Table of contents for issues of Operating Systems Review

Last update: Sat Jan 6 13:24:00 MST 2024                Valid HTML 3.2!

Volume 6, Number 1/2, June, 1972
Volume 6, Number 3, October, 1972
Volume 7, Number 2, April, 1973
Volume 7, Number 3, July, 1973
Volume 7, Number 4, October, 1973
Volume 8, Number 1, January, 1974
Volume 8, Number 2, April, 1974
Volume 8, Number 3, July, 1974
Volume 8, Number 4, October, 1974
Volume 9, Number 1, January, 1975
Volume 9, Number 2, April, 1975
Volume 9, Number 3, July, 1975
Volume 9, Number 4, October, 1975
Volume 9, Number 5, November, 1975
Volume 10, Number 1, January, 1976
Volume 10, Number 3, July, 1976
Volume 10, Number 4, October, 1976
Volume 11, Number 1, January, 1977
Volume 11, Number 2, April, 1977
Volume 11, Number 3, July, 1977
Volume 11, Number 4, October, 1977
Volume 11, Number 5, November, 1977
Volume 12, Number 1, January, 1978
Volume 12, Number 2, April, 1978
Volume 12, Number 3, July, 1978
Volume 12, Number 4, October, 1978
Volume 13, Number 1, January, 1979
Volume 13, Number 2, April, 1979
Volume 13, Number 3, July, 1979
Volume 14, Number 1, January, 1980
Volume 14, Number 2, April, 1980
Volume 14, Number 3, July, 1980
Volume 14, Number 4, October, 1980
Volume 15, Number 1, January, 1981
Volume 15, Number 2, April, 1981
Volume 15, Number 3, July, 1981
Volume 15, Number 4, October, 1981
Volume 15, Number 5, December, 1981
Volume 16, Number 1, January, 1982
Volume 16, Number 2, April, 1982
Volume 16, Number 3, July, 1982
Volume 16, Number 4, October, 1982
Volume 17, Number 1, January, 1983
Volume 17, Number 2, April, 1983
Volume 17, Number 3, July, 1983
Volume 17, Number 4, October, 1983
Volume 17, Number 5, October, 1983
Volume 18, Number 1, January, 1984
Volume 18, Number 2, April, 1984
Volume 18, Number 3, July, 1984
Volume 18, Number 4, October, 1984
Volume 19, Number 1, January, 1985
Volume 19, Number 2, April, 1985
Volume 19, Number 3, July, 1985
Volume 19, Number 4, October, 1985
Volume 19, Number 5, December, 1985
Volume 20, Number 1, January, 1986
Volume 20, Number 2, April, 1986
Volume 20, Number 3, July, 1986
Volume 20, Number 4, October, 1986
Volume 21, Number 1, January, 1987
Volume 21, Number 2, April, 1987
Volume 21, Number 3, July, 1987
Volume 21, Number 4, October, 1987
Volume 21, Number 5, November, 1987
Volume 22, Number 1, January, 1988
Volume 22, Number 2, April, 1988
Volume 22, Number 3, July, 1988
Volume 22, Number 4, October, 1988
Volume 23, Number 1, January, 1989
Volume 23, Number 2, April, 1989
Volume 23, Number 3, July, 1989
Volume 23, Number 4, October, 1989
Volume 23, Number 5, December, 1989
Volume 24, Number 1, January, 1990
Volume 24, Number 2, April, 1990
Volume 24, Number 3, July, 1990
Volume 24, Number 4, October, 1990
Volume 25, Number 1, January, 1991
Volume 25, Number 2, April, 1991
Volume 25, Number 3S, April, 1991
Volume 25, Number 3, July, 1991
Volume 25, Number 4, October, 1991
Volume 25, Number 5, October, 1991
Volume 26, Number 1, January, 1992
Volume 26, Number 2, April, 1992
Volume 26, Number 3, July, 1992
Volume 26, Number 4, October, 1992
Volume 27, Number 1, January, 1993
Volume 27, Number 2, April, 1993
Volume 27, Number 3, July, 1993
Volume 27, Number 4, October, 1993
Volume 27, Number 5, December, 1993
Volume 28, Number 1, January, 1994
Volume 28, Number 2, April, 1994
Volume 28, Number 3, July, 1994
Volume 28, Number 4, October, 1994
Volume 28, Number 5, December, 1994
Volume 29, Number 1, January, 1995
Volume 29, Number 2, April, 1995
Volume 29, Number 3, July, 1995
Volume 29, Number 4, October, 1995
Volume 29, Number 5, December, 1995
Volume 30, Number SI, October, 1996
Volume 30, Number 1, January, 1996
Volume 30, Number 2, April, 1996
Volume 30, Number 3, July, 1996
Volume 30, Number 4, October, 1996
Volume 30, Number 5, December, 1996
Volume 31, Number 1, January, 1997
Volume 31, Number 2, April, 1997
Volume 31, Number 3, July, 1997
Volume 31, Number 4, October, 1997
Volume 31, Number 5, December, 1997
Volume 32, Number 1, January, 1998
Volume 32, Number 2, April, 1998
Volume 32, Number 3, July, 1998
Volume 32, Number 4, October, 1998
Volume 32, Number 5, December, 1998
Volume 33, Number 1, January, 1999
Volume 33, Number 2, April, 1999
Volume 33, Number 3, July, 1999
Volume 33, Number 4, October, 1999
Volume 33, Number 5, December, 1999
Volume 34, Number 1, January, 2000
Volume 34, Number 2, April, 2000
Volume 34, Number 3, July, 2000
Volume 34, Number 4, October, 2000
Volume 34, Number 5, December, 2000
Volume 35, Number 1, January, 2001
Volume 35, Number 2, April, 2001
Volume 35, Number 3, July, 2001
Volume 35, Number 4, October, 2001
Volume 35, Number 5, December, 2001
Volume 36, Number 1, January, 2002
Volume 36, Number 2, April, 2002
Volume 36, Number 3, July, 2002
Volume 36, Number 4, October, 2002
Volume 36, Number 5, December, 2002
Volume 36, Number 5S, December, 2002
Volume 37, Number 1, January, 2003
Volume 37, Number 2, April, 2003
Volume 37, Number 3, July, 2003
Volume 37, Number 4, October, 2003
Volume 38, Number 1, January, 2004
Volume 38, Number 2, April, 2004
Volume 38, Number 3, July, 2004
Volume 38, Number 4, October, 2004
Volume 38, Number 5, December, 2004
Volume 39, Number 1, January, 2005
Volume 39, Number 2, April, 2005
Volume 39, Number 3, July, 2005
Volume 39, Number 4, October, 2005
Volume 39, Number 5, December, 2005
Volume 40, Number 1, January, 2006
Volume 40, Number 2, April, 2006
Volume 40, Number 3, July, 2006
Volume 40, Number 4, October, 2006
Volume 40, Number 5, December, 2006
Volume 41, Number 1, January, 2007
Volume 41, Number 2, April, 2007
Volume 41, Number 3, June, 2007
Volume 41, Number 4, July, 2007
Volume 41, Number 5, October, 2007
Volume 41, Number 6, December, 2007
Volume 42, Number 1, January, 2008
Volume 42, Number 2, March, 2008
Volume 42, Number 3, April, 2008
Volume 42, Number 4, May, 2008
Volume 42, Number 5, July, 2008
Volume 42, Number 6, October, 2008
Volume 43, Number 1, January, 2009
Volume 43, Number 2, April, 2009
Volume 43, Number 3, July, 2009
Volume 43, Number 4, December, 2009
Volume 44, Number 1, January, 2010
Volume 44, Number 2, April, 2010
Volume 44, Number 3, July, 2010
Volume 44, Number 4, December, 2010
Volume 45, Number 1, January, 2011
Volume 45, Number 2, July, 2011
Volume 45, Number 3, December, 2011
Volume 46, Number 1, January, 2012
Volume 46, Number 2, July, 2012
Volume 46, Number 3, December, 2012
Volume 47, Number 1, January, 2013
Volume 47, Number 2, July, 2013
Volume 47, Number 3, December, 2013
Volume 48, Number 1, 2014
Volume 48, Number 2, July, 2014
Volume 49, Number 1, January, 2015
Volume 49, Number 2, December, 2015
Volume 50, Number 1, January, 2016
Volume 50, Number 2, June, 2016
Volume 50, Number 3, December, 2016
Volume 51, Number 1, August, 2017
Volume 51, Number 2, June, 2017
Volume 52, Number 1, July, 2018
Volume 53, Number 1, July, 2019
Volume 54, Number 1, August, 2020
Volume 55, Number 1, June, 2021
Volume 56, Number 1, June, 2022
Volume 57, Number 1, June, 2023


Operating Systems Review
Volume 6, Number 1/2, June, 1972

           Daniel G. Bobrow and   
         Jerry D. Burchfiel and   
           Daniel L. Murphy and   
           Raymond S. Tomlinson   TENEX: a paged time sharing system for
                                  the PDP-10 . . . . . . . . . . . . . . . 1--10
              Barbara H. Liskov   The design of the Venus Operating System 11--16
             R. Stockton Gaines   An operating system based on the concept
                                  of a supervisory computer  . . . . . . . 17--23
                      Sam Howry   A multiprogramming system for process
                                  control  . . . . . . . . . . . . . . . . 24--30
               Peter A. Alsberg   Extensible data features in the
                                  operating system language OSL/2  . . . . 31--34
             R. J. Feiertag and   
                 E. I. Organick   The Multics input/output system  . . . . 35--38
       Michael D. Schroeder and   
              Jerome H. Saltzer   A hardware architecture for implementing
                                  protection rings . . . . . . . . . . . . 42--54
                  R. M. Needham   Handling difficult faults in operating
                                  systems  . . . . . . . . . . . . . . . . 55--57
               Jeffrey L. Gertz   Storage reallocation in hierarchical
                                  associative memories . . . . . . . . . . 58--63
                Richard C. Holt   Some deadlock properties of computer
                                  systems  . . . . . . . . . . . . . . . . 64--71
               Rafael O. Fontao   A concurrent algorithm for avoiding
                                  deadlocks in multiprocess multiple
                                  resource systems . . . . . . . . . . . . 72--79
              A. Nico Habermann   Synchronization of communicating
                                  processes  . . . . . . . . . . . . . . . 80--85
                    Gilles Kahn   An approach to systems correctness . . . 86--94
              William B. Easton   Process synchronization without
                                  long-term interlock  . . . . . . . . . . 95--100
              Per Brinch Hansen   Short-term scheduling in
                                  multiprogramming systems . . . . . . . . 101--105
                   R. C. Varney   Process selection in a hierarchical
                                  operating system . . . . . . . . . . . . 106--108
                 Forest Baskett   The dependence of computer system queues
                                  upon processing time distribution and
                                  central processor scheduling . . . . . . 109--113
             Toby J. Teorey and   
               Tad B. Pinkerton   A comparative analysis of disk
                                  scheduling policies  . . . . . . . . . . 114--121
              E. G. Coffman and   
                 Thomas A. Ryan   A study of storage partitioning using a
                                  mathematical model of locality . . . . . 122--129
           Peter J. Denning and   
             Stuart C. Schwartz   Properties of the working-set model  . . 130--140
              Mark L. Greenberg   An algorithm for drum storage management
                                  in time-sharing systems  . . . . . . . . 141--148
                J. Winograd and   
          S. J. Morganstein and   
                      R. Herman   Simulation studies of a virtual memory,
                                  time-shared, demand paging operating
                                  system . . . . . . . . . . . . . . . . . 149--155
          Juan Rodriguez-Rosell   Experimental data on how program
                                  behavior affects the choice of scheduler
                                  parameters . . . . . . . . . . . . . . . 156--163

Operating Systems Review
Volume 6, Number 3, October, 1972

                 Marc Fogel and   
                Joseph Winograd   EINSTEIN: an internal driver in a
                                  time-sharing environment . . . . . . . . 6--14


Operating Systems Review
Volume 7, Number 2, April, 1973

                 Peter C. Poole   When is a test not a test? . . . . . . . 4--5
             William W. Collier   Asynchronous interactions on shared data 6--15
               John M. Chambers   A user-controlled synchronization method 16--25
         David H. Abernathy and   
            John S. Mancino and   
          Charls R. Pearson and   
                 Dona C. Swiger   Survey of design goals for operating
                                  systems  . . . . . . . . . . . . . . . . 29--48

Operating Systems Review
Volume 7, Number 3, July, 1973

                M. D. Schroeder   A brief report on the SIGPLAN/SIGOPS
                                  interface meeting  . . . . . . . . . . . 4--9
               David C. M. Wood   An example in synchronization of
                                  cooperating processes: theory and
                                  practice . . . . . . . . . . . . . . . . 10--18
         David H. Abernathy and   
            John S. Mancino and   
          Charls R. Pearson and   
                 Dona C. Swiger   Survey of design goals for operating
                                  systems  . . . . . . . . . . . . . . . . 19--34

Operating Systems Review
Volume 7, Number 4, October, 1973

                 P. G. Sorenson   Interprocess communication in real-time
                                  systems  . . . . . . . . . . . . . . . . 1--7
           Michale J. Spier and   
         Thomas N. Hastings and   
                David N. Cutler   An experimental implementation of the
                                  kernel/domain architecture . . . . . . . 8--21
               C. J. Stephenson   On the structure and control of commands 22--26
          Dennis M. Ritchie and   
                   Ken Thompson   The UNIX time-sharing system . . . . . . 27--27
                   Paul Day and   
                     John Hines   ARGOS: An operating system for a
                                  computer utility supporting interactive
                                  instrument control . . . . . . . . . . . 28--37
                     W. Walther   Multiprocessor self diagnosis, surgery,
                                  and recovery in air terminal traffic
                                  control  . . . . . . . . . . . . . . . . 38--44
                 Liba Svobodova   Online system performance measurements
                                  with software and hybrid monitors  . . . 45--53
               Samuel H. Fuller   Summary of minimal-total-processing-time
                                  drum and disk scheduling disciplines . . 54--57
               Lee J. Scheffier   Optimal folding of a paging drum in a
                                  three level memory system  . . . . . . . 58--65
       Donald D. Chamberlin and   
           Samuel H. Fulier and   
                 Leonard Y. Liu   A page allocation strategy for
                                  multiprogramming systems . . . . . . . . 66--72
           Peter J. Denning and   
               Jeffrey R. Spirn   Dynamic storage partitioning . . . . . . 73--79
                     Arvind and   
                 R. Y. Kain and   
                       E. Sadeh   On reference string generation processes 80--87
              Clarence A. Ellis   On the probability of deadlock in
                                  computer systems . . . . . . . . . . . . 88--95
                   J. D. Ullman   Polynomial complete scheduling problems  96--101
                   J. Eruno and   
         E. G. Coffman, Jr. and   
                       R. Sethi   Scheduling independent tasks to reduce
                                  mean finishing-time (extended abstract)  102--103
                M. R. Garey and   
                   R. L. Grehem   Bounds on scheduling with limited
                                  resources  . . . . . . . . . . . . . . . 104--111
               K. L. Krause and   
                 V. Y. Shen and   
                H. D. Schwetman   A task-scheduling algorithm for a
                                  multiprogramming computer system . . . . 112--118
              Jerome H. Saltzer   Protection and control of information
                                  sharing in Multics . . . . . . . . . . . 119--119
                    R. S. Fabry   The case for capability based computers
                                  (Extended Abstract)  . . . . . . . . . . 120--120
            Gerald J. Popek and   
             Robert P. Goldberg   Formal requirements for virtualizable
                                  third generation architectures . . . . . 121--121
                S. Rao Kosaraju   Limitations of Dijkstra's Semaphore
                                  Primitives and Petri nets  . . . . . . . 122--126


Operating Systems Review
Volume 8, Number 1, January, 1974

               Peter J. Denning   Is it not time to define ``structured
                                  programming''? . . . . . . . . . . . . . 6--7
                  Marc H. Fogel   The VMOS paging algorithm: a practical
                                  implementation of the working set model  8--17
              Butler W. Lampson   Protection . . . . . . . . . . . . . . . 18--24
         David H. Abernathy and   
            John S. Mancino and   
          Charls R. Pearson and   
                 Dona C. Swiger   Survey of design goals for operating
                                  systems  . . . . . . . . . . . . . . . . 25--35

Operating Systems Review
Volume 8, Number 2, April, 1974

            Marvin V. Zelkowitz   It is not time to define ``structured
                                  programming''  . . . . . . . . . . . . . 7--8
               Michael J. Spier   A critical look at the state of our
                                  science  . . . . . . . . . . . . . . . . 9--15

Operating Systems Review
Volume 8, Number 3, July, 1974

               Clinton R. Foulk   Yet another attempt to define
                                  ``structured programming'' . . . . . . . 4--5
                   Gary J. Nutt   An implementation of a computer
                                  simulation system  . . . . . . . . . . . 6--7
              Jerome H. Saltzer   Ongoing research and development on
                                  information protection . . . . . . . . . 8--24

Operating Systems Review
Volume 8, Number 4, October, 1974

               Peter J. Denning   Is ``structured programming'' any longer
                                  the right term?  . . . . . . . . . . . . 4--6
                  Gary D. Knott   A proposal for certain process
                                  management and intercommunication
                                  primitives . . . . . . . . . . . . . . . 7--44


Operating Systems Review
Volume 9, Number 1, January, 1975

           Michael J. Spier and   
            Richard L. Hill and   
           Timothy J. Stein and   
                Daniel Bricklin   The TYPESET-10 Message Exchange
                                  Facility: a case study in systemic
                                  design . . . . . . . . . . . . . . . . . 10--18
                  Gary D. Knott   A proposal for certain process
                                  management and intercommunication
                                  primitives . . . . . . . . . . . . . . . 19--41

Operating Systems Review
Volume 9, Number 2, April, 1975

                  Petr Beckmann   Book review  . . . . . . . . . . . . . . 8--9
National Bureau of Standards and   
    National Science Foundation   A preliminary prospectus for a software
                                  engineering handbook . . . . . . . . . . 10--13
                      Anonymous   Aims and scope for IEEE Transactions on
                                  Software Engineering . . . . . . . . . . 14--15
               Philip H. Enslow   OSCL (1) activity in Europe  . . . . . . 16--17

Operating Systems Review
Volume 9, Number 3, July, 1975

                 Butler Lampson   Synchronization: Introduction by the
                                  session chairman . . . . . . . . . . . . 1--2
                Gerald Belpaire   Synchronization: Is a synthesis of the
                                  problems possible? . . . . . . . . . . . 3--10
           Raymond S. Tomlinson   Selecting sequence numbers . . . . . . . 11--23
                 Yogen K. Dalal   More on selecting sequence numbers . . . 25--36
                 Robert C. Chen   Representation of process
                                  synchronization  . . . . . . . . . . . . 37--42
                    Vinton Cerf   Formalisms for interprocess
                                  communication  . . . . . . . . . . . . . 43--44
             Gregor V. Bochmann   Communication protocols and error
                                  recovery procedures  . . . . . . . . . . 45--50
           Philip M. Merlin and   
                David J. Farber   Recoverability of modular systems  . . . 51--56
             R. Stockton Gaines   Protection . . . . . . . . . . . . . . . 57--58
                Gerald J. Popek   On data secure computer networks . . . . 59--62
                     T. C. Chen   Interprocess communication systems . . . 63--63
               Eric Manning and   
                  R. W. Peebles   Segment transfer protocols for a
                                  homogeneous computer network . . . . . . 65--73
                     Wesley Chu   Performance  . . . . . . . . . . . . . . 75--75
          John M. McQuillan and   
                David C. Walden   Some considerations for a high
                                  performance message-based interprocess
                                  communication system . . . . . . . . . . 77--86
André A. S. Danthine and   
                  Joseph Bremer   Communication protocols in a network
                                  context  . . . . . . . . . . . . . . . . 87--92
               Holger Opderbeck   On the efficiency of control procedures
                                  for computer communication networks  . . 93--96

Operating Systems Review
Volume 9, Number 4, October, 1975

                R. R. Brown and   
              J. L. Elshoff and   
                     M. R. Ward   The GM multiple console time sharing
                                  system . . . . . . . . . . . . . . . . . 7--17
                    R. R. Brown   MCTS customer task environment . . . . . 18--42

Operating Systems Review
Volume 9, Number 5, November, 1975

                Richard Y. Kain   How to evaluate page replacement
                                  algorithms . . . . . . . . . . . . . . . 1--5
                       E. Sadeh   An analysis of the performance of the
                                  page fault frequency (PFF) replacement
                                  algorithm  . . . . . . . . . . . . . . . 6--13
        Michael A. Harrison and   
            Walter L. Ruzzo and   
              Jeffrey D. Ullman   On protection in operating systems . . . 14--24
           Michael D. Schroeder   Engineering a security kernel for
                                  Multics  . . . . . . . . . . . . . . . . 25--32
                D. L. Bayer and   
                    H. Lycklama   MERT --- a multi-environment real-time
                                  operating system . . . . . . . . . . . . 33--42
             Philippe A. Janson   Dynamic linking and environment
                                  initialization in a multi-domain process 43--50
               J. L. Pruitt and   
                     W. W. Case   Architecture of a real time operating
                                  system . . . . . . . . . . . . . . . . . 51--59
             Gregory L. Chesson   The network Unix system  . . . . . . . . 60--66
            E. A. Akkoyunlu and   
               K. Ekanadham and   
                    R. V. Huber   Some constraints and tradeoffs in the
                                  design of network communications . . . . 67--74
               B. P. Cosell and   
              P. R. Johnson and   
               J. H. Malman and   
              R. E. Schantz and   
                 J. Sussman and   
               R. H. Thomas and   
                   D. C. Walden   An operational system for computer
                                  resource sharing . . . . . . . . . . . . 75--81
               J. D. Bagley and   
                E. R. Floto and   
                S. C. Hsieh and   
                      V. Watson   Sharing data and services in a virtual
                                  machine system . . . . . . . . . . . . . 82--88
            Gerald Belpaire and   
                   Nai-Ting Hsu   Formal properties of recursive Virtual
                                  Machine architectures  . . . . . . . . . 89--96
            Gerald J. Popek and   
               Charles S. Kline   The PDP-11 virtual machine architecture:
                                  A case study . . . . . . . . . . . . . . 97--105
           David L. Russell and   
                Thomas H. Bredt   Error resynchronization in
                                  producer-consumer systems  . . . . . . . 106--113
             Bruce W. Arden and   
              Alan D. Berenbaum   A multi-microprocessor computer system
                                  architecture . . . . . . . . . . . . . . 114--121
                    W. Wulf and   
                   R. Levin and   
                     C. Pierson   Overview of the Hydra Operating System
                                  development  . . . . . . . . . . . . . . 122--131
                   R. Levin and   
                   E. Cohen and   
                  W. Corwin and   
                 F. Pollack and   
                        W. Wulf   Policy/mechanism separation in Hydra . . 132--140
                Ellis Cohen and   
                David Jefferson   Protection in the Hydra Operating System 141--160
         Robert E. Brundage and   
                 Alan P. Batson   Computational processor demands of
                                  Algol-60 programs  . . . . . . . . . . . 161--168
               K. M. Chandy and   
                 P. F. Reynolds   Scheduling partially ordered tasks with
                                  probabilistic execution times  . . . . . 169--177
                   Shui Lam and   
                     Ravi Sethi   Analysis of a level algorithm for
                                  preemptive scheduling  . . . . . . . . . 178--186
         E. G. Coffman, Jr. and   
                     I. Mitrani   Selecting a scheduling rule that meets
                                  pre-specified response time demands  . . 187--191
               Steven B. Lipner   A comment on the confinement problem . . 192--196
             Anita K. Jones and   
              Richard J. Lipton   The enforcement of security policies for
                                  computation  . . . . . . . . . . . . . . 197--206
           Peter J. Denning and   
                  Kevin C. Kahn   A study of program locality and lifetime
                                  functions  . . . . . . . . . . . . . . . 207--216
             A. K. Agrawala and   
                   R. M. Bryant   Models of memory scheduling  . . . . . . 217--222


Operating Systems Review
Volume 10, Number 1, January, 1976

              James L. Peterson   Referee coordination for the fifth
                                  Symposium on Operating Systems
                                  Principles . . . . . . . . . . . . . . . 7--16
                R. R. Brown and   
              J. L. Elshoff and   
                     M. R. Ward   The GM multiple console time sharing
                                  system . . . . . . . . . . . . . . . . . 17--17
           James L. Elshoff and   
                Mitchel R. Ward   The MCTS operating system  . . . . . . . 18--38
                 Ralph R. Brown   MCTS nucleus: philosophy and praxis  . . 39--60
                Mitchel R. Ward   A simple approach to operating system
                                  generation and initialization  . . . . . 61--71

Operating Systems Review
Volume 10, Number 3, July, 1976

                       G. Yuval   An operating non-system  . . . . . . . . 9--10

Operating Systems Review
Volume 10, Number 4, October, 1976

                   E. H. Sibley   Economic justification of an OSCL/OSRL   7--15


Operating Systems Review
Volume 11, Number 1, January, 1977

                Philip M. Mills   Control functions for a multiprocessor
                                  architecture . . . . . . . . . . . . . . 26--40

Operating Systems Review
Volume 11, Number 2, April, 1977

            Allen L. Ambler and   
             Donald I. Good and   
            James C. Browne and   
          Wilhelm F. Burger and   
           Richard M. Cohen and   
            Charles G. Hoch and   
                Robert E. Wells   Gypsy: A language for specification and
                                  implementation of verifiable programs    1--10
                G. J. Popek and   
              J. J. Horning and   
              B. W. Lampson and   
             J. G. Mitchell and   
                   R. L. London   Notes on the design of Euclid  . . . . . 11--18
         Charles N. Fischer and   
             Richard J. LeBlanc   Efficient implementation and
                                  optimization of run-time checking in
                                  PASCAL . . . . . . . . . . . . . . . . . 19--24
            Allen L. Ambler and   
                Charles G. Hoch   A study of protection in programming
                                  languages  . . . . . . . . . . . . . . . 25--40
         Daniel P. Friedman and   
                  David S. Wise   Aspects of applicative programming for
                                  file systems (preliminary version) . . . 41--55
              Robert G. Herriot   Towards the ideal programming language   56--62
             Jhon V. Guttag and   
             Ellis Horowitz and   
                David R. Musser   Some extensions to algebraic
                                  specifications . . . . . . . . . . . . . 63--67
                 Normand Buckle   Restricted data types, specification and
                                  enforcement of invariant properties of
                                  variables  . . . . . . . . . . . . . . . 68--76
             Patrick Causot and   
                  Radhia Cousot   Static determination of dynamic
                                  properties of generalized type unions    77--94
        P. M. Melliar-Smith and   
                     B. Randell   Software reliability: The role of
                                  programmed exception handling  . . . . . 95--100
             M. Donald MacLaren   Exception handling in PL/I . . . . . . . 101--104
                       Tom Love   An experimental investigation of the
                                  effect of program structure on program
                                  understanding  . . . . . . . . . . . . . 105--113
         Gregory R. Andrews and   
                James R. McGraw   Language features for process
                                  interaction  . . . . . . . . . . . . . . 114--127
                    D. B. Lomet   Process structuring, synchronization,
                                  and recovery using atomic actions  . . . 128--137
         Charles M. Geschke and   
       James H. Morris, Jr. and   
         Edwin H. Satterthwaite   Early experience with Mesa . . . . . . . 138--138
                  Mary Shaw and   
                 Wm A. Wulf and   
                Ralph L. London   Abstraction and verification in Alphard:
                                  Defining and specifying iteration and
                                  generators . . . . . . . . . . . . . . . 139--139
             Barbara Liskov and   
                Alan Snyder and   
           Russell Atkinson and   
                Craig Schaffert   Abstraction mechanisms in CLU  . . . . . 140--140
                   J. D. Gannon   An experimental evaluation of data types
                                  on programming reliability . . . . . . . 141--141
                       N. Wirth   Towards a discipline of real-time
                                  programming  . . . . . . . . . . . . . . 142--142

Operating Systems Review
Volume 11, Number 3, July, 1977

                  Andrew Lister   The problem of nested monitor calls  . . 5--7
                    A. J. Payne   A formalised technique for expressing
                                  system exercisers  . . . . . . . . . . . 8--12

Operating Systems Review
Volume 11, Number 4, October, 1977

                   A. J. Gerber   Process synchronization by counter
                                  variables  . . . . . . . . . . . . . . . 6--17
                Bruce K. Haddon   Nested monitor calls . . . . . . . . . . 18--23

Operating Systems Review
Volume 11, Number 5, November, 1977

              R. M. Needham and   
                R. D. H. Walker   The Cambridge CAP computer and its
                                  protection system  . . . . . . . . . . . 1--10
              R. M. Needham and   
                  A. D. Birrell   The CAP filing system  . . . . . . . . . 11--16
                  R. M. Needham   The CAP project --- an interim
                                  evaluation . . . . . . . . . . . . . . . 17--22
             Forest Baskett and   
             John H. Howard and   
               John T. Montague   Task communication in DEMOS  . . . . . . 23--31
              Michael L. Powell   The DEMOS file system  . . . . . . . . . 33--42
       Michael D. Schroeder and   
             David D. Clark and   
              Jerome H. Saltzer   The Multics kernel design project  . . . 43--56
             R. J. Feiertag and   
               K. N. Levitt and   
                    L. Robinson   Proving multilevel security of a system
                                  design . . . . . . . . . . . . . . . . . 57--65
              Clarence A. Ellis   Consistency and correctness of duplicate
                                  database systems . . . . . . . . . . . . 67--84
           Warren A. Montgomery   Measurements of sharing in Multics . . . 85--90
              David P. Reed and   
            Rajendra K. Kanodia   Synchronization with eventcounts and
                                  sequencers (extended abstract) . . . . . 91--91
                  Gene Mcdaniel   Metric (extended abstract): A kernel
                                  instrumentation system for distributed
                                  environments . . . . . . . . . . . . . . 93--99
                   L. Casey and   
                    N. Shelness   A domain structure for distributed
                                  computer systems . . . . . . . . . . . . 101--108
            J. Y. Babonneau and   
               M. S. Achard and   
                G. Morisset and   
                M. B. Mounajjed   Automatic and general solution to the
                                  adaptation of programs in a paging
                                  environment  . . . . . . . . . . . . . . 109--116
                 Takashi Masuda   Effect of program localities on memory
                                  management strategies  . . . . . . . . . 117--124
               Dominique Potier   Analysis of demand paging policies with
                                  swapped working sets . . . . . . . . . . 125--131
                    Ellis Choen   Information transmission in
                                  computational systems  . . . . . . . . . 133--139
                Lawrence Snyder   On the synthesis and analysis of
                                  protection systems . . . . . . . . . . . 141--150
               David L. Russell   Process backup in producer-consumer
                                  systems  . . . . . . . . . . . . . . . . 151--157
                     Arvind and   
            Kim P. Gostelow and   
                    Wil Plouffe   Indeterminacy, monitors, and dataflow    159--169
          David R. Cheriton and   
         Michael A. Malcolm and   
          Lawrence S. Melen and   
                  Gary R. Sager   Thoth, a portable real-time operating
                                  system (extended abstract) . . . . . . . 171--171
          Klaus-Peter Löhr   Beyond concurrent Pascal . . . . . . . . 173--180


Operating Systems Review
Volume 12, Number 1, January, 1978

                David L. Parnas   The non-problem of nested monitor calls  12--18
                Horst Wettstein   The problem of nested monitor calls
                                  revisited  . . . . . . . . . . . . . . . 19--23
                  A. J. Herbert   A new protection architecture for the
                                  Cambridge capability computer  . . . . . 24--28
                  D. C. Gilbert   Modeling spin locks with queuing
                                  networks . . . . . . . . . . . . . . . . 29--42
              Jerome H. Saltzer   Research problems of decentralized
                                  systems with largely autonomous nodes    43--52
                       C. Mohan   Survey of recent operating systems
                                  research, designs and implementations    53--89
              Bjarne Stroustrup   On unifying module interfaces  . . . . . 90--98

Operating Systems Review
Volume 12, Number 2, April, 1978

                      Anonymous   Errata . . . . . . . . . . . . . . . . . 11--11
              Jerome H. Saltzer   On digital signatures  . . . . . . . . . 12--14
            F. B. Schneider and   
                A. J. Bernstein   Scheduling in Concurrent Pascal  . . . . 15--20
                  M. Joseph and   
                   V. R. Prasad   More on nested monitor calls . . . . . . 21--25
                   Douglas Cook   The cost of using the CAP computer's
                                  protection facilities  . . . . . . . . . 26--30
              A. D. Birrell and   
                  R. M. Needham   An asynchronous garbage collector for
                                  the CAP filing system  . . . . . . . . . 31--33

Operating Systems Review
Volume 12, Number 3, July, 1978

             Dorothy E. Denning   A note from your secretary-treasurer . . 2--4
         R. Stockton Gaines and   
              Norman Z. Shapiro   Some security principles and their
                                  application to computer security . . . . 19--28
              A. D. Birrell and   
                  R. M. Needham   Character streams  . . . . . . . . . . . 29--31
                 Richard Miller   UNIX: a portable operating system? . . . 32--37
                      Greg Rose   Performance evaluation under Unix and a
                                  study of PDP-11 instruction usage  . . . 38--45
                       J. Lions   An operating system case study . . . . . 46--53
                     Jason Gait   Easy entry: the password encryption
                                  problem  . . . . . . . . . . . . . . . . 54--60
           Janusz Górski   A modular representation of the access
                                  control system . . . . . . . . . . . . . 61--77

Operating Systems Review
Volume 12, Number 4, October, 1978

              Dennis Heimbigner   Writing device drivers in Concurrent
                                  Pascal . . . . . . . . . . . . . . . . . 16--33
               K. Ekanadham and   
                A. J. Bernstein   Some new transitions in hierarchical
                                  level structures . . . . . . . . . . . . 34--38
                 Alan Jay Smith   Bibliography on paging and related
                                  topics . . . . . . . . . . . . . . . . . 39--56


Operating Systems Review
Volume 13, Number 1, January, 1979

               Roger M. Needham   Adding capability access to conventional
                                  file servers . . . . . . . . . . . . . . 3--4
                    J. L. Keedy   On structuring operating systems with
                                  monitors . . . . . . . . . . . . . . . . 5--9
                  K. Hopper and   
               H. J. Kugler and   
                       C. Unger   Abstract machines modelling network
                                  control systems  . . . . . . . . . . . . 10--24

Operating Systems Review
Volume 13, Number 2, April, 1979

              Hugh C. Lauer and   
               Roger M. Needham   On the duality of operating system
                                  structures . . . . . . . . . . . . . . . 3--19
               Mike Blasgen and   
                   Jim Gray and   
                Mike Mitoma and   
                      Tom Price   The convoy phenomenon  . . . . . . . . . 20--25
            Andrew S. Tanenbaum   A method for implementing paged,
                                  segmented virtual memories on
                                  microprogrammable computers  . . . . . . 26--32
                    Glen Newton   Deadlock prevention, detection, and
                                  resolution: an annotated bibliography    33--44

Operating Systems Review
Volume 13, Number 3, July, 1979

             Dorothy E. Denning   A note from your secretary-treasurer . . 1--2
            Henrik Maegaard and   
                Aksel Andreasen   REPOS: An operating system for the
                                  PDP-11 . . . . . . . . . . . . . . . . . 6--11
             Jeffrey A. Barnett   Garbage collection versus swapping . . . 12--17


Operating Systems Review
Volume 14, Number 1, January, 1980

                 B. Hebbard and   
                  P. Grosso and   
               T. Baldridge and   
                    C. Chan and   
                 D. Fishman and   
              P. Goshgarian and   
                  T. Hilton and   
                  J. Hoshen and   
                   K. Hoult and   
                 G. Huntley and   
              M. Stolarchuk and   
                      L. Warner   A penetration analysis of the Michigan
                                  Terminal System  . . . . . . . . . . . . 7--20
          Maurice V. Wilkes and   
               Roger M. Needham   The Cambridge Model Distributed System   21--29

Operating Systems Review
Volume 14, Number 2, April, 1980

           Peter J. Denning and   
                  T. Don Dennis   On minimizing contention at semaphores   9--16
                   M. W. Wilkes   A new hardware capability architecture   17--20
                  Trevor Turton   The management of operating system state
                                  data . . . . . . . . . . . . . . . . . . 21--24
                   N. Natarajan   Atomic actions and timestamps  . . . . . 25--27
                Andrew Klossner   A parallel between operating system and
                                  human government . . . . . . . . . . . . 28--31

Operating Systems Review
Volume 14, Number 3, July, 1980

             Dorothy E. Denning   A note from your secretary-treasurer . . 2--4
                  Neta Amit and   
                    Micha Hofri   A simple semaphore-queue management for
                                  multiprocessing systems  . . . . . . . . 13--15
                  N. D. Francis   Simulation of operating systems: a
                                  functional flowchart . . . . . . . . . . 16--21
               Charles Hoch and   
                   J. C. Browne   An implementation of capabilities on the
                                  PDP-11/45  . . . . . . . . . . . . . . . 22--32
                 Anita K. Jones   Capability architecture revisited  . . . 33--35
            Dan Oestreicher and   
                  J. I. Strauss   A set of efficient semaphoring
                                  instructions . . . . . . . . . . . . . . 36--45
         W. David Sincoskie and   
                David J. Farber   SODS/OS: a distributed operating system
                                  for the IBM Series/1 . . . . . . . . . . 46--54
                 H. Sturgis and   
                J. Mitchell and   
                      J. Israel   Issues in the design and use of a
                                  distributed file system  . . . . . . . . 55--69
               Sun Zhongxiu and   
                     Xie Li and   
               Fei Xianglin and   
                  Yi Wenguo and   
                    Tan Yaoming   An introduction to DJS200/XT1  . . . . . 70--74

Operating Systems Review
Volume 14, Number 4, October, 1980

                G. J. Myers and   
            B. R. S. Buckingham   A hardware implementation of
                                  capability-based addressing  . . . . . . 13--25
                    Jeremy Dion   The Cambridge File Server  . . . . . . . 26--35
              N. H. Garnett and   
                  R. M. Needham   An asynchronous garbage collector for
                                  the Cambridge File Server  . . . . . . . 36--40
                    Carl Dellar   Removing backing store administration
                                  from the CAP operating system  . . . . . 41--49
               H. Wettstein and   
                     G. Merbeth   The concept of asynchronization  . . . . 50--70
           Peter J. Denning and   
                Harold S. Stone   An exchange of views on operating
                                  systems courses  . . . . . . . . . . . . 71--82


Operating Systems Review
Volume 15, Number 1, January, 1981

            A. L. Wilkinson and   
             D. H. Anderson and   
                D. P. Chang and   
               Lee Hock Hin and   
                 A. J. Mayo and   
                I. T. Viney and   
                R. Williams and   
                      W. Wright   A penetration analysis of a Burroughs
                                  Large System . . . . . . . . . . . . . . 14--25
               Brett D. Fleisch   An architecture for pup services on a
                                  distributed operating system . . . . . . 26--44
                Johannes Madsen   A computer system supporting data
                                  abstraction  . . . . . . . . . . . . . . 45--72

Operating Systems Review
Volume 15, Number 2, April, 1981

          Bruce Light Hillsberg   Generic terminal support . . . . . . . . 10--15
                    K. Lunn and   
                  K. H. Bennett   An algorithm for resource location in a
                                  loosely linked distributed computer
                                  system . . . . . . . . . . . . . . . . . 16--20
              Barton Miller and   
                 David Presotto   XOS: an operating system for the X-tree
                                  architecture . . . . . . . . . . . . . . 21--32
                  D. C. Lindsay   On binding layers of software  . . . . . 33--37
                Johannes Madsen   A computer system supporting data
                                  abstraction  . . . . . . . . . . . . . . 38--78

Operating Systems Review
Volume 15, Number 3, July, 1981

                 Liba Svobodova   Performance monitoring in computer
                                  systems: a structured approach . . . . . 39--50
        Andrew S. Tanenbaum and   
              Sape J. Mullender   An overview of the Amoeba distributed
                                  operating system . . . . . . . . . . . . 51--64

Operating Systems Review
Volume 15, Number 4, October, 1981

             Gregory R. Andrews   A note from your secretary-treasurer . . 1--2
                   P. A. Janson   Using type-extension to organize
                                  virtual-memory mechanisms  . . . . . . . 6--38
               John Sanguinetti   The use of the monitor call instruction
                                  to implement domain switching in the IBM
                                  370 architecture . . . . . . . . . . . . 55--61
                     Jean Bacon   An approach to distributed software
                                  systems  . . . . . . . . . . . . . . . . 62--74
             Kirk A. Bailey and   
                Lee Boynton and   
           Paul E. McKenney and   
             Gary J. Oliver and   
                     Dave Regan   User defined files . . . . . . . . . . . 75--84

Operating Systems Review
Volume 15, Number 5, December, 1981

           Arthur Bernstein and   
            Paul K. Harter, Jr.   Proving real-time properties of programs
                                  with temporal logic  . . . . . . . . . . 1--11
                   J. M. Rushby   Design and verification of secure
                                  systems  . . . . . . . . . . . . . . . . 12--21
               Joel F. Bartlett   A NonStop kernel . . . . . . . . . . . . 22--29
                  Hugh C. Lauer   Observations on the development of an
                                  operating system . . . . . . . . . . . . 30--36
                M. Fridrich and   
                       W. Older   The Felix File Server  . . . . . . . . . 37--44
          James G. Mitchell and   
                    Jeremy Dion   A comparison of two network-based file
                                  servers  . . . . . . . . . . . . . . . . 45--46
                 Liba Svobodova   A reliable object-oriented data
                                  repository for a distributed computer
                                  system . . . . . . . . . . . . . . . . . 47--58
              A. J. Herbert and   
                  R. M. Needham   Sequencing computation steps in a
                                  network  . . . . . . . . . . . . . . . . 59--63
          Richard F. Rashid and   
            George G. Robertson   Accent: A communication oriented network
                                  operating system kernel  . . . . . . . . 64--75
              Alfred Z. Spector   Performing remote operations efficiently
                                  on a local computer network  . . . . . . 76--77
      Özalp Babao\uglu and   
                    William Joy   Converting a swap-based system to do
                                  paging in an architecture lacking
                                  page-referenced bits . . . . . . . . . . 78--86
            Richard W. Carr and   
               John L. Hennessy   WSCLOCK---a simple and effective
                                  algorithm for virtual memory management  87--95
              M. Satyanarayanan   A study of file sizes and functional
                                  lifetimes  . . . . . . . . . . . . . . . 96--108
                    Matt Bishop   Hierarchical Take-Grant Protection
                                  systems  . . . . . . . . . . . . . . . . 109--122
               David K. Gifford   Cryptographic sealing for information
                                  secrecy and authentication . . . . . . . 123--124
              George W. Cox and   
          William M. Corwin and   
              Konrad K. Lai and   
                Fred J. Pollack   A unified model and implementation for
                                  interprocess communication in a
                                  multiprocessor environment . . . . . . . 125--126
              Kevin C. Kahn and   
          William M. Corwin and   
              T. Don Dennis and   
             Herman D'Hooge and   
             David E. Hubka and   
          Linda A. Hutchins and   
           John T. Montague and   
                Fred J. Pollack   iMAX: A multiprocessor operating system
                                  for an object-based computer . . . . . . 127--136
            Fred J. Pollack and   
              Kevin C. Kahn and   
               Roy M. Wilkinson   The iMAX-432 object filing system  . . . 137--147
         Edward D. Lazowska and   
              Henry M. Levy and   
               Guy T. Almes and   
         Michael J. Fischer and   
           Robert J. Fowler and   
              Stephen C. Vestal   The architecture of the Eden system  . . 148--159
           G. W. R. Luderer and   
                     H. Che and   
             J. P. Haggerty and   
              P. A. Kirslis and   
                 W. T. Marshall   A distributed UNIX system based on a
                                  virtual circuit switch . . . . . . . . . 160--168
                   G. Popek and   
                  B. Walker and   
                    J. Chow and   
                 D. Edwards and   
                   C. Kline and   
                 G. Rudisin and   
                       G. Thiel   LOCUS a network transparent, high
                                  reliability distributed system . . . . . 169--177
          Andrew D. Birrell and   
                  Roy Levin and   
           Roger M. Needham and   
           Michael D. Schroeder   Grapevine: An exercise in distributed
                                  computing  . . . . . . . . . . . . . . . 178--179
           Norman Meyrowitz and   
                 Margaret Moser   BRUWIN: An adaptable design strategy for
                                  window manager/virtual terminal systems  180--189


Operating Systems Review
Volume 16, Number 1, January, 1982

                     R. C. Holt   Tunis: a Unix look-alike written in
                                  concurrent Euclid (abstract) . . . . . . 4--5
                     S. P. Rana   Triple-handed dining philosophers  . . . 6--9
       Richard M. Weatherly and   
              James F. Leathrum   Efficient semaphore management using
                                  read/modify/write memory cycles  . . . . 10--13
                 S. Tucker Taft   An object-based virtual operating system
                                  for the Ada programming support
                                  environment  . . . . . . . . . . . . . . 14--25
                  D. M. Nessett   Identifier protection in a distributed
                                  operating system . . . . . . . . . . . . 26--31
                James D. Mooney   USIM: a user interface manager . . . . . 32--40

Operating Systems Review
Volume 16, Number 2, April, 1982

               H. S. M. Kruijer   Processor management in a concurrent
                                  Pascal kernel  . . . . . . . . . . . . . 7--17
                J. M. Adams and   
                    A. P. Black   On proof rules for monitors  . . . . . . 18--27

Operating Systems Review
Volume 16, Number 3, July, 1982

               Krishna Kant and   
           Abraham Silberschatz   On the generalized critical region
                                  construct  . . . . . . . . . . . . . . . 4--16

Operating Systems Review
Volume 16, Number 4, October, 1982

                 John H. Howard   Reply to \em ``On Proof Rules for
                                  Monitors'' . . . . . . . . . . . . . . . 8--9
                  J. R. Metzner   Structuring operating systems literature
                                  for the graduate course  . . . . . . . . 10--25
              Irving L. Traiger   Virtual memory management for database
                                  systems  . . . . . . . . . . . . . . . . 26--48
                C. Gray Girling   Object representation on a heterogeneous
                                  network  . . . . . . . . . . . . . . . . 49--59
                   M. E. Harper   Mutual exclusion within both software-
                                  and hardware-driven kernel primitives    60--68


Operating Systems Review
Volume 17, Number 1, January, 1983

             Gregory R. Andrews   Report to the SIGOPS membership  . . . . 2--3
                          Staff   Review of \em ``Probability and
                                  statistics with reliability, queueing
                                  and computer science applications'' by
                                  Kishor S. Trivedi. Prentice-Hall,
                                  Englewood-Cliffs, 1982 . . . . . . . . . 9--9
                 Pearl Brereton   Detection and resolution of
                                  inconsistencies among distributed
                                  replicates of files  . . . . . . . . . . 10--15
              R. M. Needham and   
              A. J. Herbert and   
                 J. G. Mitchell   How to connect stable memory to a
                                  computer . . . . . . . . . . . . . . . . 16--16
           Sandra A. Mamrak and   
           Dennis Leinbaugh and   
                   Toby S. Berk   A progress report on the Desperanto
                                  research project: software support for
                                  distributed processing . . . . . . . . . 17--29
                Peter Peinl and   
                 Andreas Reuter   Synchronizing multiple database
                                  processes in a tightly coupled
                                  multiprocessor environment . . . . . . . 30--37

Operating Systems Review
Volume 17, Number 2, April, 1983

               William M. Waite   Reviews of ``\em Medusa, A Distributed
                                  Operating System by John K.
                                  Ousterhout'', Harold S. Stone, Series
                                  Editor. UMI Research Pres, University
                                  Microfilms International, Ann Arbor,
                                  Michigan, 1981 . . . . . . . . . . . . . 9--10
               William M. Waite   Reviews of ``\em Probability and
                                  Statistics with Reliability, Queueing
                                  and Computer Science Applications by
                                  Kishor S. Trivedi'', Prentice-Hall,
                                  Englewood-Cliffs, 1982 . . . . . . . . . 10--10
                   Krishna Kant   Efficient local checkpointing for
                                  software fault tolerance . . . . . . . . 11--13
               Brett D. Fleisch   Operating systems: a perspective on
                                  future trends  . . . . . . . . . . . . . 14--17
          Alfred Z. Spector and   
               Peter M. Schwarz   Transactions: a construct for reliable
                                  distributed computing  . . . . . . . . . 18--35

Operating Systems Review
Volume 17, Number 3, July, 1983

                Bruce K. Haddon   Review of \em ``Technical aspects of
                                  data communication'': (second edition)
                                  by John E. McNamara. Digital Press,
                                  Educational Services, Digital Equipment
                                  Corporation, Bedford, Massachusetts,
                                  1982 . . . . . . . . . . . . . . . . . . 7--7
                   J. L. Tuggle   Review of ``Planning for future market
                                  events using data processing support by
                                  Jerome Svigals.'' Macmillan Inc. 1983    8--8
         Jeffrey A. Barnett and   
            Alvin S. Cooperband   Priority is a limited property . . . . . 9--9
              Ian H. Witten and   
       Graham M. Birtwistle and   
                John Cleary and   
              David R. Hill and   
             Danny Levinson and   
                 Greg Lomow and   
               Radford Neal and   
            Murray Peterson and   
             Brian W. Unger and   
                   Brian Wyvill   Jade: a distributed software prototyping
                                  environment  . . . . . . . . . . . . . . 10--23
                 H. Schmutz and   
                 P. Silberbusch   Working sets and near-optimality . . . . 24--29
               Sun Zhongxiu and   
                   Zhang Du and   
                     Yan Peigen   ZCZOS: a distributed operating system
                                  for a LSI-11 microcomputer network . . . 30--34
              Per Brinch Hansen   Using personal computers in operating
                                  system courses . . . . . . . . . . . . . 41--44

Operating Systems Review
Volume 17, Number 4, October, 1983

              Dieter Zöbel   The Deadlock problem: a classifying
                                  bibliography . . . . . . . . . . . . . . 6--15

Operating Systems Review
Volume 17, Number 5, October, 1983

           Bruce G. Lindsay and   
              Laura M. Haas and   
              Paul F. Wilms and   
                 Robert A. Yost   Computation & communication in R: a
                                  distributed database manager . . . . . . 1--2
          Andrew D. Birrell and   
               Bruce Jay Nelson   Implementing Remote procedure calls  . . 3--3
                Andrew P. Black   An asymmetric stream communication
                                  system . . . . . . . . . . . . . . . . . 4--10
                Daniel H. Craft   Resource management in a decentralized
                                  system . . . . . . . . . . . . . . . . . 11--19
       Loretta Guarino Reid and   
              Philip L. Karlton   A file system supporting cooperation
                                  between programs . . . . . . . . . . . . 20--29
               C. J. Stephenson   New methods for dynamic storage
                                  allocation (Fast Fits) . . . . . . . . . 30--32
              Butler W. Lampson   Hints for computer system design . . . . 33--48
               Bruce Walker and   
               Gerald Popek and   
             Robert English and   
              Charles Kline and   
                     Greg Thiel   The LOCUS distributed operating system   49--70
            Erik T. Mueller and   
           Johanna D. Moore and   
                Gerald J. Popek   A nested transaction mechanism for LOCUS 71--89
                 Anita Borg and   
               Jim Baumbach and   
                     Sam Glazer   A message system supporting fault
                                  tolerance  . . . . . . . . . . . . . . . 90--99
          Michael L. Powell and   
              David L. Presotto   Publishing: a reliable broadcast
                                  communication mechanism  . . . . . . . . 100--109
          Michael L. Powell and   
               Barton P. Miller   Process migration in DEMOS/MP  . . . . . 110--119
           M. F. Richardson and   
                  R. M. Needham   The TRIPOS filing machine, a front end
                                  to a file server . . . . . . . . . . . . 120--128
          David R. Cheriton and   
               Willy Zwaenepoel   The distributed V kernel and its
                                  performance for diskless workstations    129--140
       Michael D. Schroeder and   
          Andrew D. Birrell and   
               Roger M. Needham   Experience with Grapevine (Summary): the
                                  growth of a distributed system . . . . . 141--142
          Jonathan M. Silverman   Reflections on the verification of the
                                  security of an operating system kernel   143--154


Operating Systems Review
Volume 18, Number 1, January, 1984

            Krishna M. Kavi and   
                K. Krishnamohan   Architecture quality . . . . . . . . . . 11--19
                   Kenneth Owen   Data communications: IFIP's
                                  international ``network'' of experts . . 20--26

Operating Systems Review
Volume 18, Number 2, April, 1984

                   J. W. Atwood   Use of Tunis in an operating systems
                                  design course  . . . . . . . . . . . . . 6--7
            Michael Stonebraker   Virtual memory transaction management    8--16

Operating Systems Review
Volume 18, Number 3, July, 1984

                Bruce K. Haddon   Book review of ``Security, IFIP/Sec'83:
                                  proceedings of the first security
                                  conference'' North-Holland Publishing
                                  Co. 1983 . . . . . . . . . . . . . . . . 14--14
                  John R. Sopka   National parallel processing research
                                  council executive committee charter  . . 25--27
              Francis C. M. Lau   Two-part names and process termination   28--30
            Richard LeRoy Routh   A proposal for an architectural approach
                                  which apparently solves all known
                                  software-based internal computer
                                  security problems  . . . . . . . . . . . 31--39

Operating Systems Review
Volume 18, Number 4, October, 1984

                    Swamy Kutti   Why a distributed kernel?  . . . . . . . 5--11
              David R. Cheriton   An experiment using registers for fast
                                  message-based interprocess communication 12--20


Operating Systems Review
Volume 19, Number 1, January, 1985

               David C. M. Wood   Review of ``VAX/VMS Internals and Data
                                  Structures by Lawrence J. Kenah and
                                  Simon F. Bate'', Digital Press,
                                  Educational Services, Digital Equipment
                                  Corporation, Bedford, Massachusetts
                                  (1984), ISBN 0-932376-52-5.  . . . . . . 5--5
        Michael Stonebraker and   
        Deborah DuBourdieux and   
                William Edwards   Problems in supporting data base
                                  transactions in an operating system
                                  transaction manager  . . . . . . . . . . 6--14
                       Anna Hac   Distributed file systems --- a survey    15--18
               William E. Weihl   Data-dependent concurrency control and
                                  recovery . . . . . . . . . . . . . . . . 19--31
              J. E. Allchin and   
                 M. S. McKendry   Synchronization and recovery of actions  32--45
                  Arun Lakhotia   Implication and equivalence I/O  . . . . 46--52
                 Kamaljit Singh   On improvements to password security . . 53--60

Operating Systems Review
Volume 19, Number 2, April, 1985

                  Kevin C. Kahn   Financial report to the SIGOPS
                                  membership . . . . . . . . . . . . . . . 2--2
                   C. Mohan and   
                     B. Lindsay   Efficient commit protocols for the tree
                                  of processes model of distributed
                                  transactions . . . . . . . . . . . . . . 40--52
             Nissim Francez and   
                 Brent Hailpern   Script: a communication abstraction
                                  mechanism  . . . . . . . . . . . . . . . 53--67

