017
},
"06018aa08f70a2c10d51e51976eaf4c560918bb9": {
"authors": [
{
"ids": [
"7777279"
],
"name": "Yunfei Ma"
},
{
"ids": [
"3979901"
],
"name": "Nicholas Selby"
},
{
"ids": [
"1761544"
],
"name": "Fadel Adib"
}
],
"doi": "10.1145/3098822.3098847",
"doiUrl": "https://doi.org/10.1145/3098822.3098847",
"entities": [
"Algorithm",
"Duplex (telecommunications)",
"Location estimation in sensor networks",
"Printed circuit board",
"Radio frequency",
"Radio-frequency identification",
"Relay",
"Sensor",
"Unmanned aerial vehicle",
"Video game localization"
],
"id": "06018aa08f70a2c10d51e51976eaf4c560918bb9",
"inCitations": [
"0d023aa7b708a02ebeb7853565c9d0f607932ae7",
"d1e0fb65317c729b8c2b72461ba6f8b2d3728c42",
"076cefb7b5de0ad5b6ab53402f238e97359de39c",
"af8ae2a2a2d74ae63c599865beaaf54d85c69acc",
"98cb0ce9ca0cc29f2468f7da50c75666fd09483f"
],
"journalName": "",
"journalPages": "335-347",
"journalVolume": "",
"outCitations": [
"14ba7b31b92233766089dfae54b53e339822f3cc",
"29e9cd18af650b7e448dea668121a1d98afd3c46",
"e895a0c2b989221a665868331eafbca5967436b7",
"8317f40c569af2b5bb0aefbb6b07d6a991c1204e",
"16ccb8d307d3f33ebb395b32db23279b409f1228",
"4b2f3372baef782618daf54e59782f251c58b97d",
"151831fc041a3fc19ed56bacdd8bf330d2a93eeb",
"ecfa0452164fc39e6b1d63b7e298e1b74582ef8e",
"ff19edf8a6eb77821a8e58ac51b62c619b538614",
"291bc654cc9622d7fb71bf6507ae927ebc684153",
"0c9b68449b6241478ba38c2af220b393db86e206",
"04ce31e09475303e84473b4b29613204da92c9c1",
"ceb862f41396546d5d7df3b6db194e9a45aeb34e",
"7a8704e143cd93edee5ee4fd7077cdc0c0469e5c",
"05fe031e53dd8990e7076a91277cb2b74e22b811",
"24d96f44682195f9901dcbdd9506ac1cc1a19879",
"0a5cb101a28848dfec9955ad15e2ed754d3f0bb4",
"2b2d03f8b96aa1e306fb941e0318d403efbde4be",
"101aaa6b7a3ebd049412265a43f8aed414f44db1",
"2b91d684bced5c95172a6e847355a37969a3c9e3",
"15f4d8eca1d25f6ec7fbfaa939e5e70bb4abbbcd",
"e5edfbdf645a3dbcdaf7d9fcbf350c67fbbadae5",
"cd068e50d8590dfea9acf829d713aef194c6ba5d",
"1682daf380ecd745adc378422a3ff58eb4141b0d",
"052b36fd8bde6035c11eb316c3f9a3665c0110f0",
"381d605d38e372c4f3d9306aeb781f7204c29385",
"5a0e84b72d161ce978bba66bfb0e337b80ea1708",
"201432738e66b70616c1a442880648b79b56ca01",
"d98598f0c210730856852ba0c80a061c9a227ad1",
"82802e411495bbad77fa2415c6d4633dde180764",
"6d8c069ea2b6b8c71638ec40799244f7e3d3284b",
"af2b7426c907ba9baed2e63c1c90ed6dd7249720"
],
"paperAbstract": "Battery-free sensors, such as RFIDs, are annually attached to billions of items including pharmaceutical drugs, clothes, and manufacturing parts. The fundamental challenge with battery-free sensors is that they are only reliable at short distances of tens of centimeters to few meters. As a result, today's systems for communicating with and localizing battery-free sensors are crippled by the limited range.\n To overcome this challenge, this paper presents RFly, a system that leverages drones as relays for battery-free networks. RFly delivers two key innovations. It introduces the first full-duplex relay for battery-free networks. The relay can seamlessly integrate with a deployed RFID infrastructure, and it preserves phase and timing characteristics of the forwarded packets. RFly also develops the first RF-localization algorithm that can operate through a mobile relay.\n We built a hardware prototype of RFly's relay into a custom PCB circuit and mounted it on a Parrot Bebop drone. Our experimental evaluation demonstrates that RFly enables communication with commercial RFIDs at over 50 m. Moreover, its through-relay localization algorithm has a median accuracy of 19 centimeters. These results demonstrate that RFly provides powerful primitives for communication and localization in battery-free networks.",
"pdfUrls": [
"http://www.mit.edu/~fadel/papers/RFly-paper.pdf",
"http://doi.acm.org/10.1145/3098822.3098847"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/06018aa08f70a2c10d51e51976eaf4c560918bb9",
"sources": [
"DBLP"
],
"title": "Drone Relays for Battery-Free Networks",
"venue": "SIGCOMM",
"year": 2017
},
"0631f1cdd062b257fdf8ca51728aa44f216edb64": {
"authors": [
{
"ids": [
"2390252"
],
"name": "Tingzhe Zhou"
},
{
"ids": [
"3448074"
],
"name": "Pantea Zardoshti"
},
{
"ids": [
"1687335"
],
"name": "Michael F. Spear"
}
],
"doi": "10.1109/ICPP.2017.17",
"doiUrl": "https://doi.org/10.1109/ICPP.2017.17",
"entities": [
"Compiler",
"Critical section",
"Data compression",
"Encoder",
"Experience",
"Experiment",
"GNU Compiler Collection",
"Manifest (transportation)",
"Programmer",
"Scalability",
"Transactional memory"
],
"id": "0631f1cdd062b257fdf8ca51728aa44f216edb64",
"inCitations": [
"4499838e0f3b5756e8d50970dd1c502409eafed1"
],
"journalName": "2017 46th International Conference on Parallel Processing (ICPP)",
"journalPages": "81-90",
"journalVolume": "",
"outCitations": [
"2bf4940710deb2571e93b1c922e8e7452e854afd",
"a16d87f2fa0712593f0af25a5ef802775ddd3baf",
"023ba3dff9e17a15ae8448ec6cacc3e9a5ff116a",
"167d2cfd31948e72243a5f442544c0d4b1f826b9",
"ab3f531f3c6e4920c9ba4b437d997c0ce797f5b0",
"22d3b78476f5b6c002b71b335a65f132b2a63069",
"f4d2ec012d2484ba693c63a009f5dd66dafe9b4b",
"917392fb11729b5b522d1ce5a00d3f23f4594e3c",
"92b052d441f22dd073cbe235b58a96dc78bb48ff",
"b087c5133649dbf01dfa56805a92b14f153ba3bb",
"2900690eb3132a4d1536226d629727de41f38a66",
"06fdfba1bb58bc7b43213594e6030935c8df4103",
"429e313d33a82bf086b69d47eee735450cbeb4ae",
"6b1099588fbd2be693c5a235f5a20e7bcb1bc4a7",
"7f11c7b0dda506d532e069ccd3f323c6c3155a1d",
"861fbac82ae5ec0ea654d0d95ce4d48de62419ea",
"05a518c3b1a6f5c15d77f8829368677a263ff15d",
"25883553e5315e32194614676f11bb012db6dafd",
"14e980a3d6d5a4617ed56e9bac91f3ea5cf1654c",
"3150e68dccebd9d8e371143270f6bc3942b7d69c",
"57fe2b6acccbba91df0847442d2634ffef7ccfb4",
"6f5e4f6a4b31c886d5fdb1e0da1237fbc7b7a3a5",
"842340ba3dbf81ddb65b652c22d60ece5be2e05e",
"1fffb35160cf06ddbbfa3dad44fc293ad9b29b87"
],
"paperAbstract": "Transactional Memory (TM) promises both to provide a scalable mechanism for synchronization in concurrent programs, and to offer ease-of-use benefits to programmers. The most straightforward use of TM in real-world programs is in the form of Transactional Lock Elision (TLE). In TLE, critical sections are attempted as transactions, with a fall-back to a lock if conflicts manifest. Thus TLE expects to improve scalability, but not ease of programming. Still, until TLE can deliver performance improvements, transactional styles of programming are unlikely to gain popularity.In this paper, we describe our experiences employing TLE in two real-world programs: the PBZip2 file compression tool, and the x265 video encoder/decoder. We discuss the obstacles we encountered, propose solutions to those obstacles, and introduce open challenges. In experiments using the GCC compiler's hardware and software support for TM, we observe that both are able to outperform the original lock-based code, potentially heralding the readiness of TM to be used more broadly for TLE, if not for truly transactional styles of programming.",
"pdfUrls": [
"http://transact2017.cse.lehigh.edu/zhou.pdf",
"http://transact2017.cse.lehigh.edu/slides_zhou.pdf",
"http://doi.ieeecomputersociety.org/10.1109/ICPP.2017.17"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/0631f1cdd062b257fdf8ca51728aa44f216edb64",
"sources": [
"DBLP"
],
"title": "Practical Experience with Transactional Lock Elision",
"venue": "2017 46th International Conference on Parallel Processing (ICPP)",
"year": 2017
},
"063d724a6f7a376f5c276cc2c7113c68c33fc1c1": {
"authors": [
{
"ids": [
"12762343"
],
"name": "Benjamin Fuller"
},
{
"ids": [
"33860798"
],
"name": "Mayank Varia"
},
{
"ids": [
"2529763"
],
"name": "Arkady Yerukhimovich"
},
{
"ids": [
"2374854"
],
"name": "Emily Shen"
},
{
"ids": [
"2984519"
],
"name": "Ariel Hamlin"
},
{
"ids": [
"1867298"
],
"name": "Vijay Gadepally"
},
{
"ids": [
"1783649"
],
"name": "Richard Shay"
},
{
"ids": [
"2377837"
],
"name": "John Darby Mitchell"
},
{
"ids": [
"1939551"
],
"name": "Robert K. Cunningham"
}
],
"doi": "10.1109/SP.2017.10",
"doiUrl": "https://doi.org/10.1109/SP.2017.10",
"entities": [
"Computer security",
"Cryptography",
"Database",
"NewSQL",
"NoSQL",
"Open-source software",
"Performance Evaluation",
"SQL",
"Usability"
],
"id": "063d724a6f7a376f5c276cc2c7113c68c33fc1c1",
"inCitations": [
"80621d09c3d3dd896c7e2bff083b9e702dc2ed29",
"f81bf1e2fd52b978af73e4b567528a66de2e319f",
"46e837585af419dc79a949fcb1cfa46a8621f9ff",
"53f18a9a84c41ff532302166f4456856f3711830",
"ed84133ca8ef37a273d4b187202f55c6618b953e",
"f39796b6656cac1e9ddf9e4758dec9d6a8aab8d1",
"27d04d11402484260517af073172724e0b6eecaf",
"b7a64553739fa597268a5f4b912837aced813ab8",
"00e99b1ac9e395068f90e413fcbb96f2112c1293"
],
"journalName": "2017 IEEE Symposium on Security and Privacy (SP)",
"journalPages": "172-191",
"journalVolume": "",
"outCitations": [
"40438276d4744cd4ac13140ccea28ea157098075",
"0e84d3a84b41c06ae8f8413fe7bd37c2d7f37c2f",
"00e6e8a8dc5c4100584af8175e24616a8a5efab1",
"49e72b668dcde9fe57a8ed60e6890a5622733f19",
"18264d2218cd7e45bd459750a0c946023a6b845c",
"85770543edf9b69a7a1e06551582906ed8cd24e9",
"35b7492ff025d4b9412508504c97d8545c8d8a3f",
"4527bf2b990a91a276cffd1cd65253f827247cfe",
"9b5890065c9ff71b1279250c1c809bb782c31c60",
"1f6cbdee0cd99b74ab2a8ffb381265286a11ea90",
"4f888052bc790d2e6825ce34b494cce5112d9609",
"3ae6e3f385f075c2b7b6958122c1e30fb1b54b0e",
"63e6d48a08035cf111ecf09f965514dcbb2c841e",
"52e1811ed88f9eed814e3a208efd1bafffd6a598",
"cf3fbac4277172f24d6a8f7e2b2beb39c8ea14cf",
"bcb49a06e4fb7ea831257e146073d84234f4d238",
"73f31354cc9058ddc2e47a1c585b753e1592c1bf",
"6e5c20d5c50aa92857a5880285674f4dee27fd96",
"13868fa5a86ebde021a1c91415fb9bb718c4a804",
"4af77753e00973f339fd93a27e4131047018e79c",
"225c357ee5490febc4fe9ca002fbf08b29adec46",
"732ae647aa75acd7b7349679a4746c0539370122",
"70d2a37d5af527dfc345691e2f978f6e46dc4efe",
"06fb8f5e59bac8b014e7ab70851b3568ea5a0a46",
"7a9afe050785e0c51498e2978359a84307d7e368",
"3181b9ce21265bbf8175314714e1535f75b3d80f",
"18e704e31d06f955f39955cd4c785c4731e5fbd7",
"6db00c7de3c9c13b7fd1c0078eefdbe506d054cd",
"7ee7c3ddc35e084a03decda196866c64c359dfd6",
"b274d13fce445dc10f7e0d40620b8c96ebc01f44",
"7ec028ace29244cb74c105327a7e4177a34aa6bd",
"db5647a233f5657913e669ce11d02aafb3fb8fa1",
"33457f49553d918e912c2d8c54b81f4fd8a4c234",
"5ad1dd1aa78ba772c969aa01ee5e8ee0d255ce3d",
"b4ed18399f7690c469f973c28ee1b0f61991572d",
"46527c14457cf84d1cf26487d6b4c31f4825db71",
"18a5f443299784479e78d9e77f175af57cb2fa2b",
"02beed2e1350a0d0b01bb9622081cb93a965a716",
"669a754df3cffa8f52bbfad60c44f8ae8aa83183",
"2ce053e6d742031ef2da8b83d6ee5d8876b9dc2e",
"09598c6fa85bb64b22816cfaef54e682cb3f3a6a",
"0b3c3941b97876b1034dd341cf527d297c257000",
"abaa88edcdb30b66a6adb3b098fcd4e082e45231",
"75cbe27efe1c8b255102f641feba1871176c6c20",
"9ea1bbb1d3302aa9504e71ca42e1c19c09e310e0",
"5623dec3a4fe0e6c45f3422d1840bc463cbad3c9",
"0df6726c1d83b1e0d6c6580a1e2594519590e38e",
"11ef7c142295aeb1a28a0e714c91fc8d610c3047",
"083ce3238ea0f3b94f92c850767354475195f678",
"1c799eca7983c62f7815ac5f41787b3e552567b6",
"4cee38d9d088cf021bc5f5b9fda6764feeb1806a",
"dd186d6826a0bc007fd02bafed6861f99b2f4ef1",
"a344060ddde7b86e8f2105ed8b96a54954ecc57c",
"4b510ec66f9ca8a3248427367e1c627e663ecad2",
"fdae98ed41d0324e7484d5e1a0a24e0aab56233f",
"2ef1d7024bb95d908857f4113c1880b18d4d96f2",
"685c70f73abff7ce4c16282cfa5a36478ef4cb8b",
"2898cd36fcaaf2e1dc44f555cc4685545ebc5178",
"47564fdfc63a1a36102b8b6c74f978bbc5190c5a",
"19c3736da5116e0e80a64db35afe421663c4b4a8",
"3d8e636e82339b83feda41b689ef92b462d9420d",
"a560e4a8264280ff5c4246d502beb351e564dea2",
"8a37efc82e54353d387cfb073f9379c053988aef",
"019d8ba2274b5555bb71baebf76af35de23ef988",
"ae2bb2dd98ce5db50703005e3c6c7b43045621ca",
"1da3e391252ea1a346744a6dade6983ec5c5babf",
"080ed793c12d97436ae29851b5e34c54c07e3816",
"1cb9aa0116af7d9e61ffabfa951153e9f4e43779",
"140a563a1ef271b7dcd0675225cb543d92636f6c",
"0227e83202440c13c4c2b97b49ef7c64dfbd52c3",
"076e9f5d5b3e813b0cfa5dd3e47f1b8591136bf2",
"35704ca4fbf9a0af598877f1b0cfa84603e26287",
"99e7d185f1e70474806c9dedfc576e8525bb5c92",
"a94205aed0148ae6d00986aef009e5e05d046f43",
"1360a9e2fcd1504effe81f54bbd20ab5b5a07685",
"8c9982a59457d448ac899f8e70e277e69f5d7942",
"90569b27c21f400cd818a58005fecd9f2033048a",
"41d16b9f8bc2e3af15067d9227deaef88c81a28d",
"629a62c681a03ab7875d0883a986978b280e76d3",
"1fb4a73e144257d2d5ad7990db319720a960b07a",
"45ba5e720039754ccd07b936714f64f8b6355e5a",
"c484e351445232ea526c8d73b84bc529ffcddee1",
"92eaba06af12761b5c64b84e6028d21cd05af9dd",
"be2f737bd30976386b069f6edc61371dcda9fec8",
"3efacce012135fa5ea952339b101761e2bb56bfb",
"56d320acfad7f6e8060acb77191c179844fab3cb",
"8f3f63773aa801b2cdcfa2e5699e3abb9aed7443",
"ab288ba0ecf4027d5eec90d8debbb06dde0076e3",
"1939f908a8b47e16617bbba22d08e97ad3eadba8",
"3864cfb41db27452cefe3b1f64f05623690201ab",
"42435ffebeae0b09810c61b661c88cb51e36c4c0",
"6871b95c14dccca7636b498b5d363a743c5288e6",
"b07fb9ae940ddaaa690de67cee2029e4373fdbc4",
"8776c004a351e23be9ef7a4d214da4fc93260484",
"4646e3be0ab8ef61846c4ef954677376d0f880fb",
"3661adc4d70f140e86957b2dff527a5676079adb",
"17e20f8493523809f0189476d52d3b2ed13e0e3f",
"10130d16b8ceb9aea868c416df56e929a0631cdc",
"57a40440be2c8f38ebde172cddca3925d2827c62",
"ad0c881078b2cd3d69b5cc2ef63bcdb72070298e",
"26c4c1dd27fdb449fe0267eac595930766917878",
"b748b52dc7e9de9c0d96ba31faaf4ea87fc28892",
"0e0427aedfed65c8dd688c094b181feacf4eaab4",
"a3072a044575760e0a6fd20e353f3f44d86f692d",
"961487973d4b33f96406fddbfcf1235dc587571f",
"d878fb5a7d1ea14649f590de5ebb806d1414f0b6",
"3cb49b5c2614d5d54fc0827567de9dc7d8dfb8f3",
"1c730d368ee9b381907a95bc3638cffbc0968bcd",
"0b6d88342563acaf5f7ac34bec19cfdef6c77eff",
"9543618825efde94e081aa4820f4852fc973963d",
"14dc5effd28d22cf7fc8aa6a1be8ae2d37859891",
"1cf87af22b3b4dd0ff1144d861e0573121d8de2e",
"2e72e6c022dd33115304ecfcb6dad7ea609534a4",
"85a3c518ae3f0d77a2a16e3a45761be2c8517b19",
"965299efb158bace13e71ab11c6d547d6234d009",
"3d989af52b72e9ccc7bcc215c0f25a4fb62aee12",
"20b63210954f7c5a70664f301dcd7196856ccfa7",
"1ab81ae077d6944fbff279a7a8a38df48f75eadf",
"a0835c336ccc0e2f6f7cde1ba9c214996a70f1f3",
"0832933a67612dc18e0f70cb0ed949fef1a830a5",
"94bb86c99e93b8ae04eed9a48d4fa138439f7ef0",
"057337e87c84640a3ad32ad499908e83696c0147",
"3cbf6df60d91d4f2422827c46ec4f85fb45bbeb7"
],
"paperAbstract": "Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches. Since protected search was introduced in 2000, the area has grown rapidly, systems are offered by academia, start-ups, and established companies. However, there is no best protected search system or set of techniques. Design of such systems is a balancing act between security, functionality, performance, and usability. This challenge is made more difficult by ongoing database specialization, as some users will want the functionality of SQL, NoSQL, or NewSQL databases. This database evolution will continue, and the protected search community should be able to quickly provide functionality consistent with newly invented databases. At the same time, the community must accurately and clearly characterize the tradeoffs between different approaches. To address these challenges, we provide the following contributions:1) An identification of the important primitive operations across database paradigms. We find there are a small number of base operations that can be used and combined to support a large number of database paradigms.2) An evaluation of the current state of protected search systems in implementing these base operations. This evaluation describes the main approaches and tradeoffs for each base operation. Furthermore, it puts protected search in the context of unprotected search, identifying key gaps in functionality.3) An analysis of attacks against protected search for different base queries.4) A roadmap and tools for transforming a protected search system into a protected database, including an open-source performance evaluation platform and initial user opinions of protected search.",
"pdfUrls": [
"https://arxiv.org/pdf/1703.02014v1.pdf",
"https://doi.org/10.1109/SP.2017.10",
"https://arxiv.org/pdf/1703.02014v2.pdf",
"http://arxiv.org/abs/1703.02014"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/063d724a6f7a376f5c276cc2c7113c68c33fc1c1",
"sources": [
"DBLP"
],
"title": "SoK: Cryptographically Protected Database Search",
"venue": "2017 IEEE Symposium on Security and Privacy (SP)",
"year": 2017
},
"0646a88dfd7e7ce7233041eaad62076ccc55624c": {
"authors": [
{
"ids": [
"3243432"
],
"name": "Andrea Bittau"
},
{
"ids": [
"1758110"
],
"name": "\u00dalfar Erlingsson"
},
{
"ids": [
"2286904"
],
"name": "Petros Maniatis"
},
{
"ids": [
"1761190"
],
"name": "Ilya Mironov"
},
{
"ids": [
"1806005"
],
"name": "Ananth Raghunathan"
},
{
"ids": [
"4260658"
],
"name": "David Lie"
},
{
"ids": [
"2830166"
],
"name": "Mitch Rudominer"
},
{
"ids": [
"35798085"
],
"name": "Ushasree Kode"
},
{
"ids": [
"2521134"
],
"name": "Julien Tinn\u00e9s"
},
{
"ids": [
"11435780"
],
"name": "Bernhard Seefeld"
}
],
"doi": "10.1145/3132747.3132769",
"doiUrl": "https://doi.org/10.1145/3132747.3132769",
"entities": [
"Algorithm",
"Blinding (cryptography)",
"Cryptography",
"Differential privacy",
"Enthusiast System Architecture",
"Exception handling",
"Experience",
"Experiment",
"Pipeline (computing)",
"Privacy",
"Randomness",
"Scalability",
"Secret sharing",
"Software deployment",
"Systems architecture",
"User (computing)"
],
"id": "0646a88dfd7e7ce7233041eaad62076ccc55624c",
"inCitations": [
"ed7682b9ab6c19d87e0275cf2823b2d824b13e40"
],
"journalName": "",
"journalPages": "441-459",
"journalVolume": "",
"outCitations": [
"491bbfcc4d5b8d322b312fb18bbc5d9f7bc5b2d4",
"1c7a9933cfad8dfcc4dd0e2e4f2100dba3c34a08",
"1bb07c114cb447552d36a95445cc207f496d85aa",
"312fcd1ab4e5187ad5f79701d9abd730cd6d5642",
"3b2849c55fe6fd719cc298be03292a93ce78d107",
"3dfce4601c3f413605399267b3314b90dc4b3362",
"09de90384bacfdd82e4503dc155ab6868f953eb3",
"4fbf4fd303d969606edc6f1cb42642ab2d11ce14",
"5523832d7e841d5aa3336b7d0ae4c14d784fbed8",
"78e2d6b7a671d8e53f207adff088833fd7606e13",
"2e8b9a7a085a8bc18783e76b776c6e780116efd8",
"06eaabcdf0c1f578c2442b3e7a0858a8dc5679c8",
"795d820bad517834441a78117effaf661fc58933",
"0dca2b86c0bffff6b47ce03cb1b01545d8d2cbb2",
"2c9f073340ab55613f0e25e444bbd09b7851aa23",
"2e037e25c0af281f6b699d238e79aa7074e9fe06",
"3ca369fa2cadb403db7ac5e75deefd9acbb10723",
"64028c85cd7b7e42f208e29734028572d7735c61",
"35516916cd8840566acc05d0226f711bee1b563b",
"3d2af27adb6fe7751b91248a5b4da60e032bf4f8",
"9a5c5e7f30c1db4aa91b55829e8fe1669213f65e",
"2087f336b0eb38fc60a24a32ec0821fc8fe2b2aa",
"61d968e9c2e067398e8ba325dc14170b686e68e4",
"70fda5147aedd42c64143a464117b5ffde18a2e4",
"8e48f3892878edc64a312b1bc20299508522d16f",
"2173406c4ca5fff0de66e8cbed4cb01ca959cb31",
"415012ec86c7a6acebd34bf7eb02eff46dd96e68",
"1c2d161c5bb15efd73311d0a3223aee773d38cca",
"0b52c0dddb4b37abfd6fb3657c81342777ff62bc",
"0d7ecfcbca1e8884944073c82886cef76fc53adf",
"2106bb4ef13e35ad7640376b0ba3b6261b82fe22",
"34bdd36330946cf9b377d274bdaaa7dc41888aa2",
"28a6e6ceb0a92de7a49048d094321af5fab227a0",
"03b01daccd140e7d65358f31f8c4472d18573a5a",
"5ac7a4dca5509c9dee49d96b4c3c62cc1d0bb9dd",
"5a51a18a63fc57cd9ef206bcfdb303933c2bcfb9",
"11a651253f8603c01ed29c00c76673a67bd291c7",
"02dad9c51e3a2e2117ffc41d624de4a090271d1f",
"31445e3bd3672ed743c4a089cc0db4f23357f0f2",
"1026527f60f4df0c523dc4b4b07a06274f1f0517",
"4df9835710f8a684854da04dd68cd472ca214f12",
"b532099ff8b67049f292cd62700dca37fc2be623",
"249d2e15cfcd531e3f91d561877d5b23d31ec2e8",
"39fbcdd2253f7749fc5b8a91db2eca71f618887c",
"9771e382794af067f7360f1cac7b6d2a1e6dd1c4",
"9209c11ec4a63c5e6b4c967e49e6fc9ae3e169f2",
"0a84bbe4dd47d99bc77010931b7daffecf8c1a11",
"12da6c20e0743e9434894359c387f6a72e7e91f0",
"11ccb00bd3ff98e3f46a51cca059241c70954d4f",
"5c15b11610d7c3ee8d6d99846c276795c072eec3",
"ebc5a18b1b043144d848e2e2c2563dc71b7bf815",
"19db199fd25aa604618d13e80cf317f0858d5604",
"232bb5913f12cdcf8419a3e44d06a5d6fffe2c9b",
"45267521d36920a49ee5cc64e6f5e50bd5f029e3",
"4342a1109fef5aaaf438de2ffcb82d5a71a8ab95",
"d4312997dd7ade9cf411a0997e36c8c289e6ab68",
"016bb661e767d8fa2491743d289b11cfc41e3efb",
"2833e9958db9721550f2dab609ef7124875dc12a",
"0f2d0df8d3fdc8db93d776dbc565fda4b8a3b7a1",
"07a5809436a9ade7bee9fdc9a970c23263a580d0",
"4954fa180728932959997a4768411ff9136aac81",
"5ff155a684fdae3da603e615095084567dcfc3ea",
"1265c6dad37e184955a97ef5fd018bf45d2aca88",
"16e85d76e57739da3082ca9dd4868b240c0b3c86",
"1e2a5126486820abea0cdaccf996c975b9103443",
"17fac85921a6538161b30665f55991f7c7e0f940",
"4c60ec65bd28c6637f82ee3f6ad28d6eaa9c4824"
],
"paperAbstract": "The large-scale monitoring of computer users' software activities has become commonplace, e.g., for application telemetry, error reporting, or demographic profiling. This paper describes a principled systems architecture---Encode, Shuffle, Analyze (ESA)---for performing such monitoring with high utility while also protecting user privacy. The ESA design, and its Prochlo implementation, are informed by our practical experiences with an existing, large deployment of privacy-preserving software monitoring.\n With ESA, the privacy of monitored users' data is guaranteed by its processing in a three-step pipeline. First, the data is encoded to control scope, granularity, and randomness. Second, the encoded data is collected in batches subject to a randomized threshold, and blindly shuffled, to break linkability and to ensure that individual data items get \"lost in the crowd\" of the batch. Third, the anonymous, shuffled data is analyzed by a specific analysis engine that further prevents statistical inference attacks on analysis results.\n ESA extends existing best-practice methods for sensitive-data analytics, by using cryptography and statistical techniques to make explicit how data is elided and reduced in precision, how only common-enough, anonymous data is analyzed, and how this is done for only specific, permitted purposes. As a result, ESA remains compatible with the established workflows of traditional database analysis.\n Strong privacy guarantees, including differential privacy, can be established at each processing step to defend against malice or compromise at one or more of those steps. Prochlo develops new techniques to harden those steps, including the Stash Shuffle, a novel scalable and efficient oblivious-shuffling algorithm based on Intel's SGX, and new applications of cryptographic secret sharing and blinding. We describe ESA and Prochlo, as well as experiments that validate their ability to balance utility and privacy.",
"pdfUrls": [
"http://arxiv.org/abs/1710.00901",
"http://www.eecg.toronto.edu/~lie/papers/prochlo_sosp2017.pdf",
"https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/46411.pdf",
"https://arxiv.org/pdf/1710.00901v1.pdf",
"http://doi.acm.org/10.1145/3132747.3132769"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/0646a88dfd7e7ce7233041eaad62076ccc55624c",
"sources": [
"DBLP"
],
"title": "Prochlo: Strong Privacy for Analytics in the Crowd",
"venue": "SOSP",
"year": 2017
},
"06479f0b9b71e8c0744ec7291ab0867ab9ec5059": {
"authors": [
{
"ids": [
"2522763"
],
"name": "Jorge Albericio"
},
{
"ids": [
"39885275"
],
"name": "Alberto Delmas"
},
{
"ids": [
"39891957"
],
"name": "Patrick Judd"
},
{
"ids": [
"15384887"
],
"name": "Sayeh Sharify"
},
{
"ids": [
"37606908"
],
"name": "Gerard O'Leary"
},
{
"ids": [
"2655550"
],
"name": "Roman Genov"
},
{
"ids": [
"1782536"
],
"name": "Andreas Moshovos"
}
],
"doi": "10.1145/3123939.3123982",
"doiUrl": "https://doi.org/10.1145/3123939.3123982",
"entities": [
"16-bit",
"8-bit",
"Artificial neural network",
"Bitap algorithm",
"Computation",
"Convolutional neural network",
"Data parallelism",
"Deep learning",
"Degree of parallelism",
"Fixed-point arithmetic",
"Neural Networks",
"Parallel computing"
],
"id": "06479f0b9b71e8c0744ec7291ab0867ab9ec5059",
"inCitations": [
"9a4e0f2ad4c854de475748f519f3c6340f5b9412",
"2512a6ced085503c399ee512ecaeb88606081261",
"381b008b49d04c1bd5ff00649521fa028b9d3ea8",
"8d321487858b3c5c9fe1720629bf3f0f354a0e31",
"8033f293c894eae64c9f379dee2192bfe4f7883a",
"dfbddd14c1b517c5a9478961534e765b0eac513f"
],
"journalName": "",
"journalPages": "382-394",
"journalVolume": "",
"outCitations": [
"37e6d234ed6caf7abcc489a30c9c3c6bf1ad74a1",
"68837728232463651283edbb7ef0c93b2f502b2b",
"dbf33161c1dc9c94dba25b233b2376c8f95c9bd2",
"c3013c2068b41cb1235707e097ec797592510e28",
"2bb28f6105ca30b2bc1ba91578234ecb12e788a6",
"49b4094f2c313a92da4461572c0bef80b0d7d649",
"0a3ad4a0ec19926128e307e7ec178fd7288b5a37",
"5bfecd14937da569eabec0afea710db846d3899b",
"23d14ab0f18fa881a2ac8ae027be6b9f2c91d74d",
"55bc52bbec8972d62874bcbe169dac573b57d1df",
"e277762804aa4615b2258fbd367d91326c00b90e",
"62124e3cb35d9d34159d2d4c673c0f7d04cfa533",
"9f3cc03b1c9fc9c3e080e42a0ddd34cdd24a20fb",
"3d8cbd72a4effa7ee4ad20f9644719819343ab7a",
"02c78232075ac431834e3442dcb2954d4e708def",
"9f1f065bf08cd90431cc051267a708f56436cd82"
],
"paperAbstract": "Deep Neural Networks expose a high degree of parallelism, making them amenable to highly data parallel architectures. However, data-parallel architectures often accept inefficiency in individual computations for the sake of overall efficiency. We show that on average, activation values of convolutional layers during inference in modern Deep Convolutional Neural Networks (CNNs) contain 92% zero bits. Processing these zero bits entails ineffectual computations that could be skipped. We propose Pragmatic (PRA), a massively data-parallel architecture that eliminates most of the ineffectual computations on-the-fly, improving performance and energy efficiency compared to state-of-the-art high-performance accelerators [5]. The idea behind PRA is deceptively simple: use serial-parallel shift-and-add multiplication while skipping the zero bits of the serial input. However, a straightforward implementation based on shift-and-add multiplication yields unacceptable area, power and memory access overheads compared to a conventional bit-parallel design. PRA incorporates a set of design decisions to yield a practical, area and energy efficient design.\n Measurements demonstrate that for convolutional layers, PRA is 4.31X faster than DaDianNao [5] (DaDN) using a 16-bit fixed-point representation. While PRA requires 1.68X more area than DaDN, the performance gains yield a 1.70X increase in energy efficiency in a 65nm technology. With 8-bit quantized activations, PRA is 2.25X faster and 1.31X more energy efficient than an 8-bit version of DaDN.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3123939.3123982",
"https://openreview.net/pdf?id=ryeF7mVFl",
"https://arxiv.org/pdf/1610.06920v1.pdf",
"https://arxiv.org/pdf/1610.06920.pdf",
"http://arxiv.org/abs/1610.06920",
"https://openreview.net/pdf?id=By14kuqxx"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/06479f0b9b71e8c0744ec7291ab0867ab9ec5059",
"sources": [
"DBLP"
],
"title": "Bit-pragmatic deep neural network computing",
"venue": "MICRO",
"year": 2017
},
"0665e1a0ca3fb7dec851eeaf830ed277fab26572": {
"authors": [
{
"ids": [
"1800764"
],
"name": "Yan Zheng"
},
{
"ids": [
"1795436"
],
"name": "Jeff M. Phillips"
}
],
"doi": "10.1145/3097983.3098000",
"doiUrl": "https://doi.org/10.1145/3097983.3098000",
"entities": [
"Best, worst and average case",
"Data compression",
"Data point",
"Kernel (operating system)",
"Smoothing",
"Time complexity",
"Time series"
],
"id": "0665e1a0ca3fb7dec851eeaf830ed277fab26572",
"inCitations": [
"15a122e1f5efc7727a4610c1313b7b1217d4ec93"
],
"journalName": "",
"journalPages": "645-654",
"journalVolume": "",
"outCitations": [
"3c29f6a47c955382ccbc26f258123fcce627a00b",
"663bdbb58506774f70366c03e4e974fc7085548b",
"746941d4bb73b64238c2f16a048220e410017fbd",
"1592fe924114866c1ac559bae33ea789930daa98",
"03ef1b0c3ca5ad5eac8d379b59d150aed59294b6",
"225f78ae8a44723c136646044fd5c5d7f1d3d15a",
"1942364cc6b0399bf099f57bd0d322b2f5c0544b",
"a36b028d024bf358c4af1a5e1dc3ca0aed23b553",
"0fe0aa0a80b8eeb2ea9005e2d96951e3bf4f3f59",
"ba3c88fecf39ff7db405deb2fbd298685e8f9b70",
"044c1f31a27014301b5c879406275b70d62f320a",
"115313a919c93fe8741f4a2431324f3b67036189",
"3ff7d797f59971b1df94d14ac8bc931b136f10f2",
"499ffc99eeee63ceff6fc33f732b590e4d3352b9",
"3818cad77f4fab71163ec5f741d2d142f10926df",
"12bafd25fa3a9d1552480555f7fcdb7e7fd8b7e9",
"1c2dc6f0cb5a808924838e823b1cbca0eca21799",
"e3cb014f1663b7a4236081c0c8d0667f4730b171",
"1cdd3c62172b7598cd090e349d38e9644734edfd",
"7f750853c849dbdf08a17fcd91ab077fb6d8a791"
],
"paperAbstract": "Kernel regression is an essential and ubiquitous tool for non-parametric data analysis, particularly popular among time series and spatial data. However, the central operation which is performed many times, evaluating a kernel on the data set, takes linear time. This is impractical for modern large data sets.\n In this paper we describe coresets for kernel regression: compressed data sets which can be used as proxy for the original data and have provably bounded worst case error. The size of the coresets are independent of the raw number of data points; rather they only depend on the error guarantee, and in some cases the size of domain and amount of smoothing. We evaluate our methods on very large time series and spatial data, and demonstrate that they incur negligible error, can be constructed extremely efficiently, and allow for great computational gains.",
"pdfUrls": [
"https://arxiv.org/pdf/1702.03644v2.pdf",
"http://arxiv.org/abs/1702.03644",
"http://doi.acm.org/10.1145/3097983.3098000",
"https://arxiv.org/pdf/1702.03644v1.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/0665e1a0ca3fb7dec851eeaf830ed277fab26572",
"sources": [
"DBLP"
],
"title": "Coresets for Kernel Regression",
"venue": "KDD",
"year": 2017
},
"066ad1afcb6344a8b65d9249d694f5a2605247b4": {
"authors": [
{
"ids": [
"2056741"
],
"name": "Doowon Lee"
},
{
"ids": [
"1683260"
],
"name": "Valeria Bertacco"
}
],
"doi": "10.1145/3079856.3080235",
"doiUrl": "https://doi.org/10.1145/3079856.3080235",
"entities": [
"Bare machine",
"Baseline (configuration management)",
"Computation",
"Computer architecture simulator",
"Consistency model",
"Execution pattern",
"Memory ordering",
"Model checking",
"Multi-core processor",
"Requirement",
"Simulation",
"Software bug",
"Software verification and validation",
"Sorting",
"System Simulation",
"Thread (computing)",
"Topological sorting",
"Type signature"
],
"id": "066ad1afcb6344a8b65d9249d694f5a2605247b4",
"inCitations": [],
"journalName": "2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA)",
"journalPages": "201-213",
"journalVolume": "",
"outCitations": [
"4bb640b092cbbf55ed4d1de8edb79ba8a79b0ebd",
"12a233efbdd874afdeb8a1e6fe71c4ccff758175",
"4bc8a08d77ca193f4506c617f626d0a07afd2f89",
"30dac5d73a5aebc5dcb4671ee4d915267a6b78ac",
"ad913bd3d95fc9e5f6888974e04726eb441a6fc6",
"370d546ab1ce3988194cbf835ee09e73e3733b41",
"6f5907ec67ed7266a34a8094a22bae322eb2aae4",
"428449baa75b4af7987109b9fcb942c9f0b6295d",
"66c4e96ccc884601b0eb79fb680f83fdfd0c05cf",
"4d5099d75d8aa8f1328bccb1f0b8578f35b42526",
"7f80ae3a81d063083b049b91cd0299f09bbb4696",
"447563c219ca8241334a69d2f2caf5b855277f1a",
"31181e73befea410e25de462eccd0e74ba8fea0b",
"24366914b06dfddff8d343a7f93b89820d525d75",
"837be6dc51f0ccf8135ebaea8a48afc3faf5b14b",
"6308c1a4bc95986c594fbab8abed87a780c59e6a",
"4292384b0b798feea238c7f0437d88476e342771",
"7631275e3266f627df6cc29441f69ab9f5f2b1c6",
"36f5c34fd648301984a68b638dc9cd726a108853",
"5d8223b9caf90736f4ca75750290a1a25f66b7a8",
"5cb1012da36f41f0d56777d4ad0ba4d5f42390c2",
"f0ca54ebf208c7ef592b2ccf4e8961ec5524633c",
"10f1faeec4ee2158b8535b249a20de5419998153",
"aeea9a3480fd211bb44558353c1751dbf1df3f19",
"d4c5e14e27b45266532c74f6aa0d51a1a4280e7c",
"86fb520c6596ae0780ba6c24541a7304c53f3891",
"15bb80d7f7d5a76ba0955e2a1a7b79852ca89509",
"3eae0271717f6b4d65024abf04e5d98aef41d748",
"a28f4c45ad72a50f56f7f9df13762c739230b646",
"3a850f54e6dea4728aaa6a71ba222b7d612cd2b1",
"1811222cd3f4116d586bf752745c7500230983cb",
"15c8550942ee0191bb34d177d7e653b2f3cb6eff",
"62bd72d7a4160bd1a35191c51137d11cfbe30cf7",
"957272cdbd0a44a44dc7d1e91eb2fa5bcf85e6e0",
"1984a63dac62e537ae2bdb7372355e5891e0e05b",
"2beebe471d23ca56cc07a254d74065574ff809e4",
"27b94d947c4b094f482e9689412e1f753b52a62f"
],
"paperAbstract": "This work presents a minimally-intrusive, high-performance, post-silicon validation framework for validating memory consistency in multi-core systems. Our framework generates constrained-random tests that are instrumented with observability-enhancing code for memory consistency verification. For each test, we generate a set of compact signatures reflecting the memory-ordering patterns observed over many executions of the test, with each of the signatures corresponding to a unique memory-ordering pattern. We then leverage an efficient and novel analysis to quickly determine if the observed execution patterns represented by each unique signature abide by the memory consistency model. Our analysis derives its efficiency by exploiting the structural similarities among the patterns observed.\n We evaluated our framework, MTraceCheck, on two platforms: an x86-based desktop and an ARM-based SoC platform, both running multi-threaded test programs in a bare-metal environment. We show that MTraceCheck reduces the perturbation introduced by the memory-ordering monitoring activity by 93% on average, compared to a baseline register flushing approach that saves the register's state after each load operation. We also reduce the computation requirements of our consistency checking analysis by 81% on average, compared to a conventional topological sorting solution. We finally demonstrate the effectiveness of MTraceCheck on buggy designs, by evaluating multiple case studies where it successfully exposes subtle bugs in a full-system simulation environment.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3079856.3080235",
"http://web.eecs.umich.edu/~valeria/research/publications/MTrace-ISCA17.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/066ad1afcb6344a8b65d9249d694f5a2605247b4",
"sources": [
"DBLP"
],
"title": "MTraceCheck: Validating non-deterministic behavior of memory consistency models in post-silicon validation",
"venue": "2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA)",
"year": 2017
},
"066e1cd75a4f37a3c58089e24ccf43eb5adf1f19": {
"authors": [
{
"ids": [
"39433682"
],
"name": "Hung T. Nguyen"
},
{
"ids": [
"9398355"
],
"name": "Tri P. Nguyen"
},
{
"ids": [
"17903381"
],
"name": "Tam N. Vu"
},
{
"ids": [
"1745290"
],
"name": "Thang N. Dinh"
}
],
"doi": "10.1145/3084457",
"doiUrl": "https://doi.org/10.1145/3084457",
"entities": [
"Biological network",
"Estimation theory",
"Experiment",
"Ground truth",
"Influence line",
"Information",
"Sampling (signal processing)",
"Shoe size"
],
"id": "066e1cd75a4f37a3c58089e24ccf43eb5adf1f19",
"inCitations": [
"5b7452ed5791f3b4497a5cb0fd95699dcaa14119",
"e2b7b9bd2c9fb7baae1f7e5de4b994229d53031a",
"25113be728f6126f31683bd02460c8a72bd3e270"
],
"journalName": "",
"journalPages": "63",
"journalVolume": "",
"outCitations": [
"b790f9ae49cdee5354eacfc7897ab9752acd5e2a",
"23d85a0008429845870780c6db3640c05165acaf",
"6a5ae0e083ab69153ce395874c8dddcd830dfcfd",
"8c1fa3949409eb65017a4625a7351039f72ebf04",
"4bb0f607c1f6be38ca720ad6913577a778cc2f15"
],
"paperAbstract": "Estimating cascade size and nodes' influence is a fundamental task in social, technological, and biological networks. Yet this task is extremely challenging due to the sheer size and the structural heterogeneity of networks. We investigate a new influence measure, termed outward influence (OI), defined as the (expected) number of nodes that a subset of nodes S will activate, excluding the nodes in S. Thus, OI equals, the de facto standard measure, influence spread of S minus |S|. OI is not only more informative for nodes with small influence, but also, critical in designing new effective sampling and statistical estimation methods.\n Based on OI, we propose SIEA/SOIEA, novel methods to estimate influence spread/outward influence at scale and with rigorous theoretical guarantees. The proposed methods are built on two novel components 1) IICP an important sampling method for outward influence; and 2) RSA, a robust mean estimation method that minimize the number of samples through analyzing variance and range of random variables. Compared to the state-of-the art for influence estimation, SIEA is Ω(log4 n) times faster in theory and up to several orders of magnitude faster in practice. For the first time, influence of nodes in the networks of billions of edges can be estimated with high accuracy within a few minutes. Our comprehensive experiments on real-world networks also give evidence against the popular practice of using a fixed number, e.g. 10K or 20K, of samples to compute the \"ground truth\" for influence spread.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3084457",
"https://arxiv.org/pdf/1704.04794v1.pdf",
"http://arxiv.org/abs/1704.04794",
"http://doi.acm.org/10.1145/3078505.3078526"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/066e1cd75a4f37a3c58089e24ccf43eb5adf1f19",
"sources": [
"DBLP"
],
"title": "Outward Influence and Cascade Size Estimation in Billion-scale Networks",
"venue": "SIGMETRICS",
"year": 2017
},
"0670ef42e5c9f28d547ba0dfb816fdb99ca2992f": {
"authors": [
{
"ids": [
"2172728"
],
"name": "Luke Valenta"
},
{
"ids": [
"2406885"
],
"name": "David Adrian"
},
{
"ids": [
"34880513"
],
"name": "Antonio Sanso"
},
{
"ids": [
"39974279"
],
"name": "Shaanan Cohney"
},
{
"ids": [
"2188415"
],
"name": "Joshua Fried"
},
{
"ids": [
"36420322"
],
"name": "Marcella Hastings"
},
{
"ids": [
"2349976"
],
"name": "J. Alex Halderman"
},
{
"ids": [
"2842650"
],
"name": "Nadia Heninger"
}
],
"doi": "",
"doiUrl": "",
"entities": [
"Cryptography",
"Diffie\u2013Hellman key exchange",
"Directory System Agent",
"HTTPS",
"Internet Key Exchange",
"Key escrow",
"Key exchange",
"Library",
"Load balancing (computing)",
"Open-source software",
"OpenSSL",
"Opportunistic TLS",
"Server (computing)"
],
"id": "0670ef42e5c9f28d547ba0dfb816fdb99ca2992f",
"inCitations": [
"00e363001d11bc47b6e347d7dd2db6addfdf7858",
"12a969cd25b06ba88eb2ce92903b1d7c8f959f1b",
"12de15f0e283f748af4f1820c9a3d4361c026561",
"baa58c6a4976094a0186b2c58411a4fa3537f777"
],
"journalName": "IACR Cryptology ePrint Archive",
"journalPages": "995",
"journalVolume": "2016",
"outCitations": [
"b2a7da3aafc4787d3e1370fa9609e381ea296722",
"fb46335b5a7b4cad0fd1935b97f90ebc443ad8e4",
"201b0a185dda51629d7b6fdef3b380a0beaba455",
"2b6ce083906634e3c3b084e4c9139fb58f082df6",
"48fc8f1aa0b6d1e4266b8017820ff8770fb67b6f",
"082d2b922818331e2994aeebaaccb776cfa09145",
"5635e383c4a9edb01c35e07e83196ab0ba85f129",
"a56bb06de510bd9f947372dea98b3dede408ceb2",
"4c165fb087b4861141577a07571c46fbd2324a69",
"19e5adf691d70deff696dfd27a521009cb1cf437",
"d21f261bf5a9d7333337031a3fa206eaf0c6082c",
"2dbcc7077a01981679007eceac6c6659a1c18200",
"6074680689aa03260d46a27ee969a2ce95680b30",
"372e528fb9de9f062496af4530ea3e2ec5df02a1",
"0f17ca31699de87aaa09dd31205b146bc472c861",
"8169647e744faf5f08de3d5af69a22acf9532563",
"271be477fda5bb096706bbb2615240dd3282f6db",
"14aec370592b692a7341a77ed18471fd39db8a4a",
"72ef5bb2f8459b397942ab66e196d32db4fdb80a",
"8353b7ce17536d7c4c4d11e379781fff4f4c45a6",
"fd1d864a95d7231eaf133b00a1757ee5d0bf0e07",
"cf5dfdbb0b8d1c673726178f37f499b77fcc7f03",
"d6d0f49fe811a32341a055eb914c528879398904",
"06e8ec86953a2cce5b604bf03ef6d677a3d85f8a",
"444a738feecb3f7b911886e7b5ec0d75afd12b6b",
"4e33e9d1aa91aa78819ec9700d1024e0f0cdef6c",
"455e4078715f19a2a97e61b4acc6670bc73a3e8c",
"179962ca03a85002b7bd45d9f2cae9fd32b5bfca",
"32e6b1eeebaec6dbc380a284dca837d20ef281a5",
"834e9ad34048740f59826d3be75d5635fc7eb252",
"1020f10f733cba8562db77fcceef47145118b8bc",
"3b03935dfc89c0cad63e05976c21fef6c9fb4190",
"418cffbc1313eab9a4650b00161bb4b8897a2569"
],
"paperAbstract": "Several recent standards, including NIST SP 80056A and RFC 5114, advocate the use of \u201cDSA\u201d parameters for Diffie-Hellman key exchange. While it is possible to use such parameters securely, additional validation checks are necessary to prevent well-known and potentially devastating attacks. In this paper, we observe that many Diffie-Hellman implementations do not properly validate key exchange inputs. Combined with other protocol properties and implementation choices, this can radically decrease security. We measure the prevalence of these parameter choices in the wild for HTTPS, POP3S, SMTP with STARTTLS, SSH, IKEv1, and IKEv2, finding millions of hosts using DSA and other non-\u201csafe\u201d primes for Diffie-Hellman key exchange, many of them in combination with potentially vulnerable behaviors. We examine over 20 open-source cryptographic libraries and applications and observe that until January 2016, not a single one validated subgroup orders by default. We found feasible full or partial key recovery vulnerabilities in OpenSSL, the Exim mail server, the Unbound DNS client, and Amazon\u2019s load balancer, as well as susceptibility to weaker attacks in many other applications.",
"pdfUrls": [
"https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/measuring-small-subgroup-attacks-against-diffie-hellman/",
"https://jhalderm.com/pub/papers/subgroup-ndss16.pdf",
"http://www.cis.upenn.edu/~lukev/files/subgroup-slides.pdf",
"https://eprint.iacr.org/2016/995.pdf",
"http://eprint.iacr.org/2016/995.pdf",
"http://eprint.iacr.org/2016/995"
],
"pmid": "",
"s2PdfUrl": "http://pdfs.semanticscholar.org/0896/cf42b12df1917e67dbc82060752e91462c1c.pdf",
"s2Url": "https://semanticscholar.org/paper/0670ef42e5c9f28d547ba0dfb816fdb99ca2992f",
"sources": [
"DBLP"
],
"title": "Measuring small subgroup attacks against Diffie-Hellman",
"venue": "NDSS",
"year": 2016
},
"067b78da4dc2309510d4a74d4606cc1a46426581": {
"authors": [
{
"ids": [
"1722767"
],
"name": "Peng Wang"
},
{
"ids": [
"1726699"
],
"name": "Di Wang"
},
{
"ids": [
"1762600"
],
"name": "Adam Chlipala"
}
],
"doi": "10.1145/3133903",
"doiUrl": "https://doi.org/10.1145/3133903",
"entities": [
"Algorithm",
"Amortized analysis",
"Analysis of algorithms",
"Best, worst and average case",
"Broadcast automation",
"Coq (software)",
"Data structure",
"Functional programming",
"Heuristic",
"Invariant (computer science)",
"Master theorem",
"Merge sort",
"Pattern matching",
"Programmer",
"Recurrence plot",
"Red\u2013black tree",
"Shortest path problem",
"Time complexity",
"Type safety",
"Type system",
