• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,681
Next 10 →

Efficient Software-Based Fault Isolation

by Robert Wahbe, Steven Lucco, Thomas E. Anderson, Susan L. Graham , 1993
"... One way to provide fault isolation among cooperating software modules is to place each in its own address space. However, for tightly-coupled modules, this solution incurs prohibitive context switch overhead, In this paper, we present a software approach to implementing fault isolation within a sing ..."
Abstract - Cited by 777 (12 self) - Add to MetaCart
single address space. Our approach has two parts. First, we load the code and data for a distrusted module into its own fault do-main, a logically separate portion of the application’s address space. Second, we modify the object code of a distrusted module to prevent it from writing or jumping

A theory of social comparison processes,”

by Leon Festinger - Human Relations, , 1954
"... In this paper we shall present a further development of a previously published theory concerning opinion influence processes in social groups (7). This further development has enabled us to extend the theory to deal with other areas, in addition to opinion formation, in which social comparison is i ..."
Abstract - Cited by 1318 (0 self) - Add to MetaCart
is important. Specifically, we shall develop below how the theory applies to the appraisal and evaluation of abilities as well as opinions. Such theories and hypotheses in the area of social psychology are frequently viewed in terms of how "plausible" they seem. "Plausibility" usually means

UNIX Disk Access Patterns

by Chris Ruemmler, John Wilkes , 1993
"... Disk access patterns are becoming ever more important to understand as the gap between processor and disk performance increases. The study presented here is a detailed characterization of every lowlevel disk access generated by three quite different systems over a two month period. The contributions ..."
Abstract - Cited by 277 (20 self) - Add to MetaCart
-volatile memory per disk could reduce disk traffic by 10-- 18%, and 90% of metadata write traffic can be absorbed with as little as 0.2MB per disk of nonvolatile RAM. Even 128KB of NVRAM cache in each disk can improve write performance by as much as a factor of three. FCFS scheduling...

Write-Combined Logging: An Optimized Logging for Consistency in NVRAM

by Wenzhe Zhang , Kai Lu , Mikel Luján , Xiaoping Wang , Xu Zhou
"... Nonvolatile memory (e.g., Phase Change Memory) blurs the boundary between memory and storage and it could greatly facilitate the construction of in-memory durable data structures. Data structures can be processed and stored directly in NVRAM. To maintain the consistency of persistent data, logging ..."
Abstract - Add to MetaCart
is a widely adopted mechanism. However, logging introduces write-twice overhead. This paper introduces an optimized write-combined logging to reduce the writes to NVRAM log. By leveraging the fastread and byte-addressable features of NVRAM, we can perform a read-and-compare operation before writes

NVRAM-aware Logging in Transaction Systems

by Jian Huang, Karsten Schwan, Moinuddin K. Qureshi
"... Emerging byte-addressable, non-volatile memory technolo-gies (NVRAM) like phase-change memory can increase the capacity of future memory systems by orders of magnitude. Compared to systems that rely on disk storage, NVRAM-based systems promise significant improvements in perfor-mance for key applica ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
applications like online transaction process-ing (OLTP). Unfortunately, NVRAM systems suffer from two drawbacks: their asymmetric read-write performance and the notable higher cost of the new memory technologies compared to disk. This paper investigates the cost-effective use of NVRAM in transaction systems

Storage Management in the NVRAM Era ABSTRACT

by Steven Pelley, Brian T. Gold
"... Emerging nonvolatile memory technologies (NVRAM) offer an alternative to disk that is persistent, provides read latency similar to DRAM, and is byte-addressable. Such NVRAMs could revolutionize online transaction processing (OLTP), which today must employ sophisticated optimizations with substantial ..."
Abstract - Add to MetaCart
with substantial software overheads to overcome the long latency and poor random access performance of disk. Nevertheless, many candidate NVRAM technologies exhibit their own limitations, such as greater-than-DRAM latency, particularly for writes. In this paper, we reconsider OLTP durability management to optimize

Language and Memory

by Roger C. Schank - Cognitive Science , 1980
"... This paper outlines some of the issues and basic philosophy that have guided my work and that of my students in the last ten years. It describes the progression of conceptual representational theories developed during that time, as well OS some of the research models built to implement those theorie ..."
Abstract - Cited by 246 (4 self) - Add to MetaCart
and in many ways resistant to the “mushiness ” of Artificial Intelligence (AI). Where AI did exist, concern with people as opposed to machines was frequently lacking. In the last few years the situation in all three fields has begun to change. In AI, cognitive concerns have not only been accepted

Non-Volatile Memory for Fast, Reliable File Systems

by Mary Baker, Satoshi Asami, Etienne Deprit, John Ousterhout, Margo Seltzer , 1992
"... Given the decreasing cost of non-volatile RAM (NVRAM), by the late 1990’s it will be feasible for most workstations to include a megabyte or more of NVRAM, enabling the design of higher-performance, more reliable systems. We present the trace-driven simulation and analysis of two uses of NVRAM to im ..."
Abstract - Cited by 181 (5 self) - Add to MetaCart
to improve I/O performance in distributed file systems: non-volatile file caches on client workstations to reduce write traffic to file servers, and write buffers for write-optimized file systems to reduce server disk accesses. Our results show that a megabyte of NVRAM on diskless clients reduces the amount

Using Active NVRAM for I/O Staging

by Sudarsun Kannan, Dejan Milojicic, Ada Gavrilovska, Vanish Talwar, Karsten Schwan
"... With HPC machines moving to the exascale, scaling the I/O performance of applications is a well known problem. Also, a closely related problem is, how to efficiently analyze and extract useful information from I/O data, viz. data post processing. With advent of nonvolatile memory technologies (NVMs) ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
buffers of dedicated data processing or staging nodes using high performance I/O channels. The I/O data gets processed in these nodes before writing them to persistent storage like disks. However, issues with such approaches include(1) the limitation that theycannot easily analyze temporal data

Memoir: Practical State Continuity for Protected Modules

by Bryan Parno, Jacob R. Lorch, John R. Douceur, James Mickens, Jonathan M. Mccune
"... Abstract—To protect computation, a security architecture must safeguard not only the software that performs it but also the state on which the software operates. This requires more than just preserving state confidentiality and integrity, since, e.g., software may err if its state is rolled back to ..."
Abstract - Cited by 26 (7 self) - Add to MetaCart
to ensure rollback resistance without making the system vulnerable to system crashes. It does this by using a deterministic module, storing a concise summary of the module’s request history in protected NVRAM, and allowing only safe request replays after crashes. Since frequent NVRAM writes are impractical
Next 10 →
Results 1 - 10 of 1,681
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University