Corfu: A distributed shared log Balakrishnan et al., ACM TOCS, 2013 (If you experience any difficulty in accessing the pdf in the above link please let me know, it should be open for you on the ACM DL. UPDATE, many readers are still seeing a paywall for the above paper link, here's an alternative open … Continue reading Corfu: A distributed shared log
Author: adriancolyer
The design, implementation and deployment of a system to transparently compress hundreds of petabytes of image files for a file storage service
The design, implementation, and deployment of a system to transparently compress hundreds of petabytes of image files for a file storage service Horn et al., NSDI'17 When I first started reading, I thought this paper was going to be about a new compression format Dropbox had introduced for JPEG images. And it is about that, … Continue reading The design, implementation and deployment of a system to transparently compress hundreds of petabytes of image files for a file storage service
FM Backscatter: Enabling connected cities and smart fabrics
FM Backscatter: Enabling connected cities and smart fabrics Wang et al., NSDI'17 If we want to connect all the things, then we need a means of sending and/or receiving information at each thing. These transmissions require power, and no-one wants to have to plug in chargers or keep swapping batteries for endless everyday objects. So … Continue reading FM Backscatter: Enabling connected cities and smart fabrics
ViewMap: Sharing private in-vehicle dashcam videos
ViewMap: Sharing private in-vehicle dashcam videos Kim et al., NSDI'17 In the world of sensor-laden connected cars that we're rushing towards, ViewMap addresses an interesting question: how can we use the information collected by those cars for common good, without significant invasion of privacy? It raises deeper questions too about the limits of state surveillance … Continue reading ViewMap: Sharing private in-vehicle dashcam videos
Improving user perceived page load time using gaze
Improving user perceived page load time using gaze Kelton, Ryoo, et al., NSDI 2017 I feel like I'm stretching things a little bit including this paper in an IoT flavoured week, but it does use at least bridge from the physical world to the virtual, if only via a webcam. What's really interesting here to … Continue reading Improving user perceived page load time using gaze
FarmBeats: An IoT platform for data-driven agriculture
FarmBeats: An IoT platform for data-driven agriculture Vasisht et al., NSDI '17 Today we have another pragmatic, low cost, IoT system case study. And it's addressing a problem almost as important as cricket: how can we help to meet the burgeoning demand for food across the globe by increasing farm productivity? [Just in case British … Continue reading FarmBeats: An IoT platform for data-driven agriculture
Bringing IoT to sports analytics
Bringing IoT to sports analytics Gowda et al., NSDI 17 Welcome back to the summer term of #themorningpaper! To kick things off, we'll be looking at a selection of papers from last month's NSDI'17 conference. We haven't looked at an IoT paper for a while, and this one happens to be about cricket - how … Continue reading Bringing IoT to sports analytics
End of term, and thank you to the ACM
We've reached the end of term again, and The Morning Paper will be taking a two week break to recharge my batteries and my paper backlog! We covered a lot of ground over the last few months, and I've selected a few highlighted papers/posts at the end of this piece to tide you over until … Continue reading End of term, and thank you to the ACM
SGXIO: Generic trusted I/O path for Intel SGX
SGXIO: Generic trusted I/O path for Intel SGX Weiser & Werner, CODASPY '17 Intel's SGX provides hardware-secured enclaves for trusted execution of applications in an untrusted environment. Previously we've looked at Haven, which uses SGX in the context of cloud infrastructure, SCONE which shows how to run docker containers under SGX, and Panoply which looks at … Continue reading SGXIO: Generic trusted I/O path for Intel SGX
Detecting ROP with statistical learning of program characteristics
Detecting ROP with statistical learning of program characteristics Elsabagh et al., CODASPY '17 Return-oriented programming (ROP) attacks work by finding short instruction sequences in a process' executable memory (called gadgets) and chaining them together to achieve some goal of the attacker. For a quick introduction to ROP, see "The geometry of innocent flesh on the … Continue reading Detecting ROP with statistical learning of program characteristics