EuroSys¶
All¶
Cited by | Paper title | Year |
---|---|---|
2483 | Dryad: distributed data-parallel programs from sequential building blocks. | 2007 |
1314 | CloneCloud: elastic execution between mobile device and cloud. | 2011 |
1148 | Delay scheduling: a simple technique for achieving locality and fairness in cluster scheduling. | 2010 |
880 | User interactions in social networks and their implications. | 2009 |
703 | Understanding user behavior in large-scale video-on-demand systems. | 2006 |
656 | Adaptive control of virtualized resources in utility computing environments. | 2007 |
638 | Flicker: an execution infrastructure for tcb minimization. | 2008 |
613 | Container-based operating system virtualization: a scalable high-performance alternative to hypervisors. | 2007 |
546 | Where is the energy spent inside my app?: fine grained energy accounting on smartphones with Eprof. | 2012 |
541 | DepSky: dependable and secure storage in a cloud-of-clouds. | 2011 |
515 | Automated control of multiple virtualized resources. | 2009 |
461 | Q-clouds: managing performance interference effects for QoS-aware clouds. | 2010 |
432 | SnowFlock: rapid virtual machine cloning for cloud computing. | 2009 |
421 | Thorough static analysis of device drivers. | 2006 |
348 | BlinkDB: queries with bounded errors and bounded response times on very large data. | 2013 |
337 | Migrating server storage to SSDs: analysis of tradeoffs. | 2009 |
331 | Omega: flexible scalable schedulers for large compute clusters. | 2013 |
325 | Language support for fast and reliable message-based communication in singularity OS. | 2006 |
321 | Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. | 2006 |
308 | NOVA: a microhypervisor-based secure virtualization architecture. | 2010 |
302 | Fine-grained power modeling for smartphones using system call tracing. | 2011 |
280 | Thread clustering: sharing-aware scheduling on SMP-CMP-SMT multiprocessors. | 2007 |
274 | Large-scale cluster management at Google with Borg. | 2015 |
252 | STMBench7: a benchmark for software transactional memory. | 2007 |
232 | GreenHadoop: leveraging green energy in data-processing frameworks. | 2012 |
226 | Bias scheduling in heterogeneous multi-core architectures. | 2010 |
225 | Scarlett: coping with skewed content popularity in mapreduce clusters. | 2011 |
211 | Towards practical page coloring-based multicore cache management. | 2009 |
208 | System software for persistent memory. | 2014 |
202 | Koala: a platform for OS-level power management. | 2009 |
199 | Practical taint-based protection using demand emulation. | 2006 |
195 | Execution synthesis: a technique for automated software debugging. | 2010 |
189 | Exploiting nonstationarity for performance prediction. | 2007 |
185 | Emergent (mis)behavior vs. complex software systems. | 2006 |
176 | Mizan: a system for dynamic load balancing in large-scale graph processing. | 2013 |
174 | Balancing power consumption in multiprocessor systems. | 2006 |
174 | Automated known problem diagnosis with event traces. | 2006 |
171 | A fresh look at the reliability of long-term digital storage. | 2006 |
171 | Parallel symbolic execution for automated real-world software testing. | 2011 |
169 | Resource-conscious scheduling for energy efficiency on multicore processors. | 2010 |
169 | Documenting and automating collateral evolutions in linux device drivers. | 2008 |
168 | Reducing TCB complexity for security-sensitive applications: three case studies. | 2006 |
163 | “Defeating return-oriented rootkits with “”Return-Less”” kernels. “ | 2010 |
162 | Peer sharing behaviour in the eDonkey network and implications for the design of server-less file sharing systems. | 2006 |
157 | Ksplice: automatic rebootless kernel updates. | 2009 |
156 | Energy efficiency for large-scale MapReduce workloads with significant interactive analysis. | 2012 |
156 | Fingerprinting the datacenter: automated classification of performance crises. | 2010 |
155 | Parallax: virtual disks for virtual machines. | 2008 |
153 | Cache craftiness for fast multicore key-value storage. | 2012 |
153 | Jockey: guaranteed job latency in data parallel clusters. | 2012 |
150 | MDCC: multi-data center consistency. | 2013 |
144 | Isolating web programs in modern browser architectures. | 2009 |
144 | Cycles cells and platters: an empirical analysisof hardware failures on a million consumer PCs. | 2011 |
142 | FlashTier: a lightweight consistent and durable storage cache. | 2012 |
139 | K42: building a complete operating system. | 2006 |
139 | A comprehensive scheduler for asymmetric multicore systems. | 2010 |
136 | The next 700 BFT protocols. | 2010 |
135 | Differential RAID: rethinking RAID for SSD reliability. | 2010 |
135 | Statistical profiling-based techniques for effective power provisioning in data centers. | 2009 |
130 | Kineograph: taking the pulse of a fast-changing and connected world. | 2012 |
128 | CPI2: CPU performance isolation for shared compute clusters. | 2013 |
127 | Energy management in mobile devices with the cinder operating system. | 2011 |
126 | Pointless tainting?: evaluating the practicality of pointer tainting. | 2009 |
126 | TimeStream: reliable stream computation in the cloud. | 2013 |
126 | Sierra: practical power-proportionality for data center storage. | 2011 |
124 | Evaluation of AMD’s advanced synchronization facility within a complete transactional memory stack. | 2010 |
124 | A quantitative analysis of aspects in the eCos kernel. | 2006 |
122 | Boom analytics: exploring data-centric declarative programming for the cloud. | 2010 |
120 | The Xen-Blanket: virtualize once run everywhere. | 2012 |
112 | Feature consistency in compile-time-configurable system software: facing the linux 10000 feature problem. | 2011 |
111 | Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space. | 2009 |
106 | A virtual machine for sensor networks. | 2007 |
105 | Dingo: taming device drivers. | 2009 |
103 | Concierge: a service platform for resource-constrained devices. | 2007 |
102 | PowerLyra: differentiated graph computation and partitioning on skewed graphs. | 2015 |
101 | Multi-aspect profiling of kernel rootkit behavior. | 2009 |
100 | Dr. multicast: Rx for data center communication scalability. | 2010 |
99 | Efficient guaranteed disk request scheduling with fahrrad. | 2008 |
98 | DepSpace: a byzantine fault-tolerant coordination service. | 2008 |
98 | RIMAC: a novel redundancy-based hierarchical cache architecture for energy efficient high performance storage systems. | 2006 |
97 | Choosy: max-min fair sharing for datacenter jobs with constraints. | 2013 |
93 | Enabling scalability and performance in a large scale CMP environment. | 2007 |
