By Topic

Object-Orientation in Operating Systems, 1995., Fourth International Workshop on

Date 14-15 Aug. 1995

Filter Results

Displaying Results 1 - 25 of 38
  • Object-stacking in the World-Wide Web

    Publication Year: 1995, Page(s):210 - 219
    Cited by:  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (898 KB)

    Object-stacking is a model for structuring object based systems. The main feature of object-stacking is that layers of objects with a uniform interface are constructed, and the functions of these objects are integrated. The effectiveness of object-stacking has been shown for file systems of distributed operating systems. The paper presents the application of the object-stacking model to the World-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proceedings of International Workshop on Object Orientation in Operating Systems

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • Garbage collection for hard real-time systems

    Publication Year: 1995, Page(s):60 - 63
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    This paper describes a scheme for garbage collection suitable for hard real-time applications. The approach supports both periodic high-priority processes and low-priority processes. Garbage collection work is done exclusively during execution of low-priority processes. A prototype garbage collector has been implemented for a C++ real-time kernel. The results confirms that high-priority processes ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building a secure, location transparent object invocation system

    Publication Year: 1995, Page(s):114 - 117
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    This paper addresses efficient object invocation in distributed systems. Such systems include support for transparent object migration between computers connected by a network, delegation and revocation of access to objects in a system, and very high speed communication between objects, whether they are located in the same machine or across the network from each other. Asynchronous Transfer Mode (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object consistency-a new model for distributed memory systems

    Publication Year: 1995, Page(s):33 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    This paper presents main ideas of object consistency (OC)-a new consistency model for distributed shared memory (DSM) systems. It was developed by analyzing various sharing patterns in real parallel applications as well as existing coherency models for both flat and object-based DSMs. OC is an attempt to effectively integrate entry consistency (EC) and version consistency (VC) into a single consis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An object-oriented nano-kernel for operating system hardware support

    Publication Year: 1995, Page(s):220 - 223
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    The nano-kernel in the μChoices operating system provides hardware support for the operating system. The nano-kernel is a single, modular subsystem that encapsulates the hardware and presents an idealized machine architecture to the rest of the system. Higher levels of the system that implement policy access the nano-kernel through a single interface. Thus the μChoices nano-kernel is fully d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An extensible type system for wide-area information management

    Publication Year: 1995, Page(s):175 - 178
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB)

    The advent of usable information access systems like the World-Wide Web has placed vast amounts of information within easy reach of users. However, the volume of information complicates information access and quickly overwhelms users. To overcome the complexity of wide-area information management, the next generation of information systems must facilitate applications to locate, retrieve and custo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The case for segments

    Publication Year: 1995, Page(s):94 - 102
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    This paper argues two points: firstly that persistent systems ought to have some kind of user-level intermediate structure, unlike systems where the persistent store is just a huge collection of small objects; and secondly it describes the Barbados system (which has such an intermediate structure) and argues that it is an effective implementation of persistence. The first point is almost a philoso... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operating systems and communication protocols

    Publication Year: 1995, Page(s):166 - 170
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    Modern operating system designs should not only offer suitable system call interfaces to the end-user application programs, but should also be able to accommodate special purpose sub-systems, such as networking software, executing in a privileged/kernel address space. Decisions involved in networking software design and implementation require a careful analysis of the features offered by the targe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • (De-)clustering objects for multiprocessor system software

    Publication Year: 1995, Page(s):72 - 81
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB)

    Designing system software for large scale shared memory multiprocessors is challenging because of the level of performance demanded by the application workload and the distributed nature of the system. Adopting an object oriented approach for our system, we have developed a framework for de clustering objects, where each object may migrate, replicate, and distribute all or part of its data across ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient implementation of naming and addressing of objects

    Publication Year: 1995, Page(s):157 - 161
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    This paper proposes an efficient implementation of method calls using the Hierarchy-Relative Naming Scheme. The relative cost of the straightforward implementation of the scheme increases dramatically when virtual address space sharing optimization and replacement with local procedure calls is taken into account. We designed a method called instruction sequence that is as efficient as a simple pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Log compaction and garbage collection-What could they bring to each other?