"Usability"
],
"id": "067b78da4dc2309510d4a74d4606cc1a46426581",
"inCitations": [
"2d92f591b555e101ce083a73a6cbbfe68e3016d7",
"785b84dd4f9506dc4fe76f47d75e76bec9b8f4f7",
"0379110eef88d0721e6a66f8211474fb4906e16b"
],
"journalName": "PACMPL",
"journalPages": "79:1-79:26",
"journalVolume": "1",
"outCitations": [
"13ded9c00933c12d4f81c4a754b8b44d19940956",
"a7f3a72a82a4f7864e1a8e6c1b0183d3b3249f20",
"330047eafc086b07eb1cb69030e59288f824748d",
"16c8ad89060897e39803a175470d7990bd40cd2b",
"31181e73befea410e25de462eccd0e74ba8fea0b",
"c8f6a8f081f49325eb97600eca05620887092d2c",
"231e6a4fd7922c6adaaa48b2d02f7878e88c4048",
"a3be177176ffdc02dbb0317ecef4ce41f8840bb7",
"2e5122e23ee5f354cea7189fd2900c1aaf290fbb",
"15aee0a8260bcf2cfc9334409bf6c1c450851ff6",
"3782f4660041d22d3d3b737384d0144771f4ef3b",
"0a638d50ab62a14e0ddeb0afe97333e6156670c3",
"1663f8a95a41a66502a2c902c7bc3520e3287bbf",
"5b98bbbb92b7bf6f6d5945defead158c045bf252",
"6c725d2a7e88515c5f7c877936f90b0184c4fe8f",
"5ebd59de39d5e79328d84903f47be4c2f5efccb9",
"736768fe05e6d114f9d0d2b10ba4a04db6c5ba75",
"f78cde3866f6cdcb1a88a8598ae3c4ce48bda0bc",
"1b31c65d8b5023dabcdd18fd57241488834c7206",
"646c91f328a129fe7f4c1b182b05dd501a271a06",
"129b6328e2d2d951d6ea49bafd0fd77b312df60c",
"a638ddb00cdb5d2fcc9616c7e254eaaa790d48ef",
"43de5136309e262007d3f14893959af69749caf8",
"0e639ae7d0caae09489f7fbfb6f4739d96f626e8",
"990893b26bf52167b806c23dd18f8d2632e0fa01",
"7154a072fe7b7bb416d9492f95101f691e4d6d6c",
"327c5c7540a17718e77bc7bd8be3db12f684f7f2",
"67105715d44cfc13db798804d08f8dac7f079090",
"a4d1265e3b7473e73ab168b8fa06d185733f853c",
"3ccced52d24cad8b3d9b4f69cd2e3d4872e447d9",
"36eac00175dcea2b33cf998e8a2b5bca2b567ba0",
"0d4d6e9ea9aa77e9c9e822b1c85a4d497021e3fb",
"12cb1b261106fe238505c0772e8826a294fa3546",
"75068766c0a09523504d14be8aac8a029ad097ef",
"4cd8465d8f323daa7ead10c8d19801a2d234c0da",
"ac881b07060bc0563721b80c5bc220168f1ddba3",
"0f5bd2edf5b1ce8815e34f6090d726c35d9331d5",
"dcca6b40661c280294b526756b9aa67857c1eee2",
"0a39f18c6ce7b5a63b20a122c24ddcf2ae8a3ce4",
"5a6682af0ad2eb0e08e6f52c0101119c603b663c",
"56595635124dd4170fcb9ca606d3881876eab30f",
"48a0fb31fbc7440bd0d92d4f9a5378e09018e20f",
"25e7e119e82a332c1787f3a9e9b91a560f74b163",
"3960dda299e0f8615a7db675b8e6905b375ecf8a",
"20f3fcd714230fbcb88661ba0f623d9e6217a717",
"39d85ddbf6c9aad76689fd02306dcc7583f5b094",
"a5ade56a2f37f3f5f5b956b0c5546de9a3428537",
"164b11b1f9f8432db88424b1e4f9ba6e09e5c894",
"9cb5955e01d7bfdf6595e7414c80f53ac452cd2c"
],
"paperAbstract": "We present TiML (Timed ML), an ML-like functional language with time-complexity annotations in types. It uses indexed types to express sizes of data structures and upper bounds on running time of functions; and refinement kinds to constrain these indices, expressing data-structure invariants and pre/post-conditions. Indexed types are flexible enough that TiML avoids a built-in notion of â\u0080\u009csize,â\u0080\u009d and the programmer can choose to index user-defined datatypes in any way that helps her analysis. TiMLâ\u0080\u0099s distinguishing characteristic is supporting highly automated time-bound verification applicable to data structures with nontrivial invariants. The programmer provides type annotations, and the typechecker generates verification conditions that are discharged by an SMT solver. Type and index inference are supported to lower annotation burden, and, furthermore, big-O complexity can be inferred from recurrences generated during typechecking by a recurrence solver based on heuristic pattern matching (e.g. using the Master Theorem to handle divide-and-conquer-like recurrences). We have evaluated TiMLâ\u0080\u0099s usability by implementing a broad suite of case-study modules, demonstrating that TiML, though lacking full automation and theoretical completeness, is versatile enough to verify worst-case and/or amortized complexities for algorithms and data structures like classic list operations, merge sort, Dijkstraâ\u0080\u0099s shortest-path algorithm, red-black trees, Braun trees, functional queues, and dynamic tables with bounds like m n logn. The learning curve and annotation burden are reasonable, as we argue with empirical results on our case studies. We formalized TiMLâ\u0080\u0099s type-soundness proof in Coq.",
"pdfUrls": [
"http://people.csail.mit.edu/wangpeng/timl.pdf",
"http://doi.acm.org/10.1145/3133903",
"http://adam.chlipala.net/papers/TimlOOPSLA17/TimlOOPSLA17.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/067b78da4dc2309510d4a74d4606cc1a46426581",
"sources": [
"DBLP"
],
"title": "TiML: a functional language for practical complexity analysis with invariants",
"venue": "PACMPL",
"year": 2017
},
"06885ce9502460e231c240bae121554cfd5209ee": {
"authors": [
{
"ids": [
"2218875"
],
"name": "Jian Guo"
},
{
"ids": [
"1812563"
],
"name": "Fangming Liu"
},
{
"ids": [
"1685072"
],
"name": "Tao Wang"
},
{
"ids": [
"1723366"
],
"name": "John C. S. Lui"
}
],
"doi": "",
"doiUrl": "",
"entities": [
"Central processing unit",
"Cloud computing",
"Data center",
"Experiment",
"Fairness measure",
"Network performance",
"OpenVMS",
"Scheduling (computing)",
"Simulation",
"Software bug",
"Testbed"
],
"id": "06885ce9502460e231c240bae121554cfd5209ee",
"inCitations": [
"9cf2db35591b832d78d112ad6e1746c635d1a6ea",
"0c3913eb8a3628cc8c9100468da6a4242c345d7d"
],
"journalName": "",
"journalPages": "69-81",
"journalVolume": "",
"outCitations": [
"3b988049dd8f62f772281e90196bbd793700c86b",
"1d2bdecbc025f3c28118e5b06aac890603c73526",
"33de35074ba1e72e57f2fe5e347899652d6295c2",
"138856ad6b8b4cca92965aacb20961aaa4e34a92",
"1eddf92320697dbaae59cb84fafd5af73e0fc865",
"0e25351745b6b5cb364fbdf73d327f3c71474d66",
"438110dc02f39f221896847a4d0e24f88e130598",
"057d04a074eaa7162594800abdd80320ea172874",
"47d5357957cabb610131db1b228e58b70860ee8d",
"544b0ba4ae011fe26c3f207a7c6f9d6de04468ae",
"27c04dce51362fcc7531acbe74823a7f0a4e48bf",
"132f00de21cee656d00ad6779f1926070ad59544",
"18cdc2ce6d040228cf1c385dfb9b8373fca64298",
"22630a79f1c50603c1356f6ac9dc8524a18d4061",
"058f6752d85a517aae298586fdf117acdd7560ea",
"235da9c0f828b60300f7e5cfa2ca6aaa116dd14c",
"52ece1e929758e9d282e818e8e9985f88570f2dd",
"19ff9dac013d1ebca1ea1c9845325c9ddafdf93a",
"4f86fa28602d9503a8575c5b31082284abc8415c",
"1862c29bc091a17e43952046811b5d129dda87c7",
"0b7301fe4766447af960f9a2c06ccde042538e9c",
"282c6a3b573051e3e799d73cfc623ccbd68bcd6a",
"41fca6c199464c983cb6384ae65c83eb7522fb46",
"056f1d66700d33f5e95de5cb571deb28a1706aef",
"0a856697f40bac32d4243320d95c8e614e82c7d1",
"0aa4cacf6a60125961f1dac4afca63a8dcf706f9",
"663e064469ad91e6bda345d216504b4c868f537b",
"1927de3ddaddbc3bf53257cc5ee6e8ba127819a0",
"238dd4c308c1ee6ef3809fdf15fdc87be74bdbc8",
"231ba17921ebd80e95771e28dfb5082e169d5a53",
"0be133617dfb5fe8fe35cf7cdfb7c2f0c3e672cd",
"9b3cd6d6ae6b071e69d4e2510d73384258811ef6",
"908f7931de8768786d9ef7d64f5a8156860709dd",
"8c9a91b774fcc126db7ce7c67bd97d1d16143932"
],
"paperAbstract": "Current IaaS clouds provide performance guarantee on CPU and memory but no quantitative network performance for VM instances. Our measurements from three production IaaS clouds show that for the VMs with same CPU and memory, or similar pricing, the difference in bandwidth performance can be as much as 16\u00d7, which reveals a severe price-performance anomaly due to a lack of pricing for bandwidth guarantee. Considering the low network utilization in cloud-scale datacenters, we address this by presenting SoftBW, a system that enables pricing bandwidth with over commitment on bandwidth guarantee. SoftBW leverages usage-based charging to guarantee price-performance consistency among tenants, and implements a fulfillment based scheduling to provide bandwidth/fairness guarantee under bandwidth over commitment. Both testbed experiments and large-scale simulation results validate SoftBW\u2019s ability of providing efficient bandwidth guarantee, and show that by using bandwidth over commitment, SoftBW increases 3.9\u00d7 network utilization while incurring less than 5% guarantee failure.",
"pdfUrls": [
"https://www.usenix.org/conference/atc17/technical-sessions/presentation/guo-jian",
"http://www.cs.cuhk.hk/~cslui/PUBLICATION/ATC-17-a.pdf",
"https://www.usenix.org/system/files/conference/atc17/atc17-guo.pdf",
"https://www.usenix.org/sites/default/files/conference/protected-files/atc17_slides_guo.pdf"
],
"pmid": "",
"s2PdfUrl": "http://pdfs.semanticscholar.org/9466/35010bb9a0a2ff2792d535343694901b1c29.pdf",
"s2Url": "https://semanticscholar.org/paper/06885ce9502460e231c240bae121554cfd5209ee",
"sources": [
"DBLP"
],
"title": "Pricing Intra-Datacenter Networks with Over-Committed Bandwidth Guarantee",
"venue": "USENIX Annual Technical Conference",
"year": 2017
},
"069794b44b81c8b0651c8ea39594a91cd6081142": {
"authors": [
{
"ids": [
"3409732"
],
"name": "Ariel Eizenberg"
},
{
"ids": [
"3199368"
],
"name": "Yuanfeng Peng"
},
{
"ids": [
"17785358"
],
"name": "Toma Pigli"
},
{
"ids": [
"2686490"
],
"name": "William Mansky"
},
{
"ids": [
"1739688"
],
"name": "Joseph Devietti"
}
],
"doi": "10.1145/3062341.3062342",
"doiUrl": "https://doi.org/10.1145/3062341.3062342",
"entities": [
"CUDA",
"Concurrency (computer science)",
"Correctness (computer science)",
"Graphics processing unit",
"High- and low-level",
"Parallel computing",
"Software bug"
],
"id": "069794b44b81c8b0651c8ea39594a91cd6081142",
"inCitations": [
"3c874433b330676b693ffe45fedd9d2d10b0b767"
],
"journalName": "",
"journalPages": "126-140",
"journalVolume": "",
"outCitations": [
"d9fe45f6ee750d8aad7e79302554497bebe8a92d",
"109c4450b7fdbf5c760bc8ee5c28bec3d1186c0e",
"59857e2857df6d69a12e3cbaa720648b5c299159",
"00c3b08c4e1dbfa080b6d3c422fa0da0131a743c",
"d2949f47e0b007d632aae21407edf5e5760413fb",
"01d271d173eaa7b20d187b0938e70ab58493ff6a",
"2927360763d20dbd3678b83d4df22891d86b2aeb",
"1799668a2d5a08f48c1e768c4cde957d93c7bfc1",
"182c0524aa353b6f4f4cb75a88ff3f5fc3bd86e0",
"62bd72d7a4160bd1a35191c51137d11cfbe30cf7",
"019bdc1544839acf14f49971f6b3661dd6b497c7",
"4308295a2eaef30be423520918ad224dc2f3ffe2",
"289c67f9976d72b6d9aeb64a4e9743538bf9b4be",
"8747dabeaeda342fbac4ebff628c574be4c53826",
"01293cc2b2bda3c38c7095d2ea1813fcb0611a3e",
"47cdefebd5534d1d8c5d0f8061b482dbcd656e63",
"0958a63d9c6238b38377f076b487c413bc8642c1",
"0a11aaef4a109166db76ad2cbfaa78b240548354",
"c2c42d4d5c8a02b6d39ffea8cdba44a0453dd12f",
"00156e79606084497789662dfaf59c3b54a10722",
"86ed165adcfd254b511ff1bbb912cad65d45f0d6",
"015f9639075216603db029d2273d17f429916a2e",
"5009b9a830ce61ba97305f04c87ae35deac66b67",
"2f2daefa4a6d1c722dcaf7110f8c29f779435d99",
"8eef8d67441a0a6d83c98d8b4ff3250a4f59e0e1",
"7b93d3e42a7498e4de67a76b8f6861875fa74d79",
"2346439ece014d5e3ce1564adc2a7ca098a37c8e",
"430f66819f758f6a84aaac4b5f516f9ee4861482",
"1769e6ed89d2314bb25e681f1e006b3585cb4754",
"25010bbdf127101e1fd5adea5e15f45765b87b0f",
"66bf50846bf7713306ed8274fd9702fab4616dbb",
"101bcfb23ad622fa5fed78ca627f0ef3fc8e5624",
"0a44e8cd34a110ec4ed7221b0431694172eadda8",
"f4721973c7b55d091c86e1f13b44726987f8732a",
"5b9f54be658fe5e42448bbcf3a33fff9532cc0b1",
"8143a43afeb2d50ba46ee98a41db8f4430c1f5c8",
"14505c2bdd3822d7a62385121d28ba3eb36fea1d",
"10ba04904f12e44cd0569cb86aa6e97e47939e23",
"a23ee6da0dc85cee92f03de621096bb79b692d35",
"4aa993db77b888a02084a542a929b1a81a8d03f6"
],
"paperAbstract": "GPU programming models enable and encourage massively parallel programming with over a million threads, requiring extreme parallelism to achieve good performance. Massive parallelism brings significant correctness challenges by increasing the possibility for bugs as the number of thread interleavings balloons. Conventional dynamic safety analyses struggle to run at this scale. \n We present BARRACUDA, a concurrency bug detector for GPU programs written in Nvidia’s CUDA language. BARRACUDA handles a wider range of parallelism constructs than previous work, including branch operations, low-level atomics and memory fences, which allows BARRACUDA to detect new classes of concurrency bugs. BARRACUDA operates at the binary level for increased compatibility with existing code, leveraging a new binary instrumentation framework that is extensible to other dynamic analyses. BARRACUDA incorporates a number of novel optimizations that are crucial for scaling concurrency bug detection to over a million threads.",
"pdfUrls": [
"http://www.cs.princeton.edu/~wmansky/barracuda.pdf",
"http://doi.acm.org/10.1145/3062341.3062342"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/069794b44b81c8b0651c8ea39594a91cd6081142",
"sources": [
"DBLP"
],
"title": "BARRACUDA: binary-level analysis of runtime RAces in CUDA programs",
"venue": "PLDI",
"year": 2017
},
"06b5973d2fde715a6c5970ebac373a4009dd4963": {
"authors": [
{
"ids": [
"2615278"
],
"name": "Pavlos Katsogridakis"
},
{
"ids": [
"2740159"
],
"name": "Sofia Papagiannaki"
},
{
"ids": [
"2385564"
],
"name": "Polyvios Pratikakis"
}
],
"doi": "10.1007/978-3-319-64203-1_21",
"doiUrl": "https://doi.org/10.1007/978-3-319-64203-1_21",
"entities": [
"Algorithm",
"Apache Spark",
"Computation",
"Distributed Interactive Simulation",
"Fault tolerance",
"Hierarchical and recursive queries in SQL",
"MapReduce",
"Programmer",
"Programming model",
"Recursion",
"Scalability",
"Scheduling (computing)",
"Synchronization (computer science)"
],
"id": "06b5973d2fde715a6c5970ebac373a4009dd4963",
"inCitations": [],
"journalName": "",
"journalPages": "289-302",
"journalVolume": "",
"outCitations": [
"756d1f8f07a83f3cfc0edaa81493a9f109628e1b",
"24281c886cd9339fe2fc5881faf5ed72b731a03e",
"fce7fd98928ab9bf3e4e919e108c48fc1040f569",
"0608d9937c074520cdc93cc444cc1c77039c5332",
"2f88dcf1e9abaa0b0f8c63820548c98b2da61220",
"243230d5b623f79c22750b42447e902ab07a2db9",
"31b27a3b4ff89993eb92e8b1353edead8d5f2520",
"0a12a179bebdf4bb69d692a1127795b3f536270b",
"89aed5a5da5c7e34f8ff0bc11d5704ec49f266d9",
"0f1042350e2c97117620d9f5182f94262f1f5ac0",
"0e23117148029fbef47d1eed869c7952546e53aa",
"661b19ff987b9ed9d9252324d4a72ab1fbd588ae"
],