Operating Systems Review
Volume 19, Number 3, July, 1985

                     C. K. Yuen   On programs, tasks and processes . . . . 7--8
                  Keith Loepere   Resolving covert channels within a B2
                                  class secure system  . . . . . . . . . . 9--28
                   C. Mohan and   
                  R. Strong and   
                 S. Finkelstein   Method for distributed transaction
                                  commit and recovery using Byzantine
                                  Agreement within clusters of processors  29--43
             Keith Marzullo and   
                   Susan Owicki   Maintaining the time in a distributed
                                  system . . . . . . . . . . . . . . . . . 44--54
              Lindsey L. Spratt   The transaction resolution journal:
                                  extending the before journal . . . . . . 55--62

Operating Systems Review
Volume 19, Number 4, October, 1985

                Bruce K. Haddon   Review of \em ``Information systems
                                  design methodologies: a feature
                                  analysis''. Edited by T. W. Olle, H. G.
                                  Sol, and C. J. Tully. North-Holland
                                  Publishing Co. 1983  . . . . . . . . . . 4--5
                   Norman Hardy   KeyKOS architecture  . . . . . . . . . . 8--25
              David R. Cheriton   Preliminary thoughts on problem-oriented
                                  shared memory: a decentralized approach
                                  to distributed systems . . . . . . . . . 26--33
                 Leslie Lamport   Solved problems, unsolved problems and
                                  non-problems in concurrency  . . . . . . 34--44
            Jonathan Kepecs and   
                 Marvin Solomon   SODA: a simplified operating system for
                                  distributed applications . . . . . . . . 45--56

Operating Systems Review
Volume 19, Number 5, December, 1985

        Nancy P. Kronenberg and   
              Henry M. Levy and   
            William D. Strecker   VAXclusters (extended abstract): a
                                  closely-coupled distributed system . . . 1--1
          Marvin M. Theimer and   
             Keith A. Lantz and   
              David R. Cheriton   Preemptable remote execution facilities
                                  for the V-system . . . . . . . . . . . . 2--12
          Robert Fitzgerald and   
              Richard F. Rashid   The integration of virtual memory
                                  management and interprocess
                                  communication in accent (abstract only)  13--14
         John K. Ousterhout and   
      Hervé Da Costa and   
             David Harrison and   
              John A. Kunze and   
                Mike Kupfer and   
              James G. Thompson   A trace-driven analysis of the UNIX 4.2
                                  BSD file system  . . . . . . . . . . . . 15--24
       Michael D. Schroeder and   
           David K. Gifford and   
               Roger M. Needham   A caching file system for a programmer's
                                  workstation  . . . . . . . . . . . . . . 25--34
          M. Satyanarayanan and   
             John H. Howard and   
           David A. Nichols and   
       Robert N. Sidebotham and   
          Alfred Z. Spector and   
                Michael J. West   The ITC distributed file system:
                                  principles and design  . . . . . . . . . 35--50
          Sape J. Mullender and   
            Andrew S. Tanenbaum   A distributed file service based on
                                  optimistic concurrency control . . . . . 51--62
                 Eric C. Cooper   Replicated distributed programs  . . . . 63--78
              Kenneth P. Birman   Replication and fault-tolerance in the
                                  ISIS system  . . . . . . . . . . . . . . 79--86
           Dan\vco Dav\vcev and   
             Walter A. Burkhard   Consistency and recovery control for
                                  replicated files . . . . . . . . . . . . 87--96
           Mohammad Malkawi and   
                    Janek Patel   Compiler directed memory management
                                  policy for numerical programs  . . . . . 97--106
                Steve Reinhardt   A data-flow approach to multitasking on
                                  CRAY X-MP computers  . . . . . . . . . . 107--114
       Matthew J. Weinstein and   
        Thomas W. Page, Jr. and   
           Brian K. Livezey and   
                Gerald J. Popek   Transactions and synchronization in a
                                  distributed operating system . . . . . . 115--126
          Alfred Z. Spector and   
               Dean Daniels and   
             Daniel Duchamp and   
        Jeffrey L. Eppinger and   
                   Randy Pausch   Distributed transactions for reliable
                                  systems  . . . . . . . . . . . . . . . . 127--146
               Brian M. Oki and   
          Barbara H. Liskov and   
            Robert W. Scheifler   Reliable object storage to support
                                  atomic actions . . . . . . . . . . . . . 147--159
          Nicholas Carriero and   
                David Gelernter   The S/Net's Linda kernel (extended
                                  abstract)  . . . . . . . . . . . . . . . 160--160
           David K. Gifford and   
          Robert W. Baldwin and   
          Stephen T. Berlin and   
               John M. Lucassen   An architecture for large scale
                                  information systems  . . . . . . . . . . 161--170
                 David D. Clark   The structuring of systems using upcalls 171--180
                Andrew P. Black   Supporting distributed applications:
                                  experience with Eden . . . . . . . . . . 181--193


Operating Systems Review
Volume 20, Number 1, January, 1986

                      Anonymous   Financial Report . . . . . . . . . . . . 4--4
                   Harold Lorin   An expanded approach to objects  . . . . 6--11
               P. Singleton and   
              K. H. Bennett and   
                 O. P. Brereton   A single model for files and processes   12--18
                  M. Ancona and   
                A. Clematis and   
                    V. Gianuzzi   Interfacing user processes and kernel in
                                  high level language  . . . . . . . . . . 19--23
          Alfred Z. Spector and   
                   Dean Daniels   An algorithm for replicated directories  24--43
                 Eric C. Cooper   Replicated procedure call  . . . . . . . 44--56
             Gene T. J. Wuu and   
            Arthur J. Bernstein   Efficient solutions to the replicated
                                  log and dictionary problems  . . . . . . 57--66

Operating Systems Review
Volume 20, Number 2, April, 1986

                Joanne L. Waite   Book Review: \em A Handbook of Software
                                  Development and Operating Procedures for
                                  Micro computers by Paul Holliday
                                  (Macmillan Publishing Company 1985)  . . 6--7
                    S. J. Pratt   The alchemy model: a model for
                                  homogeneous and heterogeneous
                                  distributed computing system . . . . . . 25--37
           Jeffrey A. Brumfield   A Guide To Operating Systems Literature  38--42
             Keith A. Lantz and   
         Judy L. Edighoffer and   
                Bruce L. Hitson   Towards a universal directory service    43--53
          Sape J. Mullender and   
             Paul M. B. Vitanyi   Distributed match-making for processes
                                  in computer networks . . . . . . . . . . 54--64

Operating Systems Review
Volume 20, Number 3, July, 1986

                  Robert Sansom   Book Review: \em Computer Security: A
                                  Global Challenge --- Proceedings of the
                                  Second IFIP International Conference on
                                  Computer Security, IFIP/Sec'84, Toronto,
                                  Ontario, Canada, 10--12 September, 1984:
                                  (Elsevier Science Publishing Co. 1984)   9--9
             Leslie Lamport and   
            P. M. Melliar Smith   Byzantine clock synchronization  . . . . 10--16
               David Cheung and   
                    Tiko Kameda   Site optimal termination protocols for a
                                  distributed database under network
                                  partitioning . . . . . . . . . . . . . . 17--27
                  I. Rattan and   
                 L. P. S. Singh   On table fragmentation in virtual memory
                                  management . . . . . . . . . . . . . . . 28--30
                Maurice Herlihy   Comparing how atomicity mechanisms
                                  support replication  . . . . . . . . . . 31--39

Operating Systems Review
Volume 20, Number 4, October, 1986

                   Du Zhang and   
                      Meiliu Lu   Process name resolution in
                                  fault-intolerant CSP programs  . . . . . 9--15
           Amos O. Olagunju and   
                  Elvis Borders   Emulators; prospective instruments for
                                  instruction in systems programming . . . 16--24


Operating Systems Review
Volume 21, Number 1, January, 1987

               Thomas F. Litant   Book Review: \em Computer Security: the
                                  Practical Issues in a Troubled World,
                                  (Elsevier Science Publishers, Amsterdam
                                  1985)  . . . . . . . . . . . . . . . . . 3--5
              R. M. Needham and   
                M. D. Schroeder   Authentication revisited . . . . . . . . 7--7
                 Dave Otway and   
                      Owen Rees   Efficient and timely mutual
                                  authentication . . . . . . . . . . . . . 8--10
              John R. Nicol and   
            Gordon S. Blair and   
               Jonathan Walpole   Operating system design: towards a
                                  holistic approach? . . . . . . . . . . . 11--19
            Andrew S. Tanenbaum   A UNIX clone with source code for
                                  operating systems courses  . . . . . . . 20--29
                 G. R. Guenther   Running 7th edition UNIX programs on a
                                  VAX in compatibility mode  . . . . . . . 30--33
                      I. Rattan   Memory management units for
                                  microcomputer operating systems  . . . . 34--38
          Rogert G. Ruckert and   
                   John D. Dean   Launching a successful CPME program in a
                                  multi-vendor environment . . . . . . . . 39--48
                 Sape Mullender   Report on the Second European SIGOPS
                                  Workshop ``Making Distributed Systems
                                  Work'' . . . . . . . . . . . . . . . . . 49--84

Operating Systems Review
Volume 21, Number 2, April, 1987

                 Sten F. Andler   Financial report . . . . . . . . . . . . 3--4
                Martin Turnbull   Support for heterogeneity in the global
                                  distributed operating system . . . . . . 11--22
                    S. J. Pratt   Catastrophe theory: its application in
                                  operating system design  . . . . . . . . 23--32
                Maurice Herlihy   Optimistic concurrency control for
                                  abstract data types  . . . . . . . . . . 33--44

Operating Systems Review
Volume 21, Number 3, July, 1987

               Robert L. Gordon   Window management, graphics, and
                                  operating systems  . . . . . . . . . . . 5--8
               Roy Campbell and   
             Garry Johnston and   
                  Vincent Russo   Choices (class hierarchical open
                                  interface for custom embedded systems)   9--17
           Charles H. Sauer and   
             Don W. Johnson and   
            Larry K. Loucks and   
      Amal A. Shaheen-Gouda and   
                  Todd A. Smith   RT PC distributed services overview  . . 18--29
              Timothy V. Fossum   PC-XINU features and installation  . . . 30--33

Operating Systems Review
Volume 21, Number 4, October, 1987

                  Niklaus Wirth   Hardware architectures for programming
                                  languages and programming languages for
                                  hardware architectures . . . . . . . . . 2--8
                   Bob Beck and   
                 Bob Kasten and   
              Shreekant Thakkar   VLSI assist for a multiprocessor . . . . 10--20
            Roberto Bisiani and   
               Alessandro Forin   Architectural support for multilanguage
                                  parallel programming on heterogeneous
                                  systems  . . . . . . . . . . . . . . . . 21--30
             Richard Rashid and   
            Avadis Tevanian and   
              Michael Young and   
                David Golub and   
                   Robert Baron   Machine-independent virtual memory
                                  management for paged uniprocessor and
                                  multiprocessor architectures . . . . . . 31--39
              John R. Hayes and   
          Martin E. Fraeman and   
         Robert L. Williams and   
                 Thomas Zaremba   An architecture for the direct execution
                                  of the Forth programming language  . . . 42--49
           Peter Steenkiste and   
                  John Hennessy   Tags and type checking in LISP: hardware
                                  and software approaches  . . . . . . . . 50--59
           Jack W. Davidson and   
             Richard A. Vaughan   The effect of instruction set complexity
                                  on program size and memory performance   60--64
        Russell R. Atkinson and   
            Edward M. McCreight   The dragon processor . . . . . . . . . . 65--69
               James R. Goodman   Coherency for multiprocessor virtual
                                  address caches . . . . . . . . . . . . . 72--81
              T. A. Cargill and   
                 B. N. Locanthi   Cheap hardware support for software
                                  debugging and profiling  . . . . . . . . 82--83
             C. J. Georgiou and   
               S. L. Palmer and   
                P. L. Rosenfeld   An experimental coprocessor for
                                  implementing persistent objects on an
                                  IBM 4381 . . . . . . . . . . . . . . . . 84--87
      Daniel J. Magenheimer and   
                 Liz Peters and   
                Karl Pettis and   
                      Dan Zuras   Integer multiplication and division on
                                  the HP precision architecture  . . . . . 90--99
              David W. Wall and   
              Michael L. Powell   The Mahler experience: using an
                                  intermediate language as the machine
                                  description  . . . . . . . . . . . . . . 100--104
               Shlomo Weiss and   
                 James E. Smith   A study of scalar compilation techniques
                                  for pipelined supercomputers . . . . . . 105--109
            William R. Bush and   
            A. Dain Samples and   
                David Ungar and   
              Paul N. Hilfinger   Compiling Smalltalk-80 to a RISC . . . . 112--116
                    F. Chow and   
                 S. Correll and   
              M. Himelstein and   
                 E. Killian and   
                       L. Weber   How many addressing modes are enough?    117--121
                 Henry Massalin   Superoptimizer: a look at the smallest
                                  program  . . . . . . . . . . . . . . . . 122--126
                 Kazuo Taki and   
           Katzuto Nakajima and   
          Hiroshi Nakashima and   
                 Morihiro Ikeda   Performance and architectural evaluation
                                  of the PSI machine . . . . . . . . . . . 128--135
          Gaetano Borriello and   
        Andrew R. Cherenson and   
            Peter B. Danzig and   
              Michael N. Nelson   RISCs vs. CISCs for Prolog: a case study 136--145
            Richard B. Kieburtz   A RISC architecture for symbolic
                                  computation  . . . . . . . . . . . . . . 146--155
            David R. Ditzel and   
         Hubert R. McLellan and   
              Alan D. Berenbaum   Design tradeoffs to support the C
                                  programming language in the CRISP
                                  microprocessor . . . . . . . . . . . . . 158--163
         Charles P. Thacker and   
            Lawrence C. Stewart   Firefly: a multiprocessor workstation    164--172
               Douglas W. Clark   Pipelining and performance in the VAX
                                  8800 processor . . . . . . . . . . . . . 173--177
          Robert P. Colwell and   
              Robert P. Nix and   
          John J. O'Donnell and   
          David B. Papworth and   
                 Paul K. Rodman   A VLIW architecture for a trace
                                  scheduling compiler  . . . . . . . . . . 180--192
             Adam Levinthal and   
               Pat Hanrahan and   
              Mike Paquette and   
                     Jim Lawson   Parallel computers for graphics
                                  applications . . . . . . . . . . . . . . 193--198
                J. E. Smith and   
               G. E. Dermer and   
           B. D. Vanderwarn and   
              S. D. Klinger and   
                 C. M. Rozewski   The ZS-1 central processor . . . . . . . 199--204

Operating Systems Review
Volume 21, Number 5, November, 1987

                  J. Howard and   
                   M. Kazar and   
                  S. Menees and   
                 D. Nichols and   
          M. Satyanarayanan and   
       Robert N. Sidebotham and   
                        M. West   Scale and performance in a distributed
                                  file system  . . . . . . . . . . . . . . 1--2
                  M. Nelson and   
                   B. Welch and   
                  J. Ousterhout   Caching in the Sprite network file
                                  system . . . . . . . . . . . . . . . . . 3--4
                     D. Nichols   Using idle workstations in a shared
                                  computing environment  . . . . . . . . . 5--12
                       E. Zayas   Attacking the process migration
                                  bottleneck . . . . . . . . . . . . . . . 13--24
                G. Varghese and   
                       T. Lauck   Hashed and hierarchical timing wheels:
                                  data structures for the efficient
                                  implementation of a timer facility . . . 25--38
                   J. Mogul and   
                  R. Rashid and   
                     M. Accetta   The packer filter: an efficient
                                  mechanism for user-level network code    39--51
                M. Schwartz and   
                J. Zahorjan and   
                      D. Notkin   A name service for evolving
                                  heterogeneous systems  . . . . . . . . . 52--62
                   M. Young and   
                A. Tevanian and   
                  R. Rashid and   
                   D. Golub and   
                    J. Eppinger   The duality of memory and communication
                                  in the implementation of a
                                  multiprocessor operating system  . . . . 63--76
               D. Jefferson and   
                 B. Beckman and   
                 F. Wieland and   
                   L. Blume and   
                    M. Diloreto   Distributed Simulation and the Time Warp
                                  Operating System . . . . . . . . . . . . 77--93
                 A. Birrell and   
                  J. Guttag and   
                 J. Horning and   
                       R. Levin   Synchronization primitives for a
                                  multiprocessor: a formal specification   94--102
                   D. Terry and   
                   D. Swinehart   Managing stored voice in the Etherphone
                                  system . . . . . . . . . . . . . . . . . 103--104
                     E. Jul and   
                    H. Levy and   
              N. Hutchinson and   
                       A. Black   Fine-grained mobility in the emerald
                                  system . . . . . . . . . . . . . . . . . 105--106
                  R. Haskin and   
                 Y. Malachi and   
                  W. Sawdon and   
                        G. Chan   Recovery management in QuickSilver . . . 107--108
                   A. Chang and   
                      M. Mergen   801 Storage: architecture and
                                  programming  . . . . . . . . . . . . . . 109--110
                  B. Liskov and   
                  D. Curtis and   
                 P. Johnson and   
                    R. Scheifer   Implementation of Argus  . . . . . . . . 111--122
                  K. Birman and   
                      T. Joseph   Exploiting virtual synchrony in
                                  distributed systems  . . . . . . . . . . 123--138
               R. Finlayson and   
                    D. Cheriton   Log files: an extended file service
                                  exploiting write-once storage  . . . . . 139--148
                 A. Birrell and   
                   M. Jones and   
                      E. Wobber   A simple and efficient implementation of
                                  a small database . . . . . . . . . . . . 149--154
                     R. Hagmann   Reimplementing the Cedar file system
                                  using logging and group commit . . . . . 155--162


Operating Systems Review
Volume 22, Number 1, January, 1988

                Alan Demers and   
                 Dan Greene and   
                Carl Houser and   
                  Wes Irish and   
                John Larson and   
              Scott Shenker and   
             Howard Sturgis and   
              Dan Swinehart and   
                     Doug Terry   Epidemic algorithms for replicated
                                  database maintenance . . . . . . . . . . 8--32
                     R. C. Holt   Device management in TURNING PLUS  . . . 33--41
                     Ami Litman   The DUNIX distributed operating system   42--51
          Dieter Zöbel and   
                 Christoph Koch   Resolution techniques and complexity
                                  results with deadlocks: a classifying
                                  and annotated bibliography . . . . . . . 52--72
                Neil W. Rickert   Non-Byzantine clock synchronization---a
                                  programming experiment . . . . . . . . . 73--78

Operating Systems Review
Volume 22, Number 2, April, 1988

     Daniel A. Cañas and   
              Laura M. Esquivel   Portability and the UNIX operating
                                  system . . . . . . . . . . . . . . . . . 6--23
               Zhongxiu Sun and   
                   Xing Xue and   
             Jianqiang Zhou and   
                Peigen Yang and   
                       Xihao Xu   Developing a heterogeneous distributed
                                  operating system . . . . . . . . . . . . 24--31
                David L. Harris   An input/output subsystem for the Hawk
                                  operating system kernel  . . . . . . . . 32--44
                Stephen Russell   Single-user capabilities in interprocess
                                  communication  . . . . . . . . . . . . . 45--52
                Leszek Kotulski   Comments on implementation of P and V
                                  primitives with help of binary
                                  semaphores . . . . . . . . . . . . . . . 53--59
                  S. Haldar and   
                 D. Subramanian   An efficient solution to the mutual
                                  exclusion problem using unfair and weak
                                  semaphore  . . . . . . . . . . . . . . . 60--66

Operating Systems Review
Volume 22, Number 3, July, 1988

                Carole B. Hogan   Protection imperfect: the security of
                                  some computing environments  . . . . . . 7--27
              Jonathan M. Smith   A survey of process migration mechanisms 28--40
            Anthony J. Dos Reis   A note on Ben-Ari's concurrent
                                  programming system . . . . . . . . . . . 41--42
             David Hemmendinger   A correct implementation of general
                                  semaphores . . . . . . . . . . . . . . . 42--44

Operating Systems Review
Volume 22, Number 4, October, 1988

                      Hank Levy   SIGOPS Financial Report August 1, 1988   1--2
              Grant R. Guenther   Extended control services in operating
                                  system interfaces  . . . . . . . . . . . 20--24
        Robbert van Renesse and   
          Hans van Staveren and   
            Andrew S. Tanenbaum   Performance of the world's fastest
                                  distributed operating system . . . . . . 25--34
                    Codie Wells   A Note on ``Protection Imperfect'' . . . 35--35
                 Norm Hardy and   
                   Norman Hardy   The Confused Deputy: (or why
                                  capabilities might have been invented)   36--38
                    H. Wedekind   Ubiquity and need-to-know: two
                                  principles of data distribution  . . . . 39--45
                    Phil Kearns   A correct and unrestrictive
                                  implementation of general semaphores . . 46--48


Operating Systems Review
Volume 23, Number 1, January, 1989

             David Hemmendinger   Comments on ``A Correct and
                                  Unrestrictive Implementation of General
                                  Semaphores'' . . . . . . . . . . . . . . 7--8
                C. Samuel Hsieh   Further comments on implementation of
                                  general semaphores . . . . . . . . . . . 9--10
            John Ousterhout and   
                   Fred Douglis   Beating the I/O bottleneck: a case for
                                  log-structured file systems  . . . . . . 11--28

Operating Systems Review
Volume 23, Number 2, April, 1989

                J. Kent Peacock   Deadlock avoidance in loosely-coupled
                                  multiprocessors with finite buffer pools 20--24
               Bruno Braban and   
                  Peter Schlenk   A well structured parallel file system
                                  for PM . . . . . . . . . . . . . . . . . 25--38
                  Keith Loepere   The covert channel limiter revisited . . 39--44
                T. F. Leibfried   A deadlock detection and recovery
                                  algorithm using the formalism of a
                                  directed graph matrix  . . . . . . . . . 45--55
                        Li Gong   On security in capability-based systems  56--60

Operating Systems Review
Volume 23, Number 3, July, 1989

                    W. Shih and   
               J. S. W. Liu and   
                   J. Chung and   
                  D. W. Gillies   Scheduling tasks with ready times and
                                  deadlines to minimize average error  . . 14--28
                  H. Tokuda and   
                   C. W. Mercer   ARTS: a distributed real-time kernel . . 29--53
            J. A. Stankovic and   
                 K. Ramamritham   The Spring kernel: a new paradigm for
                                  real-time operating systems  . . . . . . 54--71
              D. D. Kandlur and   
               D. L. Kiskis and   
                     K. G. Shin   HARTOS: a distributed real-time
                                  operating system . . . . . . . . . . . . 72--89
                    S. Levi and   
             S. K. Tripathi and   
               S. D. Carson and   
                 A. K. Agrawala   The MARUTI hard real-time operating
                                  system . . . . . . . . . . . . . . . . . 90--105
                P. Gopinath and   
                      K. Schwan   CHAOS: why one cannot have only an
                                  operating system for real-time
                                  applications . . . . . . . . . . . . . . 106--125
                H. F. Wedde and   
              G. S. Alijani and   
                W. G. Brown and   
                    S. Chen and   
                        G. Kang   Operating system support for adaptive
                                  distributed real-time systems in DRAGON
                                  SLAYER . . . . . . . . . . . . . . . . . 126--140
                    A. Damm and   
               J. Reisinger and   
                 W. Schwabl and   
                      H. Kopetz   The real-time operating system of MARS   141--157
               V. P. Holmes and   
                   D. L. Harris   A designer's perspective of the Hawk
                                  multiprocessor operating system kernel   158--172

Operating Systems Review
Volume 23, Number 4, October, 1989

              Charles R. Landau   Security in a secure capability-based
                                  system . . . . . . . . . . . . . . . . . 2--4
          M. Frans Kaashoek and   
            A. S. Tanenbaum and   
                   S. F. Hummel   An efficient reliable broadcast protocol 5--19
              S. T. Chanson and   
              G. W. Neufeld and   
                       L. Liang   A bibliography on multicast and group
                                  communications . . . . . . . . . . . . . 20--25
           Walter G. Piotrowski   Are file names enough? . . . . . . . . . 26--27
                   B. C. Neuman   The need for closure in large
                                  distributed systems  . . . . . . . . . . 28--30
                     June Power   Distributed system evolution-some
                                  observations . . . . . . . . . . . . . . 31--32
                 J. H. Emck and   
              J. H. Voskamp and   
              A. J. van der Wal   EPEP: an operating system designed for
                                  experiment-control . . . . . . . . . . . 33--44
                Borko Furht and   
                  J. Parker and   
                    D. Grostick   Performance of REAL/IX$^{TM}$-fully
                                  preemptive real time UNIX  . . . . . . . 45--52

Operating Systems Review
Volume 23, Number 5, December, 1989

                 M. Burrows and   
                   M. Abadi and   
                     R. Needham   A logic of authentication  . . . . . . . 1--13
                   T. Lomas and   
                    L. Gong and   
                 J. Saltzer and   
                    R. Needhamn   Reducing risks from poorly chosen keys   14--18
                 W. Bolosky and   
              R. Fitzgerald and   
                       M. Scott   Simple but effective techniques for NUMA
                                  memory management  . . . . . . . . . . . 19--31
                     A. Cox and   
                      R. Fowler   The implementation of a coherent memory
                                  abstraction on a NUMA multiprocessor:
                                  experiences with platinum  . . . . . . . 32--44
              V. Srinivasan and   
                       J. Mogul   Spritely NFS: experiments with
                                  cache-consistency protocols  . . . . . . 44--57
                 D. Edwards and   
                    M. Mckendry   Exploiting read-mostly workloads in the
                                  FileNet file system  . . . . . . . . . . 58--70
              A. Braunstein and   
                   M. Riley and   
                      J. Wilkes   Improving the efficiency of UNIX buffer
                                  caches . . . . . . . . . . . . . . . . . 71--82
               M. Schroeder and   
                     M. Burrows   Performance of Firefly RPC . . . . . . . 83--90
                L. Peterson and   
              N. Hutchinson and   
                S. O'Malley and   
                      M. Abbott   RPC in the x-Kernel: evaluating new
                                  design techniques  . . . . . . . . . . . 91--101
                 B. Bershad and   
                T. Anderson and   
                E. Lazowska and   
                        H. Levy   Lightweight remote procedure call  . . . 102--113
                  M. Weiser and   
                  A. Demers and   
                      C. Hauser   The portable common runtime approach to
                                  interoperability . . . . . . . . . . . . 114--122
              E. Abrossimov and   
                  M. Rozier and   
                     M. Shapiro   Generic virtual memory management for
                                  operating system kernels . . . . . . . . 123--136
                   B. Rosenburg   Low-synchronization translation
                                  lookaside buffer consistency in
                                  large-scale shared-memory
                                  multiprocessors  . . . . . . . . . . . . 137--146
                   J. Chase and   
                  F. Amador and   
                E. Lazowska and   
                    H. Levy and   
                 R. Littlefield   The Amber system: parallel programming
                                  on a network of multiprocessors  . . . . 147--158
                  A. Tucker and   
                       A. Gupta   Process control and scheduling issues
                                  for multiprogrammed shared-memory
                                  multiprocessors  . . . . . . . . . . . . 159--166
                 R. Barkley and   
                         T. Lee   A lazy buddy system bounded by two
                                  coalescing delays  . . . . . . . . . . . 167--176
                     D. Duchamp   Analysis of transaction management
                                  performance  . . . . . . . . . . . . . . 177--190
                H. Massalin and   
                          C. Pu   Threads and input/output in the
                                  synthesis kernel . . . . . . . . . . . . 191--201
                    C. Gray and   
                    D. Cheriton   Leases: an efficient fault-tolerant
                                  mechanism for distributed file cache
                                  consistency  . . . . . . . . . . . . . . 202--210
                 B. Fleisch and   
                       G. Popek   Mirage: a coherent distributed shared
                                  memory design  . . . . . . . . . . . . . 211--223


Operating Systems Review
Volume 24, Number 1, January, 1990

              Rajan G. Chandras   Distributed message passing operating
                                  systems  . . . . . . . . . . . . . . . . 7--17
                    Micha Hofri   Proof of a mutual exclusion
                                  algorithm---a classic example  . . . . . 18--22
            Peter B. Danzig and   
                 Stephen Melvin   High resolution timing with low
                                  resolution clocks and microsecond
                                  resolution timer for Sun workstations    23--26
          Özalp Babao\uglu   Fault-tolerant computing based on Mach   27--39
              Pankaj Jalote and   
             Satish K. Tripathi   Workshop on integrated approach for
                                  fault tolerance-current state and future
                                  requirements . . . . . . . . . . . . . . 40--57
            Mark J. Lorence and   
              M. Satyanarayanan   IPwatch: a tool for monitoring network
                                  locality . . . . . . . . . . . . . . . . 58--80

Operating Systems Review
Volume 24, Number 2, April, 1990

              Chuck Koelbel and   
              Gene Spafford and   
                   George Leach   Workshop on experiences with building
                                  distributed and multiprocessor systems   2--6
        Christopher Burdorf and   
                      Jed Marti   Non-preemptive time warp scheduling
                                  algorithms . . . . . . . . . . . . . . . 7--18
                    Andy Hopper   Pandora --- an experimental system for
                                  multimedia applications  . . . . . . . . 19--34
                 Dan M. Nessett   A critique of the Burrows, Abadi and
                                  Needham logic  . . . . . . . . . . . . . 35--38
            Michael Burrows and   
        Martín Abadi and   
                  Roger Needham   Rejoinder to Nessett . . . . . . . . . . 39--40
                       Bob Beck   AAMP: a multiprocessor approach for
                                  operating system and application
                                  migration  . . . . . . . . . . . . . . . 41--55
                   Roger Oliver   Protection in a distributed document
                                  processing system  . . . . . . . . . . . 56--65
                Joseph W. Seigh   A distributed solution to the
                                  reader--writer problem . . . . . . . . . 66--68

Operating Systems Review
Volume 24, Number 3, July, 1990

                      Hank Levy   New SIGOPS dues structure  . . . . . . . 1--1
            Luis-Felipe Cabrera   Technical summary of the second IEEE
                                  workshop on workstation operating
                                  systems  . . . . . . . . . . . . . . . . 7--21
               Vadim G. Antonov   A regular architecture for operating
                                  system . . . . . . . . . . . . . . . . . 22--39
              Ming-Chit Tam and   
          Jonathan M. Smith and   
                David J. Farber   A taxonomy-based comparison of several
                                  distributed shared memory systems  . . . 40--67
                  B. H. Tay and   
                   A. L. Ananda   A survey of remote procedure calls . . . 68--79

Operating Systems Review
Volume 24, Number 4, October, 1990

          Andrzej Goscinski and   
                 Mirion Bearman   Resource management in large distributed
                                  systems  . . . . . . . . . . . . . . . . 7--25
                   Chen Jun and   
                     Xie Li and   
                  Sun Zhong-xiu   A model for intelligent task scheduling
                                  in a large distributed system  . . . . . 26--33
                  Zhao Hong and   
                    Wayne McCoy   An associated object model for
                                  distributed systems  . . . . . . . . . . 34--51
                Frank W. Miller   Predictive deadline multi-processing . . 52--63
                  Don Davis and   
                    Ralph Swick   Network security via private-key
                                  certificates . . . . . . . . . . . . . . 64--67
                   H. Ghosh and   
                    S. Sreedhar   A comparative study of two simple
                                  network file access models . . . . . . . 68--77
                    Tai-Kuo Woo   A note on Lamport's mutual exclusion
                                  algorithm  . . . . . . . . . . . . . . . 78--80


Operating Systems Review
Volume 25, Number 1, January, 1991

                  S. Haldar and   
              D. K. Subramanian   Fairness in processor scheduling in time
                                  sharing systems  . . . . . . . . . . . . 4--18
          Özalp Babao\uglu   Report on the fourth ACM SIGOPS European
                                  workshop fault tolerance support in
                                  distributed systems  . . . . . . . . . . 19--43
             Keith Marzullo and   
                      Mark Wood   Making real-time reactive systems
                                  reliable . . . . . . . . . . . . . . . . 45--48
                Rivka Ladin and   
             Barbara Liskov and   
                   Liuba Shrira   Lazy replication: exploiting the
                                  semantics of distributed services
                                  (extended abstract)  . . . . . . . . . . 49--55
                John Wilkes and   
                   Raymie Stata   Specifying data availability in
                                  multi-device file systems  . . . . . . . 56--59
             Barbara Liskov and   
              Robert Gruber and   
               Paul Johnson and   
                   Liuba Shrira   A replicated Unix file system (extended
                                  abstract)  . . . . . . . . . . . . . . . 60--64
               Dean Daniels and   
               Roger Haskin and   
                 Jon Reinke and   
                   Wayne Sawdon   Shared logging services for
                                  fault-tolerant distributed computing . . 65--68
           M. Banâtre and   
                Ph. Joubert and   
                  Ch. Morin and   
                  G. Muller and   
                  B. Rochat and   
                     P. Sanchez   Stable transactional memories and fault
                                  tolerant architectures . . . . . . . . . 68--72
                Andrew P. Black   Understanding transactions in the
                                  operating system context . . . . . . . . 73--76
          James Jay Kistler and   
              M. Satyanarayanan   Transparent disconnected operation for
                                  fault-tolerance  . . . . . . . . . . . . 77--80
              Jerome H. Saltzer   Fault-tolerance in very large archival
                                  systems  . . . . . . . . . . . . . . . . 81--82
                 Andrew Birrell   Position paper for SIGOPS workshop on
                                  fault tolerance support in distributed
                                  systems  . . . . . . . . . . . . . . . . 83--84

Operating Systems Review
Volume 25, Number 2, April, 1991

            Maria D. Maggio and   
                David W. Krumme   A flexible system call interface for
                                  interprocessor communication in a
                                  distributed memory multicomputer . . . . 4--21
            Yasuhiko Yokote and   
              Fumio Teraoka and   
          Atsushi Mitsuzawa and   
          Nobuhisa Fujinami and   
                   Mario Tokoro   The muse object architecture: a new
                                  operating system structuring concept . . 22--46
                  Michel Raynal   A simple taxonomy for distributed mutual
                                  exclusion algorithms . . . . . . . . . . 47--50
             Jochen Liedtke and   
            Ulrich Bartling and   
                  Uwe Beyer and   
          Dietmar Heinrichs and   
              Rudolf Ruland and   
                   Gyula Szalay   Two years of experience with a
                                  $\mu$-kernel based OS  . . . . . . . . . 51--62
        Jonathan D. Moffett and   
               Morris S. Sloman   Content-dependent access control . . . . 63--70
          M. Frans Kaashoek and   
            Andrew S. Tanenbaum   Fault tolerance using group
                                  communication  . . . . . . . . . . . . . 71--74
             Pat Stephenson and   
                 Kenneth Birman   Fast causal multicast  . . . . . . . . . 75--79
                 G. Le Lann and   
                        G. Bres   Reliable atomic broadcast in distributed
                                  systems with omission faults . . . . . . 80--86
              Pascale Minet and   
            Emmanuelle Anceaume   Atomic broadcast in one phase  . . . . . 87--90
                 David F. Bacon   Transparent recovery in distributed
                                  systems (position paper) . . . . . . . . 91--94
                 Mary Baker and   
                John Ousterhout   Availability in the Sprite distributed
                                  file system  . . . . . . . . . . . . . . 95--98
           David B. Johnson and   
               Willy Zwaenepoel   Transparent optimistic rollback recovery 99--102
             Kenneth Birman and   
                  Robert Cooper   The ISIS project: real experience with a
                                  fault tolerant programming system  . . . 103--107
                     Liam Casey   Lessons from Norstar's distributed call
                                  processing system  . . . . . . . . . . . 108--111
                 Gita Gopal and   
              Nancy D. Griffeth   Software fault tolerance in
                                  telecommunications systems . . . . . . . 112--116
                Flaviu Cristian   Fault-Tolerance in the Advanced
                                  Automation System  . . . . . . . . . . . 117--121
            Daniel L. McCue and   
         Santosh K. Shrivastava   Structuring fault-tolerant object
                                  systems for portability  . . . . . . . . 118--121
               David Powell and   
     Marc Chér\`eque and   
                 David Drackley   Fault-tolerance in Delta-4 . . . . . . . 122--125
                  J. Nehmer and   
                      T. Becker   A fault tolerance approach for
                                  distributed ISDN control systems . . . . 126--129
            Brendan Tangney and   
               Vinny Cahill and   
                 Chris Horn and   
             Dominic Herity and   
                 Alan Judge and   
          Gradimir Starovic and   
                  Mark Sheppard   Some ideas on support for fault
                                  tolerance in COMANDOS, an object
                                  oriented distributed system  . . . . . . 130--135

Operating Systems Review
Volume 25, Number 3S, April, 1991

               Andrew Wolfe and   
                   John P. Shen   A variable instruction stream extension
                                  to the VLIW architecture . . . . . . . . 2--14
          Manolis Katevenis and   
            Nestoras Tzartzanis   Reducing the branch penalty by
                                  rearranging instructions in a
                                  double-width memory  . . . . . . . . . . 15--27
              Roland L. Lee and   
               Alex Y. Kwok and   
          Fayé A. Briggs   The floating-point performance of a
                                  superscalar SPARC processor  . . . . . . 28--37
             David Callahan and   
                Ken Kennedy and   
              Allan Porterfield   Software prefetching . . . . . . . . . . 40--52
           Gurindar S. Sohi and   
                 Manoj Franklin   High-bandwidth data memory systems for
                                  superscalar processors . . . . . . . . . 53--62
              Monica D. Lam and   
         Edward E. Rothberg and   
                Michael E. Wolf   The cache performance and optimizations
                                  of blocked algorithms  . . . . . . . . . 63--74
           Jeffrey C. Mogul and   
                     Anita Borg   The effect of context switches on cache
                                  performance  . . . . . . . . . . . . . . 75--84
                   David Keppel   A portable interface for on-the-fly
                                  instruction space modification . . . . . 86--95
            Andrew W. Appel and   
                         Kai Li   Virtual memory primitives for user
                                  programs . . . . . . . . . . . . . . . . 96--107
         Thomas E. Anderson and   
              Henry M. Levy and   
           Brian N. Bershad and   
             Edward D. Lazowska   The interaction of architecture and
                                  operating system design  . . . . . . . . 108--120
           David G. Bradlee and   
            Susan J. Eggers and   
                Robert R. Henry   Integrating register allocation and
                                  instruction scheduling for RISCs . . . . 122--131
          Manuel E. Benitez and   
               Jack W. Davidson   Code generation for streaming: an
                                  access/execute mechanism . . . . . . . . 132--141
            Rajive Bagrodia and   
                  Sharad Mathur   Efficient implementation of high-level
                                  parallel programs  . . . . . . . . . . . 142--151
     William Mangione-Smith and   
         Santosh G. Abraham and   
             Edward S. Davidson   Vector register design for polycyclic
                                  vector scheduling  . . . . . . . . . . . 154--163
            David E. Culler and   
                 Anurag Sah and   
          Klaus E. Schauser and   
        Thorsten von Eicken and   
                 John Wawrzynek   Fine-grain parallelism with minimal
                                  hardware support: a compiler-controlled
                                  threaded abstract machine  . . . . . . . 164--175
                  David W. Wall   Limits of instruction-level parallelism  176--188
              Edward K. Lee and   
                  Randy H. Katz   Performance consequences of parity
                                  placement in disk arrays . . . . . . . . 190--199
               Vincent Cate and   
                   Thomas Gross   Combining the concepts of compression
                                  and caching for a two-level filesystem   200--211
         William J. Bolosky and   
           Michael L. Scott and   
       Robert P. Fitzgerald and   
           Robert J. Fowler and   
                    Alan L. Cox   NUMA policies and their relation to
                                  memory architecture  . . . . . . . . . . 212--221
              David Chaiken and   
           John Kubiatowicz and   
                  Anant Agarwal   LimitLESS directories: A scalable cache
                                  coherence scheme . . . . . . . . . . . . 224--234
                Sang L. Min and   
                 Jong-Deok Choi   An efficient cache-based access anomaly
                                  detection scheme . . . . . . . . . . . . 235--244
       Kourosh Gharachorloo and   
                Anoop Gupta and   
                  John Hennessy   Performance evaluation of memory
                                  consistency models for shared-memory
                                  multiprocessors  . . . . . . . . . . . . 245--257
           Eric Freudenthal and   
                 Allan Gottlieb   Process coordination with
                                  fetch-and-increment  . . . . . . . . . . 260--268
     John M. Mellor-Crummey and   
               Michael L. Scott   Synchronization without contention . . . 269--278
                Douglas Johnson   The case for a read barrier  . . . . . . 279--287
           Robert F. Cmelik and   
              Shing I. Kong and   
            David R. Ditzel and   
                Edmund J. Kelly   An analysis of MIPS and SPARC
                                  instruction set utilization on the SPEC
                                  benchmarks . . . . . . . . . . . . . . . 290--302
              C. Brian Hall and   
                  Kevin O'Brien   Performance characteristics of
                                  architectural features of the IBM RISC
                                  System/6000  . . . . . . . . . . . . . . 303--309
          Dileep Bhandarkar and   
               Douglas W. Clark   Performance from architecture: comparing
                                  a RISC and a CISC with similar hardware
                                  organization . . . . . . . . . . . . . . 310--319

Operating Systems Review
Volume 25, Number 3, July, 1991

            David B. Wagner and   
                    Carl Ponder   Book Review: \em The Art of Computer
                                  Systems Performance Analysis by Raj
                                  Jain: (John Wiley and Sons, Inc., New
                                  York 1991) . . . . . . . . . . . . . . . 7--9
            Garbriel Broner and   
                 Patrick Powell   Intelligent I/O rule-based input/output
                                  processing for operating systems . . . . 10--26
                   Neil Dunstan   Semaphores for fair scheduling monitor
                                  conditions . . . . . . . . . . . . . . . 27--31
                 G. Aguirre and   
               M. Errecalde and   
                R. Guerrero and   
                   C. Kavka and   
              G. Leguizamon and   
               M. Printista and   
                     R. Gallard   Experiencing Minix as a didactical aid
                                  for operating systems courses  . . . . . 32--39

Operating Systems Review
Volume 25, Number 4, October, 1991

            Allison J. Mull and   
              P. Tobin Maginnis   Evolutionary steps toward a distributed
                                  operating system: theory and
                                  implementation . . . . . . . . . . . . . 4--13
                Mark Hayter and   
                  Derek McAuley   The desk area network  . . . . . . . . . 14--21
  Jorge Buenabadd Chávez   XINIX time-sharing operating system  . . 22--34
             Karsten Schwan and   
                Hongyi Zhou and   
                   Ahmed Gheith   Real-time threads  . . . . . . . . . . . 35--46
                 Jean Bacon and   
                  Ken Moody and   
                Sue Thomson and   
                     Tim Wilson   A multi-service storage architecture . . 47--65
                Dan Oestreicher   A simple reliable globally-ordered
                                  broadcast service  . . . . . . . . . . . 66--76
                   Kwok-yan Lam   An implementation for small databases
                                  with high availability . . . . . . . . . 77--77

Operating Systems Review
Volume 25, Number 5, October, 1991

           Mendel Rosenblum and   
             John K. Ousterhout   The design and implementation of a
                                  log-structured file system . . . . . . . 1--15
           David K. Gifford and   
            Pierre Jouvelot and   
            Mark A. Sheldon and   
          James W. O'Toole, Jr.   Semantic file systems  . . . . . . . . . 16--25
                Raj Vaswani and   
                  John Zahorjan   The implications of cache affinity on
                                  processor scheduling for
                                  multiprogrammed, shared memory
                                  multiprocessors  . . . . . . . . . . . . 26--40
             Anna R. Karlin and   
                     Kai Li and   
            Mark S. Manasse and   
                   Susan Owicki   Empirical studies of competitive
                                  spinning for a shared-memory
                                  multiprocessor . . . . . . . . . . . . . 41--55
               Keith Muller and   
                Joseph Pasquale   A high performance multi-structured file
                                  system design  . . . . . . . . . . . . . 56--67
            Ramesh Govindan and   
              David P. Anderson   Scheduling and IPC mechanisms for
                                  continuous media . . . . . . . . . . . . 68--80
           P. Venkat Rangan and   
                 Harrick M. Vin   Designing file systems for digital video
                                  and audio  . . . . . . . . . . . . . . . 81--94
         Thomas E. Anderson and   
           Brian N. Bershad and   
         Edward D. Lazowska and   
                  Henry M. Levy   Scheduler activations: effective kernel
                                  support for the user-level management of
                                  parallelism  . . . . . . . . . . . . . . 95--109
             Brian D. Marsh and   
           Michael L. Scott and   
          Thomas J. LeBlanc and   
          Evangelos P. Markatos   First-class user-level threads . . . . . 110--121
          Richard P. Draves and   
           Brian N. Bershad and   
          Richard F. Rashid and   
                Randall W. Dean   Using continuations to implement thread
                                  management and communication in
                                  operating systems  . . . . . . . . . . . 122--136
     Richard P. LaRowe, Jr. and   
      Carla Schlatter Ellis and   
             Laurence S. Kaplan   The robustness of NUMA memory management 137--151
             John B. Carter and   
            John K. Bennett and   
               Willy Zwaenepoel   Implementation and performance of Munin  152--164
             Butler Lampson and   
        Martín Abadi and   
            Michael Burrows and   
                  Edward Wobber   Authentication in distributed systems:
                                  theory and practice  . . . . . . . . . . 165--182
       Thomas L. Rodeheffer and   
           Michael D. Schroeder   Automatic reconfiguration in Autonet . . 183--197
              Mary G. Baker and   
            John H. Hartman and   
          Michael D. Kupfer and   
            Ken W. Shirriff and   
             John K. Ousterhout   Measurements of a distributed file
                                  system . . . . . . . . . . . . . . . . . 198--212
           James J. Kistler and   
              M. Satyanarayanan   Disconnected operation in the Coda file
                                  system . . . . . . . . . . . . . . . . . 213--225
             Barbara Liskov and   
            Sanjay Ghemawat and   
              Robert Gruber and   
               Paul Johnson and   
                   Liuba Shrira   Replication in the Harp file system  . . 226--238
              Frank Schmuck and   
                      Jim Wylie   Experience with transactions in
                                  QuickSilver  . . . . . . . . . . . . . . 239--253


Operating Systems Review
Volume 26, Number 1, January, 1992

             Edward D. Lazowska   13th ACM Symposium on Operating Systems
                                  Principles: panel session presentations  3--17
           Barton P. Miller and   
               Charles McDowell   Summary of ACM/ONR workshop on parallel
                                  and distributed debugging  . . . . . . . 18--31
                 Mahmoud Dasser   TOMP a total ordering multicast protocol 32--40
                  Michel Raynal   About logical clocks for distributed
                                  systems  . . . . . . . . . . . . . . . . 41--48
                        Li Gong   A security risk of depending on
                                  synchronized clocks  . . . . . . . . . . 49--53
             Karsten Schwan and   
                    Hongyi Zhou   Multiprocessor real-time threads . . . . 54--65
                  Zhao Hong and   
                     Huatian Li   A mechanism of process group for
                                  application reliability in distributed
                                  systems  . . . . . . . . . . . . . . . . 66--77
                  S. Halder and   
                 K. Vidyasankar   Counterexamples to a one writer
                                  multireader atomic variable construction
                                  of Burns and Peterson  . . . . . . . . . 78--87

Operating Systems Review
Volume 26, Number 2, April, 1992

             Edward D. Lazowska   13th ACM Symposium on Operating Systems
                                  Principles: ``Work in Progress'';
                                  abstracts  . . . . . . . . . . . . . . . 7--7
             Henry Massalin and   
                      Calton Pu   A Lock-Free Multiprocessor OS Kernel . . 8--8
                 Jeff Chase and   
         Miche Baker-Harvey and   
                  Hank Levy and   
                    Ed Lazowska   Opal: A Single Address Space System for
                                  64-bit Architectures . . . . . . . . . . 9--9
                 Daniel Duchamp   Systems Software for Wireless Mobile
                                  Computing  . . . . . . . . . . . . . . . 10--10
                John Wilkes and   
                  Chia Chao and   
             Robert English and   
             David Jacobson and   
                 Bart Sears and   
               Carl Staelin and   
                  Alex Stepanov   DataMesh parallel storage servers  . . . 11--11
                Maurice Herlihy   A Methodology for Implementing Highly
                                  Concurrent Data Objects  . . . . . . . . 12--12
                    Rick LaRowe   Operating Systems Research Related to
                                  the Galactica Net Architecture . . . . . 13--13
                Joseph Pasquale   Project Sequoia 2000 . . . . . . . . . . 14--14
               Cheryl A. Wiecek   VMS on Mach  . . . . . . . . . . . . . . 15--15
                   Kevin Jeffay   Network and Operating System Support for
                                  Digital Audio and Video  . . . . . . . . 16--16
             B. Clifford Neuman   The Virtual System Project . . . . . . . 17--17
           Bruce K. Hillyer and   
            Bethany S. Robinson   The BBFS Filesystem Model  . . . . . . . 18--18
               Kieran Harty and   
              David R. Cheriton   Application-Controlled Physical Memory
                                  using External Page-Cache Management . . 19--19
            Michael Wayne Young   Episode: Lazy Transactions for
                                  Filesystem Meta-Data Updates . . . . . . 20--20
               Michael B. Jones   A Toolkit for Interposing User Code at
                                  the System Interface . . . . . . . . . . 21--21
                 Peter Druschel   Modularity and Protection are
                                  Orthogonal, or ``Why $\mu$-kernel
                                  Architectures are Flawed'' . . . . . . . 22--22
             Keith Marzullo and   
                   Mark D. Wood   A Toolkit for Building Reactive Systems
                                  or A Minute on Meta  . . . . . . . . . . 23--23
               William E. Weihl   Prelude: Tools for Building Portable
                                  Parallel Programs  . . . . . . . . . . . 24--24
                 Sharon E. Perl   Performance Assertion Checking . . . . . 25--25
             Richard G. Guy and   
          John S. Heidemann and   
            Thomas W. Page, Jr.   The Ficus Replicated File System . . . . 26--26
                 Michael Reiter   Integrating Security in a Group Oriented
                                  Distributed System . . . . . . . . . . . 27--27
           Jonathan Walpole and   
                Richard Staehli   Supporting Access to Stored Multimedia
                                  Data in Large Distributed Systems Work
                                  in Progress  . . . . . . . . . . . . . . 28--28
          M. Frans Kaashoek and   
        Robbert van Renesse and   
          Hans van Staveren and   
            Andrew S. Tanenbaum   FLIP; an Internetwork Protocol for
                                  Supporting Distributed Systems . . . . . 29--29
                 Ross Finlayson   Structuring and Communication in the
                                  Vanguard OS Kernel . . . . . . . . . . . 30--30
           Robbert van Rennesse   Design and Implementation of a Multicast
                                  Transport Service  . . . . . . . . . . . 31--31
           Ralf Guido Herrtwich   Summary of the Second International
                                  Workshop on Network and Operating System
                                  Support for Digital Audio and Video  . . 32--59
              Rex E. Gantenbein   An annotated bibliography of dependable
                                  distributed computing  . . . . . . . . . 60--81
                  Cui-Qing Yang   Distributed computing in a NUMP
                                  (Non-Uniform Message-Passing)
                                  environment  . . . . . . . . . . . . . . 82--91
               A. L. Ananda and   
                  B. H. Tay and   
                      E. K. Koh   A survey of asynchronous remote
                                  procedure calls  . . . . . . . . . . . . 92--109
             Henry Massalin and   
                      Calton Pu   A Lock-Free Multiprocessor OS Kernel . . 108--108
              Sadegh Davari and   
                        Lui Sha   Sources of unbounded priority inversions
                                  in real-time systems and a comparative
                                  study of possible solutions  . . . . . . 110--120

Operating Systems Review
Volume 26, Number 3, July, 1992

        R. Ananthanarayanan and   
               Sathis Menon and   
              Ajay Mohindra and   
        Umakishore Ramachandran   Experiences in integrating distributed
                                  shared memory with virtual memory
                                  management . . . . . . . . . . . . . . . 4--26
                      G. O'Shea   Redundant rights in protection systems   27--30
           Ralph C. Hilzer, Jr.   Synchronization of the producer/consumer
                                  problem using semaphores, monitors, and
                                  the Ada rendezvous . . . . . . . . . . . 31--39

Operating Systems Review
Volume 26, Number 4, October, 1992

                Frank W. Miller   The performance of a mixed priority
                                  real-time scheduling algorithm . . . . . 5--13
                 Jon Inouye and   
        Ravindranath Konuru and   
           Jonathan Walpole and   
                     Bart Sears   The effects of virtually addressed
                                  caches on virtual memory design and
                                  performance  . . . . . . . . . . . . . . 14--29
                Uwe M. Borghoff   Design of optimal distributed file
                                  systems: a framework for research  . . . 30--61
               Jiannong Cao and   
                     K. C. Wang   An abstract model of rollback recovery
                                  control in distributed systems . . . . . 62--76
           G. Florin C. Toinard   A new way to design causally and totally
                                  ordered multicast protocols  . . . . . . 77--83
                   A. Kehne and   
   J. Schönwälder and   
           H. Langendörfer   A nonce-based protocol for multiple
                                  authentications  . . . . . . . . . . . . 84--89
                James D. Mooney   The CTRON approach to operating system
                                  support for software portability . . . . 90--97
              Michael Kifer and   
                Scott A. Smolka   OSP: an environment for operating system
                                  projects . . . . . . . . . . . . . . . . 98--100


Operating Systems Review
Volume 27, Number 1, January, 1993

                Bruce K. Haddon   Book Review: \em Global Software:
                                  Developing Applications for the
                                  International Market by Dave Taylor:
                                  (Springer-Verlag, New York 1992) . . . . 5--6
            Alberto Bartoli and   
          Sape J. Mullender and   
           Martijn van der Valk   Wide-address spaces: exploring the
                                  design space . . . . . . . . . . . . . . 11--17
                David Mosberger   Memory consistency models  . . . . . . . 18--26
              Djemal H. Abawajy   Orphan problems and remedies in
                                  distributed systems  . . . . . . . . . . 27--32
             Marie Rose Low and   
             Bruce Christianson   Fine grained object protection in UNIX   33--50
                      Ted Hills   Structured interrupts  . . . . . . . . . 51--68
              Ian M. Leslie and   
              Derek McAuley and   
              Sape J. Mullender   Pegasus---operating system support for
                                  distributed multimedia systems . . . . . 69--78
                R. Guerrero and   
              L. Leguizamon and   
                     R. Gallard   Implementation and evaluation of
                                  alternative process schedulers in MINIX  79--100

