Proceedings of the Seventh Workshop on Hot Topics in Operating Systems

30-30 March 1999

Filter Results

Displaying Results 1 - 25 of 33
  • Proceedings of the Seventh Workshop on Hot Topics in Operating Systems

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • Index of authors

    Publication Year: 1999, Page(s): 197
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE
  • A case for buffer servers

    Publication Year: 1999, Page(s):82 - 87
    Cited by:  Papers (2)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    Faster networks and cheaper storage have brought us to a point where I/O caching servers have an important role in the design of scalable, high-performance file systems. These intermediary I/O servers-or buffer servers-can be deployed at strategic points in the network, interposed between clients and data sources such as standard file servers, Internet data servers and tertiary storage. Their purp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operating systems support for programmable cluster-based Internet routers

    Publication Year: 1999, Page(s):76 - 81
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    As network routers evolve towards supporting ever higher-level networking functions beyond traditional network-layer and transport-layer protocols, programmability becomes a major design issue in network device operating systems (NDOS), which until very recently has been based on the type of operating system used in embedded systems. On the other hand, it is now possible to build high-performance ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Elephant: the file system that never forgets

    Publication Year: 1999, Page(s):2 - 7
    Cited by:  Papers (14)  |  Patents (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    Modern file systems associate the deletion of a file with the release of the storage associated with that file, and file writes with the irrevocable change of file contents. We propose that this model of file system behavior is a relic of the past, when disk storage was a scarce resource. We believe that the correct model should ensure that all user actions are revocable. Deleting a file should ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Drawing the red line in Java

    Publication Year: 1999, Page(s):116 - 121
    Cited by:  Papers (10)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    Software-based protection has become a viable alternative to hardware-based protection in systems based on languages such as Java, but the absence of hardware mechanisms for protection has been coupled with an absence of a user/kernel boundary. We show why such a “red line” must be present in order for a Java virtual machine to be as effective and as reliable as an operating system. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The case for better throughput estimation

    Publication Year: 1999, Page(s):70 - 75
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    A Web proxy must accurately predict network performance between itself and its servers and clients in order to make good distillation decisions. In this paper we show that the current approaches to make such predictions-either assuming the proxy is well-connected to all servers or using past observations-are insufficient. We propose a new prediction method, estimation with uncertainty, that will p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The problems you're having may not be the problems you think you're having: results from a latency study of Windows NT

    Publication Year: 1999, Page(s):96 - 101
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    This paper is intended to catalyze discussions on two intertwined systems topics. First, it presents early results from a latency study of Windows NT that identifies some specific causes of long-thread scheduling latencies, many of which delay the dispatching of runnable threads for tens of milliseconds. Reasons for these delays, including technical, methodological and economic reasons, are presen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The case for efficient file access pattern modeling

    Publication Year: 1999, Page(s):14 - 19
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    Most modern I/O systems treat each file access independently. However events in a computer system are driven by programs. Thus, accesses to files occur in consistent patterns and are by no means independent. The result is that modern I/O systems ignore useful information. Using traces of file system activity we show that file accesses are strongly correlated with preceding accesses. In fact, a sim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Soft real time scheduling for general purpose client-server systems

    Publication Year: 1999, Page(s):130 - 135
    Cited by:  Papers (2)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    This paper considers the problem of scheduling Real Time applications on a general-purpose Operating System. The approach taken is to modify a mainstream system, in order to realize the benefits of Real Time scheduling whilst preserving all existing software. Particular care has been taken to make important servers aware of their clients' Quality of Service, without major restructuring. We have im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intra-address space protection using segmentation hardware

    Publication Year: 1999, Page(s):110 - 115
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    The technological evolution towards extensible software systems and component-based software development requires efficient, flexible and easy-to-use protection mechanisms to isolate software modules residing in the same address space. While a number of software-based approaches have been proposed in the last several years, no clear winner emerges that satisfactorily addresses all the design issue... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transparent communication management in wireless networks

    Publication Year: 1999, Page(s):64 - 69
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    Wireless networks are characterized by the generally low quality of service (QoS) that they provide. In the face of user mobility between heterogeneous networks, distributed applications designed for the higher and less variable QoS of wired networks have difficulty operating. Proxy systems provide one solution to this problem. By placing an intermediary on the communication path between wired and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability hierarchies

    Publication Year: 1999, Page(s):168 - 173
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    Hierarchies of diverse storage levels have been analyzed extensively for their ability to achieve both good performance and low cost. The article argues that we should view hierarchies also as a way to achieve both good reliability and low overhead. After discussing the design of a reliability hierarchy, we suggest two metrics to use in evaluating the overall reliability of a reliability hierarchy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ISTORE: introspective storage for data-intensive network services

