Search For:

Displaying 1-36 out of 36 total
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Found in: Microarchitecture, IEEE/ACM International Symposium on
By Feng Qin, Cheng Wang, Zhenmin Li, Ho-seop Kim, Yuanyuan Zhou, Youfeng Wu
Issue Date:December 2006
pp. 135-148
<p>Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising technique to detect a wide range of security attacks. However, current inform...
 
A Framework for Accessing General Object Storage
Found in: Networking, Architecture, and Storages, International Workshop on
By Qun Liu, Dan Feng, Qin Ling-jun, Zeng Ling-fang
Issue Date:August 2006
pp. 145-148
With computer application popularizing and storage capacity increasing, research for NAS and SAN storage system are gradually turning to OBS. The OBS will become the next wave of network storage technology. In this paper a framework for accessing general o...
 
GMRace: Detecting Data Races in GPU Programs via a Low-Overhead Scheme
Found in: IEEE Transactions on Parallel and Distributed Systems
By Mai Zheng,Vignesh T. Ravi,Feng Qin,Gagan Agrawal
Issue Date:January 2014
pp. 104-115
In recent years, GPUs have emerged as an extremely cost-effective means for achieving high performance. While languages like CUDA and OpenCL have eased GPU programming for nongraphical applications, they are still explicitly parallel languages. All paralle...
 
LiU: Hiding Disk Access Latency for HPC Applications with a New SSD-Enabled Data Layout
Found in: 2013 IEEE 21st International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS)
By Dachuan Huang,Xuechen Zhang,Wei Shi,Mai Zheng,Song Jiang,Feng Qin
Issue Date:August 2013
pp. 111-120
Unlike in the consumer electronics and personal computing areas, in the HPC environment hard disks can hardly be replaced by SSDs. The reasons include hard disk's large capacity, very low price, and decent peak throughput. However, when latency dominates t...
 
Improving the Reliability of MPI Libraries via Message Flow Checking
Found in: IEEE Transactions on Parallel and Distributed Systems
By Zhezhe Chen,Qi Gao,Wenbin Zhang,Feng Qin
Issue Date:March 2013
pp. 535-549
Despite the success of the Message Passing Interface (MPI), many MPI libraries have suffered from software bugs. These bugs severely impact the productivity of a large number of users, causing program failures or other errors. As a result, MPI application ...
 
Modeling Software Execution Environment
Found in: 2012 19th Working Conference on Reverse Engineering (WCRE)
By Dawei Qi,William N. Sumner,Feng Qin,Mai Zheng,Xiangyu Zhang,Abhik Roychoudhury
Issue Date:October 2012
pp. 415-424
Software execution environment, interfaced with software through library functions and system calls, constitutes an important aspect of the software's semantics. Software analysis ought to take the execution environment into consideration. However, due to ...
 
SyncChecker: Detecting Synchronization Errors between MPI Applications and Libraries
Found in: 2012 IEEE International Symposium on Parallel & Distributed Processing (IPDPS)
By Zhezhe Chen,Xinyu Li,Jau-Yuan Chen,Hua Zhong,Feng Qin
Issue Date:May 2012
pp. 342-353
While improving the performance, nonblocking communication is prone to synchronization errors between MPI applications and the underlying MPI libraries. Such synchronization error occurs in the following way. After initiating nonblocking communication and ...
 
An Expression of Animal Abdominal Breathing Based on Intercept
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Bin Ji,Feng Qin,Hongshen Liu
Issue Date:May 2012
pp. 716-719
To monitor the tachypnea of pig, computer vision was introduced to construct a model for the pig's abdominal respiration based on intercept. The breathing mainly showed markedly dilating and shrinking at ridge-abdomen of pig. Based on the centroid of pig's...
 
Set-Expression Based Method for Effective Privacy Preservation
Found in: Web-Age Information Management, International Conference on
By Yu Liu, Dapeng Lv, Yang Ye, Jianhua Feng, Qin Hong
Issue Date:July 2008
pp. 325-332
Anonymization is proposed to alleviate the problem of privacy disclosure in recent years. Previous approaches typically generalize the specific values in the original data table to achieve anonymization. However, these solutions suffer from information los...
 
