Proceedings of the 19th International Middleware Conference最新文献

筛选
英文 中文
EActors EActors
Proceedings of the 19th International Middleware Conference Pub Date : 2018-11-26 DOI: 10.1145/3274808.3274823
V. Sartakov, Stefan Brenner, Sonia Ben Mokhtar, Sara Bouchenak, Gaël Thomas, Rüdiger Kapitza
{"title":"EActors","authors":"V. Sartakov, Stefan Brenner, Sonia Ben Mokhtar, Sara Bouchenak, Gaël Thomas, Rüdiger Kapitza","doi":"10.1145/3274808.3274823","DOIUrl":"https://doi.org/10.1145/3274808.3274823","url":null,"abstract":"Novel trusted execution support, as offered by Intel's Software Guard eXtensions (SGX), embeds seamlessly into user space applications by establishing regions of encrypted memory, called enclaves. Enclaves comprise code and data that is executed under special protection of the CPU and can only be accessed via an enclave defined interface. To facilitate the usability of this new system abstraction, Intel offers a software development kit (SGX SDK). While the SDK eases the use of SGX, it misses appropriate programming support for inter-enclave interaction, and demands to hardcode the exact use of trusted execution into applications, which restricts flexibility. This paper proposes EActors, an actor framework that is tailored to SGX and offers a more seamless, flexible and efficient use of trusted execution -- especially for applications demanding multiple enclaves. EActors disentangles the interaction with enclaves and, among them, from costly execution mode transitions. It features lightweight fine-grained parallelism based on the concept of actors, thereby avoiding costly SGX SDK provided synchronisation constructs. Finally, EActors offers a high degree of freedom to execute actors, either untrusted or trusted, depending on security requirements and performance demands. We implemented two use cases on top of EActors: (i) a secure instant messaging service, and (ii) a secure multi-party computation service. Both illustrate the ability of EActors to seamlessly and effectively build secure applications. Furthermore, our performance evaluation results show that securing the messaging service with EActors improves performance compared to the vanilla versions of JabberD2 and ejabberd by up to 40x.","PeriodicalId":167957,"journal":{"name":"Proceedings of the 19th International Middleware Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130447619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Gemini: A Distributed Crash Recovery Protocol for Persistent Caches Gemini:用于持久缓存的分布式崩溃恢复协议
Proceedings of the 19th International Middleware Conference Pub Date : 2018-11-26 DOI: 10.1145/3274808.3274819
Shahram Ghandeharizadeh, Haoyu Huang
{"title":"Gemini: A Distributed Crash Recovery Protocol for Persistent Caches","authors":"Shahram Ghandeharizadeh, Haoyu Huang","doi":"10.1145/3274808.3274819","DOIUrl":"https://doi.org/10.1145/3274808.3274819","url":null,"abstract":"Gemini is a distributed crash recovery protocol for persistent caches. When a cache instance fails, Gemini assigns other cache instances to process its reads and writes. Once the failed instance recovers, Gemini starts to recover its persistent content while using it to process reads and writes immediately. Gemini does so while guaranteeing read-after-write consistency. It also transfers the working set of the application to the recovering instance to maximize its cache hit ratio. Our evaluation shows that Gemini restores hit ratio two orders of magnitude faster than a volatile cache. Working set transfer is particularly effective with workloads that exhibit an evolving access pattern.","PeriodicalId":167957,"journal":{"name":"Proceedings of the 19th International Middleware Conference","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132625388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
CRIMES 犯罪
Proceedings of the 19th International Middleware Conference Pub Date : 2018-11-26 DOI: 10.1145/3274808.3274812
Sundaresan Rajasekaran, H. Chawla, Zhen Ni, Neel Shah, E. Berger, Timothy Wood
{"title":"CRIMES","authors":"Sundaresan Rajasekaran, H. Chawla, Zhen Ni, Neel Shah, E. Berger, Timothy Wood","doi":"10.1145/3274808.3274812","DOIUrl":"https://doi.org/10.1145/3274808.3274812","url":null,"abstract":"Rating: Explicit Archive Warning: Graphic Depictions Of Violence Category: F/F Fandom: Buffy the Vampire Slayer (Comic), Buffy the Vampire Slayer Relationship: Faith Lehane/Buffy Summers Character: Faith Lehane, Buffy Summers, Twilight (BtVS) Additional Tags: Explicit Language, Torture, Original Character(s), Dream Sex, Minor Character Death, Season 8 Spoilers, Mental Breakdown, Altered Mental States, Femslash, Romance, Lesbianism, Go Ask Malice, Buffy Driving, Erotica, Explicit Sexual Content, Award Winners Series: Part 5 of Another Thirteen Steps Collections: BtVS/ AtS Femslash, Epic Fiction Novels Stats: Published: 2011-06-15 Completed: 2011-09-18 Chapters: 22/22 Words: 148939","PeriodicalId":167957,"journal":{"name":"Proceedings of the 19th International Middleware Conference","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114463818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Pythia Pythia