Operating Systems Review
Volume 27, Number 2, April, 1993

                     K. C. Wong   Determining the shortest process
                                  migration paths for program compilation
                                  using a dynamic programming approach . . 1--6
             Darrell D. E. Long   A note on bit-mapped free sector
                                  management . . . . . . . . . . . . . . . 7--9
         B. Clifford Neuman and   
          Stuart G. Stubblebine   A note on the use of timestamps as
                                  nonces . . . . . . . . . . . . . . . . . 10--14
            B. R. Badrinath and   
               Arup Acharya and   
            Tomasz Imieli\'nski   Impact of mobility on distributed
                                  computations . . . . . . . . . . . . . . 15--20
          R. Hugo Patterson and   
            Garth A. Gibson and   
              M. Satyanarayanan   A status report on research in
                                  transparent informed prefetching . . . . 21--34
                   C. Kavka and   
               M. Printista and   
                     R. Gallard   Extending device management in Minix . . 35--43
            Robbert van Renesse   Causal controversy at Le Mont St.-Michel 44--53
                   C. Bryce and   
                D. Hagimont and   
                 P. Joubert and   
                   C. Morin and   
                  G. Muller and   
                      B. Rochat   Models and paradigms for distributed
                                  systems structuring: summary of sessions 56--60
                 Jeff Chase and   
    Valérie Issarnay and   
                      Hank Levy   Distribution in a single address space
                                  operating system . . . . . . . . . . . . 61--65
                      Calton Pu   Relaxing the limitations of serializable
                                  transactions in distributed systems  . . 66--71
                   Rob Pike and   
              Dave Presotto and   
               Ken Thompson and   
             Howard Trickey and   
              Phil Winterbottom   The use of name spaces in Plan 9 . . . . 72--76
              Jerome H. Saltzer   Needed: a systematic structuring
                                  paradigm for distributed data  . . . . . 77--81
             Carlos Almeida and   
                 Brad Glade and   
                 Keith Marzullo   High availability in a real-time system  82--87
                   Fred Douglis   On the role of compression in
                                  distributed systems  . . . . . . . . . . 88--93
              Larry L. Peterson   Life on the OS/network boundary  . . . . 94--98
                  Robert Stroud   Transparency and reflection in
                                  distributed systems  . . . . . . . . . . 99--103
                    John Wilkes   DataMesh, house-building, and
                                  distributed systems technology . . . . . 104--108

Operating Systems Review
Volume 27, Number 3, July, 1993

                  A. K. Yeo and   
               A. L. Ananda and   
                      E. K. Koh   A taxonomy of issues in name systems
                                  design and implementation  . . . . . . . 4--18
          R. Gopalakrishnan and   
          Andreas D. Bovopoulos   A protocol processing architecture for
                                  networked multimedia computers . . . . . 19--33
                Prasad Raja and   
                 Guevara Noubir   Static and dynamic polling mechanisms
                                  for Fieldbus networks  . . . . . . . . . 34--45
           P. Krishna Reddy and   
                      S. Bhalla   A non-blocking transaction data flow
                                  graph based approach for replicated data 46--54
              Zhonghua Yang and   
            T. Anthony Marsland   Annotated bibliography on global states
                                  and times in distributed systems . . . . 55--74
               Xingwei Wang and   
                  Hong Zhao and   
                    Jiakeng Zhu   GRPC: a communication cooperation
                                  mechanism in distributed systems . . . . 75--86
                  Jiubin Ju and   
                 Gaochao Xu and   
                        Jie Tao   Parallel computing using idle
                                  workstations . . . . . . . . . . . . . . 87--96
            Christophe Haro and   
               Christian Proust   A multitasking executive for operating
                                  systems courses  . . . . . . . . . . . . 97--107

Operating Systems Review
Volume 27, Number 4, October, 1993

           Barton P. Miller and   
               Charles McDowell   Summary of ACM/ONR workshop on parallel
                                  and distributed debugging  . . . . . . . 8--23
                  Paul Syverson   On key distribution protocols for
                                  repeated authentication  . . . . . . . . 24--30
                    Armin Liebl   Authentication in distributed systems: a
                                  bibliography . . . . . . . . . . . . . . 31--41
           Claudio Calvelli and   
             Vijay Varadharajan   Authentication and revocation in SPM
                                  extended abstract  . . . . . . . . . . . 42--57
        Alexander B. Romanovsky   Fault tolerance: synchronization of
                                  redundancy . . . . . . . . . . . . . . . 58--66
                  Mohamed Naimi   Distributed algorithm for K-entries to
                                  critical section based on the directed
                                  graphs . . . . . . . . . . . . . . . . . 67--75
              P. Ciancarini and   
                    N. Guerrini   Linda meets Minix  . . . . . . . . . . . 76--92

Operating Systems Review
Volume 27, Number 5, December, 1993

          Yousef A. Khalidi and   
              Michael N. Nelson   Extensible file systems in spring  . . . 1--14
           Wiebren de Jonge and   
          M. Frans Kaashoek and   
                Wilson C. Hsieh   The Logical Disk: a new approach to
                                  improving file systems . . . . . . . . . 15--28
            John H. Hartman and   
             John K. Ousterhout   The Zebra striped network file system    29--43
          David R. Cheriton and   
                     Dale Skeen   Understanding the limitations of
                                  causally and totally ordered
                                  communication  . . . . . . . . . . . . . 44--57
                  Brian Oki and   
            Manfred Pfluegl and   
                Alex Siegel and   
                     Dale Skeen   The Information Bus: an architecture for
                                  extensible distributed systems . . . . . 58--68
            Graham Hamilton and   
          Michael L. Powell and   
              James G. Mitchell   Subcontract: a flexible base for
                                  distributed programming  . . . . . . . . 69--79
               Michael B. Jones   Interposition agents: transparently
                                  interposing user code at the system
                                  interface  . . . . . . . . . . . . . . . 80--93
                Carl Hauser and   
           Christian Jacobi and   
             Marvin Theimer and   
                Brent Welch and   
                    Mark Weiser   Using threads in interactive systems: a
                                  case study . . . . . . . . . . . . . . . 94--105
          Antony L. Hosking and   
               J. Eliot B. Moss   Protection traps and alternatives for
                                  memory management of an object-oriented
                                  language . . . . . . . . . . . . . . . . 106--119
            J. Bradley Chen and   
               Brian N. Bershad   The impact of operating system structure
                                  on memory system performance . . . . . . 120--133
             Sharon E. Perl and   
               William E. Weihl   Performance assertion checking . . . . . 134--145
          M. Satyanarayanan and   
          Henry H. Mashburn and   
               Puneet Kumar and   
            David C. Steere and   
               James J. Kistler   Lightweight recoverable virtual memory   146--160
              James O'Toole and   
              Scott Nettles and   
                  David Gifford   Concurrent compacting garbage collection
                                  of a persistent heap . . . . . . . . . . 161--174
                 Jochen Liedtke   Improving IPC by kernel design . . . . . 175--188
             Peter Druschel and   
              Larry L. Peterson   Fbufs: a high-bandwidth cross-domain
                                  transfer facility  . . . . . . . . . . . 189--202
               Robert Wahbe and   
               Steven Lucco and   
         Thomas E. Anderson and   
                Susan L. Graham   Efficient software-based fault isolation 203--216
             Andrew Birrell and   
                Greg Nelson and   
               Susan Owicki and   
                  Edward Wobber   Network objects  . . . . . . . . . . . . 217--230
                 Alan Jones and   
                  Andrew Hopper   Handling audio and video streams in a
                                  distributed environment  . . . . . . . . 231--243
                Chris Maeda and   
               Brian N. Bershad   Protocol service decomposition for
                                  high-performance networking  . . . . . . 244--255
              Edward Wobber and   
        Martín Abadi and   
            Michael Burrows and   
                 Butler Lampson   Authentication in the Taos operating
                                  system . . . . . . . . . . . . . . . . . 256--269
             Mike Spreitzer and   
                 Marvin Theimer   Providing location information in a
                                  ubiquitous computing environment (panel
                                  session) . . . . . . . . . . . . . . . . 270--283


Operating Systems Review
Volume 28, Number 1, January, 1994

                   Gary J. Nutt   Book Review: \em Coloured Petri Nets:
                                  Basic Concepts, Analysis Methods and
                                  Practical Use (volume 1) by Kurt Jensen:
                                  (Springer-Verlag, 1992)  . . . . . . . . 1--2
         Dinesh C. Kulkarni and   
            Arindam Banerji and   
                  David L. Cohn   Operating systems and cost management    5--10
                     Ken Birman   A response to Cheriton and Skeen's
                                  criticism of causal and totally ordered
                                  communication  . . . . . . . . . . . . . 11--21
            Robbert van Renesse   Why bother with CATOCS?  . . . . . . . . 22--27
                  Robert Cooper   Experience with causally and totally
                                  ordered communication support: a
                                  cautionary tale  . . . . . . . . . . . . 28--31
      Bodhisattwa Mukherjee and   
            Greg Eisenhauer and   
                  Kaushik Ghosh   A machine independent interface for
                                  lightweight threads  . . . . . . . . . . 33--47
                   Bill Mahoney   An ``open'' oriented file system . . . . 48--54
                 L. Mummert and   
              M. Satyanarayanan   Variable granularity cache coherence . . 55--60
                 Jochen Liedtke   A short note on implementing ``new''
                                  machine instructions by software for
                                  efficient test of page accessibility . . 61--65
  K. Benmohammed-Mahieddine and   
                      P. M. Dew   A periodic symmetrically-initiated load
                                  balancing algorithm for distributed
                                  systems  . . . . . . . . . . . . . . . . 66--79
        Abdelmadjid Bouabdallah   On mutual exclusion in faulty
                                  distributed systems  . . . . . . . . . . 80--87
               Chris Zimmermann   Making distributed multimedia systems
                                  secure: the switchboard approach . . . . 88--100
               William M. Waite   Book Review: \em Programming with MOTIF
                                  by Keith D. Gregory: (Springer-Verlag,
                                  New York 1992) . . . . . . . . . . . . . 100--100

Operating Systems Review
Volume 28, Number 2, April, 1994

                  Todd Valentic   Book Review: \em High-Speed Windows
                                  Applications: Multitasking Design
                                  Methods by Bruce E. Krell: (Bantam
                                  Books, New York 1993)  . . . . . . . . . 4--5
               Michael Lightner   Book Review: \em \TeX in Practice,
                                  Volumes 1--4 by Stephan von
                                  Bechtolsheim: (Springer-Verlag, New York
                                  1993)  . . . . . . . . . . . . . . . . . 6--8
                 Maurice Wilkes   Operating systems in a changing world    9--21
                G. S. Blair and   
                A. Campbell and   
                 G. Coulson and   
                  N. Davies and   
                  F. Garcia and   
                    D. Shepherd   Summary of the 4th International
                                  Workshop on Network and Operating System
                                  Support for Digital Audio and Video
                                  (NOSSDAV'93) . . . . . . . . . . . . . . 22--33
                 G. Aguirre and   
               M. Errecalde and   
                S. Esquivel and   
              G. Leguizamon and   
                     R. Gallard   Design features of high level layers in
                                  LAHNOS, a local area heterogeneous
                                  network operating system . . . . . . . . 34--50
               Lars C. Wolf and   
                R. G. Herrtwich   The system architecture of the
                                  Heidelberg transport system  . . . . . . 51--64
             Eddy Fromentin and   
                  Michel Raynal   Local states in distributed
                                  computations: a few relations and
                                  formulas . . . . . . . . . . . . . . . . 65--72
            Michael K. Gschwind   FTP access as a user-defined file system 73--80
                      Qi Lu and   
              M. Satyanarayanan   Isolation-only transactions for mobile
                                  computing  . . . . . . . . . . . . . . . 81--87
         Pradeep Hatkanagalekar   A note on structured interrupts  . . . . 88--91
                      Joe Gwinn   Some measurements of timeline gaps in
                                  VAX/VMS  . . . . . . . . . . . . . . . . 92--96

Operating Systems Review
Volume 28, Number 3, July, 1994

                 Jean Bacon and   
             Richard Hayton and   
                 Sai Lai Lo and   
                      Ken Moody   Extensible access control for a
                                  hierarchy of servers . . . . . . . . . . 4--15
                    Ulf Carlsen   Optimal privacy and authentication on a
                                  portable communications system . . . . . 16--23
           Thomas Y. C. Woo and   
                   Simon S. Lam   A lesson on authentication protocol
                                  design . . . . . . . . . . . . . . . . . 24--37
                 Jochen Liedtke   A short note on implementing thread
                                  exclusiveness and address space locking  38--42
               Joel M. Crichlow   Combining optimism and pessimism to
                                  produce high availability in distributed
                                  transaction processing . . . . . . . . . 43--64

Operating Systems Review
Volume 28, Number 4, October, 1994

                Silvano Maffeis   Design and implementation of a
                                  configurable mixed-media file system . . 4--10
         Santosh K. Shrivastava   To CATOCS or not to CATOCS, that is the
                                  \ldots . . . . . . . . . . . . . . . . . 11--14
              Jang Seung-Ju and   
                   Kim Gil-Yong   Spin-block synchronization algorithm in
                                  the shared memory multiprocessor system  15--30
                      Ted Hills   Response to a note on structured
                                  interrupts . . . . . . . . . . . . . . . 31--33
Antônio Marinho Pilla Barcellos and   
Valdir Rossi Belmonte Filho and   
João Frederico Lacava Schramm and   
Cláudio Fernando Resin Geyer   The HetNOS network operating system: a
                                  tool for writing distributed
                                  applications . . . . . . . . . . . . . . 34--47
                 Timothy Roscoe   Linkage in the Nemesis single address
                                  space operating system . . . . . . . . . 48--55
             Diomidis Spinellis   Trace: a tool for logging operating
                                  system call transactions . . . . . . . . 56--63
                   Mark Nuttall   A brief survey of systems providing
                                  process or object migration facilities   64--80

Operating Systems Review
Volume 28, Number 5, December, 1994

   Chandramohan A. Thekkath and   
              Henry M. Levy and   
             Edward D. Lazowska   Separating data and control transfer in
                                  distributed operating systems  . . . . . 2--11
              Rohit Chandra and   
               Scott Devine and   
               Ben Verghese and   
                Anoop Gupta and   
               Mendel Rosenblum   Scheduling and page migration for
                                  multiprocessor compute servers . . . . . 12--24
              Beng-Hong Lim and   
                  Anant Agarwal   Reactive synchronization algorithms for
                                  multiprocessors  . . . . . . . . . . . . 25--35
              John Heinlein and   
       Kourosh Gharachorloo and   
              Scott Dresser and   
                    Anoop Gupta   Integration of message passing and
                                  shared memory in the Stanford FLASH
                                  multiprocessor . . . . . . . . . . . . . 38--50
           Vijay Karamcheti and   
                Andrew A. Chien   Software overhead in messaging layers:
                                  where does the time go?  . . . . . . . . 51--60
             Satish Chandra and   
             James R. Larus and   
                    Anne Rogers   Where is time spent in message-passing
                                  and shared-memory programs?  . . . . . . 61--73
         William J. Schmidt and   
               Kelvin D. Nilsen   Performance of a hardware-assisted
                                  real-time garbage collector  . . . . . . 76--85
                 Michael Wu and   
               Willy Zwaenepoel   eNVy: a non-volatile, main memory
                                  storage system . . . . . . . . . . . . . 86--97
              Michael Upton and   
                Thomas Huff and   
               Trevor Mudge and   
                  Richard Brown   Resource allocation in a high clock rate
                                  microprocessor . . . . . . . . . . . . . 98--109
   Chandramohan A. Thekkath and   
                  Henry M. Levy   Hardware and software support for
                                  efficient exception handling . . . . . . 110--119
           Pramod V. Argade and   
           David K. Charles and   
                   Craig Taylor   A technique for monitoring run-time
                                  dynamics of an operating system and a
                                  microprocessor executing user
                                  applications . . . . . . . . . . . . . . 122--131
              Richard Uhlig and   
                David Nagle and   
               Trevor Mudge and   
                Stuart Sechrest   Trap-driven simulation with Tapeworm II  132--144
Ann Marie Grizzaffi Maynard and   
        Colette M. Donnelly and   
              Bret R. Olszewski   Contrasting characteristics and cache
                                  performance of technical and multi-user
                                  commercial workloads . . . . . . . . . . 145--156
           Brian N. Bershad and   
                 Dennis Lee and   
          Theodore H. Romer and   
                J. Bradley Chen   Avoiding conflict misses dynamically in
                                  large direct-mapped caches . . . . . . . 158--170
        Madhusudhan Talluri and   
                   Mark D. Hill   Surpassing the TLB performance of
                                  superpages with less operating system
                                  support  . . . . . . . . . . . . . . . . 171--182
         David M. Gallagher and   
            William Y. Chen and   
            Scott A. Mahlke and   
         John C. Gyllenhaal and   
                 Wen-mei W. Hwu   Dynamic memory disambiguation using the
                                  memory conflict buffer . . . . . . . . . 183--193
            Kenichi Hayashi and   
              Tsunehisa Doi and   
              Takeshi Horie and   
            Yoichi Koyanagi and   
              Osamu Shiraki and   
           Nobutaka Imamura and   
          Toshiyuki Shimizu and   
           Hiroaki Ishihata and   
                 Tatsuya Shindo   AP1000+: architectural support of
                                  PUT/GET interface for parallelizing
                                  compiler . . . . . . . . . . . . . . . . 196--207
             James R. Larus and   
              Brad Richards and   
              Guhan Viswanathan   LCM: memory system support for parallel
                                  language implementation  . . . . . . . . 208--218
         Steven Cameron Woo and   
        Jaswinder Pal Singh and   
               John L. Hennessy   The performance advantages of
                                  integrating block data transfer in
                                  cache-coherent multiprocessors . . . . . 219--229
                Cliff Young and   
               Michael D. Smith   Improving the accuracy of static branch
                                  prediction using branch correlation  . . 232--241
                Brad Calder and   
                  Dirk Grunwald   Reducing branch costs via branch
                                  alignment  . . . . . . . . . . . . . . . 242--251
                 Steve Carr and   
        Kathryn S. McKinley and   
                 Chau-Wen Tseng   Compiler optimizations for improving
                                  data locality  . . . . . . . . . . . . . 252--262
           Dawson R. Engler and   
             Todd A. Proebsting   DCG: an efficient, retargetable dynamic
                                  code generation system . . . . . . . . . 263--272
              Mark Heinrich and   
             Jeffrey Kuskin and   
                David Ofelt and   
              John Heinlein and   
                Joel Baxter and   
        Jaswinder Pal Singh and   
             Richard Simoni and   
       Kourosh Gharachorloo and   
             David Nakahira and   
              Mark Horowitz and   
                Anoop Gupta and   
           Mendel Rosenblum and   
                  John Hennessy   The performance impact of flexibility in
                                  the Stanford FLASH multiprocessor  . . . 274--285
           Jonas Skeppstedt and   
             Per Stenström   Simple compiler algorithms to reduce
                                  ownership overhead in cache coherence
                                  protocols  . . . . . . . . . . . . . . . 286--296
           Ioannis Schoinas and   
              Babak Falsafi and   
            Alvin R. Lebeck and   
        Steven K. Reinhardt and   
             James R. Larus and   
                  David A. Wood   Fine-grain access control for
                                  distributed shared memory  . . . . . . . 297--306
               James Laudon and   
                Anoop Gupta and   
                  Mark Horowitz   Interleaving: a multithreading technique
                                  targeting multiprocessors and
                                  workstations . . . . . . . . . . . . . . 308--318
         Nicholas P. Carter and   
         Stephen W. Keckler and   
               William J. Dally   Hardware support for fast
                                  capability-based addressing  . . . . . . 319--327
           Radhika Thekkath and   
                Susan J. Eggers   The effectiveness of multiple hardware
                                  contexts . . . . . . . . . . . . . . . . 328--337


Operating Systems Review
Volume 29, Number 1, January, 1995

               Michael Lightner   Book Review: \em \TeX in Practice,
                                  Stephan von Bechtolsheim . . . . . . . . 2--6
                  Jiubin Ju and   
                 Gaochao Xu and   
                       Kun Yang   An intelligent dynamic load balancer for
                                  workstation clusters . . . . . . . . . . 7--16
                    M. Cena and   
               M. L. Crespo and   
                     R. Gallard   Transparent remote execution in LAHNOS
                                  by means of a neural network device  . . 17--28
                     Li Xie and   
                    Xing Du and   
                   Jun Chen and   
                Yuhua Zheng and   
                   Zhongxiu Sun   An introduction to intelligent operating
                                  system KZ2 . . . . . . . . . . . . . . . 29--46
                   Marc Shapiro   Summary of the Sixth SIGOPS European
                                  Workshop on ``Matching Operating Systems
                                  to Application Needs'' . . . . . . . . . 47--51
          M. Satyanarayanan and   
                Brian Noble and   
               Puneet Kumar and   
                   Morgan Price   Application-aware adaptation for mobile
                                  computing  . . . . . . . . . . . . . . . 52--55
           Pierre Paradinas and   
        Jean-Jacques Vandewalle   New directions for integrated circuit
                                  cards operating systems  . . . . . . . . 56--61
      Özalp Babao\uglu and   
           André Schiper   On group communication in large-scale
                                  distributed systems  . . . . . . . . . . 62--67
                Dawson Dean and   
                 Richard Zippel   Matching data storage to application
                                  needs  . . . . . . . . . . . . . . . . . 68--73
           Brian N. Bershad and   
             Craig Chambers and   
               Susan Eggers and   
                Chris Maeda and   
              Dylan McNamee and   
        Przemys\law Pardyak and   
              Stefan Savage and   
            Emin Gün Sirer   SPIN---an extensible microkernel for
                                  application-specific operating system
                                  services . . . . . . . . . . . . . . . . 74--77
           Dawson R. Engler and   
          M. Frans Kaashoek and   
          James W. O'Toole, Jr.   The operating system kernel as a secure
                                  programmable machine . . . . . . . . . . 78--82
          David R. Cheriton and   
                Kenneth J. Duda   A caching model of operating system
                                  kernel functionality . . . . . . . . . . 83--86
                 Jochen Liedtke   Address space sparsity and fine
                                  granularity  . . . . . . . . . . . . . . 87--90
            Andrew P. Black and   
               Jonathan Walpole   Objects to the rescue! or httpd: the
                                  next generation operating system . . . . 91--95

Operating Systems Review
Volume 29, Number 2, April, 1995

                   Basim Kadhim   Book Review: \em Linux: Unleashing the
                                  Workstation in Your PC, Stefan Strobel
                                  and Thomas Uhl . . . . . . . . . . . . . 2--3
              M. Satyanarayanan   Workshop on mobile computing systems and
                                  applications, December 1994: digest of
                                  proceedings  . . . . . . . . . . . . . . 4--12
                 Timothy Roscoe   CLANGER: an interpreted systems
                                  programming language . . . . . . . . . . 13--20
              Steve Kleiman and   
                    Joe Eykholt   Interrupts as threads  . . . . . . . . . 21--26
    William F. Klostermeyer and   
          Kankanahalli Srinivas   Reducing disk power consumption in a
                                  portable computer  . . . . . . . . . . . 27--32
                   Tomas Smolik   An object-oriented file system---an
                                  example of using the class hierarchy
                                  framework concept  . . . . . . . . . . . 33--53
                   Wolfgang Lux   Adaptable object migration: concept and
                                  implementation . . . . . . . . . . . . . 54--69
                Harald Schrimpf   Migration of processes, files, and
                                  virtual devices in the MDX operating
                                  system . . . . . . . . . . . . . . . . . 70--81
                S. Esquivel and   
              G. Leguizamon and   
                     R. Gallard   A quasi-optimal cluster allocation
                                  strategy for parallel program execution
                                  in distributed systems using genetic
                                  algorithms . . . . . . . . . . . . . . . 82--96

Operating Systems Review
Volume 29, Number 3, July, 1995

               William M. Waite   Book Review: \em Building in Big
                                  Brother: The Cryptographic Policy
                                  Debate, Lance J. Hoffman . . . . . . . . 2--2
             Jim Alves-Foss and   
               Salvador Barbosa   Assessing computer security
                                  vulnerability  . . . . . . . . . . . . . 3--13
                I.-Lung Kao and   
                     Randy Chow   An efficient and secure authentication
                                  protocol using uncertified keys  . . . . 14--21
            Michael Steiner and   
                Gene Tsudik and   
                Michael Waidner   Refinement and extension of encrypted
                                  key exchange . . . . . . . . . . . . . . 22--30
                 Jochen Liedtke   A short note a small virtually-addressed
                                  control blocks . . . . . . . . . . . . . 31--34
              Michael Harry and   
    Juan Miguel del Rosario and   
                 Alok Choudhary   The design of VIP-FS: a virtual,
                                  parallel file system for high
                                  performance parallel and distributed
                                  computing  . . . . . . . . . . . . . . . 35--48
                 Pierre Castori   Semaphores revisited with MMS  . . . . . 49--63
          Maria Consuelo Franky   DGDBM: programming support for
                                  distributed transactions over replicated
                                  files  . . . . . . . . . . . . . . . . . 64--74
              Gabriel A. Wainer   Implementing real-time services in MINIX 75--84
               A. B. Romanovsky   Software diversity as a way to
                                  well-structured concurrent software  . . 85--90
                Xiaohua Jia and   
                 Mamoru Maekawa   Operating system kernel automatic
                                  construction . . . . . . . . . . . . . . 91--96

Operating Systems Review
Volume 29, Number 4, October, 1995

                 Sally Blackman   Book Review: \em The WEB Empowerment
                                  Book, Ralph Abraham, Frank Jas, and
                                  Willard Russell  . . . . . . . . . . . . 2--2
                   Basim Kadhim   Book Review: \em Linux Universe, Stefan
                                  Strobel and Thomas Uhl . . . . . . . . . 3--3
               W. H. Cheung and   
            Anthony H. S. Loong   Exploring issues of operating systems
                                  structuring: from microkernel to
                                  extensible systems . . . . . . . . . . . 4--16
              Geoff Coulson and   
                   Gordon Blair   Architectural principles and techniques
                                  for distributed multimedia application
                                  support in operating systems . . . . . . 17--24
                   S. Petri and   
           H. Langendörfer   Load balancing and fault tolerance in
                                  workstation clusters migrating groups of
                                  communicating processes  . . . . . . . . 25--36
               Ing-Jye Shyu and   
               Shiuh-Pyng Shieh   Virtual address translation for
                                  wide-address architectures . . . . . . . 37--46
               Gregory F. Welch   A survey of power management techniques
                                  in mobile computing operating systems    47--56
                K. R. Mayes and   
                   S. Quick and   
                  B. C. Warboys   User-level threads on a general hardware
                                  interface  . . . . . . . . . . . . . . . 57--62
             Shuichi Oikawa and   
                Hideyuki Tokuda   Reflection of developing user-level
                                  real-time thread packages  . . . . . . . 63--76
                   Yun Ding and   
                Patrick Horster   Undetectable on-line password guessing
                                  attacks  . . . . . . . . . . . . . . . . 77--86
                    Ping Hu and   
             Bruce Christianson   Is your computing environment secure?:
                                  security problems with interrupt
                                  handling mechanisms  . . . . . . . . . . 87--96

Operating Systems Review
Volume 29, Number 5, December, 1995

             T. C. Bressoud and   
                F. B. Schneider   Hypervisor-based fault tolerance . . . . 1--11
                  J. Chapin and   
               M. Rosenblum and   
                  S. Devine and   
                  T. Lahiri and   
                D. Teodosiu and   
                       A. Gupta   Hive: fault containment for
                                  shared-memory multiprocessors  . . . . . 12--25
             D. R. Cheriton and   
                     K. J. Duda   Logged virtual memory  . . . . . . . . . 26--38
              T. von Eicken and   
                    A. Basu and   
                    V. Buch and   
                      W. Vogels   U-Net: a user-level network interface
                                  for parallel and distributed computing
                                  (includes URL) . . . . . . . . . . . . . 40--53
               M. N. Nelson and   
                  M. Linton and   
                      S. Owicki   A highly available scalable ITV system   54--67
             B. Steensgaard and   
                         E. Jul   Object and native code thread mobility
                                  among heterogeneous computers (includes
                                  sources) . . . . . . . . . . . . . . . . 68--77
            R. H. Patterson and   
               G. A. Gibson and   
                 E. Ginting and   
               D. Stodolsky and   
                     J. Zelenka   Informed prefetching and caching . . . . 79--95
                  J. Wilkes and   
                 R. Golding and   
                 C. Staelin and   
                    T. Sullivan   The HP AutoRAID hierarchical storage
                                  system . . . . . . . . . . . . . . . . . 96--108
             T. E. Anderson and   
               M. D. Dahlin and   
                J. M. Neefe and   
            D. A. Patterson and   
              D. S. Roselli and   
                     R. Y. Wang   Serverless network file systems  . . . . 109--126
               J. Heidemann and   
                       G. Popek   Performance of cache coherence in
                                  stackable filing . . . . . . . . . . . . 127--141
              L. B. Mummert and   
               M. R. Ebling and   
              M. Satyanarayanan   Exploiting weak connectivity for mobile
                                  file access  . . . . . . . . . . . . . . 143--155
               A. D. Joseph and   
        A. F. de Lespinasse and   
               J. A. Tauber and   
              D. K. Gifford and   
                 M. F. Kaashoek   Rover: a toolkit for mobile information
                                  access . . . . . . . . . . . . . . . . . 156--171
                D. B. Terry and   
              M. M. Theimer and   
             Karin Petersen and   
               A. J. Demers and   
            M. J. Spreitzer and   
                   C. H. Hauser   Managing update conflicts in Bayou, a
                                  weakly connected replicated storage
                                  system . . . . . . . . . . . . . . . . . 172--182
                 M. Talluri and   
                 M. D. Hill and   
                  Y. A. Khalidi   A new page table for 64-bit address
                                  spaces . . . . . . . . . . . . . . . . . 184--200
               M. J. Feeley and   
               W. E. Morgan and   
               E. P. Pighin and   
               A. R. Karlin and   
                 H. M. Levy and   
                 C. A. Thekkath   Implementing global memory management in
                                  a workstation cluster  . . . . . . . . . 201--212
              K. L. Johnson and   
             M. F. Kaashoek and   
                  D. A. Wallach   CRL: high-performance all-software
                                  distributed shared memory  . . . . . . . 213--226
                     Mary Baker   Going threadbare (panel session): sense
                                  or sedition? a debate on the threads
                                  abstraction  . . . . . . . . . . . . . . 227--227
               Eric W. Anderson   The performance of the Container
                                  Shipping I/O system  . . . . . . . . . . 229--229
              Liana L. Fong and   
             Mark S. Squillante   Time-function scheduling: a general
                                  approach to controllable resource  . . . 230--230
          R. Gopalakrishnan and   
               Guru M. Parulkar   A real-time upcall facility for protocol
                                  processing with QoS guarantees . . . . . 231--231
                 Bryan Ford and   
                Mike Hibler and   
                    Jay Lepreau   Using annotated interface definitions to
                                  optimize RPC . . . . . . . . . . . . . . 232--232
                 Jason Nieh and   
                  Monica S. Lam   SMART: a processor scheduler for
                                  multimedia applications  . . . . . . . . 233--233
         James S. Gwertzman and   
                  Margo Seltzer   Autonomous replication across wide-area
                                  internetworks  . . . . . . . . . . . . . 234--234
            Sanjay Ghemawat and   
          M. Frans Kaashoek and   
                 Barbara Liskov   Using a modified object buffer to
                                  improve the write performance of an
                                  object-oriented database . . . . . . . . 235--235
         Mor Harchol-Balter and   
                Allen B. Downey   Exploiting process lifetime
                                  distributions for dynamic load balancing 236--236
                     J. Liedtke   On micro-kernel construction . . . . . . 237--250
               D. R. Engler and   
             M. F. Kaashoek and   
                J. O'Toole, Jr.   Exokernel: an operating system
                                  architecture for application-level
                                  resource management  . . . . . . . . . . 251--266
              B. N. Bershad and   
                  S. Savage and   
                 P. Pardyak and   
                E. G. Sirer and   
           M. E. Fiuczynski and   
                  D. Becker and   
                C. Chambers and   
                      S. Eggers   Extensibility safety and performance in
                                  the SPIN operating system  . . . . . . . 267--283
               M. Rosenblum and   
                 E. Bugnion and   
               S. A. Herrod and   
                 E. Witchel and   
                       A. Gupta   The impact of architectural trends on
                                  operating system performance . . . . . . 285--298
                 J. B. Chen and   
                    Y. Endo and   
                    K. Chan and   
                D. Mazieres and   
                    A. Dias and   
                 M. Seltzer and   
                    M. D. Smith   The measured performance of personal
                                  computer operating systems . . . . . . . 299--313
                      C. Pu and   
                  T. Autrey and   
                   A. Black and   
                  C. Consel and   
                   C. Cowan and   
                  J. Inouye and   
                 L. Kethana and   
                 J. Walpole and   
                       K. Zhang   Optimistic incremental specialization:
                                  streamlining a commercial operating
                                  system . . . . . . . . . . . . . . . . . 314--321


Operating Systems Review
Volume 30, Number SI, October, 1996

              James G. Mitchell   JavaOS: back to the future . . . . . . . 1--1
              Todd C. Mowry and   
            Angela K. Demke and   
                  Orran Krieger   Automatic compiler-inserted I/O
                                  prefetching for out-of-core applications 3--17
              Tracy Kimbrel and   
             Andrew Tomkins and   
          R. Hugo Patterson and   
              Brian Bershad and   
                    Pei Cao and   
           Edward W. Felten and   
            Garth A. Gibson and   
             Anna R. Karlin and   
                         Kai Li   A trace-driven comparison of algorithms
                                  for parallel prefetching and caching . . 19--34
           Prasenjit Sarkar and   
                   John Hartman   Efficient cooperative caching using
                                  hints  . . . . . . . . . . . . . . . . . 35--46
             Dejan Perkovic and   
               Peter J. Keleher   Online data-race detection via coherency
                                  guarantees . . . . . . . . . . . . . . . 47--57
               Manuel Costa and   
               Paulo Guedes and   
            Manuel Sequeira and   
                 Nuno Neves and   
                  Miguel Castro   Lightweight logging for lazy release
                                  consistent distributed shared memory . . 59--73
              Yuanyuan Zhou and   
               Liviu Iftode and   
                         Kai Li   Performance evaluation of two home-based
                                  lazy release consistency protocols for
                                  shared virtual memory systems  . . . . . 75--88
              David Tennenhouse   Active networks (abstract) . . . . . . . 89--89
                 Bryan Ford and   
                    Sai Susarla   CPU inheritance scheduling . . . . . . . 91--105
                Pawan Goyal and   
                Xingang Guo and   
                 Harrick M. Vin   A hierarchical CPU scheduler for
                                  multimedia operating systems . . . . . . 107--121
          Michael Greenwald and   
                 David Cheriton   The synergy between non-blocking
                                  synchronization and operating system
                                  structure  . . . . . . . . . . . . . . . 123--136
                 Bryan Ford and   
                Mike Hibler and   
                Jay Lepreau and   
           Patrick Tullmann and   
                Godmar Back and   
                Stephen Clawson   Microkernels meet recursive virtual
                                  machines . . . . . . . . . . . . . . . . 137--151
            David Mosberger and   
              Larry L. Peterson   Making paths explicit in the Scout
                                  operating system . . . . . . . . . . . . 153--167
             Sharon E. Perl and   
               Richard L. Sites   Studies of Windows NT performance using
                                  dynamic execution traces . . . . . . . . 169--183
              Yasuhiro Endo and   
                 Zheng Wang and   
            J. Bradley Chen and   
                  Margo Seltzer   Using latency to evaluate interactive
                                  system performance . . . . . . . . . . . 185--199
        Przemys\law Pardyak and   
               Brian N. Bershad   Dynamic binding for an extensible system 201--212
           Margo I. Seltzer and   
              Yasuhiro Endo and   
          Christopher Small and   
                 Keith A. Smith   Dealing with disaster: surviving
                                  misbehaved kernel extensions . . . . . . 213--227
           George C. Necula and   
                      Peter Lee   Safe kernel extensions without run-time
                                  checking . . . . . . . . . . . . . . . . 229--243
               Greg Buzzard and   
             David Jacobson and   
               Milon Mackey and   
             Scott Marovich and   
                    John Wilkes   An implementation of the Hamlyn
                                  sender-managed interface architecture    245--259
             Peter Druschel and   
                   Gaurav Banga   Lazy receiver processing (LRP): a
                                  network subsystem architecture for
                                  server systems . . . . . . . . . . . . . 261--275
José Carlos Brustoloni and   
               Peter Steenkiste   Effects of buffering semantics on I/O
                                  performance  . . . . . . . . . . . . . . 277--291

Operating Systems Review
Volume 30, Number 1, January, 1996

                  Marco de Vivo   Book Review: \em Distributed Operating
                                  Systems by Andrew S. Tanenbaum . . . . . 3--3
             Jochen Liedtke and   
              Kevin Elphinstone   Guarded page tables on Mips R4600 or an
                                  exercise in architecture-dependent micro
                                  optimization . . . . . . . . . . . . . . 4--15
                A. W. Moore and   
             A. J. McGregor and   
                    J. W. Breen   A comparison of system monitoring
                                  methods, passive network monitoring and
                                  kernel instrumentation . . . . . . . . . 16--38
           M. H. Samadzadeh and   
                    B. S. Koshy   A display and analysis tool for
                                  process-resource graphs  . . . . . . . . 39--62
               Rodney Van Meter   A brief survey of current work on
                                  network attached peripherals (extended
                                  abstract)  . . . . . . . . . . . . . . . 63--70
          M. Rasit Eskicio\uglu   A comprehensive bibliography of
                                  distributed shared memory  . . . . . . . 71--96

Operating Systems Review
Volume 30, Number 2, April, 1996

              Zhonghua Yang and   
                    Keith Duddy   CORBA: a platform for distributed object
                                  computing  . . . . . . . . . . . . . . . 4--31
           Shiuh-Pyng Shieh and   
                   Wen-Her Yang   An authentication and key distribution
                                  system for open network systems  . . . . 32--41
                   Yun Ding and   
                Patrick Horster   Why the Kuperee authentication system
                                  fails  . . . . . . . . . . . . . . . . . 42--51
                    Ye-In Chang   A dynamic request set based algorithm
                                  for mutual exclusion in distributed
                                  systems  . . . . . . . . . . . . . . . . 52--62
                 David Kotz and   
                Nils Nieuwejaar   Flexibility and performance of parallel
                                  file systems . . . . . . . . . . . . . . 63--73
               J. Carretero and   
            F. Pérez and   
               P. de Miguel and   
           F. García and   
                      L. Alonso   ParFiSys: a parallel file system for MPP 74--80
             Roger Butenuth and   
             Wolfgang Burke and   
         Hans-Ulrich Heiß   Cosy: an operating system for highly
                                  parallel computers . . . . . . . . . . . 81--91
                 Jochen Liedtke   A short note on cheap fine-grained time
                                  measurement  . . . . . . . . . . . . . . 92--94

Operating Systems Review
Volume 30, Number 3, July, 1996

               Paul F. Syverson   A new look at an old protocol  . . . . . 1--4
                  K. C. Tai and   
              Richard H. Carver   VP: a new operation for semaphores . . . 5--11
              Benjamin Reed and   
             Darrell D. E. Long   Analysis of caching algorithms for
                                  distributed file systems . . . . . . . . 12--21
                  Jiubin Ju and   
                      Yong Wang   Scheduling PVM tasks . . . . . . . . . . 22--31
         Vijay Varadharajan and   
                  Phillip Allen   Joint actions based authorization
                                  schemes  . . . . . . . . . . . . . . . . 32--45
                  Mohamed Naimi   Distributed mutual exclusion on
                                  hypercubes . . . . . . . . . . . . . . . 46--51
         Rajmohan Panadiwal and   
           Andrzej M. Goscinski   A high performance and adaptive commit
                                  protocol for a distributed environment   52--58
                  H. Mountassir   Decidability of a class of dual
                                  communicating finite state machines  . . 59--66
              Wen-Jiin Tsai and   
                    Suh-Yin Lee   Real-time scheduling of multimedia data
                                  retrieval to minimize buffer requirement 67--80

Operating Systems Review
Volume 30, Number 4, October, 1996

                     Ji Hua and   
                         Xie Li   A distributed computing model based on
                                  multiserver  . . . . . . . . . . . . . . 3--11
          Chris J. Mitchell and   
                     Liqun Chen   Comments on the S/KEY user
                                  authentication scheme  . . . . . . . . . 12--16
               Jongwoon Lee and   
              Sungyoung Lee and   
                   Hyungill Kim   Scheduling soft aperiodic tasks in
                                  adaptable fixed-priority systems . . . . 17--28
               John T. Robinson   Analysis of steady-state segment storage
                                  utilizations in a log-structured file
                                  system with least-utilized segment
                                  cleaning . . . . . . . . . . . . . . . . 29--32
              T. Cornilleau and   
             E. Gressier-Soudan   A combined-consistency approach:
                                  sequential & causal-consistency . . . . . 33--44

Operating Systems Review
Volume 30, Number 5, December, 1996

             Kunle Olukotun and   
            Basem A. Nayfeh and   
              Lance Hammond and   
                 Ken Wilson and   
                  Kunyung Chang   The case for a single-chip
                                  multiprocessor . . . . . . . . . . . . . 2--11
               Vijay S. Pai and   
  Parthasarathy Ranganathan and   
             Sarita V. Adve and   
                   Tracy Harton   An evaluation of memory consistency
                                  models for shared-memory systems with
                                  ILP processors . . . . . . . . . . . . . 12--23
                Steven L. Scott   Synchronization and communication in the
                                  T3E multiprocessor . . . . . . . . . . . 26--36
       Arvind Krishnamurthy and   
          Klaus E. Schauser and   
          Chris J. Scheiman and   
           Randolph Y. Wang and   
            David E. Culler and   
               Katherine Yelick   Evaluation of architectural support for
                                  global address-based communication in
                                  large-scale parallel machines  . . . . . 37--48
              Dirk Grunwald and   
                  Richard Neves   Whole-program optimization for time and
                                  space efficient threads  . . . . . . . . 50--59
              James Philbin and   
                  Jan Edler and   
             Otto J. Anshus and   
           Craig C. Douglas and   
                         Kai Li   Thread scheduling for cache locality . . 60--71
              Peter M. Chen and   
                Wee Teck Ng and   
       Subhachandra Chandra and   
         Christopher Aycock and   
       Gurushankar Rajamani and   
                   David Lowell   The Rio file cache: surviving operating
                                  system crashes . . . . . . . . . . . . . 74--83
              Edward K. Lee and   
       Chandramohan A. Thekkath   Petal: distributed virtual disks . . . . 84--92
        Kathryn S. McKinley and   
                  Olivier Temam   A quantitative analysis of loop nest
                                  locality . . . . . . . . . . . . . . . . 94--104
            Andrew S. Huang and   
                 John Paul Shen   The intrinsic bandwidth requirements of
                                  ordinary programs  . . . . . . . . . . . 105--114
        André Seznec and   
     Stéphan Jourdan and   
             Pascal Sainrat and   
                 Pierre Michaud   Multiple-block ahead branch predictors   116--127
            I-Cheng K. Chen and   
             John T. Coffey and   
                Trevor N. Mudge   Analysis of branch prediction via data
                                  compression  . . . . . . . . . . . . . . 128--137
           Mikko H. Lipasti and   
   Christopher B. Wilkerson and   
                 John Paul Shen   Value locality and load value prediction 138--147
          Theodore H. Romer and   
                 Dennis Lee and   
        Geoffrey M. Voelker and   
                Alec Wolman and   
              Wayne A. Wong and   
             Jean-Loup Baer and   
           Brian N. Bershad and   
                  Henry M. Levy   The structure and performance of
                                  interpreters . . . . . . . . . . . . . . 150--159
                Armando Fox and   
          Steven D. Gribble and   
             Eric A. Brewer and   
                      Elan Amir   Adapting to network and client
                                  variability via on-demand dynamic
                                  distillation . . . . . . . . . . . . . . 160--170
           Daniel J. Scales and   
       Kourosh Gharachorloo and   
       Chandramohan A. Thekkath   Shasta: a low overhead, software-only
                                  approach for supporting fine-grain
                                  shared memory  . . . . . . . . . . . . . 174--185
          Sandhya Dwarkadas and   
                Alan L. Cox and   
               Willy Zwaenepoel   An integrated compile-time/run-time
                                  software distributed shared memory
                                  system . . . . . . . . . . . . . . . . . 186--197
               R. Bianchini and   
       L. I. Kontothanassis and   
                   R. Pinto and   
                M. De Maria and   
                    M. Abud and   
                   C. L. Amorim   Hiding communication latency and
                                  coherence overhead in software DSMs  . . 198--209
           Andrew Erlichson and   
              Neal Nuckolls and   
               Greg Chesson and   
                  John Hennessy   SoftFLASH: analyzing the performance of
                                  clustered distributed virtual shared
                                  memory . . . . . . . . . . . . . . . . . 210--220
              Chi-Keung Luk and   
                  Todd C. Mowry   Compiler-based prefetching for recursive
                                  data structures  . . . . . . . . . . . . 222--233
         Mazen A. R. Saghir and   
                  Paul Chow and   
                 Corinna G. Lee   Exploiting dual data-memory banks in
                                  digital signal processors  . . . . . . . 234--243
            Edouard Bugnion and   
       Jennifer M. Anderson and   
              Todd C. Mowry and   
           Mendel Rosenblum and   
                  Monica S. Lam   Compiler-directed page coloring for
                                  multiprocessors  . . . . . . . . . . . . 244--255
   Hervé A. Jamrozik and   
          Michael J. Feeley and   
        Geoffrey M. Voelker and   
             James Evans II and   
             Anna R. Karlin and   
              Henry M. Levy and   
                 Mary K. Vernon   Reducing network latency using subpages
                                  in a global memory environment . . . . . 258--267
              Jih-Kwon Peir and   
             Windsor W. Hsu and   
              Honesty Young and   
                    Shauchi Ong   Improving cache performance with
                                  balanced tag and data paths  . . . . . . 268--278
               Ben Verghese and   
               Scott Devine and   
                Anoop Gupta and   
               Mendel Rosenblum   Operating system support for improving
                                  data locality on CC-NUMA compute servers 279--289


Operating Systems Review
Volume 31, Number 1, January, 1997

           John T. Robinson and   
          Murthy V. Devarakonda   Note on a problem with Reed and Long's
                                  FBR results  . . . . . . . . . . . . . . 3--4
            Andrew S. Tanenbaum   Report on the Seventh ACM SIGOPS
                                  European Workshop: Systems Support for
                                  Worldwide Applications . . . . . . . . . 5--17
          M. Satyanarayanan and   
             Mirjana Spasojevic   AFS and the Web: competitors or
                                  collaborators? . . . . . . . . . . . . . 18--23
                 Dane Dwyer and   
             Vaduvur Bharghavan   A mobility-aware file system for
                                  partially connected operation  . . . . . 24--30
           Michael Richmond and   
               Michael Hitchens   A new process migration algorithm  . . . 31--42
                Weiping Zhu and   
                Piotr Socko and   
            Bartek Kiepuszewski   Migration impact on load balancing---an
                                  experience on Amoeba . . . . . . . . . . 43--53
        Alexander B. Romanovsky   Conversational group service . . . . . . 54--63
             Vijay Varadharajan   Extending the Schematic Protection Model
                                  II: revocation . . . . . . . . . . . . . 64--77
               Sherali Zeadally   An evaluation of the real-time
                                  performances of SVR4.0 and SVR4.2  . . . 78--87
             Marie Rose Low and   
               James A. Malcolm   A joint authorisation scheme . . . . . . 88--96

Operating Systems Review
Volume 31, Number 2, April, 1997

                    W. M. Waite   Book Review: \em PostScript &
                                  Acrobat/PDF, Thomas Merz . . . . . . . . 1--1
                    W. M. Waite   Book Reviews: Robert Slade's \em Guide
                                  to Computer Viruses  . . . . . . . . . . 1--1
                    W. M. Waite   Book Reviews: \em The Web Publisher's
                                  Illustrated Quick Reference, Ralph
                                  Grabowski  . . . . . . . . . . . . . . . 2--2
                 Arne Helme and   
       Tage Stabell-Kulò   Security functions for a file repository 3--8
       Tage Stabell-Kulò   Security and log structured file systems 9--10
      Özalp Babao\uglu and   
               Renzo Davoli and   
              Alberto Montresor   Group membership and view synchrony in
                                  partitionable asynchronous distributed
                                  systems: specifications  . . . . . . . . 11--22
                     Qun Li and   
                     Hua Ji and   
                         Li Xie   Group consistency model which separates
                                  the intra-group consistency maintenance
                                  from the inter-group consistency
                                  maintenance in large scale DSM systems   23--35
                    Luigi Rizzo   A very fast algorithm for RAM
                                  compression  . . . . . . . . . . . . . . 36--45
               D. Arredondo and   
               M. Errecalde and   
                 F. Piccoli and   
               M. Printista and   
                 R. Gallard and   
                      s. Flores   Load distribution and balancing support
                                  in a workstation-based distributed
                                  system . . . . . . . . . . . . . . . . . 46--59
            Jonathan Karges and   
                Otto Ritter and   
            Sándor Suhai   Design and implementation of a parallel
                                  pipe . . . . . . . . . . . . . . . . . . 60--94

Operating Systems Review
Volume 31, Number 3, July, 1997

                Keok Auyong and   
                  Chye-Lin Chee   Authentication services for computer
                                  networks and electronic messaging
                                  systems  . . . . . . . . . . . . . . . . 3--15
                 Liqun Chen and   
            Dieter Gollmann and   
              Chris J. Mitchell   Authentication using minimally trusted
                                  servers  . . . . . . . . . . . . . . . . 16--28
                Ye-In Chang and   
                  Yao-Jen Chang   A fault-tolerant dynamic triangular mesh
                                  protocol for distributed mutual
                                  exclusion  . . . . . . . . . . . . . . . 29--44
                Jianmin Hou and   
                Xuandong Li and   
               Xiaocong Fan and   
                 Guoliang Zheng   A message-based real-time model by
                                  object-oriented technique  . . . . . . . 45--51
                   Carsten Vogt   Visualizing UNIX synchronization
                                  operations . . . . . . . . . . . . . . . 52--64

Operating Systems Review
Volume 31, Number 4, October, 1997

             Vincent P. Heuring   Book Review: \em Essential Java Fast,
                                  John Cowell  . . . . . . . . . . . . . . 2--2
          Evangelos P. Markatos   Visualizing working sets . . . . . . . . 3--11
                Shouhuai Xu and   
                Gendu Zhang and   
                       Hong Zhu   On the properties of cryptographic
                                  protocols and the weaknesses of the
                                  BAN-like logics  . . . . . . . . . . . . 12--23
                   Pascal Ledru   Adaptive parallelism: an early
                                  experiment with Java remote method
                                  invocation . . . . . . . . . . . . . . . 24--29
                     Qun Li and   
                   Jie Jing and   
                         Li Xie   BFXM: a parallel file system model based
                                  on the mechanism of distributed shared
                                  memory . . . . . . . . . . . . . . . . . 30--40
                Weisong Shi and   
                   Weiwu Hu and   
                    Zhimin Tang   An interaction of coherence protocols
                                  and memory consistency models in DSM
                                  systems  . . . . . . . . . . . . . . . . 41--54
  Santiago Rodríquez and   
       Antonio Pérez and   
           Rafael Méndez   A new checkpoint mechanism for real time
                                  operating systems  . . . . . . . . . . . 55--62
              A. Romanovsky and   
                    A. F. Zorzo   On distribution of coordinated atomic
                                  actions  . . . . . . . . . . . . . . . . 63--71
                    Carl Ponder   Organizing UNIX directories as lattices  72--77
                Yanxiang He and   
           Donald H. Cooley and   
                 Jianping Zhang   A model for a distributed OS automatic
                                  generation system  . . . . . . . . . . . 78--84
                Yanxiang He and   
             Jianping Zhang and   
           Donald H. Cooley and   
                        Li Chen   Semantics subsystem in distributed OS
                                  formalization generating system  . . . . 85--92

Operating Systems Review
Volume 31, Number 5, December, 1997

       Jennifer M. Anderson and   
              Lance M. Berc and   
               Jeffrey Dean and   
            Sanjay Ghemawat and   
        Monika R. Henzinger and   
          Shun-Tak A. Leung and   
           Richard L. Sites and   
        Mark T. Vandevoorde and   
        Carl A. Waldspurger and   
               William E. Weihl   Continuous profiling: where have all the
                                  cycles gone? . . . . . . . . . . . . . . 1--14
              Xiaolan Zhang and   
                 Zheng Wang and   
              Nicholas Gloy and   
            J. Bradley Chen and   
               Michael D. Smith   System support for automatic profiling
                                  and optimization . . . . . . . . . . . . 15--26
              Stefan Savage and   
            Michael Burrows and   
                Greg Nelson and   
         Patrick Sobalvarro and   
                Thomas Anderson   Eraser: a dynamic data race detector for
                                  multi-threaded programs  . . . . . . . . 27--37
                 Bryan Ford and   
                Godmar Back and   
                Greg Benson and   
                Jay Lepreau and   
                 Albert Lin and   
                   Olin Shivers   The Flux OSKit: a substrate for kernel
                                  and language research  . . . . . . . . . 38--51
          M. Frans Kaashoek and   
           Dawson R. Engler and   
          Gregory R. Ganger and   
   Hector M. Briceño and   
               Russell Hunt and   
           David Mazi\`eres and   
            Thomas Pinckney and   
               Robert Grimm and   
              John Jannotti and   
              Kenneth Mackenzie   Application performance and flexibility
                                  on exokernel systems . . . . . . . . . . 52--65
        Hermann Härtig and   
            Michael Hohmuth and   
             Jochen Liedtke and   
       Sebastian Schönberg   The performance of $\mu$-kernel-based
                                  systems  . . . . . . . . . . . . . . . . 66--77
                Armando Fox and   
          Steven D. Gribble and   
             Yatin Chawathe and   
             Eric A. Brewer and   
                  Paul Gauthier   Cluster-based scalable network services  78--91
            David E. Lowell and   
                  Peter M. Chen   Free transactions with Rio Vista . . . . 92--101
              Miguel Castro and   
                  Atul Adya and   
             Barbara Liskov and   
               Andrew C. Meyers   HAC: hybrid adaptive caching for
                                  distributed storage systems  . . . . . . 102--115
             Dan S. Wallach and   
               Dirk Balfanz and   
                  Drew Dean and   
               Edward W. Felten   Extensible security architectures for
                                  Java . . . . . . . . . . . . . . . . . . 116--128
            Andrew C. Myers and   
                 Barbara Liskov   A decentralized model for information
                                  flow control . . . . . . . . . . . . . . 129--142
            Edouard Bugnion and   
               Scott Devine and   
               Mendel Rosenblum   Disco: running commodity operating
                                  systems on scalable multiprocessors  . . 143--156
           Daniel J. Scales and   
           Kourosh Gharachorloo   Towards transparent and efficient
                                  software distributed shared memory . . . 157--169
               Robert Stets and   
          Sandhya Dwarkadas and   
       Nikolaos Hardavellas and   
                 Galen Hunt and   
    Leonidas Kontothanassis and   
   Srinivasan Parthasarathy and   
                  Michael Scott   Cashmere-2L: software coherent shared
                                  memory on a clustered remote-write
                                  network  . . . . . . . . . . . . . . . . 170--183
                 Jason Nieh and   
                  Monica S. Lam   The design, implementation and
                                  evaluation of SMART: a scheduler for
                                  multimedia applications  . . . . . . . . 184--197
           Michael B. Jones and   
             Daniela Ro\csu and   
Marcel-Cãtãlin Ro\csu   CPU reservations and time constraints:
                                  efficient, predictable scheduling of
                                  independent activities . . . . . . . . . 198--211
         William J. Bolosky and   
       Robert P. Fitzgerald and   
                John R. Douceur   Distributed schedule management in the
                                  Tiger video fileserver . . . . . . . . . 212--223
   Chandramohan A. Thekkath and   
               Timothy Mann and   
                  Edward K. Lee   Frangipani: a scalable distributed file
                                  system . . . . . . . . . . . . . . . . . 224--237
      Jeanna Neefe Matthews and   
               Drew Roselli and   
           Adam M. Costello and   
           Randolph Y. Wang and   
             Thomas E. Anderson   Improving the performance of
                                  log-structured file systems with
                                  adaptive methods . . . . . . . . . . . . 238--251
                David C. Steere   Exploiting the non-determinism and
                                  asynchrony of set iterators to reduce
                                  aggregate file I/O latency . . . . . . . 252--263
       Geoffrey H. Kuenning and   
                Gerald J. Popek   Automated hoarding for mobile computers  264--275
             Brian D. Noble and   
          M. Satyanarayanan and   
        Dushyanth Narayanan and   
          James Eric Tilton and   
                Jason Flinn and   
                Kevin R. Walker   Agile application-aware adaptation for
                                  mobility . . . . . . . . . . . . . . . . 276--287
             Karin Petersen and   
          Mike J. Spreitzer and   
           Douglas B. Terry and   
          Marvin M. Theimer and   
                 Alan J. Demers   Flexible update propagation for weakly
                                  consistent replication . . . . . . . . . 288--301


