Search For:

Displaying 1-8 out of 8 total
Efficient eventual consistency in Pahoehoe, an erasure-coded key-blob archive
Found in: Dependable Systems and Networks, International Conference on
By Eric Anderson, Xiaozhou Li, Arif Merchant, Mehul A. Shah, Kevin Smathers, Joseph Tucek, Mustafa Uysal, Jay J. Wylie
Issue Date:July 2010
pp. 181-190
Cloud computing demands cheap, always-on, and reliable storage. We describe Pahoehoe, a key-value cloud storage system we designed to store large objects cost-effectively with high availability. Pahoehoe stores objects across multiple data centers and prov...
AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants
Found in: IEEE Micro
By Shan Lu, Joseph Tucek, Feng Qin, Yuanyuan Zhou
Issue Date:January 2007
pp. 26-35
This article proposes an innovative concurrent-program invariant that captures programmers' atomicity assumptions. It describes a tool with two implementations, one in software and the other using hardware support, that can automatically extract such invar...
Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions
Found in: Mass Storage Systems and Technologies, IEEE / NASA Goddard Conference on
By Joseph Tucek, Paul Stanton, Elizabeth Haubert, Ragib Hasan, Larry Brumbaugh, William Yurcik
Issue Date:April 2005
pp. 329-340
Modern storage systems are responsible for increasing amounts of data and the value of the data itself is growing in importance. Several primary storage system solutions have emerged for the protection of data: (1) Secure Storage through Cryptography, (2) ...
Applying idealized lower-bound runtime models to understand inefficiencies in data-intensive computing
Found in: Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems (SIGMETRICS '11)
By Elie Krevat, Eric Anderson, Gregory R. Ganger, Jay J. Wylie, Joseph Tucek, Tomer Shiran
Issue Date:June 2011
pp. 125-126
We study the role of Kullback-Leibler divergence in the framework of anomaly detection, where its abilities as a statistic underlying detection have never been investigated in depth. We give an in-principle analysis of network attack detection, showing exp...
Applying syntactic similarity algorithms for enterprise information management
Found in: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD '09)
By Alistair Veitch, Charles B. Morrey, Joseph Tucek, Kave Eshghi, Ludmila Cherkasova
Issue Date:June 2009
pp. 1-24
For implementing content management solutions and enabling new applications associated with data retention, regulatory compliance, and litigation issues, enterprises need to develop advanced analytics to uncover relationships among the documents, e.g., con...
Efficient online validation with delta execution
Found in: Proceeding of the 14th international conference on Architectural support for programming languages and operating systems (ASPLOS '09)
By Joseph Tucek, Weiwei Xiong, Yuanyuan Zhou
Issue Date:March 2009
pp. 23-27
Software systems are constantly changing. Patches to fix bugs and patches to add features are all too common. Every change risks breaking a previously working system. Hence administrators loathe change, and are willing to delay even critical security patch...
Rx: Treating bugs as allergies---a safe method to survive software failures
Found in: ACM Transactions on Computer Systems (TOCS)
By Feng Qin, Jagadeesan Sundaresan, Joseph Tucek, Yuanyuan Zhou
Issue Date:August 2007
pp. 7-es
Many applications demand availability. Unfortunately, software failures greatly reduce system availability. Prior work on surviving software failures suffers from one or more of the following limitations: required application restructuring, inability to ad...
AVIO: detecting atomicity violations via access interleaving invariants
Found in: Proceedings of the 12th international conference on Architectural support for programming languages and operating systems (ASPLOS-XII)
By Feng Qin, Joseph Tucek, Shan Lu, Yuanyuan Zhou
Issue Date:October 2006
pp. 109-es
Concurrency bugs are among the most difficult to test and diagnose of all software bugs. The multicore technology trend worsens this problem. Most previous concurrency bug detection work focuses on one bug subclass, data races, and neglects many other impo...