Search For:

Displaying 1-50 out of 157 total
Report on the tenth ICFP programming contest
Found in: Proceeding of the 13th ACM SIGPLAN international conference on Functional programming (ICFP '08)
By Alexey Rodriguez, Andres Loh, Arie Middelkoop, Bastiaan Heeren, Clara Loh, Eelco Dolstra, Johan Jeuring, John van Schie, Jurriaan Hage, Stefan Holdermans
Issue Date:September 2008
pp. 25-28
The ICFP programming contest is a 72-hour contest, which attracts thousands of contestants from all over the world. In this report we describe what it takes to organise this contest, the main ideas behind the contest we organised, the task, how to solve it...
     
A Configurable and Strong RAS Solution for Die-Stacked DRAM Caches
Found in: IEEE Micro
By Jaewoong Sim,Gabriel H. Loh,Vilas Sridharan,Mike O'Connor
Issue Date:May 2014
pp. 80-90
The resiliency problem of die-stacked memory will become important because of its lack of serviceability. This article details how to provide practical and cost-effective reliability, availability, and serviceability support for die-stacked DRAM cache arch...
 
Increasing TLB reach by exploiting clustering in page translations
Found in: 2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA)
By Binh Pham,Abhishek Bhattacharjee,Yasuko Eckert,Gabriel H. Loh
Issue Date:February 2014
pp. 558-567
The steadily increasing sizes of main memory capacities require corresponding increases in the processor's translation lookaside buffer (TLB) resources to avoid performance bottlenecks. Large operating system page sizes can mitigate the bottleneck with a s...
   
Optimizing GPU energy efficiency with 3D die-stacking graphics memory and reconfigurable memory interface
Found in: ACM Transactions on Architecture and Code Optimization (TACO)
By Gabriel H. Loh, Guangyu Sun, Jishen Zhao, Yuan Xie
Issue Date:December 2013
pp. 1-25
The performance of graphics processing unit (GPU) systems is improving rapidly to accommodate the increasing demands of graphics and high-performance computing applications. With such a performance improvement, however, power consumption of GPU systems is ...
     
A Masking Index for Quantifying Hidden Glitches
Found in: 2013 IEEE International Conference on Data Mining (ICDM)
By Laure Berti-Equille,Ji Meng Loh,Tamraparni Dasu
Issue Date:December 2013
pp. 21-30
Data glitches are errors in a data set, they are complex entities that often span multiple attributes and records. When they co-occur in data, the presence of one type of glitch can hinder the detection of another type of glitch. This phenomenon is called ...
 
Design and Analysis of 3D-MAPS (3D Massively Parallel Processor with Stacked Memory)
Found in: IEEE Transactions on Computers
By Dae Hyun Kim,Krit Athikulwongse,Michael B. Healy,Mohammad M. Hossain,Moongon Jung,Ilya Khorosh,Gokul Kumar,Young-Joon Lee,Dean L. Lewis,Tzu-Wei Lin,Chang Liu,Shreepad Panth,Mohit Pathak,Minzhen Ren,Guanhao Shen,Taigon Song,Dong Hyuk Woo,Xin Zhao,Joungho Kim,Ho Choi,Gabriel H. Loh,Hsien-Hsin Lee,Sung Kyu Lim
Issue Date:October 2013
pp. 1
This paper describes the architecture, design, analysis, and simulation and measurement results of the 3D-MAPS (3D massively parallel processor with stacked memory) chip built with a 1.5V, 130nm process technology and a two-tier 3D stacking technology usin...
 
App Analytic: A Study on Correlation Analysis of App Ranking Data
Found in: 2013 International Conference on Cloud and Green Computing (CGC)
By Sun-Young Ihm, Woong-Kee Loh, Young-Ho Park
Issue Date:September 2013
pp. 561-563
In recent years, app store and android market have experienced a significant growth in terms of app numbers. Since we discover 85% of apps through the ranks, it is important to develop effective app ranking analyzing tools. In this paper, we present a meth...
 
