skip to main content
10.1145/1755913acmconferencesBook PagePublication PageseurosysConference Proceedingsconference-collections
EuroSys '10: Proceedings of the 5th European conference on Computer systems
ACM2010 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
EuroSys '10: Fifth EuroSys Conference 2010 Paris France April 13 - 16, 2010
ISBN:
978-1-60558-577-2
Published:
13 April 2010
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the 5th ACM EuroSys conference on Computer Systems -- EuroSys 2010. Previous years have established a reputation for high quality, and a broad and enthusiastic attendance. We are delighted that this year is no exception, with an excellent program. The topics cover a wide variety of areas ranging from storage systems to kernels, from scheduling to transactional memory; and from clouds to real-time systems. In addition, the program includes a poster session to encourage detailed technical interactions. There are also a number of co-located workshops, tutorials on cutting-edge topics and the EuroSys Doctoral Symposium.

This year's call for papers attracted 141 submissions. These came from all over the world: Asia, Australia, Europe, North America and the Middle East. One paper was rejected for failing to meet the formatting guidelines, so we had 140 papers to choose from. The program committee (PC) used a two-round reviewing process that winnowed down the full set of papers to 67 for the second round and then selected 27 papers for the final program. All papers received at least 3 reviews; all secondround papers received 6 or 7 reviews. A total of 630 reviews were written. All this in only two months!

EuroSys 2010 is organized in Paris by the Institut National de Recherche en Informatique et Automatique (INRIA) and the Conservatoire National des Arts et Métiers (CNAM) with the support of the ACM SIGOPS France (ASF). The organization of EuroSys 2010 would not have been possible without the dedication of all the members of the organization committee. Samia Bouzefrane, and Elisabeth Lebret deserve special thanks for their extensive work on the conference logistics. Frédéric Le Mouël and Laurent Réveillère have done a prodigious job in continuously maintaining the conference web site. Finally, we would like to thank the EuroSys board for their continued support.

Skip Table Of Content Section
SESSION: Storage systems
research-article
Using transparent compression to improve SSD-based I/O caches

Flash-based solid state drives (SSDs) offer superior performance over hard disks for many workloads. A prominent use of SSDs in modern storage systems is to use these devices as a cache in the I/O path. In this work, we examine how transparent, online I/...

research-article
Differential RAID: rethinking RAID for SSD reliability

SSDs exhibit very different failure characteristics compared to hard drives. In particular, the Bit Error Rate (BER) of an SSD climbs as it receives more writes. As a result, RAID arrays composed from SSDs are subject to correlated failures. By ...

SESSION: Transactional memory
research-article
Evaluation of AMD's advanced synchronization facility within a complete transactional memory stack

AMD's Advanced Synchronization Facility (ASF) is an x86 instruction set extension proposal intended to simplify and speed up the synchronization of concurrent programs. In this paper, we report our experiences using ASF for implementing transactional ...

research-article
Transactional memory support for scalable and transparent parallelization of multiplayer games

In this paper, we study parallelization of multiplayer games using software Transactional Memory (STM) support. We show that the STM provides not only ease of programming, but also better performance than that achievable with state-of-the-art lock-based ...

SESSION: Real-time systems
research-article
Self-tuning schedulers for legacy real-time applications

We present an approach for adaptive scheduling of soft real-time legacy applications (for which no timing information is exposed to the system). Our strategy is based on the combination of two techniques: 1) a real-time monitor that observes the ...

research-article
High-level programming of embedded hard real-time devices

While managed languages such as C# and Java have become quite popular in enterprise computing, they are still considered unsuitable for hard real-time systems. In particular, the presence of garbage collection has been a sore point for their acceptance ...

SESSION: Systems management
research-article
Barricade: defending systems against operator mistakes

In this paper, we propose a management framework for protecting large computer systems against operator mistakes. By detecting and confining mistakes to isolated portions of the managed system, our framework facilitates correct operation even by ...

research-article
Splitter: a proxy-based approach for post-migration testing of web applications

The benefits of virtualized IT environments, such as compute clouds, have drawn interested enterprises to migrate their applications onto new platforms to gain the advantages of reduced hardware and energy costs, increased flexibility and deployment ...

research-article
Fingerprinting the datacenter: automated classification of performance crises

Contemporary datacenters comprise hundreds or thousands of machines running applications requiring high availability and responsiveness. Although a performance crisis is easily detected by monitoring key end-to-end performance indicators (KPIs) such as ...

