logo资料库

usenix 09 会议论文全部.pdf

第1页 / 共432页
第2页 / 共432页
第3页 / 共432页
第4页 / 共432页
第5页 / 共432页
第6页 / 共432页
第7页 / 共432页
第8页 / 共432页
资料共432页,剩余部分请下载后查看
USENIX Association Proceedings of the 2009 USENIX Annual Technical Conference June 14–19, 2009 San Diego, CA, USA
Conference Organizers Program Co-Chairs Geoffrey M. Voelker, University of California, San Diego Alec Wolman, Microsoft Research Program Committee Remzi Arpaci-Dusseau, University of Wisconsin, Madison Ranjita Bhagwan, Microsoft Research India George Candea, EPFL Ira Cohen, HP Labs, Israel Landon Cox, Duke University John Dunagan, Microsoft Research Nick Feamster, Georgia Institute of Technology Michael J. Freedman, Princeton University Garth Goodson, NetApp Robert Grimm, New York University Dirk Grunwald, University of Colorado Jaeyeon Jung, Intel Research Sam King, University of Illinois at Urbana-Champaign Geoff Kuenning, Harvey Mudd College Ed Lazowska, University of Washington Erich Nahum, IBM T.J. Watson Research Center Niels Provos, Google, Inc. Sean Rhea, Meraki, Inc. Mahadev Satyanarayanan, Carnegie Mellon University Prashant Shenoy, University of Massachusetts Marvin Theimer, Amazon.com Andrew Warfield, University of British Columbia and Citrix Systems Yinglian Xie, Microsoft Research Silicon Valley Ken Yocum, University of California, San Diego Poster Session Co-Chairs George Candea, EPFL Andrew Warfield, University of British Columbia and Citrix Systems Invited Talks Program Committee Dan Klein, USENIX Association Ellie Young, USENIX Association The USENIX Association Staff Atul Adya Bhavish Aggarwal Muneeb Ali David Becker Sapan Bhatia Nilton Bila Silas Boyd-Wickizer Luis Ceze Vitaly Chipounov Anthony Cozzie Tim Deegan Fred Douglis Jeremy Elson External Reviewers Cristian Estan Steve Gribble Chris Grier Dan Halperin Michael Hicks Wenjun Hu Hai Huang Rahul Iyer Horatiu Jula Charles Krassic Arvind Krishnamurthy Geoffrey Lefebvre James Lentini Jie Liu Susan Martonosi Trevor Pering Alkis Polyzotis Vijayan Prabhakaran Moheeb Rajab Charlie Reis Eric Rescorla Yaoping Ruan Stefan Saroiu Jiri Schindler Simon Schubert Vyas Sekar Hovav Shacham Neil Spring Kiran Srinivasan Radu Stoica John Strunk Sai Susarla Srinivasan Venkatachary Michael Vrable Yi Wang John Zahorjan Cristian Zamfir Nickolai Zeldovich Lintao Zhang
2009 USENIX Annual Technical Conference June 14–19, 2009 San Diego, CA, USA Message from the Program Co-Chairs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii Wednesday, June 17 Virtualization Satori: Enlightened Page Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Grzegorz Miłoś, Derek G. Murray, and Steven Hand, University of Cambridge Computer Laboratory; Michael A. Fetterman, NVIDIA Corporation vNUMA: A Virtual Shared-Memory Multiprocessor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Matthew Chapman, The University of New South Wales and NICTA; Gernot Heiser, The University of New South Wales, NICTA, and Open Kernel Labs ShadowNet: A Platform for Rapid and Safe Network Evolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Xu Chen and Z. Morley Mao, University of Michigan; Jacobus Van der Merwe, AT&T Labs—Research Networking Design and Implementation of TCP Data Probes for Reliable and Metric-Rich Network Path Monitoring . . . . . . .43 Xiapu Luo, Edmond W.W. Chan, and Rocky K.C. Chang, The Hong Kong Polytechnic University, Hong Kong StrobeLight: Lightweight Availability Mapping and Anomaly Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57 James W. Mickens, John R. Douceur, and William J. Bolosky, Microsoft Research; Brian D. Noble, University of Michigan Hashing Round-down Prefixes for Rapid Packet Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71 Fong Pong, Broadcom Corp.; Nian-Feng Tzeng, Center for Advanced Computer Studies, University of Louisiana at Lafayette File and Storage Systems Tolerating File-System Mistakes with EnvyFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87 Lakshmi N. Bairavasundaram, NetApp;Inc.; Swaminathan Sundararaman, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau, University of Wisconsin—Madison Decentralized Deduplication in SAN Cluster File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Austin T. Clements, MIT CSAIL; Irfan Ahmad, Murali Vilayannur, and Jinyuan Li, VMware, Inc. FlexFS: A Flexible Flash File System for MLC NAND Flash Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Sungjin Lee, Keonsoo Ha, Kangwon Zhang, and Jihong Kim, Seoul National University, Korea; Junghwan Kim, Samsung Electronics, Korea Layering in Provenance Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 Kiran-Kumar Muniswamy-Reddy, Uri Braun, David A. Holland, Peter Macko, Diana Maclean, Daniel Margo, Margo Seltzer, and Robin Smogor, Harvard School of Engineering and Applied Sciences USENIX Association 2009 USENIX Annual Technical Conference iii
Thursday, June 18 Distributed Systems Object Storage on CRAQ: High-Throughput Chain Replication for Read-Mostly Workloads . . . . . . . . . . . . . . . . . 143 Jeff Terrace and Michael J. Freedman, Princeton University Census: Location-Aware Membership Management for Large-Scale Distributed Systems . . . . . . . . . . . . . . . . . . . 159 James Cowling, Dan R.K. Ports, Barbara Liskov, and Raluca Ada Popa, MIT CSAIL; Abhijeet Gaikwad, École Centrale Paris Veracity: Practical Secure Network Coordinates via Vote-based Agreements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 Micah Sherr, Matt Blaze, and Boon Thau Loo, University of Pennsylvania Kernel Development Decaf: Moving Device Drivers to a Modern Language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 Matthew J. Renzelmann and Michael M. Swift, University of Wisconsin—Madison Rump File Systems: Kernel Code Reborn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .201 Antti Kantee, Helsinki University of Technology CiAO: An Aspect-Oriented Operating-System Family for Resource-Constrained Embedded Systems . . . . . . . . . 215 Daniel Lohmann, Wanja Hofer, and Wolfgang Schröder-Preikschat, FAU Erlangen—Nuremberg; Jochen Streicher and Olaf Spinczyk, TU Dortmund Automated Management Automatically Generating Predicates and Solutions for Configuration Troubleshooting . . . . . . . . . . . . . . . . . . . . . 229 Ya-Yunn Su, NEC Laboratories America; Jason Flinn, University of Michigan JustRunIt: Experiment-Based Management of Virtualized Data Centers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 Wei Zheng and Ricardo Bianchini, Rutgers University; G. John Janakiraman, Jose Renato Santos, and Yoshio Turner, HP Labs vPath: Precise Discovery of Request Processing Paths from Black-Box Observations of Thread and Network Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 Byung Chul Tak, Pennsylvania State University; Chunqiang Tang and Chun Zhang, IBM T.J. Watson Research Center; Sriram Govindan and Bhuvan Urgaonkar, Pennsylvania State University; Rong N. Chang, IBM T.J. Watson Research Center Short Papers The Restoration of Early UNIX Artifacts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .273 Warren Toomey, Bond University Block Management in Solid-State Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .279 Abhishek Rajimwale, University of Wisconsin, Madison; Vijayan Prabhakaran and John D. Davis, Microsoft Research, Silicon Valley Linux Kernel Developer Responses to Static Analysis Bug Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .285 Philip J. Guo and Dawson Engler, Stanford University Hardware Execution Throttling for Multi-core Resource Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .293 Xiao Zhang, Sandhya Dwarkadas, and Kai Shen, University of Rochester iv 2009 USENIX Annual Technical Conference USENIX Association
Friday, June 19 System Optimization Reducing Seek Overhead with Application-Directed Prefetching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .299 Steve VanDeBogart, Christopher Frost, and Eddie Kohler, UCLA Fido: Fast Inter-Virtual-Machine Communication for Enterprise Appliances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313 Anton Burtsev, University of Utah; Kiran Srinivasan, Prashanth Radhakrishnan, Lakshmi N. Bairavasundaram, Kaladhar Voruganti, and Garth R. Goodson, NetApp, Inc. STOW: A Spatially and Temporally Optimized Write Caching Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .327 Binny S. Gill and Michael Ko, IBM Almaden Research Center; Biplob Debnath, University of Minnesota; Wendy Belluomini, IBM Almaden Research Center Web, Internet, Data Center Black-Box Performance Control for High-Volume Non-Interactive Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341 Chunqiang Tang, IBM T.J. Watson Research