By Topic

Operating Systems, 1997., The Sixth Workshop on Hot Topics in

Date 5-6 May 1997

Filter Results

Displaying Results 1 - 25 of 25
  • Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133)

    Publication Year: 1997
    Request permission for commercial reuse | PDF file iconPDF (310 KB)
    Freely Available from IEEE
  • Index of authors

    Publication Year: 1997, Page(s): 141
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • Extensible kernels are leading OS research astray

    Publication Year: 1997, Page(s):38 - 42
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    Argues that ongoing research in extensible kernels largely fails to address the real challenges facing the operating systems (OS) community. Instead, these efforts have become entangled in trying to solve the safety problems that extensibility itself introduces into OS design. We propose a pragmatic approach to extensibility, where kernel extensions are used in experimental settings to evaluate an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The network hardware is the operating system

    Publication Year: 1997, Page(s):32 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    To build a distributed operating system (OS), the microkernel approach is the most popular. To build an adaptable OS, a minimal microkernel is preferred, but for an adaptable and flexible distributed OS, the previous approaches are not enough because they create an artificial barrier to OS distribution and harm system transparency and adaptability. This paper express how adaptable distributed syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Achieved IPC performance (still the foundation for extensibility)

    Publication Year: 1997, Page(s):28 - 31
    Cited by:  Papers (16)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    Extensibility can be based on cross-address-space interprocess communication (IPC) or on grafting application-specific modules into the operating system. For comparing both approaches, we need to explore the best achievable performance for both models. This paper reports the achieved performance of cross-address-space communication for the L4 microkernel on Intel Pentium, Mips R4600 and DEC Alpha ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal methods: a practical tool for OS implementors

    Publication Year: 1997, Page(s):20 - 25
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB)

    The formal methods community has long known about the need to formally analyze concurrent software, but the operating systems (OS) community has been slow to adopt such methods. The foremost reasons for this are the cultural and knowledge gaps between formalists and OS hackers, fostered by three beliefs: inaccessibility of the tools, the disabling gap between the validated model and actual impleme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Flux OS Toolkit: reusable components for OS implementation

    Publication Year: 1997, Page(s):14 - 19
    Cited by:  Papers (4)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    To an unappreciated degree, research both in operating systems (OSs) and their programming languages has been severely hampered by the lack of cleanly reusable code providing mundane low-level OS infrastructure such as bootstrap code and device drivers. The Flux OS Toolkit solves this problem by providing a set of clean, well-documented components. These components can be used as basic building bl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The failure of personalities to generalize

    Publication Year: 1997, Page(s):8 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    IBM's adoption of operating system personalities was one of the most publicized issues in operating systems design. The basic premise of Workplace OS work was: (1) IBM would adopt and improve the CMU Mach 3.0 microkernel for use on PDAs, the desktop and massively parallel machines, and (2) that several operating system personalities would execute on the microkernel platform concurrently. This arch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience with the development of a microkernel-based, multiserver operating system

    Publication Year: 1997, Page(s):2 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (752 KB)

    During the first half of the 1990s, IBM developed a set of operating system products called Workplace OS that was based on the Mach 3.0 microkernel and Taligent's object-oriented TalOS. These products were intended to be scalable, portable and capable of concurrently running multiple operating system personalities while sharing as much code as possible. The operating system personalities were cons... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure applications need flexible operating systems

    Publication Year: 1997, Page(s):56 - 61
    Cited by:  Papers (5)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    As information exchange over wide area networks becomes an increasingly essential component of new applications, firewalls will no longer provide an adequate defense against malicious attackers. Individual workstations will need to provide strong enough security to contain malicious processes and prevent the domino effect of a pierced firewall. Some of the most commonly found security holes today ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preventing denial-of-service attacks on a μ-kernel for WebOSes

    Publication Year: 1997, Page(s):73 - 79
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    A goal of World Wide Web operating systems (WebOSes) is to enable clients to download executable content from servers connected to the World Wide Web (WWW). This will make applications more easily available to clients, but some of these applications may be malicious. Thus, a WebOS must be able to control the downloaded content's behavior. We examine a specific type of malicious activity: denial of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reduce, reuse, recycle: an approach to building large Internet caches

    Publication Year: 1997, Page(s):93 - 98
    Cited by:  Papers (35)  |  Patents (55)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    New demands brought by the continuing growth of the Internet will be met in part by more effective use of caching in the Web and other services. We have developed CRISP, a distributed Internet object cache targeted to the needs of the organizations that aggregate the end users of Internet services, particularly the commercial Internet Service Providers (ISPs) where much of the new growth occurs. A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Customization lite [operating systems]

