Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 16, Issue 1September 2022
Reflects downloads up to 15 Oct 2024Bibliometrics
Skip Table Of Content Section
C5: cloned concurrency control that always keeps up

Asynchronously replicated primary-backup databases are commonly deployed to improve availability and offload read-only transactions. To both apply replicated writes from the primary and serve read-only transactions, the backups implement a cloned ...

research-article
The case for distributed shared-memory databases with RDMA-enabled memory disaggregation

Memory disaggregation (MD) allows for scalable and elastic data center design by separating compute (CPU) from memory. With MD, compute and memory are no longer coupled into the same server box. Instead, they are connected to each other via ultra-fast ...

FlexChain: an elastic disaggregated blockchain

While permissioned blockchains enable a family of data center applications, existing systems suffer from imbalanced loads across compute and memory, exacerbating the underutilization of cloud resources. This paper presents FlexChain, a novel ...

research-article
MiCS: near-linear scaling for training gigantic model on public cloud

Existing general purpose frameworks for gigantic model training, i.e., dense models with billions of parameters, cannot scale efficiently on cloud environment with various networking conditions due to large communication overheads. In this paper, we ...

Privacy-preserving cooperative online matching over spatial crowdsourcing platforms

With the continuous development of spatial crowdsourcing platform, online task assignment problem has been widely studied as a typical problem in spatial crowdsourcing. Most of the existing studies are based on a single-platform task assignment to ...

Coresets over multiple tables for feature-rich and data-efficient machine learning

Successful machine learning (ML) needs to learn from good data. However, one common issue about train data for ML practitioners is the lack of good features. To mitigate this problem, feature augmentation is often employed by joining with (or enriching ...

research-article
Starry: multi-master transaction processing on semi-leader architecture

Multi-master architecture is desirable for cloud databases in supporting large-scale transaction processing. To enable concurrent transaction execution on multiple computing nodes, we need an efficient transaction commit protocol on the storage layer ...

SIFTER: space-efficient value iteration for finite-horizon MDPs

Can we solve finite-horizon Markov decision processes (FHMDPs) while raising low memory requirements? Such models find application in many cases where a decision-making agent needs to act in a probabilistic environment, from resource management to ...

TreeLine: an update-in-place key-value store for modern storage

Many modern key-value stores, such as RocksDB, rely on log-structured merge trees (LSMs). Originally designed for spinning disks, LSMs optimize for write performance by only making sequential writes. But this optimization comes at the cost of reads: ...

research-article
DPXPlain: privately explaining aggregate query answers

Differential privacy (DP) is the state-of-the-art and rigorous notion of privacy for answering aggregate database queries while preserving the privacy of sensitive information in the data. In today's era of data analysis, however, it poses new ...

Subjects

Currently Not Available

Comments