Learn More
Recent technological trends indicate that future datacen-ter networks will incorporate High Performance Computing network features, such as ultra-low latency and CPU bypassing. How can these features be exploited in datacenter-scale systems infrastructure? In this paper , we explore the design of a distributed in-memory key-value store called Pilaf that(More)
A significant challenge in the development of robust wireless networking protocols is often the need to prototype and test these protocols in a small-scale setting before they can be widely deployed. Two contrasting prototyping and testing methods are currently used, requiring a choice between convenience and accuracy. The first involves simulating a(More)
The extensive recent research in protocols development for wireless networks must be complemented with simple yet efficient prototyping and evaluation mechanism. MiNT-2 is a miniaturized multi-hop wireless network testbed that addresses this challenge by combining the benefits of existing protocol evaluations strategies: simulations and custom built large(More)
We describe a 30-year-old pregnant woman with undiagnosed weakness who delivered a severely weak neonate. Subsequent workup of the mother revealed myasthenia gravis with muscle-specific kinase antibodies. The infant responded to intravenous immunoglobulin and symptoms normalized. He was presumed to have an anti-muscle-specific kinase-mediated transient(More)
Petascale simulations compute at resolutions ranging into billions of cells and write terabytes of data for visualization and analysis. Interactive visualization of this time series is a desired step before starting a new run. The I/O subsystem and associated network often are a significant impediment to interactive visualization of time-varying data, as(More)
This paper examines some aspects of the security services in the CCITT Draft 1988 X.400 Recommendations for Message Handling Systems. A brief introduction to relevant cryptographic concepts is followed by a description of how some of the security services may be provided. Key management, as defined within the CCITT Draft X.500 Recommendations for Directory(More)
We present Oolong, a distributed programming framework designed for sparse asynchronous applications such as distributed web crawling, shortest paths, and connected components. Oolong stores program state in distributed in-memory key-value tables on which user-defined triggers may be set. Triggers can be activated whenever a key-value pair is modified. The(More)
The proliferation of wireless-enabled portable computing devices has spurred a growing need for efficient and powerful networking protocols. The key challenge in the development of robust wireless networking protocols is an ability to conduct effective and efficient evaluation of the protocol in order to ensure its successful working in real-world settings.(More)
—With the emergence of data-intensive applications, recent years have seen a fast-growing volume of I/O traffic propagated through the local I/O interconnect bus. This raises up a question for storage servers on how to resolve such a potential bottleneck. In this paper, we present a hierarchical Data Cache Architecture called DCA to effectively slash local(More)