A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A distributed mutual exclusion algorithm
1985
ACM Transactions on Computer Systems
A distributed algorithm is presented that realizes mutual exclusion among N nodes in a computer network. The algorithm requires at most N message exchanges for one mutual exclusion invocation. ...
To 0 1985 ACM 0734-2071/85/1100-0344 $00.75 ACM Transactions on Computer Systems, Vol. 3, No. 4, November 1985, Pages 344-349.
ACM Transactions on Computer Systems, Vol. 3, No. 4, November 1985. ...
. , N) -[I) do if not in(Q, j) and (RN[jJ = LN[j] + 1) then Q := append(Q,
ACM Transactions on Computer Systems, Vol. 3, No. 4, November 1985.
and Agrawala in February 1983. ...
doi:10.1145/6110.214406
fatcat:morn2oxgbffnbbghiegx474woy
Access normalization: loop restructuring for NUMA computers
1993
ACM Transactions on Computer Systems
To run well on such machines, software must exploit these features. ...
The anonymous referees from both ASPLOS '92 and TOCS have provided us many helpful comments. In particular, we are grateful to Mary Lou Soffa for shepherding the ASPLOS version of this paper. ...
A data flow-dependence occurs when a value computed in one statement is used in another statement. ...
doi:10.1145/161541.159766
fatcat:gxdxnl73bfcpfffqb7g42noolu
A logic of authentication
1990
ACM Transactions on Computer Systems
Authentication protocols are the basis of security in many distributed systems, and it is therefore essential to ensure that these protocols function correctly. ...
Chris Mitchell provided information on the CCITT protocol. Kathleen Sedehi typeset an early version of this paper and produced the figures, and Cynthia Hibbard provided editorial assistance. ...
ACM Transactions on Computer Systems, Vol. 8, No. 1, February 1990. ...
doi:10.1145/77648.77649
fatcat:3mihwfivx5hlvgki2vwryvream
Depot
2011
ACM Transactions on Computer Systems
This article describes the design, implementation, and evaluation of Depot, a cloud storage system that minimizes trust assumptions. ...
Aguilera, Hari Balakrishnan, Michael Freedman, Brad Karp, David Mazières, Arun Seehra, Jessica Wilson, the anonymous OSDI 2010 reviewers, and the anonymous TOCS reviewers improved this article. ...
ACM Transactions on Computer Systems, Vol. 29, No. 4, Article 12, Publication date: December 2011. ...
doi:10.1145/2063509.2063512
fatcat:63hlwvtoavbqdl7lalbcbvl4yi
A high-level abstraction of shared accesses
2000
ACM Transactions on Computer Systems
Tapes-based mechanisms are layered on top of existing shared memory protocols, and are largely independent of the underlying memory model. ...
In The ACM Transactions on Computer Systems (TOCS), 18(1): 1-36, January 2000. ...
) into computations running on other machines. ...
doi:10.1145/332799.332800
fatcat:sbnuib5qprardbogepxpbyfo3u
Distributed process groups in the V Kernel
1985
ACM Transactions on Computer Systems
Examples include the group of tile servers, a group of processes executing a particular job, and a group of processes executing a distributed parallel computation. ...
This abstraction is used as a software base for constructing distributed systems. As a distributed kernel, the V kernel makes intermachine boundaries largely transparent. ...
ACM Transactions on Computer Systems, Vol. 3, No. 2, May 1985.
ACM Transactions on Computer Systems, Vol. 3, No. 2, May 1985. ...
doi:10.1145/214438.214439
fatcat:7di35ut2hrdlpovhqopctb5eae
Improving round-trip time estimates in reliable transport protocols
1991
ACM Transactions on Computer Systems
ACKNOWLEDGMENT The authors would like to thank Will Leland and Chase Cotton as well as our anonymous TOCS reviewers for their useful comments on this paper. ...
ACM Transactions
on Computer Systems, Vol 9, No 4, Novemeber 370
. ...
ACM Transactions
on Computer Systems, Vol. 9, No, 4, Novemeber
1991.
368
q
P. ...
doi:10.1145/118544.118549
fatcat:wfuch54eh5hb7mdd2ls6n4qa2e
Scalable high-speed prefix matching
2001
ACM Transactions on Computer Systems
Finding the longest matching prefix from a database of keywords is an old problem with a number of applications, ranging from dictionary searches to advanced memory management to computational geometry ...
COMPARISON OF EXISTING ALGORITHMS As several algorithms for efficient prefix matching lookups have appeared in the literature over the last few years (including a recent paper in ACM TOCS), we feel that ...
and distributed file systems. ...
doi:10.1145/502912.502914
fatcat:2jmyu225grc3tcw34gdtoeoriy
Application-Tailored I/O with Streamline
2011
ACM Transactions on Computer Systems
Streamline automates optimization and only presents users a clear, concise job control language based on Unix pipelines. ...
