Sciweavers

HOTOS
1999
IEEE
14 years 3 months ago
Elephant: The File System That Never Forgets
Modern file systems associate the deletion of a file with the release of the storage associated with that file, and file writes with the irrevocable change of file contents. We pr...
Douglas J. Santry, Michael J. Feeley, Norman C. Hu...
HOTOS
1999
IEEE
14 years 3 months ago
Xenoservers: Accountable Execution of Untrusted Programs
Many networked applications could benefit from executing closer to the data or services with which they interact. By doing this they may be able to circumvent long communication l...
Dickon Reed, Ian Pratt, Paul Menage, Stephen Early...
HOTOS
1999
IEEE
14 years 3 months ago
The Case for Better Throughput Estimation
A Web proxy must accurately predict network performance between itself and its servers and clients in order to make good distillation decisions. In this paper, we show that the cu...
Brian Noble, Li Li, Atul Prakash
HOTOS
1999
IEEE
14 years 3 months ago
The Case for Higher-Level Power Management
Reducing the energy consumed in the use of computing devices is becoming a major design challenge. While the problem obviously must be addressed with improved low-level technology...
Carla Schlatter Ellis
HOTOS
1999
IEEE
14 years 3 months ago
Reliability Hierarchies
Peter M. Chen, David E. Lowell
HOTOS
1999
IEEE
14 years 3 months ago
Caching Documents with Active Properties
Caching in the Placeless Documents system poses new challenges because users can attach active properties to documents. Active properties can modify the document's content as...
Eyal de Lara, Karin Petersen, Douglas B. Terry, An...
HOTOS
1999
IEEE
14 years 3 months ago
ISTORE: Introspective Storage for Data-Intensive Network Services
Today's fast-growing data-intensive network services place heavy demands on the backend servers that support them. This paper introduces ISTORE, an intelligent server archite...
Aaron B. Brown, David L. Oppenheimer, Kimberly Kee...
HOTOS
1999
IEEE
14 years 3 months ago
Hey, You Got Your Compiler in My Operating System!
Several operating systems projects revolve around moving functionality above or below the kernel "red line" to increase flexibility or performance. We describe how a gen...
Jon Howell, Mark H. Montague
HOTOS
1999
IEEE
14 years 3 months ago
The Case for Efficient File Access Pattern Modeling
Most modern I/O systems treat each file access independently. However, events in a computer system are driven by programs. Thus, accesses to files occur in consistent patterns and...
Tom M. Kroeger, Darrell D. E. Long
HOTOS
1999
IEEE
14 years 3 months ago
Transparent Communication Management in Wireless Networks
David Kidston, James P. Black, Thomas Kunz