{"51726":{"#nid":"51726","#data":{"type":"news","title":"CSS Papers Accepted To 2006 Middleware Conference","body":[{"value":"\u003Cp\u003E\u003Cstrong\u003EATLANTA (July 20, 2006)--\u003C\/strong\u003EThe College\u0027s Computing Science \u0026amp; Systems (CSS) division has four papers accepted to the ACM\/IFIP\/USENIX 7th International Middleware Conference in Melbourne, Australia. The broad scope of this premier\u00a0conference is the design, implementation, deployment, and evaluation of distributed systems platforms, and architectures for future computing environments. Because only\u00a021 total papers\u00a0were accepted by the 2006 conference,\u00a0this is quite an achievement for CSS.\u003C\/p\u003E\n\u003Cp\u003EThe four CSS accepted papers demonstrate the strong research in middleware systems being conducted at the College of Computing at Georgia Tech. Middleware is used in a wide variety of enterprise information systems, and solving the challenges in deploying efficient, robust middleware is key to the development of next generation enterprise systems. Three out of the four papers had industrial co-authors, showing how CSS researchers are actively working to solve real problems faced by enterprises. Congratulations to the following CSS faculty and students: Professor Karsten Schwan, Associate Professor Ling Liu, Assistant Professor Brian Cooper, Research Scientist Greg Eisenhauer, and Ph.D. students Zhontang Cai, Vibhore Kumar, Seung Jun, and Mudhakar Srivatsa.\u003C\/p\u003E\n\u003Cp\u003E\u003Cstrong\u003ETitle:\u003C\/strong\u003E \u003Cem\u003EA Middleware System for Protecting Against Application Level Denial of Service Attacks\u003Cbr \/\u003E\u003C\/em\u003E\u003Cstrong\u003EAuthors:\u003C\/strong\u003E Mudhakar Srivatsa (Georgia Tech), Arun Iyengar (IBM TJ Watson),Jian Yin (IBM TJ Watson) and Ling Liu (Georgia Tech)\u003Cbr \/\u003E\u003Cstrong\u003ESummary:\u003C\/strong\u003E Denial of Service (DoS) attacks are one of the primary threats facing online services. This work presents a novel solution to an increasingly frequent attack: application-level DoS attacks. By monitoring and controlling the amount of resources used in servicing requests, the middleware can protect against a wide range of DoS attacks (including previously unseen attacks) while remaining transparent to the client.\u003C\/p\u003E\n\u003Cp\u003E\u003Cstrong\u003ETitle:\u003C\/strong\u003E \u003Cem\u003EUtility-Driven Proactive Management of Availability in Enterprise-Scale Information Flows\u003Cbr \/\u003E\u003C\/em\u003E\u003Cstrong\u003EAuthors:\u003C\/strong\u003E Zhongtang Cai (Georgia Tech), Vibhore Kumar (Georgia Tech), Brian F. Cooper (Georgia Tech), Greg Eisenhauer (Georgia Tech), Karsten Schwan (Georgia Tech) and Robert E. Strom (IBM TJ Watson)\u003Cbr \/\u003E\u003Cstrong\u003ESummary:\u003C\/strong\u003E Information flows underpin many vital computing systems used by enterprises to manage their day-to-day operations. These information flows must be made resilient to failures, but at an affordable cost. This work examines how to ensure high availability of critical information flows, while allowing the enterprise to tune the tradeoff between overhead during normal operation and cost of recovery according to their business needs.\u003C\/p\u003E\n\u003Cp\u003E\u003Cstrong\u003ETitle:\u003C\/strong\u003E \u003Cem\u003ELow-Overhead Message Tracking for Distributed Messaging\u003Cbr \/\u003E\u003C\/em\u003E\u003Cstrong\u003EAuthors:\u003C\/strong\u003E Seung Jun (Georgia Tech) and Mark Astley (IBM TJ Watson)\u003Cbr \/\u003E\u003Cstrong\u003ESummary:\u003C\/strong\u003E Messaging middleware is both critical and extremely complex to deploy and maintain. Efficient message tracking has become instrumental in testing and run-time monitoring, as enterprise applications rely increasingly on commodity messaging middleware. The paper presents a message tracking system, using Bloom filters, that achieves low overhead with respect to latency, memory, and storage.\u003C\/p\u003E\n\u003Cp class=\u0022MsoPlainText\u0022\u003E\u003Cstrong\u003ETitle:\u003C\/strong\u003E \u003Cem\u003ETrading Off Resources Between Overlapping Overlays\u003Cbr \/\u003E\u003C\/em\u003E\u003Cstrong\u003EAuthor:\u003C\/strong\u003E Brian F. Cooper (Georgia Tech)\u003Cbr \/\u003E\u003Cstrong\u003ESummary:\u003C\/strong\u003E Enterprises who want to get the most of their infrastructure investment often use the same hardware to support multiple services. However, safeguards are needed to ensure that one service does not steal all of the infrastructure resources, especially if other services are higher priority. This work examines how overlapping distributed information services (often implemented using network overlays) can be made to play nicely with each other and respect the business\u0027s objectives and priorities.\u003C\/p\u003E\n\u003Cp class=\u0022MsoPlainText\u0022\u003E\u003C\/p\u003E\n\u003Cp class=\u0022MsoPlainText\u0022\u003EFor more information about the 2006 Middleware Conference, \u003Ca href=\u0022http:\/\/2006.middleware-conference.org\/\u0022 target=\u0022_blank\u0022\u003Eclick here\u003C\/a\u003E.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe College\u0027s Computing Science \u0026amp; Systems (CSS) division has four papers accepted to the ACM\/IFIP\/USENIX 7th International Middleware Conference in Melbourne, Australia.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":"","uid":"27154","created_gmt":"2010-02-09 21:46:54","changed_gmt":"2016-10-08 03:05:12","author":"Louise Russo","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2006-07-20T00:00:00-04:00","iso_date":"2006-07-20T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}