"paperAbstract": "MapReduce environments offer great scalability by restricting the programming model to only map and reduce operators. This abstraction simplifies many difficult problems occuring in generic dis-ion simplifies many difficult problems occuring in generic distributed computations like fault tolerance and synchronization, hiding them from the programmer. There are, however, algorithms that cannot be easily or efficiently expressed in MapReduce, such as recursive functions. In this paper we extend the Apache Spark runtime so that it can support recursive queries. We also introduce a new parallel and more lightweight scheduling mechanism, ideal for scheduling a very large set of tiny tasks. We implemented the aformentioned scheduler and found that it simplifies the code for recursive computation and can perform up to 2.1\u00d7 faster than the default Spark scheduler.",
"pdfUrls": [
"https://doi.org/10.1007/978-3-319-64203-1_21"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/06b5973d2fde715a6c5970ebac373a4009dd4963",
"sources": [
"DBLP"
],
"title": "Execution of Recursive Queries in Apache Spark",
"venue": "Euro-Par",
"year": 2017
},
"06c4652c6333baca654be06c26da9f940ed5b53b": {
"authors": [
{
"ids": [
"1723309"
],
"name": "Yue Wang"
},
{
"ids": [
"2687810"
],
"name": "Yeye He"
}
],
"doi": "10.1145/3035918.3064010",
"doiUrl": "https://doi.org/10.1145/3035918.3064010",
"entities": [
"Column (database)",
"Display resolution",
"Functional dependency",
"Software repository",
"Spreadsheet",
"Text corpus"
],
"id": "06c4652c6333baca654be06c26da9f940ed5b53b",
"inCitations": [
"1a691ae847155cfb1908711664dd14f7f3c1f84c",
"0da82e643ffb634681154e73b5087adb655bad8c"
],
"journalName": "",
"journalPages": "1117-1132",
"journalVolume": "",
"outCitations": [
"1b189d721adbf1d2bab93b7ed6ce826e188b0b99",
"06f31a1a8be734c6dadc4b6b7074c51ffd1f1109",
"7de3221dafddc78a38cafe8d50d0929fe6994b03",
"3965680854b5d503c1b4ba079ec010c5d3ebe1ef",
"45595d87dbe94105595de857bced011a20137999",
"8b052b4278020fb96354c6977988953e09eff05a",
"283bd5f985d27a2790b79479f2907f0065c4eb47",
"ab50b1801ec9585642f320e12b1488599bff030e",
"2a01665351592b6c113510c6015b9d365475bbb4",
"5a3c095e943c4444ad70a5ceb20cefa3f1ab9d54",
"952dd3540e2d1ccee59bc0971c897166acb5048e",
"0df69e1454c0c3a4c90de32bccc3771acb5fbc67",
"022e367b68958d6818e6f6b688970caec7155ea6",
"3b76b68c44e4d9f875e2aaa95eae689bbc67396c",
"33eec6aac58cfa7743c2ad2a7996a5a345cf2610",
"b2ec74c72d99b755325dc470dec2949d69cd4d57",
"2454c84c71d282b95bc99d05adda914361905ffe",
"530f4487992599b3598bd4bb45d74de8436fc3fc",
"46e286af9798472955ec2258e464dc7e3ff97936",
"5afa5c75d5b11ddecaee5594e502ae2c04ee4f2b",
"bbcf76a84ee10348442ccb50ccdbfb288ede5cbb",
"6e0b2b32aa3eed696aa868386d485321a63ccebb",
"67c42a30220edacf848e58c29a624234a0c37a6e",
"55d176b92d5740d039e1c8ebbad025d460de9ae0",
"e4350656463922d21177251458d25cef68a6763d",
"17ffd84480267785c6a9987211a8a86a58cea1a9",
"1f990d98dcc3941f01bd6bb5405fbda37e00dd6a",
"372942ff6ede5a66b0600a852c9902fb8cdd5fa1",
"6350f382e814d4b2f888f5a2a8bd6dd0e9362d81",
"ce18a622d6cfc38ff739f850f01a750d33587fd4",
"1b4474be934290872e9c03fc084d940e9a51a360",
"00a3f6924f90fcd77e6e7e6534b957a75d0ced07",
"5eafdf2477441c1da7cee5f2a6982b1af9abc6f5",
"1976c9eeccc7115d18a04f1e7fb5145db6b96002"
],
"paperAbstract": "Mapping relationships, such as (country, country-code) or (company, stock-ticker), are versatile data assets for an array of applications in data cleaning and data integration like auto-correction and auto-join. However, today there are no good repositories of mapping tables that can enable these intelligent applications.\n Given a corpus of tables such as web tables or spreadsheet tables, we observe that values of these mappings often exist in pairs of columns in same tables. Motivated by their broad applicability, we study the problem of synthesizing mapping relationships using a large table corpus. Our synthesis process leverages compatibility of tables based on co-occurrence statistics, as well as constraints such as functional dependency. Experiment results using web tables and enterprise spreadsheets suggest that the proposed approach can produce high quality mappings.",
"pdfUrls": [
"https://arxiv.org/pdf/1705.09276v2.pdf",
"https://www.microsoft.com/en-us/research/wp-content/uploads/2017/03/mapping-synthesis.pdf",
"https://arxiv.org/pdf/1705.09276v1.pdf",
"http://doi.acm.org/10.1145/3035918.3064010",
"http://arxiv.org/abs/1705.09276"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/06c4652c6333baca654be06c26da9f940ed5b53b",
"sources": [
"DBLP"
],
"title": "Synthesizing Mapping Relationships Using Table Corpus",
"venue": "SIGMOD Conference",
"year": 2017
},
"06e97b3ea02af7274d659a420f94bc5da5e6d541": {
"authors": [
{
"ids": [
"38568238"
],
"name": "Jayesh Gaur"
},
{
"ids": [
"6226754"
],
"name": "Mainak Chaudhuri"
},
{
"ids": [
"2256065"
],
"name": "Pradeep Ramachandran"
},
{
"ids": [
"1706165"
],
"name": "Sreenivas Subramoney"
}
],
"doi": "10.1109/HPCA.2017.46",
"doiUrl": "https://doi.org/10.1109/HPCA.2017.46",
"entities": [
"Algorithm",
"Best, worst and average case",
"Byte",
"Cache (computing)",
"Central processing unit",
"Computer data storage",
"Die (integrated circuit)",
"Double data rate",
"Dynamic random-access memory",
"EDRAM",
"High Bandwidth Memory",
"ICL Distributed Array Processor",
"Memory hierarchy",
"Random-access memory",
"Simulation",
"Static random-access memory"
],
"id": "06e97b3ea02af7274d659a420f94bc5da5e6d541",
"inCitations": [
"88824f4400bf03caed2f99879e68f3543b214c92",
"bac4a0e99c98fac6fa231e9ed21e8f643674200a"
],
"journalName": "2017 IEEE International Symposium on High Performance Computer Architecture (HPCA)",
"journalPages": "13-24",
"journalVolume": "",
"outCitations": [
"0cbc3b849eb23d23654c882c70cb65b19f99c011",
"ffae769267e77e8b025c13e7a9b4f2c559e7593e",
"02ffe89d82a5b727f8c8d259474dd972230b0f98",
"43260df86b2aaa20824d73eff48e0b49162689cb",
"786e1b83380c8953dc65de35d2df9bf495755d08",
"417ab9b8b003982222017ef585e19680366609f3",
"39e83bc7d1dd445a879c4ed7a50cb787103d1c4f",
"2046f7c54470e7617269cc954aab877a4691c241",
"1495c420afc2e26b649e3254840e111dfc928b0d",
"18633256bb17ba0744518479c0752ca87f0d03c6",
"36de396ee9d1c9991e44c01be35e5206d79c3328",
"5bf1fdb6dc950537962eafe888259272eed67737",
"22f00894ce6f678a9a701ab0b010d05a2d38e4bf",
"95390b3c703ae99dfe98758f5f008a2a90bb0bb5",
"0891f725910e268c00ea0ba84f08c268db91fe4f",
"70d44cb49dc7aa31d90e2c9c6100b1a249e42136",
"3216ab441ef92aedededd7c72dcacc866423ce69",
"22b4811bb8265e84d53c62a842cac10dda15f6af",
"0dc38d3afb68f617e23eced7ce2994a0a82feb11",
"c7341dcd5e6c71b149edf808331ab1e8b37cd03b",
"cb111d5c350431b53a9a217cefb5d1701ef46e46",
"8009b1c8cc4af8d3d4b792ac32926487a428172e",
"094b881edab3f5833c4ff2f38d4ed207af141bcd",
"98ab001452b8392bb0d0b2677cfb91281bad7708",
"234049a484dee54d3f9555fe7f50805e783ec432",
"f01a27fe52fd71e853ad823e38835bbf8e7269e7",
"48fc9415566ca5bc80e6519d50f4d78fe43a383b",
"3000b16ee204ffed4c602ed6f93fc7a692850b6e",
"1a5ce35fc5ad575c2c9e5f692bf263082d656f80",
"745d50eb6b74b191191ce93c6ef1ec9760ce0cb0",
"5f3cce1bc739ebfc03e003010d3438bb318efc14",
"90851f7e712bc8a2a201c0609fdf53520779d1f8",
"1154b2fd6fb913b02eb6f64f5287a6b75a506e64",
"c07ebd47e86f0ece88b28c57d79ed7544f5a30f0",
"8383b7f6f4f9556e522f735a0fd7b8c9e11e613b",
"92e9e22f2201ee11f244cde9f37fc8954bc3a6a0",
"8007305d525a0802f09002b7a5bca2bb3f23ed7d",
"1e1b0f0411e35a7d8edacc3cd555e8a347674ef1",
"11b0e5ee27e7fdf989632f157ff204fc8962918c",
"513e0a61ad2a55fc5f87606cfa55e3590f80ecaf"
],
"paperAbstract": "The memory wall continues to be a major performance bottleneck. While small on-die caches have been effective so far in hiding this bottleneck, the ever-increasing footprint of modern applications renders such caches ineffective. Recent advances in memory technologies like embedded DRAM (eDRAM) and High Bandwidth Memory (HBM) have enabled the integration of large memories on the CPU package as an additional source of bandwidth other than the DDR main memory. Because of limited capacity, these memories are typically implemented as a memory-side cache. Driven by traditional wisdom, many of the optimizations that target improving system performance have been tried to maximize the hit rate of the memory-side cache. A higher hit rate enables better utilization of the cache, and is therefore believed to result in higher performance. In this paper, we challenge this traditional wisdom and present DAP, a Dynamic Access Partitioning algorithm that sacrifices cache hit rates to exploit under-utilized bandwidth available at main memory. DAP achieves a near-optimal bandwidth partitioning between the memory-side cache and main memory by using a light-weight learning mechanism that needs just sixteen bytes of additional hardware. Simulation results show a 13% average performance gain when DAP is implemented on top of a die-stacked memory-side DRAM cache. We also show that DAP delivers large performance benefits across different implementations, bandwidth points, and capacity points of the memory-side cache, making it a valuable addition to any current or future systems based on multiple heterogeneous bandwidth sources beyond the on-chip SRAM cache hierarchy.",
"pdfUrls": [
"http://doi.ieeecomputersociety.org/10.1109/HPCA.2017.46",
"http://www.cse.iitk.ac.in/users/mainakc/pub/hpca2017dap.pdf",
"http://www.cse.iitk.ac.in/users/mainakc/pub/hpca2017dap.pdf/",
"https://www.cse.iitk.ac.in/users/mainakc/pub/hpca2017dap.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/06e97b3ea02af7274d659a420f94bc5da5e6d541",
"sources": [
"DBLP"
],
"title": "Near-Optimal Access Partitioning for Memory Hierarchies with Multiple Heterogeneous Bandwidth Sources",
"venue": "2017 IEEE International Symposium on High Performance Computer Architecture (HPCA)",
"year": 2017
},
"06fd348d9388abfd880d3f207e3664e3180857cb": {
"authors": [
{
"ids": [
"2993481"
],
"name": "Srikanth Sundaresan"
},
{
"ids": [
"1771164"
],
"name": "Mark Allman"
},
{
"ids": [
"1718655"
],
"name": "Amogh Dhamdhere"
},
{
"ids": [
"10179735"
],
"name": "Kimberly C. Claffy"
}
],
"doi": "10.1145/3131365.3131381",
"doiUrl": "https://doi.org/10.1145/3131365.3131381",
"entities": [
"Experiment",
"Interconnection",
"Last mile",
"Maxima and minima",
"Multitier architecture",
"Network congestion",
"Network switch",
"TCP congestion control",
"Throughput",
"Type signature"
],
"id": "06fd348d9388abfd880d3f207e3664e3180857cb",
"inCitations": [
"4c49270fefd4d359e3ee76e1a6bccb94283d51ff"
],
"journalName": "",
"journalPages": "64-77",
"journalVolume": "",
"outCitations": [
"83e16961840d660945295918b96e840829fbd984",
"1be16d8c557b15cdf2db9e7eb4453f2274fd60af",
"bf0da8f3a47fffcba82cf9e4f57c43521b8effd3",
"605543e3bad4dcc65fdc711fa16c0a22d4ddfd95",
"3318f54d21edb825cb223e2fd88754c61b362e4c",
"7b49ef639ecc802b7ccb2933a8eda5ddb21c8be1",
"05a800a0cd33048d6e5ec59efc2532fa86071755",
"b3afefa8e89adda9112724015142e99daeabf9e9",
"4c49270fefd4d359e3ee76e1a6bccb94283d51ff",
"7043703fe7d4efc25764e03cb4bea46ceb0ab353",
"5c8ee2b6d8ff485bb9ce1ef525693a2e728b36c3",
"5d4445bfa05fc47466dbbc950717a181613e87a0",
"21a378262cb3402ab1f4b11cb20a4687c28bc052",
"20b7cb4c512556ce597ce99cf11712a2b9409262",
"6d2337411e0bdf7fe19a0089cdc1f8a754b11305",
"2be5a7ddb866e22bacb7982a9a73188cf5564f8d",
"097ca8b402d3eb1ee125396dc2e36b1d7713a5ea",
"25ded9f81378f6b85daf5a70c85bbadfb84ebc3d",
"a01117f34d8f692e948f20080a3080096ec144ae",
"d09aa6f9d2df3e20441f80914947e6aae60a016b",
"7a0e7065d521e31e74fc367597db41b62b19a789",
"16eedc8ccfda1a7e213097ada3c234829488add5",
"11945a1b14a40206e3e74956c1911d10207dcfe9",
"04a32d03a605e7b27c29faebb6a5079689c04bc8"
],
"paperAbstract": "We develop and validate Internet path measurement techniques to distinguish congestion experienced when a flow self-induces congestion in the path from when a flow is affected by an already congested path. One application of this technique is for speed tests, when the user is affected by congestion either in the last mile or in an interconnect link. This difference is important because in the latter case, the user is constrained by their service plan (i.e., what they are paying for), and in the former case, they are constrained by forces outside of their control. We exploit TCP congestion control dynamics to distinguish these cases for Internet paths that are predominantly TCP traffic. In TCP terms, we re-articulate the question: was a TCP flow bottlenecked by an already congested (possibly interconnect) link, or did it induce congestion in an otherwise idle (possibly a last-mile) link?\n TCP congestion control affects the round-trip time (RTT) of packets within the flow (i.e., the flow RTT): an endpoint sends packets at higher throughput, increasing the occupancy of the bottleneck buffer, thereby increasing the RTT of packets in the flow. We show that two simple, statistical metrics derived from the flow RTT during the slow start period---its coefficient of variation, and the normalized difference between the maximum and minimum RTT---can robustly identify which type of congestion the flow encounters. We use extensive controlled experiments to demonstrate that our technique works with up to 90% accuracy. We also evaluate our techniques using two unique real-world datasets of TCP throughput measurements using Measurement Lab data and the Ark platform. We find up to 99% accuracy in detecting self-induced congestion, and up to 85% accuracy in detecting external congestion. Our results can benefit regulators of interconnection markets, content providers trying to improve customer service, and users trying to understand whether poor performance is something they can fix by upgrading their service tier.",
"pdfUrls": [
"http://www.icir.org/mallman/pubs/SDAC17/SDAC17.pdf",
"http://doi.acm.org/10.1145/3131365.3131381",
"https://conferences.sigcomm.org/imc/2017/papers/imc17-final99.pdf",
"http://www.caida.org/publications/papers/2017/tcp_congestion_signatures/tcp_congestion_signatures.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/06fd348d9388abfd880d3f207e3664e3180857cb",
"sources": [
"DBLP"
],
"title": "TCP congestion signatures",
"venue": "IMC",
"year": 2017
},
"070771bdc55490cdcdadc63f815faf0cf23224fb": {
"authors": [
{
"ids": [
"34710867"
],
"name": "Lun Liu"
},
{
"ids": [
"3105241"
],
