A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2012; you can also visit the original URL.
The file type is application/pdf
.
Filters
Scale and performance in the Denali isolation kernel
2002
Proceedings of the 5th symposium on Operating systems design and implementation - OSDI '02
This paper describes the Denali isolation kernel, an operating system architecture that safely multiplexes a large number of untrusted Interact services on shared hardware. ...
to more than 10,000 virtual machines on commodity hardware. ...
This work also benefitted greatly from many discussions with the Systems and Networking group at Microsoft Research, particularly Bill Bolosky, Marvin Theimer, Mike Jones, and John Douceur. ...
doi:10.1145/1060289.1060308
fatcat:uawydxyknvcdvdyk3elri65mba
In memoriam
2008
Computer communication review
Jay graduated in 1983 and became the manager of the systems programming group. Randy and Jay established the first Ethernet networks on campus, and together ran the USENIX 1984 Summer Conference. ...
Jay got started earlier than these projects, receiving funding from HP to port the BSD operating system to PA-RISC. ...
doi:10.1145/1496091.1496098
fatcat:ohpjc4lhefcbzljkgcu5ntmhkm
Nevertheless, one can minimize the number of vulnerabilities by applying security patches to operating systems or by introducing newer (better) versions of the application code. ...
While not completely fault independent, our preliminary study indicates that, for example, different COTS operating system families (Linux, *BSD, Solaris, Windows) have only few vulnerabilities in common ...
doi:10.1145/1462735.1462763
dblp:conf/middleware/BessaniRSGSDKDO08
fatcat:tgzhmohbmvguzmzz3vxranfkca
Lazy receiver processing (LRP)
1996
Proceedings of the second USENIX symposium on Operating systems design and implementation - OSDI '96
In particular, the operating system running on such systems needs to manage the machine's resources in a manner that maximizes and maintains throughput under conditions of high load. ...
The explosive growth of the Internet, the widespread use of WWW-related applications, and the increased reliance on client-server architectures places interesting new demands on network servers. ...
Also, thanks to Thorsten von Eicken and the U-Net group at Cornell for making the U-Net NI firmware available to us. ...
doi:10.1145/238721.238786
dblp:conf/osdi/DruschelB96
fatcat:wgqdztmkinattgprgwll6ereea
An Implementation of Scheduler Activations on the NetBSD Operating System
2002
USENIX Annual Technical Conference
All of the *BSDs currently have one of these user-level packages as their primary thread system. ...
One is that the
overhead of thread operations is high: since they are managed by the
kernel, operations must be performed by requesting services of the
kernel (usually via system call), which is a relatively ...
dblp:conf/usenix/Williams02
fatcat:cu2x4gz4yzfcbbyvmhzgljzysi
Project Athena: Supporting distributed computing at MIT
1992
IBM Systems Journal
Treese, “Berkeley UNIX on 1000 Workstations: Athena Changes to 4.3 BSD,” USENIX Association (February 1988).
. R.M. Needham and M. D. ...
The architec- ture of the Athena system is shown in Figure 2, layered on top of the operating system and com- munication protocol. ...
doi:10.1147/sj.313.0550
fatcat:qhcgbuctefbrndyivm4kynjjlq
Invalidation-Based Protocols for Replicated Datastores
[article]
2021
arXiv
pre-print
Although handling failures in the datacenter is critical for data availability, we observe that the common operation is fault-free and far exceeds the operation during faults. ...
Based on this insight, we draw inspiration from the multiprocessor for high-performance, strongly consistent replication in the datacenter. ...
In Proceedings of the 13th USENIX Conference on Operating
Systems Design and Implementation, OSDI ’18, page 727–743, USA,
2018. USENIX Association. ...
arXiv:2112.02405v1
fatcat:toi3wflouvbzngpdfzypw3l4li
Deconstructing Wide-Area Networks: Application of Theory to Cell Communication
2016
Translational Biomedicine
In proceedings of the symposium on certifiable, Linear-Time theory. 22. Jacobson V (1999) HugeNay: Construction of link-level acknowledgements. In proceedings of the USENIX security conference. ...
To achieve this aim, electronic models help to show that the important algorithm for the operation of neural networks by Thompson et al. runs in O([n/n]) time. ...
For computer, (1) our framework was dogfooded, focusing on response time on our desktop machines; (2) we compared mean work factor on the GNU/ Hurd, MacOS X and KeyKOS operating systems; (3) 72 trials ...
doi:10.21767/2172-0479.100093
fatcat:ikw3uczn3zcfjinywidobzlmfa
Principles for writing reusable libraries
1995
Proceedings of the 1995 Symposium on Software reusability - SSR '95
Over the past 10 years, the Software Engineering Research Department in A T@T has been engaging in a research program to build a collection of highly portable advanced software tools known as Ast, Advanced ...
