WEKO3
アイテム
User-level Enforcement of Appropriate Background Process Execution
https://ipsj.ixsq.nii.ac.jp/records/73589
https://ipsj.ixsq.nii.ac.jp/records/73589dcde5234-b892-4ae5-bef4-e7d1407121ea
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
Copyright (c) 2011 by the Information Processing Society of Japan
|
|
オープンアクセス |
Item type | Trans(1) | |||||||
---|---|---|---|---|---|---|---|---|
公開日 | 2011-03-10 | |||||||
タイトル | ||||||||
タイトル | User-level Enforcement of Appropriate Background Process Execution | |||||||
タイトル | ||||||||
言語 | en | |||||||
タイトル | User-level Enforcement of Appropriate Background Process Execution | |||||||
言語 | ||||||||
言語 | eng | |||||||
キーワード | ||||||||
主題Scheme | Other | |||||||
主題 | プロセススケジューリング | |||||||
資源タイプ | ||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||
資源タイプ | journal article | |||||||
著者所属 | ||||||||
Keio University/Carnegie Mellon University | ||||||||
著者所属 | ||||||||
Keio University | ||||||||
著者所属 | ||||||||
Keio University | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Keio University / Carnegie Mellon University | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Keio University | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Keio University | ||||||||
著者名 |
Yoshihisa, Abe
× Yoshihisa, Abe
|
|||||||
著者名(英) |
Yoshihisa, Abe
× Yoshihisa, Abe
|
|||||||
論文抄録 | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | Idle resources can be exploited not only to run important local tasks such as data backup and virus checking, but also to make contributions to society by participating in distributed computing projects. When executing background processes to utilize such valuable idle resources, we need to control them explicitly to avoid foreground performance degradation. Otherwise, the user will be discouraged from exploiting idle resources. In this paper, we show that we can detect resource contention between foreground and background processes and properly control background process execution at the user level, without modifications to the underlying operating system or user applications. We infer resource contention from changes in the approximated resource shares of background processes. In deriving those resource shares, our approach takes advantage of dynamically enabled probes. Also, it takes account of different resource types and can handle multiple background processes with varied resource needs. Our experiments show that our system keeps the increase in foreground execution time due to background processes below 16.9% - often much lower in most of our experiments. | |||||||
論文抄録(英) | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | Idle resources can be exploited not only to run important local tasks such as data backup and virus checking, but also to make contributions to society by participating in distributed computing projects. When executing background processes to utilize such valuable idle resources, we need to control them explicitly to avoid foreground performance degradation. Otherwise, the user will be discouraged from exploiting idle resources. In this paper, we show that we can detect resource contention between foreground and background processes and properly control background process execution at the user level, without modifications to the underlying operating system or user applications. We infer resource contention from changes in the approximated resource shares of background processes. In deriving those resource shares, our approach takes advantage of dynamically enabled probes. Also, it takes account of different resource types and can handle multiple background processes with varied resource needs. Our experiments show that our system keeps the increase in foreground execution time due to background processes below 16.9% - often much lower in most of our experiments. | |||||||
書誌レコードID | ||||||||
収録物識別子タイプ | NCID | |||||||
収録物識別子 | AA11833852 | |||||||
書誌情報 |
情報処理学会論文誌コンピューティングシステム(ACS) 巻 4, 号 2, p. 94-113, 発行日 2011-03-10 |
|||||||
ISSN | ||||||||
収録物識別子タイプ | ISSN | |||||||
収録物識別子 | 1882-7829 | |||||||
出版者 | ||||||||
言語 | ja | |||||||
出版者 | 情報処理学会 |