Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
ACM Transactions on Computer Systems
ACM Press
 
   
 
Options:
 
  1-10 of 181 reviews Date Reviewed 
  Efficient instruction scheduling using real-time load delay tracking
Diavastos A., Carlson T. ACM Transactions on Computer Systems 40(1-4): 1-21, 2022.  Type: Article

Central processing unit (CPU) architectures with out-of-order instruction scheduling use, among other data, static instruction-timing information to create good schedules. The work reported in this paper describes the result of augmenting out-of-o...

Oct 27 2023
  H-Container: enabling heterogeneous-ISA container migration in edge computing
Xing T., Barbalace A., Olivier P., Karaoui M., Wang W., Ravindran B. ACM Transactions on Computer Systems 39(1-4): 1-36, 2021.  Type: Article

Xing et al. describe a novel approach to dealing with the difficulties posed by container migration in edge computing settings with heterogeneous instruction set architectures (ISAs). By putting forth a mechanism that permits effective and seamles...

May 10 2023
  Building consistent transactions with inconsistent replication
Zhang I., Sharma N., Szekeres A., Krishnamurthy A., Ports D. ACM Transactions on Computer Systems 35(4): 1-37, 2018.  Type: Article

Large-scale transaction processing systems must balance the need for minimal response times with maintaining the integrity of the data being processed. In theory, transactions are processed sequentially in the order received. Very larg...

Aug 18 2020
  Improving resource efficiency at scale with Heracles
Lo D., Cheng L., Govindaraju R., Ranganathan P., Kozyrakis C. ACM Transactions on Computer Systems 34(2): Article No. 6, 2016.  Type: Article

Most of the paper’s authors are connected to Google, and their work centers on Google workload performance improvement. They’ve developed runtime controller software, Heracles, that uses real-time feedback and stati...

Sep 6 2017
  K2: a mobile operating system for heterogeneous coherence domains
Lin F., Wang Z., Zhong L. ACM Transactions on Computer Systems 33(2): 1-27, 2015.  Type: Article

Power management is the unsung hero of mobile computing and the limiting frontier of future mobile technology. Improvements in energy usage will expand our horizons past mobile through wearable and on to implantable technology, but fir...

Jul 28 2015
  Improving software diagnosability via log enhancement
Yuan D., Zheng J., Park S., Zhou Y., Savage S. ACM Transactions on Computer Systems 30(1): 1-28, 2012.  Type: Article

When a software system fails at a user site, information is often automatically sent to the developer for diagnostics. Usually, only a system log is included, with all the confidential data such as identities and financial information ...

Jul 6 2012
  DoublePlay: parallelizing sequential logging and replay
Veeraraghavan K., Lee D., Wester B., Ouyang J., Chen P., Flinn J., Narayanasamy S. ACM Transactions on Computer Systems 30(1): 1-24, 2012.  Type: Article

There are some computer fields, like computer forensics and security analysis, that require the replaying of interesting operational sequences. On uniprocessor systems, this is not a problem. Critical events are logged and can then be ...

May 29 2012
  Depot: cloud storage with minimal trust
Mahajan P., Setty S., Lee S., Clement A., Alvisi L., Dahlin M., Walfish M. ACM Transactions on Computer Systems 29(4): 1-38, 2011.  Type: Article

Storage service providers (SSPs) are fault-prone black boxes operated by a third party. Prudent clients should avoid strong assumptions about the integrity of data stored remotely and implement some form of end-to-end checks. Based on ...

Apr 2 2012
  SnowFlock: virtual machine cloning as a first-class cloud primitive
Lagar-Cavilla H., Whitney J., Bryant R., Patchin P., Brudno M., de Lara E., Rumble S., Satyanarayanan M., Scannell A. ACM Transactions on Computer Systems 29(1): 1-45, 2011.  Type: Article

A somewhat unusual mechanism for achieving parallelism in cloud-based systems is explored in this paper. Traditionally, a cloud server would be instantiated on a multiprocessor, and the developer would run multiple processes or threads...

Mar 13 2012
  DDoS defense by offense
Walfish M., Vutukuru M., Balakrishnan H., Karger D., Shenker S. ACM Transactions on Computer Systems 28(1): 1-54, 2010.  Type: Article

Two methods are usually used to defend against distributed denial-of-service (DDoS) attacks: the first method provides lots of resources to satisfy requests, so that services cannot be denied; the other method builds a blacklist for de...

Jul 9 2010
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy