5

Proceedings of the 19th Workshop on Hot Topics in Operating Systems

 1 year ago
source link: https://dl.acm.org/doi/proceedings/10.1145/3593856
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

Proceedings of the 19th Workshop on Hot Topics in Operating Systems

HOTOS '23: Proceedings of the 19th Workshop on Hot Topics in Operating Systems
2023 Proceeding
Publisher:
Conference:
HOTOS '23: 19th Workshop on Hot Topics in Operating Systems Providence RI USA June 22 - 24, 2023
ISBN:
979-8-4007-0195-5
Published:
22 June 2023
Sponsors:
Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section

Select All
research-article
Open Access
CPU-free Computing: A Vision with a Blueprint

Since the inception of computing, we have been reliant on CPU-powered architectures. However, today this reliance is challenged by manufacturing limitations (CMOS … (More)

research-article
Metal: An Open Architecture for Developing Processor Features

In recent years, an increasing number of hardware devices started providing programming interfaces to developers such as smart NICs. Processor vendors use microcode to … (More)

research-article
Open Access
Software-Defined CPU Modes

Our CPUs contain a compute instruction set, which regular applications use. But they also feature an intricate underworld of different CPU modes, combined with trap and … (More)

research-article
Open Access
Out of Hand for Hardware? Within Reach for Software!

Events that take 10s to 100s of ns like cache misses increasingly cause CPU stalls. However, hiding the latency of these events is challenging: hardware mechanisms suffer from the … (More)

research-article
The Case for Performance Interfaces for Hardware Accelerators

While systems designers are increasingly turning to hardware accelerators for performance gains, realizing these gains is painstaking and error-prone. It can take several … (More)

research-article
Putting out the hardware dumpster fire

The immense hardware complexity of modern computers, both mobile phones and datacenter servers, is a seemingly endless source of bugs and vulnerabilities in system software.

… (More)
research-article
Open Access
Prefetching Using Principles of Hippocampal-Neocortical Interaction

Memory prefetching improves performance across many systems layers. However, achieving high prefetch accuracy with low overhead is challenging, as memory hierarchies and … (More)

research-article
Degrading Data to Save the Planet

Storage capacity demand is projected to grow exponentially in the coming decade and so will its contribution to the overall carbon footprint of computing devices. In recent years, … (More)

research-article
Open Access
research-article
System Virtualization for Neural Processing Units

Modern cloud platforms have been employing hardware accelerators such as neural processing units (NPUs) to meet the increasing demand for computing resources for AI-based … (More)

research-article
research-article
Open Access
research-article
Open Access
Executing Shell Scripts in the Wrong Order, Correctly

Shell scripts are critical infrastructure for developers, administrators, and scientists; and ought to enjoy the performance benefits of the full suite of advances in compiler … (More)

research-article
Open Access
Towards Modern Development of Cloud Applications

When writing a distributed application, conventional wisdom says to split your application into separate services that can be rolled out independently. This approach … (More)

research-article
Fabric-Centric Computing

Emerging memory fabrics and the resulting composable infrastructures have fundamentally challenged our conventional wisdom on how to build efficient rack/cluster-scale … (More)

research-article
Towards Increased Datacenter Efficiency with Soft Memory

Memory is the bottleneck resource in today's datacenters because it is inflexible: low-priority processes are routinely killed to free up resources during memory pressure. This wastes … (More)

research-article
Open Access
research-article
Automatic Kernel Offload Using BPF

BPF support in Linux has made kernel extensions easier. Recent efforts have shown that using BPF to offload portions of server applications, e.g., memcached and service proxies, can … (More)

research-article
Kernel extension verification is untenable

The emergence of verified eBPF bytecode is ushering in a new era of safe kernel extensions. In this paper, we argue that eBPF's verifier---the source of its safety … (More)

research-article
Beyond isolation: OS verification as a foundation for correct applications

Verified systems software has generally had to assume the correctness of the operating system and its provided services (like networking and the file system). Even though there exist … (More)

research-article
Open Access
research-article
Open Access
research-article
research-article
Open Access
Programming Fully Disaggregated Systems

With full resource disaggregation on the horizon, it is unclear what the most suitable programming model is that enables dataflow developers to fully harvest the potential that recent … (More)

research-article
Open Access
Unleashing True Utility Computing with Quicksand

Today's clouds are inefficient: their utilization of resources like CPUs, GPUs, memory, and storage is low. This inefficiency occurs because applications consume resources at … (More)

research-article
Towards a Manageable Intra-Host Network

Intra-host networks, including heterogeneous devices and interconnect fabrics, have become increasingly complex and crucial. However, intra-host networks today do not provide … (More)

research-article
Open Access
Towards (Really) Safe and Fast Confidential I/O

Confidential cloud computing enables cloud tenants to distrust their service provider. Achieving confidential computing solutions that provide concrete security guarantees … (More)

research-article
Open Access
research-article
Creating Trust by Abolishing Hierarchies

Software is going through a trust crisis. Privileged code is no longer trusted and processes insufficiently protect user code from unverified libraries. While usually treated … (More)


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK