A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Scale-out Edge Storage Systems with Embedded Storage Nodes to Get Better Availability and Cost-Efficiency At the Same Time
2020
USENIX Workshop on Hot Topics in Edge Computing
As evidence for our hypothesis, we compared the possibility of data loss between two different types of storage systems: one is constructed with general-purpose servers, and the other one is constructed ...
Our results show that the storage system constructed with general-purpose servers has 7 to 20 times higher risk of losing data over the storage system constructed with embedded storage devices. ...
In this paper, we focus on edge storage systems and investigate the benefits in data availability in addition to costefficiency of using embedded storage nodes to build edge storage systems. ...
dblp:conf/hotedge/LiuCMK20
fatcat:mvdhzpjx6nb4fozwlmb5dlpfwm
Smart Messages: a system architecture for large networks of embedded systems
Proceedings Eighth Workshop on Hot Topics in Operating Systems
Embedded systems greatly outnumber desktop computing systems and are witnessing rapid growth as increasing numbers of industrial, commercial and consumer devices incorporate embedded intelligence. ...
Presented is a system architecture, Smart Messages, for computation and communication in large networks of networked embedded systems. ...
Third, We propose a new system architecture for large networks of embedded systems, based on the idea of intelligent carriers of data in a network. ...
doi:10.1109/hotos.2001.990097
dblp:conf/hotos/Stanley-MarbellBNI01
fatcat:cxwo7zwhcvdlrjpog7hmugsrue
Lightweight KV-based Distributed Store for Datacenters
2017
USENIX Workshop on Hot Topics in Storage and File Systems
Such a node can be a drive-sized embedded system, which can directly interact with application servers over a datacenter network such as Ethernet. ...
We believe that the hardware and software of existing storage systems can be refactored to run on a lightweight storage node comprised of low-power ARM cores, FP-GAs, and raw NAND flash chips. ...
dblp:conf/hotstorage/ChungKAL17
fatcat:2ckehwenifakzhawtqk74mkuye
Big Data Gets Bigger: What about Data Cleaning Analytics as a Storage Service?
2017
USENIX Workshop on Hot Topics in Storage and File Systems
While this is a use case, most datasets are self-similar and would benefit from the proposed service, as they tend to have embedded correlation patterns. ...
Consider traffic, air quality, weather, and energy consumption sensors that report their periodic readings in a big data storage system. ...
dblp:conf/hotstorage/Fekry17
fatcat:tomdonogr5eufmmwsyy7cdhvee
FOREWORD
2011
IEICE transactions on information and systems
In July 2002 some members from Technical Group on Information Networks and Technical Group on Dependable Computing founded the International Workshop on Assurance in Distributed Systems and Networks (ADSN ...
His research interests include real-time systems, distributed systems, mobile systems, and software development environments. He is a member of IPSJ, IEEE Computer Society, ACM, and USENIX. ...
doi:10.1587/transinf.e94.d.1
fatcat:cmmuag2oq5dutkycb74z24lvlm
Introduction to the Special Issue on SAMOS 2007
2008
Journal of Signal Processing Systems
The International Symposium on Embedded Computer Systems, Architectures, Modeling and Simulation (SAMOS) is an event which annually takes place on the scenic Mediterranean island of Samos. ...
systems have been selected for publication in this special issue. ...
The International Symposium on Embedded Computer Systems, Architectures, Modeling and Simulation (SAMOS) is an event which annually takes place on the scenic Mediterranean island of Samos. ...
doi:10.1007/s11265-008-0220-8
fatcat:k7gmmhwqfvckpdalpd4nzidani
Intelligent Defense against Malicious JavaScript Code
2012
PIK - Praxis der Informationsverarbeitung und Kommunikation
Embedded in a web proxy, Cujo transparently inspects web pages and blocks the delivery of malicious JavaScript code. ...
In this article, we present Cujo, a learning-based system for detection and prevention of JavaScript attacks. ...
In Proc. of USENIX Workshop on Large-Scale Exploits and Emergent reats (LEET), . [ ] N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. ...
doi:10.1515/pik-2012-0009piko.2012.35.1.54
fatcat:jrfvhtbi7reeva5a3y2jc7h4qa
Intelligent Defense against Malicious JavaScript Code
2012
PIK - Praxis der Informationsverarbeitung und Kommunikation
Embedded in a web proxy, Cujo transparently inspects web pages and blocks the delivery of malicious JavaScript code. ...
