We present Speculative Authorization (SPAN), a prediction technique that reduces authorization latency in enterprise systems. SPAN predicts requests that a system client might make in the near future, based on its past behavior. SPAN allows authorization decisions for the predicted requests to be made before the requests are issued, thus virtually reducing the authorization latency to zero. We developed SPAN algorithms, implemented a prototype, and evaluated it using two real-world data traces and one synthetic data trace. The results of our evaluation suggest that systems employing SPAN are able to achieve zero authorization latency for almost 60% of the requests. We analyze the tradeoffs between the hit rate and the precision of SPAN pred...
TPC-C, subepochs Thread level speculation (TLS) has proven to be a promising method of extracting pa...
Communication latencies within critical sections constitute a major bottleneck in some classes of em...
Speculative prefetching has been proposed to improve the response time of network access. Previous s...
As enterprises aim towards achieving zero latency for their systems, latency introduced by authoriza...
As enterprises aim towards achieving zero latency for their systems, latency introduced by authoriza...
With the emergence of tighter corporate policies and government regulations, access control has beco...
With the emergence of tighter corporate policies and government regulations, access control has beco...
diction technique that reduces authorization latency in enterprise systems. SPAN predicts requests t...
In a large-scale enterprise system, making authorization decisions is often computationally expensiv...
Speculative service implies that a client's request for a document is serviced by sending, in additi...
Various concurrency control algorithms di er in the time when con icts are detected, and in the way ...
Previous studies in speculative prefetching focus on building and evaluating access models for the p...
We describe SCC-kS, a Speculative Concurrency Control (SCC) algorithm that allows a DBMS to use e ci...
Thiswork presents Speculative Transaction Replication (STR), a protocol that exploits transparent sp...
Efficient data supply to the processor is the one of the keys to achieve high performance. However, ...
TPC-C, subepochs Thread level speculation (TLS) has proven to be a promising method of extracting pa...
Communication latencies within critical sections constitute a major bottleneck in some classes of em...
Speculative prefetching has been proposed to improve the response time of network access. Previous s...
As enterprises aim towards achieving zero latency for their systems, latency introduced by authoriza...
As enterprises aim towards achieving zero latency for their systems, latency introduced by authoriza...
With the emergence of tighter corporate policies and government regulations, access control has beco...
With the emergence of tighter corporate policies and government regulations, access control has beco...
diction technique that reduces authorization latency in enterprise systems. SPAN predicts requests t...
In a large-scale enterprise system, making authorization decisions is often computationally expensiv...
Speculative service implies that a client's request for a document is serviced by sending, in additi...
Various concurrency control algorithms di er in the time when con icts are detected, and in the way ...
Previous studies in speculative prefetching focus on building and evaluating access models for the p...
We describe SCC-kS, a Speculative Concurrency Control (SCC) algorithm that allows a DBMS to use e ci...
Thiswork presents Speculative Transaction Replication (STR), a protocol that exploits transparent sp...
Efficient data supply to the processor is the one of the keys to achieve high performance. However, ...
TPC-C, subepochs Thread level speculation (TLS) has proven to be a promising method of extracting pa...
Communication latencies within critical sections constitute a major bottleneck in some classes of em...
Speculative prefetching has been proposed to improve the response time of network access. Previous s...