A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Flask coherence: A morphable hybrid coherence protocol to balance energy, performance and scalability
2015
2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA)
Using the same configuration, it can outperform the performance and on-chip memory hierarchy energy of a broadcast-based coherence protocol such as Token by 10% and 20% respectively. ...
With a directory capable of tracking just 40% of the blocks kept in private caches, this coherence protocol is able to match the performance and energy of a sparse-directory capable of tracking 160% of ...
Figure 7 : 7 Example of marshaling shared memory onto the stack to invoke an unsafe library function foo().
Figure 8 : 8 Performance with safe library functions. ...
doi:10.1109/hpca.2015.7056033
dblp:conf/hpca/MenezoPG15
fatcat:4lssxzd2ozdf7eonk44s3dmsge
Practical Fine-grained Privilege Separation in Multithreaded Applications
[article]
2013
arXiv
pre-print
We ported a widely-used, in-memory database application (memcached) to ARBITER system, changing only around 100 LOC. ...
To realize controlled sharing in a fine-grained manner, we created a novel abstraction named ARBITER Secure Memory Segment (ASMS) and corresponding OS support. ...
Our experiments demonstrate Arbiter's ease-of-adoption as well as its satisfying application performance. ...
arXiv:1305.2553v1
fatcat:aqerh3nbe5dqhkdmnqavxml4zu
PMThreads: persistent memory threads harnessing versioned shadow copies
2020
Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation
Using Memcached, we also investigate the scalability of PMThreads and the effect of different time intervals for the quiescent state. ...
Byte-addressable non-volatile memory (NVM) makes it possible to perform fast in-memory accesses to persistent data using standard load/store processor instructions. ...
Mikel Luján is funded by an Arm/RAEng Research Chair Award and a Royal Society Wolfson Fellowship. ...
doi:10.1145/3385412.3386000
dblp:conf/pldi/WuLNZL20
fatcat:oehtxdzpwvadjivnauhpre6vsm
Arrakis
2015
ACM Transactions on Computer Systems
In a traditional operating system, the kernel mediates access to device hardware by server applications, to enforce process isolation as well as network and disk security. ...
Recent device hardware trends enable a new approach to the design of network server operating systems. ...
On Linux, memcached processes share the kernel-level network stack. ...
doi:10.1145/2812806
fatcat:7ihxxfyxv5gjzokgphstozh7y4
Efficient, Dynamic Multi-tenant Edge Computation in EdgeOS
[article]
2019
arXiv
pre-print
Edge clouds promise a pervasive computational infrastructure a short network hop away from end devices, but today's operating systems are a poor fit to meet the goals of scalable isolation, dense multi-tenancy ...
to 1000 edge-cloud memcached instances on one server. ...
As this places data-structures into a known and safe state, it ensures the integrity of future FWP-chain instances. ...
arXiv:1901.01222v1
fatcat:prmmqbtovzhopmd37j7z55bgoy
WELES: Policy-driven Runtime Integrity Enforcement of Virtual Machines
[article]
2021
arXiv
pre-print
It performs an implicit attestation of VMs during a secure login and binds the VM integrity state with the secure connection. ...
We propose WELES, a protocol allowing tenants to establish and maintain trust in VM runtime integrity of software and its configuration. WELES is transparent to the VM configuration and setup. ...
The TPM chip cannot be effectively shared with many VMs due to a limited amount of PCRs. ...
arXiv:2104.14862v1
fatcat:df5i2n4x25fu7oqvoxdm5ei3ae
Remote Memory-Deduplication Attacks
[article]
2021
arXiv
pre-print
We demonstrate our attacks on deduplication both on Windows and Linux and attack widely used server software such as Memcached and InnoDB. ...
We showcase our remote memory-deduplication attack in three case studies: First, we show that an attacker can disclose the presence of data in memory on a server running Memcached. ...
Any opinions or recommendationsw expressed in this work are those of the authors and do not necessarily reflect the views of the funding parties. ...
arXiv:2111.08553v1
fatcat:d3wtxwkb2zfpfdttr5yb7sevem
We present HAFT, a fault tolerance technique using hardware extensions of commodity CPUs to protect unmodified multithreaded applications against such corruptions. ...
Transient hardware faults during the execution of a program can cause data corruptions. ...
This work is supported in part by the German Research Foundation (DFG) within the Cluster of Excellence "Center for Advancing Electronics Dresden" (cfaed). ...
doi:10.1145/2901318.2901339
dblp:conf/eurosys/KuvaiskiiFBFF16
fatcat:rvirzztinzcgpoi52iiy7dclnq
Consistent, durable, and safe memory management for byte-addressable non volatile main memory
2013
Proceedings of the First ACM SIGOPS Conference on Timely Results in Operating Systems - TRIOS '13
Taking the fullest advantage of the low latency and high bandwidths of emerging memories such as phase change memory (PCM), spin torque, and memristor necessitates a serious look at placing these persistent ...
This paper presents three building blocks for enabling the efficient and safe design of persistent data stores for emerging non-volatile memory technologies. ...
Figure 2 depicts the high-level organization of our approach. To protect pages, the kernel and process share a memory buffer used as a lockless producer-consumer queue [21] . ...
doi:10.1145/2524211.2524216
dblp:conf/sosp/MoraruAKTRB13
fatcat:zdl5jowcqjgc7pnt763d42iwyq
HICAMP
2012
SIGPLAN notices
Programming language and operating system support for efficient concurrency-safe access to shared data is a key concern for the effective use of multi-core processors. ...
Most research has focused on the software model of multiple threads accessing this data within a single shared address space. ...
The authors are also grateful for valuable comments on earlier versions of this paper from Al Davis and Stephen Richardson, and on the final version from Carl Waldspurger. ...
doi:10.1145/2248487.2151007
fatcat:ifg5mgegonhitfqoqlbbhqvvzi
Programming language and operating system support for efficient concurrency-safe access to shared data is a key concern for the effective use of multi-core processors. ...
Most research has focused on the software model of multiple threads accessing this data within a single shared address space. ...
The authors are also grateful for valuable comments on earlier versions of this paper from Al Davis and Stephen Richardson, and on the final version from Carl Waldspurger. ...
doi:10.1145/2150976.2151007
dblp:conf/asplos/CheritonFSSA12
fatcat:mnswy2r6ljdj7ldbey6h7gvsey
HICAMP
2012
SIGARCH Computer Architecture News
Programming language and operating system support for efficient concurrency-safe access to shared data is a key concern for the effective use of multi-core processors. ...
Most research has focused on the software model of multiple threads accessing this data within a single shared address space. ...
The authors are also grateful for valuable comments on earlier versions of this paper from Al Davis and Stephen Richardson, and on the final version from Carl Waldspurger. ...
doi:10.1145/2189750.2151007
fatcat:loxswyyvczgvxd2yozxp7uaoh4
The IX Operating System
2016
ACM Transactions on Computer Systems
We present IX, a dataplane operating system that provides high I/O performance and high resource efficiency while maintaining the protection and isolation benefits of existing kernels. ...
The IX operating system: Combining low latency, high throughput, and efficiency in a protected dataplane. ACM Trans. ...
Porting memcached to IX primarily consisted of adapting it to use our event library. ...
doi:10.1145/2997641
fatcat:6nt2zson6jfjrieodatckxbfhi
Memshare: a Dynamic Multi-tenant Memory Key-value Cache
[article]
2016
arXiv
pre-print
We implemented Memshare and ran it on a week-long trace from a commercial memcached provider. ...
Memshare provides a resource sharing model that guarantees private memory to different applications while dynamically allocating the remaining shared memory to optimize overall hit rate. ...
A spin lock protects the list of full segments and the list of empty segments. ...
arXiv:1610.08129v1
fatcat:db6dyqa5gzgqrgvoik27pd54mm
Scalable concurrent hash tables via relativistic programming
2010
ACM SIGOPS Operating Systems Review
Relativistic hash tables demonstrate the promise of a new concurrent programming methodology known as relativistic programming. ...
Applying this algorithm to memcached removes a scalability limit for get requests, allowing memcached to scale linearly and service up to 46% more requests per second. ...
Thanks to memcached developer "dormando" for providing technical help with memcached, as well as the benchmarking framework. Thanks to Salvatore Sanfilippo for the original mc-benchmark. ...
doi:10.1145/1842733.1842750
fatcat:qghmq7xba5brhemmkviaa2h6qa
« Previous
Showing results 1 — 15 out of 203 results