Filters








640 Hits in 1.1 sec

Scale-out Edge Storage Systems with Embedded Storage Nodes to Get Better Availability and Cost-Efficiency At the Same Time

Jianshen Liu, Matthew L. Curry, Carlos Maltzahn, Philip Kufeldt
2020 USENIX Workshop on Hot Topics in Edge Computing  
As evidence for our hypothesis, we compared the possibility of data loss between two different types of storage systems: one is constructed with general-purpose servers, and the other one is constructed  ...  Our results show that the storage system constructed with general-purpose servers has 7 to 20 times higher risk of losing data over the storage system constructed with embedded storage devices.  ...  In this paper, we focus on edge storage systems and investigate the benefits in data availability in addition to costefficiency of using embedded storage nodes to build edge storage systems.  ... 
dblp:conf/hotedge/LiuCMK20 fatcat:mvdhzpjx6nb4fozwlmb5dlpfwm

Smart Messages: a system architecture for large networks of embedded systems

P. Stanley-Marbell, C. Borcea, K. Nagaraja, L. Iftode
Proceedings Eighth Workshop on Hot Topics in Operating Systems  
Embedded systems greatly outnumber desktop computing systems and are witnessing rapid growth as increasing numbers of industrial, commercial and consumer devices incorporate embedded intelligence.  ...  Presented is a system architecture, Smart Messages, for computation and communication in large networks of networked embedded systems.  ...  Third, We propose a new system architecture for large networks of embedded systems, based on the idea of intelligent carriers of data in a network.  ... 
doi:10.1109/hotos.2001.990097 dblp:conf/hotos/Stanley-MarbellBNI01 fatcat:cxwo7zwhcvdlrjpog7hmugsrue

Lightweight KV-based Distributed Store for Datacenters

Chanwoo Chung, Jinhyung Koo, Arvind, Sungjin Lee
2017 USENIX Workshop on Hot Topics in Storage and File Systems  
Such a node can be a drive-sized embedded system, which can directly interact with application servers over a datacenter network such as Ethernet.  ...  We believe that the hardware and software of existing storage systems can be refactored to run on a lightweight storage node comprised of low-power ARM cores, FP-GAs, and raw NAND flash chips.  ... 
dblp:conf/hotstorage/ChungKAL17 fatcat:2ckehwenifakzhawtqk74mkuye

Big Data Gets Bigger: What about Data Cleaning Analytics as a Storage Service?

Ayat Fekry
2017 USENIX Workshop on Hot Topics in Storage and File Systems  
While this is a use case, most datasets are self-similar and would benefit from the proposed service, as they tend to have embedded correlation patterns.  ...  Consider traffic, air quality, weather, and energy consumption sensors that report their periodic readings in a big data storage system.  ... 
dblp:conf/hotstorage/Fekry17 fatcat:tomdonogr5eufmmwsyy7cdhvee

FOREWORD

Yukikazu NAKAMOTO
2011 IEICE transactions on information and systems  
In July 2002 some members from Technical Group on Information Networks and Technical Group on Dependable Computing founded the International Workshop on Assurance in Distributed Systems and Networks (ADSN  ...  His research interests include real-time systems, distributed systems, mobile systems, and software development environments. He is a member of IPSJ, IEEE Computer Society, ACM, and USENIX.  ... 
doi:10.1587/transinf.e94.d.1 fatcat:cmmuag2oq5dutkycb74z24lvlm

Introduction to the Special Issue on SAMOS 2007

Holger Blume, Georgi Gaydadjiev, John Glossner
2008 Journal of Signal Processing Systems  
The International Symposium on Embedded Computer Systems, Architectures, Modeling and Simulation (SAMOS) is an event which annually takes place on the scenic Mediterranean island of Samos.  ...  systems have been selected for publication in this special issue.  ...  The International Symposium on Embedded Computer Systems, Architectures, Modeling and Simulation (SAMOS) is an event which annually takes place on the scenic Mediterranean island of Samos.  ... 
doi:10.1007/s11265-008-0220-8 fatcat:k7gmmhwqfvckpdalpd4nzidani

Intelligent Defense against Malicious JavaScript Code

Tammo Krueger, Konrad Rieck
2012 PIK - Praxis der Informationsverarbeitung und Kommunikation  
Embedded in a web proxy, Cujo transparently inspects web pages and blocks the delivery of malicious JavaScript code.  ...  In this article, we present Cujo, a learning-based system for detection and prevention of JavaScript attacks.  ...  In Proc. of USENIX Workshop on Large-Scale Exploits and Emergent reats (LEET), . [ ] N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N.  ... 
doi:10.1515/pik-2012-0009piko.2012.35.1.54 fatcat:jrfvhtbi7reeva5a3y2jc7h4qa

