By Topic

Hot Topics in Operating Systems, 1999. Proceedings of the Seventh Workshop on

Date 30-30 March 1999

Filter Results

Displaying Results 1 - 25 of 33
  • Proceedings of the Seventh Workshop on Hot Topics in Operating Systems

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • Index of authors

    Publication Year: 1999, Page(s): 197
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE
  • The case for higher-level power management

    Publication Year: 1999, Page(s):162 - 167
    Cited by:  Papers (46)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    Reducing the energy consumed in the use of computing devices is becoming a major design challenge. While the problem obviously must be addressed with improved low level technology, we claim there is potential value in a higher level perspective, as well. In our approach, the needs of applications serve as the driving force for the development of power management functions in the operating system a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Harvest, yield, and scalable tolerant systems

    Publication Year: 1999, Page(s):174 - 178
    Cited by:  Papers (13)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    The cost of reconciling consistency and state management with high availability is highly magnified by the unprecedented scale and robustness requirements of today's Internet applications. We propose two strategies for improving overall availability using simple mechanisms that scale over large applications whose output behavior tolerates graceful degradation. We characterize this degradation in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical security systems with smartcards

    Publication Year: 1999, Page(s):185 - 190
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    Secure hardware is a useful tool for enhancing computer system security. Traditionally, researchers have attempted to build secure operating systems by creating secure hardware and developing on top of it. Our approach is to integrate commodity secure hardware, i.e., smartcards, into existing operating systems. The paper describes three projects aimed at practical secure operating systems based on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Elephant: the file system that never forgets

    Publication Year: 1999, Page(s):2 - 7
    Cited by:  Papers (9)  |  Patents (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    Modern file systems associate the deletion of a file with the release of the storage associated with that file, and file writes with the irrevocable change of file contents. We propose that this model of file system behavior is a relic of the past, when disk storage was a scarce resource. We believe that the correct model should ensure that all user actions are revocable. Deleting a file should ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The box: a replacement for files

    Publication Year: 1999, Page(s):24 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    The file is a well-understood and very simple abstraction, which has been successfully used in both centralized and distributed systems. However files are not expressive enough to capture high-level data semantics and relationships, including sharing and data dependencies. How many times has your operating system translated a JPEG figure into postscript, automatically when needed? How do files hel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Xenoservers: accountable execution of untrusted programs

    Publication Year: 1999, Page(s):136 - 141
    Cited by:  Papers (22)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    Many networked applications could benefit from executing closer to the data or services with which they interact. By doing this they may be able to circumvent long communication latencies or avoid transferring data over congested or expensive network links. However no public infrastructure currently exists that enables this. We propose a system that can execute code supplied by an untrusted user y... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Command management system for next-generation user input

    Publication Year: 1999, Page(s):179 - 184
    Cited by:  Patents (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    Next generation user input and sensor technologies (such as speech, handwriting, vision, and physical location) present new possibilities for adaptable easy-to-use commands. These input modalities also present problems of noise and ambiguity, for which current “ad hoc” command processing services (e.g., undo) are often inconsistent and insufficient. Applications should work with sensor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability hierarchies

    Publication Year: 1999, Page(s):168 - 173
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    Hierarchies of diverse storage levels have been analyzed extensively for their ability to achieve both good performance and low cost. The article argues that we should view hierarchies also as a way to achieve both good reliability and low overhead. After discussing the design of a reliability hierarchy, we suggest two metrics to use in evaluating the overall reliability of a reliability hierarchy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The case for informed transport protocols

    Publication Year: 1999, Page(s):58 - 63
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    Wide-area distributed applications are frequently limited by the performance of Internet data transfers. We argue that the principle cause of this effect is the poor interaction between host-centric congestion control algorithms and the realities of today's Internet traffic and infrastructure. In particular when the duration of a network flow is short, then using end-to-end feedback to determine n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intra-address space protection using segmentation hardware

    Publication Year: 1999, Page(s):110 - 115
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    The technological evolution towards extensible software systems and component-based software development requires efficient, flexible and easy-to-use protection mechanisms to isolate software modules residing in the same address space. While a number of software-based approaches have been proposed in the last several years, no clear winner emerges that satisfactorily addresses all the design issue... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The case for better throughput estimation

    Publication Year: 1999, Page(s):70 - 75
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    A Web proxy must accurately predict network performance between itself and its servers and clients in order to make good distillation decisions. In this paper we show that the current approaches to make such predictions-either assuming the proxy is well-connected to all servers or using past observations-are insufficient. We propose a new prediction method, estimation with uncertainty, that will p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A case for buffer servers

