

Proceedings of the 19th Workshop on Hot Topics in Operating Systems
source link: https://dl.acm.org/doi/proceedings/10.1145/3593856
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Proceedings of the 19th Workshop on Hot Topics in Operating Systems
No abstract available.
CPU-free Computing: A Vision with a Blueprint
Since the inception of computing, we have been reliant on CPU-powered architectures. However, today this reliance is challenged by manufacturing limitations (CMOS … (More)
Metal: An Open Architecture for Developing Processor Features
In recent years, an increasing number of hardware devices started providing programming interfaces to developers such as smart NICs. Processor vendors use microcode to … (More)
Software-Defined CPU Modes
Our CPUs contain a compute instruction set, which regular applications use. But they also feature an intricate underworld of different CPU modes, combined with trap and … (More)
Out of Hand for Hardware? Within Reach for Software!
Events that take 10s to 100s of ns like cache misses increasingly cause CPU stalls. However, hiding the latency of these events is challenging: hardware mechanisms suffer from the … (More)
The Case for Performance Interfaces for Hardware Accelerators
While systems designers are increasingly turning to hardware accelerators for performance gains, realizing these gains is painstaking and error-prone. It can take several … (More)
Putting out the hardware dumpster fire
The immense hardware complexity of modern computers, both mobile phones and datacenter servers, is a seemingly endless source of bugs and vulnerabilities in system software.
… (More)Prefetching Using Principles of Hippocampal-Neocortical Interaction
Memory prefetching improves performance across many systems layers. However, achieving high prefetch accuracy with low overhead is challenging, as memory hierarchies and … (More)
Degrading Data to Save the Planet
Storage capacity demand is projected to grow exponentially in the coming decade and so will its contribution to the overall carbon footprint of computing devices. In recent years, … (More)
System Virtualization for Neural Processing Units
Modern cloud platforms have been employing hardware accelerators such as neural processing units (NPUs) to meet the increasing demand for computing resources for AI-based … (More)
Executing Shell Scripts in the Wrong Order, Correctly
Shell scripts are critical infrastructure for developers, administrators, and scientists; and ought to enjoy the performance benefits of the full suite of advances in compiler … (More)
Towards Modern Development of Cloud Applications
When writing a distributed application, conventional wisdom says to split your application into separate services that can be rolled out independently. This approach … (More)
Fabric-Centric Computing
Emerging memory fabrics and the resulting composable infrastructures have fundamentally challenged our conventional wisdom on how to build efficient rack/cluster-scale … (More)
Towards Increased Datacenter Efficiency with Soft Memory
Memory is the bottleneck resource in today's datacenters because it is inflexible: low-priority processes are routinely killed to free up resources during memory pressure. This wastes … (More)
Automatic Kernel Offload Using BPF
BPF support in Linux has made kernel extensions easier. Recent efforts have shown that using BPF to offload portions of server applications, e.g., memcached and service proxies, can … (More)
Kernel extension verification is untenable
The emergence of verified eBPF bytecode is ushering in a new era of safe kernel extensions. In this paper, we argue that eBPF's verifier---the source of its safety … (More)
Beyond isolation: OS verification as a foundation for correct applications
Verified systems software has generally had to assume the correctness of the operating system and its provided services (like networking and the file system). Even though there exist … (More)
Programming Fully Disaggregated Systems
With full resource disaggregation on the horizon, it is unclear what the most suitable programming model is that enables dataflow developers to fully harvest the potential that recent … (More)
Unleashing True Utility Computing with Quicksand
Today's clouds are inefficient: their utilization of resources like CPUs, GPUs, memory, and storage is low. This inefficiency occurs because applications consume resources at … (More)
Towards a Manageable Intra-Host Network
Intra-host networks, including heterogeneous devices and interconnect fabrics, have become increasingly complex and crucial. However, intra-host networks today do not provide … (More)
Towards (Really) Safe and Fast Confidential I/O
Confidential cloud computing enables cloud tenants to distrust their service provider. Achieving confidential computing solutions that provide concrete security guarantees … (More)
Creating Trust by Abolishing Hierarchies
Software is going through a trust crisis. Privileged code is no longer trusted and processes insufficiently protect user code from unverified libraries. While usually treated … (More)
Recommend
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK