Skip to main content

Showing 1–7 of 7 results for author: Mace, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2205.11458  [pdf, other

    cs.CR

    Groundhog: Efficient Request Isolation in FaaS

    Authors: Mohamed Alzayat, Jonathan Mace, Peter Druschel, Deepak Garg

    Abstract: Security is a core responsibility for Function-as-a-Service (FaaS) providers. The prevailing approach has each function execute in its own container to isolate concurrent executions of different functions. However, successive invocations of the same function commonly reuse the runtime state of a previous invocation in order to avoid container cold-start delays when invoking a function. Although ef… ▽ More

    Submitted 23 May, 2022; originally announced May 2022.

  2. arXiv:2205.06933  [pdf, other

    cs.DC

    ACT now: Aggregate Comparison of Traces for Incident Localization

    Authors: Kamala Ramasubramanian, Ashutosh Raina, Jonathan Mace, Peter Alvaro

    Abstract: Incidents in production systems are common and downtime is expensive. Applying an appropriate mitigating action quickly, such as changing a specific firewall rule, reverting a change, or diverting traffic to a different availability zone, saves money. Incident localization is time-consuming since a single failure can have many effects, extending far from the site of failure. Knowing how different… ▽ More

    Submitted 13 May, 2022; originally announced May 2022.

  3. arXiv:2202.05769  [pdf, other

    cs.DC

    The Benefit of Hindsight: Tracing Edge-Cases in Distributed Systems

    Authors: Lei Zhang, Vaastav Anand, Zhiqiang Xie, Ymir Vigfusson, Jonathan Mace

    Abstract: Today's distributed tracing frameworks are ill-equipped to troubleshoot rare edge-case requests. The crux of the problem is a trade-off between specificity and overhead. On the one hand, frameworks can indiscriminately select requests to trace when they enter the system (head sampling), but this is unlikely to capture a relevant edge-case trace because the framework cannot know which requests will… ▽ More

    Submitted 26 April, 2022; v1 submitted 11 February, 2022; originally announced February 2022.

  4. arXiv:2010.13681  [pdf, other

    cs.DC cs.HC

    Aggregate-Driven Trace Visualizations for Performance Debugging

    Authors: Vaastav Anand, Matheus Stolet, Thomas Davidson, Ivan Beschastnikh, Tamara Munzner, Jonathan Mace

    Abstract: Performance issues in cloud systems are hard to debug. Distributed tracing is a widely adopted approach that gives engineers visibility into cloud systems. Existing trace analysis approaches focus on debugging single request correctness issues but not debugging single request performance issues. Diagnosing a performance issue in a given request requires comparing the performance of the offending r… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

  5. arXiv:2006.02464  [pdf, other

    cs.DC cs.LG

    Serving DNNs like Clockwork: Performance Predictability from the Bottom Up

    Authors: Arpan Gujarati, Reza Karimi, Safya Alzayat, Wei Hao, Antoine Kaufmann, Ymir Vigfusson, Jonathan Mace

    Abstract: Machine learning inference is becoming a core building block for interactive web applications. As a result, the underlying model serving systems on which these applications depend must consistently meet low latency targets. Existing model serving architectures use well-known reactive techniques to alleviate common-case sources of latency, but cannot effectively curtail tail latency caused by unpre… ▽ More

    Submitted 26 October, 2020; v1 submitted 3 June, 2020; originally announced June 2020.

    Comments: In Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI '20)

  6. Cyclic Bayesian Attack Graphs: A Systematic Computational Approach

    Authors: Isaac Matthews, John Mace, Sadegh Soudjani, Aad van Moorsel

    Abstract: Attack graphs are commonly used to analyse the security of medium-sized to large networks. Based on a scan of the network and likelihood information of vulnerabilities, attack graphs can be transformed into Bayesian Attack Graphs (BAGs). These BAGs are used to evaluate how security controls affect a network and how changes in topology affect security. A challenge with these automatically generated… ▽ More

    Submitted 13 May, 2020; originally announced May 2020.

  7. arXiv:1901.06887  [pdf, other

    cs.DC

    No DNN Left Behind: Improving Inference in the Cloud with Multi-Tenancy

    Authors: Amit Samanta, Suhas Shrinivasan, Antoine Kaufmann, Jonathan Mace

    Abstract: With the rise of machine learning, inference on deep neural networks (DNNs) has become a core building block on the critical path for many cloud applications. Applications today rely on isolated ad-hoc deployments that force users to compromise on consistent latency, elasticity, or cost-efficiency, depending on workload characteristics. We propose to elevate DNN inference to be a first class cloud… ▽ More

    Submitted 23 January, 2019; v1 submitted 21 January, 2019; originally announced January 2019.

    Comments: 5 pages