It improves performance of I/O-bound applications (such as webservers and streaming media applications) by constructing tailor-made I/O paths through the operating system for each application at runtime ...
Acknowledgments We are grateful to Kees Verstoep and the anonymous TOCS reviewers for commenting on earlier drafts of the paper, Hamid Bazoobandi for helping with the evaluation of splicing, and Tudor ...
doi:10.1145/1963559.1963562
fatcat:z4z5yvufjvfvlcugtkdtmy6fc4
Bigtable
2008
ACM Transactions on Computer Systems
Bigtable is a distributed storage system for managing structured data that is designed to scale to a very large size: petabytes of data across thousands of commodity servers. ...
These applications place very different demands on Bigtable, both in terms of data size (from URLs to web pages to satellite imagery) and latency requirements (from backend bulk processing to realtime ...
ACKNOWLEDGMENTS We thank the anonymous reviewers for TOCS and OSDI, our OSDI shepherd Brad Calder, and David Nagle for their detailed suggestions for improvements on drafts of this paper. ...
doi:10.1145/1365815.1365816
fatcat:3iu3rzn3dra2dpzswp5kl5eqee
File access performance of diskless workstations
1986
ACM Transactions on Computer Systems
The major conclusions of our study are: (1) A system of diskless workstations with a shared file server can have satisfactory performance. ...
ACM Transactions on Computer Systems, Vol. 4, No, 3, August 1986,
ACM Transactions on Computer Systems, Vol. 4, NO. 3, August 1986. ...
Figure 7
ACM Transactions on Computer Systems, Vol. 4, No. 3, August 1986.
ACM Transactions on Computer Systems, Vol. 4, No. 3, August 1986. ...
doi:10.1145/6420.6423
fatcat:beqsau727faitpi3pvix3hbp2m
Specifying and using a partitionable group communication service
2001
ACM Transactions on Computer Systems
Because consensus is not required in every execution, the specification is not subject to the existing impossibility results for partitionable systems. ...
Our specification has a simple implementation, based on the membership algorithm of Cristian and Schmuck. ...
Finally we thank the ACM TOCS referees for insightful comments and suggestions that helped us improve the presentation. ...
doi:10.1145/377769.377776
fatcat:pkcklslerrexrckljqtd7upnrm
Soft timers: efficient microsecond software timer support for network processing
2000
ACM Transactions on Computer Systems
This paper proposes and evaluates soft timers, a new operating system facility that allows the efficient scheduling of software events at a granularity down to tens of microseconds. ...
ACKNOWLEDGMENTS We are grateful to the anonymous TOCS and SOSP reviewers and our SOSP shepherd, Mendel Rosenblum, for their helpful comments. ...
Druschel ACM Transactions on Computer Systems, Vol. 18, No. 3, August 2000.
ACM Transactions on Computer Systems,Vol. 18, No. 3, August 2000.
• M. Aron and P. ...
doi:10.1145/354871.354872
fatcat:yabie4q2ojbrhfmf3ch2xasweq
Eraser: a dynamic data race detector for multithreaded programs
1997
ACM Transactions on Computer Systems
Cynthia Hibbard, Brian Bershad, Michael Ernst, Paulo Guedes, Wilson Hsieh, Terri Watson, and the SOSP and TOCS reviewers provided useful feedback on earlier drafts of this article. ...
Alan Heydon, Dave Detlefs, Chandu Thekkath, and Edward Lee provided expert advice on Vesta and Petal. Puneet Kumar worked on an earlier version of Eraser. ...
ACM Transactions on Computer Systems, Vol. 15, No. 4, November 1997.
•Stefan Savage et al.ACM Transactions on ComputerSystems, Vol. 15, No. 4, November 1997. ...
doi:10.1145/265924.265927
fatcat:ixhe4pbak5d3th4rwqkbhscwte
Automated anomaly detection and performance modeling of enterprise applications
2009
ACM Transactions on Computer Systems
It is based on integration of two complementary techniques: i) a regression-based transaction model that reflects a resource consumption model of the application, and ii) an application performance signature ...
Early, informative warnings on significant changes in application performance should help service providers to timely identify and prevent performance problems and their negative impact on the service. ...
If the detected change indicates an increase of the ACM TOCS, Vol. V, No. N, Month 20YY. ...
doi:10.1145/1629087.1629089
fatcat:eans2wl5bnfcdgikpknvl2wfte
« Previous
Showing results 1 — 15 out of 340 results