Filters








216,358 Hits in 4.3 sec

UniHeap: Managing Persistent Objects Across Managed Runtimes for Non-Volatile Memory [article]

Daixuan Li, Benjamin Reidys, Jinghan Sun, Thomas Shull, Josep Torrellas, Jian Huang
2022 arXiv   pre-print
It proposes a unified persistent object model that supports various managed languages, and manages NVM within a shared heap that enables cross-language persistent object sharing.  ...  UniHeap reduces the object persistence overhead by managing the shared heap in a log-structured manner and coalescing object updates during the garbage collection.  ...  • We present a shared NVM heap for managing persistent objects.  ... 
arXiv:2205.06444v1 fatcat:saivvv4i35chfkhmvka5ystqlu

The Redesigned BaBar Event Store: Believe the Hype [article]

Adeyemi Adesanya, Jacek Becla, Daniel Wang
2003 arXiv   pre-print
With significant experience in managing actual production data under our belt, we are now in a position to recraft the system to better suit current needs.  ...  The persistent event storage system has remained largely unchanged since the initial implementation, and thus includes many design features which have become performance bottlenecks.  ...  Acknowledgments We wish to acknowledge David Quarrie and Simon Patton for their work on the original BaBar event store [1] .  ... 
arXiv:cs/0306023v1 fatcat:ezwrufird5cc7k2pnsqypllj44

Mosiqs: Persistent Memory Object Storage with Metadata Indexing and Querying for Scientific Computing

Awais Khan, Hyogi Sim, Sudharshan S. Vazhkudai, Youngjae Kim
2021 IEEE Access  
Therefore, sharing a PMO beyond the application bounds to other applications or scientists requires storing the persistent pointer of PMO.  ...  Our key contributions in this paper are: • We propose an application framework for PM to store and access memory objects via persistent pointers beyond the application lifetime and to share objects across  ...  He is also a Distinguished Scientist at ORNL and studies the fundamental underpinnings of supercomputers and data centers in many of the aforementioned areas.  ... 
doi:10.1109/access.2021.3087502 fatcat:vqaurh7hjjbbna6ei46e6mjlva

Two models for integrating persistence and lazy functional languages

David J. McNally, Antony J. T. Davie
1991 SIGPLAN notices  
The first, persistence with modules, relies on static binding to objects in the persistent store (By 'object', we mean the concrete representation of a value).  ...  The second, stream persistence, provides a more flexible mechanism which supports dynamic binding to objects in the persistent store.  ...  Acknowledgements We are indebted to Fred Brown for providing the persistent storage system [Brow89] which underlies Staple and to our colleagues at St Andrews for their valuable comments.  ... 
doi:10.1145/122501.122504 fatcat:b5fritlz65a6xio3w4t6uodnty

Persistent Languages and Architectures [chapter]

R. Morrison, M. P. Atkinson
1990 Workshops in Computing  
Following these rules, languages may be designed that provide persistence as a basic abstraction.  ...  Persistent programming is concerned with creating and manipulating data in a manner that is independent of its lifetime.  ...  Figure 5 illustrates a data structure where one of the components is pointed at or shared by two others. This sharing should be preserved within the persistent store.  ... 
doi:10.1007/978-1-4471-3178-6_2 fatcat:ouu5imn5evezthppixfxxixiyu

HEAPO

Taeho Hwang, Jaemin Jung, Youjip Won
2014 ACM Transactions on Storage  
In this work, we developed a Heap-Based Persistent Object Store (HEAPO) to manage persistent objects in byte-addressable Nonvolatile RAM (NVRAM).  ...  HEAPO defines its own persistent heap layout, the persistent object format, name space organization, object sharing and protection mechanism, and undo-only log-based crash recovery, all of which are effectively  ...  Update consistency for a shared persistent object is guaranteed since the HEAPO library synchronizes the accesses to the shared object metadata with a lock.  ... 
doi:10.1145/2629619 fatcat:y2s5qs5uzrc6vlol4zdomdlzse

Object Persistence Techniques - A Study of Approaches, Benefits, Limits and Challenges

Clarence JMTauro, Ritesh Kumar Sahai, Sandhya Rani A.
2014 International Journal of Computer Applications  
Object-Persistence feature contributes a major role in designing data model.  ...  The major benefit we can obtain from Object-Orientation is of course object itself and the feature that enable us making an object persistent.  ...  Data Sharing Characteristics This section describes about how the various Object-Persistence methods provide data sharing support for applications.  ... 
doi:10.5120/14837-3099 fatcat:gzpzdh7zkjcr7kdgw6q3eznqde

PerDiS: An Infrastructure for Cooperative Engineering in Virtual Enterprise [chapter]

Fadi Sandakly, Joao Garcia, Paulo Ferreira, Patrice Poyet
1999 IFIP Advances in Information and Communication Technology  
data store based on distributed-shared memory paradigm.  ...  PerDiS is based on Persistent Shared Memory where no difference exists between persistent and volatile object manipulation.  ... 
doi:10.1007/978-0-387-35577-1_21 fatcat:l6257bmbxvhbjjuialhnvvxrhq

