It is our great pleasure to welcome you to the 5th ACM EuroSys conference on Computer Systems -- EuroSys 2010. Previous years have established a reputation for high quality, and a broad and enthusiastic attendance. We are delighted that this year is no exception, with an excellent program. The topics cover a wide variety of areas ranging from storage systems to kernels, from scheduling to transactional memory; and from clouds to real-time systems. In addition, the program includes a poster session to encourage detailed technical interactions. There are also a number of co-located workshops, tutorials on cutting-edge topics and the EuroSys Doctoral Symposium.
This year's call for papers attracted 141 submissions. These came from all over the world: Asia, Australia, Europe, North America and the Middle East. One paper was rejected for failing to meet the formatting guidelines, so we had 140 papers to choose from. The program committee (PC) used a two-round reviewing process that winnowed down the full set of papers to 67 for the second round and then selected 27 papers for the final program. All papers received at least 3 reviews; all secondround papers received 6 or 7 reviews. A total of 630 reviews were written. All this in only two months!
EuroSys 2010 is organized in Paris by the Institut National de Recherche en Informatique et Automatique (INRIA) and the Conservatoire National des Arts et Métiers (CNAM) with the support of the ACM SIGOPS France (ASF). The organization of EuroSys 2010 would not have been possible without the dedication of all the members of the organization committee. Samia Bouzefrane, and Elisabeth Lebret deserve special thanks for their extensive work on the conference logistics. Frédéric Le Mouël and Laurent Réveillère have done a prodigious job in continuously maintaining the conference web site. Finally, we would like to thank the EuroSys board for their continued support.
Proceeding Downloads
Using transparent compression to improve SSD-based I/O caches
Flash-based solid state drives (SSDs) offer superior performance over hard disks for many workloads. A prominent use of SSDs in modern storage systems is to use these devices as a cache in the I/O path. In this work, we examine how transparent, online I/...
Differential RAID: rethinking RAID for SSD reliability
SSDs exhibit very different failure characteristics compared to hard drives. In particular, the Bit Error Rate (BER) of an SSD climbs as it receives more writes. As a result, RAID arrays composed from SSDs are subject to correlated failures. By ...
Evaluation of AMD's advanced synchronization facility within a complete transactional memory stack
- Dave Christie,
- Jae-Woong Chung,
- Stephan Diestelhorst,
- Michael Hohmuth,
- Martin Pohlack,
- Christof Fetzer,
- Martin Nowack,
- Torvald Riegel,
- Pascal Felber,
- Patrick Marlier,
- Etienne Rivière
AMD's Advanced Synchronization Facility (ASF) is an x86 instruction set extension proposal intended to simplify and speed up the synchronization of concurrent programs. In this paper, we report our experiences using ASF for implementing transactional ...
Transactional memory support for scalable and transparent parallelization of multiplayer games
In this paper, we study parallelization of multiplayer games using software Transactional Memory (STM) support. We show that the STM provides not only ease of programming, but also better performance than that achievable with state-of-the-art lock-based ...
Self-tuning schedulers for legacy real-time applications
We present an approach for adaptive scheduling of soft real-time legacy applications (for which no timing information is exposed to the system). Our strategy is based on the combination of two techniques: 1) a real-time monitor that observes the ...
High-level programming of embedded hard real-time devices
While managed languages such as C# and Java have become quite popular in enterprise computing, they are still considered unsuitable for hard real-time systems. In particular, the presence of garbage collection has been a sore point for their acceptance ...
Barricade: defending systems against operator mistakes
In this paper, we propose a management framework for protecting large computer systems against operator mistakes. By detecting and confining mistakes to isolated portions of the managed system, our framework facilitates correct operation even by ...
Splitter: a proxy-based approach for post-migration testing of web applications
The benefits of virtualized IT environments, such as compute clouds, have drawn interested enterprises to migrate their applications onto new platforms to gain the advantages of reduced hardware and energy costs, increased flexibility and deployment ...
Fingerprinting the datacenter: automated classification of performance crises
Contemporary datacenters comprise hundreds or thousands of machines running applications requiring high availability and responsiveness. Although a performance crisis is easily detected by monitoring key end-to-end performance indicators (KPIs) such as ...
Bias scheduling in heterogeneous multi-core architectures
Heterogeneous architectures that integrate a mix of big and small cores are very attractive because they can achieve high single-threaded performance while enabling high performance thread-level parallelism with lower energy costs. Despite their ...
