Sciweavers

USENIX
2008
13 years 6 months ago
Wide-Scale Data Stream Management
This paper describes Mortar, a distributed stream processing platform for building very large queries across federated systems (enterprises, grids, datacenters, testbeds). Nodes i...
Dionysios Logothetis, Ken Yocum
USENIX
2008
13 years 6 months ago
Spectator: Detection and Containment of JavaScript Worms
Recent popularity of interactive AJAX-based Web 2.0 applications has given rise to a new breed of security threats: JavaScript worms. In this paper we propose Spectator, the first...
V. Benjamin Livshits, Weidong Cui
USENIX
2008
13 years 6 months ago
Protection Strategies for Direct Access to Virtualized I/O Devices
Commodity virtual machine monitors forbid direct access to I/O devices by untrusted guest operating systems in order to provide protection and sharing. However, both I/O memory ma...
Paul Willmann, Scott Rixner, Alan L. Cox
USENIX
2008
13 years 6 months ago
Prefetching with Adaptive Cache Culling for Striped Disk Arrays
Conventional prefetching schemes regard prediction accuracy as important because useless data prefetched by a faulty prediction may pollute the cache. If prefetching requires cons...
Sung Hoon Baek, Kyu Ho Park
USENIX
2008
13 years 6 months ago
Design Tradeoffs for SSD Performance
Solid-state disks (SSDs) have the potential to revolutionize the storage system landscape. However, there is little published work about their internal organization or the design ...
Nitin Agrawal, Vijayan Prabhakaran, Ted Wobber, Jo...
USENIX
2008
13 years 6 months ago
FlexVol: Flexible, Efficient File Volume Virtualization in WAFL
zation is a well-known method of abstracting physical resources and of separating the manipulation and use of logical resources from their underlying implementation. We have used ...
John K. Edwards, Daniel Ellard, Craig Everhart, Ro...
USENIX
2008
13 years 6 months ago
LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages
Continuous memory leaks severely hurt program performance and software availability for garbage-collected programs. This paper presents a safe method, called LeakSurvivor, to tole...
Yan Tang, Qi Gao, Feng Qin
USENIX
2008
13 years 6 months ago
A Linux Implementation Validation of Track-Aligned Extents and Track-Aligned RAIDs
Through clean-slate implementation of two storage optimizations--track-aligned extents and track-aligned RAIDs--this paper shows the values of independent validations. The experie...
Jin Qian, Christopher R. Meyers, An-I Andy Wang
USENIX
2008
13 years 6 months ago
Adaptive File Transfers for Diverse Environments
This paper presents dsync, a file transfer system that can dynamically adapt to a wide variety of environments. While many transfer systems work well in their specialized context,...
Himabindu Pucha, Michael Kaminsky, David G. Anders...
USENIX
2008
13 years 6 months ago
Striping without Sacrifices: Maintaining POSIX Semantics in a Parallel File System
Striping is a technique that distributes file content over multiple storage servers and thereby enables parallel access. In order to be able to provide a consistent view across fi...
Jan Stender, Björn Kolbeck, Felix Hupfeld, Eu...