Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2020
The Complexity of Cloning Candidates in Multiwinner Elections
AAMAS '20: Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent SystemsMay 2020, Pages 922–930We initiate the study of cloning in multiwinner elections, focusing on single-transferable vote (STV), single-nontransferable vote (SNTV), bloc, k-Borda, t-approval-CC, and Borda-CC. Transferring the model of cloning due to Elkind et al. [15] from ...
- research-articleApril 2020
Towards Performance Modeling of Speculative Execution for Cloud Applications
ICPE '20: Companion of the ACM/SPEC International Conference on Performance EngineeringApril 2020, Pages 17–19https://doi.org/10.1145/3375555.3384379Interesting approaches to counteract performance variability within cloud datacenters include sending multiple request clones, either immediately or after a specified waiting time. In this paper we present a performance model of cloud applications that ...
Modeling of Request Cloning in Cloud Server Systems using Processor Sharing
ICPE '20: Proceedings of the ACM/SPEC International Conference on Performance EngineeringApril 2020, Pages 24–35https://doi.org/10.1145/3358960.3379128The interest for studying server systems subject to cloned requests has recently increased. In this paper we present a model that allows us to equivalently represent a system of servers with cloned requests, as a single server. The model is very general,...
- research-articleDecember 2019
Reducing tail latency using duplication: a multi-layered approach
- Hafiz Mohsin Bashir,
- Abdullah Bin Faisal,
- M Asim Jamshed,
- Peter Vondras,
- Ali Musa Iftikhar,
- Ihsan Ayyub Qazi,
- Fahad R. Dogar
CoNEXT '19: Proceedings of the 15th International Conference on Emerging Networking Experiments And TechnologiesDecember 2019, Pages 246–259https://doi.org/10.1145/3359989.3365432Duplication can be a powerful strategy for overcoming stragglers in cloud services, but is often used conservatively because of the risk of overloading the system. We call for making duplication a first-class concept in cloud systems, and make two ...
Granular Cloning: Intra-Object Parallelism in Ensemble Studies
SIGSIM-PADS '18: Proceedings of the 2018 ACM SIGSIM Conference on Principles of Advanced Discrete SimulationMay 2018, Pages 165–176https://doi.org/10.1145/3200921.3200927Many runs of a computer simulation are needed to model uncertainty and evaluate alternate design choices. Such an ensemble of runs often contains many commonalities among the different individual runs. Simulation cloning is a technique that capitalizes ...
-
- research-articleSeptember 2016
A prototype-based approach for managing clones in clone-and-own product lines
SPLC '16: Proceedings of the 20th International Systems and Software Product Line ConferenceSeptember 2016, Pages 35–44https://doi.org/10.1145/2934466.2934487Feature models are commonly used in industrial contexts to guide and automate the derivation of product variants. However, in real-world product lines the derivation process goes beyond selecting and composing product features. Specifically, developers ...
- research-articleJune 2016
Replication of web-based pervasive display applications
PerDis '16: Proceedings of the 5th ACM International Symposium on Pervasive DisplaysJune 2016, Pages 204–211https://doi.org/10.1145/2914920.2915013Pervasive displays are increasingly employing web-based applications served by the cloud to show dynamic content and provide services to end users. In several important use cases, the content shown by one display needs to be replicated at multiple ...
- research-articleMarch 2016
Android Applications Repackaging Detection Techniques for Smartphone Devices
Procedia Computer Science (PROCS), Volume 78, Issue CMarch 2016, Pages 26–32https://doi.org/10.1016/j.procs.2016.02.006The problem of malwares affecting Smartphones has been widely recognized by the researchers across the world. Majority of these malwares target Android OS. Studies have found that most of the Android malwares hide inside repackaged apps to get inside ...
- ArticleJune 2015
Physically Unclonable Digital ID
MS '15: Proceedings of the 2015 IEEE International Conference on Mobile ServicesJune 2015, Pages 105–111https://doi.org/10.1109/MobServ.2015.24The Center for Strategic and International Studies estimates the annual cost from cyber crime to be more than $400 billion. Most notable is the recent digital identity thefts that compromised millions of accounts. These attacks emphasize the security ...
- research-articleJune 2015
Cloning Agent-based Simulation on GPU
SIGSIM PADS '15: Proceedings of the 3rd ACM SIGSIM Conference on Principles of Advanced Discrete SimulationJune 2015, Pages 173–182https://doi.org/10.1145/2769458.2769470Simulation cloning is an efficient way to analyze multiple configurations in a parameter exploration task. This paper presents a generic approach to perform incremental agent-based simulation cloning and discusses its implementation on GPU. Compared ...
- short-paperJune 2014
Cyber defenses for physical attacks and insider threats in cloud computing
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityJune 2014, Pages 519–524https://doi.org/10.1145/2590296.2590310In cloud computing, most of the computations and data in the data center do not belong to the cloud provider. This leaves owners of applications and data concerned about cyber and physical attacks which may compromise the confidentiality, integrity or ...
- ArticleJuly 2013
Exposing Clone RFID Tags at the Reader
TRUSTCOM '13: Proceedings of the 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and CommunicationsJuly 2013, Pages 1669–1674https://doi.org/10.1109/TrustCom.2013.207The basic premise of Radio Frequency Identification (RFID) is that objects are marked with "tags" which emit unique "serial numbers" obtainable by "readers" using radio signals. An increasingly popular RFID standard, Class-One Generation-Two (ISO 18000-...
- research-articleDecember 2012
Detection of doctored images using correlations of PSF
ICVGIP '12: Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image ProcessingDecember 2012, Article No.: 56, Pages 1–6https://doi.org/10.1145/2425333.2425389We address the problem of detection of image doctoring using correlations of Point Spread Function (PSF) and iterative blind deconvolution. Doctoring is a process of tampering or hampering or changing the content of an image in order to deceive people ...
- research-articleJune 2012
Clone structures in voters' preferences
EC '12: Proceedings of the 13th ACM Conference on Electronic CommerceJune 2012, Pages 496–513https://doi.org/10.1145/2229012.2229050In elections, a set of candidates ranked consecutively (though possibly in different order) by all voters is called a clone set, and its members are called clones. A clone structure is the family of all clone sets of a given election. In this paper we ...
- ArticleMay 2012
Molecular Cloning, Characterization and Functional Analysis of the Genes Encoding DXR and DXS, the Two Enzymes in the MEP Pathway, from Amomum villosum Lour.
ICBEB '12: Proceedings of the 2012 International Conference on Biomedical Engineering and BiotechnologyMay 2012, Pages 1060–1065https://doi.org/10.1109/iCBEB.2012.278Amomum villosum Lour. (officinal name Fructus Amomi) is one of the most well-known and authentic herbs in South China. Monoterpenes in its volatile oil are the main medicinal compounds. The condensation of pyruvate with D-glyceraldhyde-3-phosphate to ...
- ArticleMay 2012
Cloning and Sequence Analysis of LEAFY Homologue from Pistacia chinensis Bunge
ICBEB '12: Proceedings of the 2012 International Conference on Biomedical Engineering and BiotechnologyMay 2012, Pages 104–110https://doi.org/10.1109/iCBEB.2012.103A pair of degenerate primers was designed according to the conservative regions at the 3' terminus of the floral meristem identity genes (LEAFY). A 361 bp cDNA fragment of LEAFY homologous gene (PcBLFY) coding for 120 amino acid residues was amplified ...
- ArticleApril 2012
Assessment and Evaluation of Internet-Based Virtual Computing Infrastructure
ISORC '12: Proceedings of the 2012 IEEE 15th International Symposium on Object/Component/Service-Oriented Real-Time Distributed ComputingApril 2012, Pages 39–46https://doi.org/10.1109/ISORC.2012.14Virtualisation is a prevalent technology in current computing. Among the many aspects of virtualisation, it can be employed to reduce hardware costs by server consolidation, implement "green computing" by reducing power consumption and as an underpinning ...
- ArticleMarch 2012
Performance Measurements in iVIC Virtual Machine Clones
WAINA '12: Proceedings of the 2012 26th International Conference on Advanced Information Networking and Applications WorkshopsMarch 2012, Pages 1258–1263https://doi.org/10.1109/WAINA.2012.41Virtualisation is a prevalent technology in current computing. Virtualisation can reduce hardware costs by server consolidation, implement "green computing" by reducing power consumption and is an underpinning process for cloud computing enabling the ...
- ArticleDecember 2011
Reputation-Based trust for mobile agents
ADCONS'11: Proceedings of the 2011 international conference on Advanced Computing, Networking and SecurityDecember 2011, Pages 486–494https://doi.org/10.1007/978-3-642-29280-4_57Mobile Agents are self-contained objects that are not bound to the system on which it begins execution. Its features like mobility, cloning, learning and interactions introduces many security problems with hosts (agent platforms) on which they execute. ...
- research-articleJune 2011
Going back and forth: efficient multideployment and multisnapshotting on clouds
HPDC '11: Proceedings of the 20th international symposium on High performance distributed computingJune 2011, Pages 147–158https://doi.org/10.1145/1996130.1996152Infrastructure as a Service (IaaS) cloud computing has revolutionized the way we think of acquiring resources by introducing a simple change: allowing users to lease computational resources from the cloud provider's datacenter for a short time by ...