Now showing items 1-20 of 92

    • Accelerating Markov chain Monte Carlo via parallel predictive prefetching 

      Angelino, Elaine Lee (2014-10-21)
      We present a general framework for accelerating a large class of widely used Markov chain Monte Carlo (MCMC) algorithms. This dissertation demonstrates that MCMC inference can be accelerated in a model of parallel computation ...
    • Accelerating MCMC with Parallel Predictive Prefetching 

      Angelino, Elaine; Kohler, Eddie W; Waterland, Amos; Seltzer, Margo I.; Adams, Ryan Prescott (AUAI Press, 2014)
      Parallel predictive prefetching is a new frame- work for accelerating a large class of widely- used Markov chain Monte Carlo (MCMC) algorithms. It speculatively evaluates many potential steps of an MCMC chain in parallel ...
    • Addressing Underspecified Lineage Queries on Provenance 

      Margo, Daniel Wyatt; Macko, Peter; Seltzer, Margo I. (2011)
      State-of-the-art provenance systems accumulate data over time, creating deep lineage trees. When queried for the lineage of an object, these systems can return excessive results due to the longevity and depth of their ...
    • The ANT Architecture--An Architecture for CS1 

      Ellard, Daniel J.; Ellard, Penelope A.; Megquier, James M.; Chen, J. Bradley; Seltzer, Margo I. (1998)
      A central goal of high-level programming languages, such as those we use to teach introductory computer science courses, is to provide an abstraction that hides the complexity and idiosyncrasies of computer hardware. ...
    • Application Performance on the Direct Access File System 

      Fedorova, Alexandra; Seltzer, Margo I.; Magoutis, Kostas; Addetia, Salimah (2003)
      The Direct Access File System (DAFS) is a distributed file system built on top of direct-access transports (DAT). Direct-access transports are characterized by using remote direct memory access (RDMA) for data transfer and ...
    • An Architecture A Day Keeps The Hacker Away 

      Holland, David; Lim, Ada T.; Seltzer, Margo (Association for Computing Machinery, 2005)
      System security as it is practiced today is a losing battle. In this paper, we outline a possible comprehensive solution for binary-based attacks, using virtual machines, machine descriptions, and randomization to achieve ...
    • ASC: Automatically Scalable Computation 

      Waterland, Amos; Angelino, Elaine; Adams, Ryan Prescott; Appavoo, Jonathan; Seltzer, Margo I. (Association of Computing Machinery, 2014)
      We present an architecture designed to transparently and automatically scale the performance of sequential programs as a function of the hardware resources available. The architecture is predicated on a model of computation ...
    • Attribute-Based Prediction of File Properties 

      Ellard, Daniel; mesnier, Michael; Thereska, Eno; Ganger, Gregory R.; Seltzer, Margo I. (2003)
      We present evidence that attributes that are known to the file system when a file is created, such as its name, permission mode, and owner, are often strongly related to future properties of the file such as its ultimate ...
    • Benchmarking File System Benchmarking: It *IS* Rocket Science 

      Tarasov, Vasily; Bhanage, Saumitra; Zadok, Erez; Seltzer, Margo I. (USENIX Association, 2011)
      The quality of file system benchmarking has not improved in over a decade of intense research spanning hundreds of publications. Researchers repeatedly use a wide range of poorly designed benchmarks, and in most cases, ...
    • BURRITO: Wrapping Your Lab Notebook in Computational Infrastructure 

      Guo, Philip J.; Seltzer, Margo I. (USENIX Association, 2012)
      Researchers in fields such as bioinformatics, CS, finance, and applied math have trouble managing the numerous code and data files generated by their computational experiments, comparing the results of trials executed with ...
    • Cache-Fair Thread Scheduling for Multicore Processors 

      Fedorova, Alexandra; Seltzer, Margo I.; Smith, Michael D. (2006)
      We present a new operating system scheduling algorithm for multicore processors. Our algorithm reduces the effects of unequal CPU cache sharing that occur on these processors and cause unfair CPU sharing, priority inversion, ...
    • The Case for Browser Provenance 

      Margo, Daniel Wyatt; Seltzer, Margo I. (USENIX Association, 2009)
      In our increasingly networked world, web browsers are important applications. Originally an interface tool for accessing distributed documents, browsers have become ubiquitous, incorporating a significant portion of user ...
    • The Case for Extensible Operating Systems 

      Seltzer, Margo I.; Small, Christopher A.; Smith, Keith (1996)
      Many of the performance improvements cited in recent operating systems research describe specific enhancements to normal operating system functionality that improve performance in a set of designated test cases. Global ...
    • Choosing a Data Model and Query Language for Provenance 

      Holland, David A; Braun, Uri Jacob; Maclean, Diana; Muniswamy-Reddy, Kiran-Kumar; Seltzer, Margo I. (Springer, 2008)
      The ancestry relationships found in provenance form a directed graph. Many provenance queries require traversal of this graph. The data and query models for provenance should directly and naturally address this graph-centric ...
    • Clilets: Web Applications with Secure Client-Side Storage 

      Fischer, Robert; Seltzer, Margo I. (2002)
      Today’s web applications require that all data be visible to the server. This is a problem in cases, such as a Web Tax service, where the user may not trust the server with the data. We present the Clilet system, a new web ...
    • Collecting Provenance via the Xen Hypervisor 

      Macko, Peter; Chiarini, Marc A.; Seltzer, Margo I. (USENIX Association, 2011)
      The Provenance Aware Storage Systems project (PASS) currently collects system-level provenance by intercepting system calls in the Linux kernel and storing the provenance in a stackable filesystem. While this approach is ...
    • Computational Caches 

      Waterland, Amos; Angelino, Elaine Lee; Cubuk, Ekin Dogus; Kaxiras, Efthimios; Adams, Ryan Prescott; Appavoo, Jonathan; Seltzer, Margo I. (ACM Press, 2013)
      Caching is a well-known technique for speeding up computation. We cache data from file systems and databases; we cache dynamically generated code blocks; we cache page translations in TLBs. We propose to cache the act of ...
    • A Cost-Space Approach to Distributed Query Optimization in Stream Based Overlays 

      Shneidman, Jeffrey; Pietzuch, Peter; Welsh, Matt; Seltzer, Margo; Roussopoulos, Mema (IEEE Computer Society, 2005)
      Distributed stream-based applications, such as continuous query systems, have network scale and time characteristics that challenge traditional distributed query optimization. The optimization sub-problems of plan generation ...
    • Data provenance to audit compliance with privacy policy in the Internet of Things 

      Pasquier, Thomas; Singh, Jatinder; Powles, Julia; Eyers, David; Seltzer, Margo I.; Bacon, Jean (Springer Nature, 2017)
      Managing privacy in the IoT presents a significant challenge. We make the case that information obtained by auditing the flows of data can assist in demonstrating that the systems handling personal data satisfy regulatory ...
    • Dimetrodon: Processor-level Preventive Thermal Management via Idle Cycle Injection 

      Bailis, Peter; Reddi, Vijay Janapa; Gandhi, Sanjay; Brooks, David M.; Seltzer, Margo I. (ACM, 2011)
      Processor-level dynamic thermal management techniques have long targeted worst-case thermal margins. We examine the thermal-performance trade-offs in average-case, preventive thermal management by actively degrading ...