Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/2813767guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
USENIX ATC '15: Proceedings of the 2015 USENIX Conference on Usenix Annual Technical Conference
2015 Proceeding
Publisher:
  • USENIX Association
  • 2560 Ninth St. Suite 215 Berkeley, CA
  • United States
Conference:
Santa Clara CA July 8 - 10, 2015
ISBN:
978-1-931971-22-5
Published:
08 July 2015
Sponsors:
VMware, NetApp, Google Inc., Facebook, HP

Reflects downloads up to 17 Oct 2024Bibliometrics
Abstract

No abstract available.

Article
Spartan: a distributed array framework with smart tiling
Pages 1–15

Application programmers in domains like machine learning, scientific computing, and computational biology are accustomed to using powerful, high productivity array languages such as MatLab, R and NumPy. Distributed array frameworks aim to scale array ...

Article
Experience with rules-based programming for distributed, concurrent, fault-tolerant code
Pages 17–30

This paper describes how a rules-based approach allowed us to solve a broad class of challenging distributed system problems in the RAMCloud storage system. In the rules-based approach, behavior is described with small sections of code that trigger ...

Article
Tiered replication: a cost-effective alternative to full cluster geo-replication
Pages 31–43

Cloud storage systems typically use three-way random replication to guard against data loss within the cluster, and utilize cluster geo-replication to protect against correlated failures. This paper presents a much lower cost alternative to full cluster ...

Article
Callisto-RTS: fine-grain parallel loops
Pages 45–56

We introduce Callisto-RTS, a parallel runtime system designed for multi-socket shared-memory machines. It supports very fine-grained scheduling of parallel loops-- down to batches of work of around 1K cycles. Finegrained scheduling helps avoid load ...

Article
LAMA: optimized locality-aware memory allocation for key-value cache
Pages 57–69

The in-memory cache system is a performance-critical layer in today's web server architecture. Memcached is one of the most effective, representative, and prevalent among such systems. An important problem is memory allocation. The default design does ...

Article
LSM-trie: an LSM-tree-based ultra-large key-value store for small data
Pages 71–82

Key-value (KV) stores have become a backbone of large-scale applications in today's data centers. The data set of the store on a single server can grow to billions of KV items or many terabytes, while individual data items are often small (with their ...

Article
MetaSync: file synchronization across multiple untrusted storage services
Pages 83–95

Cloud-based file synchronization services, such as Drop-box, are a worldwide resource for many millions of users. However, individual services often have tight resource limits, suffer from temporary outages or even shutdowns, and sometimes silently ...

Article
Pyro: a spatial-temporal big-data storage system
Pages 97–109

With the rapid growth of mobile devices and applications, geo-tagged data has become a major workload for big data storage systems. In order to achieve scalability, existing solutions build an additional index layer above general purpose distributed ...

Article
CDStore: toward reliable, secure, and cost-efficient cloud storage via convergent dispersal
Pages 111–124

We present CDStore, which disperses users' backup data across multiple clouds and provides a unified multicloud storage solution with reliability, security, and cost-efficiency guarantees. CDStore builds on an augmented secret sharing scheme called ...

Article
Surviving peripheral failures in embedded systems
Pages 125–137

Peripherals fail. Yet, modern embedded systems largely leave the burden of tolerating peripheral failures to the programmer. This paper presents Phoenix, a semi-automated peripheral recovery system for resource-constrained embedded systems. Phoenix ...

Article
Log2: a cost-aware logging mechanism for performance diagnosis
Pages 139–150

Logging has been a common practice for monitoring and diagnosing performance issues. However, logging comes at a cost, especially for large-scale online service systems. First, the overhead incurred by intensive logging is non-negligible. Second, it is ...

Article
Identifying trends in enterprise data protection systems
Pages 151–164

Enterprises routinely use data protection techniques to achieve business continuity in the event of failures. To ensure that backup and recovery goals are met in the face of the steep data growth rates of modern workloads, data protection systems need ...

Article
Systematically exploring the behavior of control programs
Pages 165–176

Many networked systems today, ranging from home automation networks to global wide-area networks, are operated using centralized control programs. Bugs in such programs pose serious risks to system security and stability. We develop a new technique to ...

Article
Fence: protecting device availability with uniform resource control
Pages 177–191

Applications such as software updaters or a run-away web app, even if low priority, can cause performance degradation, loss of battery life, or other issues that reduce a computing device's availability. The core problem is that OS resource control ...

Article
Request-oriented durable write caching for application performance
Pages 193–206

Non-volatile write cache (NVWC) can help to improve the performance of I/O-intensive tasks, especially write-dominated tasks. The benefit of NVWC, however, cannot be fully exploited if an admission policy blindly caches all writes without ...