"name": "Todd D. Millstein"
},
{
"ids": [
"1702346"
],
"name": "Madan Musuvathi"
}
],
"doi": "10.1145/3133873",
"doiUrl": "https://doi.org/10.1145/3133873",
"entities": [
"A* search algorithm",
"Apache Spark",
"Baseline (configuration management)",
"Benchmark (computing)",
"Big data",
"Compiler",
"Consistency model",
"Java",
"Java HotSpot Virtual Machine",
"Java virtual machine",
"Library",
"Machine learning",
"Memory model (programming)",
"Optimizing compiler",
"Overhead projector",
"Programmer",
"Programming language",
"Sequential consistency",
"Server (computing)",
"Server-side",
"Shared memory",
"Thread (computing)",
"X86"
],
"id": "070771bdc55490cdcdadc63f815faf0cf23224fb",
"inCitations": [],
"journalName": "PACMPL",
"journalPages": "49:1-49:25",
"journalVolume": "1",
"outCitations": [
"3302da00188f85f87710d62a743c98d7fbc1e437",
"3d802a3254a1a532f080bc8e713d970ea8796db5",
"5eef609f21fc9327e551ab40425f7f1715c3e200",
"4e624272a61a228bcf9565b0e48e86ae3936db80",
"129aea79d23b3295999332bf336c4aa8804ebfc5",
"101bcfb23ad622fa5fed78ca627f0ef3fc8e5624",
"1820869030fca660212fb7a6449b6ad1aa99d9db",
"da68320330b849d7a549db022a2400a7c6a711cf",
"13bc2fe34d03c49cfcb80a814c046b8ad8895deb",
"1066cce77abb53eea67bfcc1d2dee8e7f4e3ebcf",
"33817456b5263fab036210ff1245dcc96f863101",
"5e51e70eb2e423988cf73262d9cb3adf72f5b6f1",
"05a518c3b1a6f5c15d77f8829368677a263ff15d",
"3eae0271717f6b4d65024abf04e5d98aef41d748",
"3784b73a1f392160523400ec0309191c0a96d86f",
"e2cd72273908651ea11f9cb45d0dd5d755ca3bd0",
"362e9b5afe5934a9d8046d758c17c5bada0652b3",
"66dada0d684ddc29a3156adfd3b2e97be5c44943",
"3a66a682ee36cde0738824b152a51df2ccbb80fd",
"833dd2477b9f783434121f9d07a91349fad4d5d4",
"254fe5dec3f90810a89ea02ae66e8f1d60b5054a",
"2e3058c0c279a5ff59b7fd65b7f73fab2fe0d0b3",
"52eee82594982f3c6ba7f0385a78002868fa30cb",
"0f1042350e2c97117620d9f5182f94262f1f5ac0",
"0ed62848d5c9e01f692c0c0b3851848ac7bb0764",
"26fff9101c4499511d44e140570983d2a655e6be",
"0eee11504314fb4c13da25773edfc3ae061e8fc2",
"09cb251072ef19e125ec5d94de5777584af68db5",
"62bd72d7a4160bd1a35191c51137d11cfbe30cf7",
"bbb9c3119edd9daa414fd8f2df5072587bfa3462",
"1b9e9bfdc66140d2eb192e4ac8aca9281f0239b8",
"19580e4beb903595082ced092c0bc5ba0a2e7bac",
"0aff06e25dd081211e39771f2aeb41aff7b2fcd6",
"00a9ba0063d34ec56792849a67ef57b4601becbb",
"3371781698dbd3d3e78477af7528530024b828f8",
"2701419224edb78e2f34f1470115be290097ba8b",
"012f8e43e7973c8fad3c9a48b4dd7be773c770d1",
"2cdeba58517d6b3e0dc3e9a4998c141f08f9f11c",
"67c64f4e676e1996cca7fd0ec50e453d6c698814",
"4a3f0c1b983315c863dd6f4820dc147b50ab6109",
"c11db6ccd0c480c47c97d3c3beadb1a90f0a8e2b",
"9a95cb1f79a8078e47dfb17f695952a6bea92fb5"
],
"paperAbstract": "A *memory consistency model* (or simply *memory model*) defines the possible values that a shared-memory read may return in a multithreaded programming language. Choosing a memory model involves an inherent performance-programmability tradeoff. The Java language has adopted a *relaxed* (or *weak*) memory model that is designed to admit most traditional compiler optimizations and obviate the need for hardware fences on most shared-memory accesses. The downside, however, is that programmers are exposed to a complex and unintuitive semantics and must carefully declare certain variables as `volatile` in order to enforce program orderings that are necessary for proper behavior. \n This paper proposes a simpler and stronger memory model for Java through a conceptually small change: *every* variable has `volatile` semantics by default, but the language allows a programmer to tag certain variables, methods, or classes as `relaxed` and provides the current Java semantics for these portions of code. This *volatile-by-default* semantics provides *sequential consistency* (SC) for all programs by default. At the same time, expert programmers retain the freedom to build performance-critical libraries that violate the SC semantics. \n At the outset, it is unclear if the `volatile`-by-default semantics is practical for Java, given the cost of memory fences on today's hardware platforms. The core contribution of this paper is to demonstrate, through comprehensive empirical evaluation, that the `volatile`-by-default semantics is arguably acceptable for a predominant use case for Java today -- server-side applications running on Intel x86 architectures. We present VBD-HotSpot, a modification to Oracle's widely used HotSpot JVM that implements the `volatile`-by-default semantics for x86. To our knowledge VBD-HotSpot is the first implementation of SC for Java in the context of a modern JVM. VBD-HotSpot incurs an average overhead versus the baseline HotSpot JVM of 28% for the Da Capo benchmarks, which is significant though perhaps less than commonly assumed. Further, VBD-HotSpot incurs average overheads of 12% and 19% respectively on standard benchmark suites for big-data analytics and machine learning in the widely used Spark framework.",
"pdfUrls": [
"http://doi.acm.org/10.1145/3133873",
"http://web.cs.ucla.edu/~todd/research/oopsla17.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/070771bdc55490cdcdadc63f815faf0cf23224fb",
"sources": [
"DBLP"
],
"title": "A volatile-by-default JVM for server applications",
"venue": "PACMPL",
"year": 2017
},
"071341873bf6755131dae4347a09996b29852c90": {
"authors": [
{
"ids": [
"24624948"
],
"name": "Charalampos Stylianopoulos"
},
{
"ids": [
"2088512"
],
"name": "Magnus Almgren"
},
{
"ids": [
"2626539"
],
"name": "Olaf Landsiedel"
},
{
"ids": [
"1752071"
],
"name": "Marina Papatriantafilou"
}
],
"doi": "10.1109/ICPP.2017.56",
"doiUrl": "https://doi.org/10.1109/ICPP.2017.56",
"entities": [
"Aho\u2013Corasick algorithm",
"Algorithm",
"Automatic vectorization",
"Central processing unit",
"Cloud computing",
"Firewall (computing)",
"Haswell (microarchitecture)",
"Intrusion detection system",
"Laptop",
"Locality of reference",
"Network security",
"Network traffic control",
"Pattern matching",
"SIMD",
"Speedup",
"Time complexity",
"Web server",
"Xeon Phi"
],
"id": "071341873bf6755131dae4347a09996b29852c90",
"inCitations": [],
"journalName": "2017 46th International Conference on Parallel Processing (ICPP)",
"journalPages": "472-482",
"journalVolume": "",
"outCitations": [
"7f864cfdde0a6f92e90ac53a73079f4bea884d85",
"3d940be9caba441c327991febf19bed1d896cc89",
"f311412463c33223947df56ae04644e8c68cdd5d",
"b85df0212d624cbcf52108969ba722fe5d24cb2e",
"80527e7595530951081494d1b98f3f13da3033a2",
"d059a2ade9d34a97846ec63f30caf80014088582",
"7ad9b11b446d29006ed857b0f13323f6875d601b",
"3f82fb3d54b2baaa3b18ae1e0953b16760641b20",
"24251f02c34f32b1dd96572a1d984c4463a26a10",
"846fcf30dc75f04886092891e754791e9704f69f",
"784c88bfd72ae75e21942e1bc74bd840e25fb2aa",
"0cff369abc1673194ea1e61999ad6c8cd1c8bc30",
"eb7539d4a06a027dd8cbabe8f28190de60b28629",
"1e5027ff533d31513b667cec06f6a650882e1ee0",
"363d109c3f00026f9ef904dd8cc3c935ee463b65",
"6a5e0414a01c19da4a48ac4018b5687d782ad25c",
"d985c93917cd0a145451ec2c02c9e25d988ac368",
"b4bf6a0a782450383bca2b91eac34a64a083acb5",
"210da4f92fe3a29656165d895d44c71aad3f1b79",
"c0b438eee7bd423606da9335229602b9c77c10d4",
"752a2efb4cc8a40e86a442b45e8f675f9ff8d224",
"5b6705672ecd3281fd1736bfa93f1c153f4c86c0",
"3547ac839d02f6efe3f6f76a8289738a22528442"
],
"paperAbstract": "Pattern matching is a key building block of Intrusion Detection Systems and firewalls, which are deployed nowadays on commodity systems from laptops to massive web servers in the cloud. In fact, pattern matching is one of their most computationally intensive parts and a bottleneck to their performance. In Network Intrusion Detection, for example, pattern matching algorithms handle thousands of patterns and contribute to more than 70% of the total running time of the system.In this paper, we introduce efficient algorithmic designs for multiple pattern matching which (a) ensure cache locality and (b) utilize modern SIMD instructions. We first identify properties of pattern matching that make it fit for vectorization and show how to use them in the algorithmic design. Second, we build on an earlier, cache-aware algorithmic design and we show how cache-locality combined with SIMD gather instructions, introduced in 2013 to Intel's family of processors, can be applied to pattern matching. We evaluate our algorithmic design with open data sets of real-world network traffic:Our results on two different platforms, Haswell and Xeon-Phi, show a speedup of 1.8x and 3.6x, respectively, over Direct Filter Classification (DFC), a recently proposed algorithm by Choi et al. for pattern matching exploiting cache locality, and a speedup of more than 2.3x over Aho-Corasick, a widely used algorithm in today's Intrusion Detection Systems.",
"pdfUrls": [
"http://doi.ieeecomputersociety.org/10.1109/ICPP.2017.56"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/071341873bf6755131dae4347a09996b29852c90",
"sources": [
"DBLP"
],
"title": "Multiple Pattern Matching for Network Security Applications: Acceleration through Vectorization",
"venue": "2017 46th International Conference on Parallel Processing (ICPP)",
"year": 2017
},
"0713ca8723993973640da3ad3c68074547ebd673": {
"authors": [
{
"ids": [
"4367659"
],
"name": "Karthik Rao"
},
{
"ids": [
"1715001"
],
"name": "Jun Wang"
},
{
"ids": [
"2933334"
],
"name": "Sudhakar Yalamanchili"
},
{
"ids": [
"2279524"
],
"name": "Yorai Wardi"
},
{
"ids": [
"3210669"
],
"name": "Handong Ye"
}
],
"doi": "10.1109/HPCA.2017.32",
"doiUrl": "https://doi.org/10.1109/HPCA.2017.32",
"entities": [
"Algorithm",
"Android",
"Best, worst and average case",
"Central processing unit",
"Control theory",
"Dynamic voltage scaling",
"Memory bandwidth",
"Mobile device",
"Operating system",
"Power management",
"Smartphone",
"System configuration"
],
"id": "0713ca8723993973640da3ad3c68074547ebd673",
"inCitations": [
"a447e9372fbe9abaeb88a8d83856e81c0a0fd343",
"a7a971a51e10a0f5cdc2d2ee4e1d5c735f6d86c2"
],
"journalName": "2017 IEEE International Symposium on High Performance Computer Architecture (HPCA)",
"journalPages": "169-180",
"journalVolume": "",
"outCitations": [
"d320abd5c9d10abdb40ee24925ce757df7ae807d",
"04a8986ea5df3d6c29fb21627ac1f51ccf68eb15",
"01debf23d55fcd72ff2d78f980c5c73a79b90102",
"35fb4a067532c90b030bb19a94857f891dff28d5",
"9442ed36516eac3af26bf515c659e4cacf999dee",
"6252dda1eda881986d91ef19f5f1f46750679ba6",
"9d5862f2251d6ad666fe8582bbc5d1fdf18c1a45",
"1fe0f151c9e693431d15193e6f47ad81d8345dc2",
"53d2bf89576e95387a1004842722bd721d675c18",
"8f577a032b08c61ee5ce858062bfa051c8194b5f",
"2fbf9ab58d81b2a45a5c52803e02c1a2c18add3d",
"7cb133f451aa5f00a21ff19941d1417ba77fa6d3",
"24208da401b10445ae684c20ef1bbc4428eb131d",
"d01a01e0ff9f730517231f9d2aad201e14080795",
"03385e04bf3df318ee9a94237e6b5e96b8663a0d",
"15860f9f774f19f245f016d9cf479222e4f9a6ba",
"f08f79290a79800969a33ab209bd20931160557a",
"961c1840153791e10376630d6a428300389e98de",
"649db1efb9f7415f6c0f1247bcb3734ad62e4442",
"387eb8909b5527dd2513cfdd2f376a3a1f2973b3"
],
"paperAbstract": "Energy management is a key issue for mobile devices. On current Android devices, power management relies heavily on OS modules known as governors. These modules are created for various hardware components, including the CPU, to support DVFS. They implement algorithms that attempt to balance performance and power consumption. In this paper we make the observation that the existing governors are (1) general-purpose by nature (2) focused on power reduction and (3) are not energy-optimal for many applications. We thus establish the need for an application-specific approach that could overcome these drawbacks and provide higher energy efficiency for suitable applications. We also show that existing methods manage power and performance in an independent and isolated fashion and that co-ordinated control of multiple components can save more energy. In addition, we note that on mobile devices, energy savings cannot be achieved at the expense of performance. Consequently, we propose a solution that minimizes energy consumption of specific applications while maintaining a user-specified performance target. Our solution consists of two stages: (1) offline profiling and (2) online controlling. Utilizing the offline profiling data of the target application, our control theory based online controller dynamically selects the optimal system configuration (in this paper, combination of CPU frequency and memory bandwidth) for the application, while it is running. Our energy management solution is tested on a Nexus 6 smartphone with 6 real-world applications. We achieve 4 - 31% better energy than default governors with a worst case performance loss of",
"pdfUrls": [
"http://casl.gatech.edu/wp-content/uploads/2016/11/enopt.pdf",
"http://doi.ieeecomputersociety.org/10.1109/HPCA.2017.32"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/0713ca8723993973640da3ad3c68074547ebd673",
"sources": [
"DBLP"
],
"title": "Application-Specific Performance-Aware Energy Optimization on Android Mobile Devices",
"venue": "2017 IEEE International Symposium on High Performance Computer Architecture (HPCA)",
"year": 2017
},
"071564baef078867847fc54a3a0b50dd22d29d62": {
"authors": [
{
"ids": [
"40016363"
],
"name": "Hasan Hassan"
},
{
"ids": [
"1920997"
],
"name": "Nandita Vijaykumar"
},
{
"ids": [
"2781428"
],
"name": "Samira Manabi Khan"
},
{
"ids": [
"33801185"
],
"name": "Saugata Ghose"
},
{
"ids": [
"23008160"
],
"name": "Kevin K. Chang"
},
{
"ids": [
"3257164"
],
"name": "Gennady Pekhimenko"
},
{
"ids": [
"15895903"
],
"name": "Donghyuk Lee"
},
{
"ids": [
"1741511"
],
"name": "Oguz Ergin"
},
{
"ids": [
"1734461"
],
"name": "Onur Mutlu"
}
],
"doi": "10.1109/HPCA.2017.62",
"doiUrl": "https://doi.org/10.1109/HPCA.2017.62",
"entities": [
"Computer data storage",
"Data integrity",
"Double data rate",
"Dynamic random-access memory",
"Field-programmable gate array",
"High- and low-level",
"High-level programming language",
"Memory controller",
"Memory module",
"Non-volatile memory",
"Observable",
"Open-source software",
"Systems design",
"Utility",
"Volatile memory"
],
"id": "071564baef078867847fc54a3a0b50dd22d29d62",
"inCitations": [
"60aa9510638d4d9739ebfc3a0042187988482346",
