• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 164
Next 10 →

Lightweight recoverable virtual memory

by M. Satyanarayanan, Henry H. Mashburn, Puneet Kumar, David C. Steere, James J. Kistler - ACM Transactions on Computer Systems , 1994
"... Recoverable virtual memory refers to regions of a virtual This combination of circumstances is most likely to be found in situations involving the meta-data of storage address space on which transactional guarantees are repositories. Thus RVM can benefit a wide range of offered. This paper describes ..."
Abstract - Cited by 122 (10 self) - Add to MetaCart
Recoverable virtual memory refers to regions of a virtual This combination of circumstances is most likely to be found in situations involving the meta-data of storage address space on which transactional guarantees are repositories. Thus RVM can benefit a wide range of offered. This paper

The Recoverable-Persistent Virtual Memory Paradigm

by Khien-mien Chew, Avi Silberschatz , 1993
"... The lack of suitable buffering support in most operating systems for ensuring the performance and consistency requirements of database applications has resulted in most database systems providing their own buffering facilities. With the recent emergence of new technologies and application domains th ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
to support Recoverable-Persistent Virtual Memory (RPVM). This involves extending virtual ...

Dealing with disaster: Surviving misbehaved kernel extensions

by Margo I. Seltzer, Yasuhiro Endo, Christopher Small, Keith A. Smith - In OSDI , 1996
"... Today’s extensible operating systems allow applications to modify kernel behavior by providing mechanisms for application code to run in the kernel address space. The advantage of this approach is that it provides improved application flexibility and performance; the disadvantage is that buggy or ma ..."
Abstract - Cited by 276 (9 self) - Add to MetaCart
or malicious code can jeopardize the integrity of the kernel. It has been demonstrated that it is feasible to use safe languages, software fault isolation, or virtual memory protection to safeguard the main kernel. However, such protection mechanisms do not address the full range of problems, such as resource

Kernel Support For Recoverable-Persistent Virtual Memory

by Khien-mien Chew, A. Jyothy Reddy, Theodore H. Romer, Avi Silberschatz , 1993
"... The buffering facilities typically provided by operating systems are not powerful enough to support the performance and consistency requirements of database systems. As a result, most database systems are structured as Buffer Pool Database (BPDB) systems, providing their own buffering facilities, wi ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
virtual memory system are used. VMDB systems do not experience many of the problems faced by BPDB systems. To support the consistency and recoverability requirements of VMDB systems, we have proposed that the virtual memory system be extended to support the Recoverable-Persistent Updates (RPU) model

Support for Recoverable Memory in the Distributed Virtual Communication Machine

by Marcel-Catalin Rosu, Karsten Schwan - In Proc. of International Parallel and Distributed Processing Symposium (IPDPS , 2000
"... The Distributed Virtual Communication Machine (DVCM) is a software communication architecture for clusters of workstations equipped with programmable network interfaces (NIs) for high-speed networks. DVCM is an extensible architecture, which promotes the transfer of application modules to the NI. B ..."
Abstract - Cited by 3 (3 self) - Add to MetaCart
. By executing `closer' to the network, on the NI CoProcessor, these modules can communicate with significantly higher message rates and lower latencies than achievable at the CPU-level. This paper describes how DVCM modules can be used to enhance the performance of the Cluster Recoverable Memory system

A Lightweight Causal Logging Scheme for Recoverable Distributed Shared Memory Systems

by Taesoon Park, Heon Y. Yeom
"... This paper presents a new causal logging scheme for lazy release consistent distributed shared memory systems. For the efficient implementation of causal logging, data structures and operations supported by the lazy release consistency memory model are utilized. Also, unlike the previous scheme whic ..."
Abstract - Add to MetaCart
This paper presents a new causal logging scheme for lazy release consistent distributed shared memory systems. For the efficient implementation of causal logging, data structures and operations supported by the lazy release consistency memory model are utilized. Also, unlike the previous scheme

Recoverable Virtual Memory through the Multi-View Memory Computer System

by P. Bodorik
"... Recoverable virtual memory (RVM) is very useful for applications that require fault tolerance for persistent data structures. Updates to a recoverable region of memory are recorded so that recovery in case of faults is possible. Multi-view virtual memory (MVM) provides recoverability for a memory re ..."
Abstract - Add to MetaCart
Recoverable virtual memory (RVM) is very useful for applications that require fault tolerance for persistent data structures. Updates to a recoverable region of memory are recorded so that recovery in case of faults is possible. Multi-view virtual memory (MVM) provides recoverability for a memory

Lightweight Bytecode Verification

by Eva Rose - In OOPSALA Workshop on Formal Underpinnings of Java , 1998
"... Abstract. In this paper, we provide a theoretical foundation and improvements to the existing bytecode verification technology, a critical component of the Java security model, for mobile code used with the Java “micro edition ” (J2ME) which is intended for embedded computing devices. In Java, remot ..."
Abstract - Cited by 83 (0 self) - Add to MetaCart
the verification, however, is beyond the capacity of most embedded devices because of the memory requirements which the typical algorithm will need. We propose to take a Proof-Carrying Code (PCC) approach to data flow analysis in defining an alternative technique called “Lightweight Analysis ” which uses

Integrating Coherency and Recoverability in Distributed Systems

by Michael J. Feeley , Jeffrey S. Chase, Vivek R. Narasayya, Henry M. Levy - IN PROCEEDINGS OF THE FIRST SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDI'94 , 1994
"... We propose a technique for maintaining coherency of a transactional distributed shared memory, used by applications accessing a shared persistent store. Our goal is to improve support for fine-grained distributed data sharing in collaborative design applications, such as CAD systems and software dev ..."
Abstract - Cited by 25 (5 self) - Add to MetaCart
with a standard mechanism for ensuring recoverability of persistent data. In our system, transaction logs are the basis of both recoverability and coherency. We have prototyped log-based coherency as a set of extensions to RVM [Satyanarayanan et al. 94], a runtime package supporting recoverable virtual

Lightweight Transactions on Networks of Workstations

by Athanasios E. Papathanasiou, Evangelos P. Markatos - In Proc. 18-th Int. Conf. on Distr. Comp. Syst , 1998
"... Although transactions have been a valuable abstraction of atomicity, persistency, and recoverability, they have not been widely used in programming environments today, mostly because of their high overheads that have been driven by the low performance of magnetic disks. A major challenge in transact ..."
Abstract - Cited by 11 (4 self) - Add to MetaCart
main memory that provides fast and recoverable storage of data. We have implemented our system as a user-level library on top of the Windows NT operating system in a network of workstations connected with the SCI interconnection network. Our experimental results suggest that PERSEAS achieves
Next 10 →
Results 1 - 10 of 164
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University