Results 31 to 40 of about 1,088,631 (88)

Proving the Absence of Microarchitectural Timing Channels

open access: yes, 2023
Microarchitectural timing channels are a major threat to computer security. A set of OS mechanisms called time protection was recently proposed as a principled way of preventing information leakage through such channels and prototyped in the seL4 ...
Buckley, Scott   +6 more
core  

MProtect: Operating System Memory Management without Access

open access: yes, 2022
Modern operating systems (OSes) have unfettered access to application data, assuming that applications trust them. This assumption, however, is problematic under many scenarios where either the OS provider is not trustworthy or the OS can be compromised ...
Lee, Seung-seob   +3 more
core  

MaxMem: Colocation and Performance for Big Data Applications on Tiered Main Memory Servers

open access: yes, 2023
We present MaxMem, a tiered main memory management system that aims to maximize Big Data application colocation and performance. MaxMem uses an application-agnostic and lightweight memory occupancy control mechanism based on fast memory miss ratios to ...
Erez, Mattan   +5 more
core  

Cascade: A Platform for Delay-Sensitive Edge Intelligence

open access: yes, 2023
Interactive intelligent computing applications are increasingly prevalent, creating a need for AI/ML platforms optimized to reduce per-event latency while maintaining high throughput and efficient resource management.
Birman, Ken   +8 more
core  

3PO: Programmed Far-Memory Prefetching for Oblivious Applications

open access: yes, 2022
Using memory located on remote machines, or far memory, as a swap space is a promising approach to meet the increasing memory demands of modern datacenter applications.
Amaro, Emmanuel   +7 more
core  

uTNT: Unikernels for Efficient and Flexible Internet Probing

open access: yes
The last twenty years have seen the development and popularity of network measurement infrastructures. Internet measurement platforms have become common and have demonstrated their relevance in Internet understanding and security observation.
Donnet, Benoit   +4 more
core  

Understanding Persistent-Memory Related Issues in the Linux Kernel

open access: yes, 2023
Persistent memory (PM) technologies have inspired a wide range of PM-based system optimizations. However, building correct PM-based systems is difficult due to the unique characteristics of PM hardware.
Gatla, Om Rameshwar   +3 more
core  

Agile Development of Linux Schedulers with Ekiben

open access: yes, 2023
Kernel task scheduling is important for application performance, adaptability to new hardware, and complex user requirements. However, developing, testing, and debugging new scheduling algorithms in Linux, the most widely used cloud operating system, is ...
Anderson, Tom   +5 more
core  

BPF-oF: Storage Function Pushdown Over the Network

open access: yes, 2023
Storage disaggregation, wherein storage is accessed over the network, is popular because it allows applications to independently scale storage capacity and bandwidth based on dynamic application demand. However, the added network processing introduced by
Carin, Jeremy   +10 more
core  

AIOS: LLM Agent Operating System

open access: yes
The integration and deployment of large language model (LLM)-based intelligent agents have been fraught with challenges that compromise their efficiency and efficacy. Among these issues are sub-optimal scheduling and resource allocation of agent requests
Ge, Yingqiang   +5 more
core  

Home - About - Disclaimer - Privacy