Adaptive Operating System Design for High Throughput I/O
暂无分享,去创建一个
[1] Donald E. Knuth,et al. Structured Programming with go to Statements , 1974, CSUR.
[2] Herbert Bos,et al. Ruler: high-speed packet matching and rewriting on NPUs , 2007, ANCS '07.
[3] Noah Treuhaft,et al. Revisiting the Cache Interference Costs of Context Switching , 2007 .
[4] Ramesh Govindan,et al. Scheduling and IPC mechanisms for continuous media , 1991, SOSP '91.
[5] Larry L. Peterson,et al. Scout: a communications-oriented operating system , 1995, Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V).
[6] Kadangode K. Ramakrishnan,et al. Proceedings of the 3rd ACM/IEEE Symposium on Architecture for networking and communications systems , 2007 .
[7] Alan L. Cox,et al. An Evaluation of Network Stack Parallelization Strategies in Modern Operating Systems , 2006, USENIX Annual Technical Conference, General Track.
[8] Riccardo Poli,et al. Particle swarm optimization , 1995, Swarm Intelligence.
[9] Les Hatton,et al. Reexamining the Fault Density-Component Size Connection , 1997, IEEE Softw..
[10] R. Solomonott. Inductive Inference Theory - A Unified Approach to Problems in Pattern Recognition and Artificial Intelligence , 1975, IJCAI.
[11] Jennifer Widom,et al. STREAM: The Stanford Stream Data Manager , 2003, IEEE Data Eng. Bull..
[12] Alistair Craig Veitch,et al. A dynamically reconfigurable and extensible operating system , 1998 .
[13] David P. Anderson,et al. SETI@home: an experiment in public-resource computing , 2002, CACM.
[14] Nicolae Popovici,et al. Putting intel® threading building blocks to work , 2008, IWMSE '08.
[15] Herbert Bos,et al. Robust distributed systems achieving self-management through inference , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[16] Ian Graham,et al. Design principles for accurate passive measurement , 2000 .
[17] Jürgen Dingel,et al. A survey of self-management in dynamic software architecture specifications , 2004, WOSS '04.
[18] David A. Patterson,et al. Computer Architecture: A Quantitative Approach , 1969 .
[19] Arthur H. Veen,et al. Dataflow machine architecture , 1986, CSUR.
[20] Jeff Magee,et al. Self-Managed Systems: an Architectural Challenge , 2007, Future of Software Engineering (FOSE '07).
[21] Mendel Rosenblum,et al. Streamware: programming general-purpose multicore processors using streams , 2008, ASPLOS.
[22] Kees Verstoep,et al. Efficient reliable multicast on Myrinet , 1996, Proceedings of the 1996 ICPP Workshop on Challenges for Parallel Processing.
[23] Niklaus Wirth,et al. Program development by stepwise refinement , 1971, CACM.
[24] Kunle Olukotun,et al. The Future of Microprocessors , 2005, ACM Queue.
[25] James M. Bieman,et al. Open source software development: a case study of FreeBSD , 2004, 10th International Symposium on Software Metrics, 2004. Proceedings..
[26] Phil Winterbottom,et al. The design of the Inferno virtual machine , 1997 .
[27] A. Land,et al. An Automatic Method for Solving Discrete Programming Problems , 1960, 50 Years of Integer Programming.
[28] John K. Ousterhout,et al. Why Aren't Operating Systems Getting Faster As Fast as Hardware? , 1990, USENIX Summer.
[29] E KnuthDonald. Structured Programming with go to Statements , 1974 .
[30] Henri E. Bal,et al. NETIBIS: an efficient and dynamic communication system for heterogeneous grids , 2005, CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005..
[31] Deeparnab Chakrabarty,et al. Knapsack Problems , 2008 .
[32] Yuval Rabani,et al. Linear Programming , 2007, Handbook of Approximation Algorithms and Metaheuristics.
[33] Laxmi N. Bhuyan,et al. Compiling PCRE to FPGA for accelerating SNORT IDS , 2007, ANCS '07.
