Proceedings Eighth Workshop on Hot Topics in Operating Systems

20-22 May 2001

Filter Results

Displaying Results 1 - 25 of 56
  • Proceedings Eighth Workshop on Hot Topics in Operating Systems

    Publication Year: 2001
    Request permission for commercial reuse | |PDF file iconPDF (257 KB)
    Freely Available from IEEE
  • Notes from the HotOS-VIII workshop hot topics in operating systems: 21-23 May 2001, Schloss Elmau, Germany

    Publication Year: 2001, Page(s):xv - xxx
    Request permission for commercial reuse | |PDF file iconPDF (1726 KB) | HTML iconHTML
    Freely Available from IEEE
  • Supporting coordinated adaptation in networked systems

    Publication Year: 2001
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (111 KB) | HTML iconHTML

    Summary form only given. Our position is that the true potential of adaptation can only be realized if support is provided for more general solutions, including adaptations that span multiple hosts and multiple system components, and algorithmic adaptations that involve changing the underlying algorithms used by the system at runtime. Such a general solution must, however, address the difficult is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Active Streams - an approach to adaptive distributed systems

    Publication Year: 2001
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (106 KB) | HTML iconHTML

    Summary form only given. An increasing number of distributed applications aim to provide services to users by interacting with a correspondingly growing set of data-intensive network services. To support such requirements, we believe that new services need to be customizable, applications need to be dynamically extensible, and both applications and services need to be able to adapt to variations i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Middleware for mobile computing: awareness vs. transparency

    Publication Year: 2001
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (93 KB) | HTML iconHTML

    Summary form only given. Middleware solutions for wired distributed systems cannot be used in a mobile setting, as mobile applications impose new requirements that run counter to the principle of transparency on which current middleware systems have been built. We propose the use of reflection capabilities and meta-data to pave the way for a new generation of middleware platforms designed to suppo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting hot-swappable components for system software

    Publication Year: 2001
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (98 KB) | HTML iconHTML

    Summary form only given. A hot-swappable component is one that can be replaced with a new or different implementation while the system is running and actively using the component. For example, a component of a TCP/IP protocol stack, when hot-swappable, can be replaced (perhaps to handle new denial-of-service attacks or improve performance), without disturbing existing network connections. The capa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Censorship resistant publishing through document entanglements

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (108 KB) | HTML iconHTML

    Summary form only given. Today, most documents available over the the Internet are easy to censor. Each document can usually be traced back to a specific host or even the individual responsible for publishing the document. Someone wishing to censor a document can use the courts, threats, or some other means to force the host administrator or author to delete a particular file. Clearly, a censorshi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Conquest file system - life after disks

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (112 KB) | HTML iconHTML

    Summary form only given. The Conquest file system is designed to provide a transition from disk- to persistent-RAM-based storage. Initially, we assume 2 to 4 Gbytes of persistent RAM and the popular single-user desktop environment. Unlike other memory file systems, Conquest can incrementally assume more responsibility for in-core storage as memory prices decline. The Conquest approach realizes mos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The importance of good plumbing: reconsidering infrastructure in distributed systems

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (115 KB) | HTML iconHTML

    Summary form only given. Our work to date has been in the design and development of a stream-centric model for communications which we have called the flow. A flow is a uniquely named, message-based, multicast communications stream. Flows are named by FlowIDs which represent a collection of resources used to provide a communications stream in the same manner that process IDs represent resources as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • eOS - the dawn of the resource economy

    Publication Year: 2001
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (120 KB) | HTML iconHTML

    Summary form only given. We believe that achieving the benefits of a resource economy, which supports the execution of services wherever and whenever is most convenient, cost-effective, and trustworthy, represents the next big computer systems research opportunity. That is, the emphasis in the operating research community should move away from extracting a few more percentage points of speed from ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anypoint Communication Protocol

    Publication Year: 2001
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (102 KB) | HTML iconHTML

    Summary form only given. We are developing the Anypoint Communication Protocol (ACP). ACP clients establish connections to abstract services, represented at the network edge by Anypoint intermediaries. The intermediary is an intelligent network switch that acts as an extension of the service; it encapsulates a service-specific policy for distributing requests among servers in the active set for ea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2001, Page(s):191 - 192
    Request permission for commercial reuse | |PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • When virtual is better than real [operating system relocation to virtual machines]

    Publication Year: 2001, Page(s):133 - 138
    Cited by:  Papers (104)  |  Patents (18)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (598 KB) | HTML iconHTML

    This paper argues that the operating system and applications currently running on a real machine should relocate into a virtual machine. This structure enables services to be added below the operating system and to do so without trusting or modifying the operating system or applications. To demonstrate the usefulness of this structure, we describe three services that take advantage of it: secure l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recursive restartability: turning the reboot sledgehammer into a scalpel

    Publication Year: 2001, Page(s):125 - 130
    Cited by:  Papers (44)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (727 KB) | HTML iconHTML

