Last update:
Tue Oct 1 07:11:39 MDT 2024
Daniel G. Bobrow and Jerry D. Burchfiel and Daniel L. Murphy and Raymond S. Tomlinson TENEX: a paged time sharing system for the PDP-10 . . . . . . . . . . . . . . . 1--10 Barbara H. Liskov The design of the Venus Operating System 11--16 R. Stockton Gaines An operating system based on the concept of a supervisory computer . . . . . . . 17--23 Sam Howry A multiprogramming system for process control . . . . . . . . . . . . . . . . 24--30 Peter A. Alsberg Extensible data features in the operating system language OSL/2 . . . . 31--34 R. J. Feiertag and E. I. Organick The Multics input/output system . . . . 35--38 Michael D. Schroeder and Jerome H. Saltzer A hardware architecture for implementing protection rings . . . . . . . . . . . . 42--54 R. M. Needham Handling difficult faults in operating systems . . . . . . . . . . . . . . . . 55--57 Jeffrey L. Gertz Storage reallocation in hierarchical associative memories . . . . . . . . . . 58--63 Richard C. Holt Some deadlock properties of computer systems . . . . . . . . . . . . . . . . 64--71 Rafael O. Fontao A concurrent algorithm for avoiding deadlocks in multiprocess multiple resource systems . . . . . . . . . . . . 72--79 A. Nico Habermann Synchronization of communicating processes . . . . . . . . . . . . . . . 80--85 Gilles Kahn An approach to systems correctness . . . 86--94 William B. Easton Process synchronization without long-term interlock . . . . . . . . . . 95--100 Per Brinch Hansen Short-term scheduling in multiprogramming systems . . . . . . . . 101--105 R. C. Varney Process selection in a hierarchical operating system . . . . . . . . . . . . 106--108 Forest Baskett The dependence of computer system queues upon processing time distribution and central processor scheduling . . . . . . 109--113 Toby J. Teorey and Tad B. Pinkerton A comparative analysis of disk scheduling policies . . . . . . . . . . 114--121 E. G. Coffman and Thomas A. Ryan A study of storage partitioning using a mathematical model of locality . . . . . 122--129 Peter J. Denning and Stuart C. Schwartz Properties of the working-set model . . 130--140 Mark L. Greenberg An algorithm for drum storage management in time-sharing systems . . . . . . . . 141--148 J. Winograd and S. J. Morganstein and R. Herman Simulation studies of a virtual memory, time-shared, demand paging operating system . . . . . . . . . . . . . . . . . 149--155 Juan Rodriguez-Rosell Experimental data on how program behavior affects the choice of scheduler parameters . . . . . . . . . . . . . . . 156--163
Marc Fogel and Joseph Winograd EINSTEIN: an internal driver in a time-sharing environment . . . . . . . . 6--14
Peter C. Poole When is a test not a test? . . . . . . . 4--5 William W. Collier Asynchronous interactions on shared data 6--15 John M. Chambers A user-controlled synchronization method 16--25 David H. Abernathy and John S. Mancino and Charls R. Pearson and Dona C. Swiger Survey of design goals for operating systems . . . . . . . . . . . . . . . . 29--48
M. D. Schroeder A brief report on the SIGPLAN/SIGOPS interface meeting . . . . . . . . . . . 4--9 David C. M. Wood An example in synchronization of cooperating processes: theory and practice . . . . . . . . . . . . . . . . 10--18 David H. Abernathy and John S. Mancino and Charls R. Pearson and Dona C. Swiger Survey of design goals for operating systems . . . . . . . . . . . . . . . . 19--34
P. G. Sorenson Interprocess communication in real-time systems . . . . . . . . . . . . . . . . 1--7 Michale J. Spier and Thomas N. Hastings and David N. Cutler An experimental implementation of the kernel/domain architecture . . . . . . . 8--21 C. J. Stephenson On the structure and control of commands 22--26 Dennis M. Ritchie and Ken Thompson The UNIX time-sharing system . . . . . . 27--27 Paul Day and John Hines ARGOS: An operating system for a computer utility supporting interactive instrument control . . . . . . . . . . . 28--37 W. Walther Multiprocessor self diagnosis, surgery, and recovery in air terminal traffic control . . . . . . . . . . . . . . . . 38--44 Liba Svobodova Online system performance measurements with software and hybrid monitors . . . 45--53 Samuel H. Fuller Summary of minimal-total-processing-time drum and disk scheduling disciplines . . 54--57 Lee J. Scheffier Optimal folding of a paging drum in a three level memory system . . . . . . . 58--65 Donald D. Chamberlin and Samuel H. Fulier and Leonard Y. Liu A page allocation strategy for multiprogramming systems . . . . . . . . 66--72 Peter J. Denning and Jeffrey R. Spirn Dynamic storage partitioning . . . . . . 73--79 Arvind and R. Y. Kain and E. Sadeh On reference string generation processes 80--87 Clarence A. Ellis On the probability of deadlock in computer systems . . . . . . . . . . . . 88--95 J. D. Ullman Polynomial complete scheduling problems 96--101 J. Eruno and E. G. Coffman, Jr. and R. Sethi Scheduling independent tasks to reduce mean finishing-time (extended abstract) 102--103 M. R. Garey and R. L. Grehem Bounds on scheduling with limited resources . . . . . . . . . . . . . . . 104--111 K. L. Krause and V. Y. Shen and H. D. Schwetman A task-scheduling algorithm for a multiprogramming computer system . . . . 112--118 Jerome H. Saltzer Protection and control of information sharing in Multics . . . . . . . . . . . 119--119 R. S. Fabry The case for capability based computers (Extended Abstract) . . . . . . . . . . 120--120 Gerald J. Popek and Robert P. Goldberg Formal requirements for virtualizable third generation architectures . . . . . 121--121 S. Rao Kosaraju Limitations of Dijkstra's Semaphore Primitives and Petri nets . . . . . . . 122--126
Peter J. Denning Is it not time to define ``structured programming''? . . . . . . . . . . . . . 6--7 Marc H. Fogel The VMOS paging algorithm: a practical implementation of the working set model 8--17 Butler W. Lampson Protection . . . . . . . . . . . . . . . 18--24 David H. Abernathy and John S. Mancino and Charls R. Pearson and Dona C. Swiger Survey of design goals for operating systems . . . . . . . . . . . . . . . . 25--35
Marvin V. Zelkowitz It is not time to define ``structured programming'' . . . . . . . . . . . . . 7--8 Michael J. Spier A critical look at the state of our science . . . . . . . . . . . . . . . . 9--15
Clinton R. Foulk Yet another attempt to define ``structured programming'' . . . . . . . 4--5 Gary J. Nutt An implementation of a computer simulation system . . . . . . . . . . . 6--7 Jerome H. Saltzer Ongoing research and development on information protection . . . . . . . . . 8--24
Peter J. Denning Is ``structured programming'' any longer the right term? . . . . . . . . . . . . 4--6 Gary D. Knott A proposal for certain process management and intercommunication primitives . . . . . . . . . . . . . . . 7--44
Michael J. Spier and Richard L. Hill and Timothy J. Stein and Daniel Bricklin The TYPESET-10 Message Exchange Facility: a case study in systemic design . . . . . . . . . . . . . . . . . 10--18 Gary D. Knott A proposal for certain process management and intercommunication primitives . . . . . . . . . . . . . . . 19--41
Petr Beckmann Book review . . . . . . . . . . . . . . 8--9 National Bureau of Standards and National Science Foundation A preliminary prospectus for a software engineering handbook . . . . . . . . . . 10--13 Anonymous Aims and scope for IEEE Transactions on Software Engineering . . . . . . . . . . 14--15 Philip H. Enslow OSCL (1) activity in Europe . . . . . . 16--17
Butler Lampson Synchronization: Introduction by the session chairman . . . . . . . . . . . . 1--2 Gerald Belpaire Synchronization: Is a synthesis of the problems possible? . . . . . . . . . . . 3--10 Raymond S. Tomlinson Selecting sequence numbers . . . . . . . 11--23 Yogen K. Dalal More on selecting sequence numbers . . . 25--36 Robert C. Chen Representation of process synchronization . . . . . . . . . . . . 37--42 Vinton Cerf Formalisms for interprocess communication . . . . . . . . . . . . . 43--44 Gregor V. Bochmann Communication protocols and error recovery procedures . . . . . . . . . . 45--50 Philip M. Merlin and David J. Farber Recoverability of modular systems . . . 51--56 R. Stockton Gaines Protection . . . . . . . . . . . . . . . 57--58 Gerald J. Popek On data secure computer networks . . . . 59--62 T. C. Chen Interprocess communication systems . . . 63--63 Eric Manning and R. W. Peebles Segment transfer protocols for a homogeneous computer network . . . . . . 65--73 Wesley Chu Performance . . . . . . . . . . . . . . 75--75 John M. McQuillan and David C. Walden Some considerations for a high performance message-based interprocess communication system . . . . . . . . . . 77--86 André A. S. Danthine and Joseph Bremer Communication protocols in a network context . . . . . . . . . . . . . . . . 87--92 Holger Opderbeck On the efficiency of control procedures for computer communication networks . . 93--96
R. R. Brown and J. L. Elshoff and M. R. Ward The GM multiple console time sharing system . . . . . . . . . . . . . . . . . 7--17 R. R. Brown MCTS customer task environment . . . . . 18--42
Richard Y. Kain How to evaluate page replacement algorithms . . . . . . . . . . . . . . . 1--5 E. Sadeh An analysis of the performance of the page fault frequency (PFF) replacement algorithm . . . . . . . . . . . . . . . 6--13 Michael A. Harrison and Walter L. Ruzzo and Jeffrey D. Ullman On protection in operating systems . . . 14--24 Michael D. Schroeder Engineering a security kernel for Multics . . . . . . . . . . . . . . . . 25--32 D. L. Bayer and H. Lycklama MERT --- a multi-environment real-time operating system . . . . . . . . . . . . 33--42 Philippe A. Janson Dynamic linking and environment initialization in a multi-domain process 43--50 J. L. Pruitt and W. W. Case Architecture of a real time operating system . . . . . . . . . . . . . . . . . 51--59 Gregory L. Chesson The network Unix system . . . . . . . . 60--66 E. A. Akkoyunlu and K. Ekanadham and R. V. Huber Some constraints and tradeoffs in the design of network communications . . . . 67--74 B. P. Cosell and P. R. Johnson and J. H. Malman and R. E. Schantz and J. Sussman and R. H. Thomas and D. C. Walden An operational system for computer resource sharing . . . . . . . . . . . . 75--81 J. D. Bagley and E. R. Floto and S. C. Hsieh and V. Watson Sharing data and services in a virtual machine system . . . . . . . . . . . . . 82--88 Gerald Belpaire and Nai-Ting Hsu Formal properties of recursive Virtual Machine architectures . . . . . . . . . 89--96 Gerald J. Popek and Charles S. Kline The PDP-11 virtual machine architecture: A case study . . . . . . . . . . . . . . 97--105 David L. Russell and Thomas H. Bredt Error resynchronization in producer-consumer systems . . . . . . . 106--113 Bruce W. Arden and Alan D. Berenbaum A multi-microprocessor computer system architecture . . . . . . . . . . . . . . 114--121 W. Wulf and R. Levin and C. Pierson Overview of the Hydra Operating System development . . . . . . . . . . . . . . 122--131 R. Levin and E. Cohen and W. Corwin and F. Pollack and W. Wulf Policy/mechanism separation in Hydra . . 132--140 Ellis Cohen and David Jefferson Protection in the Hydra Operating System 141--160 Robert E. Brundage and Alan P. Batson Computational processor demands of Algol-60 programs . . . . . . . . . . . 161--168 K. M. Chandy and P. F. Reynolds Scheduling partially ordered tasks with probabilistic execution times . . . . . 169--177 Shui Lam and Ravi Sethi Analysis of a level algorithm for preemptive scheduling . . . . . . . . . 178--186 E. G. Coffman, Jr. and I. Mitrani Selecting a scheduling rule that meets pre-specified response time demands . . 187--191 Steven B. Lipner A comment on the confinement problem . . 192--196 Anita K. Jones and Richard J. Lipton The enforcement of security policies for computation . . . . . . . . . . . . . . 197--206 Peter J. Denning and Kevin C. Kahn A study of program locality and lifetime functions . . . . . . . . . . . . . . . 207--216 A. K. Agrawala and R. M. Bryant Models of memory scheduling . . . . . . 217--222
James L. Peterson Referee coordination for the fifth Symposium on Operating Systems Principles . . . . . . . . . . . . . . . 7--16 R. R. Brown and J. L. Elshoff and M. R. Ward The GM multiple console time sharing system . . . . . . . . . . . . . . . . . 17--17 James L. Elshoff and Mitchel R. Ward The MCTS operating system . . . . . . . 18--38 Ralph R. Brown MCTS nucleus: philosophy and praxis . . 39--60 Mitchel R. Ward A simple approach to operating system generation and initialization . . . . . 61--71
G. Yuval An operating non-system . . . . . . . . 9--10
E. H. Sibley Economic justification of an OSCL/OSRL 7--15
Philip M. Mills Control functions for a multiprocessor architecture . . . . . . . . . . . . . . 26--40
Allen L. Ambler and Donald I. Good and James C. Browne and Wilhelm F. Burger and Richard M. Cohen and Charles G. Hoch and Robert E. Wells Gypsy: A language for specification and implementation of verifiable programs 1--10 G. J. Popek and J. J. Horning and B. W. Lampson and J. G. Mitchell and R. L. London Notes on the design of Euclid . . . . . 11--18 Charles N. Fischer and Richard J. LeBlanc Efficient implementation and optimization of run-time checking in PASCAL . . . . . . . . . . . . . . . . . 19--24 Allen L. Ambler and Charles G. Hoch A study of protection in programming languages . . . . . . . . . . . . . . . 25--40 Daniel P. Friedman and David S. Wise Aspects of applicative programming for file systems (preliminary version) . . . 41--55 Robert G. Herriot Towards the ideal programming language 56--62 Jhon V. Guttag and Ellis Horowitz and David R. Musser Some extensions to algebraic specifications . . . . . . . . . . . . . 63--67 Normand Buckle Restricted data types, specification and enforcement of invariant properties of variables . . . . . . . . . . . . . . . 68--76 Patrick Causot and Radhia Cousot Static determination of dynamic properties of generalized type unions 77--94 P. M. Melliar-Smith and B. Randell Software reliability: The role of programmed exception handling . . . . . 95--100 M. Donald MacLaren Exception handling in PL/I . . . . . . . 101--104 Tom Love An experimental investigation of the effect of program structure on program understanding . . . . . . . . . . . . . 105--113 Gregory R. Andrews and James R. McGraw Language features for process interaction . . . . . . . . . . . . . . 114--127 D. B. Lomet Process structuring, synchronization, and recovery using atomic actions . . . 128--137 Charles M. Geschke and James H. Morris, Jr. and Edwin H. Satterthwaite Early experience with Mesa . . . . . . . 138--138 Mary Shaw and Wm A. Wulf and Ralph L. London Abstraction and verification in Alphard: Defining and specifying iteration and generators . . . . . . . . . . . . . . . 139--139 Barbara Liskov and Alan Snyder and Russell Atkinson and Craig Schaffert Abstraction mechanisms in CLU . . . . . 140--140 J. D. Gannon An experimental evaluation of data types on programming reliability . . . . . . . 141--141 N. Wirth Towards a discipline of real-time programming . . . . . . . . . . . . . . 142--142
Andrew Lister The problem of nested monitor calls . . 5--7 A. J. Payne A formalised technique for expressing system exercisers . . . . . . . . . . . 8--12
A. J. Gerber Process synchronization by counter variables . . . . . . . . . . . . . . . 6--17 Bruce K. Haddon Nested monitor calls . . . . . . . . . . 18--23
R. M. Needham and R. D. H. Walker The Cambridge CAP computer and its protection system . . . . . . . . . . . 1--10 R. M. Needham and A. D. Birrell The CAP filing system . . . . . . . . . 11--16 R. M. Needham The CAP project --- an interim evaluation . . . . . . . . . . . . . . . 17--22 Forest Baskett and John H. Howard and John T. Montague Task communication in DEMOS . . . . . . 23--31 Michael L. Powell The DEMOS file system . . . . . . . . . 33--42 Michael D. Schroeder and David D. Clark and Jerome H. Saltzer The Multics kernel design project . . . 43--56 R. J. Feiertag and K. N. Levitt and L. Robinson Proving multilevel security of a system design . . . . . . . . . . . . . . . . . 57--65 Clarence A. Ellis Consistency and correctness of duplicate database systems . . . . . . . . . . . . 67--84 Warren A. Montgomery Measurements of sharing in Multics . . . 85--90 David P. Reed and Rajendra K. Kanodia Synchronization with eventcounts and sequencers (extended abstract) . . . . . 91--91 Gene Mcdaniel Metric (extended abstract): A kernel instrumentation system for distributed environments . . . . . . . . . . . . . . 93--99 L. Casey and N. Shelness A domain structure for distributed computer systems . . . . . . . . . . . . 101--108 J. Y. Babonneau and M. S. Achard and G. Morisset and M. B. Mounajjed Automatic and general solution to the adaptation of programs in a paging environment . . . . . . . . . . . . . . 109--116 Takashi Masuda Effect of program localities on memory management strategies . . . . . . . . . 117--124 Dominique Potier Analysis of demand paging policies with swapped working sets . . . . . . . . . . 125--131 Ellis Choen Information transmission in computational systems . . . . . . . . . 133--139 Lawrence Snyder On the synthesis and analysis of protection systems . . . . . . . . . . . 141--150 David L. Russell Process backup in producer-consumer systems . . . . . . . . . . . . . . . . 151--157 Arvind and Kim P. Gostelow and Wil Plouffe Indeterminacy, monitors, and dataflow 159--169 David R. Cheriton and Michael A. Malcolm and Lawrence S. Melen and Gary R. Sager Thoth, a portable real-time operating system (extended abstract) . . . . . . . 171--171 Klaus-Peter Löhr Beyond concurrent Pascal . . . . . . . . 173--180
David L. Parnas The non-problem of nested monitor calls 12--18 Horst Wettstein The problem of nested monitor calls revisited . . . . . . . . . . . . . . . 19--23 A. J. Herbert A new protection architecture for the Cambridge capability computer . . . . . 24--28 D. C. Gilbert Modeling spin locks with queuing networks . . . . . . . . . . . . . . . . 29--42 Jerome H. Saltzer Research problems of decentralized systems with largely autonomous nodes 43--52 C. Mohan Survey of recent operating systems research, designs and implementations 53--89 Bjarne Stroustrup On unifying module interfaces . . . . . 90--98
Anonymous Errata . . . . . . . . . . . . . . . . . 11--11 Jerome H. Saltzer On digital signatures . . . . . . . . . 12--14 F. B. Schneider and A. J. Bernstein Scheduling in Concurrent Pascal . . . . 15--20 M. Joseph and V. R. Prasad More on nested monitor calls . . . . . . 21--25 Douglas Cook The cost of using the CAP computer's protection facilities . . . . . . . . . 26--30 A. D. Birrell and R. M. Needham An asynchronous garbage collector for the CAP filing system . . . . . . . . . 31--33
Dorothy E. Denning A note from your secretary-treasurer . . 2--4 R. Stockton Gaines and Norman Z. Shapiro Some security principles and their application to computer security . . . . 19--28 A. D. Birrell and R. M. Needham Character streams . . . . . . . . . . . 29--31 Richard Miller UNIX: a portable operating system? . . . 32--37 Greg Rose Performance evaluation under Unix and a study of PDP-11 instruction usage . . . 38--45 J. Lions An operating system case study . . . . . 46--53 Jason Gait Easy entry: the password encryption problem . . . . . . . . . . . . . . . . 54--60 Janusz Górski A modular representation of the access control system . . . . . . . . . . . . . 61--77
Dennis Heimbigner Writing device drivers in Concurrent Pascal . . . . . . . . . . . . . . . . . 16--33 K. Ekanadham and A. J. Bernstein Some new transitions in hierarchical level structures . . . . . . . . . . . . 34--38 Alan Jay Smith Bibliography on paging and related topics . . . . . . . . . . . . . . . . . 39--56
Roger M. Needham Adding capability access to conventional file servers . . . . . . . . . . . . . . 3--4 J. L. Keedy On structuring operating systems with monitors . . . . . . . . . . . . . . . . 5--9 K. Hopper and H. J. Kugler and C. Unger Abstract machines modelling network control systems . . . . . . . . . . . . 10--24
