Now showing items 41-60 of 92

    • Issues in Extensible Operating Systems 

      Seltzer, Margo I.; Endo, Yasuhiro; Small, Christopher A.; Smith, Keith A. (1997)
      Operating systems research has traditionally consisted of adding functionality to the operating system or inventing and evaluating new methods for performing functions. Regardless of the research goal, the single constant ...
    • Layering in Provenance Systems 

      Muniswamy-Reddy, Kiran-Kumar; Braun, Uri Jacob; Holland, David A; Macko, Peter; Maclean, Diana; Margo, Daniel Wyatt; Seltzer, Margo I.; Smogor, Robin (USENIX Association, 2009)
      Digital provenance describes the ancestry or history of a digital object. Most existing provenance systems, however, operate at only one level of abstraction: the sys- tem call layer, a workflow specification, or the ...
    • Layering in Provenance-Aware Storage Systems 

      Muniswamy-Reddy, Kiran-Kumar; Barillari, Joseph; Braun, Uri; Holland, David A; Maclean, Diana; Seltzer, Margo I.; Holland, Stephen D. (2008)
      Digital provenance describes the ancestry or history of a digital document. Provenance provides answers to questions such as: “How does the ancestry of these objects differ?” “Are there source code files tainted by proprietary ...
    • Limiting Disclosure in Annotated Graphs 

      Braun, Uri Jacob (2014-06-06)
      Data is increasingly represented in annotated graphs, but graphs pose novel security and privacy challenges that at present lack solutions. We begin by identifying the new challenges graphs introduce and explain why existing ...
    • LLAMA: A Persistent, Mutable Representation for Graphs 

      Macko, Peter (2015-01-16)
      Graph-structured data is large, ever-changing, and ubiquitous. These features demand that graph analytic applications both compute on and modify large graphs efficiently, and it is also beneficial for analysts to be able ...
    • LLAMA: Efficient graph analytics using Large Multiversioned Arrays 

      Macko, Peter; Marathe, Virendra J.; Margo, Daniel Wyatt; Seltzer, Margo I. (IEEE, 2015)
      We present LLAMA, a graph storage and analysis system that supports mutability and out-of-memory execution. LLAMA performs comparably to immutable main-memory analysis systems for graphs that fit in memory and significantly ...
    • Local clustering in provenance graphs 

      Macko, Peter; Margo, Daniel Wyatt; Seltzer, Margo I. (ACM Press, 2013)
      Systems that capture and store data provenance, the record of how an object has arrived at its current state, accumulate historical metadata over time, forming a large graph. Local clustering in these graphs, in which we ...
    • Local Clustering in Provenance Graphs (Extended Version) 

      Macko, Peter; Margo, Daniel Wyatt; Seltzer, Margo I. (2013)
      Systems that capture and store data provenance, the record of how an object has arrived at its current state, accumulate historical metadata over time, forming a large graph. Local clustering in these graphs, in which we ...
    • Logging versus Soft Updates: Asynchronous Meta-data Protection in File Systems 

      Seltzer, Margo I.; Granger, Gregory R.; McKusick, M. Kirk; Smith, Keith A.; Soules, Craig A. N.; Stein, Christopher A. (1999)
      The UNIX Fast File System (FFS) is probably the most widely-used file system for performance comparisons. However, such comparisons frequently overlook many of the performance enhancements that have been added over the ...
    • Making a Cloud Provenance-Aware 

      Muniswamy-Reddy, Kiran-Kumar; Macko, Peter; Seltzer, Margo I. (USENIX Association, 2009)
      The advent of cloud computing provides a cheap and convenient mechanism for scientists to share data. The utility of such data is obviously enhanced when the provenance of the data is also available. The cloud, while ...
    • Making the Most out of Direct-Access Network Attached Storage 

      Magoutis, Kostas; Addetia, Salimah; Fedorova, Alexandra; Seltzer, Margo (USENIX, 2003)
      The performance of high-speed network-attached storage applications is often limited by end-system overhead, caused primarily by memory copying and network protocol processing. In this paper, we examine alternative ...
    • Mining the Web for Medical Hypothesis: A Proof-of-Concept System 

      Maclean, Diana; Seltzer, Margo I. (2012-05-14)
      As the prevalence of blogs, discussion forums, and online news services continues to grow, so too does the portion of this Web content that relates to health and medicine. We propose that everyday, medically-oriented Web ...
    • Modeling the Effects of Memory Hierarchy Performance on Throughput of Multithreaded Processors 

      Fedorova, Alexandra; Seltzer, Margo I.; Smith, Michael D. (2005)
      Understanding the relationship between the performance of the on-chip processor caches and the overall performance of the processor is critical for both hardware design and software program optimization. While this ...
    • MOSS: A Mobile Operating System Substrate 

      Chen, J. Bradley; Kung, H. T.; Seltzer, Margo I. (1995)
      The Mobile Operating System Substrate (MOSS) is a new system architecture for wireless mobile computing being developed at Harvard. MOSS provides highly efficient, robust and flexible virtual device access over wireless ...
    • The Mug-Shot Search Problem 

      Baker, Ellie; Seltzer, Margo I. (1997)
      Mug-shot search is the classic example of the general problem of searching a large facial image database when starting out with only a mental image of the sought-after face. We have implemented a prototype content-based ...
    • Multicore OSes: Looking Forward from 1991, er, 2011 

      Holland, David A; Seltzer, Margo I. (USENIX Association, 2011)
      Upcoming multicore processors, with hundreds of cores or more in a single chip, require a degree of parallel scalability that is not currently available in today’s system software. Based on prior experience in the ...
    • New NFS Tracing Tools and Techniques for System Analysis 

      Ellard, Daniel; Seltzer, Margo (USENIX Association, 2003)
      Passive NFS traces provide an easy and unobtrusive way to measure, analyze, and gain an understanding of an NFS workload. Historically, such traces have been used primarily by file system researchers in an attempt to ...
    • NFS Tricks and Benchmarking Traps 

      Ellard, Daniel; Seltzer, Margo (USENIX Association, 2003)
      We describe two modi cations to the FreeBSD 4.6 NFS server to increase read throughput by improving the read-ahead heuristic to deal with reordered requests and stride access patterns. We show that for some stride access ...
    • On the Design of a New CPU Architecture for Pedagogical Purposes 

      Ellard, Daniel; Holland, David; Murphy, Nicholas; Seltzer, Margo I. (2002)
      Ant-32 is a new processor architecture designed specifically to address the pedagogical needs of teaching many subjects, including assembly language programming, machine architecture, compilers, operating systems, and VLSI ...
    • Open Problems in Data Collection Networks 

      Ledlie, Jonathan; Shneidman, Jeffrey; Welsh, Matt; Roussopoulos, Mema; Seltzer, Margo (ACM, 2004)
      Research in sensor networks, continuous queries (CQ), and other domains has been motivated by powerful applications that aim to aggregate, assimilate, and interact with scores of sensor networks in parallel. Numerous system ...