[34] L. Zadeh. Fuzzy sets as a basis for a theory of possibility , 1999 .
[35] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[36] Vikram A. Saletore,et al. Evaluating network processing efficiency with processor partitioning and asynchronous I/O , 2006, EuroSys.
[37] Ken Thompson,et al. Plan 9 from Bell Labs , 1995 .
[38] Herbert Bos,et al. FFPF: Fairly Fast Packet Filters , 2004, OSDI.
[39] Evangelos P. Markatos,et al. First-class user-level threads , 1991, SOSP '91.
[40] Alan L. Cox,et al. Optimizing network virtualization in Xen , 2006 .
[41] Volume 28 , 2003, Intensive Care Medicine.
[42] Aravind Seshadri,et al. A FAST ELITIST MULTIOBJECTIVE GENETIC ALGORITHM: NSGA-II , 2000 .
[43] George Varghese,et al. Automated Worm Fingerprinting , 2004, OSDI.
[44] John von Neumann,et al. First draft of a report on the EDVAC , 1993, IEEE Annals of the History of Computing.
[45] Samuel K. Moore,et al. Multicore is bad news for supercomputers , 2008 .
[46] Eric Eide,et al. Knit: component composition for systems software , 2000, OSDI.
[47] Dirk Beyer,et al. Don't Settle for Less Than the Best: Use Optimization to Make Decisions , 2007, HotOS.
[48] W. de Bruijn,et al. Scalable network monitors for high-speed links: a bottom-up approach , 2004, 2004 IEEE International Workshop on IP Operations and Management.
[49] Herbert Bos,et al. Beltway Buffers: Avoiding the OS Traffic Jam , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[50] Anne Rogers,et al. Hancock: a language for extracting signatures from data streams , 2000, KDD '00.
[51] Evi Nemeth,et al. Linux Administration Handbook , 1989 .
[52] Harold S. Stone,et al. Multiprocessor Scheduling with the Aid of Network Flow Algorithms , 1977, IEEE Transactions on Software Engineering.
[53] Michael G. Norman,et al. Models of machines and computation for mapping in multicomputers , 1993, CSUR.
[54] Larry L. Peterson,et al. VERA: an extensible router architecture , 2002, Comput. Networks.
[55] Ailsa H. Land,et al. An Automatic Method of Solving Discrete Programming Problems , 1960 .
[56] Marc G. Besselink,et al. Universiteit Leiden , 2003 .
[57] Raffaele Perego,et al. Minimizing network contention for mapping tasks onto massively parallel computers , 1995, Proceedings Euromicro Workshop on Parallel and Distributed Processing.
[58] Farnam Jahanian,et al. An extensible probe architecture for network protocol performance measurement , 1998, SIGCOMM '98.
[59] Herbert Bos,et al. Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card , 2005, RAID.
[60] C. V. Ramamoorthy,et al. Aspects of a Dynamically Adaptive Operating System , 1976, IEEE Transactions on Computers.
[61] Herbert Bos,et al. Safe kernel programming in the OKE , 2002, 2002 IEEE Open Architectures and Network Programming Proceedings. OPENARCH 2002 (Cat. No.02EX571).
[62] Larry L. Peterson,et al. PathFinder: A Pattern-Based Packet Classifier , 1994, OSDI.
[63] H. Isermann. Linear lexicographic optimization , 1982 .
[64] Grace A. Lewis,et al. Modernizing Legacy Systems - Software Technologies, Engineering Processes, and Business Practices , 2003, SEI series in software engineering.
[65] G. Amdhal,et al. Validity of the single processor approach to achieving large scale computing capabilities , 1967, AFIPS '67 (Spring).
[66] Nicholas Carriero,et al. Coordination languages and their significance , 1992, CACM.
[67] G.E. Moore,et al. Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.
[68] Joseph Pasquale,et al. Container shipping: operating system support for I/O-intensive applications , 1994, Computer.
[69] Claude Sammut,et al. Greedy Search , 2010, Encyclopedia of Machine Learning.
[70] Archana Ganapathi,et al. A case for machine learning to optimize multicore performance , 2009 .
