A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Automated and on-demand provisioning of virtual machines for database applications
2007
Proceedings of the 2007 ACM SIGMOD international conference on Management of data - SIGMOD '07
Shirako is a toolkit for leasing VMs to an application from a utility resource infrastructure. ...
Virtual Machine (VM) technology offers powerful mechanisms to manage a utility resource infrastructure. ...
For example, a resource profile might represent a virtual machine with its share of CPU cycles, memory size, and network bandwidth. ...
doi:10.1145/1247480.1247612
dblp:conf/sigmod/ShivamDGIGYBC07
fatcat:xth5ifmu3zhpbctbl3id36aomm
Eliminating State Entanglement with Checkpoint-based Virtualization of Mobile OS Services
2015
Proceedings of the 6th Asia-Pacific Workshop on Systems - APSys '15
These interactions cause application-specific states to be spread across many service processes, a problem we identify as state entanglement. ...
State entanglement presents significant challenges to a wide variety of computing goals: fault isolation, fault tolerance, application migration, live update, and application speculation. ...
By profiling fork(), we find that it takes only 1 ms to copy and write to about 10 MB of memory, or 2500 pages. ...
doi:10.1145/2797022.2797041
dblp:conf/apsys/BoosSZ15
fatcat:rbdmwvhv7nasxkjlvjsajldyaq
An evaluation of the middleware's impact on the performance of object oriented distributed systems
2007
Journal of Systems and Software
We conducted performance testing with the purpose to reveal the specific characteristics of each middleware technology and the impact that they infer on the distributed application's performance. ...
The simulation framework can be further extended to become a testing tool able to differentiate on various service demand classes as an input in distributed applications so as to offer first-cut validated ...
The interactions between the distributed components adhere to the test application's specification. ...
doi:10.1016/j.jss.2006.09.038
fatcat:sxzdlv73jbfmdjzanxvmzb53vy
Extracting and Improving Microarchitecture Performance on Reconfigurable Architectures
2005
International journal of parallel programming
We modify its core to measure performance characteristics, obtaining a system that provides cycle-accurate timings and presents results in the style of gprof, but with absolutely no software overhead. ...
Generic processors, such as ARM and Power PC, are inexpensive, but with respect to a given application, they often overprovision in areas that are unimportant for the application's performance. ...
Based on our knowledge of this application, we next evaluate the application's performance with regard to the memory-subsystem behavior. ...
doi:10.1007/s10766-005-3575-5
fatcat:ushqlcgvo5cfjjrdhq6dg4cofq
A systems perspective on GPU computing
2016
Proceedings of the 9th Annual Workshop on General Purpose Processing using Graphics Processing Unit - GPGPU '16
Over a distinguished career, Regents Professor Karsten Schwan has made significant contributions across a diverse array of topics in computer systems, including operating systems for multi-core platforms ...
To this end, his contributions include novel scheduling and resource management abstractions, runtime specialization, and novel data management techniques to support scalable, distributed GPU frameworks ...
Acknowledgments We would like to thank Professor Sudhakar Yalamanchili, Ada Gavrilovska, Vishakha Gupta, Sudarsun Kannan, Alexander Merritt, and Dipanjan Sengupta for their feedback and assistance with ...
doi:10.1145/2884045.2884057
dblp:conf/ppopp/Farooqui16
fatcat:lcxhf6nfsvannnbp5lusxudmmu
Performance Analysis Using Subsuming Methods: An Industrial Case Study
2015
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering
Subsuming methods analysis is a new approach that aggregates performance costs across repeated patterns of method calls that occur in the application's runtime behaviour. ...
To evaluate the practicality of this analysis with a real world large-scale object-oriented application we completed a case study with the developers of letterboxd.com -a social network website for movie ...
ACKNOWLEDGMENT David Maplesden is supported by a University of Auckland Doctoral Scholarship and the John Butcher One-Tick Scholarship for Postgraduate Study in Computer Science. ...
doi:10.1109/icse.2015.143
dblp:conf/icse/MaplesdenRTHG15
fatcat:vjdonr5o4zhujmttesze6zpmhe
Resource-aware meta-computing
[chapter]
2000
Advances in Computers
We discuss how this flexibility can be used to tune the overall performance of a collection of applications in a system. ...
However, meta-computer environments pose a number of unique challenges, many of which have yet to be addressed effectively. ...
Acknowledgements We tank the other members of the Harmony Project (Bryan Buck, Hyeonsang Eom, Dejan Perkovic, Kritchalach Thitikamol) for their contributions to the project. We also thank Dr. ...
doi:10.1016/s0065-2458(00)80005-4
fatcat:dfwborv5tzelpbo37pwvaj7atm
A Semantic Context Management Framework on Mobile Device
2009
2009 International Conference on Embedded Software and Systems
We use the FOAF ontology schema and a synthetic data set of up to 2500 records to evaluate the context query and storage performance. Ordinary context queries can be replied instantaneously. ...