Hugh C. Lauer and Roger M. Needham On the duality of operating system structures . . . . . . . . . . . . . . . 3--19 Mike Blasgen and Jim Gray and Mike Mitoma and Tom Price The convoy phenomenon . . . . . . . . . 20--25 Andrew S. Tanenbaum A method for implementing paged, segmented virtual memories on microprogrammable computers . . . . . . 26--32 Glen Newton Deadlock prevention, detection, and resolution: an annotated bibliography 33--44
Dorothy E. Denning A note from your secretary-treasurer . . 1--2 Henrik Maegaard and Aksel Andreasen REPOS: An operating system for the PDP-11 . . . . . . . . . . . . . . . . . 6--11 Jeffrey A. Barnett Garbage collection versus swapping . . . 12--17
B. Hebbard and P. Grosso and T. Baldridge and C. Chan and D. Fishman and P. Goshgarian and T. Hilton and J. Hoshen and K. Hoult and G. Huntley and M. Stolarchuk and L. Warner A penetration analysis of the Michigan Terminal System . . . . . . . . . . . . 7--20 Maurice V. Wilkes and Roger M. Needham The Cambridge Model Distributed System 21--29
Peter J. Denning and T. Don Dennis On minimizing contention at semaphores 9--16 M. V. Wilkes A new hardware capability architecture 17--20 Trevor Turton The management of operating system state data . . . . . . . . . . . . . . . . . . 21--24 N. Natarajan Atomic actions and timestamps . . . . . 25--27 Andrew Klossner A parallel between operating system and human government . . . . . . . . . . . . 28--31
Dorothy E. Denning A note from your secretary-treasurer . . 2--4 Neta Amit and Micha Hofri A simple semaphore-queue management for multiprocessing systems . . . . . . . . 13--15 N. D. Francis Simulation of operating systems: a functional flowchart . . . . . . . . . . 16--21 Charles Hoch and J. C. Browne An implementation of capabilities on the PDP-11/45 . . . . . . . . . . . . . . . 22--32 Anita K. Jones Capability architecture revisited . . . 33--35 Dan Oestreicher and J. I. Strauss A set of efficient semaphoring instructions . . . . . . . . . . . . . . 36--45 W. David Sincoskie and David J. Farber SODS/OS: a distributed operating system for the IBM Series/1 . . . . . . . . . . 46--54 H. Sturgis and J. Mitchell and J. Israel Issues in the design and use of a distributed file system . . . . . . . . 55--69 Sun Zhongxiu and Xie Li and Fei Xianglin and Yi Wenguo and Tan Yaoming An introduction to DJS200/XT1 . . . . . 70--74
G. J. Myers and B. R. S. Buckingham A hardware implementation of capability-based addressing . . . . . . 13--25 Jeremy Dion The Cambridge File Server . . . . . . . 26--35 N. H. Garnett and R. M. Needham An asynchronous garbage collector for the Cambridge File Server . . . . . . . 36--40 Carl Dellar Removing backing store administration from the CAP operating system . . . . . 41--49 H. Wettstein and G. Merbeth The concept of asynchronization . . . . 50--70 Peter J. Denning and Harold S. Stone An exchange of views on operating systems courses . . . . . . . . . . . . 71--82
A. L. Wilkinson and D. H. Anderson and D. P. Chang and Lee Hock Hin and A. J. Mayo and I. T. Viney and R. Williams and W. Wright A penetration analysis of a Burroughs Large System . . . . . . . . . . . . . . 14--25 Brett D. Fleisch An architecture for pup services on a distributed operating system . . . . . . 26--44 Johannes Madsen A computer system supporting data abstraction . . . . . . . . . . . . . . 45--72
Bruce Light Hillsberg Generic terminal support . . . . . . . . 10--15 K. Lunn and K. H. Bennett An algorithm for resource location in a loosely linked distributed computer system . . . . . . . . . . . . . . . . . 16--20 Barton Miller and David Presotto XOS: an operating system for the X-tree architecture . . . . . . . . . . . . . . 21--32 D. C. Lindsay On binding layers of software . . . . . 33--37 Johannes Madsen A computer system supporting data abstraction . . . . . . . . . . . . . . 38--78
Liba Svobodova Performance monitoring in computer systems: a structured approach . . . . . 39--50 Andrew S. Tanenbaum and Sape J. Mullender An overview of the Amoeba distributed operating system . . . . . . . . . . . . 51--64
Gregory R. Andrews A note from your secretary-treasurer . . 1--2 P. A. Janson Using type-extension to organize virtual-memory mechanisms . . . . . . . 6--38 John Sanguinetti The use of the monitor call instruction to implement domain switching in the IBM 370 architecture . . . . . . . . . . . . 55--61 Jean Bacon An approach to distributed software systems . . . . . . . . . . . . . . . . 62--74 Kirk A. Bailey and Lee Boynton and Paul E. McKenney and Gary J. Oliver and Dave Regan User defined files . . . . . . . . . . . 75--84
Arthur Bernstein and Paul K. Harter, Jr. Proving real-time properties of programs with temporal logic . . . . . . . . . . 1--11 J. M. Rushby Design and verification of secure systems . . . . . . . . . . . . . . . . 12--21 Joel F. Bartlett A NonStop kernel . . . . . . . . . . . . 22--29 Hugh C. Lauer Observations on the development of an operating system . . . . . . . . . . . . 30--36 M. Fridrich and W. Older The Felix File Server . . . . . . . . . 37--44 James G. Mitchell and Jeremy Dion A comparison of two network-based file servers . . . . . . . . . . . . . . . . 45--46 Liba Svobodova A reliable object-oriented data repository for a distributed computer system . . . . . . . . . . . . . . . . . 47--58 A. J. Herbert and R. M. Needham Sequencing computation steps in a network . . . . . . . . . . . . . . . . 59--63 Richard F. Rashid and George G. Robertson Accent: A communication oriented network operating system kernel . . . . . . . . 64--75 Alfred Z. Spector Performing remote operations efficiently on a local computer network . . . . . . 76--77 Özalp Babao\uglu and William Joy Converting a swap-based system to do paging in an architecture lacking page-referenced bits . . . . . . . . . . 78--86 Richard W. Carr and John L. Hennessy WSCLOCK---a simple and effective algorithm for virtual memory management 87--95 M. Satyanarayanan A study of file sizes and functional lifetimes . . . . . . . . . . . . . . . 96--108 Matt Bishop Hierarchical Take-Grant Protection systems . . . . . . . . . . . . . . . . 109--122 David K. Gifford Cryptographic sealing for information secrecy and authentication . . . . . . . 123--124 George W. Cox and William M. Corwin and Konrad K. Lai and Fred J. Pollack A unified model and implementation for interprocess communication in a multiprocessor environment . . . . . . . 125--126 Kevin C. Kahn and William M. Corwin and T. Don Dennis and Herman D'Hooge and David E. Hubka and Linda A. Hutchins and John T. Montague and Fred J. Pollack iMAX: A multiprocessor operating system for an object-based computer . . . . . . 127--136 Fred J. Pollack and Kevin C. Kahn and Roy M. Wilkinson The iMAX-432 object filing system . . . 137--147 Edward D. Lazowska and Henry M. Levy and Guy T. Almes and Michael J. Fischer and Robert J. Fowler and Stephen C. Vestal The architecture of the Eden system . . 148--159 G. W. R. Luderer and H. Che and J. P. Haggerty and P. A. Kirslis and W. T. Marshall A distributed UNIX system based on a virtual circuit switch . . . . . . . . . 160--168 G. Popek and B. Walker and J. Chow and D. Edwards and C. Kline and G. Rudisin and G. Thiel LOCUS a network transparent, high reliability distributed system . . . . . 169--177 Andrew D. Birrell and Roy Levin and Roger M. Needham and Michael D. Schroeder Grapevine: An exercise in distributed computing . . . . . . . . . . . . . . . 178--179 Norman Meyrowitz and Margaret Moser BRUWIN: An adaptable design strategy for window manager/virtual terminal systems 180--189
R. C. Holt Tunis: a Unix look-alike written in concurrent Euclid (abstract) . . . . . . 4--5 S. P. Rana Triple-handed dining philosophers . . . 6--9 Richard M. Weatherly and James F. Leathrum Efficient semaphore management using read/modify/write memory cycles . . . . 10--13 S. Tucker Taft An object-based virtual operating system for the Ada programming support environment . . . . . . . . . . . . . . 14--25 D. M. Nessett Identifier protection in a distributed operating system . . . . . . . . . . . . 26--31 James D. Mooney USIM: a user interface manager . . . . . 32--40
H. S. M. Kruijer Processor management in a concurrent Pascal kernel . . . . . . . . . . . . . 7--17 J. M. Adams and A. P. Black On proof rules for monitors . . . . . . 18--27
Krishna Kant and Abraham Silberschatz On the generalized critical region construct . . . . . . . . . . . . . . . 4--16
John H. Howard Reply to \em ``On Proof Rules for Monitors'' . . . . . . . . . . . . . . . 8--9 J. R. Metzner Structuring operating systems literature for the graduate course . . . . . . . . 10--25 Irving L. Traiger Virtual memory management for database systems . . . . . . . . . . . . . . . . 26--48 C. Gray Girling Object representation on a heterogeneous network . . . . . . . . . . . . . . . . 49--59 M. E. Harper Mutual exclusion within both software- and hardware-driven kernel primitives 60--68
Gregory R. Andrews Report to the SIGOPS membership . . . . 2--3 Staff Review of \em ``Probability and statistics with reliability, queueing and computer science applications'' by Kishor S. Trivedi. Prentice-Hall, Englewood-Cliffs, 1982 . . . . . . . . . 9--9 Pearl Brereton Detection and resolution of inconsistencies among distributed replicates of files . . . . . . . . . . 10--15 R. M. Needham and A. J. Herbert and J. G. Mitchell How to connect stable memory to a computer . . . . . . . . . . . . . . . . 16--16 Sandra A. Mamrak and Dennis Leinbaugh and Toby S. Berk A progress report on the Desperanto research project: software support for distributed processing . . . . . . . . . 17--29 Peter Peinl and Andreas Reuter Synchronizing multiple database processes in a tightly coupled multiprocessor environment . . . . . . . 30--37
William M. Waite Reviews of ``\em Medusa, A Distributed Operating System by John K. Ousterhout'', Harold S. Stone, Series Editor. UMI Research Pres, University Microfilms International, Ann Arbor, Michigan, 1981 . . . . . . . . . . . . . 9--10 William M. Waite Reviews of ``\em Probability and Statistics with Reliability, Queueing and Computer Science Applications by Kishor S. Trivedi'', Prentice-Hall, Englewood-Cliffs, 1982 . . . . . . . . . 10--10 Krishna Kant Efficient local checkpointing for software fault tolerance . . . . . . . . 11--13 Brett D. Fleisch Operating systems: a perspective on future trends . . . . . . . . . . . . . 14--17 Alfred Z. Spector and Peter M. Schwarz Transactions: a construct for reliable distributed computing . . . . . . . . . 18--35
Bruce K. Haddon Review of \em ``Technical aspects of data communication'': (second edition) by John E. McNamara. Digital Press, Educational Services, Digital Equipment Corporation, Bedford, Massachusetts, 1982 . . . . . . . . . . . . . . . . . . 7--7 J. L. Tuggle Review of ``Planning for future market events using data processing support by Jerome Svigals.'' Macmillan Inc. 1983 8--8 Jeffrey A. Barnett and Alvin S. Cooperband Priority is a limited property . . . . . 9--9 Ian H. Witten and Graham M. Birtwistle and John Cleary and David R. Hill and Danny Levinson and Greg Lomow and Radford Neal and Murray Peterson and Brian W. Unger and Brian Wyvill Jade: a distributed software prototyping environment . . . . . . . . . . . . . . 10--23 H. Schmutz and P. Silberbusch Working sets and near-optimality . . . . 24--29 Sun Zhongxiu and Zhang Du and Yan Peigen ZCZOS: a distributed operating system for a LSI-11 microcomputer network . . . 30--34 Per Brinch Hansen Using personal computers in operating system courses . . . . . . . . . . . . . 41--44
Dieter Zöbel The Deadlock problem: a classifying bibliography . . . . . . . . . . . . . . 6--15
Bruce G. Lindsay and Laura M. Haas and Paul F. Wilms and Robert A. Yost Computation & communication in R: a distributed database manager . . . . . . 1--2 Andrew D. Birrell and Bruce Jay Nelson Implementing Remote procedure calls . . 3--3 Andrew P. Black An asymmetric stream communication system . . . . . . . . . . . . . . . . . 4--10 Daniel H. Craft Resource management in a decentralized system . . . . . . . . . . . . . . . . . 11--19 Loretta Guarino Reid and Philip L. Karlton A file system supporting cooperation between programs . . . . . . . . . . . . 20--29 C. J. Stephenson New methods for dynamic storage allocation (Fast Fits) . . . . . . . . . 30--32 Butler W. Lampson Hints for computer system design . . . . 33--48 Bruce Walker and Gerald Popek and Robert English and Charles Kline and Greg Thiel The LOCUS distributed operating system 49--70 Erik T. Mueller and Johanna D. Moore and Gerald J. Popek A nested transaction mechanism for LOCUS 71--89 Anita Borg and Jim Baumbach and Sam Glazer A message system supporting fault tolerance . . . . . . . . . . . . . . . 90--99 Michael L. Powell and David L. Presotto Publishing: a reliable broadcast communication mechanism . . . . . . . . 100--109 Michael L. Powell and Barton P. Miller Process migration in DEMOS/MP . . . . . 110--119 M. F. Richardson and R. M. Needham The TRIPOS filing machine, a front end to a file server . . . . . . . . . . . . 120--128 David R. Cheriton and Willy Zwaenepoel The distributed V kernel and its performance for diskless workstations 129--140 Michael D. Schroeder and Andrew D. Birrell and Roger M. Needham Experience with Grapevine (Summary): the growth of a distributed system . . . . . 141--142 Jonathan M. Silverman Reflections on the verification of the security of an operating system kernel 143--154
Krishna M. Kavi and K. Krishnamohan Architecture quality . . . . . . . . . . 11--19 Kenneth Owen Data communications: IFIP's international ``network'' of experts . . 20--26
J. W. Atwood Use of Tunis in an operating systems design course . . . . . . . . . . . . . 6--7 Michael Stonebraker Virtual memory transaction management 8--16
Bruce K. Haddon Book review of ``Security, IFIP/Sec'83: proceedings of the first security conference'' North-Holland Publishing Co. 1983 . . . . . . . . . . . . . . . . 14--14 John R. Sopka National parallel processing research council executive committee charter . . 25--27 Francis C. M. Lau Two-part names and process termination 28--30 Richard LeRoy Routh A proposal for an architectural approach which apparently solves all known software-based internal computer security problems . . . . . . . . . . . 31--39
Swamy Kutti Why a distributed kernel? . . . . . . . 5--11 David R. Cheriton An experiment using registers for fast message-based interprocess communication 12--20
David C. M. Wood Review of ``VAX/VMS Internals and Data Structures by Lawrence J. Kenah and Simon F. Bate'', Digital Press, Educational Services, Digital Equipment Corporation, Bedford, Massachusetts (1984), ISBN 0-932376-52-5. . . . . . . 5--5 Michael Stonebraker and Deborah DuBourdieux and William Edwards Problems in supporting data base transactions in an operating system transaction manager . . . . . . . . . . 6--14 Anna Hac Distributed file systems --- a survey 15--18 William E. Weihl Data-dependent concurrency control and recovery . . . . . . . . . . . . . . . . 19--31 J. E. Allchin and M. S. McKendry Synchronization and recovery of actions 32--45 Arun Lakhotia Implication and equivalence I/O . . . . 46--52 Kamaljit Singh On improvements to password security . . 53--60
Kevin C. Kahn Financial report to the SIGOPS membership . . . . . . . . . . . . . . . 2--2 C. Mohan and B. Lindsay Efficient commit protocols for the tree of processes model of distributed transactions . . . . . . . . . . . . . . 40--52 Nissim Francez and Brent Hailpern Script: a communication abstraction mechanism . . . . . . . . . . . . . . . 53--67
C. K. Yuen On programs, tasks and processes . . . . 7--8 Keith Loepere Resolving covert channels within a B2 class secure system . . . . . . . . . . 9--28 C. Mohan and R. Strong and S. Finkelstein Method for distributed transaction commit and recovery using Byzantine Agreement within clusters of processors 29--43 Keith Marzullo and Susan Owicki Maintaining the time in a distributed system . . . . . . . . . . . . . . . . . 44--54 Lindsey L. Spratt The transaction resolution journal: extending the before journal . . . . . . 55--62
Bruce K. Haddon Review of \em ``Information systems design methodologies: a feature analysis''. Edited by T. W. Olle, H. G. Sol, and C. J. Tully. North-Holland Publishing Co. 1983 . . . . . . . . . . 4--5 Norman Hardy KeyKOS architecture . . . . . . . . . . 8--25 David R. Cheriton Preliminary thoughts on problem-oriented shared memory: a decentralized approach to distributed systems . . . . . . . . . 26--33 Leslie Lamport Solved problems, unsolved problems and non-problems in concurrency . . . . . . 34--44 Jonathan Kepecs and Marvin Solomon SODA: a simplified operating system for distributed applications . . . . . . . . 45--56
Nancy P. Kronenberg and Henry M. Levy and William D. Strecker VAXclusters (extended abstract): a closely-coupled distributed system . . . 1--1 Marvin M. Theimer and Keith A. Lantz and David R. Cheriton Preemptable remote execution facilities for the V-system . . . . . . . . . . . . 2--12 Robert Fitzgerald and Richard F. Rashid The integration of virtual memory management and interprocess communication in accent (abstract only) 13--14 John K. Ousterhout and Hervé Da Costa and David Harrison and John A. Kunze and Mike Kupfer and James G. Thompson A trace-driven analysis of the UNIX 4.2 BSD file system . . . . . . . . . . . . 15--24 Michael D. Schroeder and David K. Gifford and Roger M. Needham A caching file system for a programmer's workstation . . . . . . . . . . . . . . 25--34 M. Satyanarayanan and John H. Howard and David A. Nichols and Robert N. Sidebotham and Alfred Z. Spector and Michael J. West The ITC distributed file system: principles and design . . . . . . . . . 35--50 Sape J. Mullender and Andrew S. Tanenbaum A distributed file service based on optimistic concurrency control . . . . . 51--62 Eric C. Cooper Replicated distributed programs . . . . 63--78 Kenneth P. Birman Replication and fault-tolerance in the ISIS system . . . . . . . . . . . . . . 79--86 Dan\vco Dav\vcev and Walter A. Burkhard Consistency and recovery control for replicated files . . . . . . . . . . . . 87--96 Mohammad Malkawi and Janek Patel Compiler directed memory management policy for numerical programs . . . . . 97--106 Steve Reinhardt A data-flow approach to multitasking on CRAY X-MP computers . . . . . . . . . . 107--114 Matthew J. Weinstein and Thomas W. Page, Jr. and Brian K. Livezey and Gerald J. Popek Transactions and synchronization in a distributed operating system . . . . . . 115--126 Alfred Z. Spector and Dean Daniels and Daniel Duchamp and Jeffrey L. Eppinger and Randy Pausch Distributed transactions for reliable systems . . . . . . . . . . . . . . . . 127--146 Brian M. Oki and Barbara H. Liskov and Robert W. Scheifler Reliable object storage to support atomic actions . . . . . . . . . . . . . 147--159 Nicholas Carriero and David Gelernter The S/Net's Linda kernel (extended abstract) . . . . . . . . . . . . . . . 160--160 David K. Gifford and Robert W. Baldwin and Stephen T. Berlin and John M. Lucassen An architecture for large scale information systems . . . . . . . . . . 161--170 David D. Clark The structuring of systems using upcalls 171--180 Andrew P. Black Supporting distributed applications: experience with Eden . . . . . . . . . . 181--193
Anonymous Financial Report . . . . . . . . . . . . 4--4 Harold Lorin An expanded approach to objects . . . . 6--11 P. Singleton and K. H. Bennett and O. P. Brereton A single model for files and processes 12--18 M. Ancona and A. Clematis and V. Gianuzzi Interfacing user processes and kernel in high level language . . . . . . . . . . 19--23 Alfred Z. Spector and Dean Daniels An algorithm for replicated directories 24--43 Eric C. Cooper Replicated procedure call . . . . . . . 44--56 Gene T. J. Wuu and Arthur J. Bernstein Efficient solutions to the replicated log and dictionary problems . . . . . . 57--66