    Publication Year: 1995, Page(s):64 - 67
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    This paper describes the compaction techniques and problems and compares them to those of garbage collection. By studying how certain garbage collection problems are solved in the context of log compaction, it tries to suggest new paths of research for garbage collection in the domains of distribution, parallelisation and fault-tolerance View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Filtering duplicated invocations using symmetric proxies

    Publication Year: 1995, Page(s):118 - 126
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    Invocation is the communication paradigm of objects. It is asymmetric by definition: the invoker initiates the invocation whereas the invokee reacts to it. A proxy is a local representative of the invokee on the invoker's machine. Like the invocation, the proxy notion is asymmetric. However, when replicated objects are considered, there is a need for symmetric proxies: a regular proxy plus an invo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structuring operating systems using adaptive objects for improving performance

    Publication Year: 1995, Page(s):130 - 133
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    Programmers of high-performance applications often complain that the abstractions provided by the operating system (OS) hinder the optimal exploitation of the underlying hardware. We believe that this should not be the case with a well designed OS. The key is that OS subsystems must be customizable, adaptable and extensible, to permit an optimal match between the application needs and the hardware... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectural support for mobile objects in large scale distributed systems

    Publication Year: 1995, Page(s):38 - 47
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (840 KB)

    The paper discusses the relevant features of an object support system that provides basic facilities for building flexible distributed applications in environments where objects can be mobile and occasional failures (node crashes, real or virtual network partitions) are possible. These facilities are for naming, locating and invoking objects, persistence and garbage collection. One of the key feat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An algorithm for supporting fault tolerant objects in distributed object oriented operating systems

    Publication Year: 1995, Page(s):142 - 148
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    This paper presents a new algorithm for supporting fault tolerant objects in distributed object oriented systems. The fault tolerance provided by the algorithm is fully user transparent. The algorithm uses checkpointing and message logging scheme. However the novelty of this scheme is in identifying the checkpointing instances such that the checkpointing time will not affect the regular response t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards object-based wide area distributed systems

    Publication Year: 1995, Page(s):224 - 227
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    In order to facilitate the construction of wide area distributed systems, if is necessary that we adopt a model that simplifies application development. We advocate an object-based approach. Our approach allows for flexibility because many of the technical detail of distribution, such as communication protocols, consistency rules, etc. can be hidden behind the objects' interfaces. In addition, we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Graph-based optimizations for parameter passing in remote invocations

    Publication Year: 1995, Page(s):179 - 182
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    This paper proposes a graph-based solution to the problem of parameter passing in distributed object-oriented applications. The solution presented makes use of graph directives for the purpose of optimizing the copying of objects which are passed as parameters in remote invocations. These specifications are done using a very simple graph traversal language-GOOP. The resulting parameter passing sch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Configuration classes: an object oriented paradigm for distributed programming

    Publication Year: 1995, Page(s):200 - 209
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (892 KB)

    The paper presents a new object oriented model for distributed computing. This model aims at providing a language independent formalism in order to express the distribution of an object oriented application. The model allows the location of objects in a distributed system to be dynamically managed. This means that it can manage complex duplication, migration or distant communication over a network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making meta-object protocols practical for operating systems

    Publication Year: 1995, Page(s):52 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    This position paper considers how Meta-Object Protocol (MOP) technology can be used to support operating system flexibility including the dynamic adoption and extension of the system. We are interested in applying MOPs to a domain (that of operating systems) where they have had little acceptance. We believe that this is largely due to the complexity of operating system software and the possible se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An open visual model for object-oriented operating systems

    Publication Year: 1995, Page(s):103 - 112
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1048 KB)

    Flexibility and user-customizability are amongst the potential benefits of reorganizing and restructuring operating systems using object-orientation. However, operating systems are often designed as black boxes whose internals cannot easily be examined or tailored by the user or application. As a black box, the complexity of an operating system appears to grow as additional features and options ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On page-based optimistic process checkpointing

    Publication Year: 1995, Page(s):24 - 32
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB)

    Persistent object systems must provide some form of checkpointing to ensure that changes to persistent data are secured on non-volatile storage. When processes share or exchange modified data, mechanisms must be provided to ensure that they may be consistently checkpointed. This may be performed eagerly by synchronously checkpointing all dependent data. Alternatively, optimistic techniques may be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operating system support for flexible coherence in distributed object systems

    Publication Year: 1995, Page(s):171 - 174
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    COMMOS is an operating system architecture developed to support shared persistent objects in distributed systems. This paper describes its support for flexible coherence. The approach is based on a microkernel, typed memory objects and integrated coherence control. A microkernel architecture is used to make it easier to support multiple coherence protocols and to add new protocols. Memory objects ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework of customizing transactions in persistent object management for advanced applications

    Publication Year: 1995, Page(s):84 - 93
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB)

    In the new applications that support user cooperation using the power of distributed computers, users' processes in distributed hosts often share large data structures containing nested structure and pointers that often indicate persistent objects. Transactions usually manage concurrent accesses to shared persistent objects in such applications. Although various types of transaction schemes have b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptable infrastructures for operating systems

    Publication Year: 1995, Page(s):162 - 165
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    This paper presents structuring adaptable execution environments, which are referred to as “infrastructures” and their impact on “instances” running above them. Instances are the only units for identification, for processing by performing services and for keeping state. Instances have different “shapes” at different “levels”. Instances at one level f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.