Filters








2,723 Hits in 2.5 sec

Memshare: a Dynamic Multi-tenant Memory Key-value Cache [article]

Asaf Cidon, Daniel Rushton, Stephen M. Rumble, Ryan Stutsman
2016 arXiv   pre-print
Web application performance is heavily reliant on the hit rate of memory-based caches. Current DRAM-based web caches statically partition their memory across multiple applications sharing the cache. This causes under utilization of memory which negatively impacts cache hit rates. We present Memshare, a novel web memory cache that dynamically manages memory across applications. Memshare provides a resource sharing model that guarantees private memory to different applications while dynamically
more » ... locating the remaining shared memory to optimize overall hit rate. Today's high cost of DRAM storage and the availability of high performance CPU and memory bandwidth, make web caches memory capacity bound. Memshare's log-structured design allows it to provide significantly higher hit rates and dynamically partition memory among applications at the expense of increased CPU and memory bandwidth consumption. In addition, Memshare allows applications to use their own eviction policy for their objects, independent of other applications. We implemented Memshare and ran it on a week-long trace from a commercial memcached provider. We demonstrate that Memshare increases the combined hit rate of the applications in the trace by an 6.1% (from 84.7% hit rate to 90.8% hit rate) and reduces the total number of misses by 39.7% without affecting system throughput or latency. Even for single-tenant applications, Memshare increases the average hit rate of the current state-of-the-art memory cache by an additional 2.7% on our real-world trace.
arXiv:1610.08129v1 fatcat:db6dyqa5gzgqrgvoik27pd54mm

Apprehending joule thieves with cinder

Stephen M. Rumble, Ryan Stutsman, Philip Levis, David Mazières, Nickolai Zeldovich
2010 Computer communication review  
Energy is the critical limiting resource to mobile computing devices. Correspondingly, an operating system must track, provision, and ration how applications consume energy. The emergence of third-party application stores and marketplaces makes this concern even more pressing. A third-party application must not deny service through excessive, unforeseen energy expenditure, whether accidental or malicious. Previous research has shown promise in tracking energy usage and rationing it to meet
more » ... e lifetime goals, but such mechanisms and policies are still nascent, especially regarding user interaction. We argue for a new operating system, called Cinder, which builds on top of the HiStar OS. Cinder's energy awareness is based on hierarchical capacitors and task profiles. We introduce and explore these abstractions, paying particular attention to the ways in which policies could be generated and enforced in a dynamic system.
doi:10.1145/1672308.1672327 fatcat:d3pd7d5wobhpde7zpfbulj7an4

SnowFlock

H. Andrés Lagar-Cavilla, Joseph A. Whitney, Roy Bryant, Philip Patchin, Michael Brudno, Eyal de Lara, Stephen M. Rumble, M. Satyanarayanan, Adin Scannell
2011 ACM Transactions on Computer Systems  
Returns a ticket describing an allocation for m ≤ n clones. • sf clone(ticket): Clones, using the ticket allocation.  ...  SHRiMP [Rumble et al. 2009 ] (SHort Read Mapping Package) is a tool for aligning large collections of very short DNA sequences ("reads") against a known genome: e.g. the human genome.  ... 
doi:10.1145/1925109.1925111 fatcat:chd7gbpzajfapfdg3x4rpnxvl4

Fast crash recovery in RAMCloud

Diego Ongaro, Stephen M. Rumble, Ryan Stutsman, John Ousterhout, Mendel Rosenblum
2011 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles - SOSP '11  
Steve Rumble is supported by a Natural Sciences and Engineering Research Council of Canada Postgraduate Scholarship. Figure 1 : 1 RAMCloud cluster architecture.  ... 
doi:10.1145/2043556.2043560 dblp:conf/sosp/OngaroRSOR11 fatcat:iglpm5pr55eajbwylbjhpebxe4

