USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Machine-Aware Atomic Broadcast Trees for Multicores

Stefan Kaestle, Reto Achermann, Roni Haecki, Moritz Hoffmann, Sabela Ramos, Timothy Roscoe

Machine-Aware Atomic Broadcast Trees for Multicores

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Shuffler: Fast and Deployable Continuous Code Re-Randomization

David Williams-King, Graham Gobieski, Kent Williams-King, James P. Blake, Xinhao Yuan, Patrick Colp, Michelle Zheng, Vasileios P. Kemerlis, Junfeng Yang, William Aiello

Shuffler: Fast and Deployable Continuous Code Re-Randomization

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

TensorFlow: A System for Large-Scale Machine Learning

Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, Manjunath Kudlur, Josh Levenberg, Rajat Monga, Sherry Moore, Derek Gordon Murray, Benoit Steiner, Paul A. Tucker, Vijay Vasudevan, Pete Warden, Martin Wicke, Yuan Yu, Xiaoqiang Zheng

TensorFlow: A System for Large-Scale Machine Learning

Details
Discussion Comments: 0
Verification: Authors have not verified information

Non-Intrusive Performance Profiling for Entire Software Stacks Based on the Flow Reconstruction Principle

Xu Zhao, Kirk Rodrigues, Yu Luo, Ding Yuan, Michael Stumm

Non-Intrusive Performance Profiling for Entire Software Stacks Based on the Flow Reconstruction Principle

Details
Author Comments: We have patented this technology and it is already licensed by a large software company. However, we do share our source code for research purposes and we have already shared it with a research group from Yale. Contact the authors if you'd like to have a copy of our code.
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Efficient Network Reachability Analysis Using a Succinct Control Plane Representation

Seyed Kaveh Fayaz, Tushar Sharma, Ari Fogel, Ratul Mahajan, Todd D. Millstein, Vyas Sekar, George Varghese

Efficient Network Reachability Analysis Using a Succinct Control Plane Representation

Details
Discussion Comments: 0
Verification: Authors have not verified information

History-Based Harvesting of Spare Cycles and Storage in Large-Scale Datacenters

Yunqi Zhang, George Prekas, Giovanni Matteo Fumarola, Marcus Fontoura, Iñigo Goiri, Ricardo Bianchini

History-Based Harvesting of Spare Cycles and Storage in Large-Scale Datacenters

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

GRAPHENE: Packing and Dependency-Aware Scheduling for Data-Parallel Clusters

Robert Grandl, Srikanth Kandula, Sriram Rao, Aditya Akella, Janardhan Kulkarni

GRAPHENE: Packing and Dependency-Aware Scheduling for Data-Parallel Clusters

Details
Discussion Comments: 0
Verification: Authors have not verified information

JetStream: Cluster-Scale Parallelization of Information Flow Queries

Andrew Quinn, David Devecsery, Peter M. Chen, Jason Flinn

JetStream: Cluster-Scale Parallelization of Information Flow Queries

Details
Discussion Comments: 0
Verification: Authors have not verified information

Consolidating Concurrency Control and Consensus for Commits under Conflicts

Shuai Mu, Lamont Nelson, Wyatt Lloyd, Jinyang Li

Consolidating Concurrency Control and Consensus for Commits under Conflicts

Details
Discussion Comments: 0
Verification: Authors have not verified information

Slicer: Auto-Sharding for Datacenter Applications

Atul Adya, Daniel Myers, Jon Howell, Jeremy Elson, Colin Meek, Vishesh Khemani, Stefan Fulger, Pan Gu, Lakshminath Bhuvanagiri, Jason Hunter, Roberto Peon, Larry Kai, Alexander Shraer, Arif Merchant, Kfir Lev-Ari

Slicer: Auto-Sharding for Datacenter Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Simplifying Datacenter Network Debugging with PathDump

Praveen Tammana, Rachit Agarwal, Myungjin Lee

Simplifying Datacenter Network Debugging with PathDump

Details
Discussion Comments: 0
Verification: Authors have not verified information

The SNOW Theorem and Latency-Optimal Read-Only Transactions

Haonan Lu, Christopher Hodsdon, Khiem Ngo, Shuai Mu, Wyatt Lloyd

The SNOW Theorem and Latency-Optimal Read-Only Transactions

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

EC-Cache: Load-Balanced, Low-Latency Cluster Caching with Online Erasure Coding

K. V. Rashmi, Mosharaf Chowdhury, Jack Kosaian, Ion Stoica, Kannan Ramchandran

EC-Cache: Load-Balanced, Low-Latency Cluster Caching with Online Erasure Coding

Details
Discussion Comments: 0
Verification: Authors have not verified information

Just Say NO to Paxos Overhead: Replacing Consensus with Network Ordering

Jialin Li, Ellis Michael, Naveen Kr. Sharma, Adriana Szekeres, Dan R. K. Ports

Just Say NO to Paxos Overhead: Replacing Consensus with Network Ordering

Details
Discussion Comments: 0
Verification: Authors have not verified information

FaSST: Fast, Scalable and Simple Distributed Transactions with Two-Sided (RDMA) Datagram RPCs

