| Cited by |
Paper title |
Year |
| 20882 |
MapReduce: Simplified Data Processing on Large Clusters. |
2004 |
| 5200 |
Bigtable: A Distributed Storage System for Structured Data (Awarded Best Paper!). |
2006 |
| 3736 |
TAG: A Tiny AGgregation Service for Ad-Hoc Sensor Networks. |
2002 |
| 3029 |
Fine-Grained Network Time Synchronization Using Reference Broadcasts. |
2002 |
| 2299 |
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. |
2010 |
| 1640 |
KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. |
2008 |
| 1563 |
An Integrated Experimental Environment for Distributed Systems and Networks. |
2002 |
| 1550 |
Memory Resource Management in VMware ESX Server. |
2002 |
| 1541 |
Overcast: Reliable Multicasting with an Overlay Network. |
2000 |
| 1469 |
Improving MapReduce Performance in Heterogeneous Environments. |
2008 |
| 1393 |
Practical Byzantine Fault Tolerance. |
1999 |
| 1359 |
Scheduling for Reduced CPU Energy. |
1994 |
| 1116 |
Ceph: A Scalable, High-Performance Distributed File System. |
2006 |
| 1095 |
Secure Routing for Structured Peer-to-Peer Overlay Networks. |
2002 |
| 1076 |
FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment. |
2002 |
| 1053 |
ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay. |
2002 |
| 998 |
Lottery Scheduling: Flexible Proportional-Share Resource Management. |
1994 |
| 983 |
Onix: A Distributed Control Platform for Large-scale Production Networks. |
2010 |
| 921 |
The Chubby Lock Service for Loosely-Coupled Distributed Systems. |
2006 |
| 878 |
Spanner: Google’s Globally-Distributed Database. |
2012 |
| 856 |
Resource Containers: A New Facility for Resource Management in Server Systems. |
1999 |
| 790 |
Automated Worm Fingerprinting. |
2004 |
| 785 |
An Analysis of Internet Content Delivery Systems. |
2002 |
| 785 |
DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language. |
2008 |
| 734 |
Cooperative Caching: Using Remote Client Memory to Improve File System Performance. |
1994 |
| 720 |
Fidelity and Yield in a Volcano Monitoring Sensor Network. |
2006 |
| 709 |
Safe Kernel Extensions Without Run-Time Checking. |
1996 |
| 686 |
Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions. |
2000 |
| 685 |
PowerGraph: Distributed Graph-Parallel Computation on Natural Graphs. |
2012 |
| 634 |
Using Magpie for Request Extraction and Workload Modelling. |
2004 |
| 612 |
Scalability and Accuracy in a Large-Scale Network Emulator. |
2002 |
| 596 |
Optimizing the Migration of Virtual Computers. |
2002 |
| 586 |
Ivy: A Read/Write Peer-to-Peer File System. |
2002 |
| 584 |
iPlane: An Information Plane for Distributed Services. |
2006 |
| 580 |
Making Information Flow Explicit in HiStar. |
2006 |
| 560 |
A Hierarchical CPU Scheduler for Multimedia Operating Systems. |
1996 |
| 553 |
The Design and Implementation of Zap: A System for Migrating Computing Environments. |
2002 |
| 536 |
Scale and Performance in the Denali Isolation Kernel. |
2002 |
| 518 |
GraphChi: Large-Scale Graph Computation on Just a PC. |
2012 |
| 515 |
Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control. |
2004 |
| 499 |
Reining in the Outliers in Map-Reduce Clusters using Mantri. |
2010 |
| 486 |
Microreboot - A Technique for Cheap Recovery. |
2004 |
| 477 |
Finding and Reproducing Heisenbugs in Concurrent Programs. |
2008 |
| 476 |
Pastiche: Making Backup Cheap and Easy. |