"00cc482570d739e7b733f45b6f8f1836b24056bd",
"2976932bec7334a150e1bb6916b7564bdaa864ea",
"0c4fe1f1a8043e8f4175b21faca1b72bff8033e6",
"24b300b2395e4d0b0d2c8b9797fc9f8e735a58ef",
"42f7ade4ab1ee6941da178b53712bb7ef7822815",
"1f80d8bdf5a0a1787a36ccfc4929f71d14a94e57",
"b06b556169d8b55d6d8058164dd599c67c50c430",
"6ff7fd341b0a4ab4d919f8ce3b35d447668e80ae",
"983e87929eeb3f77c2ddb02d17d6efe978c80667",
"1ebdf99bf03787a10d1c37bc9f93e89116e29bd6",
"0f41b9c0900b1c17b63d3d59bd4c334f7cf736af",
"5c478e5c774eb3cf71e446e2c9eb2166ca032b28",
"0b393cab00401cb971cf71970e00c2767f881f75",
"2aa997522d212ab74163b986be211ffc7f3e9e34",
"447f492235719d7c2b061b95d818f928d6cbdac5",
"2cfa2068d49fc0e9cc5d96bc498c63e782f7478f",
"042855085a52934e5599e02555071bb222f6a000"
],
"journalName": "2017 IEEE International Symposium on High Performance Computer Architecture (HPCA)",
"journalPages": "241-252",
"journalVolume": "",
"outCitations": [
"77f826132cf09ac91ea9c859387a8d52221a019a",
"8d71fb5efe95801b31d65366ff1ce8c01525e493",
"403966143ae4ded89f519214124761d667821a11",
"e762b1b654798cec0fb9d6000c7f7c777ac0689f",
"1da48d8173e34eb7825870248c4c12b6bbe7d9c1",
"081c32609be4adcf16fe6f3bd6ae35ce2622edaf",
"170fc81c89a7fa5541d078b8400529fdea94af18",
"831b348bbabaf2fbab1700de982440de11bedf72",
"710b3d324b07197a705683af18fc417ef712d042",
"1be96030c042ff6b5bbe05bf0fd86f5f9a4d27dc",
"e0a4d1dbd9d459f3613be9da56243d72c40e152e",
"35b92289fe9c19e5baf462ffe91bdd2d25768b00",
"3420b736c4a182cb72c90f3649d8475e196d0401",
"03eaf3a6b6db01bdb749e8c3a097a0198c61b976",
"5a04b332441e2ff025313bfd303383e13050a274",
"06d5e64635ff941d08cf833706554c493deb7acb",
"fae8a785260ac5c34be82fca92a4abef4c30d655",
"7815c4243d581d0f96d0dac2c6e90e01d1ce94a3",
"517c5cd1dbafb3cfa0eea4fc78d0b5cd085209b2",
"eef1f3f44d249a37c8382f77ed9770b62e8bc158",
"9341125876271d46cc25f86dac93f25acb343e8d",
"0ffbd9cd0fe4fa005fc9b6eea24ecf9bff67c806",
"3f310c82a8a6f5a6a02841d4c5484873cb9530c6",
"1c32ad0a42109fab826eb3054df7cfc33b424125",
"37b5850e3e75a3462f3991491ca26674925f233b",
"07e01e6ea72ef3e0cca2bf3316de05546285c8b6",
"084037d504c95c1af6fb1398179f8495618b72d7",
"33cb4013c7cc36a173e7fb4e541133056e8e43cf",
"44d886f89cdbd4fdf5dd25d83b2d37deb7541bf7",
"2612541a89857949bc512b6fb2ad7f0c153cb97c",
"174a3d4ad2caba68b55fd3ee863b9471e3786f21",
"8b4682a90b39d0b95d92098be48f05687cb23086",
"3c89345bb88a440096f7a057c28857cc4baf3695",
"0eacd1b47786f740b723d906d46e160f143c0378",
"bb117349638a1d63be1b105bba0e152bd6c031f8",
"ab6888a1b024d109c768f81b49c77b585efc975a",
"8e53bdcc9f1d059a0649c97a05a9e8bd2c25698b",
"1114ef6ef315a23755740545ee46c5af0cf1e02c",
"ddc3e4501691c41bda5d927628f5f4abb2cfeb7f",
"31c299532c42106b71e909c2fc0fc7472c39ce90",
"fd840d5275cac98d64e7778a1b9173b937a77386",
"26e72340c47b7348e1b1de285f89dd96cc925b27",
"3f82aa1373e823ec622b3021fff9df4a82230267",
"0edf4ef1b8e09e4abc994f7d450bc090262e2c9b",
"67acde1c1a93644a45e92b42a6467a558235861a",
"a56683f144d7498e1fc5b34a9314c138221d71c5",
"f0409a67cbc7457693c4787892076d94c4ec3c6c",
"76e29695c7c119d869d3b87886a611261a98e4a4",
"2fa80c8342dcb349f1d91c102a76400c86dfb042",
"1a8c7439080c2e5d42bf173c4db084713e5f05b7",
"a95436fb5417f16497d90cd2aeb11a0e2873f55f",
"238de3a78baa66b590c077ae95b33570b0ee2fc2",
"663fee48f41849a47a89ce014876c745851c8a06",
"468035263afa59095614f26a62e0217da4a1aeed",
"dc2e2b794a784782d7d9860f1358aa107f71c1bf",
"63e8d74a3243df7f05f2a12ad537b211767f2adc",
"012d556d67acedc6898930b4c93f54b87aabf5ee",
"6902867509928c0e5c19aff3e62e1def3a19d581",
"0d89743bbb517a2534b3a4a7a8e9e4f04610c7fa",
"1db11a76fa33ca81970aa345fe4bc150ae846ce0",
"c2d21dc070bec49f3efcb71e4edf73770faa2fef",
"94468d080421c4ec3141625a6c573b42d3b01261",
"76d791a34301b60f4c6c081b091fb7bdc2971435",
"0494a1ab6f0dd764fb9039772818b8f269ed70b4",
"35235e03fd84d273235abbe71357b9b9dea77e3d",
"61ea230d0e757ff46d3a381e79691bd54b92a503",
"2621b8f63247ea5af03f4ea0e83c3b528238c4a1",
"9cea2a7caea7a77dec3b6f493518a6b26375723c",
"45d8dfe5b5dce66bd73c7688d91327f280915314",
"434fa04db769935ae61bbcf4d9faa602b9a8c730",
"096ee9c89d43fd03a602aed3a37fdf43dc8e60ae",
"84564d347d505467dd628e56319bc037b0a1ec28",
"3ef44315caebb6169b7ffbf9886cd782193ab40e",
"8c581854139c628a8c16e36bf48dc5b65d3e26d0",
"356955d0f190829b7481b8dc39c5f90dfac1b652"
],
"paperAbstract": "DRAM is the primary technology used for main memory in modern systems. Unfortunately, as DRAM scales down to smaller technology nodes, it faces key challenges in both data integrity and latency, which strongly affects overall system reliability and performance. To develop reliable and high-performance DRAM-based main memory in future systems, it is critical to characterize, understand, and analyze various aspects (e.g., reliability, latency) of existing DRAM chips. To enable this, there is a strong need for a publicly-available DRAM testing infrastructure that can flexibly and efficiently test DRAM chips in a manner accessible to both software and hardware developers. This paper develops the first such infrastructure, SoftMC (Soft Memory Controller), an FPGA-based testing platform that can control and test memory modules designed for the commonly-used DDR (Double Data Rate) interface. SoftMC has two key properties: (i) it provides flexibility to thoroughly control memory behavior or to implement a wide range of mechanisms using DDR commands, and (ii) it is easy to use as it provides a simple and intuitive high-level programming interface for users, completely hiding the low-level details of the FPGA. We demonstrate the capability, flexibility, and programming ease of SoftMC with two example use cases. First, we implement a test that characterizes the retention time of DRAM cells. Experimental results we obtain using SoftMC are consistent with the findings of prior studies on retention time in modern DRAM, which serves as a validation of our infrastructure. Second, we validate two recently-proposed mechanisms, which rely on accessing recently-refreshed or recently-accessed DRAM cells faster than other DRAM cells. Using our infrastructure, we show that the expected latency reduction effect of these mechanisms is not observable in existing DRAM chips, which demonstrates the usefulness of SoftMC in testing new ideas on existing memory modules. We discuss several other use cases of SoftMC, including the ability to characterize emerging non-volatile memory modules that obey the DDR standard. We hope that our open-source release of SoftMC fills a gap in the space of publicly-available experimental memory testing infrastructures and inspires new studies, ideas, and methodologies in memory system design.",
"pdfUrls": [
"http://doi.ieeecomputersociety.org/10.1109/HPCA.2017.62",
"http://www.pdl.cmu.edu/PDL-FTP/NVM/17hpca_softmc.pdf",
"http://www.ece.cmu.edu/~safari/pubs/softMC_hpca17-lightning-talk.pdf",
"http://www.ece.cmu.edu/~safari/pubs/softMC_hpca17-talk.pdf",
"https://people.inf.ethz.ch/omutlu/pub/softMC_hpca17.pdf"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/071564baef078867847fc54a3a0b50dd22d29d62",
"sources": [
"DBLP"
],
"title": "SoftMC: A Flexible and Practical Open-Source Infrastructure for Enabling Experimental DRAM Studies",
"venue": "2017 IEEE International Symposium on High Performance Computer Architecture (HPCA)",
"year": 2017
},
"071ed5d381c0ab3a600f0ca8b5829c973ea3990a": {
"authors": [
{
"ids": [
"1727449"
],
"name": "Vu Nguyen"
},
{
"ids": [
"8409193"
],
"name": "Sunil Gupta"
},
{
"ids": [
"2867032"
],
"name": "Santu Rana"
},
{
"ids": [
"40144382"
],
"name": "Cheng Li"
},
{
"ids": [
"1679520"
],
"name": "Svetha Venkatesh"
}
],
"doi": "10.1109/ICDM.2017.44",
"doiUrl": "https://doi.org/10.1109/ICDM.2017.44",
"entities": [
"Address space",
"Algorithm",
"Bayesian optimization",
"Benchmark (computing)",
"Black box",
"Experiment",
"Global optimization",
"Hyper-threading",
"Information management",
"Machine learning",
"Mathematical optimization",
"Maxima and minima",
"Procedural parameter",
"Program optimization",
"Regret (decision theory)",
"Theory",
"Value (ethics)"
],
"id": "071ed5d381c0ab3a600f0ca8b5829c973ea3990a",
"inCitations": [
"0edbac9c47df0cea7f3fee7409421ee8a9a97420"
],
"journalName": "2017 IEEE International Conference on Data Mining (ICDM)",
"journalPages": "347-356",
"journalVolume": "",
"outCitations": [
"5520b482b2c92ddad4907152217948a30cb459e2",
"30423f985355d74295546f1d14ed2ddd33cdef99",
"fe0749b9f46b4b6aa0fcfe05e0fef95f61d1cb85",
"552c4a314cdab45336801a685872a4b45c7d1caa",
"b39c891a23d920ab1aa10b6fc8978b127c95c8bd",
"217135d666e8349ba6d7312a37bd1dd166c098ec",
"25ca0946d0318570a758d9a6e4e4dd260fca126a",
"1592fe924114866c1ac559bae33ea789930daa98",
"6a6a20bcae8fe52d50c86457e71a2b9ae88d6c7c",
"cd5a26b89f0799db1cbc1dff5607cb6815739fe7",
"034c8c60a10d09a0b28ca929a9349cb3c0466b8b",
"26f58c28de7469dc6b6846d37953bbbe3f4fc0e9",
"210b3ccdc5d43ff218f894695a6ee8f1ff71a32f",
"7e0c75efced4a572c369e88e2aec69c1c8d4687b",
"46ecf53aad58de50fa85714f9a175a609ffb7ebb",
"bcfca73fd9a210f9a4c78a0e0ca7e045c5495250",
"9346ee1c7d8eb41301b733311270aa9ee73d0e6d",
"d859d016c42ea2e8b941002c1468bfc0eb1f02b2",
"4f9a756ceecc75f1f339dcaa7e590e6aef6f2244",
"0c839972087ca6e798f10cfd4368d461b872d6ac",
"1a7fd7b566697c9b69e64b27b68db4384314d925",
"30c4b5432dded3ce170f58d96e8935d538c58b98",
"1903b4448f1d87dbe3b6a5ef6089944a68a06ffd",
"5ba6dcdbf846abb56bf9c8a060d98875ae70dbc8",
"3706bba3ed884524e9cf8c63ecbf9f0d615f7004"
],
"paperAbstract": "Bayesian optimization (BO) has recently emerged as a powerful and flexible tool for hyper-parameter tuning and more generally for the efficient global optimization of expensive black-box functions. Systems implementing BO has successfully solved difficult problems in automatic design choices and machine learning hyper-parameters tunings. Many recent advances in the methodologies and theories underlying Bayesian optimization have extended the framework to new applications and provided greater insights into the behavior of these algorithms. Still, these established techniques always require a user-defined space to perform optimization. This pre-defined space specifies the ranges of hyper-parameter values. In many situations, however, it can be difficult to prescribe such spaces, as a prior knowledge is often unavailable. Setting these regions arbitrarily can lead to inefficient optimization - if a space is too large, we can miss the optimum with a limited budget, on the other hand, if a space is too small, it may not contain the optimum point that we want to get. The unknown search space problem is intractable to solve in practice. Therefore, in this paper, we narrow down to consider specifically the setting of "weakly specified" search space for Bayesian optimization. By weakly specified space, we mean that the pre-defined space is placed at a sufficiently good region so that the optimization can expand and reach to the optimum. However, this pre-defined space need not include the global optimum. We tackle this problem by proposing the filtering expansion strategy for Bayesian optimization. Our approach starts from the initial region and gradually expands the search space. Wedevelop an efficient algorithm for this strategy and derive its regret bound. These theoretical results are complemented by an extensive set of experiments on benchmark functions and tworeal-world applications which demonstrate the benefits of our proposed approach.",
"pdfUrls": [
"http://doi.ieeecomputersociety.org/10.1109/ICDM.2017.44"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/071ed5d381c0ab3a600f0ca8b5829c973ea3990a",
"sources": [
"DBLP"
],
"title": "Bayesian Optimization in Weakly Specified Search Space",
"venue": "2017 IEEE International Conference on Data Mining (ICDM)",
"year": 2017
},
"0734438fb61b5a1558b42e9156f800bb49aa6e26": {
"authors": [
{
"ids": [
"34608926"
],
"name": "Sharath Chandrashekhara"
},
{
"ids": [
"3102980"
],
"name": "Taeyeon Ki"
},
{
"ids": [
"2654406"
],
"name": "Kyungho Jeon"
},
{
"ids": [
"3119495"
],
"name": "Karthik Dantu"
},
{
"ids": [
"1691861"
],
"name": "Steven Y. Ko"
}
],
"doi": "10.1145/3117811.3117822",
"doiUrl": "https://doi.org/10.1145/3117811.3117822",
"entities": [
"Android",
"Database",
"End-to-end principle",
"Mobile operating system"
],
"id": "0734438fb61b5a1558b42e9156f800bb49aa6e26",
"inCitations": [],
"journalName": "",
"journalPages": "396-408",
"journalVolume": "",
"outCitations": [
"7dbce0de554c2adbc28d7ba1d927c9f1cc8b184a",
"2d1addf9bc1c37214d1656cd400f3f344e82ac33",
"bc53135d3296ce4bb907238f423e89d2a59c7c71",
"5e97ff426b5d0a415fa380a6c9645d2537aa6cd2",
"3f834b98ea5cf9a24beb13e48018bcbf846c4e20",
"186e91a2c251e55a787e96dbb7a5d06cb4c81517",
"2ab731e0263229327d43a4e716ac6d7f0473a56d",
"4e412c4a9c216312a59e95114330b06f6ba14592",
"0f6e3c5ad255b43c867f8f63f5ea7aec67da075a",
"0ea6716514909256eeedb4849c5009b9e237f763",
"60ab9884f187e7395011d78fcb142f5614fe0d5e",
"9061a3802910b71cf5d840473d7b9989649af94a",
"642e0646013dadd1f8f49f88901a109cdb6f2984",
"5619c61ac036cfcde641ff6e1ce882f0e00f5acb",
"027eb436c35c7e293e7ebc565163cb54c05fe2e9",
"aa7458464f3e0ad3cbfeed72fea08dd93ef79649",
"3207fdb643e19e0602757241c303e9fc21953b49",
"0d366f3522bcf503b9f0fea8a5d009ba3ecddf39",
"2c9b6f1a420ecd9e54b7467efd17f203690ef07e",
"a6a8313f30420c60e7eaa9f34ea5a41833695af1",
"407a55ea947f5f430e8def26c5f4183db0f53c3a"
],
"paperAbstract": "In this paper, we design a pluggable data management solution for modern mobile platforms (e.g., Android). Our goal is to allow data management mechanisms and policies to be implemented independently of core app logic. Our design allows a user to install data management solutions as apps, install multiple such solutions on a single device, and choose a suitable solution each for one or more apps. It allows app developers to focus their effort on app logic and helps the developers of data management solutions to achieve wider deployability. It also gives increased control of data management to end users and allows them to use different solutions for different apps. We present a prototype implementation of our design called BlueMountain, and implement several data management solutions for file and database management to demonstrate the utility and ease of using our design. We perform detailed microbenchmarks as well as end-to-end measurements for files and databases to demonstrate the performance overhead incurred by our implementation.",