[71] Brian N. Bershad,et al. Extensibility safety and performance in the SPIN operating system , 1995, SOSP.
[72] Setsuo Ohsuga,et al. INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES , 1977 .
[73] Robbert van Renesse,et al. Experiences with the Amoeba distributed operating system , 1990, CACM.
[74] Jeffrey C. Mogul,et al. The effect of context switches on cache performance , 1991, ASPLOS IV.
[75] Emin Gun Sirer. Heuristics Considered Harmful or Using Mathematical Optimization for Resource Management in Distributed Systems , 2005 .
[76] Andrew Warfield,et al. Safe Hardware Access with the Xen Virtual Machine Monitor , 2007 .
[77] William M. Waite,et al. Proceedings of the sixteenth ACM symposium on Operating systems principles , 1991, SOSP 1997.
[78] A. Retrospective,et al. The UNIX Time-sharing System , 1977 .
[79] Kathleen J. Mullen,et al. Agricultural Policies in India , 2018, OECD Food and Agricultural Reviews.
[80] Nicolas Beldiceanu,et al. Constraint Logic Programming , 1997 .
[81] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[82] Robert Grimm,et al. Application performance and flexibility on exokernel systems , 1997, SOSP.
[83] Henri E. Bal,et al. A comparative study of five parallel programming languages , 1992, Future Gener. Comput. Syst..
[84] D. Griffel. Linear programming 2: Theory and extensions , by G. B. Dantzig and M. N. Thapa. Pp. 408. £50.00. 2003 ISBN 0 387 00834 9 (Springer). , 2004, The Mathematical Gazette.
[85] Andrew Heybey,et al. Tribeca: A System for Managing Large Databases of Network Traffic , 1998, USENIX Annual Technical Conference.
[86] Yuan Yu,et al. Dryad: distributed data-parallel programs from sequential building blocks , 2007, EuroSys '07.
[87] Gerald J. Sussman,et al. Structure and interpretation of computer programs , 1985, Proceedings of the IEEE.
[88] Steven McCanne,et al. BPF+: exploiting global data-flow optimization in a generalized packet filter architecture , 1999, SIGCOMM '99.
[89] Willy Zwaenepoel,et al. IO-Lite: a unified I/O buffering and caching system , 1999, TOCS.
[90] Yasuhiko Yokote,et al. Adaptive Operating System Design using Reflection , 1995, OBPDC.
[91] Peter H. Salus,et al. A quarter century of UNIX , 1994 .
[92] Steven Ericsson Zenith. Ease; the model and its implementation , 1993, SIGP.
[93] Christoph Kreitz,et al. Building reliable, high-performance communication systems from components , 2000, OPSR.
[94] Alexandra Fedorova,et al. Throughput-Oriented Scheduling On Chip Multithreadi ng Systems , 2004 .
[95] Yitzchak M. Gottlieb,et al. Building a robust software-based router using network processors , 2001, SOSP.
[96] Virginia Mary Lo,et al. Temporal Communication Graphs: Lamport's Process-Time Graphs Augmented for the Purpose of Mapping and Scheduling , 1992, J. Parallel Distributed Comput..
[97] Larry L. Peterson,et al. Beyond micro-kernel design: decoupling modularity and protection in Lipto , 1992, [1992] Proceedings of the 12th International Conference on Distributed Computing Systems.
[98] David H. Wolpert,et al. No free lunch theorems for optimization , 1997, IEEE Trans. Evol. Comput..
[99] Michael Stonebraker,et al. Monitoring Streams - A New Class of Data Management Applications , 2002, VLDB.
[100] Andrew S. Grimshaw,et al. Legion-a view from 50,000 feet , 1996, Proceedings of 5th IEEE International Symposium on High Performance Distributed Computing.
[101] Rajkumar Buyya,et al. A taxonomy and survey of grid resource management systems for distributed computing , 2002, Softw. Pract. Exp..
[102] Thiemo Voigt,et al. SILK: Scout Paths in the Linux Kernel , 2001 .
[103] H. Bos,et al. Packet monitoring at high speed with FFPF ( Technical Report ) , 2022 .
[104] Calton Pu,et al. Optimistic incremental specialization: streamlining a commercial operating system , 1995, SOSP.
[105] John W. Backus,et al. Can programming be liberated from the von Neumann style?: a functional style and its algebra of programs , 1978, CACM.
[106] Mihai Lucian Cristea,et al. Parallel and distributed processing in high speed traffic monitoring , 2008 .
[107] Dennis M. Ritchie,et al. A stream input-output system , 1990 .
[108] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[109] Erich M. Nahum,et al. Performance issues in parallelized network protocols , 1994, OSDI '94.
[110] Éva Tardos,et al. Approximation algorithms for classification problems with pairwise relationships: metric labeling and Markov random fields , 2002, JACM.
[111] Herbert Bos,et al. FPL-3: Towards Language Support for Distributed Packet Processing , 2005, NETWORKING.
[112] José Carlos Brustoloni,et al. Effects of buffering semantics on I/O performance , 1996, OSDI '96.
[113] Edsger W. Dijkstra,et al. A note on two problems in connexion with graphs , 1959, Numerische Mathematik.
[114] Larry L. Peterson,et al. The x-Kernel: An Architecture for Implementing Network Protocols , 1991, IEEE Trans. Software Eng..
[115] Eddie Kohler,et al. The Click modular router , 1999, SOSP.
[116] Sun Fire V20z. Sun Microsystems , 1996 .
[117] David Gelernter,et al. Generative communication in Linda , 1985, TOPL.
[118] kc claffy,et al. The nature of the beast: Recent traffic measurements from an Internet backbone , 1998 .
[119] Mike Hibler,et al. FLEX: a tool for building efficient and flexible systems , 1993, Proceedings of IEEE 4th Workshop on Workstation Operating Systems. WWOS-III.
[120] Marco Laumanns,et al. SPEA2: Improving the Strength Pareto Evolutionary Algorithm For Multiobjective Optimization , 2002 .
[121] William Thies,et al. Cache aware optimization of stream programs , 2005, LCTES '05.
[122] Maged M. Michael,et al. Simple, fast, and practical non-blocking and blocking concurrent queue algorithms , 1996, PODC '96.
[123] Thom W. Frühwirth,et al. Contraint Logic Programming - An Informal Introduction , 1992, Logic Programming Summer School.
[124] Larry L. Peterson,et al. Fbufs: a high-bandwidth cross-domain transfer facility , 1994, SOSP '93.
[125] Moussa Larbani,et al. On the Pareto Optimality in Goal Programming , 2007 .
[126] Steven McCanne,et al. The BSD Packet Filter: A New Architecture for User-level Packet Capture , 1993, USENIX Winter.
[127] Farhad Arbab,et al. The IWIM Model for Coordination of Concurrent Activities , 1996, COORDINATION.
[128] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.
[129] J. van Leeuwen,et al. Logic Programming , 2002, Lecture Notes in Computer Science.
[130] Rajkumar Buyya,et al. A taxonomy of scientific workflow systems for grid computing , 2005, SGMD.
[131] Luca Cardelli,et al. Squeak: a language for communicating with mice , 1985, SIGGRAPH.
[132] Akinori Yonezawa,et al. Virtual private grid: a command shell for utilizing hundreds of machines efficiently , 2003, Future Gener. Comput. Syst..
[133] RaphaelBertram,et al. Correction to "A Formal Basis for the Heuristic Determination of Minimum Cost Paths" , 1972 .
[134] Rajiv D. Banker,et al. Software complexity and maintenance costs , 1993, CACM.
[135] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[136] Ying Xing,et al. The Design of the Borealis Stream Processing Engine , 2005, CIDR.
[137] Herbert Bos,et al. The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[138] W. de Bruijn,et al. Model-T: Rethinking the OS for terabit speeds , 2008, IEEE INFOCOM Workshops 2008.
[139] David D. Clark,et al. Architectural considerations for a new generation of protocols , 1990, SIGCOMM '90.
