By Topic

Proceedings Eighth Workshop on Hot Topics in Operating Systems

20-22 May 2001

Filter Results

Displaying Results 1 - 25 of 56
  • Proceedings Eighth Workshop on Hot Topics in Operating Systems

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (257 KB)
    Freely Available from IEEE
  • Notes from the HotOS-VIII workshop hot topics in operating systems: 21-23 May 2001, Schloss Elmau, Germany

    Publication Year: 2001, Page(s):xv - xxx
    Request permission for commercial reuse | PDF file iconPDF (1726 KB) | HTML iconHTML
    Freely Available from IEEE
  • Supporting coordinated adaptation in networked systems

    Publication Year: 2001
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (111 KB) | HTML iconHTML

    Summary form only given. Our position is that the true potential of adaptation can only be realized if support is provided for more general solutions, including adaptations that span multiple hosts and multiple system components, and algorithmic adaptations that involve changing the underlying algorithms used by the system at runtime. Such a general solution must, however, address the difficult is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Active Streams - an approach to adaptive distributed systems

    Publication Year: 2001
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (106 KB) | HTML iconHTML

    Summary form only given. An increasing number of distributed applications aim to provide services to users by interacting with a correspondingly growing set of data-intensive network services. To support such requirements, we believe that new services need to be customizable, applications need to be dynamically extensible, and both applications and services need to be able to adapt to variations i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Middleware for mobile computing: awareness vs. transparency

    Publication Year: 2001
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (93 KB) | HTML iconHTML

    Summary form only given. Middleware solutions for wired distributed systems cannot be used in a mobile setting, as mobile applications impose new requirements that run counter to the principle of transparency on which current middleware systems have been built. We propose the use of reflection capabilities and meta-data to pave the way for a new generation of middleware platforms designed to suppo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting hot-swappable components for system software

    Publication Year: 2001
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (98 KB) | HTML iconHTML

    Summary form only given. A hot-swappable component is one that can be replaced with a new or different implementation while the system is running and actively using the component. For example, a component of a TCP/IP protocol stack, when hot-swappable, can be replaced (perhaps to handle new denial-of-service attacks or improve performance), without disturbing existing network connections. The capa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Censorship resistant publishing through document entanglements

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB) | HTML iconHTML

    Summary form only given. Today, most documents available over the the Internet are easy to censor. Each document can usually be traced back to a specific host or even the individual responsible for publishing the document. Someone wishing to censor a document can use the courts, threats, or some other means to force the host administrator or author to delete a particular file. Clearly, a censorshi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Conquest file system - life after disks

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    Summary form only given. The Conquest file system is designed to provide a transition from disk- to persistent-RAM-based storage. Initially, we assume 2 to 4 Gbytes of persistent RAM and the popular single-user desktop environment. Unlike other memory file systems, Conquest can incrementally assume more responsibility for in-core storage as memory prices decline. The Conquest approach realizes mos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The importance of good plumbing: reconsidering infrastructure in distributed systems

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (115 KB) | HTML iconHTML

    Summary form only given. Our work to date has been in the design and development of a stream-centric model for communications which we have called the flow. A flow is a uniquely named, message-based, multicast communications stream. Flows are named by FlowIDs which represent a collection of resources used to provide a communications stream in the same manner that process IDs represent resources as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • eOS - the dawn of the resource economy

    Publication Year: 2001
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    Summary form only given. We believe that achieving the benefits of a resource economy, which supports the execution of services wherever and whenever is most convenient, cost-effective, and trustworthy, represents the next big computer systems research opportunity. That is, the emphasis in the operating research community should move away from extracting a few more percentage points of speed from ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anypoint Communication Protocol

    Publication Year: 2001
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (102 KB) | HTML iconHTML

    Summary form only given. We are developing the Anypoint Communication Protocol (ACP). ACP clients establish connections to abstract services, represented at the network edge by Anypoint intermediaries. The intermediary is an intelligent network switch that acts as an extension of the service; it encapsulates a service-specific policy for distributing requests among servers in the active set for ea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2001, Page(s):191 - 192
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Using abstraction to improve fault tolerance

    Publication Year: 2001, Page(s):27 - 32
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (693 KB) | HTML iconHTML

    Software errors are a major cause of outages and they are increasingly exploited in malicious attacks. Byzantine fault tolerance allows replicated systems to mask some software errors but it is expensive to deploy. The paper describes a replication technique, BFTA, which uses abstraction to reduce the cost of Byzantine fault tolerance and to improve its ability to mask software errors. BFTA reduce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robustness in complex systems