Center; Sunjit Tara, IBM Software Group, Tivoli; Rong N. Chang and Chun Zhang, IBM T.J. Watson Research Center Server Workload Analysis for Power Minimization using Consolidation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355 Akshat Verma, Gargi Dasgupta, Tapan Kumar Nayak, Pradipta De, and Ravi Kothari, IBM India Research Lab RCB: A Simple and Practical Framework for Real-time Collaborative Browsing . . . . . . . . . . . . . . . . . . . . . . . . . .369 Chuan Yue, Zi Chu, and Haining Wang, The College of William and Mary Bugs and Software Updates The Beauty and the Beast: Vulnerabilities in Red Hat’s Packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .383 Stephan Neuhaus, Università degli Studi di Trento; Thomas Zimmermann, Microsoft Research Immediate Multi-Threaded Dynamic Software Updates Using Stack Reconstruction . . . . . . . . . . . . . . . . . . . . . . 397 Kristis Makris and Rida A. Bazzi, Arizona State University Zephyr: Efficient Incremental Reprogramming of Sensor Nodes using Function Call Indirections and Difference Computation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411 Rajesh Krishna Panta, Saurabh Bagchi, and Samuel P. Midkiff, Purdue University USENIX Association 2009 USENIX Annual Technical Conference v
Message from the Program Co-Chairs Welcome to the 2009 USENIX Annual Technical Conference! Once again USENIX Annual Tech continues its tradition of high-quality papers that both break new ground and provide practical insight into modern computer systems. The program committee accepted 32 excellent papers—28 long and 4 short—selected from 191 submissions. The topics range from tolerating file system errors, tracking data provenance, and reprogramming sensor networks to breathing new life into UNIX artifacts. The program also features two engaging plenary talks . James Hamilton from Amazon opens the conference with a keynote on the critical issue of power in large-scale datacenters, and Hugo Award–winning author David Brin closes the confer- ence with a plenary on new tools for problem solving in the information age and their policy implications in the near future . We had an excellent program committee of 26 members drawn from both industry and academia. As with other conferences receiving a large number of submissions, the PC reviewed the submitted papers in two rounds. In the first round, every paper received at least three reviews. Based on these reviews, we assigned at least one additional review for 10 short papers and two additional reviews for 80 long papers. During the process, we also relied upon the specific expertise of 52 external reviewers. In total, the 191 submitted papers received 743 reviews. The pro- gram committee then met on March 12, 2009, for a lively full-day discussion that resulted in the final conference program. The PC shepherded all accepted papers, and the authors produced the polished final papers that constitute these proceedings . As program co-chairs, we stand on the shoulders of many who did a tremendous amount of hard work. First, and most importantly, we thank all of the authors for their creative and compelling research—the conference and the community around which it forms would not exist without it. We thank the program committee for their diligence and commitment—each PC member reviewed nearly 30 papers, a dedicated undertaking. We thank our external re- viewers for contributing much-needed reviews on short notice, Microsoft for hosting the PC meeting in Redmond, and Eddie Kohler for his tireless efforts supporting the HotCRP conference management software. Finally, we thank the USENIX staff—Ellie, Jane-Ellen, Devon, Casey, and many others—for all the tremendous behind-the- scenes work that makes the conference both a success and a reality . Finally, we would like to thank our industry sponsors for their support in making the 2009 USENIX Annual Technical Conference possible and enjoyable. In particular we thank VMware, Google, Hewlett-Packard, Microsoft Research, NetApp, and Berkeley Communications for their generous support. We hope you enjoy the program and the conference! Alec Wolman, Microsoft Research Geoffrey M. Voelker, University of California, San Diego 2009 USENIX Annual Technical Conference Co-Chairs USENIX Association 2009 USENIX Annual Technical Conference vii
分享到:
收藏