Follow


Reports from 2007

PDF

DNA repair in incipient Alzheimer's disease Monika Ray and Weixiong Zhang
Technical Report

Abstract:

Alzheimer’s disease (AD) is a progressive neurodegenerative disorder currently with no cure. Understanding the pathogenesis in the early stages of late-onset AD can help gain important mechanistic insights into this disease as well as aid in effective drug development. The analysis of incipient AD is steeped in difficulties due to its slight pathological and genetic differences from normal ageing. The difficulty also lies in the choice of analysis techniques as statistical power to analyse incipient AD with a small sample size, as is common in pilot studies, can be low ...Read More

PDF

Single cell expression profiling reveals major disruption of DNA repair capacity in incipient Alzheimer's Disease Monika Ray and Weixiong Zhang
Technical Report

Abstract:

Understanding the pathogenesis in the early stages of late-onset Alzheimer's disease (LOAD) can help in gaining important mechanistic insights into this devastating neurodegenerative disorder. Alzheimer's disease (AD) is characterised by extensive cell death with disease progression. In this paper laser capture microdissection (LCM) based gene expression profiling, which is able to profile gene expression in a single cell type, is employed to analyse the gene expression regulation of incipient AD. Our analysis shows that LCM based gene expression profiling of neurons has a critical advantage over the conventional gene expression ...Read More

PDF

Distributed Allocation of Workflow Tasks in MANETs Rohan Sen, Gruia-Catalin Roman, and Christopher Gill
Technical Report

Abstract:

When multiple participants work on a workflow that represents a large, collaborative activity, it is important to have a well defined process to determine the portions of the workflow that each participant is responsible for executing. In this paper, we describe a process and related algorithms required to assign tasks in a workflow, to hosts that are willing to carry out the execution of these tasks, and thereby contributing to the completion of the activity. This problem is a stylized form of the multi-processor scheduling algorithm which has been shown ...Read More

PDF

Implementing Legba: Fine-Grained Memory Protection Sheffield, Sowell, and Wilson
Technical Report

Abstract:

Fine-grained hardware protection could provide a powerful and effective means for isolating untrusted code. However, previous techniques for providing fine-grained protection in hardware have lead to poor performance. Legba has been proposed as a new caching architecture, designed to reduce the granularity of protection, without slowing down the processor. Unfortunately, the designers of Legba have not attempted an implementation. Instead, all of their analysis is based purely on simulations. We present an implementation of the Legba design on a MIPS Core Processor, along with an analysis of our observations and ...Read More

PDF

Splice: A Standardized Peripheral Logic and Interface Creation Engine Justin Thiel
Technical Report

Abstract:

Recent advancements in FPGA technology have allowed manufacturers to place general-purpose processors alongside user-configurable logic gates on a single chip. At first glance, these integrated devices would seem to be the ideal deployment platform for hardware-software co-designed systems, but some issues, such as incompatibility across vendors and confusion over which bus interfaces to support, have impeded adoption of these platforms. This thesis describes the design and operation of Splice, a software-based code generation tool intended to address these types of issues by providing a bus-independent structure that allows end-users to ...Read More

PDF

Splice: A Standardized Peripheral Logic and Interface Creation Engine, Master's Thesis, May 2007 Justin Thiel
Technical Report

Abstract:

Recent advancements in FPGA technology have allowed manufacturers to place general-purpose processors alongside user-configurable logic gates on a single chip. At first glance, these integrated devices would seem to be the ideal deployment platform for hardware-software co-designed systems, but some issues, such as incompatibility across vendors and confusion over which bus interfaces to support, have impeded adoption of these platforms. This thesis describes the design and operation of Splice, a software-based code generation tool intended to address these types of issues by providing a bus-independent structure that allows end-users to ...Read More

PDF

Scheduling Induced Bounds and the Verification of Preemptive Real-Time Systems Terry Tidwell, Christopher Gill, and Venkita Subramonian
Technical Report

Abstract:

Distributed real-time and embedded (DRE) systems have stringent constraints on timeliness and other properties whose assurance is crucial to correct system behavior. Our previous research has shown that detailed models of essential middleware mechanisms can be developed, composed, and for constrained examples verified tractably, using state of the art timed automata model checkers. However, to apply model checking to a wider range of real-time systems, particularly those involving more general forms of preemptive concurrency, new techniques are needed to address decidability and tractability concerns. This paper makes three contributions to ...Read More

