Now showing items 1-10 of 10

    • A Case for Language-Based Protection 

      Hawblitzel, Chris; von Eicken, Thorsten (Cornell University, 1998-03)
      The use of language mechanisms to enforce protection boundaries around software modules has become increasingly attractive. This paper examines the advantages and disadvantages of language-based protection over more ...
    • Design and Evaluation of an Extensible Web and Telephony Server based on the J-Kernel 

      Spoonhower, Daniel; Czajkowski, Grzegorz; Hawblitzel, Chris; Chang, Chi-Chao; Hu, Deyu; von Eicken, Thorsten (Cornell University, 1998-11)
      This paper describes the design and performance of the J-Server, an integrated web and telephony server that allows untrusted Java servlets to be dynamically uploaded to extend the server's functionality. The J-Kernel ...
    • Design and Performance of Active Messages on the IBM SP-2 

      Chang, Chi-Chao; Czajkowski, Grzegorz; von Eicken, Thorsten (Cornell University, 1996-02)
      This technical report describes the design, implementation, and evaluation of Active Messages on the IBM SP-2. The implementation benchmarked here uses the standard TB2 network adapter firmware but does not use any ...
    • Evaluating the Performance Limitations of MPMD Communication 

      Chang, Chi-Chao; Czajkowski, Grzegorz; von Eicken, Thorsten; Kesselman, Carl (Cornell University, 1997-05)
      The MPMD approach for parallel computing is attractive for programmers who seek fast development cycles, high code re-use, and modular programming, or whose applications exhibit irregular computation loads and communication ...
    • Implementing Multiple Protection Domains in Java 

      Hawblitzel, Chris; Chang, Chi-Chao; Czajkowski, Grzegorz; Hu, Deyu; von Eicken, Thorsten (Cornell University, 1997-12)
      Safe language technology can be used for protection within a single address space. This protection is enforced by the language's type system, which ensures that references to objects cannot be forged. A safe language alone, ...
    • Incorporating Memory Management into User-Level Network Interfaces 

      Welsh, Matt; Basu, Anindya; von Eicken, Thorsten (Cornell University, 1997-02)
      User-level network interfaces allow applications direct access to the network without operating system intervention on every send and receive. Messages are transferred directly to and from user-space by the network interface ...
    • Interfacing Java with the Virtual Interface Architecture 

      Chang, Chi-Chao; von Eicken, Thorsten (Cornell University, 1999-01)
      User-level network interfaces (UNIs) have reduced the overheads of communication by exposing the buffers used by the network interface DMA engine to the applications. This removes the kernel from the critical path of message ...
    • JRes: A Resource Accounting Interface for Java 

      Czajkowski, Grzegorz; von Eicken, Thorsten (Cornell University, 1998-05)
      In order to better support the Internet the computing model on server systems is undergoing several important changes. First, recent research ideas concerning dynamic operating system extensibility are finding their way ...
    • Resource Control for Database Extensions 

      Czajkowski, Grzegorz; Mayr, Tobias; Seshadri, Praveen; von Eicken, Thorsten (Cornell University, 1998-11)
      While object-relational database servers can be extended with user-defined functions (UDFs), the security of the server may be compromised by these extensions. The use of Java to implement the UDFs is promising because it ...
    • A Software Architecture for Zero-Copy RPC in Java 

      Chang, Chi-Chao; von Eicken, Thorsten (Cornell University, 1998-10)
      RPC has established itself as one of the more powerful communication paradigms for distributed computing. In recent years, object-oriented languages have impacted RPC semantics, with a number of variants providing remote ...