92 | Fireflies: scalable support for intrusion-tolerant network overlays. | 2006 |
92 | Improving network connection locality on multicore systems. | 2012 |
92 | Dynamic and adaptive updates of non-quiescent subsystems in commodity operating system kernels. | 2007 |
90 | Comparing the performance of web server architectures. | 2007 |
90 | Tashkent: uniting durability with transaction ordering for high-performance scalable database replication. | 2006 |
88 | Tashkent+: memory-aware load balancing and update filtering in replicated databases. | 2007 |
85 | Reconciling high server utilization and sub-millisecond quality-of-service. | 2014 |
84 | Automatic configuration of internet services. | 2007 |
83 | Is co-scheduling too expensive for SMP VMs? | 2011 |
83 | Sealing OS processes to improve dependability and safety. | 2007 |
82 | The SMART way to migrate replicated stateful services. | 2006 |
81 | Locating cache performance bottlenecks using data profiling. | 2010 |
79 | Database engines on multicores why parallelize when you can distribute? | 2011 |
77 | Sweeper: a lightweight end-to-end system for defending against fast worms. | 2007 |
77 | Understanding collateral evolution in Linux device drivers. | 2006 |
76 | TrustLite: a security architecture for tiny embedded devices. | 2014 |
75 | CheapBFT: resource-efficient byzantine fault tolerance. | 2012 |
75 | Using transparent compression to improve SSD-based I/O caches. | 2010 |
75 | Controlled systematic and efficient code replacement for running java programs. | 2008 |
73 | ChainReaction: a causal+ consistent datastore based on chain replication. | 2013 |
72 | Using queries for distributed monitoring and forensics. | 2006 |
72 | Towards cinematic internet video-on-demand. | 2008 |
71 | ZZ and the art of practical BFT execution. | 2011 |
71 | Presto: distributed machine learning and graph processing with sparse matrices. | 2013 |
69 | Whodunit: transactional profiling for multi-tier applications. | 2007 |
69 | Jettison: efficient idle desktop consolidation with partial VM migration. | 2012 |
67 | Manageable fine-grained information flow. | 2008 |
65 | Reverse engineering of binary device drivers with RevNIC. | 2010 |
65 | Otherworld: giving applications a chance to survive OS kernel crashes. | 2010 |
65 | Competitive prefetching for concurrent sequential I/O. | 2007 |
63 | Experiences in building and operating ePOST a reliable peer-to-peer application. | 2006 |
62 | Resolving the conflict between generality and plausibility in verified computation. | 2013 |
61 | Aerie: flexible file-system interfaces to storage-class memory. | 2014 |
60 | Database replication policies for dynamic content applications. | 2006 |
59 | Sprint: a middleware for high-performance transaction processing. | 2007 |
59 | Delta-FTL: improving SSD lifetime via exploiting content locality. | 2012 |
59 | High-level programming of embedded hard real-time devices. | 2010 |
59 | Chronos: a graph engine for temporal graph analysis. | 2014 |
58 | Symbolic crosschecking of floating-point and SIMD code. | 2011 |
58 | TCP offload through connection handoff. | 2006 |
57 | HadoopToSQL: a mapReduce query optimizer. | 2010 |
57 | Application-level isolation and recovery with solitude. | 2008 |
56 | Macroprogramming heterogeneous sensor networks using cosmos. | 2007 |
56 | Application level ballooning for efficient server consolidation. | 2013 |
55 | VPFS: building a virtual private file system with a small trusted computing base. | 2008 |
55 | Kaleidoscope: cloud micro-elasticity via VM state coloring. | 2011 |
53 | Experiences with open overlays: a middleware approach to network heterogeneity. | 2008 |
52 | On the road to recovery: restoring data after disasters. | 2006 |
52 | GreenFS: making enterprise computers greener by protecting them better. | 2008 |
52 | Kivati: fast detection and prevention of atomicity violations. | 2010 |
52 | Privacy-preserving browser-side scripting with BFlow. | 2009 |
52 | Finding complex concurrency bugs in large multi-threaded applications. | 2011 |
51 | Task activity vectors: a new metric for temperature-aware scheduling. | 2008 |
51 | Itrustpage: a user-assisted anti-phishing tool. | 2008 |
50 | BorderPatrol: isolating events for black-box tracing. | 2008 |
50 | “Melange: creating a “”functional”” internet. “ | 2007 |
50 | RadixVM: scalable address spaces for multithreaded applications. | 2013 |
49 | Caching in video CDNs: building strong lines of defense. | 2014 |
49 | Canal: scaling social network-based Sybil tolerance schemes. | 2012 |
48 | Using restricted transactional memory to build a scalable in-memory database. | 2014 |
48 | Isolating commodity hosted hypervisors with HyperLock. | 2012 |
48 | Keypad: an auditing file system for theft-prone devices. | 2011 |
48 | Maygh: building a CDN from client web browsers. | 2013 |
47 | Antiquity: exploiting a secure log for wide-area distributed storage. | 2007 |
47 | Ferret: a toolkit for content-based similarity search of feature-rich data. | 2006 |
47 | hFS: a hybrid file system prototype for improving small file and metadata performance. | 2007 |
47 | A compiler-level intermediate representation based binary analysis and rewriting system. | 2013 |
47 | Solving the starting problem: device drivers as self-describing artifacts. | 2006 |
47 | A case for scaling applications to many-core with OS clustering. | 2011 |
46 | MadLINQ: large-scale distributed matrix computation for the cloud. | 2012 |
46 | Efficient middleware for byzantine fault tolerant database replication. | 2011 |
46 | MeT: workload aware elasticity for NoSQL. | 2013 |
45 | IFDB: decentralized information flow control for databases. | 2013 |
44 | LazyBase: trading freshness for performance in a scalable database. | 2012 |
44 | Algorithmic improvements for fast concurrent Cuckoo hashing. | 2014 |
43 | Practical TDMA for datacenter ethernet. | 2012 |
43 | Samurai: protecting critical data in unsafe languages. | 2008 |
43 | Discrete control for safe execution of IT automation workflows. | 2007 |
42 | WCMP: weighted cost multipathing for improved fairness in data centers. | 2014 |
42 | SpotCheck: designing a derivative IaaS cloud on the spot market. | 2015 |
41 | An efficient design and implementation of LSM-tree based key-value store on open-channel SSD. | 2014 |
39 | Prefetching mobile ads: can advertising systems afford it? | 2013 |
39 | Efficiently effectively detecting mobile app bugs with AppDoctor. | 2014 |
39 | Replication degree customization for high availability. | 2008 |
39 | Increasing performance in byzantine fault-tolerant systems with on-demand replica consistency. | 2011 |
38 | Hypnos: understanding and treating sleep conflicts in smartphones. | 2013 |
