{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00073589","sets":["934:1119:6347:6373"]},"path":["6373"],"owner":"11","recid":"73589","title":["User-level Enforcement of Appropriate Background Process Execution"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-03-10"},"_buckets":{"deposit":"7b6cfb98-6697-4cba-ad5d-2507b5c6d644"},"_deposit":{"id":"73589","pid":{"type":"depid","value":"73589","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"User-level Enforcement of Appropriate Background Process Execution","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"User-level Enforcement of Appropriate Background Process Execution"},{"subitem_title":"User-level Enforcement of Appropriate Background Process Execution","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"プロセススケジューリング","subitem_subject_scheme":"Other"}]},"item_type_id":"3","publish_date":"2011-03-10","item_3_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Keio University/Carnegie Mellon University"},{"subitem_text_value":"Keio University"},{"subitem_text_value":"Keio University"}]},"item_3_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Keio University / Carnegie Mellon University","subitem_text_language":"en"},{"subitem_text_value":"Keio University","subitem_text_language":"en"},{"subitem_text_value":"Keio University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/73589/files/IPSJ-TACS0402010.pdf"},"date":[{"dateType":"Available","dateValue":"2013-03-10"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-TACS0402010.pdf","filesize":[{"value":"3.0 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"16"},{"tax":["include_tax"],"price":"0","billingrole":"11"},{"tax":["include_tax"],"price":"0","billingrole":"14"},{"tax":["include_tax"],"price":"0","billingrole":"15"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"5e80b151-4e5a-4e82-84c5-59df0df551e4","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_3_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yoshihisa, Abe"},{"creatorName":"Hiroshi, Yamada"},{"creatorName":"Kenji, Kono"}],"nameIdentifiers":[{}]}]},"item_3_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yoshihisa, Abe","creatorNameLang":"en"},{"creatorName":"Hiroshi, Yamada","creatorNameLang":"en"},{"creatorName":"Kenji, Kono","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_3_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11833852","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_3_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7829","subitem_source_identifier_type":"ISSN"}]},"item_3_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Idle resources can be exploited not only to run important local tasks such as data backup and virus checking, but also to make contributions to society by participating in distributed computing projects. When executing background processes to utilize such valuable idle resources, we need to control them explicitly to avoid foreground performance degradation. Otherwise, the user will be discouraged from exploiting idle resources. In this paper, we show that we can detect resource contention between foreground and background processes and properly control background process execution at the user level, without modifications to the underlying operating system or user applications. We infer resource contention from changes in the approximated resource shares of background processes. In deriving those resource shares, our approach takes advantage of dynamically enabled probes. Also, it takes account of different resource types and can handle multiple background processes with varied resource needs. Our experiments show that our system keeps the increase in foreground execution time due to background processes below 16.9% - often much lower in most of our experiments.","subitem_description_type":"Other"}]},"item_3_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Idle resources can be exploited not only to run important local tasks such as data backup and virus checking, but also to make contributions to society by participating in distributed computing projects. When executing background processes to utilize such valuable idle resources, we need to control them explicitly to avoid foreground performance degradation. Otherwise, the user will be discouraged from exploiting idle resources. In this paper, we show that we can detect resource contention between foreground and background processes and properly control background process execution at the user level, without modifications to the underlying operating system or user applications. We infer resource contention from changes in the approximated resource shares of background processes. In deriving those resource shares, our approach takes advantage of dynamically enabled probes. Also, it takes account of different resource types and can handle multiple background processes with varied resource needs. Our experiments show that our system keeps the increase in foreground execution time due to background processes below 16.9% - often much lower in most of our experiments.","subitem_description_type":"Other"}]},"item_3_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"113","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌コンピューティングシステム(ACS)"}],"bibliographicPageStart":"94","bibliographicIssueDates":{"bibliographicIssueDate":"2011-03-10","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"4"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":73589,"updated":"2025-01-21T21:53:28.582311+00:00","links":{},"created":"2025-01-18T23:31:28.042917+00:00"}