Big data applications in operations/supply-chain management: A literature review

R Addo-Tenkorang, PT Helo - Computers & Industrial Engineering, 2016 - Elsevier
Purpose Big data is increasingly becoming a major organizational enterprise force to reckon
with in this global era for all sizes of industries. It is a trending new enterprise system or …

Semeru: A {Memory-Disaggregated} managed runtime

C Wang, H Ma, S Liu, Y Li, Z Ruan, K Nguyen… - … USENIX Symposium on …, 2020 - usenix.org
Resource-disaggregated architectures have risen in popularity for large datacenters.
However, prior disaggregation systems are designed for native applications; in addition, all …

AsterixDB: A scalable, open source BDMS

S Alsubaiee, Y Altowim, H Altwaijry, A Behm… - arXiv preprint arXiv …, 2014 - arxiv.org
AsterixDB is a new, full-function BDMS (Big Data Management System) with a feature set
that distinguishes it from other platforms in today's open source Big Data ecosystem. Its …

Debloating software through {Piece-Wise} compilation and loading

A Quach, A Prakash, L Yan - 27th USENIX security symposium (USENIX …, 2018 - usenix.org
Programs are bloated. Our study shows that only 5% of libc is used on average across the
Ubuntu Desktop envi-ronment (2016 programs); the heaviest user, vlc media player, only …

{RAZOR}: A framework for post-deployment software debloating

C Qian, H Hu, M Alharthi, PH Chung, T Kim… - 28th USENIX security …, 2019 - usenix.org
Commodity software typically includes functionalities for a broad user population. However,
each individual user usually only needs a subset of the supported functionalities. The …

Visual slam for automated driving: Exploring the applications of deep learning

S Milz, G Arbeiter, C Witt, B Abdallah… - Proceedings of the …, 2018 - openaccess.thecvf.com
Deep learning has become the standard model for object detection and recognition.
Recently, there is progress on using CNN models for geometric vision tasks like depth …

Nibbler: debloating binary shared libraries

I Agadakos, D Jin, D Williams-King… - Proceedings of the 35th …, 2019 - dl.acm.org
Developers today have access to an arsenal of toolkits and libraries for rapid application
prototyping. However, when an application loads a library, the entirety of that library's code …

Yak: A {High-Performance}{Big-Data-Friendly} Garbage Collector

K Nguyen, L Fang, G Xu, B Demsky, S Lu… - … USENIX Symposium on …, 2016 - usenix.org
Most “Big Data” systems are written in managed languages, such as Java, C#, or Scala.
These systems suffer from severe memory problems due to the massive volume of objects …

Quality assurance technologies of big data applications: A systematic literature review

S Ji, Q Li, W Cao, P Zhang, H Muccini - Applied Sciences, 2020 - mdpi.com
Big data applications are currently used in many application domains, ranging from
statistical applications to prediction systems and smart cities. However, the quality of these …

Efficient and available in-memory KV-store with hybrid erasure coding and replication

H Chen, H Zhang, M Dong, Z Wang, Y Xia… - ACM Transactions on …, 2017 - dl.acm.org
In-memory key/value store (KV-store) is a key building block for many systems like
databases and large websites. Two key requirements for such systems are efficiency and …