A recent monograph, "Practical Reusable UNIX Software" (John Wiley~Sons, Inc., 1995), summarizes the philosophy and components of this research program. ...
USENIX,
1991.
Stephen
C. North
and
Kiem-Phong
Vo.
Dictio-
nary
and Graph
Libraries.
In Proceeding
of Winter
tLSEi'VIX Conference, pages 1-11. USENIX,
1993. ...
doi:10.1145/211782.211834
dblp:conf/ssr/FowlerKV95
fatcat:ogvf3jgxcrbz3dil4qncus7fma
Conceiving Open Systems
[chapter]
2008
Two Bits
Without interoperable operating systems, internetworking and portable applications are impossible. Without portable applications that can run on any system, open markets are impossible. ...
components the UNIX operating system and the TCP/IP protocols of the Internet as open systems components, including the demand for structures of fair and open competition, antimonopoly and open markets ...
Brian William Keves, Open Systems Formal Evaluation Process (Nov. 4, 1993), in USENIX SEVENTH SYSTEM ADMINISTRATION CONFERENCE available at http://www.usenix.org/publications/library/proceedings/lisa93 ...
doi:10.1215/9780822389002-008
fatcat:z5csb2eadzgxvpwgtpnvylcjlm
Instruction fetching
1995
SIGARCH Computer Architecture News
Our analysis is based on trace-driven and trap-driven simulations and takes into full account both the application and operating-system components of the workloads. ...
We study the impact of cache organization, transfer bandwidth, prefetching, and pipelined memory systems on machines that rely on the use of relatively small primary caches to facilitate increased clock ...
Mach: A new kernel foundation for UNIX development, In Summer 1986 USENIX Conference, USENIX, 1986. ...
doi:10.1145/225830.224445
fatcat:rhxzy45ambdtpf3cusayczjgmu
Towards Effective Portability of Packet Handling Applications across Heterogeneous Hardware Platforms
[chapter]
2009
Lecture Notes in Computer Science
intrusion detectors) so that they can be executed on any network device, ranging from high-end routers to small appliances. ...
network processing elements) included in special purpose hardware systems possibly deployed to implement network devices. ...
This work has been carried out within the framework of the QUASAR project, funded by the Italian Ministry of Education, University and Research (MIUR) as part of the PRIN 2004 Funding Program. ...
doi:10.1007/978-3-642-00972-3_3
fatcat:oivepegncvdxvpcswdsp33y5mu
Executive (AIX) operating system overview
1987
IBM Systems Journal
IBM SYSTEMS JOURNAL, VOL 26, NO 4, 1987
9. S. R. Kleinman, “Vnodes: An architecture for multiple file system types in Sun UNIX,” USENIX Conference Proceed- ings, Atlanta, June 1986, pp. 238-247.
10. ...
We decided to base the core of the RT Personal Computer operating system on the AT&T UNIX® Sys- tem V. ...
doi:10.1147/sj.264.0326
fatcat:gpki55rdr5gprap7fgcoxvxj4m
Implementing Ultra Low Latency Data Center Services with Programmable Logic
2015
2015 IEEE 23rd Annual Symposium on High-Performance Interconnects
Most existing KVS systems run in software and scale out by running parallel processes on multiple microprocessor cores to increase throughput. ...
As with other KVS systems like redis, memcached, and Aerospike, high-level applications store, replace, delete, and search keys using a standard Application Programming Interface (API). ...
ACKNOWLEDGEMENTS The authors would like to thank members of the Algo-Logic team for help in developing and testing the KVS hardware and software. ...
doi:10.1109/hoti.2015.20
dblp:conf/hoti/LockwoodM15
fatcat:fc6evf6kojevhopivcxuohvsxa
A fork() in the road
2019
Proceedings of the Workshop on Hot Topics in Operating Systems - HotOS '19
As the designers and implementers of operating systems, we should acknowledge that fork's continued existence as a first-class OS primitive holds back systems research, and deprecate it. ...
We catalog the ways in which fork is a terrible abstraction for the modern programmer to use, describe how it compromises OS implementations, and propose alternatives. ...
feedback, including: Tom Anderson, Remzi Arpaci-Dusseau, Marc Auslander, Bill Bolosky, Ulrich Drepper, Chris Hawblitzel, Eddie Kohler, Petros Maniatis, Mathias Payer, Michael Stumm, Robbert Van Renesse, and the ...
doi:10.1145/3317550.3321435
dblp:conf/hotos/BaumannAKR19
fatcat:7puwoua5ujgrpmbgi4ekfu3p6m
« Previous
Showing results 1 — 15 out of 104 results