DMTracker: finding bugs in large-scale parallel programs by detecting anomaly in data movements
Found in: SC Conference
By Qi Gao, Feng Qin, Dhabaleswar K. Panda
Issue Date:November 2007
pp. 1-12
While software reliability in large-scale systems becomes increasingly important, debugging in large-scale parallel systems remains a daunting task. This paper proposes an innovative technique to find hard-to-detect software bugs that can cause severe prob...
 
Implementation and Evaluation of a Popularity-Based Reconstruction Optimization Algorithm in Availability-Oriented Disk Arrays
Found in: Mass Storage Systems and Technologies, IEEE / NASA Goddard Conference on
By Lei Tian, Hong Jiang, Dan Feng, Qin Xin, Xing Shu
Issue Date:September 2007
pp. 233-238
In this paper, we implement the incorporation of a Popularity-based multi-threaded Reconstruction Optimization algorithm, PRO, into the recovery mechanism of the Linux software RAID (MD), which is a well-known and widely-used availability-oriented disk arr...
 
Laplacian Regularized Least Squares Regression and its Dynamic Parameter Optimization for Near Infrared Spectroscopy Modeling
Found in: International Conference on Natural Computation
By Hui-hua Yang, Feng Qin, Yong Wang, Qiong-lin Liang, Yi-ming Wang, Guo-an Luo
Issue Date:August 2007
pp. 591-595
Partial Least Square (PLS) is the most commonly used algorithm for Near Infrared (NIR) modeling. NIR modeling features that it?s cheap, easy and fast to measure the NIR spectroscopy, while expensive, difficult and time- consuming to measure the reference v...
 
AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants
Found in: IEEE Micro
By Shan Lu, Joseph Tucek, Feng Qin, Yuanyuan Zhou
Issue Date:January 2007
pp. 26-35
This article proposes an innovative concurrent-program invariant that captures programmers' atomicity assumptions. It describes a tool with two implementations, one in software and the other using hardware support, that can automatically extract such invar...
 
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Found in: High-Performance Computer Architecture, International Symposium on
By Feng Qin, Shan Lu, Yuanyuan Zhou
Issue Date:February 2005
pp. 291-302
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Database, 68% of all reported vulnerabilities in 2003 were caused by memory leaks ...
 
AccMon: Automatically Detecting Memory-Related Bugs via Program Counter-Based Invariants
Found in: Microarchitecture, IEEE/ACM International Symposium on
By Pin Zhou, Wei Liu, Long Fei, Shan Lu, Feng Qin, Yuanyuan Zhou, Samuel Midkiff, Josep Torrellas
Issue Date:December 2004
pp. 269-280
This paper makes two contributions to architectural support for software debugging. First, it proposes a novel statistics-based, on-the-fly bug detection method called PC-based invariant detection. The idea is based on the observation that, in most program...
 
iWatcher: Simple, General Architectural Support for Software Debugging
Found in: IEEE Micro
By Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, Josep Torrellas
Issue Date:November 2004
pp. 50-56
iWatcher lets programmers associate specified functions to
 
iWatcher: Efficient Architectural Support for Software Debugging
Found in: Computer Architecture, International Symposium on
By Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, Josep Torrellas
Issue Date:June 2004
pp. 224
Recent impressive performance improvements in computer architecture have not led to significant gains in ease of debugging. Software debugging often relies on inserting run-time software checks. In many cases, however, it is hard to find the root cause of ...
 
FlowChecker: Detecting Bugs in MPI Libraries via Message Flow Checking
Found in: SC Conference
By Zhezhe Chen, Qi Gao, Wenbin Zhang, Feng Qin
Issue Date:November 2010
pp. 1-11
Many MPI libraries have suffered from software bugs, which severely impact the productivity of a large number of users. This paper presents a new method called FlowChecker for detecting communication-related bugs inMPI libraries. The main idea is to extrac...
 
Application of Apriori Algorithm in Multi Label Classification
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Feng Qin,Xian-Juan Tang,Ze-Kai Cheng
Issue Date:June 2013
pp. 717-720
Multi_label learning and application is a new hot issue in machine learning and data mining recently. In multi_label learning, a training set is composed of instances, each is associated with a set of labels, and the task is to predict all the appropriate ...
 
