Filters








132 Hits in 0.64 sec

Replay for concurrent non-deterministic shared-memory applications

Mark Russinovich, Bryce Cogswell
1996 SIGPLAN notices  
Replay of shared memory program execution is desirable in many domains including cyclic debugging, fault tolerance and performance monitoring. Past approaches to repeatable execution have focused on the problem of re-executing the shared memory access patterns in parallel programs. With the proliferation of operating system supported threads and shared memory for uniprocessor programs, there is a clear need for efficient replay of concurrent applications. The solutions for parallel systems can
more » ... e performance prohibitive when applied to the uniprocessor case. We briefly present an algorithm, called the repeatable scheduling algorithm, combining scheduling and instruction counts to provide an invariant for efficient, language independent replay of concurrent shared memory applications. We focus on the design of a general operating system exported framework that makes possible the use of hardware instruction counters and scheduling notifications for efficient implementation of repeatable scheduling.
doi:10.1145/249069.231432 fatcat:2dhnmesvfbclhavkqvkoakrbh4

Resource Central

Eli Cortez, Anand Bonde, Alexandre Muzio, Mark Russinovich, Marcus Fontoura, Ricardo Bianchini
2017 Proceedings of the 26th Symposium on Operating Systems Principles - SOSP '17  
In this version, the scheduler treats limiting the CPU utilization as best effort, i.e. if enforcing the soft rule would cause all servers that have the needed resources to be marked ineligible, the rule  ...  The rule then marks as candidates any oversubscribable servers for which: the sum of the VMs' allocations is less than MAX_OVERSUB, and the sum of the VMs' predicted 95 th -percentile utilizations is less  ... 
doi:10.1145/3132747.3132772 dblp:conf/sosp/CortezBMRFB17 fatcat:ccg5udcu35eprbquevmjfoxmze

IA-CCF: Individual Accountability for Permissioned Ledgers [article]

Alex Shamis, Peter Pietzuch, Miguel Castro, Cédric Fournet, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Antoine Delignat-Lavaud, Matthew Kerner, Julien Maffre, Manuel Costa, Mark Russinovich
2022 arXiv   pre-print
Russinovich et al. [54] describe CCF's programming model, receipts, governance, and replication protocols.  ... 
arXiv:2105.13116v2 fatcat:cwmjrmivzzddfeu3t7z4ij4chi

Protean: VM Allocation Service at Scale

Ori Hadary, Luke Marshall, Ishai Menache, Abhisek Pan, Esaias E. Greeff, David Dion, Star Dorminey, Shailesh Joshi, Yang Chen, Mark Russinovich, Thomas Moscibroda
2020 USENIX Symposium on Operating Systems Design and Implementation  
We describe the design and implementation of Protean -the Microsoft Azure service responsible for allocating Virtual Machines (VMs) to millions of servers around the globe. A single instance of Protean serves an entire availability zone (10-100k machines), facilitating seamless failover and scaleout to customers. The design has proven robust, enabling a substantial expansion of VM offerings and features with minimal changes to the core infrastructure. In particular, Protean preserves a clear
more » ... aration between policy and mechanisms. From a policy perspective, a flexible rule-based Allocation Agent (AA) allows Protean to efficiently address multiple constraints and performance criteria, and adapt to different conditions. On the system side, a multi-layer caching mechanism expedites the allocation process, achieving turnaround times of few milliseconds. A slight compromise on allocation quality enables multiple AAs to run concurrently on the same inventory, resulting in increased throughput with negligible conflict rate. Our results from both simulations and production demonstrate that Protean achieves high throughput and utilization (85-90% on a key utilization metric), while satisfying user-specific requirements. We also demonstrate how Protean is adapted to handle capacity crunch conditions, by zooming in on spikes caused by COVID-19.
dblp:conf/osdi/HadaryMMPGDDJCR20 fatcat:zriucdzk65clnbh76p4eadvrfa

VC3: Trustworthy Data Analytics in the Cloud Using SGX

Felix Schuster, Manuel Costa, Cedric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, Mark Russinovich
2015 2015 IEEE Symposium on Security and Privacy  
If the check succeeds, we then check that the address is marked as writable in the bitmap.  ... 
doi:10.1109/sp.2015.10 dblp:conf/sp/SchusterCFGPMR15 fatcat:aosg7w2refhi7i3q3uvk7qm374

Serverless in the Wild: Characterizing and Optimizing the Serverless Workload at a Large Cloud Provider [article]

Mohammad Shahrad, Rodrigo Fonseca, Íñigo Goiri, Gohar Chaudhry, Paul Batum, Jason Cooke, Eduardo Laureano, Colby Tresness, Mark Russinovich, Ricardo Bianchini
2020 arXiv   pre-print
Function as a Service (FaaS) has been gaining popularity as a way to deploy computations to serverless backends in the cloud. This paradigm shifts the complexity of allocating and provisioning resources to the cloud provider, which has to provide the illusion of always-available resources (i.e., fast function invocations without cold starts) at the lowest possible resource cost. Doing so requires the provider to deeply understand the characteristics of the FaaS workload. Unfortunately, there
more » ... been little to no public information on these characteristics. Thus, in this paper, we first characterize the entire production FaaS workload of Azure Functions. We show for example that most functions are invoked very infrequently, but there is an 8-order-of-magnitude range of invocation frequencies. Using observations from our characterization, we then propose a practical resource management policy that significantly reduces the number of function coldstarts,while spending fewerresources than state-of-the-practice policies.
arXiv:2003.03423v3 fatcat:llayop67tzbjnbadk3pbt5u3lm