2002 |
| 464 |
Can the Production Network Be the Testbed? |
2010 |
| 452 |
Disk-directed I/O for MIMD Multiprocessors. |
1994 |
| 449 |
CMC: A Pragmatic Approach to Model Checking Real Code. |
2002 |
| 432 |
Secure Untrusted Data Repository (SUNDR). |
2004 |
| 426 |
Large-scale Incremental Processing Using Distributed Transactions and Notifications. |
2010 |
| 414 |
Resource Overbooking and Application Profiling in Shared Hosting Platforms. |
2002 |
| 412 |
Dealing with Disaster: Surviving Misbehaved Kernel Extensions. |
1996 |
| 406 |
Difference Engine: Harnessing Memory Redundancy in Virtual Machines. |
2008 |
| 384 |
Corey: An Operating System for Many Cores. |
2008 |
| 379 |
A Feedback-driven Proportion Allocator for Real-Rate Scheduling. |
1999 |
| 377 |
Availability in Globally Distributed Storage Systems. |
2010 |
| 375 |
Making Paths Explicit in the Scout Operating System. |
1996 |
| 365 |
Finding a Needle in Haystack: Facebook’s Photo Storage. |
2010 |
| 362 |
Policies for Dynamic Clock Scheduling. |
2000 |
| 359 |
Fast and Secure Distributed Read-Only File System. |
2000 |
| 359 |
Enhancing Server Availability and Security Through Failure-Oblivious Computing. |
2004 |
| 356 |
Improving the Reliability of Internet Paths with One-hop Source Routing. |
2004 |
| 347 |
XFI: Software Guards for System Address Spaces. |
2006 |
| 340 |
Lazy Receiver Processing (LRP): A Network Subsystem Architecture for Server Systems. |
1996 |
| 337 |
Storage Alternatives for Mobile Computers. |
1994 |
| 332 |
GraphX: Graph Processing in a Distributed Dataflow Framework. |
2014 |
| 328 |
An Analysis of Linux Scalability to Many Cores. |
2010 |
| 320 |
Using Model Checking to Find Serious File System Errors (Awarded Best Paper!). |
2004 |
| 316 |
CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code. |
2004 |
| 309 |
Scalable, Distributed Data Structures for Internet Service Construction. |
2000 |
| 308 |
Self-Securing Storage: Protecting Data in Compromised Systems. |
2000 |
| 304 |
The Coign Automatic Distributed Partitioning System. |
1999 |
| 294 |
Chain Replication for Supporting High Throughput and Availability. |
2004 |
| 292 |
BAR Gossip. |
2006 |
| 290 |
Unmodified Device Driver Reuse and Improved System Dependability via Virtual Machines. |
2004 |
| 284 |
Design and Evaluation of a Continuous Consistency Model for Replicated Services. |
2000 |
| 283 |
BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML. |
2006 |
| 282 |
Automatic Compiler-Inserted I/O Prefetching for Out-of-Core Applications. |
1996 |
| 281 |
Performance Evaluation of Two Home-Based Lazy Release Consistency Protocols for Shared Virtual Memory Systems. |
1996 |
| 277 |
Experiences Building PlanetLab. |
2006 |
| 266 |
TCP Nice: A Mechanism for Background Transfers. |
2002 |
| 254 |
Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java. |
2000 |
| 252 |
Securing Software by Enforcing Data-flow Integrity. |
2006 |
| 251 |
HQ Replication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance. |
2006 |
| 247 |
Tornado: Maximizing Locality and Concurrency in a Shared Memory Multiprocessor Operating System. |
1999 |
| 246 |
Scout: A Communications-Oriented Operating System (Abstract). |
1994 |
| 245 |
SPORC: Group Collaboration using Untrusted Cloud Resources. |
2010 |
| 243 |
Automatic Misconfiguration Troubleshooting with PeerPressure. |
