Course Reading List

Storage-Side Processing

ABCs of Disk Drives

  • A.D. Anderson, J. Dykes, E. Riedel, More than an Interface -- SCSI vs. ATA, FAST, 2003.
  • C. Ruemmler, J. Wilkes, An introduction to disk drive modeling, IEEE Computer 27(3):17-28, March 1994.

    Active Disks

  • A. Acharya, M. Uysal, and J. Saltz, Active Disks: Programming Model, Algorithms and Evaluation, ASPLOS, 1998.
  • E. Riedel, G. Gibson, and C. Faloutsos, Active Storage for Large-Scale Data Mining and Multimedia, VLDB, 1998.
  • W.W Hsu, A.J. Smith, H.C. Young, Projecting the Performance of Decision Support Workloads on Systems with Smart Storage (SmartSTOR), Technical Report CSD-99-1057, University of California - Berkeley, August 1999.
  • L. Huston, R. Sukthankar, R. Wickremesinghe, M. Satyanarayanan, G.R. Ganger, E. Riedel, A. Ailamaki, Diamond: A Storage Architecture for Early Discard in Interactive Search, FAST, 2004.

    Application Aware Disks

  • M. Sivathanu, V. Prabhakaran, F. Popovici, T. E. Denehy, A. C. Arpaci-Dusseau, R. H. Arpaci-Dusseau, Semantically-Smart Disk Systems, FAST, 2003.
  • Z. Li, Z. Chen, S. Srinivasan, Y. Zhou, C-Miner: Mining Block Correlations in Storage Systems, FAST, 2004.
  • M. Sivathanu, V. Prabhakaran, A.C. Arpaci-Dusseau, R.H. Arpaci-Dusseau, Improving Storage System Availability with D-GRAID, FAST, 2004.

    Support for Security

    Storage Support for Security

  • J.D. Strunk, G.R. Goodson, M.L. Scheinholtz, C.A.N. Soules, G.R. Ganger, Self-Securing Storage: Protecting Data in Compromised Systems, OSDI, 2000.
  • A.G. Pennington, J.D. Strunk, J.L. Griffin, C.A.N. Soules, G.R. Goodson, G.R. Ganger, Storage-Based Intrusion Detection: Watching Storage Activity for Suspicious Behavior, USENIX Security, 2003.
  • Q. Zhu, W.W. Hsu, Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records, SIGMOD, 2005.

    Processor Support for Security

  • J.R. Crandall, F.T. Chong, Minos: Control Data Attack Prevention Orthogonal to Memory Model, MICRO, 2004.
  • R.B. Lee, P.C.S. Kwan, J.P McGregor, J. Dwoskin, Z. Wang, Architecture for Protecting Critical Secrets in Microprocessors, ISCA, 2005.
  • G.E. Suh, C.W. O'Donnell, I. Sachdev, S. Devdas,xi Design and Implementation of the AEGIS Sngle-Chip Secure Processor Using Physical Random Functions, ISCA, 2005.

    Soft-Error Tolerant Microprocessor Design

    Basics of Soft-Errors

  • J.F. Zeigler, Terrestrial Cosmic Rays, IBM JRD, 40(1), January 1996.
  • S.S. Mukherjee, J. Emer, S.K. Reinhardt, The Soft Error Problem: an Architectural Perspective, HPCA, 2005.

    Modeling and Analysis

  • S.S. Mukherjee, C. Weaver, J.S. Emer, S.K. Reinhardt, T.M. Austin, A Systematic Methodology to Compute the Architectural Vulnerability Factors for a High-Performance Microprocessor, MICRO, 2003
  • A. Biswas, P. Racunas, R. Cheveresan, J.S. Emer, S.S. Mukherjee, R. Rangan, Computing Architectural Vulnerability Factors for Address-Based Structures, ISCA, 2005.

    Techniques for Soft-Error Detection

  • S.K. Reinhardt, S.S. Mukherjee, Transient Fault Detection via Simultaneous Multithreading, ISCA, 2000.
  • S.S. Mukherjee, M. Knotz, S.K. Reinhardt, Detailed Design and Evaluation of Redundant Multithreading Alternatives, ISCA, 2002.

    Techniques of Soft-Error Recovery

  • T. N. Vijaykumar, I. Pomeranz, K. Cheng, Transient-Fault Recovery via Simultaneous Multithreading, ISCA, 2002.
  • M. Gomaa, C. Scarbrough, T. N. Vijaykumar, I. Pomeranz, Transient-Fault Recovery for Chip Multiprocessors, ISCA, 2003.

    Efficiency Issues

  • A. Parashar, S. Gurumurthi, A. Sivasubramaniam, A Complexity-Effective Approach to ALU Bandwidth Enhancement for Instruction-Level Temporal Redundancy, ISCA, 2004.
  • J. Smolens, B. Gold, J. Kim, B. Falsafi, J.C. Hoe, A.G. Nowatzyk, Fingerprinting: Bounding the Soft-Error Detection Latency and Bandwidth, ASPLOS, 2004.
  • M.W. Rashid, E. Tan, M. Huang, D. Albonesi, Exposing Coarse-Grained Verification Parallelism for Power-Efficient Fault Tolerance, PACT, 2005.