Joanne L. Waite Book Review: \em A Handbook of Software Development and Operating Procedures for Micro computers by Paul Holliday (Macmillan Publishing Company 1985) . . 6--7 S. J. Pratt The alchemy model: a model for homogeneous and heterogeneous distributed computing system . . . . . . 25--37 Jeffrey A. Brumfield A Guide To Operating Systems Literature 38--42 Keith A. Lantz and Judy L. Edighoffer and Bruce L. Hitson Towards a universal directory service 43--53 Sape J. Mullender and Paul M. B. Vitanyi Distributed match-making for processes in computer networks . . . . . . . . . . 54--64
Robert Sansom Book Review: \em Computer Security: A Global Challenge --- Proceedings of the Second IFIP International Conference on Computer Security, IFIP/Sec'84, Toronto, Ontario, Canada, 10--12 September, 1984: (Elsevier Science Publishing Co. 1984) 9--9 Leslie Lamport and P. M. Melliar Smith Byzantine clock synchronization . . . . 10--16 David Cheung and Tiko Kameda Site optimal termination protocols for a distributed database under network partitioning . . . . . . . . . . . . . . 17--27 I. Rattan and L. P. S. Singh On table fragmentation in virtual memory management . . . . . . . . . . . . . . . 28--30 Maurice Herlihy Comparing how atomicity mechanisms support replication . . . . . . . . . . 31--39
Du Zhang and Meiliu Lu Process name resolution in fault-intolerant CSP programs . . . . . 9--15 Amos O. Olagunju and Elvis Borders Emulators; prospective instruments for instruction in systems programming . . . 16--24
Thomas F. Litant Book Review: \em Computer Security: the Practical Issues in a Troubled World, (Elsevier Science Publishers, Amsterdam 1985) . . . . . . . . . . . . . . . . . 3--5 R. M. Needham and M. D. Schroeder Authentication revisited . . . . . . . . 7--7 Dave Otway and Owen Rees Efficient and timely mutual authentication . . . . . . . . . . . . . 8--10 John R. Nicol and Gordon S. Blair and Jonathan Walpole Operating system design: towards a holistic approach? . . . . . . . . . . . 11--19 Andrew S. Tanenbaum A UNIX clone with source code for operating systems courses . . . . . . . 20--29 G. R. Guenther Running 7th edition UNIX programs on a VAX in compatibility mode . . . . . . . 30--33 I. Rattan Memory management units for microcomputer operating systems . . . . 34--38 Rogert G. Ruckert and John D. Dean Launching a successful CPME program in a multi-vendor environment . . . . . . . . 39--48 Sape Mullender Report on the Second European SIGOPS Workshop ``Making Distributed Systems Work'' . . . . . . . . . . . . . . . . . 49--84
Sten F. Andler Financial report . . . . . . . . . . . . 3--4 Martin Turnbull Support for heterogeneity in the global distributed operating system . . . . . . 11--22 S. J. Pratt Catastrophe theory: its application in operating system design . . . . . . . . 23--32 Maurice Herlihy Optimistic concurrency control for abstract data types . . . . . . . . . . 33--44
Robert L. Gordon Window management, graphics, and operating systems . . . . . . . . . . . 5--8 Roy Campbell and Garry Johnston and Vincent Russo Choices (class hierarchical open interface for custom embedded systems) 9--17 Charles H. Sauer and Don W. Johnson and Larry K. Loucks and Amal A. Shaheen-Gouda and Todd A. Smith RT PC distributed services overview . . 18--29 Timothy V. Fossum PC-XINU features and installation . . . 30--33
Niklaus Wirth Hardware architectures for programming languages and programming languages for hardware architectures . . . . . . . . . 2--8 Bob Beck and Bob Kasten and Shreekant Thakkar VLSI assist for a multiprocessor . . . . 10--20 Roberto Bisiani and Alessandro Forin Architectural support for multilanguage parallel programming on heterogeneous systems . . . . . . . . . . . . . . . . 21--30 Richard Rashid and Avadis Tevanian and Michael Young and David Golub and Robert Baron Machine-independent virtual memory management for paged uniprocessor and multiprocessor architectures . . . . . . 31--39 John R. Hayes and Martin E. Fraeman and Robert L. Williams and Thomas Zaremba An architecture for the direct execution of the Forth programming language . . . 42--49 Peter Steenkiste and John Hennessy Tags and type checking in LISP: hardware and software approaches . . . . . . . . 50--59 Jack W. Davidson and Richard A. Vaughan The effect of instruction set complexity on program size and memory performance 60--64 Russell R. Atkinson and Edward M. McCreight The dragon processor . . . . . . . . . . 65--69 James R. Goodman Coherency for multiprocessor virtual address caches . . . . . . . . . . . . . 72--81 T. A. Cargill and B. N. Locanthi Cheap hardware support for software debugging and profiling . . . . . . . . 82--83 C. J. Georgiou and S. L. Palmer and P. L. Rosenfeld An experimental coprocessor for implementing persistent objects on an IBM 4381 . . . . . . . . . . . . . . . . 84--87 Daniel J. Magenheimer and Liz Peters and Karl Pettis and Dan Zuras Integer multiplication and division on the HP precision architecture . . . . . 90--99 David W. Wall and Michael L. Powell The Mahler experience: using an intermediate language as the machine description . . . . . . . . . . . . . . 100--104 Shlomo Weiss and James E. Smith A study of scalar compilation techniques for pipelined supercomputers . . . . . . 105--109 William R. Bush and A. Dain Samples and David Ungar and Paul N. Hilfinger Compiling Smalltalk-80 to a RISC . . . . 112--116 F. Chow and S. Correll and M. Himelstein and E. Killian and L. Weber How many addressing modes are enough? 117--121 Henry Massalin Superoptimizer: a look at the smallest program . . . . . . . . . . . . . . . . 122--126 Kazuo Taki and Katzuto Nakajima and Hiroshi Nakashima and Morihiro Ikeda Performance and architectural evaluation of the PSI machine . . . . . . . . . . . 128--135 Gaetano Borriello and Andrew R. Cherenson and Peter B. Danzig and Michael N. Nelson RISCs vs. CISCs for Prolog: a case study 136--145 Richard B. Kieburtz A RISC architecture for symbolic computation . . . . . . . . . . . . . . 146--155 David R. Ditzel and Hubert R. McLellan and Alan D. Berenbaum Design tradeoffs to support the C programming language in the CRISP microprocessor . . . . . . . . . . . . . 158--163 Charles P. Thacker and Lawrence C. Stewart Firefly: a multiprocessor workstation 164--172 Douglas W. Clark Pipelining and performance in the VAX 8800 processor . . . . . . . . . . . . . 173--177 Robert P. Colwell and Robert P. Nix and John J. O'Donnell and David B. Papworth and Paul K. Rodman A VLIW architecture for a trace scheduling compiler . . . . . . . . . . 180--192 Adam Levinthal and Pat Hanrahan and Mike Paquette and Jim Lawson Parallel computers for graphics applications . . . . . . . . . . . . . . 193--198 J. E. Smith and G. E. Dermer and B. D. Vanderwarn and S. D. Klinger and C. M. Rozewski The ZS-1 central processor . . . . . . . 199--204
J. Howard and M. Kazar and S. Menees and D. Nichols and M. Satyanarayanan and Robert N. Sidebotham and M. West Scale and performance in a distributed file system . . . . . . . . . . . . . . 1--2 M. Nelson and B. Welch and J. Ousterhout Caching in the Sprite network file system . . . . . . . . . . . . . . . . . 3--4 D. Nichols Using idle workstations in a shared computing environment . . . . . . . . . 5--12 E. Zayas Attacking the process migration bottleneck . . . . . . . . . . . . . . . 13--24 G. Varghese and T. Lauck Hashed and hierarchical timing wheels: data structures for the efficient implementation of a timer facility . . . 25--38 J. Mogul and R. Rashid and M. Accetta The packer filter: an efficient mechanism for user-level network code 39--51 M. Schwartz and J. Zahorjan and D. Notkin A name service for evolving heterogeneous systems . . . . . . . . . 52--62 M. Young and A. Tevanian and R. Rashid and D. Golub and J. Eppinger The duality of memory and communication in the implementation of a multiprocessor operating system . . . . 63--76 D. Jefferson and B. Beckman and F. Wieland and L. Blume and M. Diloreto Distributed Simulation and the Time Warp Operating System . . . . . . . . . . . . 77--93 A. Birrell and J. Guttag and J. Horning and R. Levin Synchronization primitives for a multiprocessor: a formal specification 94--102 D. Terry and D. Swinehart Managing stored voice in the Etherphone system . . . . . . . . . . . . . . . . . 103--104 E. Jul and H. Levy and N. Hutchinson and A. Black Fine-grained mobility in the emerald system . . . . . . . . . . . . . . . . . 105--106 R. Haskin and Y. Malachi and W. Sawdon and G. Chan Recovery management in QuickSilver . . . 107--108 A. Chang and M. Mergen 801 Storage: architecture and programming . . . . . . . . . . . . . . 109--110 B. Liskov and D. Curtis and P. Johnson and R. Scheifer Implementation of Argus . . . . . . . . 111--122 K. Birman and T. Joseph Exploiting virtual synchrony in distributed systems . . . . . . . . . . 123--138 R. Finlayson and D. Cheriton Log files: an extended file service exploiting write-once storage . . . . . 139--148 A. Birrell and M. Jones and E. Wobber A simple and efficient implementation of a small database . . . . . . . . . . . . 149--154 R. Hagmann Reimplementing the Cedar file system using logging and group commit . . . . . 155--162
Alan Demers and Dan Greene and Carl Houser and Wes Irish and John Larson and Scott Shenker and Howard Sturgis and Dan Swinehart and Doug Terry Epidemic algorithms for replicated database maintenance . . . . . . . . . . 8--32 R. C. Holt Device management in TURNING PLUS . . . 33--41 Ami Litman The DUNIX distributed operating system 42--51 Dieter Zöbel and Christoph Koch Resolution techniques and complexity results with deadlocks: a classifying and annotated bibliography . . . . . . . 52--72 Neil W. Rickert Non-Byzantine clock synchronization---a programming experiment . . . . . . . . . 73--78
Daniel A. Cañas and Laura M. Esquivel Portability and the UNIX operating system . . . . . . . . . . . . . . . . . 6--23 Zhongxiu Sun and Xing Xue and Jianqiang Zhou and Peigen Yang and Xihao Xu Developing a heterogeneous distributed operating system . . . . . . . . . . . . 24--31 David L. Harris An input/output subsystem for the Hawk operating system kernel . . . . . . . . 32--44 Stephen Russell Single-user capabilities in interprocess communication . . . . . . . . . . . . . 45--52 Leszek Kotulski Comments on implementation of P and V primitives with help of binary semaphores . . . . . . . . . . . . . . . 53--59 S. Haldar and D. Subramanian An efficient solution to the mutual exclusion problem using unfair and weak semaphore . . . . . . . . . . . . . . . 60--66
Carole B. Hogan Protection imperfect: the security of some computing environments . . . . . . 7--27 Jonathan M. Smith A survey of process migration mechanisms 28--40 Anthony J. Dos Reis A note on Ben-Ari's concurrent programming system . . . . . . . . . . . 41--42 David Hemmendinger A correct implementation of general semaphores . . . . . . . . . . . . . . . 42--44
Hank Levy SIGOPS Financial Report August 1, 1988 1--2 Grant R. Guenther Extended control services in operating system interfaces . . . . . . . . . . . 20--24 Robbert van Renesse and Hans van Staveren and Andrew S. Tanenbaum Performance of the world's fastest distributed operating system . . . . . . 25--34 Codie Wells A Note on ``Protection Imperfect'' . . . 35--35 Norm Hardy and Norman Hardy The Confused Deputy: (or why capabilities might have been invented) 36--38 H. Wedekind Ubiquity and need-to-know: two principles of data distribution . . . . 39--45 Phil Kearns A correct and unrestrictive implementation of general semaphores . . 46--48
David Hemmendinger Comments on ``A Correct and Unrestrictive Implementation of General Semaphores'' . . . . . . . . . . . . . . 7--8 C. Samuel Hsieh Further comments on implementation of general semaphores . . . . . . . . . . . 9--10 John Ousterhout and Fred Douglis Beating the I/O bottleneck: a case for log-structured file systems . . . . . . 11--28
J. Kent Peacock Deadlock avoidance in loosely-coupled multiprocessors with finite buffer pools 20--24 Bruno Braban and Peter Schlenk A well structured parallel file system for PM . . . . . . . . . . . . . . . . . 25--38 Keith Loepere The covert channel limiter revisited . . 39--44 T. F. Leibfried A deadlock detection and recovery algorithm using the formalism of a directed graph matrix . . . . . . . . . 45--55 Li Gong On security in capability-based systems 56--60
W. Shih and J. S. W. Liu and J. Chung and D. W. Gillies Scheduling tasks with ready times and deadlines to minimize average error . . 14--28 H. Tokuda and C. W. Mercer ARTS: a distributed real-time kernel . . 29--53 J. A. Stankovic and K. Ramamritham The Spring kernel: a new paradigm for real-time operating systems . . . . . . 54--71 D. D. Kandlur and D. L. Kiskis and K. G. Shin HARTOS: a distributed real-time operating system . . . . . . . . . . . . 72--89 S. Levi and S. K. Tripathi and S. D. Carson and A. K. Agrawala The MARUTI hard real-time operating system . . . . . . . . . . . . . . . . . 90--105 P. Gopinath and K. Schwan CHAOS: why one cannot have only an operating system for real-time applications . . . . . . . . . . . . . . 106--125 H. F. Wedde and G. S. Alijani and W. G. Brown and S. Chen and G. Kang Operating system support for adaptive distributed real-time systems in DRAGON SLAYER . . . . . . . . . . . . . . . . . 126--140 A. Damm and J. Reisinger and W. Schwabl and H. Kopetz The real-time operating system of MARS 141--157 V. P. Holmes and D. L. Harris A designer's perspective of the Hawk multiprocessor operating system kernel 158--172
Charles R. Landau Security in a secure capability-based system . . . . . . . . . . . . . . . . . 2--4 M. Frans Kaashoek and A. S. Tanenbaum and S. F. Hummel An efficient reliable broadcast protocol 5--19 S. T. Chanson and G. W. Neufeld and L. Liang A bibliography on multicast and group communications . . . . . . . . . . . . . 20--25 Walter G. Piotrowski Are file names enough? . . . . . . . . . 26--27 B. C. Neuman The need for closure in large distributed systems . . . . . . . . . . 28--30 June Power Distributed system evolution-some observations . . . . . . . . . . . . . . 31--32 J. H. Emck and J. H. Voskamp and A. J. van der Wal EPEP: an operating system designed for experiment-control . . . . . . . . . . . 33--44 Borko Furht and J. Parker and D. Grostick Performance of REAL/IX$^{TM}$-fully preemptive real time UNIX . . . . . . . 45--52
M. Burrows and M. Abadi and R. Needham A logic of authentication . . . . . . . 1--13 T. Lomas and L. Gong and J. Saltzer and R. Needhamn Reducing risks from poorly chosen keys 14--18 W. Bolosky and R. Fitzgerald and M. Scott Simple but effective techniques for NUMA memory management . . . . . . . . . . . 19--31 A. Cox and R. Fowler The implementation of a coherent memory abstraction on a NUMA multiprocessor: experiences with platinum . . . . . . . 32--44 V. Srinivasan and J. Mogul Spritely NFS: experiments with cache-consistency protocols . . . . . . 44--57 D. Edwards and M. Mckendry Exploiting read-mostly workloads in the FileNet file system . . . . . . . . . . 58--70 A. Braunstein and M. Riley and J. Wilkes Improving the efficiency of UNIX buffer caches . . . . . . . . . . . . . . . . . 71--82 M. Schroeder and M. Burrows Performance of Firefly RPC . . . . . . . 83--90 L. Peterson and N. Hutchinson and S. O'Malley and M. Abbott RPC in the x-Kernel: evaluating new design techniques . . . . . . . . . . . 91--101 B. Bershad and T. Anderson and E. Lazowska and H. Levy Lightweight remote procedure call . . . 102--113 M. Weiser and A. Demers and C. Hauser The portable common runtime approach to interoperability . . . . . . . . . . . . 114--122 E. Abrossimov and M. Rozier and M. Shapiro Generic virtual memory management for operating system kernels . . . . . . . . 123--136 B. Rosenburg Low-synchronization translation lookaside buffer consistency in large-scale shared-memory multiprocessors . . . . . . . . . . . . 137--146 J. Chase and F. Amador and E. Lazowska and H. Levy and R. Littlefield The Amber system: parallel programming on a network of multiprocessors . . . . 147--158 A. Tucker and A. Gupta Process control and scheduling issues for multiprogrammed shared-memory multiprocessors . . . . . . . . . . . . 159--166 R. Barkley and T. Lee A lazy buddy system bounded by two coalescing delays . . . . . . . . . . . 167--176 D. Duchamp Analysis of transaction management performance . . . . . . . . . . . . . . 177--190 H. Massalin and C. Pu Threads and input/output in the synthesis kernel . . . . . . . . . . . . 191--201 C. Gray and D. Cheriton Leases: an efficient fault-tolerant mechanism for distributed file cache consistency . . . . . . . . . . . . . . 202--210 B. Fleisch and G. Popek Mirage: a coherent distributed shared memory design . . . . . . . . . . . . . 211--223
Rajan G. Chandras Distributed message passing operating systems . . . . . . . . . . . . . . . . 7--17 Micha Hofri Proof of a mutual exclusion algorithm---a classic example . . . . . 18--22 Peter B. Danzig and Stephen Melvin High resolution timing with low resolution clocks and microsecond resolution timer for Sun workstations 23--26 Özalp Babao\uglu Fault-tolerant computing based on Mach 27--39 Pankaj Jalote and Satish K. Tripathi Workshop on integrated approach for fault tolerance-current state and future requirements . . . . . . . . . . . . . . 40--57 Mark J. Lorence and M. Satyanarayanan IPwatch: a tool for monitoring network locality . . . . . . . . . . . . . . . . 58--80
Chuck Koelbel and Gene Spafford and George Leach Workshop on experiences with building distributed and multiprocessor systems 2--6 Christopher Burdorf and Jed Marti Non-preemptive time warp scheduling algorithms . . . . . . . . . . . . . . . 7--18 Andy Hopper Pandora --- an experimental system for multimedia applications . . . . . . . . 19--34 Dan M. Nessett A critique of the Burrows, Abadi and Needham logic . . . . . . . . . . . . . 35--38 Michael Burrows and Martín Abadi and Roger Needham Rejoinder to Nessett . . . . . . . . . . 39--40 Bob Beck AAMP: a multiprocessor approach for operating system and application migration . . . . . . . . . . . . . . . 41--55 Roger Oliver Protection in a distributed document processing system . . . . . . . . . . . 56--65 Joseph W. Seigh A distributed solution to the reader--writer problem . . . . . . . . . 66--68
Hank Levy New SIGOPS dues structure . . . . . . . 1--1 Luis-Felipe Cabrera Technical summary of the second IEEE workshop on workstation operating systems . . . . . . . . . . . . . . . . 7--21 Vadim G. Antonov A regular architecture for operating system . . . . . . . . . . . . . . . . . 22--39 Ming-Chit Tam and Jonathan M. Smith and David J. Farber A taxonomy-based comparison of several distributed shared memory systems . . . 40--67 B. H. Tay and A. L. Ananda A survey of remote procedure calls . . . 68--79
Andrzej Goscinski and Mirion Bearman Resource management in large distributed systems . . . . . . . . . . . . . . . . 7--25 Chen Jun and Xie Li and Sun Zhong-xiu A model for intelligent task scheduling in a large distributed system . . . . . 26--33 Zhao Hong and Wayne McCoy An associated object model for distributed systems . . . . . . . . . . 34--51 Frank W. Miller Predictive deadline multi-processing . . 52--63 Don Davis and Ralph Swick Network security via private-key certificates . . . . . . . . . . . . . . 64--67 H. Ghosh and S. Sreedhar A comparative study of two simple network file access models . . . . . . . 68--77 Tai-Kuo Woo A note on Lamport's mutual exclusion algorithm . . . . . . . . . . . . . . . 78--80