Performance metrics for serious games: Will the (real) expert please step forward?
Found in: 2013 18th International Conference on Computer Games: AI, Animation, Mobile, Interactive Multimedia, Educational & Serious Games (CGAMES)
By Christian S. Loh,Yanyan Sheng
Issue Date:July 2013
pp. 202-206
The literature on human training performance has long attested to the behavioral differences between experts and novices, in which ‘competency’ is a demonstrable attribute based on a person's course of action in problem solving. The advances in technology ...
   
Resilient die-stacked DRAM caches
Found in: Proceedings of the 40th Annual International Symposium on Computer Architecture (ISCA '13)
By Gabriel H. Loh, Jaewoong Sim, Mike O'Connor, Vilas Sridharan
Issue Date:June 2013
pp. 416-427
Die-stacked DRAM can provide large amounts of in-package, high-bandwidth cache storage. For server and high-performance computing markets, however, such DRAM caches must also provide sufficient support for reliability and fault tolerance. While conventiona...
     
Top Picks from the 2012 Computer Architecture Conferences
Found in: IEEE Micro
By Babak Falsafi,Gabriel H. Loh
Issue Date:May 2013
pp. 4-7
This special issue is the tenth in an important tradition in the computer architecture community: IEEE Micro's Top Picks from the Computer Architecture Conferences. This tradition provides a means for sharing a sample of the best papers published in comput...
 
Human mobility characterization from cellular network data
Found in: Communications of the ACM
By Alexander Varshavsky, Chris Volinsky, James Rowland, Ji Meng Loh, Karrie Hanson, Margaret Martonosi, Ramón Cáceres, Richard Becker, Sibren Isaacman, Simon Urbanek
Issue Date:January 2013
pp. 74-82
Anonymous location data from cellular phone networks sheds light on how people move around on a large scale.
     
Fundamental Latency Trade-off in Architecting DRAM Caches: Outperforming Impractical SRAM-Tags with a Simple and Practical Design
Found in: 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)
By Moinuddin K. Qureshi,Gabe H. Loh
Issue Date:December 2012
pp. 235-246
This paper analyzes the design trade-offs in architecting large-scale DRAM caches. Prior research, including the recent work from Loh and Hill, have organized DRAM caches similar to conventional caches. In this paper, we contend that some of the basic desi...
 
A Mostly-Clean DRAM Cache for Effective Hit Speculation and Self-Balancing Dispatch
Found in: 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)
By Jaewoong Sim,Gabriel H. Loh,Hyesoon Kim,Mike OConnor,Mithuna Thottethodi
Issue Date:December 2012
pp. 247-257
Die-stacking technology allows conventional DRAM to be integrated with processors. While numerous opportunities to make use of such stacked DRAM exist, one promising way is to use it as a large cache. Although previous studies show that DRAM caches can del...
 
Effect of Data Repair on Mining Network Streams
Found in: 2012 IEEE 12th International Conference on Data Mining Workshops
By Ji Meng Loh,Tamraparni Dasu
Issue Date:December 2012
pp. 226-233
Data quality issues have special implications in network data. Data glitches are propagated rapidly along pathways dictated by the hierarchy and topology of the network. In this paper, we use temporal data from a vast data network to study data glitches an...
 
Deterministic Parallel Programming with Haskell
Found in: Computing in Science & Engineering
By D. Coutts,A. Loh
Issue Date:November 2012
pp. 36-43
Haskell is a modern, functional programming language with an interesting story to tell about parallelism: rather than using concurrent threads and locks, Haskell offers a variety of libraries that enable concise, high-level parallel programs with results t...
 
Managed data: modular strategies for data abstraction
Found in: Proceedings of the ACM international symposium on New ideas, new paradigms, and reflections on programming and software (Onward! '12)
By Alex Loh, Tijs van der Storm, William R. Cook
Issue Date:October 2012
pp. 179-194
Managed Data is a two-level approach to data abstraction in which programmers first define data description and manipulation mechanisms, and then use these mechanisms to define specific kinds of data. Managed Data allows programmers to take control of many...
     
