Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

Proceedings of the Seventh Workshop on Hot Topics in Operating Systems

30-30 March 1999

Filter Results

Displaying Results 1 - 25 of 33
  • Proceedings of the Seventh Workshop on Hot Topics in Operating Systems

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • Index of authors

    Publication Year: 1999, Page(s): 197
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE
  • Flexible access control using IPC redirection

    Publication Year: 1999, Page(s):191 - 196
    Cited by:  Papers (2)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    We present a mechanism for inter-process communication (IPC) redirection that enables efficient and flexible access control for micro-kernel systems. In such systems, services are implemented at user level, so IPC is the only means of communication between them. Thus, the system must be able to mediate IPCs to enforce its access control policy. Such mediation must enable enforcement of security po... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical security systems with smartcards

    Publication Year: 1999, Page(s):185 - 190
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    Secure hardware is a useful tool for enhancing computer system security. Traditionally, researchers have attempted to build secure operating systems by creating secure hardware and developing on top of it. Our approach is to integrate commodity secure hardware, i.e., smartcards, into existing operating systems. The paper describes three projects aimed at practical secure operating systems based on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The case for higher-level power management

    Publication Year: 1999, Page(s):162 - 167
    Cited by:  Papers (55)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    Reducing the energy consumed in the use of computing devices is becoming a major design challenge. While the problem obviously must be addressed with improved low level technology, we claim there is potential value in a higher level perspective, as well. In our approach, the needs of applications serve as the driving force for the development of power management functions in the operating system a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Command management system for next-generation user input

    Publication Year: 1999, Page(s):179 - 184
    Cited by:  Patents (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    Next generation user input and sensor technologies (such as speech, handwriting, vision, and physical location) present new possibilities for adaptable easy-to-use commands. These input modalities also present problems of noise and ambiguity, for which current “ad hoc” command processing services (e.g., undo) are often inconsistent and insufficient. Applications should work with sensor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The case for application-specific benchmarking

    Publication Year: 1999, Page(s):102 - 107
    Cited by:  Papers (26)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    Most performance analysis today uses either microbenchmarks or standard macrobenchmarks (e.g. SPEC, LADDIS, the Andrew benchmark). However, the results of such benchmarks provide little information to indicate how well a particular system will handle a particular application. Such results are, at best, useless and, at worst, misleading. In this paper we argue for an application-directed approach t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to schedule unlimited memory pinning of untrusted processes or provisional ideas about service-neutrality

    Publication Year: 1999, Page(s):153 - 159
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    You can read it as a paper that treats a concrete problem motivated in the first section: how can we permit untrusted user processes to pin their virtual pages in memory most flexibly and as unlimited as possible? From this point of view, the paper presents a general solution that is theoretically and experimentally reasonably substantiated. However, you can also read the paper as an approach to s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An end-system architecture for unified congestion management

    Publication Year: 1999, Page(s):52 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    In this position paper we motivate and describe the Congestion Manager (CM), a novel end-system architecture, which enables application adaptation to network congestion. The CM maintains congestion and path related information and allows flows to learn from each other and share information. It also exports an API to enable applications to learn about network status and regulate data transmission. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Harvest, yield, and scalable tolerant systems

    Publication Year: 1999, Page(s):174 - 178
    Cited by:  Papers (22)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    The cost of reconciling consistency and state management with high availability is highly magnified by the unprecedented scale and robustness requirements of today's Internet applications. We propose two strategies for improving overall availability using simple mechanisms that scale over large applications whose output behavior tolerates graceful degradation. We characterize this degradation in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transparent communication management in wireless networks

    Publication Year: 1999, Page(s):64 - 69
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    Wireless networks are characterized by the generally low quality of service (QoS) that they provide. In the face of user mobility between heterogeneous networks, distributed applications designed for the higher and less variable QoS of wired networks have difficulty operating. Proxy systems provide one solution to this problem. By placing an intermediary on the communication path between wired and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The box: a replacement for files

    Publication Year: 1999, Page(s):24 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    The file is a well-understood and very simple abstraction, which has been successfully used in both centralized and distributed systems. However files are not expressive enough to capture high-level data semantics and relationships, including sharing and data dependencies. How many times has your operating system translated a JPEG figure into postscript, automatically when needed? How do files hel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The case for efficient file access pattern modeling

    Publication Year: 1999, Page(s):14 - 19
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    Most modern I/O systems treat each file access independently. However events in a computer system are driven by programs. Thus, accesses to files occur in consistent patterns and are by no means independent. The result is that modern I/O systems ignore useful information. Using traces of file system activity we show that file accesses are strongly correlated with preceding accesses. In fact, a sim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The problems you're having may not be the problems you think you're having: results from a latency study of Windows NT

    Publication Year: 1999, Page(s):96 - 101
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    This paper is intended to catalyze discussions on two intertwined systems topics. First, it presents early results from a latency study of Windows NT that identifies some specific causes of long-thread scheduling latencies, many of which delay the dispatching of runnable threads for tens of milliseconds. Reasons for these delays, including technical, methodological and economic reasons, are presen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tickets and currencies revisited: extensions to multi-resource lottery scheduling

    Publication Year: 1999, Page(s):148 - 152
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    Lottery scheduling's ticket and currency abstractions provide a resource management framework that allows for both flexible allocation and insulation between groups of processes. We propose extensions to this framework that enable greater flexibility while preserving the ability to isolate groups of processes. In particular we present a mechanism that allows processes to modify their own resource ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Elephant: the file system that never forgets

    Publication Year: 1999, Page(s):2 - 7
    Cited by:  Papers (13)  |  Patents (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    Modern file systems associate the deletion of a file with the release of the storage associated with that file, and file writes with the irrevocable change of file contents. We propose that this model of file system behavior is a relic of the past, when disk storage was a scarce resource. We believe that the correct model should ensure that all user actions are revocable. Deleting a file should ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A case for buffer servers

    Publication Year: 1999, Page(s):82 - 87
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    Faster networks and cheaper storage have brought us to a point where I/O caching servers have an important role in the design of scalable, high-performance file systems. These intermediary I/O servers-or buffer servers-can be deployed at strategic points in the network, interposed between clients and data sources such as standard file servers, Internet data servers and tertiary storage. Their purp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conductor: a framework for distributed adaptation

    Publication Year: 1999, Page(s):44 - 49
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    Most network applications provide poor service when the network's capabilities are below a minimum level assumed by the developer. As a wider array of network technologies become available, users will be increasingly frustrated with a lack of flexibility in such applications. The services provided by an application should be tunable to a level appropriate for the capabilities and associated costs ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Xenoservers: accountable execution of untrusted programs

    Publication Year: 1999, Page(s):136 - 141
    Cited by:  Papers (27)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    Many networked applications could benefit from executing closer to the data or services with which they interact. By doing this they may be able to circumvent long communication latencies or avoid transferring data over congested or expensive network links. However no public infrastructure currently exists that enables this. We propose a system that can execute code supplied by an untrusted user y... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability hierarchies

    Publication Year: 1999, Page(s):168 - 173
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    Hierarchies of diverse storage levels have been analyzed extensively for their ability to achieve both good performance and low cost. The article argues that we should view hierarchies also as a way to achieve both good reliability and low overhead. After discussing the design of a reliability hierarchy, we suggest two metrics to use in evaluating the overall reliability of a reliability hierarchy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intra-address space protection using segmentation hardware

    Publication Year: 1999, Page(s):110 - 115
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    The technological evolution towards extensible software systems and component-based software development requires efficient, flexible and easy-to-use protection mechanisms to isolate software modules residing in the same address space. While a number of software-based approaches have been proposed in the last several years, no clear winner emerges that satisfactorily addresses all the design issue... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The case for informed transport protocols

    Publication Year: 1999, Page(s):58 - 63
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    Wide-area distributed applications are frequently limited by the performance of Internet data transfers. We argue that the principle cause of this effect is the poor interaction between host-centric congestion control algorithms and the realities of today's Internet traffic and infrastructure. In particular when the duration of a network flow is short, then using end-to-end feedback to determine n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The case for better throughput estimation

    Publication Year: 1999, Page(s):70 - 75
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    A Web proxy must accurately predict network performance between itself and its servers and clients in order to make good distillation decisions. In this paper we show that the current approaches to make such predictions-either assuming the proxy is well-connected to all servers or using past observations-are insufficient. We propose a new prediction method, estimation with uncertainty, that will p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ISTORE: introspective storage for data-intensive network services

    Publication Year: 1999, Page(s):32 - 37
    Cited by:  Papers (13)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    Today's fast-growing data-intensive network services place heavy demands on the back-end servers that support them. This paper introduces ISTORE, a novel server architecture that couples LEGO-like plug-and-play hardware with a generic framework for constructing adaptive software that leverages continuous self-monitoring. ISTORE exploits introspection to provide high availability, performance, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • File systems for CE equipment

    Publication Year: 1999, Page(s):20 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    We discuss how system technology can be used in consumer electronics storage devices to enhance the usability of these products. We claim that the best way to achieve compatibility between consumer electronics devices and the PC platform is to use PC-style file systems in consumer electronics devices, instead of designing proprietary solutions for audio/video storage. However, to achieve this PC-s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.