S. Haldar and D. K. Subramanian Fairness in processor scheduling in time sharing systems . . . . . . . . . . . . 4--18 Özalp Babao\uglu Report on the fourth ACM SIGOPS European workshop fault tolerance support in distributed systems . . . . . . . . . . 19--43 Keith Marzullo and Mark Wood Making real-time reactive systems reliable . . . . . . . . . . . . . . . . 45--48 Rivka Ladin and Barbara Liskov and Liuba Shrira Lazy replication: exploiting the semantics of distributed services (extended abstract) . . . . . . . . . . 49--55 John Wilkes and Raymie Stata Specifying data availability in multi-device file systems . . . . . . . 56--59 Barbara Liskov and Robert Gruber and Paul Johnson and Liuba Shrira A replicated Unix file system (extended abstract) . . . . . . . . . . . . . . . 60--64 Dean Daniels and Roger Haskin and Jon Reinke and Wayne Sawdon Shared logging services for fault-tolerant distributed computing . . 65--68 M. Banâtre and Ph. Joubert and Ch. Morin and G. Muller and B. Rochat and P. Sanchez Stable transactional memories and fault tolerant architectures . . . . . . . . . 68--72 Andrew P. Black Understanding transactions in the operating system context . . . . . . . . 73--76 James Jay Kistler and M. Satyanarayanan Transparent disconnected operation for fault-tolerance . . . . . . . . . . . . 77--80 Jerome H. Saltzer Fault-tolerance in very large archival systems . . . . . . . . . . . . . . . . 81--82 Andrew Birrell Position paper for SIGOPS workshop on fault tolerance support in distributed systems . . . . . . . . . . . . . . . . 83--84
Maria D. Maggio and David W. Krumme A flexible system call interface for interprocessor communication in a distributed memory multicomputer . . . . 4--21 Yasuhiko Yokote and Fumio Teraoka and Atsushi Mitsuzawa and Nobuhisa Fujinami and Mario Tokoro The muse object architecture: a new operating system structuring concept . . 22--46 Michel Raynal A simple taxonomy for distributed mutual exclusion algorithms . . . . . . . . . . 47--50 Jochen Liedtke and Ulrich Bartling and Uwe Beyer and Dietmar Heinrichs and Rudolf Ruland and Gyula Szalay Two years of experience with a $\mu$-kernel based OS . . . . . . . . . 51--62 Jonathan D. Moffett and Morris S. Sloman Content-dependent access control . . . . 63--70 M. Frans Kaashoek and Andrew S. Tanenbaum Fault tolerance using group communication . . . . . . . . . . . . . 71--74 Pat Stephenson and Kenneth Birman Fast causal multicast . . . . . . . . . 75--79 G. Le Lann and G. Bres Reliable atomic broadcast in distributed systems with omission faults . . . . . . 80--86 Pascale Minet and Emmanuelle Anceaume Atomic broadcast in one phase . . . . . 87--90 David F. Bacon Transparent recovery in distributed systems (position paper) . . . . . . . . 91--94 Mary Baker and John Ousterhout Availability in the Sprite distributed file system . . . . . . . . . . . . . . 95--98 David B. Johnson and Willy Zwaenepoel Transparent optimistic rollback recovery 99--102 Kenneth Birman and Robert Cooper The ISIS project: real experience with a fault tolerant programming system . . . 103--107 Liam Casey Lessons from Norstar's distributed call processing system . . . . . . . . . . . 108--111 Gita Gopal and Nancy D. Griffeth Software fault tolerance in telecommunications systems . . . . . . . 112--116 Flaviu Cristian Fault-Tolerance in the Advanced Automation System . . . . . . . . . . . 117--121 Daniel L. McCue and Santosh K. Shrivastava Structuring fault-tolerant object systems for portability . . . . . . . . 118--121 David Powell and Marc Chér\`eque and David Drackley Fault-tolerance in Delta-4 . . . . . . . 122--125 J. Nehmer and T. Becker A fault tolerance approach for distributed ISDN control systems . . . . 126--129 Brendan Tangney and Vinny Cahill and Chris Horn and Dominic Herity and Alan Judge and Gradimir Starovic and Mark Sheppard Some ideas on support for fault tolerance in COMANDOS, an object oriented distributed system . . . . . . 130--135
Andrew Wolfe and John P. Shen A variable instruction stream extension to the VLIW architecture . . . . . . . . 2--14 Manolis Katevenis and Nestoras Tzartzanis Reducing the branch penalty by rearranging instructions in a double-width memory . . . . . . . . . . 15--27 Roland L. Lee and Alex Y. Kwok and Fayé A. Briggs The floating-point performance of a superscalar SPARC processor . . . . . . 28--37 David Callahan and Ken Kennedy and Allan Porterfield Software prefetching . . . . . . . . . . 40--52 Gurindar S. Sohi and Manoj Franklin High-bandwidth data memory systems for superscalar processors . . . . . . . . . 53--62 Monica D. Lam and Edward E. Rothberg and Michael E. Wolf The cache performance and optimizations of blocked algorithms . . . . . . . . . 63--74 Jeffrey C. Mogul and Anita Borg The effect of context switches on cache performance . . . . . . . . . . . . . . 75--84 David Keppel A portable interface for on-the-fly instruction space modification . . . . . 86--95 Andrew W. Appel and Kai Li Virtual memory primitives for user programs . . . . . . . . . . . . . . . . 96--107 Thomas E. Anderson and Henry M. Levy and Brian N. Bershad and Edward D. Lazowska The interaction of architecture and operating system design . . . . . . . . 108--120 David G. Bradlee and Susan J. Eggers and Robert R. Henry Integrating register allocation and instruction scheduling for RISCs . . . . 122--131 Manuel E. Benitez and Jack W. Davidson Code generation for streaming: an access/execute mechanism . . . . . . . . 132--141 Rajive Bagrodia and Sharad Mathur Efficient implementation of high-level parallel programs . . . . . . . . . . . 142--151 William Mangione-Smith and Santosh G. Abraham and Edward S. Davidson Vector register design for polycyclic vector scheduling . . . . . . . . . . . 154--163 David E. Culler and Anurag Sah and Klaus E. Schauser and Thorsten von Eicken and John Wawrzynek Fine-grain parallelism with minimal hardware support: a compiler-controlled threaded abstract machine . . . . . . . 164--175 David W. Wall Limits of instruction-level parallelism 176--188 Edward K. Lee and Randy H. Katz Performance consequences of parity placement in disk arrays . . . . . . . . 190--199 Vincent Cate and Thomas Gross Combining the concepts of compression and caching for a two-level filesystem 200--211 William J. Bolosky and Michael L. Scott and Robert P. Fitzgerald and Robert J. Fowler and Alan L. Cox NUMA policies and their relation to memory architecture . . . . . . . . . . 212--221 David Chaiken and John Kubiatowicz and Anant Agarwal LimitLESS directories: A scalable cache coherence scheme . . . . . . . . . . . . 224--234 Sang L. Min and Jong-Deok Choi An efficient cache-based access anomaly detection scheme . . . . . . . . . . . . 235--244 Kourosh Gharachorloo and Anoop Gupta and John Hennessy Performance evaluation of memory consistency models for shared-memory multiprocessors . . . . . . . . . . . . 245--257 Eric Freudenthal and Allan Gottlieb Process coordination with fetch-and-increment . . . . . . . . . . 260--268 John M. Mellor-Crummey and Michael L. Scott Synchronization without contention . . . 269--278 Douglas Johnson The case for a read barrier . . . . . . 279--287 Robert F. Cmelik and Shing I. Kong and David R. Ditzel and Edmund J. Kelly An analysis of MIPS and SPARC instruction set utilization on the SPEC benchmarks . . . . . . . . . . . . . . . 290--302 C. Brian Hall and Kevin O'Brien Performance characteristics of architectural features of the IBM RISC System/6000 . . . . . . . . . . . . . . 303--309 Dileep Bhandarkar and Douglas W. Clark Performance from architecture: comparing a RISC and a CISC with similar hardware organization . . . . . . . . . . . . . . 310--319
David B. Wagner and Carl Ponder Book Review: \em The Art of Computer Systems Performance Analysis by Raj Jain: (John Wiley and Sons, Inc., New York 1991) . . . . . . . . . . . . . . . 7--9 Garbriel Broner and Patrick Powell Intelligent I/O rule-based input/output processing for operating systems . . . . 10--26 Neil Dunstan Semaphores for fair scheduling monitor conditions . . . . . . . . . . . . . . . 27--31 G. Aguirre and M. Errecalde and R. Guerrero and C. Kavka and G. Leguizamon and M. Printista and R. Gallard Experiencing Minix as a didactical aid for operating systems courses . . . . . 32--39
Allison J. Mull and P. Tobin Maginnis Evolutionary steps toward a distributed operating system: theory and implementation . . . . . . . . . . . . . 4--13 Mark Hayter and Derek McAuley The desk area network . . . . . . . . . 14--21 Jorge Buenabadd Chávez XINIX time-sharing operating system . . 22--34 Karsten Schwan and Hongyi Zhou and Ahmed Gheith Real-time threads . . . . . . . . . . . 35--46 Jean Bacon and Ken Moody and Sue Thomson and Tim Wilson A multi-service storage architecture . . 47--65 Dan Oestreicher A simple reliable globally-ordered broadcast service . . . . . . . . . . . 66--76 Kwok-yan Lam An implementation for small databases with high availability . . . . . . . . . 77--77
Mendel Rosenblum and John K. Ousterhout The design and implementation of a log-structured file system . . . . . . . 1--15 David K. Gifford and Pierre Jouvelot and Mark A. Sheldon and James W. O'Toole, Jr. Semantic file systems . . . . . . . . . 16--25 Raj Vaswani and John Zahorjan The implications of cache affinity on processor scheduling for multiprogrammed, shared memory multiprocessors . . . . . . . . . . . . 26--40 Anna R. Karlin and Kai Li and Mark S. Manasse and Susan Owicki Empirical studies of competitive spinning for a shared-memory multiprocessor . . . . . . . . . . . . . 41--55 Keith Muller and Joseph Pasquale A high performance multi-structured file system design . . . . . . . . . . . . . 56--67 Ramesh Govindan and David P. Anderson Scheduling and IPC mechanisms for continuous media . . . . . . . . . . . . 68--80 P. Venkat Rangan and Harrick M. Vin Designing file systems for digital video and audio . . . . . . . . . . . . . . . 81--94 Thomas E. Anderson and Brian N. Bershad and Edward D. Lazowska and Henry M. Levy Scheduler activations: effective kernel support for the user-level management of parallelism . . . . . . . . . . . . . . 95--109 Brian D. Marsh and Michael L. Scott and Thomas J. LeBlanc and Evangelos P. Markatos First-class user-level threads . . . . . 110--121 Richard P. Draves and Brian N. Bershad and Richard F. Rashid and Randall W. Dean Using continuations to implement thread management and communication in operating systems . . . . . . . . . . . 122--136 Richard P. LaRowe, Jr. and Carla Schlatter Ellis and Laurence S. Kaplan The robustness of NUMA memory management 137--151 John B. Carter and John K. Bennett and Willy Zwaenepoel Implementation and performance of Munin 152--164 Butler Lampson and Martín Abadi and Michael Burrows and Edward Wobber Authentication in distributed systems: theory and practice . . . . . . . . . . 165--182 Thomas L. Rodeheffer and Michael D. Schroeder Automatic reconfiguration in Autonet . . 183--197 Mary G. Baker and John H. Hartman and Michael D. Kupfer and Ken W. Shirriff and John K. Ousterhout Measurements of a distributed file system . . . . . . . . . . . . . . . . . 198--212 James J. Kistler and M. Satyanarayanan Disconnected operation in the Coda file system . . . . . . . . . . . . . . . . . 213--225 Barbara Liskov and Sanjay Ghemawat and Robert Gruber and Paul Johnson and Liuba Shrira Replication in the Harp file system . . 226--238 Frank Schmuck and Jim Wylie Experience with transactions in QuickSilver . . . . . . . . . . . . . . 239--253
Edward D. Lazowska 13th ACM Symposium on Operating Systems Principles: panel session presentations 3--17 Barton P. Miller and Charles McDowell Summary of ACM/ONR workshop on parallel and distributed debugging . . . . . . . 18--31 Mahmoud Dasser TOMP a total ordering multicast protocol 32--40 Michel Raynal About logical clocks for distributed systems . . . . . . . . . . . . . . . . 41--48 Li Gong A security risk of depending on synchronized clocks . . . . . . . . . . 49--53 Karsten Schwan and Hongyi Zhou Multiprocessor real-time threads . . . . 54--65 Zhao Hong and Huatian Li A mechanism of process group for application reliability in distributed systems . . . . . . . . . . . . . . . . 66--77 S. Halder and K. Vidyasankar Counterexamples to a one writer multireader atomic variable construction of Burns and Peterson . . . . . . . . . 78--87
Edward D. Lazowska 13th ACM Symposium on Operating Systems Principles: ``Work in Progress''; abstracts . . . . . . . . . . . . . . . 7--7 Henry Massalin and Calton Pu A Lock-Free Multiprocessor OS Kernel . . 8--8 Jeff Chase and Miche Baker-Harvey and Hank Levy and Ed Lazowska Opal: A Single Address Space System for 64-bit Architectures . . . . . . . . . . 9--9 Daniel Duchamp Systems Software for Wireless Mobile Computing . . . . . . . . . . . . . . . 10--10 John Wilkes and Chia Chao and Robert English and David Jacobson and Bart Sears and Carl Staelin and Alex Stepanov DataMesh parallel storage servers . . . 11--11 Maurice Herlihy A Methodology for Implementing Highly Concurrent Data Objects . . . . . . . . 12--12 Rick LaRowe Operating Systems Research Related to the Galactica Net Architecture . . . . . 13--13 Joseph Pasquale Project Sequoia 2000 . . . . . . . . . . 14--14 Cheryl A. Wiecek VMS on Mach . . . . . . . . . . . . . . 15--15 Kevin Jeffay Network and Operating System Support for Digital Audio and Video . . . . . . . . 16--16 B. Clifford Neuman The Virtual System Project . . . . . . . 17--17 Bruce K. Hillyer and Bethany S. Robinson The BBFS Filesystem Model . . . . . . . 18--18 Kieran Harty and David R. Cheriton Application-Controlled Physical Memory using External Page-Cache Management . . 19--19 Michael Wayne Young Episode: Lazy Transactions for Filesystem Meta-Data Updates . . . . . . 20--20 Michael B. Jones A Toolkit for Interposing User Code at the System Interface . . . . . . . . . . 21--21 Peter Druschel Modularity and Protection are Orthogonal, or ``Why $\mu$-kernel Architectures are Flawed'' . . . . . . . 22--22 Keith Marzullo and Mark D. Wood A Toolkit for Building Reactive Systems or A Minute on Meta . . . . . . . . . . 23--23 William E. Weihl Prelude: Tools for Building Portable Parallel Programs . . . . . . . . . . . 24--24 Sharon E. Perl Performance Assertion Checking . . . . . 25--25 Richard G. Guy and John S. Heidemann and Thomas W. Page, Jr. The Ficus Replicated File System . . . . 26--26 Michael Reiter Integrating Security in a Group Oriented Distributed System . . . . . . . . . . . 27--27 Jonathan Walpole and Richard Staehli Supporting Access to Stored Multimedia Data in Large Distributed Systems Work in Progress . . . . . . . . . . . . . . 28--28 M. Frans Kaashoek and Robbert van Renesse and Hans van Staveren and Andrew S. Tanenbaum FLIP; an Internetwork Protocol for Supporting Distributed Systems . . . . . 29--29 Ross Finlayson Structuring and Communication in the Vanguard OS Kernel . . . . . . . . . . . 30--30 Robbert van Rennesse Design and Implementation of a Multicast Transport Service . . . . . . . . . . . 31--31 Ralf Guido Herrtwich Summary of the Second International Workshop on Network and Operating System Support for Digital Audio and Video . . 32--59 Rex E. Gantenbein An annotated bibliography of dependable distributed computing . . . . . . . . . 60--81 Cui-Qing Yang Distributed computing in a NUMP (Non-Uniform Message-Passing) environment . . . . . . . . . . . . . . 82--91 A. L. Ananda and B. H. Tay and E. K. Koh A survey of asynchronous remote procedure calls . . . . . . . . . . . . 92--109 Henry Massalin and Calton Pu A Lock-Free Multiprocessor OS Kernel . . 108--108 Sadegh Davari and Lui Sha Sources of unbounded priority inversions in real-time systems and a comparative study of possible solutions . . . . . . 110--120
R. Ananthanarayanan and Sathis Menon and Ajay Mohindra and Umakishore Ramachandran Experiences in integrating distributed shared memory with virtual memory management . . . . . . . . . . . . . . . 4--26 G. O'Shea Redundant rights in protection systems 27--30 Ralph C. Hilzer, Jr. Synchronization of the producer/consumer problem using semaphores, monitors, and the Ada rendezvous . . . . . . . . . . . 31--39
Frank W. Miller The performance of a mixed priority real-time scheduling algorithm . . . . . 5--13 Jon Inouye and Ravindranath Konuru and Jonathan Walpole and Bart Sears The effects of virtually addressed caches on virtual memory design and performance . . . . . . . . . . . . . . 14--29 Uwe M. Borghoff Design of optimal distributed file systems: a framework for research . . . 30--61 Jiannong Cao and K. C. Wang An abstract model of rollback recovery control in distributed systems . . . . . 62--76 G. Florin C. Toinard A new way to design causally and totally ordered multicast protocols . . . . . . 77--83 A. Kehne and J. Schönwälder and H. Langendörfer A nonce-based protocol for multiple authentications . . . . . . . . . . . . 84--89 James D. Mooney The CTRON approach to operating system support for software portability . . . . 90--97 Michael Kifer and Scott A. Smolka OSP: an environment for operating system projects . . . . . . . . . . . . . . . . 98--100
Bruce K. Haddon Book Review: \em Global Software: Developing Applications for the International Market by Dave Taylor: (Springer-Verlag, New York 1992) . . . . 5--6 Alberto Bartoli and Sape J. Mullender and Martijn van der Valk Wide-address spaces: exploring the design space . . . . . . . . . . . . . . 11--17 David Mosberger Memory consistency models . . . . . . . 18--26 Djemal H. Abawajy Orphan problems and remedies in distributed systems . . . . . . . . . . 27--32 Marie Rose Low and Bruce Christianson Fine grained object protection in UNIX 33--50 Ted Hills Structured interrupts . . . . . . . . . 51--68 Ian M. Leslie and Derek McAuley and Sape J. Mullender Pegasus---operating system support for distributed multimedia systems . . . . . 69--78 R. Guerrero and L. Leguizamon and R. Gallard Implementation and evaluation of alternative process schedulers in MINIX 79--100
K. C. Wong Determining the shortest process migration paths for program compilation using a dynamic programming approach . . 1--6 Darrell D. E. Long A note on bit-mapped free sector management . . . . . . . . . . . . . . . 7--9 B. Clifford Neuman and Stuart G. Stubblebine A note on the use of timestamps as nonces . . . . . . . . . . . . . . . . . 10--14 B. R. Badrinath and Arup Acharya and Tomasz Imieli\'nski Impact of mobility on distributed computations . . . . . . . . . . . . . . 15--20 R. Hugo Patterson and Garth A. Gibson and M. Satyanarayanan A status report on research in transparent informed prefetching . . . . 21--34 C. Kavka and M. Printista and R. Gallard Extending device management in Minix . . 35--43 Robbert van Renesse Causal controversy at Le Mont St.-Michel 44--53 C. Bryce and D. Hagimont and P. Joubert and C. Morin and G. Muller and B. Rochat Models and paradigms for distributed systems structuring: summary of sessions 56--60 Jeff Chase and Valérie Issarnay and Hank Levy Distribution in a single address space operating system . . . . . . . . . . . . 61--65 Calton Pu Relaxing the limitations of serializable transactions in distributed systems . . 66--71 Rob Pike and Dave Presotto and Ken Thompson and Howard Trickey and Phil Winterbottom The use of name spaces in Plan 9 . . . . 72--76 Jerome H. Saltzer Needed: a systematic structuring paradigm for distributed data . . . . . 77--81 Carlos Almeida and Brad Glade and Keith Marzullo High availability in a real-time system 82--87 Fred Douglis On the role of compression in distributed systems . . . . . . . . . . 88--93 Larry L. Peterson Life on the OS/network boundary . . . . 94--98 Robert Stroud Transparency and reflection in distributed systems . . . . . . . . . . 99--103 John Wilkes DataMesh, house-building, and distributed systems technology . . . . . 104--108
A. K. Yeo and A. L. Ananda and E. K. Koh A taxonomy of issues in name systems design and implementation . . . . . . . 4--18 R. Gopalakrishnan and Andreas D. Bovopoulos A protocol processing architecture for networked multimedia computers . . . . . 19--33 Prasad Raja and Guevara Noubir Static and dynamic polling mechanisms for Fieldbus networks . . . . . . . . . 34--45 P. Krishna Reddy and S. Bhalla A non-blocking transaction data flow graph based approach for replicated data 46--54 Zhonghua Yang and T. Anthony Marsland Annotated bibliography on global states and times in distributed systems . . . . 55--74 Xingwei Wang and Hong Zhao and Jiakeng Zhu GRPC: a communication cooperation mechanism in distributed systems . . . . 75--86 Jiubin Ju and Gaochao Xu and Jie Tao Parallel computing using idle workstations . . . . . . . . . . . . . . 87--96 Christophe Haro and Christian Proust A multitasking executive for operating systems courses . . . . . . . . . . . . 97--107
Barton P. Miller and Charles McDowell Summary of ACM/ONR workshop on parallel and distributed debugging . . . . . . . 8--23 Paul Syverson On key distribution protocols for repeated authentication . . . . . . . . 24--30 Armin Liebl Authentication in distributed systems: a bibliography . . . . . . . . . . . . . . 31--41 Claudio Calvelli and Vijay Varadharajan Authentication and revocation in SPM extended abstract . . . . . . . . . . . 42--57 Alexander B. Romanovsky Fault tolerance: synchronization of redundancy . . . . . . . . . . . . . . . 58--66 Mohamed Naimi Distributed algorithm for K-entries to critical section based on the directed graphs . . . . . . . . . . . . . . . . . 67--75 P. Ciancarini and N. Guerrini Linda meets Minix . . . . . . . . . . . 76--92
Yousef A. Khalidi and Michael N. Nelson Extensible file systems in spring . . . 1--14 Wiebren de Jonge and M. Frans Kaashoek and Wilson C. Hsieh The Logical Disk: a new approach to improving file systems . . . . . . . . . 15--28 John H. Hartman and John K. Ousterhout The Zebra striped network file system 29--43 David R. Cheriton and Dale Skeen Understanding the limitations of causally and totally ordered communication . . . . . . . . . . . . . 44--57 Brian Oki and Manfred Pfluegl and Alex Siegel and Dale Skeen The Information Bus: an architecture for extensible distributed systems . . . . . 58--68 Graham Hamilton and Michael L. Powell and James G. Mitchell Subcontract: a flexible base for distributed programming . . . . . . . . 69--79 Michael B. Jones Interposition agents: transparently interposing user code at the system interface . . . . . . . . . . . . . . . 80--93 Carl Hauser and Christian Jacobi and Marvin Theimer and Brent Welch and Mark Weiser Using threads in interactive systems: a case study . . . . . . . . . . . . . . . 94--105 Antony L. Hosking and J. Eliot B. Moss Protection traps and alternatives for memory management of an object-oriented language . . . . . . . . . . . . . . . . 106--119 J. Bradley Chen and Brian N. Bershad The impact of operating system structure on memory system performance . . . . . . 120--133 Sharon E. Perl and William E. Weihl Performance assertion checking . . . . . 134--145 M. Satyanarayanan and Henry H. Mashburn and Puneet Kumar and David C. Steere and James J. Kistler Lightweight recoverable virtual memory 146--160 James O'Toole and Scott Nettles and David Gifford Concurrent compacting garbage collection of a persistent heap . . . . . . . . . . 161--174 Jochen Liedtke Improving IPC by kernel design . . . . . 175--188 Peter Druschel and Larry L. Peterson Fbufs: a high-bandwidth cross-domain transfer facility . . . . . . . . . . . 189--202 Robert Wahbe and Steven Lucco and Thomas E. Anderson and Susan L. Graham Efficient software-based fault isolation 203--216 Andrew Birrell and Greg Nelson and Susan Owicki and Edward Wobber Network objects . . . . . . . . . . . . 217--230 Alan Jones and Andrew Hopper Handling audio and video streams in a distributed environment . . . . . . . . 231--243 Chris Maeda and Brian N. Bershad Protocol service decomposition for high-performance networking . . . . . . 244--255 Edward Wobber and Martín Abadi and Michael Burrows and Butler Lampson Authentication in the Taos operating system . . . . . . . . . . . . . . . . . 256--269 Mike Spreitzer and Marvin Theimer Providing location information in a ubiquitous computing environment (panel session) . . . . . . . . . . . . . . . . 270--283
Gary J. Nutt Book Review: \em Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use (volume 1) by Kurt Jensen: (Springer-Verlag, 1992) . . . . . . . . 1--2 Dinesh C. Kulkarni and Arindam Banerji and David L. Cohn Operating systems and cost management 5--10 Ken Birman A response to Cheriton and Skeen's criticism of causal and totally ordered communication . . . . . . . . . . . . . 11--21 Robbert van Renesse Why bother with CATOCS? . . . . . . . . 22--27 Robert Cooper Experience with causally and totally ordered communication support: a cautionary tale . . . . . . . . . . . . 28--31 Bodhisattwa Mukherjee and Greg Eisenhauer and Kaushik Ghosh A machine independent interface for lightweight threads . . . . . . . . . . 33--47 Bill Mahoney An ``open'' oriented file system . . . . 48--54 L. Mummert and M. Satyanarayanan Variable granularity cache coherence . . 55--60 Jochen Liedtke A short note on implementing ``new'' machine instructions by software for efficient test of page accessibility . . 61--65 K. Benmohammed-Mahieddine and P. M. Dew A periodic symmetrically-initiated load balancing algorithm for distributed systems . . . . . . . . . . . . . . . . 66--79 Abdelmadjid Bouabdallah On mutual exclusion in faulty distributed systems . . . . . . . . . . 80--87 Chris Zimmermann Making distributed multimedia systems secure: the switchboard approach . . . . 88--100 William M. Waite Book Review: \em Programming with MOTIF by Keith D. Gregory: (Springer-Verlag, New York 1992) . . . . . . . . . . . . . 100--100
Todd Valentic Book Review: \em High-Speed Windows Applications: Multitasking Design Methods by Bruce E. Krell: (Bantam Books, New York 1993) . . . . . . . . . 4--5 Michael Lightner Book Review: \em \TeX in Practice, Volumes 1--4 by Stephan von Bechtolsheim: (Springer-Verlag, New York 1993) . . . . . . . . . . . . . . . . . 6--8 Maurice Wilkes Operating systems in a changing world 9--21 G. S. Blair and A. Campbell and G. Coulson and N. Davies and F. Garcia and D. Shepherd Summary of the 4th International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV'93) . . . . . . . . . . . . . . 22--33 G. Aguirre and M. Errecalde and S. Esquivel and G. Leguizamon and R. Gallard Design features of high level layers in LAHNOS, a local area heterogeneous network operating system . . . . . . . . 34--50 Lars C. Wolf and R. G. Herrtwich The system architecture of the Heidelberg transport system . . . . . . 51--64 Eddy Fromentin and Michel Raynal Local states in distributed computations: a few relations and formulas . . . . . . . . . . . . . . . . 65--72 Michael K. Gschwind FTP access as a user-defined file system 73--80 Qi Lu and M. Satyanarayanan Isolation-only transactions for mobile computing . . . . . . . . . . . . . . . 81--87 Pradeep Hatkanagalekar A note on structured interrupts . . . . 88--91 Joe Gwinn Some measurements of timeline gaps in VAX/VMS . . . . . . . . . . . . . . . . 92--96
Jean Bacon and Richard Hayton and Sai Lai Lo and Ken Moody Extensible access control for a hierarchy of servers . . . . . . . . . . 4--15 Ulf Carlsen Optimal privacy and authentication on a portable communications system . . . . . 16--23 Thomas Y. C. Woo and Simon S. Lam A lesson on authentication protocol design . . . . . . . . . . . . . . . . . 24--37 Jochen Liedtke A short note on implementing thread exclusiveness and address space locking 38--42 Joel M. Crichlow Combining optimism and pessimism to produce high availability in distributed transaction processing . . . . . . . . . 43--64
Silvano Maffeis Design and implementation of a configurable mixed-media file system . . 4--10 Santosh K. Shrivastava To CATOCS or not to CATOCS, that is the \ldots . . . . . . . . . . . . . . . . . 11--14 Jang Seung-Ju and Kim Gil-Yong Spin-block synchronization algorithm in the shared memory multiprocessor system 15--30 Ted Hills Response to a note on structured interrupts . . . . . . . . . . . . . . . 31--33 Antônio Marinho Pilla Barcellos and Valdir Rossi Belmonte Filho and João Frederico Lacava Schramm and Cláudio Fernando Resin Geyer The HetNOS network operating system: a tool for writing distributed applications . . . . . . . . . . . . . . 34--47 Timothy Roscoe Linkage in the Nemesis single address space operating system . . . . . . . . . 48--55 Diomidis Spinellis Trace: a tool for logging operating system call transactions . . . . . . . . 56--63 Mark Nuttall A brief survey of systems providing process or object migration facilities 64--80
Chandramohan A. Thekkath and Henry M. Levy and Edward D. Lazowska Separating data and control transfer in distributed operating systems . . . . . 2--11 Rohit Chandra and Scott Devine and Ben Verghese and Anoop Gupta and Mendel Rosenblum Scheduling and page migration for multiprocessor compute servers . . . . . 12--24 Beng-Hong Lim and Anant Agarwal Reactive synchronization algorithms for multiprocessors . . . . . . . . . . . . 25--35 John Heinlein and Kourosh Gharachorloo and Scott Dresser and Anoop Gupta Integration of message passing and shared memory in the Stanford FLASH multiprocessor . . . . . . . . . . . . . 38--50 Vijay Karamcheti and Andrew A. Chien Software overhead in messaging layers: where does the time go? . . . . . . . . 51--60 Satish Chandra and James R. Larus and Anne Rogers Where is time spent in message-passing and shared-memory programs? . . . . . . 61--73 William J. Schmidt and Kelvin D. Nilsen Performance of a hardware-assisted real-time garbage collector . . . . . . 76--85 Michael Wu and Willy Zwaenepoel eNVy: a non-volatile, main memory storage system . . . . . . . . . . . . . 86--97 Michael Upton and Thomas Huff and Trevor Mudge and Richard Brown Resource allocation in a high clock rate microprocessor . . . . . . . . . . . . . 98--109 Chandramohan A. Thekkath and Henry M. Levy Hardware and software support for efficient exception handling . . . . . . 110--119 Pramod V. Argade and David K. Charles and Craig Taylor A technique for monitoring run-time dynamics of an operating system and a microprocessor executing user applications . . . . . . . . . . . . . . 122--131 Richard Uhlig and David Nagle and Trevor Mudge and Stuart Sechrest Trap-driven simulation with Tapeworm II 132--144 Ann Marie Grizzaffi Maynard and Colette M. Donnelly and Bret R. Olszewski Contrasting characteristics and cache performance of technical and multi-user commercial workloads . . . . . . . . . . 145--156 Brian N. Bershad and Dennis Lee and Theodore H. Romer and J. Bradley Chen Avoiding conflict misses dynamically in large direct-mapped caches . . . . . . . 158--170 Madhusudhan Talluri and Mark D. Hill Surpassing the TLB performance of superpages with less operating system support . . . . . . . . . . . . . . . . 171--182 David M. Gallagher and William Y. Chen and Scott A. Mahlke and John C. Gyllenhaal and Wen-mei W. Hwu Dynamic memory disambiguation using the memory conflict buffer . . . . . . . . . 183--193 Kenichi Hayashi and Tsunehisa Doi and Takeshi Horie and Yoichi Koyanagi and Osamu Shiraki and Nobutaka Imamura and Toshiyuki Shimizu and Hiroaki Ishihata and Tatsuya Shindo AP1000+: architectural support of PUT/GET interface for parallelizing compiler . . . . . . . . . . . . . . . . 196--207 James R. Larus and Brad Richards and Guhan Viswanathan LCM: memory system support for parallel language implementation . . . . . . . . 208--218 Steven Cameron Woo and Jaswinder Pal Singh and John L. Hennessy The performance advantages of integrating block data transfer in cache-coherent multiprocessors . . . . . 219--229 Cliff Young and Michael D. Smith Improving the accuracy of static branch prediction using branch correlation . . 232--241 Brad Calder and Dirk Grunwald Reducing branch costs via branch alignment . . . . . . . . . . . . . . . 242--251 Steve Carr and Kathryn S. McKinley and Chau-Wen Tseng Compiler optimizations for improving data locality . . . . . . . . . . . . . 252--262 Dawson R. Engler and Todd A. Proebsting DCG: an efficient, retargetable dynamic code generation system . . . . . . . . . 263--272 Mark Heinrich and Jeffrey Kuskin and David Ofelt and John Heinlein and Joel Baxter and Jaswinder Pal Singh and Richard Simoni and Kourosh Gharachorloo and David Nakahira and Mark Horowitz and Anoop Gupta and Mendel Rosenblum and John Hennessy The performance impact of flexibility in the Stanford FLASH multiprocessor . . . 274--285 Jonas Skeppstedt and Per Stenström Simple compiler algorithms to reduce ownership overhead in cache coherence protocols . . . . . . . . . . . . . . . 286--296 Ioannis Schoinas and Babak Falsafi and Alvin R. Lebeck and Steven K. Reinhardt and James R. Larus and David A. Wood Fine-grain access control for distributed shared memory . . . . . . . 297--306 James Laudon and Anoop Gupta and Mark Horowitz Interleaving: a multithreading technique targeting multiprocessors and workstations . . . . . . . . . . . . . . 308--318 Nicholas P. Carter and Stephen W. Keckler and William J. Dally Hardware support for fast capability-based addressing . . . . . . 319--327 Radhika Thekkath and Susan J. Eggers The effectiveness of multiple hardware contexts . . . . . . . . . . . . . . . . 328--337
Michael Lightner Book Review: \em \TeX in Practice, Stephan von Bechtolsheim . . . . . . . . 2--6 Jiubin Ju and Gaochao Xu and Kun Yang An intelligent dynamic load balancer for workstation clusters . . . . . . . . . . 7--16 M. Cena and M. L. Crespo and R. Gallard Transparent remote execution in LAHNOS by means of a neural network device . . 17--28 Li Xie and Xing Du and Jun Chen and Yuhua Zheng and Zhongxiu Sun An introduction to intelligent operating system KZ2 . . . . . . . . . . . . . . . 29--46 Marc Shapiro Summary of the Sixth SIGOPS European Workshop on ``Matching Operating Systems to Application Needs'' . . . . . . . . . 47--51 M. Satyanarayanan and Brian Noble and Puneet Kumar and Morgan Price Application-aware adaptation for mobile computing . . . . . . . . . . . . . . . 52--55 Pierre Paradinas and Jean-Jacques Vandewalle New directions for integrated circuit cards operating systems . . . . . . . . 56--61 Özalp Babao\uglu and André Schiper On group communication in large-scale distributed systems . . . . . . . . . . 62--67 Dawson Dean and Richard Zippel Matching data storage to application needs . . . . . . . . . . . . . . . . . 68--73 Brian N. Bershad and Craig Chambers and Susan Eggers and Chris Maeda and Dylan McNamee and Przemys\law Pardyak and Stefan Savage and Emin Gün Sirer SPIN---an extensible microkernel for application-specific operating system services . . . . . . . . . . . . . . . . 74--77 Dawson R. Engler and M. Frans Kaashoek and James W. O'Toole, Jr. The operating system kernel as a secure programmable machine . . . . . . . . . . 78--82 David R. Cheriton and Kenneth J. Duda A caching model of operating system kernel functionality . . . . . . . . . . 83--86 Jochen Liedtke Address space sparsity and fine granularity . . . . . . . . . . . . . . 87--90 Andrew P. Black and Jonathan Walpole Objects to the rescue! or httpd: the next generation operating system . . . . 91--95
Basim Kadhim Book Review: \em Linux: Unleashing the Workstation in Your PC, Stefan Strobel and Thomas Uhl . . . . . . . . . . . . . 2--3 M. Satyanarayanan Workshop on mobile computing systems and applications, December 1994: digest of proceedings . . . . . . . . . . . . . . 4--12 Timothy Roscoe CLANGER: an interpreted systems programming language . . . . . . . . . . 13--20 Steve Kleiman and Joe Eykholt Interrupts as threads . . . . . . . . . 21--26 William F. Klostermeyer and Kankanahalli Srinivas Reducing disk power consumption in a portable computer . . . . . . . . . . . 27--32 Tomas Smolik An object-oriented file system---an example of using the class hierarchy framework concept . . . . . . . . . . . 33--53 Wolfgang Lux Adaptable object migration: concept and implementation . . . . . . . . . . . . . 54--69 Harald Schrimpf Migration of processes, files, and virtual devices in the MDX operating system . . . . . . . . . . . . . . . . . 70--81 S. Esquivel and G. Leguizamon and R. Gallard A quasi-optimal cluster allocation strategy for parallel program execution in distributed systems using genetic algorithms . . . . . . . . . . . . . . . 82--96
William M. Waite Book Review: \em Building in Big Brother: The Cryptographic Policy Debate, Lance J. Hoffman . . . . . . . . 2--2 Jim Alves-Foss and Salvador Barbosa Assessing computer security vulnerability . . . . . . . . . . . . . 3--13 I.-Lung Kao and Randy Chow An efficient and secure authentication protocol using uncertified keys . . . . 14--21 Michael Steiner and Gene Tsudik and Michael Waidner Refinement and extension of encrypted key exchange . . . . . . . . . . . . . . 22--30 Jochen Liedtke A short note a small virtually-addressed control blocks . . . . . . . . . . . . . 31--34 Michael Harry and Juan Miguel del Rosario and Alok Choudhary The design of VIP-FS: a virtual, parallel file system for high performance parallel and distributed computing . . . . . . . . . . . . . . . 35--48 Pierre Castori Semaphores revisited with MMS . . . . . 49--63 Maria Consuelo Franky DGDBM: programming support for distributed transactions over replicated files . . . . . . . . . . . . . . . . . 64--74 Gabriel A. Wainer Implementing real-time services in MINIX 75--84 A. B. Romanovsky Software diversity as a way to well-structured concurrent software . . 85--90 Xiaohua Jia and Mamoru Maekawa Operating system kernel automatic construction . . . . . . . . . . . . . . 91--96
Sally Blackman Book Review: \em The WEB Empowerment Book, Ralph Abraham, Frank Jas, and Willard Russell . . . . . . . . . . . . 2--2 Basim Kadhim Book Review: \em Linux Universe, Stefan Strobel and Thomas Uhl . . . . . . . . . 3--3 W. H. Cheung and Anthony H. S. Loong Exploring issues of operating systems structuring: from microkernel to extensible systems . . . . . . . . . . . 4--16 Geoff Coulson and Gordon Blair Architectural principles and techniques for distributed multimedia application support in operating systems . . . . . . 17--24 S. Petri and H. Langendörfer Load balancing and fault tolerance in workstation clusters migrating groups of communicating processes . . . . . . . . 25--36 Ing-Jye Shyu and Shiuh-Pyng Shieh Virtual address translation for wide-address architectures . . . . . . . 37--46 Gregory F. Welch A survey of power management techniques in mobile computing operating systems 47--56 K. R. Mayes and S. Quick and B. C. Warboys User-level threads on a general hardware interface . . . . . . . . . . . . . . . 57--62 Shuichi Oikawa and Hideyuki Tokuda Reflection of developing user-level real-time thread packages . . . . . . . 63--76 Yun Ding and Patrick Horster Undetectable on-line password guessing attacks . . . . . . . . . . . . . . . . 77--86 Ping Hu and Bruce Christianson Is your computing environment secure?: security problems with interrupt handling mechanisms . . . . . . . . . . 87--96