"pdfUrls": [
"https://nsr.cse.buffalo.edu/wp-content/uploads/2017/12/bluemountain-mobicom17.pdf",
"http://doi.acm.org/10.1145/3117811.3117822"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/0734438fb61b5a1558b42e9156f800bb49aa6e26",
"sources": [
"DBLP"
],
"title": "BlueMountain: An Architecture for Customized Data Management on Mobile Systems",
"venue": "MobiCom",
"year": 2017
},
"075420f809aa1a9e5a56016ca4ae9d8cdb78b213": {
"authors": [
{
"ids": [
"2219393"
],
"name": "Wilson Lian"
},
{
"ids": [
"1786752"
],
"name": "Hovav Shacham"
},
{
"ids": [
"1727599"
],
"name": "Stefan Savage"
}
],
"doi": "",
"doiUrl": "",
"entities": [
"Address space",
"Byte",
"Compiler",
"Diversification (finance)",
"Executable",
"JIT spraying",
"JavaScript",
"Just-in-time compilation",
"Unified Framework",
"X86",
"X86-64"
],
"id": "075420f809aa1a9e5a56016ca4ae9d8cdb78b213",
"inCitations": [],
"journalName": "",
"journalPages": "",
"journalVolume": "",
"outCitations": [
"96628792f9e88e95bb788ba0e128c001c320490c",
"0fc7f3a21359665c456853e3fe09c9a5c4a24f37",
"480d4a756381f7aec1ffda84a3d7f1ef2695252a",
"2f4002755b309cdb91e18116b8028005497d8400",
"f7d02a1b86772f0ce8cbb3a6a7424b3ce5f367e4",
"f479c0578156255ce176e75bb13051fbb0f25b98",
"569393ee0bbba78af3241e544c347b2e98a1275d",
"3738a8045c001c8ffd245e72b0d68382fba27a48",
"1bb2363ddfec8e12f5408ce6b1538d74570bd865",
"67b752aaef2133ec0cda47b2a2c1856f0f2f266f",
"3875d1d1b623af0d640528efc9e581bc91338e35",
"36ef68442d55cee50fd35283617d3e77ecca6784",
"4e12a563998733080cf02240ce8fdd3292c14044",
"f4666ceedb6f0590dc4031ca2558c1ed3e8ffbcc",
"65950dfc50eb482d9df1ae11050a9f76fcddbc61",
"77cab38bef9d1b8b7bcfd3bb382c9d55541465e1",
"01ee7db67463b53143e0b2c126363ed6d3c8a532",
"26de23713ac23ed7a952cf56faa8bd23f8fd6575",
"1677bf5c635ef0e81b6c6cdfce30727f83959132"
],
"paperAbstract": "JIT spraying allows an attacker to subvert a JustIn-Time compiler, introducing instruction sequences useful to the attacker into executable regions of the victim program\u2019s address space as a side effect of compiling seemingly innocuous code in a safe language like JavaScript. We present new JIT spraying attacks against Google\u2019s V8 and Mozilla\u2019s SpiderMonkey JavaScript engines on ARM. The V8 attack is the first JIT spraying attack not to rely on instruction decoding ambiguity, and the SpiderMonkey attack uses the first ARM payload that executes unintended instructions derived from intended instruction bytes without resynchronizing to the intended instruction stream. We review the JIT spraying defenses proposed in the literature and their currently-deployed implementations and conclude that the current state of JIT spraying mitigation, which prioritizes low performance overhead, leaves many exploitable attacker options unchecked. We perform an empirical evaluation of mitigations with low but non-zero overhead in a unified framework and find that full, robust defense implementations of diversification defenses can effectively mitigate JIT spraying attacks in the literature as well as our new attacks with a combined average overhead of 4.56% on x86-64 and 4.88% on ARM32.",
"pdfUrls": [
"http://cseweb.ucsd.edu/~savage/papers/NDSS2017.pdf",
"https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/call-arms-understanding-costs-and-benefits-jit-spraying-mitigations/"
],
"pmid": "",
"s2PdfUrl": "http://pdfs.semanticscholar.org/0754/20f809aa1a9e5a56016ca4ae9d8cdb78b213.pdf",
"s2Url": "https://semanticscholar.org/paper/075420f809aa1a9e5a56016ca4ae9d8cdb78b213",
"sources": [
"DBLP"
],
"title": "A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations",
"venue": "NDSS",
"year": 2017
},
"075547a518e15af7e334fe66a845da4862d79af4": {
"authors": [
{
"ids": [
"1684480"
],
"name": "Kartik Gopalan"
},
{
"ids": [
"24694633"
],
"name": "Rohith Kugve"
},
{
"ids": [
"7314140"
],
"name": "Hardik Bagdi"
},
{
"ids": [
"2973015"
],
"name": "Yaohui Hu"
},
{
"ids": [
"30904419"
],
"name": "Dan Williams"
},
{
"ids": [
"2606437"
],
"name": "Nilton Bila"
}
],
"doi": "",
"doiUrl": "",
"entities": [
"Central processing unit",
"Cloud computing",
"Disk mirroring",
"Ecosystem",
"FUJITSU Cloud IaaS Trusted Public S5",
"Hypervisor",
"Introspection",
"Management system",
"Operating system",
"Span and div",
"Virtual machine",
"X86 virtualization"
],
"id": "075547a518e15af7e334fe66a845da4862d79af4",
"inCitations": [],
"journalName": "",
"journalPages": "235-249",
"journalVolume": "",
"outCitations": [
"46b9d88a665a94f7bd0fd88d4d99ca71891ad182",
"423455ad8afb9b2534c0954a5e61c95bea611801",
"1ef9c15256e66f020c339df27c5d0fe5ff758aaf",
"0e851f49432767888b6ef4421beb268b9f2fc057",
"86013daaae16572bceb755e65ee5fa2fdfb63848",
"8cf946e26dda4b335850195f661d78518a6870ca",
"a52defad31f7cc297559159c872ee54f1d94b300",
"080b1f2c8316dad80d8c385dfcb82335a64a4d29",
"3574657705475722b6c398c266805f758268778b",
"12d6a1bc055f40b5ac7b35a6b560483dfd5fb909",
"972bf3fbd8c7c6bc35d29a383f3805cca5ddd583",
"3b0045277fd4cd8134439ea29a6361dc8a63c2a6",
"5bc690391cb140731f88c8a68b4dee6dacd7097d",
"6c2a4fd3bae2ddae3f23558985de58dd7673378e",
"30d9132ef7845b8fb4e53d9ad982363700746928",
"85d555f7ce19740b4fc656ff797623c6e1513018",
"8204d8fef85ddd8c32e7b470c244a50910836263",
"6c0562ffc00ba7a4d2734ac039ffd181afe2008d",
"2f2cdd7b0c98b5e43b61272d2ac3ebb5cd29041d",
"7911a30950d0bd1e6fab291df51803b453b851be",
"c1761031e49fb73b185a73ddc8ba61c234fce646",
"454dd673096a64d5ed41e4afe246ff4059a40a1a",
"37d6841e5a5b11c8f187234ce2d1ee5ee2a888b2",
"27f071ccbea5a4940dcc585ba4cfa9258bf2bcdf",
"6111f1a9ab657910f5a11a95de117b3c5181565a",
"17f1ff82aca7a592a8815e8169b6e2210bf6ae7a",
"0abc3e83ccd6e685f8d0299f24f03ae28f4c2459",
"170a81df3ff2076fe9a3f2fdee0755a7310c2c41",
"43f6fbd92f450aab99fd58fde5e7c861898b33ae",
"3946a5c410ba1980d932cc6d2987b4d935e038d5",
"60f135af3eb5253394f4ff944062a1b9e6a0c564",
"9d0dfe6c2ffb2c1ff0715010688b213dfc1d0e9f",
"47dc52eeb7bf6efb46c550201cc8d52af71cc1a3",
"07aca048b6dbc583fed7434890a213b68dd4e0f1",
"1251fe24e96d5c12f868bf4584351c0ee03d55ec",
"24748ef2b88e6df370b5dccfb75cba47e132f92d",
"b2d12095065899f6fb0970b56d6a9f5ea5af1a2e",
"32a7c5e10a09b5532d56af50ef2f60d9776cc56a",
"69ccb255d3747bbebbd031d8c21cb870e5bf3b53",
"ad4a6346ef0da6704d2017ae48839644de92c9ba",
"4295e39f3e631fdd099481acb24b1e1fef772c9b",
"5edb4dd1952a63707f1ff73db5e507c21bb962f8",
"4ab4a666f5e5ed34ac219a9fdc2f70bd1cab0922"
],
"paperAbstract": "Public cloud software marketplaces already offer users a wealth of choice in operating systems, database management systems, financial software, and virtual networking, all deployable and configurable at the click of a button. Unfortunately, this level of customization has not extended to emerging hypervisor-level services, partly because traditional virtual machines (VMs) are fully controlled by only one hypervisor at a time. Currently, a VM in a cloud platform cannot concurrently use hypervisorlevel services from multiple third-parties in a compartmentalized manner. We propose the notion of a multihypervisor VM, which is an unmodified guest that can simultaneously use services from multiple coresident, but isolated, hypervisors. We present a new virtualization architecture, called Span virtualization, that leverages nesting to allow multiple hypervisors to concurrently control a guest\u2019s memory, virtual CPU, and I/O resources. Our prototype of Span virtualization on the KVM/QEMU platform enables a guest to use services such as introspection, network monitoring, guest mirroring, and hypervisor refresh, with performance comparable to traditional nested VMs.",
"pdfUrls": [
"https://www.usenix.org/system/files/conference/atc17/atc17-gopalan.pdf",
"https://www.usenix.org/sites/default/files/conference/protected-files/atc17_slides_gopalan.pdf",
"https://www.usenix.org/conference/atc17/technical-sessions/presentation/gopalan"
],
"pmid": "",
"s2PdfUrl": "http://pdfs.semanticscholar.org/4d22/eb245bbee568195c5e84a32c41284da0f5fc.pdf",
"s2Url": "https://semanticscholar.org/paper/075547a518e15af7e334fe66a845da4862d79af4",
"sources": [
"DBLP"
],
"title": "Multi-Hypervisor Virtual Machines: Enabling an Ecosystem of Hypervisor-level Services",
"venue": "USENIX Annual Technical Conference",
"year": 2017
},
"075ce944583b93b2dc7c2b3bbe53485780dfc7e2": {
"authors": [
{
"ids": [
"3359075"
],
"name": "Ewnetu Bayuh Lakew"
},
{
"ids": [
"1805880"
],
"name": "Alessandro Vittorio Papadopoulos"
},
{
"ids": [
"2753088"
],
"name": "Martina Maggio"
},
{
"ids": [
"2748720"
],
"name": "Cristian Klein"
},
{
"ids": [
"1685517"
],
"name": "Erik Elmroth"
}
],
"doi": "",
"doiUrl": "",
"entities": [
"Cloud computing",
"Control theory",
"Elasticity (cloud computing)",
"Experiment",
"Interactivity",
"LXC",
"Linux",
"Megabyte",
"Provisioning",
"Throughput"
],
"id": "075ce944583b93b2dc7c2b3bbe53485780dfc7e2",
"inCitations": [
"a8ccae500af3dbcfb2d2ce3701bea479a46e2556",
"bf1122c2881e6b48be951c930e61fb882c1cfa9d",
"5446eb3a622f5d14d4202395e2960892407ab00a"
],
"journalName": "2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)",
"journalPages": "589-598",
"journalVolume": "",
"outCitations": [
"42c9ffb48c907631d1471de313b3870a330a5182",
"9e98d529d158e2230d722f497fbc36373eaa8583",
"3c0bc4e9d30719269b0048d4f36752ab964145dd",
"0a96ed079dfa8768c4aba0226dd3e014a4f61f2c",
"ee981f0d7de58726989cdc14ac1b71f754adc621",
"6f5d96874b919df9e884a165a21859b860f2a5fd",
"2e72178091b2ca445f46200dcba71a53417b69eb",
"85dfe3c3053506f7602c410cfa97cc1595cd6143",
"5e8b0bce8fcc140c124241e0ac89121a13b40f92",
"48cd46d91c45f45b073d2d38a5fea45dbc3f7f1e",
"363db948ce2da7d84e3e9ee85e0182d0632bb33a",
"2af510fa15b09b6f2247691b73955fb1885797e4",
"605f6a93cc650c37dcb00c27da4f5026724523bc",
"725b58aa6b81490b9db8e9ed2d4a72c1d0fb366f",
"04c0c3d9f08c77de9ba448d64825c4f556c2de99",
"4beed7056c232d88ae0f5294034a710e06802eb4",
"eeaac9219d99c0dee5f194f598d1abe278cc9c92",
"6ec43f357fb62d16c853e1848bc02bd5aea98676",
"067c7857753e21e7317b556c86e30be60aa7cac0",
"0d2ccae6d37b9e4053fc476887d1565de58e5924",
"c2bc2e165fe6af3de5de600af57cb0b301ce0c0f",
"d3ee0f817b1909d3373c95d5133c485d15e0b77d",
"277f20ddc0e9fa593753ef2778110508372c597f",
"379d51fbe02b562a31719a1005a5c520508348c5",
"a4aa78a726fb277a94f08f301a7153b2ee5e4e92",
"0ec59b7fae15a7caa3256ba31b21802d455618c2",
"fa3b9aeaddbf900c6df1c6979e10dd3330e757da"
],
"paperAbstract": "Applications hosted in the cloud have become indispensable in several contexts, with their performance often being key to business operation and their running costs needing to be minimized. To minimize running costs, most modern virtualization technologies such as Linux Containers, Xen, and KVM offer powerful resource control primitives for individual provisioning – that enable adding or removing of fraction of cores and/or megabytes of memory for as short as few seconds. Despite the technology being ready, there is a lack of proper techniques for fine-grained resource allocation, because there is an inherent challenge in determining the correct composition of resources an application needs, with varying workload, to ensure deterministic performance. This paper presents a control-based approach for the management of multiple resources, accounting for the resource consumption, together with the application performance, enabling fine-grained vertical elasticity. The control strategy ensures that the application meets the target performance indicators, consuming as less resources as possible. We carried out an extensive set of experiments using different applications – interactive with response-time requirements, as well as noninteractive with throughput desires – by varying the workload mixes of each application over time. The results demonstrate that our solution precisely provides guaranteed performance while at the same time avoiding both resource over-and underprovisioning.",
"pdfUrls": [
"http://dl.acm.org/citation.cfm?id=3101192"
],
"pmid": "",
"s2PdfUrl": "",
"s2Url": "https://semanticscholar.org/paper/075ce944583b93b2dc7c2b3bbe53485780dfc7e2",
"sources": [
"DBLP"
],
"title": "KPI-Agnostic Control for Fine-Grained Vertical Elasticity",
"venue": "2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)",
"year": 2017
},
"075dfcf2d75023c51fdab755d747a3f9437883c1": {
"authors": [
{
"ids": [
"1682591"
],
"name": "Richard Wolski"
},
{
"ids": [
"1793260"
],
"name": "John Brevik"
},
{
"ids": [
"36319017"
],
"name": "Ryan Chard"
},
{
"ids": [
"3091414"
],
"name": "Kyle Chard"
}
],
"doi": "10.1145/3126908.3126953",
"doiUrl": "https://doi.org/10.1145/3126908.3126953",
"entities": [
"Amazon Elastic Compute Cloud (EC2)",
"F-Spot",
"Multitier architecture",
"Reduced cost",
"Service-level agreement",
"Signal trace",
"Virtual machine"
],
"id": "075dfcf2d75023c51fdab755d747a3f9437883c1",
"inCitations": [
"c57b90ab1ca73dd52ce1b1161e68f5feb652d694",
"ca7c6532d9174b15bb783a09c4c95d669e4fffd5",
"3f99bb743fa9576f8da7d168f3858dd0acf35e79"
],
"journalName": "",
"journalPages": "18:1-18:11",
"journalVolume": "",
"outCitations": [
"72d521432ec40e1c855f45f1cf88c1b77edfbb36",
"0935bb723e4071ccd4c2334d3b6d728faa111d11",
"48a6b370460dc8e6ce9c5a45eb39cf1fb654f1f3",
"0287a0c19b29b2497fd860b568dbb89cdf1a4813",
"4e44046bfb459c5f627ef141786773e2c4591de4",
"d608a95490b02839fdf71a412aab46ad20a70596",
"05be0db01d70bcce9530b462ab2368f9e15127d9",
"754eaf7f37708105f94b9798a30e177cd4c58f98",
"3cd6ad03a55a0450f34043bc5091cb9a6827255f",
"71de39ceaaa0efecc2c84ce8fe0af8ceb5ed79e7",
"bbbdaa8d70f767956358f365cebe80206ee20a4d",
"12c28dd5ea0b2d0269a67a43c2eb0b1207b2b889",
"9bea73e953bd714354829b4f0eda55f9eb1fa37f",
"4f86fa28602d9503a8575c5b31082284abc8415c",
"1da8852aa591d82f6dab3d93c8aba923e69a45d4",
"0364d9b50978071565a1abc6206daaa0b6178899",
"94859f850f345629c23526e1155aa9deb1852491",
"616ac1d7764f3586b26e482818b0070bd85b1288",
"51694f797b0d4a7e03b1e9a6587a9d4976e92297",
"b46bf5cfc2f721557c28d2809d6704dce1af1abc",
"031a2c591a08b89bf06de1d8277fe8fd3c1705ae"
],
"paperAbstract": "In this paper we propose D