    Even after decades of software engineering research, complex computer systems still fail, primarily due to nondeterministic bugs that are typically resolved by rebooting. Conceding that Heisenbugs will remain a fact of life, we propose a systematic investigation of restarts as "high availability medicine." In this paper we show how recursive restartability (RR) - the ability of a system to gracefu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bossa: a DSL framework for application-specific scheduling policies

    Publication Year: 2001
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (212 KB) | HTML iconHTML

    We present a framework for easing the development of adaptable process scheduling infrastructures. This framework permits the development and installation of basic scheduling policies, which can be specialized using application-specific policies. We base our approach on a Domain-Specific Language (DSL) named Bossa. A DSL is a high-level language that provides appropriate abstractions, which captur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Active protocols for agile censor-resistant networks

    Publication Year: 2001, Page(s):119 - 124
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (696 KB) | HTML iconHTML

    The authors argue that content distribution in the face of censorship is a compelling and feasible application of active networking. In the face of a determined and powerful adversary, every fixed protocol can become known and subsequently monitored, blocked, or its member nodes identified and attacked. Frequent and diverse protocol change is key to allowing information to continue to flow. Typica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The case for resilient overlay networks

    Publication Year: 2001, Page(s):152 - 157
    Cited by:  Papers (97)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (668 KB) | HTML iconHTML

    This paper makes the case for Resilient Overlay Networks (RONs), an application-level routing and packet forwarding service that gives end-hosts and applications the ability to take advantage of network paths that traditional Internet routing cannot make use of, thereby improving their end-to-end reliability and performance. Using RON, nodes participating in a distributed Internet application conf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reconsidering Internet mobility

    Publication Year: 2001, Page(s):41 - 46
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (674 KB) | HTML iconHTML

    Despite the popularity of mobile computing platforms, appropriate system support for mobile operation is lacking in the Internet. The paper argues that this is not for lack of deployment incentives, but because a comprehensive system architecture that efficiently addresses the needs of mobile applications does not exist. We identify five fundamental issues raised by mobility: location, preservatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robustness in complex systems

    Publication Year: 2001, Page(s):21 - 26
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (611 KB) | HTML iconHTML

    The paper argues that a common design paradigm for systems is fundamentally flawed, resulting in unstable, unpredictable behavior as the complexity of the system grows. In this flawed paradigm, designers carefully attempt to predict the operating environment and failure modes of the system in order to design its basic operational mechanisms. However, as a system grows in complexity, the diffuse co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Don't trust your file server

    Publication Year: 2001, Page(s):113 - 118
    Cited by:  Papers (16)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (645 KB) | HTML iconHTML

    All too often, decisions about whom to trust in computer systems are driven by the needs of system management rather than data security. In particular data storage is often entrusted to people who have no role in creating or using the data-through outsourcing of data management, hiring of outside consultants to administer servers, or even collocation servers in physically insecure machine rooms to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Beyond address spaces-flexibility, performance, protection, and resource management in the type-safe JX operating system

    Publication Year: 2001, Page(s):3 - 8
    Cited by:  Papers (2)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (633 KB) | HTML iconHTML

    Early type-safe operating systems were hampered by poor performance. Contrary to these experiences we show that an operating system that is founded on an object-oriented, type-safe intermediate code can compete with MMU-based microkernels concerning performance while widening the realm of possibilities. Moving from hardware-based protection to software-based protection offers new options for opera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy management for server clusters

    Publication Year: 2001
    Cited by:  Papers (42)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (218 KB) | HTML iconHTML

    The central point of this paper is that energy should be viewed as an important element of resource management for Web sites, hosting centers, and other Internet server clusters. In particular, we are developing a system to manage server resources so that cluster power demand scales with request throughput. This can yield significant energy savings because server clusters are sized for peak load, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systems directions for pervasive computing

    Publication Year: 2001, Page(s):147 - 151
    Cited by:  Papers (20)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (556 KB) | HTML iconHTML

    Pervasive computing, with its focus on users and their tasks rather than on computing devices and technology, provides an attractive vision for the future of computing. But, while hardware and networking infrastructure to realize this vision are becoming a reality, precious few applications run in this infrastructure. We believe that this lack of applications stems largely from the fact that it is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probabilistic modelling of replica divergence

    Publication Year: 2001, Page(s):55 - 60
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (643 KB) | HTML iconHTML

    It is common in distributed systems to replicate data. In many cases this data evolves in a consistent fashion, and this evolution can be modelled. A probabilistic model of the evolution allows us to estimate the divergence of the replicas and can be used by the application to alter its behaviour, for example to control synchronisation times, to determine the propagation of writes, and to convey t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fail-stutter fault tolerance

    Publication Year: 2001, Page(s):33 - 38
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (754 KB) | HTML iconHTML

    Traditional fault models present system designers with two extremes: the Byzantine fault model, which is general and therefore difficult to apply, and the fail-stop fault model, which is easier to employ but does not accurately capture modern device behavior To address this gap, we introduce the concept of fail-stutter fault tolerance, a realistic and yet tractable fault model that accounts for bo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.