Proceedings of IEEE 4th Workshop on Workstation Operating Systems. WWOS-III

14-15 Oct. 1993

Filter Results

Displaying Results 1 - 25 of 35
  • Proceedings of IEEE 4th Workshop on Workstation Operating Systems. WWOS-III

    Publication Year: 1993
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • Generic support for caching and disconnected operation

    Publication Year: 1993, Page(s):61 - 65
    Cited by:  Papers (2)  |  Patents (44)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    Current systems use caching to provide high performance and possibly support disconnected operation. However, current solutions are type specific. With the advent of modular distributed operating systems and mobile machines there is a need to provide generic support for implementing cacheable/disconnectable services. We present an architecture that can be used to implement cacheable/disconnectable... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting application-specific resolution in an optimistically replicated file system

    Publication Year: 1993, Page(s):66 - 70
    Cited by:  Papers (17)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    We describe an interface to incorporate application-specific knowledge for conflict resolution in an optimistically replicated file system. Conflicts arise in such systems because replicas of an object can be modified simultaneously in different network partitions. Application-specific knowledge is made available by the application writer in specialized tools called Application-Specific Resolvers ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • xFS: a wide area mass storage file system

    Publication Year: 1993, Page(s):71 - 78
    Cited by:  Papers (15)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (752 KB)

    The current generation of file systems are inadequate in facing the new technological challenges of wide area networks and massive storage. xFS is a prototype file system we are developing to explore the issues brought about by these technological advances. xFS adapts many of the techniques used in the field of high performance multiprocessor design. It organizes hosts into a hierarchical structur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FLEX: a tool for building efficient and flexible systems

    Publication Year: 1993, Page(s):198 - 202
    Cited by:  Papers (3)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    Modern operating systems must support a wide variety of services for a diverse set of users. Designers of these systems face a tradeoff between functionality and performance. Systems like Mach provide a set of general abstractions and attempt to handle every situation, which can lead to poor performance for common cases. Other systems, such as Unix, provide a small set of abstractions that can be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The persistent relevance of IPC performance: new techniques for reducing the IPC penalty

    Publication Year: 1993, Page(s):186 - 190
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    Although there have been substantial improvements in interprocess communication (IPC) performance (in particular round-trip IPC time) in recent years, further reduction of the IPC penalty is still important for parallel applications and microkernel-based operating systems. We describe a number of new software and hardware techniques that we are investigating for reducing various components of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Careful protocols or how to use highly reliable networks

    Publication Year: 1993, Page(s):80 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    The motivation for the work presented in this paper stems from the observation that optical token-ring networks have bit-error rates that are low enough to be negligible for all but the most demanding applications. We define the notion of careful protocols that attempt to benefit from the reliability of such networks. Although it might seem trivial to implement protocols in the presence of a relia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The PARCTAB mobile computing system

    Publication Year: 1993, Page(s):34 - 39
    Cited by:  Papers (36)  |  Patents (215)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    The PARCTAB is a personal digital assistant (PDA) that communicates via infrared (IR) datapackets to a network of IR transceivers. The infrared network is designed for in-building use, where each room becomes a communication cell. In contrast to the approach used by other PDAs, most PARCTAB applications run on remote hosts and therefore depend on reliable communication through the IR network. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transparent mistrust: OS support for cryptography-in-the-large

    Publication Year: 1993, Page(s):98 - 102
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    This position paper advocates the development of new mechanisms to support cooperative computing requiring less than complete trust. Traditional OS security mechanisms have assumed a monolithic or hierarchical model for controlling and arbitrating access to local resources. Operating systems authenticate users as they log in and enforce controlled access to files, devices and memory. Distributed s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object groups may be better than pages

    Publication Year: 1993, Page(s):119 - 122
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB)

    Argues against trying to solve the problem of clustering objects into disk pages. Instead, the author proposes that objects be fetched in groups that may be specific to an application or user, and that can be computed at fetch time. He briefly describes crystals, which serve to record such groups statically. Finally, I speculate that object fetching may be particularly relevant for providing servi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invocation chaining: manipulating lightweight objects across heavyweight boundaries

    Publication Year: 1993, Page(s):191 - 193
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    Invocation batching combines multiple object invocations into a single message; result chaining makes results from one batched invocation available to the other invocations batched with it. Invocation chaining, or the combination of invocation batching with result chaining, is the key to allowing lightweight objects to be manipulated efficiently across heavyweight boundaries, whether between machi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ubiquitous mobile host internetworking

    Publication Year: 1993, Page(s):85 - 90
    Cited by:  Papers (4)  |  Patents (74)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    Argues that being a mobile host (or a mobile capable host) should be a standard property of all hosts in the Internet, and summarizes the design of a new protocol for transparently allowing these mobile hosts to interoperate in the Internet using IP. A mobile host may move from one network to another at any time, while always using only its “home” IP address. Any host may be configured... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resolving the integrity/performance conflict

