Filters








340 Hits in 3.2 sec

A distributed mutual exclusion algorithm

Ichiro Suzuki, Tadao Kasami
1985 ACM Transactions on Computer Systems  
A distributed algorithm is presented that realizes mutual exclusion among N nodes in a computer network. The algorithm requires at most N message exchanges for one mutual exclusion invocation.  ...  To 0 1985 ACM 0734-2071/85/1100-0344 $00.75 ACM Transactions on Computer Systems, Vol. 3, No. 4, November 1985, Pages 344-349. ACM Transactions on Computer Systems, Vol. 3, No. 4, November 1985.  ...  . , N) -[I) do if not in(Q, j) and (RN[jJ = LN[j] + 1) then Q := append(Q, ACM Transactions on Computer Systems, Vol. 3, No. 4, November 1985. and Agrawala in February 1983.  ... 
doi:10.1145/6110.214406 fatcat:morn2oxgbffnbbghiegx474woy

Access normalization: loop restructuring for NUMA computers

Wei Li, Keshav Pingali
1993 ACM Transactions on Computer Systems  
To run well on such machines, software must exploit these features.  ...  The anonymous referees from both ASPLOS '92 and TOCS have provided us many helpful comments. In particular, we are grateful to Mary Lou Soffa for shepherding the ASPLOS version of this paper.  ...  A data flow-dependence occurs when a value computed in one statement is used in another statement.  ... 
doi:10.1145/161541.159766 fatcat:gxdxnl73bfcpfffqb7g42noolu

A logic of authentication

Michael Burrows, Martin Abadi, Roger Needham
1990 ACM Transactions on Computer Systems  
Authentication protocols are the basis of security in many distributed systems, and it is therefore essential to ensure that these protocols function correctly.  ...  Chris Mitchell provided information on the CCITT protocol. Kathleen Sedehi typeset an early version of this paper and produced the figures, and Cynthia Hibbard provided editorial assistance.  ...  ACM Transactions on Computer Systems, Vol. 8, No. 1, February 1990.  ... 
doi:10.1145/77648.77649 fatcat:3mihwfivx5hlvgki2vwryvream

Depot

Prince Mahajan, Srinath Setty, Sangmin Lee, Allen Clement, Lorenzo Alvisi, Mike Dahlin, Michael Walfish
2011 ACM Transactions on Computer Systems  
This article describes the design, implementation, and evaluation of Depot, a cloud storage system that minimizes trust assumptions.  ...  Aguilera, Hari Balakrishnan, Michael Freedman, Brad Karp, David Mazières, Arun Seehra, Jessica Wilson, the anonymous OSDI 2010 reviewers, and the anonymous TOCS reviewers improved this article.  ...  ACM Transactions on Computer Systems, Vol. 29, No. 4, Article 12, Publication date: December 2011.  ... 
doi:10.1145/2063509.2063512 fatcat:63hlwvtoavbqdl7lalbcbvl4yi

A high-level abstraction of shared accesses

Peter J. Keleher
2000 ACM Transactions on Computer Systems  
Tapes-based mechanisms are layered on top of existing shared memory protocols, and are largely independent of the underlying memory model.  ...  In The ACM Transactions on Computer Systems (TOCS), 18(1): 1-36, January 2000.  ...  ) into computations running on other machines.  ... 
doi:10.1145/332799.332800 fatcat:sbnuib5qprardbogepxpbyfo3u

Distributed process groups in the V Kernel

David R. Cheriton, Willy Zwaenepoel
1985 ACM Transactions on Computer Systems  
Examples include the group of tile servers, a group of processes executing a particular job, and a group of processes executing a distributed parallel computation.  ...  This abstraction is used as a software base for constructing distributed systems. As a distributed kernel, the V kernel makes intermachine boundaries largely transparent.  ...  ACM Transactions on Computer Systems, Vol. 3, No. 2, May 1985. ACM Transactions on Computer Systems, Vol. 3, No. 2, May 1985.  ... 
doi:10.1145/214438.214439 fatcat:7di35ut2hrdlpovhqopctb5eae

Improving round-trip time estimates in reliable transport protocols

Phil Karn, Craig Partridge
1991 ACM Transactions on Computer Systems  
ACKNOWLEDGMENT The authors would like to thank Will Leland and Chase Cotton as well as our anonymous TOCS reviewers for their useful comments on this paper.  ...  ACM Transactions on Computer Systems, Vol 9, No 4, Novemeber 370 .  ...  ACM Transactions on Computer Systems, Vol. 9, No, 4, Novemeber 1991. 368 q P.  ... 
doi:10.1145/118544.118549 fatcat:wfuch54eh5hb7mdd2ls6n4qa2e

Scalable high-speed prefix matching

Marcel Waldvogel, George Varghese, Jon Turner, Bernhard Plattner
2001 ACM Transactions on Computer Systems  
Finding the longest matching prefix from a database of keywords is an old problem with a number of applications, ranging from dictionary searches to advanced memory management to computational geometry  ...  COMPARISON OF EXISTING ALGORITHMS As several algorithms for efficient prefix matching lookups have appeared in the literature over the last few years (including a recent paper in ACM TOCS), we feel that  ...  and distributed file systems.  ... 
doi:10.1145/502912.502914 fatcat:2jmyu225grc3tcw34gdtoeoriy

