Adaptive Operating System Design for High Throughput I/O

[1]  Donald E. Knuth,et al.  Structured Programming with go to Statements , 1974, CSUR.

[2]  Herbert Bos,et al.  Ruler: high-speed packet matching and rewriting on NPUs , 2007, ANCS '07.

[3]  Noah Treuhaft,et al.  Revisiting the Cache Interference Costs of Context Switching , 2007 .

[4]  Ramesh Govindan,et al.  Scheduling and IPC mechanisms for continuous media , 1991, SOSP '91.

[5]  Larry L. Peterson,et al.  Scout: a communications-oriented operating system , 1995, Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V).

[6]  Kadangode K. Ramakrishnan,et al.  Proceedings of the 3rd ACM/IEEE Symposium on Architecture for networking and communications systems , 2007 .

[7]  Alan L. Cox,et al.  An Evaluation of Network Stack Parallelization Strategies in Modern Operating Systems , 2006, USENIX Annual Technical Conference, General Track.

[8]  Riccardo Poli,et al.  Particle swarm optimization , 1995, Swarm Intelligence.

[9]  Les Hatton,et al.  Reexamining the Fault Density-Component Size Connection , 1997, IEEE Softw..

[10]  R. Solomonott Inductive Inference Theory - A Unified Approach to Problems in Pattern Recognition and Artificial Intelligence , 1975, IJCAI.

[11]  Jennifer Widom,et al.  STREAM: The Stanford Stream Data Manager , 2003, IEEE Data Eng. Bull..

[12]  Alistair Craig Veitch,et al.  A dynamically reconfigurable and extensible operating system , 1998 .

[13]  David P. Anderson,et al.  SETI@home: an experiment in public-resource computing , 2002, CACM.

[14]  Nicolae Popovici,et al.  Putting intel® threading building blocks to work , 2008, IWMSE '08.

[15]  Herbert Bos,et al.  Robust distributed systems achieving self-management through inference , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[16]  Ian Graham,et al.  Design principles for accurate passive measurement , 2000 .

[17]  Jürgen Dingel,et al.  A survey of self-management in dynamic software architecture specifications , 2004, WOSS '04.

[18]  David A. Patterson,et al.  Computer Architecture: A Quantitative Approach , 1969 .

[19]  Arthur H. Veen,et al.  Dataflow machine architecture , 1986, CSUR.

[20]  Jeff Magee,et al.  Self-Managed Systems: an Architectural Challenge , 2007, Future of Software Engineering (FOSE '07).

[21]  Mendel Rosenblum,et al.  Streamware: programming general-purpose multicore processors using streams , 2008, ASPLOS.

[22]  Kees Verstoep,et al.  Efficient reliable multicast on Myrinet , 1996, Proceedings of the 1996 ICPP Workshop on Challenges for Parallel Processing.

[23]  Niklaus Wirth,et al.  Program development by stepwise refinement , 1971, CACM.

[24]  Kunle Olukotun,et al.  The Future of Microprocessors , 2005, ACM Queue.

[25]  James M. Bieman,et al.  Open source software development: a case study of FreeBSD , 2004, 10th International Symposium on Software Metrics, 2004. Proceedings..

[26]  Phil Winterbottom,et al.  The design of the Inferno virtual machine , 1997 .

[27]  A. Land,et al.  An Automatic Method for Solving Discrete Programming Problems , 1960, 50 Years of Integer Programming.

[28]  John K. Ousterhout,et al.  Why Aren't Operating Systems Getting Faster As Fast as Hardware? , 1990, USENIX Summer.

[29]  E KnuthDonald Structured Programming with go to Statements , 1974 .

[30]  Henri E. Bal,et al.  NETIBIS: an efficient and dynamic communication system for heterogeneous grids , 2005, CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005..

[31]  Deeparnab Chakrabarty,et al.  Knapsack Problems , 2008 .

[32]  Yuval Rabani,et al.  Linear Programming , 2007, Handbook of Approximation Algorithms and Metaheuristics.

[33]  Laxmi N. Bhuyan,et al.  Compiling PCRE to FPGA for accelerating SNORT IDS , 2007, ANCS '07.

[34]  L. Zadeh Fuzzy sets as a basis for a theory of possibility , 1999 .