PDF

Strong Performance Guarantees for Asynchronous Buffered Crossbar Schedulers Jonathon Turner
Technical Report

Abstract:

Crossbar-based switches are commonly used to implement routers with throughputs up to about 1 Tb/s. The advent of crossbar scheduling algorithms that provide strong performance guarantees now makes it possible to engineer systems that perform well, even under extreme traffic conditions. Until recently, such performance guarantees have only been developed for crossbars that switch cells rather than variable length packets. Cell-based crossbars incur a worst-case bandwidth penalty of up to a factor of two, since they must fragment variable length packets into fixed length cells. In addition, schedulers for cell-based ...Read More

PDF

Network Access in a Diversified Internet M. Wilson, F. Kuhns, and J. Turner
Technical Report

Abstract:

There is a growing interest in virtualized network infrastructures as a means to enable experimental evaluation of new network architectures on a realistic scale. The National Science Foundation's GENI initiative seeks to develop a national experimental facility that would include virtualized network platforms that can support many concurrent experimental networks. Some researchers seek to make virtualization a central architectural component of a future Internet, so that new network architectures can be introduced at any time, without the barriers to entry that currently make this difficult. This paper focuses on how ...Read More

PDF

Experimental Evaluation of a Coarse-Grained Switch Scheduler Charlie Wiseman, Jon Turner, Ken Wong, and Brandon Heller
Technical Report

Abstract:

Modern high performance routers rely on sophisticated interconnection networks to meet ever increasing demands on capacity. Regulating the flow of packets through these interconnects is critical to providing good performance, particularly in the presence of extreme traffic patterns that result in sustained overload at output ports. Previous studies have used a combination of analysis and idealized simulations to show that coarse-grained scheduling of traffic flows can be effective in preventing congestion, while ensuring high utilization. In this paper, we study the performance of a coarse-grained scheduler in a real router ...Read More

PDF

Configurable Component Middleware for Distributed Real-Time Systems with Aperiodic and Periodic Tasks Yuanfang Zhang, Christopher Gill, and Chenyang Lu
Technical Report

Abstract:

Many distributed real-time applications must handle mixed periodic and aperiodic tasks with diverse requirements. However, existing middleware lacks flexible configuration mechanisms needed to manage end-to-end timing easily for a wide range of different applications with both periodic and aperiodic tasks. The primary contribution of this work is the design, implementation and performance evaluation of the first configurable component middleware services for admission control and load balancing of aperiodic and periodic tasks in distributed real-time systems. Empirical results demonstrate the need for and effectiveness of our configurable component middleware approach in ...Read More

PDF

Customizing Component Middleware for Distributed Real-Time Systems with Aperiodic and Periodic Tasks Yuanfang Zhang, Christopher Gill, and Chenyang Lu
Technical Report

Abstract:

Many distributed real-time applications must handle mixed aperiodic and periodic tasks with diverse requirements. However, existing middleware lacks flexible configuration mechanisms needed to manage end-to-end timing easily for a wide range of different applications with both aperiodic and periodic tasks. The primary contribution of this work is the design, implementation and performance evaluation of the first configurable component middleware services for admission control and load balancing of aperiodic and periodic tasks in distributed real-time systems. Empirical results demonstrate the need for, and the effectiveness of, our configurable component middleware approach ...Read More

PDF

Leveraging EST Evidence to Automatically Predict Alternatively Spliced Genes, Master's Thesis, December 2006 Robert Zimmermann
Technical Report

Abstract:

Current methods for high-throughput automatic annotation of newly sequenced genomes are largely limited to tools which predict only one transcript per gene locus. Evidence suggests that 20-50% of genes in higher eukariotic organisms are alternatively spliced. This leaves the remainder of the transcripts to be annotated by hand, an expensive time-consuming process. Genomes are being sequenced at a much higher rate than they can be annotated. We present three methods for using the alignments of inexpensive Expressed Sequence Tags in combination with HMM-based gene prediction with N-SCAN EST to recreate ...Read More

Reports from 2006

PDF

Adaptive Embedded Roadmaps for Sensor Networks Gazihan Alankus, Nuzhet Atay, Chenyang Lu, and Burchan Bayazit
Technical Report

Abstract:

