Filters








43 Hits in 10.8 sec

Tales of the Tail

Jialin Li, Naveen Kr. Sharma, Dan R. K. Ports, Steven D. Gribble
2014 Proceedings of the ACM Symposium on Cloud Computing - SOCC '14  
In this paper, we explore the hardware, OS, and application-level sources of poor tail latency in high throughput servers executing on multi-core machines.  ...  To deliver fast responses, the median and tail latencies of a service's components must be low.  ...  We thank the members of the UW systems research group for many insightful and lively discussions, including Katelin Bailey, Peter Hornyack, Adriana Szekeres, Irene Zhang, Luis Ceze, and Hank Levy.  ... 
doi:10.1145/2670979.2670988 dblp:conf/cloud/LiSPG14 fatcat:56cac52pqjebbbbqhmrnr3dbrm

Tell-Tale Tail Latencies: Pitfalls and Perils in Database Benchmarking [article]

Michael Fruth, Stefanie Scherzinger, Wolfgang Mauerer, Ralf Ramsauer
2021 arXiv   pre-print
In this paper, we address the challenge of measuring tail latencies using standard benchmarks, and identify subtle perils and pitfalls.  ...  In particular, we demonstrate how Java-based benchmarking approaches can substantially distort tail latency observations, and discuss how the discovery of such problems is inhibited by the common focus  ...  The measurement of the GC G1 shows that the GC causes the maximum latency and the tail of the latencies.  ... 
arXiv:2107.11607v1 fatcat:7yusucqg6bf4bba6ngyu4je6gq

Elfen Scheduling: Fine-Grain Principled Borrowing from Latency-Critical Workloads Using Simultaneous Multithreading

Xi Yang, Stephen M. Blackburn, Kathryn S. McKinley
2016 USENIX Annual Technical Conference  
Web services from search to games to stock trading impose strict Service Level Objectives (SLOs) on tail latency.  ...  Although co-running batch jobs with latency critical requests to utilize multiple SMT hardware contexts (lanes) is appealing, unmitigated sharing of core resources induces non-linear effects on tail latency  ...  explicitly rule out SMT because of the highly unpredictable and non-linear impact on tail latency (which we confirm) and the inadequacy of high-latency OS scheduling [23] . Zhang et al.  ... 
dblp:conf/usenix/YangBM16 fatcat:pdi6g45la5cudbkjv5aigiu2o4

Live in the Express Lane

Patrick Jahnke, Vincent Riesop, Pierre-Louis Roman, Pavel Chuprikov, Patrick Eugster
2021 USENIX Annual Technical Conference  
Ports, and Jim Wanderer, Junlan Zhou, Min Zhu, Jon Zolla, Urs Steven D. Gribble. Tales of the Tail: Hardware, OS, Hölzle, Stephen Stuart, and Amin Vahdat.  ...  B4: Experi- and Application-Level Sources of Tail Latency. In Pro- ence with a Globally-deployed Software Defined WAN.  ... 
dblp:conf/usenix/JahnkeRRCE21 fatcat:aoi3x635yjdl5bjnv5m5qo6atm

New Mechanism for Fast System Calls [article]

Till Miemietz
2021 arXiv   pre-print
System calls have no place on the fast path of microsecond-scale systems. However, kernel bypass prevents the OS from controlling and supervising access to the hardware.  ...  This way the OS does not give up the control over device access, whereas the applications maintain their performance.  ...  Such analysis will simplify tail latency optimization at the [5] Amirali Boroumand, Saugata Ghose, Youngsok Kim, OS level.  ... 
arXiv:2112.10106v1 fatcat:bhlcttdkwbclhgbohhubi3viwy

Railgun: managing large streaming windows under MAD requirements [article]

Ana Sofia Gomes, João Oliveirinha, Pedro Cardoso, Pedro Bizarro
2021 arXiv   pre-print
., fraud detection, require accurate, real-time metrics over long time sliding windows on applications that demand high throughput and low latencies.  ...  In this paper, we propose Railgun, a fault-tolerant, elastic, and distributed streaming system supporting real-time sliding windows for scenarios requiring high loads and millisecond-level latencies.  ...  All of our experiments focus on tail latency, i.e., the latency of the In opposition to the previous two experiments, here we vary the system at the high percentiles of latency distribution.  ... 
arXiv:2106.12626v1 fatcat:otrohxszszay7dwp4cdmcrfqke

SHIM and Its Applications [article]

Xi Yang, University, The Australian National, University, The Australian National
2019
Profiling records run-time system behavior by monitoring software and hardware events either exhaustively or--because of high costs and strong observer effect--periodically.  ...  My thesis is that by exploiting existing underutilized multicore hardware the sample rates of profilers can be increased by orders of magnitude, leading to new profiling approaches, new discoveries of  ...  The most related work on diagnosing and fixing tail latency sources in application and system software [Li et al., 2014; Zhang et al., 2016; Leverich and Kozyrakis, 2014] and hardware and its configuration  ... 
doi:10.25911/5dc92b0c30999 fatcat:yjkoewnrobbz3n2mii6zw5yhg4

Who Should Read This Book [chapter]