Operating Systems Review
Volume 32, Number 1, January, 1998

          Edward A. Feustel and   
                 Terry Mayfield   The DGSA: unmet information security
                                  challenges for operating system
                                  designers  . . . . . . . . . . . . . . . 3--22
           Birgit Pfitzmann and   
                Michael Waidner   How to break fraud-detectable key
                                  recovery . . . . . . . . . . . . . . . . 23--28
                 Theodore Faber   Optimizing throughout in a
                                  workstation-based network file system
                                  over a high bandwidth local area network 29--40
      Özalp Babao\uglu and   
               Renzo Davoli and   
          Alberto Montresor and   
                 Roberto Segala   System support for partition-aware
                                  network applications . . . . . . . . . . 41--56
                Yanxiang He and   
           Donald H. Cooley and   
                 Jianping Zhang   Planning management of multiagent-based
                                  distributed open: computing environment
                                  model  . . . . . . . . . . . . . . . . . 57--64

Operating Systems Review
Volume 32, Number 2, April, 1998

                    W. M. Waite   Is operating systems review obsolete?    1--1
              Gunter Haring and   
        Christoph Lindemann and   
                  Martin Reiser   International workshop performance
                                  evaluation . . . . . . . . . . . . . . . 2--3
              Marco de Vivo and   
        Gabriela O. de Vivo and   
                 Germinal Isern   Internet security attacks at the basic
                                  levels . . . . . . . . . . . . . . . . . 4--15
         Stefanos Gritzalis and   
                 George Aggelis   Security issues surrounding programming
                                  languages for mobile code: JAVA vs.
                                  Safe-Tcl . . . . . . . . . . . . . . . . 16--32

Operating Systems Review
Volume 32, Number 3, July, 1998

                Shouhuai Xu and   
                Gendu Zhang and   
                       Hong Zhu   On the security of three-party
                                  cryptographic protocols  . . . . . . . . 7--20
                  Amjad Mahmood   Task allocation in distributed computing
                                  systems  . . . . . . . . . . . . . . . . 21--29
               Sung-Il Kang and   
                  Heung-Kyu Lee   Analysis and solution of non-preemptive
                                  policies for scheduling readers and
                                  writers  . . . . . . . . . . . . . . . . 30--50
              George Dimitoglou   Deadlocks and methods for their
                                  detection, prevention and recovery in
                                  modern operating systems . . . . . . . . 51--54
                  Sanglu Lu and   
                         Xie Li   A scalable loading balancing system for
                                  NOWs . . . . . . . . . . . . . . . . . . 55--63
              Zhonghua Yang and   
                 Chengzheng Sun   CORBA for hard real time applications:
                                  some critical issues . . . . . . . . . . 64--71
              Rajesh Bordawekar   A case for compositional file systems
                                  (extended abstract)  . . . . . . . . . . 72--80

Operating Systems Review
Volume 32, Number 4, October, 1998

            Geoffrey M. Voelker   Report on the
                                  SIGMETRICS'98/PERFORMANCE'98 Joint
                                  International Conference on Measurement
                                  and Modeling of Computer Systems . . . . 3--8
              Ross Anderson and   
        Francesco Bergadano and   
               Bruno Crispo and   
             Jong-Hyeon Lee and   
      Charalampos Manifavas and   
                  Roger Needham   A new family of authentication protocols 9--20
          Chris J. Mitchell and   
                 Chan Yeob Yeun   Fixing a problem in the Helsinki
                                  protocol . . . . . . . . . . . . . . . . 21--24
                D. Patiyoot and   
                 S. J. Shepherd   Techniques for authentication protocols
                                  and key distribution on wireless ATM
                                  networks . . . . . . . . . . . . . . . . 25--32
                  Marc Joye and   
                  Sung-Ming Yen   ID-based secret-key cryptography . . . . 33--39
                Bernhard Wagner   Controlling CGI programs . . . . . . . . 40--46
    Winfried E. Kühnhauser   A classification of interdomain actions  47--61
                  Stein J. Ryan   Synchronization in portable device
                                  drivers  . . . . . . . . . . . . . . . . 62--69
                Xiaohui Wei and   
                      Jiubin Ju   SFT: a consistent checkpointing
                                  algorithm with shorter freezing time . . 70--76
                 Steven Robbins   Introducing empirical investigation in
                                  undergraduate operating systems  . . . . 77--80

Operating Systems Review
Volume 32, Number 5, December, 1998

            Keith D. Cooper and   
              Timothy J. Harvey   Compiler-controlled memory . . . . . . . 2--11
           Matthew L. Seidl and   
               Benjamin G. Zorn   Segregating heap objects by reference
                                  behavior and lifetime  . . . . . . . . . 12--23
      Michelle Mills Strout and   
               Larry Carter and   
            Jeanne Ferrante and   
                     Beth Simon   Schedule-independent storage mapping for
                                  loops  . . . . . . . . . . . . . . . . . 24--33
             Avinash Sodani and   
               Gurindar S. Sohi   An empirical analysis of instruction
                                  repetition . . . . . . . . . . . . . . . 35--45
                 Walter Lee and   
               Rajeev Barua and   
              Matthew Frank and   
    Devabhaktuni Srikrishna and   
              Jonathan Babb and   
               Vivek Sarkar and   
              Saman Amarasinghe   Space-time scheduling of
                                  instruction-level parallelism on a raw
                                  machine  . . . . . . . . . . . . . . . . 46--57
              Lance Hammond and   
                Mark Willey and   
                 Kunle Olukotun   Data speculation support for a chip
                                  multiprocessor . . . . . . . . . . . . . 58--69
           Rodney Van Meter and   
            Gregory G. Finn and   
                     Steve Hotz   VISA: Netstation's virtual Internet SCSI
                                  adapter  . . . . . . . . . . . . . . . . 71--80
             Anurag Acharya and   
              Mustafa Uysal and   
                     Joel Saltz   Active disks: programming model,
                                  algorithms and evaluation  . . . . . . . 81--91
            Garth A. Gibson and   
             David F. Nagle and   
               Khalil Amiri and   
                Jeff Butler and   
               Fay W. Chang and   
             Howard Gobioff and   
             Charles Hardin and   
                Erik Riedel and   
             David Rochberg and   
                    Jim Zelenka   A cost-effective, high-bandwidth storage
                                  architecture . . . . . . . . . . . . . . 92--103
           Philip Machanick and   
            Pierre Salverda and   
                    Lance Pompe   Hardware-software trade-offs in a direct
                                  Rambus implementation of the RAMpage
                                  memory hierarchy . . . . . . . . . . . . 105--114
                  Amir Roth and   
           Andreas Moshovos and   
               Gurindar S. Sohi   Dependence based prefetching for linked
                                  data structures  . . . . . . . . . . . . 115--126
                 Boris Weissman   Performance counters and state sharing
                                  annotations: a unified approach to
                                  thread locality  . . . . . . . . . . . . 127--138
                Brad Calder and   
             Chandra Krintz and   
                 Simmi John and   
                    Todd Austin   Cache-conscious data placement . . . . . 139--149
                     Bich C. Le   An out-of-order execution technique for
                                  runtime binary translators . . . . . . . 151--158
             Chandra Krintz and   
                Brad Calder and   
                Han Bok Lee and   
               Benjamin G. Zorn   Overlapping execution with transfer
                                  using non-strict execution for mobile
                                  programs . . . . . . . . . . . . . . . . 159--169
                Jared Stark and   
               Marius Evers and   
                   Yale N. Patt   Variable length path branch prediction   170--179
               Ben Verghese and   
                Anoop Gupta and   
               Mendel Rosenblum   Performance isolation: sharing and
                                  isolation in shared-memory
                                  multiprocessors  . . . . . . . . . . . . 181--192
                 Yuqun Chen and   
              Angelos Bilas and   
     Stefanos N. Damianakis and   
            Cezary Dubnicki and   
                         Kai Li   UTLB: a mechanism for address
                                  translation on network interfaces  . . . 193--204
               Vivek S. Pai and   
                 Mohit Aron and   
               Gaurov Banga and   
           Michael Svendsen and   
             Peter Druschel and   
           Willy Zwaenepoel and   
                    Erich Nahum   Locality-aware request distribution in
                                  cluster-based network servers  . . . . . 205--216
                  Olivier Temam   Investigating optimal local memory
                                  performance  . . . . . . . . . . . . . . 218--227
              Somnath Ghosh and   
         Margaret Martonosi and   
                   Sharad Malik   Precise miss analysis for program
                                  transformations with caches of arbitrary
                                  associativity  . . . . . . . . . . . . . 228--239
              Jih-Kwon Peir and   
               Yongjoon Lee and   
                 Windsor W. Hsu   Capturing dynamic memory reference
                                  behavior with adaptive cache topology    240--250
              Daniel Citron and   
             Dror Feitelson and   
                  Larry Rudolph   Accelerating multi-media processing by
                                  implementing memoing in multiplication
                                  and division units . . . . . . . . . . . 252--261
               Chao-Ying Fu and   
        Matthew D. Jennings and   
            Sergei Y. Larin and   
                Thomas M. Conte   Value speculation scheduling for high
                                  performance processors . . . . . . . . . 262--271
        Narayan Ranganathan and   
                 Manoj Franklin   An empirical study of decentralized ILP
                                  execution models . . . . . . . . . . . . 272--281
               Eric Schnarr and   
                 James R. Larus   Fast out-of-order processor simulation
                                  using memoization  . . . . . . . . . . . 283--294
             Bruce L. Jacob and   
                Trevor N. Mudge   A look at several memory management
                                  units, TLB-refill mechanisms, and page
                                  table organizations  . . . . . . . . . . 295--306
  Parthasarathy Ranganathan and   
       Kourosh Gharachorloo and   
             Sarita V. Adve and   
      Luiz André Barroso   Performance of database workloads on
                                  shared-memory systems with out-of-order
                                  processors . . . . . . . . . . . . . . . 307--318


Operating Systems Review
Volume 33, Number 1, January, 1999

                     Jean Bacon   Report on the Eighth ACM SIGOPS European
                                  Workshop . . . . . . . . . . . . . . . . 6--17
                  Stein J. Ryan   Synchronization in portable device
                                  drivers  . . . . . . . . . . . . . . . . 18--25
               Wei Xiao-Hui and   
                     Ju Jiu-Bin   SCR algorithm: saving/restoring states
                                  of file systems  . . . . . . . . . . . . 26--33
                     Yan Gu and   
                  B. S. Lee and   
                    Wentong Cai   Evaluation of Java thread performance on
                                  two different multithreaded kernels  . . 34--46
             Taekyoung Kwon and   
                   Jooseok Song   Clarifying straight replays and forced
                                  delays . . . . . . . . . . . . . . . . . 47--52

Operating Systems Review
Volume 33, Number 2, April, 1999

    Winfried E. Kühnhauser   A comment on S. Kang's and H. Lee's
                                  paper on ``Analysis and solution of
                                  non-preemptive policies for scheduling
                                  readers and writers'' (OSR 32(2))  . . . 4--4
                    Pei Dan and   
             Wang Dongsheng and   
               Zhang Youhui and   
                   Shen Meiming   Quasi-asynchronous migration: a novel
                                  migration protocol for PVM tasks . . . . 5--14
         Andrew T. Campbell and   
              Irene Katzela and   
                Kazuho Miki and   
                   John Vicente   Open Signaling for ATM, INTERNET and
                                  Mobile Networks (OPENSIG'98) . . . . . . 15--28
             Danai Patiyoot and   
                 S. J. Shepherd   WASS: wireless ATM security system . . . 29--35
             Danai Patiyoot and   
                 S. J. Shepherd   Cryptographic security techniques for
                                  wireless networks  . . . . . . . . . . . 36--50
               Udo Halfmann and   
    Winfried E. Kühnhauser   Embedding security policies into a
                                  distributed computing environment  . . . 51--64

Operating Systems Review
Volume 33, Number 3, July, 1999

                   Siaw-Lynn Ng   Comments on ``On the Security of
                                  Three-Party Cryptographic Protocols'' by
                                  Xu, Zhang, Zhu . . . . . . . . . . . . . 5--6
                 David Kotz and   
                 Robert S. Gray   Mobile agents and the future of the
                                  Internet . . . . . . . . . . . . . . . . 7--13
          M. Satyanarayanan and   
                Jason Flinn and   
                Kevin R. Walker   Visual proxy: exploiting OS
                                  customizations without application
                                  source code  . . . . . . . . . . . . . . 14--18
                 Jong-Hyeon Lee   The big brother ballot . . . . . . . . . 19--25
                D. Patiyoot and   
                 S. J. Shepherd   Modelling and evaluation of security
                                  induced delay in wireless ATM networks   26--31
                        Hai Jin   On-the-fly reconstruction of the failed
                                  disk in RAID . . . . . . . . . . . . . . 32--42
               Sung-Il Kang and   
                Kihyun Pyun and   
                  Heung-Kyu Lee   Performance evaluation of non-preemptive
                                  policies for scheduling readers and
                                  writers  . . . . . . . . . . . . . . . . 43--61

Operating Systems Review
Volume 33, Number 4, October, 1999

              M. Satyanarayanan   Digest of proceedings, Seventh IEEE
                                  Workshop on Hot Topics in Operating
                                  Systems, March 29--30, 1999, Rio Rico,
                                  AZ . . . . . . . . . . . . . . . . . . . 4--21
             Danai Patiyoot and   
                  S. J. Shepard   Security issues in ATM networks  . . . . 22--35
                D. Patiyoot and   
                 S. J. Shepherd   WASS: a security services for wireless
                                  ATM networks . . . . . . . . . . . . . . 36--41
               John A. Bull and   
                 David J. Otway   A nested mutual authentication protocol  42--47
               Yuqing Zhang and   
                  Jihong Li and   
                   Guozhen Xiao   An approach to the formal verification
                                  of the two-party cryptographic protocols 48--51
           D. G. Waddington and   
                   D. Hutchison   Resource partitioning in general purpose
                                  operating systems: experimental results
                                  in Windows NT  . . . . . . . . . . . . . 52--74
                 C. Toinard and   
                  G. Florin and   
                      C. Carrez   A formal method to prove ordering
                                  properties of multicast systems  . . . . 75--75
             Carlos Baquero and   
                Francisco Moura   Using structural characteristics for
                                  autonomous operation . . . . . . . . . . 90--96

Operating Systems Review
Volume 33, Number 5, December, 1999

              Yasushi Saito and   
           Brian N. Bershad and   
                  Henry M. Levy   Manageability, availability and
                                  performance in Porcupine: a highly
                                  scalable, cluster-based mail service . . 1--15
                Alec Wolman and   
                 M. Voelker and   
               Nitin Sharma and   
              Neal Cardwell and   
                Anna Karlin and   
                  Henry M. Levy   On the scale and performance of
                                  cooperative Web proxy caching  . . . . . 16--31
           Brian K. Schmidt and   
              Monica S. Lam and   
             J. Duane Northcutt   The interactive performance of SLIM: a
                                  stateless, thin-client architecture  . . 32--47
                Jason Flinn and   
              M. Satyanarayanan   Energy-aware adaptation for mobile
                                  applications . . . . . . . . . . . . . . 48--63
                David Wetherall   Active network vision and reality:
                                  lessons from a capsule-based system  . . 64--79
               Xiaoming Liu and   
           Christoph Kreitz and   
        Robbert van Renesse and   
               Jason Hickey and   
                Mark Hayden and   
             Kenneth Birman and   
               Robert Constable   Building reliable, high-performance
                                  communication systems from components    80--92
                  Werner Vogels   File system usage in Windows NT 4.0  . . 93--109
          Douglas S. Santry and   
          Michael J. Feeley and   
       Norman C. Hutchinson and   
         Alistair C. Veitch and   
             Ross W. Carton and   
                     Jacob Ofir   Deciding when to forget in the Elephant
                                  file system  . . . . . . . . . . . . . . 110--123
           David Mazi\`eres and   
           Michael Kaminsky and   
          M. Frans Kaashoek and   
                 Emmett Witchel   Separating key management from file
                                  system security  . . . . . . . . . . . . 124--139
            Tzi-cker Chiueh and   
       Ganesh Venkitachalam and   
               Prashant Pradhan   Integrating segmentation and paging
                                  protection for safe, efficient and
                                  transparent software extensions  . . . . 140--153
              Kinshuk Govil and   
               Dan Teodosiu and   
            Yongqiang Huang and   
               Mendel Rosenblum   Cellular Disco: resource management
                                  using virtual clusters on shared-memory
                                  multiprocessors  . . . . . . . . . . . . 154--169
        Jonathan S. Shapiro and   
          Jonathan M. Smith and   
                David J. Farber   EROS: a fast capability system . . . . . 170--185
       William Adjie-Winoto and   
            Elliot Schwartz and   
          Hari Balakrishnan and   
                  Jeremy Lilley   The design and implementation of an
                                  intentional naming system  . . . . . . . 186--201
        Emin Gün Sirer and   
               Robert Grimm and   
          Arthur J. Gregory and   
               Brian N. Bershad   Design and implementation of a
                                  distributed virtual machine for
                                  networked computers  . . . . . . . . . . 202--216
              Robert Morris and   
               Eddie Kohler and   
              John Jannotti and   
              M. Frans Kaashoek   The Click modular router . . . . . . . . 217--231
                 Mohit Aron and   
                 Peter Druschel   Soft timers: efficient microsecond
                                  software timer support for network
                                  processing . . . . . . . . . . . . . . . 232--246
            John R. Douceur and   
             William J. Bolosky   Progress-based regulation of
                                  low-importance processes . . . . . . . . 247--260
            Kenneth J. Duda and   
              David R. Cheriton   Borrowed-virtual-time (BVT) scheduling:
                                  supporting latency-sensitive threads in
                                  a general-purpose scheduler  . . . . . . 261--276
           Khawar M. Zuberi and   
         Padmanabhan Pillai and   
                   Kang G. Shin   EMERALDS: a small-memory real-time
                                  microkernel  . . . . . . . . . . . . . . 277--299


Operating Systems Review
Volume 34, Number 1, January, 2000

            Tyrone Nicholas and   
            Jerzy A. Barchanski   Overview of TOS: a distributed
                                  educational operating system in Java . . 2--10
                     Rohit Dube   Scalable hierarchical coarse-grained
                                  timers . . . . . . . . . . . . . . . . . 11--20
                   Yang Kun and   
                    Guo Xin and   
                      Liu Dayou   Security in mobile agent system:
                                  problems and approaches  . . . . . . . . 21--28

Operating Systems Review
Volume 34, Number 2, April, 2000

                Jay Lepreau and   
                      Eric Eide   Session summaries from the 17th
                                  Symposium on Operating Systems Principle
                                  (SOSP'99)  . . . . . . . . . . . . . . . 4--5
               Mark Theimer and   
          M. Satyanarayanan and   
               Maria Ebling and   
                 Mary Baker and   
             Frans Kaashoek and   
                Jay Lepreau and   
               Andrew Black and   
                    Carla Ellis   Tribute to Mark Weiser (summary only)    6--7
                  Jerry Saltzer   Copying with complexity (invited talk)
                                  (summary only) . . . . . . . . . . . . . 7--8
                 Butler Lampson   Computer systems research (invited talk)
                                  (summary only): past and future  . . . . 8--9
              Yasushi Saito and   
           Brian N. Bershad and   
                  Henry M. Levy   Manageability, availability and
                                  performance in Porcupine: a highly
                                  scalable, cluster-based mail service
                                  (summary only) . . . . . . . . . . . . . 9--11
                Alec Wolman and   
        Geoffrey M. Voelker and   
               Nitin Sharma and   
              Neal Cardwell and   
                Anna Karlin and   
                  Henry M. Levy   On the scale and performance of
                                  cooperative Web proxy caching  . . . . . 11--12
           Brian K. Schimdt and   
              Monica S. Lam and   
              J. Duane Northcut   The interactive performance of SLIM: a
                                  stateless, thin-client architecture  . . 12--13
                Jason Flinn and   
              M. Satyanarayanan   Energy-aware adaptation for mobile
                                  applications . . . . . . . . . . . . . . 13--14
                David Wetherall   Active network vision and reality:
                                  lessons from a capsule-based system  . . 15--16
               Xiaoming Liu and   
           Christoph Kreitz and   
        Robbert van Renesse and   
               Jason Hickey and   
                Mark Hayden and   
             Kenneth Birman and   
               Robert Constable   Building reliable, high-performance
                                  communication systems from components    16--17
                  Werner Vogels   File system usage in Windows NT 4.0  . . 17--18
          Douglas S. Santry and   
          Michael J. Feeley and   
       Norman C. Hutchinson and   
         Alistair C. Veitch and   
             Ross W. Carton and   
                     Jacob Ofir   Deciding when to forget in the Elephant
                                  file system  . . . . . . . . . . . . . . 18--19
           David Mazi\`eres and   
           Michael Kaminsky and   
          M. Frans Kaashoek and   
                 Emmett Witchel   Separating key management from file
                                  system security  . . . . . . . . . . . . 19--20
            Tzi-Cker Chiueh and   
       Ganesh Venkitachalam and   
               Prashant Pradhan   Integrating segmentation and paging
                                  protection for safe, efficient and
                                  transparent software extensions  . . . . 20--20
             Kingshuk Govil and   
               Dan Teodosiu and   
            Yongqiang Huang and   
               Mendel Rosenblum   Cellular disco: resource management
                                  using virtual clusters on shared-memory
                                  multiprocessors  . . . . . . . . . . . . 21--21
        Jonathan S. Shapiro and   
          Jonathan M. Smith and   
                David J. Farber   EROS: a fast capability system . . . . . 21--22
       William Adjie-Winoto and   
            Elliot Schwartz and   
          Hari Balakrishnan and   
                  Jeremy Lilley   The design and implementation of an
                                  intentional naming system  . . . . . . . 22--22
        Emin Gün Sirer and   
               Robert Grimm and   
          Arthur J. Gregory and   
               Brian N. Bershad   Design and implementation of a
                                  distributed virtual machine for
                                  networked computers  . . . . . . . . . . 23--23
              Robert Morris and   
               Eddie Kohler and   
              John Jannotti and   
              M. Frans Kaashoek   The click modular router . . . . . . . . 24--25
                 Mohit Aron and   
                 Peter Druschel   Soft timers: efficient microsecond
                                  software timer support for network
                                  processing . . . . . . . . . . . . . . . 25--26
            John R. Douceur and   
             William J. Bolosky   Process-based regulation of
                                  low-importance processes . . . . . . . . 26--27
            Kenneth J. Duda and   
              David R. Cheriton   Borrowed-virtual-time (BVT) scheduling:
                                  supporting latency-sensitive threads in
                                  a general-purpose scheduler  . . . . . . 27--28
           Khawar M. Zuberi and   
         Padmanabhan Pillai and   
                   Kang G. Shin   EMERALDS: a small-memory real-time
                                  microkernel  . . . . . . . . . . . . . . 28--29
                   Marc Shapiro   Lessons learned from a wide area sharing
                                  platform . . . . . . . . . . . . . . . . 29--29
         William J. Bolosky and   
            John R. Doucher and   
                 Marvin Theimer   Mutually-distrusting cooperative file
                                  systems  . . . . . . . . . . . . . . . . 29--30
                Greg Ganger and   
            Steve Schlosser and   
               John Griffin and   
                    David Nagle   Incorporating MEMS-based storage into
                                  computer systems . . . . . . . . . . . . 30--30
                Jay Lepreau and   
               Chris Alfeld and   
             David Andersen and   
                 Kristin Wright   A highly configurable emulation facility
                                  for distributed systems and networks . . 30--30
        Umakishore Ramachandran   System infrastructure for ubiquitous
                                  presence . . . . . . . . . . . . . . . . 31--31
                John Regehr and   
              John A. Stankovic   Hierarchical schedulers, performance
                                  guarantee, and resource management . . . 31--31
              Matthew Flatt and   
              Alastair Reid and   
                    Jay Lepreau   CpU: practical components for systems
                                  software . . . . . . . . . . . . . . . . 32--32
           Michael L. Scott and   
          Sandhya Dwarkadas and   
   Srinivasan Parthasarathy and   
     Rajeev Balasubramonian and   
                DeQing Chen and   
          Grigorios Magklis and   
   Athanasios Papathanasiou and   
           Eduardo Pinheiro and   
        Umit Rencuzogullari and   
                Chunquiang Tang   Interweave: object caching meets
                                  software distributed shared memory . . . 32--32
               Eyal de Lara and   
                Dan Wallach and   
               Willy Zwaenepoel   Puppeteer: component-based adaptation
                                  for mobile computing . . . . . . . . . . 33--33
                Chenyang Lu and   
          John A. Stankovic and   
           Tarek Abdelzaher and   
                Sang H. Son and   
                       Gang Tao   Feedback control real-time scheduling:
                                  support for performance guarantees in
                                  unpredictable environments . . . . . . . 33--33
             Yasushi Shinjo and   
                      Calton Pu   Developing correct and efficient
                                  multithreaded programs with
                                  thread-specific data and a partial
                                  evaluator  . . . . . . . . . . . . . . . 33--33
                     Haifeng Yu   TACT: tunable availability and
                                  consistency tradeoffs for replicated
                                  Internet services  . . . . . . . . . . . 33--33
                    Aaron Brown   Towards benchmarks for maintainability,
                                  availability and growth/evolution  . . . 34--34
                 David Cheriton   TRIAD  . . . . . . . . . . . . . . . . . 34--34
            Pål Halvorsen   Network level framing: speeding up a
                                  multimedia storage server  . . . . . . . 34--34
             Tatyana Ryutov and   
                Clifford Neuman   Representation and evaluation of
                                  security policies  . . . . . . . . . . . 34--34
               Emmanuel Cecchet   Distributed shared memory for large
                                  computing clusters based on
                                  memory-mapped networks (poster session)  35--35
                  Fay Chang and   
                   Garth Gibson   Automatic generation of I/O prefetching
                                  hints through speculative execution
                                  (poster session) . . . . . . . . . . . . 35--35
                   Han Kilicote   PASIS: perpetually available and secure
                                  information systems (poster session) . . 35--35
               Khalil Amiri and   
               David Petrou and   
                Greg Ganger and   
                   Garth Gibson   Automatic function placement in
                                  distributed storage systems  . . . . . . 36--36
           Surendar Chandra and   
      Carla Schlatter Ellis and   
                    Amin Vahdat   Differentiated QoS through quality aware
                                  transformation of Web content  . . . . . 36--36
        Pål Halvorsen and   
           Thomas Plagemann and   
                    Vera Goebel   The INSTANCE project: operating system
                                  enhancements to support multimedia
                                  servers  . . . . . . . . . . . . . . . . 36--36
              Joon Suan Ong and   
               Yvonne Coady and   
              Michael J. Feeley   Integrating virtual memory with
                                  user-level network communication . . . . 36--37
             Anurag Acharya and   
            Maximilian Ibel and   
           Matthias Koelsch and   
                Michael Schmitt   RENS: a framework for rapidly evolvable
                                  network services . . . . . . . . . . . . 37--37
              Donald Miller and   
                   Alan Skousen   The Sombrero distributed single address
                                  space operating system . . . . . . . . . 37--37
                Yasushi Negishi   Tuplink: a communication system for PDAs
                                  and micro-devices  . . . . . . . . . . . 37--37
          Steven D. Gribble and   
             Eric A. Brewer and   
               David Culler and   
          Joseph M. Hellerstein   Persistent distributed data structures
                                  to simplify cluster-based Internet
                                  services . . . . . . . . . . . . . . . . 37--38
                   Eric Jul and   
                  Povl Koch and   
    Jòrgen S. Hansen and   
           Michael Svendsen and   
              Kim Henriksen and   
               Kenn Nielsen and   
                Mads Dydensborg   High-performance cluster-based Internet
                                  servers  . . . . . . . . . . . . . . . . 38--38
                 Erez Zadok and   
                     Jason Nieh   FIST: a language for stackable file
                                  systems  . . . . . . . . . . . . . . . . 38--38
                 Jon Howell and   
                     David Kotz   Restricted delegation: seamlessly
                                  spanning administrative boundaries . . . 38--39
                   Ian McDonald   Distributed, flexible memory management
                                  in an operating system supporting
                                  quality of service . . . . . . . . . . . 39--39
                Rolf Neugebauer   A Unix-like personality supporting
                                  quality-of-service . . . . . . . . . . . 39--39
           Prashant Pradhan and   
                  Anindya Neogi   Suez: high-performance real-time IP
                                  router . . . . . . . . . . . . . . . . . 39--39
               Eyal de Lara and   
                Dan Wallach and   
               Willy Zwaenepoel   Puppeteer: component-based adaptation
                                  for mobile computing (poster session)    40--40
                Chenyang Lu and   
          John A. Stankovic and   
           Tarek Abdelzaher and   
                Sang H. Son and   
                       Gang Tao   Feedback control real-time scheduling:
                                  support for performance guarantees in
                                  unpredictable environments (poster
                                  session) . . . . . . . . . . . . . . . . 40--40
                 Yasushi Shinjo   Developing correct and efficient
                                  multithreaded programs with
                                  thread-specific data and a partial
                                  evaluator  . . . . . . . . . . . . . . . 40--40
                     Haifeng Yu   TACT: tunable availability and
                                  consistency tradeoffs for replicated
                                  Internet services (poster session) . . . 40--40
                    Aaron Brown   Towards benchmarks for maintainability,
                                  availability and growth/evolution(MAGE)  41--41
                 David Cheriton   TRIAD  . . . . . . . . . . . . . . . . . 41--41
            Pål Halvorsen   Network level farming: speeding up a
                                  multimedia storage server  . . . . . . . 41--41
             Tatyana Ryutov and   
                Clifford Neuman   Representation and evaluation of
                                  security policies (poster session) . . . 41--41
                 Yibei Ling and   
               Tracy Mullen and   
                     Xiaola Lin   Analysis of optimal thread pool size . . 42--55
                   Marc Lacoste   Towards a secure platform for
                                  distributed mobile object computing  . . 56--73
                  Sanglu Lu and   
                         Li Xie   Scalable scheduling on a network of
                                  workstations . . . . . . . . . . . . . . 74--83
                Chen Ximing and   
                   Lu Xianliang   Runtime incremental concentrated
                                  scheduling on NOW(NRICS) . . . . . . . . 84--96

Operating Systems Review
Volume 34, Number 3, July, 2000

              John A. Trono and   
              William E. Taylor   Further comments on \em ``A Correct and
                                  Unrestrictive Implementation of General
                                  Semaphores'' . . . . . . . . . . . . . . 5--10
                      Baowen Xu   Tagged semaphores  . . . . . . . . . . . 11--15
                Pengjun Pei and   
                 Guohua Cui and   
                       Kun Peng   On a session key compromise problem in
                                  [KC95] protocol  . . . . . . . . . . . . 16--18
               Yongxing Sun and   
                    Xinmei Wang   An approach to finding the attacks on
                                  the cryptographic protocols  . . . . . . 19--28
                      Li Ji and   
                Li Tianning and   
                Chen Guihai and   
                     Xie Li and   
                     C. L. Wang   Strategies optimization and integration
                                  in DSM . . . . . . . . . . . . . . . . . 29--39
                K. A. Iskra and   
          F. van der Linden and   
            Z. W. Hendrikse and   
           B. J. Overeinder and   
           G. D. van Albada and   
                 P. M. A. Sloot   The implementation of dynamite: an
                                  environment for migrating PVM tasks  . . 40--55
              Chris J. Mitchell   Making serial number based
                                  authentication robust against loss of
                                  state  . . . . . . . . . . . . . . . . . 56--59
             A. Bouabdallah and   
                    C. Laforest   A distributed token-based algorithm for
                                  the dynamic resource allocation problem  60--68
              G. Alan Creak and   
                 Robert Sheehan   A top-down operating systems course  . . 69--80

Operating Systems Review
Volume 34, Number 4, October, 2000

                  John A. Trono   Comments on \em ``Tagged semaphores''    7--11
                Chun-Li Lin and   
               Hung-Min Sun and   
                 Tzonelih Hwang   Three-party encrypted key exchange:
                                  attacks and a solution . . . . . . . . . 12--20
                D. M. Beder and   
              A. Romanovsky and   
                 B. Randell and   
                 C. R. Snow and   
                   R. J. Stroud   An application of fault tolerance
                                  patterns and coordinated atomic actions
                                  to a problem in railway scheduling . . . 21--31
              M. Satyanarayanan   Caching trust rather than content  . . . 32--33
               J. M. Sierra and   
                 S. J. Shepherd   New phase 1 exchange mode for IKE
                                  framework  . . . . . . . . . . . . . . . 34--40
           Gerco Ballintijn and   
              Maarten van Steen   Characterizing Internet performance to
                                  support wide-area application
                                  development  . . . . . . . . . . . . . . 41--47
            Michael Sonntag and   
        Rudolf Hörmanseder   Mobile agent security based on payment   48--55
           Laurence Duchien and   
       Gérard Florin and   
              Lionel Seinturier   Partial order relations in distributed
                                  object environments  . . . . . . . . . . 56--75
                  Henri Bal and   
            Raoul Bhoedjang and   
              Rutger Hofman and   
              Ceriel Jacobs and   
             Thilo Kielmann and   
              Jason Maassen and   
         Rob van Nieuwpoort and   
                John Romein and   
               Luc Renambot and   
              Tim Rühl and   
             Ronald Veldema and   
              Kees Verstoep and   
               Aline Baggio and   
           Gerco Ballintijn and   
                   Ihor Kuz and   
           Guillaume Pierre and   
          Maarten van Steen and   
             Andy Tanenbaum and   
            Gerben Doornbos and   
            Desmond Germans and   
              Hans Spoelder and   
         Evert-Jan Baerends and   
         Stan van Gisbergen and   
        Hamideh Afsermanesh and   
            Dick van Albada and   
               Adam Belloum and   
            David Dubbeldam and   
            Zeger Hendrikse and   
            Bob Hertzberger and   
            Alfons Hoekstra and   
                Kamil Iskra and   
              Drona Kandhai and   
              Dennis Koelma and   
       Frank van der Linden and   
           Benno Overeinder and   
                Peter Sloot and   
             Piero Spinnato and   
                 Dick Epema and   
           Arjan van Gemund and   
              Pieter Jonker and   
           Andrei Radulescu and   
          Cees van Reeuwijk and   
                  Henk Sips and   
          Peter Knijnenburg and   
                Michael Lew and   
             Floris Sluiter and   
                Lex Wolters and   
                  Hans Blom and   
               Cees de Laat and   
              Aad van der Steen   The distributed ASCI Supercomputer
                                  project  . . . . . . . . . . . . . . . . 76--96

Operating Systems Review
Volume 34, Number 5, December, 2000

        Steven W. Schlosser and   
       John Linwood Griffin and   
             David F. Nagle and   
              Gregory R. Ganger   Designing computer systems with
                                  MEMS-based storage . . . . . . . . . . . 1--12
       Kourosh Gharachorloo and   
               Madhu Sharma and   
               Simon Steely and   
              Stephen Van Doren   Architecture and design of AlphaServer
                                  GS320  . . . . . . . . . . . . . . . . . 13--24
          Milo M. K. Martin and   
            Daniel J. Sorin and   
         Anatassia Ailamaki and   
         Alaa R. Alameldeen and   
            Ross M. Dickson and   
              Carl J. Mauer and   
             Kevin E. Moore and   
               Manoj Plakal and   
               Mark D. Hill and   
                  David A. Wood   Timestamp snooping: an approach for
                                  extending SMPs . . . . . . . . . . . . . 25--36
              Ashwini Nanda and   
               Kwok-Ken Mak and   
        Krishnan Sugarvanam and   
          Ramendra K. Sahoo and   
Vijayaraghavan Soundarararjan and   
                 T. Basil Smith   MemorIES3: a programmable, real-time
                                  hardware emulation tool for
                                  multiprocessor server design . . . . . . 37--48
                Jeff Gibson and   
                Robert Kunz and   
                David Ofelt and   
              Mark Horowitz and   
              John Hennessy and   
                  Mark Heinrich   FLASH vs. (Simulated) FLASH: closing the
                                  simulation loop  . . . . . . . . . . . . 49--58
                  Andy Chou and   
             Benjamin Chelf and   
              Dawson Engler and   
                  Mark Heinrich   Using meta-level compilation to check
                                  FLASH protocol code  . . . . . . . . . . 59--70
      Raoul A. F. Bhoedjang and   
              Kees Verstoep and   
              Tim Rühl and   
               Henri E. Bal and   
            Rutger F. H. Hofman   Evaluating design alternatives for
                                  reliable communication on high-speed
                                  networks . . . . . . . . . . . . . . . . 71--81
              Peter Mattson and   
           William J. Dally and   
               Scott Rixner and   
            Ujval J. Kapasi and   
                  John D. Owens   Communication scheduling . . . . . . . . 82--92
                 Jason Hill and   
            Robert Szewczyk and   
                   Alec Woo and   
                Seth Hollar and   
               David Culler and   
               Kristofer Pister   System architecture directions for
                                  networked sensors  . . . . . . . . . . . 93--104
            Alvin R. Lebeck and   
                 Xiaobo Fan and   
                  Heng Zeng and   
                    Carla Ellis   Power aware page allocation  . . . . . . 105--116
            Emery D. Berger and   
        Kathryn S. McKinley and   
          Robert D. Blumofe and   
                 Paul R. Wilson   Hoard: a scalable memory allocator for
                                  multithreaded applications . . . . . . . 117--128
   Kristián Flautner and   
                 Rich Uhlig and   
            Steve Reinhardt and   
                   Trevor Mudge   Thread-level parallelism and interactive
                                  performance of desktop applications  . . 129--138
          Motohiro Kawahito and   
            Hideaki Komatsu and   
                Toshio Nakatani   Effective null pointer check elimination
                                  utilizing hardware trap  . . . . . . . . 139--149
               Youtao Zhang and   
                   Jun Yang and   
                    Rajiv Gupta   Frequent value locality and
                                  value-centric data cache design  . . . . 150--159
                 M. Burrows and   
               U. Erlingson and   
              S-T. A. Leung and   
          M. T. Vandevoorde and   
          C. A. Waldspurger and   
                  K. Walker and   
                    W. E. Weihl   Efficient and flexible value sampling    160--167
David Lie Chandramohan Thekkath and   
              Mark Mitchell and   
            Patrick Lincoln and   
                  Dan Boneh and   
              John Mitchell and   
                  Mark Horowitz   Architectural support for copy and
                                  tamper resistant software  . . . . . . . 168--177
               Jerome Burke and   
              John McDonald and   
                    Todd Austin   Architectural support for fast
                                  symmetric-key cryptography . . . . . . . 178--189
           John Kubiatowicz and   
               David Bindel and   
                   Yan Chen and   
          Steven Czerwinski and   
              Patrick Eaton and   
               Dennis Geels and   
        Ramakrishna Gummadi and   
                  Sean Rhea and   
         Hakim Weatherspoon and   
                Chris Wells and   
                       Ben Zhao   OceanStore: an architecture for
                                  global-scale persistent storage  . . . . 190--201
         Evelyn Duesterwald and   
                   Vasanth Bala   Software profiling for hot path
                                  prediction: less is more . . . . . . . . 202--211
                 Rumi Zahir and   
              Jonathan Ross and   
                Dale Morris and   
                      Drew Hess   OS and compiler considerations in the
                                  design of the IA-64 architecture . . . . 212--221
          Daniel A. Connors and   
          Hillery C. Hunter and   
            Ben-Chung Cheng and   
                 Wen-mei W. Hwu   Hardware support for dynamic activation
                                  of compiler-directed computation reuse   222--233
              Allan Snavely and   
                Dean M. Tullsen   Symbiotic jobscheduling for a
                                  simultaneous multithreaded processor . . 234--244
         Joshua A. Redstone and   
            Susan J. Eggers and   
                  Henry M. Levy   An analysis of operating system behavior
                                  on a simultaneous multithreaded
                                  architecture . . . . . . . . . . . . . . 245--256
     Karthik Sundaramoorthy and   
                Zach Purser and   
                 Eric Rotenburg   Slipstream processors: improving both
                                  performance and fault tolerance  . . . . 257--268


Operating Systems Review
Volume 35, Number 1, January, 2001

                 Dongyao Ji and   
                    Yuming Wang   Comments on \em ``An approach to the
                                  formal verification of the two-party
                                  cryptographic protocols'' by Zhang, Li
                                  and Xiao . . . . . . . . . . . . . . . . 6--7
                Bruce K. Haddon   IEEE storage system standards  . . . . . 8--16
              Ming-Yuan Zhu and   
                    Lei Luo and   
                Guang-Zhe Xiong   A provably correct operating system:
                                  $\delta$-core  . . . . . . . . . . . . . 17--33
              D. Janaki Ram and   
              M. Uma Mahesh and   
    N. S. K. Chandra Sekhar and   
                    Chitra Babu   Causal consistency in mobile environment 34--40
                Chun-Li Lin and   
               Hung-Min Sun and   
                 Tzonelih Hwang   Efficient and practical DHEKE protocols  41--47
            Daniel P. Bovet and   
                   Marco Cesati   A real bottom-up operating systems
                                  course . . . . . . . . . . . . . . . . . 48--60
       Herman Chung-Hwa Rao and   
              Yih-Farn Chen and   
                 Ming-Feng Chen   A proxy-based personal Web archiving
                                  service  . . . . . . . . . . . . . . . . 61--72
          Alberto Montresor and   
               Renzo Davoli and   
          Özalp Babao\uglu   Middleware for dependable network
                                  services in partitionable distributed
                                  systems  . . . . . . . . . . . . . . . . 73--96
            Maurice Herlihy and   
        Srikanta Tirthapura and   
              Roger Wattenhofer   Ordered Multicast and Distributed Swap   85--96

Operating Systems Review
Volume 35, Number 2, April, 2001

            Greg Eisenhauer and   
Fabián E. Bustamante and   
                 Karsten Schwan   A middleware toolkit for
                                  client-initiated service specialization  7--20
          Ahmed Al-Theneyan and   
            Piyush Mehrotra and   
                Mohammed Zubair   Enhancing Jini for use across
                                  non-multicastable networks . . . . . . . 21--30
                 Radu Litiu and   
                   Atul Prakash   DACIA: a mobile component framework for
                                  building adaptive distributed
                                  applications . . . . . . . . . . . . . . 31--42
               Yuqing Zhang and   
              Chunling Wang and   
                Jianping Wu and   
                        Xing Li   Using SMV for cryptographic protocol
                                  analysis: a case study . . . . . . . . . 43--50
                   Z. Huang and   
                     C. Sun and   
                  M. Purvis and   
                  S. Cranefield   View-based consistency and false sharing
                                  effect in distributed shared memory  . . 51--60
              Athena Vakali and   
                 Evimaria Terzi   Multimedia data storage and
                                  representation issues on tertiary
                                  storage subsystems: an overview  . . . . 61--77
               Youhui Zhang and   
             Dongsheng Wang and   
                   Weimin Zheng   Transparent checkpointing and rollback
                                  recovery mechanism for Windows NT
                                  applications . . . . . . . . . . . . . . 78--85
                M. Bozyigit and   
                       M. Wasiq   User-level process checkpoint and
                                  restore for migration  . . . . . . . . . 86--96

Operating Systems Review
Volume 35, Number 3, July, 2001

             Jason Crampton and   
                  George Loizou   Authorisation and antichains . . . . . . 6--15
               Alok Shriram and   
            Anuraag Sarangi and   
                     Avinash S.   ICHU model for processor allocation in
                                  distributed operating systems  . . . . . 16--21
              Ming-Yuan Zhu and   
                    Lei Luo and   
                 Guang-Ze Xiong   The minimal model of operating systems   22--29
                Bu-Sung Lee and   
               Wen-Tong Cai and   
          Stephen J. Turner and   
                   Jit-Beng Koh   Comparison of network protocol and
                                  architecture for distributed virtual
                                  simulation environment . . . . . . . . . 30--42
                    Vijay Gupta   A distributed backoff algorithm to
                                  support real-time traffic on Ethernet    43--66
                   B. Gupta and   
                 S. K. Banerjee   A Roll-Forward Recovery Scheme for
                                  Solving the Problem of Coasting Forward
                                  for Distributed Systems  . . . . . . . . 55--66
                    Jun Wen and   
                 Xiang-liang Lu   Realize network subsystem QoS guarantee  67--71

Operating Systems Review
Volume 35, Number 4, October, 2001

                G. Saunders and   
                M. Hitchens and   
                V. Varadharajan   Role-based access control and the access
                                  control matrix . . . . . . . . . . . . . 6--20
                Dan Oestreicher   Experience with a commercial Java
                                  implementation of group communication
                                  using reliable multicast . . . . . . . . 21--31
            Chang-Seop Park and   
                  Dong-Hoon Lee   Secure and efficient key management for
                                  dynamic multicast groups . . . . . . . . 32--38
                  Yuhong Li and   
                      Lars Wolf   Collection of network information in
                                  active networks  . . . . . . . . . . . . 39--49
      Constantinos Dovrolis and   
                Brad Thayer and   
        Parameswaran Ramanathan   HIP: hybrid interrupt-polling for the
                                  network interface  . . . . . . . . . . . 50--60
       Sukanya Suranauwarat and   
                Hideo Taniguchi   The design, implementation and initial
                                  evaluation of an advanced
                                  knowledge-based process scheduler  . . . 61--81
                  Tao Huang and   
                    Teng Xu and   
                   Xianliang Lu   A high resolution disk I/O trace system  82--87
              Stefan Ludwig and   
                 Winfried Kalfa   File system encryption with integrated
                                  user management  . . . . . . . . . . . . 88--93
                    Gu Dawu and   
                        Wang Yi   On the techniques of enhancing the
                                  security of block ciphers  . . . . . . . 94--96

Operating Systems Review
Volume 35, Number 5, December, 2001

            Steve Zdancewic and   
              Lantian Zheng and   
          Nathaniel Nystrom and   
                Andrew C. Myers   Untrusted hosts and confidentiality:
                                  secure program partitioning  . . . . . . 1--14
          Rodrigo Rodrigues and   
              Miguel Castro and   
                 Barbara Liskov   BASE: using abstraction to improve fault
                                  tolerance  . . . . . . . . . . . . . . . 15--28
                 Haifeng Yu and   
                    Amin Vahdat   The costs and limits of availability for
                                  replicated services  . . . . . . . . . . 29--42
   Andrea C. Arpaci-Dusseau and   
        Remzi H. Arpaci-Dusseau   Information and control in gray-box
                                  systems  . . . . . . . . . . . . . . . . 43--56
              Dawson Engler and   
              David Yu Chen and   
                Seth Hallem and   
                  Andy Chou and   
                 Benjamin Chelf   Bugs as deviant behavior: a general
                                  approach to inferring errors in systems
                                  code . . . . . . . . . . . . . . . . . . 57--72
                  Andy Chou and   
               Junfeng Yang and   
             Benjamin Chelf and   
                Seth Hallem and   
                  Dawson Engler   An empirical study of operating systems
                                  errors . . . . . . . . . . . . . . . . . 73--88
         Padmanabhan Pillai and   
                   Kang G. Shin   Real-time dynamic voltage scaling for
                                  low-power embedded operating systems . . 89--102
           Jeffrey S. Chase and   
        Darrell C. Anderson and   
           Prachi N. Thakar and   
             Amin M. Vahdat and   
                Ronald P. Doyle   Managing energy and server resources in
                                  hosting centers  . . . . . . . . . . . . 103--116
               Sitaram Iyer and   
                 Peter Druschel   Anticipatory scheduling: a disk
                                  scheduling framework to overcome
                                  deceptive idleness in synchronous I/O    117--130
             David Andersen and   
          Hari Balakrishnan and   
             Frans Kaashoek and   
                  Robert Morris   Resilient overlay networks . . . . . . . 131--145
             John Heidemann and   
                Fabio Silva and   
   Chalermek Intanagonwiwat and   
            Ramesh Govindan and   
             Deborah Estrin and   
                 Deepak Ganesan   Building efficient wireless sensor
                                  networks with low-level naming . . . . . 146--159
            Alex C. Snoeren and   
             Kenneth Conley and   
               David K. Gifford   Mesh-based content routing using XML . . 160--173
     Athicha Muthitacharoen and   
                Benjie Chen and   
               David Mazi\`eres   A low-bandwidth network file system  . . 174--187
            Antony Rowstron and   
                 Peter Druschel   Storage management and caching in PAST,
                                  a large-scale, persistent peer-to-peer
                                  storage utility  . . . . . . . . . . . . 188--201
                Frank Dabek and   
          M. Frans Kaashoek and   
               David Karger and   
              Robert Morris and   
                     Ion Stoica   Wide-area cooperative storage with CFS   202--215
              Tammo Spalink and   
               Scott Karlin and   
             Larry Peterson and   
              Yitzchak Gottlieb   Building a robust software-based router
                                  using network processors . . . . . . . . 216--229
                 Matt Welsh and   
               David Culler and   
                    Eric Brewer   SEDA: an architecture for
                                  well-conditioned, scalable Internet
                                  services . . . . . . . . . . . . . . . . 230--243


Operating Systems Review
Volume 36, Number 1, January, 2002

             Stuart Eichert and   
           Osman N. Ertugay and   
                Dan Nessett and   
            Suresh Vobbilisetty   Commercially viable active networking    8--22
                    D. Patiyoot   Migration /evolution of security towards
                                  wireless ATM . . . . . . . . . . . . . . 23--30
                 Danai Patiyoot   Security issues for wireless ATM
                                  networks . . . . . . . . . . . . . . . . 31--57
           Stephen D. Wolthusen   Access and use control using externally
                                  controlled reference monitors  . . . . . 58--69
                    Yun Mao and   
               Youhui Zhang and   
             Dongsheng Wang and   
                   Weimin Zheng   LND: a reliable multi-tier storage
                                  device in NOW  . . . . . . . . . . . . . 70--80
                    Jun Wen and   
                   Xianliang Lu   The design of QoS guarantee network
                                  subsystem  . . . . . . . . . . . . . . . 81--87
                Yanxiang He and   
                 Zhuomin Du and   
                   Xuhui Li and   
           Donald H. Cooley and   
                        Jing He   A field-based collaboration strategy in
                                  MADCE  . . . . . . . . . . . . . . . . . 88--96

Operating Systems Review
Volume 36, Number 2, April, 2002

                 Rimon Barr and   
             John C. Bicket and   
           Daniel S. Dantas and   
                   Bowei Du and   
            T. W. Danny Kim and   
                  Bing Zhou and   
            Emin Gün Sirer   On the need for system-level support for
                                  ad hoc and sensor networks . . . . . . . 1--5
           Niklas Borselius and   
          Chris J. Mitchell and   
                   Aaron Wilson   A pragmatic alternative to undetachable
                                  signatures . . . . . . . . . . . . . . . 6--11
               Zhang Youhui and   
                 Wang Dongsheng   A checkpoint-based high availability
                                  run-time system for Windows NT clusters  12--18
       Daniel G. Waddington and   
             Ramesh Viswanathan   Interaction points: exploiting operating
                                  system mechanisms for inter-component
                                  communications . . . . . . . . . . . . . 19--35
                  T. M. Ong and   
                  T. M. Lim and   
                  B. S. Lee and   
                      C. K. Yeo   Unicorn: voluntary computing over
                                  Internet . . . . . . . . . . . . . . . . 36--51
                    Bi Peng and   
                    Xie Fei and   
              Yang Guangwen and   
                  Wang Dingxing   A multi-protocol cross-domain
                                  communication model for metacomputing
                                  systems  . . . . . . . . . . . . . . . . 52--63

Operating Systems Review
Volume 36, Number 3, July, 2002

                Felix Rauch and   
             Thomas M. Stricker   Comments on \em ``Transparent User-Level
                                  Process Checkpoint and Restore for
                                  Migration'' by Bozyigit and Wasiq  . . . 8--9
                     Lu Jun and   
               Lu Xianliang and   
                   Han Hong and   
                   Wei Qingsong   A cooperative asynchronous write
                                  mechanism for NAS  . . . . . . . . . . . 25--32
                Yutaka Wada and   
                    Zixue Cheng   An efficient distributed method for
                                  allocating resources based on an
                                  unobstructed squeezing technique . . . . 33--45
              Cheng-Chi Lee and   
           Min-Shiang Hwang and   
                  Wei-Peng Yang   A flexible remote user authentication
                                  scheme using Smart Cards . . . . . . . . 46--52
                 Arun Kumar and   
              Neeran Karnik and   
                  Girish Chafle   Context sensitivity in role-based access
                                  control  . . . . . . . . . . . . . . . . 53--66
            Laurent Amanton and   
               Mohamed Na\"\imi   The concept of causal-phase ordering
                                  for overlapped broadcasts  . . . . . . . 67--81
                  C. K. Yeo and   
                  B. S. Lee and   
                       M. H. Er   A peering architecture for ubiquitous IP
                                  multicast streaming  . . . . . . . . . . 82--95

Operating Systems Review
Volume 36, Number 4, October, 2002

                   Hong Han and   
              Xian Liang Lu and   
                     Jun Lu and   
                    Chen Bo and   
                    Ren Li Yong   Data mining aided signature discovery in
                                  network-based intrusion detection system 7--13
               Her-Tyan Yeh and   
                   Hung-Min Sun   Simple authenticated key agreement
                                  protocol resistant to password guessing
                                  attacks  . . . . . . . . . . . . . . . . 14--22
              Cheng-Chi Lee and   
                  Li-Hua Li and   
               Min-Shiang Hwang   A remote user authentication scheme
                                  using hash functions . . . . . . . . . . 23--29
           Niklas Borselius and   
          Chris J. Mitchell and   
                   Aaron Wilson   On the value of threshold signatures . . 30--35
                   Chao Jin and   
               Weimin Zheng and   
                  Feng Zhou and   
                     Yinghui Wu   A distributed persistent object store
                                  for scalable service . . . . . . . . . . 36--49
                     Lu Jun and   
               Lu Xianliang and   
              Luo Guangchun and   
                   Han Hong and   
                        Zhou Xu   STFS: a novel file system for efficient
                                  small writes . . . . . . . . . . . . . . 50--54
               Nian-Min Yao and   
            Ming-Yang Zheng and   
                     Jiu-Bin Ju   Pipeline: a new architecture of high
                                  performance servers  . . . . . . . . . . 55--64