In this paper, we propose a new approach to wireless sensor network assisted navigation while avoiding moving dangers. Our approach relies on an embedded roadmap in the sensor network that always contains safe paths. The roadmap is adaptive, i.e., it adapts its topology to changing dangers. The mobile robots in the environment uses the roadmap to reach their destinations. We evaluated the performance of embedded roadmap both in simulations using realistic conditions and with real hardware. Our results show that the proposed navigation algorithm is better suited for sensor networks ...Read More

PDF

Mixed-Integer Linear Programming Solution to Multi-Robot Task Allocation Problem Nuzhet Atay and Burchan Bayazit
Technical Report

Abstract:

Multi-robot systems require efficient and accurate planning in order to perform mission-critical tasks. This paper introduces a mixed-integer linear programming solution to coordinate multiple heterogenenous robots for detecting and controlling multiple regions of interest in an unknown environment. The objective function contains four basic requirements of a multi-robot system serving this purpose: control regions of interest, provide communication between robots, control maximum area and detect regions of interest. Our solution defines optimum locations of robots in order to maximize the objective function while efficiently satisfying some constraints such as avoiding ...Read More

PDF

Perceptually Meaningful Image Editing: Depth Reynold J. Bailey and Cindy Grimm
Technical Report

Abstract:

We introduce the concept of perceptually meaningful image editing and present two techniques for manipulating the apparent depth of objects in an image. The user loads an image, selects an object and specifies whether the object should appear closer or further away. The system automatically determines target values for the object and/or background that achieve the desired depth change. These depth editing operations, based on techniques used by traditional artists, manipulate either the luminance or color temperature of different regions of the image. By performing blending in the gradient domain ...Read More

PDF

The Real Effect of Warm-Cool Colors Reynold J. Bailey; Cindy M, Grimm; and Chris Davoli
Technical Report

Abstract:

The phenomenon of warmer colors appearing nearer in depth to viewers than cooler colors has been studied extensively by psychologists and other vision researchers. The vast majority of these studies have asked human observers to view physically equidistant, colored stimuli and compare them for relative depth. However, in most cases, the stimuli presented were rather simple: straight colored lines, uniform color patches, point light sources, or symmetrical objects with uniform shading. Additionally, the colors used were typically highly saturated. Although such stimuli are useful in isolating and studying depth cues ...Read More

PDF

Smooth Key-framing using the Image Plane Leon Barrett and Cindy Grimm
Technical Report

Abstract:

This paper demonstrates the use of image-space constraints for key frame interpolation. Interpolating in image-space results in sequences with predictable and controlable image trajectories and projected size for selected objects, particularly in cases where the desired center of rotation is not fixed or when the key frames contain perspective distortion changes. Additionally, we provide the user with direct image-space control over {\em how} the key frames are interpolated by allowing them to directly edit the object's projected size and trajectory. Image-space key frame interpolation requires solving the inverse camera problem ...Read More

PDF

The Remote-Clique Problem Revisited Benjamin E. Birnbaum
Technical Report

Abstract:

Given a positive integer k and a complete graph with non-negative edge weights that satisfy the triangle inequality, the remote-clique problem is to find a subset of k vertices having a maximum-weight induced subgraph. A greedy algorithm for the problem has been shown to have an approximation ratio of 4, but this analysis was not shown to be tight. In this thesis, we present an algorithm called d-Greedy Augment that generalizes this greedy algorithm (they are equivalent when d = 1). We use the technique of factor-revealing linear programs to ...Read More

PDF

An Improved Analysis for a Greedy Remote-Clique Algorithm using Factor-Revealing LPs Benjamin E. Birnbaum and Kenneth J. Goldman
Technical Report

Abstract:

Given a complete graph with nonnegative edge weights satisfying the triangle inequality and a positive integer p, the remote-clique problem is to find a subset of p vertices having a maximum-weight induced subgraph. A simple greedy algorithm for the problem has been shown to have an approximation ratio of 4, but a tight example has not been provided. In this paper, we use the technique of factor revealing linear programs to prove that this algorithm actually achieves an approximation ratio of 2, matching the best-known ratio for the problem. The ...Read More

PDF

Real-Time Memory Management: Life and Times Andrew Borg, Andy Wellings, Christopher Gill, and Ron K. Cytron
Technical Report

Abstract:

As high integrity real-time systems become increasingly large and complex, forcing a static model of memory usage becomes untenable. The challenge is to provide a dynamic memory model that guarantees tight and bounded time and space requirements without overburdening the developer with memory concerns. This paper provides an analysis of memory management approaches in order to characterise the tradeoffs across three semantic domains: space, time and a characterisation of memory usage information such as the lifetime of objects. A unified approach to distinguishing the merits of each memory model highlights ...Read More

