Share on Facebook Tweet on Twitter Share on LinkedIn Share by email
Our research
Content type
+
Downloads (455)
+
Events (449)
 
Groups (151)
+
News (2742)
 
People (735)
 
Projects (1106)
+
Publications (12580)
+
Videos (5746)
Labs
Research areas
Algorithms and theory47205 (341)
Communication and collaboration47188 (215)
Computational linguistics47189 (243)
Computational sciences47190 (223)
Computer systems and networking47191 (762)
Computer vision208594 (911)
Data mining and data management208595 (106)
Economics and computation47192 (105)
Education47193 (85)
Gaming47194 (77)
Graphics and multimedia47195 (233)
Hardware and devices47196 (216)
Health and well-being47197 (92)
Human-computer interaction47198 (894)
Machine learning and intelligence47200 (893)
Mobile computing208596 (57)
Quantum computing208597 (32)
Search, information retrieval, and knowledge management47199 (691)
Security and privacy47202 (311)
Social media208598 (46)
Social sciences47203 (264)
Software development, programming principles, tools, and languages47204 (623)
Speech recognition, synthesis, and dialog systems208599 (138)
Technology for emerging markets208600 (32)
1–25 of 762
Sort
Show 25 | 50 | 100
1234567Next 
Youshan Miao, Wentao Han, Kaiwei Li, Ming Wu, Fan Yang, Lidong Zhou, Vijayan Prabhakaran, Enhong Chen, and Wenguang Chen

Temporal graphs that capture graph changes over time are attracting increasing interest from research communities, for functions such as understanding temporal characteristics of social interactions on a time-evolving social graph. ImmortalGraph is a storage and execution engine designed and optimized specifically for temporal graphs. Locality is at the center of ImmortalGraph’s design: temporal graphs are carefully laid out in both persistent storage and memory, taking into account data locality in...

Publication details
Date: 1 December 2015
Type: Article
Publisher: ACM – Association for Computing Machinery
Abdullah-Al Mamun, Iyswarya Narayanan, Di Wang, Anand Sivasubramaniam, and Hosam K. Fathy
Publication details
Date: 1 October 2015
Type: Article
Publisher: ASME
Ioan Stefanovici, Eno Thereska, Greg O'Shea, Bianca Schroeder, Hitesh Ballani, Thomas Karagiannis, Ant Rowstron, and Tom Talpey

In data centers, caches work both to provide low IO latencies and to reduce the load on the back-end network and storage. But they are not designed for multi-tenancy; system-level caches today cannot be configured to match tenant or provider objectives. Exacerbating the problemis the increasing number of un-coordinated caches on the IO data plane. The lack of global visibility on the control plane to coordinate this distributed set of caches leads to inefficiencies, increasing cloud provider cost....

Publication details
Date: 27 August 2015
Type: Inproceeding
Publisher: ACM – Association for Computing Machinery
Virajith Jalaparti, Peter Bodik, Ishai Menache, Sriram Rao, Konstantin Makarychev, and Matt Caesar

To reduce the impact of network congestion on big data jobs, cluster management frameworks use various heuristics to schedule compute tasks and/or network flows. Most of these schedulers consider the job input data fixed and greedily schedule the tasks and flows that are ready to run. However, a large fraction of production jobs are recurring with predictable characteristics, which allows us to plan ahead for them. Coordinating the placement of data and tasks of these jobs allows for significantly...

Publication details
Date: 1 August 2015
Type: Inproceeding
Publisher: ACM SIGCOMM
Kalin Ovtcharov, Olatunji Ruwase, Joo-Young Kim, Jeremy Fowers, Karin Strauss, and Eric Chung
Publication details
Date: 1 August 2015
Type: Proceedings
Publisher: HOTCHIPS
Publication details
Date: 1 August 2015
Type: Inproceeding
Publisher: KDD
Paolo Costa, Hitesh Ballani, Kaveh Razavi, and Ian Kash

Rack-scale computers, comprising a large number of micro-servers connected by a direct-connect topology, are poised to replace servers as the building block in data centers. We focus on the problem of routing and congestion control across the rack's network, and find that high path diversity in rack topologies, in combination with workload diversity across it, means that traditional solutions are inadequate.

We present R2C2, a network stack for rack-scale computers providing flexible and...

Publication details
Date: 1 August 2015
Type: Inproceeding
Publisher: ACM – Association for Computing Machinery
Hitesh Ballani, Paolo Costa, Christos Gkantsidis, Matthew P. Grosvenor, Thomas Karagiannis, Lazaros Koromilas, and Greg O'Shea

Many network functions executed in modern datacenters, e.g., load balancing, application-level QoS, and congestion control, exhibit three common properties at the data plane: they need to access and modify state, to perform computations, and to access application semantics --- this is critical since many network functions are best expressed in terms of application-level messages. In this paper, we argue that the end hosts are a natural enforcement point for these functions and we present Eden, an...