[35]  Thomas Henry Ptacek,et al.  Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .

[36]  Vikram A. Saletore,et al.  Evaluating network processing efficiency with processor partitioning and asynchronous I/O , 2006, EuroSys.

[37]  Ken Thompson,et al.  Plan 9 from Bell Labs , 1995 .

[38]  Herbert Bos,et al.  FFPF: Fairly Fast Packet Filters , 2004, OSDI.

[39]  Evangelos P. Markatos,et al.  First-class user-level threads , 1991, SOSP '91.

[40]  Alan L. Cox,et al.  Optimizing network virtualization in Xen , 2006 .

[41]  Volume 28 , 2003, Intensive Care Medicine.

[42]  Aravind Seshadri,et al.  A FAST ELITIST MULTIOBJECTIVE GENETIC ALGORITHM: NSGA-II , 2000 .

[43]  George Varghese,et al.  Automated Worm Fingerprinting , 2004, OSDI.

[44]  John von Neumann,et al.  First draft of a report on the EDVAC , 1993, IEEE Annals of the History of Computing.

[45]  Samuel K. Moore,et al.  Multicore is bad news for supercomputers , 2008 .

[46]  Eric Eide,et al.  Knit: component composition for systems software , 2000, OSDI.

[47]  Dirk Beyer,et al.  Don't Settle for Less Than the Best: Use Optimization to Make Decisions , 2007, HotOS.

[48]  W. de Bruijn,et al.  Scalable network monitors for high-speed links: a bottom-up approach , 2004, 2004 IEEE International Workshop on IP Operations and Management.

[49]  Herbert Bos,et al.  Beltway Buffers: Avoiding the OS Traffic Jam , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[50]  Anne Rogers,et al.  Hancock: a language for extracting signatures from data streams , 2000, KDD '00.

[51]  Evi Nemeth,et al.  Linux Administration Handbook , 1989 .

[52]  Harold S. Stone,et al.  Multiprocessor Scheduling with the Aid of Network Flow Algorithms , 1977, IEEE Transactions on Software Engineering.

[53]  Michael G. Norman,et al.  Models of machines and computation for mapping in multicomputers , 1993, CSUR.

[54]  Larry L. Peterson,et al.  VERA: an extensible router architecture , 2002, Comput. Networks.

[55]  Ailsa H. Land,et al.  An Automatic Method of Solving Discrete Programming Problems , 1960 .

[56]  Marc G. Besselink,et al.  Universiteit Leiden , 2003 .

[57]  Raffaele Perego,et al.  Minimizing network contention for mapping tasks onto massively parallel computers , 1995, Proceedings Euromicro Workshop on Parallel and Distributed Processing.

[58]  Farnam Jahanian,et al.  An extensible probe architecture for network protocol performance measurement , 1998, SIGCOMM '98.

[59]  Herbert Bos,et al.  Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card , 2005, RAID.

[60]  C. V. Ramamoorthy,et al.  Aspects of a Dynamically Adaptive Operating System , 1976, IEEE Transactions on Computers.

[61]  Herbert Bos,et al.  Safe kernel programming in the OKE , 2002, 2002 IEEE Open Architectures and Network Programming Proceedings. OPENARCH 2002 (Cat. No.02EX571).

[62]  Larry L. Peterson,et al.  PathFinder: A Pattern-Based Packet Classifier , 1994, OSDI.

[63]  H. Isermann Linear lexicographic optimization , 1982 .

[64]  Grace A. Lewis,et al.  Modernizing Legacy Systems - Software Technologies, Engineering Processes, and Business Practices , 2003, SEI series in software engineering.

[65]  G. Amdhal,et al.  Validity of the single processor approach to achieving large scale computing capabilities , 1967, AFIPS '67 (Spring).

[66]  Nicholas Carriero,et al.  Coordination languages and their significance , 1992, CACM.

[67]  G.E. Moore,et al.  Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.

[68]  Joseph Pasquale,et al.  Container shipping: operating system support for I/O-intensive applications , 1994, Computer.

[69]  Claude Sammut,et al.  Greedy Search , 2010, Encyclopedia of Machine Learning.

[70]  Archana Ganapathi,et al.  A case for machine learning to optimize multicore performance , 2009 .

