Now showing items 61-80 of 92

    • Operating System Support for Multi-User, Remote, Graphical Interaction 

      Wong, Alexander Ya-li; Seltzer, Margo I. (1999)
      The rising popularity of thin client computing and multi-user, remote, graphical interaction recalls to the fore a range of operating system research issues long dormant, and introduces a number of new directions. This ...
    • Overcoming Rational Manipulation in Distributed Mechanism Implementations 

      Shneidman, Jeffrey; Parkes, David C.; Seltzer, Margo I. (2003)
      Distributed systems are increasingly made up of nodes governed by disparate self-interested parties. These parties can be modeled as rational (in a game theoretic sense) utility-maximizing players that participate in a ...
    • Parallelization by Simulated Tunneling 

      Waterland, Amos; Appavoo, Jonathan; Seltzer, Margo I. (USENIX Association, 2012)
      As highly parallel heterogeneous computers become commonplace, automatic parallelization of software is an increasingly critical unsolved problem. Continued progress on this problem will require large quantities of information ...
    • Passive NFS Tracing of Email and Research Workloads 

      Ellard, Daniel; Ledlie, Jonathan; Malkani, Pia; Seltzer, Margo (USENIX Association, 2003)
      We present an analysis of a pair of NFS traces of contemporary email and research workloads. We show that although the research workload resembles previously studied workloads, the email workload is quite different. We ...
    • Performance Introspection of Graph Databases 

      Macko, Peter; Margo, Daniel Wyatt; Seltzer, Margo I. (Association for Computing Machinery, 2013)
      The explosion of graph data in social and biological networks, recommendation systems, provenance databases, etc. makes graph storage and processing of paramount importance. We present a performance introspection framework ...
    • Performance of Multithreaded Chip Multiprocessors And Implications for Operating System Design 

      Fedorova, Alexandra; Seltzer, Margo I.; Small, Christopher A.; Nussbaum, Daniel (2005)
      An operating system’s design is often influenced by the architecture of the target hardware. While uniprocessor and multiprocessor architectures are well understood, such is not the case for multithreaded chip multiprocessors ...
    • Practical whole-system provenance capture 

      Pasquier, Thomas; Han, Xueyuan Michael; Goldstein, Mark; Moyer, Thomas; Eyers, David; Seltzer, Margo I.; Bacon, Jean (ACM, 2018-04-09)
      Data provenance describes how data came to be in its present form. It includes data sources and the transformations that have been applied to them. Data provenance has many uses, from forensics and security to aiding the ...
    • Programmable Smart Machines: A Hybrid Neuromorphic approach to General Purpose Computation 

      Appavoo, Jonathan; Waterland, Amos; Eldridge, Schuyler; Zhao, Katherine; Joshi, Ajay; Homer, Steve; Seltzer, Margo I. (2014)
    • Provenance as First Class Cloud Data 

      Muniswamy-Reddy, Kiran-Kumar; Seltzer, Margo I. (Association for Computing Machinery, 2010)
      Digital provenance is meta-data that describes the ancestry or history of a digital object. Most work on provenance focuses on how provenance increases the value of data to consumers. However, provenance is also valuable ...
    • Provenance for the Cloud 

      Muniswamy-Reddy, Kiran-Kumar; Macko, Peter; Seltzer, Margo I. (The USENIX Association, 2010)
      The cloud is poised to become the next computing environment for both data storage and computation due to its pay-as-you-go and provision-as-you-go models. Cloud storage is already being used to back up desktop user data, ...
    • Provenance Integration Requires Reconciliation 

      Angelino, Elaine Lee; Braun, Uri Jacob; Holland, David A; Macko, Peter; Margo, Daniel Wyatt; Seltzer, Margo I. (2011)
      While there has been a great deal of research on provenance systems, there has been little discussion about challenges that arise when making different provenance systems interoperate. In fact, most of the literature focuses ...
    • Provenance Map Orbiter: Interactive Exploration of Large Provenance Graphs 

      Macko, Peter; Seltzer, Margo I. (USENIX Association, 2011)
      Provenance systems can produce enormous provenance graphs that can be used for a variety of tasks from determining the inputs to a particular process to debugging entire workflow executions or tracking difficult-to-find ...
    • Provenance-Aware Sensor Data Storage 

      Ledlie, Jonathan; Ng, Chaki; Holland, David A.; Muniswamy-Reddy, Kiran-Kumar; Braun, Uri; Seltzer, Margo (IEEE Computer Society, 2005)
      Sensor network data has both historical and realtime value. Making historical sensor data useful, in particular, requires storage, naming, and indexing. Sensor data presents new challenges in these areas. Such data is ...
    • Provenance-Aware Storage Systems 

      Muniswamy-Reddy, Kiran-Kumar; Holland, David A; Braun, Uri; Seltzer, Margo I. (2006)
      A Provenance-Aware Storage System (PASS) is a storage system that automatically collects and maintains provenance or lineage, the complete history or ancestry of an item. We discuss the advantages of treating provenance ...
    • Provenance-Aware Storage Systems 

      Seltzer, Margo I.; Muniswamy-Reddy, Kiran-Kumar; Holland, David A.; Braun, Uri; Ledlie, Jonathan (2005)
      Provenance is a type of meta-data that describes the history or ancestry of an object. Although provenance is typically manually generated and stored in a stand-alone database, we make the case that it must be managed by ...
    • Provenance: A Future History 

      Cheney, James; Chong, Stephen N; Foster, Nate; Seltzer, Margo I.; Vansummeren, Stijn (Associate for Computing Machinery, 2009)
      Science, industry, and society are being revolutionized by radical new capabilities for information sharing, distributed computation, and collaboration offered by the World Wide Web. This revolution promises dramatic ...
    • Reliable and Fault-Tolerant Peer-to-Peer Block Storage 

      Stein, C.A.; Tucker, Michael J.; Seltzer, Margo I. (2002)
      The Charles is a scalable, fault-tolerant, persistent block storage service built from a constantly changing network of potentially faulty or malicious computing nodes. The Charles is designed for a P2P environment: networks ...
    • A Resource Management Framework for Central Servers 

      Sullivan, David Gerard; Seltzer, Margo I. (1999)
      Proportional-share resource management is becoming increasingly important in today’s computing environments. In particular, the growing use of the computational resources of central service providers argues for a ...
    • Scheduler Activations on BSD: Sharing Thread Management Between Kernel and Application 

      Small, Christopher A.; Seltzer, Margo I. (1995)
      There are two commonly used thread models: kernel level threads and user level threads. Kernel level threads suffer from the cost of frequent user-kernel domain crossings and fixed kernel scheduling priorities. User level ...
    • Scooped, Again 

      Ledlie, Jonathan; Shneidman, Jeff; Seltzer, Margo; Huth, John (Springer Verlag, 2003)
      The Peer-to-Peer (p2p) and Grid infrastructure communities are tackling an overlapping set of problems. In addressing these problems, p2p solutions are usually motivated by elegance or research interest. Grid researchers, ...