    Publication Year: 1997, Page(s):43 - 48
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    There has been a great deal of interest in recent years in developing operating systems that can be customized to meet the performance and functionality needs of particular applications while being extensible to support new policies, new implementations and new interfaces. We describe a structuring technique, called building-block composition, that we are employing for this purpose. The customizab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security for extensible systems

    Publication Year: 1997, Page(s):62 - 66
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    The recent trend towards dynamically extensible systems, such as Java, SPIN or VINO, promises more powerful and flexible systems. At the same time, the impact of extensibility on overall system security and, specifically, on access control is still ill understood, and protection mechanisms in these extensible systems are rudimentary at best. We identify the structure of extensible systems as it re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Query routing: applying systems thinking to Internet search

    Publication Year: 1997, Page(s):82 - 86
    Cited by:  Papers (1)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    As the Internet continues to grow exponentially, locating desired information becomes more difficult. Centralized approaches to the problem may prove unable to cope with this growth, and existing distributed ones do not scale well either, so it would be wise to investigate alternatives. One alternative is `query routing', a technology which uses compressed indices from multiple sites to `route' qu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed systems support for networked games

    Publication Year: 1997, Page(s):99 - 104
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    Network based multi user interaction systems such as network games typically include a database shared among the players that are physically distributed and interact with one another over the network. Currently network game developers have to implement the shared database and the inter player communications from scratch. The paper presents the architecture of a distributed system, Artery, which is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operating systems for component software environments

    Publication Year: 1997, Page(s):49 - 54
    Cited by:  Papers (4)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    Although component software has emerged as one of the most significant and commercially successful technologies of the past few years, few operating systems (OSs) are designed to host and manage component software effectively. Components impact OS architectures in the areas of security, process isolation, code sharing, installation management and user interface design. A more radical question is: ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building diverse computer systems

    Publication Year: 1997, Page(s):67 - 72
    Cited by:  Papers (99)  |  Patents (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    Diversity is an important source of robustness in biological systems. Computers, by contrast, are notable for their lack of diversity. Although homogeneous systems have many advantages, the beneficial effects of diversity in computing systems have been overlooked, specifically in the area of computer security. Several methods of achieving software diversity are discussed based on randomizations th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • General purpose proxies: solved and unsolved problems

    Publication Year: 1997, Page(s):87 - 92
    Cited by:  Papers (11)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    Proxies are becoming increasingly common. One use of a proxy is to address network heterogeneity, which can arise especially in mobile computing. In this setting, a proxy can process the traffic flowing to and from a network limited mobile host, damping the variations in application performance as well as providing other benefits such as reduced cost and increased security. We describe the issues ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operating system directions for the next Millennium

    Publication Year: 1997, Page(s):106 - 110
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    We believe it is time to reexamine the operating system's role in computing. Operating systems exist to create an environment in which compelling applications come to life. They do that by providing abstractions built on the services provided by hardware. We argue that advances in hardware and networking technology enable a new kind of operating system to support tomorrow's applications. Such an o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Run-time code generation as a central system service

    Publication Year: 1997, Page(s):112 - 117
    Cited by:  Papers (2)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB)

    We are building an operating system in which an integral run time code generator constantly strives to improve the quality of already executing code. Our system is based on a platform independent software distribution format twice as dense as Java byte codes that is translated into native code only at the time of loading. This initial translation happens in a single burst and puts compilation spee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What synchronous groupware needs: notification services

    Publication Year: 1997, Page(s):118 - 122
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    Synchronous groupware is the class of applications in which two or more people collaborate in what they perceive to be real time. Most previous efforts to deploy synchronous groupware have failed. The author argues that: synchronous groupware can often be deployed independently of system support for audio, video, or persistent storage; deployment and maintenance of different synchronous groupware ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-monitoring and self-adapting operating systems

    Publication Year: 1997, Page(s):124 - 129
    Cited by:  Papers (19)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    Extensible operating systems allow applications to modify kernel behavior by providing mechanisms for application code to run in the kernel address space. Extensibility enables a system to efficiently support a broader class of applications than is currently supported. This paper discusses the key challenge in making extensible systems practical: determining which parts of the system need to be ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fresh look at memory hierarchy management

    Publication Year: 1997, Page(s):130 - 134
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    The memory systems of modern computers are much more complicated than the ones for which the operating system memory management algorithms in current widespread use were developed. Additionally, the way in which computer systems are used has changed substantially. This paper argues that these changes are sufficient to require reevaluating some of the fundamental assumptions made in operating syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The role of trace modulation in building mobile computing systems

    Publication Year: 1997, Page(s):135 - 139
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    We put forth the view that trace modulation is an indispensable technique for building and evaluating mobile computing systems. The essence of our solution is transparent, real-time, trace-driven emulation of a target network. Although conceptually simple, trace modulation strikes an attractive balance between the conflicting demands of realism, ease-of-use, and reproducibility. It provides three ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.