USENIX Annual Technical Conference, USENIX ATC 2016


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

StackMap: Low-Latency Networking with the OS Stack and Dedicated NICs

Kenichi Yasukata, Michio Honda, Douglas Santry, Lars Eggert

StackMap: Low-Latency Networking with the OS Stack and Dedicated NICs

Details
Discussion Comments: 0
Verification: Authors have not verified information

MEANTIME: Achieving Both Minimal Energy and Timeliness with Approximate Computing

Anne Farrell, Henry Hoffmann

MEANTIME: Achieving Both Minimal Energy and Timeliness with Approximate Computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Elfen Scheduling: Fine-Grain Principled Borrowing from Latency-Critical Workloads Using Simultaneous Multithreading

Xi Yang, Stephen M. Blackburn, Kathryn S. McKinley

Elfen Scheduling: Fine-Grain Principled Borrowing from Latency-Critical Workloads Using Simultaneous Multithreading

Details
Discussion Comments: 0
Verification: Authors have not verified information

PhyCloak: Obfuscating Sensing from Communication Signals

Yue Qiao, Ouyang Zhang, Wenjie Zhou, Kannan Srinivasan, Anish Arora

PhyCloak: Obfuscating Sensing from Communication Signals

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimizing Every Operation in a Write-optimized File System

Jun Yuan, Yang Zhan, William Jannen, Prashant Pandey, Amogh Akshintala, Kanchan Chandnani, Pooja Deo, Zardosht Kasheff, Leif Walsh, Michael A. Bender, Martin Farach-Colton, Rob Johnson, Bradley C. Kuszmaul, Donald E. Porter

Optimizing Every Operation in a Write-optimized File System

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Multicore Locks: The Case Is Not Closed Yet

Hugo Guiroux, Renaud Lachaize, Vivien Quéma

Multicore Locks: The Case Is Not Closed Yet

Details
Discussion Comments: 0
Verification: Authors have not verified information

An Industrial-Scale Software Defined Internet Exchange Point

Arpit Gupta, Robert MacDavid, Rüdiger Birkner, Marco Canini, Nick Feamster, Jennifer Rexford, Laurent Vanbever

An Industrial-Scale Software Defined Internet Exchange Point

Details
Discussion Comments: 0
Verification: Authors have not verified information

Understanding Manycore Scalability of File Systems

Changwoo Min, Sanidhya Kashyap, Steffen Maass, Taesoo Kim

Understanding Manycore Scalability of File Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Balancing CPU and Network in the Cell Distributed B-Tree Store

Christopher Mitchell, Kate Montgomery, Lamont Nelson, Siddhartha Sen, Jinyang Li

Balancing CPU and Network in the Cell Distributed B-Tree Store

Details
Discussion Comments: 0
Verification: Authors have not verified information

Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices

Yeongpil Cho, Jun-Bum Shin, Donghyun Kwon, MyungJoo Ham, Yuna Kim, Yunheung Paek

Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Caching Doesn't Improve Mobile Web Performance (Much)

Jamshed Vesuna, Colin Scott, Michael Buettner, Michael Piatek, Arvind Krishnamurthy, Scott Shenker

Caching Doesn't Improve Mobile Web Performance (Much)

Details
Discussion Comments: 0
Verification: Authors have not verified information

Subversive-C: Abusing and Protecting Dynamic Message Dispatch

Julian Lettner, Benjamin Kollenda, Andrei Homescu, Per Larsen, Felix Schuster, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Michael Franz

Subversive-C: Abusing and Protecting Dynamic Message Dispatch

Details
Discussion Comments: 0
Verification: Authors have not verified information

Getting Back Up: Understanding How Enterprise Data Backups Fail

George Amvrosiadis, Medha Bhadkamkar

Getting Back Up: Understanding How Enterprise Data Backups Fail

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Tucana: Design and Implementation of a Fast and Efficient Scale-up Key-value Store

Anastasios Papagiannis, Giorgos Saloustros, Pilar González-Férez, Angelos Bilas

Tucana: Design and Implementation of a Fast and Efficient Scale-up Key-value Store

Details
Discussion Comments: 0
Verification: Authors have not verified information

SplitJoin: A Scalable, Low-latency Stream Join Architecture with Adjustable Ordering Precision

Mohammadreza Najafi, Mohammad Sadoghi, Hans-Arno Jacobsen

SplitJoin: A Scalable, Low-latency Stream Join Architecture with Adjustable Ordering Precision

Details
Discussion Comments: 0
Verification: Authors have not verified information

Satellite: Joint Analysis of CDNs and Network-Level Interference

Will Scott, Thomas E. Anderson, Tadayoshi Kohno, Arvind Krishnamurthy

Satellite: Joint Analysis of CDNs and Network-Level Interference

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Replex: A Scalable, Highly Available Multi-Index Data Store

Amy Tai, Michael Wei, Michael J. Freedman, Ittai Abraham, Dahlia Malkhi

Replex: A Scalable, Highly Available Multi-Index Data Store

Details
Discussion Comments: 0
Verification: Authors have not verified information

An Evolutionary Study of Linux Memory Management for Fun and Profit

Jian Huang, Moinuddin K. Qureshi, Karsten Schwan

An Evolutionary Study of Linux Memory Management for Fun and Profit

Details
Discussion Comments: 0
Verification: Authors have not verified information

Erasing Belady's Limitations: In Search of Flash Cache Offline Optimality

Yue Cheng, Fred Douglis, Philip Shilane, Grant Wallace, Peter Desnoyers, Kai Li

Erasing Belady's Limitations: In Search of Flash Cache Offline Optimality

Details
Discussion Comments: 0
Verification: Authors have not verified information

Version Traveler: Fast and Memory-Efficient Version Switching in Graph Processing Systems

Xiaoen Ju, Dan Williams, Hani Jamjoom, Kang G. Shin

Version Traveler: Fast and Memory-Efficient Version Switching in Graph Processing Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Design Guidelines for High Performance RDMA Systems

Anuj Kalia, Michael Kaminsky, David G. Andersen

Design Guidelines for High Performance RDMA Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Environmental Conditions and Disk Reliability in Free-cooled Datacenters

Ioannis Manousakis, Sriram Sankar, Gregg McKnight, Thu D. Nguyen, Ricardo Bianchini

Environmental Conditions and Disk Reliability in Free-cooled Datacenters

Details
Discussion Comments: 0
Verification: Authors have not verified information

All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS

Mathy Vanhoef, Frank Piessens

All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

COZ: Finding Code that Counts with Causal Profiling

Charlie Curtsinger, Emery D. Berger

COZ: Finding Code that Counts with Causal Profiling

Details
Discussion Comments: 0
Verification: Authors have not verified information

Testing Error Handling Code in Device Drivers Using Characteristic Fault Injection

Jia-Ju Bai, Yu-Ping Wang, Jie Yin, Shi-Min Hu

Testing Error Handling Code in Device Drivers Using Characteristic Fault Injection

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Coherence Stalls or Latency Tolerance: Informed CPU Scheduling for Socket and Core Sharing

Sharanyan Srikanthan, Sandhya Dwarkadas, Kai Shen

Coherence Stalls or Latency Tolerance: Informed CPU Scheduling for Socket and Core Sharing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Callinicos: Robust Transactional Storage for Distributed Data Structures

Ricardo Padilha, Enrique Fynn, Robert Soulé, Fernando Pedone

Callinicos: Robust Transactional Storage for Distributed Data Structures

Details
Discussion Comments: 0
Verification: Authors have not verified information

Filo: Consolidated Consensus as a Cloud Service

Parisa Jalili Marandi, Christos Gkantsidis, Flavio Junqueira, Dushyanth Narayanan

Filo: Consolidated Consensus as a Cloud Service

Details
Discussion Comments: 0
Verification: Authors have not verified information

gScale: Scaling up GPU Virtualization with Dynamic Sharing of Graphics Memory Space

Mochi Xue, Kun Tian, Yaozu Dong, Jiacheng Ma, Jiajun Wang, Zhengwei Qi, Bingsheng He, Haibing Guan

gScale: Scaling up GPU Virtualization with Dynamic Sharing of Graphics Memory Space

Details
Discussion Comments: 0
Verification: Authors have not verified information