SESSION: Scheduling
research-article
Bias scheduling in heterogeneous multi-core architectures

Heterogeneous architectures that integrate a mix of big and small cores are very attractive because they can achieve high single-threaded performance while enabling high performance thread-level parallelism with lower energy costs. Despite their ...

research-article
A comprehensive scheduler for asymmetric multicore systems

Symmetric-ISA (instruction set architecture) asymmetric-performance multicore processors were shown to deliver higher performance per watt and area for applications with diverse architectural requirements, and so it is likely that future multicore ...

research-article
Resource-conscious scheduling for energy efficiency on multicore processors

In multicore systems, shared resources such as caches or the memory subsystem can lead to contention between applications running on different cores, entailing reduced performance and poor energy efficiency. The characteristics of individual ...

SESSION: Kernel
research-article
Reverse engineering of binary device drivers with RevNIC

This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driver's logic, and synthesizes new device driver code that implements the exact ...

research-article
Otherworld: giving applications a chance to survive OS kernel crashes

The default behavior of all commodity operating systems today is to restart the system when a critical error is encountered in the kernel. This terminates all running applications with an attendant loss of "work in progress" that is nonpersistent.

...

research-article
Defeating return-oriented rootkits with "Return-Less" kernels

Targeting the operating system (OS) kernel, kernel rootkits pose a formidable threat to computer systems and their users. Recent efforts have made significant progress in blocking them from injecting malicious code into the OS kernel for execution. ...

research-article
NOVA: a microhypervisor-based secure virtualization architecture

The availability of virtualization features in modern CPUs has reinforced the trend of consolidating multiple guest operating systems on top of a hypervisor in order to improve platform-resource utilization and reduce the total cost of ownership. ...

SESSION: Cloud
research-article
Boom analytics: exploring data-centric, declarative programming for the cloud

Building and debugging distributed software remains extremely difficult. We conjecture that by adopting a data-centric approach to system design and by employing declarative programming languages, a broad range of distributed software can be recast ...

research-article
Q-clouds: managing performance interference effects for QoS-aware clouds

Cloud computing offers users the ability to access large pools of computational and storage resources on demand. Multiple commercial clouds already allow businesses to replace, or supplement, privately owned IT assets, alleviating them from the burden ...

research-article
HadoopToSQL: a mapReduce query optimizer

MapReduce is a cost-effective way to achieve scalable performance for many log-processing workloads. These workloads typically process their entire dataset. MapReduce can be inefficient, however, when handling business-oriented workloads, especially ...

research-article
Delay scheduling: a simple technique for achieving locality and fairness in cluster scheduling

As organizations start to use data-intensive cluster computing systems like Hadoop and Dryad for more applications, there is a growing need to share clusters between users. However, there is a conflict between fairness in scheduling and data locality (...

SESSION: Security
research-article
Residue objects: a challenge to web browser security

A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be alive/active is non-trivial, but the decisions can be security-critical. ...

research-article
Policy-based access control for weakly consistent replication

Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be temporarily inconsistent, any given operation may be permitted at one node and ...

SESSION: Bugs and profiling
research-article
Kivati: fast detection and prevention of atomicity violations

Bugs in concurrent programs are extremely difficult to find and fix during testing. In this paper, we propose Kivati, which can efficiently detect and prevent atomicity violation bugs. Kivati imposes an average run-time overhead of 19%, which makes it ...

research-article
Execution synthesis: a technique for automated software debugging

Debugging real systems is hard, requires deep knowledge of the code, and is time-consuming. Bug reports rarely provide sufficient information, thus forcing developers to turn into detectives searching for an explanation of how the program could have ...

research-article
Locating cache performance bottlenecks using data profiling

Effective use of CPU data caches is critical to good performance, but poor cache use patterns are often hard to spot using existing execution profiling tools. Typical profilers attribute costs to specific code locations. The costs due to frequent cache ...

SESSION: Multicast
research-article
Dr. multicast: Rx for data center communication scalability

IP Multicast (IPMC) in data centers becomes disruptive when the technology is used by a large number of groups, a capability desired by event notification systems. We trace the problem to root causes, and introduce Dr. Multicast (MCMD), a system that ...

research-article
The next 700 BFT protocols

Modern Byzantine fault-tolerant state machine replication (BFT) protocols involve about 20,000 lines of challenging C++ code encompassing synchronization, networking and cryptography. They are notoriously difficult to develop, test and prove. We present ...

Contributors
  • INRIA Institut National de Recherche en Informatique et en Automatique
  • INRIA Institut National de Recherche en Informatique et en Automatique

Recommendations

Acceptance Rates

Overall Acceptance Rate241of1,308submissions,18%
YearSubmittedAcceptedRate
EuroSys '211813821%
EuroSys '202344318%
EuroSys '182624316%
EuroSys '161803821%
EuroSys '141472718%
EuroSys '131432820%
EuroSys '111612415%
Overall1,30824118%