Operating Systems Review
Volume 36, Number 5, December, 2002

                 Deborah Estrin   Keynote address: Sensor network
                                  research: emerging challenges for
                                  architecture, systems, and languages . . 1--4
                Ravi Rajwar and   
               James R. Goodman   Transactional lock-free execution of
                                  lock-based programs  . . . . . . . . . . 5--17
José F. Martínez and   
                Josep Torrellas   Speculative synchronization: applying
                                  thread-level speculation to explicitly
                                  parallel applications  . . . . . . . . . 18--29
             Kevin M. Lepak and   
               Mikko H. Lipasti   Temporally silent stores . . . . . . . . 30--41
           Timothy Sherwood and   
              Erez Perelman and   
               Greg Hamerly and   
                    Brad Calder   Automatically characterizing large scale
                                  program behavior . . . . . . . . . . . . 45--57
             Kazunori Ogata and   
            Hideaki Komatsu and   
                Toshio Nakatani   Bytecode fetch optimization for a Java
                                  interpreter  . . . . . . . . . . . . . . 58--67
                     Tao Li and   
           Lizy Kurian John and   
      Anand Sivasubramaniam and   
           N. Vijaykrishnan and   
                     Juan Rubio   Understanding and improving operating
                                  system effects in control flow
                                  prediction . . . . . . . . . . . . . . . 68--80
               Philip Levis and   
                   David Culler   Maté: a tiny virtual machine for sensor
                                  networks . . . . . . . . . . . . . . . . 85--95
                Philo Juang and   
               Hidekazu Oki and   
                  Yong Wang and   
         Margaret Martonosi and   
              Li Shiuan Peh and   
              Daniel Rubenstein   Energy-efficient computing for wildlife
                                  tracking: design tradeoffs and early
                                  experiences with ZebraNet  . . . . . . . 96--107
             Darko Kirovski and   
           Milenko Drini\'c and   
              Miodrag Potkonjak   Enabling trusted software integrity  . . 108--120
                  Heng Zeng and   
             Carla S. Ellis and   
            Alvin R. Lebeck and   
                    Amin Vahdat   ECOSystem: managing energy as a first
                                  class operating system resource  . . . . 123--132
               Raksit Ashok and   
             Saurabh Chheda and   
            Csaba Andras Moritz   Cool-Mem: combining statically
                                  speculative memory accessing with
                                  selective address translation for energy
                                  efficiency . . . . . . . . . . . . . . . 133--143
            Ruchira Sasanka and   
      Christopher J. Hughes and   
                 Sarita V. Adve   Joint local and global hardware
                                  adaptations for energy . . . . . . . . . 144--155
               Dongkeun Kim and   
                   Donald Yeung   Design and evaluation of compiler
                                  algorithms for pre-execution . . . . . . 159--170
               Antonia Zhai and   
     Christopher B. Colohan and   
         J. Gregory Steffan and   
                  Todd C. Mowry   Compiler optimization of scalar value
                                  communication between speculative
                                  threads  . . . . . . . . . . . . . . . . 171--183
           Jeffrey Oplinger and   
                  Monica S. Lam   Enhancing software reliability with
                                  speculative threads  . . . . . . . . . . 184--196
              J. Adam Butts and   
                      Guri Sohi   Dynamic dead-instruction detection and
                                  elimination  . . . . . . . . . . . . . . 199--210
               Changkyu Kim and   
                Doug Burger and   
             Stephen W. Keckler   An adaptive, non-uniform cache structure
                                  for wire-delay dominated on-chip caches  211--222
     Shubhendu S. Mukherjee and   
             Federico Silla and   
               Peter Bannon and   
                  Joel Emer and   
                 Steve Lang and   
                     David Webb   A comparative study of arbitration
                                  algorithms for the Alpha 21364 pipelined
                                  router . . . . . . . . . . . . . . . . . 223--234
             Hyong-youb Kim and   
               Vijay S. Pai and   
                   Scott Rixner   Increasing Web server throughput with
                                  network interface data caching . . . . . 239--250
               Eddie Kohler and   
              Robert Morris and   
                    Benjie Chen   Programming language optimizations for
                                  modular router configurations  . . . . . 251--263
          Muthian Sivathanu and   
   Andrea C. Arpaci-Dusseau and   
        Remzi H. Arpaci-Dusseau   Evolving RPC for active storage  . . . . 264--276
             Robert Cooksey and   
            Stephan Jourdan and   
                  Dirk Grunwald   A stateless, content-directed data
                                  prefetching mechanism  . . . . . . . . . 279--290
          Michael I. Gordon and   
              William Thies and   
          Michal Karczmarek and   
                 Jasper Lin and   
                Ali S. Meli and   
             Andrew A. Lamb and   
                Chris Leger and   
                Jeremy Wong and   
             Henry Hoffmann and   
                 David Maze and   
              Saman Amarasinghe   A stream compiler for
                                  communication-exposed architectures  . . 291--303
             Emmett Witchel and   
                 Josh Cates and   
               Krste Asanovi\'c   Mondrian memory protection . . . . . . . 304--316

Operating Systems Review
Volume 36, Number 5S, December, 2002

                  Atul Adya and   
         William J. Bolosky and   
              Miguel Castro and   
              Gerald Cermak and   
             Ronnie Chaiken and   
            John R. Douceur and   
                 Jon Howell and   
             Jacob R. Lorch and   
             Marvin Theimer and   
           Roger P. Wattenhofer   Farsite: federated, available, and
                                  reliable storage for an incompletely
                                  trusted environment  . . . . . . . . . . 1--14
              Yasushi Saito and   
       Christos Karamanolis and   
            Magnus Karlsson and   
              Mallik Mahalingam   Taming aggressive replication in the
                                  Pangaea wide-area file system  . . . . . 15--30
     Athicha Muthitacharoen and   
              Robert Morris and   
              Thomer M. Gil and   
                    Benjie Chen   Ivy: a read/write peer-to-peer file
                                  system . . . . . . . . . . . . . . . . . 31--44
                 Xiaohu Qie and   
               Ruoming Pang and   
                 Larry Peterson   Defensive programming: using an
                                  annotation toolkit to build
                                  DoS-resistant software . . . . . . . . . 45--60
              Sanjeev Kumar and   
                         Kai Li   Using model checking to debug device
                                  firmware . . . . . . . . . . . . . . . . 61--74
         Madanlal Musuvathi and   
           David Y. W. Park and   
                  Andy Chou and   
           Dawson R. Engler and   
                  David L. Dill   CMC: a pragmatic approach to model
                                  checking real code . . . . . . . . . . . 75--88
               Juan Navarro and   
              Sitararn Iyer and   
             Peter Druschel and   
                       Alan Cox   Practical, transparent operating system
                                  support for superpages . . . . . . . . . 89--104
  Krisztián Flautner and   
                   Trevor Mudge   Vertigo: automatic performance-setting
                                  for Linux  . . . . . . . . . . . . . . . 105--116
            Andreas Weissel and   
          Björn Beutel and   
                  Frank Bellosa   Cooperative I/O: a novel I/O semantics
                                  for energy-aware applications  . . . . . 117--129
              Samuel Madden and   
        Michael J. Franklin and   
      Joseph M. Hellerstein and   
                       Wei Hong   TAG: a Tiny AGgregation service for
                                  ad-hoc sensor networks . . . . . . . . . 131--146
               Jeremy Elson and   
                Lewis Girod and   
                 Deborah Estrin   Fine-grained network time
                                  synchronization using reference
                                  broadcasts . . . . . . . . . . . . . . . 147--163
                Ashvin Goel and   
                 Luca Abeni and   
             Charles Krasic and   
                   Jim Snow and   
               Jonathan Walpole   Supporting time-sensitive applications
                                  on a commodity OS  . . . . . . . . . . . 165--180
            Carl A. Waldspurger   Memory resource management in VMware ESX
                                  server . . . . . . . . . . . . . . . . . 181--194
            Andrew Whitaker and   
              Marianne Shaw and   
              Steven D. Gribble   Scale and performance in the Denali
                                  isolation kernel . . . . . . . . . . . . 195--209
           George W. Dunlap and   
             Samuel T. King and   
                Sukru Cinar and   
          Murtaza A. Basrai and   
                  Peter M. Chen   ReVirt: enabling intrusion analysis
                                  through virtual-machine logging and
                                  replay . . . . . . . . . . . . . . . . . 211--224
                   Kai Shen and   
                  Hong Tang and   
                   Tao Yang and   
                    Lingkun Chu   Integrated resource management for
                                  cluster-based Internet services  . . . . 225--238
           Bhuvan Urgaonkar and   
            Prashant Shenoy and   
                 Timothy Roscoe   Resource overbooking and application
                                  profiling in shared hosting platforms    239--254
                Brian White and   
                Jay Lepreau and   
              Leigh Stoller and   
               Robert Ricci and   
          Shashi Guruprasad and   
                Mac Newbold and   
                Mike Hibler and   
                  Chad Barb and   
              Abhijeet Joglekar   An integrated experimental environment
                                  for distributed systems and networks . . 255--270
                Amin Vahdat and   
                  Ken Yocum and   
                Kevin Walsh and   
            Priya Mahadevan and   
             Dejan Kosti\'c and   
                 Jeff Chase and   
                   David Becker   Scalability and accuracy in a
                                  large-scale network emulator . . . . . . 271--284
              Landon P. Cox and   
      Christopher D. Murray and   
                 Brian D. Noble   Pastiche: making backup cheap and easy   285--298
              Miguel Castro and   
             Peter Druschel and   
            Ayalvadi Ganesh and   
            Antony Rowstron and   
                 Dan S. Wallach   Secure routing for structured
                                  peer-to-peer overlay networks  . . . . . 299--314
              Stefan Saroiu and   
         Krishna P. Gummadi and   
            Richard J. Dunn and   
          Steven D. Gribble and   
                  Henry M. Levy   An analysis of Internet content delivery
                                  systems  . . . . . . . . . . . . . . . . 315--327
         Arun Venkataramani and   
                 Ravi Kokku and   
                    Mike Dahlin   TCP Nice: a mechanism for background
                                  transfers  . . . . . . . . . . . . . . . 329--343
                 Limin Wang and   
                  Vivek Pai and   
                 Larry Peterson   The effectiveness of request redirection
                                  on CDN robustness  . . . . . . . . . . . 345--360
               Steven Osman and   
          Dinesh Subhraveti and   
                    Gong Su and   
                     Jason Nieh   The design and implementation of Zap: a
                                  system for migrating computing
                                  environments . . . . . . . . . . . . . . 361--376
 Constantine P. Sapuntzakis and   
             Ramesh Chandra and   
                  Ben Pfaff and   
                   Jim Chow and   
              Monica S. Lam and   
               Mendel Rosenblum   Optimizing the migration of virtual
                                  computers  . . . . . . . . . . . . . . . 377--390
           Chris Hawblitzel and   
            Thorsten von Eicken   Luna: a flexible Java protection system  391--403


Operating Systems Review
Volume 37, Number 1, January, 2003

              Luo Guangchun and   
                  Zhang Jun and   
               Lu Xianliang and   
                         Lu Jun   Active block layout: a high performance
                                  disk layout mechanism  . . . . . . . . . 5--13
                   Jing Liu and   
             Mingyang Zheng and   
                      Jiubin Ju   Offering different services by server
                                  clusters . . . . . . . . . . . . . . . . 14--22
               Youhui Zhang and   
                   Weimin Zheng   User-level communication based
                                  cooperative caching  . . . . . . . . . . 23--33
            Patricia Pascal and   
                Thierry Monteil   PAPER: influence of deterministic
                                  customers in time sharing scheduler  . . 34--45
              Luo Guangchun and   
               Lu Xianliang and   
                   Li Jiong and   
                      Zhang Jun   MADIDS: a novel distributed IDS based on
                                  mobile agent . . . . . . . . . . . . . . 46--53
         Gertrude Neuman Levine   Defining deadlock  . . . . . . . . . . . 54--64

Operating Systems Review
Volume 37, Number 2, April, 2003

               Chih-Wei Lin and   
                Jau-Ji Shen and   
               Min-Shiang Hwang   Security enhancement for Optimal
                                  Strong-Password Authentication protocol  7--12
              Sung-Woon Lee and   
                Woo-Hun Kim and   
              Hyun-Sung Kim and   
                  Kee-Young Yoo   Parallizable simple authenticated key
                                  agreement protocol . . . . . . . . . . . 13--18
               Qingsong Wei and   
               Xianliang Lu and   
                        Xu Zhou   DFTS: a novel distributed high
                                  fault-tolerance storage mechanism  . . . 19--24
              Luo Guangchun and   
                  Zhang Jun and   
               Lu Xianliang and   
                         Lu Jun   HCCM: a novel cache consistence
                                  mechanism  . . . . . . . . . . . . . . . 25--36
                   Kun Yang and   
                    Xin Guo and   
                 Alex Galis and   
                    Bo Yang and   
                      Dayou Liu   Towards efficient resource on-demand in
                                  Grid Computing . . . . . . . . . . . . . 37--43
              Ruben Pinilla and   
                     Marisa Gil   JVM: platform independent vs.
                                  performance dependent  . . . . . . . . . 44--56

Operating Systems Review
Volume 37, Number 3, July, 2003

         Gertrude Neuman Levine   Defining deadlock with fungible
                                  resources  . . . . . . . . . . . . . . . 5--11
               Chih-Wei Lin and   
                Jau-Ji Shen and   
               Min-Shiang Hwang   Security enhancement for Optimal
                                  Strong-Password Authentication Protocol  12--16
              Sung-Woon Lee and   
                Woo-Hun Kim and   
              Hyun-Sung Kim and   
                  Kee-Young Yoo   Parallizable simple authenticated key
                                  agreement protocol . . . . . . . . . . . 17--22
                    Lei Luo and   
                  Ming-Yuan Zhu   Partitioning based operating system: a
                                  formal model . . . . . . . . . . . . . . 23--35
                  K. W. Tse and   
                  W. K. Lam and   
                      P. K. Lun   Reservation aware operating system for
                                  grid economy . . . . . . . . . . . . . . 36--42
                 S. C. Wang and   
                  K. Q. Yan and   
                    C. F. Cheng   Asynchronous consensus protocol for the
                                  unreliable un-fully connected network    43--54
               Qingsong Wei and   
               Xianliang Lu and   
                 Liyong Ren and   
                        Xu Zhou   A novel disk queue to reduce disk I/O of
                                  messaging system . . . . . . . . . . . . 55--60

Operating Systems Review
Volume 37, Number 4, October, 2003

             Christophe Rippert   Protection in flexible operating system
                                  architectures  . . . . . . . . . . . . . 8--18
                 Wei-Chi Ku and   
            Chien-Ming Chen and   
                   Hui-Lung Lee   Weaknesses of Lee--Li--Hwang's
                                  hash-based password authentication
                                  scheme . . . . . . . . . . . . . . . . . 19--25
                 Wei-Chi Ku and   
             Hao-Chuan Tsai and   
                 Shuai-Min Chen   Two simple attacks on Lin--Shen--Hwang's
                                  strong-password authentication protocol  26--31
              Hyun-Sung Kim and   
              Sung-Woon Lee and   
                  Kee-Young Yoo   ID-based password authentication scheme
                                  using smart cards and fingerprints . . . 32--41
           Min-Shiang Hwang and   
             Chao-Chen Yang and   
                 Cheng-Yeh Shiu   An authentication scheme for mobile
                                  satellite communication systems  . . . . 42--47
              Ruben Pinilla and   
                     Marisa Gil   ULT: a Java threads model for platform
                                  independent execution  . . . . . . . . . 48--62
                 Ren Liyong and   
                    Chen Bo and   
                        Wu Jing   A novel packet-pair-based inferring
                                  bandwidth congestion control mechanism
                                  for layered multicast  . . . . . . . . . 63--69
                 S. C. Wang and   
                  K. Q. Yan and   
                    C. F. Cheng   Reaching agreement on an unknown network
                                  with partial graphic information . . . . 70--89
             Carlos Baquero and   
                     Nuno Lopes   Towards peer-to-peer content indexing    90--96


Operating Systems Review
Volume 38, Number 1, January, 2004

    Winfried E. Kühnhauser   Root Kits: an operating systems
                                  viewpoint  . . . . . . . . . . . . . . . 12--23
              Sung-Woon Lee and   
              Hyun-Sung Kim and   
                  Kee-Young Yoo   Cryptanalysis of a user authentication
                                  scheme using hash functions  . . . . . . 24--28
                     Wei-Chi Ku   A hash-based strong-password
                                  authentication scheme without using
                                  Smart Cards  . . . . . . . . . . . . . . 29--34
               Yuqing Zhang and   
                    Xiuying Liu   An approach to the formal verification
                                  of the three-principal cryptographic
                                  protocols  . . . . . . . . . . . . . . . 35--42
                Bu-Sung Lee and   
             Wing-Keong Woo and   
              Chai-Kiat Yeo and   
              Teck-Meng Lim and   
                Bee-Hwa Lim and   
                 Yuxiong He and   
                       Jie Song   Secure communications between bandwidth
                                  brokers  . . . . . . . . . . . . . . . . 43--57
                   B. Gupta and   
                     Z. Liu and   
                       Z. Liang   On designing direct dependency: based
                                  fast recovery algorithms for distributed
                                  systems  . . . . . . . . . . . . . . . . 58--73
            M. Bencha\"\iba and   
             A. Bouabdallah and   
                 N. Badache and   
                 M. Ahmed-Nacer   Distributed mutual exclusion algorithms
                                  in mobile ad hoc networks: an overview   74--89
               Qingsong Wei and   
                    Bo Chen and   
               Xianliang Lu and   
                 Liyong Ren and   
                        Xu Zhou   The research of the distributed stripped
                                  storage spatial model  . . . . . . . . . 90--96

Operating Systems Review
Volume 38, Number 2, April, 2004

          Jeanna Neefe Matthews   The case for repeated research in
                                  operating systems  . . . . . . . . . . . 5--7
            Melekam Tsegaye and   
                   Richard Foss   A comparison of the Linux and Windows
                                  device driver architectures  . . . . . . 8--33
               Yuqing Zhang and   
                    Xiuying Liu   Running-mode analysis of the Security
                                  Socket Layer protocol  . . . . . . . . . 34--40
                 S. C. Wang and   
                      K. Q. Yan   Revisiting fault diagnosis agreement in
                                  a new territory  . . . . . . . . . . . . 41--61
               Eun-Jun Yoon and   
              Eun-Kyung Ryu and   
                  Kee-Young Yoo   A secure user authentication scheme
                                  using hash functions . . . . . . . . . . 62--68
              Jung-Seuk Lee and   
             Jun-Cheol Jeon and   
                  Kee-Young Yoo   A security scheme for protecting
                                  security policies in firewall  . . . . . 69--72
                  Michael Scott   Cryptanalysis of an ID-based password
                                  authentication scheme using Smart Cards
                                  and fingerprints . . . . . . . . . . . . 73--75
                Min-Hui Lin and   
                Chin-Chen Chang   A secure one-time password
                                  authentication scheme with
                                  low-computation for mobile
                                  communications . . . . . . . . . . . . . 76--84
               Narn-Yih Lee and   
                   Chien-Nan Wu   Improved authentication key exchange
                                  protocol without using one-way hash
                                  function . . . . . . . . . . . . . . . . 85--92
              Cheng-Chi Lee and   
           Min-Shiang Hwang and   
                      I-En Liao   A server assisted authentication
                                  protocol for detecting error vectors . . 93--96

Operating Systems Review
Volume 38, Number 3, July, 2004

         René Serral and   
                     Marisa Gil   A Linux networking study . . . . . . . . 1--11
                 Yibei Ling and   
                       Wai Chen   Measuring cache freshness by additive
                                  age  . . . . . . . . . . . . . . . . . . 12--17
                    Zhou Xu and   
                Lu Xialiang and   
                    Hou Mengshu   DCFS: distributed cooperative
                                  fault-tolerance storage mechanism  . . . 18--25
                     ZhouXu and   
               Lu Xianliang and   
                Hou Mengshu and   
                         Wu Jin   A dynamic distributed replica management
                                  mechanism based on accessing frequency
                                  detecting  . . . . . . . . . . . . . . . 26--34
                    Bi-Hui Chen   Improvement of authenticated
                                  multiple-key agreement protocol  . . . . 35--41
                Kuo-Qin Yan and   
             Shu-Ching Wang and   
                 Mao-Lun Chiang   New application of reliable agreement:
                                  underlying an unsecured business
                                  environment  . . . . . . . . . . . . . . 42--57
                Tian-Fu Lee and   
                 Tzonelih Hwang   Improved conference key distribution
                                  protocol based on a symmetric balanced
                                  incomplete block design  . . . . . . . . 58--64
               Ya-Fan Chang and   
            Chin-Chen Chang and   
                   Chia-Lin Kao   An improvement on a deniable
                                  authentication protocol  . . . . . . . . 65--74
           Min-Shiang Hwang and   
                  Li-Hua Li and   
                  Cheng-Chi Lee   A key authentication scheme with
                                  non-repudiation  . . . . . . . . . . . . 75--78
               Ya-Fen Chang and   
                Chin-Chen Chang   A secure and efficient strong-password
                                  authentication protocol  . . . . . . . . 79--90
             Chou-Chen Yang and   
                 Ren-Ching Wang   An improvement of security enhancement
                                  for the timestamp-based password
                                  authentication scheme using Smart Cards  91--96

Operating Systems Review
Volume 38, Number 4, October, 2004

                    Tim Leschke   Achieving speed and flexibility by
                                  separating management from protection:
                                  embracing the Exokernel operating system 5--19
           Nicolas Bouillot and   
           Eric Gressier-Soudan   Consistency models for distributed
                                  interactive multimedia applications  . . 20--32
             Mordechai Geva and   
                   Yair Wiseman   A common framework for inter-process
                                  communication on a cluster . . . . . . . 33--44
                Guo Yuan-bo and   
                   Ma Jian-feng   An intrusion-tolerant authorization and
                                  authentication scheme in distributed
                                  environments . . . . . . . . . . . . . . 45--51
            Chin-Chen Chang and   
                 Iuon-Chang Lin   An improvement of delegated
                                  multisignature scheme with document
                                  decomposition  . . . . . . . . . . . . . 52--57
            Chin-Chen Chang and   
                   Yeu-Pong Lai   A convertible group signature scheme . . 58--65
                  Li-Hua Li and   
                 Chi-Yu Liu and   
               Min-Shiang Hwang   Cryptanalysis of an efficient secure
                                  group signature scheme . . . . . . . . . 66--69
               Narn-Yih Lee and   
                  Ming-Feng Lee   Comments on multiparty key exchange
                                  scheme . . . . . . . . . . . . . . . . . 70--73
             Horng-Twu Liaw and   
              Shiou-Wei Fan and   
                    Wei-Chen Wu   A simple password authentication using a
                                  polynomial . . . . . . . . . . . . . . . 74--79
               Ya-Fen Chang and   
            Chin-Chen Chang and   
                     Jui-Yi Kuo   A secure one-time password
                                  authentication scheme using Smart Cards
                                  without limiting login times . . . . . . 80--90
            Chin-Chen Chang and   
                 Iuon-Chang Lin   Remarks on fingerprint-based remote user
                                  authentication scheme using Smart Cards  91--96

Operating Systems Review
Volume 38, Number 5, December, 2004

              Lance Hammond and   
         Brian D. Carlstrom and   
                 Vicky Wong and   
              Ben Hertzberg and   
                  Mike Chen and   
         Christos Kozyrakis and   
                 Kunle Olukotun   Programming with transactional coherence
                                  and consistency (TCC)  . . . . . . . . . 1--13
                Mihai Budiu and   
       Girish Venkataramani and   
            Tiberiu Chelcea and   
           Seth Copen Goldstein   Spatial computation  . . . . . . . . . . 14--26
         Virantha Ekanayake and   
           Clinton Kelly IV and   
                  Rajit Manohar   An ultra low-power processor for sensor
                                  networks . . . . . . . . . . . . . . . . 27--36
        Christopher R. Lumb and   
                Richard Golding   D-SPTF: decentralized request
                                  distribution in brick-based storage
                                  systems  . . . . . . . . . . . . . . . . 37--47
              Yasushi Saito and   
       Svend Fròlund and   
            Alistair Veitch and   
              Arif Merchant and   
                   Susan Spence   FAB: building distributed enterprise
                                  disk arrays from commodity components    48--58
          Timothy E. Denehy and   
                  John Bent and   
     Florentina I. Popovici and   
   Andrea C. Arpaci-Dusseau and   
        Remzi H. Arpaci-Dusseau   Deconstructing storage arrays  . . . . . 59--71
            Xiaotong Zhuang and   
                  Tao Zhang and   
                  Santosh Pande   HIDE: an infrastructure for efficiently
                                  protecting information leakage on the
                                  address bus  . . . . . . . . . . . . . . 72--84
              G. Edward Suh and   
                 Jae W. Lee and   
                David Zhang and   
               Srinivas Devadas   Secure program execution via dynamic
                                  information flow tracking  . . . . . . . 85--96
                Jaehyuk Huh and   
              Jichuan Chang and   
                Doug Burger and   
               Gurindar S. Sohi   Coherence decoupling: making use of
                                  incoherence  . . . . . . . . . . . . . . 97--106
     Srikanth T. Srinivasan and   
                Ravi Rajwar and   
             Haitham Akkary and   
                Amit Gandhi and   
                     Mike Upton   Continual flow pipelines . . . . . . . . 107--119
        Rajagopalan Desikan and   
        Simha Sethumadhavan and   
                Doug Burger and   
             Stephen W. Keckler   Scalable selective re-execution for EDGE
                                  architectures  . . . . . . . . . . . . . 120--132
                John Regehr and   
                  Alastair Reid   HOIST: a system for automatically
                                  deriving static analyzers for embedded
                                  systems  . . . . . . . . . . . . . . . . 133--143
              Perry H. Wang and   
         Jamison D. Collins and   
                  Hong Wang and   
               Dongkeun Kim and   
                Bill Greene and   
              Kai-Ming Chan and   
             Aamir B. Yunus and   
                 Terry Sych and   
           Stephen F. Moore and   
                   John P. Shen   Helper threads via virtual
                                  multithreading on an experimental
                                  Itanium-2 processor-based platform . . . 144--155
         Matthias Hauswirth and   
            Trishul M. Chilimbi   Low-overhead memory leak detection using
                                  adaptive statistical profiling . . . . . 156--164
                Xipeng Shen and   
                Yutao Zhong and   
                      Chen Ding   Locality phase prediction  . . . . . . . 165--176
                   Pin Zhou and   
               Vivek Pandey and   
      Jagadeesan Sundaresan and   
           Anand Raghuraman and   
              Yuanyuan Zhou and   
                  Sanjeev Kumar   Dynamic tracking of page miss ratio
                                  curve for memory management  . . . . . . 177--188
           Rodric M. Rabbah and   
  Hariharan Sandanagobalane and   
        Mongkol Ekpanyapong and   
                  Weng-Fai Wong   Compiler orchestrated prefetching via
                                  speculation and predication  . . . . . . 189--198
             Chen-Yong Cher and   
          Antony L. Hosking and   
               T. N. Vijaykumar   Software prefetching for mark-sweep
                                  garbage collection: hardware analysis
                                  and software redesign  . . . . . . . . . 199--210
            David E. Lowell and   
              Yasushi Saito and   
              Eileen J. Samberg   Devirtualizable virtual machines
                                  enabling general, single-node, online
                                  maintenance  . . . . . . . . . . . . . . 211--223
           Jared C. Smolens and   
              Brian T. Gold and   
                Jangwoo Kim and   
              Babak Falsafi and   
               James C. Hoe and   
            Andreas G. Nowatzyk   Fingerprinting: bounding soft-error
                                  detection latency and bandwidth  . . . . 224--234
           Greg Bronevetsky and   
             Daniel Marques and   
             Keshav Pingali and   
                Peter Szwed and   
                  Martin Schulz   Application-level checkpointing for
                                  shared memory programs . . . . . . . . . 235--247
                   Qiang Wu and   
                Philo Juang and   
         Margaret Martonosi and   
               Douglas W. Clark   Formal online methods for
                                  voltage/frequency control in multiple
                                  clock domain microprocessors . . . . . . 248--259
              Mohamed Gomaa and   
          Michael D. Powell and   
               T. N. Vijaykumar   Heat-and-run: leveraging SMT and CMP to
                                  manage power density through the
                                  operating system . . . . . . . . . . . . 260--270
                Xiaodong Li and   
                 Zhenmin Li and   
              Francis David and   
                   Pin Zhou and   
              Yuanyuan Zhou and   
                Sarita Adve and   
                  Sanjeev Kumar   Performance directed energy management
                                  for main memory and disks  . . . . . . . 271--283


Operating Systems Review
Volume 39, Number 1, January, 2005

                Shihyu Chou and   
            Eric Jui-Lin Lu and   
                    Yi-Hui Chen   X-RDR: a role-based delegation processor
                                  for Web-based information systems  . . . 4--21
                       Jia Song   Segment-based proxy caching for
                                  distributed cooperative media content
                                  servers  . . . . . . . . . . . . . . . . 22--33
                 Zhan Chuan and   
               Lu Xianliang and   
                Hou Mengshu and   
                        Zhou Xu   A LVQ-based neural network anti-spam
                                  email approach . . . . . . . . . . . . . 34--39
              Manik Lal Das and   
            Ashutosh Saxena and   
              Ved P. Gulati and   
               Deepak B. Phatak   Hierarchical key management scheme using
                                  polynomial interpolation . . . . . . . . 40--47
              Ting-Yi Chang and   
           Min-Shiang Hwang and   
                  Wei-Pang Yang   A new multi-stage secret sharing scheme
                                  using one-way function . . . . . . . . . 48--55
                Hou Mengshu and   
               Lu Xianliang and   
                    Zhou Xu and   
                     Zhan Chuan   A trust model of P2P system based on
                                  confirmation theory  . . . . . . . . . . 56--62
                    Zhou Xu and   
               Lu Xianliang and   
                Hou Mengshu and   
                     Zhan Chuan   A speed-based adaptive dynamic parallel
                                  downloading technique  . . . . . . . . . 63--69
               Ya-Fen Chang and   
                Chin-Chen Chang   An efficient authentication protocol for
                                  mobile satellite communication systems   70--84
                 Wei-Chi Ku and   
            Min-Hung Chiang and   
                Shen-Tien Chang   Weaknesses of Yoon--Ryu--Yoo's
                                  hash-based password authentication
                                  scheme . . . . . . . . . . . . . . . . . 85--89
                 Wei-Chi Ku and   
                 Shuai-Min Chen   Cryptanalysis of a flexible remote user
                                  authentication scheme using Smart Cards  90--96

Operating Systems Review
Volume 39, Number 2, April, 2005

             Edsger W. Dijkstra   My recollections of operating system
                                  design . . . . . . . . . . . . . . . . . 4--40
                Cliff Jones and   
                David Lomet and   
       Alexander Romanovsky and   
             Gerhard Weikum and   
                Alan Fekete and   
        Marie-Claude Gaudel and   
             Henry F. Korth and   
           Rogerio de Lemos and   
                 Eliot Moss and   
                Ravi Rajwar and   
         Krithi Ramamritham and   
              Brian Randell and   
                 Luis Rodrigues   The atomic manifesto: a story in four
                                  quarks . . . . . . . . . . . . . . . . . 41--46
         Gertrude Neuman Levine   The classification of deadlock
                                  prevention and avoidance is erroneous    47--50
         Rushikesh K. Joshi and   
                   Subash Rajaa   Modeling VP operation: the Diwali
                                  Festival Problem . . . . . . . . . . . . 51--53
                 Marisa Gil and   
                  Ruben Pinilla   Thread coloring: a scheduler proposal
                                  from user to hardware threads  . . . . . 54--70
             Robert Steinke and   
                Micah Clark and   
                  Elihu McMahon   A new pattern for flexible worker
                                  threads with in-place consumption
                                  message queues . . . . . . . . . . . . . 71--73
                   Yair Wiseman   ARC based superpaging  . . . . . . . . . 74--78
            Catherine Dodge and   
             Cynthia Irvine and   
                    Thuy Nguyen   A study of initialization in Linux and
                                  OpenBSD  . . . . . . . . . . . . . . . . 79--93
             Kuo-Feng Hwang and   
                      I-En Liao   Two attacks on a user friendly remote
                                  authentication scheme with Smart Cards   94--96

Operating Systems Review
Volume 39, Number 3, July, 2005

               Yair Wiseman and   
             Karsten Schwan and   
                Patrick Widener   Efficient end to end data exchange using
                                  configurable compression . . . . . . . . 4--23
               Zhiqiang Lin and   
                  Chao Wang and   
                   Bing Mao and   
                         Li Xie   A policy flexible architecture for
                                  secure operating system  . . . . . . . . 24--33
Jorge Herrerías Guerrero and   
Roberto Gómez Cárdenas   An example of communication between
                                  security tools: IPTables --- Snort . . . 34--43
              Guangchun Luo and   
               Xianliang Lu and   
                      Ting Yang   The research on consistency of
                                  space/time of IDS  . . . . . . . . . . . 44--51
                   Yan Tang and   
                   Tao Wang and   
                    Xiaoming Li   The design and implementation of
                                  LilyTask in shared memory  . . . . . . . 52--63
          A. Vijay Srinivas and   
                   D. Janakiram   A model for characterizing the
                                  scalability of distributed systems . . . 64--71
               Youhui Zhang and   
             Dongsheng Wong and   
                   Weimin Zheng   User-level checkpoint and recovery for
                                  LAM/MPI  . . . . . . . . . . . . . . . . 72--81
                Kuo-Qin Yan and   
                 Shu-Ching Wang   The bounds of faulty components on
                                  consensus with dual failure modes  . . . 82--89
                Yi-Hwa Chen and   
                    Jinn-Ke Jan   Enhancement of digital signature with
                                  message recovery using self-certified
                                  public keys and its variants . . . . . . 90--96

Operating Systems Review
Volume 39, Number 4, October, 2005

                  Keith Loepere   Stackable thread mechanisms  . . . . . . 4--17
                Joseph M. Gwinn   Quality-of-Service versus Realtime . . . 18--22
        Vijay Shivshanker Gupta   Trust and accountability issues in
                                  scalable invalidation-based Web cache
                                  consistency  . . . . . . . . . . . . . . 23--36
                 Mais Nijim and   
                    Tao Xie and   
                       Xiao Qin   Performance analysis of an admission
                                  controller for CPU- and I/O-intensive
                                  applications in self-managing computer
                                  systems  . . . . . . . . . . . . . . . . 37--45
             Chien-Fu Cheng and   
             Shu-Ching Wang and   
                     Tyne Liang   Multi-agent schema of Mobile IP protocol
                                  for mobile environment . . . . . . . . . 46--65
             Chih-Hung Wang and   
                  Yan-Sheng Kuo   An efficient contract signing protocol
                                  using the aggregate signature scheme to
                                  protect signers' privacy and promote
                                  reliability  . . . . . . . . . . . . . . 66--79
                 S. C. Wang and   
               M. L. Chiang and   
                  K. Q. Yan and   
                      K. F. Jea   Streets of consensus under unknown
                                  unreliable network . . . . . . . . . . . 80--96

Operating Systems Review
Volume 39, Number 5, December, 2005

            Arvind Seshadri and   
                   Mark Luk and   
                 Elaine Shi and   
              Adrian Perrig and   
         Leendert van Doorn and   
                 Pradeep Khosla   Pioneer: verifying code integrity and
                                  enforcing untampered code execution on
                                  legacy systems . . . . . . . . . . . . . 1--16
      Petros Efstathopoulos and   
              Maxwell Krohn and   
          Steve VanDeBogart and   
                 Cliff Frey and   
              David Ziegler and   
               Eddie Kohler and   
           David Mazi\`eres and   
             Frans Kaashoek and   
                  Robert Morris   Labels and event processes in the
                                  asbestos operating system  . . . . . . . 17--30
             Emmett Witchel and   
              Junghwan Rhee and   
               Krste Asanovi\'c   Mondrix: memory isolation for Linux
                                  using Mondrian memory protection . . . . 31--44
         Amitanand S. Aiyer and   
             Lorenzo Alvisi and   
              Allen Clement and   
                Mike Dahlin and   
       Jean-Philippe Martin and   
                     Carl Porth   BAR fault tolerance for cooperative
                                  services . . . . . . . . . . . . . . . . 45--58
       Michael Abd-El-Malek and   
          Gregory R. Ganger and   
           Garth R. Goodson and   
          Michael K. Reiter and   
                   Jay J. Wylie   Fault-scalable Byzantine fault-tolerant
                                  services . . . . . . . . . . . . . . . . 59--74
              Boon Thau Loo and   
               Tyson Condie and   
      Joseph M. Hellerstein and   
            Petros Maniatis and   
             Timothy Roscoe and   
                     Ion Stoica   Implementing declarative overlays  . . . 75--90
             Ashlesha Joshi and   
             Samuel T. King and   
           George W. Dunlap and   
                  Peter M. Chen   Detecting past and present intrusions
                                  through vulnerability-specific
                                  predicates . . . . . . . . . . . . . . . 91--104
                  Ira Cohen and   
                Steve Zhang and   
          Moises Goldszmidt and   
               Julie Symons and   
              Terence Kelly and   
                    Armando Fox   Capturing, indexing, clustering, and
                                  retrieving system history  . . . . . . . 105--118
         Craig A. N. Soules and   
              Gregory R. Ganger   Connections: using context to enhance
                                  file search  . . . . . . . . . . . . . . 119--132
               Manuel Costa and   
              Jon Crowcroft and   
              Miguel Castro and   
            Antony Rowstron and   
                Lidong Zhou and   
               Lintao Zhang and   
                    Paul Barham   Vigilante: end-to-end containment of
                                  Internet worms . . . . . . . . . . . . . 133--147
             Michael Vrable and   
                  Justin Ma and   
                   Jay Chen and   
                David Moore and   
            Erik Vandekieft and   
            Alex C. Snoeren and   
        Geoffrey M. Voelker and   
                  Stefan Savage   Scalability, fidelity, and containment
                                  in the Potemkin Virtual Honeyfarm  . . . 148--162
                Ashvin Goel and   
                 Kenneth Po and   
             Kamran Farhadi and   
                   Zheng Li and   
                   Eyal de Lara   The Taser intrusion recovery system  . . 163--176
                 Qingbo Zhu and   
               Zhifeng Chen and   
                    Lin Tan and   
              Yuanyuan Zhou and   
            Kimberly Keeton and   
                    John Wilkes   Hibernator: helping disk arrays sleep
                                  through the winter . . . . . . . . . . . 177--190
      Edmund B. Nightingale and   
              Peter M. Chen and   
                    Jason Flinn   Speculative execution in a distributed
                                  file system  . . . . . . . . . . . . . . 191--205
        Vijayan Prabhakaran and   
 Lakshmi N. Bairavasundaram and   
              Nitin Agrawal and   
          Haryadi S. Gunawi and   
   Andrea C. Arpaci-Dusseau and   
        Remzi H. Arpaci-Dusseau   IRON file systems  . . . . . . . . . . . 206--220
                    Yuan Yu and   
             Tom Rodeheffer and   
                       Wei Chen   RaceTrack: efficient detection of data
                                  race conditions via adaptive tracking    221--234
                   Feng Qin and   
               Joseph Tucek and   
      Jagadeesan Sundaresan and   
                  Yuanyuan Zhou   Rx: treating bugs as allergies---a safe
                                  method to survive software failures  . . 235--248
                Lars Eggert and   
                Joseph D. Touch   Idletime scheduling with preemption
                                  intervals  . . . . . . . . . . . . . . . 249--262
                  Hai Huang and   
                 Wanda Hung and   
                   Kang G. Shin   FS2: dynamic data replication in free
                                  disk space for improving disk
                                  performance and energy consumption . . . 263--276
         Ricardo A. Baratto and   
             Leonard N. Kim and   
                     Jason Nieh   THINC: a virtual display architecture
                                  for thin-client computing  . . . . . . . 277--290


Operating Systems Review
Volume 40, Number 1, January, 2006

             Jeanna N. Matthews   Operating systems review: looking back
                                  and looking forward  . . . . . . . . . . 1--2
             Marc E. Fiuczynski   PlanetLab: overview, history, and future
                                  directions . . . . . . . . . . . . . . . 6--10
             Larry Peterson and   
                 Timothy Roscoe   The design principles of PlanetLab . . . 11--16
                Neil Spring and   
             Larry Peterson and   
                Andy Bavier and   
                      Vivek Pai   Using PlanetLab for network research:
                                  myths, realities, and best practices . . 17--24
               Robert Ricci and   
          David Oppenheimer and   
                Jay Lepreau and   
                    Amin Vahdat   Lessons from resource allocators for
                                  large-scale multiuser testbeds . . . . . 25--32
           Jeannie Albrecht and   
         Christopher Tuttle and   
            Alex C. Snoeren and   
                    Amin Vahdat   PlanetLab application management using
                                  plush  . . . . . . . . . . . . . . . . . 33--40
       Harsha V. Madhyastha and   
         Arun Venkataramani and   
       Arvind Krishnamurthy and   
                Thomas Anderson   Oasis: an overlay-aware network stack    41--48
              Akihiro Nakao and   
             Larry Peterson and   
                    Andy Bavier   Scalable routing overlay networks  . . . 49--61
               Bernard Wong and   
            Emin Gün Sirer   ClosestNode.com: an open access,
                                  scalable, shared geocast service for
                                  distributed systems  . . . . . . . . . . 62--64
             KyoungSoo Park and   
                   Vivek S. Pai   CoMon: a mostly-scalable monitoring
                                  system for PlanetLab . . . . . . . . . . 65--74
                 Steve Muir and   
             Larry Peterson and   
            Marc Fiuczynski and   
              Justin Cappos and   
                   John Hartman   Privileged operations in the PlanetLab
                                  virtualised environment  . . . . . . . . 75--88
                 Mark Huang and   
                Andy Bavier and   
                 Larry Peterson   PlanetFlow: maintaining accountability
                                  for network services . . . . . . . . . . 89--94
              Gernot Heiser and   
              Volkmar Uhlig and   
               Joshua LeVasseur   Are virtual-machine monitors
                                  microkernels done right? . . . . . . . . 95--99
        Andrew S. Tanenbaum and   
           Jorrit N. Herder and   
                    Herbert Bos   File size distribution on UNIX systems:
                                  then and now . . . . . . . . . . . . . . 100--104

Operating Systems Review
Volume 40, Number 2, April, 2006

         Patrick G. Bridges and   
          Arthur B. MacCabe and   
                  Orran Krieger   System software for high end computing   6--7
             Mark F. Mergen and   
              Volkmar Uhlig and   
              Orran Krieger and   
                   Jimi Xenidis   Virtualization for high-performance
                                  computing  . . . . . . . . . . . . . . . 8--11
            Eric Van Hensbergen   P.R.O.S.E.: partitioned reliable
                                  operating system environment . . . . . . 12--15
      Jean-Charles Tournier and   
         Patrick G. Bridges and   
          Arthur B. MacCabe and   
         Patrick M. Widener and   
             Zaid Abudayyeh and   
             Ron Brightwell and   
                Rolf Riesen and   
                 Trammel Hudson   Towards a framework for dedicated
                                  operating systems development in
                                  high-end computing systems . . . . . . . 16--21
          Ronald G. Minnich and   
         Matthew J. Sottile and   
              Sung-Eun Choi and   
              Erik Hendriks and   
                      Jim McKie   Right-weight kernels: an off-the-shelf
                                  alternative to custom light-weight
                                  kernels  . . . . . . . . . . . . . . . . 22--28
               Pete Beckman and   
                Kamil Iskra and   
            Kazutomo Yoshii and   
                  Susan Coghlan   Operating system issues for petascale
                                  systems  . . . . . . . . . . . . . . . . 29--33
             Dilma Da Silva and   
              Orran Krieger and   
       Robert W. Wisniewski and   
             Amos Waterland and   
                  David Tam and   
                 Andrew Baumann   K42: an infrastructure for operating
                                  system research  . . . . . . . . . . . . 34--42
       Sayantan Chakravorty and   
            Celso L. Mendes and   
   Laxmikant V. Kalé and   
                Terry Jones and   
           Andrew Tauferner and   
               Todd Inglett and   
            José Moreira   HPC-Colony: services and interfaces for
                                  very large systems . . . . . . . . . . . 43--49
                   Hong Ong and   
             Jeffrey Vetter and   
           R. Scott Studham and   
             Collin McCurdy and   
               Bruce Walker and   
                       Alan Cox   Kernel-level single system image for
                                  petascale computing  . . . . . . . . . . 50--54
           Fabrizio Petrini and   
            Jarek Nieplocha and   
                Vinod Tipparaju   SFT: scalable fault tolerance  . . . . . 55--62
        Christian Engelmann and   
           Stephen L. Scott and   
         David E. Bernholdt and   
  Narasimha R. Gottumukkala and   
       Chokchai Leangsuksun and   
             Jyothish Varma and   
                  Chao Wang and   
              Frank Mueller and   
          Aniruddha G. Shet and   
                  P. Sadayappan   MOLAR: adaptive runtime support for
                                  high-end computing operating and runtime
                                  systems  . . . . . . . . . . . . . . . . 63--72
       Lawrence Rauchwerger and   
                 Nancy M. Amato   SmartApps: middle-ware for adaptive
                                  applications on reconfigurable platforms 73--82
         Patricia J. Teller and   
           Seetharami R. Seelam   Insights into providing dynamic
                                  adaptation of operating system policies  83--89
              Gengbin Zheng and   
                 Chao Huang and   
       Laxmikant V. Kalé   Performance evaluation of automatic
                                  checkpoint-based fault tolerance for
                                  AMPI and Charm++ . . . . . . . . . . . . 90--99
                 Jason Nieh and   
                    Chris Vaill   Experiences teaching operating systems
                                  using virtual platforms and Linux  . . . 100--104
          Felix C. Freiling and   
              Hagen Völzer   Illustrating the impossibility of
                                  crash-tolerant consensus in asynchronous
                                  systems  . . . . . . . . . . . . . . . . 105--109
                     Oded Koren   A study of the Linux kernel evolution    110--112

Operating Systems Review
Volume 40, Number 3, July, 2006

            Emin Gün Sirer   Introduction . . . . . . . . . . . . . . 8--8
      Özalp Babao\uglu and   
       Márk Jelasity and   
       Anne-Marie Kermarrec and   
          Alberto Montresor and   
              Maarten van Steen   Managing clouds: a case for a fresh look
                                  at large unreliable dynamic networks . . 9--13
               Jay A. Patel and   
                 Indranil Gupta   Bridging the gap: augmenting centralized
                                  systems with P2P technologies  . . . . . 14--17
              Jolyon Clulow and   
                    Tyler Moore   Suicide for the common good: a new
                                  strategy for credential revocation in
                                  self-organizing systems  . . . . . . . . 18--21
              Ruchir Bindal and   
                        Pei Cao   Can self-organizing P2P file
                                  distribution provide QoS guarantees? . . 22--30
               Fred Douglis and   
            Michael Branson and   
            Kirsten Hildrum and   
                   Bin Rong and   
                         Fan Ye   Multi-site cooperative data stream
                                  analysis . . . . . . . . . . . . . . . . 31--37
                  Evan Hoke and   
                 Jimeng Sun and   
             John D. Strunk and   
          Gregory R. Ganger and   
             Christos Faloutsos   InteMon: continuous mining of sensor
                                  data in large-scale self-infrastructures 38--44
                   Minor Gordon   Small-scale peer-to-peer overlays  . . . 45--48
                 Ming Zhong and   
                       Kai Shen   Random walk based node sampling in
                                  self-organizing networks . . . . . . . . 49--55
                David Hales and   
          Özalp Babao\uglu   Towards automatic social bootstrapping
                                  of peer-to-peer protocols  . . . . . . . 56--60
               Jacomo Corbo and   
Antoni Calvó-Armengol and   
                   David Parkes   A study of Nash equilibrium in
                                  contribution games for peer-to-peer
                                  networks . . . . . . . . . . . . . . . . 61--66
       Panayotis Antoniadis and   
            Costas Courcoubetis   Enforcing efficient resource
                                  provisioning in peer-to-peer file
                                  sharing systems  . . . . . . . . . . . . 67--72
    Öznur Özkasap and   
Zülküf Genç and   
                     Emre Atsan   Epidemic-based approaches for reliable
                                  multicast in mobile ad hoc networks  . . 73--79
           Jorrit N. Herder and   
                Herbert Bos and   
                   Ben Gras and   
             Philip Homburg and   
            Andrew S. Tanenbaum   MINIX 3: a Highly Reliable,
                                  Self-Repairing Operating System  . . . . 80--89
              Gilles Muller and   
            Yoann Padioleau and   
            Julia L. Lawall and   
      René Rydhof Hansen   Semantic patches considered helpful  . . 90--92
    Úlfar Erlingsson and   
                John MacCormick   Ad hoc extensibility and access control  93--101
            Ryusuke Konishi and   
             Yoshiji Amagai and   
                  Koji Sato and   
             Hisashi Hifumi and   
               Seiji Kihara and   
                 Satoshi Moriai   The Linux implementation of a
                                  log-structured file system . . . . . . . 102--107
                   Stefan Bosse   VAMNET: the functional approach to
                                  distributed programming  . . . . . . . . 108--114

Operating Systems Review
Volume 40, Number 4, October, 2006

      Håvard Johansen and   
      André Allavena and   
            Robbert van Renesse   Fireflies: Scalable support for
                                  intrusion-tolerant network overlays  . . 3--13
      Georgios Portokalidis and   
             Asia Slowinska and   
                    Herbert Bos   Argos: an emulator for fingerprinting
                                  zero-day attacks for advertised
                                  honeypots with automatic signature
                                  generation . . . . . . . . . . . . . . . 15--27
                    Alex Ho and   
          Michael Fetterman and   
          Christopher Clark and   
            Andrew Warfield and   
                    Steven Hand   Practical taint-based protection using
                                  demand emulation . . . . . . . . . . . . 29--41
           Michael F. Spear and   
                 Tom Roeder and   
               Orion Hodson and   
              Galen C. Hunt and   
                    Steven Levi   Solving the starting problem: device
                                  drivers as self-describing artifacts . . 45--57
            Yoann Padioleau and   
            Julia L. Lawall and   
                  Gilles Muller   Understanding collateral evolution in
                                  Linux device drivers . . . . . . . . . . 59--71
                Thomas Ball and   
             Ella Bounimova and   
                 Byron Cook and   
             Vladimir Levin and   
          Jakob Lichtenberg and   
               Con McGarvey and   
             Bohus Ondrusek and   
         Sriram K. Rajamani and   
               Abdullah Ustuner   Thorough static analysis of device
                                  drivers  . . . . . . . . . . . . . . . . 73--85
        Gokul Soundararajan and   
             Cristiana Amza and   
                    Ashvin Goel   Database replication policies for
                                  dynamic content applications . . . . . . 89--102
             Jacob R. Lorch and   
                  Atul Adya and   
         William J. Bolosky and   
             Ronnie Chaiken and   
            John R. Douceur and   
                     Jon Howell   The SMART way to migrate replicated
                                  stateful services  . . . . . . . . . . . 103--115
             Sameh Elnikety and   
             Steven Dropsho and   
                Fernando Pedone   Tashkent: uniting durability with
                                  transaction ordering for
                                  high-performance scalable database
                                  replication  . . . . . . . . . . . . . . 117--130
              Orran Krieger and   
             Marc Auslander and   
            Bryan Rosenburg and   
       Robert W. Wisniewski and   
               Jimi Xenidis and   
             Dilma Da Silva and   
           Michal Ostrowski and   
           Jonathan Appavoo and   
              Maria Butrico and   
                Mark Mergen and   
             Amos Waterland and   
                  Volkmar Uhlig   K42: building a complete operating
                                  system . . . . . . . . . . . . . . . . . 133--145
               Alan Mislove and   
                Ansley Post and   
          Andreas Haeberlen and   
                 Peter Druschel   Experiences in building and operating
                                  ePOST, a reliable peer-to-peer
                                  application  . . . . . . . . . . . . . . 147--159
          Lenin Singaravelu and   
                  Calton Pu and   
        Hermann Härtig and   
              Christian Helmuth   Reducing TCB complexity for
                                  security-sensitive applications: three
                                  case studies . . . . . . . . . . . . . . 161--174
      Manuel Fähndrich and   
                 Mark Aiken and   
           Chris Hawblitzel and   
               Orion Hodson and   
                 Galen Hunt and   
             James R. Larus and   
                    Steven Levi   Language support for fast and reliable
                                  message-based communication in
                                  singularity OS . . . . . . . . . . . . . 177--190
             Daniel Lohmann and   
             Fabian Scheler and   
           Reinhard Tartler and   
              Olaf Spinczyk and   
Wolfgang Schröder-Preikschat   A quantitative analysis of aspects in
                                  the eCos kernel  . . . . . . . . . . . . 191--204
          Arvind S. Krishna and   
       Aniruddha S. Gokhale and   
             Douglas C. Schmidt   Context-specific middleware
                                  specialization techniques for optimizing
                                  software product-line architectures  . . 205--218
                 Mary Baker and   
                 Mehul Shah and   
      David S. H. Rosenthal and   
          Mema Roussopoulos and   
            Petros Maniatis and   
                   TJ Giuli and   
              Prashanth Bungale   A fresh look at the reliability of
                                  long-term digital storage  . . . . . . . 221--234
            Kimberly Keeton and   
                 Dirk Beyer and   
               Ernesto Brau and   
              Arif Merchant and   
            Cipriano Santos and   
                     Alex Zhang   On the road to recovery: restoring data
                                  after disasters  . . . . . . . . . . . . 235--248
                 Xiaoyu Yao and   
                       Jun Wang   RIMAC: a novel redundancy-based
                                  hierarchical cache architecture for
                                  energy efficient, high performance
                                  storage systems  . . . . . . . . . . . . 249--262
                 Tim Brecht and   
      G. (John) Janakiraman and   
                 Brian Lynn and   
            Vikram Saletore and   
                  Yoshio Turner   Evaluating network processing efficiency
                                  with processor partitioning and
                                  asynchronous I/O . . . . . . . . . . . . 265--278
             Hyong-youb Kim and   
                   Scott Rixner   TCP offload through connection handoff   279--290
               Jeffrey C. Mogul   Emergent (mis)behavior vs. complex
                                  software systems . . . . . . . . . . . . 293--304
                 Ori Shalev and   
                     Nir Shavit   Predictive log-synchronization . . . . . 305--315
                     Qin Lv and   
          William Josephson and   
                   Zhe Wang and   
             Moses Charikar and   
                         Kai Li   Ferret: a toolkit for content-based
                                  similarity search of feature-rich data   317--330
               Hongliang Yu and   
             Dongdong Zheng and   
                Ben Y. Zhao and   
                   Weimin Zheng   Understanding user behavior in
                                  large-scale video-on-demand systems  . . 333--344
              Iqbal Mohomed and   
          Jim Chengming Cai and   
                   Eyal de Lara   URICA: Usage-awaRe Interactive Content
                                  Adaptation for mobile devices  . . . . . 345--358
         S. B. Handurukande and   
            A.-M. Kermarrec and   
              F. Le Fessant and   
        L. Massoulié and   
                     S. Patarin   Peer sharing behaviour in the eDonkey
                                  network, and implications for the design
                                  of server-less file sharing systems  . . 359--371
                  Chun Yuan and   
                     Ni Lao and   
                Ji-Rong Wen and   
                   Jiwei Li and   
                Zheng Zhang and   
                Yi-Min Wang and   
                    Wei-Ying Ma   Automated known problem diagnosis with
                                  event traces . . . . . . . . . . . . . . 375--388
                 Atul Singh and   
            Petros Maniatis and   
             Timothy Roscoe and   
                 Peter Druschel   Using queries for distributed monitoring
                                  and forensics  . . . . . . . . . . . . . 389--402
             Andreas Merkel and   
                  Frank Bellosa   Balancing power consumption in
                                  multiprocessor systems . . . . . . . . . 403--414