[140] Dhabaleswar K. Panda,et al. High Performance VMM-Bypass I/O in Virtual Machines , 2006, USENIX Annual Technical Conference, General Track.
[141] John W. Romein,et al. Astronomical real-time streaming signal processing on a Blue Gene/L supercomputer , 2006, SPAA '06.
[142] A. Gnauck,et al. 25.6-Tb/s WDM Transmission of Polarization-Multiplexed RZ-DQPSK Signals , 2008, Journal of Lightwave Technology.
[143] Bratin Saha,et al. Enabling scalability and performance in a large scale CMP environment , 2007, EuroSys '07.
[144] Dawson R. Engler,et al. DPF: Fast, Flexible Message Demultiplexing Using Dynamic Code Generation , 1996, SIGCOMM.
[145] Stuart Dreyfus,et al. Richard Bellman on the Birth of Dynamic Programming , 2002, Oper. Res..
[146] M. R. Rao,et al. Combinatorial Optimization , 1992, NATO ASI Series.
[147] George B. Dantzig,et al. Linear Programming Under Uncertainty , 2004, Manag. Sci..
[148] Jon Stokes. Inside the Machine: An Illustrated Introduction to Microprocessors and Computer Architecture , 2006 .
[149] Sally A. McKee,et al. Reflections on the memory wall , 2004, CF '04.
[150] L. A. Schmit,et al. Structural synthesis - Its genesis and development , 1981 .
[151] James Newsome,et al. Polygraph: automatically generating signatures for polymorphic worms , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[152] Hans A. Eschenauer,et al. Multicriteria Optimization Techniques for Highly Accurate Focusing Systems , 1988 .
[153] Robert A. Kowalski,et al. Predicate Logic as Programming Language , 1974, IFIP Congress.
[154] Thomas G. Dietterich. What is machine learning? , 2020, Archives of Disease in Childhood.
[155] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.
[156] Anant Agarwal,et al. Factored operating systems (fos): the case for a scalable operating system for multicores , 2009, OPSR.
[157] Marco Dorigo,et al. Ant system: optimization by a colony of cooperating agents , 1996, IEEE Trans. Syst. Man Cybern. Part B.
[158] Jonathan M. Smith,et al. Hardware/Software Organization of a High-Performance ATM Host Interface , 1993, IEEE J. Sel. Areas Commun..
[159] Tong Li,et al. Efficient operating system scheduling for performance-asymmetric multi-core architectures , 2007, Proceedings of the 2007 ACM/IEEE Conference on Supercomputing (SC '07).
[160] Leon Gommans,et al. The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts , 2007, Networking.
[161] Herbert Bos,et al. SafeCard: A Gigabit IPS on the Network Card , 2006, RAID.
[162] Joseph S. Sventek,et al. Real-time Detection of Grid Bulk Transfer Traffic , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.
[163] Bronwyn H. Hall,et al. 1, Overview , 2019, Elementary Mathematical Models.
[164] Adrian Schüpbach,et al. Embracing diversity in the Barrelfish manycore operating system , 2008 .
[165] Sally A. McKee,et al. Hitting the memory wall: implications of the obvious , 1995, CARN.
[166] J. Mixter. Fast , 2012 .
[167] A. N. Kolmogorov,et al. Foundations of the theory of probability , 1960 .
[168] Sean R Eddy,et al. What is dynamic programming? , 2004, Nature Biotechnology.
[169] S RosenblumDavid,et al. An Architecture-Based Approach to Self-Adaptive Software , 1999 .
[170] Anders Krogh,et al. Introduction to the theory of neural computation , 1994, The advanced book program.
[171] Samuel Williams,et al. The Landscape of Parallel Computing Research: A View from Berkeley , 2006 .
[172] David D. Clark,et al. The structuring of systems using upcalls , 1985, SOSP '85.
[173] David A. Patterson. The parallel computing landscape: a Berkeley view , 2007, Proceedings of the 2007 international symposium on Low power electronics and design (ISLPED '07).
[174] K. B. Williams,et al. Management Models and Industrial Applications of Linear Programming , 1962 .