skip to main content
10.1145/1851276acmconferencesBook PagePublication PagesapsysConference Proceedingsconference-collections
APSys '10: Proceedings of the first ACM asia-pacific workshop on Workshop on systems
ACM2010 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SIGCOMM '10: ACM SIGCOMM 2010 Conference New Delhi India 30 August 2010
ISBN:
978-1-4503-0195-4
Published:
30 August 2010
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

Welcome to the 1st ACM Asia-Pacific Workshop on Systems-APSys'10, held at New Delhi, India. The main motivation of this workshop is to catalyze computer systems research in the Asia-Pacific region by bringing innovative practitioners and researchers around the world to this region to present their work and exchange ideas on all aspects of systems practice. We are excited to have a strong program with position papers spanning wide range of system topics from security to file systems, from low level operating systems issues to designing robust networked systems, from optimizing resource allocation in the cloud to optimizing performance for mobile settings.

We received 21 papers and all papers were reviewed by at least three program committee members and selected external reviewers. The program committee finally accepted 10 papers after carefully discussing all the papers. These papers represent the international character of systems research with papers from Australia, India, Netherlands, Singapore, South Korea, and USA.

Skip Table Of Content Section
SESSION: System architecture
research-article
Free
Topology-aware resource allocation for data-intensive workloads

This paper proposes an architecture for optimized resource allocation in Infrastructure-as-a-Service (IaaS)-based cloud systems. Current IaaS systems are usually unaware of the hosted application's requirements and therefore allocate resources ...

research-article
Free
Architecture optimisation with Currawong

We describe Currawong, a tool to perform system software architecture optimisation. Currawong is an extensible tool which applies optimisations at the point where an application invokes framework or library code. Currawong does not require source code ...

research-article
Free
DDE: dynamic data structure excavation

Dynamic Datastructure Excavation (DDE) is a new approach to extract datastructures from C binaries without any need for debugging symbols. Unlike most existing tools, DDE uses dynamic analysis (on a QEMU-based emulator) and detects data structures by ...

SESSION: Operating systems issues
research-article
Free
The OKL4 microvisor: convergence point of microkernels and hypervisors

We argue that recent hypervisor-vs-microkernel discussions completely miss the point. Fundamentally, the two classes of systems have much in common, and provide similar abstractions. We assert that the requirements for both types of systems can be met ...

research-article
Free
The case for active device drivers

We revisit the device-driver architecture supported by the majority of operating systems, where a driver is a passive object that does not have its own thread of control and is only activated when an external thread invokes one of its entry points. This ...

research-article
Free
capDL: a language for describing capability-based systems

Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the security provided by such systems it is necessary to verify that their ...

research-article
Free
On-line consistent backup in transactional file systems

A consistent backup, preserving data integrity across files in a file system, is of utmost importance for the purpose of correctness and minimizing system downtime during the process of data recovery. With the present day demand for continuous access to ...

SESSION: Robust networked systems
research-article
Free
Suppressing bot traffic with accurate human attestation

Human attestation is a promising technique to suppress unwanted bot traffic in the Internet. With a proof of human existence attached to the message, the receiving end can verify whether the content is actually drafted by humans. This technique can ...

research-article
Free
Towards software-friendly networks

There has usually been a clean separation between networks and the applications that use them. Applications send packets over a simple socket API; the network delivers them. However, there are many occasions when applications can benefit from more ...

research-article
Free
Improving peer-to-peer file distribution: winner doesn't have to take all

Recent work on BitTorrent has shown that the choke/unchoke mechanism implements an auction where each peer tries to induce other peers into "unchoking" it by uploading more data than competing peers. Under such a scenario, fast peers tend to trade with ...

Contributors
  • Microsoft Research
  • Microsoft Research

Index Terms

  1. Proceedings of the first ACM asia-pacific workshop on Workshop on systems

    Recommendations

    Acceptance Rates

    Overall Acceptance Rate149of386submissions,39%
    YearSubmittedAcceptedRate
    APSys '23321341%
    APSys '21431944%
    APSys '19361542%
    APSys '18481838%
    APSys '17512753%
    APSys '15682029%
    APSys '14351440%
    APSys '13732332%
    Overall38614939%