Proceedings of the 19th International Middleware Conference Pub Date : 2018-11-26 DOI: 10.1145/3274808.3274820
Ran Xu, Subrata Mitra, Jason Rahman, Peter Bai, Bowen Zhou, G. Bronevetsky, S. Bagchi
{"title":"Pythia","authors":"Ran Xu, Subrata Mitra, Jason Rahman, Peter Bai, Bowen Zhou, G. Bronevetsky, S. Bagchi","doi":"10.1145/3274808.3274820","DOIUrl":"https://doi.org/10.1145/3274808.3274820","url":null,"abstract":"With the increase in the number cores in modern architectures, the need for co-locating multiple workloads has become crucial for improving the overall compute utilization. However, co-locating multiple workloads on the same server is often avoided to protect the performance of the latency sensitive (LS) workloads from the contentions created by other co-located workloads on the shared resources, such as cache and memory bandwidth. In this paper, we present Pythia, a co-location manager that can precisely predict the combined contention on shared resources when multiple co-located workloads interfere with an LS workload. Pythia uses a simple linear regression model that can be trained using a small fraction of the large configuration space of all possible co-locations and can still make highly accurate predictions for the combined contentions. Based on those predictions, Pythia judiciously schedules incoming workloads so that cluster utilization is improved without violating the latency threshold of the LS workloads. We demonstrate that Pythia's scheduling can improve cluster utilization by 71% compared to a simple extension of a prior work when the user is ready to sacrifice up to 5% in the QoS metric and achieve cluster utilization of 99% if 10% degradation in QoS is acceptable.","PeriodicalId":167957,"journal":{"name":"Proceedings of the 19th International Middleware Conference","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128148753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Speculative Read Write Locks 推测性读写锁
Proceedings of the 19th International Middleware Conference Pub Date : 2018-11-26 DOI: 10.1145/3274808.3274825
S. Issa, P. Romano, Tiago Lopes
{"title":"Speculative Read Write Locks","authors":"S. Issa, P. Romano, Tiago Lopes","doi":"10.1145/3274808.3274825","DOIUrl":"https://doi.org/10.1145/3274808.3274825","url":null,"abstract":"Hardware Transactional Memory (HTM) has recently entered the realm of mainstream computing thanks to its integration in processors commercialized by major industrial manufacturers. HTM provides highly-efficient, hardware-assisted synchronization mechanisms for concurrent programs. Unfortunately, though, existing HTM implementations also suffer from severe limitations that are inherently related to their best-effort, hardware-based design. This work introduces SpRWL (Speculative Read Write Lock), a HTM-based implementation of read-write locks that provides a key benefit: allowing readers to execute outside the scope of hardware transactions, thus, effectively sparing them from any HTM-related limitation. SpRWL is the first HTM-based read-write lock implementation to support the concurrent execution of uninstrumented readers, while assuming a standard transaction demarcation API that is universally supported by any HTM implementation. Via an extensive experimental study, we show that SpRWL can achieve striking performance gains (up to 16x) with respect to state of the art read-write lock implementations based not only on pessimistic/lock-based schemes, but also on HTM-based techniques that exploit specific hardware mechanisms currently supported solely by a restricted number of architectures.","PeriodicalId":167957,"journal":{"name":"Proceedings of the 19th International Middleware Conference","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133450398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
sgx-perf: A Performance Analysis Tool for Intel SGX Enclaves SGX -perf:用于英特尔SGX enclave的性能分析工具
Proceedings of the 19th International Middleware Conference Pub Date : 2018-11-26 DOI: 10.1145/3274808.3274824
Nico Weichbrodt, Pierre-Louis Aublin, R. Kapitza