Publication details
Date: 1 August 2015
Type: Inproceeding
Publisher: ACM – Association for Computing Machinery
Ding Li, James Mickens, Suman Nath, and Lenin

In a modern web application, a single high-level action like a mouse click triggers a flurry of asynchronous events on the client browser and remote web servers. We introduce Domino, a new tool which automatically captures and analyzes end-to-end, asynchronous causal relationship of events that span clients and servers. Using Domino, we found uncharacteristically long event chains in Bing Maps, discovered data races in the WinJS implementation of promises, and developed a new server-side scheduling...

Publication details
Date: 1 August 2015
Type: Inproceeding
Publisher: ACM Symposium on Cloud Computing conference (SOCC)
Keon Jang, Justine Sherry, Hitesh Ballani, and Toby Moncaster

Many cloud applications can benefit from guaranteed latency for their network messages, however providing such predictability is hard, especially in multi-tenant datacenters. We identify three key requirements for such predictability: guaranteed network bandwidth, guaranteed packet delay and guaranteed burst allowance. We present Silo, a system that offers these guarantees in multi-tenant datacenters. Silo leverages the tight coupling between bandwidth and delay: controlling tenant bandwidth leads to...

Publication details
Date: 1 August 2015
Type: Inproceeding
Publisher: ACM – Association for Computing Machinery
Jian Huang, Anirudh Badam, Ranveer Chandra, and Ed Nightingale

Size and weight constraints on wearables limit their battery capacity and restrict them from providing rich functionality. The need for durable and secure storage for personal data further compounds this problem as these features incur energy-intensive operations. This paper
presents WearDrive, a fast storage system for wearables based on battery-backed RAM and an efficient means to offload energy intensive tasks to the phone. WearDrive leverages low-power network connectivity available on...

Publication details
Date: 10 July 2015
Type: Inproceeding
Publisher: USENIX
Awards: Best Paper Award
Dan Alistarh, Milan Vojnovic, and Rati Gelashvili

Population protocols, roughly defined as systems consisting of large numbers of simple identical agents, interacting at random and updating their state following simple rules, are an important research topic at the intersection of distributed computing and biology. One of the fundamental tasks that a population protocol may solve is majority: each node starts in one of two states; the goal is for all nodes to reach a correct consensus on which of the two states was initially the majority....

Publication details
Date: 1 July 2015
Type: Inproceeding
Publisher: ACM – Association for Computing Machinery
Luo Mai, Chuntao Hong, and Paolo Costa

To cope with the ever growing availability of training data, there have been several proposals to scale machine learning computation beyond a single server and distribute it across a cluster. While this enables reducing the training time, the observed speed up is often limited by network bottlenecks.

To address this, we design MLNet, a host-based communication layer that aims to improve the network performance of distributed machine learning systems. This is achieved through a combination of...

Publication details
Date: 1 July 2015
Type: Inproceeding
Publisher: USENIX – Advanced Computing Systems Association
Jinglei Ren, Chieh-Jan Mike Liang, Yongwei Wu, and Thomas Moscibroda

Current data storage on smartphones mostly inherits from desktop/server systems a flash-centric design: The memory (DRAM) effectively acts as an I/O cache for the relatively slow flash. To improve both app responsiveness and energy efficiency, this paper proposes MobiFS, a memory-centric design for smartphone data storage. This design no longer exercises cache writeback at short fixed periods or on file synchronization calls. Instead, it incrementally checkpoints app data into flash at appropriate...

Publication details
Date: 1 July 2015
Type: Inproceeding
Publisher: USENIX – Advanced Computing Systems Association
Konstantinos Karanasos, Sriram Rao, Carlo Curino, Chris Douglas, Kishore Chaliparambil, Giovanni Fumarola, Solom Heddaya, Raghu Ramakrishnan, and Sarvesh Sakalanaga

Datacenter-scale computing for analytics workloads is increasingly common. High operational costs force heterogeneous applications to share cluster resources for achieving economy of scale. Scheduling such large and diverse workloads is inherently hard, and existing approaches tackle this in two alternative ways: 1) centralized solutions offer strict, secure enforcement of scheduling invariants (e.g., fairness, capacity) for heterogeneous applications, 2) distributed solutions offer...

Publication details
Date: 1 July 2015
Type: Inproceeding
Publisher: USENIX – Advanced Computing Systems Association
Dan Alistarh, Thomas Sauerwald, and Milan Vojnovic

In this work, we consider the following random process, motivated by the analysis of lock-free concurrent algorithms under high memory contention. In each round, a new scheduling step is allocated to one of $n$ threads, according to a distribution $\vect{p} = (p_1, p_2, \ldots, p_n)$, where thread $i$ is scheduled with probability $p_i$. When some thread first reaches a set threshold of executed steps, it registers a \emph{win}, completing its current operation, and resets its step count to $1$. At...