An open source RDF parser has been extended to effectively get RDF triples from files or over the network. ...
Live Mesh [8] and DropBox [4] are more recent industry softwares that could be used to synchronize a group of shared files among peers. ...
doi:10.1109/icess.2009.95
dblp:conf/icess/HuDW09
fatcat:ae2dwirwqrgehc3kwmwpt2xkgq
VScope: Middleware for Troubleshooting Time-Sensitive Data Center Applications
[chapter]
2012
Lecture Notes in Computer Science
With VScope, lightweight anomaly detection and interaction tracking methods can be run continuously throughout an application's execution. ...
Data-Intensive infrastructures are increasingly used for online processing of live data to guide operations and decision making. ...
In a nutshell, Scope works by searching an in-memory, global graph abstraction that describes interactions between every pair of nodes. ...
doi:10.1007/978-3-642-35170-9_7
fatcat:2aevtezkyjdktdujs7d7nhhq3m
Identifying Memory Allocation Patterns in HEP Software
2017
Journal of Physics, Conference Series
Plotting these metrics for every single allocation over time gives a new insight into application's memory handling. ...
These issues are already known for a decade, but due to the complexity of software frameworks and billions of allocations for a single job, up until recently no efficient mechanism has been available to ...
The paper shows that all profiled HEP applications suffer significantly from memory churn, meaning that 80% of allocations are smaller than 100 Bytes and about 65% live less than 1 ms. ...
doi:10.1088/1742-6596/898/7/072031
fatcat:hsy26j6zvjhdta4jyzpzdyk5fe
On-device objective-C application optimization framework for high-performance mobile processors
2014
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2014
Smartphones provide applications that are increasingly similar to those of interactive desktop programs, providing rich graphics and animations. ...
To simplify the creation of these interactive applications, mobile operating systems employ highlevel object-oriented programming languages and shared libraries to manipulate the device's peripherals and ...
The drawback to these profile-guided approaches is the necessity of having accurate profiling workloads. ...
doi:10.7873/date.2014.098
dblp:conf/date/BournoutianO14
fatcat:3ro2h54rnrh35nszp7qzsjhppy
Optimizing Google's warehouse scale computers: The NUMA experience
2013
2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA)
Leveraging a newlydesigned metric and continuous large-scale profiling in live datacenters, our production analysis demonstrates that NUMA has a significant impact (10-20%) on two important web-services ...
As a result of these challenges, there is currently a lack of understanding of the microarchitecture-workload interaction, leaving potentially significant performance on the table. ...
A load generator is set up to feed the queries, collected from production WSCs, to these applications. ...
doi:10.1109/hpca.2013.6522318
dblp:conf/hpca/TangMZHHT13
fatcat:x7rmtvko3rchzfn66sigfelcnm
From a stream of relational queries to distributed stream processing
2010
Proceedings of the VLDB Endowment
Applications from several domains are now being written to process live data originating from hardware and softwarebased streaming sources. ...
In this paper we demonstrate an application acceleration approach whereby a regular ODBC-based application is converted into a true streaming application with minimal disruption from a software engineering ...
In essence, the points where frequent database interactions are made are converted into interactions with a streaming infrastructure that is automatically generated to manage the data at rest and process ...
doi:10.14778/1920841.1921012
fatcat:xvbizkiianhhzorpnzmhp5dboq
A middleware infrastructure for active spaces
2002
IEEE pervasive computing
His research interests include ubiquitous computing, middleware, operating systems, and interactive and programmable active spaces. ...
The coordinator oversees the composition of the model, presentation, and controller components. 82 PERVASIVE computing PERVASIVE computing 83 the AUTHORS Manuel Román is a PhD candidate at the University ...
This event contains information about the speaker, including a reference to his or her profile. ...
doi:10.1109/mprv.2002.1158281
fatcat:4zlvp3nakbfvnjdtrbqw4ibwbm
"Implementation Notes For The Storage And Data Access Infrastructure", Exanest Project Deliverable D4.3
2017
Zenodo
database profiler [MDBS]. ...
[FHG] Acceleration mechanisms for Host-to-VM and VM-to-VM interactions that take into account properties of the hardware platform and the unified interconnect. ...
The calls do not depend on the application's state, i.e., accessing process' memory through pointers. Forwarding a control path call introduces a small overhead of a 8-word memory copy. ...
doi:10.5281/zenodo.802198
fatcat:x4ohfmywmjdjjlxogciiq27o7i
« Previous
Showing results 1 — 15 out of 1,597 results