[71]  Brian N. Bershad,et al.  Extensibility safety and performance in the SPIN operating system , 1995, SOSP.

[72]  Setsuo Ohsuga,et al.  INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES , 1977 .

[73]  Robbert van Renesse,et al.  Experiences with the Amoeba distributed operating system , 1990, CACM.

[74]  Jeffrey C. Mogul,et al.  The effect of context switches on cache performance , 1991, ASPLOS IV.

[75]  Emin Gun Sirer Heuristics Considered Harmful or Using Mathematical Optimization for Resource Management in Distributed Systems , 2005 .

[76]  Andrew Warfield,et al.  Safe Hardware Access with the Xen Virtual Machine Monitor , 2007 .

[77]  William M. Waite,et al.  Proceedings of the sixteenth ACM symposium on Operating systems principles , 1991, SOSP 1997.

[78]  A. Retrospective,et al.  The UNIX Time-sharing System , 1977 .

[79]  Kathleen J. Mullen,et al.  Agricultural Policies in India , 2018, OECD Food and Agricultural Reviews.

[80]  Nicolas Beldiceanu,et al.  Constraint Logic Programming , 1997 .

[81]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[82]  Robert Grimm,et al.  Application performance and flexibility on exokernel systems , 1997, SOSP.

[83]  Henri E. Bal,et al.  A comparative study of five parallel programming languages , 1992, Future Gener. Comput. Syst..

[84]  D. Griffel Linear programming 2: Theory and extensions , by G. B. Dantzig and M. N. Thapa. Pp. 408. £50.00. 2003 ISBN 0 387 00834 9 (Springer). , 2004, The Mathematical Gazette.

[85]  Andrew Heybey,et al.  Tribeca: A System for Managing Large Databases of Network Traffic , 1998, USENIX Annual Technical Conference.

[86]  Yuan Yu,et al.  Dryad: distributed data-parallel programs from sequential building blocks , 2007, EuroSys '07.

[87]  Gerald J. Sussman,et al.  Structure and interpretation of computer programs , 1985, Proceedings of the IEEE.

[88]  Steven McCanne,et al.  BPF+: exploiting global data-flow optimization in a generalized packet filter architecture , 1999, SIGCOMM '99.

[89]  Willy Zwaenepoel,et al.  IO-Lite: a unified I/O buffering and caching system , 1999, TOCS.

[90]  Yasuhiko Yokote,et al.  Adaptive Operating System Design using Reflection , 1995, OBPDC.

[91]  Peter H. Salus,et al.  A quarter century of UNIX , 1994 .

[92]  Steven Ericsson Zenith Ease; the model and its implementation , 1993, SIGP.

[93]  Christoph Kreitz,et al.  Building reliable, high-performance communication systems from components , 2000, OPSR.

[94]  Alexandra Fedorova,et al.  Throughput-Oriented Scheduling On Chip Multithreadi ng Systems , 2004 .

[95]  Yitzchak M. Gottlieb,et al.  Building a robust software-based router using network processors , 2001, SOSP.

[96]  Virginia Mary Lo,et al.  Temporal Communication Graphs: Lamport's Process-Time Graphs Augmented for the Purpose of Mapping and Scheduling , 1992, J. Parallel Distributed Comput..

[97]  Larry L. Peterson,et al.  Beyond micro-kernel design: decoupling modularity and protection in Lipto , 1992, [1992] Proceedings of the 12th International Conference on Distributed Computing Systems.

[98]  David H. Wolpert,et al.  No free lunch theorems for optimization , 1997, IEEE Trans. Evol. Comput..

[99]  Michael Stonebraker,et al.  Monitoring Streams - A New Class of Data Management Applications , 2002, VLDB.

[100]  Andrew S. Grimshaw,et al.  Legion-a view from 50,000 feet , 1996, Proceedings of 5th IEEE International Symposium on High Performance Distributed Computing.

[101]  Rajkumar Buyya,et al.  A taxonomy and survey of grid resource management systems for distributed computing , 2002, Softw. Pract. Exp..

[102]  Thiemo Voigt,et al.  SILK: Scout Paths in the Linux Kernel , 2001 .

[103]  H. Bos,et al.  Packet monitoring at high speed with FFPF ( Technical Report ) , 2022 .

[104]  Calton Pu,et al.  Optimistic incremental specialization: streamlining a commercial operating system , 1995, SOSP.

[105]  John W. Backus,et al.  Can programming be liberated from the von Neumann style?: a functional style and its algebra of programs , 1978, CACM.

[106]  Mihai Lucian Cristea,et al.  Parallel and distributed processing in high speed traffic monitoring , 2008 .

[107]  Dennis M. Ritchie,et al.  A stream input-output system , 1990 .

[108]  Vern Paxson,et al.  How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.

[109]  Erich M. Nahum,et al.  Performance issues in parallelized network protocols , 1994, OSDI '94.

[110]  Éva Tardos,et al.  Approximation algorithms for classification problems with pairwise relationships: metric labeling and Markov random fields , 2002, JACM.

[111]  Herbert Bos,et al.  FPL-3: Towards Language Support for Distributed Packet Processing , 2005, NETWORKING.

[112]  José Carlos Brustoloni,et al.  Effects of buffering semantics on I/O performance , 1996, OSDI '96.

[113]  Edsger W. Dijkstra,et al.  A note on two problems in connexion with graphs , 1959, Numerische Mathematik.

[114]  Larry L. Peterson,et al.  The x-Kernel: An Architecture for Implementing Network Protocols , 1991, IEEE Trans. Software Eng..

[115]  Eddie Kohler,et al.  The Click modular router , 1999, SOSP.

[116]  Sun Fire V20z Sun Microsystems , 1996 .

[117]  David Gelernter,et al.  Generative communication in Linda , 1985, TOPL.

[118]  kc claffy,et al.  The nature of the beast: Recent traffic measurements from an Internet backbone , 1998 .

[119]  Mike Hibler,et al.  FLEX: a tool for building efficient and flexible systems , 1993, Proceedings of IEEE 4th Workshop on Workstation Operating Systems. WWOS-III.

[120]  Marco Laumanns,et al.  SPEA2: Improving the Strength Pareto Evolutionary Algorithm For Multiobjective Optimization , 2002 .

[121]  William Thies,et al.  Cache aware optimization of stream programs , 2005, LCTES '05.

[122]  Maged M. Michael,et al.  Simple, fast, and practical non-blocking and blocking concurrent queue algorithms , 1996, PODC '96.

[123]  Thom W. Frühwirth,et al.  Contraint Logic Programming - An Informal Introduction , 1992, Logic Programming Summer School.

[124]  Larry L. Peterson,et al.  Fbufs: a high-bandwidth cross-domain transfer facility , 1994, SOSP '93.

[125]  Moussa Larbani,et al.  On the Pareto Optimality in Goal Programming , 2007 .

[126]  Steven McCanne,et al.  The BSD Packet Filter: A New Architecture for User-level Packet Capture , 1993, USENIX Winter.

[127]  Farhad Arbab,et al.  The IWIM Model for Coordination of Concurrent Activities , 1996, COORDINATION.

[128]  Joan Feigenbaum,et al.  The KeyNote Trust-Management System Version 2 , 1999, RFC.

[129]  J. van Leeuwen,et al.  Logic Programming , 2002, Lecture Notes in Computer Science.

[130]  Rajkumar Buyya,et al.  A taxonomy of scientific workflow systems for grid computing , 2005, SGMD.

[131]  Luca Cardelli,et al.  Squeak: a language for communicating with mice , 1985, SIGGRAPH.

[132]  Akinori Yonezawa,et al.  Virtual private grid: a command shell for utilizing hundreds of machines efficiently , 2003, Future Gener. Comput. Syst..

[133]  RaphaelBertram,et al.  Correction to "A Formal Basis for the Heuristic Determination of Minimum Cost Paths" , 1972 .

[134]  Rajiv D. Banker,et al.  Software complexity and maintenance costs , 1993, CACM.

[135]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[136]  Ying Xing,et al.  The Design of the Borealis Stream Processing Engine , 2005, CIDR.

[137]  Herbert Bos,et al.  The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[138]  W. de Bruijn,et al.  Model-T: Rethinking the OS for terabit speeds , 2008, IEEE INFOCOM Workshops 2008.

[139]  David D. Clark,et al.  Architectural considerations for a new generation of protocols , 1990, SIGCOMM '90.

[140]  Dhabaleswar K. Panda,et al.  High Performance VMM-Bypass I/O in Virtual Machines , 2006, USENIX Annual Technical Conference, General Track.

[141]  John W. Romein,et al.  Astronomical real-time streaming signal processing on a Blue Gene/L supercomputer , 2006, SPAA '06.

[142]  A. Gnauck,et al.  25.6-Tb/s WDM Transmission of Polarization-Multiplexed RZ-DQPSK Signals , 2008, Journal of Lightwave Technology.

[143]  Bratin Saha,et al.  Enabling scalability and performance in a large scale CMP environment , 2007, EuroSys '07.

[144]  Dawson R. Engler,et al.  DPF: Fast, Flexible Message Demultiplexing Using Dynamic Code Generation , 1996, SIGCOMM.

[145]  Stuart Dreyfus,et al.  Richard Bellman on the Birth of Dynamic Programming , 2002, Oper. Res..

[146]  M. R. Rao,et al.  Combinatorial Optimization , 1992, NATO ASI Series.

[147]  George B. Dantzig,et al.  Linear Programming Under Uncertainty , 2004, Manag. Sci..

[148]  Jon Stokes Inside the Machine: An Illustrated Introduction to Microprocessors and Computer Architecture , 2006 .

[149]  Sally A. McKee,et al.  Reflections on the memory wall , 2004, CF '04.

[150]  L. A. Schmit,et al.  Structural synthesis - Its genesis and development , 1981 .

[151]  James Newsome,et al.  Polygraph: automatically generating signatures for polymorphic worms , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[152]  Hans A. Eschenauer,et al.  Multicriteria Optimization Techniques for Highly Accurate Focusing Systems , 1988 .

[153]  Robert A. Kowalski,et al.  Predicate Logic as Programming Language , 1974, IFIP Congress.

[154]  Thomas G. Dietterich What is machine learning? , 2020, Archives of Disease in Childhood.

[155]  C. A. R. Hoare,et al.  Communicating sequential processes , 1978, CACM.

[156]  Anant Agarwal,et al.  Factored operating systems (fos): the case for a scalable operating system for multicores , 2009, OPSR.

[157]  Marco Dorigo,et al.  Ant system: optimization by a colony of cooperating agents , 1996, IEEE Trans. Syst. Man Cybern. Part B.

[158]  Jonathan M. Smith,et al.  Hardware/Software Organization of a High-Performance ATM Host Interface , 1993, IEEE J. Sel. Areas Commun..

[159]  Tong Li,et al.  Efficient operating system scheduling for performance-asymmetric multi-core architectures , 2007, Proceedings of the 2007 ACM/IEEE Conference on Supercomputing (SC '07).

[160]  Leon Gommans,et al.  The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts , 2007, Networking.

[161]  Herbert Bos,et al.  SafeCard: A Gigabit IPS on the Network Card , 2006, RAID.

[162]  Joseph S. Sventek,et al.  Real-time Detection of Grid Bulk Transfer Traffic , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.

[163]  Bronwyn H. Hall,et al.  1, Overview , 2019, Elementary Mathematical Models.

[164]  Adrian Schüpbach,et al.  Embracing diversity in the Barrelfish manycore operating system , 2008 .

[165]  Sally A. McKee,et al.  Hitting the memory wall: implications of the obvious , 1995, CARN.

[166]  J. Mixter Fast , 2012 .

[167]  A. N. Kolmogorov,et al.  Foundations of the theory of probability , 1960 .

[168]  Sean R Eddy,et al.  What is dynamic programming? , 2004, Nature Biotechnology.

[169]  S RosenblumDavid,et al.  An Architecture-Based Approach to Self-Adaptive Software , 1999 .

[170]  Anders Krogh,et al.  Introduction to the theory of neural computation , 1994, The advanced book program.

[171]  Samuel Williams,et al.  The Landscape of Parallel Computing Research: A View from Berkeley , 2006 .

[172]  David D. Clark,et al.  The structuring of systems using upcalls , 1985, SOSP '85.

[173]  David A. Patterson The parallel computing landscape: a Berkeley view , 2007, Proceedings of the 2007 international symposium on Low power electronics and design (ISLPED '07).

[174]  K. B. Williams,et al.  Management Models and Industrial Applications of Linear Programming , 1962 .