Anuj Kalia, Michael Kaminsky, David G. Andersen

FaSST: Fast, Scalable and Simple Distributed Transactions with Two-Sided (RDMA) Datagram RPCs

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Yak: A High-Performance Big-Data-Friendly Garbage Collector

Khanh Nguyen, Lu Fang, Guoqing (Harry) Xu, Brian Demsky, Shan Lu, Sanazsadat Alamian, Onur Mutlu

Yak: A High-Performance Big-Data-Friendly Garbage Collector

Details
Discussion Comments: 0
Verification: Authors have not verified information

EbbRT: A Framework for Building Per-Application Library Operating Systems

Dan Schatzberg, James Cadden, Han Dong, Orran Krieger, Jonathan Appavoo

EbbRT: A Framework for Building Per-Application Library Operating Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata

David Lazar, Nickolai Zeldovich

Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fast and Concurrent RDF Queries with RDMA-Based Distributed Graph Exploration

Jiaxin Shi, Youyang Yao, Rong Chen, Haibo Chen, Feifei Li

Fast and Concurrent RDF Queries with RDMA-Based Distributed Graph Exploration

Details
Discussion Comments: 0
Verification: Authors have not verified information

Correlated Crash Vulnerabilities

Ramnatthan Alagappan, Aishwarya Ganesan, Yuvraj Patel, Thanumalayan Sankaranarayana Pillai, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau

Correlated Crash Vulnerabilities

Details
Discussion Comments: 0
Verification: Authors have not verified information

REX: A Development Platform and Online Learning Approach for Runtime Emergent Software Systems

Barry Porter, Matthew Grieves, Roberto Vito Rodrigues Filho, David Leslie

REX: A Development Platform and Online Learning Approach for Runtime Emergent Software Systems

Details
Author Comments: The artifacts at the provided URL include full documentation and we're very happy to offer additional help with repeatability of our experiments if any difficulty is encountered - just ask.
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Unobservable Communication over Fully Untrusted Infrastructure

Sebastian Angel, Srinath T. V. Setty

Unobservable Communication over Fully Untrusted Infrastructure

Details
Discussion Comments: 0
Verification: Authors have not verified information

DQBarge: Improving Data-Quality Tradeoffs in Large-Scale Internet Services

Michael Chow, Kaushik Veeraraghavan, Michael J. Cafarella, Jason Flinn

DQBarge: Improving Data-Quality Tradeoffs in Large-Scale Internet Services

Details
Discussion Comments: 0
Verification: Authors have not verified information

Big Data Analytics over Encrypted Datasets with Seabed

Antonis Papadimitriou, Ranjita Bhagwan, Nishanth Chandran, Ramachandran Ramjee, Andreas Haeberlen, Harmeet Singh, Abhishek Modi, Saikrishna Badrinarayanan

Big Data Analytics over Encrypted Datasets with Seabed

Details
Discussion Comments: 0
Verification: Authors have not verified information

Early Detection of Configuration Errors to Reduce Failure Damage

Tianyin Xu, Xinxin Jin, Peng Huang, Yuanyuan Zhou, Shan Lu, Long Jin, Shankar Pasupathy

Early Detection of Configuration Errors to Reduce Failure Damage

Details
Discussion Comments: 0
Verification: Authors have not verified information

NetBricks: Taking the V out of NFV

Aurojit Panda, Sangjin Han, Keon Jang, Melvin Walls, Sylvia Ratnasamy, Scott Shenker

NetBricks: Taking the V out of NFV

Details
Discussion Comments: 0
Verification: Authors have not verified information

Intermittent Computation without Hardware Support or Programmer Intervention

Joel van der Woude, Matthew Hicks

Intermittent Computation without Hardware Support or Programmer Intervention

Details
Discussion Comments: 0
Verification: Authors have not verified information

Coordinated and Efficient Huge Page Management with Ingens

Youngjin Kwon, Hangchen Yu, Simon Peter, Christopher J. Rossbach, Emmett Witchel

Coordinated and Efficient Huge Page Management with Ingens

Details
Author Comments: Source code: https://github.com/ut-osa/ingens
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Exploring the Hidden Dimension in Graph Processing

Mingxing Zhang, Yongwei Wu, Kang Chen, Xuehai Qian, Xue Li, Weimin Zheng

Exploring the Hidden Dimension in Graph Processing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Firmament: Fast, Centralized Cluster Scheduling at Scale

Ionel Gog, Malte Schwarzkopf, Adam Gleave, Robert N. M. Watson, Steven Hand

Firmament: Fast, Centralized Cluster Scheduling at Scale

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data

Tyler Hunt, Zhiting Zhu, Yuanzhong Xu, Simon Peter, Emmett Witchel

Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

SCONE: Secure Linux Containers with Intel SGX

Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, André Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'Keeffe, Mark Stillwell, David Goltzsche, David M. Eyers, Rüdiger Kapitza, Peter R. Pietzuch, Christof Fetzer

SCONE: Secure Linux Containers with Intel SGX

Details
Discussion Comments: 0
Verification: Authors have not verified information

Realizing the Fault-Tolerance Promise of Cloud Storage Using Locks with Intent

Srinath T. V. Setty, Chunzhi Su, Jacob R. Lorch, Lidong Zhou, Hao Chen, Parveen Patel, Jinglei Ren

Realizing the Fault-Tolerance Promise of Cloud Storage Using Locks with Intent

Details
Discussion Comments: 0
Verification: Authors have not verified information

Light-Weight Contexts: An OS Abstraction for Safety and Performance

James Litton, Anjo Vahldiek-Oberwagner, Eslam Elnikety, Deepak Garg, Bobby Bhattacharjee, Peter Druschel

Light-Weight Contexts: An OS Abstraction for Safety and Performance

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Morpheus: Towards Automated SLOs for Enterprise Clusters

Sangeetha Abdu Jyothi, Carlo Curino, Ishai Menache, Shravan Matthur Narayanamurthy, Alexey Tumanov, Jonathan Yaniv, Ruslan Mavlyutov, Iñigo Goiri, Subru Krishnan, Janardhan Kulkarni, Sriram Rao

Morpheus: Towards Automated SLOs for Enterprise Clusters

Details
Author Comments: The part of the system that was open-sourced can be accessed at the links provided here.
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Altruistic Scheduling in Multi-Resource Clusters

Robert Grandl, Mosharaf Chowdhury, Aditya Akella, Ganesh Ananthanarayanan

Altruistic Scheduling in Multi-Resource Clusters

Details
Discussion Comments: 0
Verification: Authors have not verified information

XFT: Practical Fault Tolerance beyond Crashes

Shengyun Liu, Paolo Viotti, Christian Cachin, Vivien Quéma, Marko Vukolic

XFT: Practical Fault Tolerance beyond Crashes

Details
Discussion Comments: 0
Verification: Authors have not verified information

CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels

Ronghui Gu, Zhong Shao, Hao Chen, Xiongnan (Newman) Wu, Jieung Kim, Vilhelm Sjöberg, David Costanzo

CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels

Details
Discussion Comments: 0
Verification: Authors have not verified information

Network Requirements for Resource Disaggregation

Peter Xiang Gao, Akshay Narayan, Sagar Karandikar, Joao Carreira, Sangjin Han, Rachit Agarwal, Sylvia Ratnasamy, Scott Shenker

Network Requirements for Resource Disaggregation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Gemini: A Computation-Centric Distributed Graph Processing System

Xiaowei Zhu, Wenguang Chen, Weimin Zheng, Xiaosong Ma

Gemini: A Computation-Centric Distributed Graph Processing System

Details
Discussion Comments: 0
Verification: Authors have not verified information

Kraken: Leveraging Live Traffic Tests to Identify and Resolve Resource Utilization Bottlenecks in Large Scale Web Services

Kaushik Veeraraghavan, Justin Meza, David Chou, Wonho Kim, Sonia Margulis, Scott Michelson, Rajesh Nishtala, Daniel Obenshain, Dmitri Perelman, Yee Jiun Song

Kraken: Leveraging Live Traffic Tests to Identify and Resolve Resource Utilization Bottlenecks in Large Scale Web Services

Details
Discussion Comments: 0
Verification: Authors have not verified information

Incremental Consistency Guarantees for Replicated Objects

Rachid Guerraoui, Matej Pavlovic, Dragos-Adrian Seredinschi

Incremental Consistency Guarantees for Replicated Objects

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

CLARINET: WAN-Aware Optimization for Analytics Queries

Raajay Viswanathan, Ganesh Ananthanarayanan, Aditya Akella

CLARINET: WAN-Aware Optimization for Analytics Queries

Details
Discussion Comments: 0
Verification: Authors have not verified information

Diamond: Automating Data Management and Storage for Wide-Area, Reactive Applications

Irene Zhang, Niel Lebeck, Pedro Fonseca, Brandon Holt, Raymond Cheng, Ariadna Norberg, Arvind Krishnamurthy, Henry M. Levy

Diamond: Automating Data Management and Storage for Wide-Area, Reactive Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Don't Get Caught in the Cold, Warm-up Your JVM: Understand and Eliminate JVM Warm-up Overhead in Data-Parallel Systems

David Lion, Adrian Chiu, Hailong Sun, Xin Zhuang, Nikola Grcevski, Ding Yuan

Don't Get Caught in the Cold, Warm-up Your JVM: Understand and Eliminate JVM Warm-up Overhead in Data-Parallel Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Push-Button Verification of File Systems via Crash Refinement

Helgi Sigurbjarnarson, James Bornholt, Emina Torlak, Xi Wang

Push-Button Verification of File Systems via Crash Refinement

Details
Discussion Comments: 0
Verification: Authors have not verified information

To Waffinity and Beyond: A Scalable Architecture for Incremental Parallelization of File System Code

Matthew Curtis-Maury, Vinay Devadas, Vania Fang, Aditya Kulkarni

To Waffinity and Beyond: A Scalable Architecture for Incremental Parallelization of File System Code

Details
Discussion Comments: 0
Verification: Authors have not verified information