Author image not provided
 Paul T Barham

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article111.50
Citation Count2,676
Publication count24
Publication years1993-2016
Available for download11
Average downloads per article8,007.18
Downloads (cumulative)88,079
Downloads (12 Months)7,718
Downloads (6 Weeks)1,130
SEARCH
ROLE
Arrow RightAuthor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


24 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 24
Result page: 1 2

Sort by:

1 published by ACM
September 2016 Communications of the ACM: Volume 59 Issue 10, October 2016
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 815,   Downloads (12 Months): 3,903,   Downloads (Overall): 7,154

Full text available: HtmlHtml  PDFPDF
We describe the timely dataflow model for distributed computation and its implementation in the Naiad system. The model supports stateful iterative and incremental computations. It enables both low-latency stream processing and high-throughput batch processing, using a new approach to coordination that combines asynchronous and fine-grained synchronous execution. We describe two ...

2 published by ACM
November 2013 SOSP '13: Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles
Publisher: ACM
Bibliometrics:
Citation Count: 130
Downloads (6 Weeks): 139,   Downloads (12 Months): 1,569,   Downloads (Overall): 7,748

Full text available: PDFPDF
Naiad is a distributed system for executing data parallel, cyclic dataflow programs. It offers the high throughput of batch processors, the low latency of stream processors, and the ability to perform iterative and incremental computations. Although existing systems offer some of these features, applications that require all three have relied ...

3
June 2010 HotPar'10: Proceedings of the 2nd USENIX conference on Hot topics in parallelism
Publisher: USENIX Association
Bibliometrics:
Citation Count: 7

As personal computing devices become increasingly parallel multiprocessors, the requirements for operating system schedulers change considerably. Future general-purpose machines will need to handle a dynamic, bursty, and interactive mix of parallel programs sharing a heterogeneous multicore machine. We argue that a key challenge for such machines is rethinking scheduling as ...

4 published by ACM
October 2009 SOSP '09: Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles
Publisher: ACM
Bibliometrics:
Citation Count: 43
Downloads (6 Weeks): 4,   Downloads (12 Months): 35,   Downloads (Overall): 691

Full text available: PDFPDF
Bugs in kernel extensions remain one of the main causes of poor operating system reliability despite proposed techniques that isolate extensions in separate protection domains to contain faults. We believe that previous fault isolation techniques are not widely used because they cannot isolate existing kernel extensions with low overhead on ...
Keywords: device drivers, isolation

5 published by ACM
October 2009 SOSP '09: Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles
Publisher: ACM
Bibliometrics:
Citation Count: 237
Downloads (6 Weeks): 34,   Downloads (12 Months): 386,   Downloads (Overall): 3,831

Full text available: PDFPDF
Commodity computer systems contain more and more processor cores and exhibit increasingly diverse architectural tradeoffs, including memory hierarchies, interconnects, instruction sets and variants, and IO configurations. Previous high-performance computing systems have scaled in specific cases, but the dynamic nature of modern client and server workloads, coupled with the impossibility of ...
Keywords: message passing, scalability, multicore processors

6
May 2009 HotOS'09: Proceedings of the 12th conference on Hot topics in operating systems
Publisher: USENIX Association
Bibliometrics:
Citation Count: 13


7 published by ACM
December 2008 ACM Transactions on Computer Systems (TOCS): Volume 26 Issue 4, December 2008
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 5,   Downloads (12 Months): 43,   Downloads (Overall): 1,072

Full text available: PDFPDF
Worm containment must be automatic because worms can spread too fast for humans to respond. Recent work proposed network-level techniques to automate worm containment; these techniques have limitations because there is no information about the vulnerabilities exploited by worms at the network level. We propose Vigilante, a new end-to-end architecture ...
Keywords: Worm containment, dynamic data-flow analysis, program analysis, self-certifying alerts, vulnerability condition slicing

8 published by ACM
April 2008 Eurosys '08: Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 2,   Downloads (12 Months): 9,   Downloads (Overall): 890

Full text available: PDFPDF
The basic system timer facilities used by applications and OS kernels for scheduling timeouts and periodic activities have remained largely unchanged for decades, while hardware architectures and application loads have changed radically. This raises concerns with CPU overhead power management and application responsiveness. In this paper we study how kernel ...
Keywords: kernel interface design, adaptability, timers, scheduling
Also published in:
April 2008  ACM SIGOPS Operating Systems Review - EuroSys '08: Volume 42 Issue 4, May 2008

9
May 2006 ATEC '06: Proceedings of the annual conference on USENIX '06 Annual Technical Conference
Publisher: USENIX Association
Bibliometrics:
Citation Count: 11

Network-centric tools like NetFlow and security systems like IDSes provide essential data about the availability, reliability, and security of network devices and applications. However, the increased use of encryption and tunnelling has reduced the visibility of monitoring applications into packet headers and payloads (e.g. 93% of traffic on our enterprise ...