T. C. Bressoud and F. B. Schneider Hypervisor-based fault tolerance . . . . 1--11 J. Chapin and M. Rosenblum and S. Devine and T. Lahiri and D. Teodosiu and A. Gupta Hive: fault containment for shared-memory multiprocessors . . . . . 12--25 D. R. Cheriton and K. J. Duda Logged virtual memory . . . . . . . . . 26--38 T. von Eicken and A. Basu and V. Buch and W. Vogels U-Net: a user-level network interface for parallel and distributed computing (includes URL) . . . . . . . . . . . . . 40--53 M. N. Nelson and M. Linton and S. Owicki A highly available scalable ITV system 54--67 B. Steensgaard and E. Jul Object and native code thread mobility among heterogeneous computers (includes sources) . . . . . . . . . . . . . . . . 68--77 R. H. Patterson and G. A. Gibson and E. Ginting and D. Stodolsky and J. Zelenka Informed prefetching and caching . . . . 79--95 J. Wilkes and R. Golding and C. Staelin and T. Sullivan The HP AutoRAID hierarchical storage system . . . . . . . . . . . . . . . . . 96--108 T. E. Anderson and M. D. Dahlin and J. M. Neefe and D. A. Patterson and D. S. Roselli and R. Y. Wang Serverless network file systems . . . . 109--126 J. Heidemann and G. Popek Performance of cache coherence in stackable filing . . . . . . . . . . . . 127--141 L. B. Mummert and M. R. Ebling and M. Satyanarayanan Exploiting weak connectivity for mobile file access . . . . . . . . . . . . . . 143--155 A. D. Joseph and A. F. de Lespinasse and J. A. Tauber and D. K. Gifford and M. F. Kaashoek Rover: a toolkit for mobile information access . . . . . . . . . . . . . . . . . 156--171 D. B. Terry and M. M. Theimer and Karin Petersen and A. J. Demers and M. J. Spreitzer and C. H. Hauser Managing update conflicts in Bayou, a weakly connected replicated storage system . . . . . . . . . . . . . . . . . 172--182 M. Talluri and M. D. Hill and Y. A. Khalidi A new page table for 64-bit address spaces . . . . . . . . . . . . . . . . . 184--200 M. J. Feeley and W. E. Morgan and E. P. Pighin and A. R. Karlin and H. M. Levy and C. A. Thekkath Implementing global memory management in a workstation cluster . . . . . . . . . 201--212 K. L. Johnson and M. F. Kaashoek and D. A. Wallach CRL: high-performance all-software distributed shared memory . . . . . . . 213--226 Mary Baker Going threadbare (panel session): sense or sedition? a debate on the threads abstraction . . . . . . . . . . . . . . 227--227 Eric W. Anderson The performance of the Container Shipping I/O system . . . . . . . . . . 229--229 Liana L. Fong and Mark S. Squillante Time-function scheduling: a general approach to controllable resource . . . 230--230 R. Gopalakrishnan and Guru M. Parulkar A real-time upcall facility for protocol processing with QoS guarantees . . . . . 231--231 Bryan Ford and Mike Hibler and Jay Lepreau Using annotated interface definitions to optimize RPC . . . . . . . . . . . . . . 232--232 Jason Nieh and Monica S. Lam SMART: a processor scheduler for multimedia applications . . . . . . . . 233--233 James S. Gwertzman and Margo Seltzer Autonomous replication across wide-area internetworks . . . . . . . . . . . . . 234--234 Sanjay Ghemawat and M. Frans Kaashoek and Barbara Liskov Using a modified object buffer to improve the write performance of an object-oriented database . . . . . . . . 235--235 Mor Harchol-Balter and Allen B. Downey Exploiting process lifetime distributions for dynamic load balancing 236--236 J. Liedtke On micro-kernel construction . . . . . . 237--250 D. R. Engler and M. F. Kaashoek and J. O'Toole, Jr. Exokernel: an operating system architecture for application-level resource management . . . . . . . . . . 251--266 B. N. Bershad and S. Savage and P. Pardyak and E. G. Sirer and M. E. Fiuczynski and D. Becker and C. Chambers and S. Eggers Extensibility safety and performance in the SPIN operating system . . . . . . . 267--283 M. Rosenblum and E. Bugnion and S. A. Herrod and E. Witchel and A. Gupta The impact of architectural trends on operating system performance . . . . . . 285--298 J. B. Chen and Y. Endo and K. Chan and D. Mazieres and A. Dias and M. Seltzer and M. D. Smith The measured performance of personal computer operating systems . . . . . . . 299--313 C. Pu and T. Autrey and A. Black and C. Consel and C. Cowan and J. Inouye and L. Kethana and J. Walpole and K. Zhang Optimistic incremental specialization: streamlining a commercial operating system . . . . . . . . . . . . . . . . . 314--321
James G. Mitchell JavaOS: back to the future . . . . . . . 1--1 Todd C. Mowry and Angela K. Demke and Orran Krieger Automatic compiler-inserted I/O prefetching for out-of-core applications 3--17 Tracy Kimbrel and Andrew Tomkins and R. Hugo Patterson and Brian Bershad and Pei Cao and Edward W. Felten and Garth A. Gibson and Anna R. Karlin and Kai Li A trace-driven comparison of algorithms for parallel prefetching and caching . . 19--34 Prasenjit Sarkar and John Hartman Efficient cooperative caching using hints . . . . . . . . . . . . . . . . . 35--46 Dejan Perkovic and Peter J. Keleher Online data-race detection via coherency guarantees . . . . . . . . . . . . . . . 47--57 Manuel Costa and Paulo Guedes and Manuel Sequeira and Nuno Neves and Miguel Castro Lightweight logging for lazy release consistent distributed shared memory . . 59--73 Yuanyuan Zhou and Liviu Iftode and Kai Li Performance evaluation of two home-based lazy release consistency protocols for shared virtual memory systems . . . . . 75--88 David Tennenhouse Active networks (abstract) . . . . . . . 89--89 Bryan Ford and Sai Susarla CPU inheritance scheduling . . . . . . . 91--105 Pawan Goyal and Xingang Guo and Harrick M. Vin A hierarchical CPU scheduler for multimedia operating systems . . . . . . 107--121 Michael Greenwald and David Cheriton The synergy between non-blocking synchronization and operating system structure . . . . . . . . . . . . . . . 123--136 Bryan Ford and Mike Hibler and Jay Lepreau and Patrick Tullmann and Godmar Back and Stephen Clawson Microkernels meet recursive virtual machines . . . . . . . . . . . . . . . . 137--151 David Mosberger and Larry L. Peterson Making paths explicit in the Scout operating system . . . . . . . . . . . . 153--167 Sharon E. Perl and Richard L. Sites Studies of Windows NT performance using dynamic execution traces . . . . . . . . 169--183 Yasuhiro Endo and Zheng Wang and J. Bradley Chen and Margo Seltzer Using latency to evaluate interactive system performance . . . . . . . . . . . 185--199 Przemys\law Pardyak and Brian N. Bershad Dynamic binding for an extensible system 201--212 Margo I. Seltzer and Yasuhiro Endo and Christopher Small and Keith A. Smith Dealing with disaster: surviving misbehaved kernel extensions . . . . . . 213--227 George C. Necula and Peter Lee Safe kernel extensions without run-time checking . . . . . . . . . . . . . . . . 229--243 Greg Buzzard and David Jacobson and Milon Mackey and Scott Marovich and John Wilkes An implementation of the Hamlyn sender-managed interface architecture 245--259 Peter Druschel and Gaurav Banga Lazy receiver processing (LRP): a network subsystem architecture for server systems . . . . . . . . . . . . . 261--275 José Carlos Brustoloni and Peter Steenkiste Effects of buffering semantics on I/O performance . . . . . . . . . . . . . . 277--291
Marco de Vivo Book Review: \em Distributed Operating Systems by Andrew S. Tanenbaum . . . . . 3--3 Jochen Liedtke and Kevin Elphinstone Guarded page tables on Mips R4600 or an exercise in architecture-dependent micro optimization . . . . . . . . . . . . . . 4--15 A. W. Moore and A. J. McGregor and J. W. Breen A comparison of system monitoring methods, passive network monitoring and kernel instrumentation . . . . . . . . . 16--38 M. H. Samadzadeh and B. S. Koshy A display and analysis tool for process-resource graphs . . . . . . . . 39--62 Rodney Van Meter A brief survey of current work on network attached peripherals (extended abstract) . . . . . . . . . . . . . . . 63--70 M. Rasit Eskicio\uglu A comprehensive bibliography of distributed shared memory . . . . . . . 71--96
Zhonghua Yang and Keith Duddy CORBA: a platform for distributed object computing . . . . . . . . . . . . . . . 4--31 Shiuh-Pyng Shieh and Wen-Her Yang An authentication and key distribution system for open network systems . . . . 32--41 Yun Ding and Patrick Horster Why the Kuperee authentication system fails . . . . . . . . . . . . . . . . . 42--51 Ye-In Chang A dynamic request set based algorithm for mutual exclusion in distributed systems . . . . . . . . . . . . . . . . 52--62 David Kotz and Nils Nieuwejaar Flexibility and performance of parallel file systems . . . . . . . . . . . . . . 63--73 J. Carretero and F. Pérez and P. de Miguel and F. García and L. Alonso ParFiSys: a parallel file system for MPP 74--80 Roger Butenuth and Wolfgang Burke and Hans-Ulrich Heiß Cosy: an operating system for highly parallel computers . . . . . . . . . . . 81--91 Jochen Liedtke A short note on cheap fine-grained time measurement . . . . . . . . . . . . . . 92--94
Paul F. Syverson A new look at an old protocol . . . . . 1--4 K. C. Tai and Richard H. Carver VP: a new operation for semaphores . . . 5--11 Benjamin Reed and Darrell D. E. Long Analysis of caching algorithms for distributed file systems . . . . . . . . 12--21 Jiubin Ju and Yong Wang Scheduling PVM tasks . . . . . . . . . . 22--31 Vijay Varadharajan and Phillip Allen Joint actions based authorization schemes . . . . . . . . . . . . . . . . 32--45 Mohamed Naimi Distributed mutual exclusion on hypercubes . . . . . . . . . . . . . . . 46--51 Rajmohan Panadiwal and Andrzej M. Goscinski A high performance and adaptive commit protocol for a distributed environment 52--58 H. Mountassir Decidability of a class of dual communicating finite state machines . . 59--66 Wen-Jiin Tsai and Suh-Yin Lee Real-time scheduling of multimedia data retrieval to minimize buffer requirement 67--80
Ji Hua and Xie Li A distributed computing model based on multiserver . . . . . . . . . . . . . . 3--11 Chris J. Mitchell and Liqun Chen Comments on the S/KEY user authentication scheme . . . . . . . . . 12--16 Jongwoon Lee and Sungyoung Lee and Hyungill Kim Scheduling soft aperiodic tasks in adaptable fixed-priority systems . . . . 17--28 John T. Robinson Analysis of steady-state segment storage utilizations in a log-structured file system with least-utilized segment cleaning . . . . . . . . . . . . . . . . 29--32 T. Cornilleau and E. Gressier-Soudan A combined-consistency approach: sequential & causal-consistency . . . . . 33--44
Kunle Olukotun and Basem A. Nayfeh and Lance Hammond and Ken Wilson and Kunyung Chang The case for a single-chip multiprocessor . . . . . . . . . . . . . 2--11 Vijay S. Pai and Parthasarathy Ranganathan and Sarita V. Adve and Tracy Harton An evaluation of memory consistency models for shared-memory systems with ILP processors . . . . . . . . . . . . . 12--23 Steven L. Scott Synchronization and communication in the T3E multiprocessor . . . . . . . . . . . 26--36 Arvind Krishnamurthy and Klaus E. Schauser and Chris J. Scheiman and Randolph Y. Wang and David E. Culler and Katherine Yelick Evaluation of architectural support for global address-based communication in large-scale parallel machines . . . . . 37--48 Dirk Grunwald and Richard Neves Whole-program optimization for time and space efficient threads . . . . . . . . 50--59 James Philbin and Jan Edler and Otto J. Anshus and Craig C. Douglas and Kai Li Thread scheduling for cache locality . . 60--71 Peter M. Chen and Wee Teck Ng and Subhachandra Chandra and Christopher Aycock and Gurushankar Rajamani and David Lowell The Rio file cache: surviving operating system crashes . . . . . . . . . . . . . 74--83 Edward K. Lee and Chandramohan A. Thekkath Petal: distributed virtual disks . . . . 84--92 Kathryn S. McKinley and Olivier Temam A quantitative analysis of loop nest locality . . . . . . . . . . . . . . . . 94--104 Andrew S. Huang and John Paul Shen The intrinsic bandwidth requirements of ordinary programs . . . . . . . . . . . 105--114 André Seznec and Stéphan Jourdan and Pascal Sainrat and Pierre Michaud Multiple-block ahead branch predictors 116--127 I-Cheng K. Chen and John T. Coffey and Trevor N. Mudge Analysis of branch prediction via data compression . . . . . . . . . . . . . . 128--137 Mikko H. Lipasti and Christopher B. Wilkerson and John Paul Shen Value locality and load value prediction 138--147 Theodore H. Romer and Dennis Lee and Geoffrey M. Voelker and Alec Wolman and Wayne A. Wong and Jean-Loup Baer and Brian N. Bershad and Henry M. Levy The structure and performance of interpreters . . . . . . . . . . . . . . 150--159 Armando Fox and Steven D. Gribble and Eric A. Brewer and Elan Amir Adapting to network and client variability via on-demand dynamic distillation . . . . . . . . . . . . . . 160--170 Daniel J. Scales and Kourosh Gharachorloo and Chandramohan A. Thekkath Shasta: a low overhead, software-only approach for supporting fine-grain shared memory . . . . . . . . . . . . . 174--185 Sandhya Dwarkadas and Alan L. Cox and Willy Zwaenepoel An integrated compile-time/run-time software distributed shared memory system . . . . . . . . . . . . . . . . . 186--197 R. Bianchini and L. I. Kontothanassis and R. Pinto and M. De Maria and M. Abud and C. L. Amorim Hiding communication latency and coherence overhead in software DSMs . . 198--209 Andrew Erlichson and Neal Nuckolls and Greg Chesson and John Hennessy SoftFLASH: analyzing the performance of clustered distributed virtual shared memory . . . . . . . . . . . . . . . . . 210--220 Chi-Keung Luk and Todd C. Mowry Compiler-based prefetching for recursive data structures . . . . . . . . . . . . 222--233 Mazen A. R. Saghir and Paul Chow and Corinna G. Lee Exploiting dual data-memory banks in digital signal processors . . . . . . . 234--243 Edouard Bugnion and Jennifer M. Anderson and Todd C. Mowry and Mendel Rosenblum and Monica S. Lam Compiler-directed page coloring for multiprocessors . . . . . . . . . . . . 244--255 Hervé A. Jamrozik and Michael J. Feeley and Geoffrey M. Voelker and James Evans II and Anna R. Karlin and Henry M. Levy and Mary K. Vernon Reducing network latency using subpages in a global memory environment . . . . . 258--267 Jih-Kwon Peir and Windsor W. Hsu and Honesty Young and Shauchi Ong Improving cache performance with balanced tag and data paths . . . . . . 268--278 Ben Verghese and Scott Devine and Anoop Gupta and Mendel Rosenblum Operating system support for improving data locality on CC-NUMA compute servers 279--289
John T. Robinson and Murthy V. Devarakonda Note on a problem with Reed and Long's FBR results . . . . . . . . . . . . . . 3--4 Andrew S. Tanenbaum Report on the Seventh ACM SIGOPS European Workshop: Systems Support for Worldwide Applications . . . . . . . . . 5--17 M. Satyanarayanan and Mirjana Spasojevic AFS and the Web: competitors or collaborators? . . . . . . . . . . . . . 18--23 Dane Dwyer and Vaduvur Bharghavan A mobility-aware file system for partially connected operation . . . . . 24--30 Michael Richmond and Michael Hitchens A new process migration algorithm . . . 31--42 Weiping Zhu and Piotr Socko and Bartek Kiepuszewski Migration impact on load balancing---an experience on Amoeba . . . . . . . . . . 43--53 Alexander B. Romanovsky Conversational group service . . . . . . 54--63 Vijay Varadharajan Extending the Schematic Protection Model II: revocation . . . . . . . . . . . . . 64--77 Sherali Zeadally An evaluation of the real-time performances of SVR4.0 and SVR4.2 . . . 78--87 Marie Rose Low and James A. Malcolm A joint authorisation scheme . . . . . . 88--96
W. M. Waite Book Review: \em PostScript & Acrobat/PDF, Thomas Merz . . . . . . . . 1--1 W. M. Waite Book Reviews: Robert Slade's \em Guide to Computer Viruses . . . . . . . . . . 1--1 W. M. Waite Book Reviews: \em The Web Publisher's Illustrated Quick Reference, Ralph Grabowski . . . . . . . . . . . . . . . 2--2 Arne Helme and Tage Stabell-Kulò Security functions for a file repository 3--8 Tage Stabell-Kulò Security and log structured file systems 9--10 Özalp Babao\uglu and Renzo Davoli and Alberto Montresor Group membership and view synchrony in partitionable asynchronous distributed systems: specifications . . . . . . . . 11--22 Qun Li and Hua Ji and Li Xie Group consistency model which separates the intra-group consistency maintenance from the inter-group consistency maintenance in large scale DSM systems 23--35 Luigi Rizzo A very fast algorithm for RAM compression . . . . . . . . . . . . . . 36--45 D. Arredondo and M. Errecalde and F. Piccoli and M. Printista and R. Gallard and s. Flores Load distribution and balancing support in a workstation-based distributed system . . . . . . . . . . . . . . . . . 46--59 Jonathan Karges and Otto Ritter and Sándor Suhai Design and implementation of a parallel pipe . . . . . . . . . . . . . . . . . . 60--94
Keok Auyong and Chye-Lin Chee Authentication services for computer networks and electronic messaging systems . . . . . . . . . . . . . . . . 3--15 Liqun Chen and Dieter Gollmann and Chris J. Mitchell Authentication using minimally trusted servers . . . . . . . . . . . . . . . . 16--28 Ye-In Chang and Yao-Jen Chang A fault-tolerant dynamic triangular mesh protocol for distributed mutual exclusion . . . . . . . . . . . . . . . 29--44 Jianmin Hou and Xuandong Li and Xiaocong Fan and Guoliang Zheng A message-based real-time model by object-oriented technique . . . . . . . 45--51 Carsten Vogt Visualizing UNIX synchronization operations . . . . . . . . . . . . . . . 52--64
Vincent P. Heuring Book Review: \em Essential Java Fast, John Cowell . . . . . . . . . . . . . . 2--2 Evangelos P. Markatos Visualizing working sets . . . . . . . . 3--11 Shouhuai Xu and Gendu Zhang and Hong Zhu On the properties of cryptographic protocols and the weaknesses of the BAN-like logics . . . . . . . . . . . . 12--23 Pascal Ledru Adaptive parallelism: an early experiment with Java remote method invocation . . . . . . . . . . . . . . . 24--29 Qun Li and Jie Jing and Li Xie BFXM: a parallel file system model based on the mechanism of distributed shared memory . . . . . . . . . . . . . . . . . 30--40 Weisong Shi and Weiwu Hu and Zhimin Tang An interaction of coherence protocols and memory consistency models in DSM systems . . . . . . . . . . . . . . . . 41--54 Santiago Rodríquez and Antonio Pérez and Rafael Méndez A new checkpoint mechanism for real time operating systems . . . . . . . . . . . 55--62 A. Romanovsky and A. F. Zorzo On distribution of coordinated atomic actions . . . . . . . . . . . . . . . . 63--71 Carl Ponder Organizing UNIX directories as lattices 72--77 Yanxiang He and Donald H. Cooley and Jianping Zhang A model for a distributed OS automatic generation system . . . . . . . . . . . 78--84 Yanxiang He and Jianping Zhang and Donald H. Cooley and Li Chen Semantics subsystem in distributed OS formalization generating system . . . . 85--92
Jennifer M. Anderson and Lance M. Berc and Jeffrey Dean and Sanjay Ghemawat and Monika R. Henzinger and Shun-Tak A. Leung and Richard L. Sites and Mark T. Vandevoorde and Carl A. Waldspurger and William E. Weihl Continuous profiling: where have all the cycles gone? . . . . . . . . . . . . . . 1--14 Xiaolan Zhang and Zheng Wang and Nicholas Gloy and J. Bradley Chen and Michael D. Smith System support for automatic profiling and optimization . . . . . . . . . . . . 15--26 Stefan Savage and Michael Burrows and Greg Nelson and Patrick Sobalvarro and Thomas Anderson Eraser: a dynamic data race detector for multi-threaded programs . . . . . . . . 27--37 Bryan Ford and Godmar Back and Greg Benson and Jay Lepreau and Albert Lin and Olin Shivers The Flux OSKit: a substrate for kernel and language research . . . . . . . . . 38--51 M. Frans Kaashoek and Dawson R. Engler and Gregory R. Ganger and Hector M. Briceño and Russell Hunt and David Mazi\`eres and Thomas Pinckney and Robert Grimm and John Jannotti and Kenneth Mackenzie Application performance and flexibility on exokernel systems . . . . . . . . . . 52--65 Hermann Härtig and Michael Hohmuth and Jochen Liedtke and Sebastian Schönberg The performance of $\mu$-kernel-based systems . . . . . . . . . . . . . . . . 66--77 Armando Fox and Steven D. Gribble and Yatin Chawathe and Eric A. Brewer and Paul Gauthier Cluster-based scalable network services 78--91 David E. Lowell and Peter M. Chen Free transactions with Rio Vista . . . . 92--101 Miguel Castro and Atul Adya and Barbara Liskov and Andrew C. Meyers HAC: hybrid adaptive caching for distributed storage systems . . . . . . 102--115 Dan S. Wallach and Dirk Balfanz and Drew Dean and Edward W. Felten Extensible security architectures for Java . . . . . . . . . . . . . . . . . . 116--128 Andrew C. Myers and Barbara Liskov A decentralized model for information flow control . . . . . . . . . . . . . . 129--142 Edouard Bugnion and Scott Devine and Mendel Rosenblum Disco: running commodity operating systems on scalable multiprocessors . . 143--156 Daniel J. Scales and Kourosh Gharachorloo Towards transparent and efficient software distributed shared memory . . . 157--169 Robert Stets and Sandhya Dwarkadas and Nikolaos Hardavellas and Galen Hunt and Leonidas Kontothanassis and Srinivasan Parthasarathy and Michael Scott Cashmere-2L: software coherent shared memory on a clustered remote-write network . . . . . . . . . . . . . . . . 170--183 Jason Nieh and Monica S. Lam The design, implementation and evaluation of SMART: a scheduler for multimedia applications . . . . . . . . 184--197 Michael B. Jones and Daniela Ro\csu and Marcel-Cãtãlin Ro\csu CPU reservations and time constraints: efficient, predictable scheduling of independent activities . . . . . . . . . 198--211 William J. Bolosky and Robert P. Fitzgerald and John R. Douceur Distributed schedule management in the Tiger video fileserver . . . . . . . . . 212--223 Chandramohan A. Thekkath and Timothy Mann and Edward K. Lee Frangipani: a scalable distributed file system . . . . . . . . . . . . . . . . . 224--237 Jeanna Neefe Matthews and Drew Roselli and Adam M. Costello and Randolph Y. Wang and Thomas E. Anderson Improving the performance of log-structured file systems with adaptive methods . . . . . . . . . . . . 238--251 David C. Steere Exploiting the non-determinism and asynchrony of set iterators to reduce aggregate file I/O latency . . . . . . . 252--263 Geoffrey H. Kuenning and Gerald J. Popek Automated hoarding for mobile computers 264--275 Brian D. Noble and M. Satyanarayanan and Dushyanth Narayanan and James Eric Tilton and Jason Flinn and Kevin R. Walker Agile application-aware adaptation for mobility . . . . . . . . . . . . . . . . 276--287 Karin Petersen and Mike J. Spreitzer and Douglas B. Terry and Marvin M. Theimer and Alan J. Demers Flexible update propagation for weakly consistent replication . . . . . . . . . 288--301