2004 |
| 240 |
Interposed Request Routing for Scalable Network Storage. |
2000 |
| 239 |
Depot: Cloud Storage with Minimal Trust. |
2010 |
| 236 |
Microkernels Meet Recursive Virtual Machines. |
1996 |
| 234 |
PathFinder: A Pattern-Based Packet Classifier. |
1994 |
| 233 |
The Turtles Project: Design and Implementation of Nested Virtualization. |
2010 |
| 227 |
Fine-Grained Dynamic Instrumentation of Commodity Operating System Kernels. |
1999 |
| 223 |
Proactive Recovery in a Byzantine-Fault-Tolerant System. |
2000 |
| 222 |
Middleboxes No Longer Considered Harmful. |
2004 |
| 221 |
Boxwood: Abstractions as the Foundation for Storage Infrastructure. |
2004 |
| 220 |
Vertigo: Automatic Performance-Setting for Linux. |
2002 |
| 217 |
Efficient System-Enforced Deterministic Parallelism. |
2010 |
| 215 |
IO-Lite: A Unified I/O Buffering and Caching System. |
1999 |
| 214 |
Automatic I/O Hint Generation Through Speculative Execution. |
1999 |
| 209 |
COMET: Code Offload by Migrating Execution Transparently. |
2012 |
| 208 |
A Caching Model of Operating System Kernel Functionality. |
1994 |
| 206 |
Defending Against Denial of Service Attacks in Scout. |
1999 |
| 206 |
How to Build a Trusted Database System on Untrusted Storage. |
2000 |
| 205 |
CPU Inheritance Scheduling. |
1996 |
| 205 |
The Effectiveness of Request Redirection on CDN Robustness. |
2002 |
| 204 |
Integrated Resource Management for Cluster-based Internet Services. |
2002 |
| 203 |
Taming Aggressive Replication in the Pangaea Wide-Area File System. |
2002 |
| 198 |
Implementation and Performance of Application-Controlled File Caching. |
1994 |
| 193 |
The Synergy Between Non-Blocking Synchronization and Operating System Structure. |
1996 |
| 193 |
A Low-Overhead, High-Performance Unified Buffer Management Scheme That Exploits Sequential and Looping References. |
2000 |
| 190 |
Scaling Distributed Machine Learning with the Parameter Server. |
2014 |
| 188 |
Configuration Debugging as Search: Finding the Needle in the Haystack. |
2004 |
| 187 |
Shielding Applications from an Untrusted Cloud with Haven. |
2014 |
| 183 |
“Towards Higher Disk Head Utilization: Extracting “”Free”” Bandwidth from Busy Disk Drives. “ |
2000 |
| 181 |
SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques. |
2006 |
| 178 |
Quanto: Tracking Energy in Networked Embedded Systems. |
2008 |
| 176 |
Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable. |
2006 |
| 174 |
Practical, Transparent Operating System Support for Superpages. |
2002 |
| 173 |
PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services. |
2004 |
| 172 |
mClock: Handling Throughput Variability for Hypervisor IO Scheduling. |
2010 |
| 171 |
Integrating Content-Based Access Mechanisms with Hierarchical File Systems. |
1999 |
| 171 |
Piccolo: Building Fast, Distributed Programs with Partitioned Tables. |
2010 |
| 169 |
A Trace-Driven Comparison of Algorithms for Parallel Prefetching and Caching. |
1996 |
| 168 |
Knit: Component Composition for Systems Software. |
2000 |
| 164 |
FlexSC: Flexible System Call Scheduling with Exception-Less System Calls. |
2010 |
| 160 |
Virtual Log Based File Systems for a Programmable Disk. |
1999 |
| 160 |
Cooperative I/O: A Novel I/O Semantics for Energy-Aware Applications. |
2002 |
| 159 |
An Implementation of the Hamlyn Sender-Managed Interface Architecture. |
