Proceedings of the 13th international conference on Architectural support for programming languages and operating systems最新文献

筛选
英文 中文
Empathic Computer Architectures and Systems 移情计算机体系结构和系统
Alex Shye, Lei Yang, Xi Chen, Berkin Ozisikyilmaz, A. Mallik, Bin Lin, P. Dinda, G. Memik
{"title":"Empathic Computer Architectures and Systems","authors":"Alex Shye, Lei Yang, Xi Chen, Berkin Ozisikyilmaz, A. Mallik, Bin Lin, P. Dinda, G. Memik","doi":"10.1145/1346281.2181008","DOIUrl":"https://doi.org/10.1145/1346281.2181008","url":null,"abstract":"Any computer system ultimately aims to satisfy the end user. However, computer design, evaluation, and optimization typically leave the user out-of-the-loop. Recent studies [1, 3, 5] indicate that there is significant optimization potential in considering the user when making system-level decisions. One of key challenges in user-aware research lies in understanding user satisfaction. While it is possible to explicitly ask the user for feedback, such interaction may be annoying. An effective implicit form of user feedback would be ideal. In this paper, we argue for incorporating such feedback into future architectures/systems and ask the question: Can we use human physiological traits to make informed user-aware (empathic) architectural and system-level decisions? As an example, imagine the following scenario for a laptop user. An eye tracker follows the user’s line of vision. The OS scheduler increases the priority of the window which the user is focused on. During game play, the eye tracker recognizes user arousal through pupil dilation and notifies the game engine. To improve power consumption, several heuristics throttle CPU/memory/disk performance to minimize system performance to a level believed to satisfy the user. However, when biometric sensors indicate the user is annoyed, performance is increased, and the heuristics are updated accordingly.","PeriodicalId":120246,"journal":{"name":"Proceedings of the 13th international conference on Architectural support for programming languages and operating systems","volume":"16 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125763736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computing, Approximately 计算,大约
R. Nair, D. Prener
{"title":"Computing, Approximately","authors":"R. Nair, D. Prener","doi":"10.1145/1346281.2181011","DOIUrl":"https://doi.org/10.1145/1346281.2181011","url":null,"abstract":"Computation today brings with it an expectation of preciseness – preciseness in the definition of the architecture, preciseness in the implementation of the architecture, and preciseness in the program designed to solve problems of interest. But is such preciseness important when the program itself encodes an approximate solution to a problem and is not sacrosanct? Is such preciseness important when an instruction executed by a program does not need all the restrictions indicated by its definition in the architecture, and hence does not make use of all the hardware associated with executing the instruction? Is such preciseness important when it is perfectly acceptable for an implementation to generate a result for a set of instructions that is close enough to one produced by a precise implementation? It is clear that the preciseness of today’s computational model comes at a cost – a cost in the complexity of programming a solution, a cost in the verification of complex behavior specification, and a cost in the energy expended beyond the minimum needed to solve the problem.","PeriodicalId":120246,"journal":{"name":"Proceedings of the 13th international conference on Architectural support for programming languages and operating systems","volume":"105 32","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131942141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Designing and implementing malicious processors 设计和实现恶意处理器
Samuel T. King, Joseph A. Tucek, Anthony Cozzie, Yuanyuan Zhou
{"title":"Designing and implementing malicious processors","authors":"Samuel T. King, Joseph A. Tucek, Anthony Cozzie, Yuanyuan Zhou","doi":"10.1145/1346281.2181012","DOIUrl":"https://doi.org/10.1145/1346281.2181012","url":null,"abstract":"It may be possible for attackers to modify integrated circuits (ICs) to insert covert, malicious circuitry into manufactured components; a recent Department of Defense report1 identifies several trends that contribute to this threat. First, it is infeasible economically for government-based IC suppliers to produce technology that matches the performance of commercial suppliers. These high-performance ICs provide a tactical advantage making them an indispensable resource. Second, commercial suppliers are moving more design, manufacturing, and testing of ICs to a geographically diverse set of countries in an effort to cut costs, making it infeasible to secure these steps in the IC life cycle. Together, these trends lead to an “enormous and increasing” opportunity for attack. Motivated attackers will subvert the IC supply chain if doing so provides sufficient value. Since modifying an IC is an expensive attack, it is doubtful that “script kiddies” will turn their adolescent energies to malicious processors, but the same cannot be said for attackers with resources. If malicious processors are capable of running valuable attacks, governments, terrorist organizations, and so on will deploy them despite their cost. Historically, these types of organizations are experienced at covert operations, and have demonstrated considerable ingenuity in pursuing their goals. In contrast, there is little work on malicious processors. If an attacker were able to include a malicious IC within a computer system, it would give them a fundamentally higher level of control compared to softwarebased attacks. While the recent SubVirt project shows that attackers can gain control over operating systems by using virtual-machine monitors (VMMs) to control the layer beneath, ICs occupy yet a lower layer. A malicious IC would be below all software, including VMMs, so compromising ICs gives attackers complete control over the entire software stack. This high level of control pro-","PeriodicalId":120246,"journal":{"name":"Proceedings of the 13th international conference on Architectural support for programming languages and operating systems","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131840828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Whiteboards that Compute: Goals and Challenges for System Designers 计算的白板:系统设计师的目标和挑战
Ryan Dixon, T. Sherwood
{"title":"Whiteboards that Compute: Goals and Challenges for System Designers","authors":"Ryan Dixon, T. Sherwood","doi":"10.1145/1346281.2181009","DOIUrl":"https://doi.org/10.1145/1346281.2181009","url":null,"abstract":"Even after more than thirty years of desktop computing, many (if not most) engineers facing complex problems instinctively run right to the whiteboard. A whiteboard offers an incredibly natural way by which ideas can be remembered: it provides a means of describing and communicating the relationships between complex interacting parts, and can be used to specify rough schematics of final designs. While the utility of these simple smooth white slabs is clear, there is an opportunity here to create a computing device that can provide all of these abilities and more--a computer that is as simple as sketching but as powerful as a modern desktop. Written equations can be captured and solved, sketches of state machines can be executed, and previous drawings can be queried, recalled, shared, and transformed. We are not the first to claim this is an important direction of work, so why do we believe this to be a fruitful direction for systems research now?","PeriodicalId":120246,"journal":{"name":"Proceedings of the 13th international conference on Architectural support for programming languages and operating systems","volume":"41 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122636821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
uDSim, a Microprocessor Design Time Simulation Infrastructure uDSim,一个微处理器设计时仿真基础设施
Sangeetha Sudhakrishnan, F. Mesa-Martinez
{"title":"uDSim, a Microprocessor Design Time Simulation Infrastructure","authors":"Sangeetha Sudhakrishnan, F. Mesa-Martinez","doi":"10.1145/1346281.2181010","DOIUrl":"https://doi.org/10.1145/1346281.2181010","url":null,"abstract":"","PeriodicalId":120246,"journal":{"name":"Proceedings of the 13th international conference on Architectural support for programming languages and operating systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122829689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computation: A Byproduct of Home Water Heaters 计算:家用热水器的副产品
D. Wentzlaff
{"title":"Computation: A Byproduct of Home Water Heaters","authors":"D. Wentzlaff","doi":"10.1145/1346281.2181007","DOIUrl":"https://doi.org/10.1145/1346281.2181007","url":null,"abstract":"","PeriodicalId":120246,"journal":{"name":"Proceedings of the 13th international conference on Architectural support for programming languages and operating systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130883990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信