2016 Securing the Outdoor Construction Site  
Thus, the design of the OS encourages a relatively clean separation between application engine and GUI interface.  ...  This is the one area of the design where OS/2 achieved a level of capability which Unix arguably has not yet matched.  ...  Their instinct is to say that protecting the user from himself should be done at the GUI or application level, not in the operating system.  ... 
doi:10.1016/b978-0-12-802383-9.00019-8 fatcat:5cxlhe2k4fbjzfwouwq6qa7iqe

Recent Work on Distributed Commit Protocolls, and Recoverable Messaging and Queuing

C. Mohan, Dick Dievendorff
1994 IEEE Data Engineering Bulletin  
Its scope includes the design, implementation, modelling, theory and application of database systems and their technology.  ...  The Bulletin of the Technical Committee on Data Engineering is published quarterly and is distributed to all TC members.  ...  Acknowledgements We would like to acknowledge the contributions of our Almaden, Hursley and Raleigh colleagues to the work described here. PROGRAM COMMITTEE:  ... 
dblp:journals/debu/MohanD94 fatcat:qezgeew4qfeqhmckpkfixankaa

NFV/SDN Based Multiple Upstream Interfaces Multicast Proxy Service

David Fernandez, Luis M. Contreras, Ricardo Flores Moyano, Sandra Garcia
2021 2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)  
, service and transport levels.  ...  This Thesis first overviews the implications of the progressive introduction of network softwarization in operational networks for later on detail some advances at different levels, namely architectural  ...  for running multi-access edge applications on top of it.  ... 
doi:10.1109/icin51074.2021.9385529 fatcat:cvfiecprjzadxlv5suqstg4rb4

Chasing the AIDS virus

Thomas Lengauer, André Altmann, Alexander Thielen, Rolf Kaiser
2010 Communications of the ACM  
All advertising in ACM Media publications is at the discretion of ACM and is intended to provide financial support for the various activities and services for ACM members.  ...  ACM Media Advertising Policy Communications of the ACM and other ACM Media publications accept advertising in both print and electronic formats.  ...  All errors and omissions are my own (though of course I faced constraints on length and number of citations).  ... 
doi:10.1145/1666420.1666440 fatcat:o2qllqh4tzhh5dzgvnjewl52vq

Strategies for spatial music performance: the practicalities and aesthetics of responsive systems design

Ricky Graham, Brian Bridges
2015 Divergence Press  
processes at the cellular and animal level.  ...  Reviewers Selection The re-new call for participation was published March 29, 2013, and is republished below. A total of 358 submissions were made in all categories of the call.  ...  The workshops incorporate software and hardware gained from the Open Source Software communities and techniques from drama and contemporary music notation.  ... 
doi:10.5920/divp.2015.33 fatcat:xbb7altyobafvfiidg2adzn7l4

Money Trust in Digital Society, Bitcoin and Stablecoins in ML enabled Metaverse Telecollaboration [article]

John Joseph O'Hare, Allen Fairchild, Umran Ali
2022 arXiv   pre-print
A high level overview of Web3 technologies leads to a description of blockchain, and the Bitcoin network is specifically selected for detailed examination.  ...  Bitcoin is selected as the best contender for value transfer in metaverses because of it's free and open source nature, and network effect. Challenges and risks of this approach are identified.  ...  On the vircadia server open a terminal and run: Client interface For testing the client application the Windows OS was opted for and Vircadia 2022.1.1 was used. 8.5.3.9 Connecting the Metaverse server  ... 
arXiv:2207.09460v3 fatcat:65pr65aelfcnzbke7ursxfuwdi

Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era

Christopher Soghoian
2010 Journal on Telecommunications and High Technology Law  
Pretty much everyone in the tech industry agrees it's the future-including Microsoft, which last week devoted much of its annual conference for developers to a rollout of new cloud technologies and a pep  ...  While pure remote storage or computing services such as Amazon's S3 are commonly described as cloud services, they are beyond the scope of this article. 15. See, e.g.  ...  to paragraph (1). 196 tails on the government's interpretation and use of this law are understandably impossible to find.  ... 
dblp:journals/jthtl/Soghoian10 fatcat:ugbafmlppbgpvnpv7adegknmhi

Making sense of sensing systems

Victoria Bellotti, Maribeth Back, W. Keith Edwards, Rebecca E. Grinter, Austin Henderson, Cristina Lopes
2002 Proceedings of the SIGCHI conference on Human factors in computing systems Changing our world, changing ourselves - CHI '02  
This requires a way to rate the degree of reality or innate-ness for a piece of knowledge. One way is by when the user learned it; and we conjecture that younger is better.  ...  By contrast, navigating through virtual reality exploits the user's existing real-world "navigational commands:" positioning the head and eyes, turning the body, and walking toward something of interest  ...  Acknowledgements The author would like to thank to many of the former and current TMG students and colleagues in the MIT Media Lab for their contributions to the TUI research in the past 10 years at the  ... 
doi:10.1145/503376.503450 dblp:conf/chi/BellottiBEGHL02 fatcat:qraobvd44jadjfq4faprxdwue4
« Previous Showing results 1 — 15 out of 43 results