Learn More
Cloud offload is an important technique in mobile computing. VM-based cloudlets have been proposed as offload sites for the resource-intensive and latency-sensitive computations typically associated with mobile multimedia applications. Since cloud offload relies on precisely-configured back-end software, it is difficult to support at global scale across(More)
Cloud-sourced virtual appliances (VAs) have been touted as powerful solutions for many software maintenance, mobility, backward compatibility, and security challenges. In this paper, we ask whether it is possible to create a VA cloud service that supports fluid, interactive user experience even over mobile networks. More specifically, we wish to support a(More)
—Amazon S3-style storage is an attractive option for clouds that provides data access over HTTP/HTTPS. At the same time, parallel file systems are an essential component in privately owned clusters that enable highly scalable data-intensive computing. In this work, we take advantage of both of those storage options, and propose pWalrus, a storage service(More)
Oak gallwasps are cyclically parthenogenetic insects that induce a wide diversity of highly complex species- and generation-specific galls on oaks and other Fagaceae. Phylogenetic relationships within oak gallwasps remain to be established, while sexual and parthenogenetic generations of many species remain unpaired. Previous work on oak gallwasps has(More)
Metrics like disk activity and network traffic are widespread sources of diagnosis and monitoring information in datacenters and networks. However, as the scale of these systems increases, examining the raw data yields diminishing insight. We present RainMon, a novel end-to-end approach for mining timeseries monitoring data designed to handle its size and(More)
Cloudlet offload is a valuable technique for ensuring low end-to-end latency of resource-intensive cloud processing for many emerging mobile applications. This paper examines the impact of user mobility on cloudlet offload, and shows that even modest user mobility can result in significant network degradation. We propose VM handoff as a technique for(More)
Idle resources can be exploited not only to run important local tasks such as data replication and virus checking, but also to make contributions to society by participating in open computing projects like SETI@home [2]. When executing background processes to utilize such valuable idle resources, we need to explicitly control them so that the user will not(More)
Virtual machine (VM) migration demands distinct properties under resource oversubscription and workload surges. We present enlightened post-copy, a new mechanism for VMs under contention that evicts the target VM with fast execution transfer and short total duration. This design contrasts with common live migration, which uses the down time of the migrated(More)
Middle Stone Age (MSA) and Middle Paleolithic (MP) faunal assemblages have gained widespread attention due to their relevance to the debate over the modernity of hominid behavior during the MSA/MP. A recent critique of the scavenging argument for MSA/MP behavior drew on a summary presentation of the skeletal abundance and surface modification data from Die(More)
Virtual Machine (VM) encapsulation provides a way to provision existing software over the Inter-net without any code modifications. However, distributing software introduces performance costs that vary in complex ways. Our study provides empirical evidence of how network conditions, software interfaces and VM provisioning techniques impact user experience.(More)