|
ROLE
BOOKMARK & SHARE
|
|
Result page:
1
2
3
4
5
6
7
1
May 2017
CCGrid '17: Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0, Downloads (12 Months): 0, Downloads (Overall): 0
Full text available:
PDF
The design and the deployment of energy-efficient distributed systems is a challenging task, which requires software engineers to consider all the layers of a system, from hardware to software. In particular, monitoring and analyzing the power consumption of a distributed system spanning several---potentially heterogeneous---nodes becomes particularly tedious when aiming at ...
2
May 2017
IEEE Transactions on Dependable and Secure Computing: Volume 14 Issue 3, May 2017
Publisher: IEEE Computer Society Press
Content-based publish/subscribe provides a loosely-coupled and expressive form of communication for large-scale distributed systems. Confidentiality is a major challenge for publish/subscribe middleware deployed over multiple administrative domains. Encrypted matching allows confidentiality-preserving content-based filtering but has high performance overheads. It may also prevent the use of classical optimizations based on subscriptions ...
3
April 2017
EuroSys '17: Proceedings of the Twelfth European Conference on Computer Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 213, Downloads (12 Months): 654, Downloads (Overall): 654
Full text available:
PDF
Shielded execution based on Intel SGX provides strong security guarantees for legacy applications running on untrusted platforms. However, memory safety attacks such as Heartbleed can render the confidentiality and integrity properties of shielded execution completely ineffective. To prevent these attacks, the state-of-the-art memory-safety approaches can be used in the context ...
4
February 2017
Journal of Parallel and Distributed Computing: Volume 100 Issue C, February 2017
Publisher: Academic Press, Inc.
This paper presents elastic transactions, an appealing alternative to traditional transactions, in particular to implement search structures in shared memory multicore architectures. Upon conflict detection, an elastic transaction might drop what it did so far within a separate transaction that immediately commits, and resume its computation within a new transaction ...
Keywords:
Transactional memory, Concurrent data structures
5
November 2016
Middleware '16: Proceedings of the 17th International Middleware Conference
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 16, Downloads (12 Months): 130, Downloads (Overall): 130
Full text available:
PDF
Content-based routing (CBR) is a powerful model that supports scalable asynchronous communication among large sets of geographically distributed nodes. Yet, preserving privacy represents a major limitation for the wide adoption of CBR, notably when the routers are located in public clouds. Indeed, a CBR router must see the content of ...
Keywords:
Content-based routing, privacy, publish/subscribe, security, SGX
6
June 2016
ACM Computing Surveys (CSUR): Volume 49 Issue 2, November 2016
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 14, Downloads (12 Months): 439, Downloads (Overall): 444
Full text available:
PDF
Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale distributed applications running across multiple administrative domains. Pub/sub allows event-based information dissemination based on constraints on the nature of the data rather than on pre-established communication channels. It is a natural fit for deployment in untrusted environments such as public clouds ...
Keywords:
confidentiality, Publish/subscribe
7
June 2016
Proceedings of the 16th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems - Volume 9687
Publisher: Springer-Verlag New York, Inc.
Due to rising energy costs, energy-efficient data centers have gained increasingly more attention in research and practice. Optimizations targeting energy efficiency are usually performed on an isolated level, either by producing more efficient hardware, by reducing the number of nodes simultaneously active in a data center, or by applying dynamic ...
8
June 2016
Proceedings of the 16th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems - Volume 9687
Publisher: Springer-Verlag New York, Inc.
Erasure codes have been widely used over the last decade to implement reliable data stores. They offer interesting trade-offs between efficiency, reliability, and storage overhead. Indeed, a distributed data store holding encoded data blocks can tolerate the failure of multiple nodes while requiring only a fraction of the space necessary ...
9
April 2016
EuroSys '16: Proceedings of the Eleventh European Conference on Computer Systems
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 6, Downloads (12 Months): 104, Downloads (Overall): 228
Full text available:
PDF
Hardware Lock Elision (HLE) represents a promising technique to enhance parallelism of concurrent applications relying on conventional, lock-based synchronization. The idea at the basis of current HLE approaches is to wrap critical sections into hardware transactions: this allows critical sections to be executed in parallel using a speculative approach, while ...
10
April 2016
EuroSys '16: Proceedings of the Eleventh European Conference on Computer Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6, Downloads (12 Months): 136, Downloads (Overall): 318
Full text available:
PDF
Transient hardware faults during the execution of a program can cause data corruptions. We present HAFT, a fault tolerance technique using hardware extensions of commodity CPUs to protect unmodified multithreaded applications against such corruptions. HAFT utilizes instruction-level redundancy for fault detection and hardware transactional memory for fault recovery. We evaluated ...
