Search For:

Displaying 1-30 out of 30 total
Adaptive Pipeline Parallelism for Image Feature Extraction Algorithms
Found in: 2012 41st International Conference on Parallel Processing (ICPP)
By Peng Chen,Donglei Yang,Weihua Zhang,Yi Li,Binyu Zang,Haibo Chen
Issue Date:September 2012
pp. 299-308
Currently, multimedia data has become one of the major data types processed and transferred on the Internet. With the rapid growth of multimedia data, it is vitally important to find an efficient way to extract useful information from a large amount of dat...
The Digital Field-Frequency Lock System of High-Resolution NMR Spectrometer
Found in: Electrical and Control Engineering, International Conference on
By Dezhi Jiang, Haibo Chen, Zhong Chen, Zhenyao Zheng
Issue Date:June 2010
pp. 2328-2331
To obtain a high-resolution NMR spectrum, the NMR spectrometer needs ultra-high magnetic field which is very hard to be stable. The temporal variation of magnetic field causes the change of nuclear resonance frequency from one transient to another, thus wo...
Mercury: Combining Performance with Dependability Using Self-virtualization
Found in: Parallel Processing, International Conference on
By Haibo Chen, Rong Chen, Fengzhe Zhang, Binyu Zang, Pen-Chung Yew
Issue Date:September 2007
pp. 9
There has recently been increasing interests in using system virtualization to improve the dependability of HPC cluster systems. However, it is not cost-free and may come with some performance degradation, uncertain QoS and loss of functionalities. Meanwhi...
POLUS: A POwerful Live Updating System
Found in: Software Engineering, International Conference on
By Haibo Chen, Jie Yu, Rong Chen, Binyu Zang, Pen-Chung Yew
Issue Date:May 2007
pp. 271-281
This paper presents POLUS, a software maintenance tool capable of iteratively evolving running software into newer versions. POLUS?s primary goal is to increase the dependability of contemporary server software, which is frequently disrupted either by exte...
Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks
Found in: 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA)
By Yubin Xia,Yutao Liu,Haibo Chen
Issue Date:February 2013
pp. 246-257
The privacy and integrity of tenant's data highly rely on the infrastructure of multi-tenant cloud being secure. However, with both hardware and software being controlled by potentially curious or even malicious cloud operators, it is no surprise to see fr...
A New Matching Cost Function for Similar Texture Images Using Segmentation Based Census
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Jingzhou Huang,Dongming Lu,Changyu Diao,Haibo Chen
Issue Date:August 2012
pp. 472-476
It is a challenge to match two corresponding points between images captured from two little different views. Particularly, if some regions in the image have similar textures, finding correspondence will become very difficult. Traditional cost functions hav...
CFIMon: Detecting violation of control flow integrity using performance counters
Found in: 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Yubin Xia, Yutao Liu,Haibo Chen,Binyu Zang
Issue Date:June 2012
pp. 1-12
Many classic and emerging security attacks usually introduce illegal control flow to victim programs. This paper proposes an approach to detecting violation of control flow integrity based on hardware support for performance monitoring in modern processors...
A Hierarchical Approach to Maximizing MapReduce Efficiency
Found in: Parallel Architectures and Compilation Techniques, International Conference on
By Zhiwei Xiao,Haibo Chen,Binyu Zang
Issue Date:October 2011
pp. 167-168
MapReduce has been widely recognized for its elastic scalability and fault tolerance, with the efficiency being relatively disregarded, which, however, is equally important in
Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring
Found in: Dependable Systems and Networks Workshops
By Jicheng Shi,Xiang Song,Haibo Chen,Binyu Zang
Issue Date:June 2011
pp. 194-199
Multi-tenant cloud, which features utility-like computing resources to tenants in a
A comprehensive analysis and parallelization of an image retrieval algorithm
Found in: Performance Analysis of Systems and Software, IEEE International Symmposium on
By Zhenman Fang, Donglei Yang, Weihua Zhang, Haibo Chen, Binyu Zang
Issue Date:April 2011
pp. 154-164
The prevalence of the Internet and cloud computing has made multimedia data, such as image data and video data, become major data types in our daily life. For example, many data-intensive applications, such as health care and video recommendation, involve ...
Response of Sugarcane Chlorophyll Fluorescence Parameters and Spectral Reflectance to Water Stress in Elongation
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Haibo Chen, Xiaodong Zheng, Jiuhao Li, Jingdong Zhang, Xinwu Xu
Issue Date:February 2011
pp. 981-984
The response of chlorophyll fluorescence parameters characteristics and spectral reflectance in New sugarcane 22(T22) were studied under 4 different water treaments in pots. The results showed that, except qN increased, other chlorophyll fluorescence param...