1996 |
| 158 |
R2: An Application-Level Kernel for Record and Replay. |
2008 |
| 157 |
Efficient Cooperative Caching Using Hints. |
1996 |
| 155 |
Metadata Update Performance in File Systems. |
1994 |
| 155 |
Making Geo-Replicated Systems Fast as Possible, Consistent when Necessary. |
2012 |
| 153 |
Using Latency to Evaluate Interactive System Performance. |
1996 |
| 153 |
Deterministic Process Groups in dOS. |
2010 |
| 152 |
Devil: An IDL for Hardware Programming. |
2000 |
| 152 |
Deadlock Immunity: Enabling Systems to Defend Against Deadlocks. |
2008 |
| 152 |
Performance Isolation and Fairness for Multi-Tenant Cloud Storage. |
2012 |
| 150 |
Mencius: Building Efficient Replicated State Machine for WANs. |
2008 |
| 148 |
CoDNS: Improving DNS Performance and Reliability via Cooperative Lookups. |
2004 |
| 145 |
Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions. |
2008 |
| 140 |
Self-Paging in the Nemesis Operating System. |
1999 |
| 139 |
EXPLODE: A Lightweight, General System for Finding Serious Storage System Errors. |
2006 |
| 139 |
Project Adam: Building an Efficient and Scalable Deep Learning Training System. |
2014 |
| 136 |
Persistent Personal Names for Globally Connected Mobile Devices. |
2006 |
| 136 |
Arrakis: The Operating System is the Control Plane. |
2014 |
| 135 |
Software Write Detection for a Distributed Shared Memory. |
1994 |
| 135 |
Nectar: Automatic Management of Data and Computation in Datacenters. |
2010 |
| 133 |
From Uncertainty to Belief: Inferring the Specification Within. |
2006 |
| 131 |
Logical vs. Physical File System Backup. |
1999 |
| 131 |
Understanding and Dealing with Operator Mistakes in Internet Services. |
2004 |
| 130 |
Gadara: Dynamic Deadlock Avoidance for Multithreaded Programs. |
2008 |
| 130 |
AppInsight: Mobile App Performance Monitoring in the Wild. |
2012 |
| 128 |
Surplus Fair Scheduling: A Proportional-Share CPU Scheduling Algorithm for Symmetric Multiprocessors. |
2000 |
| 126 |
The Design and Evaluation of a Shared Object System for Distributed Memory Machines. |
1994 |
| 126 |
System Support for Bandwidth Management and Content Adaptation in Internet Applications. |
2000 |
| 126 |
Effective Data-Race Detection for the Kernel. |
2010 |
| 124 |
Code-Pointer Integrity. |
2014 |
| 123 |
Distributed Filaments: Efficient Fine-Grain Parallelism on a Cluster of Workstations. |
1994 |
| 122 |
Digging for Data Structures. |
2008 |
| 120 |
Effects of Buffering Semantics on I/O Performance. |
1996 |
| 120 |
Automating Configuration Troubleshooting with Dynamic Information Flow Analysis. |
2010 |
| 120 |
IX: A Protected Dataplane Operating System for High Throughput and Low Latency. |
2014 |
| 119 |
Energy-Efficiency and Storage Flexibility in the Blue File System. |
2004 |
| 117 |
FFPF: Fairly Fast Packet Filters. |
2004 |
| 117 |
Ad Hoc Synchronization Considered Harmful. |
2010 |
| 117 |
X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software. |
2012 |
| 114 |
Program-Counter-Based Pattern Classification in Buffer Caching. |
2004 |
| 112 |
Dynamic Binding for an Extensible System. |
1996 |
| 112 |
FlightPath: Obedience vs. Choice in Cooperative Services. |
2008 |
| 110 |
Studies of Windows NT Performance Using Dynamic Execution Traces. |
1996 |
| 110 |
Trading Capacity for Performance in a Disk Array. |
2000 |
| 107 |
Transactional Flash. |
2008 |
| 107 |
Device Driver Safety Through a Reference Validation Mechanism. |
2008 |
| 106 |
Stable Deterministic Multithreading through Schedule Memoization. |
2010 |
| 106 |
Flat Datacenter Storage. |
2012 |
| 105 |
Dune: Safe User-level Access to Privileged CPU Features. |
2012 |
| 103 |
MultiView and Millipage - Fine-Grain Sharing in Page-Based DSMs. |
1999 |
| 102 |
Software Prefetching and Caching for Translation Lookaside Buffers. |
1994 |
| 101 |
Performance Issues in Parallelized Network Protocols. |
1994 |
| 101 |
Leveraging Legacy Code to Deploy Desktop Applications on the Web. |
2008 |
| 99 |
CRAMM: Virtual Memory Support for Garbage-Collected Applications. |
2006 |
| 97 |
Hails: Protecting Data Privacy in Untrusted Web Applications. |
2012 |
| 95 |
Accountable Virtual Machines. |
2010 |
| 93 |
Online Data-Race Detection via Coherency Guarantees. |
1996 |
| 93 |
A Modular Network Layer for Sensornets. |
2006 |
| 93 |
Everest: Scaling Down Peak Loads Through I/O Off-Loading. |
2008 |
| 89 |
TensorFlow: A System for Large-Scale Machine Learning. |
2016 |
| 88 |
Trust and Protection in the Illinois Browser Operating System. |
2010 |
| 87 |
Stasis: Flexible Transactional Storage. |
2006 |
| 85 |
Apollo: Scalable and Coordinated Scheduling for Cloud-Scale Computing. |
2014 |
| 84 |
EnsemBlue: Integrating Distributed Storage and Consumer Electronics. |
2006 |
| 83 |
HiPEC: High Performance External Virtual Memory Caching. |
1994 |
| 83 |
Automated Concurrency-Bug Fixing. |
2012 |
| 81 |
Dissent in Numbers: Making Strong Anonymity Scale. |
2012 |
| 80 |
Hardware Enforcement of Application Security Policies Using Tagged Memory. |
2008 |
| 79 |
Life or Death at Block-Level. |
2004 |
| 79 |
CleanOS: Limiting Mobile Data Exposure with Idle Eviction. |
2012 |
| 79 |
f4: Facebook’s Warm BLOB Storage System. |
2014 |
| 78 |
The Design of a Multicast-Based Distributed File System. |
1999 |
| 77 |
MegaPipe: A New Programming Interface for Scalable Network I/O. |
2012 |
| 77 |
All about Eve: Execute-Verify Replication for Multi-Core Servers. |
2012 |
| 76 |
Operating System Management of MEMS-based Storage Devices. |
2000 |
| 76 |
Redline: First Class Support for Interactivity in Commodity Operating Systems. |
2008 |
| 75 |
Supporting Time-Sensitive Applications on a Commodity OS. |
2002 |
| 75 |
CuriOS: Improving Reliability through Operating System Structure. |
2008 |
| 74 |
Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant Software. |
2002 |
| 72 |
Intrusion Recovery Using Selective Re-execution. |
2010 |
| 71 |
Taming the Memory Hogs: Using Compiler-Inserted Releases to Manage Physical Memory Intelligently. |
2000 |
| 71 |
Exploring Failure Transparency and the Limits of Generic Recovery. |
2000 |
| 71 |
Improving Integer Security for Systems with KINT. |
2012 |
| 70 |
Lightweight Logging for Lazy Release Consistent Distributed Shared Memory. |
1996 |
| 69 |
End-to-End Authorization. |
2000 |
| 69 |
Static Checking of Dynamically-Varying Security Policies in Database-Backed Applications. |
2010 |
| 67 |
Ironclad Apps: End-to-End Security via Automated Full-System Verification. |
2014 |
| 66 |
Garbage Collection and DSM Consistency. |
1994 |
| 66 |
Dynamic Page Mapping Policies for Cache Conflict Resolution on Standard Hardware. |
1994 |
| 66 |
Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management. |
2006 |
| 65 |
Comet: An active distributed key-value store. |
2010 |
| 64 |
Integrating Coherency and Recoverability in Distributed Systems. |
1994 |
| 64 |
Operating System Profiling via Latency Analysis. |
2006 |
| 64 |
Binary Translation Using Peephole Superoptimizers. |
2008 |
| 63 |
Lightweight, High-Resolution Monitoring for Troubleshooting Production Systems. |
2008 |
| 62 |
Type-Safe Disks. |
2006 |
| 62 |
Transactional Consistency and Automatic Management in an Application Data Cache. |
2010 |
| 60 |
Distributed Directory Service in the Farsite File System. |
2006 |
| 57 |
Bypassing Races in Live Applications with Execution Filters. |
2010 |
| 56 |
Be Conservative: Enhancing Failure Diagnosis with Proactive Logging. |
2012 |
| 52 |
SQCK: A Declarative File System Checker. |
2008 |
| 51 |
Performance-Driven Processor Allocation. |
2000 |
| 51 |
SymDrive: Testing Drivers without Devices. |
2012 |
| 49 |
Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems. |
2014 |
| 48 |
Network Imprecision: A New Consistency Metric for Scalable Monitoring. |
2008 |
| 47 |
FUSE: Lightweight Guaranteed Distributed Failure Notification. |
2004 |
| 47 |
Building Extensible Networks with Rule-Based Forwarding. |
2010 |
| 47 |
Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels. |
2012 |
| 46 |
Extracting More Concurrency from Distributed Transactions. |
2014 |
| 45 |
End-to-end Performance Isolation Through Virtual Datacenters. |
2014 |
| 43 |
Protecting Users by Confining JavaScript with COWL. |
2014 |
| 42 |
All File Systems Are Not Created Equal: On the Complexity of Crafting Crash-Consistent Applications. |
2014 |
| 41 |
A Comparison of Windows Driver Model Latency Performance on Windows NT and Windows 98. |
1999 |
| 38 |
The Mystery Machine: End-to-end Performance Analysis of Large-scale Internet Services. |
2014 |
| 38 |
The Power of Choice in Data-Aware Cluster Scheduling. |
2014 |
| 38 |
Characterizing Storage Workloads with Counter Stacks. |
2014 |
| 37 |
Phase Reconciliation for Contended In-Memory Transactions. |
2014 |
| 36 |
Fast Databases with Fast Durability and Recovery Through Multicore Parallelism. |
2014 |
| 35 |
Message-Driven Relaxed Consistency in a Software Distributed Shared Memory. |
1994 |
| 35 |
Luna: A Flexible Java Protection System. |
2002 |
| 34 |
DJoin: Differentially Private Join Queries over Distributed Databases. |
2012 |
| 34 |
GPUnet: Networking Abstractions for GPU Programs. |
2014 |
| 33 |
Experiences with Locking in a NUMA Multiprocessor Operating System Kernel. |
1994 |
| 32 |
Experiences from a Decade of TinyOS Development. |
2012 |
| 32 |
lprof: A Non-intrusive Request Flow Profiler for Distributed Systems. |
2014 |
| 31 |
Active Networks (Abstract). |
1996 |
| 28 |
Using Model Checking to Debug Device Firmware. |
2002 |
| 28 |
Virtualize Everything but Time. |
2010 |
| 28 |
A Self-Configurable Geo-Replicated Cloud Storage System. |
2014 |
| 27 |
Eidetic Systems. |
2014 |
| 26 |
Torturing Databases for Fun and Profit. |
2014 |
| 26 |
SAMC: Semantic-Aware Model Checking for Fast Discovery of Deep Bugs in Cloud Systems. |
2014 |
| 26 |
Decoupling Cores, Kernels, and Operating Systems. |
2014 |
| 26 |
SCONE: Secure Linux Containers with Intel SGX. |
2016 |
| 25 |
ksniffer: Determining the Remote Client Perceived Response Time from Live Packet Streams. |
2004 |
| 25 |
StarTrack Next Generation: A Scalable Infrastructure for Track-Based Applications. |
2010 |
| 25 |
Salt: Combining ACID and BASE in a Distributed Database. |
2014 |
| 25 |
Customizable and Extensible Deployment for Mobile/Cloud Applications. |
2014 |
| 24 |
Some Issues in the Design of an Extensible Operating System (Panel Statement). |
1994 |
| 24 |
Deploying Safe User-Level Network Services with icTCP. |
2004 |
| 23 |
Avoiding File System Micromanagement with Range Writes. |
2008 |
| 23 |
Willow: A User-Programmable SSD. |
2014 |
| 21 |
Pelican: A Building Block for Exascale Cold Data Storage. |
2014 |
| 20 |
Recovering Device Drivers (Awarded Best Paper!). |
2004 |
| 20 |
Spotting Code Optimizations in Data-Parallel Pipelines through PeriSCOPE. |
2012 |
| 20 |
Pasture: Secure Offline Data Access Using Commodity Trusted Hardware. |
2012 |
| 20 |
Detecting Covert Timing Channels with Time-Deterministic Replay. |
2014 |
| 20 |
Heading Off Correlated Failures through Independence-as-a-Service. |
2014 |
| 19 |
Optimizing the Idle Task and Other MMU Tricks. |
1999 |
| 19 |
Pebbles: Fine-Grained Data Management Abstractions for Modern Operating Systems. |
2014 |
| 18 |
Tapeworm: High-Level Abstractions of Shared Accesses. |
1999 |
| 18 |
Latency Management in Storage Systems. |
2000 |
| 18 |
Efficient Patch-based Auditing for Web Application Vulnerabilities. |
2012 |
| 18 |
Jitk: A Trustworthy In-Kernel Interpreter Infrastructure. |
2014 |
| 17 |
Enabling Configuration-Independent Automation by Non-Expert Users. |
2010 |
| 14 |
Opportunistic Log: Efficient Installation Reads in a Reliable Storage Server. |
1994 |
| 14 |
User-Guided Device Driver Synthesis. |
2014 |
| 14 |
Pydron: Semi-Automatic Parallelization for Multi-Core and the Cloud. |
2014 |
| 13 |
ETI Resource Distributor: Guaranteed Resource Allocation and Scheduling in Multimedia Systems. |
1999 |
| 13 |
Connection Handoff Policies for TCP Offload Network Interfaces. |
2006 |
| 12 |
SKI: Exposing Kernel Concurrency Bugs through Systematic Schedule Exploration. |
2014 |
| 12 |
SHILL: A Secure Shell Scripting Language. |
2014 |
| 11 |
Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data. |
2016 |
| 10 |
Nail: A Practical Tool for Parsing and Generating Data Formats. |
2014 |
| 8 |
JavaOS: Back to the Future (Abstract). |
1996 |
| 8 |
Physical Disentanglement in a Container-Based File System. |
2014 |
| 8 |
Gemini: A Computation-Centric Distributed Graph Processing System. |
2016 |
| 8 |
FaSST: Fast, Scalable and Simple Distributed Transactions with Two-Sided (RDMA) Datagram RPCs. |
2016 |
| 7 |
Low and High Risk Operating System Architectures (Panel Statement). |
1994 |
| 7 |
Rethink the Sync (Awarded Best Paper!). |
2006 |
| 6 |
Yak: A High-Performance Big-Data-Friendly Garbage Collector. |
2016 |
| 6 |
GRAPHENE: Packing and Dependency-Aware Scheduling for Data-Parallel Clusters. |
2016 |
| 6 |
Firmament: Fast, Centralized Cluster Scheduling at Scale. |
2016 |
| 6 |
Morpheus: Towards Automated SLOs for Enterprise Clusters. |
2016 |
| 6 |
Shuffler: Fast and Deployable Continuous Code Re-Randomization. |
2016 |
| 5 |
The Exokernel Approach to Operating System Extensibility (Panel Statement). |
1994 |
| 5 |
XFT: Practical Fault Tolerance beyond Crashes. |
2016 |
| 5 |
Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata. |