    Publication Year: 1999, Page(s):32 - 37
    Cited by:  Papers (13)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    Today's fast-growing data-intensive network services place heavy demands on the back-end servers that support them. This paper introduces ISTORE, a novel server architecture that couples LEGO-like plug-and-play hardware with a generic framework for constructing adaptive software that leverages continuous self-monitoring. ISTORE exploits introspection to provide high availability, performance, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An end-system architecture for unified congestion management

    Publication Year: 1999, Page(s):52 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    In this position paper we motivate and describe the Congestion Manager (CM), a novel end-system architecture, which enables application adaptation to network congestion. The CM maintains congestion and path related information and allows flows to learn from each other and share information. It also exports an API to enable applications to learn about network status and regulate data transmission. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to schedule unlimited memory pinning of untrusted processes or provisional ideas about service-neutrality

    Publication Year: 1999, Page(s):153 - 159
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    You can read it as a paper that treats a concrete problem motivated in the first section: how can we permit untrusted user processes to pin their virtual pages in memory most flexibly and as unlimited as possible? From this point of view, the paper presents a general solution that is theoretically and experimentally reasonably substantiated. However, you can also read the paper as an approach to s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Brittle metrics in operating systems research

    Publication Year: 1999, Page(s):90 - 95
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    Most operating systems research publications make claims about performance. We expect these performance claims to be both repeatable and relevant to important applications. We also expect them to be comparable to similar claims made in other papers. This implies the need for realistic and widely-used benchmarks. Often, however, no such benchmark exists. The problem is especially acute in applicati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Caching documents with active properties

    Publication Year: 1999, Page(s):8 - 13
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    Caching in the Placeless Documents system poses new challenges because users can attach active properties to documents. Active properties can modify the document's content as seen by a user. Thus, the caching mechanisms must take into account that a document's content not only depends on when the document was last modified, but also on the set of personal and universal properties attached to the d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hey, you got your compiler in my operating system!

    Publication Year: 1999, Page(s):122 - 127
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    Several operating systems projects revolve around moving functionality above or below the kernel “red line” to increase flexibility or performance. We describe how a general model of partial evaluation encompasses this trend. The operating systems community should not be content with a single interface between applications and the operating system, even if that interface allows extensi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The case for application-specific benchmarking

    Publication Year: 1999, Page(s):102 - 107
    Cited by:  Papers (27)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    Most performance analysis today uses either microbenchmarks or standard macrobenchmarks (e.g. SPEC, LADDIS, the Andrew benchmark). However, the results of such benchmarks provide little information to indicate how well a particular system will handle a particular application. Such results are, at best, useless and, at worst, misleading. In this paper we argue for an application-directed approach t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • File systems for CE equipment

    Publication Year: 1999, Page(s):20 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    We discuss how system technology can be used in consumer electronics storage devices to enhance the usability of these products. We claim that the best way to achieve compatibility between consumer electronics devices and the PC platform is to use PC-style file systems in consumer electronics devices, instead of designing proprietary solutions for audio/video storage. However, to achieve this PC-s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Xenoservers: accountable execution of untrusted programs

    Publication Year: 1999, Page(s):136 - 141
    Cited by:  Papers (27)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    Many networked applications could benefit from executing closer to the data or services with which they interact. By doing this they may be able to circumvent long communication latencies or avoid transferring data over congested or expensive network links. However no public infrastructure currently exists that enables this. We propose a system that can execute code supplied by an untrusted user y... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Harvest, yield, and scalable tolerant systems

    Publication Year: 1999, Page(s):174 - 178
    Cited by:  Papers (24)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    The cost of reconciling consistency and state management with high availability is highly magnified by the unprecedented scale and robustness requirements of today's Internet applications. We propose two strategies for improving overall availability using simple mechanisms that scale over large applications whose output behavior tolerates graceful degradation. We characterize this degradation in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OS support for general-purpose routers

    Publication Year: 1999, Page(s):38 - 43
    Cited by:  Papers (16)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    This paper argues that there is a need for routers to move from being closed, special-purpose network devices to being open, general-purpose computing/communication systems. The central challenge in making this shift is to simultaneously support increasing complex forwarding logic and high performance, while using commercial hardware components and open operating systems. This paper introduces the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The case for informed transport protocols

    Publication Year: 1999, Page(s):58 - 63
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    Wide-area distributed applications are frequently limited by the performance of Internet data transfers. We argue that the principle cause of this effect is the poor interaction between host-centric congestion control algorithms and the realities of today's Internet traffic and infrastructure. In particular when the duration of a network flow is short, then using end-to-end feedback to determine n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.