Horton Tables: Fast Hash Tables for In-Memory Data-Intensive Computing

Alex D. Breslow, Dong Ping Zhang, Joseph L. Greathouse, Nuwan Jayasena, Dean M. Tullsen

Horton Tables: Fast Hash Tables for In-Memory Data-Intensive Computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cheap and Available State Machine Replication

Rong Shi, Yang Wang

Cheap and Available State Machine Replication

Details
Discussion Comments: 0
Verification: Authors have not verified information

Load the Edges You Need: A Generic I/O Optimization for Disk-based Graph Processing

Keval Vora, Guoqing (Harry) Xu, Rajiv Gupta

Load the Edges You Need: A Generic I/O Optimization for Disk-based Graph Processing

Details
Discussion Comments: 0
Verification: Authors have not verified information

FastCDC: a Fast and Efficient Content-Defined Chunking Approach for Data Deduplication

Wen Xia, Yukun Zhou, Hong Jiang, Dan Feng, Yu Hua, Yuchong Hu, Qing Liu, Yucheng Zhang

FastCDC: a Fast and Efficient Content-Defined Chunking Approach for Data Deduplication

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fast and Cautious: Leveraging Multi-path Diversity for Transport Loss Recovery in Data Centers

Guo Chen, Yuanwei Lu, Yuan Meng, Bojie Li, Kun Tan, Dan Pei, Peng Cheng, Layong Luo, Yongqiang Xiong, Xiaoliang Wang, Youjian Zhao

Fast and Cautious: Leveraging Multi-path Diversity for Transport Loss Recovery in Data Centers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Ginseng: Market-Driven LLC Allocation

Liran Funaro, Orna Agmon Ben-Yehuda, Assaf Schuster

Ginseng: Market-Driven LLC Allocation

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Scalable In-Memory Transaction Processing with HTM

Yingjun Wu, Kian-Lee Tan

Scalable In-Memory Transaction Processing with HTM

Details
Discussion Comments: 0
Verification: Authors have not verified information

Passive Wi-Fi: Bringing Low Power to Wi-Fi Transmissions

Bryce Kellogg, Vamsi Talla, Shyamnath Gollakota, Joshua R. Smith

Passive Wi-Fi: Bringing Low Power to Wi-Fi Transmissions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Greening the Video Transcoding Service with Low-Cost Hardware Transcoders

Peng Liu, Jongwon Yoon, Lance Johnson, Suman Banerjee

Greening the Video Transcoding Service with Low-Cost Hardware Transcoders

Details
Discussion Comments: 0
Verification: Authors have not verified information

Beam: Ending Monolithic Applications for Connected Devices

Chenguang Shen, Rayman Preet Singh, Amar Phanishayee, Aman Kansal, Ratul Mahajan

Beam: Ending Monolithic Applications for Connected Devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

FLICK: Developing and Running Application-Specific Network Services

Abdul Alim, Richard G. Clegg, Luo Mai, Lukas Rupprecht, Eric Seckler, Paolo Costa, Peter R. Pietzuch, Alexander L. Wolf, Nik Sultana, Jon Crowcroft, Anil Madhavapeddy, Andrew W. Moore, Richard Mortier, Masoud Koleini, Luis Oviedo, Matteo Migliavacca, Derek McAuley

FLICK: Developing and Running Application-Specific Network Services

Details
Discussion Comments: 0
Verification: Authors have not verified information

ParaFS: A Log-Structured File System to Exploit the Internal Parallelism of Flash Devices

Jiacheng Zhang, Jiwu Shu, Youyou Lu

ParaFS: A Log-Structured File System to Exploit the Internal Parallelism of Flash Devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Samsara: Efficient Deterministic Replay in Multiprocessor Environments with Hardware Virtualization Extensions

Shiru Ren, Le Tan, Chunqi Li, Zhen Xiao, Weijia Song

Samsara: Efficient Deterministic Replay in Multiprocessor Environments with Hardware Virtualization Extensions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Apps with Hardware: Enabling Run-time Architectural Customization in Smart Phones

Michael Coughlin, Ali Ismail, Eric Keller

Apps with Hardware: Enabling Run-time Architectural Customization in Smart Phones

