[PDF][PDF] Practical DB-OS Co-Design with Privileged Kernel Bypass
Authors' Contact Information: **n**g Zhou, MIT CSAIL, USA, xin**g@ mit. edu; Viktor Leis,
Technische Universität München, Germany, leis@ in. tum. de; **ming Hu, DolphinDB Inc …
Technische Universität München, Germany, leis@ in. tum. de; **ming Hu, DolphinDB Inc …
IsoPredict: Dynamic Predictive Analysis for Detecting Unserializable Behaviors in Weakly Isolated Data Store Applications
Distributed data stores typically provide weak isolation levels, which are efficient but can
lead to unserializable behaviors, which are hard for programmers to understand and often …
lead to unserializable behaviors, which are hard for programmers to understand and often …
An Empirical Study on Challenges of Event Management in Microservice Architectures
Microservices emerged as a popular architectural style over the last decade. Although
microservices are designed to be self-contained, they must communicate to realize business …
microservices are designed to be self-contained, they must communicate to realize business …
Transactions and Serverless are Made for Each Other
Transactions and Serverless are Made for Each Other | Communications of the ACM skip to
main content ACM Digital Library home ACM Association for Computing Machinery corporate …
main content ACM Digital Library home ACM Association for Computing Machinery corporate …
Transactions and Serverless are Made for Each Other: If serverless platforms could wrap functions in database transactions, they would be a good fit for database …
Database-backed applications are an exciting new frontier for serverless computation. By
tightly integrating application execution and data management, a transactional serverless …
tightly integrating application execution and data management, a transactional serverless …
Enhancing Web Application Security Through Program Analysis-Based Database Synthesis and Race Vulnerability Detection
A Chen - 2024 - search.proquest.com
Conventional security analysis methods for web applications typically concentrate on either
the application codebase or the backend database, often overlooking the critical interactions …
the application codebase or the backend database, often overlooking the critical interactions …
JMVX: Improving Record-Replay for Managed Languages
D Schwartz - Companion Proceedings of the 2024 ACM SIGPLAN …, 2024 - dl.acm.org
Record-Replay (RR) is a useful technique for investigating concurrency related bugs whose
appearance are subject to particular thread schedulings. RR logs/records the …
appearance are subject to particular thread schedulings. RR logs/records the …
[PDF][PDF] Record and Replay Debugging at Scale: Towards Always-On Java Application Recording in the Cloud
J Lampérth - 2024 - research-collection.ethz.ch
Identifying the root cause of software failures in production environments is a crucial yet
often elusive task, primarily due to the lack of detailed information required to replicate these …
often elusive task, primarily due to the lack of detailed information required to replicate these …