IO-Lite: A Unified I/O Buffering and Caching System
For many users, the perceived speed of computing is increasingly dependent on the performance of networked server systems, underscoring the need for high performance servers. Unfortunately, general purpose operating systems provide inadequate support for server applications, leading to poor server performance and increased hardware cost of server systems.
Automatic I/O Hint Generation through Speculative Execution
Many applications, ranging from simple text search utilities to complex databases, issue large numbers of file access requests that cannot always be serviced by in-memory caches. Due to the disparity between processor speeds and disk access times, the execution times of these applications are often dominated by I/O latency
Resource Containers: A New Facility for Resource Management in Server Systems
Networked servers have become one of the most important applications of large computer systems. For many users, the perceived speed of computing is governed by server performance. We are especially interested in the performance of Web servers, since these must often scale to thousands or millions of users.
Intrusion Detection Through Dynamic Software Measurement
The thrust of this paper is to present a new real-time approach to detect aberrant modes of system behavior induced by abnormal and unauthorized system activities. The theoretical foundation for the research program is based on the study of the software internal behavior.
Experience with EMERALD to Date
Anomaly detection involves the recognition of deviations from expected normal behavior, whereas misuse detection involves the detection of various types of misuse. The term ``intrusion detection' is often used to encompass both, but unfortunately suggests only the detection of intrusions rather than the broader scope of EMERALD.
Filters as a Language Support for Design Patterns in Object-Oriented Scripting Languages
Scripting languages are designed for glueing software components together. Such languages provide features like dynamic extensibility and dynamic typing with automatic conversion that make them well suited for rapid application development. Although these features entail runtime penalties, modern CPUs are fast enough to execute even large applications in scripting languages efficiently
Breaking Up Is Hard To Do: Modeling Security Threats for Smart Cards
Smart card systems differ from conventional computer systems in that different aspects of the system are not under a single trust boundary. The processor, I/O, data, programs, and network may be controlled by different, and hostile, parties. We discuss the security ramifications of these ``splits'' in trust, showing that they are fundamental to a proper understanding of the security of systems that include smart cards.
Design Strategies for Tamper-Resistant Card Processors
Smartcards promise numerous security benefits. They can participate in cryptographic protocols, and unlike magnetic stripe cards, the stored data can be protected against unauthorized access. However, the strength of this protection seems to be frequently overestimated.
Lightweight Structured Text Processing
Structured text has always been a popular way to store, process, and distribute information. Traditional examples of structured text include source code, SGML or LaTeX documents, bibliographies, and email messages. With the advent of the World Wide Web, structured text (in the form of HTML) has become a dominant medium for online information.
The Case for Compressed Caching in Virtual Memory Systems
Compressed caching uses part of the available RAM to hold pages in compressed form, effectively adding a new level to the virtual memory hierarchy. This level attempts to bridge the huge performance gap between normal (uncompressed) RAM and disk.
Deployme: Tellme's Software and Content Manager - Free eBook Deployme: Tellme's Software and Content Manager - Download ebook Deployme: Tellme's Software and Content Manager free
|