Sciweavers

IPPS
2003
IEEE
13 years 10 months ago
On the Appropriateness of Commodity Operating Systems for Large-Scale, Balanced Computing Systems
In the past five years, we have been involved in the design and development of Cplanttm . An important goal was to take advantages of commodity approaches wherever possible. In p...
Ron Brightwell, Arthur B. Maccabe, Rolf Riesen
HOTOS
2003
IEEE
13 years 10 months ago
Towards a Semantic-Aware File Store
—Traditional hierarchical namespaces are not sufficient for representing and managing the rich semantics of today’s storage systems. In this paper, we discuss the principles o...
Zhichen Xu, Magnus Karlsson, Chunqiang Tang, Chris...
HOTOS
2003
IEEE
13 years 10 months ago
Hardware Works, Software Doesn't: Enforcing Modularity with Mondriaan Memory Protection
Two big problems with operating systems written in unsafe languages are that they crash too often and that adding features becomes much more difficult over time. One cause of bot...
Emmett Witchel, Krste Asanovic
HOTOS
2003
IEEE
13 years 10 months ago
Palimpsest: Soft-Capacity Storage for Planetary-Scale Services
Distributed writable storage systems typically provide NFS-like semantics and unbounded persistence for files. We claim that for planetary-scale distributed services such facilit...
Timothy Roscoe, Steven Hand
HOTOS
2003
IEEE
13 years 10 months ago
Cassyopia: Compiler Assisted System Optimization
Execution of a program almost always involves multiple address spaces, possibly across separate machines. Here, an approach to reducing such costs using compiler optimization tech...
Mohan Rajagopalan, Saumya K. Debray, Matti A. Hilt...
HOTOS
2003
IEEE
13 years 10 months ago
Virtual Appliances in the Collective: A Road to Hassle-Free Computing
This paper describes the vision of the Collective, a compute utility which runs internet services as well as the highly interactive applications we run on desktop computers today....
Constantine P. Sapuntzakis, Monica S. Lam
HOTOS
2003
IEEE
13 years 10 months ago
An Analysis of Compare-by-hash
Recent research has produced a new and perhaps dangerous technique for uniquely identifying blocks that I will call compare-by-hash. Using this technique, we decide whether two bl...
Val Henson
HOTOS
2003
IEEE
13 years 10 months ago
Access Control to Information in Pervasive Computing Environments
Many types of information available in a pervasive computing environment, such as people location information, should be accessible only by a limited set of people. Some propertie...
Urs Hengartner, Peter Steenkiste
HOTOS
2003
IEEE
13 years 10 months ago
One Hop Lookups for Peer-to-Peer Overlays
Current peer-to-peer lookup algorithms have been designed with the assumption that routing information at each member node must be kept small, so that the bookkeeping required to ...
Anjali Gupta, Barbara Liskov, Rodrigo Rodrigues
HOTOS
2003
IEEE
13 years 10 months ago
Secure Data Replication over Untrusted Hosts
Data replication is a widely used technique for achieving fault tolerance and improved performance. With the advent of content delivery networks, it is becoming more and more freq...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...