A survey on data storage and placement methodologies for cloud-big data ecosystem

S Mazumdar, D Seybold, K Kritikos, Y Verginadis - Journal of Big Data, 2019 - Springer
Currently, the data to be explored and exploited by computing systems increases at an
exponential rate. The massive amount of data or so-called “Big Data” put pressure on …

Tachyon: Reliable, memory speed storage for cluster computing frameworks

H Li, A Ghodsi, M Zaharia, S Shenker… - Proceedings of the ACM …, 2014 - dl.acm.org
Tachyon is a distributed file system enabling reliable data sharing at memory speed across
cluster computing frameworks. While caching today improves read workloads, writes are …

[PDF][PDF] Improving MapReduce performance in heterogeneous environments.

M Zaharia, A Konwinski, AD Joseph, RH Katz, I Stoica - Osdi, 2008 - usenix.org
MapReduce is emerging as an important programming model for large-scale data-parallel
applications such as web indexing, data mining, and scientific simulation. Hadoop is an …

Zyzzyva: speculative byzantine fault tolerance

R Kotla, L Alvisi, M Dahlin, A Clement… - Proceedings of twenty-first …, 2007 - dl.acm.org
We present Zyzzyva, a protocol that uses speculation to reduce the cost and simplify the
design of Byzantine fault tolerant state machine replication. In Zyzzyva, replicas respond to a …

Remus: High availability via asynchronous virtual machine replication

B Cully, G Lefebvre, D Meyer, M Feeley… - Proceedings of the 5th …, 2008 - usenix.org
Allowing applications to survive hardware failure is an expensive undertaking, which
generally involves re-engineering software to include complicated recovery logic as well as …

Deterministic replay: A survey

Y Chen, S Zhang, Q Guo, L Li, R Wu… - ACM Computing Surveys …, 2015 - dl.acm.org
Deterministic replay is a type of emerging technique dedicated to providing deterministic
executions of computer programs in the presence of nondeterministic factors. The …

Exploring multiple execution paths for malware analysis

A Moser, C Kruegel, E Kirda - … on Security and Privacy (SP'07), 2007 - ieeexplore.ieee.org
Malicious code (or Malware) is defined as software that fulfills the deliberately harmful intent
of an attacker. Malware analysis is the process of determining the behavior and purpose of a …

[PDF][PDF] Augmented smartphone applications through clone cloud execution.

BG Chun, P Maniatis - HotOS, 2009 - usenix.org
Smartphones enable a new, rich user experience in pervasive computing, but their
hardware is still very limited in terms of computation, memory, and energy reserves, thus …

Zyzzyva: Speculative byzantine fault tolerance

R Kotla, L Alvisi, M Dahlin, A Clement… - ACM Transactions on …, 2010 - dl.acm.org
A longstanding vision in distributed systems is to build reliable systems from unreliable
components. An enticing formulation of this vision is Byzantine Fault-Tolerant (BFT) state …

Designing distributed systems using approximate synchrony in data center networks

DRK Ports, J Li, V Liu, NK Sharma… - … USENIX Symposium on …, 2015 - usenix.org
Distributed systems are traditionally designed independently from the underlying network,
making worst-case assumptions (eg, complete asynchrony) about its behavior. However …