Pascal Felber
Pascal Felber

homepage
pascal.felberatunine.ch

  Affiliation history
Bibliometrics: publication history
Average citations per article13.82
Citation Count1,658
Publication count120
Publication years1995-2016
Available for download38
Average downloads per article723.34
Downloads (cumulative)27,487
Downloads (12 Months)3,997
Downloads (6 Weeks)560
Professional ACM Member
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


125 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 125
Result page: 1 2 3 4 5 6 7

Sort by:

1
May 2017 CCGrid '17: Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 0,   Downloads (Overall): 0

Full text available: PDFPDF
The design and the deployment of energy-efficient distributed systems is a challenging task, which requires software engineers to consider all the layers of a system, from hardware to software. In particular, monitoring and analyzing the power consumption of a distributed system spanning several---potentially heterogeneous---nodes becomes particularly tedious when aiming at ...

2
May 2017 IEEE Transactions on Dependable and Secure Computing: Volume 14 Issue 3, May 2017
Publisher: IEEE Computer Society Press
Bibliometrics:
Citation Count: 0

Content-based publish/subscribe provides a loosely-coupled and expressive form of communication for large-scale distributed systems. Confidentiality is a major challenge for publish/subscribe middleware deployed over multiple administrative domains. Encrypted matching allows confidentiality-preserving content-based filtering but has high performance overheads. It may also prevent the use of classical optimizations based on subscriptions ...

3 published by ACM
April 2017 EuroSys '17: Proceedings of the Twelfth European Conference on Computer Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 213,   Downloads (12 Months): 654,   Downloads (Overall): 654

Full text available: PDFPDF
Shielded execution based on Intel SGX provides strong security guarantees for legacy applications running on untrusted platforms. However, memory safety attacks such as Heartbleed can render the confidentiality and integrity properties of shielded execution completely ineffective. To prevent these attacks, the state-of-the-art memory-safety approaches can be used in the context ...

4
February 2017 Journal of Parallel and Distributed Computing: Volume 100 Issue C, February 2017
Publisher: Academic Press, Inc.
Bibliometrics:
Citation Count: 0

This paper presents elastic transactions, an appealing alternative to traditional transactions, in particular to implement search structures in shared memory multicore architectures. Upon conflict detection, an elastic transaction might drop what it did so far within a separate transaction that immediately commits, and resume its computation within a new transaction ...
Keywords: Transactional memory, Concurrent data structures

5 published by ACM
November 2016 Middleware '16: Proceedings of the 17th International Middleware Conference
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 16,   Downloads (12 Months): 130,   Downloads (Overall): 130

Full text available: PDFPDF
Content-based routing (CBR) is a powerful model that supports scalable asynchronous communication among large sets of geographically distributed nodes. Yet, preserving privacy represents a major limitation for the wide adoption of CBR, notably when the routers are located in public clouds. Indeed, a CBR router must see the content of ...
Keywords: Content-based routing, privacy, publish/subscribe, security, SGX

6 published by ACM
June 2016 ACM Computing Surveys (CSUR): Volume 49 Issue 2, November 2016
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 14,   Downloads (12 Months): 439,   Downloads (Overall): 444

Full text available: PDFPDF
Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale distributed applications running across multiple administrative domains. Pub/sub allows event-based information dissemination based on constraints on the nature of the data rather than on pre-established communication channels. It is a natural fit for deployment in untrusted environments such as public clouds ...
Keywords: confidentiality, Publish/subscribe

7
June 2016 Proceedings of the 16th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems - Volume 9687
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Due to rising energy costs, energy-efficient data centers have gained increasingly more attention in research and practice. Optimizations targeting energy efficiency are usually performed on an isolated level, either by producing more efficient hardware, by reducing the number of nodes simultaneously active in a data center, or by applying dynamic ...

8
June 2016 Proceedings of the 16th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems - Volume 9687
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 1

Erasure codes have been widely used over the last decade to implement reliable data stores. They offer interesting trade-offs between efficiency, reliability, and storage overhead. Indeed, a distributed data store holding encoded data blocks can tolerate the failure of multiple nodes while requiring only a fraction of the space necessary ...

9 published by ACM
April 2016 EuroSys '16: Proceedings of the Eleventh European Conference on Computer Systems
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 6,   Downloads (12 Months): 104,   Downloads (Overall): 228

Full text available: PDFPDF
Hardware Lock Elision (HLE) represents a promising technique to enhance parallelism of concurrent applications relying on conventional, lock-based synchronization. The idea at the basis of current HLE approaches is to wrap critical sections into hardware transactions: this allows critical sections to be executed in parallel using a speculative approach, while ...

10 published by ACM
April 2016 EuroSys '16: Proceedings of the Eleventh European Conference on Computer Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6,   Downloads (12 Months): 136,   Downloads (Overall): 318

Full text available: PDFPDF
Transient hardware faults during the execution of a program can cause data corruptions. We present HAFT, a fault tolerance technique using hardware extensions of commodity CPUs to protect unmodified multithreaded applications against such corruptions. HAFT utilizes instruction-level redundancy for fault detection and hardware transactional memory for fault recovery. We evaluated ...