PDF

A Thesis on Sketch-Based Techniques for Mesh Deformation and Editing Raquel Bujans
Technical Report

Abstract:

The goal of this research is to develop new and more intuitive ways for editing a mesh from a static camera angle. I present two ways to edit a mesh via a simple sketching system. The first method is a gray-scale editor which allows the user to specify a fall off function for the region being deformed. The second method is a profile editor in which the user can re-sketch a mesh’s profile. Lastly, the types of edits possible will be discussed and our results will be presented.

...Read More

PDF

Flexible Maximum Urgency First Scheduling for Distributed Real-Time Systems Yingming Chen and Chenyang Lu
Technical Report

Abstract:

PDF

Dynamic Conflict-free Query Scheduling for Wireless Sensor Networks Octav Chipara, Chenyang Lu, and John Stankovic
Technical Report

Abstract:

With the emergence of high data rate sensor network applications, there is an increasing demand for high-performance query services in such networks. To meet this challenge, we present Dynamic Conflict-free Query Scheduling (DCQS), a novel scheduling technique for queries in wireless sensor networks. In contrast to earlier TDMA protocols designed for general-purpose networks and workloads, DCQS is specifically designed for query services supporting in-network data aggregation. DCQS has several important features. First, it optimizes the query performance and energy efficiency by exploiting the temporal properties and precedence constraints introduced by ...Read More

PDF

Limit Crossing for Decision Problems Sharlee Climer and Weixiong Zhang
Technical Report

Abstract:

Limit crossing is a methodology in which modified versions of a problem are solved and compared, yielding useful information about the original problem. Pruning rules that are used to exclude portions of search trees are excellent examples of the limit-crossing technique. In our previous work, we examined limit crossing for optimization problems. In this paper, we extend this methodology to decision problems. We demonstrate the use of limit crossing in our design of a tool for identifying K-SAT backbones. This tool is guaranteed to identify all of the backbone variables ...Read More

PDF

activePDF-Toolk Washington University in St. Louis Computer Science Engineering Department
Technical Report

Abstract:

This document provides information for deploying activePDF Toolkit Professional in a development environment. This document is organized into four sections: Getting Started, Tutorials, Technical Reference and the Toolkit Appendices. The Getting Started section covers setup and installation, includes a product overview and information related to operating Toolkit Professional. Tutorials includes examples of many Toolkit features, including PDF generation and form filling. All of the tutorials can be used with activePDF Toolkit. Technical Reference provides detailed information on Toolkit’s objects, subobjects, methods and properties.

...Read More

PDF

Algorithms and Architectures for Network Search Processors Sarang Dharmapurikar
Technical Report

Abstract:

The continuous growth in the Internet’s size, the amount of data traffic, and the complexity of processing this traffic gives rise to new challenges in building high-performance network devices. One of the most fundamental tasks performed by these devices is searching the network data for predefined keys. Address lookup, packet classification, and deep packet inspection are some of the operations which involve table lookups and searching. These operations are typically part of the packet forwarding mechanism, and can create a performance bottleneck. Therefore, fast and resource efficient algorithms are required. ...Read More

PDF

Fast Packet Classification Using Bloom Filters Sarang Dharmapurikar, Haoyu Song, Jonathan Turner, and John Lockwood
Technical Report

Abstract:

While the problem of general packet classification has received a great deal of attention from researchers over the last ten years, there is still no really satisfactory solution. Ternary Content Addressable Memory (TCAM), although widely used in practice, is both expensive and consumes a lot of power. Algorithmic solutions, which rely on commodity memory chips, are relatively inexpensive and power-efficient, but have not been able to match the generality and performance of TCAMs. In this paper we propose a new approach to packet classification, which combines architectural and algorithmic techniques. ...Read More

PDF

Agilla: A Mobile Agent Middleware for Sensor Networks Chien-Liang Fok, Gruia-Catalin Roman, and Chenyang Lu
Technical Report

Abstract:

Agilla is a mobile agent middleware for sensor networks. Mobile agents are special processes that can migrate across sensors. They increase network flexibility by enabling active in-network reprogramming. Neighbor lists and tuple spaces are used for agent coordination. Agilla was originally implemented on Mica2 motes, but has been ported to other platforms. Its Mica2 implementation consumes 41.6KB of code and 3.59KB of data memory. Agents can move five hops in less than 1.1s with over 92% success. Agilla was used to develop multiple applications related to fire detection and tracking, ...Read More

PDF

Distributed Utilization Control for Real-time Clusters with Load Balancing Yong Fu, Hongan Wang, Chenyang Lu, and Ramu S. Chandra
Technical Report

Abstract:

Recent years have seen rapid growth of online services that rely on large-scale server clusters to handle high volume of requests. Such clusters must adaptively control the CPU utilizations of many processors in order to maintain desired soft real-time performance and prevent system overload in face of unpredictable workloads. This paper presents DUC-LB, a novel distributed utilization control algorithm for cluster-based soft real-time applications. Compared to earlier works on utilization control, a distinguishing feature of DUC-LB is its capability to handle system dynamics caused by load balancing, which is a ...Read More

PDF

Control of Decoherence in Open Quantum Systems Narayan Ganesan
Technical Report

Abstract:

PDF

Feature Detection Using Curvature Maps and the Min-Cut/Max-Flow Graph Cut Algorithm Timothy Gatzke and Cindy Grimm
Technical Report

Abstract:

Automatic detection of features in three-dimensional objects is a critical part of shape matching tasks such as object registration and recognition. Previous approaches to local surface matching have either focused on man-made objects, where features are generally well-defined, or required some type of user interaction to select features. Manual selection of corresponding features and subjective determination of the difference between objects are time consuming processes requiring a high level of expertise. Curvature is a useful property of a surface, but curvature calculation on a discrete mesh is often noisy and ...Read More

PDF

A Theory of Load Adjustments and its Implications for Congestion Control Sergey Gorinsky, Manfred Georg, Maxim Podlesny, and Christoph Jechlitschek
Technical Report

Abstract:

Multiplicative Increase (MI), Additive Increase (AI), and Multiplicative Decrease (MD) are linear adjustments used extensively in networking. However, their properties are not fully understood. We analyze responsiveness (time for the total load to reach the target load), smoothness (maximal size of the total load oscillations after reaching the target load), fairing speed (speed of convergence to equal individual loads) and scalabilities of MAIMD algorithms, which generalize AIMD algorithms via optional inclusion of MI. We prove that an MAIMD can provide faster asymptotic fairing than a less smooth AIMD. Furthermore, we ...Read More

PDF

Smooth Surface Reconstruction using Charts for Medical Data Cindy Grimm and Tao Ju
Technical Report

Abstract:

We present a surface reconstruction technique that constructs a smooth analytic surface from scattered data. The technique is robust to noise and both poorly and non-uniformly sampled data, making it well-suited for use in medical applications. In addition, the surface can be parameterized in multiple ways, making it possible to represent additional data, such as electromagnetic potential, in a different (but related) coordinate system to the geometric one. The parameterization technique also supports consistent parameterizations of multiple data sets.

...Read More

PDF

Sliver: A BPEL Workflow Process Execution Engine for Mobile Devices Gregory Hackmann, Mart Haitjema, Christopher Gill, and Catalin-Gruia Roman
Technical Report

Abstract:

The Business Process Execution Language (BPEL) has become the dominant means for expressing traditional business processes as workflows. The widespread deployment of mobile devices like PDAs and mobile phones has created a vast computational and communication resource for these workflows to exploit. However, BPEL so far has been deployed only on relatively heavyweight server platforms such as Apache Tomcat, leaving the potential created by these lower-end devices untapped. This paper presents Sliver, a BPEL workflow process execution engine that supports a wide variety of devices ranging from mobile phones to ...Read More

PDF

MobiWork: Mobile Workflow for MANETs Gregory Hackmann, Rohan Sen, Mart Haitjema, Gruia-Catalin Roman, and Gill
Technical Report

Abstract:

The workflow model is well suited for scenarios where many entities work collaboratively towards a common goal, and is used widely today to model complex business processes. However, the fundamental workflow model is very powerful and can be applied to a wider variety of application domains. This paper represents an initial investigation into the possibility of using workflows to model collaboration in an ad hoc mobile environment. Moving to a mobile setting introduces many challenges as the mobility of the participants in a workflow imposes constraints on allocation of workflow ...Read More

PDF

Acceleration of Gapped Alignment in BLASTP Using the Mercury System Brandon B. Harris
Technical Report

Abstract:

Protein databases have grown exponentially over the last decade. This exponential growth has made extracting valuable information from these databases increasingly time consuming. This project presents a new method of accelerating a commonly used program for performing similarity searching on protein databases, BLASTP. This project describes the design and implementation of Mercury BLASTP, a customized hardware accelerated variant of BLASTP. This project focuses on the gapped alignment stage of Mercury BLASTP and provides design details and implementation results.

