[PDF][PDF] Practical DB-OS Co-Design with Privileged Kernel Bypass

X Zhou, V Leis, J Hu, X Yu, M Stonebraker - 2025 - zxjcarrot.github.io
Authors' Contact Information: **n**g Zhou, MIT CSAIL, USA, xin**g@ mit. edu; Viktor Leis,
Technische Universität München, Germany, leis@ in. tum. de; **ming Hu, DolphinDB Inc …

IsoPredict: Dynamic Predictive Analysis for Detecting Unserializable Behaviors in Weakly Isolated Data Store Applications

C Geng, S Blanas, MD Bond, Y Wang - Proceedings of the ACM on …, 2024 - dl.acm.org
Distributed data stores typically provide weak isolation levels, which are efficient but can
lead to unserializable behaviors, which are hard for programmers to understand and often …

An Empirical Study on Challenges of Event Management in Microservice Architectures

R Laigner, AC Almeida, WKG Assunção… - arxiv preprint arxiv …, 2024 - arxiv.org
Microservices emerged as a popular architectural style over the last decade. Although
microservices are designed to be self-contained, they must communicate to realize business …

Transactions and Serverless are Made for Each Other

Q Li, P Kraft - Communications of the ACM, 2024 - dl.acm.org
Transactions and Serverless are Made for Each Other | Communications of the ACM skip to
main content ACM Digital Library home ACM Association for Computing Machinery corporate …

Transactions and Serverless are Made for Each Other: If serverless platforms could wrap functions in database transactions, they would be a good fit for database …

Q Li, P Kraft - Queue, 2024 - dl.acm.org
Database-backed applications are an exciting new frontier for serverless computation. By
tightly integrating application execution and data management, a transactional serverless …

Enhancing Web Application Security Through Program Analysis-Based Database Synthesis and Race Vulnerability Detection

A Chen - 2024 - search.proquest.com
Conventional security analysis methods for web applications typically concentrate on either
the application codebase or the backend database, often overlooking the critical interactions …

JMVX: Improving Record-Replay for Managed Languages

D Schwartz - Companion Proceedings of the 2024 ACM SIGPLAN …, 2024 - dl.acm.org
Record-Replay (RR) is a useful technique for investigating concurrency related bugs whose
appearance are subject to particular thread schedulings. RR logs/records the …

[PDF][PDF] Record and Replay Debugging at Scale: Towards Always-On Java Application Recording in the Cloud

J Lampérth - 2024 - research-collection.ethz.ch
Identifying the root cause of software failures in production environments is a crucial yet
often elusive task, primarily due to the lack of detailed information required to replicate these …