By Topic

Hot Topics in Operating Systems, 2001. Proceedings of the Eighth Workshop on

Date 20-22 May 2001

Filter Results

Displaying Results 1 - 25 of 56
  • Proceedings Eighth Workshop on Hot Topics in Operating Systems

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (257 KB)
    Freely Available from IEEE
  • Notes from the HotOS-VIII workshop hot topics in operating systems: 21-23 May 2001, Schloss Elmau, Germany

    Publication Year: 2001, Page(s):xv - xxx
    Request permission for commercial reuse | PDF file iconPDF (1726 KB) | HTML iconHTML
    Freely Available from IEEE
  • Author index

    Publication Year: 2001, Page(s):191 - 192
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Bossa: a DSL framework for application-specific scheduling policies

    Publication Year: 2001
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    We present a framework for easing the development of adaptable process scheduling infrastructures. This framework permits the development and installation of basic scheduling policies, which can be specialized using application-specific policies. We base our approach on a Domain-Specific Language (DSL) named Bossa. A DSL is a high-level language that provides appropriate abstractions, which captur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting coordinated adaptation in networked systems

    Publication Year: 2001
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    Summary form only given. Our position is that the true potential of adaptation can only be realized if support is provided for more general solutions, including adaptations that span multiple hosts and multiple system components, and algorithmic adaptations that involve changing the underlying algorithms used by the system at runtime. Such a general solution must, however, address the difficult is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probabilistic modelling of replica divergence

    Publication Year: 2001, Page(s):55 - 60
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (643 KB) | HTML iconHTML

    It is common in distributed systems to replicate data. In many cases this data evolves in a consistent fashion, and this evolution can be modelled. A probabilistic model of the evolution allows us to estimate the divergence of the replicas and can be used by the application to alter its behaviour, for example to control synchronisation times, to determine the propagation of writes, and to convey t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Active Streams - an approach to adaptive distributed systems

    Publication Year: 2001
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    Summary form only given. An increasing number of distributed applications aim to provide services to users by interacting with a correspondingly growing set of data-intensive network services. To support such requirements, we believe that new services need to be customizable, applications need to be dynamically extensible, and both applications and services need to be able to adapt to variations i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Don't trust your file server

    Publication Year: 2001, Page(s):113 - 118
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (645 KB) | HTML iconHTML

    All too often, decisions about whom to trust in computer systems are driven by the needs of system management rather than data security. In particular data storage is often entrusted to people who have no role in creating or using the data-through outsourcing of data management, hiring of outside consultants to administer servers, or even collocation servers in physically insecure machine rooms to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-tuned remote execution for pervasive computing

    Publication Year: 2001, Page(s):61 - 66
    Cited by:  Papers (26)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (685 KB) | HTML iconHTML

    Pervasive computing creates environments saturated with computing and communication capability, yet gracefully integrated with human users. Remote execution has a natural role to play, in such environments, since it lets applications simultaneously leverage the mobility of small devices and the greater resources of large devices. In this paper, we describe Spectra, a remote execution system design... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Position summary: toward a rigorous data type model for HTTP

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    The HTTP protocol depends on a structure of several data types, such as messages and resources. The current ad hoc data type model has served to support a huge variety of HTTP-based applications, but its weaknesses have been exposed in attempts to formalize and (especially) to extend the protocol. These weaknesses particularly affect the semantics of caching within the HTTP distributed system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Position summary: applying the VVM kernel to flexible Web caches

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    The VVM (virtual virtual machine) is a systematic approach to adaptability and reconfigurability for portable, object-oriented applications based on byte-coded languages such as Java and Smalltalk. The main objectives of the VVM are (i) to allow adaptation of language and system according to a particular application domain; (ii) to provide extensibility by allowing a live execution environment to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Position summary: the Lana approach to wireless computing

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    The goal of the Lana project is to develop system support for short-distance wireless applications. We chose a language-based approach: mechanisms like scoping and typing are used to enforce system properties. The Lana language is strongly influenced by Java-it contains interfaces, packages, single inheritance etc.-though is designed with support for disconnected operation, coordination and securi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transport layer support for highly-available network services

    Publication Year: 2001
    Cited by:  Papers (8)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    We advocate a transport layer protocol for highly available network services by means of transparent migration of the server endpoint of a live connection between cooperating servers that provide the same service. We propose a transport protocol that: (i) offers a better alternative than the simple retransmission to the same server, which may be suffering from overload or a DoS attack, may be down... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Position summary: hinting for goodness' sake

    Publication Year: 2001
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    Modern operating systems and adaptive applications offer an overwhelming number of parameters affecting application latency, throughput, image resolution, audio quality, and so on. We are designing a system to automatically tune resource allocation and application parameters at runtime, with the aim of maximizing user happiness or goodness. Consider a 3D graphics application that operates at varia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robustness in complex systems

    Publication Year: 2001, Page(s):21 - 26
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (611 KB) | HTML iconHTML

    The paper argues that a common design paradigm for systems is fundamentally flawed, resulting in unstable, unpredictable behavior as the complexity of the system grows. In this flawed paradigm, designers carefully attempt to predict the operating environment and failure modes of the system in order to design its basic operational mechanisms. However, as a system grows in complexity, the diffuse co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Position summary. DiPS: a unifying approach for developing system software

    Publication Year: 2001
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    In this position paper we unify three essential features for flexible system software: a component oriented approach, self-adaptation and separation of concerns. We propose DiPS (Distrinet Protocol Stack), a component framework, which offers components, an anonymous interaction model and connectors to handle non-functional aspects such as concurrency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy is just another resource: energy accounting and energy pricing in the Nemesis OS

    Publication Year: 2001, Page(s):67 - 72
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (694 KB) | HTML iconHTML

    In this paper, we argue that, with an appropriate operating system structure, energy in mobile computers can be treated and managed as just another resource. In particular, we investigate how energy management could be added to the Nemesis OS which provides detailed and accurate resource accounting capabilities in order to provide Quality of Service (QoS) guarantees for all resources to applicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Position summary: a streaming interface for real-time interprocess communication

    Publication Year: 2001
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    Timely transfer of long, continuous data streams and handling data omission are stringent requirements of multimedia applications. To cope with these requirements, we extend well known mechanisms for inter-address-space data transmission, such as zero-copy and fast IPC, by the notion of time. Therefore, we add a time track to data streams and add mechanisms to limit the validity of data. For cases... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reconsidering Internet mobility

    Publication Year: 2001, Page(s):41 - 46
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (674 KB) | HTML iconHTML

    Despite the popularity of mobile computing platforms, appropriate system support for mobile operation is lacking in the Internet. The paper argues that this is not for lack of deployment incentives, but because a comprehensive system architecture that efficiently addresses the needs of mobile applications does not exist. We identify five fundamental issues raised by mobility: location, preservatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Beyond address spaces-flexibility, performance, protection, and resource management in the type-safe JX operating system

    Publication Year: 2001, Page(s):3 - 8
    Cited by:  Papers (2)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (633 KB) | HTML iconHTML

    Early type-safe operating systems were hampered by poor performance. Contrary to these experiences we show that an operating system that is founded on an object-oriented, type-safe intermediate code can compete with MMU-based microkernels concerning performance while widening the realm of possibilities. Moving from hardware-based protection to software-based protection offers new options for opera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fail-stutter fault tolerance

    Publication Year: 2001, Page(s):33 - 38
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (754 KB) | HTML iconHTML

    Traditional fault models present system designers with two extremes: the Byzantine fault model, which is general and therefore difficult to apply, and the fail-stop fault model, which is easier to employ but does not accurately capture modern device behavior To address this gap, we introduce the concept of fail-stutter fault tolerance, a realistic and yet tractable fault model that accounts for bo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Position summary: supporting disconnected operation in DOORS

    Publication Year: 2001
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    The increasing popularity of portable computers opens the possibility of collaboration among multiple distributed and disconnected users. In such environments, collaboration is often achieved through the concurrent modification of shared data. DOORS is a distributed object store to support asynchronous collaboration in distributed systems that may contain disconnected computers. In this summary we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart Messages: a system architecture for large networks of embedded systems

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    We propose a system architecture and a computing model, based on Smart Messages (SMs), for computation and communication in large networks of embedded systems. In this model, communication is realized by sending SMs in the network. These messages are comprised of code, which is executed at each hop in the path of the message, and data which the message carries in the network. The execution at each... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mansion, a distributed multi-agent system

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    In this paper we present work in progress on a worldwide, scalable multi-agent system, based on a paradigm of hyperlinked rooms. The framework offers facilities for managing distribution, security and mobility aspects for both active elements (agents) and passive elements (objects) in the system. Our framework offers separation of logical concepts from physical representation, distribution support... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Middleware for mobile computing: awareness vs. transparency

    Publication Year: 2001
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    Summary form only given. Middleware solutions for wired distributed systems cannot be used in a mobile setting, as mobile applications impose new requirements that run counter to the principle of transparency on which current middleware systems have been built. We propose the use of reflection capabilities and meta-data to pave the way for a new generation of middleware platforms designed to suppo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.