Author image not provided
 Matei Ripeanu

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article15.44
Citation Count1,312
Publication count85
Publication years2001-2019
Available for download45
Average downloads per article416.80
Downloads (cumulative)18,756
Downloads (12 Months)1,211
Downloads (6 Weeks)148
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


85 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 85
Result page: 1 2 3 4 5

Sort by:

1 published by ACM
June 2019 ICS '19: Proceedings of the ACM International Conference on Supercomputing
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 10,   Downloads (12 Months): 28,   Downloads (Overall): 28

Full text available: PDFPDF
Detectable but Uncorrectable Errors (DUEs) in the memory subsystem are becoming increasingly frequent. Today, upon encountering a DUE, applications crash, and the recovery methods used incur significant performance, storage, and energy overheads. To mitigate the impact of these errors, we start from two high-level observations that apply to some classes ...

2
November 2018 SC '18: Proceedings of the International Conference for High Performance Computing, Networking, Storage, and Analysis
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 23,   Downloads (12 Months): 212,   Downloads (Overall): 212

Full text available: PDFPDF
Pattern matching is a powerful graph analysis tool. Unfortunately, existing solutions have limited scalability, support only a limited set of search patterns, and/or focus on only a subset of the real-world problems associated with pattern matching. This paper presents a new algorithmic pipeline that: (i) enables highly scalable pattern matching ...

3
January 2018 IEEE Transactions on Parallel and Distributed Systems: Volume 29 Issue 1, January 2018
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

Interferometric Synthetic Aperture Radar (InSAR) is a remote sensing technology used for estimating the displacement of an object on the ground or the earth's surface itself. Persistent Scatterer-InSAR (PS-InSAR) is a category of time series algorithms enabling high resolution monitoring. PS-InSAR relies on successful selection of points that appear stable ...

4 published by ACM
November 2017 AISec '17: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 75,   Downloads (Overall): 174

Full text available: PDFPDF
In the face of large-scale automated cyber-attacks to large online services, fast detection and remediation of compromised accounts are crucial to limit the spread of new attacks and to mitigate the overall damage to users, companies, and the public at large. We advocate a fully automated approach based on machine ...
Keywords: early warning system, online account security, supervised learning

5 published by ACM
June 2017 HPDC '17: Proceedings of the 26th International Symposium on High-Performance Parallel and Distributed Computing
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2,   Downloads (12 Months): 39,   Downloads (Overall): 143

Full text available: PDFPDF
Requirements for reliability, low power consumption, and performance place complex and conflicting demands on the design of high-performance computing (HPC) systems. Fault-tolerance techniques such as checkpoint/restart (C/R) protect HPC applications against hardware faults. These techniques, however, have non negligible overheads particularly when the fault rate exposed by the hardware is ...
Keywords: checkpoint/restart, fault tolerance, forward recovery, hpc

6
December 2016 IEEE Transactions on Parallel and Distributed Systems: Volume 27 Issue 12, December 2016
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

The wide adoption of graphics processing units (GPUs) as accelerators for general-purpose applications makes the end-to-end reliability implications of their use increasingly significant. Fault injection is a widely adopted method to evaluate the resilience of applications. However, building a fault injector for general-purpose GPU applications is challenging due to their ...

7
November 2016 SC '16: Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis
Publisher: IEEE Press
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 2,   Downloads (12 Months): 17,   Downloads (Overall): 269

Full text available: PDFPDF
An unprecedented growth in data generation is taking place. Data about larger dynamic systems is being accumulated, capturing finer granularity events, and thus processing requirements are increasingly approaching real-time. To keep up, data-analytics pipelines need to be viable at massive scale, and switch away from static, offline scenarios to support ...

8 published by ACM
September 2016 NSPW '16: Proceedings of the 2016 New Security Paradigms Workshop
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 13,   Downloads (12 Months): 76,   Downloads (Overall): 288

Full text available: PDFPDF
The orthodox paradigm to defend against automated social-engineering attacks in large-scale socio-technical systems is reactive and victim-agnostic. Defenses generally focus on identifying the attacks/attackers (e.g., phishing emails, social-bot infiltrations, malware offered for download). To change the status quo, we propose to identify, even if imperfectly, the vulnerable user population, that ...
Keywords: cyber intrusions, defense system design, vulnerable population

9
September 2016 IEEE Transactions on Parallel and Distributed Systems: Volume 27 Issue 9, September 2016
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

System provisioning, resource allocation, and configuration decisions for I/O-intensive workflow applications are complex even for expert users. Users face choices at multiple levels: allocating resources to individual sub-systems (e.g., the application layer, the storage layer) as well as configuring each of these optimally (e.g., replication level, chunk size, caching policies ...

