By Topic

Hot Topics in Operating Systems, 1995. (HotOS-V), Proceedings., Fifth Workshop on

Date 4-5 May 1995

Filter Results

Displaying Results 1 - 25 of 29
  • Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V)

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (220 KB)
    Freely Available from IEEE
  • Meta-scripts as a mechanism for complex web services

    Publication Year: 1995, Page(s):46 - 50
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (434 KB)

    The World-Wide Web is the 'killer application' of the mid-1990's, and as a result it serves as the market place for various services. This position document discusses the problem of creating complex Web services from simpler ones, under client control. For example, one might want an annotated forecast of a company's stock price from three simple services, viz., stock price data, forecasting and an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • Protection is a software issue

    Publication Year: 1995, Page(s):62 - 65
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    Modern operating systems are strongly dependent on software mechanisms to protect system resources from users. This is true despite the fact that the promoters of these systems imply that their reliability and integrity derive solely from the use of a core set of protected hardware mechanisms, such as address spaces and protected supervisor mode. While typical microprocessors provide cheap and eff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exterminate all operating system abstractions

    Publication Year: 1995, Page(s):78 - 83
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    The defining tragedy of the operating systems community has been the definition of an operating system as software that both multiplexes and abstracts physical resources. The view that the OS should abstract the hardware is based on the assumption that it is possible bath to define abstractions that are appropriate for all areas and to implement them to perform efficiently in all situations. We be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Paramecium: an extensible object-based kernel

    Publication Year: 1995, Page(s):86 - 89
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    We describe the design of an extensible kernel, called Paramecium. This kernel uses an object-based software architecture which together with instance naming, late binding and explicit overrides enables easy reconfiguration. Determining which components reside in the kernel protection domain is up to the user. A certification authority or one of its delegates certifies which components are trustwo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using dynamic sets to overcome high I/O latencies during search

    Publication Year: 1995, Page(s):136 - 140
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    Describes a single unifying abstraction called `dynamic sets', which can offer substantial benefits to search applications. These benefits include greater opportunity in the I/O subsystem to aggressively exploit prefetching and parallelism, as well as support for associative naming to complement the hierarchical naming in typical file systems. This paper motivates dynamic sets and presents the des... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time operating systems for multimedia processing

    Publication Year: 1995, Page(s):18 - 21
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    Real-time DSP operating systems have recently appeared in several commercial products that integrate multimedia processing into PCs. The DSP OSs, which run on DSP subsystems integrated on PC adapter cards, include admission control capabilities to ensure that timing guarantees are met and sufficient resources are available to handle the processing demands of a given mix of applications. Admission ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent communication filtering for limited bandwidth environments

    Publication Year: 1995, Page(s):28 - 34
    Cited by:  Papers (12)  |  Patents (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    We advocate a new architecture for distributed systems supporting mobility. In this architecture an intermediary is interposed between client and server. Its purpose is to filter or delay all but the most essential data that would travel over the slow link to the mobile host, as instructed by the client. The goal of our work is to provide a general framework to ease the installation and management... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Are we answering the right research questions for commercial operating systems?

    Publication Year: 1995, Page(s):142 - 144
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    There was an underlying question during both panel sessions at OSDI '94 (Operating Systems Design and Implementation Conference, November 14-17, 1994) which was never discussed: “Is the operating systems research community neglecting some major technical problems for commercial operating systems?” Operating systems are complex, costly and constantly growing more chaotic. Companies are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The grand unified theory of address spaces

    Publication Year: 1995, Page(s):66 - 71
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    A key decision in the design of an operating system is which facilities to provide for the management and composition of the address space. A wide spectrum of schemes exist, ranging from the private process address spaces of Unix through to the recently revived single address space approach. This paper proposes a new model which provides a unified and generalised approach to address space manageme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operating system support for mobile agents

    Publication Year: 1995, Page(s):42 - 45
    Cited by:  Papers (36)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    The TACOMA project is concerned with implementing operating system support for agents, processes that migrate through a network. Two TACOMA prototypes have been completed; this paper outlines our experiences in building and using them. A mechanism for exchanging electronic cash was explored, as well as agent-based schemes for scheduling and fault-tolerance View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generic support for synchronization and consistency in Arias

    Publication Year: 1995, Page(s):113 - 118
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    In the context of Arias, a distributed shared memory service with a persistent global address space, we have designed a general framework for consistency protocols. We motivate the general design of Arias and the specific approach to consistency, which is to allow applications to choose the consistency protocol adapted to their data synchronization model. A simple entity, the zone, is introduced, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operating systems support for busy Internet servers

    Publication Year: 1995, Page(s):I1 - I5
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    The Internet has experienced exponential growth in the use of the World-Wide Web, and rapid growth in the use of other Internet services such as USENET news and electronic mail. These applications qualitatively differ from other network applications in the stresses they impose on busy server systems. Unlike traditional distributed systems, Internet servers must cope with huge user communities, sho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AVM: application-level virtual memory

    Publication Year: 1995, Page(s):72 - 77
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    Virtual memory (VM) is a notoriously complicated abstraction to implement, and is hard to change, specialize, or replace. Although a certain degree of flexibility is achieved by user-level pagers, the control they provide is limited: they leave much of the VM system fixed in the kernel, unreachable by the application. As applications become more diverse and the opportunity cost of bad memory polic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A memory approach to consistent, reliable distributed shared memory

    Publication Year: 1995, Page(s):108 - 112
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    Fault-tolerant distributed shared memory systems do not always need to support a complete and consistent recovery after a failure. We describe a framework, within which different approaches to, and different degrees of consistency and recoverability can be understood. The addition of consistent failure recovery may be approached from two different viewpoints: either by an application-oriented view... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The case for geographical push-caching

    Publication Year: 1995, Page(s):51 - 55
    Cited by:  Papers (65)  |  Patents (87)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    Most wide-area caching schemes are client initiated. Decisions on when and where to cache information are made without the benefit of the server's global knowledge of the situation. We believe that the server should play a role in making these caching decisions, and we propose geographical push-caching as a way of bringing the server back into the loop. The World Wide Web is an excellent example o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving data consistency in mobile computing using isolation-only transactions

    Publication Year: 1995, Page(s):124 - 128
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    Disconnected operation is an important technique for providing mobile access to shared data in distributed file systems. However, data inconsistency resulting from partitioned sharing remains a serious concern. This paper presents a new mechanism called isolation-only transaction (IOT) that uses serializability constraints to automatically detect read/write conflicts. The IOT consistency model pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effective wireless communication through application partitioning

    Publication Year: 1995, Page(s):24 - 27
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    The comparatively severe network constraints imposed by mobile wireless computing require more careful management of communication resources than is typically necessary in the wired network. The performance characteristics of the wireless network are affected by a number of factors such as changes in location, environmental noise, cost constraints, and contention with other users. In addition, sin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time is no longer a small specialized niche

    Publication Year: 1995, Page(s):2 - 7
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    Operating system and real time researchers have historically worked in areas that are considered by each to be specialized and unrelated to the other's domain. However, embedded real time systems are evolving such that they now require increasing amounts of general purpose operating system support. Meanwhile, general purpose computer systems are evolving such that they are requiring increasing amo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modular real-time resource management in the Rialto operating system

    Publication Year: 1995, Page(s):12 - 17
    Cited by:  Papers (18)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    This paper describes ongoing investigations into algorithms for modular distributed real-time resource management. These investigations are being conducted in the context of the Rialto operating system-an object-based real-time kernel and programming environment currently being developed within Microsoft Research. Some of the goals of this research include developing appropriate real-time programm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive operating system design using reflection

    Publication Year: 1995, Page(s):95 - 100
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    Flexibility to adapt to different applications is a key requirement of modern operating systems. We have explored the use of meta-objects and reflection as a means to write adaptable system software. The paper discusses the Apertos operating system, that uses these techniques. It outlines how meta-objects help to support flexibility and how we have implemented the concepts, and gives some performa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient TCP over networks with wireless links

    Publication Year: 1995, Page(s):35 - 40
    Cited by:  Papers (16)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    TCP is a reliable transport protocol tuned to perform well in traditional networks made up of wired links with stationary hosts. Networks with wireless links and mobile hosts violate many of the assumptions made by TCP, causing degraded performance. We describe a simple protocol that improves TCP performance by modifying network-layer software only at a basestation without violating end-to-end TCP... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed shared memory: where we are and where we should be headed

    Publication Year: 1995, Page(s):119 - 122
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    It has been almost ten years since the birth of the first distributed shared memory (DSM) system, Ivy. While significant progress has been made in the area of improving the performance of DSM, and DSM has been the focus of several dozen PhD theses, its overall impact on “real” users and applications has been small. The goal of this paper is to present our position on what remains to be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of meta-protocols to improve OS services

    Publication Year: 1995, Page(s):101 - 105
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    User control of the implementation of OS services is the target of many current OS research efforts. The majority of these efforts require the OS to be substantially modified to expose its previously internal interfaces, with applications modified to reference these interfaces. Recent work in languages has centered on the use of meta-protocols to improve application implementations. Meta-protocols... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.