Algorithmic improvements for fast concurrent cuckoo hashing

Algorithmic improvements for fast concurrent cuckoo hashing Li et al, EuroSys 2014 Today’s paper continues the work on optimistic cuckoo hashing that we looked at yesterday, extending it to support multiple writers and even higher throughput. One of the original goals for the research was to take advantage of the hardware transactional memory support in ... Continue Reading

Designing software for ease of extension and contraction

Designing software for ease of extension and contraction Parnas, IEEE Transactions on Software Engineering, 1979 A couple of weeks ago we looked at ‘A design methodology for reliable software systems’. David Parnas posted a comment (thank you!) giving some more insight into the history of Dijkstra’s “levels of abstraction” concept: This paper followed Dijkstra in ... Continue Reading

Preemptive intrusion detection: theoretical framework and real-world measurements

Preemptive intrusion detection: theoretical framework and real-world measurements Cao et al, HotSoS 2015 Phuong Cao (the first author of this paper) got in touch following my review of DeepDive to say "Thanks for the review on DeepDive. I was inspired by that paper to apply factor graph on detecting intrusions at an early stage..." Preemptive ... Continue Reading