skip to main content
10.5555/1268256.1268259guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Transparent result caching

Published: 15 June 1998 Publication History

Abstract

The goal of this work is to develop a general framework for transparently managing the interactions and dependencies among input files, development tools, and output files. By unobtrusively monitoring the execution of unmodified programs, we are able to track process lineage--each process's parent, children, input files, and output files, and file dependency--for each file, the sequence of operations and the set of input files used to create the file. We use this information to implement Transparent Result Caching (TREC) and describe how TREC is used to build a number of useful user utilities. Unmake allows users to query TREC for file lineage information, including the full sequence of programs executed to create a particular output file. Transparent Make uses TREC to automatically generate dependency information by observing program execution, freeing end users from the need to explicitly specify dependency information (i.e., Makefiles can be replaced by shell scripts). Dynamic Web Object Caching allows for the caching of certain dynamically generated web pages, improving server performance and client latency.

References

[1]
{Alvisi & Marzullo 1996} L. Alvisi and K. Marzullo. "Trade-offs in Implementing Optimal Message Logging Protocols". In Proceedings of the Fifteenth Symposium on Principles of Distributed Computing, June 1996.
[2]
{Apa 1995} Apache HTTP Server Project, 1995. http:// www.apache.org/.
[3]
{Baker et al. 1991} M. Baker, J. Hartman, M. Kupfer, K. Shirriff, and J. Ousterhout. "Measurements of a Distributed File System". In Proceedings of the 13th ACM Symposium on Operating Systems Principles, pp. 198-212, October 1991.
[4]
{Bershad & Pinkerton 1988} B. N. Bershad and C. B. Pinkerton. "Watchdogs--Extending the UNIX File System". Computing Systems, 1(2):169-188, Spring 1988.
[5]
{Braun & Claffy 1994} H.-W. Braun and K. Claffy. "Web Traffic Characterization: An Assessment of the Impact of Caching Documents From NCSA's Web Server". In Second International World Wide Web Conference, October 1994.
[6]
{Bubenik & Zwaenepoel 1989} R. Bubenik and W. Zwaenepoel. "Performance of Optimistic Make". In Proceedings of Sigmetrics, pp. 39-48, 1989.
[7]
{Cate 1992} V. Cate. "Alex - a Global Filesystem". In Proceedings of the 1992 USENIX File System Workshop , pp. 1-12, May 1992.
[8]
{Chankhunthod et al. 1996} A. Chankhunthod, P. Danzig, C. Neerdaels, M. Schwartz, and K. Worrell. "A Hierarchical Internet Object Cache". In Proceedings of the 1996 USENIX Technical Conference, January 1996.
[9]
{Clemm & Osterweil 1990} G. Clemm and L. Osterweil. "A Mechanism for Environment Integration". ACM Transactions on Programming Languages and Systems, 12(1):1-25, Jan 1990.
[10]
{Colby et al. 1996} L. S. Colby, T. Griffin, L. Libkin, I. S. Mumick, and H. Trickey. "Algorithms for Derred View Maintenance". In SIGMOD, pp. 469-480, 1996.
[11]
{Danzig et al. 1993} P. B. Danzig, M. F. Schwartz, and R. S. Hall. "A Case for Caching File Objects Inside Internetworks". In ACM SIGCOMM 93 Conference , pp. 239-248, September 1993.
[12]
{Douglis & Ousterhout 1991} F. Douglis and J. Ousterhout. "Transparent Process Migration: Design Alternatives and the Sprite Implementation". Software-- Practice and Experience, 21(8):757-85, August 1991.
[13]
{Dozier 1993} J. Dozier. Personal Communication, March 1993.
[14]
{Duska et al. 1997} B. Duska, D. Marwood, and M. J. Feeley. "The Measured Access Characteristics of World Wide Web Client Proxy Caches". In Proceedings of the 1997 Usenix Symposium on Internet Technologies and Systems, Monterey, California, December 1997.
[15]
{Ghormley et al. 1996} D. P. Ghormley, D. Petrou, and T. E. Anderson. "SLIC: Secure Loadable Interposition Code". Technical Report CSD-96-920, University of California at Berkeley, November 1996.
[16]
{Goldberg et al. 1996} I. Goldberg, D. Wagner, R. Thomas, and E. Brewer. "A Secure Environment for Untrusted Helper Applications". In Proceedings of the Sixth USENIX Security Symposium, July 1996.
[17]
{Gribble & Brewer 1997} S. D. Gribble and E. A. Brewer. "System Design Issues for Internet Middleware Services: Deductions from a Large Client Trace". In Proceedings of the 1997 Usenix Symposium on Internet Technologies and Systems, Monterey, California, December 1997.
[18]
{Gupta & Mumick 1995} A. Gupta and I. S. Mumick. "Maintenance of Materialized Views: Problems, Techniques, and Applications". In Data Engineering Bulletin, June 1995.
[19]
{Gupta et al. 1993} A. Gupta, I. S. Mumick, and V. S. Subrahmanian. "Maintaining View Incrementally". In SIGMOD, 1993.
[20]
{Gwertzman & Seltzer 1996} J. Gwertzman and M. Seltzer. "World-Wide Web Cache Consistency". In Proceedings of the 1996 USENIX Technical Conference , pp. 141-151, January 1996.
[21]
{Heydon et al. 1997} A. Heydon, J. Horning, R. Levin, T. Mann, and Y. Yu. "The Vesta-2 Software Description Language". Technical Report 1997-005, Digital Equipment Corporation, Systems Research Center, 130 Lytton Avenue, Palo Alto, California 94301, June 1997.
[22]
{Howard et al. 1988} J. Howard, M. Kazar, S. Menees, D. Nichols, M. Satyanarayanan, R. Sidebotham, and M. West. "Scale and Performance in a Distributed File System". ACM Transactions on Computer Systems, 6(1):51-82, February 1988.
[23]
{Iyenger & Challenger 1997} A. Iyenger and J. Challenger. "Improving Web Server Performance by Caching Dynamic Data". In Proceedings of USENIX Symposium on Internet Technologies and Systems, pp. 49-60, December 1997.
[24]
{Jones 1993} M. B. Jones. "Interposition Agents: Transparently Interposing User Code at the System Interface". In Proceedings of the 14th ACM Symposium on Operating Systems Principles, pp. 80-93, December 1993.
[25]
{Kawaguchi et al. 1996} A. Kawaguchi, D. Lieuwen, I. S. Mumick, D. Quass, and K. A. Ross. "Concurrency Control Theory for Deferred Materialized Views". Unpublished, 1996.
[26]
{Leblang & Chase 1984} D. B. Leblang and R. P. Chase, Jr. "Computer-Aided Software Engineering in a Distributed Workstation Environment". In Proceedings of the ACM SIGSOFT/SIGPLAN Software Engineering Symposium on Practical Software Development Environments, pp. 104-112, May 1984.
[27]
{Leblang & McLean 1985} D. B. Leblang and G. D. McLean, Jr. "Configuration management for large-scale software development efforts". In Proceedings of the Workshop on Software Engineering Environments for Programming-in-the-Large, pp. 122-127, Harwichport, Massachusetts, June 1985.
[28]
{Levin & McJones 1993} R. Levin and P. R. McJones. "The Vesta Approach to Precise Configuration of Large Software Systems". Technical Report 105, Digital Equipment Corporation, Systems Research Center, 130 Lytton Avenue, Palo Alto, California 94301, June 1993.
[29]
{McCarthy & Dayal 1989} D. R. McCarthy and U. Dayal. "The Architecure of an Active Data Base Management System". In SIGMOD, June 1989.
[30]
{Microsoft Corporation} "ISAPI Overview". http: //www.microsft.com/msdn/sdk/ platforms/doc/sdk/internet/src/ isapimr%g.htm. Microsoft Corporation.
[31]
{Netscape} "The Server-Application Function and Netscape Server API". http://www.netscape. com/newsref/srd/server_api.html.
[32]
{Open Market} "Fastcgi". http://www.fastcgi.com.
[33]
{RTDA} "VOV". http://www.rtda.com/vov. html. Runtime Design Automation.
[34]
{Schechter et al. 1998} S. Schechter, M. Kirshnan, and M. D. Smith. "Using Path Profiles to Predict HTTP Requests". In Proceedings of the Seventh International World Wide Web Conference, April 1998.
[35]
{Squ 1996} Squid Internet Object Cache, 1996. http:// squid.nlanr.net/Squid/.
[36]
{Stonebraker et al. 1990} M. Stonebraker, A. Jhingran, J. Goh, and S. Potamianos. "On Rules, Procedures, Caching and Views In Database Systems". In SIGMOD, May 1990.
[37]
{Vahdat et al. 1998} A. Vahdat, T. Anderson, and M. Dahlin. "WebOS: Operating System Services for Wide Area Applications". In To appear in the Proceedings of the Seventh IEEE Symposium on High Performance Distributed Systems, Chicago, Illinois, July 1998.
[38]
{Widom & Finkelstein 1990} J. Widom and S. J. Finkelstein. "Set-Oriented Production Rules in Relational Database Systems". In SIGMOD, May 1990.
[39]
{Zhang et al. 1997} L. Zhang, S. Floyd, and V. Jacobsen. "Adaptive Web Caching". In Web Caching Workshop . National Laboratory for Applied Network Research, June 1997.