Botanicus Interacticus: interactive plants technology
Found in: ACM SIGGRAPH 2012 Emerging Technologies (SIGGRAPH '12)
By Ivan Poupyrev, Jonas Loh, Munehiko Sato, Philipp Schoessler
Issue Date:August 2012
pp. 1-1
Botanicus Interacticus is a technology for designing highly expressive interactive plants, both living and artificial. We are motivated by the rapid fusion of computing and our dwelling spaces, as well as the increasingly tactile and gestural nature of our...
     
Energy-efficient GPU design with reconfigurable in-package graphics memory
Found in: Proceedings of the 2012 ACM/IEEE international symposium on Low power electronics and design (ISLPED '12)
By Gabriel H. Loh, Guangyu Sun, Jishen Zhao, Yuan Xie
Issue Date:July 2012
pp. 403-408
We propose an energy-efficient reconfigurable in-package graphics memory design that integrates wide-interface graphics DRAMs with GPU on a silicon interposer. We reduce the memory power consumption by scaling down the supply voltage and frequency while ma...
     
Staged memory scheduling: achieving high performance and scalability in heterogeneous systems
Found in: Proceedings of the 39th Annual International Symposium on Computer Architecture (ISCA '12)
By Gabriel H. Loh, Kevin Kai-Wei Chang, Lavanya Subramanian, Onur Mutlu, Rachata Ausavarungnirun
Issue Date:June 2012
pp. 416-427
When multiple processor (CPU) cores and a GPU integrated together on the same chip share the off-chip main memory, requests from the GPU can heavily interfere with requests from the CPU cores, leading to low system performance and starvation of CPU cores. ...
     
Supporting Very Large DRAM Caches with Compound-Access Scheduling and MissMap
Found in: IEEE Micro
By Gabriel H. Loh,Mark D. Hill
Issue Date:May 2012
pp. 70-78
This work efficiently enables conventional block sizes for very large die-stacked DRAM caches with two innovations: it makes hits faster with compound-access scheduling and misses faster with a MissMap. The combination of these mechanisms enables the new o...
 
Self-stabilizing sensor networks for emergency management
Found in: Pervasive Computing and Communications Workshops, IEEE International Conference on
By Stefan Lohs,Reinhardt Karnapke,Jorg Nolte,Andreas Lagemann
Issue Date:March 2012
pp. 715-720
Wireless sensor networks gather data, which is then transmitted in a sense-and-send manner to a central sink. The large number of sensor nodes makes configuring them before deployment impossible, resulting in the need for self configuration. The possibly l...
 
Efficiently enabling conventional block sizes for very large die-stacked DRAM caches
Found in: Proceedings of the 44th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-44 '11)
By Gabriel H. Loh, Mark D. Hill
Issue Date:December 2011
pp. 454-464
Die-stacking technology enables multiple layers of DRAM to be integrated with multicore processors. A promising use of stacked DRAM is as a cache, since its capacity is insufficient to be all of main memory (for all but some embedded systems). However, a 1...
     
A register-file approach for row buffer caches in die-stacked DRAMs
Found in: Proceedings of the 44th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-44 '11)
By Gabriel H. Loh
Issue Date:December 2011
pp. 351-361
Die-stacked DRAMs have been proposed that combine multiple layers of dense memory cells with a base logic layer to implement peripheral circuitry (decoders, sense amps), interface logic, and test structures. Even after implementing these various features, ...
     
Preventing PCM banks from seizing too much power
Found in: Proceedings of the 44th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-44 '11)
By Andrew Hay, Doug Burger, Gabriel H. Loh, Karin Strauss, Timothy Sherwood
Issue Date:December 2011
pp. 186-195
Widespread adoption of Phase Change Memory (PCM) requires solutions to several problems recently addressed in the literature, including limited endurance, increased write latencies, and system-level changes required to exploit non-volatility. One important...
     