38 | xCalls: safe I/O in memory transactions. | 2009 |
38 | Putting consistency back into eventual consistency. | 2015 |
37 | Failure-atomic msync(): a simple and efficient mechanism for preserving the integrity of durable data. | 2013 |
37 | Transactional memory support for scalable and transparent parallelization of multiplayer games. | 2010 |
37 | A runtime system for software lock elision. | 2009 |
36 | Musketeer: all for one, one for all in data processing systems | 2015 |
36 | JIT instrumentation: a novel approach to dynamically instrument operating systems. | 2007 |
35 | Callisto: co-scheduling parallel runtime systems. | 2014 |
35 | Self-tuning schedulers for legacy real-time applications. | 2010 |
34 | Barricade: defending systems against operator mistakes. | 2010 |
34 | A critique of snapshot isolation. | 2012 |
33 | Latency and bandwidth-minimizing failure detectors. | 2007 |
32 | Evaluating network processing efficiency with processor partitioning and asynchronous I/O. | 2006 |
32 | GeePS: scalable deep learning on distributed GPUs with a GPU-specialized parameter server. | 2016 |
32 | Policy-based access control for weakly consistent replication. | 2010 |
31 | Composing OS extensions safely and efficiently with Bascule. | 2013 |
31 | Context-specific middleware specialization techniques for optimizing software product-line architectures. | 2006 |
31 | SRM-buffer: an OS buffer management technique to prevent last level cache from thrashing in multicores. | 2011 |
31 | TM2C: a software transactional memory for many-cores. | 2012 |
30 | Secure file system versioning at the block level. | 2007 |
29 | Striking a new balance between program instrumentation and debugging time. | 2011 |
29 | Memory resource allocation for file system prefetching: from a supply chain management perspective. | 2009 |
28 | Process-level power estimation in VM-based systems. | 2015 |
28 | URICA: Usage-awaRe Interactive Content Adaptation for mobile devices. | 2006 |
28 | Guaranteeing deadlines for inter-datacenter transfers. | 2015 |
28 | Cooperation and security isolation of library OSes for multi-process applications. | 2014 |
27 | First-aid: surviving and preventing memory management bugs during production runs. | 2009 |
27 | Adaptive parallelism for web search. | 2013 |
27 | The Linux scheduler: a decade of wasted cores. | 2016 |
26 | Popcorn: bridging the programmability gap in heterogeneous-ISA platforms. | 2015 |
26 | Predictive log-synchronization. | 2006 |
26 | Authorizing applications in singularity. | 2007 |
26 | Fine grained kernel logging with KLogger: experience and insights. | 2007 |
26 | StackTrack: an automated transactional approach to concurrent memory reclamation. | 2014 |
26 | STM in the small: trading generality for performance in software transactional memory. | 2012 |
26 | Predicting replicated database scalability from standalone database profiling. | 2009 |
25 | Data tiering in heterogeneous memory systems. | 2016 |
25 | Rex: replication at the speed of multi-core. | 2014 |
25 | Eudaemon: involuntary and on-demand emulation against zero-day exploits. | 2008 |
25 | NBA (network balancing act): a high-performance packet processing framework for heterogeneous processors. | 2015 |
25 | Conversion: multi-version concurrency control for main memory segments. | 2013 |
25 | Transparent checkpoints of closed distributed systems in Emulab. | 2009 |
24 | Tralfamadore: unifying source code and execution experience. | 2009 |
24 | BWS: balanced work stealing for time-sharing multicores. | 2012 |
23 | Fair and timely scheduling via cooperative polling. | 2009 |
23 | Hang analysis: fighting responsiveness bugs. | 2008 |
23 | Improving interrupt response time in a verifiable protected microkernel. | 2012 |
22 | Switchblade: enforcing dynamic personalized system call models. | 2008 |
22 | Fast black-box testing of system recovery code. | 2012 |
21 | Efficient queue management for cluster scheduling. | 2016 |
21 | Frugal storage for cloud file systems. | 2012 |
20 | Operating system support for application-specific speculation. | 2011 |
20 | A high performance file system for non-volatile main memory. | 2016 |
19 | Delusional boot: securing hypervisors without massive re-engineering. | 2012 |
19 | Removing the memory limitations of sensor networks with flash-based virtual memory. | 2007 |
18 | Scheduling large jobs by abstraction refinement. | 2011 |
18 | Effective and efficient compromise recovery for weakly consistent replication. | 2009 |
18 | CYRUS: towards client-defined cloud storage. | 2015 |
18 | An efficient page-level FTL to optimize address translation in flash memory. | 2015 |
17 | MALT: distributed data-parallelism for existing ML applications. | 2015 |
17 | An aggressive worn-out flash block management scheme to alleviate SSD performance degradation. | 2014 |
17 | Fast and general distributed transactions using RDMA and HTM. | 2016 |
17 | Flint: batch-interactive data-intensive processing on transient servers. | 2016 |
17 | 30 seconds is not enough!: a study of operating system timer usage. | 2008 |
16 | hClock: hierarchical QoS for packet scheduling in a hypervisor. | 2013 |
16 | pVM: persistent virtual memory for efficient capacity scaling and object storage. | 2016 |
16 | Splitter: a proxy-based approach for post-migration testing of web applications. | 2010 |
16 | GD-Wheel: a cost-aware replacement policy for key-value stores. | 2015 |
16 | ?PnP: plug and play peripherals for the internet of things. | 2015 |
16 | From application requests to virtual IOPs: provisioned key-value storage with Libra. | 2014 |
16 | DynMR: dynamic MapReduce with ReduceTask interleaving and MapTask backfilling. | 2014 |
15 | Enforcing appropriate process execution for exploiting idle resources from outside operating systems. | 2008 |
15 | TetriSched: global rescheduling with adaptive plan-ahead in dynamic heterogeneous clusters. | 2016 |
14 | Synapse: a microservices architecture for heterogeneous-database web applications. | 2015 |
14 | In-Net: in-network processing for the masses. | 2015 |
14 | Flux: multi-surface computing in Android. | 2015 |
14 | Simba: tunable end-to-end data consistency for mobile apps. | 2015 |
14 | An in-memory object caching framework with adaptive load balancing. | 2015 |
14 | RapiLog: reducing system complexity through verification. | 2013 |
13 | Snapshots in a flash with ioSnap. | 2014 |
13 | Archiving cold data in warehouses with clustered network coding. | 2014 |
13 | DIBS: just-in-time congestion mitigation for data centers. | 2014 |
13 | Scalable testing of file system checkers. | 2012 |
13 | Optimus: a dynamic rewriting framework for data-parallel execution plans. | 2013 |