Article
NVMKV: a scalable, lightweight, FTL-aware key-value store
Pages 207–219

Key-value stores are ubiquitous in high performance data-intensive, scale out, and NoSQL environments. Many KV stores use flash devices for meeting their performance needs. However, by using flash as a simple block device, these KV stores are unable to ...

Article
Lightweight application-level crash consistency on transactional flash storage
Pages 221–234

Applications implement their own update protocols to ensure consistency of data on the file system. However, since current file systems provide only a preliminary ordering guarantee, notably fsync, these update protocols become complex, slow, and error-...

Article
WALDIO: eliminating the filesystem journaling in resolving the journaling of journal anomaly
Pages 235–247

This work is dedicated to resolve the Journaling of Journal Anomaly in Android IO stack. We orchestrate SQLite and EXT4 filesystem so that SQLite's file-backed journaling activity can dispense with the expensive filesystem intervention, the journaling, ...

Article
SpanFS: a scalable file system on fast storage devices
Pages 249–261

Most recent storage devices, such as NAND flash-based solid state drives (SSDs), provide low access latency and high degree of parallelism. However, conventional file systems, which are designed for slow hard disk drives, often encounter severe ...

Article
Shoal: smart allocation and replication of memory for parallel programs
Pages 263–276

Modern NUMA multi-core machines exhibit complex latency and throughput characteristics, making it hard to allocate memory optimally for a given program's access patterns. However, sub-optimal allocation can significantly impact performance of parallel ...

Article
Thread and memory placement on NUMA systems: asymmetry matters
Pages 277–289

It is well known that the placement of threads and memory plays a crucial role for performance on NUMA (Non-Uniform Memory-Access) systems. The conventional wisdom is to place threads close to their memory, to collocate on the same node threads that ...

Article
Latency-tolerant software distributed shared memory
Pages 291–305

We present Grappa, a modern take on software distributed shared memory (DSM) for in-memory data-intensive applications. Grappa enables users to program a cluster as if it were a single, large, non-uniform memory access (NUMA) machine. Performance scales ...

Article
NightWatch: integrating lightweight and transparent cache pollution control into dynamic memory allocation systems
Pages 307–318

Cache pollution, by which weak-locality data unduly replaces strong-locality data, may notably degrade application performance in a shared-cache multicore machine. This paper presents NightWatch, a cache management subsystem that provides general, ...

Article
Secure deduplication of general computations
Pages 319–331

The world's fast-growing data has become highly concentrated on enterprise or cloud storage servers. Data deduplication reduces redundancy in this data, saving storage and simplifying management. While existing systems can deduplicate computations on ...

Article
Lamassu: storage-efficient host-side encryption
Pages 333–345

Many storage customers are adopting encryption solutions to protect critical data. Most existing encryption solutions sit in, or near, the application that is the source of critical data, upstream of the primary storage system. Placing encryption near ...

Article
SecPod: a framework for virtualization-based security systems
Pages 347–360

The OS kernel is critical to the security of a computer system. Many systems have been proposed to improve its security. A fundamental weakness of those systems is that page tables, the data structures that control the memory protection, are not ...

Article
Between mutual trust and mutual distrust: practical fine-grained privilege separation in multithreaded applications
Pages 361–373

Threads in a multithreaded process share the same address space and thus are implicitly assumed to be mutually trusted. However, one (compromised) thread attacking another is a real world threat. It remains challenging to achieve privilege separation ...

Article
GridGraph: large-scale graph processing on a single machine using 2-level hierarchical partitioning
Pages 375–386

In this paper, we present GridGraph, a system for processing large-scale graphs on a single machine. Grid-Graph breaks graphs into 1D-partitioned vertex chunks and 2D-partitioned edge blocks using a first fine-grained level partitioning in ...

Article
GraphQ: graph query processing with abstraction refinement: scalable and programmable analytics over very large graphs on a single PC
Pages 387–401

This paper introduces GraphQ, a scalable querying framework for very large graphs. GraphQ is built on a key insight that many interesting graph properties -- such as finding cliques of a certain size, or finding vertices with a certain page rank -- can ...

Article
Accurate latency-based congestion feedback for datacenters
Pages 403–415

The nature of congestion feedback largely governs the behavior of congestion control. In datacenter networks, where RTTs are in hundreds of microseconds, accurate feedback is crucial to achieve both high utilization and low queueing delay. Proposals for ...

Contributors
Index terms have been assigned to the content through auto-classification.

Recommendations