- Sponsor:
- sigops
It is our great pleasure to present the proceedings of the 8th ACM European Conference on Computer Systems. Ever since the first EuroSys conference in 2006, EuroSys has gained and maintained a reputation as one of the premier systems conferences in the world. This year is no exception. The program is thought-provoking, high quality, and very broad---with topics ranging from kernels to clouds; from storage to security; and from mobile devices to multicore servers. In addition, the program includes 5 colocated workshops, posters, and demos.
Proceeding Downloads
TimeStream: reliable stream computation in the cloud
- Zhengping Qian,
- Yong He,
- Chunzhi Su,
- Zhuojie Wu,
- Hongyu Zhu,
- Taizhi Zhang,
- Lidong Zhou,
- Yuan Yu,
- Zheng Zhang
TimeStream is a distributed system designed specifically for low-latency continuous processing of big streaming data on a large cluster of commodity machines. The unique characteristics of this emerging application domain have led to a significantly ...
Optimus: a dynamic rewriting framework for data-parallel execution plans
In distributed data-parallel computing, a user program is compiled into an execution plan graph (EPG), typically a directed acyclic graph. This EPG is the core data structure used by modern distributed execution engines for task distribution, job ...
BlinkDB: queries with bounded errors and bounded response times on very large data
In this paper, we present BlinkDB, a massively parallel, approximate query engine for running interactive SQL queries on large volumes of data. BlinkDB allows users to trade-off query accuracy for response time, enabling interactive queries over massive ...
IFDB: decentralized information flow control for databases
Numerous sensitive databases are breached every year due to bugs in applications. These applications typically handle data for many users, and consequently, they have access to large amounts of confidential information.
This paper describes IFDB, a DBMS ...
Process firewalls: protecting processes during resource access
Processes retrieve a variety of resources from the operating system in order to execute properly, but adversaries have several ways to trick processes into retrieving resources of the adversaries' choosing. Such resource access attacks use name ...
Resolving the conflict between generality and plausibility in verified computation
The area of proof-based verified computation (outsourced computation built atop probabilistically checkable proofs and cryptographic machinery) has lately seen renewed interest. Although recent work has made great strides in reducing the overhead of ...
ChainReaction: a causal+ consistent datastore based on chain replication
This paper proposes a Geo-distributed key-value datastore, named ChainReaction, that offers causal+ consistency, with high performance, fault-tolerance, and scalability. ChainReaction enforces causal+ consistency which is stronger than eventual ...
Augustus: scalable and robust storage for cloud applications
Cloud-scale storage applications have strict requirements. On the one hand, they require scalable throughput; on the other hand, many applications would largely benefit from strong consistency. Since these requirements are sometimes considered ...
MDCC: multi-data center consistency
Replicating data across multiple data centers allows using data closer to the client, reducing latency for applications, and increases the availability in the event of a data center failure. MDCC (Multi-Data Center Consistency) is an optimistic commit ...
Conversion: multi-version concurrency control for main memory segments
We present Conversion, a multi-version concurrency control system for main memory segments. Like the familiar Subversion version control system for files, Conversion provides isolation between processes that each operate on their own working copy. A ...
Whose cache line is it anyway?: operating system support for live detection and repair of false sharing
- Mihir Nanavati,
- Mark Spear,
- Nathan Taylor,
- Shriram Rajagopalan,
- Dutch T. Meyer,
- William Aiello,
- Andrew Warfield
As hardware parallelism continues to increase, CPU caches can no longer be considered as a transparent, hardware-level performance optimization. Cache impact on performance, in particular in the face of false sharing, is completely dependent on the ...
Adaptive parallelism for web search
A web search query made to Microsoft Bing is currently parallelized by distributing the query processing across many servers. Within each of these servers, the query is, however, processed sequentially. Although each server may be processing multiple ...
Mizan: a system for dynamic load balancing in large-scale graph processing
Pregel [23] was recently introduced as a scalable graph mining system that can provide significant performance improvements over traditional MapReduce implementations. Existing implementations focus primarily on graph partitioning as a preprocessing ...
MeT: workload aware elasticity for NoSQL
NoSQL databases manage the bulk of data produced by modern Web applications such as social networks. This stems from their ability to partition and spread data to all available nodes, allowing NoSQL systems to scale. Unfortunately, current solutions' ...