Study on Ash Melting and Combustion Characteristics of Compound Biomass Pellets
Found in: 2010 International Conference on Intelligent System Design and Engineering Application (ISDEA 2010)
By Haizhen Huang, Zhenwei Jiao, Haibo Chen, Xiaowen Zhao
Issue Date:October 2010
pp. 433-436
Biomass is widely used now because of its renewable and release characteristics. It has been an important substitute of fossil energy. Because of low melting temperature, agglomeration becomes a big problem to be solved. In this paper, the ash melting and ...
Dynamic Software Updating Using a Relaxed Consistency Model
Found in: IEEE Transactions on Software Engineering
By Haibo Chen,Jie Yu,Chengqun Hang,Binyu Zang,Pen-Chung Yew
Issue Date:September 2011
pp. 679-694
Software is inevitably subject to changes. There are patches and upgrades that close vulnerabilities, fix bugs, and evolve software with new features. Unfortunately, most traditional dynamic software updating approaches suffer some level of limitations; fe...
Why software hangs and what can be done with it
Found in: Dependable Systems and Networks, International Conference on
By Xiang Song, Haibo Chen, Binyu Zang
Issue Date:July 2010
pp. 311-316
Software hang is an annoying behavior and forms a major threat to the dependability of many software systems. To avoid software hang at the design phase or fix it in production runs, it is desirable to understand its characteristics. Unfortunately, to our ...
PALM: Security Preserving VM Live Migration for Systems with VMM-enforced Protection
Found in: Trusted Infrastructure Technologies Conference, Asia-Pacific /Trusted Infrastructure Technologies Conference, Third Asia-Pacific
By Fengzhe Zhang, Yijian Huang, Huihong Wang, Haibo Chen, Binyu Zang
Issue Date:October 2008
pp. 9-18
Live migration of virtual machine (VM) is a desirable feature for distributed computing such as Grid Computing and recent Cloud Computing by facilitating fault tolerance, load balance, and hardware maintenance. Virtual Machine Monitor (VMM) enforced proces...
From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware
Found in: Computer Architecture, International Symposium on
By Haibo Chen, Xi Wu, Liwei Yuan, Binyu Zang, Pen-chung Yew, Frederic T. Chong
Issue Date:June 2008
pp. 401-412
Dynamic information flow tracking (also known as taint tracking) is an appealing approach to combat various security attacks. However, the performance of applications can severely degrade without hardware support for tracking taints. This paper observes th...
Persistent Transactional Memory
Found in: IEEE Computer Architecture Letters
By Zhaoguo Wang,Han Yi,Ran Liu,Mingkai Dong,Haibo Chen
Issue Date:June 2014
pp. 1
This paper proposes persistent transactional memory (PTM), a new design that adds durability to transactional memory (TM) by incorporating with the emerging non-volatile memory (NVM). PTM dynamically tracks transactional updates to cache lines to ensure th...
Concurrent and consistent virtual machine introspection with hardware transactional memory
Found in: 2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA)
By Yutao Liu,Yubin Xia,Haibing Guan,Binyu Zang,Haibo Chen
Issue Date:February 2014
pp. 416-427
Virtual machine introspection, which provides tamperresistant, high-fidelity “out of the box” monitoring of virtual machines, has many prominent security applications including VM-based intrusion detection, malware analysis and memory forensic analysis. Ho...
Architecting Flash-based Solid-State Drive for High-performance I/O Virtualization
Found in: IEEE Computer Architecture Letters
By Xiang Song,Jian Yang,Haibo Chen
Issue Date:July 2013
pp. 1
Flash-based solid-state drive (SSD) is now being widely deployed in cloud computing platforms due to the potential advantages of better performance and less energy consumption. However, current virtualization architecture lacks support for high- performanc...
X10-FT: transparent fault tolerance for APGAS language and runtime
Found in: Proceedings of the 2013 International Workshop on Programming Models and Applications for Multicores and Manycores (PMAM '13)
By Chenning Xie, Haibo Chen, Zhijun Hao
Issue Date:February 2013
pp. 11-20
The emergence of multicore machines has made exploiting parallelism a necessity to harness the abundant computing resources in both a single machine and clusters. This, however, may hinder programming productivities as threaded and distributed programming ...