Edward A. Feustel and Terry Mayfield The DGSA: unmet information security challenges for operating system designers . . . . . . . . . . . . . . . 3--22 Birgit Pfitzmann and Michael Waidner How to break fraud-detectable key recovery . . . . . . . . . . . . . . . . 23--28 Theodore Faber Optimizing throughout in a workstation-based network file system over a high bandwidth local area network 29--40 Özalp Babao\uglu and Renzo Davoli and Alberto Montresor and Roberto Segala System support for partition-aware network applications . . . . . . . . . . 41--56 Yanxiang He and Donald H. Cooley and Jianping Zhang Planning management of multiagent-based distributed open: computing environment model . . . . . . . . . . . . . . . . . 57--64
W. M. Waite Is operating systems review obsolete? 1--1 Gunter Haring and Christoph Lindemann and Martin Reiser International workshop performance evaluation . . . . . . . . . . . . . . . 2--3 Marco de Vivo and Gabriela O. de Vivo and Germinal Isern Internet security attacks at the basic levels . . . . . . . . . . . . . . . . . 4--15 Stefanos Gritzalis and George Aggelis Security issues surrounding programming languages for mobile code: JAVA vs. Safe-Tcl . . . . . . . . . . . . . . . . 16--32
Shouhuai Xu and Gendu Zhang and Hong Zhu On the security of three-party cryptographic protocols . . . . . . . . 7--20 Amjad Mahmood Task allocation in distributed computing systems . . . . . . . . . . . . . . . . 21--29 Sung-Il Kang and Heung-Kyu Lee Analysis and solution of non-preemptive policies for scheduling readers and writers . . . . . . . . . . . . . . . . 30--50 George Dimitoglou Deadlocks and methods for their detection, prevention and recovery in modern operating systems . . . . . . . . 51--54 Sanglu Lu and Xie Li A scalable loading balancing system for NOWs . . . . . . . . . . . . . . . . . . 55--63 Zhonghua Yang and Chengzheng Sun CORBA for hard real time applications: some critical issues . . . . . . . . . . 64--71 Rajesh Bordawekar A case for compositional file systems (extended abstract) . . . . . . . . . . 72--80
Geoffrey M. Voelker Report on the SIGMETRICS'98/PERFORMANCE'98 Joint International Conference on Measurement and Modeling of Computer Systems . . . . 3--8 Ross Anderson and Francesco Bergadano and Bruno Crispo and Jong-Hyeon Lee and Charalampos Manifavas and Roger Needham A new family of authentication protocols 9--20 Chris J. Mitchell and Chan Yeob Yeun Fixing a problem in the Helsinki protocol . . . . . . . . . . . . . . . . 21--24 D. Patiyoot and S. J. Shepherd Techniques for authentication protocols and key distribution on wireless ATM networks . . . . . . . . . . . . . . . . 25--32 Marc Joye and Sung-Ming Yen ID-based secret-key cryptography . . . . 33--39 Bernhard Wagner Controlling CGI programs . . . . . . . . 40--46 Winfried E. Kühnhauser A classification of interdomain actions 47--61 Stein J. Ryan Synchronization in portable device drivers . . . . . . . . . . . . . . . . 62--69 Xiaohui Wei and Jiubin Ju SFT: a consistent checkpointing algorithm with shorter freezing time . . 70--76 Steven Robbins Introducing empirical investigation in undergraduate operating systems . . . . 77--80
Keith D. Cooper and Timothy J. Harvey Compiler-controlled memory . . . . . . . 2--11 Matthew L. Seidl and Benjamin G. Zorn Segregating heap objects by reference behavior and lifetime . . . . . . . . . 12--23 Michelle Mills Strout and Larry Carter and Jeanne Ferrante and Beth Simon Schedule-independent storage mapping for loops . . . . . . . . . . . . . . . . . 24--33 Avinash Sodani and Gurindar S. Sohi An empirical analysis of instruction repetition . . . . . . . . . . . . . . . 35--45 Walter Lee and Rajeev Barua and Matthew Frank and Devabhaktuni Srikrishna and Jonathan Babb and Vivek Sarkar and Saman Amarasinghe Space-time scheduling of instruction-level parallelism on a raw machine . . . . . . . . . . . . . . . . 46--57 Lance Hammond and Mark Willey and Kunle Olukotun Data speculation support for a chip multiprocessor . . . . . . . . . . . . . 58--69 Rodney Van Meter and Gregory G. Finn and Steve Hotz VISA: Netstation's virtual Internet SCSI adapter . . . . . . . . . . . . . . . . 71--80 Anurag Acharya and Mustafa Uysal and Joel Saltz Active disks: programming model, algorithms and evaluation . . . . . . . 81--91 Garth A. Gibson and David F. Nagle and Khalil Amiri and Jeff Butler and Fay W. Chang and Howard Gobioff and Charles Hardin and Erik Riedel and David Rochberg and Jim Zelenka A cost-effective, high-bandwidth storage architecture . . . . . . . . . . . . . . 92--103 Philip Machanick and Pierre Salverda and Lance Pompe Hardware-software trade-offs in a direct Rambus implementation of the RAMpage memory hierarchy . . . . . . . . . . . . 105--114 Amir Roth and Andreas Moshovos and Gurindar S. Sohi Dependence based prefetching for linked data structures . . . . . . . . . . . . 115--126 Boris Weissman Performance counters and state sharing annotations: a unified approach to thread locality . . . . . . . . . . . . 127--138 Brad Calder and Chandra Krintz and Simmi John and Todd Austin Cache-conscious data placement . . . . . 139--149 Bich C. Le An out-of-order execution technique for runtime binary translators . . . . . . . 151--158 Chandra Krintz and Brad Calder and Han Bok Lee and Benjamin G. Zorn Overlapping execution with transfer using non-strict execution for mobile programs . . . . . . . . . . . . . . . . 159--169 Jared Stark and Marius Evers and Yale N. Patt Variable length path branch prediction 170--179 Ben Verghese and Anoop Gupta and Mendel Rosenblum Performance isolation: sharing and isolation in shared-memory multiprocessors . . . . . . . . . . . . 181--192 Yuqun Chen and Angelos Bilas and Stefanos N. Damianakis and Cezary Dubnicki and Kai Li UTLB: a mechanism for address translation on network interfaces . . . 193--204 Vivek S. Pai and Mohit Aron and Gaurov Banga and Michael Svendsen and Peter Druschel and Willy Zwaenepoel and Erich Nahum Locality-aware request distribution in cluster-based network servers . . . . . 205--216 Olivier Temam Investigating optimal local memory performance . . . . . . . . . . . . . . 218--227 Somnath Ghosh and Margaret Martonosi and Sharad Malik Precise miss analysis for program transformations with caches of arbitrary associativity . . . . . . . . . . . . . 228--239 Jih-Kwon Peir and Yongjoon Lee and Windsor W. Hsu Capturing dynamic memory reference behavior with adaptive cache topology 240--250 Daniel Citron and Dror Feitelson and Larry Rudolph Accelerating multi-media processing by implementing memoing in multiplication and division units . . . . . . . . . . . 252--261 Chao-Ying Fu and Matthew D. Jennings and Sergei Y. Larin and Thomas M. Conte Value speculation scheduling for high performance processors . . . . . . . . . 262--271 Narayan Ranganathan and Manoj Franklin An empirical study of decentralized ILP execution models . . . . . . . . . . . . 272--281 Eric Schnarr and James R. Larus Fast out-of-order processor simulation using memoization . . . . . . . . . . . 283--294 Bruce L. Jacob and Trevor N. Mudge A look at several memory management units, TLB-refill mechanisms, and page table organizations . . . . . . . . . . 295--306 Parthasarathy Ranganathan and Kourosh Gharachorloo and Sarita V. Adve and Luiz André Barroso Performance of database workloads on shared-memory systems with out-of-order processors . . . . . . . . . . . . . . . 307--318
Jean Bacon Report on the Eighth ACM SIGOPS European Workshop . . . . . . . . . . . . . . . . 6--17 Stein J. Ryan Synchronization in portable device drivers . . . . . . . . . . . . . . . . 18--25 Wei Xiao-Hui and Ju Jiu-Bin SCR algorithm: saving/restoring states of file systems . . . . . . . . . . . . 26--33 Yan Gu and B. S. Lee and Wentong Cai Evaluation of Java thread performance on two different multithreaded kernels . . 34--46 Taekyoung Kwon and Jooseok Song Clarifying straight replays and forced delays . . . . . . . . . . . . . . . . . 47--52
Winfried E. Kühnhauser A comment on S. Kang's and H. Lee's paper on ``Analysis and solution of non-preemptive policies for scheduling readers and writers'' (OSR 32(2)) . . . 4--4 Pei Dan and Wang Dongsheng and Zhang Youhui and Shen Meiming Quasi-asynchronous migration: a novel migration protocol for PVM tasks . . . . 5--14 Andrew T. Campbell and Irene Katzela and Kazuho Miki and John Vicente Open Signaling for ATM, INTERNET and Mobile Networks (OPENSIG'98) . . . . . . 15--28 Danai Patiyoot and S. J. Shepherd WASS: wireless ATM security system . . . 29--35 Danai Patiyoot and S. J. Shepherd Cryptographic security techniques for wireless networks . . . . . . . . . . . 36--50 Udo Halfmann and Winfried E. Kühnhauser Embedding security policies into a distributed computing environment . . . 51--64
Siaw-Lynn Ng Comments on ``On the Security of Three-Party Cryptographic Protocols'' by Xu, Zhang, Zhu . . . . . . . . . . . . . 5--6 David Kotz and Robert S. Gray Mobile agents and the future of the Internet . . . . . . . . . . . . . . . . 7--13 M. Satyanarayanan and Jason Flinn and Kevin R. Walker Visual proxy: exploiting OS customizations without application source code . . . . . . . . . . . . . . 14--18 Jong-Hyeon Lee The big brother ballot . . . . . . . . . 19--25 D. Patiyoot and S. J. Shepherd Modelling and evaluation of security induced delay in wireless ATM networks 26--31 Hai Jin On-the-fly reconstruction of the failed disk in RAID . . . . . . . . . . . . . . 32--42 Sung-Il Kang and Kihyun Pyun and Heung-Kyu Lee Performance evaluation of non-preemptive policies for scheduling readers and writers . . . . . . . . . . . . . . . . 43--61
M. Satyanarayanan Digest of proceedings, Seventh IEEE Workshop on Hot Topics in Operating Systems, March 29--30, 1999, Rio Rico, AZ . . . . . . . . . . . . . . . . . . . 4--21 Danai Patiyoot and S. J. Shepard Security issues in ATM networks . . . . 22--35 D. Patiyoot and S. J. Shepherd WASS: a security services for wireless ATM networks . . . . . . . . . . . . . . 36--41 John A. Bull and David J. Otway A nested mutual authentication protocol 42--47 Yuqing Zhang and Jihong Li and Guozhen Xiao An approach to the formal verification of the two-party cryptographic protocols 48--51 D. G. Waddington and D. Hutchison Resource partitioning in general purpose operating systems: experimental results in Windows NT . . . . . . . . . . . . . 52--74 C. Toinard and G. Florin and C. Carrez A formal method to prove ordering properties of multicast systems . . . . 75--75 Carlos Baquero and Francisco Moura Using structural characteristics for autonomous operation . . . . . . . . . . 90--96
Yasushi Saito and Brian N. Bershad and Henry M. Levy Manageability, availability and performance in Porcupine: a highly scalable, cluster-based mail service . . 1--15 Alec Wolman and M. Voelker and Nitin Sharma and Neal Cardwell and Anna Karlin and Henry M. Levy On the scale and performance of cooperative Web proxy caching . . . . . 16--31 Brian K. Schmidt and Monica S. Lam and J. Duane Northcutt The interactive performance of SLIM: a stateless, thin-client architecture . . 32--47 Jason Flinn and M. Satyanarayanan Energy-aware adaptation for mobile applications . . . . . . . . . . . . . . 48--63 David Wetherall Active network vision and reality: lessons from a capsule-based system . . 64--79 Xiaoming Liu and Christoph Kreitz and Robbert van Renesse and Jason Hickey and Mark Hayden and Kenneth Birman and Robert Constable Building reliable, high-performance communication systems from components 80--92 Werner Vogels File system usage in Windows NT 4.0 . . 93--109 Douglas S. Santry and Michael J. Feeley and Norman C. Hutchinson and Alistair C. Veitch and Ross W. Carton and Jacob Ofir Deciding when to forget in the Elephant file system . . . . . . . . . . . . . . 110--123 David Mazi\`eres and Michael Kaminsky and M. Frans Kaashoek and Emmett Witchel Separating key management from file system security . . . . . . . . . . . . 124--139 Tzi-cker Chiueh and Ganesh Venkitachalam and Prashant Pradhan Integrating segmentation and paging protection for safe, efficient and transparent software extensions . . . . 140--153 Kinshuk Govil and Dan Teodosiu and Yongqiang Huang and Mendel Rosenblum Cellular Disco: resource management using virtual clusters on shared-memory multiprocessors . . . . . . . . . . . . 154--169 Jonathan S. Shapiro and Jonathan M. Smith and David J. Farber EROS: a fast capability system . . . . . 170--185 William Adjie-Winoto and Elliot Schwartz and Hari Balakrishnan and Jeremy Lilley The design and implementation of an intentional naming system . . . . . . . 186--201 Emin Gün Sirer and Robert Grimm and Arthur J. Gregory and Brian N. Bershad Design and implementation of a distributed virtual machine for networked computers . . . . . . . . . . 202--216 Robert Morris and Eddie Kohler and John Jannotti and M. Frans Kaashoek The Click modular router . . . . . . . . 217--231 Mohit Aron and Peter Druschel Soft timers: efficient microsecond software timer support for network processing . . . . . . . . . . . . . . . 232--246 John R. Douceur and William J. Bolosky Progress-based regulation of low-importance processes . . . . . . . . 247--260 Kenneth J. Duda and David R. Cheriton Borrowed-virtual-time (BVT) scheduling: supporting latency-sensitive threads in a general-purpose scheduler . . . . . . 261--276 Khawar M. Zuberi and Padmanabhan Pillai and Kang G. Shin EMERALDS: a small-memory real-time microkernel . . . . . . . . . . . . . . 277--299
Tyrone Nicholas and Jerzy A. Barchanski Overview of TOS: a distributed educational operating system in Java . . 2--10 Rohit Dube Scalable hierarchical coarse-grained timers . . . . . . . . . . . . . . . . . 11--20 Yang Kun and Guo Xin and Liu Dayou Security in mobile agent system: problems and approaches . . . . . . . . 21--28
Jay Lepreau and Eric Eide Session summaries from the 17th Symposium on Operating Systems Principle (SOSP'99) . . . . . . . . . . . . . . . 4--5 Mark Theimer and M. Satyanarayanan and Maria Ebling and Mary Baker and Frans Kaashoek and Jay Lepreau and Andrew Black and Carla Ellis Tribute to Mark Weiser (summary only) 6--7 Jerry Saltzer Copying with complexity (invited talk) (summary only) . . . . . . . . . . . . . 7--8 Butler Lampson Computer systems research (invited talk) (summary only): past and future . . . . 8--9 Yasushi Saito and Brian N. Bershad and Henry M. Levy Manageability, availability and performance in Porcupine: a highly scalable, cluster-based mail service (summary only) . . . . . . . . . . . . . 9--11 Alec Wolman and Geoffrey M. Voelker and Nitin Sharma and Neal Cardwell and Anna Karlin and Henry M. Levy On the scale and performance of cooperative Web proxy caching . . . . . 11--12 Brian K. Schimdt and Monica S. Lam and J. Duane Northcut The interactive performance of SLIM: a stateless, thin-client architecture . . 12--13 Jason Flinn and M. Satyanarayanan Energy-aware adaptation for mobile applications . . . . . . . . . . . . . . 13--14 David Wetherall Active network vision and reality: lessons from a capsule-based system . . 15--16 Xiaoming Liu and Christoph Kreitz and Robbert van Renesse and Jason Hickey and Mark Hayden and Kenneth Birman and Robert Constable Building reliable, high-performance communication systems from components 16--17 Werner Vogels File system usage in Windows NT 4.0 . . 17--18 Douglas S. Santry and Michael J. Feeley and Norman C. Hutchinson and Alistair C. Veitch and Ross W. Carton and Jacob Ofir Deciding when to forget in the Elephant file system . . . . . . . . . . . . . . 18--19 David Mazi\`eres and Michael Kaminsky and M. Frans Kaashoek and Emmett Witchel Separating key management from file system security . . . . . . . . . . . . 19--20 Tzi-Cker Chiueh and Ganesh Venkitachalam and Prashant Pradhan Integrating segmentation and paging protection for safe, efficient and transparent software extensions . . . . 20--20 Kingshuk Govil and Dan Teodosiu and Yongqiang Huang and Mendel Rosenblum Cellular disco: resource management using virtual clusters on shared-memory multiprocessors . . . . . . . . . . . . 21--21 Jonathan S. Shapiro and Jonathan M. Smith and David J. Farber EROS: a fast capability system . . . . . 21--22 William Adjie-Winoto and Elliot Schwartz and Hari Balakrishnan and Jeremy Lilley The design and implementation of an intentional naming system . . . . . . . 22--22 Emin Gün Sirer and Robert Grimm and Arthur J. Gregory and Brian N. Bershad Design and implementation of a distributed virtual machine for networked computers . . . . . . . . . . 23--23 Robert Morris and Eddie Kohler and John Jannotti and M. Frans Kaashoek The click modular router . . . . . . . . 24--25 Mohit Aron and Peter Druschel Soft timers: efficient microsecond software timer support for network processing . . . . . . . . . . . . . . . 25--26 John R. Douceur and William J. Bolosky Process-based regulation of low-importance processes . . . . . . . . 26--27 Kenneth J. Duda and David R. Cheriton Borrowed-virtual-time (BVT) scheduling: supporting latency-sensitive threads in a general-purpose scheduler . . . . . . 27--28 Khawar M. Zuberi and Padmanabhan Pillai and Kang G. Shin EMERALDS: a small-memory real-time microkernel . . . . . . . . . . . . . . 28--29 Marc Shapiro Lessons learned from a wide area sharing platform . . . . . . . . . . . . . . . . 29--29 William J. Bolosky and John R. Doucher and Marvin Theimer Mutually-distrusting cooperative file systems . . . . . . . . . . . . . . . . 29--30 Greg Ganger and Steve Schlosser and John Griffin and David Nagle Incorporating MEMS-based storage into computer systems . . . . . . . . . . . . 30--30 Jay Lepreau and Chris Alfeld and David Andersen and Kristin Wright A highly configurable emulation facility for distributed systems and networks . . 30--30 Umakishore Ramachandran System infrastructure for ubiquitous presence . . . . . . . . . . . . . . . . 31--31 John Regehr and John A. Stankovic Hierarchical schedulers, performance guarantee, and resource management . . . 31--31 Matthew Flatt and Alastair Reid and Jay Lepreau CpU: practical components for systems software . . . . . . . . . . . . . . . . 32--32 Michael L. Scott and Sandhya Dwarkadas and Srinivasan Parthasarathy and Rajeev Balasubramonian and DeQing Chen and Grigorios Magklis and Athanasios Papathanasiou and Eduardo Pinheiro and Umit Rencuzogullari and Chunquiang Tang Interweave: object caching meets software distributed shared memory . . . 32--32 Eyal de Lara and Dan Wallach and Willy Zwaenepoel Puppeteer: component-based adaptation for mobile computing . . . . . . . . . . 33--33 Chenyang Lu and John A. Stankovic and Tarek Abdelzaher and Sang H. Son and Gang Tao Feedback control real-time scheduling: support for performance guarantees in unpredictable environments . . . . . . . 33--33 Yasushi Shinjo and Calton Pu Developing correct and efficient multithreaded programs with thread-specific data and a partial evaluator . . . . . . . . . . . . . . . 33--33 Haifeng Yu TACT: tunable availability and consistency tradeoffs for replicated Internet services . . . . . . . . . . . 