Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3127479acmconferencesBook PagePublication PagesmodConference Proceedingsconference-collections
SoCC '17: Proceedings of the 2017 Symposium on Cloud Computing
ACM2017 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SoCC '17: ACM Symposium on Cloud Computing Santa Clara California September 24 - 27, 2017
ISBN:
978-1-4503-5028-0
Published:
24 September 2017
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 25 Jan 2025Bibliometrics
Abstract

No abstract available.

research-article
Public Access
FSP: towards flexible synchronous parallel framework for expectation-maximization based algorithms on cloud

Myriad of parameter estimation algorithms can be performed by an Expectation-Maximization (EM) approach. Traditional synchronous frameworks can parallelize these EM algorithms on the cloud to accelerate computation while guaranteeing the convergence. ...

research-article
Trustable virtual machine scheduling in a cloud

In an Infrastructure As A Service (IaaS) cloud, the scheduler deploys VMs to servers according to service level objectives (SLOs). Clients and service providers must both trust the infrastructure. In particular they must be sure that the VM scheduler ...

research-article
Search lookaside buffer: efficient caching for index data structures

With the ever increasing DRAM capacity in commodity computers, applications tend to store large amount of data in main memory for fast access. Accordingly, efficient traversal of index structures to locate requested data becomes crucial to their ...

research-article
Public Access
Architectural implications on the performance and cost of graph analytics systems

Graph analytics systems have gained significant popularity due to the prevalence of graph data. Many of these systems are designed to run in a shared-nothing architecture whereby a cluster of machines can process a large graph in parallel. In more ...

research-article
Public Access
Incentivizing self-capping to increase cloud utilization

Cloud Infrastructure as a Service (IaaS) providers continually seek higher resource utilization to better amortize capital costs. Higher utilization not only can enable higher profit for IaaS providers but also provides a mechanism to raise energy ...

research-article
Public Access
Mithril: mining sporadic associations for cache prefetching

The growing pressure on cloud application scalability has accentuated storage performance as a critical bottleneck. Although cache replacement algorithms have been extensively studied, cache prefetching - reducing latency by retrieving items before they ...

research-article
Public Access
GLoop: an event-driven runtime for consolidating GPGPU applications

Graphics processing units (GPUs) have become an attractive platform for general-purpose computing (GPGPU) in various domains. Making GPUs a time-multiplexing resource is a key to consolidating GPGPU applications (apps) in multi-tenant cloud platforms. ...

research-article
APUS: fast and scalable paxos on RDMA

State machine replication (SMR) uses Paxos to enforce the same inputs for a program (e.g., Redis) replicated on a number of hosts, tolerating various types of failures. Unfortunately, traditional Paxos protocols incur prohibitive performance overhead on ...

research-article
No data left behind: real-time insights from a complex data ecosystem

The typical enterprise data architecture consists of several actively updated data sources (e.g., NoSQL systems, data warehouses), and a central data lake such as HDFS, in which all the data is periodically loaded through ETL processes. To simplify ...

research-article
Remote memory in the age of fast networks

As the latency of the network approaches that of memory, it becomes increasingly attractive for applications to use remote memory---random-access memory at another computer that is accessed using the virtual memory subsystem. This is an old idea whose ...

research-article
Public Access
CapNet: security and least authority in a capability-enabled cloud

We present CapNet, a capability-based network architecture designed to enable least authority and secure collaboration in the cloud. CapNet allows fine-grained management of rights, recursive delegation, hierarchical policies, and least privilege. To ...

research-article
Public Access
LSM-tree managed storage for large-scale key-value store

Key-value stores are increasingly adopting LSM-trees as their enabling data structure in the backend storage, and persisting their clustered data through a file system. A file system is expected to not only provide file/directory abstraction to organize ...

research-article
HyperNF: building a high performance, high utilization and fair NFV platform

Network Function Virtualization has been touted as the silver bullet for tackling a number of operator problems, including vendor lock-in, fast deployment of new functionality, converged management, and lower expenditure since packet processing runs on ...

research-article
Public Access
Workload analysis and caching strategies for search advertising systems

Search advertising depends on accurate predictions of user behavior and interest, accomplished today using complex and computationally expensive machine learning algorithms that estimate the potential revenue gain of thousands of candidate ...

research-article
Prism: a proxy architecture for datacenter networks

In datacenters, workload throughput is often constrained by the attachment bandwidth of proxy servers, despite the much higher aggregate bandwidth of backend servers. We introduce a novel architecture that addresses this problem by combining ...