First Prototype of Aquatic Tool Kit: Towards Low-Cost Intelligent Larval Fish Counting in Hatcheries
Found in: Dependable, Autonomic and Secure Computing, IEEE International Symposium on
By Brian C.S. Loh,Valliappan Raman,Patrick H.H. Then
Issue Date:December 2011
pp. 192-195
The demand for aquaculture tools have been increasing due to the rising needs for fish. Several factors show the potential requirements for software solutions. For instance, the continual market value growth of fish, government focus on innovative technolo...
 
Enhancing the Quality of Recommendations through Expert and Trusted Agents
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Fabiana Lorenzi,Mara Abel,Stanley Loh,André Peres
Issue Date:November 2011
pp. 329-335
In multi-agent recommender systems, agents are able to generate recommendations according to the preferences of the customer. However, in some domains, specific knowledge is required in order to compose a recommendation and this knowledge may be not availa...
 
Thread-aware dynamic shared cache compression in multi-core processors
Found in: Computer Design, International Conference on
By Yuejian Xie,Gabriel H. Loh
Issue Date:October 2011
pp. 135-141
When a program's working set exceeds the size of its last-level cache, performance may suffer due to the resulting off-chip memory accesses. Cache compression can increase the effective cache size and therefore reduce misses, but compression also introduce...
 
Route classification using cellular handoff patterns
Found in: Proceedings of the 13th international conference on Ubiquitous computing (UbiComp '11)
By Alexander Varshavsky, Chris Volinsky, Ji Meng Loh, Karrie Hanson, Ramon Caceres, Richard A. Becker, Simon Urbanek
Issue Date:September 2011
pp. 123-132
Understanding utilization of city roads is important for urban planners. In this paper, we show how to use handoff patterns from cellular phone networks to identify which routes people take through a city. Specifically, this paper makes three contributions...
     
PersonalTour: A Recommender System for Travel Packages
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Fabiana Lorenzi,Stanley Loh,Mara Abel
Issue Date:August 2011
pp. 333-336
This paper describes the Personal Tour recommender system that helps customers to find best travel packages according to their preferences. Personal Tour is based on the paradigm of the Distributed Artificial Intelligence and a customer recommendation requ...
 
A Tale of One City: Using Cellular Network Data for Urban Planning
Found in: IEEE Pervasive Computing
By Richard A Becker,Ramon Caceres,Karrie Hanson,Ji Meng Loh,Simon Urbanek,Alexander Varshavsky,Chris Volinsky
Issue Date:October 2011
pp. 18-26
Cellular data from call detail records can help urban planners better understand city dynamics. The authors use CDR data to analyze people flow in and out of a suburban city near New York City.
 
Organizational Control Protocol in Multiagent Systems
Found in: Agent Systems, their Environment and Applications, Workshop and School of
By Mauricio Rocha,Fabiana Lorenzi,Stanley Loh
Issue Date:April 2011
pp. 85-90
This paper presents the study of a technique for implementation of organization control systems. The proposed protocol is based on MASPA and is able to perform searches in the agent network, finding the agent capable of performing the task with a low cost....
 
Using Natural Language Tool to Assist VPRG Automated Extraction from Textual Vulnerability Description
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Ha Thanh Le, Peter Kok Keong Loh
Issue Date:March 2011
pp. 586-592
This paper presents an application of Natural Language Tool (NLT) to support the VPRG extraction of text based vulnerability description. The NLT is used to analyze the text-based vulnerability descriptions to retrieve vulnerability properties and evaluate...
 
