A novel technique for data transmission that uses vibration motors in all cell phones as transmitters and accelerometers as receivers. By carefully regulating the...
A novel technique for data transmission that uses vibration motors in all cell phones as transmitters and accelerometers as receivers. By carefully regulating the vibrations at the transmitter and sensing them through vibration sensors, two mobile devices can communicate.
This is useful for security-sensitive applications such as mobile payments because vibrations are inherently more secure than RF broadcast in NFC or Bluetooth. The ubiquity of vibration motors in every cell phone, even in developing regions, presents an immediate market for vibratory communication
Dr. Caccamo and his team from the University of IL have developed an operating system to solve the issue of temporal unpredictability when using multi-core platforms in...
Dr. Caccamo and his team from the University of IL have developed an operating system to solve the issue of temporal unpredictability when using multi-core platforms in hard real-time systems. This is especially useful in automotive applications.
Assuming certain hardware configurations, this software can be used to achieve temporal predictability in commercial off the shelf hardware platforms.
Publications – A Real-Time Scratchpad-Centric OS for Multi-Core Embedded Systems
Dr. Nam Sung Kim has developed a protocol to vastly improve energy savings in low to medium load server environments.
The protocol works entirely on the Network Interface Card and is easy to implement. For low and medium load environments, the protocol can save approximately 50% of the energy used by the management of "sleep" and "wake" stages. It can be applied to servers both of small and large scale.
Professor Yih-Chun Hu from the University of Illinois has developed software that can protect networks against Internet attacks. In particular, it greatly reduces DDos...
Professor Yih-Chun Hu from the University of Illinois has developed software that can protect networks against Internet attacks. In particular, it greatly reduces DDos attacks, which plague the Internet. This new software could be used for personalized Internet security. MiddlePolice combines high protection of capability systems with the facile development of cloud-based services.
Drs. Choudhury and Hassanieh, and Mr. Roy from the Electrical and Computer Engineering Department at the University of Illinois at Urbana-Champaign have developed a system...
Drs. Choudhury and Hassanieh, and Mr. Roy from the Electrical and Computer Engineering Department at the University of Illinois at Urbana-Champaign have developed a system enabling microphones to record inaudible sounds called BackDoor. This system can be used for data communication, communication security and privacy, and acoustic watermarking. BackDoor operates at frequencies of 40 kHz and higher, and is not limited with the 20-24 kHz bandwidth as other ultrasound devices. Reported results achieve data rates of 4 kbps at a distance of 1 m, and 2 kbps at 1.5 m, as well as room-level (3.5 m radius) privacy protection against electronic eavesdropping.
This technology reduces latency bottlenecks in data center network communication by shifting aggregation processes to programmable switches. iSwitch is particularly...
This technology reduces latency bottlenecks in data center network communication by shifting aggregation processes to programmable switches. iSwitch is particularly relevant to AI applications such as reinforcement learning (RL)-based training, where frequent gradient aggregation typically requires a large number of network hops. In demonstrations, the technology achieved a system-level speedup of more than 3.5x for both synchronous and asynchronous RL distributed training and also improved scalability.
Application
Networking datacenters
Benefits
iSwitch results in a system-level speedup of more than 3.5x for both synchronous and asynchronous RL distributed training and also improves scalability.
Dr. Huang has developed RSSD, a ransomware-aware solid-state drive. This solid-state drive has been meticulously designed and tested to withstand 3 new types of ransomware...
Dr. Huang has developed RSSD, a ransomware-aware solid-state drive. This solid-state drive has been meticulously designed and tested to withstand 3 new types of ransomware attacks by transferring data to a cloud server through NVMe over Ethernet. RSSD faces no performance impacts and even allows for post-attack analysis to carefully identify the cause and methodology of any ransomware attacks faced by the RSSD. RSSD enhances security support from typical ransomware attacks which assume conventional SSDs perform like HDDs by preemptively protecting against 3 novel types of ransomware attacks designed by Dr. Huang. Furthermore, RSSD ensures that stale data is not discarded after a limited amount of time as current SSDs behave, instead opting to allocate the stale data to the cloud storage in a time-dependent order. This cloud storage effectively removes the limitation of storage on SSDs by providing a space to store an infinite amount of data. The NVMe over Ethernet is the novel design that serves to protect from ransomware attacks the transfer of data from the local SSD to the cloud storage.