10 published by ACM
October 2005 ACM SIGOPS Operating Systems Review - SOSP '05: Volume 39 Issue 5, December 2005
Publisher: ACM
Bibliometrics:
Citation Count: 167
Downloads (6 Weeks): 5,   Downloads (12 Months): 43,   Downloads (Overall): 1,931

Full text available: PDFPDF
Worm containment must be automatic because worms can spread too fast for humans to respond. Recent work has proposed network-level techniques to automate worm containment; these techniques have limitations because there is no information about the vulnerabilities exploited by worms at the network level. We propose Vigilante, a new end-to-end ...
Keywords: control flow analysis, self-certifying alerts, worm containment, data flow analysis
Also published in:
October 2005  SOSP '05: Proceedings of the twentieth ACM symposium on Operating systems principles

11 published by ACM
August 2005 MineNet '05: Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 0,   Downloads (12 Months): 10,   Downloads (Overall): 217

Full text available: PDFPDF
Enterprise networks contain hundreds, if not thousands, of cooperative end-systems. We advocate devoting a small fraction of their idle cycles, free disk space and network bandwidth to create Anemone , a platform for network management. In contrast to current approaches which rely on traffic statistics provided by network devices, Anemone ...
Keywords: distributed enterprise network management

12
December 2004 OSDI'04: Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Publisher: USENIX Association
Bibliometrics:
Citation Count: 209

Tools to understand complex system behaviour are essential for many performance analysis and debugging tasks, yet there are many open research problems in their development. Magpie is a toolchain for automatically extracting a system's workload under realistic operating conditions. Using low-overhead instrumentation, we monitor the system to record fine-grained events ...

13 published by ACM
September 2004 EW 11: Proceedings of the 11th workshop on ACM SIGOPS European workshop
Publisher: ACM
Bibliometrics:
Citation Count: 7
Downloads (6 Weeks): 0,   Downloads (12 Months): 9,   Downloads (Overall): 162

Full text available: PDFPDF
This paper addresses the problem of extracting individual request activity from interleaved event traces. We present a new technique for event correlation which applies a form of temporal join over timestamped, parameterized event streams in order to identify the events pertaining to an individual request. Event schemas ensure that the ...

14 published by ACM
October 2003 ACM SIGOPS Operating Systems Review - SOSP '03: Volume 37 Issue 5, December 2003
Publisher: ACM
Bibliometrics:
Citation Count: 1,578
Downloads (6 Weeks): 129,   Downloads (12 Months): 1,709,   Downloads (Overall): 63,753

Full text available: PDFPDF
Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity operating systems. Some target 100% binary compatibility at the expense of performance. Others sacrifice security or functionality for speed. Few offer resource isolation or performance ...
Keywords: paravirtualization, hypervisors, virtual machine monitors
Also published in:
October 2003  SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles

15
May 2003 HOTOS'03: Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Publisher: USENIX Association
Bibliometrics:
Citation Count: 49

Understanding the performance of distributed systems requires correlation of thousands of interactions between numerous components -- a task best left to a computer. Today's systems provide voluminous traces from each component but do not synthesise the data into concise models of system performance. We argue that online performance modelling should ...

16
March 2003 VR '03: Proceedings of the IEEE Virtual Reality 2003
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

One way of measuring of the success of a technology is the degree to which it has foundacceptance in "real world" companies. These companies will only adopt and continue to use newtechnology if it lets them solve "real world" problems more effectively than alternative methodsand techniques. Critical to this success ...

17
October 1998 Presence: Teleoperators and Virtual Environments: Volume 7 Issue 5, October 1998
Publisher: MIT Press
Bibliometrics:
Citation Count: 2

This paper describes the implementation of the sound system used to generate aural cues for use in the distributed virtual environment of NPSNET. This sound system is called the NPSNET-3D Sound Server. It is a MIDI-based loudspeaker system consisting of commercial, off-the-shelf equipment. This sound system currently generates 2-D aural ...

18
November 1997 LCN '97: Proceedings of the 22nd Annual IEEE Conference on Local Computer Networks
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 12

A vertically structured Operating System is one in which neither the "kernel" nor "servers" perform work on behalf of applications -- the former because it exists only to multiplex the CPU, and the latter in order to avoid Quality of Service interference between the applications. Instead, wherever possible, the applications ...

19
October 1997 Presence: Teleoperators and Virtual Environments: Volume 6 Issue 5, October 1997
Publisher: MIT Press
Bibliometrics:
Citation Count: 0

This paper examines the representation of humans in large-scale, networked virtual environments. Previous work done in this field is summarized, and existing problems with rendering, articulating, and networking numerous human figures in real time are explained. We have developed a system that integrates together some well-known solutions along with new ...

20
September 1995 IEEE Computer Graphics and Applications: Volume 15 Issue 5, September 1995
Publisher: IEEE Computer Society Press
Bibliometrics:
Citation Count: 69

We describe a network software architecture for solving the problem of scaling very large distributed simulations. The fundamental idea is to logically partition virtual environments by associating spatial, temporal, and functionally related entity classes with network multicast groups. We exploit the actual characteristics of the real-world large-scale environments that are ...
Keywords: Virtual Reality, Distributed Interactive Simulation, Internet Protocol Multicast, Distributed Interactive Entertainment, Large-Scale Virtual Environments.



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us