    Publication Year: 1993, Page(s):156 - 159
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    It is argued that future applications will require integrity of complex, persistent data in the face of hardware and program failures. We discuss Thor, a new object-oriented database, which offers a computational model that ensures data integrity in a distributed system without sacrificing expressiveness or performance. Perhaps surprisingly, compiler technology is important to make this work well View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User interface issues in mobile computing

    Publication Year: 1993, Page(s):40 - 47
    Cited by:  Papers (10)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    The age of mobile computing with small portable computers is upon us. However, systems researchers continue to focus on transferring their workstation environments to these machines rather than studying what tasks more typical users wish to perform. Furthermore, we argue that even in the unlikely event that these tasks are the same as those performed by researchers on their workstations, desktop e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The need for customizable operating systems

    Publication Year: 1993, Page(s):165 - 169
    Cited by:  Papers (6)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    Although modern operating systems provide powerful abstractions to application programs, they often fail to implement those abstractions in a way that provides applications programs, especially specialized application programs, with the best utilization of the physical resources of the computer system. The operating system community has implicitly recognized this problem by providing mechanisms th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual memory support for multiple page sizes

    Publication Year: 1993, Page(s):104 - 109
    Cited by:  Papers (9)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    The advent of computers with 64-bit virtual address spaces and giga-bytes of physical memory will provide applications with many more orders of magnitude of memory than is possible today. However, to tap the potential of this new hardware, we need to re-examine how virtual memory is traditionally managed. We concentrate in this note on two aspects of virtual memory: software support for multiple p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile computing personae

    Publication Year: 1993, Page(s):14 - 20
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    Highly portable, powerful computers with wireless connections will radically change the way people think about and use computing. No longer will users limit their computations to a single machine; rather, they will use the machines that best suit their current needs. A user's environment, which we call the computing persona, cannot continue to be redefined on each machine. Rather, as people move b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Processor capacity reserves: an abstraction for managing processor usage

    Publication Year: 1993, Page(s):129 - 134
    Cited by:  Papers (13)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    We have briefly motivated and described processor capacity reserves and our prototype implementation of reserves in Real-Time Mach. The reservation mechanism provides a way for application programs to specify their reservation requests and incorporates a scheduling framework which supports an admission control policy. The reservation system accurately measures processor usage of individual threads... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using reconciliation to share files between occasionally connected computers

    Publication Year: 1993, Page(s):56 - 60
    Cited by:  Papers (8)  |  Patents (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    Future large distributed systems will be made by interconnecting highly autonomous subsystems, rather than by building ever more elaborate complexes which attempt to provide a single system image transparent to the user. The work described here explores the implications of this in the context of file sharing using occasional reconciliation View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-tuning systems software

    Publication Year: 1993, Page(s):194 - 197
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    Systems software that tunes and reconfigures itself is both feasible and increasingly necessary. The necessity of self-tuning systems arises from the increased complexity of systems software combined with the broader audience for such systems. We demonstrate the feasibility of self-tuning systems by constructing one based on an architecture which separates the tasks of defining expectations, measu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software methods for system address tracing

    Publication Year: 1993, Page(s):178 - 185
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    This paper discusses the use of software methods to collect system trace for DEC Ultrix and 3.0 Mach on a DECstation 5000/200. We assert that software methods are a valuable tool for collecting system trace and understanding operating system and memory system behavior for modern workstation workloads. Software methods have some well documented shortcomings. We discuss how their impact was minimize... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to program networked portable computers

    Publication Year: 1993, Page(s):30 - 33
    Cited by:  Papers (8)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB)

    What is the correct programming model for networked portable computers? Such computers come in many shapes and sizes, so it is unreasonable to expect that there is one programming model appropriate for every single variety. However, it is likely that there is some model that will work well for a wide range of cases. We propose the intelligently autonomous model for this role. Our goal for a widely... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handling mobile clients: a case for indirect interaction

    Publication Year: 1993, Page(s):91 - 97
    Cited by:  Papers (38)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    Networking protocols are being modified to handle mobility of hosts. This paper argues that there is a need to make mobility explicit at every level of the OSI model - even above the network level through user or application level. Further, it is proposed that the mobile host and the first hop (wireless link) of communication be handled differently than the rest of the network. Hence, in networks ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • eNVy: a NonVolatile main memory storage system

    Publication Year: 1993, Page(s):116 - 118
    Cited by:  Papers (31)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB)

    We are designing a machine with a very large amount of nonvolatile solid state memory. While some mechanical storage device may remain present to handle overflow and to protect against catastrophic (software) failures, the nonvolatile solid state memory is the primary repository of permanent data. Benefits of this approach include much improved access times, and, hopefully, simplified storage syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some issues for single address space systems

    Publication Year: 1993, Page(s):150 - 154
    Cited by:  Papers (2)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    We previously described Opal, an OS environment that has a single virtual address space common to all protection domains, rather than the usual private virtual address space per protection domain (e.g., a Unix process). All threads on an Opal node see the same mapping of virtual to physical addresses; any thread can reference any virtual address, but access to the data is determined by the thread'... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.