Patrick Reynolds

Learn More
Today, exponential growth in network content makes it difficult to build and maintain a complete document index to support efficient search. Centralized search services must actively and repeatedly probe the network for new or changed content. The scope and rapid evolution of the Internet means that even the best pull-based search services will always be(More)
Many interesting large-scale systems are distributed systems of multiple communicating components. Such systems can be very hard to debug, especially when they exhibit poor performance. The problem becomes much harder when systems are composed of "black-box" components: software from many different (perhaps competing) vendors, usually without source code(More)
Bugs in distributed systems are often hard to find. Many bugs reflect discrepancies between a system’s behavior and the programmer’s assumptions about that behavior. We present Pip1, an infrastructure for comparing actual behavior and expected behavior to expose structural errors and performance problems in distributed systems. Pip allows programmers to(More)
Device drivers typically execute in supervisor mode and thus must be fully trusted. This paper describes how to move them out of the trusted computing base, by running them without supervisor privileges and constraining their interactions with hardware devices. An implementation of this approach in the Nexus operating system executes drivers in user space,(More)
This paper describes the design and implementation of a new operating system authorization architecture to support trustworthy computing. Called <i>logical attestation</i>, this architecture provides a sound framework for reasoning about run time behavior of applications. Logical attestation is based on attributable, unforgeable statements about program(More)
Wide-area distributed applications are challenging to debug, optimize, and maintain. We present Wide-Area Project 5 (WAP5), which aims to make these tasks easier by exposing the causal structure of communication within an application and by exposing delays that imply bottlenecks. These bottlenecks might not otherwise be obvious, with or without the(More)
This study investigates the relationship between tinnitus and psychological morbidity using a cross-sectional survey design from patients of an outpatient audiology department in a typical District General Hospital. The results suggest that a significant number of tinnitus patients suffer from psychological problems both during and more unfortunately after(More)
Security modifications to legacy network protocols are expensive and disruptive. This paper outlines an approach, based on external security monitors, for securing legacy protocols by deploying additional hosts that locally monitor the inputs and outputs of each host executing the protocol, check the behavior of the host against a safety specification, and(More)
Metastatic spread is the single-most powerful predictor of poor outcome in Ewing sarcoma (ES). Therefore targeting pathways that drive metastasis has tremendous potential to reduce the burden of disease in ES. We previously showed that activation of the ERBB4 tyrosine kinase suppresses anoikis, or detachment-induced cell death, and induces chemoresistance(More)
Magnetic resonance imaging (MRI) of rodent brains enables study of the development and the integrity of the brain under certain conditions (alcohol, drugs etc.). However, these images are difficult to analyze for biomedical researchers with limited image processing experience. In this paper we present an image processing pipeline running on a Midas server,(More)