Thomas E. Anderson
YOU?
Author Swipe
View article: m4: A Learned Flow-level Network Simulator
m4: A Learned Flow-level Network Simulator Open
Flow-level simulation is widely used to model large-scale data center networks due to its scalability. Unlike packet-level simulators that model individual packets, flow-level simulators abstract traffic as continuous flows with dynamicall…
View article: Probing the alkylidene carbene–strained alkyne equilibrium in polycyclic systems via the Fritsch–Buttenberg–Wiechell rearrangement
Probing the alkylidene carbene–strained alkyne equilibrium in polycyclic systems via the Fritsch–Buttenberg–Wiechell rearrangement Open
Strained cycloalkynes are valuable building blocks in synthetic chemistry due to their high degree of reactivity and ability to form structurally complex scaffolds, common features of many pharmaceuticals and natural products. Alkylidene c…
View article: Comment on egusphere-2023-2099
Comment on egusphere-2023-2099 Open
Abstract. Global mean sea level during the mid-Pliocene Epoch (~3 Ma), when CO2 and temperatures were above present levels, was notably higher than today due to reduced global ice sheet coverage. Nevertheless, the extent to which ice sheet…
View article: Abstract 1456 Expression, Purification, and Enzymology of GAPDH from the Venom of the Parasitoid Wasp Ganaspis hookeri
Abstract 1456 Expression, Purification, and Enzymology of GAPDH from the Venom of the Parasitoid Wasp Ganaspis hookeri Open
G. hookeri are obligate parasitoid wasps that inject Drosophila larvae with their eggs and venom. Upon infection by the wasp, the fly initiates an immune response that results in encapsulation of the wasp egg alongside metabolic changes to…
View article: Scalable Tail Latency Estimation for Data Center Networks
Scalable Tail Latency Estimation for Data Center Networks Open
In this paper, we consider how to provide fast estimates of flow-level tail latency performance for very large scale data center networks. Network tail latency is often a crucial metric for cloud application performance that can be affecte…
View article: Optimal Congestion Control for Time-varying Wireless Links
Optimal Congestion Control for Time-varying Wireless Links Open
Modern networks exhibit a high degree of variability in link rates. Cellular network bandwidth inherently varies with receiver motion and orientation, while class-based packet scheduling in datacenter and service provider networks induces …
View article: An incremental path towards a safer OS kernel
An incremental path towards a safer OS kernel Open
Linux has become the de-facto operating system of our age, but its vulnerabilities are a constant threat to service availability, user privacy, and data integrity. While one might scrap Linux and start over, the cost of that would be prohi…
View article: Toward reconfigurable kernel datapaths with learned optimizations
Toward reconfigurable kernel datapaths with learned optimizations Open
Today's computing systems pay a heavy "OS tax", as kernel execution accounts for a significant amount of resource footprint. This is not least because today's kernels abound with hardcoded heuristics that are designed with unstated assumpt…
View article: SWP: Microsecond Network SLOs Without Priorities
SWP: Microsecond Network SLOs Without Priorities Open
The increasing use of cloud computing for latency-sensitive applications has sparked renewed interest in providing tight bounds on network tail latency. Achieving this in practice at reasonable network utilization has proved elusive, due t…
View article: Strain-Promoted Oxidation of Methylenecyclopropane Derivatives using <i>N</i>-Hydroxyphthalimide and Molecular Oxygen in the Dark
Strain-Promoted Oxidation of Methylenecyclopropane Derivatives using <i>N</i>-Hydroxyphthalimide and Molecular Oxygen in the Dark Open
The hydroperoxidation of alkylidenecyclopropanes and other strained alkenes using an N-hydroxylamine and molecular oxygen occurred in the absence of catalyst, initiator, or light. The oxidation reaction proceeds through a radical pathway t…
View article: Talek: Private Group Messaging with Hidden Access Patterns
Talek: Private Group Messaging with Hidden Access Patterns Open
Talek is a private group messaging system that sends messages through potentially untrustworthy servers, while hiding both data content and the communication patterns among its users. Talek explores a new point in the design space of priva…
View article: Assise: Performance and Availability via Client-local {NVM} in a Distributed File System
Assise: Performance and Availability via Client-local {NVM} in a Distributed File System Open
The adoption of low latency persistent memory modules (PMMs) upends the long-established model of remote storage for distributed file systems. Instead, by colocating computation with PMM storage, we can provide applications with much highe…
View article: Backpressure Flow Control
Backpressure Flow Control Open
Effective congestion control for data center networks is becoming increasingly challenging with a growing amount of latency sensitive traffic, much fatter links, and extremely bursty traffic. Widely deployed algorithms, such as DCTCP and D…