Scalable deterministic replay in a parallel full-system emulator
Found in: Proceedings of the 18th ACM SIGPLAN symposium on Principles and practice of parallel programming (PPoPP '13)
By Haibo Chen, Yufei Chen
Issue Date:February 2013
pp. 207-218
Full-system emulation has been an extremely useful tool in developing and debugging systems software like operating systems and hypervisors. However, current full-system emulators lack the support for deterministic replay, which limits the reproducibility ...
A GPU-based high-throughput image retrieval algorithm
Found in: Proceedings of the 5th Annual Workshop on General Purpose Processing with Graphics Processing Units (GPGPU-5)
By Haibo Chen, Peng Chen, Weihua Zhang, Binyu Zang, Donglei Yang, Feiwen Zhu
Issue Date:March 2012
pp. 30-37
With the development of Internet and cloud computing, multimedia data, such as images and videos, has become one of the most common data types being processed. As the scale of multimedia data being still increasing, it is vitally important to efficiently e...
A case for scaling applications to many-core with OS clustering
Found in: Proceedings of the sixth conference on Computer systems (EuroSys '11)
By Binyu Zang, Haibo Chen, Rong Chen, Xiang Song, Yuanxuan Wang
Issue Date:April 2011
pp. 61-76
This paper proposes an approach to scaling UNIX-like operating systems for many cores in a backward-compatible way, which still enjoys common wisdom in new operating system designs. The proposed system, called Cerberus, mitigates contention on many shared ...
Tiled-MapReduce: optimizing resource usages of data-parallel applications on multicore with tiling
Found in: Proceedings of the 19th international conference on Parallel architectures and compilation techniques (PACT '10)
By Binyu Zang, Haibo Chen, Rong Chen
Issue Date:September 2010
pp. 523-534
The prevalence of chip multiprocessor opens opportunities of running data-parallel applications originally in clusters on a single machine with many cores. MapReduce, a simple and elegant programming model to program large scale clusters, has recently been...
Live updating operating systems using virtualization
Found in: Proceedings of the 2nd international conference on Virtual execution environments (VEE '06)
By Binyu Zang, Fengzhe Zhang, Haibo Chen, Pen-Chung Yew, Rong Chen
Issue Date:June 2006
pp. 35-44
Many critical IT infrastructures require non-disruptive operations. However, the operating systems thereon are far from perfect that patches and upgrades are frequently applied, in order to close vulnerabilities, add new features and enhance performance. T...
Tiled-MapReduce: Efficient and Flexible MapReduce Processing on Multicore with Tiling
Found in: ACM Transactions on Architecture and Code Optimization (TACO)
By Haibo Chen
Issue Date:April 2013
pp. 1-30
The prevalence of chip multiprocessors opens opportunities of running data-parallel applications originally in clusters on a single machine with many cores. MapReduce, a simple and elegant programming model to program large-scale clusters, has recently bee...
Parallelizing live migration of virtual machines
Found in: Proceedings of the 9th ACM SIGPLAN/SIGOPS international conference on Virtual execution environments (VEE '13)
By Haibo Chen, Jian Yang, Jicheng Shi, Ran Liu, Xiang Song
Issue Date:March 2013
pp. 85-96
Live VM migration is one of the major primitive operations to manage virtualized cloud platforms. Such operation is usually mission-critical and disruptive to the running services, and thus should be completed as fast as possible. Unfortunately, with the i...
A case for secure and scalable hypervisor using safe language
Found in: Proceedings of the 2012 International Workshop on Programming Models and Applications for Multicores and Manycores (PMAM '12)
By Haibo Chen, Binyu Zang
Issue Date:February 2012
pp. 134-139
System virtualization has been a new foundation for system software, which is evidenced in many systems and innovations, as well as numerous commercial successes in desktop, datacenter and cloud. However, with more and more functionality being built into t...
Optimizing crash dump in virtualized environments
Found in: Proceedings of the 6th ACM SIGPLAN/SIGOPS international conference on Virtual execution environments (VEE '10)
By Binyu Zang, Haibo Chen, Yijian Huang
Issue Date:March 2010
pp. 25-36
Crash dump, or core dump is the typical way to save memory image on system crash for future offline debugging and analysis. However, for typical server machines with likely abundant memory, the time of core dump can significantly increase the mean time to ...
Control flow obfuscation with information flow tracking
Found in: Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture (Micro-42)
By Binyu Zang, Bo Huang, Haibo Chen, Liwei Yuan, Pen-chung Yew, Xi Wu
Issue Date:December 2009
pp. 391-400
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is usually referred to as information flow tracking, has been widely applied to se...