Now showing items 1-17 of 17

    • Abstract Execution in a Multi-Tasking Environment 

      Mazières, David; Smith, Michael D. (1994)
      Tracing software execution is an important part of understanding system performance. Raw CPU power has been increasing at a rate far greater than memory and I/O bandwidth, with the result that the performance of client/server ...
    • Cache-Fair Thread Scheduling for Multicore Processors 

      Fedorova, Alexandra; Seltzer, Margo I.; Smith, Michael D. (2006)
      We present a new operating system scheduling algorithm for multicore processors. Our algorithm reduces the effects of unequal CPU cache sharing that occur on these processors and cause unfair CPU sharing, priority inversion, ...
    • A Comparative Analysis of Schemes for Correlated Branch Prediction 

      Young, Cliff; Gloy, Nicolas; Smith, Michael D. (1995)
      Modern high-performance architectures require extremely accurate branch prediction to overcome the performance limitations of conditional branches. We present a framework that categorizes branch prediction schemes by the ...
    • Eliminating voltage emergencies via software-guided code transformations 

      Reddi, Vijay Janapa; Campanoni, Simone; Gupta, Meeta S.; Smith, Michael D.; Wei, Gu-Yeon; Brooks, David M.; Hazelwood, Kim (Association for Computing Machinery (ACM), 2010)
      In recent years, circuit reliability in modern high-performance processors has become increasingly important. Shrinking feature sizes and diminishing supply voltages have made circuits more sensitive to microprocessor ...
    • Exploiting Temporal Consistency to Reduce False Positives in Host-Based, Collaborative Detection of Worms 

      Malan, David J.; Smith, Michael (Association for Computing Machinery, 2006)
      The speed of today’s worms demands automated detection, but the risk of false positives poses a difficult problem. In prior work, we proposed a host-based intrusion-detection system for worms that leveraged collaboration ...
    • Host-Based Detection of Worms through Peer-to-Peer Cooperation 

      Malan, David J.; Smith, Michael (Association for Computing Machinery, 2005)
      We propose a host-based, runtime defense against worms that achieves negligible risk of false positives through peer-to-peer cooperation. We view correlation among otherwise independent peers’ behavior as anomalous behavior, ...
    • The Impact of Operating System Structure on Personal Computer Performance 

      Chen, J. Bradley; Endo, Yashuhiro; Chan, Kee; Mazieres, David; Dias, Antonio; Seltzer, Margo I.; Smith, Michael D. (1995)
      This paper presents a comparative study of the performance of three operating systems that run on the personal computer architecture derived from the IBM-PC. The operating systems, Windows for Workgroups (tm), Windows NT ...
    • Implementing Public-Key Infrastructure for Sensor Networks 

      Malan, David; Welsh, Matt; Smith, Michael (Association for Computing Machinery, 2008)
      We present a critical evaluation of the first known implementation of elliptic curve cryptography over F<sub>2p</sub> for sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. We offer, along the way, a primer for ...
    • Improving Performance Isolation on Chip Multiprocessors via an Operating System Scheduler 

      Federova, Alexandra; Seltzer, Margo I.; Smith, Michael D. (IEEE Computer Society, 2007)
      We describe a new operating system scheduling algorithm that improves performance isolation on chip multiprocessors (CMP). Poor performance isolation occurs when an application’s performance is determined by the behaviour ...
    • Infrastructure for Research towards Ubiquitous Information Systems 

      Grosz, Barbara J.; Kung, H. T.; Seltzer, Margo I.; Shieber, Stuart Merrill; Smith, Michael D. (1994)
      The availability of fast, inexpensive computers and the growth of network technology have resulted in the proliferation of computing power and an enormous increase in information available in electronic form. However, most ...
    • Modeling the Effects of Memory Hierarchy Performance on Throughput of Multithreaded Processors 

      Fedorova, Alexandra; Seltzer, Margo I.; Smith, Michael D. (2005)
      Understanding the relationship between the performance of the on-chip processor caches and the overall performance of the processor is critical for both hardware design and software program optimization. While this ...
    • Performance issues in correlated branch prediction schemes 

      Gloy, Nicolas; Smith, Michael D.; Young, Cliff (1995)
      Accurate static branch prediction is the key to many techniques for exposing, enhancing, and exploiting Instruction Level Parallelism (ILP). The initial work on static correlated branch prediction (SCBP) demonstrated ...
    • A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography 

      Malan, David; Welsh, Matt; Smith, Michael (IEEE, 2004)
      We present the first known implementation of elliptic curve cryptography over F2p for sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. Through instrumentation of UC Berkeley's TinySec module, we argue that, ...
    • Quality and speed in linear-scan register allocation 

      Traub, Omri; Holloway, Glenn H.; Smith, Michael D. (1997)
      A linear-scan algorithm directs the global allocation of register candidates to registers based on a simple linear sweep over the program being compiled. This approach to register allocation makes sense for systems, such ...
    • SSDPOP: Improving the Privacy of DCOP with Secret Sharing 

      Smith, Michael; Grosz, Barbara; Greenstadt, Rachel (Association for Computing Machinery, 2007)
      Multi-agent systems designed to work collaboratively with groups of people typically require private information that people will entrust to them only if they have assurance that this information will be protected. Although ...
    • Voltage Noise in Production Processors 

      Janapa Reddi, Vijay; Kanev, Svilen; Kim, Wonyoung; Campanoni, Simone; Smith, Michael D.; Wei, Gu-Yeon; Brooks, David M. (Institute of Electrical & Electronics Engineers (IEEE), 2011)
      Voltage variations are a major challenge in processor design. Here, researchers characterize the voltage noise characteristics of programs as they run to completion on a production Core 2 Duo processor. Furthermore, they ...
    • Voltage Smoothing: Characterizing and Mitigating Voltage Noise in Production Processors via Software-Guided Thread Scheduling 

      Reddi, Vijay Janapa; Kanev, Svilen; Kim, Wonyoung; Campanoni, Simone; Smith, Michael D.; Wei, Gu-Yeon; Brooks, David M. (IEEE, 2010)
      Parameter variations have become a dominant challenge in microprocessor design. Voltage variation is especially daunting because it happens so rapidly. We measure and characterize voltage variation in a running Intel Core2 ...