Publications without Fulltext
Permanent URI for this collectionhttps://hdl.handle.net/20.500.14288/3
Browse
2 results
Search Results
Publication Metadata only Access pattern-aware data placement for hybrid DRAM/NVM(TUBITAKScientific and Technical Research Council Turkey, 2017) Department of Computer Engineering; Erten, Didem Unat; Faculty Member; Department of Computer Engineering; College of Engineering; 219274in recent years, increased interest in data-centric applications has led to an increasing demand for large capacity memory systems. Nonvolatile memory (NVM) technologies enable new opportunities in terms of process-scaling and energy consumption, and have become an attractive memory technology that serves as a secondary memory at low cost. However, NVM has certain disadvantages for write references, due to its high dynamic energy consumption for writes and low bandwidth compared to DRaM writes. in this paper, we propose an access-aware placement of objects in the application code for two types of memories. Given the desired power savings and acceptable performance loss, our placement algorithm suggests candidate variables for NVM. We present an evaluation of the proposed technique on two applications and study the energy and performance consequences of different placements.Publication Metadata only A reputation-based privacy management system for social networking sites(TÜBİTAK, 2013) Yüksel, Mehmet Erkan; Yüksel, Asım Sinan; Department of Computer Engineering; Faculty Member; Department of Computer Engineering; College of Engineering; 8693Social networking sites form a special type of virtual community where we share our personal information with people and develop new relationships on the Internet. These sites allow the users to share just about everything, including photos, videos, favorite music, and games, and record all user interactions and retain them for potential use in social data mining. This storing and sharing of large amounts of information causes privacy problems for the users of these websites. In order to prevent these problems, we have to provide strict privacy policies, data protection mechanisms, and trusted and built-in applications that help to protect user privacy by limiting the people who get access to a user's personal information. Thus, the privacy problem has prompted us to provide a solution that o ers the users of these social networking websites an opportunity to protect their information. In this paper, a social networking application and its system design, algorithm, and database structure are described. Our application o ers a reputation-based trusted architecture to social network users. It creates and monitors social reputations, nds social circles, and helps the users to group their friends easily, meaningfully, and automatically to protect their privacy. This system provides the grouping of users through an automated system into di erent social circles by analyzing the user's social connections depending on what common information or application they share that should not be accessed by other users.