Publication details
Date: 1 July 2015
Type: Inproceeding
Publisher: ACM – Association for Computing Machinery
Dan Alistarh, Rati Gelashvili, and Adrian Vladu

The problem of electing a leader from among n contenders is one of the fundamental questions in distributed computing. In its simplest formulation, the task is as follows: given n processors, all participants must eventually return a win or lose indication, such that a single contender may win. Despite a considerable amount of work on leader election, the following question is still open: can we elect a leader in an asynchronous fault-prone system faster than...

Publication details
Date: 1 July 2015
Type: Inproceeding
Publisher: ACM – Association for Computing Machinery
Jian Huang, Anirudh Badam, Moinuddin K. Qureshi, and Karsten Schwann

Applications can map data on SSDs into virtual memory to transparently scale beyond DRAM capacity, permitting them to leverage high SSD capacities with few code changes. Obtaining good performance for memory-mapped SSD content, however, is hard because the virtual memory layer, the file system and the flash translation layer (FTL) perform address translations, sanity and permission checks independently from each other. We introduce FlashMap, an SSD interface that is
optimized for memory-mapped...

Publication details
Date: 13 June 2015
Type: Inproceeding
Publisher: ACM/IEEE
Kyungmin Lee, David Chu, Eduardo Cuervo, Johannes Kopf, Yury Degtyarev, Sergey Grizan, Alec Wolman, and Jason Flinn

Gaming on phones, tablets and laptops is very popular. Cloud gaming -- where remote servers perform game execution and rendering on behalf of thin clients that simply send input and display output frames -- promises any device the ability to play any game any time. Unfortunately, the reality is that wide-area network latencies are often prohibitive; cellular, Wi-Fi and even wired residential end host round trip times (RTTs) can exceed 100ms, a threshold above which many gamers tend to deem...

Publication details
Date: 3 June 2015
Type: Proceedings
Publisher: ACM – Association for Computing Machinery
Anurag Khandelwal, Navendu Jain, and Seny Kamara

The ubiquitous growth in the popularity of public cloud computing platforms as seen today entails an inherent risk: the shared nature of data center networks (DCNs) renders co-hosted tenants susceptible to attacks from within the network. In this paper, we discuss the security mechanisms offered by popular cloud service providers at present, and explore the extent to which existing data center networks might be vulnerable to internal denial-of-service attacks. We describe two categories of attacks: the...

Publication details
Date: 1 June 2015
Type: Technical report
Number: MSR-TR-2015-52
Bo Zong, Christos Gkantsidis, and Milan Vojnovic

We study the problem of placing streaming queries into servers. Unlike previous work, we focus on queries that consume events of relative low rates, each computed in a single server (i.e. no scaling out per query). However, we need to place a very large and dynamic number of queries in relatively few servers. Our focus is motivated by the need to support a platform for hosting end-user streaming queries that may come from a variety of applications, such as the Cortana personal assistant.

The...

Publication details
Date: 1 June 2015
Type: Inproceeding
Publisher: ACM – Association for Computing Machinery
Jiansong Zhang, Jin Zhang, Kun Tan, Lin Yang, Yongguang Zhang, and Qian Zhang
Publication details
Date: 1 June 2015
Type: Inproceeding
Publisher: ACM Mobihoc 2015
Hongyi Zeng, Ratul Mahajan, Nick McKeown, George Varghese, Lihua Yuan, and Ming Zhang

Troubleshooting large operational networks is extremely difficult due to the extensive usage of multipath routing. We present NetSonar, a system that localizes performance problems in such networks. It uses planned tomography, whose input comes from a novel test technique that maximizes component coverage while minimizing probing overhead. Earlier techniques are either white box (assuming complete knowledge of network’s forwarding state) or black box (assuming no knowledge). We argue that the...

Publication details
Date: 1 June 2015
Type: Technical report
Number: MSR-TR-2015-55
Chen Liu, Xiaojiang Chen, Dingyi Fang, Dan Xu, Zhanyong Tang, and Chieh-Jan Mike Liang
Publication details
Date: 1 June 2015
Type: Inproceeding
Publisher: ACM – Association for Computing Machinery
Vasileios Karakostas, Jayneel Gandhi, Furkan Ayar, Adrián Cristal, Mark D. Hill, Kathryn S. McKinley, Mario Nemirovsky, Michael M. Swift, and Osman Ünsal

Page-based virtual memory improves programmer productivity, security, and memory utilization, but incurs performance overheads due to costly page table walks after TLB misses. This overhead can reach 50% for modern workloads that access increasingly vast memory with stagnating TLB sizes.

To reduce the overhead of virtual memory, this paper proposes Redundant Memory Mappings (RMM), which leverage ranges of pages and provides an efficient, alternative representation...

Publication details
Date: 1 June 2015
Type: Inproceeding
Publisher: ACM/IEEE International Symposium on Computer Architecture (ISCA)
1–25 of 762
Sort
Show 25 | 50 | 100
1234567Next 
> Our research