    Publication Year: 2001, Page(s):21 - 26
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (611 KB) | HTML iconHTML

    The paper argues that a common design paradigm for systems is fundamentally flawed, resulting in unstable, unpredictable behavior as the complexity of the system grows. In this flawed paradigm, designers carefully attempt to predict the operating environment and failure modes of the system in order to design its basic operational mechanisms. However, as a system grows in complexity, the diffuse co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-tuned remote execution for pervasive computing

    Publication Year: 2001, Page(s):61 - 66
    Cited by:  Papers (37)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (685 KB) | HTML iconHTML

    Pervasive computing creates environments saturated with computing and communication capability, yet gracefully integrated with human users. Remote execution has a natural role to play, in such environments, since it lets applications simultaneously leverage the mobility of small devices and the greater resources of large devices. In this paper, we describe Spectra, a remote execution system design... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lazy process switching

    Publication Year: 2001, Page(s):15 - 18
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    Lazy switching enables very fast blocking intra-task IPC between kernel-implemented threads. This type of IPC can typically be entirely executed in user mode, although it operates on kernel objects. We hope that lazy switching adds the advantages of user level threads to kernel-level threads. The work on lazy switching is ongoing research in its early stage. Whether all its promising properties ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probabilistic modelling of replica divergence

    Publication Year: 2001, Page(s):55 - 60
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (643 KB) | HTML iconHTML

    It is common in distributed systems to replicate data. In many cases this data evolves in a consistent fashion, and this evolution can be modelled. A probabilistic model of the evolution allows us to estimate the divergence of the replicas and can be used by the application to alter its behaviour, for example to control synchronisation times, to determine the propagation of writes, and to convey t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Position summary: separating mobility from mobile agents

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    The reasons for using mobile agents are well-known: moving computation to data to avoid transferring large amounts of data; supporting disconnected operation by, for example, moving a computation to a network that has better connectivity; supporting autonomous distributed computation by, for example, deploying a personalized filter near a real-time data source. Many mobile agent systems have been ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authentication confidences

    Publication Year: 2001
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB) | HTML iconHTML

    "Over the Internet, no one knows you're a dog," goes the joke. Yet, in most systems, a password submitted over the Internet gives one the same access rights as one typed at the physical console. We promote an alternate approach to authentication, in which a system fuses observations about a user into a probability (an authentication confidence) that the user is who they claim to be. Relevant obser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards global storage management and data placement

    Publication Year: 2001
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (231 KB) | HTML iconHTML

    As users and companies increasingly depend on shared, networked information services, we continue to see growth in data centers and service providers. This happens as services and servers are consolidated (for ease of management and reduced duplication), while also being distributed (for fault tolerance and to accommodate the global reach of customers). Since access to data is the lifeblood of any... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design issues in system support for programmable routers

    Publication Year: 2001, Page(s):9 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    Placement of computation inside the network is a powerful computation model that can improve the overall performance of network applications. The authors address the problem of providing sound and efficient system support for placing computation in a network router We identify a set of requirements, related to protection, resource control, scheduling and efficiency, that are relevant to the design... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Position summary: supporting disconnected operation in DOORS

    Publication Year: 2001
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    The increasing popularity of portable computers opens the possibility of collaboration among multiple distributed and disconnected users. In such environments, collaboration is often achieved through the concurrent modification of shared data. DOORS is a distributed object store to support asynchronous collaboration in distributed systems that may contain disconnected computers. In this summary we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protium, an infrastructure for partitioned applications

    Publication Year: 2001, Page(s):47 - 52
    Cited by:  Papers (6)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (765 KB) | HTML iconHTML

    Remote access feels different from local access. The major issues are consistency (machines vary in GUIs, applications, and devices) and responsiveness (the user must wait for network and server delays), Protium attacks these by partitioning programs into local viewers that connect to remote services using application-specific protocols. Partitioning allows viewers to be customized to adapt to loc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Position summary: towards zero-code service composition

    Publication Year: 2001
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    For many years, people have been trying to develop systems from modular, reusable components. The ideal is zero-code composition: building applications out of components without writing any new code. By investigating zero-code composition, our goal is to make composition easy enough to be of practical use to systems researchers and developers. We are focusing on identifying and removing systemic i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure OS extensibility needn't cost an arm and a leg

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    This paper makes the claim that secure extensibility of operating systems is not only desirable but also achievable. We claim that OS extensibility should be done at user-level to avoid the security problems inherent in other approaches. We furthermore claim (backed up by some initial results) that user-level extensibility is possible at a performance that is similar to in-kernel extensions. Final... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.