Singularity: Planet-Scale, Preemptive and Elastic Scheduling of AI Workloads [article]

Dharma Shukla, Muthian Sivathanu, Srinidhi Viswanatha, Bhargav Gulavani, Rimma Nehme, Amey Agrawal, Chen Chen, Nipun Kwatra, Ramachandran Ramjee, Pankaj Sharma, Atul Katiyar, Vipul Modi (+14 others)
2022 arXiv   pre-print
During swap-out, it first looks up whether the host already contains a buffer with the same content checksum; if yes, it avoids the swapout and simply marks the GPU buffer as unused (GC happens lazily  ... 
arXiv:2202.07848v2 fatcat:y5kbgdevwra5bcovf3j2mhcv6u

Eventos y Productos

MsC. Julio Cesar Camps
2013 Telemática  
Sysinternals Suite 2012.05.14, Pack de Utilidades para solucionar problemas Descripción Sysinternals Suite es un paquete completo de utilidades de las muy conocidas herramientas de Mark Russinovich.  ... 
doaj:c07b79a9d75d430a9a62989c89804ccc fatcat:elrok66wvvgg7pbr3b33illrwy

Page 873 of Linguistics and Language Behavior Abstracts: LLBA Vol. 25, Issue 2 [page]

1991 Linguistics and Language Behavior Abstracts: LLBA  
., 9104548, 9104549 Seidel, Asher, 9104595 Seidel, Gill, 9103647 Seidenberg, Mark S., 9102419 Seikel, J.  ...  9102391, 9104374 Soars, John, 9102784 Sobkowiak, Wiodzimierz, 9103326 — — Miquel, 9103209, 8 arses _ 9104181, 9104188, Soft, OFreak, 9104814 lan, Harold A., 9104814 Solano, Frank R., 9104310 Solé, Yolanda Russinovich  ... 

Page 603 of Behavior Research Methods Vol. 41, Issue 3 [page]

2009 Behavior Research Methods  
The Yamaha speakers with switchable hardware DSP effects, for example, showed no marked increase in latencies, regardless of whether DSP was switched on.  ...  Russinovich, M. (2007, August 27). Vista Multimedia playback and network throughput. Article posted to http://blogs.technet.coin/ markrussinovich/archive/2007/08/27/1833290.aspx Schmidt, W.  ... 

Page 1357 of Linguistics and Language Behavior Abstracts: LLBA Vol. 24, Issue 3 [page]

1990 Linguistics and Language Behavior Abstracts: LLBA  
Mark, III, 9005601 Russell, Frances, 9005847, 9007042 Russell, Jane, 9007343 Russell, Raymond Scott, 9005763 Rusted, J.  ...  V., 90r02324 Sojat, Antun, 9006496 Sojat, Olga, 9006883 Soldano, Giuseppe, 9006834 Solé, Yolanda Russinovich, 9006114 Soles, Derek Arthur John, 9005765 Solodub, Yuriy P., 90r02229 Sommerfeldt, Karl-Ernst  ... 

Page 342 of Linguistics and Language Behavior Abstracts: LLBA Vol. 25, Issue 1 [page]

1991 Linguistics and Language Behavior Abstracts: LLBA  
John, Mark F., 9101556 Staab, Claire F., 9100630 Stahl-Cemake, Josephine, 9100760 Stahlke, Herbert F.  ...  ., 9101166 Sole, Yolanda Russinovich, 9100793 Soloway, Robert Martin, 9100693 Somers, Harold, 91100679 Sonck-Mercier, A., 9100440 Sondergaard, Georg, 9101645 Sondheimer, Norman, 9101555 Song, Kyung-An,  ... 

Windows Passwords - A Well Known Secret?

Michael Schneider
2014 Zenodo  
In a presentation at TechEd 2014 [1] Nathan Ide and Mark Russinovich of Microsoft showed the following overview of reusable credentials during an active session.  ... 
doi:10.5281/zenodo.3521331 fatcat:xanmgtr27rhnri2wsyp7ehzhqe

Pool tag quick scanning for windows memory analysis

Joe T. Sylve, Vico Marziale, Golden G. Richard
2016 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
Prior to Windows 8 the kernel marked "protected" allocations by setting the most significant bit of PoolTag, so care should be taken to scan for both variants.  ...  For example, there is a pool region in session space, which is used for data that is common to all processes in the session (Russinovich et al., 2012, pp. 212e213) .  ... 
doi:10.1016/j.diin.2016.01.005 fatcat:zhssv5mpvvgqxngxyvfu2m6oqe

News Briefs

H. Drinan, N. Fontaine, B. Kesler
2006 IEEE Security and Privacy  
Russinovich discovered a rootkit included in a number of Sony BMG music CDs.  ...  . ■ According to Valerie McNiven, cybercrime advisor to the US Department of Treasury, 2004 marked the first time that cybercrime yielded more revenue than the drug trade's estimated US$105 billion.  ... 
doi:10.1109/msp.2006.19 fatcat:fwowqtzbevgahjvtpckex75kgy
« Previous Showing results 1 — 15 out of 132 results