Intelligent Defense against Malicious JavaScript Code

Tammo Krueger, Konrad Rieck
2012 PIK - Praxis der Informationsverarbeitung und Kommunikation  
Embedded in a web proxy, Cujo transparently inspects web pages and blocks the delivery of malicious JavaScript code.  ...  In this article, we present Cujo, a learning-based system for detection and prevention of JavaScript attacks.  ...  In Proc. of USENIX Workshop on Large-Scale Exploits and Emergent reats (LEET), . [ ] N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N.  ... 
doi:10.1515/pik-2012-0009 fatcat:34pjgv35jjbfdil3uwbr6z4rwm

Tutorials

2009 2009 Congress on Services - I  
He has been the program chair of the IEEE Agent Systems and Applications Symposium (ASA/MA'99) and of the first USENIX Workshop on Industrial Experiences with System Software (WIESS'2000). Dr.  ...  His research is focused on distributed systems, programming languages, and highperformance, reliable, scalable architectures.  ... 
doi:10.1109/services-i.2009.124 fatcat:5e4sj4nzdbg6zntji7ozmfcuai

SIGMOBILE FY'05 annual report

David B. Johnson
2005 ACM SIGMOBILE Mobile Computing and Communications Review  
The conference also included two full-day workshops on June 5: • EESR 2005: Workshop on End-to-End, Senseand-Respond Systems, Applications, and Services. the Second ACM Conference on Embedded Networked  ...  The SenSys conference focuses on systems issues in the emerging area of embedded, networked sensors, spanning multiple disciplines, including wireless communication, networking, operating systems, architecture  ... 
doi:10.1145/1094549.1094551 fatcat:6hmjo2ujszcsfndy47g6l7m7km

A View to a Kill: WebView Exploitation

Matthias Neugschwandtner, Martina Lindorfer, Christian Platzer
2013 USENIX Workshop on Large-Scale Exploits and Emergent Threats  
The fact that its main incentive requires making data stored on, as well as the functionality of mobile devices, directly accessible to active web content, is not without consequences to security.  ...  Since the data is transmitted in plain text, it is easy to inject malicious JavaScript embedded in a <script> tag. Nature Wallpaper.  ...  The security implications of this feature are obvious: by providing a direct bridge between web content and the operating system, WebView punches a hole in the browser sandbox containment.  ... 
dblp:conf/leet/NeugschwandtnerLP13 fatcat:7vn7oyqnyrbfhgkj6rchkziinm

Deduplication Analyses of Multimedia System Images

Tim Süß, Tunahan Kaya, Markus Mäsker, André Brinkmann
2018 USENIX Workshop on Hot Topics in Edge Computing  
The availability and usage of embedded systems increases permanently and the industry drives the IoT to become more and more relevant in daily life.  ...  A data reduction technique that provides high efficiency, but which has not been considered so far for embedded systems is data deduplication.  ...  Update Encoding And Distribution Embedded systems usually operate on limited resources. This requires system updates to be encoded, transmitted and installed in a resource-efficient manner.  ... 
dblp:conf/hotedge/SussKMB18 fatcat:sw6eibjjjrchllrdehv7opjnqy

Page 1010 of IEEE Transactions on Computers Vol. 52, Issue 8 [page]

2003 IEEE Transactions on Computers  
Topics in Operating Systems, 1995 D. Milojicic, W. LaForge, and D. Chauhan, “Mobile Objects and Agents,” Proc. USENIX Conf. Object-Oriented Technologies and , Systems, pp. 1-14, 1998 4. Cerpa and D.  ...  and reconfigurable software for real-time embedded systems, distributed robotic systems, distributed information systems, and intelligent instruments for biomedical applica- tions.  ... 

Towards Fast and Scalable Graph Pattern Mining

Anand Padmanabha Iyer, Zaoxing Liu, Xin Jin, Shivaram Venkataraman, Vladimir Braverman, Ion Stoica
2018 USENIX Workshop on Hot Topics in Cloud Computing  
While there has been a tremendous interest in processing graph-structured data, existing distributed graph processing systems take several minutes or even hours to mine simple patterns on graphs.  ...  We conclude by discussing several systems challenges to make our proposal practical.  ...  The system checks all such candidate embeddings, and prunes those which cannot be part of the final answer.  ... 
dblp:conf/hotcloud/IyerLJVBS18 fatcat:jpyx3432nvfq5affdwffv7t6wi

D6.5 Final Report on Communication and Dissemination Activities

Teresa Via, Gino Carrozzo, Giada Landi, Gabriele Scivoletto, Felipe Huici, Franck Messaoudi, Mike Rapoport, Ioan Constantin, Stephen Parker, Gaylor Bosson, Radu Stoenescu, Razvan Deaconescu (+3 others)
2022 Zenodo  
The key to this is to compile an application into very light-weight virtual machines – known as unikernels – where there is no traditional operating system, only the specific bits of operating system functionality  ...  The resulting unikernels can then be deployed and run on standard high-volume servers or cloud computing infrastructure.  ...  In HotOS '21: Proceedings of the Workshop on Hot Topics in Operating Systems, June 2021, pp. 79-87.  ... 
doi:10.5281/zenodo.6405508 fatcat:sxtuwxsfyrcn7fk52kxzgg66d4
« Previous Showing results 1 — 15 out of 640 results