11 published by ACM
November 2015 Middleware '15: Proceedings of the 16th Annual Middleware Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 99,   Downloads (Overall): 167

Full text available: PDFPDF
Content-based publish/subscribe (pub/sub) is an appealing information dissemination paradigm for distributed systems. Consumers of data subscribe to a pub/sub service, typically offered through a distributed broker overlay, and indicate their interests as constraints over the information content. Publishers generate the information flow, which the brokers filter and route to the ...
Keywords: publish/subscribe, confidentiality, key management

12 published by ACM
November 2015 Middleware '15: Proceedings of the 16th Annual Middleware Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 32,   Downloads (Overall): 95

Full text available: PDFPDF
The ordering of events is a fundamental problem of distributed computing and has been extensively studied over several decades. From all the available orderings, total ordering is of particular interest as it provides a powerful abstraction for building reliable distributed applications. Unfortunately, deterministic total order algorithms scale poorly and are ...
Keywords: data dissemination, large-scale distributed systems, total, epidemic algorithm, order

13 published by ACM
September 2015 ACM SIGCOMM Computer Communication Review: Volume 45 Issue 5, October 2015
Publisher: ACM
Bibliometrics:
Citation Count: 10
Downloads (6 Weeks): 109,   Downloads (12 Months): 1,087,   Downloads (Overall): 1,570

Full text available: PDFPDF
In many aspects of human activity, there has been a continuous struggle between the forces of centralization and decentralization. Computing exhibits the same phenomenon; we have gone from mainframes to PCs and local networks in the past, and over the last decade we have seen a centralization and consolidation of ...
Keywords: peer-to-peer, fog computing, cloud computing, decentralized systems

14 published by ACM
September 2015 PPPJ '15: Proceedings of the Principles and Practices of Programming on The Java Platform
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 34,   Downloads (Overall): 111

Full text available: PDFPDF
Concurrent programming has always been a challenging task best left to expert developers. Yet, with the advent of multi-core systems, programs have to explicitly deal with multithreading to fully exploit the parallel processing capabilities of the underlying hardware. There has been much research over the last decade on abstractions to ...

15
September 2015 Computing: Volume 97 Issue 9, September 2015
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

In this paper we investigate the issue of automatically identifying the "natural" degree of parallelism of an application using software transactional memory (STM), i.e., the workload-specific multiprogramming level that maximizes application's performance. We discuss the importance of adapting the concurrency level in two different scenarios, a shared-memory and a distributed ...
Keywords: Gradient descent, Machine learning, 68N19, Transactional memory, Analytical modelling, Multi-programming level, Self-tuning

16 published by ACM
July 2015 ACM Transactions on Parallel Computing: Volume 2 Issue 2, July 2015
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 23,   Downloads (Overall): 107

Full text available: PDFPDF
Software transactional memory (STM) is an optimistic concurrency control mechanism that simplifies parallel programming. However, there has been little interest in its applicability to reactive applications in which there is a required response time for certain operations. We propose supporting such applications by allowing programmers to associate time with atomic ...
Keywords: quality of service, transactional memory, Contention management, fairness, scheduling

17 published by ACM
June 2015 DEBS '15: Proceedings of the 9th ACM International Conference on Distributed Event-Based Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 24,   Downloads (Overall): 126

Full text available: PDFPDF
Systems such as social networks, search engines or trading platforms operate geographically distant sites that continuously generate streams of events at high-rate. Such events can be access logs to web servers, feeds of messages from participants of a social network, or financial data, among others. The ability to timely detect ...
Keywords: top-k frequency, distributed systems, event processing, top-k query

18
June 2015 Proceedings of the 15th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems - Volume 9038
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 1

With the trend of ever growing data centers and scaling core counts, simple programming models for efficient distributed and concurrent programming are required. One of the successful principles for scalable computing is the actor model, which is based on message passing. Actors are objects that hold local state that can ...

19 published by ACM
April 2015 EuroSys '15: Proceedings of the Tenth European Conference on Computer Systems
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 7,   Downloads (12 Months): 122,   Downloads (Overall): 750

Full text available: PDFPDF
Power estimation of software processes provides critical indicators to drive scheduling or power capping heuristics. State-of-the-art solutions can perform coarse-grained power estimation in virtualized environments, typically treating virtual machines (VMs) as a black box. Yet, VM-based systems are nowadays commonly used to host multiple applications for cost savings and better ...

20 published by ACM
February 2015 PMAM '15: Proceedings of the Sixth International Workshop on Programming Models and Applications for Multicores and Manycores
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6,   Downloads (12 Months): 40,   Downloads (Overall): 195

Full text available: PDFPDF
In the last few years, managed runtime environments such as the Java Virtual Machine (JVM) are increasingly used on large-scale multicore servers. The garbage collector (GC) represents a critical component of the JVM and has a significant influence on the overall performance and efficiency of the running application. We perform ...
Keywords: garbage collection, multicore, performance analysis



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2017 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us