Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
WannaLaugh: A Configurable Ransomware Emulator - Learning to Mimic Malicious Storage Traces
SYSTOR '24: Proceedings of the 17th ACM International Systems and Storage ConferencePages 118–131https://doi.org/10.1145/3688351.3689163Ransomware, a fearsome and an evolving cybersecurity threat, continues to inflict severe consequences on individuals and organizations worldwide. Traditional detection methods, reliant on static signatures and application behavioral patterns, are ...
- research-articleOctober 2023
Empowering Storage Systems Research with NVMeVirt: A Comprehensive NVMe Device Emulator
ACM Transactions on Storage (TOS), Volume 19, Issue 4Article No.: 32, Pages 1–26https://doi.org/10.1145/3625006There have been drastic changes in the storage device landscape recently. At the center of the diverse storage landscape lies the NVMe interface, which allows high-performance and flexible communication models required by these next-generation device ...
- research-articleMay 2023
Wind turbine emulator control improvement using nonlinear PI controller for wind energy conversion system: Design and real‐time implementation
International Journal of Adaptive Control and Signal Processing (ACSP), Volume 37, Issue 5Pages 1151–1165https://doi.org/10.1002/acs.3566SummaryWind turbine emulators (WTE) have become a necessity for testing, developing, and improving design and control strategies in the renewable energy domain. The aim of this paper is to realize an experimental standalone wind energy conversion system ...
- research-articleJuly 2022
RISC-V Console: A Containerized RISC-V Based Game Console Emulator for Education
ITiCSE '22: Proceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education Vol. 1Pages 145–150https://doi.org/10.1145/3502718.3524791The rapid transition to online education due to the COVID-19 pandemic left many instructors needing to redesign their course projects as students no longer had access to physical hardware. This paper describes the development of an open-source ...
- research-articleJune 2022
Almost-linear ε-emulators for planar graphs
STOC 2022: Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of ComputingPages 1311–1324https://doi.org/10.1145/3519935.3519998We study vertex sparsification for distances, in the setting of planar graphs with distortion: Given a planar graph G (with edge weights) and a subset of k terminal vertices, the goal is to construct an ε-emulator, which is a small planar graph G′ that ...
-
- research-articleJanuary 2022
Performance evaluation of SDWNs in cloud systems
International Journal of Information and Communication Technology (IJICT), Volume 21, Issue 4Pages 445–456https://doi.org/10.1504/ijict.2022.126492The bursty traffic conditions and fast mobility of consumers induce significant delays in wireless networks. Taking the aforementioned factors into account, designing cost-effective wireless solutions with efficient resource usage and manageability is ...
- research-articleJanuary 2021
The Random Feature Model for Input-Output Maps between Banach Spaces
SIAM Journal on Scientific Computing (SISC), Volume 43, Issue 5Pages A3212–A3243https://doi.org/10.1137/20M133957XWell known to the machine learning community, the random feature model is a parametric approximation to kernel interpolation or regression methods. It is typically used to approximate functions mapping a finite-dimensional input space to the real line. In ...
- short-paperJune 2018
WebLinux: a scalable in-browser and client-side Linux and IDE
L@S '18: Proceedings of the Fifth Annual ACM Conference on Learning at ScaleArticle No.: 45, Pages 1–2https://doi.org/10.1145/3231644.3231703"WebLinux" is a web app tool providing a standard Linux OS and an IDE in the browser, including a terminal, a code editor and a file browser. It provides a client-side and offline Linux OS environment based on a Javascript emulated processor. By ...
- demonstrationMay 2018
Mobicomonkey: context testing of Android apps
MOBILESoft '18: Proceedings of the 5th International Conference on Mobile Software Engineering and SystemsPages 76–79https://doi.org/10.1145/3197231.3197234The functionality of many mobile applications is dependent on various contextual, external factors. Depending on unforeseen scenarios, mobile apps can even malfunction or crash. In this paper, we have introduced MobiCoMonkey - automated tool that allows ...
- research-articleJune 2018
Data-Driven Polynomial Ridge Approximation Using Variable Projection
SIAM Journal on Scientific Computing (SISC), Volume 40, Issue 3Pages A1566–A1589https://doi.org/10.1137/17M1117690Inexpensive surrogates are useful for reducing the cost of science and engineering studies involving large-scale, complex computational models with many input parameters. A ridge approximation is one class of surrogate that models a quantity of interest ...