2016 |
| 5 |
Push-Button Verification of File Systems via Crash Refinement. |
2016 |
| 5 |
NetBricks: Taking the V out of NFV. |
2016 |
| 5 |
CLARINET: WAN-Aware Optimization for Analytics Queries. |
2016 |
| 4 |
Identifying Information Disclosure in Web Applications with Retroactive Auditing. |
2014 |
| 4 |
Altruistic Scheduling in Multi-Resource Clusters. |
2016 |
| 4 |
Unobservable Communication over Fully Untrusted Infrastructure. |
2016 |
| 4 |
Network Requirements for Resource Disaggregation. |
2016 |
| 4 |
CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels. |
2016 |
| 3 |
Exploring the Hidden Dimension in Graph Processing. |
2016 |
| 3 |
Coordinated and Efficient Huge Page Management with Ingens. |
2016 |
| 3 |
Big Data Analytics over Encrypted Datasets with Seabed. |
2016 |
| 3 |
Just Say NO to Paxos Overhead: Replacing Consensus with Network Ordering. |
2016 |
| 3 |
Early Detection of Configuration Errors to Reduce Failure Damage. |
2016 |
| 3 |
Fast and Concurrent RDF Queries with RDMA-Based Distributed Graph Exploration. |
2016 |
| 2 |
REX: A Development Platform and Online Learning Approach for Runtime Emergent Software Systems. |
2016 |
| 2 |
Incremental Consistency Guarantees for Replicated Objects. |
2016 |
| 2 |
Efficient Network Reachability Analysis Using a Succinct Control Plane Representation. |
2016 |
| 2 |
JetStream: Cluster-Scale Parallelization of Information Flow Queries. |
2016 |
| 2 |
Don’t Get Caught in the Cold, Warm-up Your JVM: Understand and Eliminate JVM Warm-up Overhead in Data-Parallel Systems. |
2016 |
| 2 |
Intermittent Computation without Hardware Support or Programmer Intervention. |
2016 |
| 2 |
Machine-Aware Atomic Broadcast Trees for Multicores. |
2016 |
| 2 |
The SNOW Theorem and Latency-Optimal Read-Only Transactions. |
2016 |
| 2 |
Consolidating Concurrency Control and Consensus for Commits under Conflicts. |
2016 |
| 2 |
To Waffinity and Beyond: A Scalable Architecture for Incremental Parallelization of File System Code. |
2016 |
| 1 |
Kraken: Leveraging Live Traffic Tests to Identify and Resolve Resource Utilization Bottlenecks in Large Scale Web Services. |
2016 |
| 1 |
Slicer: Auto-Sharding for Datacenter Applications. |
2016 |
| 1 |
Diamond: Automating Data Management and Storage for Wide-Area, Reactive Applications. |
2016 |
| 1 |
Simplifying Datacenter Network Debugging with PathDump. |
2016 |
| 1 |
History-Based Harvesting of Spare Cycles and Storage in Large-Scale Datacenters. |
2016 |
| 1 |
EC-Cache: Load-Balanced, Low-Latency Cluster Caching with Online Erasure Coding. |
2016 |
| 0 |
Panel: Radical Operating Systems Structures for Extensibility. |
1994 |
| 0 |
High-Performance Microkernel Systems (Panel Statement). |
1994 |
| 0 |
Interface and Execution Models in the Fluke Kernel. |
1999 |
| 0 |
Non-Intrusive Performance Profiling for Entire Software Stacks Based on the Flow Reconstruction Principle. |
2016 |
| 0 |
Light-Weight Contexts: An OS Abstraction for Safety and Performance. |
2016 |
| 0 |
DQBarge: Improving Data-Quality Tradeoffs in Large-Scale Internet Services. |
2016 |
| 0 |
EbbRT: A Framework for Building Per-Application Library Operating Systems. |
2016 |
| 0 |
Realizing the Fault-Tolerance Promise of Cloud Storage Using Locks with Intent. |
2016 |
| 0 |
Correlated Crash Vulnerabilities. |
2016 |