10
August 2016 Computers and Security: Volume 61 Issue C, August 2016
Publisher: Elsevier Advanced Technology Publications
Bibliometrics:
Citation Count: 0

Detecting fake accounts in online social networks (OSNs) protects both OSN operators and their users from various malicious activities. Most detection mechanisms attempt to classify user accounts as real (i.e., benign, honest) or fake (i.e., malicious, Sybil) by analyzing either user-level activities or graph-level structures. These mechanisms, however, are not ...
Keywords: Fake account detection, Victim account prediction, Online social networks, Social infiltration, Socialbots

11
December 2015 Future Generation Computer Systems: Volume 53 Issue C, December 2015
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 2

The Big Data challenge consists in managing, storing, analyzing and visualizing these huge and ever growing data sets to extract sense and knowledge. As the volume of data grows exponentially, the management of these data becomes more complex in proportion. A key point is to handle the complexity of the ...
Keywords: Distributed and heterogeneous systems, Parallel programming model, Data life cycle

12 published by ACM
October 2015 AISec '15: Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 3,   Downloads (12 Months): 34,   Downloads (Overall): 188

Full text available: PDFPDF
Traditional defense mechanisms for fighting against automated fake accounts in online social networks are victim-agnostic. Even though victims of fake accounts play an important role in the viability of subsequent attacks, there is no work on utilizing this insight to improve the status quo. In this position paper, we take ...
Keywords: applied machine learning, online social networks, social botnets, fake accounts

13
March 2015 Journal of Grid Computing: Volume 13 Issue 1, March 2015
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 3

This article evaluates the potential gains a workflow-aware storage system can bring. Two observations make us believe such storage system is crucial to efficiently support workflow-based applications: First, workflows generate irregular and application-dependent data access patterns. These patterns render existing generic storage systems unable to harness all optimization opportunities as ...
Keywords: Workflow runtime engine, Workflow-aware, Large-scale storage system, storage system

14
November 2014 SE-HPCCSE '14: Proceedings of the 2nd International workshop on Software Engineering for High Performance Computing in Computational Science and Engineering
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 3,   Downloads (Overall): 23

Full text available: PDFPDF
Developing a distributed system is a complex and error-prone task. Properly handling the interaction of a potentially large number of distributed components while keeping resource usage low and performance high is challenging. The state-of-the-practice on performance evaluation focuses on employing profilers to detect and fix potential performance problems, but lacks ...

15 published by ACM
September 2014 HT '14: Proceedings of the 25th ACM conference on Hypertext and social media
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 18,   Downloads (Overall): 108

Full text available: PDFPDF
A large portion of the audience of video content items on the web currently comes from keyword-based search and/or tag-based navigation. Thus, the textual features of this content (e.g., the title, description, and tags) can directly impact the view count of a particular content item, and ultimately the advertisement generated ...
Keywords: video popularity, peer-production, social tagging

16
June 2014 DSN '14: Proceedings of the 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

As a consequence of increasing hardware fault rates, HPC systems face significant challenges in terms of reliability. Evaluating the error resilience of HPC applications is an essential step for building efficient fault-tolerant mechanisms for these applications. In this paper, we propose a methodology to characterize the resilience of OpenMP programs ...
Keywords: Error Resilience, OpenMP, algorithms

17 published by ACM
June 2014 ScienceCloud '14: Proceedings of the 5th ACM workshop on Scientific cloud computing
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 7,   Downloads (Overall): 178

Full text available: PDFPDF
Infrastructure-as-a-Service (IaaS) clouds are an appealing resource for scientific computing. However, the bare-bones presentation of raw Linux virtual machines leaves much to the application developer. For many cloud applications, effective data handling is critical to efficient application execution. This paper investigates the capabilities of a variety of POSIX-accessible distributed storage ...
Keywords: cloud, distributed computing, storage systems

18 published by ACM
June 2014 ICS '14: Proceedings of the 28th ACM international conference on Supercomputing
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 3,   Downloads (12 Months): 4,   Downloads (Overall): 185

Full text available: PDFPDF
System provisioning, resource allocation, and system configuration decisions for I/O-intensive workflow applications are complex even for expert users. Users face choices at multiple levels: allocating resources to individual sub-systems (e.g., the application layer, the storage layer) and configuring each of these optimally (e.g., replication level, chunk size, caching policies in ...
Keywords: distributed storage systems, performance prediction

19 published by ACM
May 2014 ACM Transactions on Internet Technology (TOIT): Volume 13 Issue 3, May 2014
Publisher: ACM
Bibliometrics:
Citation Count: 7
Downloads (6 Weeks): 18,   Downloads (12 Months): 105,   Downloads (Overall): 978

Full text available: PDFPDF
Online gaming is a multi-billion dollar industry that entertains a large, global population. One unfortunate phenomenon, however, poisons the competition and spoils the fun: cheating. The costs of cheating span from industry-supported expenditures to detect and limit it, to victims’ monetary losses due to cyber crime. This article studies cheaters ...
Keywords: Social networks, cheating in online games, contagion, diffusion

20 published by ACM
November 2013 IA3 '13: Proceedings of the 3rd Workshop on Irregular Applications: Architectures and Algorithms
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 4,   Downloads (12 Months): 8,   Downloads (Overall): 193

Full text available: PDFPDF
This paper investigates the power, energy, and performance characteristics of large-scale graph processing on hybrid (i.e., CPU and GPU) single-node systems. Graph processing can be accelerated on hybrid systems by properly mapping the graph-layout to processing units, such that the algorithmic tasks exercise each of the units where they perform ...
Keywords: graphics processing units, energy delay product, energy efficiency, graph processing, GPUs, hybrid systems



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2019 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us