Presto: distributed machine learning and graph processing with sparse matrices
It is cumbersome to write machine learning and graph algorithms in data-parallel models such as MapReduce and Dryad. We observe that these algorithms are based on matrix computations and, hence, are inefficient to implement with the restrictive ...
RadixVM: scalable address spaces for multithreaded applications
RadixVM is a new virtual memory system design that enables fully concurrent operations on shared address spaces for multithreaded processes on cache-coherent multicore computers. Today, most operating systems serialize operations such as mmap and munmap,...
Failure-atomic msync(): a simple and efficient mechanism for preserving the integrity of durable data
Preserving the integrity of application data across updates is difficult if power outages and system crashes may occur during updates. Existing approaches such as relational databases and transactional key-value stores restrict programming flexibility ...
Composing OS extensions safely and efficiently with Bascule
- Andrew Baumann,
- Dongyoon Lee,
- Pedro Fonseca,
- Lisa Glendenning,
- Jacob R. Lorch,
- Barry Bond,
- Reuben Olinsky,
- Galen C. Hunt
Library OS (LibOS) architectures implement the OS personality as a user-mode library, giving each application the flexibility to choose its LibOS. This approach is appealing for many reasons, not least the ability to extend or customise the LibOS. ...
Hypnos: understanding and treating sleep conflicts in smartphones
To maximally conserve the critical resource of battery energy, smartphone OSes implement an aggressive system suspend policy that suspends the whole system after a brief period of user inactivity. This burdens developers with the responsibility of ...
Prefetching mobile ads: can advertising systems afford it?
Mobile app marketplaces are dominated by free apps that rely on advertising for their revenue. These apps place increased demands on the already limited battery lifetime of modern phones. For example, in the top 15 free Windows Phone apps, we found in-...
Maygh: building a CDN from client web browsers
Over the past two decades, the web has provided dramatic improvements in the ease of sharing content. Unfortunately, the costs of distributing this content are largely incurred by web site operators; popular web sites are required to make substantial ...
A compiler-level intermediate representation based binary analysis and rewriting system
This paper presents component techniques essential for converting executables to a high-level intermediate representation (IR) of an existing compiler. The compiler IR is then employed for three distinct applications: binary rewriting using the compiler'...
hClock: hierarchical QoS for packet scheduling in a hypervisor
Higher consolidation ratios in virtualized datacenters, SSD based storage arrays and converged IO fabric are mandating the need for more flexible and powerful models for physical network adapter bandwidth allocation. Existing solutions such as fair-...
RapiLog: reducing system complexity through verification
- Gernot Heiser,
- Etienne Le Sueur,
- Adrian Danis,
- Aleksander Budzynowski,
- Tudor-loan Salomie,
- Gustavo Alonso
Database management systems provide updates with guaranteed durability in the presence of OS crashes or power failures. Durability is achieved by performing synchronous writes to a transaction log on stable, non-volatile storage. The procedure is ...
Application level ballooning for efficient server consolidation
Systems software like databases and language runtimes typically manage memory themselves to exploit application knowledge unavailable to the OS. Traditionally deployed on dedicated machines, they are designed to be statically configured with memory ...
Omega: flexible, scalable schedulers for large compute clusters
Increasing scale and the need for rapid response to changing requirements are hard to meet with current monolithic cluster scheduler architectures. This restricts the rate at which new features can be deployed, decreases efficiency and utilization, and ...
Choosy: max-min fair sharing for datacenter jobs with constraints
Max-Min Fairness is a flexible resource allocation mechanism used in most datacenter schedulers. However, an increasing number of jobs have hard placement constraints, restricting the machines they can run on due to special hardware or software ...
CPI2: CPU performance isolation for shared compute clusters
Performance isolation is a key challenge in cloud computing. Unfortunately, Linux has few defenses against performance interference in shared resources such as processor caches and memory buses, so applications in a cloud can experience unpredictable ...
Index Terms
- Proceedings of the 8th ACM European Conference on Computer Systems
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
EuroSys '21 | 181 | 38 | 21% |
EuroSys '20 | 234 | 43 | 18% |
EuroSys '18 | 262 | 43 | 16% |
EuroSys '16 | 180 | 38 | 21% |
EuroSys '14 | 147 | 27 | 18% |
EuroSys '13 | 143 | 28 | 20% |
EuroSys '11 | 161 | 24 | 15% |
Overall | 1,308 | 241 | 18% |