research-article
Towards automatic parameter tuning of stream processing systems

Optimizing the performance of big-data streaming applications has become a daunting and time-consuming task: parameters may be tuned from a space of hundreds or even thousands of possible configurations. In this paper, we present a framework for ...

research-article
STYX: a trusted and accelerated hierarchical SSL key management and distribution system for cloud based CDN application

Protecting the customer's SSL private key is the paramount issue to persuade the website owners to migrate their contents onto the cloud infrastructure, besides the advantages of cloud infrastructure in terms of flexibility, efficiency, scalability and ...

research-article
QFrag: distributed graph search via subgraph isomorphism

This paper introduces QFrag, a distributed system for graph search on top of bulk synchronous processing (BSP) systems such as MapReduce and Spark. Searching for patterns in graphs is an important and computationally complex problem. Most current ...

research-article
A robust partitioning scheme for ad-hoc query workloads

Data partitioning is crucial to improving query performance several workload-based partitioning techniques have been proposed in database literature. However, many modern analytic applications involve ad-hoc or exploratory analysis where users do not ...

research-article
DLSH: a distribution-aware LSH scheme for approximate nearest neighbor query in cloud computing

Cloud computing needs to process and analyze massive high-dimensional data in a real-time manner. Approximate queries in cloud computing systems can provide timely queried results with acceptable accuracy, thus alleviating the consumption of a large ...

research-article
SLO-aware colocation of data center tasks based on instantaneous processor requirements

In a cloud data center, a single physical machine simultaneously executes dozens of highly heterogeneous tasks. Such colocation results in more efficient utilization of machines, but, when tasks' requirements exceed available resources, some of the ...

research-article
Preserving I/O prioritization in virtualized OSes

While virtualization helps to enable multi-tenancy in data centers, it introduces new challenges to the resource management in traditional OSes. We find that one important design in an OS, prioritizing interactive and I/O-bound workloads, can become ...

research-article
Public Access
A policy-based system for dynamic scaling of virtual machine memory reservations

To maximize the effectiveness of modern virtualization systems, resources must be allocated fairly and efficiently amongst virtual machines (VMs). However, current policies for allocating memory are relatively static. As a result, system-wide memory ...

research-article
Public Access
PBSE: a robust path-based speculative execution for degraded-network tail tolerance in data-parallel frameworks

We reveal loopholes of Speculative Execution (SE) implementations under a unique fault model: node-level network throughput degradation. This problem appears in many data-parallel frameworks such as Hadoop MapReduce and Spark. To address this, we ...

research-article
Public Access
Polygravity: traffic usage accountability via coarse-grained measurements in multi-tenant data centers

Network usage accountability is critical in helping operators and customers of multi-tenant data centers deal with concerns such as capacity planning, resource allocation, hotspot detection, link failure detection, and troubleshooting. However, the cost ...

research-article
Public Access
Distributed shared persistent memory

Next-generation non-volatile memories (NVMs) will provide byte addressability, persistence, high density, and DRAM-like performance. They have the potential to benefit many datacenter applications. However, most previous research on NVMs has focused on ...

research-article
BestConfig: tapping the performance potential of systems via automatic configuration tuning

An ever increasing number of configuration parameters are provided to system users. But many users have used one configuration setting across different workloads, leaving untapped the performance potential of systems. A good configuration setting can ...

research-article
A machine learning approach to live migration modeling

Live migration is one of the key technologies to improve data center utilization, power efficiency, and maintenance. Various live migration algorithms have been proposed; each exhibiting distinct characteristics in terms of completion time, amount of ...

research-article
Latency reduction and load balancing in coded storage systems

Erasure coding has been used in storage systems to enhance data durability at a lower storage overhead. However, these systems suffer from long access latency tails due to a lack of flexible load balancing mechanisms and passively launched degraded ...

research-article
On-demand virtualization for live migration in bare metal cloud

The level of demand for bare-metal cloud services has increased rapidly because such services are cost-effective for several types of workloads, and some cloud clients prefer a single-tenant environment due to the lower security vulnerability of such ...

Recommendations

Acceptance Rates

Overall Acceptance Rate 169 of 722 submissions, 23%
YearSubmittedAcceptedRate
SoCC '201433524%
SoCC '191573925%
SoCC '161513825%
SoCC '151573422%
SOCC '131142320%
Overall72216923%