Operating Systems Review
Volume 40, Number 5, December, 2006

               Mendel Rosenblum   Impact of virtualization on computer
                                  architecture and operating systems . . . 1--1
                Keith Adams and   
                     Ole Agesen   A comparison of software and hardware
                                  techniques for x86 virtualization  . . . 2--13
           Stephen T. Jones and   
   Andrea C. Arpaci-Dusseau and   
        Remzi H. Arpaci-Dusseau   Geiger: monitoring the buffer cache in a
                                  virtual machine environment  . . . . . . 14--24
       Jedidiah R. Crandall and   
            Gary Wassermann and   
  Daniela A. S. de Oliveira and   
                Zhendong Su and   
                S. Felix Wu and   
              Frederic T. Chong   Temporal search: detecting hidden
                                  malware timebombs with virtual machines  25--36
                    Shan Lu and   
               Joseph Tucek and   
                   Feng Qin and   
                  Yuanyuan Zhou   AVIO: detecting atomicity violations via
                                  access interleaving invariants . . . . . 37--48
                     Min Xu and   
               Mark D. Hill and   
                Rastislav Bodik   A regulated transitive reduction (RTR)
                                  for longer memory race recording . . . . 49--60
            Michael D. Bond and   
            Kathryn S. McKinley   Bell: bit-encoding online memory leak
                                  detection  . . . . . . . . . . . . . . . 61--72
               Smitha Shyam and   
      Kypros Constantinides and   
               Sujay Phadke and   
           Valeria Bertacco and   
                    Todd Austin   Ultra low-cost defect protection for
                                  microprocessor pipelines . . . . . . . . 73--82
             Vimal K. Reddy and   
             Eric Rotenberg and   
        Sailashri Parthasarathy   Understanding prediction-based partial
                                  redundant threading for low-overhead,
                                  high-coverage fault tolerance  . . . . . 83--94
         Angshuman Parashar and   
      Anand Sivasubramaniam and   
            Sudhanva Gurumurthi   SlicK: slice-based locality exploitation
                                  for efficient redundant multithreading   95--105
              Taliver Heath and   
          Ana Paula Centeno and   
             Pradeep George and   
                 Luiz Ramos and   
                 Yogesh Jaluria   Mercury and Freon: temperature emulation
                                  and management for server systems  . . . 106--116
                 Taeho Kgil and   
              Shaun D'Souza and   
                  Ali Saidi and   
             Nathan Binkert and   
          Ronald Dreslinski and   
               Trevor Mudge and   
           Steven Reinhardt and   
             Krisztian Flautner   PicoServer: using $3$D stacking
                                  technology to enable a compact energy
                                  efficient chip multiprocessor  . . . . . 117--128
         Katherine E. Coons and   
                   Xia Chen and   
                Doug Burger and   
        Kathryn S. McKinley and   
            Sundeep K. Kushwaha   A spatial path scheduling algorithm for
                                  EDGE architectures . . . . . . . . . . . 129--140
            Martha Mercaldi and   
             Steven Swanson and   
            Andrew Petersen and   
              Andrew Putnam and   
            Andrew Schwerin and   
                 Mark Oskin and   
                Susan J. Eggers   Instruction scheduling for a tiled
                                  dataflow architecture  . . . . . . . . . 141--150
          Michael I. Gordon and   
              William Thies and   
              Saman Amarasinghe   Exploiting coarse-grained task, data,
                                  and pipeline parallelism in stream
                                  programs . . . . . . . . . . . . . . . . 151--162
               Mahim Mishra and   
        Timothy J. Callahan and   
            Tiberiu Chelcea and   
       Girish Venkataramani and   
          Seth C. Goldstein and   
                    Mihai Budiu   Tartan: evaluating spatial computation
                                  for whole program execution  . . . . . . 163--174
              Stijn Eyerman and   
            Lieven Eeckhout and   
            Tejas Karkhanis and   
                 James E. Smith   A performance counter architecture for
                                  computing accurate CPI components  . . . 175--184
            Benjamin C. Lee and   
                David M. Brooks   Accurate and efficient regression
                                  modeling for microarchitectural
                                  performance and power prediction . . . . 185--194
            Engin Ïpek and   
             Sally A. McKee and   
               Rich Caruana and   
      Bronis R. de Supinski and   
                  Martin Schulz   Efficiently exploring architectural
                                  design spaces via predictive modeling    195--206
            Mazen Kharbutli and   
              Xiaowei Jiang and   
                Yan Solihin and   
         Guru Venkataramani and   
                Milos Prvulovic   Comprehensively and efficiently
                                  protecting the heap  . . . . . . . . . . 207--218
        Trishul M. Chilimbi and   
                Vinod Ganapathy   HeapMD: identifying heap-based bugs
                                  using anomaly detection  . . . . . . . . 219--228
        Satish Narayanasamy and   
          Cristiano Pereira and   
                    Brad Calder   Recording shared memory dependencies
                                  using strata . . . . . . . . . . . . . . 229--240
       Jaidev P. Patwardhan and   
               Vijeta Johri and   
                Chris Dwyer and   
                Alvin R. Lebeck   A defect tolerant self-organizing
                                  nanoscale SIMD architecture  . . . . . . 241--251
            Ethan Schuchman and   
               T. N. Vijaykumar   A program transformation and
                                  architecture support for quantum
                                  uncomputation  . . . . . . . . . . . . . 252--263
          Shashidhar Mysore and   
              Banit Agrawal and   
           Navin Srivastava and   
             Sheng-Chih Lin and   
           Kaustav Banerjee and   
                   Tim Sherwood   Introspective $3$D chips . . . . . . . . 264--273
            Jason F. Cantin and   
           Mikko H. Lipasti and   
                 James E. Smith   Stealth prefetching  . . . . . . . . . . 274--282
        Koushik Chakraborty and   
            Philip M. Wells and   
               Gurindar S. Sohi   Computation spreading: employing
                                  hardware migration to specialize CMP
                                  cores on-the-fly . . . . . . . . . . . . 283--292
            Jason E. Miller and   
                  Anant Agarwal   Software-based instruction caching for
                                  embedded processors  . . . . . . . . . . 293--302
                     Xin Li and   
               Marian Boldt and   
         Reinhard von Hanxleden   Mapping Esterel onto a multi-threaded
                                  embedded processor . . . . . . . . . . . 303--314
          Nathan L. Binkert and   
               Ali G. Saidi and   
            Steven K. Reinhardt   Integrated network interfaces for
                                  high-bandwidth TCP/IP  . . . . . . . . . 315--324
              David Tarditi and   
                  Sidd Puri and   
                   Jose Oglesby   Accelerator: using data parallelism to
                                  program GPUs for general-purpose uses    325--335
               Peter Damron and   
         Alexandra Fedorova and   
                      Yossi Lev   Hybrid transactional memory  . . . . . . 336--346
              Weihaw Chuang and   
        Satish Narayanasamy and   
           Ganesh Venkatesh and   
               Jack Sampson and   
     Michael Van Biesbrouck and   
               Gilles Pokam and   
                Brad Calder and   
                Osvaldo Colavin   Unbounded page-based transactional
                                  memory . . . . . . . . . . . . . . . . . 347--358
        Michelle J. Moravan and   
              Jayaram Bobba and   
             Kevin E. Moore and   
                   Luke Yen and   
               Mark D. Hill and   
                 Ben Liblit and   
           Michael M. Swift and   
                  David A. Wood   Supporting nested transactional memory
                                  in logTM . . . . . . . . . . . . . . . . 359--370
             JaeWoong Chung and   
               Chi Cao Minh and   
            Austen McDonald and   
               Travis Skare and   
               Hassan Chafi and   
         Brian D. Carlstrom and   
         Christos Kozyrakis and   
                 Kunle Olukotun   Tradeoffs in transactional memory
                                  virtualization . . . . . . . . . . . . . 371--381
          Motohiro Kawahito and   
            Hideaki Komatsu and   
             Takao Moriyama and   
              Hiroshi Inoue and   
                Toshio Nakatani   A new idiom recognition framework for
                                  exploiting hardware-assist instructions  382--393
               Sorav Bansal and   
                     Alex Aiken   Automatic generation of peephole
                                  superoptimizers  . . . . . . . . . . . . 394--403
       Armando Solar-Lezama and   
               Liviu Tancau and   
            Rastislav Bodik and   
              Sanjit Seshia and   
                 Vijay Saraswat   Combinatorial sketching for finite
                                  programs . . . . . . . . . . . . . . . . 404--415
              Jeff Da Silva and   
             J. Gregory Steffan   A probabilistic pointer analysis for
                                  speculative optimizations  . . . . . . . 416--425


Operating Systems Review
Volume 41, Number 1, January, 2007

             Jeanna N. Matthews   Operating systems review: year in review 1--2
               Brett D. Fleisch   Program director's column: can nuggets
                                  make a difference? . . . . . . . . . . . 3--4
                    Erik Riedel   Introduction . . . . . . . . . . . . . . 5--6
                 Yuhui Deng and   
                     Frank Wang   A heterogeneous storage grid enabled by
                                  grid service . . . . . . . . . . . . . . 7--13
       Sudharshan Vazhkudai and   
                    Xiaosong Ma   Recovering transient data: automated
                                  on-demand data reconstruction and
                                  offloading for supercomputers  . . . . . 14--18
             Michael Factor and   
                 Dalit Naor and   
    Simona Rabinovici-Cohen and   
               Leeat Ramati and   
               Petra Reshef and   
                  Julian Satran   The need for preservation aware storage:
                                  a position paper . . . . . . . . . . . . 19--23
              Martin Jambor and   
                Tomas Hruby and   
                   Jan Taus and   
                Kuba Krchak and   
                   Viliam Holub   Implementation of a Linux log-structured
                                  file system with a garbage collector . . 24--32
            Sudhanva Gurumurthi   Should disks be speed demons or
                                  brainiacs? . . . . . . . . . . . . . . . 33--36
             John A. Chandy and   
                  Sumit Narayan   Reliability tradeoffs in personal
                                  storage systems  . . . . . . . . . . . . 37--41
            Simson L. Garfinkel   Complete delete vs. time machine
                                  computing  . . . . . . . . . . . . . . . 42--44
      Jeffrey Choi Robinson and   
                 Jim Alves-Foss   A high assurance MLS file server . . . . 45--53
        Remzi H. Arpaci-Dusseau   CS 736 project highlights from U.
                                  Wisconsin: how students spend their days
                                  and nights in a winter wonderland  . . . 54--55
                Himani Apte and   
                 Meenali Rungta   Adding parity to the Linux \tt ext3 file
                                  system . . . . . . . . . . . . . . . . . 56--65
          Pratap Ramamurthy and   
         Ramanathan Palaniappan   Performance-directed energy management
                                  using \em BOS  . . . . . . . . . . . . . 66--77
           Barton P. Miller and   
            Gregory Cooksey and   
                 Fredrick Moore   An empirical study of the robustness of
                                  MacOS applications using random testing  78--86
          Wolfgang Emmerich and   
               Mikio Aoyama and   
                    Joe Sventek   The impact of research on middleware
                                  technology . . . . . . . . . . . . . . . 89--112

Operating Systems Review
Volume 41, Number 2, April, 2007

           Michael D. Schroeder   Systems work at Microsoft Research . . . 1--2
                      Roy Levin   A perspective on computing research
                                  management . . . . . . . . . . . . . . . 3--9
                 Andrew Herbert   What happened to Pastry  . . . . . . . . 10--16
         William J. Bolosky and   
            John R. Douceur and   
                     Jon Howell   The Farsite project: a retrospective . . 17--26
                Zheng Zhang and   
                  Qiao Lian and   
                Shiding Lin and   
                   Wei Chen and   
                    Yu Chen and   
                       Chao Jin   BitVault: a highly reliable distributed
                                  data retention platform  . . . . . . . . 27--36
              Galen C. Hunt and   
                 James R. Larus   Singularity: rethinking the software
                                  stack  . . . . . . . . . . . . . . . . . 37--49
               Jeremy Elson and   
                 Jon Howell and   
                John R. Douceur   MapCruncher: integrating the world's
                                  geographic information . . . . . . . . . 50--59
                  Michael Isard   Autopilot: automatic data center
                                  management . . . . . . . . . . . . . . . 60--67
              Dahlia Malkhi and   
                  Lev Novik and   
                  Chris Purcell   P2P replica synchronization with vector
                                  sets . . . . . . . . . . . . . . . . . . 68--74
                Anmol Sheth and   
   Chandramohan A. Thekkath and   
             Prakshep Mehta and   
             Kalyan Tejaswi and   
           Chandresh Parekh and   
            Trilok N. Singh and   
                  Uday B. Desai   Senslide: a distributed landslide
                                  prediction system  . . . . . . . . . . . 75--87
             Andrew Birrell and   
              Michael Isard and   
              Chuck Thacker and   
                     Ted Wobber   A design for high-performance flash
                                  disks  . . . . . . . . . . . . . . . . . 88--93

Operating Systems Review
Volume 41, Number 3, June, 2007

            Marek Olszewski and   
                Keir Mierle and   
            Adam Czajkowski and   
             Angela Demke Brown   JIT instrumentation: a novel approach to
                                  dynamically instrument operating systems 3--16
              Anupam Chanda and   
                Alan L. Cox and   
               Willy Zwaenepoel   Whodunit: transactional profiling for
                                  multi-tier applications  . . . . . . . . 17--30
        Christopher Stewart and   
              Terence Kelly and   
                     Alex Zhang   Exploiting nonstationarity for
                                  performance prediction . . . . . . . . . 31--44
                  David Tam and   
                 Reza Azimi and   
                  Michael Stumm   Thread clustering: sharing-aware
                                  scheduling on SMP--CMP--SMT
                                  multiprocessors  . . . . . . . . . . . . 47--58
              Michael Isard and   
                Mihai Budiu and   
                    Yuan Yu and   
             Andrew Birrell and   
                Dennis Fetterly   Dryad: distributed data-parallel
                                  programs from sequential building blocks 59--72
                Bratin Saha and   
     Ali-Reza Adl-Tabatabai and   
              Anwar Ghuloum and   
          Mohan Rajagopalan and   
          Richard L. Hudson and   
              Leaf Petersen and   
                Vijay Menon and   
               Brian Murphy and   
          Tatiana Shpeisman and   
              Eric Sprangle and   
             Anwar Rohillah and   
               Doug Carmean and   
                     Jesse Fang   Enabling scalability and performance in
                                  a large scale CMP environment  . . . . . 73--86
            Kelvin C. W. So and   
            Emin Gün Sirer   Latency and bandwidth-minimizing failure
                                  detectors  . . . . . . . . . . . . . . . 89--99
          Anil Madhavapeddy and   
                    Alex Ho and   
                 Tim Deegan and   
                David Scott and   
                 Ripduman Sohan   Melange: creating a `functional'
                                  Internet . . . . . . . . . . . . . . . . 101--114
               Joseph Tucek and   
              James Newsome and   
                    Shan Lu and   
              Chengdu Huang and   
             Spiros Xanthos and   
              David Brumley and   
              Yuanyuan Zhou and   
                      Dawn Song   Sweeper: a lightweight end-to-end system
                                  for defending against fast worms . . . . 115--128
         Andreas Lachenmann and   
Pedro José Marrón and   
            Matthias Gauger and   
              Daniel Minder and   
                 Olga Saukh and   
                 Kurt Rothermel   Removing the memory limitations of
                                  sensor networks with flash-based virtual
                                  memory . . . . . . . . . . . . . . . . . 131--144
    René Müller and   
             Gustavo Alonso and   
                Donald Kossmann   A virtual machine for sensor networks    145--158
                  Asad Awan and   
         Suresh Jagannathan and   
                   Ananth Grama   Macroprogramming heterogeneous sensor
                                  networks using cosmos  . . . . . . . . . 159--172
               Zhihui Zhang and   
                    Kanad Ghose   hFS: a hybrid file system prototype for
                                  improving small file and metadata
                                  performance  . . . . . . . . . . . . . . 175--187
               Chuanpeng Li and   
                   Kai Shen and   
    Athanasios E. Papathanasiou   Competitive prefetching for concurrent
                                  sequential I/O . . . . . . . . . . . . . 189--202
                 Jake Wires and   
              Michael J. Feeley   Secure file system versioning at the
                                  block level  . . . . . . . . . . . . . . 203--215
                  Wei Zheng and   
          Ricardo Bianchini and   
                  Thu D. Nguyen   Automatic configuration of Internet
                                  services . . . . . . . . . . . . . . . . 219--229
               David Pariag and   
                 Tim Brecht and   
                Ashif Harji and   
                 Peter Buhr and   
                Amol Shukla and   
              David R. Cheriton   Comparing the performance of Web server
                                  architectures  . . . . . . . . . . . . . 231--243
         Jan S. Rellermeyer and   
                 Gustavo Alonso   Concierge: a service platform for
                                  resource-constrained devices . . . . . . 245--258
                Yoav Etsion and   
                Dan Tsafrir and   
          Scott Kirkpatrick and   
              Dror G. Feitelson   Fine grained kernel logging with
                                  KLogger: experience and insights . . . . 259--272
            Stephen Soltesz and   
         Herbert Pötzl and   
         Marc E. Fiuczynski and   
                Andy Bavier and   
                 Larry Peterson   Container-based operating system
                                  virtualization: a scalable,
                                  high-performance alternative to
                                  hypervisors  . . . . . . . . . . . . . . 275--287
             Pradeep Padala and   
               Kang G. Shin and   
                Xiaoyun Zhu and   
              Mustafa Uysal and   
                Zhikui Wang and   
             Sharad Singhal and   
              Arif Merchant and   
                  Kenneth Salem   Adaptive control of virtualized
                                  resources in utility computing
                                  environments . . . . . . . . . . . . . . 289--302
                   Yin Wang and   
              Terence Kelly and   
      Stéphane Lafortune   Discrete control for safe execution of
                                  IT automation workflows  . . . . . . . . 305--314
           Rachid Guerraoui and   
             Michal Kapalka and   
                      Jan Vitek   STMBench7: a benchmark for software
                                  transactional memory . . . . . . . . . . 315--324
             Kristis Makris and   
                 Kyung Dong Ryu   Dynamic and adaptive updates of
                                  non-quiescent subsystems in commodity
                                  operating system kernels . . . . . . . . 327--340
                 Galen Hunt and   
                 Mark Aiken and   
      Manuel Fähndrich and   
           Chris Hawblitzel and   
               Orion Hodson and   
                James Larus and   
                Steven Levi and   
         Bjarne Steensgaard and   
              David Tarditi and   
                     Ted Wobber   Sealing OS processes to improve
                                  dependability and safety . . . . . . . . 341--354
                 Ted Wobber and   
          Aydan Yumerefendi and   
        Martín Abadi and   
             Andrew Birrell and   
                Daniel R. Simon   Authorizing applications in singularity  355--368
         Hakim Weatherspoon and   
              Patrick Eaton and   
             Byung-Gon Chun and   
               John Kubiatowicz   Antiquity: exploiting a secure log for
                                  wide-area distributed storage  . . . . . 371--384
     Lásaro Camargos and   
            Fernando Pedone and   
                 Marcin Wieloch   Sprint: a middleware for
                                  high-performance transaction processing  385--398
             Sameh Elnikety and   
             Steven Dropsho and   
               Willy Zwaenepoel   Tashkent+: memory-aware load balancing
                                  and update filtering in replicated
                                  databases  . . . . . . . . . . . . . . . 399--412

Operating Systems Review
Volume 41, Number 4, July, 2007

                Michael Hohmuth   Introduction . . . . . . . . . . . . . . 1--2
              Gernot Heiser and   
          Kevin Elphinstone and   
                   Ihor Kuz and   
               Gerwin Klein and   
              Stefan M. Petters   Towards trustworthy computing systems:
                                  taking microkernels to the next level    3--11
             Bryan D. Payne and   
              Reiner Sailer and   
Ramón Cáceres and   
                  Ron Perez and   
                      Wenke Lee   A layered approach to simplified access
                                  control in virtualized systems . . . . . 12--19
          Jacob Gorm Hansen and   
          Eske Christiansen and   
                       Eric Jul   Evil twins: two models for TCB reduction
                                  in HPC clusters  . . . . . . . . . . . . 20--29
           Neal H. Walfield and   
               Marcus Brinkmann   A critique of the GNU Hurd multi-server
                                  operating system . . . . . . . . . . . . 30--39
                   Norman Feske   A case study on the cost and benefit of
                                  dynamic RPC marshalling for low-level
                                  system components  . . . . . . . . . . . 40--48
                  Volkmar Uhlig   The mechanics of in-kernel
                                  synchronization for a scalable
                                  microkernel  . . . . . . . . . . . . . . 49--58
                     Jan Stoess   Towards effective user-controlled
                                  scheduling for microkernel-based systems 59--68
                  Dohun Kim and   
                 Jugwan Eom and   
                    Chanik Park   L4oprof: a
                                  performance-monitoring-unit-based
                                  software-profiling framework for the L4
                                  microkernel  . . . . . . . . . . . . . . 69--76
                    Micha Hofri   Service transparency considered harmful:
                                  letter to the editor . . . . . . . . . . 77--77
                     Yuhui Deng   Author response  . . . . . . . . . . . . 78--78
                 Yuhui Deng and   
                     Frank Wang   Opportunities and challenges of storage
                                  Grid enabled by Grid service . . . . . . 79--82
              Hung-Yu Chien and   
                 Chen-Wei Huang   Security of ultra-lightweight RFID
                                  authentication protocols and its
                                  improvements . . . . . . . . . . . . . . 83--86

Operating Systems Review
Volume 41, Number 5, October, 2007

       Anne-Marie Kermarrec and   
              Maarten van Steen   Gossiping in distributed systems . . . . 2--7
                     Ken Birman   The promise, and limitations, of gossip
                                  protocols  . . . . . . . . . . . . . . . 8--13
             Lorenzo Alvisi and   
              Jeroen Doumen and   
           Rachid Guerraoui and   
            Boris Koldehofe and   
                   Harry Li and   
        Robbert van Renesse and   
                  Gilles Tredan   How robust are gossip-based
                                  communication protocols? . . . . . . . . 14--18
          Yaacov Fernandess and   
   Antonio Fernández and   
                   Maxime Monod   A generic theoretical framework for
                                  modeling gossip-based algorithms . . . . 19--27
               Rena Bakhshi and   
            Francois Bonnet and   
                Wan Fokkink and   
            Boudewijn Haverkort   Formal analysis techniques for gossiping
                                  protocols  . . . . . . . . . . . . . . . 28--36
            Patrick Eugster and   
              Pascal Felber and   
             Fabrice Le Fessant   The `art' of programming gossip-based
                                  systems  . . . . . . . . . . . . . . . . 37--42
   Étienne Rivi\`ere and   
            Roberto Baldoni and   
                   Harry Li and   
            José Pereira   Compositional gossip: a conceptual
                                  architecture for designing gossip-based
                                  applications . . . . . . . . . . . . . . 43--50
                Paolo Costa and   
            Vincent Gramoli and   
       Márk Jelasity and   
            Gian Paolo Jesi and   
            Erwan Le Merrer and   
          Alberto Montresor and   
              Leonardo Querzoni   Exploring the interdisciplinary
                                  connections of gossip-based systems  . . 51--60
                 Ali Ghodsi and   
                Seif Haridi and   
             Hakim Weatherspoon   Exploiting the synergy between gossiping
                                  and structured overlays  . . . . . . . . 61--66
               Roy Friedman and   
            Daniela Gavidia and   
             Luis Rodrigues and   
       Aline Carneiro Viana and   
               Spyros Voulgaris   Gossiping on MANETs: the beauty and the
                                  beast  . . . . . . . . . . . . . . . . . 67--74
         Hakim Weatherspoon and   
               Hugo Miranda and   
            Konrad Iwanicki and   
                 Ali Ghodsi and   
                    Yann Busnel   Gossiping over storage systems is
                                  practical  . . . . . . . . . . . . . . . 75--81
                  Jin Liang and   
             Indranil Gupta and   
                Klara Nahrstedt   Reliable on-demand management operations
                                  for large-scale distributed applications 82--88

Operating Systems Review
Volume 41, Number 6, December, 2007

              Helen J. Wang and   
               Xiaofeng Fan and   
                 Jon Howell and   
                 Collin Jackson   Protection and communication
                                  abstractions for Web browsers in
                                  MashupOS . . . . . . . . . . . . . . . . 1--16
               Emre Kiciman and   
              Benjamin Livshits   AjaxScope: a platform for remotely
                                  monitoring the client-side behavior of
                                  Web 2.0 applications . . . . . . . . . . 17--30
              Stephen Chong and   
                    Jed Liu and   
            Andrew C. Myers and   
                     Xin Qi and   
                  K. Vikram and   
              Lantian Zheng and   
                      Xin Zheng   Secure Web application via automatic
                                  partitioning . . . . . . . . . . . . . . 31--44
          Ramakrishna Kotla and   
             Lorenzo Alvisi and   
                Mike Dahlin and   
              Allen Clement and   
                    Edmund Wong   Zyzzyva: speculative Byzantine fault
                                  tolerance  . . . . . . . . . . . . . . . 45--58
               Ben Vandiver and   
          Hari Balakrishnan and   
             Barbara Liskov and   
                     Sam Madden   Tolerating Byzantine faults in
                                  transaction processing systems using
                                  commit barrier scheduling  . . . . . . . 59--72
            James Hendricks and   
          Gregory R. Ganger and   
              Michael K. Reiter   Low-overhead Byzantine fault-tolerant
                                  storage  . . . . . . . . . . . . . . . . 73--86
    Christopher J. Rossbach and   
            Owen S. Hofmann and   
           Donald E. Porter and   
            Hany E. Ramadan and   
            Bhandari Aditya and   
                 Emmett Witchel   TxLinux: using and managing hardware
                                  transactional memory in an operating
                                  system . . . . . . . . . . . . . . . . . 87--102
                    Shan Lu and   
                Soyeon Park and   
               Chongfeng Hu and   
                    Xiao Ma and   
              Weihang Jiang and   
                 Zhenmin Li and   
             Raluca A. Popa and   
                  Yuanyuan Zhou   MUVI: automatically inferring
                                  multi-variable access correlations and
                                  detecting related semantic and
                                  concurrency bugs . . . . . . . . . . . . 103--116
               Manuel Costa and   
              Miguel Castro and   
                Lidong Zhou and   
               Lintao Zhang and   
                 Marcus Peinado   Bouncer: securing software by blocking
                                  bad input  . . . . . . . . . . . . . . . 117--130
               Joseph Tucek and   
                    Shan Lu and   
              Chengdu Huang and   
             Spiros Xanthos and   
                  Yuanyuan Zhou   Triage: diagnosing production run
                                  failures at the user's site  . . . . . . 131--144
                    Lin Tan and   
                  Ding Yuan and   
              Gopal Krishna and   
                  Yuanyuan Zhou   /*icomment: bugs or bad comments?*/  . . 145--158
         Marcos K. Aguilera and   
              Arif Merchant and   
                 Mehul Shah and   
            Alistair Veitch and   
           Christos Karamanolis   Sinfonia: a new paradigm for building
                                  scalable distributed systems . . . . . . 159--174
          Andreas Haeberlen and   
            Petr Kouznetsov and   
                 Peter Druschel   PeerReview: practical accountability for
                                  distributed systems  . . . . . . . . . . 175--188
             Byung-Gon Chun and   
            Petros Maniatis and   
              Scott Shenker and   
               John Kubiatowicz   Attested append-only memory: making
                                  adversaries stick to their word  . . . . 189--204
          Giuseppe DeCandia and   
             Deniz Hastorun and   
              Madan Jampani and   
     Gunavardhan Kakulapati and   
           Avinash Lakshman and   
               Alex Pilchin and   
Swaminathan Sivasubramanian and   
             Peter Vosshall and   
                  Werner Vogels   Dynamo: Amazon's highly available
                                  key-value store  . . . . . . . . . . . . 205--220
            Olivier Crameri and   
            Nikola Knezevic and   
               Dejan Kostic and   
          Ricardo Bianchini and   
               Willy Zwaenepoel   Staged deployment in Mirage, an
                                  integrated software upgrade testing and
                                  distribution system  . . . . . . . . . . 221--236
                 Ya-Yunn Su and   
             Mona Attariyan and   
                    Jason Flinn   AutoBash: improving configuration
                                  management with operating system
                                  causality analysis . . . . . . . . . . . 237--250
                Kevin Klues and   
            Vlado Handziski and   
                Chenyang Lu and   
                Adam Wolisz and   
               David Culler and   
                  David Gay and   
                   Philip Levis   Integrating concurrency control and
                                  energy management in device drivers  . . 251--264
              Ripal Nathuji and   
                 Karsten Schwan   VirtualPower: coordinated power
                                  management in virtualized enterprise
                                  systems  . . . . . . . . . . . . . . . . 265--278
                Oren Laadan and   
         Ricardo A. Baratto and   
               Dan B. Phung and   
               Shaya Potter and   
                     Jason Nieh   DejaView: a personal virtual computer
                                  recorder . . . . . . . . . . . . . . . . 279--292
          Haryadi S. Gunawi and   
        Vijayan Prabhakaran and   
            Swetha Krishnan and   
   Andrea C. Arpaci-Dusseau and   
        Remzi H. Arpaci-Dusseau   Improving file system reliability with
                                  I/O shepherding  . . . . . . . . . . . . 293--306
          Christopher Frost and   
            Mike Mammarella and   
               Eddie Kohler and   
        Andrew de los Reyes and   
            Shant Hovsepian and   
            Andrew Matsuoka and   
                      Lei Zhang   Generalized file system dependencies . . 307--320
              Maxwell Krohn and   
              Alexander Yip and   
              Micah Brodsky and   
              Natan Cliffer and   
          M. Frans Kaashoek and   
               Eddie Kohler and   
                  Robert Morris   Information flow control for standard OS
                                  abstractions . . . . . . . . . . . . . . 321--334
            Arvind Seshadri and   
                   Mark Luk and   
                    Ning Qu and   
                  Adrian Perrig   SecVisor: a tiny hypervisor to provide
                                  lifetime kernel code integrity for
                                  commodity OSes . . . . . . . . . . . . . 335--350
              John Criswell and   
            Andrew Lenharth and   
           Dinakar Dhurjati and   
                    Vikram Adve   Secure virtual architecture: a safe
                                  execution environment for commodity
                                  operating systems  . . . . . . . . . . . 351--366


Operating Systems Review
Volume 42, Number 1, January, 2008

             Dilma Da Silva and   
           Robert W. Wisniewski   Introduction . . . . . . . . . . . . . . 1--1
            Muli Ben-Yehuda and   
            Eric Van Hensbergen   Open source as a foundation for systems
                                  research . . . . . . . . . . . . . . . . 2--4
       Robert W. Wisniewski and   
             Dilma da Silva and   
             Marc Auslander and   
              Orran Krieger and   
           Michal Ostrowski and   
                Bryan Rosenburg   K42: lessons for the OS community  . . . 5--12
                Joefon Jann and   
          R. Sarma Burugula and   
              Niteesh Dubey and   
                Pratap Pattnaik   End-to-end performance of commercial
                                  applications in the face of changing
                                  hardware . . . . . . . . . . . . . . . . 13--20
               Yaoping Ruan and   
               Vivek S. Pai and   
                Erich Nahum and   
                 John M. Tracey   Do commodity SMT processors need more OS
                                  research?  . . . . . . . . . . . . . . . 21--25
                 Dan Pelleg and   
            Muli Ben-Yehuda and   
                Rick Harper and   
            Lisa Spainhower and   
              Tokunbo Adeshiyan   Vigilant: out-of-band detection of
                                  failures in virtual machines . . . . . . 26--31
              David C. Toll and   
             Paul A. Karger and   
           Elaine R. Palmer and   
        Suzanne K. McIntosh and   
                      Sam Weber   The Caernarvon secure embedded operating
                                  system . . . . . . . . . . . . . . . . . 32--39
              Stefan Berger and   
Ramón Cáceres and   
       Dimitrios Pendarakis and   
              Reiner Sailer and   
          Enriquillo Valdez and   
               Ronald Perez and   
          Wayne Schildhauer and   
               Deepa Srinivasan   TVDc: managing security in the trusted
                                  virtual datacenter . . . . . . . . . . . 40--47
        R. Ananthanarayanan and   
                   M. Eshel and   
                  R. Haskin and   
                    M. Naik and   
                 F. Schmuck and   
                      R. Tewari   Panache: a parallel WAN cache for
                                  clustered filesystems  . . . . . . . . . 48--53
        Mohammad Banikazemi and   
                 Jim Hafner and   
           Wendy Belluomini and   
                     KK Rao and   
                   Dan Poff and   
                   Bulent Abali   Flipstone: managing storage with
                                  fail-in-place and deferred maintenance
                                  service models . . . . . . . . . . . . . 54--62
             Norman Bobroff and   
             Gargi Dasgupta and   
                 Liana Fong and   
                 Yanbin Liu and   
         Balaji Viswanathan and   
            Fabio Benedetti and   
                Jonathan Wagner   A distributed job scheduling and flow
                                  management system  . . . . . . . . . . . 63--70
                   Kun Wang and   
                   Yu Zhang and   
               Huayong Wang and   
                   Xiaowei Shen   Parallelization of IBM Mambo system
                                  simulator in functional modes  . . . . . 71--76
           Jonathan Appavoo and   
              Volkmar Uhlig and   
                 Amos Waterland   Project Kittyhawk: building a
                                  global-scale computer: Blue Gene/P as a
                                  generic computing platform . . . . . . . 77--84
        Eric Van Hensbergen and   
            Charles Forsyth and   
                  Jim McKie and   
                    Ron Minnich   Holistic aggregate resource environment  85--91
             David Choffnes and   
                Mark Astley and   
                Michael J. Ward   Migration policies for multi-core
                                  fair-share scheduling  . . . . . . . . . 92--93
       Ma\lgorzata Steinder and   
                Ian Whalley and   
                    David Chess   Server virtualization in autonomic
                                  management of heterogeneous workloads    94--95
                 Liana Fong and   
           Ma\lgorzata Steinder   Duality of virtualization:
                                  simplification and complexity  . . . . . 96--97
              Tiancheng Liu and   
                    Ying Li and   
           Andrew Schofield and   
              Matt Hogstrom and   
                  Kewei Sun and   
                      Ying Chen   Partition-based heap memory management
                                  in an application server . . . . . . . . 98--98
               Arup Acharya and   
                Xiping Wang and   
                 Charles Wright   SIP message classification: design and
                                  performance  . . . . . . . . . . . . . . 100--101
                      Yi Ge and   
                  Chen Wang and   
               Xiaowei Shen and   
                  Honesty Young   A database scale-out solution for
                                  emerging write-intensive commercial
                                  workloads  . . . . . . . . . . . . . . . 102--103
                Karan Gupta and   
           Prasenjit Sarkar and   
                   Lesley Mbogo   MIRAGE: storage provisioning in large
                                  data centers using balanced component
                                  utilizations . . . . . . . . . . . . . . 104--105
              Maria Butrico and   
             Dilma Da Silva and   
              Orran Krieger and   
           Michal Ostrowski and   
            Bryan Rosenburg and   
                Dan Tsafrir and   
        Eric Van Hensbergen and   
       Robert W. Wisniewski and   
                   Jimi Xenidis   Specialized execution environments . . . 106--107
            Sheetal Agarwal and   
       Dipanjan Chakraborty and   
               Swati Challa and   
     Nandakishore Kambhatla and   
                 Arun Kumar and   
          Sougata Mukherjea and   
         Amit Anil Nanavati and   
                Nitendra Rajput   \em Pyr.mea.IT: permeating IT towards
                                  the base of the pyramid  . . . . . . . . 108--109
                Muli Ben-Yehuda   1st Annual Haifa Systems and Storage
                                  Conference (SYSTOR 2007): a message from
                                  the organizers . . . . . . . . . . . . . 110--110
                Kfir Karmon and   
                 Liran Liss and   
                 Assaf Schuster   GWiQ-P: an efficient decentralized
                                  Grid-wide quota enforcement protocol . . 111--118
              Sorin Faibish and   
           Stephen Fridella and   
                Peter Bixby and   
                     Uday Gupta   Storage virtualization using a
                                  block-device file system . . . . . . . . 119--126
              Paula Ta-Shma and   
                  Guy Laden and   
            Muli Ben-Yehuda and   
                 Michael Factor   Virtual machine time travel using
                                  continuous data protection and
                                  checkpointing  . . . . . . . . . . . . . 127--134

Operating Systems Review
Volume 42, Number 2, March, 2008

                   Erik Winfree   Toward molecular programming with DNA    1--1
               Xiaoxin Chen and   
              Tal Garfinkel and   
       E. Christopher Lewis and   
        Pratap Subrahmanyam and   
        Carl A. Waldspurger and   
                  Dan Boneh and   
            Jeffrey Dwoskin and   
                Dan R. K. Ports   Overshadow: a virtualization-based
                                  approach to retrofitting protection in
                                  commodity operating systems  . . . . . . 2--13
         Jonathan M. McCune and   
                Bryan Parno and   
              Adrian Perrig and   
          Michael K. Reiter and   
                Arvind Seshadri   How low can you go?: recommendations for
                                  hardware-supported minimal TCB code
                                  execution  . . . . . . . . . . . . . . . 14--25
              Ravi Bhargava and   
          Benjamin Serebrin and   
          Francesco Spadini and   
                 Srilatha Manne   Accelerating two-dimensional page walks
                                  for virtualized systems  . . . . . . . . 26--35
            Benjamin C. Lee and   
                   David Brooks   Efficiency trends and limits from
                                  comprehensive microarchitectural
                                  adaptivity . . . . . . . . . . . . . . . 36--47
          Ramya Raghavendra and   
  Parthasarathy Ranganathan and   
              Vanish Talwar and   
                Zhikui Wang and   
                    Xiaoyun Zhu   No `power' struggles: coordinated
                                  multi-level power management for the
                                  data center  . . . . . . . . . . . . . . 48--59
Chinnakrishnan S. Ballapuram and   
               Ahmad Sharif and   
              Hsien-Hsin S. Lee   Exploiting access semantics and program
                                  behavior to reduce snoop power in chip
                                  multiprocessors  . . . . . . . . . . . . 60--69
             Arindam Mallik and   
              Jack Cosgrove and   
             Robert P. Dick and   
               Gokhan Memik and   
                    Peter Dinda   PICSEL: measuring user-perceived
                                  performance to control dynamic frequency
                                  scaling  . . . . . . . . . . . . . . . . 70--79
               Jose A. Joao and   
                 Onur Mutlu and   
                Hyesoon Kim and   
              Rishi Agarwal and   
                   Yale N. Patt   Improving the performance of
                                  object-oriented languages with dynamic
                                  predication of indirect jumps  . . . . . 80--90
              Michal Wegiel and   
                 Chandra Krintz   The Mapping Collector: virtual memory
                                  support for generational, parallel, and
                                  concurrent compaction  . . . . . . . . . 91--102
               Joe Devietti and   
             Colin Blundell and   
          Milo M. K. Martin and   
                Steve Zdancewic   Hardbound: architectural support for
                                  spatial safety of the C programming
                                  language . . . . . . . . . . . . . . . . 103--114
            Vitaliy B. Lvin and   
                Gene Novark and   
            Emery D. Berger and   
               Benjamin G. Zorn   Archipelago: trading address space for
                                  reliability and security . . . . . . . . 115--124
               Bumyong Choi and   
                 Leo Porter and   
                Dean M. Tullsen   Accurate branch prediction for short
                                  threads  . . . . . . . . . . . . . . . . 125--134
        Shekhar Srikantaiah and   
            Mahmut Kandemir and   
                Mary Jane Irwin   Adaptive set pinning: managing shared
                                  caches in chip multiprocessors . . . . . 135--144
                 James Tuck and   
                 Wonsun Ahn and   
                  Luis Ceze and   
                Josep Torrellas   SoftSig: software-exposed hardware
                                  signatures for code analysis and
                                  optimization . . . . . . . . . . . . . . 145--156
               Ioana Burcea and   
            Stephen Somogyi and   
           Andreas Moshovos and   
                  Babak Falsafi   Predictor virtualization . . . . . . . . 157--167
            Vinod Ganapathy and   
      Matthew J. Renzelmann and   
         Arini Balakrishnan and   
           Michael M. Swift and   
                     Somesh Jha   The design and implementation of
                                  microdrivers . . . . . . . . . . . . . . 168--178
            Yaron Weinsberg and   
                Danny Dolev and   
                  Tal Anker and   
            Muli Ben-Yehuda and   
                   Pete Wyckoff   Tapping into the fountain of CPUs: on
                                  operating system support for
                                  programmable devices . . . . . . . . . . 179--188
                   Kai Shen and   
                 Ming Zhong and   
          Sandhya Dwarkadas and   
               Chuanpeng Li and   
        Christopher Stewart and   
                     Xiao Zhang   Hardware counter driven on-the-fly
                                  request signatures . . . . . . . . . . . 189--200
           Luk Van Ertvelde and   
                Lieven Eeckhout   Dispersing proprietary applications as
                                  benchmarks through code mutation . . . . 201--210
          Shashidhar Mysore and   
               Bita Mazloom and   
              Banit Agrawal and   
               Timothy Sherwood   Understanding and visualizing full
                                  systems with data flow tomography  . . . 211--221
           Guilherme Ottoni and   
                David I. August   Communication optimizations for global
                                  multi-threaded instruction scheduling    222--232
            Milind Kulkarni and   
             Keshav Pingali and   
       Ganesh Ramanarayanan and   
               Bruce Walter and   
                Kavita Bala and   
                   L. Paul Chew   Optimistic parallelism benefits from
                                  data partitioning  . . . . . . . . . . . 233--243
                   Russ Cox and   
                 Tom Bergan and   
         Austin T. Clements and   
             Frans Kaashoek and   
                   Eddie Kohler   Xoc, an extension-oriented compiler for
                                  systems programming  . . . . . . . . . . 244--254
            Philip M. Wells and   
        Koushik Chakraborty and   
               Gurindar S. Sohi   Adapting to intermittent faults in
                                  multicore systems  . . . . . . . . . . . 255--264
                 Man-Lap Li and   
       Pradeep Ramachandran and   
         Swarup Kumar Sahoo and   
             Sarita V. Adve and   
             Vikram S. Adve and   
                  Yuanyuan Zhou   Understanding the propagation of hard
                                  errors to software and implications for
                                  resilient system design  . . . . . . . . 265--276
           M. Aater Suleman and   
       Moinuddin K. Qureshi and   
                   Yale N. Patt   Feedback-driven threading:
                                  power-efficient and high-performance
                                  execution of multi-threaded workloads on
                                  CMPs . . . . . . . . . . . . . . . . . . 277--286
       Michael D. Linderman and   
         Jamison D. Collins and   
                  Hong Wang and   
                 Teresa H. Meng   Merge: a programming model for
                                  heterogeneous multi-core systems . . . . 287--296
          Jayanth Gummaraju and   
                Joel Coburn and   
              Yoshio Turner and   
               Mendel Rosenblum   Streamware: programming general-purpose
                                  multicore processors using streams . . . 297--307
      Edmund B. Nightingale and   
                Daniel Peek and   
              Peter M. Chen and   
                    Jason Flinn   Parallelizing security checks on
                                  commodity hardware . . . . . . . . . . . 308--318
              Miguel Castro and   
               Manuel Costa and   
           Jean-Philippe Martin   Better bug reporting with better privacy 319--328
                    Shan Lu and   
                Soyeon Park and   
                 Eunsoo Seo and   
                  Yuanyuan Zhou   Learning from mistakes: a comprehensive
                                  study on real world concurrency bug
                                  characteristics  . . . . . . . . . . . . 329--339

Operating Systems Review
Volume 42, Number 3, April, 2008

                Ewa Huebner and   
                 Frans Henskens   The role of operating systems in
                                  computer forensics . . . . . . . . . . . 1--3
                   Ying Xia and   
            Kevin Fairbanks and   
                     Henry Owen   A program behavior matching architecture
                                  for probabilistic file system forensics  4--13
             Eugene Libster and   
              Jesse D. Kornblum   A proposal for an integrated memory
                                  acquisition mechanism  . . . . . . . . . 14--20
                Ashvin Goel and   
             Kamran Farhadi and   
                 Kenneth Po and   
                  Wu-chang Feng   Reconstructing system state for
                                  intrusion analysis . . . . . . . . . . . 21--28
           J. Todd McDonald and   
                Yong C. Kim and   
                  Alec Yasinsac   Software issues in digital forensics . . 29--40
      Steena D. S. Monteiro and   
             Robert F. Erbacher   An authentication and validation
                                  mechanism for analyzing syslogs
                                  forensically . . . . . . . . . . . . . . 41--50
             Federico Maggi and   
             Stefano Zanero and   
                 Vincenzo Iozzo   Seeing the invisible: forensic uses of
                                  anomaly detection and machine learning   51--58
               Doug Wampler and   
                James H. Graham   A normality based method for detecting
                                  kernel rootkits  . . . . . . . . . . . . 59--64
            Iain Sutherland and   
                  Jon Evans and   
          Theodore Tryfonas and   
                   Andrew Blyth   Acquiring volatile operating system data
                                  tools and techniques . . . . . . . . . . 65--73
                  Brian Hay and   
                     Kara Nance   Forensics examination of volatile system
                                  data using virtual introspection . . . . 74--82
             Jason Franklin and   
                   Mark Luk and   
         Jonathan M. McCune and   
            Arvind Seshadri and   
              Adrian Perrig and   
             Leendert van Doorn   Remote detection of virtual machine
                                  monitors with fuzzy benchmarking . . . . 83--92
               Eoghan Casey and   
         Gerasimos J. Stellatos   The impact of full disk encryption on
                                  digital forensics  . . . . . . . . . . . 93--98
                John McHugh and   
                 Ron McLeod and   
           Vagishwari Nagaonkar   Passive network forensics: behavioural
                                  classification of network hosts based on
                                  connection patterns  . . . . . . . . . . 99--111
               Sean Peisert and   
                Matt Bishop and   
                 Keith Marzullo   Computer forensics in forensis . . . . . 112--122
         Thomas C. Bressoud and   
              M. Frans Kaashoek   Chairs' report on Twenty-First ACM
                                  Symposium on Operating Systems
                                  Principles . . . . . . . . . . . . . . . 123--126
                 Rebecca Isaacs   Report on the 2007 SOSP shadow program
                                  committee  . . . . . . . . . . . . . . . 127--131
               Jeffrey C. Mogul   Policies for the SIGOPS Hall of Fame
                                  Award  . . . . . . . . . . . . . . . . . 132--135
             Thomas C. Bressoud   Session scribe notes for Twenty-First
                                  ACM Symposium on Operating Systems
                                  Principles . . . . . . . . . . . . . . . 136--151

Operating Systems Review
Volume 42, Number 4, May, 2008

             Andreas Merkel and   
                  Frank Bellosa   Task activity vectors: a new metric for
                                  temperature-aware scheduling . . . . . . 1--12
               Anna Povzner and   
               Tim Kaldewey and   
               Scott Brandt and   
            Richard Golding and   
           Theodore M. Wong and   
                Carlos Maltzahn   Efficient guaranteed disk request
                                  scheduling with Fahrrad  . . . . . . . . 13--25
              Yoshihisa Abe and   
             Hiroshi Yamada and   
                     Kenji Kono   Enforcing appropriate process execution
                                  for exploiting idle resources from
                                  outside operating systems  . . . . . . . 27--40
             Dut h T. Meyer and   
            Gitika Aggarwal and   
              Brendan Cully and   
          Geoffrey Lefebvre and   
          Michael J. Feeley and   
       Norman C. Hutchinson and   
                Andrew Warfield   Parallax: virtual disks for virtual
                                  machines . . . . . . . . . . . . . . . . 41--54
                 Ming Zhong and   
                   Kai Shen and   
                  Joel Seiferas   Replication degree customization for
                                  high availability  . . . . . . . . . . . 55--68
             Nikolai Joukov and   
                    Josef Sipek   GreenFS: making enterprise computers
                                  greener by protecting them better  . . . 69--80
           Carsten Weinhold and   
            Hermann Härtig   VPFS: building a virtual private file
                                  system with a small trusted computing
                                  base . . . . . . . . . . . . . . . . . . 81--93
              Shvetank Jain and   
            Fareha Shafique and   
              Vladan Djeric and   
                    Ashvin Goel   Application-level isolation and recovery
                                  with solitude  . . . . . . . . . . . . . 95--107
                  Bin Cheng and   
                  Lex Stein and   
                    Hai Jin and   
                    Zheng Zhang   Towards cinematic Internet
                                  video-on-demand  . . . . . . . . . . . . 109--122
                 Paul Grace and   
               Danny Hughes and   
               Barry Porter and   
            Gordon S. Blair and   
              Geoff Coulson and   
                Francois Taiani   Experiences with open overlays: a
                                  middleware approach to network
                                  heterogeneity  . . . . . . . . . . . . . 123--136
               Jiantao Kong and   
             Karsten Schwan and   
                    Min Lee and   
                Mustaque Ahamad   Protectit: trusted distributed services
                                  operating on sensitive data  . . . . . . 137--147
                    Shan He and   
          Renan G. Cattelan and   
                 Darko Kirovski   Modeling viral economies for digital
                                  media  . . . . . . . . . . . . . . . . . 149--162
      Alysson Neves Bessani and   
   Eduardo Pelison Alchieri and   
             Miguel Correia and   
               Joni Silva Fraga   DepSpace: a Byzantine fault-tolerant
                                  coordination service . . . . . . . . . . 163--176
                    Xi Wang and   
                 Zhenyu Guo and   
               Xuezheng Liu and   
                  Zhilei Xu and   
               Haoxiang Lin and   
                Xiaoge Wang and   
                    Zheng Zhang   Hang analysis: fighting responsiveness
                                  bugs . . . . . . . . . . . . . . . . . . 177--190
              Eric Koskinen and   
                  John Jannotti   BorderPatrol: isolating events for
                                  black-box tracing  . . . . . . . . . . . 191--203
                Simon Peter and   
             Andrew Baumann and   
             Timothy Roscoe and   
                Paul Barham and   
                 Rebecca Isaacs   30 seconds is not enough!: a study of
                                  operating system timer usage . . . . . . 205--218
       Karthik Pattabiraman and   
               Vinod Grover and   
               Benjamin G. Zorn   Samurai: protecting critical data in
                                  unsafe languages . . . . . . . . . . . . 219--232
             Angela Nicoara and   
             Gustavo Alonso and   
                 Timothy Roscoe   Controlled, systematic, and efficient
                                  code replacement for running Java
                                  programs . . . . . . . . . . . . . . . . 233--246
            Yoann Padioleau and   
               Julia Lawall and   
  René Rydhof Hansen and   
                  Gilles Muller   Documenting and automating collateral
                                  evolutions in Linux device drivers . . . 247--260
                 Troy Ronda and   
              Stefan Saroiu and   
                    Alec Wolman   Itrustpage: a user-assisted
                                  anti-phishing tool . . . . . . . . . . . 261--272
            Christof Fetzer and   
     Martin Süßkraut   Switchblade: enforcing dynamic
                                  personalized system call models  . . . . 273--286
      Georgios Portokalidis and   
                    Herbert Bos   Eudaemon: involuntary and on-demand
                                  emulation against zero-day exploits  . . 287--299
      Petros Efstathopoulos and   
                   Eddie Kohler   Manageable fine-grained information flow 301--313
         Jonathan M. McCune and   
             Bryan J. Parno and   
              Adrian Perrig and   
          Michael K. Reiter and   
                Hiroshi Isozaki   Flicker: an execution infrastructure for
                                  TCB minimization . . . . . . . . . . . . 315--328

Operating Systems Review
Volume 42, Number 5, July, 2008

            Muli Ben-Yehuda and   
        Eric Van Hensbergen and   
                Marc Fiuczynski   Minding the gap: R&D in the Linux kernel  1--3
           Paul E. McKenney and   
               Jonathan Walpole   Introducing technology into the Linux
                                  kernel: a case study . . . . . . . . . . 4--17
              Helge Bahmann and   
              Konrad Froitzheim   Extending futex for kernel to user
                                  notification . . . . . . . . . . . . . . 18--26
                   Ashwin Ganti   Plan 9 authentication in Linux . . . . . 27--33
            Chee Siang Wong and   
                    Ian Tan and   
      Rosalind Deena Kumari and   
                        Fun Wey   Towards achieving fairness in the Linux
                                  scheduler  . . . . . . . . . . . . . . . 34--43
        Silviu S. Craciunas and   
        Christoph M. Kirsch and   
               Harald Röck   I/O resource management through system
                                  call scheduling  . . . . . . . . . . . . 44--54
           Willem de Bruijn and   
                    Herbert Bos   PipesFS: fast Linux I/O in the Unix
                                  tradition  . . . . . . . . . . . . . . . 55--63
                 Sangtae Ha and   
                Injong Rhee and   
                      Lisong Xu   CUBIC: a new TCP-friendly high-speed TCP
                                  variant  . . . . . . . . . . . . . . . . 64--74
               Fengguang Wu and   
               Hongsheng Xi and   
                    Chenfeng Xu   On the design of a new Linux readahead
                                  framework  . . . . . . . . . . . . . . . 75--84
             David Boutcher and   
               Abhishek Chandra   Practical techniques for purging deleted
                                  data using liveness information  . . . . 85--94
                  Rusty Russell   \tt virtio: towards a de-facto standard
                                  for virtual I/O devices  . . . . . . . . 95--103
        Sukadev Bhattiprolu and   
          Eric W. Biederman and   
               Serge Hallyn and   
                 Daniel Lezcano   Virtual servers and checkpoint/restart
                                  in mainstream Linux  . . . . . . . . . . 104--113

