A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
Replay of shared memory program execution is desirable in many domains including cyclic debugging, fault tolerance and performance monitoring. Past approaches to repeatable execution have focused on the problem of re-executing the shared memory access patterns in parallel programs. With the proliferation of operating system supported threads and shared memory for uniprocessor programs, there is a clear need for efficient replay of concurrent applications. The solutions for parallel systems candoi:10.1145/249069.231432 fatcat:2dhnmesvfbclhavkqvkoakrbh4
more »... e performance prohibitive when applied to the uniprocessor case. We briefly present an algorithm, called the repeatable scheduling algorithm, combining scheduling and instruction counts to provide an invariant for efficient, language independent replay of concurrent shared memory applications. We focus on the design of a general operating system exported framework that makes possible the use of hardware instruction counters and scheduling notifications for efficient implementation of repeatable scheduling.
In this version, the scheduler treats limiting the CPU utilization as best effort, i.e. if enforcing the soft rule would cause all servers that have the needed resources to be marked ineligible, the rule ... The rule then marks as candidates any oversubscribable servers for which: the sum of the VMs' allocations is less than MAX_OVERSUB, and the sum of the VMs' predicted 95 th -percentile utilizations is less ...doi:10.1145/3132747.3132772 dblp:conf/sosp/CortezBMRFB17 fatcat:ccg5udcu35eprbquevmjfoxmze
Russinovich et al.  describe CCF's programming model, receipts, governance, and replication protocols. ...arXiv:2105.13116v2 fatcat:cwmjrmivzzddfeu3t7z4ij4chi
We describe the design and implementation of Protean -the Microsoft Azure service responsible for allocating Virtual Machines (VMs) to millions of servers around the globe. A single instance of Protean serves an entire availability zone (10-100k machines), facilitating seamless failover and scaleout to customers. The design has proven robust, enabling a substantial expansion of VM offerings and features with minimal changes to the core infrastructure. In particular, Protean preserves a cleardblp:conf/osdi/HadaryMMPGDDJCR20 fatcat:zriucdzk65clnbh76p4eadvrfa
more »... aration between policy and mechanisms. From a policy perspective, a flexible rule-based Allocation Agent (AA) allows Protean to efficiently address multiple constraints and performance criteria, and adapt to different conditions. On the system side, a multi-layer caching mechanism expedites the allocation process, achieving turnaround times of few milliseconds. A slight compromise on allocation quality enables multiple AAs to run concurrently on the same inventory, resulting in increased throughput with negligible conflict rate. Our results from both simulations and production demonstrate that Protean achieves high throughput and utilization (85-90% on a key utilization metric), while satisfying user-specific requirements. We also demonstrate how Protean is adapted to handle capacity crunch conditions, by zooming in on spikes caused by COVID-19.
If the check succeeds, we then check that the address is marked as writable in the bitmap. ...doi:10.1109/sp.2015.10 dblp:conf/sp/SchusterCFGPMR15 fatcat:aosg7w2refhi7i3q3uvk7qm374
Function as a Service (FaaS) has been gaining popularity as a way to deploy computations to serverless backends in the cloud. This paradigm shifts the complexity of allocating and provisioning resources to the cloud provider, which has to provide the illusion of always-available resources (i.e., fast function invocations without cold starts) at the lowest possible resource cost. Doing so requires the provider to deeply understand the characteristics of the FaaS workload. Unfortunately, therearXiv:2003.03423v3 fatcat:llayop67tzbjnbadk3pbt5u3lm
more »... been little to no public information on these characteristics. Thus, in this paper, we first characterize the entire production FaaS workload of Azure Functions. We show for example that most functions are invoked very infrequently, but there is an 8-order-of-magnitude range of invocation frequencies. Using observations from our characterization, we then propose a practical resource management policy that significantly reduces the number of function coldstarts,while spending fewerresources than state-of-the-practice policies.
During swap-out, it first looks up whether the host already contains a buffer with the same content checksum; if yes, it avoids the swapout and simply marks the GPU buffer as unused (GC happens lazily ...arXiv:2202.07848v2 fatcat:y5kbgdevwra5bcovf3j2mhcv6u
Sysinternals Suite 2012.05.14, Pack de Utilidades para solucionar problemas Descripción Sysinternals Suite es un paquete completo de utilidades de las muy conocidas herramientas de Mark Russinovich. ...doaj:c07b79a9d75d430a9a62989c89804ccc fatcat:elrok66wvvgg7pbr3b33illrwy
., 9104548, 9104549 Seidel, Asher, 9104595 Seidel, Gill, 9103647 Seidenberg, Mark S., 9102419 Seikel, J. ... 9102391, 9104374 Soars, John, 9102784 Sobkowiak, Wiodzimierz, 9103326 — — Miquel, 9103209, 8 arses _ 9104181, 9104188, Soft, OFreak, 9104814 lan, Harold A., 9104814 Solano, Frank R., 9104310 Solé, Yolanda Russinovich ...
Behavior Research Methods
The Yamaha speakers with switchable hardware DSP effects, for example, showed no marked increase in latencies, regardless of whether DSP was switched on. ... Russinovich, M. (2007, August 27). Vista Multimedia playback and network throughput. Article posted to http://blogs.technet.coin/ markrussinovich/archive/2007/08/27/1833290.aspx Schmidt, W. ...
Mark, III, 9005601 Russell, Frances, 9005847, 9007042 Russell, Jane, 9007343 Russell, Raymond Scott, 9005763 Rusted, J. ... V., 90r02324 Sojat, Antun, 9006496 Sojat, Olga, 9006883 Soldano, Giuseppe, 9006834 Solé, Yolanda Russinovich, 9006114 Soles, Derek Arthur John, 9005765 Solodub, Yuriy P., 90r02229 Sommerfeldt, Karl-Ernst ...
John, Mark F., 9101556 Staab, Claire F., 9100630 Stahl-Cemake, Josephine, 9100760 Stahlke, Herbert F. ... ., 9101166 Sole, Yolanda Russinovich, 9100793 Soloway, Robert Martin, 9100693 Somers, Harold, 91100679 Sonck-Mercier, A., 9100440 Sondergaard, Georg, 9101645 Sondheimer, Norman, 9101555 Song, Kyung-An, ...
In a presentation at TechEd 2014  Nathan Ide and Mark Russinovich of Microsoft showed the following overview of reusable credentials during an active session. ...doi:10.5281/zenodo.3521331 fatcat:xanmgtr27rhnri2wsyp7ehzhqe
Prior to Windows 8 the kernel marked "protected" allocations by setting the most significant bit of PoolTag, so care should be taken to scan for both variants. ... For example, there is a pool region in session space, which is used for data that is common to all processes in the session (Russinovich et al., 2012, pp. 212e213) . ...doi:10.1016/j.diin.2016.01.005 fatcat:zhssv5mpvvgqxngxyvfu2m6oqe
Russinovich discovered a rootkit included in a number of Sony BMG music CDs. ... . ■ According to Valerie McNiven, cybercrime advisor to the US Department of Treasury, 2004 marked the first time that cybercrime yielded more revenue than the drug trade's estimated US$105 billion. ...doi:10.1109/msp.2006.19 fatcat:fwowqtzbevgahjvtpckex75kgy
« Previous Showing results 1 — 15 out of 132 results