...Read More

PDF

Virtualization for a Network Processor Runtime System Brandon Heller, Jonathan Turner, John DeHart, and Patrick Crowley
Technical Report

Abstract:

The continuing ossification of the Internet is slowing the pace of network innovation. Network diversification presents one solution to this problem, by virtualizing the network at multiple layers. Diversified networks consist of a shared physical substrate, virtual routers (metarouters), and virtual links (metalinks). Virtualizing routers enables smooth and incremental upgrades to new network services. Our current priority for a diversified router prototype is to enable reserved slices of the network for researchers to perform repeatable, high-speed network experiments. General-purpose processors have well established techniques for virtualization, but do not scale ...Read More

PDF

Design and analysis of an accelerated seed generation stage for BLASTP on the Mercury system - Master's Thesis, August 2006 Arpith Jacob
Technical Report

Abstract:

NCBI BLASTP is a popular sequence analysis tool used to study the evolutionary relationship between two protein sequences. Protein databases continue to grow exponentially as entire genomes of organisms are sequenced, making sequence analysis a computationally demanding task. For example, a search of the E. coli. k12 proteome against the GenBank Non-Redundant database takes 36 hours on a standard workstation. In this thesis, we look to address the problem by accelerating protein searching using Field Programmable Gate Arrays. We focus our attention on the BLASTP heuristic, building on work done ...Read More

PDF

Fair Efficiency, or Low Average Delay without Starvation Christoph Jechlitschek and Sergey Gorinksky
Technical Report

Abstract:

Elastic applications are primarily interested in minimal delay achievable for their messages under current network load. In this paper, we investigate how to transmit such messages over a bottleneck link efficiently and fairly.

PDF

Dynamic Resource Management in a Static Network Operating System Kevin Klues, Vlado Handziski, David Culler, David Gay, Phillip Levis Levis, Chenyang Lu, and Adam Wolisz
Technical Report

Abstract:

We present novel approaches to managing three key resources in an event-driven sensornet OS: memory, energy, and peripherals. We describe the factors that necessitate using these new approaches rather than existing ones. A combination of static allocation and compile-time virtualization isolates resources from one another, while dynamic management provides the flexibility and sharing needed to minimize worst-case overheads. We evaluate the effectiveness and efficiency of these management policies in comparison to those of TinyOS 1.x, SOS, MOS, and Contiki. We show that by making memory, energy, and peripherals first-class abstractions, ...Read More

PDF

A Unified Architecture for Flexible Radio Power Management in Wireless Sensor Networks Kevin Klues, Guoliang Xing, and Chenyang Lu
Technical Report

Abstract:

A challenge for many wireless sensor networks is to remain operational for long periods of time on a very limited power supply. While many power management protocols have been proposed, a solution does not yet exist that allows them to be seamlessly integrated into the existing systems. In this paper we study the architectural support required to resolve this issue. We propose a framework that separates sleep scheduling from the basic MAC layer functionality and provide a set of unified interfaces between them. This framework enables different sleep scheduling policies ...Read More

PDF

Link Layer Support for Unified Radio Power Management In Wireless Sensor Networks Kevin Klues, Guoliang Xing, and Chenyang Lu
Technical Report

Abstract:

Radio power management is of paramount concern in wireless sensor networks that must achieve long lifetimes on scarce amounts of energy. While a multitude of power management protocols have been proposed in the past, the lack of system support for flexibly integrating them with a diverse set of applications and network platforms has made them difficult to use. Instead of proposing yet another power management protocol, this paper focuses on providing link layer support towards realizing a Unified Power Management Architecture (UPMA) for flexible radio power management in wireless sensor ...Read More

PDF

Towards a Unified Radio Power Management Architecture for Wireless Sensor Networks Kevin Klues, Guoliang Xing, and Chenyang Lu
Technical Report

Abstract:

In many wireless sensor networks, energy is an extremely limited resource. While many different power management strategies have been proposed to help reduce the amount of energy wasted, application developers still face two fundamental challenges when developing systems with stringent power constraints. First, existing power management strategies are usually tightly coupled with network protocols and other system functionality. This monolithic approach has led to standalone solutions that cannot easily be reused or extended to other applications or platforms. Second, different power management strategies make different and sometimes even conflicting assumptions ...Read More

PDF

Efficient Mapping of Virtual Networks onto a Shared Substrate Jing Lu and Jonathan Turner
Technical Report

Abstract:

Virtualization has been proposed as a vehicle for overcoming the growing problem of internet ossification [1]. This paper studies the problem of mapping diverse virtual networks onto a common physical substrate. In particular, we develop a method for mapping a virtual network onto a substrate network in a cost-efficient way, while allocating sufficient capacity to virtual network links to ensure that the virtual network can handle any traffic pattern allowed by a general set of traffic constraints. Our approach attempts to find the best topology in a family of backbone-star ...Read More

PDF

Acceleration of Profile-HMM Search for Protein Sequences in Reconfigurable Hardware - Master's Thesis, May 2006 Rahul Pratap Maddimsetty
Technical Report

Abstract:

Profile Hidden Markov models are highly expressive representations of functional units, or motifs, conserved across protein sequences. Profile-HMM search is a powerful computational technique that is used to annotate new sequences by identifying occurrences of known motifs in them. With the exponential growth of protein databases, there is an increasing demand for acceleration of such techniques. We describe an accelerator for the Viterbi algorithm using a two-stage pipelined design in which the first stage is implemented in parallel reconfigurable hardware for greater speedup. To this end, we identify algorithmic modifications ...Read More

PDF

Automatic Application-Specific Customization of Softcore Processor Microarchitecture, Masters Thesis, May 2006 Shobana Padmanabhan
Technical Report

Abstract:

Applications for constrained embedded systems are subject to strict runtime and resource utilization bounds. With soft core processors, application developers can customize the processor for their application, constrained by available hardware resources but aimed at high application performance. The more reconfigurable the processor is, the more options the application developers will have for customization and hence increased potential for improving application performance. However, such customization entails developing in-depth familiarity with all the parameters, in order to configure them effectively. This is typically infeasible, given the tight time-to-market pressure on the ...Read More

PDF

Preserving Performance of Byzantine Fault Tolerant Replica Groups in the Presence of Malicious Clients Sajeeva L. Pallemulle, Haraldur D. Thorvaldsson, and Kenneth J. Goldman
Technical Report

Abstract:

The Castro and Liskov Byzantine Fault Tolerance protocol for replicated state machines (CLBFT) provides a practical means of tolerating arbitrary replica failures in replicated passive data servers. For better performance, CLBFT uses Message Authentication Codes (MAC) instead of public Key cryptography to authenticate messages and preserves replica consistency even in the presence of malicious clients. However, CLBFT is susceptible to potential attacks by malicious clients using corrupted MACs to force replica groups into expensive configuration changes repeatedly. While not affecting correctness, this vulnerability can seriously impair the performance of the ...Read More

PDF

Multimodal Congestion Control for Low Stable-State Queuing Maxim Podlesny and Sergey Gorinsky
Technical Report

Abstract:

To discover an efficient fair sending rate for a flow, Transmission Control Protocol (TCP) saturates the bottleneck link and its buffer until the router discards a packet. Such TCP-caused queuing is detrimental for interactive and other delay-sensitive applications. In this paper, we present Multimodal Control Protocol (MCP) which strives to maintain low queues and avoid congestion losses at network links. The multimodal MCP engages routers and hosts in limited explicit communication. A distinguishing property of MCP is stable transmission after converging to efficient fair states. To ensure convergence to fairness, ...Read More

PDF

Design Issues of Reserved Delivery Subnetworks, Doctoral Dissertation, May 2006 Ruibiao Qiu
Technical Report

Abstract:

The lack of per-flow bandwidth reservation in today's Internet limits the quality of service that an information service provider can provide. This dissertation introduces the reserved delivery subnetwork (RDS), a mechanism that provides consistent quality of service by implementing aggregate bandwidth reservation. A number of design and deployment issues of RDSs are studied. First, the configuration problem of a single-server RDS is formulated as a minimum concave cost network flow problem, which properly reflects the economy of bandwidth aggregation, but is also an NP-hard problem. To make the RDS configuration ...Read More