Ref-Finder: a refactoring reconstruction tool based on logic query templates
Found in: Proceedings of the eighteenth ACM SIGSOFT international symposium on Foundations of software engineering (FSE '10)
By Alex Loh, Matthew Gee, Miryung Kim, Napol Rachatasumrit
Issue Date:November 2010
pp. 371-372
Knowing which parts of a system underwent which types of refactoring between two program versions can help programmers better understand code changes. Though there are a number of techniques that automatically find refactorings from two input program versi...
     
Spatial probabilistic modeling of calls to businesses
Found in: Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS '10)
By James Shanahan, Ji Meng Loh, Kenji Yamada, Ramaswamy Hariharan
Issue Date:November 2010
pp. 466-469
Local search engines allow users to search for entities such as businesses in a particular geographic location. To improve the geographic relevance of search, user feedback data such as logged click locations are traditionally used. In this paper, we use a...
     
A generic deriving mechanism for Haskell
Found in: Proceedings of the third ACM Haskell symposium on Haskell (Haskell '10)
By Andres Loh, Atze Dijkstra, Johan Jeuring, Jose Pedro Magalhaes
Issue Date:September 2010
pp. 37-48
Haskell's deriving mechanism supports the automatic generation of instances for a number of functions. The Haskell 98 Report only specifies how to generate instances for the Eq, Ord, Enum, Bounded, Show, and Read classes. The description of how to generate...
     
Generic storage in Haskell
Found in: Proceedings of the 6th ACM SIGPLAN workshop on Generic programming (WGP '10)
By Andres Loh, Sebastiaan Visser
Issue Date:September 2010
pp. 25-36
We present a framework for constructing functional data structures that can be stored on disk. The data structures reside in a heap saved in a binary file. Operations read and write only the parts of the data structure that are actually needed. The framewo...
     
Performance of Qos Mechanism for HD IPTV in Jumbo Ethernet Frame Ipv6 Network
Found in: Network Applications, Protocols and Services, International Conference on
By Primantara Hari Trisnawan, Abraham Lock Jun Jiang, Loh Chong Hooi, Rahmat Budiarto
Issue Date:September 2010
pp. 90-94
Nowadays, most IPTV senders provide all of their multiple streaming channels under IPv4 protocol, in dedicated networks, which are high bandwidth but costly and having geographically limited number of subscribers located relatively close to IPTV senders. D...
 
Ontology-Enhanced Interactive Anonymization in Domain-Driven Data Mining Outsourcing
Found in: Data, Privacy, and E-Commerce, International Symposium on
By Brian C.S. Loh, Patrick H.H. Then
Issue Date:September 2010
pp. 9-14
This paper focuses on a domain-driven data mining outsourcing scenario whereby a data owner publishes data to an application service provider who returns mining results. To ensure data privacy against an un-trusted party, anonymization, a widely used techn...
 
The ideal HPC programming language
Found in: Communications of the ACM
By Eugene Loh
Issue Date:July 2010
pp. 42-47
Maybe it's Fortran. Or maybe it just doesn't matter.
     
3D Stacked Microprocessor: Are We There Yet?
Found in: IEEE Micro
By Gabriel H. Loh, Yuan Xie
Issue Date:May 2010
pp. 60-64
<p>Editors' Note</p><p>We live in a 3D world. It is hard to imagine a large city, such as New York City, with only single-level structures. There would be no skyscrapers, no mixed-use, no live-work. It would be a long walk (or drive) betw...
 
Model-based localization and drift-free user tracking for outdoor augmented reality
Found in: Multimedia and Expo, IEEE International Conference on
By Jayashree Karlekar, Steven ZhiYing Zhou, Yuta Nakayama, Weiquan Lu, Zhi Chang Loh, Daniel Hii
Issue Date:July 2010
pp. 1178-1183
In this paper we present a novel model-based hybrid technique for user localization and drift-free tracking in urban environments. In outdoor augmented reality, instantaneous 6-DoF user localization is achieved with position and orientation sensors such as...
 
