Dynamic software updating (DSU) systems allow programs to
be updated while running, thereby allowing developers to add features
and fix bugs without downtime.
Korea, also known as the nation of Psy, is one of the most dynamic countries in the world. Thanks to advanced information and communications infrastructures and unique culture, people in Korea are said to be living in the future of many other countries.
Energy efficiency is now a principal design constraint across all computing markets - from supercomputers to smartphones. Performance growth in these markets can only be sustained going forward through significant improvements in the energy efficiency of computation.
Flash based non volatile memory is revolutionizing data center
architectures, improving application performance by bridging the gap
between DRAM and disk. Future non volatile memories promise performance
even closer to DRAM.
Understanding the sources of latency within a deployed distributed
system is complicated. Asynchronous control flow, variable workloads,
pushes of new backend servers, and unreliable hardware all can make
significant contribution to a job's performance.
Modeling community formation and detecting hidden
communities in networks is a well studied problem. However,
theoretical analysis of community detection has been mostly limited
to models with non-overlapping communities such as the stochastic
block model.
The past twenty years have witnessed significant advances in formal
modeling, system verification and testing of network protocols.
However a long-standing challenge in these approaches is the
decoupling of formal reasoning process and the actual distributed
implementation.
One of the biggest challenges facing us today is how to design parallel
architectures that attain high performance while efficiently supporting
a programmable environment.
Public key cryptography, invented in the 1970's, revolutionized the world of computation by displaying a tool-box that builds trust in authenticity and integrity of {em data}, even when it is transmitted from unknown computers and relayed via untrusted and possibly corrupt intermediaries.