Arindam Banerji

Learn More
Protected shared libraries are a new mechanism for building fast user-level operating system services. They retain the isolation properties of other userlevel implementation approaches with improved performance and flexibility. The approach can be used with either microkernel-based or monolithic operating systems. Operating system services are built as(More)
As application requirements diverge, it is becoming increasingly clear that the <i>one size fits all</i> operating system design strategy is obsolete. Customizable system services would allow application-specific optimizations, and various customization strategies have been proposed. These vary widely and, depending on the required level of(More)
0 7 4 0 7 4 5 9 / 0 3 / $ 1 9 . 0 0 © 2 0 0 3 I E E E mismatch between today’s realities and the assumptions made in designing those mechanisms. The term security is often used to describe several separate problems. One is to decide who gets what rights. This step involves authentication, knowing to whom you are talking, and authorization, finding out what(More)
In order to exploit the latest advances in hardware technology, application developers need high-performance, easy-to-use cooperation tools that span interconnections of standard hardware. Distributed shared memory has been proposed as such a cooperation tool, but performance problems have limited its usefulness. This paper argues that a new approach to(More)
Highly portable, powerful computers with wireless connections will radically change the way people think about and use computing. No longer will users limit their computations to a single machine; rather, they will use the machines that best suit their current needs. A user’s environment, which we call the computing persona, cannot continue to be redefined(More)
Distribution, persistence and atomicity are natural extensions of the ARCADE data model, rather than addon properties. The model is based on the way a programmer views and uses typed data objects. It consists of data units and data unit links which act as the nodes and edges of a directed graph model. It serves as an excellent substrate for implementing(More)
Various mechanisms are available for protecting software services. Some rely on software protection, some on hardware and some on both. There has been much discussion about protection options, but there is surprising little hard data on relative costs. This paper provides detailed measurements of five different protection schemes and quantifies their impact(More)
Extensibility leads to better designed and more reusable software. Traditionally, implementors have built extensible C++ software using ad hoc mechanisms built from scratch. This paper identifies specific characteristics that constitute extensible software. A framework for building extensible C++ libraries has been defined and constructed on AIX 3.2.(More)
Accessing a rich set of information repositories in a mobile computing environment is difficult because the data resources change dynamically, physical resources are constrained and the information has diverse forms and sources. We propose a new virtual repository, which we call the Pi repository, to address this problem. The Pi repository will provide(More)