Cited By

View all
  • (2024)A benchmark suite and performance analysis of user-space provenance collectorsProceedings of the 2nd ACM Conference on Reproducibility and Replicability10.1145/3641525.3663627(85-95)Online publication date: 18-Jun-2024
  • (2020)Improving reproducibility of data science pipelines through transparent provenance captureProceedings of the VLDB Endowment10.14778/3415478.341555613:12(3354-3368)Online publication date: 14-Sep-2020
  • (2019)UrsprungProceedings of the 2019 International Conference on Management of Data10.1145/3299869.3320235(1989-1992)Online publication date: 25-Jun-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

ATEC '98: Proceedings of the annual conference on USENIX Annual Technical Conference
June 1998
476 pages

Publisher

USENIX Association

United States

Publication History

Published: 15 June 1998

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A benchmark suite and performance analysis of user-space provenance collectorsProceedings of the 2nd ACM Conference on Reproducibility and Replicability10.1145/3641525.3663627(85-95)Online publication date: 18-Jun-2024
  • (2020)Improving reproducibility of data science pipelines through transparent provenance captureProceedings of the VLDB Endowment10.14778/3415478.341555613:12(3354-3368)Online publication date: 14-Sep-2020
  • (2019)UrsprungProceedings of the 2019 International Conference on Management of Data10.1145/3299869.3320235(1989-1992)Online publication date: 25-Jun-2019
  • (2018)Reproducibility in Scientific ComputingACM Computing Surveys10.1145/318626651:3(1-36)Online publication date: 16-Jul-2018
  • (2018)Mechanisms for provenance collection in scientific workflow systemsComputing10.1007/s00607-017-0578-1100:5(439-472)Online publication date: 1-May-2018
  • (2017)KnockoffProceedings of the 15th Usenix Conference on File and Storage Technologies10.5555/3129633.3129641(73-87)Online publication date: 27-Feb-2017
  • (2016)Unifying intrusion detection and forensic analysis via provenance awarenessFuture Generation Computer Systems10.1016/j.future.2016.02.00561:C(26-36)Online publication date: 1-Aug-2016
  • (2015)WaFS: A Workflow-Aware File System for Effective Storage Utilization in the CloudIEEE Transactions on Computers10.1109/TC.2014.237519564:9(2716-2729)Online publication date: 1-Sep-2015
  • (2014)Eidetic systemsProceedings of the 11th USENIX conference on Operating Systems Design and Implementation10.5555/2685048.2685090(525-540)Online publication date: 6-Oct-2014
  • (2014)TachyonProceedings of the ACM Symposium on Cloud Computing10.1145/2670979.2670985(1-15)Online publication date: 3-Nov-2014
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy