Hardware-based real-time workload forensics via frame-level tlb profiling

Y Zhang, L Zhou, Y Makris - 2019 IEEE 37th VLSI Test …, 2019 - ieeexplore.ieee.org
We propose a hardware-based solution for performing real-time workload forensics that
enables identification of a process while it is being executed. More specifically, we divide …

Prediction based replica selection strategy for reducing tail latency in distributed systems

SM Shithil - 2022 - lib.buet.ac.bd
The deployment of modern applications in geo-distributed systems results in performance
fluctuation which is a consequence of long-tail latency. To deliver high-quality services these …

Performance Improvement of Redundant Requests in Distributed Systems

SM Shithil, MA Adnan - … of the 11th International Conference on …, 2024 - dl.acm.org
The techniques of request duplication and request reissue are used to reduce tail latency in
distributed systems by sending redundant read requests to multiple replicas. However, these …

Hardware-based real-time workload forensics

Y Zhang, L Zhou, Y Makris - IEEE Design & Test, 2020 - ieeexplore.ieee.org
Workload forensics is a key component of software security that collects and analyzes
information to identify suspicious behavior. Researchers from UT Dallas explore a hardware …

10gbe network card performance evaluation: A strategy based on sensitivity analysis

P Rocha, T Pinheiro, R Macedo… - 2019 IEEE Latin …, 2019 - ieeexplore.ieee.org
Nowadays, Big Data is emerging as a crucial approach to manage the huge amount of
information produced by the growing number of devices connected to the Internet of Things …

A Prediction Based Replica Selection Strategy for Reducing Tail Latency in Geo-Distributed Systems

MA Adnan - IEEE Transactions on Cloud Computing, 2023 - ieeexplore.ieee.org
The deployment of modern applications in geo-distributed systems results in performance
fluctuation which is a consequence of long-tail latency. To deliver high-quality services these …

Hardware-based Malware Detection in Modern Microprocessors: Formal and Statistical Methods in System-level Security Assurance

Y Zhang - 2023 - utd-ir.tdl.org
Previous studies in workload forensics have relied on retrospective assessments using
comprehensive process execution profiles, hindering the ability to take prompt action …

[PDF][PDF] Optimised data handling strategy for high throughput

S Schwingenschuh - 2018 - scholar.archive.org
The increasing data link speed of today's and coming communication networks demands on
optimisations of data handling strategies for high-performance data exchange. High …