Quantifying and coping with parametric variations in 3D-stacked microarchitectures
Found in: Proceedings of the 47th Design Automation Conference (DAC '10)
By Abhishek Das, Alok Choudhary, Gabriel Loh, Gokhan Memik, Serkan Ozdemir, Yan Pan
Issue Date:June 2010
pp. 144-149
Variability in device characteristics, i.e., parametric variations, is an important problem for shrinking process technologies. They manifest themselves as variations in performance, power consumption, and reduction in reliability in the manufactured chips...
     
Use ECP, not ECC, for hard failures in resistive memories
Found in: Proceedings of the 37th annual international symposium on Computer architecture (ISCA '10)
By Doug Burger, Gabriel H. Loh, Karin Straus, Stuart Schechter
Issue Date:June 2010
pp. 72-ff
As leakage and other charge storage limitations begin to impair the scalability of DRAM, non-volatile resistive memories are being developed as a potential replacement. Unfortunately, current error correction techniques are poorly suited to this emerging c...
     
The Ideal HPC Programming Language
Found in: Queue
By Eugene Loh
Issue Date:June 2010
pp. 30-38
Maybe it's Fortran. Or maybe it just doesn't matter.
     
Quantitative Evaluation of Related Web-Based Vulnerabilities
Found in: Secure Software Integration and Reliability Improvement Companion, IEEE International Conference on
By Deepak Subramanian, Ha Thanh Le, Peter Kok Keong Loh, Annamalai Benjamin Premkumar
Issue Date:June 2010
pp. 118-125
Current web application scanner reports contribute little to diagnosis and remediation when dealing with vulnerabilities that are related or vulnerability variants. We propose a quantitative framework that combines degree of confidence reports pre-computed...
 
LSdiff: a program differencing tool to identify systematic structural differences
Found in: Software Engineering, International Conference on
By Alex Loh,Miryung Kim
Issue Date:May 2010
pp. 263-266
Program differencing tools such as GNU diff identify individual differences but do not determine how those differences are related to each other. For example, an extract superclass refactoring on several subclasses will be represented by diff as a scattere...
 
Compression-Encryption Based on Fractal Geometric
Found in: Computer Research and Development, International Conference on
By Abraham Jun Jiang Lock, Chong Hooi Loh, Siti Hasanah Juhari, Azman Samsudin
Issue Date:May 2010
pp. 213-217
Efficient and secured transmissions are necessary to ensure proper data protection and transmission speed. Compression and encryption techniques are used to meet these requirements. Fractal geometric is one of the techniques that can combine both compressi...
 
Maximizing Bandwidth Using Disjoint Paths
Found in: Advanced Information Networking and Applications, International Conference on
By Ruen Chze Loh, Sieteng Soh, Mihai Lazarescu
Issue Date:April 2010
pp. 304-311
Recently, multi-paths solutions have been proposed to improve the quality-of-service (QoS) in communication networks (CNs). This paper addresses the problem to obtain the λ-edge-disjoint-path-set (λ DP/B) with maximum bandwidth (λ DPB), for λ≥1. λDP/B is u...
 
Scoring Web-Based Vulnerability Impact Using Property-Based Vulnerability Model
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Ha Thanh Le, Deepak Subramanian, Wen Jing Hsu, Peter Kok Keong Loh
Issue Date:April 2010
pp. 431-436
This work extends our proposed property-based vulnerability model (VPRG and VPRM) to score the impact of vulnerabilities by: (1) using the model to distinguish the cause- and consequence- factors that later affect the impact score of vulnerabilities and (2...
 
Optimizing generics is easy!
Found in: Proceedings of the ACM SIGPLAN 2010 workshop on Partial evaluation and program manipulation (PEPM '10)
By Andres Loh, Johan Jeuring, Jose Pedro Magalhaes, Stefan Holdermans
Issue Date:January 2010
pp. 33-42
Datatype-generic programming increases program reliability by reducing code duplication and enhancing reusability and modularity. Several generic programming libraries for Haskell have been developed in the past few years. These libraries have been compare...
     
 1  2 Next >>