Operating Systems Review
Volume 42, Number 6, October, 2008

               Peter Varman and   
                       Jun Wang   Storage and I/O virtualization,
                                  performance, energy, evaluation and
                                  dependability (SPEED08)  . . . . . . . . 1--2
               Jorge Guerra and   
                Luis Useche and   
           Medha Bhadkamkar and   
             Ricardo Koller and   
                Raju Rangaswami   The case for active block layer
                                  extensions . . . . . . . . . . . . . . . 3--9
                Ajay Gulati and   
                    Irfan Ahmad   Towards distributed storage resource
                                  management using flow control  . . . . . 10--16
                    Ping Ge and   
                    Hailong Cai   Providing differentiated QoS for
                                  peer-to-peer file sharing systems  . . . 17--23
               Himanshu Raj and   
                 Karsten Schwan   O2S2: enhanced object-based virtualized
                                  storage  . . . . . . . . . . . . . . . . 24--29
                Shuibing He and   
                       Dan Feng   Design of an object-based storage device
                                  based on I/O processor . . . . . . . . . 30--35
                Sungjin Lee and   
               Dongkun Shin and   
              Young-Jin Kim and   
                     Jihong Kim   LAST: locality-aware sector translation
                                  for NAND flash memory-based storage
                                  systems  . . . . . . . . . . . . . . . . 36--42
       Christina M. Patrick and   
               SeungWoo Son and   
                Mahmut Kandemir   Comparative evaluation of overlap
                                  strategies with study of I/O overlap in
                                  MPI-IO . . . . . . . . . . . . . . . . . 43--49
Rômulo Silva de Oliveira and   
           Alexandre Sztajnberg   Brazilian workshop on operating systems  50--51
               Paul Regnier and   
                George Lima and   
                Luciano Barreto   Evaluation of interrupt handling
                                  timeliness in real-time Linux operating
                                  systems  . . . . . . . . . . . . . . . . 52--63
   Eduardo M. Colaço and   
   Marcelo Iury S. Oliveira and   
        Alexandro S. Soares and   
       Francisco Brasileiro and   
             Dalton S. Guerrero   Using a file working set model to speed
                                  up the recovery of Peer-to-Peer backup
                                  systems  . . . . . . . . . . . . . . . . 64--70
 Geovani Ricardo Wiedenhoft and   
     Lucas Francisco Wanner and   
           Giovani Gracioli and   
Antônio Augusto Fröhlich   Power management in the EPOS system  . . 71--80
        Edson T. Midorikawa and   
        Ricardo L. Piantola and   
             Hugo H. Cassettari   On adaptive replacement based on LRU
                                  with working area restriction algorithm  81--92
                 Steven Robbins   A three pronged approach to teaching
                                  undergraduate operating systems  . . . . 93--100
             Roelof Hamberg and   
               Frits Vaandrager   Using model checkers in an introductory
                                  course on operating systems  . . . . . . 101--111


Operating Systems Review
Volume 43, Number 1, January, 2009

                Gary Grider and   
                James Nunez and   
                  John Bent and   
                Steve Poole and   
                   Rob Ross and   
                     Evan Felix   Coordinating government funding of file
                                  system and I/O research through the high
                                  end computing university research
                                  activity . . . . . . . . . . . . . . . . 2--7
           Jeffrey C. Mogul and   
                   Jay J. Wylie   Computer systems research at HP Labs . . 8--9
                    John Wilkes   Traveling to Rome: a retrospective on
                                  the journey  . . . . . . . . . . . . . . 10--15
           Patrick Goldsack and   
             Julio Guijarro and   
             Steve Loughran and   
             Alistair Coles and   
             Andrew Farrell and   
               Antonio Lain and   
                Paul Murray and   
                     Peter Toft   The SmartFrog configuration management
                                  framework  . . . . . . . . . . . . . . . 16--25
               Jack Brassil and   
                Rick McGeer and   
            Raj Rajagopalan and   
              Puneet Sharma and   
        Praveen Yalagandula and   
            Sujata Banerjee and   
              David P. Reed and   
                    Sung-Ju Lee   The CHART system: a high-performance,
                                  fair transport architecture based on
                                  explicit-rate signaling  . . . . . . . . 26--35
            Chris I. Dalton and   
              David Plaquin and   
           Wolfgang Weidner and   
              Dirk Kuhlmann and   
            Boris Balacheff and   
                  Richard Brown   Trusted virtual platforms: a key enabler
                                  for converged client devices . . . . . . 36--43
             Adrian Baldwin and   
               Chris Dalton and   
                 Simon Shiu and   
        Krzysztof Kostienko and   
                  Qasim Rajpoot   Providing secure services for a virtual
                                  infrastructure . . . . . . . . . . . . . 44--51
            Eduardo Argollo and   
        Ayose Falcón and   
           Paolo Faraboschi and   
           Matteo Monchiero and   
                  Daniel Ortega   COTSon: infrastructure for full system
                                  simulation . . . . . . . . . . . . . . . 52--61
                Xiaoyun Zhu and   
              Mustafa Uysal and   
                Zhikui Wang and   
             Sharad Singhal and   
              Arif Merchant and   
             Pradeep Padala and   
                      Kang Shin   What does control theory bring to
                                  systems research?  . . . . . . . . . . . 62--69
              Eric Anderson and   
              Martin Arlitt and   
      Charles B. Morrey III and   
                Alistair Veitch   DataSeries: an efficient, flexible data
                                  format for structured serial data  . . . 70--75
               Anna Povzner and   
            Kimberly Keeton and   
              Arif Merchant and   
      Charles B. Morrey III and   
              Mustafa Uysal and   
             Marcos K. Aguilera   Autograph: automatically extracting
                                  workflow file signatures . . . . . . . . 76--83
              George Forman and   
                Kave Eshghi and   
                 Jaap Suermondt   Efficient detection of large-scale
                                  redundancy in enterprise file systems    84--91
             Umeshwar Dayal and   
                Harumi Kuno and   
            Janet L. Wiener and   
            Kevin Wilkinson and   
          Archana Ganapathi and   
                Stefan Krompass   Managing operational business
                                  intelligence workloads . . . . . . . . . 92--98

Operating Systems Review
Volume 43, Number 2, April, 2009

              Kim Hazelwood and   
                 Mohamed Zahran   Challenges and opportunities at all
                                  levels: interactions among operating
                                  systems, compilers, and multicore
                                  processors . . . . . . . . . . . . . . . 3--4
            Philip M. Wells and   
        Koushik Chakraborty and   
               Gurindar S. Sohi   Dynamic heterogeneity and the need for
                                  multicore virtualization . . . . . . . . 5--14
            Vijay Nagarajan and   
                    Rajiv Gupta   Runtime monitoring on multicores via
                                  OASES  . . . . . . . . . . . . . . . . . 15--24
         M. Mustafa Rafique and   
              Benjamin Rose and   
                Ali R. Butt and   
      Dimitrios S. Nikolopoulos   Supporting MapReduce on large-scale
                                  asymmetric multi-core clusters . . . . . 25--34
             Richard Strong and   
          Jayaram Mudigonda and   
           Jeffrey C. Mogul and   
             Nathan Binkert and   
                   Dean Tullsen   Fast switching of threads between cores  35--45
         Stanislav Bratanov and   
              Roman Belenov and   
                Nikita Manovich   Virtual machines: a whole new world for
                                  performance analysis . . . . . . . . . . 46--55
                 Reza Azimi and   
               David K. Tam and   
               Livio Soares and   
                  Michael Stumm   Enhancing operating system support for
                                  multicore processors by using hardware
                                  performance monitoring . . . . . . . . . 56--65
            Daniel Shelepov and   
         Alexandra Fedorova and   
          Sergey Blagodurov and   
   Juan Carlos Saez Alcaide and   
               Nestor Perez and   
                Viren Kumar and   
             Stacey Jeffery and   
                 Zhi Feng Huang   HASS: a scheduler for heterogeneous
                                  multicore systems  . . . . . . . . . . . 66--75
            David Wentzlaff and   
                  Anant Agarwal   Factored operating systems (fos): the
                                  case for a scalable operating system for
                                  multicores . . . . . . . . . . . . . . . 76--85
              Miquel Moreto and   
       Francisco J. Cazorla and   
               Alex Ramirez and   
          Rizos Sakellariou and   
                   Mateo Valero   FlexDCP: a QoS framework for CMP
                                  architectures  . . . . . . . . . . . . . 86--96
             Thomas Karcher and   
         Christoph Schaefer and   
              Victor Pankratius   Auto-tuning support for manycore
                                  applications: perspectives for operating
                                  systems and compilers  . . . . . . . . . 96--97
                   K. Kunal and   
                  K. George and   
                  M. Gautam and   
                    V. Kamakoti   HTM design spaces: complete decoupling
                                  from caches and achieving highly
                                  concurrent transactions  . . . . . . . . 98--99
                 David A. Penry   Multicore diversity: a software
                                  developer's nightmare  . . . . . . . . . 100--101
              Dong Hyuk Woo and   
              Hsien-Hsin S. Lee   PROPHET: goal-oriented provisioning for
                                  highly tunable multicore processors in
                                  cloud computing  . . . . . . . . . . . . 102--103
              David Nellans and   
     Rajeev Balasubramonian and   
                  Erik Brunvand   OS execution on multi-cores: is
                                  out-sourcing worthwhile? . . . . . . . . 104--105
               Jeffrey C. Mogul   WOWCS: the Workshop on Organizing
                                  Workshops, Conferences, and Symposia for
                                  Computer Systems . . . . . . . . . . . . 106--107
                Thomas Anderson   Conference reviewing considered harmful  108--116
                John R. Douceur   Paper rating vs. paper ranking . . . . . 117--121

Operating Systems Review
Volume 43, Number 3, July, 2009

              Gabriel Kliot and   
               Erez Petrank and   
             Bjarne Steensgaard   A lock-free, concurrent, and incremental
                                  stack scanning mechanism for garbage
                                  collectors . . . . . . . . . . . . . . . 3--13
           Michael R. Hines and   
            Umesh Deshpande and   
                 Kartik Gopalan   Post-copy live migration of virtual
                                  machines . . . . . . . . . . . . . . . . 14--26
               Timothy Wood and   
      Gabriel Tarasuk-Levin and   
            Prashant Shenoy and   
            Peter Desnoyers and   
           Emmanuel Cecchet and   
                 Mark D. Corner   Memory buddies: exploiting page sharing
                                  for smart colocation in virtualized data
                                  centers  . . . . . . . . . . . . . . . . 27--36
               Weiming Zhao and   
               Zhenlin Wang and   
                    Yingwei Luo   Dynamic memory balancing for virtual
                                  machines . . . . . . . . . . . . . . . . 37--47
                Xipeng Shen and   
                   Feng Mao and   
                   Kai Tian and   
               Eddy Zheng Zhang   The study and handling of program inputs
                                  in the selection of garbage collectors   48--61
                Huacai Chen and   
                    Hai Jin and   
               Zhiyuan Shao and   
                     Kan Hu and   
                      Ke Yu and   
                       Kun Tian   ClientVisor: leverage COTS OS
                                  functionalities for power management in
                                  virtualized desktop environment  . . . . 62--71
                Micah Dowty and   
                Jeremy Sugerman   GPU virtualization on VMware's hosted
                                  I/O architecture . . . . . . . . . . . . 73--82
                    Lei Xia and   
                 Jack Lange and   
                Peter Dinda and   
                      Chang Bae   Investigating virtual passthrough I/O on
                                  commodity devices  . . . . . . . . . . . 83--94
                 Asim Kadav and   
               Michael M. Swift   Live migration of direct-access devices  95--104
                Viren Kumar and   
             Alexandra Fedorova   Towards better performance per watt in
                                  virtual environments on asymmetric
                                  single-ISA multi-core systems  . . . . . 105--109

Operating Systems Review
Volume 43, Number 4, December, 2009

         Hakim Weatherspoon and   
                 Doug Terry and   
               Gregory Chockler   Summary of the 3rd ACM SIGOPS Workshop
                                  on Large-Scale Distributed Systems and
                                  Middleware (LADIS 2009)  . . . . . . . . 3--4
              Liviu Ciortea and   
            Cristian Zamfir and   
               Stefan Bucur and   
           Vitaly Chipounov and   
                  George Candea   Cloud9: a software testing service . . . 5--10
Kiran-Kumar Muniswamy-Reddy and   
                  Margo Seltzer   Provenance as first class cloud data . . 11--16
              Boon Thau Loo and   
                  Stefan Saroiu   5th International Workshop on Networking
                                  Meets Databases (NetDB 2009) . . . . . . 17--18
                        Yun Mao   On the declarativity of declarative
                                  networking . . . . . . . . . . . . . . . 19--24
               Peter Alvaro and   
               Tyson Condie and   
                Neil Conway and   
      Joseph M. Hellerstein and   
                  Russell Sears   I do declare: consensus in a logic
                                  language . . . . . . . . . . . . . . . . 25--30
                  Eric Eide and   
              Gilles Muller and   
                  Olaf Spinczyk   PLOS 2009: Fifth Workshop on Programming
                                  Languages and Operating Systems  . . . . 31--34
     Pierre-Evariste Dagand and   
             Andrew Baumann and   
                 Timothy Roscoe   Filet-o-fish: practical and dependable
                                  domain-specific languages for OS
                                  development  . . . . . . . . . . . . . . 35--39
         Lonnie Princehouse and   
                     Ken Birman   Code-partitioning gossip . . . . . . . . 40--44
     Frederick R. M. Barnes and   
                 Carl G. Ritson   Checking process-oriented operating
                                  system behaviour using CSP and
                                  refinement . . . . . . . . . . . . . . . 45--49
              Walid Dabbous and   
                 Maximilian Ott   Overview of the ROADS'09 workshop  . . . 50--53
      Thierry Rakotoarivelo and   
             Maximilian Ott and   
          Guillaume Jourjon and   
                    Ivan Seskar   OMF: a control and management framework
                                  for networking testbeds  . . . . . . . . 54--59
             Mathieu Lacage and   
             Martin Ferrari and   
                Mads Hansen and   
           Thierry Turletti and   
                  Walid Dabbous   NEPI: using independent simulators,
                                  emulators, and testbeds for easy
                                  experimentation  . . . . . . . . . . . . 60--65
        Nikola Kne\vzevi\'c and   
             Simon Schubert and   
                 Dejan Kosti\'c   Towards a cost-effective networking
                                  testbed  . . . . . . . . . . . . . . . . 66--71
               Tapan Parikh and   
                      Vivek Pai   NSDR 2009 3rd Workshop on Networked
                                  Systems for Developing Regions . . . . . 72--72
               Michael Paik and   
   Lakshminarayanan Subramanian   Signet: low-cost auditable transactions
                                  using SIMs and mobile phones . . . . . . 73--78
           William B. Lober and   
             Stephen Wagner and   
               Christina Quiles   Development and implementation of a
                                  loosely coupled, multi-site, networked
                                  and replicated electronic medical record
                                  in Haiti . . . . . . . . . . . . . . . . 79--83
            Jonathan Ledlie and   
                Billy Odero and   
               Einat Minkov and   
                  Imre Kiss and   
               Joseph Polifroni   Crowd translator: on building localized
                                  speech recognizers through micropayments 84--89
              James Mickens and   
                 Dilma da Silva   SOSP diversity workshop  . . . . . . . . 90--91
            John Ousterhout and   
              Parag Agrawal and   
             David Erickson and   
         Christos Kozyrakis and   
             Jacob Leverich and   
           David Mazi\`eres and   
            Subhasish Mitra and   
          Aravind Narayanan and   
              Guru Parulkar and   
           Mendel Rosenblum and   
          Stephen M. Rumble and   
             Eric Stratmann and   
                  Ryan Stutsman   The case for RAMClouds: scalable
                                  high-performance storage entirely in
                                  DRAM . . . . . . . . . . . . . . . . . . 92--105


Operating Systems Review
Volume 44, Number 1, January, 2010

          Jeanna Neefe Matthews   Workshop proceedings and other
                                  publications in Operating System
                                  Review . . . . . . . . . . . . . . . . . 1--1
              Jacob Strauss and   
      Chris Lesniewski-Laas and   
     Justin Mazzola Paluska and   
                 Bryan Ford and   
              Robert Morris and   
                 Frans Kaashoek   Device transparency: a new model for
                                  mobile storage . . . . . . . . . . . . . 5--9
           Samer Al-Kiswany and   
         Abdullah Gharaibeh and   
                  Matei Ripeanu   The case for a versatile storage system  10--14
            Kimberly Keeton and   
      Charles B. Morrey III and   
         Craig A. N. Soules and   
                Alistair Veitch   LazyBase: freshness vs. performance in
                                  information management . . . . . . . . . 15--19
             David Boutcher and   
               Abhishek Chandra   Does virtualization make disk scheduling
                                  passé?  . . . . . . . . . . . . . . . . . 20--24
   Swaminathan Sundararaman and   
         Sriram Subramanian and   
         Abhishek Rajimwale and   
   Andrea C. Arpaci-Dusseau and   
    Remzi H. Arpaci-Dusseau and   
               Michael M. Swift   Why panic()?: improving reliability with
                                  restartable file systems . . . . . . . . 25--29
             Saeed Ghanbari and   
        Gokul Soundararajan and   
                 Cristiana Amza   SelfTalk for Dena: query language and
                                  runtime support for evaluating system
                                  behavior . . . . . . . . . . . . . . . . 30--34
               Jorge Guerra and   
           Wendy Belluomini and   
              Joseph Glider and   
                Karan Gupta and   
                Himabindu Pucha   Energy proportionality for storage:
                                  impact and feasibility . . . . . . . . . 35--39
              Eric Anderson and   
                   Joseph Tucek   Efficiency matters!  . . . . . . . . . . 40--45
            Paul T. Stanton and   
           Benjamin McKeown and   
               Randal Burns and   
              Giuseppe Ateniese   FastAD: an authenticated directory for
                                  billions of objects  . . . . . . . . . . 45--49
                Peter Desnoyers   Empirical evaluation of NAND flash
                                  memory performance . . . . . . . . . . . 50--54
                 Asim Kadav and   
        Mahesh Balakrishnan and   
        Vijayan Prabhakaran and   
                  Dahlia Malkhi   Differential RAID: rethinking RAID for
                                  SSD reliability  . . . . . . . . . . . . 55--59
             Jacob Leverich and   
             Christos Kozyrakis   On the energy (in)efficiency of Hadoop
                                  clusters . . . . . . . . . . . . . . . . 61--65
                Aman Kansal and   
                    Jie Liu and   
             Abhishek Singh and   
              Ripal Nathuji and   
               Tarek Abdelzaher   Semantic-less coordination of power
                                  management and application performance   66--70
        Alexander S. Szalay and   
             Gordon C. Bell and   
             H. Howie Huang and   
             Andreas Terzis and   
                  Alainna White   Low-power Amdahl-balanced blades for
                                  data intensive computing . . . . . . . . 71--75
             Byung-Gon Chun and   
        Gianluca Iannaccone and   
        Giuseppe Iannaccone and   
                 Randy Katz and   
                  Gunho Lee and   
                 Luca Niccolini   An energy case for hybrid datacenters    76--80
               Kenny Q. Zhu and   
            Kathleen Fisher and   
                   David Walker   Incremental learning of system log
                                  formats  . . . . . . . . . . . . . . . . 85--90
             Jian-Guang Lou and   
                   Qiang Fu and   
                    Yi Wang and   
                       Jiang Li   Mining dependency in distributed systems
                                  through unstructured logs analysis . . . 91--96
                Wim De Pauw and   
                 Stephen Heisig   Visual and algorithmic tooling for
                                  system trace analysis: a case study  . . 97--102
        Lourival A. de Gois and   
           Walter C. da Borelli   Optimization of procedures for discovery
                                  and information of idle resources in
                                  distributed systems  . . . . . . . . . . 103--109
      Jacinto C. A. Cansado and   
  João H. S. Pereira and   
            Edson T. Midorikawa   Considering the frequency dimension into
                                  on demand adaptive algorithms  . . . . . 110--115

Operating Systems Review
Volume 44, Number 2, April, 2010

               Paolo Romano and   
             Luis Rodrigues and   
              Nuno Carvalho and   
            João Cachopo   Cloud-TM: harnessing the cloud with
                                  distributed transactional memories . . . 1--6
        Krzysztof Ostrowski and   
                     Ken Birman   Storing and accessing live mashup
                                  content in the cloud . . . . . . . . . . 7--11
        Eric Van Hensbergen and   
            Noah Paul Evans and   
        Phillip Stanley-Marbell   A unified execution model for cloud
                                  computing  . . . . . . . . . . . . . . . 12--17
   Kunwadee Sripanidkulchai and   
                Sambit Sahu and   
               Yaoping Ruan and   
               Anees Shaikh and   
                   Chitra Dorai   Are clouds ready for large distributed
                                  applications?  . . . . . . . . . . . . . 18--23
       Michael Siegenthaler and   
             Hakim Weatherspoon   Cloudifying source code repositories:
                                  how much does it cost? . . . . . . . . . 24--28
                Mihai Letia and   
       Nuno Preguiça and   
                   Marc Shapiro   Consistency without concurrency control
                                  in large, dynamic systems  . . . . . . . 29--34
           Avinash Lakshman and   
                 Prashant Malik   Cassandra: a decentralized structured
                                  storage system . . . . . . . . . . . . . 35--40
                  George Porter   Decoupling storage and computation in
                                  Hadoop with SuperDataNodes . . . . . . . 41--46
          Moises Goldszmidt and   
                Mihai Budiu and   
                  Yue Zhang and   
                 Michael Pechuk   Toward automatic policy refinement in
                                  repair services for large distributed
                                  systems  . . . . . . . . . . . . . . . . 47--51
              Andreas Haeberlen   A case for the accountable cloud . . . . 52--57
          Paul Ezhilchelvan and   
            Santosh Shrivastava   Learning from the past for resolving
                                  dilemmas of asynchrony . . . . . . . . . 58--63
             Vita Bortnikov and   
           Gregory Chockler and   
             Alexey Roytman and   
                 Mike Spreitzer   Bulletin board: a scalable and robust
                                  eventually consistent shared memory over
                                  a peer-to-peer overlay . . . . . . . . . 64--70
             Ymir Vigfusson and   
                 Ken Birman and   
                   Qi Huang and   
              Deepak P. Nataraj   Optimizing information flow in the
                                  gossip objects platform  . . . . . . . . 71--76
       Pierre-Marc Fournier and   
             Michel R. Dagenais   Analyzing blocking to debug performance
                                  problems on multi-core systems . . . . . 77--87
             Michael Dalton and   
                Hari Kannan and   
             Christos Kozyrakis   Tainting is not pointless  . . . . . . . 88--92

Operating Systems Review
Volume 44, Number 3, July, 2010

                Erik Nygren and   
        Ramesh K. Sitaraman and   
                      Joel Wein   Networked systems research at Akamai . . 1--1
                Erik Nygren and   
        Ramesh K. Sitaraman and   
                   Jennifer Sun   The Akamai network: a platform for
                                  high-performance Internet applications   2--19
            Thomas Repantis and   
                 Jeff Cohen and   
                Scott Smith and   
                      Joel Wein   Scaling a monitoring infrastructure for
                                  the Akamai network . . . . . . . . . . . 20--26
                   David Belson   Akamai State of the Internet Report, Q4
                                  2009 . . . . . . . . . . . . . . . . . . 27--37
             Sara Bouchenak and   
                    Eric Rutten   Summary of the 5th International
                                  Workshop on Feedback Control
                                  Implementation and Design in Computing
                                  Systems and Networks (FeBID 2010)  . . . 38--40
                Zhikui Wang and   
                Niraj Tolia and   
                    Cullen Bash   Opportunities and challenges to unify
                                  workload, power, and cooling management
                                  in data centers  . . . . . . . . . . . . 41--46
                    Jean Arnaud   Automated control of Internet services   47--52
             Anne-Marie Alt and   
                   Daniel Simon   Control strategies for H.264 video
                                  decoding under resources constraints . . 53--58
                    Luc Malrait   QoS-oriented control of server systems   59--64
               Shlomi Dolev and   
                   Reuven Yagel   Stabilizing trust and reputation for
                                  self-stabilizing efficient hosts in
                                  spite of Byzantine guests  . . . . . . . 65--74
           Benjamin Poirier and   
                 Robert Roy and   
                Michel Dagenais   Accurate offline synchronization of
                                  distributed traces using kernel-level
                                  events . . . . . . . . . . . . . . . . . 75--87
             Asia Slowinska and   
                    Herbert Bos   Pointer tainting still pointless: (but
                                  we all see the point of tainting)  . . . 88--92
           Paul E. McKenney and   
           Maged M. Michael and   
              Josh Triplett and   
               Jonathan Walpole   Why the grass may not be greener on the
                                  other side: a comparison of locking vs.
                                  transactional memory . . . . . . . . . . 93--101
              Josh Triplett and   
           Paul E. McKenney and   
               Jonathan Walpole   Scalable concurrent hash tables via
                                  relativistic programming . . . . . . . . 102--109
                  Wenjin Hu and   
                   Tao Yang and   
             Jeanna N. Matthews   The good, the bad and the ugly of
                                  consumer cloud storage . . . . . . . . . 110--115

Operating Systems Review
Volume 44, Number 4, December, 2010

            Stephen Alan Herrod   Systems research and development at
                                  VMware . . . . . . . . . . . . . . . . . 1--2
                 Ole Agesen and   
            Alex Garthwaite and   
            Jeffrey Sheldon and   
            Pratap Subrahmanyam   The evolution of an x86 virtual machine
                                  monitor  . . . . . . . . . . . . . . . . 3--18
               Richard West and   
               Puneet Zaroo and   
        Carl A. Waldspurger and   
                     Xiao Zhang   Online cache modeling for commodity
                                  multicore processors . . . . . . . . . . 19--29
           Daniel J. Scales and   
                Mike Nelson and   
           Ganesh Venkitachalam   The design of a practical system for
                                  fault-tolerant virtual machines  . . . . 30--39
          Richard McDougall and   
              Jennifer Anderson   Virtualization performance: perspectives
                                  and challenges ahead . . . . . . . . . . 40--56
              Satyam B. Vaghani   Virtual machine file system  . . . . . . 57--70
          Jacob Gorm Hansen and   
                       Eric Jul   Scalable virtual machine storage using
                                  local disks  . . . . . . . . . . . . . . 71--79
                   Shudong Zhou   Virtual networking . . . . . . . . . . . 80--85
             Debashis Basak and   
            Rohit Toshniwal and   
             Serge Maskalik and   
                Allwyn Sequeira   Virtualizing networking and security in
                                  the cloud  . . . . . . . . . . . . . . . 86--94
Vijayaraghavan Soundararajan and   
                  Kinshuk Govil   Challenges in building scalable
                                  virtualized datacenter management  . . . 95--102
              Orran Krieger and   
              Phil McGachey and   
                Arkady Kanevsky   Enabling a marketplace of clouds:
                                  VMware's vCloud director . . . . . . . . 103--114
     René W. Schmidt and   
                 Steffen Grarup   vApp: a standards-based container for
                                  cloud providers  . . . . . . . . . . . . 115--123
                   Ken Barr and   
          Prashanth Bungale and   
              Stephen Deasy and   
              Viktor Gyuris and   
                 Perry Hung and   
               Craig Newell and   
                Harvey Tuch and   
                   Bruno Zoppis   The VMware mobile virtualization
                                  platform: is that a hypervisor in your
                                  pocket?  . . . . . . . . . . . . . . . . 124--135
           Joshua E. Simons and   
                  Jeffrey Buell   Virtualizing high performance computing  136--145
           Tudor Dumitra\cs and   
             Iulian Neamtiu and   
                   Eli Tilevich   Report on the Second ACM Workshop on Hot
                                  Topics in Software Upgrades (HotSWUp'09) 146--152


Operating Systems Review
Volume 45, Number 1, January, 2011

                 Justin Rattner   Research at Intel  . . . . . . . . . . . 1--2
             Vishakha Gupta and   
             Rob Knauerhase and   
                 Karsten Schwan   Attaining system performance points:
                                  revisiting the end-to-end argument in
                                  system design for heterogeneous
                                  many-core systems  . . . . . . . . . . . 3--10
          Gautham N. Chinya and   
         Jamison D. Collins and   
              Perry H. Wang and   
                 Hong Jiang and   
             Guei-Yuan Lueh and   
           Thomas A. Piazza and   
                      Hong Wang   Bothnia: a dual-personality extension to
                                  the Intel integrated graphics driver . . 11--20
              Dheeraj Reddy and   
              David Koufaty and   
                 Paul Brett and   
                     Scott Hahn   Bridging functional heterogeneity in
                                  multicore architectures  . . . . . . . . 21--33
            Vijay Vasudevan and   
          David G. Andersen and   
           Michael Kaminsky and   
             Jason Franklin and   
          Michael A. Kozuch and   
              Iulian Moraru and   
         Padmanabhan Pillai and   
                   Lawrence Tan   Challenges and opportunities for
                                  efficient computing with FAWN  . . . . . 34--44
         Michael P. Mesnier and   
                 Jason B. Akers   Differentiated storage services  . . . . 45--53
             Arun Raghunath and   
                  John Keys and   
                       Mona Vij   Direct data flows  . . . . . . . . . . . 54--61
       Sadagopan Srinivasan and   
                    Li Zhao and   
            Ramesh Illikkal and   
               Ravishankar Iyer   Efficient interaction between OS and
                                  architecture in heterogeneous platforms  62--72
   Rob F. van der Wijngaart and   
         Timothy G. Mattson and   
                    Werner Haas   Light-weight communications on Intel's
                                  single-chip cloud computer processor . . 73--83
                Shimin Chen and   
         Phillip B. Gibbons and   
             Michael Kozuch and   
                  Todd C. Mowry   Log-based architectures: using multicore
                                  to help software behave correctly  . . . 84--91
               Shoumeng Yan and   
             Xiaocheng Zhou and   
                   Ying Gao and   
                    Hu Chen and   
                  Gansha Wu and   
                    Sai Luo and   
                    Bratin Saha   Optimizing a shared virtual memory
                                  system for a heterogeneous
                                  CPU-accelerator platform . . . . . . . . 92--100
                  Yuan Dong and   
                Haiyang Zhu and   
               Jinzhan Peng and   
                  Fang Wang and   
         Michael P. Mesnier and   
                 Dawei Wang and   
                    Sun C. Chan   RFS: a network file system for mobile
                                  devices and the cloud  . . . . . . . . . 101--111
                 Kevin Fall and   
        Gianluca Iannaccone and   
              Maziar Manesh and   
           Sylvia Ratnasamy and   
          Katerina Argyraki and   
             Mihai Dobrescu and   
                    Norbert Egi   RouteBricks: enabling general purpose
                                  network infrastructure . . . . . . . . . 112--125
            Petros Maniatis and   
                 Byung-Gon Chun   Small trusted primitives for dependable
                                  systems  . . . . . . . . . . . . . . . . 126--141
             David (Yu) Zhu and   
               Jaeyeon Jung and   
                  Dawn Song and   
            Tadayoshi Kohno and   
                David Wetherall   TaintEraser: protecting sensitive data
                                  leaks using application-level taint
                                  tracking . . . . . . . . . . . . . . . . 142--154
             Dilma da Silva and   
            Luciano Barreto and   
  Paulo César A. Pereira   VII Brazilian Workshop on Operating
                                  Systems  . . . . . . . . . . . . . . . . 155--155
            Luciano Barreto and   
              Aline Andrade and   
               Adolfo Duran and   
                Caique Lima and   
                 Ademilson Lima   Abstract specification and formalization
                                  of an operating system kernel in Z . . . 156--160

Operating Systems Review
Volume 45, Number 2, July, 2011

           Elzbieta Krepska and   
             Thilo Kielmann and   
                 Wan Fokkin and   
                      Henri Bal   HipG: parallel processing of large-scale
                                  graphs . . . . . . . . . . . . . . . . . 3--13
               Ankur Narang and   
         Abhinav Srivastava and   
   Naga Praveen Kumar Katta and   
     Rudrapatna K. Shyamasundar   Performance driven multi-objective
                                  distributed scheduling for parallel
                                  computations . . . . . . . . . . . . . . 14--27
             Yuval Lubowich and   
                Gadi Taubenfeld   On the performance of distributed
                                  lock-based synchronization?  . . . . . . 28--37
          Fatemeh Azmandian and   
               Micha Moffie and   
          Malak Alshawabkeh and   
                Jennifer Dy and   
                Javed Aslam and   
                    David Kaeli   Virtual machine monitor-based
                                  lightweight intrusion detection  . . . . 38--53
       André Schiper and   
            Zarko Milosevic and   
               Omid Shahmirzadi   Student mini-kernel project based on an
                                  FPGA board . . . . . . . . . . . . . . . 54--58

Operating Systems Review
Volume 45, Number 3, December, 2011

                  Eric Eide and   
              Gilles Muller and   
Wolfgang Schröder-Preikschat and   
                  Olaf Spinczyk   Summary of PLOS 2011: the Sixth Workshop
                                  on Programming Languages and Operating
                                  Systems  . . . . . . . . . . . . . . . . 1--4
                 Suman Saha and   
               Julia Lawall and   
                  Gilles Muller   Finding resource-release omission faults
                                  in Linux . . . . . . . . . . . . . . . . 5--9
           Reinhard Tartler and   
             Daniel Lohmann and   
         Christian Dietrich and   
            Christoph Egger and   
                  Julio Sincero   Configuration coverage in the analysis
                                  of large-scale system software . . . . . 10--14
               Lokesh Gidra and   
           Gaël Thomas and   
              Julien Sopena and   
                   Marc Shapiro   Assessing the scalability of garbage
                                  collectors on many cores . . . . . . . . 15--19
             Peter Bodík   Overview of the workshop on managing
                                  large-scale systems via the analysis of
                                  system logs and the application of
                                  machine learning techniques  . . . . . . 20--22
           Soila P. Kavulya and   
             Kaustubh Joshi and   
             Matti Hiltunen and   
              Scott Daniels and   
              Rajeev Gandhi and   
               Priya Narasimhan   Practical experiences with chronics
                                  discovery in large telecommunications
                                  systems  . . . . . . . . . . . . . . . . 23--30
                 Sumit Basu and   
               John Dunagan and   
                  Kevin Duh and   
    Kiran-Kumar Muniswamy-Reddy   BLR-D: applying bilinear logistic
                                  regression to factored diagnosis
                                  problems . . . . . . . . . . . . . . . . 31--38
          Ivan Beschastnikh and   
                 Yuriy Brun and   
           Michael D. Ernst and   
       Arvind Krishnamurthy and   
             Thomas E. Anderson   Mining temporal invariants from
                                  partially ordered logs . . . . . . . . . 39--46
               Prabal Dutta and   
              Ricardo Bianchini   Workshop on power aware computing and
                                  systems (HotPower'11)  . . . . . . . . . 47--47
                   Jie Chen and   
              Ron C. Chiang and   
             H. Howie Huang and   
             Guru Venkataramani   Energy-aware writes to non-volatile main
                                  memory . . . . . . . . . . . . . . . . . 48--52
              Baris Aksanli and   
      Jagannathan Venkatesh and   
                Liuyi Zhang and   
                  Tajana Rosing   Utilizing green energy prediction to
                                  schedule mixed batch and service jobs in
                                  data centers . . . . . . . . . . . . . . 53--57
            Timo Hönig and   
          Christopher Eibel and   
       Rüdiger Kapitza and   
Wolfgang Schröder-Preikschat   SEEP: exploiting symbolic execution for
                                  energy-aware programming . . . . . . . . 58--62
   Lakshminarayanan Subramanian   Overview of the 3rd ACM SOSP Workshop on
                                  Networking, Systems and Applications on
                                  Mobile Handhelds . . . . . . . . . . . . 63--64
                 Umar Javed and   
                 Dongsu Han and   
              Ramon Caceres and   
               Jeffrey Pang and   
          Srinivasan Seshan and   
           Alexander Varshavsky   Predicting handoffs in 3G networks . . . 65--70
               Mehedi Bakht and   
                Matt Trower and   
                  Robin Kravets   Searchlight: helping mobile devices find
                                  their neighbors  . . . . . . . . . . . . 71--76
H. Andrés Lagar-Cavilla and   
             Kaustubh Joshi and   
       Alexander Varshavsky and   
           Jeffrey Bickford and   
                   Darwin Parra   Traffic backfilling: subsidizing lunch
                                  for delay-tolerant applications in UMTS
                                  networks . . . . . . . . . . . . . . . . 77--81
           Karthik Raghavan and   
                    V. Kamakoti   ROSY: recovering processor and memory
                                  systems from hard errors . . . . . . . . 82--84


Operating Systems Review
Volume 46, Number 1, January, 2012

             Luis Rodrigues and   
               Divy Agrawal and   
             Ymir Vigfusson and   
               Gregory Chockler   Summary of the 5th Workshop on
                                  Large-Scale Distributed Systems and
                                  Middleware (LADIS 2011)  . . . . . . . . 1--3
           Junichi Tatemura and   
                  Oliver Po and   
       Hakan Hacgümüs   Microsharding: a declarative approach to
                                  support elastic OLTP workloads . . . . . 4--11
                Florin Rusu and   
                     Alin Dobra   GLADE: a scalable framework for
                                  efficient analytics  . . . . . . . . . . 12--18
            Viet-Trung Tran and   
             Bogdan Nicolae and   
                Gabriel Antoniu   Towards scalable array-oriented active
                                  storage: the pyramid approach  . . . . . 19--25
                  Joel Wolf and   
              Andrey Balmin and   
               Deepak Rajan and   
            Kirsten Hildrum and   
            Rohit Khandekar and   
               Sujay Parekh and   
                Kun-Lung Wu and   
                  Rares Vernica   CIRCUMFLEX: a scheduling optimizer for
                                  MapReduce workloads with shared scans    26--32
             Siddhartha Sen and   
            Michael J. Freedman   Commensal cuckoo: secure group
                                  partitioning for large-scale services    33--39
                  Guy Laden and   
               Roie Melamed and   
                 Ymir Vigfusson   Adaptive and dynamic funnel replication
                                  in clouds  . . . . . . . . . . . . . . . 40--46
              Dahlia Malkhi and   
        Mahesh Balakrishnan and   
              John D. Davis and   
        Vijayan Prabhakaran and   
                     Ted Wobber   From Paxos to CORFU: a flash-speed
                                  shared log . . . . . . . . . . . . . . . 47--51
Antonio Augusto Fröhlich and   
        Leandro Buss Becker and   
                George Lima and   
             Stefan Petters and   
          Dilma M. da Silva and   
           Edna N. Silva Barros   Brazilian Symposium on Computing System
                                  Engineering  . . . . . . . . . . . . . . 52--52
              Elder Vicente and   
            Rivalino Matias and   
        Lúcio Borges and   
            Autran Macêdo   Evaluation of compound system calls in
                                  the Linux kernel . . . . . . . . . . . . 53--63
         Tiago Rogerio Muck and   
   Antonio Augusto Frohlich and   
            Michael Gernoth and   
   Wolfgang Schroder-Preikschat   Implementing OS components in hardware
                                  using AOP  . . . . . . . . . . . . . . . 64--72
       Marco A. Wehrmeister and   
             Joao G. Packer and   
                  Luis M. Ceron   Support for early verification of
                                  embedded real-time systems through UML
                                  models simulation  . . . . . . . . . . . 73--81
       Ríad Nassiffe and   
        Eduardo Camponogara and   
                    George Lima   Optimizing quality of service in
                                  real-time systems under energy
                                  constraints  . . . . . . . . . . . . . . 82--92
      Christopher M. Hayden and   
                 Iulian Neamtiu   Report on the Third Workshop on Hot
                                  Topics in Software Upgrades (HotSWUp'11) 93--99

Operating Systems Review
Volume 46, Number 2, July, 2012

            Daniel Hagimont and   
                  Noel De Palma   A simulator to assess energy saving
                                  strategies and policies in HPC workloads 2--9
Frederico Alvares de Oliveira, Jr. and   
                  Thomas Ledoux   Self-management of cloud applications
                                  and infrastructure for energy
                                  optimization . . . . . . . . . . . . . . 10--18
            Ibrahim Takouna and   
               Wesam Dawoud and   
               Christoph Meinel   Energy efficient scheduling of HPC-jobs
                                  on virtualize clusters using host and VM
                                  dynamic configuration  . . . . . . . . . 19--27
      Christine Mayap Kamga and   
             Giang Son Tran and   
                  Laurent Broto   Extended scheduler for efficient
                                  frequency scaling in virtualized systems 28--35
                 Adil Bouti and   
               Jörg Keller   Securing cloud-based computations
                                  against malicious providers  . . . . . . 38--42
            Alysson Bessani and   
       Rüdiger Kapitza and   
                 Dana Petcu and   
               Paolo Romano and   
     Spyridon V. Gogouvitis and   
       Dimosthenis Kyriazis and   
            Roberto G. Cascella   A look to the old-world\_sky: EU-funded
                                  dependability cloud computing research   43--56
                Salman A. Baset   Cloud SLAs: present and future . . . . . 57--66
   Augusto Born de Oliveira and   
       Ahmad Saif Ur Rehman and   
         Sebastian Fischmeister   mTags: augmenting microkernel messages
                                  with lightweight metadata  . . . . . . . 67--79
               Adam J. Aviv and   
                Vin Mannino and   
              Thanat Owlarn and   
               Seth Shannin and   
                   Kevin Xu and   
                  Boon Thau Loo   Experiences in teaching an educational
                                  user-level operating systems
                                  implementation project . . . . . . . . . 80--86
             Maria Couceiro and   
                   Paolo Romano   Where does transactional memory research
                                  stand and what challenges lie ahead?:
                                  WTM 2012, EuroTM Workshop on
                                  Transactional Memory . . . . . . . . . . 87--92

Operating Systems Review
Volume 46, Number 3, December, 2012

              Scott Dawkins and   
         Kaladhar Voruganti and   
                 John D. Strunk   Systems research and innovation in data
                                  ONTAP  . . . . . . . . . . . . . . . . . 1--3
              Daniel Ellard and   
             Craig Everhart and   
                    Theresa Raj   Glitz: cross-vendor federated file
                                  systems  . . . . . . . . . . . . . . . . 4--10
                 Tim Bisson and   
               Yuvraj Patel and   
              Shankar Pasupathy   Designing a fast file system crawler
                                  with incremental differencing  . . . . . 11--19
              Jayanta Basak and   
            Kushal Wadhwani and   
         Kaladhar Voruganti and   
  Srinivasan Narayanamurthy and   
               Vipul Mathur and   
               Siddhartha Nandi   Model building for dynamic multi-tenant
                                  provider environments  . . . . . . . . . 20--31
 Lakshmi N. Bairavasundaram and   
        Gokul Soundararajan and   
               Vipul Mathur and   
         Kaladhar Voruganti and   
               Kiran Srinivasan   Responding rapidly to service level
                                  violations using virtual appliances  . . 32--40
                  Atul Goel and   
                  Peter Corbett   RAID triple parity . . . . . . . . . . . 41--49
                 John D. Strunk   Hybrid aggregates: combining SSDs and
                                  HDDs in a single storage pool  . . . . . 50--56
   Giridhar Appaji Nag Yasa and   
                   P. C. Nagesh   Space savings and design considerations
                                  in variable length deduplication . . . . 57--64
          Mathieu Desnoyers and   
             Michel R. Dagenais   Lockless multi-core high-throughput
                                  buffering scheme for kernel tracing  . . 65--81


Operating Systems Review
Volume 47, Number 1, January, 2013

              Dahlia Malkhi and   
            Robbert van Renesse   Workshop report on LADIS 2012  . . . . . 1--2
                    Paolo Costa   Bridging the gap between applications
                                  and networks in data centers . . . . . . 3--8
        Flavio P. Junqueira and   
                 Ivan Kelly and   
                  Benjamin Reed   Durability with BookKeeper . . . . . . . 9--15
                 David Shue and   
        Michael J. Freedman and   
                   Anees Shaikh   Fairness and isolation in multi-tenant
                                  storage as optimization decomposition    16--21
               Denisa Ghita and   
          Katerina Argyraki and   
                 Patrick Thiran   Toward accurate and practical network
                                  tomography . . . . . . . . . . . . . . . 22--26
     Mateus Krepsky Ludwich and   
Antônio Augusto Fröhlich   On the formal verification of
                                  component-based embedded operating
                                  systems  . . . . . . . . . . . . . . . . 28--34
Alírio Santos de Sá and   
 Allan Edgard Silva Freitas and   
Raimundo José de Araújo Macêdo   Adaptive request batching for Byzantine
                                  replication  . . . . . . . . . . . . . . 35--42
         Naser Ezzati-Jivan and   
             Michel R. Dagenais   A framework to compute statistics of
                                  system parameters from very large trace
                                  files  . . . . . . . . . . . . . . . . . 43--54
                 Karla Saur and   
                 Iulian Neamtiu   Report on the Fourth Workshop on Hot
                                  Topics in Software Upgrades (HotSWUp
                                  2012)  . . . . . . . . . . . . . . . . . 55--62

Operating Systems Review
Volume 47, Number 2, July, 2013

           Alexander Shraer and   
           Rüdiger Kapitza   Dagstuhl seminar report: security and
                                  dependability for federated cloud
                                  platforms, 2012  . . . . . . . . . . . . 4--5
             Sara Bouchenak and   
           Gregory Chockler and   
              Hana Chockler and   
          Gabriela Gheorghe and   
                Nuno Santos and   
               Alexander Shraer   Verifying cloud services: present and
                                  future . . . . . . . . . . . . . . . . . 6--19
             Miguel Correia and   
                  Neeraj Mittal   Dependability issues in cloud computing:
                                  extended papers from the 1st
                                  International Workshop on Dependability
                                  Issues in Cloud Computing --- DISCCO . . 20--22
               Steve Jiekak and   
       Anne-Marie Kermarrec and   
       Nicolas Le Scouarnec and   
              Gilles Straub and   
           Alexandre Van Kempen   Regenerating codes: a system perspective 23--32
            Sara Arbab Yazd and   
      Subbarayan Venkatesan and   
                  Neeraj Mittal   Boosting energy efficiency with mirrored
                                  data block replication policy and energy
                                  scheduler  . . . . . . . . . . . . . . . 33--40
                   Moussa Taifi   Banking on decoupling: budget-driven
                                  sustainability for HPC applications on
                                  auction-based clouds . . . . . . . . . . 41--50
          Mathieu Desnoyers and   
           Paul E. McKenney and   
             Michel R. Dagenais   Multi-core systems modeling for formal
                                  verification of parallel algorithms  . . 51--65
             Ashif S. Harji and   
              Peter A. Buhr and   
                     Tim Brecht   Our troubles with Linux Kernel upgrades
                                  and why you should care  . . . . . . . . 66--72

Operating Systems Review
Volume 47, Number 3, December, 2013

                        Editors   An energy-efficient self-provisioning
                                  approach for cloud resources management  2--9
     Naga Pavan Kumar Gorti and   
                 Arun K. Somani   Reliability aware dynamic voltage and
                                  frequency scaling for improved
                                  microprocessor lifetime  . . . . . . . . 10--17
          Soguy M. K. Gueye and   
              Noel De Palma and   
                Eric Rutten and   
                   Alain Tchana   Coordinating multiple administration
                                  loops using discrete control . . . . . . 18--25
                 Sou Koyano and   
                 Shingo Ata and   
            Hisashi Iwamoto and   
                  Yuji Yano and   
              Yasuto Kuroda and   
             Kazunari Inoue and   
                       Ikuo Oka   A study on micro level traffic
                                  prediction for energy-aware routers  . . 26--33
          Christine Mayap Kamga   CPU frequency emulation based on DVFS    34--41
            Adel Noureddine and   
              Romain Rouvoy and   
              Lionel Seinturier   A review of energy measurement
                                  approaches . . . . . . . . . . . . . . . 42--49
              Chengwel Wang and   
           Soila P. Kavulya and   
                  Jiaqi Tan and   
                  Liting Hu and   
            Mahendra Kutare and   
                Mike Kasick and   
             Karsten Schwan and   
           Priya Narasimhan and   
                  Rajeev Gandhi   Performance troubleshooting in data
                                  centers: an annotated bibliography?  . . 50--62


Operating Systems Review
Volume 48, Number 1, 2014

               Julius Leite and   
             Raphael Guerra and   
       Rivalino Matias, Jr. and   
Antônio Augusto Fröhlich   Brazilian Symposium on Computer System
                                  Engineering, November 4--8 2013, Niterói,
                                  Brazil . . . . . . . . . . . . . . . . . 1--1
       Ricardo J. Pfitscher and   
         Mauricio A. Pillon and   
            Rafael R. Obelheiro   Customer-oriented diagnosis of memory
                                  provisioning for IaaS clouds . . . . . . 2--10
 Allan Edgard Silva Freitas and   
Raimundo José de Araújo Macêdo   A performance evaluation tool for hybrid
                                  and dynamic distributed systems  . . . . 11--18
           Christian Cachin and   
            Robbert van Renesse   Workshop Report: HotDep 2013 --- The 9th
                                  Workshop on Hot Topics in Dependable
                                  Systems  . . . . . . . . . . . . . . . . 19--20
                  Dirk Vogt and   
        Cristiano Giuffrida and   
                Herbert Bos and   
            Andrew S. Tanenbaum   Techniques for efficient in-memory
                                  checkpointing  . . . . . . . . . . . . . 21--25
Thanumalayan Sankaranarayana Pillai and   
          Vijay Chidambaram and   
            Joo-Young Hwang and   
   Andrea C. Arpaci-Dusseau and   
        Remzi H. Arpaci-Dusseau   Towards efficient, portable
                                  application-level consistency  . . . . . 26--31
              Kushagra Vaid and   
                      Lin Zhong   Fuel, fans, and cores --- an
                                  introduction to selected papers from
                                  HotPower 2013  . . . . . . . . . . . . . 32--33
               Hiroshi Endo and   
           Hiroyoshi Kodama and   
            Hiroyuki Fukuda and   
            Toshio Sugimoto and   
              Takashi Horie and   
                    Masao Kondo   Cooperative control architecture of
                                  fan-less servers and fresh-air cooling
                                  in container servers for low power
                                  operation  . . . . . . . . . . . . . . . 34--38
      Ana Carolina Riekstin and   
                 Sean James and   
                Aman Kansal and   
                    Jie Liu and   
                  Eric Peterson   No more electrical infrastructure:
                                  towards fuel cell powered data centers   39--43
              Aaron Carroll and   
                  Gernot Heiser   Mobile multicores: use them or waste
                                  them . . . . . . . . . . . . . . . . . . 44--48
                 Marius Eriksen   Your server as a function  . . . . . . . 51--57
            Gabriele Keller and   
                Toby Murray and   
               Sidney Amani and   
              Liam O'Connor and   
                 Zilin Chen and   
              Leonid Ryzhyk and   
               Gerwin Klein and   
                  Gernot Heiser   File systems deserve verification too!   58--64
              Anton Burtsev and   
          Nikhil Mishrikoti and   
                  Eric Eide and   
                   Robert Ricci   Weir: a streaming language for
                                  performance analysis . . . . . . . . . . 65--70
Meenakshi Sundaram Bhaskaran and   
                    Jian Xu and   
                 Steven Swanson   Bankshot: caching slow storage in fast
                                  non-volatile memory  . . . . . . . . . . 73--81
                 Hyojun Kim and   
         Sangeetha Seshadri and   
          Clement L. Dickey and   
                  Lawrence Chiu   Phase change memory in enterprise
                                  storage systems: silver bullet or snake
                                  oil? . . . . . . . . . . . . . . . . . . 82--89
                Yongseok Oh and   
               Jongmoo Choi and   
                Donghee Lee and   
                     Sam H. Noh   Improving performance and lifetime of
                                  the SSD RAID-based host cache through a
                                  log-structured approach  . . . . . . . . 90--97
            Robbert van Renesse   The story behind the first SIGOPS Dennis
                                  M. Ritchie Doctoral Dissertation Award   98--102
        Christopher Stewart and   
                 Vishakha Gupta   The Workshop on Diversity in Systems
                                  Research 2013  . . . . . . . . . . . . . 103--106
               Sidney Amani and   
                Peter Chubb and   
      Alastair F. Donaldson and   
             Alexander Legg and   
              Keng Chai Ong and   
              Leonid Ryzhyk and   
                     Yanjin Zhu   Automatic verification of active device
                                  drivers  . . . . . . . . . . . . . . . . 106--118

Operating Systems Review
Volume 48, Number 2, July, 2014

             Miguel Correia and   
                  Neeraj Mittal   Cloud Computing Dependability: Report
                                  and Extended Papers of the Second
                                  International Workshop on Dependability
                                  Issues in Cloud Computing  . . . . . . . 1--2
              Nicola Nostro and   
          Andrea Ceccarelli and   
          Andrea Bondavalli and   
             Francesco Brancati   Insider Threat Assessment: a Model-Based
                                  Methodology  . . . . . . . . . . . . . . 3--12
            Alysson Bessani and   
          Leucio A. Cutillo and   
           Gianluca Ramunno and   
           Norbert Schirmer and   
                Paolo Smiraglia   The TClouds Platform: From the Concept
                                  to the Implementation of Benchmark
                                  Scenarios  . . . . . . . . . . . . . . . 13--22
               William Tetzlaff   SOSP Professional Travel Scholarship:
                                  Reflections by Recipient William
                                  Tetzlaff . . . . . . . . . . . . . . . . 23--23
                      Cary Gray   SOSP Professional Travel Scholarship:
                                  Reflections by Recipient Cary Gray . . . 24--24
                  Artur Baruchi   SOSP Professional Travel Scholarship:
                                  Reflections by Recipient Artur Baruchi   25--25
                     Doug Terry   A Report on the First TRIOS Conference   26--34