Distributed persistent stores

Frans A Henskens, John Rosenberg
1993 Microprocessors and microsystems  
Considerable effort has been expended over the last decade on the production of persistent stores, for example CMS POMS, CPOMS, MONADS and Thatte's Persistent Memory.  ...  We then examine and contrast two examples of distributed persistent stores, the Monads DSM and distributed Napier.  ...  This implies that an object exists in the persistent store if it is referred to by another object in the persistent store.  ... 
doi:10.1016/0141-9331(93)90045-9 fatcat:qn73sfazuzc7reineqz7zeanb4

Secure Object Stores (SOS): Non-Volatile Memory Architecture for Secure Computing

Rodel Felipe Miguel, Sivaraman Sundaram, K. M. M. Aung
2016 Journal of Computers  
A program's persistent data and run-time objects that contain sensitive information and without proper security mechanisms in place, it exposes to critical attacks.  ...  In this paper, we will introduce Secure Object Stores (SOS), which is an object-based mechanism to access the NVM. We also illustrate different use-cases that can take advantage of the SOS.  ...  Object stores using capability tokens and a namespace allow easy expansion of a local store to global/distributed stores, e.g. IMC.  ... 
doi:10.17706/jcp.11.3.189-194 fatcat:wxqidpqsbzclhd6aonq5umrsnm

Lightweight shared objects in a 64-bit operating system

Jeffrey S. Chase, Henry M. Levy, Edward D. Lazowska, Miche Baker-Harvey
1992 SIGPLAN notices  
We describe facilities for object-based sharing of persistent data and services in Opal, an operating system we are developing for paged 64-bit architectures.  ...  The distinctive feature of Opal is that object sharing is supported in a runtime library, a,bove a single virtual address space that maps all primary and secondary storage in a local area network.  ...  Persistent Services Opal supports persistent service objects whose capabilities can be stored on disk and used after a system restart.  ... 
doi:10.1145/141937.141969 fatcat:jpd47q4sezhpvdbpr3pkjaq4ki

Comparative Study on Object Persistence Methods

Clarence JMTauro, N Ganesan, Ritesh Kumar Sahai, Sandhya Rani A
2012 International Journal of Computer Applications  
Object persistence plays a key role in designing data model, business objects working with other business objects. Object persistence could be very efficient if designed correctly.  ...  A typical design leads extra overheads in terms of cost, resource utilization, and time. Considering the importance of object persistence, it is very essential to concentrate more on this area.  ...  The data store schema that is used to store the persistent state of the objects in the data store is different from the objects having a different model (object-oriented) for an application.  ... 
doi:10.5120/5704-7755 fatcat:aprzoqc765cyblbsyp4asbemgu

Mobility and persistence [chapter]

Miguel Mira da Silva
1997 Lecture Notes in Computer Science  
In the last three years we have been working with persistence and distribution, in particular migration of higher-level objects between autonomous persistent programs.  ...  In this chapter we introduce persistence and then present a few examples of opportunities and many more challenges that exist in the combination of persistence and mobility.  ...  Many other people have contributed to this research work, specially Andrew Black, Joachim Baumann, Peter Dickman, Peter Larsson and the participants in the 2nd ECOOP Workshop on Mobile Object Systems.  ... 
doi:10.1007/3-540-62852-5_13 fatcat:ekk73g4fbjadvchufwqslamwku

Lightweight shared objects in a 64-bit operating system

Jeffrey S. Chase, Henry M. Levy, Edward D. Lazowska, Miche Baker-Harvey
1992 conference proceedings on Object-oriented programming systems, languages, and applications - OOPSLA '92  
We describe facilities for object-based sharing of persistent data and services in Opal, an operating system we are developing for paged 64-bit architectures.  ...  The distinctive feature of Opal is that object sharing is supported in a runtime library, a,bove a single virtual address space that maps all primary and secondary storage in a local area network.  ...  Persistent Services Opal supports persistent service objects whose capabilities can be stored on disk and used after a system restart.  ... 
doi:10.1145/141936.141969 dblp:conf/oopsla/ChaseLLB92 fatcat:twpmgzvtbbcrxp7x7j5gahnypq

The Trusted Execution Module: Commodity General-Purpose Trusted Computing [chapter]

Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, Srinivas Devadas
2008 Lecture Notes in Computer Science  
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment.  ...  Compared to a conventional smartcard, which is typically used by pre-programming a limited set of domain-or application-specific commands onto the smartcard, and compared to the Trusted Platform Module  ...  Namely, an object is constructed on a TEM by creating persistent store associations for all its fields. An object is destroyed by remove-ing the persistent store associations.  ... 
doi:10.1007/978-3-540-85893-5_10 fatcat:ofwpmtpfr5c7fmbht7epzy2q4y
« Previous Showing results 1 — 15 out of 216,358 results