View article: Assise: Performance and Availability via NVM Colocation in a Distributed File System
Assise: Performance and Availability via NVM Colocation in a Distributed File System Open
The adoption of very low latency persistent memory modules (PMMs) upends the long-established model of disaggregated file system access. Instead, by colocating computation and PMM storage, we can provide applications much higher I/O perfor…
View article: The Case for I/O-Device-as-a-Service
The Case for I/O-Device-as-a-Service Open
Many computer systems, especially mobile and IoT systems, use a large number of I/O devices. A contemporary OS acts as a security guard for these devices, which trust the OS to correctly implement the "perimeter defense." Moreover, the OS …
View article: Practical Safe Linux Kernel Extensibility
Practical Safe Linux Kernel Extensibility Open
The ability to extend kernel functionality safely has long been a design goal for operating systems. Modern operating systems, such as Linux, are structured for extensibility to enable sharing a single code base among many environments. Un…
View article: TAS
TAS Open
As datacenter network speeds rise, an increasing fraction of server CPU cycles is consumed by TCP packet processing, in particular for remote procedure calls (RPCs). To free server CPUs from this burden, various existing approaches have at…
View article: Teaching Rigorous Distributed Systems With Efficient Model Checking
Teaching Rigorous Distributed Systems With Efficient Model Checking Open
Writing correct distributed systems code is difficult, especially for novice programmers. The inherent asynchrony and need for fault-tolerance make errors almost inevitable. Industrial-strength testing and model checking have been shown to…
View article: Issue Information
Issue Information Open
Aims and Scope: For more than 50 years, clinical pharmacologists, clinical and pharmaceutical researchers, drug development specialists, physicians, nurses, and other medical professionals have relied on The Journal of Clinical Pharmacolog…
View article: A Graphical Interactive Debugger for Distributed Systems
A Graphical Interactive Debugger for Distributed Systems Open
Designing and debugging distributed systems is notoriously difficult. The correctness of a distributed system is largely determined by its handling of failure scenarios. The sequence of events leading to a bug can be long and complex, and …
View article: Volur: Concurrent Edge/Core Route Control in Data Center Networks
Volur: Concurrent Edge/Core Route Control in Data Center Networks Open
A perennial question in computer networks is where to place functionality among components of a distributed computer system. In data centers, one option is to move all intelligence to the edge, essentially relegating switches and middlebox…
View article: Strata
Strata Open
Current hardware and application storage trends put immense pressure on the operating system's storage subsystem. On the hardware side, the market for storage devices has diversified to a multi-layer storage topology spanning multiple orde…
View article: Delta-net: Real-time Network Verification Using Atoms
Delta-net: Real-time Network Verification Using Atoms Open
Real-time network verification promises to automatically detect violations of network-wide reachability invariants on the data plane. To be useful in practice, these violations need to be detected in the order of milliseconds, without rais…
View article: Rack-level Congestion Control
Rack-level Congestion Control Open
Many data center traffic patterns exhibit abundant concurrent connections and high churn. In the face of these characteristics, server-centric congestion control is a poor fit—each connection, no matter how small, must start from scratch w…
View article: High Performance Packet Processing with FlexNIC
High Performance Packet Processing with FlexNIC Open
The recent surge of network I/O performance has put enormous pressure on memory and software I/O processing sub systems. We argue that the primary reason for high memory and processing overheads is the inefficient use of these resources by…
View article: Base and Nucleotide Excision Repair of Oxidatively Generated Guanine Lesions in DNA
Base and Nucleotide Excision Repair of Oxidatively Generated Guanine Lesions in DNA Open
The well known biomarker of oxidative stress, 8-oxo-7,8-dihydroguanine, is more susceptible to further oxidation than the parent guanine base and can be oxidatively transformed to the genotoxic spiroiminodihydantoin (Sp) and 5-guanidinohyd…
View article: Planning for change in a formal verification of the raft consensus protocol
Planning for change in a formal verification of the raft consensus protocol Open
We present the first formal verification of state machine safety for the Raft consensus protocol, a critical component of many distributed systems. We connected our proof to previous work to establish an end-to-end guarantee that our imple…