A comprehensive scheduler for asymmetric multicore systems
Symmetric-ISA (instruction set architecture) asymmetric-performance multicore processors were shown to deliver higher performance per watt and area for applications with diverse architectural requirements, and so it is likely that future multicore ...
Resource-conscious scheduling for energy efficiency on multicore processors
In multicore systems, shared resources such as caches or the memory subsystem can lead to contention between applications running on different cores, entailing reduced performance and poor energy efficiency. The characteristics of individual ...
Reverse engineering of binary device drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driver's logic, and synthesizes new device driver code that implements the exact ...
Otherworld: giving applications a chance to survive OS kernel crashes
The default behavior of all commodity operating systems today is to restart the system when a critical error is encountered in the kernel. This terminates all running applications with an attendant loss of "work in progress" that is nonpersistent.
...
Defeating return-oriented rootkits with "Return-Less" kernels
Targeting the operating system (OS) kernel, kernel rootkits pose a formidable threat to computer systems and their users. Recent efforts have made significant progress in blocking them from injecting malicious code into the OS kernel for execution. ...
NOVA: a microhypervisor-based secure virtualization architecture
The availability of virtualization features in modern CPUs has reinforced the trend of consolidating multiple guest operating systems on top of a hypervisor in order to improve platform-resource utilization and reduce the total cost of ownership. ...
Boom analytics: exploring data-centric, declarative programming for the cloud
Building and debugging distributed software remains extremely difficult. We conjecture that by adopting a data-centric approach to system design and by employing declarative programming languages, a broad range of distributed software can be recast ...
Q-clouds: managing performance interference effects for QoS-aware clouds
Cloud computing offers users the ability to access large pools of computational and storage resources on demand. Multiple commercial clouds already allow businesses to replace, or supplement, privately owned IT assets, alleviating them from the burden ...
HadoopToSQL: a mapReduce query optimizer
MapReduce is a cost-effective way to achieve scalable performance for many log-processing workloads. These workloads typically process their entire dataset. MapReduce can be inefficient, however, when handling business-oriented workloads, especially ...
Delay scheduling: a simple technique for achieving locality and fairness in cluster scheduling
As organizations start to use data-intensive cluster computing systems like Hadoop and Dryad for more applications, there is a growing need to share clusters between users. However, there is a conflict between fairness in scheduling and data locality (...
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be alive/active is non-trivial, but the decisions can be security-critical. ...
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be temporarily inconsistent, any given operation may be permitted at one node and ...
Kivati: fast detection and prevention of atomicity violations
Bugs in concurrent programs are extremely difficult to find and fix during testing. In this paper, we propose Kivati, which can efficiently detect and prevent atomicity violation bugs. Kivati imposes an average run-time overhead of 19%, which makes it ...
Execution synthesis: a technique for automated software debugging
Debugging real systems is hard, requires deep knowledge of the code, and is time-consuming. Bug reports rarely provide sufficient information, thus forcing developers to turn into detectives searching for an explanation of how the program could have ...
Locating cache performance bottlenecks using data profiling
Effective use of CPU data caches is critical to good performance, but poor cache use patterns are often hard to spot using existing execution profiling tools. Typical profilers attribute costs to specific code locations. The costs due to frequent cache ...
Dr. multicast: Rx for data center communication scalability
- Ymir Vigfusson,
- Hussam Abu-Libdeh,
- Mahesh Balakrishnan,
- Ken Birman,
- Robert Burgess,
- Gregory Chockler,
- Haoyuan Li,
- Yoav Tock
IP Multicast (IPMC) in data centers becomes disruptive when the technology is used by a large number of groups, a capability desired by event notification systems. We trace the problem to root causes, and introduce Dr. Multicast (MCMD), a system that ...
The next 700 BFT protocols
Modern Byzantine fault-tolerant state machine replication (BFT) protocols involve about 20,000 lines of challenging C++ code encompassing synchronization, networking and cryptography. They are notoriously difficult to develop, test and prove. We present ...
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
EuroSys '21 | 181 | 38 | 21% |
EuroSys '20 | 234 | 43 | 18% |
EuroSys '18 | 262 | 43 | 16% |
EuroSys '16 | 180 | 38 | 21% |
EuroSys '14 | 147 | 27 | 18% |
EuroSys '13 | 143 | 28 | 20% |
EuroSys '11 | 161 | 24 | 15% |
Overall | 1,308 | 241 | 18% |