Search
Now showing items 241-250 of 290
Initial report on Object Spreadsheets
(2016-01-12)
There is a growing demand for data-driven web applications that help automate organizational and business processes of low to medium complexity by letting users view and update structured data in controlled ways. We present ...
Bridging Theory and Practice in Cache Replacement
(2015-12-19)
Much prior work has studied processor cache replacement policies, but a large gap remains between theory and practice. The optimal policy (MIN) requires unobtainable knowledge of the future, and prior theoretically-grounded ...
Cache Calculus: Modeling Caches through Differential Equations
(2015-12-19)
Caches are critical to performance, yet their behavior is hard to understand and model. In particular, prior work does not provide closed-form solutions of cache performance, i.e. simple expressions for the miss rate of a ...
Filtered Iterators For Safe and Robust Programs in RIFL
(2015-12-27)
We present a new language construct, filtered iterators, for safe and robust input processing. Filtered iterators are designed to eliminate many common input-processing errors while enabling robust continued execution. The ...
Report on the 2015 NSF Workshop on Unified Annotation Tooling
(2016-11-08)
On March 30 & 31, 2015, an international group of twenty-three researchers with expertise in linguistic annotation convened in Sunny Isles Beach, Florida to discuss problems with and potential solutions for the state of ...
Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata
(2016-10-05)
Alpenhorn is the first system for initiating an encrypted connection between two users that provides strong privacy and forward secrecy guarantees for metadata (i.e., information about which users connected to each other) ...
Examining Key Mobility Resources through Denial of Service Attacks on proposed Global Name Resolution Services
(2016-09-26)
The problem we address in this thesis is to uncover the design elements in a network architecture design that may open it up to denial of service (DoS) attacks and to expose the tradeoffs in mitigating those DoS opportunities. ...
Towards Practical Theory: Bayesian Optimization and Optimal Exploration
(2016-05-26)
This thesis discusses novel principles to improve the theoretical analyses of a class of methods, aiming to provide theoretically driven yet practically useful methods. The thesis focuses on a class of methods, called ...
Evaluating Caching Mechanisms In Future Internet Architectures
(2016-06-28)
This thesis seeks to test and evaluate the effects of in-network storage in novel proposed Internet architectures in terms of their performance. In a world where more and more people are mobile and connected to the Internet, ...
Flowtune: Flowlet Control for Datacenter Networks
(2016-08-15)
Rapid convergence to a desired allocation of network resources to endpoint traffic has been a long-standing challenge for packet-switched networks. The reason for this is that congestion control decisions are distributed ...