Details
Discussion Comments: 0
Verification: Authors have not verified information

Unsafe Time Handling in Smartphones

Abhilash Jindal, Y. Charlie Hu, Samuel P. Midkiff, Prahlad Joshi

Unsafe Time Handling in Smartphones

Details
Discussion Comments: 0
Verification: Authors have not verified information

Pivot Tracing: Dynamic Causal Monitoring for Distributed Systems

Jonathan Mace, Ryan Roelke, Rodrigo Fonseca

Pivot Tracing: Dynamic Causal Monitoring for Distributed Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Kinetic Modeling of Data Eviction in Cache

Xiameng Hu, Xiaolin Wang, Lan Zhou, Yingwei Luo, Chen Ding, Zhenlin Wang

Kinetic Modeling of Data Eviction in Cache

Details
Discussion Comments: 0
Verification: Authors have not verified information

Under-Constrained Symbolic Execution: Correctness Checking for Real Code

David A. Ramos, Dawson R. Engler

Under-Constrained Symbolic Execution: Correctness Checking for Real Code

Details
Discussion Comments: 0
Verification: Authors have not verified information

Using Crash Hoare Logic for Certifying the FSCQ File System

Haogang Chen, Daniel Ziegler, Tej Chajed, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich

Using Crash Hoare Logic for Certifying the FSCQ File System

Details
Discussion Comments: 0
Verification: Authors have not verified information

Blockstack: A Global Naming and Storage System Secured by Blockchains

Muneeb Ali, Jude C. Nelson, Ryan Shea, Michael J. Freedman

Blockstack: A Global Naming and Storage System Secured by Blockchains

Details
Discussion Comments: 0
Verification: Authors have not verified information

Secure and Efficient Application Monitoring and Replication

Stijn Volckaert, Bart Coppens, Alexios Voulimeneas, Andrei Homescu, Per Larsen, Bjorn De Sutter, Michael Franz

Secure and Efficient Application Monitoring and Replication

Details
Discussion Comments: 0
Verification: Authors have not verified information

Hyperprobe: Towards Virtual Machine Extrospection

Jidong Xiao, Lei Lu, Hai Huang, Haining Wang

Hyperprobe: Towards Virtual Machine Extrospection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Instant OS Updates via Userspace Checkpoint-and-Restart

Sanidhya Kashyap, Changwoo Min, Byoungyoung Lee, Taesoo Kim, Pavel Emelyanov

Instant OS Updates via Userspace Checkpoint-and-Restart

Details
Discussion Comments: 0
Verification: Authors have not verified information

Modular Composition of Coordination Services

Kfir Lev-Ari, Edward Bortnikov, Idit Keidar, Alexander Shraer

Modular Composition of Coordination Services

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

A General Persistent Code Caching Framework for Dynamic Binary Translation (DBT)

Wenwen Wang, Pen-Chung Yew, Antonia Zhai, Stephen McCamant

A General Persistent Code Caching Framework for Dynamic Binary Translation (DBT)

Details
Discussion Comments: 0
Verification: Authors have not verified information

SLIK: Scalable Low-Latency Indexes for a Key-Value Store

Ankita Kejriwal, Arjun Gopalan, Ashish Gupta, Zhihao Jia, Stephen Yang, John K. Ousterhout

SLIK: Scalable Low-Latency Indexes for a Key-Value Store

Details
Discussion Comments: 0
Verification: Authors have not verified information

Unlocking Energy

Babak Falsafi, Rachid Guerraoui, Javier Picorel, Vasileios Trigonakis

Unlocking Energy

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

SoftFlow: A Middlebox Architecture for Open vSwitch

Ethan J. Jackson, Melvin Walls, Aurojit Panda, Justin Pettit, Ben Pfaff, Jarno Rajahalme, Teemu Koponen, Scott Shenker

SoftFlow: A Middlebox Architecture for Open vSwitch

Details
Discussion Comments: 0
Verification: Authors have not verified information

Energy Discounted Computing on Multicore Smartphones

Meng Zhu, Kai Shen

Energy Discounted Computing on Multicore Smartphones

Details
Discussion Comments: 0
Verification: Authors have not verified information