- research-articleOctober 2017
Near memory key/value lookup acceleration
MEMSYS '17: Proceedings of the International Symposium on Memory SystemsPages 26–33https://doi.org/10.1145/3132402.3132434In the "Big Data" era, fast lookup of keys in a key/value store is a ubiquitous operation. We have designed a near memory accelerator combining simple hardware building blocks to accelerate lookup in a hash table based key/value store. We report on the ...
- research-articleAugust 2017
Mechanics automatically recognized via interactive observation: jumping
FDG '17: Proceedings of the 12th International Conference on the Foundations of Digital GamesArticle No.: 25, Pages 1–10https://doi.org/10.1145/3102071.3102104Jumping has been an important mechanic since its introduction in Donkey Kong. It has taken a variety of forms and shown up in numerous games, with each jump having a different feel. In this paper, we use a modified Nintendo Entertainment System (NES) ...
- research-articleOctober 2016
Evaluating the feasibility of storage class memory as main memory
MEMSYS '16: Proceedings of the Second International Symposium on Memory SystemsPages 437–441https://doi.org/10.1145/2989081.2989118Storage class memory offers the prospect of large capacity persistent memory with DRAM-like access latency. In this work, we evaluate the performance of a small set of benchmarks using SCM as main memory. We use an FPGA emulator to model a range of ...
- tutorialAugust 2016
Adaptive Synchronization Interface for Hardware-Software Co-Simulation based on SystemC and QEMU
SIMUTOOLS'16: Proceedings of the 9th EAI International Conference on Simulation Tools and TechniquesPages 28–36This paper presents a runtime reconfigurable interface for Hardware-Software Co-Simulations. We present our research project for autonomously configuring smart home networks, in which our hardware-software co-simulation is used to simulate network ...
- short-paperAugust 2016
Mininet-WiFi: A Platform for Hybrid Physical-Virtual Software-Defined Wireless Networking Research
SIGCOMM '16: Proceedings of the 2016 ACM SIGCOMM ConferencePages 607–608https://doi.org/10.1145/2934872.2959070Software-Defined Wireless Networking (SDWN) is being considered an appealing paradigm to design and operate wireless networks through higher-level abstractions and programmatic interfaces such as the OpenFlow protocol. Identified benefits include cost ...
- posterJuly 2016
Applying Virtualization Technology for the Construction of Trusted Executable Environment
SIN '16: Proceedings of the 9th International Conference on Security of Information and NetworksPages 65–66https://doi.org/10.1145/2947626.2947642This paper reviews the task of trusted executable environment construction. It analyses current solutions, highlights their disadvantages. Requirements for trusted executable environment are provided. The article also presents an approach of hardware ...
- research-articleJanuary 2016
Dynamic Approximate All-Pairs Shortest Paths: Breaking the $O(mn)$ Barrier and Derandomization
SIAM Journal on Computing (SICOMP), Volume 45, Issue 3Pages 947–1006https://doi.org/10.1137/140957299We study dynamic $(1+\epsilon)$-approximation algorithms for the all-pairs shortest paths problem in unweighted undirected $n$-node $m$-edge graphs under edge deletions. The fastest algorithm for this problem is a randomized algorithm with a total update ...
- articleNovember 2015
Sequential design for achieving estimated accuracy of global sensitivities
Applied Stochastic Models in Business and Industry (ASMBI), Volume 31, Issue 6Pages 782–800https://doi.org/10.1002/asmb.2091Global sensitivity analysis provides information on the relative importance of the input variables for simulator functions used in computer experiments. It is more conclusive than screening methods for determining if a variable is influential, ...
- ArticleAugust 2015
Termite: Emulation Testbed for Encounter Networks
MOBIQUITOUS'15: proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services on 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and ServicesPages 31–40https://doi.org/10.4108/eai.22-7-2015.2260069Cutting-edge mobile devices like smartphones and tablets are equipped with
various infrastructureless wireless interfaces, such as WiFi Direct and
Bluetooth. Such technologies allow for novel mobile applications that take
advantage of casual ...
- research-articleDecember 2014
Morpheus: automatically generating heuristics to detect Android emulators
ACSAC '14: Proceedings of the 30th Annual Computer Security Applications ConferencePages 216–225https://doi.org/10.1145/2664243.2664250Emulator-based dynamic analysis has been widely deployed in Android application stores. While it has been proven effective in vetting applications on a large scale, it can be detected and evaded by recent Android malware strains that carry detection ...