{"title":"sgx-perf: A Performance Analysis Tool for Intel SGX Enclaves","authors":"Nico Weichbrodt, Pierre-Louis Aublin, R. Kapitza","doi":"10.1145/3274808.3274824","DOIUrl":"https://doi.org/10.1145/3274808.3274824","url":null,"abstract":"Novel trusted execution technologies such as Intel's Software Guard Extensions (SGX) are considered a cure to many security risks in clouds. This is achieved by offering trusted execution contexts, so called enclaves, that enable confidentiality and integrity protection of code and data even from privileged software and physical attacks. To utilise this new abstraction, Intel offers a dedicated Software Development Kit (SDK). While it is already used to build numerous applications, understanding the performance implications of SGX and the offered programming support is still in its infancy. This inevitably leads to time-consuming trial-and-error testing and poses the risk of poor performance. To enable the development of well-performing SGX-based applications, this paper makes the following three contributions: First, it summarises identified performance critical factors of SGX. Second, it presents sgx-perf, a collection of tools for high-level dynamic performance analysis of SGX-based applications. In particular, sgx-perf performs not only fined-grained profiling of performance critical events in enclaves but also offers recommendations on how to improve enclave performance. Third, it demonstrates how we used sgx-perf in four non-trivial SGX workloads to increase their performance by up to 2.16x.","PeriodicalId":167957,"journal":{"name":"Proceedings of the 19th International Middleware Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133901413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
FireDeX FireDeX
Proceedings of the 19th International Middleware Conference Pub Date : 2018-11-26 DOI: 10.1145/3274808.3274830
Kyle E. Benson, Georgios Bouloukakis, Casey Grant, Valérie Issarny, Sharad Mehrotra, Ioannis Moscholios, N. Venkatasubramanian
{"title":"FireDeX","authors":"Kyle E. Benson, Georgios Bouloukakis, Casey Grant, Valérie Issarny, Sharad Mehrotra, Ioannis Moscholios, N. Venkatasubramanian","doi":"10.1145/3274808.3274830","DOIUrl":"https://doi.org/10.1145/3274808.3274830","url":null,"abstract":"Real-time event detection and targeted decision making for emerging mission-critical applications, e.g. smart fire fighting, requires systems that extract and process relevant data from connected IoT devices in the environment. In this paper, we propose FireDeX, a cross-layer middleware that facilitates timely and effective exchange of data for coordinating emergency response activities. FireDeX adopts a publish-subscribe data exchange paradigm with brokers at the network edge to manage prioritized delivery of mission-critical data from IoT sources to relevant subscribers. It incorporates parameters at the application, network, and middleware layers into a data exchange service that accurately estimates end-to-end performance metrics (e.g. delays, success rates). We design an extensible queueing theoretic model that abstracts these cross-layer interactions as a network of queues, thereby making it amenable for rapid analysis. We propose novel algorithms that utilize results of this analysis to tune data exchange configurations (event priorities and dropping policies) while meeting situational awareness requirements and resource constraints. FireDeX leverages Software-Defined Networking (SDN) methodologies to enforce these configurations in the IoT network infrastructure. We evaluate its performance through simulated experiments in a smart building fire response scenario. Our results demonstrate significant improvement to mission-critical data delivery under a variety of conditions. Our application-aware prioritization algorithm improves the value of exchanged information by 36% when compared with no prioritization; the addition of our network-aware drop rate policies improves this performance by 42% over priorities only and by 94% over no prioritization.","PeriodicalId":167957,"journal":{"name":"Proceedings of the 19th International Middleware Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117328131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Software Cache Management 自适应软件缓存管理
Proceedings of the 19th International Middleware Conference Pub Date : 2018-11-26 DOI: 10.1145/3274808.3274816
Gil Einziger, Ohad Eytan, R. Friedman, Ben Manes