In this article, we present Cujo, a learning-based system for detection and prevention of JavaScript attacks. ...
In Proc. of USENIX Workshop on Large-Scale Exploits and Emergent reats (LEET), . [ ] N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. ...
doi:10.1515/pik-2012-0009
fatcat:34pjgv35jjbfdil3uwbr6z4rwm
Tutorials
2009
2009 Congress on Services - I
He has been the program chair of the IEEE Agent Systems and Applications Symposium (ASA/MA'99) and of the first USENIX Workshop on Industrial Experiences with System Software (WIESS'2000). Dr. ...
His research is focused on distributed systems, programming languages, and highperformance, reliable, scalable architectures. ...
doi:10.1109/services-i.2009.124
fatcat:5e4sj4nzdbg6zntji7ozmfcuai
SIGMOBILE FY'05 annual report
2005
ACM SIGMOBILE Mobile Computing and Communications Review
The conference also included two full-day workshops on June 5: • EESR 2005: Workshop on End-to-End, Senseand-Respond Systems, Applications, and Services. the Second ACM Conference on Embedded Networked ...
The SenSys conference focuses on systems issues in the emerging area of embedded, networked sensors, spanning multiple disciplines, including wireless communication, networking, operating systems, architecture ...
doi:10.1145/1094549.1094551
fatcat:6hmjo2ujszcsfndy47g6l7m7km
A View to a Kill: WebView Exploitation
2013
USENIX Workshop on Large-Scale Exploits and Emergent Threats
The fact that its main incentive requires making data stored on, as well as the functionality of mobile devices, directly accessible to active web content, is not without consequences to security. ...
Since the data is transmitted in plain text, it is easy to inject malicious JavaScript embedded in a <script> tag. Nature Wallpaper. ...
The security implications of this feature are obvious: by providing a direct bridge between web content and the operating system, WebView punches a hole in the browser sandbox containment. ...
dblp:conf/leet/NeugschwandtnerLP13
fatcat:7vn7oyqnyrbfhgkj6rchkziinm
Deduplication Analyses of Multimedia System Images
2018
USENIX Workshop on Hot Topics in Edge Computing
The availability and usage of embedded systems increases permanently and the industry drives the IoT to become more and more relevant in daily life. ...
A data reduction technique that provides high efficiency, but which has not been considered so far for embedded systems is data deduplication. ...
Update Encoding And Distribution Embedded systems usually operate on limited resources. This requires system updates to be encoded, transmitted and installed in a resource-efficient manner. ...
dblp:conf/hotedge/SussKMB18
fatcat:sw6eibjjjrchllrdehv7opjnqy
Page 1010 of IEEE Transactions on Computers Vol. 52, Issue 8
[page]
2003
IEEE Transactions on Computers
Topics in Operating Systems, 1995
D. Milojicic, W. LaForge, and D. Chauhan, “Mobile Objects and Agents,” Proc. USENIX Conf. Object-Oriented Technologies and , Systems, pp. 1-14, 1998
4. Cerpa and D. ...
and reconfigurable software for real-time embedded systems, distributed robotic systems, distributed information systems, and intelligent instruments for biomedical applica- tions. ...
Towards Fast and Scalable Graph Pattern Mining
2018
USENIX Workshop on Hot Topics in Cloud Computing
While there has been a tremendous interest in processing graph-structured data, existing distributed graph processing systems take several minutes or even hours to mine simple patterns on graphs. ...
We conclude by discussing several systems challenges to make our proposal practical. ...
The system checks all such candidate embeddings, and prunes those which cannot be part of the final answer. ...
dblp:conf/hotcloud/IyerLJVBS18
fatcat:jpyx3432nvfq5affdwffv7t6wi
D6.5 Final Report on Communication and Dissemination Activities
2022
Zenodo
The key to this is to compile an application into very light-weight virtual machines – known as unikernels – where there is no traditional operating system, only the specific bits of operating system functionality ...
The resulting unikernels can then be deployed and run on standard high-volume servers or cloud computing infrastructure. ...
In HotOS '21: Proceedings of the Workshop on Hot Topics in Operating Systems, June 2021, pp. 79-87. ...
doi:10.5281/zenodo.6405508
fatcat:sxtuwxsfyrcn7fk52kxzgg66d4
« Previous
Showing results 1 — 15 out of 640 results