w/in this Title
ACM Transactions on Computer Systems
1-10 of 178 reviews
Improving resource efficiency at scale with Heracles
Lo D., Cheng L., Govindaraju R., Ranganathan P., Kozyrakis C. ACM Transactions on Computer Systems 34(2): Article No. 6, 2016. Type: Article
Most of the paper’s authors are connected to Google, and their work centers on Google workload performance improvement. They’ve developed runtime controller software, Heracles, that uses real-time feedback and static modeling rules to ...
Sep 6 2017
K2: a mobile operating system for heterogeneous coherence domains
Lin F., Wang Z., Zhong L. ACM Transactions on Computer Systems 33(2): 1-27, 2015. Type: Article
Power management is the unsung hero of mobile computing and the limiting frontier of future mobile technology. Improvements in energy usage will expand our horizons past mobile through wearable and on to implantable technology, but first we have t...
Jul 28 2015
Improving software diagnosability via log enhancement
Yuan D., Zheng J., Park S., Zhou Y., Savage S. ACM Transactions on Computer Systems 30(1): 1-28, 2012. Type: Article
When a software system fails at a user site, information is often automatically sent to the developer for diagnostics. Usually, only a system log is included, with all the confidential data such as identities and financial information stripped off...
Jul 6 2012
DoublePlay: parallelizing sequential logging and replay
Veeraraghavan K., Lee D., Wester B., Ouyang J., Chen P., Flinn J., Narayanasamy S. ACM Transactions on Computer Systems 30(1): 1-24, 2012. Type: Article
There are some computer fields, like computer forensics and security analysis, that require the replaying of interesting operational sequences. On uniprocessor systems, this is not a problem. Critical events are logged and can then be replayed as ...
May 29 2012
Depot: cloud storage with minimal trust
Mahajan P., Setty S., Lee S., Clement A., Alvisi L., Dahlin M., Walfish M. ACM Transactions on Computer Systems 29(4): 1-38, 2011. Type: Article
Storage service providers (SSPs) are fault-prone black boxes operated by a third party. Prudent clients should avoid strong assumptions about the integrity of data stored remotely and implement some form of end-to-end checks. Based on these premis...
Apr 2 2012
SnowFlock: virtual machine cloning as a first-class cloud primitive
Lagar-Cavilla H., Whitney J., Bryant R., Patchin P., Brudno M., de Lara E., Rumble S., Satyanarayanan M., Scannell A. ACM Transactions on Computer Systems 29(1): 1-45, 2011. Type: Article
A somewhat unusual mechanism for achieving parallelism in cloud-based systems is explored in this paper. Traditionally, a cloud server would be instantiated on a multiprocessor, and the developer would run multiple processes or threads to take adv...
Mar 13 2012
DDoS defense by offense
Walfish M., Vutukuru M., Balakrishnan H., Karger D., Shenker S. ACM Transactions on Computer Systems 28(1): 1-54, 2010. Type: Article
Two methods are usually used to defend against distributed denial-of-service (DDoS) attacks: the first method provides lots of resources to satisfy requests, so that services cannot be denied; the other method builds a blacklist for denying reques...
Jul 9 2010
Practical and low-overhead masking of failures of TCP-based servers
Zagorodnov D., Marzullo K., Alvisi L., Bressoud T. ACM Transactions on Computer Systems 27(2): 1-39, 2009. Type: Article
An interesting approach to maintaining transmission control protocol (TCP) connections when a server crashes is described in this paper. TCP is usually implemented in the operating system, and the protocol provides reliable communications between ...
Apr 15 2010
Selective replication: a lightweight technique for soft errors
Vera X., Abella J., Carretero J., González A. ACM Transactions on Computer Systems 27(4): 1-30, 2009. Type: Article
By selectively replicating only those instructions that have the highest probability of failing due to soft errors--caused by particle strikes, noise, electromagnetic interference, or electrostatic discharge--Vera et al. are able to redu...
Mar 11 2010
RaWMS - random walk based lightweight membership service for wireless ad hoc networks
Bar-Yossef Z., Friedman R., Kliot G. ACM Transactions on Computer Systems 26(2): 1-66, 2008. Type: Article
A random walk is a trajectory made up of a series of random steps. This paper reports on using the results of the topological study of random walks (RWs) on random geometric graphs to model the network connectivity graph of two-dimensional wireles...
Sep 30 2008
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2017 ThinkLoud, Inc.