GMProf: A low-overhead, fine-grained profiling approach for GPU programs
Found in: 2012 19th International Conference on High Performance Computing (HiPC)
By Mai Zheng,Vignesh T. Ravi,Wenjing Ma,Feng Qin,Gagan Agrawal
Issue Date:December 2012
pp. 1-10
Driven by the cost-effectiveness and the power-efficiency, GPUs are being increasingly used to accelerate computations in many domains. However, developing highly efficient GPU implementations requires a lot of expertise and effort. Thus, tool support for ...
   
A Self-Adaptive Image Process Method Based on Feedback and Study
Found in: Intelligent System Design and Engineering Application, International Conference on
By Tiantian Liu,Feng Qin,Yu Li,Yanwei Wang,Heyu Yin,Yanjun Chen
Issue Date:January 2012
pp. 97-100
Image process is a key process to the fish-like robot polo game. A good image process system is one of the basic elements of winning the game. But in the past games, it was before the game begun that we made effort to adjust the parameters to adapt to the ...
 
Detecting Fall Risk Factors for Toddlers
Found in: IEEE Pervasive Computing
By Hana Na, Sheng-Feng Qin, David K. Wright
Issue Date:January 2011
pp. 82-89
Preventing accidental injuries of toddlers requires thorough, consistent supervision, but this isn't always practical. A proposed vision-based system detects three fall risk factors in the home environment to help caregivers supervise nearby toddlers when ...
 
LeakChaser: helping programmers narrow down causes of memory leaks
Found in: Proceedings of the 32nd ACM SIGPLAN conference on Programming language design and implementation (PLDI '11)
By Atanas Rountev, Feng Qin, Guoqing Xu, Michael D. Bond
Issue Date:June 2011
pp. 123-128
In large programs written in managed languages such as Java and C#, holding unnecessary references often results in memory leaks and bloat, degrading significantly their run-time performance and scalability. Despite the existence of many leak detectors for...
     
First-aid: surviving and preventing memory management bugs during production runs
Found in: Proceedings of the fourth ACM european conference on Computer systems (EuroSys '09)
By Feng Qin, Qi Gao, Wenbin Zhang, Yan Tang
Issue Date:April 2009
pp. 29-32
Memory bugs in C/C++ programs severely affect system availability and security. This paper presents First-Aid, a lightweight runtime system that survives software failures caused by common memory management bugs and prevents future failures by the same bug...
     
DMTracker: finding bugs in large-scale parallel programs by detecting anomaly in data movements
Found in: Proceedings of the 2007 ACM/IEEE conference on Supercomputing (SC '07)
By Dhabaleswar K. Panda, Feng Qin, Qi Gao
Issue Date:November 2007
pp. 24-31
While software reliability in large-scale systems becomes increasingly important, debugging in large-scale parallel systems remains a daunting task. This paper proposes an innovative technique to find hard-to-detect software bugs that can cause severe prob...
     
Efficient checkpointing of java software using context-sensitive capture and replay
Found in: Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering (ESEC-FSE '07)
By Atanas Rountev, Feng Qin, Guoqing Xu, Yan Tang
Issue Date:September 2007
pp. 85-94
Checkpointing and replaying is an attractive technique that has been used widely at the operating/runtime system level to provide fault tolerance. Applying such a technique at the application level can benefit a range of software engineering tasks such as ...
     
Rx: Treating bugs as allergies---a safe method to survive software failures
Found in: ACM Transactions on Computer Systems (TOCS)
By Feng Qin, Jagadeesan Sundaresan, Joseph Tucek, Yuanyuan Zhou
Issue Date:August 2007
pp. 7-es
Many applications demand availability. Unfortunately, software failures greatly reduce system availability. Prior work on surviving software failures suffers from one or more of the following limitations: required application restructuring, inability to ad...
     
