Learn More
Parallel dataflow programs generate enormous amounts of distributed data that are short-lived, yet are critical for completion of the job and for good run-time performance. We call this class of data as <i>intermediate data</i>. This paper is the first to address intermediate data as a first-class citizen, specifically targeting and minimizing the effect of(More)
This paper takes a renewed look at the problem of managing intermediate data that is generated during dataflow computations (e.g., MapReduce, Pig, Dryad, etc.) within clouds. We discuss salient features of this intermediate data and outline requirements for a solution. Our experiments show that existing local write-remote read solutions, traditional(More)
Distributed graph analytics frameworks must offer low and balanced communication and computation, low preprocessing overhead, low memory footprint, and scalability. We present LFGraph, a fast, scalable, distributed, in-memory graph analytics engine intended primarily for directed graphs. LFGraph is the first system to satisfy all of the above requirements.(More)
Large-scale distributed systems are subject to churn, i.e., continuous arrival, departure and failure of processes. Analysis of protocols under churn requires one to use churn models that are tractable (easy to apply), realistic (apply to deployment settings), and general (apply to many protocols and properties). In this paper, we propose two new churn(More)
Attribute-based Access Control (ABAC) based on XACML can substantially improve the security and management of access rights on databases. However, existing implementations rely on high-level policy interpretation and are not as efficient as mechanisms natively supported by commodity databases. In this paper we explore advantages and challenges arising from(More)
Social networking applications' disk access patterns differ from those of traditional applications. However, today's disk layout techniques aren't adapted to social networking workloads, and thus their performance suffers. The authors' disk layout techniques leverage community structure in a social graph to make placement decisions that optimize read(More)
PROBLEM: Database access control mechanism does not support Attribute-based Access Control (ABAC) by utilizing information in the database itself. SOLUTION: eXtensible Access Control Markup Language (XACML) is widely accepted to describe attribute-based policies. Native database access control mechanism such as access control list (ACL) is efficient in(More)
Jeff Mogul, NSDI co-chair, opened the conference by telling attendees that there were 170 paper submissions, and each paper received three first-round reviews. About half the papers made it into the second round, and also received three or four more reviews. By the time the PC meeting occurred, there were 64 papers left. In total, each PC member performed(More)
This is a study on Toyota automobile industry, especially on Toyota GB Plc. The work mainly focuses on the strengths and weaknesses as well as the company's way of keeping competitive advantage. The purpose of the study is to explore the marketing strategy of Toyota GB Plc. in UK market. It is an explorative study in nature. Both primary and secondary data(More)
  • 1