Zobrazeno 1 - 10
of 100
pro vyhledávání: '"Grot, Boris"'
Autor:
Ustiugov, Dmitrii, Jesalpura, Shyam, Alper, Mert Bora, Baczun, Michal, Feyzkhanov, Rustem, Bugnion, Edouard, Grot, Boris, Kogias, Marios
Serverless computing has emerged as a popular cloud deployment paradigm. In serverless, the developers implement their application as a set of chained functions that form a workflow in which functions invoke each other. The cloud providers are respon
Externí odkaz:
http://arxiv.org/abs/2309.14821
Many contemporary applications feature multi-megabyte instruction footprints that overwhelm the capacity of branch target buffers (BTB) and instruction caches (L1-I), causing frequent front-end stalls that inevitably hurt performance. BTB capacity is
Externí odkaz:
http://arxiv.org/abs/2301.03899
Recent years have seen stagnating improvements to branch predictor (BP) efficacy and a dearth of fresh ideas in branch predictor design, calling for fresh thinking in this area. This paper argues that looking at BP from the viewpoint of Reinforcement
Externí odkaz:
http://arxiv.org/abs/2106.13429
Autor:
Katsarakis, Antonios, Ma, Yijun, Tan, Zhaowei, Bainbridge, Andrew, Balkwill, Matthew, Dragojevic, Aleksandar, Grot, Boris, Radunovic, Bozidar, Zhang, Yongguang
State-of-the-art distributed in-memory datastores (FaRM, FaSST, DrTM) provide strongly-consistent distributed transactions with high performance and availability. Transactions in those systems are fully general; they can atomically manipulate any set
Externí odkaz:
http://arxiv.org/abs/2104.01327
Serverless computing has seen rapid adoption due to its high scalability and flexible, pay-as-you-go billing model. In serverless, developers structure their services as a collection of functions, sporadically invoked by various events like clicks. H
Externí odkaz:
http://arxiv.org/abs/2101.09355
Prior work has observed that fetch-directed prefetching (FDIP) is highly effective at covering instruction cache misses. The key to FDIP's effectiveness is having a sufficiently large BTB to accommodate the application's branch working set. In this w
Externí odkaz:
http://arxiv.org/abs/2006.13547
Recent years have seen a surge in the number of data leaks despite aggressive information-containment measures deployed by cloud providers. When attackers acquire sensitive data in a secure cloud environment, covert communication channels are a key t
Externí odkaz:
http://arxiv.org/abs/2006.03854
Publikováno v:
In Proceedings of the IEEE International Symposium on Workload Characterization (IISWC), Orlando, Florida, USA, 2019
Graph analytics power a range of applications in areas as diverse as finance, networking and business logistics. A common property of graphs used in the domain of graph analytics is a power-law distribution of vertex connectivity, wherein a small num
Externí odkaz:
http://arxiv.org/abs/2001.08448
Graph analytics power a range of applications in areas as diverse as finance, networking and business logistics. A common property of graphs used in the domain of graph analytics is a power-law distribution of vertex connectivity, wherein a small num
Externí odkaz:
http://arxiv.org/abs/2001.09783