SnowFlock

Horacio Andrés Lagar-Cavilla, Joseph Andrew Whitney, Adin Matthew Scannell, Philip Patchin, Stephen M. Rumble, Eyal de Lara, Michael Brudno, Mahadev Satyanarayanan
2009 Proceedings of the fourth ACM european conference on Computer systems - EuroSys '09  
Returns a ticket describing an allocation for m ≤ n clones. API • sf_clone(ticket): Clones, using the allocation in the ticket. Returns the clone ID, 0 ≤ ID ≤ m.  ...  • sf_exit(): For children (1 ≤ ID ≤ m), terminates the child. • sf_join(ticket): For the parent (ID = 0), blocks until all children in the ticket reach their sf_exit call.  ... 
doi:10.1145/1519065.1519067 dblp:conf/eurosys/Lagar-CavillaWSPRLBS09 fatcat:jw5njfvjcnbgbpsgh2dgamge7q

SHRiMP: Accurate Mapping of Short Color-space Reads

Stephen M. Rumble, Phil Lacroute, Adrian V. Dalca, Marc Fiume, Arend Sidow, Michael Brudno, Wyeth W. Wasserman
2009 PLoS Computational Biology  
Citation: Rumble SM, Lacroute P, Dalca AV, Fiume M, Sidow A, et al. (2009) SHRiMP: Accurate Mapping of Short Color-space Reads. PLoS Comput Biol 5(5): e1000386.  ...  6 h18 m 1 h36 m 50 m28 s 37 m52 s 32 m32 s In all cases, two k-mer hits were required within a 41 bp window to invoke the vectorized Smith-Waterman filter.  ...  Now, the pchance of a mate-pair read_1, read_2 is defined as p c~pc,read 1 g ð Þ|p c,read 2 m{dz1 j j ð Þ ð 5Þ where g is the length of the genome used in probcalc, m is the average mate-pair distance,  ... 
doi:10.1371/journal.pcbi.1000386 pmid:19461883 pmcid:PMC2678294 fatcat:xi2byt525vdxbbyr7dwk3phrpu

The case for RAMCloud

John Ousterhout, Guru Parulkar, Mendel Rosenblum, Stephen M. Rumble, Eric Stratmann, Ryan Stutsman, Parag Agrawal, David Erickson, Christos Kozyrakis, Jacob Leverich, David Mazières, Subhasish Mitra (+2 others)
2011 Communications of the ACM  
m. rumble, eric stratmann, and ryan stutsman For the past four decades magnetic disks have been the primary storage location for online information in computer systems.  ...  applications. by John ousterhout, Parag agrawal, david erickson, christos kozyrakis, Jacob leverich, david mazières, subhasish mitra, aravind narayanan, diego ongaro, guru Parulkar, mendel rosenblum, stePhen  ...  m u n i c at i o n s o f t h e acm 122 IllustratIo n by Gencay M . eM In/shut terstock. coM communications of t h e ac m | j u ly 2 0 1 1 | vo l . 5 4 | n o. 7 contributed articles communications  ... 
doi:10.1145/1965724.1965751 fatcat:nmp2qlgjfvcivhx3fwegyegvuq

Apprehending joule thieves with cinder

Stephen M. Rumble, Ryan Stutsman, Philip Levis, David Mazières, Nickolai Zeldovich
2009 Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds - MobiHeld '09  
Energy is the critical limiting resource to mobile computing devices. Correspondingly, an operating system must track, provision, and ration how applications consume energy. The emergence of third-party application stores and marketplaces makes this concern even more pressing. A third-party application must not deny service through excessive, unforeseen energy expenditure, whether accidental or malicious. Previous research has shown promise in tracking energy usage and rationing it to meet
more » ... e lifetime goals, but such mechanisms and policies are still nascent, especially regarding user interaction. We argue for a new operating system, called Cinder, which builds on top of the HiStar OS. Cinder's energy awareness is based on hierarchical capacitors and task profiles. We introduce and explore these abstractions, paying particular attention to the ways in which policies could be generated and enforced in a dynamic system.
doi:10.1145/1592606.1592618 dblp:conf/sigcomm/RumbleSLMZ09 fatcat:hf27rgg2abcrdlx72tamcvb3wq

The case for RAMClouds

John Ousterhout, Mendel Rosenblum, Stephen M. Rumble, Eric Stratmann, Ryan Stutsman, Parag Agrawal, David Erickson, Christos Kozyrakis, Jacob Leverich, David Mazières, Subhasish Mitra, Aravind Narayanan (+1 others)
2010 ACM SIGOPS Operating Systems Review  
Disk-oriented approaches to online storage are becoming increasingly problematic: they do not scale gracefully to meet the needs of large-scale Web applications, and improvements in disk capacity have far outstripped improvements in access latency and bandwidth. This paper argues for a new approach to datacenter storage called RAMCloud, where information is kept entirely in DRAM and large-scale systems are created by aggregating the main memories of thousands of commodity servers. We believe
more » ... t RAMClouds can provide durable and available storage with 100-1000x the throughput of disk-based systems and 100-1000x lower access latency. The combination of low latency and large scale will enable a new breed of dataintensive applications.
doi:10.1145/1713254.1713276 fatcat:vwlxzupmjncujmruqaes4bulee

Energy management in mobile devices with the cinder operating system

Arjun Roy, Stephen M. Rumble, Ryan Stutsman, Philip Levis, David Mazières, Nickolai Zeldovich
2011 Proceedings of the sixth conference on Computer systems - EuroSys '11  
We present Cinder, an operating system for mobile phones and devices, which allows users and applications to control and manage limited device resources such as energy. Cinder introduces two new abstractions, reserves and taps. Unlike prior approaches, Cinder accurately tracks principals responsible for resource consumption even across interprocess communication, and allows applications to delegate their resources either in terms of rates or quantities. Rates can enforce system lifetime, while
more » ... uantities can enforce dataplan or talk time limits. Proportional taps allow threads to prevent their descendants from hoarding unused energy. Cinder additionally institutes a global half-life to prevent malicious applications from starving the rest of the system. We explore these abstractions, demonstrating their usefulness in a variety of applications running on the HTC Dream (a.k.a. Google G1). We show how Cinder maintains system lifetime in the presence of malicious applications, reserves energy for critical functions such as 911, supports energy-aware applications, easily augments existing Unix applications with energy polices, properly amortizes costs across multiple principals, and allows applications to sandbox untrusted subcomponents (such as browser plugins).
doi:10.1145/1966445.1966459 dblp:conf/eurosys/RoyRSLMZ11 fatcat:wemhmxtbzbahde3x4yrlrza7fe

Circadian actigraphic rest–activity rhythms following surgery for endometrial cancer: A prospective, longitudinal study

Meredith E. Rumble, Stephen L. Rose, Kaitlin Hanley White, A. Holliston Moore, Philip Gehrman, Ruth M. Benca, Erin S. Costanzo
2015 Gynecologic Oncology  
Women with endometrial cancer had a higher BMI (M = 38.7; SD = 10.9; median = 38.1) than the reference group (M = 30.3; SD = 11.2; median = 28.4; t(118) = − 4.2, p b 0.0001).  ...  Rumble reports grants from UW Carbone Cancer Center, during the conduct of the study and grants from Merck, Inc., outside the submitted work. Dr.  ... 
doi:10.1016/j.ygyno.2015.04.001 pmid:25906914 pmcid:PMC4452033 fatcat:zcxjobh6wvhehndhz6qxpb3tri

Cytoprotective effects of IAPs revealed by a small molecule antagonist

Stefanie Galbán, Clara Hwang, Julie M. Rumble, Karolyn A. Oetjen, Casey W. Wright, Alain Boudreault, Jon Durkin, John W. Gillard, James B. Jaquith, Stephen J. Morris, Colin S. Duckett
2009 Biochemical Journal  
SYNOPSIS Deregulated expression of members of the Inhibitor of Apoptosis (IAP) family has been found in a wide variety of neoplastic cells, and synthetic IAP antagonists represent a promising novel class of chemotherapeutic agents. Early work focused on the ability of these compounds to block the caspase inhibitory function of XIAP. However, recent studies have shown that IAP antagonists, although primarily designed to target XIAP, trigger a ubiquitin-mediated degradation of two related
more » ... , c-IAP1 and c-IAP2, and through this process potentiate the death of tumor cells via autocrine cellular signaling pathways. In this context, the relative contribution of XIAP as a target of this class of compounds is unclear. Here we examine the involvement of XIAP using a recently described synthetic IAP antagonist, AEG40730, and through the comparison of a human tumor cell line targeted for XIAP with its isogenic, wild type control line. Treatment with nanomolar concentrations of AEG40730 resulted in the loss of both XIAP and c-IAP1 proteins, albeit with different kinetics. While XIAP-deficient HCT116 cells retained some sensitivity to AEG40730 to external apoptotic stimuli, the data suggest that IAP antagonists such as AEG40730 exert their apoptotic enhancing effects through XIAP in addition to the c-IAPs. These data indicate that IAP antagonists can target multiple IAPs to augment distinct pro-apoptotic signaling pathways, thereby revealing the potential for these compounds in cancer therapy and underscoring the promise of IAP-targeted therapies.
doi:10.1042/bj20081677 pmid:18851715 pmcid:PMC2674510 fatcat:vtpens3pqfdcretmwtwpjja3fe

