Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
input-output programs
biblio
I/O Efficient Approximate Nearest Neighbour Search based on Learned Functions
Submitted by aekwall on Mon, 02/22/2021 - 12:46pm
data-sensitive hashing-based methods
multimedia database
learned index structure
learned hashing
learned functions
input-output programs
indexing
I/O efficiency
high dimensional space
function approximation
external storage scenarios
external memory
data-sensitive indexing
data privacy
approximate nearest neighbour search
ANNS
nearest neighbor search
search problems
file organisation
Predictive Metrics
Measurement
query processing
neural nets
pubcrawl
learning (artificial intelligence)
nearest neighbour methods
biblio
HashTag Erasure Codes: From Theory to Practice
Submitted by grigby1 on Mon, 11/02/2020 - 10:40am
Scalability
maintenance engineering
MDS erasure codes
minimum-storage regenerating codes
MSR constructions
pubcrawl
Reed-Solomon codes
regenerating codes
repair-bandwidth
lowest data-read
single and multiple failures
small sub-packetization level
storage management
storage overhead
sub-packetization level
Systematics
Twitter
access-optimal
input-output programs
i/o systems security
I/O operations
i-o systems security
HTECs
high-rate MDS codes
hashtag sign
HashTag erasure codes
Hadoop
encoding
distributed storage
Distributed databases
data analysis
code construction
Bandwidth
biblio
A Method for Performance Optimization of Virtual Network I/O Based on DPDK-SRIOV*
Submitted by grigby1 on Mon, 11/02/2020 - 10:40am
optimization
virtualized network
Virtualization
virtualisation
virtual network security tester
virtual network
virtual machines
Throughput
Switches
SRIOV technology
security of data
Scalability
pubcrawl
physical network card
performance optimization
performance evaluation
cyber security
optimisation
network security testing devices
Kernel
input-output programs
I/O throughput performance
i/o systems security
I/O requirement
i-o systems security
high-performance network
Hardware
general hardware platform
DPDK-SRIOV.
DPDK-SRIOV
data plane development kit
biblio
Improving MPI Collective I/O for High Volume Non-Contiguous Requests With Intra-Node Aggregation
Submitted by grigby1 on Fri, 10/30/2020 - 11:19am
MPI collective I/O
Writing
two-phase I/O
security
Scalability
request redistribution
pubcrawl
Program processors
Production
performance evaluation
parallel processing
parallel jobs
Parallel I/O
non-contiguous I/O
MPI processes
Aggregates
message passing
Libraries
intranode aggregation
internode communication contention
Intel KNL
input-output programs
i-o systems security
I-O Systems
high volume noncontiguous requests
Haswell processors
Cray XC40 parallel computers
collective MPI-IO functions
Benchmark testing
biblio
Design and Implementation of Azalea unikernel file IO offload
Submitted by grigby1 on Fri, 10/30/2020 - 11:18am
Libraries
unikernel transfers
unikernel
Telecommunications
storage management
software libraries
security
Scalability
pubcrawl
operating systems (computers)
operating systems
operating system kernels
Offloading
Linux
azalea unikernel file IO offload
Kernel
Io offload
input-output programs
i-o systems security
I-O Systems
File systems
file system
file servers
file server
file organisation
file IO result
file IO command
biblio
Smart I/O Modules for Mitigating Cyber-Physical Attacks on Industrial Control Systems
Submitted by grigby1 on Fri, 10/30/2020 - 11:18am
input-output programs
smart I/O modules
security of data
security
Scalability
Safety
runtime enforcement
Runtime
real-world physical systems
pubcrawl
programmable logic controller I/O modules
programmable controllers
production engineering computing
Power Grid
Monitoring
malicious attacks
control engineering computing
Industries
Industrial Control Systems
industrial control
i-o systems security
I-O Systems
hardware architecture
Hardware
embedded systems
embedded control
cyber-physical systems (CPSs)
cyber-physical systems
cyber-physical attacks mitigation
Cyber-physical attacks
CPS
control systems
biblio
Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries
Submitted by grigby1 on Fri, 10/30/2020 - 11:15am
Scalability
page cache eviction
parallel processing
powerful privilege-escalation attacks
program diagnostics
proof-of-concept Waylaying algorithm
pubcrawl
Random access memory
rowhammer attacks
Rowhammer bug
running time
microarchitectural security threat
security
security of data
system memory
system monitoring
time 15.0 min to 200.0 min
unprivileged instructions
unprivileged posix fadvise API
victim binary
Waylaying algorithm
Waylaying method
I-O Systems
application program interfaces
binary relocation step
cache storage
Computer bugs
disk
DRAM chips
Dynamic Random Access Memory cells
exploitable physical addresses
Hardware
Heuristic algorithms
advanced Memway algorithm
i-o systems security
in-memory swapping
in-memory waylaying acceleration
input-output programs
Kernel
Linux
Linux page cache
Linux tmpfs
mainstream platforms
Memway+fadvise relocation scheme
biblio
Toward I/O-efficient protection against silent data corruptions in RAID arrays
Submitted by BrandonB on Thu, 04/30/2015 - 1:11pm
RAID
user write sizes
trace-driven simulation
taxonomy
Systematics
storage workloads
silent data corruptions
security of data
Redundancy
read-write characteristics
RAID arrays
arrays
IO-efficient protection
IO-efficient integrity checking mechanisms
integrity protection schemes
integrity checking model
input-output programs
I/O overhead
disk errors
disk drives
Data models
data integrity