13 | Scaling concurrent log-structured data stores. | 2015 |
12 | HAFT: hardware-assisted fault tolerance. | 2016 |
12 | Process firewalls: protecting processes during resource access. | 2013 |
11 | Augustus: scalable and robust storage for cloud applications. | 2013 |
11 | Application-assisted live migration of virtual machines with Java applications. | 2015 |
11 | Partial-parallel-repair (PPR): a distributed technique for repairing erasure coded storage. | 2016 |
10 | STRADS: a distributed framework for scheduled model parallel machine learning. | 2016 |
10 | Type-aware transactions for faster concurrent code. | 2016 |
10 | Refuse to crash with Re-FUSE. | 2011 |
10 | Protectit: trusted distributed services operating on sensitive data. | 2008 |
10 | Improving server applications with system transactions. | 2012 |
10 | ConfValley: a systematic configuration validation framework for cloud services. | 2015 |
9 | TinMan: eliminating confidential mobile data exposure with security oriented offloading. | 2015 |
9 | Maxoid: transparently confining mobile applications with custom views of state. | 2015 |
9 | Optimizing distributed actor systems for dynamic interactive services. | 2016 |
9 | Improving the responsiveness of internet services with automatic cache placement. | 2009 |
9 | Taming uncertainty in distributed systems with help from the network. | 2015 |
9 | Hare: a file system for non-cache-coherent multicores. | 2015 |
9 | Flash storage disaggregation. | 2016 |
8 | Kronos: the design and implementation of an event ordering service. | 2014 |
8 | Extensible distributed coordination. | 2015 |
8 | SCAN-Lite: enterprise-wide analysis on the cheap. | 2009 |
8 | Picocenter: supporting long-lived mostly-idle applications in cloud environments. | 2016 |
8 | Whose cache line is it anyway?: operating system support for live detection and repair of false sharing. | 2013 |
8 | Verifiable differential privacy. | 2015 |
8 | Relational access to Unix kernel data structures. | 2014 |
7 | Modeling viral economies for digital media. | 2008 |
7 | A study of modern Linux API usage and compatibility: what to support when you’re supporting. | 2016 |
7 | On the capacity of thermal covert channels in multicores. | 2016 |
7 | Residue objects: a challenge to web browser security. | 2010 |
7 | PSLO: enforcing theXthpercentile latency and throughput SLOs for consolidated VM storage. | 2016 |
7 | Juggler: a practical reordering resilient network stack for datacenters. | 2016 |
6 | T-Rex: a dynamic race detection tool for C/C++ transactional memory applications. | 2014 |
5 | Guardat: enforcing data policies at the storage layer. | 2015 |
5 | SGXBOUNDS: Memory Safety for Shielded Execution. | 2017 |
5 | Hardware read-write lock elision. | 2016 |
5 | TAQ: enhancing fairness and performance predictability in small packet regimes. | 2014 |
5 | POSIX abstractions in modern operating systems: the old, the new, and the missing | 2016 |
5 | Practical techniques to obviate setuid-to-root binaries. | 2014 |
4 | Hold ‘em or fold ‘em?: aggregation queries under performance variations. | 2016 |
4 | Deriving and comparing deduplication techniques using a model-based classification. | 2015 |
4 | Visigoth fault tolerance. | 2015 |
4 | High-performance determinism with total store order consistency. | 2015 |
4 | Mosaic: Processing a Trillion-Edge Graph on a Single Machine. | 2017 |
3 | Hybrids on Steroids: SGX-Based High Performance BFT. | 2017 |
3 | Pado: A Data Processing Engine for Harnessing Transient Resources in Datacenters. | 2017 |
3 | Yoda: a highly available layer-7 load balancer. | 2016 |
3 | zExpander: a key-value cache with both high performance and fewer misses. | 2016 |
3 | Oasis: energy proportionality with hybrid server consolidation. | 2016 |
3 | Proteus: agile ML elasticity through tiered reliability in dynamic resource markets. | 2017 |
3 | Increasing large-scale data center capacity by statistical power control. | 2016 |
3 | Sinter: low-bandwidth remote access for the visually-impaired. | 2016 |
3 | TESLA: temporally enhanced system logic assertions. | 2014 |
3 | Crayon: saving power through shape and color approximation on next-generation displays. | 2016 |
2 | vScale: automatic and efficient processor scaling for SMP virtual machines. | 2016 |
2 | Node.fz: Fuzzing the Server-Side Event-Driven Architecture. | 2017 |
2 | DangSan: Scalable Use-after-free Detection. | 2017 |
2 | Eleos: ExitLess OS Services for SGX Enclaves. | 2017 |
2 | Practical condition synchronization for transactional memory. | 2016 |
2 | Saturn: a Distributed Metadata Service for Causal Consistency. | 2017 |
2 | Application-specific quantum for multi-core platform scheduler. | 2016 |
2 | Malthusian Locks. | 2017 |
1 | TFC: token flow control in data center networks. | 2016 |
1 | Parallel sections: scaling system-level data-structures. | 2016 |
1 | Taming Parallelism in a Multi-Variant Execution Environment. | 2017 |
1 | kR^X: Comprehensive Kernel Protection against Just-In-Time Code Reuse. | 2017 |
1 | Statistical Analysis of Latency Through Semantic Profiling. | 2017 |
1 | MiniCrypt: Reconciling Encryption and Compression for Big Data Stores. | 2017 |
1 | An Empirical Study on the Correctness of Formally Verified Distributed Systems. | 2017 |
1 | Exploiting Spot and Burstable Instances for Improving the Cost-efficacy of In-Memory Caches on the Public Cloud. | 2017 |
1 | The lock holder and the lock waiter pre-emption problems: nip them in the bud using informed spinlocks (I-Spinlock). | 2017 |
1 | No Need to Hide: Protecting Safe Regions on Commodity Hardware. | 2017 |
1 | FloDB: Unlocking Memory in Persistent Key-Value Stores. | 2017 |
1 | Shared address translation revisited. | 2016 |
1 | Atomic In-place Updates for Non-volatile Main Memories with Kamino-Tx. | 2017 |
1 | Online Reconstruction of Structural Information from Datacenter Logs. | 2017 |
0 | COCONUT: Seamless Scale-out of Network Elements. | 2017 |
0 | One Primitive to Diagnose Them All: Architectural Support for Internet Diagnostics. | 2017 |
0 | DStress: Efficient Differentially Private Computations on Distributed Data. | 2017 |
0 | ROS: A Rack-based Optical Storage System with Inline Accessibility for Long-Term Data Preservation. | 2017 |
0 | Rein: Taming Tail Latency in Key-Value Stores via Multiget Scheduling. | 2017 |
0 | GfxDoctor: A Holistic Graphics Energy Profiler for Mobile Devices. | 2017 |
0 | A Characterization of State Spill in Modern Operating Systems. | 2017 |
0 | BB: booting booster for consumer electronics with modern OS. | 2016 |
0 | Exploiting variability for energy optimization of parallel programs. | 2016 |
0 | RFP: When RPC is Faster than Server-Bypass with RDMA. | 2017 |
0 | Design and Evaluation of an RDMA-aware Data Shuffling Operator for Parallel Database Systems. | 2017 |
0 | The Unwritten Contract of Solid State Drives. | 2017 |
0 | Abstracting Multi-Core Topologies with MCTOP. | 2017 |
0 | NVthreads: Practical Persistence for Multi-threaded Applications. | 2017 |
0 | SyncPerf: Categorizing, Detecting, and Diagnosing Synchronization Performance Bugs. | 2017 |
0 | High-Throughput Subset Matching on Commodity GPU-Based Systems. | 2017 |
0 | Direct Inter-Process Communication (dIPC): Repurposing the CODOMs Architecture to Accelerate IPC. | 2017 |
0 | Malacology: A Programmable Storage System. | 2017 |
0 | Pandia: comprehensive contention-sensitive thread placement. | 2017 |
0 | An interface to implement NUMA policies in the Xen hypervisor. | 2017 |
0 | Forkscan: Conservative Memory Reclamation for Modern Operating Systems. | 2017 |
0 | NChecker: saving mobile app developers from network disruptions. | 2016 |
0 | CloudTalk: Enabling Distributed Application Optimisations in Public Clouds. | 2017 |
2017¶
Cited by | Paper title |
---|---|
5 | SGXBOUNDS: Memory Safety for Shielded Execution. |
4 | Mosaic: Processing a Trillion-Edge Graph on a Single Machine. |
3 | Hybrids on Steroids: SGX-Based High Performance BFT. |
3 | Pado: A Data Processing Engine for Harnessing Transient Resources in Datacenters. |
3 | Proteus: agile ML elasticity through tiered reliability in dynamic resource markets. |
2 | Node.fz: Fuzzing the Server-Side Event-Driven Architecture. |
2 | DangSan: Scalable Use-after-free Detection. |
2 | Eleos: ExitLess OS Services for SGX Enclaves. |
2 | Saturn: a Distributed Metadata Service for Causal Consistency. |
2 | Malthusian Locks. |
1 | Taming Parallelism in a Multi-Variant Execution Environment. |
1 | kR^X: Comprehensive Kernel Protection against Just-In-Time Code Reuse. |
1 | Statistical Analysis of Latency Through Semantic Profiling. |
1 | MiniCrypt: Reconciling Encryption and Compression for Big Data Stores. |
1 | An Empirical Study on the Correctness of Formally Verified Distributed Systems. |
1 | Exploiting Spot and Burstable Instances for Improving the Cost-efficacy of In-Memory Caches on the Public Cloud. |
1 | The lock holder and the lock waiter pre-emption problems: nip them in the bud using informed spinlocks (I-Spinlock). |
1 | No Need to Hide: Protecting Safe Regions on Commodity Hardware. |
1 | FloDB: Unlocking Memory in Persistent Key-Value Stores. |
1 | Atomic In-place Updates for Non-volatile Main Memories with Kamino-Tx. |
1 | Online Reconstruction of Structural Information from Datacenter Logs. |
0 | COCONUT: Seamless Scale-out of Network Elements. |
0 | One Primitive to Diagnose Them All: Architectural Support for Internet Diagnostics. |
0 | DStress: Efficient Differentially Private Computations on Distributed Data. |
0 | ROS: A Rack-based Optical Storage System with Inline Accessibility for Long-Term Data Preservation. |
0 | Rein: Taming Tail Latency in Key-Value Stores via Multiget Scheduling. |
0 | GfxDoctor: A Holistic Graphics Energy Profiler for Mobile Devices. |
0 | A Characterization of State Spill in Modern Operating Systems. |
0 | RFP: When RPC is Faster than Server-Bypass with RDMA. |
0 | Design and Evaluation of an RDMA-aware Data Shuffling Operator for Parallel Database Systems. |
0 | The Unwritten Contract of Solid State Drives. |
0 | Abstracting Multi-Core Topologies with MCTOP. |
0 | NVthreads: Practical Persistence for Multi-threaded Applications. |
0 | SyncPerf: Categorizing, Detecting, and Diagnosing Synchronization Performance Bugs. |
0 | High-Throughput Subset Matching on Commodity GPU-Based Systems. |
0 | Direct Inter-Process Communication (dIPC): Repurposing the CODOMs Architecture to Accelerate IPC. |
0 | Malacology: A Programmable Storage System. |
0 | Pandia: comprehensive contention-sensitive thread placement. |
0 | An interface to implement NUMA policies in the Xen hypervisor. |
0 | Forkscan: Conservative Memory Reclamation for Modern Operating Systems. |
0 | CloudTalk: Enabling Distributed Application Optimisations in Public Clouds. |
2016¶
Cited by | Paper title |
---|---|
32 | GeePS: scalable deep learning on distributed GPUs with a GPU-specialized parameter server. |
27 | The Linux scheduler: a decade of wasted cores. |
25 | Data tiering in heterogeneous memory systems. |
21 | Efficient queue management for cluster scheduling. |
20 | A high performance file system for non-volatile main memory. |
17 | Fast and general distributed transactions using RDMA and HTM. |
17 | Flint: batch-interactive data-intensive processing on transient servers. |
16 | pVM: persistent virtual memory for efficient capacity scaling and object storage. |
15 | TetriSched: global rescheduling with adaptive plan-ahead in dynamic heterogeneous clusters. |
12 | HAFT: hardware-assisted fault tolerance. |
11 | Partial-parallel-repair (PPR): a distributed technique for repairing erasure coded storage. |
10 | STRADS: a distributed framework for scheduled model parallel machine learning. |
10 | Type-aware transactions for faster concurrent code. |
9 | Optimizing distributed actor systems for dynamic interactive services. |
9 | Flash storage disaggregation. |
8 | Picocenter: supporting long-lived mostly-idle applications in cloud environments. |
7 | A study of modern Linux API usage and compatibility: what to support when you’re supporting. |
7 | On the capacity of thermal covert channels in multicores. |
7 | PSLO: enforcing theXthpercentile latency and throughput SLOs for consolidated VM storage. |
7 | Juggler: a practical reordering resilient network stack for datacenters. |
5 | Hardware read-write lock elision. |
5 | POSIX abstractions in modern operating systems: the old, the new, and the missing |
4 | Hold ‘em or fold ‘em?: aggregation queries under performance variations. |
3 | Yoda: a highly available layer-7 load balancer. |
3 | zExpander: a key-value cache with both high performance and fewer misses. |
3 | Oasis: energy proportionality with hybrid server consolidation. |
3 | Increasing large-scale data center capacity by statistical power control. |
3 | Sinter: low-bandwidth remote access for the visually-impaired. |
3 | Crayon: saving power through shape and color approximation on next-generation displays. |
2 | vScale: automatic and efficient processor scaling for SMP virtual machines. |
2 | Practical condition synchronization for transactional memory. |
2 | Application-specific quantum for multi-core platform scheduler. |
1 | TFC: token flow control in data center networks. |
1 | Parallel sections: scaling system-level data-structures. |
1 | Shared address translation revisited. |
0 | BB: booting booster for consumer electronics with modern OS. |
0 | Exploiting variability for energy optimization of parallel programs. |
0 | NChecker: saving mobile app developers from network disruptions. |
2015¶
Cited by | Paper title |
---|---|
274 | Large-scale cluster management at Google with Borg. |
102 | PowerLyra: differentiated graph computation and partitioning on skewed graphs. |
42 | SpotCheck: designing a derivative IaaS cloud on the spot market. |
38 | Putting consistency back into eventual consistency. |
36 | Musketeer: all for one, one for all in data processing systems |
28 | Process-level power estimation in VM-based systems. |
28 | Guaranteeing deadlines for inter-datacenter transfers. |
26 | Popcorn: bridging the programmability gap in heterogeneous-ISA platforms. |
25 | NBA (network balancing act): a high-performance packet processing framework for heterogeneous processors. |
18 | CYRUS: towards client-defined cloud storage. |
18 | An efficient page-level FTL to optimize address translation in flash memory. |
17 | MALT: distributed data-parallelism for existing ML applications. |
16 | GD-Wheel: a cost-aware replacement policy for key-value stores. |
16 | ?PnP: plug and play peripherals for the internet of things. |
14 | Synapse: a microservices architecture for heterogeneous-database web applications. |
14 | In-Net: in-network processing for the masses. |
14 | Flux: multi-surface computing in Android. |
14 | Simba: tunable end-to-end data consistency for mobile apps. |
14 | An in-memory object caching framework with adaptive load balancing. |
13 | Scaling concurrent log-structured data stores. |
11 | Application-assisted live migration of virtual machines with Java applications. |
10 | ConfValley: a systematic configuration validation framework for cloud services. |
9 | TinMan: eliminating confidential mobile data exposure with security oriented offloading. |
9 | Maxoid: transparently confining mobile applications with custom views of state. |
9 | Taming uncertainty in distributed systems with help from the network. |
9 | Hare: a file system for non-cache-coherent multicores. |
8 | Extensible distributed coordination. |
8 | Verifiable differential privacy. |
5 | Guardat: enforcing data policies at the storage layer. |
4 | Deriving and comparing deduplication techniques using a model-based classification. |
4 | Visigoth fault tolerance. |
4 | High-performance determinism with total store order consistency. |
2014¶
Cited by | Paper title |
---|---|
208 | System software for persistent memory. |
85 | Reconciling high server utilization and sub-millisecond quality-of-service. |
76 | TrustLite: a security architecture for tiny embedded devices. |
61 | Aerie: flexible file-system interfaces to storage-class memory. |
59 | Chronos: a graph engine for temporal graph analysis. |
49 | Caching in video CDNs: building strong lines of defense. |
48 | Using restricted transactional memory to build a scalable in-memory database. |
44 | Algorithmic improvements for fast concurrent Cuckoo hashing. |
42 | WCMP: weighted cost multipathing for improved fairness in data centers. |
41 | An efficient design and implementation of LSM-tree based key-value store on open-channel SSD. |
39 | Efficiently effectively detecting mobile app bugs with AppDoctor. |
35 | Callisto: co-scheduling parallel runtime systems. |
28 | Cooperation and security isolation of library OSes for multi-process applications. |
26 | StackTrack: an automated transactional approach to concurrent memory reclamation. |
25 | Rex: replication at the speed of multi-core. |
17 | An aggressive worn-out flash block management scheme to alleviate SSD performance degradation. |
16 | From application requests to virtual IOPs: provisioned key-value storage with Libra. |
16 | DynMR: dynamic MapReduce with ReduceTask interleaving and MapTask backfilling. |
13 | Snapshots in a flash with ioSnap. |
13 | Archiving cold data in warehouses with clustered network coding. |
13 | DIBS: just-in-time congestion mitigation for data centers. |
8 | Kronos: the design and implementation of an event ordering service. |
8 | Relational access to Unix kernel data structures. |
6 | T-Rex: a dynamic race detection tool for C/C++ transactional memory applications. |
5 | TAQ: enhancing fairness and performance predictability in small packet regimes. |
5 | Practical techniques to obviate setuid-to-root binaries. |
3 | TESLA: temporally enhanced system logic assertions. |
2013¶
Cited by | Paper title |
---|---|
348 | BlinkDB: queries with bounded errors and bounded response times on very large data. |
331 | Omega: flexible scalable schedulers for large compute clusters. |
176 | Mizan: a system for dynamic load balancing in large-scale graph processing. |
150 | MDCC: multi-data center consistency. |
128 | CPI2: CPU performance isolation for shared compute clusters. |
126 | TimeStream: reliable stream computation in the cloud. |
97 | Choosy: max-min fair sharing for datacenter jobs with constraints. |
73 | ChainReaction: a causal+ consistent datastore based on chain replication. |
71 | Presto: distributed machine learning and graph processing with sparse matrices. |
62 | Resolving the conflict between generality and plausibility in verified computation. |
56 | Application level ballooning for efficient server consolidation. |
50 | RadixVM: scalable address spaces for multithreaded applications. |
48 | Maygh: building a CDN from client web browsers. |
47 | A compiler-level intermediate representation based binary analysis and rewriting system. |
46 | MeT: workload aware elasticity for NoSQL. |
45 | IFDB: decentralized information flow control for databases. |
39 | Prefetching mobile ads: can advertising systems afford it? |
38 | Hypnos: understanding and treating sleep conflicts in smartphones. |
37 | Failure-atomic msync(): a simple and efficient mechanism for preserving the integrity of durable data. |
31 | Composing OS extensions safely and efficiently with Bascule. |
27 | Adaptive parallelism for web search. |
25 | Conversion: multi-version concurrency control for main memory segments. |
16 | hClock: hierarchical QoS for packet scheduling in a hypervisor. |
14 | RapiLog: reducing system complexity through verification. |
13 | Optimus: a dynamic rewriting framework for data-parallel execution plans. |
12 | Process firewalls: protecting processes during resource access. |
11 | Augustus: scalable and robust storage for cloud applications. |
8 | Whose cache line is it anyway?: operating system support for live detection and repair of false sharing. |
2012¶
Cited by | Paper title |
---|---|
546 | Where is the energy spent inside my app?: fine grained energy accounting on smartphones with Eprof. |
232 | GreenHadoop: leveraging green energy in data-processing frameworks. |
