Zobrazeno 1 - 10
of 223
pro vyhledávání: '"Calder, Brad"'
This paper explores three approaches for protecting cloud application data planes to prevent unauthorized access to the application and its data and to prevent unwanted data exfiltration. Through an exploration of various concrete security architectu
Externí odkaz:
http://arxiv.org/abs/2201.13010
Autor:
Berenberg, Anna, Calder, Brad
Publikováno v:
ACM Computing Surveys, Volume 55, Issue 3, pp 1-48, 2022
This is a survey paper that explores six Cloud-based deployment archetypes for Cloud applications and the tradeoffs between them to achieve high availability, low end-user latency, and acceptable costs. These are (1) Zonal, (2) Regional, (3) Multi-Re
Externí odkaz:
http://arxiv.org/abs/2105.00560
Autor:
BERENBERG, ANNA1 aberenberg@google.com, CALDER, BRAD1 bcalder@google.com
Publikováno v:
ACM Computing Surveys. Apr2023, Vol. 55 Issue 3, p1-48. 48p.
Autor:
Calder, Brad a, *, Grunwald, Dirk b
Publikováno v:
In Journal of Systems Architecture 1999 45(9):651-679
Autor:
Chuang, Weihaw, Narayanasamy, Satish, Pokam, Gilles, Sampson, Jack, Van Biesbrouck, Michael, Venkatesh, Ganesh, Colavin, Osvaldo, Calder, Brad
Transactions have emerged as a promising way to exploit thread-level parallelism in the presence of shared data. Preventing data-races between threads traditionally implies lock-based synchronization. This comes at the risk of deadlock due to program
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______325::1c69054b98b82a641ddff8244ee3bde9
https://escholarship.org/uc/item/2zw5m2d2
https://escholarship.org/uc/item/2zw5m2d2
Future microprocessors will be highly susceptible to transient errors as the sizes of transistors decrease due to CMOS scaling. Prior techniques advocated full scale structural or temporal redundancy to achieve fault tolerance. Though they can provid
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______325::5bbd8466792f2718d45efb7753090fb6
https://escholarship.org/uc/item/97b6z37j
https://escholarship.org/uc/item/97b6z37j
Significant time is spent by companies trying to reproduce and fix bugs. BugNet is a recent architecture proposal that provides architecture support for debugging. It focuses on continuously recording information about the program execution which can
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______325::502a0feb9e4ff564bcbcacf070b8869e
https://escholarship.org/uc/item/44z2s1rm
https://escholarship.org/uc/item/44z2s1rm
Modern architecture research relies heavily on detailed pipeline simulation. A time consuming part of building a simulator is correctly emulating the operating system effects when performing application-level simulation. This requires hand coding the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______325::39a93aec647a8792ed08b7069e0f122e
https://escholarship.org/uc/item/3vp838xc
https://escholarship.org/uc/item/3vp838xc
Autor:
Narayanasamy, Satish, Calder, Brad
Significant time is spent by companies trying to reproduce and fix bugs. We recently proposed a hardware logging approach called BugNet to aid debugging, by capturing the last few million instructions that occurred right before a bug that results in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______325::0a19a819409f098e8bb4ca8aa13cf2aa
https://escholarship.org/uc/item/6439637w
https://escholarship.org/uc/item/6439637w
Bounds checking can be used to significantly increase software quality control and security. Bounds checking is the process of keeping track of the address boundaries for an object, buffer, or array, and checking loads and stores that access that str
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______325::c1962e38a8c5a77dc7d5e7dbaf2b230d
https://escholarship.org/uc/item/19d3607j
https://escholarship.org/uc/item/19d3607j