enter search term and/or author name
The evolution of Coda
Failure-resilient, scalable, and secure read-write access to shared information by mobile and static users over wireless and wired networks is a fundamental computing challenge. In this article, we describe how the Coda file system has evolved to...
Measuring system normality
Mark Burgess, Hårek Haugerud, Sigmund Straumsnes, Trond Reitan
A comparative analysis of transaction time-series is made, for light to moderately loaded hosts, motivated by the problem of anomaly detection in computers. Criteria for measuring the statistical state of hosts are examined. Applying a scaling...
Let caches decay: reducing leakage energy via exploitation of cache generational behavior
Zhigang Hu, Stefanos Kaxiras, Margaret Martonosi
Power dissipation is increasingly important in CPUs ranging from those intended for mobile use, all the way up to high-performance processors for highend servers. Although the bulk of the power dissipated is dynamic switching power, leakage power is...