11
November 2015
Middleware '15: Proceedings of the 16th Annual Middleware Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4, Downloads (12 Months): 99, Downloads (Overall): 167
Full text available:
PDF
Content-based publish/subscribe (pub/sub) is an appealing information dissemination paradigm for distributed systems. Consumers of data subscribe to a pub/sub service, typically offered through a distributed broker overlay, and indicate their interests as constraints over the information content. Publishers generate the information flow, which the brokers filter and route to the ...
Keywords:
publish/subscribe, confidentiality, key management
12
November 2015
Middleware '15: Proceedings of the 16th Annual Middleware Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5, Downloads (12 Months): 32, Downloads (Overall): 95
Full text available:
PDF
The ordering of events is a fundamental problem of distributed computing and has been extensively studied over several decades. From all the available orderings, total ordering is of particular interest as it provides a powerful abstraction for building reliable distributed applications. Unfortunately, deterministic total order algorithms scale poorly and are ...
Keywords:
data dissemination, large-scale distributed systems, total, epidemic algorithm, order
13
September 2015
ACM SIGCOMM Computer Communication Review: Volume 45 Issue 5, October 2015
Publisher: ACM
Bibliometrics:
Citation Count: 10
Downloads (6 Weeks): 109, Downloads (12 Months): 1,087, Downloads (Overall): 1,570
Full text available:
PDF
In many aspects of human activity, there has been a continuous struggle between the forces of centralization and decentralization. Computing exhibits the same phenomenon; we have gone from mainframes to PCs and local networks in the past, and over the last decade we have seen a centralization and consolidation of ...
Keywords:
peer-to-peer, fog computing, cloud computing, decentralized systems
14
September 2015
PPPJ '15: Proceedings of the Principles and Practices of Programming on The Java Platform
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3, Downloads (12 Months): 34, Downloads (Overall): 111
Full text available:
PDF
Concurrent programming has always been a challenging task best left to expert developers. Yet, with the advent of multi-core systems, programs have to explicitly deal with multithreading to fully exploit the parallel processing capabilities of the underlying hardware. There has been much research over the last decade on abstractions to ...
15
September 2015
Computing: Volume 97 Issue 9, September 2015
Publisher: Springer-Verlag New York, Inc.
In this paper we investigate the issue of automatically identifying the "natural" degree of parallelism of an application using software transactional memory (STM), i.e., the workload-specific multiprogramming level that maximizes application's performance. We discuss the importance of adapting the concurrency level in two different scenarios, a shared-memory and a distributed ...
Keywords:
Gradient descent, Machine learning, 68N19, Transactional memory, Analytical modelling, Multi-programming level, Self-tuning
16
July 2015
ACM Transactions on Parallel Computing: Volume 2 Issue 2, July 2015
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3, Downloads (12 Months): 23, Downloads (Overall): 107
Full text available:
PDF
Software transactional memory (STM) is an optimistic concurrency control mechanism that simplifies parallel programming. However, there has been little interest in its applicability to reactive applications in which there is a required response time for certain operations. We propose supporting such applications by allowing programmers to associate time with atomic ...
Keywords:
quality of service, transactional memory, Contention management, fairness, scheduling
17
June 2015
DEBS '15: Proceedings of the 9th ACM International Conference on Distributed Event-Based Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3, Downloads (12 Months): 24, Downloads (Overall): 126
Full text available:
PDF
Systems such as social networks, search engines or trading platforms operate geographically distant sites that continuously generate streams of events at high-rate. Such events can be access logs to web servers, feeds of messages from participants of a social network, or financial data, among others. The ability to timely detect ...
Keywords:
top-k frequency, distributed systems, event processing, top-k query
18
June 2015
Proceedings of the 15th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems - Volume 9038
Publisher: Springer-Verlag New York, Inc.
With the trend of ever growing data centers and scaling core counts, simple programming models for efficient distributed and concurrent programming are required. One of the successful principles for scalable computing is the actor model, which is based on message passing. Actors are objects that hold local state that can ...
19
April 2015
EuroSys '15: Proceedings of the Tenth European Conference on Computer Systems
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 7, Downloads (12 Months): 122, Downloads (Overall): 750
Full text available:
PDF
Power estimation of software processes provides critical indicators to drive scheduling or power capping heuristics. State-of-the-art solutions can perform coarse-grained power estimation in virtualized environments, typically treating virtual machines (VMs) as a black box. Yet, VM-based systems are nowadays commonly used to host multiple applications for cost savings and better ...
20
February 2015
PMAM '15: Proceedings of the Sixth International Workshop on Programming Models and Applications for Multicores and Manycores
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6, Downloads (12 Months): 40, Downloads (Overall): 195
Full text available:
PDF
In the last few years, managed runtime environments such as the Java Virtual Machine (JVM) are increasingly used on large-scale multicore servers. The garbage collector (GC) represents a critical component of the JVM and has a significant influence on the overall performance and efficiency of the running application. We perform ...
Keywords:
garbage collection, multicore, performance analysis
|
|