AVIO: detecting atomicity violations via access interleaving invariants
Found in: Proceedings of the 12th international conference on Architectural support for programming languages and operating systems (ASPLOS-XII)
By Feng Qin, Joseph Tucek, Shan Lu, Yuanyuan Zhou
Issue Date:October 2006
pp. 109-es
Concurrency bugs are among the most difficult to test and diagnose of all software bugs. The multicore technology trend worsens this problem. Most previous concurrency bug detection work focuses on one bug subclass, data races, and neglects many other impo...
     
Sketching-out virtual humans: from 2D storyboarding to immediate 3D character animation
Found in: Proceedings of the 2006 ACM SIGCHI international conference on Advances in computer entertainment technology (ACE '06)
By Chen Mao, David K. Wright, Sheng Feng Qin
Issue Date:June 2006
pp. 76-es
Virtual beings are playing a remarkable role in today's public entertainment, while ordinary users are still treated as audiences due to the lack of appropriate expertise, equipment, and computer skills. In this paper, we present a fast and intuitive story...
     
Sketching-out virtual humans: from 2D storyboarding to immediate 3D character animation
Found in: Proceedings of the 2006 ACM SIGCHI international conference on Advances in computer entertainment technology (ACE '06)
By Chen Mao, David K. Wright, Sheng Feng Qin
Issue Date:June 2006
pp. 61-es
Virtual beings are playing a remarkable role in today's public entertainment, while ordinary users are still treated as audiences due to the lack of appropriate expertise, equipment, and computer skills. In this paper, we present a fast and intuitive story...
     
Efficient and flexible architectural support for dynamic monitoring
Found in: ACM Transactions on Architecture and Code Optimization (TACO)
By Feng Qin, Josep Torrellas, Pin Zhou, Wei Liu, Yuanyuan Zhou
Issue Date:March 2005
pp. 3-33
Recent impressive performance improvements in computer architecture have not led to significant gains in the case of debugging. Software debugging often relies on inserting run-time software checks. In many cases, however, it is hard to find the root cause...
     
The Design of Wireless Micro-Evironment Monitoring System
Found in: Electrical and Control Engineering, International Conference on
By Wang Hui-feng, Qin Tian, Hu Zhong-ze, Cai Lankun
Issue Date:June 2010
pp. 2324-2327
In order to protect cultural relics in the museum, a micro-environment is designed to monitor the humidity, temperature, gaseous pollutants. With the wireless communication module, all the micro-environment monitors in the museum can make up a wireless net...
 
Development and Application of Process Automation on Roller-Hearth Heat Treatment Furnace
Found in: Electrical and Control Engineering, International Conference on
By Yong Song, Feng-qin Lin, Zhi-mi Zhang, Yong-jun Zhang
Issue Date:June 2010
pp. 5153-5155
The hardware and software configurations of process automation system on roller-hearth heat treatment furnace are described. The design ideas and principles of control functions are introduced. Heat treatment schedule management, process parameter setting,...
 
Underdetermined Blind Separation for Speech Signal Based on Two-Step Sparse Component Analysis
Found in: Information Technology, Computer Engineering and Management Sciences, International Conference of
By Wang Yu-jing,Feng-qin Yu
Issue Date:September 2011
pp. 392-395
In order to solve the problem of underdetermined blind separation for speech signal, which the classical algorithm such as ICA can't solve, a blind separation algorithm based on two-step sparse component analysis is proposed. First, it transforms the mixed...
 
Learner Autonomy in Self-access Language Learning - An Exploration of the Self-access Center in Wuhan University
Found in: Education Technology and Computer Science, International Workshop on
By Zhang Feng-qin
Issue Date:March 2010
pp. 801-804
This paper focuses on exploring the degree of non-English majors’ learner autonomy and factors influencing learner autonomy in self-access language learning center (SAC) in Wuhan University through a questionnaire and interviews. Findings from the quantita...
 
Dynamic Network Planning and Management in an End to End Reconfiguration Context
Found in: Multimedia Information Networking and Security, International Conference on
By Ying Li, Feng-qin Wang, Bo Kong, Hong-da Fan
Issue Date:November 2009
pp. 300-303
Paper develops investigations of the network resident adaptation functions, the impact of reconfigurations to end-user service provisioning as well as the cost of network operation and maintenance, following the requirement that functions for efficient Sof...
 
 1