Operating Systems Review
Volume 49, Number 1, January, 2015

                      Eric Eide   Foreword: Special Issue on Repeatability
                                  and Sharing of Experimental Artifacts    1--2
              Dror G. Feitelson   From Repeatability to Reproducibility
                                  and Corroboration  . . . . . . . . . . . 3--11
               Heidi Howard and   
          Malte Schwarzkopf and   
          Anil Madhavapeddy and   
                  Jon Crowcroft   Raft Refloated: Do We Have Consensus?    12--21
               Mayank Varia and   
             Benjamin Price and   
             Nicholas Hwang and   
               Ariel Hamlin and   
            Jonathan Herzog and   
                Jill Poland and   
            Michael Reschly and   
            Sophia Yakoubov and   
           Robert K. Cunningham   Automated Assessment of Secure Search
                                  Systems  . . . . . . . . . . . . . . . . 22--30
          Abraham N. Aldaco and   
        Charles J. Colbourn and   
             Violet R. Syrotiuk   Locating Arrays: a New Experimental
                                  Design for Screening Complex Engineered
                                  Systems  . . . . . . . . . . . . . . . . 31--40
                  Ali Abedi and   
               Andrew Heard and   
                     Tim Brecht   Conducting Repeatable Experiments and
                                  Fair Comparisons using 802.11n MIMO
                                  Networks . . . . . . . . . . . . . . . . 41--50
         Christian Dietrich and   
                 Daniel Lohmann   The dataref versuchung: Saving Time
                                  through Better Internal Repeatability    51--60
              Luka Stanisic and   
             Arnaud Legrand and   
                Vincent Danjean   An Effective Git and Org-Mode Based
                                  Workflow for Reproducible Research . . . 61--70
                 Carl Boettiger   An introduction to Docker for
                                  reproducible research  . . . . . . . . . 71--79
              Cristian Ruiz and   
             Salem Harrache and   
            Michael Mercier and   
                Olivier Richard   Reconstructable Software Appliances with
                                  Kameleon . . . . . . . . . . . . . . . . 80--89
              Sarah Edwards and   
                   Xuan Liu and   
                      Niky Riga   Creating Repeatable Computer Science and
                                  Networking Experiments on Shared, Public
                                  Testbeds . . . . . . . . . . . . . . . . 90--99
               Robert Ricci and   
                  Gary Wong and   
              Leigh Stoller and   
                  Kirk Webb and   
            Jonathon Duerig and   
               Keith Downie and   
                    Mike Hibler   Apt: a Platform for Repeatable Research
                                  in Computer Science  . . . . . . . . . . 100--107
          Bruce R. Childers and   
              Alex K. Jones and   
            Daniel Mossé   A Roadmap and Plan of Action for
                                  Community-Supported Empirical Evaluation
                                  in Computer Architecture . . . . . . . . 108--117
           Gregory Chockler and   
           Flavio Junqueira and   
          Rodrigo Rodrigues and   
                 Ymir Vigfusson   LADIS'14: 8th Workshop on Large-Scale
                                  Distributed Systems and Middleware . . . 118--120
             Valter Balegas and   
       Sérgio Duarte and   
             Carla Ferreira and   
          Rodrigo Rodrigues and   
       Nuno Preguiça and   
           Mahsa Najafzadeh and   
                   Marc Shapiro   Towards Fast Invariant Preservation in
                                  Geo-replicated Systems . . . . . . . . . 121--125
          João Paiva and   
          Luís Rodrigues   On Data Placement in Distributed Systems 126--130
                 Ken Birman and   
       Márk Jelasity and   
           Robert Kleinberg and   
                  Edward Tremel   Building a Secure and Privacy-Preserving
                                  Smart Grid . . . . . . . . . . . . . . . 131--136
                    Qin Jia and   
               Zhiming Shen and   
                Weijia Song and   
        Robbert van Renesse and   
             Hakim Weatherspoon   Supercloud: Opportunities and Challenges 137--141
           Petter Särd and   
              Benoit Hudzia and   
                Steve Walsh and   
             Johan Tordsson and   
                   Erik Elmroth   Principles and Performance
                                  Characteristics of Algorithms for Live
                                  VM Migration . . . . . . . . . . . . . . 142--155

Operating Systems Review
Volume 49, Number 2, December, 2015

           Raimundo Barreto and   
           Rafael Obelheiro and   
                 Leandro Becker   Brazilian Symposium on Computing System
                                  Engineering  . . . . . . . . . . . . . . 1--2
           Giovani Gracioli and   
Antônio Augusto Fröhlich   On the Design and Evaluation of a
                                  Real-Time Operating System for
                                  Cache-Coherent Multicore Architectures   2--16
            Peter Desnoyers and   
                Gokul Kandiraju   INFLOW 2015: The Third Workshop on
                                  Interactions of NVM/FLash with Operating
                                  systems and Workload: INFLOW'15 Message
                                  from the Chairs  . . . . . . . . . . . . 17--17
             Biplob Debnath and   
          Alireza Haghdoost and   
                 Asim Kadav and   
         Mohammed G. Khatib and   
             Cristian Ungureanu   Revisiting Hash Table Design for Phase
                                  Change Memory  . . . . . . . . . . . . . 18--26
            Ricardo Santana and   
            Raju Rangaswami and   
             Vasily Tarasov and   
                Dean Hildebrand   A Fast and Slippery Slope for File
                                  Systems  . . . . . . . . . . . . . . . . 27--34
         Christoph Borchert and   
                  Olaf Spinczyk   Hardening an L4 Microkernel Against Soft
                                  Errors by Aspect-Oriented Programming
                                  and Whole-Program Analysis . . . . . . . 37--43
           Charles Jacobsen and   
              Muktesh Khole and   
                Sarah Spall and   
               Scotty Bauer and   
                  Anton Burtsev   Lightweight Capability Domains: Towards
                                  Decomposing the Linux Kernel . . . . . . 44--50
                 Ilya Yanok and   
              Nathaniel Nystrom   Tapir: a Language for Verified OS Kernel
                                  Probes . . . . . . . . . . . . . . . . . 51--56
                Xinhao Yuan and   
        David Williams-King and   
               Junfeng Yang and   
            Simha Sethumadhavan   Making Lock-free Data Structures
                                  Verifiable with Artificial Transactions  57--63
            Sharath K. Bhat and   
          Ajithchandra Saya and   
           Hemedra K. Rawat and   
          Antonio Barbalace and   
                Binoy Ravindran   Harnessing Energy Efficiency of
                                  Heterogeneous-ISA Platforms  . . . . . . 65--69
          Mohammad A. Hoque and   
                   Sasu Tarkoma   Sudden Drop in the Battery Level?:
                                  Understanding Smartphone State of Charge
                                  Anomaly  . . . . . . . . . . . . . . . . 70--74
                Qiuyun Wang and   
                Benjamin C. Lee   Modeling Communication Costs in Blade
                                  Servers  . . . . . . . . . . . . . . . . 75--79


Operating Systems Review
Volume 50, Number 1, January, 2016

              Gernot Heiser and   
                 Kenji Kono and   
             KyoungSoo Park and   
            Robbert van Renesse   Report on the Asia--Pacific Systems
                                  Workshop 2015 (APSys'15) . . . . . . . . 1--2
         Oliver R. A. Chick and   
              Lucian Carata and   
                 James Snee and   
      Nikilesh Balakrishnan and   
                 Ripduman Sohan   Shadow Kernels: a General Mechanism For
                                  Kernel Specialization in Existing
                                  Operating Systems  . . . . . . . . . . . 3--8
           Sanidhya Kashyap and   
               Changwoo Min and   
                     Taesoo Kim   Opportunistic Spinlocks: Achieving
                                  Virtual Machine Scalability in the
                                  Clouds . . . . . . . . . . . . . . . . . 9--16
      Márcio Oyamada and   
Antônio Augusto Fröhlich and   
                 Leandro Becker   5th Brazilian Symposium on Computing
                                  System Engineering . . . . . . . . . . . 17--17
 Caio Augusto R. dos Santos and   
           Rivalino Matias, Jr.   Exploratory Analysis on Failure Causes
                                  in a Mass-Market Operating System  . . . 18--30
             Saul Delabrida and   
            Thiago D'Angelo and   
     Ricardo A. R. Oliveira and   
         Antonio A. F. Loureiro   Building Wearables for Geology: an
                                  Operating System Approach  . . . . . . . 31--45

Operating Systems Review
Volume 50, Number 2, June, 2016

                  Yuanyuan Zhou   Programming Uncertain $<$T$>$ hings  . . . 1--2
               Sergi Abadal and   
   Albert Cabellos-Aparicio and   
             Eduard Alarcon and   
                Josep Torrellas   WiSync: an Architecture for Fast
                                  Synchronization through On-Chip Wireless
                                  Communication  . . . . . . . . . . . . . 3--17
              Xiaodong Wang and   
 José F. Martínez   ReBudget: Trading Off Efficiency vs.
                                  Fairness in Market-Based Multicore
                                  Resource Allocation via Runtime Budget
                                  Reassignment . . . . . . . . . . . . . . 19--32
                Haishan Zhu and   
                    Mattan Erez   Dirigent: Enforcing QoS for
                                  Latency-Critical Tasks on Shared
                                  Multicore Systems  . . . . . . . . . . . 33--47
             Yossi Kuperman and   
             Eyal Moscovici and   
                 Joel Nider and   
             Razya Ladelsky and   
                Abel Gordon and   
                    Dan Tsafrir   Paravirtual Remote I/O . . . . . . . . . 49--65
           Antoine Kaufmann and   
                SImon Peter and   
          Naveen Kr. Sharma and   
            Thomas Anderson and   
           Arvind Krishnamurthy   High Performance Packet Processing with
                                  FlexNIC  . . . . . . . . . . . . . . . . 67--81
             James Bornholt and   
           Antoine Kaufmann and   
                  Jialin Li and   
       Arvind Krishnamurthy and   
               Emina Torlak and   
                        Xi Wang   Specifying and Checking File System
                                  Crash-Consistency Models . . . . . . . . 83--98
            Aravinda Prasad and   
                    K. Gopinath   Prudent Memory Reclamation in
                                  Procrastination-Based Synchronization    99--112
             Anurag Mukkara and   
            Nathan Beckmann and   
                 Daniel Sanchez   Whirlpool: Improving Dynamic Cache
                                  Management with Static Data
                                  Classification . . . . . . . . . . . . . 113--127
             Myeongjae Jeon and   
                 Yuxiong He and   
                 Hwanju Kim and   
             Sameh Elnikety and   
               Scott Rixner and   
                    Alan L. Cox   TPC: Target-Driven Parallelism Combining
                                  Prediction and Correction to Reduce Tail
                                  Latency in Interactive Services  . . . . 129--141
               Fraser Brown and   
         Andres Nötzli and   
                  Dawson Engler   How to Build Static Checking Systems
                                  Using Orders of Magnitude Less Code  . . 143--157
                 Tong Zhang and   
               Dongyoon Lee and   
                  Changhee Jung   TxRace: Efficient Data Race Detection
                                  Using Commodity Hardware Transactional
                                  Memory . . . . . . . . . . . . . . . . . 159--173
               Sidney Amani and   
                 Alex Hixon and   
                 Zilin Chen and   
        Christine Rizkallah and   
                Peter Chubb and   
              Liam O'Connor and   
                Joel Beeren and   
           Yutaka Nagashima and   
                Japheth Lim and   
              Thomas Sewell and   
               Joseph Tuong and   
            Gabriele Keller and   
                Toby Murray and   
               Gerwin Klein and   
                  Gernot Heiser   CoGENT: Verifying High-Assurance File
                                  System Implementations . . . . . . . . . 175--188
              Nils Asmussen and   
           Marcus Völp and   
       Benedikt Nöthen and   
        Hermann Härtig and   
               Gerhard Fettweis   M3: a Hardware/Operating-System
                                  Co-Design to Tame Heterogeneous
                                  Manycores  . . . . . . . . . . . . . . . 189--203
             Daniyal Liaqat and   
              Silviu Jingoi and   
               Eyal de Lara and   
                Ashvin Goel and   
                  Wilson To and   
                  Kevin Lee and   
     Italo De Moraes Garcia and   
                 Manuel Saldana   Sidewinder: an Energy Efficient and
                                  Developer Friendly Heterogeneous
                                  Architecture for Continuous Mobile
                                  Sensing  . . . . . . . . . . . . . . . . 205--215
           Jonathan Balkind and   
            Michael McKeown and   
                Yaosheng Fu and   
                 Tri Nguyen and   
                 Yanqi Zhou and   
              Alexey Lavrov and   
           Mohammad Shahrad and   
                  Adi Fuchs and   
               Samuel Payne and   
              Xiaohua Liang and   
               Matthew Matl and   
                David Wentzlaff   OpenPiton: an Open Source Manycore
                                  Research Framework . . . . . . . . . . . 217--232
              Daniel Lustig and   
                 Geet Sethi and   
         Margaret Martonosi and   
         Abhishek Bhattacharjee   COATCheck: Verifying Memory Ordering at
                                  the Hardware-OS Interface  . . . . . . . 233--247
               Alex Markuze and   
              Adam Morrison and   
                    Dan Tsafrir   True IOMMU Protection from DMA Attacks:
                                  When Copy is Faster than Zero Copy . . . 249--262
                  Amro Awad and   
         Pratyusa Manadhata and   
               Stuart Haber and   
                Yan Solihin and   
                  William Horne   Silent Shredder: Zero-Cost Shredding for
                                  Secure Non-Volatile Main Memory
                                  Controllers  . . . . . . . . . . . . . . 263--276
              Youngjin Kwon and   
               Alan M. Dunn and   
             Michael Z. Lee and   
            Owen S. Hofmann and   
               Yuanzhong Xu and   
                 Emmett Witchel   Sego: Pervasive Trusted Metadata for
                                  Efficiently Verified Untrusted System
                                  Services . . . . . . . . . . . . . . . . 277--290
                    Dan Tsafrir   Synopsis of the ASPLOS '16 Wild and
                                  Crazy Ideas (WACI) Invited-Speakers
                                  Session  . . . . . . . . . . . . . . . . 291--294
            R. Stanley Williams   Brain Inspired Computing . . . . . . . . 295--295
Phitchaya Mangpo Phothilimthana and   
              Aditya Thakur and   
            Rastislav Bodik and   
               Dinakar Dhurjati   Scaling up Superoptimization . . . . . . 297--310
          Niranjan Hasabnis and   
                       R. Sekar   Lifting Assembly to Intermediate
                                  Representation: a Novel Approach
                                  Leveraging Compilers . . . . . . . . . . 311--324
        Saurav Muralidharan and   
                   Amit Roy and   
                  Mary Hall and   
            Michael Garland and   
                     Piyush Rai   Architecture-Adaptive Code Variant
                                  Tuning . . . . . . . . . . . . . . . . . 325--338
               Xiaofeng Lin and   
                    Yu Chen and   
                Xiaodong Li and   
                 Junjie Mao and   
                 Jiaquan He and   
                     Wei Xu and   
                   Yuanchun Shi   Scalable Kernel TCP Design and
                                  Implementation for Short-Lived
                                  Connections  . . . . . . . . . . . . . . 339--352
              Izzat El Hajj and   
          Alexander Merritt and   
             Gerd Zellweger and   
            Dejan Milojicic and   
             Reto Achermann and   
           Paolo Faraboschi and   
                Wen-mei Hwu and   
             Timothy Roscoe and   
                 Karsten Schwan   SpaceJMP: Programming with Multiple
                                  Virtual Address Spaces . . . . . . . . . 353--368
          Felix Xiaozhu Lin and   
                         Xu Liu   memif: Towards Programming Heterogeneous
                                  Memory Asynchronously  . . . . . . . . . 369--383
               Wook-Hee Kim and   
               Jinwoong Kim and   
               Woongki Baek and   
               Beomseok Nam and   
                     Youjip Won   NVWAL: Exploiting NVRAM in Write-Ahead
                                  Logging  . . . . . . . . . . . . . . . . 385--398
             Aasheesh Kolli and   
              Steven Pelley and   
                  Ali Saidi and   
              Peter M. Chen and   
              Thomas F. Wenisch   High-Performance Transactions for
                                  Persistent Memories  . . . . . . . . . . 399--411
                   Qing Guo and   
              Karin Strauss and   
                  Luis Ceze and   
             Henrique S. Malvar   High-Density Image Storage Using
                                  Approximate Memory Cells . . . . . . . . 413--426
         Joseph Izraelevitz and   
              Terence Kelly and   
                 Aasheesh Kolli   Failure-Atomic Persistent Memory Updates
                                  via JUSTDO Logging . . . . . . . . . . . 427--442
                 Jaeung Han and   
             Seungheun Jeon and   
              Young-ri Choi and   
                    Jaehyuk Huh   Interference Management for Distributed
                                  Parallel Applications in Consolidated
                                  Clusters . . . . . . . . . . . . . . . . 443--456
                Martin Maas and   
           Krste Asanovi\'c and   
                 Tim Harris and   
               John Kubiatowicz   Taurus: a Holistic Language Runtime
                                  System for Coordinating Distributed
                                  Managed-Language Applications  . . . . . 457--471
       Christina Delimitrou and   
             Christos Kozyrakis   HCloud: Resource-Efficient Provisioning
                                  in Shared Cloud Systems  . . . . . . . . 473--488
                    Xiao Yu and   
              Pallavi Joshi and   
                  Jianwu Xu and   
               Guoliang Jin and   
                  Hui Zhang and   
                   Guofei Jiang   CloudSeer: Workflow Monitoring of Cloud
                                  Infrastructures via Interleaved Logs . . 489--502
               Yonghwi Kwon and   
               Dohyeong Kim and   
        William Nick Sumner and   
               Kyungtae Kim and   
     Brendan Saltaformaggio and   
              Xiangyu Zhang and   
                     Dongyan Xu   LDX: Causality Inference by Lightweight
                                  Dual Execution . . . . . . . . . . . . . 503--515
 Tanakorn Leesatapornwongsa and   
          Jeffrey F. Lukman and   
                    Shan Lu and   
              Haryadi S. Gunawi   TaxDC: a Taxonomy of Non-Deterministic
                                  Concurrency Bugs in Datacenter
                                  Distributed Systems  . . . . . . . . . . 517--530
                 Junjie Mao and   
                    Yu Chen and   
                 Qixue Xiao and   
                   Yuanchun Shi   RID: Finding Reference Count Bugs with
                                  Inconsistent Path Pair Checking  . . . . 531--544
               Huazhe Zhang and   
                 Henry Hoffmann   Maximizing Performance Under a Power
                                  Cap: a Comparison of Hardware, Software,
                                  and Hybrid Techniques  . . . . . . . . . 545--559
               Songchun Fan and   
         Seyed Majid Zahedi and   
                Benjamin C. Lee   The Computational Sprinting Game . . . . 561--575
               Alexei Colin and   
              Graham Harvey and   
              Brandon Lucia and   
              Alanson P. Sample   An Energy-interference-free
                                  Hardware-Software Debugger for
                                  Intermittent Energy-harvesting Systems   577--589
                 Emmett Witchel   Programmer Productivity in a World of
                                  Mushy Interfaces: Challenges of the
                                  Post-ISA Reality . . . . . . . . . . . . 591--591
             Kevin Angstadt and   
             Westley Weimer and   
                  Kevin Skadron   RAPID Programming of Pattern-Recognition
                                  Processors . . . . . . . . . . . . . . . 593--605
                    Xin Sui and   
            Andrew Lenharth and   
          Donald S. Fussell and   
                 Keshav Pingali   Proactive Control of Approximate
                                  Programs . . . . . . . . . . . . . . . . 607--621
                Jongse Park and   
             Emmanuel Amaro and   
              Divya Mahajan and   
           Bradley Thwaites and   
              Hadi Esmaeilzadeh   AxGames: Towards Crowdsourcing Quality
                                  Target Determination in Approximate
                                  Computing  . . . . . . . . . . . . . . . 623--636
             James Bornholt and   
             Randolph Lopez and   
         Douglas M. Carmean and   
                  Luis Ceze and   
               Georg Seelig and   
                  Karin Strauss   A DNA-Based Archival Storage System  . . 637--649
            Raghu Prabhakar and   
           David Koeplinger and   
             Kevin J. Brown and   
             HyoukJoong Lee and   
          Christopher De Sa and   
         Christos Kozyrakis and   
                 Kunle Olukotun   Generating Configurable Hardware from
                                  Parallel Patterns  . . . . . . . . . . . 651--665
               Li-Wen Chang and   
               Hee-Seok Kim and   
                 Wen-mei W. Hwu   DySel: Lightweight Dynamic Selection for
                                  Kernel-based Data-parallel Programming
                                  Model  . . . . . . . . . . . . . . . . . 667--680
                  Quan Chen and   
               Hailong Yang and   
                 Jason Mars and   
                   Lingjia Tang   Baymax: QoS Awareness and Increased
                                  Utilization for Non-Preemptive
                                  Accelerators in Warehouse Scale
                                  Computers  . . . . . . . . . . . . . . . 681--696
              Tony Nowatzki and   
      Karthikeyan Sankaralingam   Analyzing Behavior Specialized
                                  Acceleration . . . . . . . . . . . . . . 697--711
                Man-Ki Yoon and   
           Negin Salajegheh and   
                   Yin Chen and   
           Mihai Christodorescu   PIFT: Predictive Information-Flow
                                  Tracking . . . . . . . . . . . . . . . . 713--725
              Ashish Venkat and   
      Sriskanda Shamasunder and   
              Hovav Shacham and   
                Dean M. Tullsen   HIPStR: Heterogeneous-ISA Program State
                                  Relocation . . . . . . . . . . . . . . . 727--741
      Zelalem Birhanu Aweke and   
  Salessawi Ferede Yitbarek and   
                   Rui Qiao and   
             Reetuparna Das and   
              Matthew Hicks and   
                 Yossi Oren and   
                    Todd Austin   ANVIL: Software-Based Protection Against
                                  Next-Generation Rowhammer Attacks  . . . 743--755
               Diego Didona and   
               Nuno Diegues and   
       Anne-Marie Kermarrec and   
           Rachid Guerraoui and   
              Ricardo Neves and   
                   Paolo Romano   ProteusTM: Abstraction Meets Performance
                                  in Transactional Memory  . . . . . . . . 757--771
                Noam Shalev and   
                Eran Harpaz and   
                Hagar Porat and   
                Idit Keidar and   
                Yaron Weinsberg   CSR: Core Surprise Removal in Commodity
                                  Operating Systems  . . . . . . . . . . . 773--787
            Tanmay Gangwani and   
              Adam Morrison and   
                Josep Torrellas   CASPAR: Breaking Serialization in
                                  Lock-Free Multicore Synchronization  . . 789--804

Operating Systems Review
Volume 50, Number 3, December, 2016

          Jean-Thomas Acquaviva   Performance and Scalability of Storage
                                  Systems, a view from the WOPSSS Workshop 2--2
     Anastasios Papagiannis and   
         Giorgos Saloustros and   
          Manolis Marazakis and   
                  Angelos Bilas   Iris: an optimized I/O stack for
                                  low-latency storage devices  . . . . . . 3--11
            Wolfram Schenck and   
             Salem El Sayed and   
         Maciej Foszczynski and   
            Wilhelm Homberg and   
                   Dirk Pleiter   Evaluation and Performance Modeling of a
                                  Burst Buffer Solution  . . . . . . . . . 12--26
           Hamza Ouarnoughi and   
            Jalil Boukhobza and   
             Frank Singhoff and   
         Stéphane Rubini   Integrating I/Os in Cloudsim for
                                  Performance and Energy Estimation  . . . 27--36
             Salem El Sayed and   
            Matthias Bolten and   
                   Dirk Pleiter   Using file system counters in modelling
                                  parallel I/O architectures . . . . . . . 37--46


Operating Systems Review
Volume 51, Number 1, August, 2017

              David Tennenhouse   Research at VMware . . . . . . . . . . . 1--4
                Mihai Budiu and   
                     Chris Dodd   The P416 Programming Language  . . . . . 5--14
                     Xin Xu and   
                  Bhavesh Davda   A Hypervisor Approach to Enable Live
                                  Migration with Passthrough SR-IOV
                                  Network Devices  . . . . . . . . . . . . 15--23
               Irina Calciu and   
             Siddhartha Sen and   
        Mahesh Balakrishnan and   
             Marcos K. Aguilera   How to implement any concurrent data
                                  structure for modern servers . . . . . . 24--32
                 Bryan Fink and   
                Eric Knauft and   
                     Gene Zhang   vSAN: Modern Distributed Storage . . . . 33--37
         Timothy Merrifield and   
                 H. Reza Taheri   Performance Implications of Extended
                                  Page Tables on Virtualized x86
                                  Processors . . . . . . . . . . . . . . . 38--47
             Abhishek Gupta and   
              Rick Spillane and   
              Wenguang Wang and   
             Maxime Austruy and   
           Vahid Fereydouny and   
           Christos Karamanolis   Hybrid Cloud Storage: Bridging the Gap
                                  between Compute Clusters and Cloud
                                  Storage  . . . . . . . . . . . . . . . . 48--53
                 Nadav Amit and   
                Michael Wei and   
                  Cheng-Chun Tu   Hypercallbacks . . . . . . . . . . . . . 54--59
Vijayaraghavan Soundararajan and   
                  Joshua Schnee   Sustainability as a first-class metric
                                  for developers and end-users . . . . . . 60--66
               Heidi Howard and   
              Dahlia Malkhi and   
               Sasha Spiegelman   Revisiting the Paxos Foundations: a Look
                                  at Summer Internship Work at VMware
                                  Research . . . . . . . . . . . . . . . . 67--71
              Cheng-Chun Tu and   
               Joe Stringer and   
                  Justin Pettit   Building an Extensible Open vSwitch
                                  Datapath . . . . . . . . . . . . . . . . 72--77
             Medhavi Dhawan and   
              Gurprit Johal and   
                Jim Stabile and   
        Vjekoslav Brajkovic and   
                James Chang and   
                Kapil Goyal and   
                Kevin James and   
        Zeeshan Lokhandwala and   
   Anny Martinez Manzanilla and   
              Roger Michoud and   
            Maithem Munshed and   
          Srinivas Neginhal and   
          Konstantin Spirov and   
                Michael Wei and   
             Scott Fritchie and   
             Chris Rossbach and   
              Ittai Abraham and   
                  Dahlia Malkhi   Consistent Clustered Applications with
                                  Corfu  . . . . . . . . . . . . . . . . . 78--82
              Youngjin Kwon and   
                Hangchen Yu and   
                Simon Peter and   
    Christopher J. Rossbach and   
                 Emmett Witchel   Ingens: Huge Page Support for the OS and
                                  Hypervisor . . . . . . . . . . . . . . . 83--93
    Abhiram Balasubramanian and   
        Marek S. Baranowski and   
              Anton Burtsev and   
              Aurojit Panda and   
          Zvonimir Rakamari and   
                  Leonid Ryzhyk   System Programming in Rust: Beyond
                                  Safety . . . . . . . . . . . . . . . . . 94--99
         Alisson Brito, Jr. and   
 Leandro Becker Rivalino Matias   6th Brazilian Symposium on Computing
                                  System Engineering . . . . . . . . . . . 100--100
   João Gabriel Reis and   
Antônio Augusto Fröhlich   OS Support for Adaptive Components in
                                  Self-aware Systems . . . . . . . . . . . 101--112
                  Cha V. Li and   
          Vinicius Petrucci and   
            Daniel Mossé   Exploring Machine Learning for Thread
                                  Characterization on Heterogeneous
                                  Multiprocessors  . . . . . . . . . . . . 113--123

Operating Systems Review
Volume 51, Number 2, June, 2017

                     Yunji Chen   Big Data Analytics and Intelligence at
                                  Alibaba Cloud  . . . . . . . . . . . . . 1--1
            Hari Cherupalli and   
                 Henry Duwe and   
                 Weidong Ye and   
               Rakesh Kumar and   
                   John Sartori   Determining Application-specific Peak
                                  Power and Energy Requirements for
                                  Ultra-low Power Processors . . . . . . . 3--16
                  Quan Chen and   
               Hailong Yang and   
                  Minyi Guo and   
        Ram Srivatsa Kannan and   
                 Jason Mars and   
                   Lingjia Tang   Prophet: Precise QoS Prediction on
                                  Non-Preemptive Accelerators to Improve
                                  Utilization in Warehouse-Scale Computers 17--32
               Svilen Kanev and   
               Sam Likun Xi and   
                Gu-Yeon Wei and   
                   David Brooks   Mallacc: Accelerating Memory Allocation  33--45
                 Shasha Wen and   
              Milind Chabbi and   
                         Xu Liu   REDSPY: Exploring Value Locality in
                                  Software . . . . . . . . . . . . . . . . 47--61
         Abhishek Bhattacharjee   Translation-Triggered Prefetching  . . . 63--76
                Channoh Kim and   
               Jaehyeok Kim and   
                Sungmin Kim and   
               Dooyoung Kim and   
                  Namho Kim and   
                   Gitae Na and   
                Young H. Oh and   
              Hyeon Gyu Cho and   
                     Jae W. Lee   Typed Architectures: Architectural
                                  Support for Lightweight Scripting  . . . 77--90
                  Jihye Seo and   
               Wook-Hee Kim and   
               Woongki Baek and   
               Beomseok Nam and   
                     Sam H. Noh   Failure-Atomic Slotted Paging for
                                  Persistent Memory  . . . . . . . . . . . 91--104
              Donald Nguyen and   
                 Keshav Pingali   What Scalable Programs Need from
                                  Transactional Memory . . . . . . . . . . 105--118
           Caroline Trippel and   
          Yatin A. Manerkar and   
              Daniel Lustig and   
           Michael Pellauer and   
             Margaret Martonosi   TriCheck: Memory Model Verification at
                                  the Trisection of Software, Hardware,
                                  and ISA  . . . . . . . . . . . . . . . . 119--133
              Sanketh Nalli and   
              Swapnil Haria and   
               Mark D. Hill and   
           Michael M. Swift and   
                Haris Volos and   
                Kimberly Keeton   An Analysis of Persistent Memory Use
                                  with WHISPER . . . . . . . . . . . . . . 135--148
                 Tong Zhang and   
              Changhee Jung and   
                   Dongyoon Lee   ProRace: Practical Data Race Detection
                                  for Production Use . . . . . . . . . . . 149--162
              Lena E. Olson and   
               Mark D. Hill and   
                  David A. Wood   Crossing Guard: Mediating
                                  Host-Accelerator Coherence Interactions  163--176
             Joseph McMahan and   
        Michael Christensen and   
             Lawton Nichols and   
               Jared Roesch and   
               Sung-Yee Guo and   
              Ben Hardekopf and   
               Timothy Sherwood   An Architecture Supporting Formal and
                                  Compositional Binary Analysis  . . . . . 177--191
            Chun-Hung Hsiao and   
        Satish Narayanasamy and   
  Essam Muhammad Idris Khan and   
       Cristiano L. Pereira and   
                Gilles A. Pokam   AsyncClock: Scalable Inference of
                                  Asynchronous Event Causality . . . . . . 193--205
               Irina Calciu and   
             Siddhartha Sen and   
        Mahesh Balakrishnan and   
             Marcos K. Aguilera   Black-box Concurrent Data Structures for
                                  NUMA Architectures . . . . . . . . . . . 207--221
                 Keval Vora and   
                  Chen Tian and   
                Rajiv Gupta and   
                       Ziang Hu   CoRAL: Confined Recovery in Distributed
                                  Asynchronous Graph Processing  . . . . . 223--236
                 Keval Vora and   
                Rajiv Gupta and   
                     Guoqing Xu   KickStarter: Fast and Accurate
                                  Computations on Streaming Graphs via
                                  Trimmed Approximations . . . . . . . . . 237--251
               Bobby Powers and   
                  John Vilk and   
                Emery D. Berger   Browsix: Bridging the Gap Between Unix
                                  and the Browser  . . . . . . . . . . . . 253--266
         Samyam Rajbhandari and   
                 Yuxiong He and   
            Olatunji Ruwase and   
             Michael Carbin and   
               Trishul Chilimbi   Optimizing CNNs on Multicores for
                                  Scalability, Performance and Goodput . . 267--280
   Kirshanthan Sundararajah and   
                Laith Sakka and   
                Milind Kulkarni   Locality Transformations for Nested
                                  Recursive Iteration Spaces . . . . . . . 281--295
                     Ang Li and   
         Shuaiwen Leon Song and   
                Weifeng Liu and   
                     Xu Liu and   
                Akash Kumar and   
                 Henk Corporaal   Locality-Aware CTA Clustering for Modern
                                  GPUs . . . . . . . . . . . . . . . . . . 297--311
         Berkeley Churchill and   
               Rahul Sharma and   
                 JF Bastien and   
                     Alex Aiken   Sound Loop Superoptimization for Google
                                  Native Client  . . . . . . . . . . . . . 313--326
              Ricardo Bianchini   Improving Datacenter Efficiency  . . . . 327--327
               Mengxing Liu and   
             Mingxing Zhang and   
                  Kang Chen and   
                Xuehai Qian and   
                 Yongwei Wu and   
               Weimin Zheng and   
                    Jinglei Ren   DudeTM: Building Durable Transactions
                                  with Decoupling for Persistent Memory    329--343
               Ana Klimovic and   
                Heiner Litz and   
             Christos Kozyrakis   ReFlex: Remote Flash $ \approx $ Local
                                  Flash  . . . . . . . . . . . . . . . . . 345--359
            Djordje Jevdjic and   
              Karin Strauss and   
                  Luis Ceze and   
             Henrique S. Malvar   Approximate Storage of Compressed and
                                  Encrypted Videos . . . . . . . . . . . . 361--373
                Nima Elyasi and   
          Mohammad Arjomand and   
      Anand Sivasubramaniam and   
         Mahmut T. Kandemir and   
               Chita R. Das and   
                 Myoungsoo Jung   Exploiting Intra-Request Slack to
                                  Improve SSD Performance  . . . . . . . . 375--388
                   Kai Wang and   
              Aftab Hussain and   
               Zhiqiang Zuo and   
                 Guoqing Xu and   
             Ardalan Amiri Sani   Graspan: a Single-machine Disk-based
                                  Graph System for Interprocedural Static
                                  Analyses of Large-scale Systems Code . . 389--404
                     Ao Ren and   
                     Zhe Li and   
                Caiwen Ding and   
                  Qinru Qiu and   
                Yanzhi Wang and   
                      Ji Li and   
                Xuehai Qian and   
                        Bo Yuan   SC--DCNN: Highly-Scalable Deep
                                  Convolutional Neural Network using
                                  Stochastic Computing . . . . . . . . . . 405--418
                 Jerry Ajay and   
                  Chen Song and   
       Aditya Singh Rathore and   
                   Chi Zhou and   
                      Wenyao Xu   $3$DGates: an Instruction-Level Energy
                                  Analysis and Optimization of $3$D
                                  Printers . . . . . . . . . . . . . . . . 419--433
              Guilherme Cox and   
         Abhishek Bhattacharjee   Efficient Address Translation for
                                  Architectures with Multiple Page Sizes   435--448
              Ilya Lesokhin and   
                Haggai Eran and   
            Shachar Raindel and   
                Guy Shapiro and   
              Sagi Grimberg and   
                 Liran Liss and   
            Muli Ben-Yehuda and   
                 Nadav Amit and   
                    Dan Tsafrir   Page Fault Support for Network
                                  Controllers  . . . . . . . . . . . . . . 449--466
                    Yang Hu and   
              Mingcong Song and   
                         Tao Li   Towards ``Full Containerization'' in
                                  Containerized Network Function
                                  Virtualization . . . . . . . . . . . . . 467--481
                      Bo Wu and   
                     Xu Liu and   
                Xiaobo Zhou and   
                 Changjun Jiang   FLEP: Enabling Flexible and Efficient
                                  Preemption on GPUs . . . . . . . . . . . 483--496
                  Kaiwei Li and   
               Jianfei Chen and   
              Wenguang Chen and   
                        Jun Zhu   SaberLDA: Sparsity-Aware Learning of
                                  Topic Models on GPUs . . . . . . . . . . 497--509
             Moein Khazraee and   
                   Lu Zhang and   
                  Luis Vega and   
         Michael Bedford Taylor   Moonwalk: NRE Optimization in ASIC
                                  Clouds . . . . . . . . . . . . . . . . . 511--526
        Jason Jong Kyu Park and   
               Yongjun Park and   
                   Scott Mahlke   Dynamic Resource Management for
                                  Efficient Utilization of Multitasking
                                  GPUs . . . . . . . . . . . . . . . . . . 527--540
                  Rui Zhang and   
            Natalie Stanley and   
         Christopher Griggs and   
                 Andrew Chi and   
                Cynthia Sturton   Identifying Security Critical Properties
                                  for the Dynamic Verification of a
                                  Processor  . . . . . . . . . . . . . . . 541--554
          Andrew Ferraiuolo and   
                     Rui Xu and   
              Danfeng Zhang and   
            Andrew C. Myers and   
                  G. Edward Suh   Verification of a Practical Hardware
                                  Security Architecture Through Static
                                  Information Flow Analysis  . . . . . . . 555--568
             David Chisnall and   
               Brooks Davis and   
               Khilan Gudka and   
              David Brazdil and   
          Alexandre Joannou and   
          Jonathan Woodruff and   
      A. Theodore Markettos and   
            J. Edward Maste and   
              Robert Norton and   
                 Stacey Son and   
                Michael Roe and   
             Simon W. Moore and   
           Peter G. Neumann and   
                 Ben Laurie and   
            Robert N. M. Watson   CHERI JNI: Sinking the Java Security
                                  Model into the C . . . . . . . . . . . . 569--583
                 Xinyang Ge and   
                Weidong Cui and   
                   Trent Jaeger   GRIFFIN: Guarding Control Flows Using
                                  Intel Processor Trace  . . . . . . . . . 585--598
       Christina Delimitrou and   
             Christos Kozyrakis   Bolt: I Know What You Did Last Summer
                                  \ldots In The Cloud  . . . . . . . . . . 599--613
                Yiping Kang and   
            Johann Hauswald and   
                    Cao Gao and   
            Austin Rovinski and   
               Trevor Mudge and   
                 Jason Mars and   
                   Lingjia Tang   Neurosurgeon: Collaborative Intelligence
                                  Between the Cloud and Mobile Edge  . . . 615--629
               Neha Agarwal and   
              Thomas F. Wenisch   Thermostat: Application-transparent Page
                                  Management for Two-tiered Main Memory    631--644
          Antonio Barbalace and   
              Robert Lyerly and   
   Christopher Jelesnianski and   
              Anthony Carno and   
              Ho-Ren Chuang and   
             Vincent Legout and   
                Binoy Ravindran   Breaking the Boundaries in
                                  Heterogeneous-ISA Datacenters  . . . . . 645--659
              Daniel Lustig and   
              Andrew Wright and   
Alexandros Papakonstantinou and   
                 Olivier Giroux   Automated Synthesis of Comprehensive
                                  Memory Model Litmus Test Suites  . . . . 661--675
                Haopeng Liu and   
                 Guangpu Li and   
          Jeffrey F. Lukman and   
                  Jiaxin Li and   
                    Shan Lu and   
          Haryadi S. Gunawi and   
                      Chen Tian   DCatch: Automatically Detecting
                                  Distributed Concurrency Bugs in Cloud
                                  Systems  . . . . . . . . . . . . . . . . 677--691
Ali José Mashtizadeh and   
              Tal Garfinkel and   
                David Terei and   
             David Mazieres and   
               Mendel Rosenblum   Towards Practical Default-On Multi-Core
                                  Record/Replay  . . . . . . . . . . . . . 693--708
                 Jian Huang and   
         Michael Allen-Bond and   
                  Xuechen Zhang   Pallas: Semantic-Aware Checking for
                                  Finding Deep Bugs in Fast Path . . . . . 709--722
          Jagadish B. Kotra and   
             Narges Shahidi and   
          Zeshan A. Chishti and   
             Mahmut T. Kandemir   Hardware-Software Co-design to Mitigate
                                  DRAM Refresh Overheads: a Case for
                                  Refresh-Aware Process Scheduling . . . . 723--736
                Jinchun Kim and   
               Elvira Teran and   
              Paul V. Gratz and   
   Daniel A. Jiménez and   
            Seth H. Pugsley and   
                Chris Wilkerson   Kill the Program Counter: Reconstructing
                                  Program Behavior in the Processor Cache
                                  Hierarchy  . . . . . . . . . . . . . . . 737--749
                 Mingyu Gao and   
                    Jing Pu and   
                  Xuan Yang and   
              Mark Horowitz and   
             Christos Kozyrakis   TETRIS: Scalable and Efficient Neural
                                  Network Acceleration with $3$D Memory    751--764
                Wonjun Song and   
               Gwangsun Kim and   
             Hyungjoon Jung and   
             Jongwook Chung and   
                Jung Ho Ahn and   
                 Jae W. Lee and   
                       John Kim   History-Based Arbitration for Fairness
                                  in Processor-Interconnect of NUMA
                                  Servers  . . . . . . . . . . . . . . . . 765--777
            Pulkit A. Misra and   
           Jeffrey S. Chase and   
            Johannes Gehrke and   
                Alvin R. Lebeck   Enabling Lightweight Transactions with
                                  Precision Time . . . . . . . . . . . . . 779--794
                   Ming Liu and   
                  Liang Luo and   
               Jacob Nelson and   
                  Luis Ceze and   
       Arvind Krishnamurthy and   
                 Kishore Atreya   IncBricks: Toward In-Network Computation
                                  with an In-Network Cache . . . . . . . . 795--809
              Ismail Akturk and   
               Ulya R. Karpuzcu   AMNESIAC: Amnesic Automatic Computer . . 811--824
                  Yuxin Bai and   
              Victor W. Lee and   
                     Engin Ipek   Voltage Regulator Efficiency Aware Power
                                  Management . . . . . . . . . . . . . . . 825--838


Operating Systems Review
Volume 52, Number 1, July, 2018

                 Hanna Alam and   
              Tianhao Zhang and   
                Mattan Erez and   
                    Yoav Etsion   Do-It-Yourself Virtual Memory
                                  Translation  . . . . . . . . . . . . . . 1--12
            Sudarsun Kannan and   
            Ada Gavrilovska and   
               Vishal Gupta and   
                 Karsten Schwan   HeteroOS: OS Design for Heterogeneous
                                  Memory Management in Datacenters . . . . 13--26
    Rachata Ausavarungnirun and   
            Joshua Landgraf and   
               Vance Miller and   
              Saugata Ghose and   
             Jayneel Gandhi and   
    Christopher J. Rossbach and   
                     Onur Mutlu   Mosaic: Enabling Application-Transparent
                                  Support for Multiple Page Sizes in
                                  Throughput Processors  . . . . . . . . . 27--44
           Christoffer Dall and   
                Shih-Wei Li and   
               Jin Tack Lim and   
                     Jason Nieh   ARM Virtualization: Performance and
                                  Architectural Implications . . . . . . . 45--56
                     Zi Yan and   
   Ján Veselý and   
              Guilherme Cox and   
         Abhishek Bhattacharjee   Hardware Translation Coherence for
                                  Virtualized Systems  . . . . . . . . . . 57--70
             Hung-Wei Tseng and   
              Qianchen Zhao and   
                Yuxiao Zhou and   
               Mark Gahagan and   
                 Steven Swanson   Morpheus: Exploring the Potential of
                                  Near-Data Processing for Creating
                                  Application Objects in Heterogeneous
                                  Computing  . . . . . . . . . . . . . . . 71--83
                Sagi Shahar and   
               Shai Bergman and   
               Mark Silberstein   ActivePointers: a Case for Software
                                  Address Translation on GPUs  . . . . . . 84--95
                Shaolin Xie and   
             Scott Davidson and   
                Ikuo Magaki and   
             Moein Khazraee and   
                  Luis Vega and   
                   Lu Zhang and   
              Michael B. Taylor   Extreme Datacenter Specialization for
                                  Planet-Scale Computing: ASIC Clouds  . . 96--108
              Mario Drumond and   
          Alexandros Daglis and   
           Nooshin Mirzadeh and   
           Dmitrii Ustiugov and   
             Javier Picorel and   
              Babak Falsafi and   
                 Boris Grot and   
        Dionisios Pnevmatikatos   Algorithm/Architecture Co-Design for
                                  Near-Memory Processing . . . . . . . . . 109--122
              Justin Pettit and   
                  Ben Pfaff and   
               Joe Stringer and   
              Cheng-Chun Tu and   
             Brenden Blanco and   
                   Alex Tessmer   Bringing Platform Harmony to VMware NSX  123--128
                   David E. Ott   Software Defined Infrastructure:
                                  Rethinking Cybersecurity with a More
                                  Capable Toolset  . . . . . . . . . . . . 129--133


Operating Systems Review
Volume 53, Number 1, July, 2019

            Sanjay Krishnan and   
            Aaron J. Elmore and   
           Michael Franklin and   
            John Paparrizos and   
               Zechao Shang and   
              Adam Dziedzic and   
                        Rui Liu   Artificial Intelligence in
                                  Resource-Constrained and Shared
                                  Environments . . . . . . . . . . . . . . 1--6
                 Ken Birman and   
          Bharath Hariharan and   
              Christopher De Sa   Cloud-Hosted Intelligence for Real-time
                                  IoT Applications . . . . . . . . . . . . 7--13
               Cody Coleman and   
                Daniel Kang and   
           Deepak Narayanan and   
                Luigi Nardi and   
                  Tian Zhao and   
                 Jian Zhang and   
               Peter Bailis and   
             Kunle Olukotun and   
            Chris Ré and   
                  Matei Zaharia   Analysis of DAWNBench, a
                                  Time-to-Accuracy Machine Learning
                                  Performance Benchmark  . . . . . . . . . 14--25
                Eunji Jeong and   
                Sungwoo Cho and   
               Gyeong-In Yu and   
            Joo Seong Jeong and   
              Dong-Jin Shin and   
                 Taebum Kim and   
                 Byung-Gon Chun   Speculative Symbolic Graph Execution of
                                  Imperative Deep Learning Programs  . . . 26--33
                     Yu Gan and   
                Yanqi Zhang and   
                  Kelvin Hu and   
               Dailun Cheng and   
                    Yuan He and   
            Meghna Pancholi and   
           Christina Delimitrou   Leveraging Deep Learning to Improve
                                  Performance Predictability in Cloud
                                  Microservices with Seer  . . . . . . . . 34--39
               Yiying Zhang and   
                   Yutong Huang   ``Learned'': Operating Systems . . . . . 40--45
             David Vengerov and   
                   Sesh Jalagam   A Machine Learning Approach to
                                  Recommending Files in a Collaborative
                                  Work Environment . . . . . . . . . . . . 46--51
                    Luo Mai and   
       Alexandros Koliousis and   
                     Guo Li and   
    Andrei-Octavian Brabete and   
                 Peter Pietzuch   Taming Hyper-parameters in Deep Learning
                                  Systems  . . . . . . . . . . . . . . . . 52--58
                  Kexin Pei and   
                 Shiqi Wang and   
                 Yuchi Tian and   
          Justin Whitehouse and   
              Carl Vondrick and   
                 Yinzhi Cao and   
              Baishakhi Ray and   
                 Suman Jana and   
                   Junfeng Yang   Bringing Engineering Rigor to Deep
                                  Learning . . . . . . . . . . . . . . . . 59--67
       Chieh-Jan Mike Liang and   
                    Hui Xue and   
                   Mao Yang and   
                    Lidong Zhou   The Case for Learning-and-System
                                  Co-design  . . . . . . . . . . . . . . . 68--74
           Mathias L`ecuyer and   
                Riley Spahn and   
           Kiran Vodrahalli and   
            Roxana Geambasu and   
                     Daniel Hsu   Privacy Accounting and Quality Control
                                  in the Sage Differentially Private ML
                                  Platform . . . . . . . . . . . . . . . . 75--84
                   Yifan Du and   
     Valérie Issarny and   
       Françoise Sailhan   When the Power of the Crowd Meets the
                                  Intelligence of the Middleware: The
                                  Mobile Phone Sensing Case  . . . . . . . 85--90


Operating Systems Review
Volume 54, Number 1, August, 2020

              Gernot Heiser and   
                Toby Murray and   
                   Gerwin Klein   Towards Provable Timing-Channel
                                  Prevention . . . . . . . . . . . . . . . 1--7
             Amit Vasudevan and   
            Petros Maniatis and   
                  Ruben Martins   überSpark: Practical, Provable,
                                  End-to-End Guarantees on Commodity
                                  Heterogeneous Interconnected Computing
                                  Platforms  . . . . . . . . . . . . . . . 8--22
              Andres Erbsen and   
             Jade Philipoom and   
                Jason Gross and   
               Robert Sloan and   
                  Adam Chlipala   Simple High-Level Code For Cryptographic
                                  Arithmetic: With Proofs, Without
                                  Compromises  . . . . . . . . . . . . . . 23--30
                Luke Nelson and   
             James Bornholt and   
       Arvind Krishnamurthy and   
               Emina Torlak and   
                        Xi Wang   Noninterference specifications for
                                  secure systems . . . . . . . . . . . . . 31--39
              Srinath Setty and   
            Sebastian Angel and   
                   Jonathan Lee   Verifiable state machines: Proofs that
                                  untrusted services operate correctly . . 40--46
           Paul E. McKenney and   
             Joel Fernandes and   
        Silas Boyd-Wickizer and   
               Jonathan Walpole   RCU Usage In the Linux Kernel: Eighteen
                                  Years Later  . . . . . . . . . . . . . . 47--63
              Kostas Ferles and   
           Jacob Van Geffen and   
                Isil Dillig and   
             Yannis Smaragdakis   Symbolic Reasoning for Automatic Signal
                                  Placement  . . . . . . . . . . . . . . . 64--76


Operating Systems Review
Volume 55, Number 1, June, 2021

             Kasra Jamshidi and   
                     Keval Vora   A Deeper Dive into Pattern-Aware
                                  Subgraph Exploration with PEREGRINE  . . 1--10
              Xiaolin Jiang and   
               Chengshuo Xu and   
                    Rajiv Gupta   VRGQ: Evaluating a Stream of Iterative
                                  Graph Queries via Value Reuse  . . . . . 11--20
           Daniel Mawhirter and   
                Sam Reinehr and   
              Connor Holmes and   
               Tongping Liu and   
                          Bo Wu   GraphZero: a High-Performance Subgraph
                                  Matching System  . . . . . . . . . . . . 21--37
                 Yiqiu Wang and   
                 Shangdi Yu and   
           Laxman Dhulipala and   
                     Yan Gu and   
                    Julian Shun   GeoGraph: a Framework for Graph
                                  Processing on Geometric Data . . . . . . 38--46
                  Loc Hoang and   
           Roshan Dathathri and   
             Gurbinder Gill and   
                 Keshav Pingali   CuSP: a Customizable Streaming Edge
                                  Partitioner for Distributed Graph
                                  Analytics  . . . . . . . . . . . . . . . 47--60
            Benjamin Bowman and   
                 H. Howie Huang   Towards Next-Generation Cybersecurity
                                  with Graph AI  . . . . . . . . . . . . . 61--67
                 Marco Serafini   Scalable Graph Neural Network Training:
                                  The Case for Sampling  . . . . . . . . . 68--76
                  Rong Chen and   
                     Haibo Chen   Wukong: a Distributed Framework for Fast
                                  and Concurrent Graph Querying  . . . . . 77--83
                Xiaowei Zhu and   
                 Zhisong Fu and   
               Zhenxuan Pan and   
                  Jin Jiang and   
               Chuntao Hong and   
               Yongchao Liu and   
                  Yang Fang and   
              Wenguang Chen and   
                    Changhua He   Taking the Pulse of Financial Activities
                                  with Online Graph Processing . . . . . . 84--87
        Mohammed Islam Naas and   
     François Trahay and   
               Alexis Colin and   
             Pierre Olivier and   
     Stéphane Rubini and   
             Frank Singhoff and   
                Jalil Boukhobza   EZIOTracer: Unifying Kernel and User
                                  Space I/O Tracing for Data-Intensive
                                  Applications . . . . . . . . . . . . . . 88--98
                Luis Thomas and   
         Sebastien Gougeaud and   
     Stéphane Rubini and   
            Philippe Deniel and   
                Jalil Boukhobza   Predicting file lifetimes for data
                                  placement in multi-tiered storage
                                  systems for HPC  . . . . . . . . . . . . 99--107


Operating Systems Review
Volume 56, Number 1, June, 2022

                  Yichen Li and   
                   Xu Zhang and   
                  Shilin He and   
             Zhuangbin Chen and   
                    Yu Kang and   
                Jinyang Liu and   
                   Liqun Li and   
              Yingnong Dang and   
                   Feng Gao and   
                Zhangwei Xu and   
           Saravan Rajmohan and   
                Qingwei Lin and   
              Dongmei Zhang and   
                 Michael R. Lyu   An Intelligent Framework for Timely,
                                  Accurate, and Comprehensive Cloud
                                  Incident Detection . . . . . . . . . . . 1--7
                Yuri Shkuro and   
            Benjamin Renard and   
                     Atul Singh   Positional Paper: Schema-First
                                  Application Telemetry  . . . . . . . . . 8--17
               Yuting Jiang and   
                Yifan Xiong and   
                     Lei Qu and   
              Cheng Luo Luo and   
                  Chen Tian and   
                 Peng Cheng and   
                Yongqiang Xiong   Moneo: Monitoring Fine-grained Metrics
                                  Nonintrusively in AI Infrastructure  . . 18--25
              Muhammed Ugur and   
                Cheng Jiang and   
                   Alex Erf and   
          Tanvir Ahmed Khan and   
                  Baris Kasikci   One Profile Fits All: Profile-Guided
                                  Linux Kernel Optimizations for Data
                                  Center Applications  . . . . . . . . . . 26--33
                     Yu Gan and   
               Mingyu Liang and   
                 Sundar Dev and   
                   David Lo and   
           Christina Delimitrou   Enabling Practical Cloud Performance
                                  Debugging with Unsupervised Learning . . 34--41
               Mert Toslali and   
                  Emre Ates and   
                 Darby Huye and   
               Zhaoqi Zhang and   
                    Lan Liu and   
          Samantha Puterman and   
             Ayse K. Coskun and   
             Raja R. Sambasivan   VAIF: Variance-driven Automated
                                  Instrumentation Framework  . . . . . . . 42--50
        Srinivas Vippagunta and   
               Ken Finnigan and   
               Kishore Pusukuri   Pharos: The Observability Platform at
                                  Workday  . . . . . . . . . . . . . . . . 51--54
     Devashish R. Purandare and   
             Daniel Bittman and   
                Ethan L. Miller   Analysis and Workload Characterization
                                  of the CERN EOS Storage System . . . . . 55--61
               Julius Plehn and   
                 Anna Fuchs and   
               Michael Kuhn and   
         Jakob Lüttgau and   
                  Thomas Ludwig   Data-Aware Compression for HPC using
                                  Machine Learning . . . . . . . . . . . . 62--69
        Louis-Marie Nicolas and   
                Luis Thomas and   
       Yassine Hadjadj-Aoul and   
                Jalil Boukhobza   SLRL: a Simple Least Remaining Lifetime
                                  File Eviction policy for HPC multi-tier
                                  storage systems  . . . . . . . . . . . . 70--76


Operating Systems Review
Volume 57, Number 1, June, 2023

                   Yiying Zhang   Make It Real: an End-to-End
                                  Implementation of a Physically
                                  Disaggregated Data Center  . . . . . . . 1--9
           Henrique Fingler and   
                Zhiting Zhu and   
                Esther Yoon and   
                Zhipeng Jia and   
             Emmett Witchel and   
        Christopher J. Rossbach   Disaggregated GPU Acceleration for
                                  Serverless Applications  . . . . . . . . 10--20
               Irina Calciu and   
             M. Talha Imran and   
                 Ivan Puddu and   
           Sanidhya Kashyap and   
             Hasan Al Maruf and   
                 Onur Mutlu and   
                 Aasheesh Kolli   Using Local Cache Coherence for
                                  Disaggregated Memory Systems . . . . . . 21--28
             Hasan Al Maruf and   
             Mosharaf Chowdhury   Memory Disaggregation: Advances and Open
                                  Challenges . . . . . . . . . . . . . . . 29--37
         Marcos K. Aguilera and   
             Emmanuel Amaro and   
                 Nadav Amit and   
              Erika Hunhoff and   
                 Anil Yelam and   
                 Gerd Zellweger   Memory disaggregation: why now and what
                                  are the challenges . . . . . . . . . . . 38--46
           Divyanshu Saxena and   
                     Tao Ji and   
              Arjun Singhvi and   
              Junaid Khalid and   
                  Aditya Akella   Navigating Performance--Efficiency
                                  Tradeoffs in Serverless Computing:
                                  Deduplication to the Rescue! . . . . . . 47--53