Application-Tailored I/O with Streamline

Willem de Bruijn, Herbert Bos, Henri Bal
2011 ACM Transactions on Computer Systems  
Streamline automates optimization and only presents users a clear, concise job control language based on Unix pipelines.  ...  It improves performance of I/O-bound applications (such as webservers and streaming media applications) by constructing tailor-made I/O paths through the operating system for each application at runtime  ...  Acknowledgments We are grateful to Kees Verstoep and the anonymous TOCS reviewers for commenting on earlier drafts of the paper, Hamid Bazoobandi for helping with the evaluation of splicing, and Tudor  ... 
doi:10.1145/1963559.1963562 fatcat:z4z5yvufjvfvlcugtkdtmy6fc4

Bigtable

Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, Robert E. Gruber
2008 ACM Transactions on Computer Systems  
Bigtable is a distributed storage system for managing structured data that is designed to scale to a very large size: petabytes of data across thousands of commodity servers.  ...  These applications place very different demands on Bigtable, both in terms of data size (from URLs to web pages to satellite imagery) and latency requirements (from backend bulk processing to realtime  ...  ACKNOWLEDGMENTS We thank the anonymous reviewers for TOCS and OSDI, our OSDI shepherd Brad Calder, and David Nagle for their detailed suggestions for improvements on drafts of this paper.  ... 
doi:10.1145/1365815.1365816 fatcat:3iu3rzn3dra2dpzswp5kl5eqee

File access performance of diskless workstations

Edward D. Lazowska, John Zahorjan, David R. Cheriton, Willy Zwaenepoel
1986 ACM Transactions on Computer Systems  
The major conclusions of our study are: (1) A system of diskless workstations with a shared file server can have satisfactory performance.  ...  ACM Transactions on Computer Systems, Vol. 4, No, 3, August 1986, ACM Transactions on Computer Systems, Vol. 4, NO. 3, August 1986.  ...  Figure 7 ACM Transactions on Computer Systems, Vol. 4, No. 3, August 1986. ACM Transactions on Computer Systems, Vol. 4, No. 3, August 1986.  ... 
doi:10.1145/6420.6423 fatcat:beqsau727faitpi3pvix3hbp2m

Specifying and using a partitionable group communication service

Alan Fekete, Nancy Lynch, Alex Shvartsman
2001 ACM Transactions on Computer Systems  
Because consensus is not required in every execution, the specification is not subject to the existing impossibility results for partitionable systems.  ...  Our specification has a simple implementation, based on the membership algorithm of Cristian and Schmuck.  ...  Finally we thank the ACM TOCS referees for insightful comments and suggestions that helped us improve the presentation.  ... 
doi:10.1145/377769.377776 fatcat:pkcklslerrexrckljqtd7upnrm

Soft timers: efficient microsecond software timer support for network processing

Mohit Aron, Peter Druschel
2000 ACM Transactions on Computer Systems  
This paper proposes and evaluates soft timers, a new operating system facility that allows the efficient scheduling of software events at a granularity down to tens of microseconds.  ...  ACKNOWLEDGMENTS We are grateful to the anonymous TOCS and SOSP reviewers and our SOSP shepherd, Mendel Rosenblum, for their helpful comments.  ...  Druschel ACM Transactions on Computer Systems, Vol. 18, No. 3, August 2000. ACM Transactions on Computer Systems,Vol. 18, No. 3, August 2000. • M. Aron and P.  ... 
doi:10.1145/354871.354872 fatcat:yabie4q2ojbrhfmf3ch2xasweq

Eraser: a dynamic data race detector for multithreaded programs

Stefan Savage, Michael Burrows, Greg Nelson, Patrick Sobalvarro, Thomas Anderson
1997 ACM Transactions on Computer Systems  
Cynthia Hibbard, Brian Bershad, Michael Ernst, Paulo Guedes, Wilson Hsieh, Terri Watson, and the SOSP and TOCS reviewers provided useful feedback on earlier drafts of this article.  ...  Alan Heydon, Dave Detlefs, Chandu Thekkath, and Edward Lee provided expert advice on Vesta and Petal. Puneet Kumar worked on an earlier version of Eraser.  ...  ACM Transactions on Computer Systems, Vol. 15, No. 4, November 1997. •Stefan Savage et al.ACM Transactions on ComputerSystems, Vol. 15, No. 4, November 1997.  ... 
doi:10.1145/265924.265927 fatcat:ixhe4pbak5d3th4rwqkbhscwte

Automated anomaly detection and performance modeling of enterprise applications

Ludmila Cherkasova, Kivanc Ozonat, Ningfang Mi, Julie Symons, Evgenia Smirni
2009 ACM Transactions on Computer Systems  
It is based on integration of two complementary techniques: i) a regression-based transaction model that reflects a resource consumption model of the application, and ii) an application performance signature  ...  Early, informative warnings on significant changes in application performance should help service providers to timely identify and prevent performance problems and their negative impact on the service.  ...  If the detected change indicates an increase of the ACM TOCS, Vol. V, No. N, Month 20YY.  ... 
doi:10.1145/1629087.1629089 fatcat:eans2wl5bnfcdgikpknvl2wfte
« Previous Showing results 1 — 15 out of 340 results