17 papers
19 files
27 references

Papers Referenced in This Repository

"We do not appreciate being experimented on": Developer and Researcher Views on the Ethics of Experiments on Open-Source Projects

D. Feitelson
2021
3 references

A tenet of open source software development is to accept contributions from users-developers (typically after appropriate vetting). But should this also include interventions done as part of research on open source development? Following an incident in which buggy code was submitted to the Linux ker...

Show 3 references in code

Euclidean Affine Functions and Applications to Calendar Algorithms

Cassio Neri, Lorenz Schneider
2021
5 references

We study properties of Euclidean affine functions (EAFs), namely those of the form $f(r) = (α\cdot r + β)/δ$, and their closely related expression $\mathring{f}(r) = (α\cdot r + β)\%δ$, where $r$, $α$, $β$ and $δ$ are integers, and where $/$ and $\%$ respectively denote the quotient and remainder of...

Show 3 references in code

Worst-Case TCAM Rule Expansion.

Ori Rottenstreich, I. Keslassy
2010
2 references

Designers of TCAMs (Ternary CAMs) for packet classification deal with unpredictable sets of rules, resulting in highly variable rule expansions, and rely on heuristic encoding algorithms with no reasonable expansion guarantees. In this paper, given several types of rules, we provide new upper bounds...

Show 2 references in code

SAX-PAC (Scalable And eXpressive PAcket Classification).

Kirill Kogan, Sergey Nikolenko, Ori Rottenstreich, William Culhane, Patrick Eugster
2014
2 references

Efficient packet classification is a core concern for network services. Traditional multi-field classification approaches, in both \nsoftware and ternary content-addressable memory (TCAMs), entail tradeoffs between (memory) space and (lookup) time. TCAMs \ncannot efficiently represent range rules, a...

Show 2 references in code

Spectre Returns! Speculation Attacks using the Return Stack Buffer

Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, N. Abu-Ghazaleh
2018
1 reference

The recent Spectre attacks exploit speculative execution, a pervasively used feature of modern microprocessors, to allow the exfiltration of sensitive data across protection boundaries. In this paper, we introduce a new Spectre-class attack that we call SpectreRSB. In particular, rather than exploit...

Show 1 reference in code

NetSpectre: Read Arbitrary Memory over Network

Scott Constable, Steve J. Chapin
2018
1 reference

In this paper, we present NetSpectre, a generic remote Spectre variant 1 attack. For this purpose, we demonstrate the first access-driven remote Evict+Reload cache attack over network, leaking 15 bits per hour. Beyond retrofitting existing attacks to a network scenario, we also demonstrate the first...

Show 1 reference in code

Algorithms for creating indexes for very large tables without quiescing updates

C. Mohan, Inderpal Narang
1992
1 reference

As relational DBMSs become more and more popular and as organizations grow, the sizes of individual tables are increasing dramatically. Unfortunately, current DBMSs do not allow updates to be performed on a table while an index (e.g., a B+-tree) is being built for that table, thereby decreasing the ...

Show 1 reference in code

Performance of memory reclamation for lockless synchronization

Tae L. Hart, Paul E. McKenney, Allison Brown, Jonathan Walpole
2007
1 reference
Show 1 reference in code

On a Real-Time Scheduling Problem

Sudarshan Dhall, C. L. Liu
1978
1 reference

We study the problem of scheduling periodic-time-critical tasks on multiprocessor computing systems. A periodic-time-critical task consists of an infinite number of requests, each of which has a prescribed deadline. The scheduling problem is to specify an order in which the requests of a set of task...

Show 1 reference in code

Linear-time Temporal Logic guided Greybox Fuzzing

Ruijie Meng, Zhen Dong, Jialin Li, Ivan Beschastnikh, Abhik Roychoudhury
2021
1 reference

Software model checking as well as runtime verification are verification techniques which are widely used for checking temporal properties of software systems. Even though they are property verification techniques, their common usage in practice is in “bug finding”, that is, finding violations of te...

Show 1 reference in code

Engineering Radix Sort.

Peter M. McIlroy, Keith Bostic, M. Douglas McIlroy
1993
1 reference
Show 1 reference in code

The Power of Two Random Choices: A Survey of Techniques and Results

Michael Mitzenmacher, Andréa W. Richa, Ramesh K. Sitaraman
2001
1 reference
Show 1 reference in code

Syntax and semantics of the weak consistency model specification language cat

J. Alglave, P. Cousot, Luc Maranget
2016
1 reference

We provide the syntax and semantics of the cat language, a domain specific language to describe consistency properties of parallel/distributed programs. The language is implemented in the herd7 too (http://diy.inria.fr/doc/herd.html)l.

Show 1 reference in code
Link copied to clipboard!