The lymphoid chemokine, CXCL13, is dispensable for the initial recruitment of B cells to the acutely inflamed central nervous system

Emily K. Rainey-Barger, Julie M. Rumble, Stephen J. Lalor, Nilufer Esen, Benjamin M. Segal, David N. Irani
2011 Brain, behavior, and immunity  
Ten μm axial sections of spinal cord were first treated with 1% hydrogen peroxide in methanol to block all endogenous peroxidase then blocked in 2% normal goat serum (Vector Laboratories).  ...  Brains and/or spinal cords were collected, minced into small fragments, and pressed through a 70-μM mesh sieve into Hank's balanced salt solution (HBSS) containing 10% fetal bovine serum (FBS) before digestion  ... 
doi:10.1016/j.bbi.2010.10.002 pmid:20933590 pmcid:PMC3135968 fatcat:nwbvamwgbfdyfp76qd3mvqohpe

Adjuvant and Salvage Radiotherapy After Prostatectomy: American Society of Clinical Oncology Clinical Practice Guideline Endorsement

Stephen J. Freedland, R. Bryan Rumble, Antonio Finelli, Ronald C. Chen, Susan Slovin, Mark N. Stein, David S. Mendelson, Colin Wackett, Howard M. Sandler
2014 Journal of Clinical Oncology  
To endorse the American Urological Association (AUA)/American Society for Radiation Oncology (ASTRO) guideline on adjuvant and salvage radiotherapy after prostatectomy. The American Society of Clinical Oncology (ASCO) has a policy and set of procedures for endorsing clinical practice guidelines developed by other professional organizations. Methods The guideline on adjuvant and salvage radiotherapy after prostatectomy was reviewed for developmental rigor by methodologists. An ASCO endorsement
more » ... nel then reviewed the content and recommendations. Results The panel determined that the guideline recommendations on adjuvant and salvage radiotherapy after prostatectomy, published in August 2013, are clear, thorough, and based on the most relevant scientific evidence. ASCO endorsed the guideline on adjuvant and salvage radiotherapy after prostatectomy, adding one qualifying statement that not all candidates for adjuvant or salvage radiotherapy have the same risk of recurrence or disease progression, and thus, risk-benefit ratios are not the same for all men. Those at the highest risk for recurrence after radical prostatectomy include men with seminal vesicle invasion, Gleason score 8 to 10, extensive positive margins, and detectable postoperative prostate-specific antigen (PSA). Recommendations Physicians should discuss adjuvant radiotherapy with patients with adverse pathologic findings at prostatectomy (ie, seminal vesicle invasion, positive surgical margins, extraprostatic extension) and salvage radiotherapy with patients with PSA or local recurrence after prostatectomy. The discussion of radiotherapy should include possible short-and long-term adverse effects and potential benefits. The decision to administer radiotherapy should be made by the patient and multidisciplinary treatment team, keeping in mind that not all men are at equal risk of recurrence or clinically meaningful disease progression. Thus, the risk-benefit ratio will differ for each patient.
doi:10.1200/jco.2014.58.8525 pmid:25366677 fatcat:rvg4lxdbefbg3ktxs36zcfydqi

Read Mapping Algorithms for Single Molecule Sequencing Data [chapter]

Vladimir Yanovsky, Stephen M. Rumble, Michael Brudno
Lecture Notes in Computer Science  
SC(M ) is maximum.  ...  For example, given matrix M of size K × N we shall denote the i'th row of the matrix by M [i; :] and its j'th column by M [:; j].  ... 
doi:10.1007/978-3-540-87361-7_4 fatcat:cpzdh7xtzzckta2ivlcaprp6me
« Previous Showing results 1 — 15 out of 2,723 results