156 | Energy efficiency for large-scale MapReduce workloads with significant interactive analysis. |
153 | Cache craftiness for fast multicore key-value storage. |
153 | Jockey: guaranteed job latency in data parallel clusters. |
142 | FlashTier: a lightweight consistent and durable storage cache. |
130 | Kineograph: taking the pulse of a fast-changing and connected world. |
120 | The Xen-Blanket: virtualize once run everywhere. |
92 | Improving network connection locality on multicore systems. |
75 | CheapBFT: resource-efficient byzantine fault tolerance. |
69 | Jettison: efficient idle desktop consolidation with partial VM migration. |
59 | Delta-FTL: improving SSD lifetime via exploiting content locality. |
49 | Canal: scaling social network-based Sybil tolerance schemes. |
48 | Isolating commodity hosted hypervisors with HyperLock. |
46 | MadLINQ: large-scale distributed matrix computation for the cloud. |
44 | LazyBase: trading freshness for performance in a scalable database. |
43 | Practical TDMA for datacenter ethernet. |
34 | A critique of snapshot isolation. |
31 | TM2C: a software transactional memory for many-cores. |
26 | STM in the small: trading generality for performance in software transactional memory. |
24 | BWS: balanced work stealing for time-sharing multicores. |
23 | Improving interrupt response time in a verifiable protected microkernel. |
22 | Fast black-box testing of system recovery code. |
21 | Frugal storage for cloud file systems. |
19 | Delusional boot: securing hypervisors without massive re-engineering. |
13 | Scalable testing of file system checkers. |
10 | Improving server applications with system transactions. |
2011¶
Cited by | Paper title |
---|---|
1314 | CloneCloud: elastic execution between mobile device and cloud. |
541 | DepSky: dependable and secure storage in a cloud-of-clouds. |
302 | Fine-grained power modeling for smartphones using system call tracing. |
225 | Scarlett: coping with skewed content popularity in mapreduce clusters. |
171 | Parallel symbolic execution for automated real-world software testing. |
144 | Cycles cells and platters: an empirical analysisof hardware failures on a million consumer PCs. |
127 | Energy management in mobile devices with the cinder operating system. |
126 | Sierra: practical power-proportionality for data center storage. |
112 | Feature consistency in compile-time-configurable system software: facing the linux 10000 feature problem. |
83 | Is co-scheduling too expensive for SMP VMs? |
79 | Database engines on multicores why parallelize when you can distribute? |
71 | ZZ and the art of practical BFT execution. |
58 | Symbolic crosschecking of floating-point and SIMD code. |
55 | Kaleidoscope: cloud micro-elasticity via VM state coloring. |
52 | Finding complex concurrency bugs in large multi-threaded applications. |
48 | Keypad: an auditing file system for theft-prone devices. |
47 | A case for scaling applications to many-core with OS clustering. |
46 | Efficient middleware for byzantine fault tolerant database replication. |
39 | Increasing performance in byzantine fault-tolerant systems with on-demand replica consistency. |
31 | SRM-buffer: an OS buffer management technique to prevent last level cache from thrashing in multicores. |
29 | Striking a new balance between program instrumentation and debugging time. |
20 | Operating system support for application-specific speculation. |
18 | Scheduling large jobs by abstraction refinement. |
10 | Refuse to crash with Re-FUSE. |
2010¶
Cited by | Paper title |
---|---|
1148 | Delay scheduling: a simple technique for achieving locality and fairness in cluster scheduling. |
461 | Q-clouds: managing performance interference effects for QoS-aware clouds. |
308 | NOVA: a microhypervisor-based secure virtualization architecture. |
226 | Bias scheduling in heterogeneous multi-core architectures. |
195 | Execution synthesis: a technique for automated software debugging. |
169 | Resource-conscious scheduling for energy efficiency on multicore processors. |
163 | “Defeating return-oriented rootkits with “”Return-Less”” kernels. “ |
156 | Fingerprinting the datacenter: automated classification of performance crises. |
139 | A comprehensive scheduler for asymmetric multicore systems. |
136 | The next 700 BFT protocols. |
135 | Differential RAID: rethinking RAID for SSD reliability. |
124 | Evaluation of AMD’s advanced synchronization facility within a complete transactional memory stack. |
122 | Boom analytics: exploring data-centric declarative programming for the cloud. |
100 | Dr. multicast: Rx for data center communication scalability. |
81 | Locating cache performance bottlenecks using data profiling. |
75 | Using transparent compression to improve SSD-based I/O caches. |
65 | Reverse engineering of binary device drivers with RevNIC. |
65 | Otherworld: giving applications a chance to survive OS kernel crashes. |
59 | High-level programming of embedded hard real-time devices. |
57 | HadoopToSQL: a mapReduce query optimizer. |
52 | Kivati: fast detection and prevention of atomicity violations. |
37 | Transactional memory support for scalable and transparent parallelization of multiplayer games. |
35 | Self-tuning schedulers for legacy real-time applications. |
34 | Barricade: defending systems against operator mistakes. |
32 | Policy-based access control for weakly consistent replication. |
16 | Splitter: a proxy-based approach for post-migration testing of web applications. |
7 | Residue objects: a challenge to web browser security. |
2009¶
Cited by | Paper title |
---|---|
880 | User interactions in social networks and their implications. |
515 | Automated control of multiple virtualized resources. |
432 | SnowFlock: rapid virtual machine cloning for cloud computing. |
337 | Migrating server storage to SSDs: analysis of tradeoffs. |
211 | Towards practical page coloring-based multicore cache management. |
202 | Koala: a platform for OS-level power management. |
157 | Ksplice: automatic rebootless kernel updates. |
144 | Isolating web programs in modern browser architectures. |
135 | Statistical profiling-based techniques for effective power provisioning in data centers. |
126 | Pointless tainting?: evaluating the practicality of pointer tainting. |
111 | Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space. |
105 | Dingo: taming device drivers. |
101 | Multi-aspect profiling of kernel rootkit behavior. |
52 | Privacy-preserving browser-side scripting with BFlow. |
38 | xCalls: safe I/O in memory transactions. |
37 | A runtime system for software lock elision. |
29 | Memory resource allocation for file system prefetching: from a supply chain management perspective. |
