Browsing by Author "Seltzer, Margo"
Now showing items 61-80 of 92
-
Operating System Support for Multi-User, Remote, Graphical Interaction
Wong, Alexander Ya-li; Seltzer, Margo I. (1999)The rising popularity of thin client computing and multi-user, remote, graphical interaction recalls to the fore a range of operating system research issues long dormant, and introduces a number of new directions. This ... -
Overcoming Rational Manipulation in Distributed Mechanism Implementations
Shneidman, Jeffrey; Parkes, David C.; Seltzer, Margo I. (2003)Distributed systems are increasingly made up of nodes governed by disparate self-interested parties. These parties can be modeled as rational (in a game theoretic sense) utility-maximizing players that participate in a ... -
Parallelization by Simulated Tunneling
Waterland, Amos; Appavoo, Jonathan; Seltzer, Margo I. (USENIX Association, 2012)As highly parallel heterogeneous computers become commonplace, automatic parallelization of software is an increasingly critical unsolved problem. Continued progress on this problem will require large quantities of information ... -
Passive NFS Tracing of Email and Research Workloads
Ellard, Daniel; Ledlie, Jonathan; Malkani, Pia; Seltzer, Margo (USENIX Association, 2003)We present an analysis of a pair of NFS traces of contemporary email and research workloads. We show that although the research workload resembles previously studied workloads, the email workload is quite different. We ... -
Performance Introspection of Graph Databases
Macko, Peter; Margo, Daniel Wyatt; Seltzer, Margo I. (Association for Computing Machinery, 2013)The explosion of graph data in social and biological networks, recommendation systems, provenance databases, etc. makes graph storage and processing of paramount importance. We present a performance introspection framework ... -
Performance of Multithreaded Chip Multiprocessors And Implications for Operating System Design
Fedorova, Alexandra; Seltzer, Margo I.; Small, Christopher A.; Nussbaum, Daniel (2005)An operating system’s design is often influenced by the architecture of the target hardware. While uniprocessor and multiprocessor architectures are well understood, such is not the case for multithreaded chip multiprocessors ... -
Practical whole-system provenance capture
Pasquier, Thomas; Han, Xueyuan Michael; Goldstein, Mark; Moyer, Thomas; Eyers, David; Seltzer, Margo I.; Bacon, Jean (ACM, 2018-04-09)Data provenance describes how data came to be in its present form. It includes data sources and the transformations that have been applied to them. Data provenance has many uses, from forensics and security to aiding the ... -
Programmable Smart Machines: A Hybrid Neuromorphic approach to General Purpose Computation
Appavoo, Jonathan; Waterland, Amos; Eldridge, Schuyler; Zhao, Katherine; Joshi, Ajay; Homer, Steve; Seltzer, Margo I. (2014) -
Provenance as First Class Cloud Data
Muniswamy-Reddy, Kiran-Kumar; Seltzer, Margo I. (Association for Computing Machinery, 2010)Digital provenance is meta-data that describes the ancestry or history of a digital object. Most work on provenance focuses on how provenance increases the value of data to consumers. However, provenance is also valuable ... -
Provenance for the Cloud
Muniswamy-Reddy, Kiran-Kumar; Macko, Peter; Seltzer, Margo I. (The USENIX Association, 2010)The cloud is poised to become the next computing environment for both data storage and computation due to its pay-as-you-go and provision-as-you-go models. Cloud storage is already being used to back up desktop user data, ... -
Provenance Integration Requires Reconciliation
Angelino, Elaine Lee; Braun, Uri Jacob; Holland, David A; Macko, Peter; Margo, Daniel Wyatt; Seltzer, Margo I. (2011)While there has been a great deal of research on provenance systems, there has been little discussion about challenges that arise when making different provenance systems interoperate. In fact, most of the literature focuses ... -
Provenance Map Orbiter: Interactive Exploration of Large Provenance Graphs
Macko, Peter; Seltzer, Margo I. (USENIX Association, 2011)Provenance systems can produce enormous provenance graphs that can be used for a variety of tasks from determining the inputs to a particular process to debugging entire workflow executions or tracking difficult-to-find ... -
Provenance-Aware Sensor Data Storage
Ledlie, Jonathan; Ng, Chaki; Holland, David A.; Muniswamy-Reddy, Kiran-Kumar; Braun, Uri; Seltzer, Margo (IEEE Computer Society, 2005)Sensor network data has both historical and realtime value. Making historical sensor data useful, in particular, requires storage, naming, and indexing. Sensor data presents new challenges in these areas. Such data is ... -
Provenance-Aware Storage Systems
Muniswamy-Reddy, Kiran-Kumar; Holland, David A; Braun, Uri; Seltzer, Margo I. (2006)A Provenance-Aware Storage System (PASS) is a storage system that automatically collects and maintains provenance or lineage, the complete history or ancestry of an item. We discuss the advantages of treating provenance ... -
Provenance-Aware Storage Systems
Seltzer, Margo I.; Muniswamy-Reddy, Kiran-Kumar; Holland, David A.; Braun, Uri; Ledlie, Jonathan (2005)Provenance is a type of meta-data that describes the history or ancestry of an object. Although provenance is typically manually generated and stored in a stand-alone database, we make the case that it must be managed by ... -
Provenance: A Future History
Cheney, James; Chong, Stephen N; Foster, Nate; Seltzer, Margo I.; Vansummeren, Stijn (Associate for Computing Machinery, 2009)Science, industry, and society are being revolutionized by radical new capabilities for information sharing, distributed computation, and collaboration offered by the World Wide Web. This revolution promises dramatic ... -
Reliable and Fault-Tolerant Peer-to-Peer Block Storage
Stein, C.A.; Tucker, Michael J.; Seltzer, Margo I. (2002)The Charles is a scalable, fault-tolerant, persistent block storage service built from a constantly changing network of potentially faulty or malicious computing nodes. The Charles is designed for a P2P environment: networks ... -
A Resource Management Framework for Central Servers
Sullivan, David Gerard; Seltzer, Margo I. (1999)Proportional-share resource management is becoming increasingly important in today’s computing environments. In particular, the growing use of the computational resources of central service providers argues for a ... -
Scheduler Activations on BSD: Sharing Thread Management Between Kernel and Application
Small, Christopher A.; Seltzer, Margo I. (1995)There are two commonly used thread models: kernel level threads and user level threads. Kernel level threads suffer from the cost of frequent user-kernel domain crossings and fixed kernel scheduling priorities. User level ... -
Scooped, Again
Ledlie, Jonathan; Shneidman, Jeff; Seltzer, Margo; Huth, John (Springer Verlag, 2003)The Peer-to-Peer (p2p) and Grid infrastructure communities are tackling an overlapping set of problems. In addressing these problems, p2p solutions are usually motivated by elegance or research interest. Grid researchers, ...