    Publication Year: 1999, Page(s):82 - 87
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    Faster networks and cheaper storage have brought us to a point where I/O caching servers have an important role in the design of scalable, high-performance file systems. These intermediary I/O servers-or buffer servers-can be deployed at strategic points in the network, interposed between clients and data sources such as standard file servers, Internet data servers and tertiary storage. Their purp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible access control using IPC redirection

    Publication Year: 1999, Page(s):191 - 196
    Cited by:  Papers (1)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    We present a mechanism for inter-process communication (IPC) redirection that enables efficient and flexible access control for micro-kernel systems. In such systems, services are implemented at user level, so IPC is the only means of communication between them. Thus, the system must be able to mediate IPCs to enforce its access control policy. Such mediation must enable enforcement of security po... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tickets and currencies revisited: extensions to multi-resource lottery scheduling

    Publication Year: 1999, Page(s):148 - 152
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    Lottery scheduling's ticket and currency abstractions provide a resource management framework that allows for both flexible allocation and insulation between groups of processes. We propose extensions to this framework that enable greater flexibility while preserving the ability to isolate groups of processes. In particular we present a mechanism that allows processes to modify their own resource ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An economic approach to adaptive resource management

    Publication Year: 1999, Page(s):142 - 147
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    Resource management is a fundamental concept in operating system design. In recent years it has become fashionable to consider the problem as an aspect of heterogeneous support for quality of service (`QoS'). The desire for QoS support leads to the dual management goals of global (system) and local (application) optimisation. We propose an architecture based on an economic model of resource manage... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to schedule unlimited memory pinning of untrusted processes or provisional ideas about service-neutrality

    Publication Year: 1999, Page(s):153 - 159
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    You can read it as a paper that treats a concrete problem motivated in the first section: how can we permit untrusted user processes to pin their virtual pages in memory most flexibly and as unlimited as possible? From this point of view, the paper presents a general solution that is theoretically and experimentally reasonably substantiated. However, you can also read the paper as an approach to s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Brittle metrics in operating systems research

    Publication Year: 1999, Page(s):90 - 95
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    Most operating systems research publications make claims about performance. We expect these performance claims to be both repeatable and relevant to important applications. We also expect them to be comparable to similar claims made in other papers. This implies the need for realistic and widely-used benchmarks. Often, however, no such benchmark exists. The problem is especially acute in applicati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conductor: a framework for distributed adaptation

    Publication Year: 1999, Page(s):44 - 49
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    Most network applications provide poor service when the network's capabilities are below a minimum level assumed by the developer. As a wider array of network technologies become available, users will be increasingly frustrated with a lack of flexibility in such applications. The services provided by an application should be tunable to a level appropriate for the capabilities and associated costs ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Caching documents with active properties

    Publication Year: 1999, Page(s):8 - 13
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    Caching in the Placeless Documents system poses new challenges because users can attach active properties to documents. Active properties can modify the document's content as seen by a user. Thus, the caching mechanisms must take into account that a document's content not only depends on when the document was last modified, but also on the set of personal and universal properties attached to the d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The case for application-specific benchmarking

    Publication Year: 1999, Page(s):102 - 107
    Cited by:  Papers (17)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    Most performance analysis today uses either microbenchmarks or standard macrobenchmarks (e.g. SPEC, LADDIS, the Andrew benchmark). However, the results of such benchmarks provide little information to indicate how well a particular system will handle a particular application. Such results are, at best, useless and, at worst, misleading. In this paper we argue for an application-directed approach t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An end-system architecture for unified congestion management

    Publication Year: 1999, Page(s):52 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    In this position paper we motivate and describe the Congestion Manager (CM), a novel end-system architecture, which enables application adaptation to network congestion. The CM maintains congestion and path related information and allows flows to learn from each other and share information. It also exports an API to enable applications to learn about network status and regulate data transmission. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Drawing the red line in Java

    Publication Year: 1999, Page(s):116 - 121
    Cited by:  Papers (10)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    Software-based protection has become a viable alternative to hardware-based protection in systems based on languages such as Java, but the absence of hardware mechanisms for protection has been coupled with an absence of a user/kernel boundary. We show why such a “red line” must be present in order for a Java virtual machine to be as effective and as reliable as an operating system. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transparent communication management in wireless networks

    Publication Year: 1999, Page(s):64 - 69
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    Wireless networks are characterized by the generally low quality of service (QoS) that they provide. In the face of user mobility between heterogeneous networks, distributed applications designed for the higher and less variable QoS of wired networks have difficulty operating. Proxy systems provide one solution to this problem. By placing an intermediary on the communication path between wired and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.