27 | First-aid: surviving and preventing memory management bugs during production runs. |
26 | Predicting replicated database scalability from standalone database profiling. |
25 | Transparent checkpoints of closed distributed systems in Emulab. |
24 | Tralfamadore: unifying source code and execution experience. |
23 | Fair and timely scheduling via cooperative polling. |
18 | Effective and efficient compromise recovery for weakly consistent replication. |
9 | Improving the responsiveness of internet services with automatic cache placement. |
8 | SCAN-Lite: enterprise-wide analysis on the cheap. |
2008¶
Cited by | Paper title |
---|---|
638 | Flicker: an execution infrastructure for tcb minimization. |
169 | Documenting and automating collateral evolutions in linux device drivers. |
155 | Parallax: virtual disks for virtual machines. |
99 | Efficient guaranteed disk request scheduling with fahrrad. |
98 | DepSpace: a byzantine fault-tolerant coordination service. |
75 | Controlled systematic and efficient code replacement for running java programs. |
72 | Towards cinematic internet video-on-demand. |
67 | Manageable fine-grained information flow. |
57 | Application-level isolation and recovery with solitude. |
55 | VPFS: building a virtual private file system with a small trusted computing base. |
53 | Experiences with open overlays: a middleware approach to network heterogeneity. |
52 | GreenFS: making enterprise computers greener by protecting them better. |
51 | Task activity vectors: a new metric for temperature-aware scheduling. |
51 | Itrustpage: a user-assisted anti-phishing tool. |
50 | BorderPatrol: isolating events for black-box tracing. |
43 | Samurai: protecting critical data in unsafe languages. |
39 | Replication degree customization for high availability. |
25 | Eudaemon: involuntary and on-demand emulation against zero-day exploits. |
23 | Hang analysis: fighting responsiveness bugs. |
22 | Switchblade: enforcing dynamic personalized system call models. |
17 | 30 seconds is not enough!: a study of operating system timer usage. |
15 | Enforcing appropriate process execution for exploiting idle resources from outside operating systems. |
10 | Protectit: trusted distributed services operating on sensitive data. |
7 | Modeling viral economies for digital media. |
2007¶
Cited by | Paper title |
---|---|
2483 | Dryad: distributed data-parallel programs from sequential building blocks. |
656 | Adaptive control of virtualized resources in utility computing environments. |
613 | Container-based operating system virtualization: a scalable high-performance alternative to hypervisors. |
280 | Thread clustering: sharing-aware scheduling on SMP-CMP-SMT multiprocessors. |
252 | STMBench7: a benchmark for software transactional memory. |
189 | Exploiting nonstationarity for performance prediction. |
106 | A virtual machine for sensor networks. |
103 | Concierge: a service platform for resource-constrained devices. |
93 | Enabling scalability and performance in a large scale CMP environment. |
92 | Dynamic and adaptive updates of non-quiescent subsystems in commodity operating system kernels. |
90 | Comparing the performance of web server architectures. |
88 | Tashkent+: memory-aware load balancing and update filtering in replicated databases. |
84 | Automatic configuration of internet services. |
83 | Sealing OS processes to improve dependability and safety. |
77 | Sweeper: a lightweight end-to-end system for defending against fast worms. |
69 | Whodunit: transactional profiling for multi-tier applications. |
65 | Competitive prefetching for concurrent sequential I/O. |
59 | Sprint: a middleware for high-performance transaction processing. |
56 | Macroprogramming heterogeneous sensor networks using cosmos. |
50 | “Melange: creating a “”functional”” internet. “ |
47 | Antiquity: exploiting a secure log for wide-area distributed storage. |
47 | hFS: a hybrid file system prototype for improving small file and metadata performance. |
43 | Discrete control for safe execution of IT automation workflows. |
36 | JIT instrumentation: a novel approach to dynamically instrument operating systems. |
33 | Latency and bandwidth-minimizing failure detectors. |
30 | Secure file system versioning at the block level. |
26 | Authorizing applications in singularity. |
26 | Fine grained kernel logging with KLogger: experience and insights. |
19 | Removing the memory limitations of sensor networks with flash-based virtual memory. |
2006¶
Cited by | Paper title |
---|---|
703 | Understanding user behavior in large-scale video-on-demand systems. |
421 | Thorough static analysis of device drivers. |
325 | Language support for fast and reliable message-based communication in singularity OS. |
321 | Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. |
199 | Practical taint-based protection using demand emulation. |
185 | Emergent (mis)behavior vs. complex software systems. |
174 | Balancing power consumption in multiprocessor systems. |
174 | Automated known problem diagnosis with event traces. |
171 | A fresh look at the reliability of long-term digital storage. |
168 | Reducing TCB complexity for security-sensitive applications: three case studies. |
162 | Peer sharing behaviour in the eDonkey network and implications for the design of server-less file sharing systems. |
139 | K42: building a complete operating system. |
124 | A quantitative analysis of aspects in the eCos kernel. |
98 | RIMAC: a novel redundancy-based hierarchical cache architecture for energy efficient high performance storage systems. |
92 | Fireflies: scalable support for intrusion-tolerant network overlays. |
90 | Tashkent: uniting durability with transaction ordering for high-performance scalable database replication. |
82 | The SMART way to migrate replicated stateful services. |
77 | Understanding collateral evolution in Linux device drivers. |
72 | Using queries for distributed monitoring and forensics. |
63 | Experiences in building and operating ePOST a reliable peer-to-peer application. |
60 | Database replication policies for dynamic content applications. |
58 | TCP offload through connection handoff. |
52 | On the road to recovery: restoring data after disasters. |
47 | Ferret: a toolkit for content-based similarity search of feature-rich data. |
47 | Solving the starting problem: device drivers as self-describing artifacts. |
32 | Evaluating network processing efficiency with processor partitioning and asynchronous I/O. |
31 | Context-specific middleware specialization techniques for optimizing software product-line architectures. |
28 | URICA: Usage-awaRe Interactive Content Adaptation for mobile devices. |
26 | Predictive log-synchronization. |