{"title":"Adaptive Software Cache Management","authors":"Gil Einziger, Ohad Eytan, R. Friedman, Ben Manes","doi":"10.1145/3274808.3274816","DOIUrl":"https://doi.org/10.1145/3274808.3274816","url":null,"abstract":"Developing a silver bullet software cache management policy is a daunting task due to the variety of potential workloads. In this paper, we investigate an adaptivity mechanism for software cache management schemes which offer tuning parameters targeted at the frequency vs. recency bias in the workload. The goal is automatic tuning of the parameters for best performance based on the workload without any manual intervention. We study two approaches for this problem, a hill climbing solution and an indicator based solution. In hill climbing, we repeatedly reconfigure the system hoping to find its best setting. In the indicator approach, we estimate the workloads' frequency vs. recency bias and adjust the parameters accordingly in a single swoop. We apply these adaptive mechanisms to two recent software management schemes. We perform an extensive evaluation of the schemes and adaptation mechanisms over a large selection of workloads with varying characteristics. With these, we derive a parameterless software cache management policy that is competitive for all tested workloads.","PeriodicalId":167957,"journal":{"name":"Proceedings of the 19th International Middleware Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126389464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Adaptive Execution of Continuous and Data-intensive Workflows with Machine Learning 使用机器学习的连续和数据密集型工作流的自适应执行
Proceedings of the 19th International Middleware Conference Pub Date : 2018-11-26 DOI: 10.1145/3274808.3274827
Sérgio Esteves, H. Galhardas, L. Veiga
{"title":"Adaptive Execution of Continuous and Data-intensive Workflows with Machine Learning","authors":"Sérgio Esteves, H. Galhardas, L. Veiga","doi":"10.1145/3274808.3274827","DOIUrl":"https://doi.org/10.1145/3274808.3274827","url":null,"abstract":"To extract value from evergrowing volumes of data and to drive decision making, organizations frequently resort to the composition of data processing workflows. The typical workflow model enforces strict temporal synchronization across processing steps without accounting the actual effect of intermediate computations on the final workflow output. However, this is not the most desirable in a multitude of scenarios. We identify a class of applications for continuous data processing where the workflow output changes slowly and without great significance in a short time window, thus squandering compute resources with current approaches. To overcome such inefficiency, we introduce a novel workflow model, for continuous and data-intensive processing, capable of relaxing triggering semantics according to the impact that input data is assessed to have on changing the workflow output. To estimate this impact, learn the correlation between input and output variation, and guarantee correctness within a given tolerated error constant, we rely on Machine Learning. The functionality of this model is implemented in SmartFlux, a middleware framework which can be integrated with existing workflow managers. Experimental results indicate substantial savings in resource usage, while not deviating the workflow output beyond a small error constant with a high confidence level.","PeriodicalId":167957,"journal":{"name":"Proceedings of the 19th International Middleware Conference","volume":"2020 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130286455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SpecRPC SpecRPC
Proceedings of the 19th International Middleware Conference Pub Date : 2018-11-26 DOI: 10.1145/3274808.3274829
Xinan Yan, Arturo Pie Joa, Bernard Wong, Benjamin Cassell, Tyler Szepesi, Malek Naouach, Disney Lam
{"title":"SpecRPC","authors":"Xinan Yan, Arturo Pie Joa, Bernard Wong, Benjamin Cassell, Tyler Szepesi, Malek Naouach, Disney Lam","doi":"10.1145/3274808.3274829","DOIUrl":"https://doi.org/10.1145/3274808.3274829","url":null,"abstract":"In this paper we introduce SpecRPC, a speculative execution framework that allows applications to concurrently execute dependent operations both locally and through remote procedure calls. The framework tracks dependencies among non-speculative and speculative operations and ensures that incorrect speculations do not affect the correctness of applications that follow our suggested design pattern. By using speculation to parallelize dependent operations, SpecRPC can significantly reduce application latency even if only a fraction of the results can be correctly speculated. We evaluate SpecRPC by using it to implement Replicated Commit, a low-latency distributed transaction commit protocol for geo-replicated database systems. Our evaluation results show that, compared to RPC frameworks that sequentially execute dependent operations, SpecRPC can reduce the average transaction completion time of Replicated Commit by 58%.","PeriodicalId":167957,"journal":{"name":"Proceedings of the 19th International Middleware Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121667844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信