Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Boris Pismenny"'
Publikováno v:
Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems.
Autor:
Boris Pismenny, J. J. Vegas Olmos, Yoray Zack, Liran Liss, Afra Domeke, Catalina Ioana Stan, Carlos Rubio Garcia, Idelfonso Tafur Monroy, Panagiotis Kokkinos, Aristotelis Kretsis, Manos Varvarigos
Publikováno v:
2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)
Workshop on Intelligent operations, security, and acceleration for edge computing (MeditCom)
2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom), 61-64
STARTPAGE=61;ENDPAGE=64;TITLE=2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)
Workshop on Intelligent operations, security, and acceleration for edge computing (MeditCom)
2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom), 61-64
STARTPAGE=61;ENDPAGE=64;TITLE=2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)
Networking is enabling a continuum comprising cloud, edge and last-mile systems. This continuum allows services and applications to join the fabric at any point and have access to processing power independently of the location of entrance. To enable
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::56387b2e7ae9de5b439421dac904d45e
https://research.tue.nl/en/publications/69a1b614-08df-4d94-977a-00b29d605d06
https://research.tue.nl/en/publications/69a1b614-08df-4d94-977a-00b29d605d06
Publikováno v:
HotStorage
Peripheral devices like SSDs are growing more complex, to the point they are effectively small computers themselves. Our position is that this trend creates a new kind of attack vector, where untrusted software could use peripherals strictly as inten
Publikováno v:
ASPLOS
CPUs routinely offload to NICs network-related processing tasks like packet segmentation and checksum. NIC offloads are advantageous because they free valuable CPU cycles. But their applicability is typically limited to layer≤4 protocols (TCP and l
Autor:
Austin Bolen, Igor Smolyar, Alex Markuze, Dan Tsafrir, Gerd Zellweger, Haggai Eran, Boris Pismenny, Liran Liss, Adam Morrison
Publikováno v:
ASPLOS
In a multi-CPU server, memory modules are local to the CPU to which they are connected, forming a nonuniform memory access (NUMA) architecture. Because non-local accesses are slower than local accesses, the NUMA architecture might degrade application
Autor:
Haggai Eran, Michael Cui, Boris Pismenny, Yiying Zhang, Michael Wei, Marcos K. Aguilera, Liran Liss, Aasheesh Kolli, Dan Tsafrir, Stanko Novakovic, Yizhou Shan
Publikováno v:
SYSTOR
RDMA technology enables a host to access the memory of a remote host without involving the remote CPU, improving the performance of distributed in-memory storage systems. Previous studies argued that RDMA suffers from scalability issues, because the