Remote physical device fingerprinting

T Kohno, A Broido, KC Claffy - IEEE Transactions on …, 2005 - ieeexplore.ieee.org
We introduce the area of remote physical device fingerprinting, or fingerprinting a physical
device, as opposed to an operating system or class of devices, remotely, and without the …

System noise, OS clock ticks, and fine-grained parallel applications

D Tsafrir, Y Etsion, DG Feitelson… - Proceedings of the 19th …, 2005 - dl.acm.org
As parallel jobs get bigger in size and finer in granularity," system noise" is increasingly
becoming a problem. In fact, fine-grained jobs on clusters with thousands of SMP nodes run …

Didi: Mitigating the performance impact of tlb shootdowns using a shared tlb directory

C Villavieja, V Karakostas, L Vilanova… - 2011 International …, 2011 - ieeexplore.ieee.org
Translation Look aside Buffers (TLBs) are ubiquitously used in modern architectures to
cache virtual-to-physical mappings and, as they are looked up on every memory access, are …

The context-switch overhead inflicted by hardware interrupts (and the enigma of do-nothing loops)

D Tsafrir - Proceedings of the 2007 workshop on Experimental …, 2007 - dl.acm.org
The overhead of a context switch is typically associated with multitasking, where several
applications share a processor. But even if only one runnable application is present in the …

The partially observable hidden Markov model and its application to keystroke dynamics

JV Monaco, CC Tappert - Pattern Recognition, 2018 - Elsevier
The partially observable hidden Markov model is an extension of the hidden Markov Model
in which the hidden state is conditioned on an independent Markov chain. This structure is …

Non-preemptive speed scaling

A Antoniadis, CC Huang - Journal of scheduling, 2013 - Springer
We consider the following offline variant of the speed scaling problem introduced by Yao et
al. We are given a set of jobs and we have a variable-speed processor to process them. The …

Secretly Monopolizing the CPU Without Superuser Privileges.

D Tsafrir, Y Etsion, DG Feitelson - USENIX Security Symposium, 2007 - usenix.org
We describe a “cheat” attack, allowing an ordinary process to hijack any desirable
percentage of the CPU cycles without requiring superuser/administrator privileges …

Flexible CoScheduling: Mitigating load imbalance and improving utilization of heterogeneous resources

E Frachtenberg, DG Feitelson, F Petrini… - Proceedings …, 2003 - ieeexplore.ieee.org
Fine-grained parallel applications require all their processes to run simultaneously on
distinct processors to achieve good efficiency. This is typically accomplished by space …

Parallel job scheduling under dynamic workloads

E Frachtenberg, DG Feitelson, J Fernandez… - … Strategies for Parallel …, 2003 - Springer
Jobs that run on parallel systems that use gang scheduling for multiprogramming may
interact with each other in various ways. These interactions are affected by system …

Paratick: reducing timer overhead in virtual machines

S Schildermans, K Aerts, J Shan, X Ding - Proceedings of the 50th …, 2021 - dl.acm.org
To this day, efficient timer management is a major challenge in virtualized environments.
Contemporary timekeeping techniques in guest kernels frequently interact with timer …