33--33 Aaron Brown Towards benchmarks for maintainability, availability and growth/evolution . . . 34--34 David Cheriton TRIAD . . . . . . . . . . . . . . . . . 34--34 Pål Halvorsen Network level framing: speeding up a multimedia storage server . . . . . . . 34--34 Tatyana Ryutov and Clifford Neuman Representation and evaluation of security policies . . . . . . . . . . . 34--34 Emmanuel Cecchet Distributed shared memory for large computing clusters based on memory-mapped networks (poster session) 35--35 Fay Chang and Garth Gibson Automatic generation of I/O prefetching hints through speculative execution (poster session) . . . . . . . . . . . . 35--35 Han Kilicote PASIS: perpetually available and secure information systems (poster session) . . 35--35 Khalil Amiri and David Petrou and Greg Ganger and Garth Gibson Automatic function placement in distributed storage systems . . . . . . 36--36 Surendar Chandra and Carla Schlatter Ellis and Amin Vahdat Differentiated QoS through quality aware transformation of Web content . . . . . 36--36 Pål Halvorsen and Thomas Plagemann and Vera Goebel The INSTANCE project: operating system enhancements to support multimedia servers . . . . . . . . . . . . . . . . 36--36 Joon Suan Ong and Yvonne Coady and Michael J. Feeley Integrating virtual memory with user-level network communication . . . . 36--37 Anurag Acharya and Maximilian Ibel and Matthias Koelsch and Michael Schmitt RENS: a framework for rapidly evolvable network services . . . . . . . . . . . . 37--37 Donald Miller and Alan Skousen The Sombrero distributed single address space operating system . . . . . . . . . 37--37 Yasushi Negishi Tuplink: a communication system for PDAs and micro-devices . . . . . . . . . . . 37--37 Steven D. Gribble and Eric A. Brewer and David Culler and Joseph M. Hellerstein Persistent distributed data structures to simplify cluster-based Internet services . . . . . . . . . . . . . . . . 37--38 Eric Jul and Povl Koch and Jòrgen S. Hansen and Michael Svendsen and Kim Henriksen and Kenn Nielsen and Mads Dydensborg High-performance cluster-based Internet servers . . . . . . . . . . . . . . . . 38--38 Erez Zadok and Jason Nieh FIST: a language for stackable file systems . . . . . . . . . . . . . . . . 38--38 Jon Howell and David Kotz Restricted delegation: seamlessly spanning administrative boundaries . . . 38--39 Ian McDonald Distributed, flexible memory management in an operating system supporting quality of service . . . . . . . . . . . 39--39 Rolf Neugebauer A Unix-like personality supporting quality-of-service . . . . . . . . . . . 39--39 Prashant Pradhan and Anindya Neogi Suez: high-performance real-time IP router . . . . . . . . . . . . . . . . . 39--39 Eyal de Lara and Dan Wallach and Willy Zwaenepoel Puppeteer: component-based adaptation for mobile computing (poster session) 40--40 Chenyang Lu and John A. Stankovic and Tarek Abdelzaher and Sang H. Son and Gang Tao Feedback control real-time scheduling: support for performance guarantees in unpredictable environments (poster session) . . . . . . . . . . . . . . . . 40--40 Yasushi Shinjo Developing correct and efficient multithreaded programs with thread-specific data and a partial evaluator . . . . . . . . . . . . . . . 40--40 Haifeng Yu TACT: tunable availability and consistency tradeoffs for replicated Internet services (poster session) . . . 40--40 Aaron Brown Towards benchmarks for maintainability, availability and growth/evolution(MAGE) 41--41 David Cheriton TRIAD . . . . . . . . . . . . . . . . . 41--41 Pål Halvorsen Network level farming: speeding up a multimedia storage server . . . . . . . 41--41 Tatyana Ryutov and Clifford Neuman Representation and evaluation of security policies (poster session) . . . 41--41 Yibei Ling and Tracy Mullen and Xiaola Lin Analysis of optimal thread pool size . . 42--55 Marc Lacoste Towards a secure platform for distributed mobile object computing . . 56--73 Sanglu Lu and Li Xie Scalable scheduling on a network of workstations . . . . . . . . . . . . . . 74--83 Chen Ximing and Lu Xianliang Runtime incremental concentrated scheduling on NOW(NRICS) . . . . . . . . 84--96
John A. Trono and William E. Taylor Further comments on \em ``A Correct and Unrestrictive Implementation of General Semaphores'' . . . . . . . . . . . . . . 5--10 Baowen Xu Tagged semaphores . . . . . . . . . . . 11--15 Pengjun Pei and Guohua Cui and Kun Peng On a session key compromise problem in [KC95] protocol . . . . . . . . . . . . 16--18 Yongxing Sun and Xinmei Wang An approach to finding the attacks on the cryptographic protocols . . . . . . 19--28 Li Ji and Li Tianning and Chen Guihai and Xie Li and C. L. Wang Strategies optimization and integration in DSM . . . . . . . . . . . . . . . . . 29--39 K. A. Iskra and F. van der Linden and Z. W. Hendrikse and B. J. Overeinder and G. D. van Albada and P. M. A. Sloot The implementation of dynamite: an environment for migrating PVM tasks . . 40--55 Chris J. Mitchell Making serial number based authentication robust against loss of state . . . . . . . . . . . . . . . . . 56--59 A. Bouabdallah and C. Laforest A distributed token-based algorithm for the dynamic resource allocation problem 60--68 G. Alan Creak and Robert Sheehan A top-down operating systems course . . 69--80
John A. Trono Comments on \em ``Tagged semaphores'' 7--11 Chun-Li Lin and Hung-Min Sun and Tzonelih Hwang Three-party encrypted key exchange: attacks and a solution . . . . . . . . . 12--20 D. M. Beder and A. Romanovsky and B. Randell and C. R. Snow and R. J. Stroud An application of fault tolerance patterns and coordinated atomic actions to a problem in railway scheduling . . . 21--31 M. Satyanarayanan Caching trust rather than content . . . 32--33 J. M. Sierra and S. J. Shepherd New phase 1 exchange mode for IKE framework . . . . . . . . . . . . . . . 34--40 Gerco Ballintijn and Maarten van Steen Characterizing Internet performance to support wide-area application development . . . . . . . . . . . . . . 41--47 Michael Sonntag and Rudolf Hörmanseder Mobile agent security based on payment 48--55 Laurence Duchien and Gérard Florin and Lionel Seinturier Partial order relations in distributed object environments . . . . . . . . . . 56--75 Henri Bal and Raoul Bhoedjang and Rutger Hofman and Ceriel Jacobs and Thilo Kielmann and Jason Maassen and Rob van Nieuwpoort and John Romein and Luc Renambot and Tim Rühl and Ronald Veldema and Kees Verstoep and Aline Baggio and Gerco Ballintijn and Ihor Kuz and Guillaume Pierre and Maarten van Steen and Andy Tanenbaum and Gerben Doornbos and Desmond Germans and Hans Spoelder and Evert-Jan Baerends and Stan van Gisbergen and Hamideh Afsermanesh and Dick van Albada and Adam Belloum and David Dubbeldam and Zeger Hendrikse and Bob Hertzberger and Alfons Hoekstra and Kamil Iskra and Drona Kandhai and Dennis Koelma and Frank van der Linden and Benno Overeinder and Peter Sloot and Piero Spinnato and Dick Epema and Arjan van Gemund and Pieter Jonker and Andrei Radulescu and Cees van Reeuwijk and Henk Sips and Peter Knijnenburg and Michael Lew and Floris Sluiter and Lex Wolters and Hans Blom and Cees de Laat and Aad van der Steen The distributed ASCI Supercomputer project . . . . . . . . . . . . . . . . 76--96
Steven W. Schlosser and John Linwood Griffin and David F. Nagle and Gregory R. Ganger Designing computer systems with MEMS-based storage . . . . . . . . . . . 1--12 Kourosh Gharachorloo and Madhu Sharma and Simon Steely and Stephen Van Doren Architecture and design of AlphaServer GS320 . . . . . . . . . . . . . . . . . 13--24 Milo M. K. Martin and Daniel J. Sorin and Anatassia Ailamaki and Alaa R. Alameldeen and Ross M. Dickson and Carl J. Mauer and Kevin E. Moore and Manoj Plakal and Mark D. Hill and David A. Wood Timestamp snooping: an approach for extending SMPs . . . . . . . . . . . . . 25--36 Ashwini Nanda and Kwok-Ken Mak and Krishnan Sugarvanam and Ramendra K. Sahoo and Vijayaraghavan Soundarararjan and T. Basil Smith MemorIES3: a programmable, real-time hardware emulation tool for multiprocessor server design . . . . . . 37--48 Jeff Gibson and Robert Kunz and David Ofelt and Mark Horowitz and John Hennessy and Mark Heinrich FLASH vs. (Simulated) FLASH: closing the simulation loop . . . . . . . . . . . . 49--58 Andy Chou and Benjamin Chelf and Dawson Engler and Mark Heinrich Using meta-level compilation to check FLASH protocol code . . . . . . . . . . 59--70 Raoul A. F. Bhoedjang and Kees Verstoep and Tim Rühl and Henri E. Bal and Rutger F. H. Hofman Evaluating design alternatives for reliable communication on high-speed networks . . . . . . . . . . . . . . . . 71--81 Peter Mattson and William J. Dally and Scott Rixner and Ujval J. Kapasi and John D. Owens Communication scheduling . . . . . . . . 82--92 Jason Hill and Robert Szewczyk and Alec Woo and Seth Hollar and David Culler and Kristofer Pister System architecture directions for networked sensors . . . . . . . . . . . 93--104 Alvin R. Lebeck and Xiaobo Fan and Heng Zeng and Carla Ellis Power aware page allocation . . . . . . 105--116 Emery D. Berger and Kathryn S. McKinley and Robert D. Blumofe and Paul R. Wilson Hoard: a scalable memory allocator for multithreaded applications . . . . . . . 117--128 Kristián Flautner and Rich Uhlig and Steve Reinhardt and Trevor Mudge Thread-level parallelism and interactive performance of desktop applications . . 129--138 Motohiro Kawahito and Hideaki Komatsu and Toshio Nakatani Effective null pointer check elimination utilizing hardware trap . . . . . . . . 139--149 Youtao Zhang and Jun Yang and Rajiv Gupta Frequent value locality and value-centric data cache design . . . . 150--159 M. Burrows and U. Erlingson and S-T. A. Leung and M. T. Vandevoorde and C. A. Waldspurger and K. Walker and W. E. Weihl Efficient and flexible value sampling 160--167 David Lie Chandramohan Thekkath and Mark Mitchell and Patrick Lincoln and Dan Boneh and John Mitchell and Mark Horowitz Architectural support for copy and tamper resistant software . . . . . . . 168--177 Jerome Burke and John McDonald and Todd Austin Architectural support for fast symmetric-key cryptography . . . . . . . 178--189 John Kubiatowicz and David Bindel and Yan Chen and Steven Czerwinski and Patrick Eaton and Dennis Geels and Ramakrishna Gummadi and Sean Rhea and Hakim Weatherspoon and Chris Wells and Ben Zhao OceanStore: an architecture for global-scale persistent storage . . . . 190--201 Evelyn Duesterwald and Vasanth Bala Software profiling for hot path prediction: less is more . . . . . . . . 202--211 Rumi Zahir and Jonathan Ross and Dale Morris and Drew Hess OS and compiler considerations in the design of the IA-64 architecture . . . . 212--221 Daniel A. Connors and Hillery C. Hunter and Ben-Chung Cheng and Wen-mei W. Hwu Hardware support for dynamic activation of compiler-directed computation reuse 222--233 Allan Snavely and Dean M. Tullsen Symbiotic jobscheduling for a simultaneous multithreaded processor . . 234--244 Joshua A. Redstone and Susan J. Eggers and Henry M. Levy An analysis of operating system behavior on a simultaneous multithreaded architecture . . . . . . . . . . . . . . 245--256 Karthik Sundaramoorthy and Zach Purser and Eric Rotenburg Slipstream processors: improving both performance and fault tolerance . . . . 257--268
Dongyao Ji and Yuming Wang Comments on \em ``An approach to the formal verification of the two-party cryptographic protocols'' by Zhang, Li and Xiao . . . . . . . . . . . . . . . . 6--7 Bruce K. Haddon IEEE storage system standards . . . . . 8--16 Ming-Yuan Zhu and Lei Luo and Guang-Zhe Xiong A provably correct operating system: $\delta$-core . . . . . . . . . . . . . 17--33 D. Janaki Ram and M. Uma Mahesh and N. S. K. Chandra Sekhar and Chitra Babu Causal consistency in mobile environment 34--40 Chun-Li Lin and Hung-Min Sun and Tzonelih Hwang Efficient and practical DHEKE protocols 41--47 Daniel P. Bovet and Marco Cesati A real bottom-up operating systems course . . . . . . . . . . . . . . . . . 48--60 Herman Chung-Hwa Rao and Yih-Farn Chen and Ming-Feng Chen A proxy-based personal Web archiving service . . . . . . . . . . . . . . . . 61--72 Alberto Montresor and Renzo Davoli and Özalp Babao\uglu Middleware for dependable network services in partitionable distributed systems . . . . . . . . . . . . . . . . 73--96 Maurice Herlihy and Srikanta Tirthapura and Roger Wattenhofer Ordered Multicast and Distributed Swap 85--96
Greg Eisenhauer and Fabián E. Bustamante and Karsten Schwan A middleware toolkit for client-initiated service specialization 7--20 Ahmed Al-Theneyan and Piyush Mehrotra and Mohammed Zubair Enhancing Jini for use across non-multicastable networks . . . . . . . 21--30 Radu Litiu and Atul Prakash DACIA: a mobile component framework for building adaptive distributed applications . . . . . . . . . . . . . . 31--42 Yuqing Zhang and Chunling Wang and Jianping Wu and Xing Li Using SMV for cryptographic protocol analysis: a case study . . . . . . . . . 43--50 Z. Huang and C. Sun and M. Purvis and S. Cranefield View-based consistency and false sharing effect in distributed shared memory . . 51--60 Athena Vakali and Evimaria Terzi Multimedia data storage and representation issues on tertiary storage subsystems: an overview . . . . 61--77 Youhui Zhang and Dongsheng Wang and Weimin Zheng Transparent checkpointing and rollback recovery mechanism for Windows NT applications . . . . . . . . . . . . . . 78--85 M. Bozyigit and M. Wasiq User-level process checkpoint and restore for migration . . . . . . . . . 86--96
Jason Crampton and George Loizou Authorisation and antichains . . . . . . 6--15 Alok Shriram and Anuraag Sarangi and Avinash S. ICHU model for processor allocation in distributed operating systems . . . . . 16--21 Ming-Yuan Zhu and Lei Luo and Guang-Ze Xiong The minimal model of operating systems 22--29 Bu-Sung Lee and Wen-Tong Cai and Stephen J. Turner and Jit-Beng Koh Comparison of network protocol and architecture for distributed virtual simulation environment . . . . . . . . . 30--42 Vijay Gupta A distributed backoff algorithm to support real-time traffic on Ethernet 43--66 B. Gupta and S. K. Banerjee A Roll-Forward Recovery Scheme for Solving the Problem of Coasting Forward for Distributed Systems . . . . . . . . 55--66 Jun Wen and Xiang-liang Lu Realize network subsystem QoS guarantee 67--71
G. Saunders and M. Hitchens and V. Varadharajan Role-based access control and the access control matrix . . . . . . . . . . . . . 6--20 Dan Oestreicher Experience with a commercial Java implementation of group communication using reliable multicast . . . . . . . . 21--31 Chang-Seop Park and Dong-Hoon Lee Secure and efficient key management for dynamic multicast groups . . . . . . . . 32--38 Yuhong Li and Lars Wolf Collection of network information in active networks . . . . . . . . . . . . 39--49 Constantinos Dovrolis and Brad Thayer and Parameswaran Ramanathan HIP: hybrid interrupt-polling for the network interface . . . . . . . . . . . 50--60 Sukanya Suranauwarat and Hideo Taniguchi The design, implementation and initial evaluation of an advanced knowledge-based process scheduler . . . 61--81 Tao Huang and Teng Xu and Xianliang Lu A high resolution disk I/O trace system 82--87 Stefan Ludwig and Winfried Kalfa File system encryption with integrated user management . . . . . . . . . . . . 88--93 Gu Dawu and Wang Yi On the techniques of enhancing the security of block ciphers . . . . . . . 94--96
Steve Zdancewic and Lantian Zheng and Nathaniel Nystrom and Andrew C. Myers Untrusted hosts and confidentiality: secure program partitioning . . . . . . 1--14 Rodrigo Rodrigues and Miguel Castro and Barbara Liskov BASE: using abstraction to improve fault tolerance . . . . . . . . . . . . . . . 15--28 Haifeng Yu and Amin Vahdat The costs and limits of availability for replicated services . . . . . . . . . . 29--42 Andrea C. Arpaci-Dusseau and Remzi H. Arpaci-Dusseau Information and control in gray-box systems . . . . . . . . . . . . . . . . 43--56 Dawson Engler and David Yu Chen and Seth Hallem and Andy Chou and Benjamin Chelf Bugs as deviant behavior: a general approach to inferring errors in systems code . . . . . . . . . . . . . . . . . . 57--72 Andy Chou and Junfeng Yang and Benjamin Chelf and Seth Hallem and Dawson Engler An empirical study of operating systems errors . . . . . . . . . . . . . . . . . 73--88 Padmanabhan Pillai and Kang G. Shin Real-time dynamic voltage scaling for low-power embedded operating systems . . 89--102 Jeffrey S. Chase and Darrell C. Anderson and Prachi N. Thakar and Amin M. Vahdat and Ronald P. Doyle Managing energy and server resources in hosting centers . . . . . . . . . . . . 103--116 Sitaram Iyer and Peter Druschel Anticipatory scheduling: a disk scheduling framework to overcome deceptive idleness in synchronous I/O 117--130 David Andersen and Hari Balakrishnan and Frans Kaashoek and Robert Morris Resilient overlay networks . . . . . . . 131--145 John Heidemann and Fabio Silva and Chalermek Intanagonwiwat and Ramesh Govindan and Deborah Estrin and Deepak Ganesan Building efficient wireless sensor networks with low-level naming . . . . . 146--159 Alex C. Snoeren and Kenneth Conley and David K. Gifford Mesh-based content routing using XML . . 160--173 Athicha Muthitacharoen and Benjie Chen and David Mazi\`eres A low-bandwidth network file system . . 174--187 Antony Rowstron and Peter Druschel Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility . . . . . . . . . . . . 188--201 Frank Dabek and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica Wide-area cooperative storage with CFS 202--215 Tammo Spalink and Scott Karlin and Larry Peterson and Yitzchak Gottlieb Building a robust software-based router using network processors . . . . . . . . 216--229 Matt Welsh and David Culler and Eric Brewer SEDA: an architecture for well-conditioned, scalable Internet services . . . . . . . . . . . . . . . . 230--243
Stuart Eichert and Osman N. Ertugay and Dan Nessett and Suresh Vobbilisetty Commercially viable active networking 8--22 D. Patiyoot Migration /evolution of security towards wireless ATM . . . . . . . . . . . . . . 23--30 Danai Patiyoot Security issues for wireless ATM networks . . . . . . . . . . . . . . . . 31--57 Stephen D. Wolthusen Access and use control using externally controlled reference monitors . . . . . 58--69 Yun Mao and Youhui Zhang and Dongsheng Wang and Weimin Zheng LND: a reliable multi-tier storage device in NOW . . . . . . . . . . . . . 70--80 Jun Wen and Xianliang Lu The design of QoS guarantee network subsystem . . . . . . . . . . . . . . . 81--87 Yanxiang He and Zhuomin Du and Xuhui Li and Donald H. Cooley and Jing He A field-based collaboration strategy in MADCE . . . . . . . . . . . . . . . . . 88--96
Rimon Barr and John C. Bicket and Daniel S. Dantas and Bowei Du and T. W. Danny Kim and Bing Zhou and Emin Gün Sirer On the need for system-level support for ad hoc and sensor networks . . . . . . . 1--5 Niklas Borselius and Chris J. Mitchell and Aaron Wilson A pragmatic alternative to undetachable signatures . . . . . . . . . . . . . . . 6--11 Zhang Youhui and Wang Dongsheng A checkpoint-based high availability run-time system for Windows NT clusters 12--18 Daniel G. Waddington and Ramesh Viswanathan Interaction points: exploiting operating system mechanisms for inter-component communications . . . . . . . . . . . . . 19--35 T. M. Ong and T. M. Lim and B. S. Lee and C. K. Yeo Unicorn: voluntary computing over Internet . . . . . . . . . . . . . . . . 36--51 Bi Peng and Xie Fei and Yang Guangwen and Wang Dingxing A multi-protocol cross-domain communication model for metacomputing systems . . . . . . . . . . . . . . . . 52--63
Felix Rauch and Thomas M. Stricker Comments on \em ``Transparent User-Level Process Checkpoint and Restore for Migration'' by Bozyigit and Wasiq . . . 8--9 Lu Jun and Lu Xianliang and Han Hong and Wei Qingsong A cooperative asynchronous write mechanism for NAS . . . . . . . . . . . 25--32 Yutaka Wada and Zixue Cheng An efficient distributed method for allocating resources based on an unobstructed squeezing technique . . . . 33--45 Cheng-Chi Lee and Min-Shiang Hwang and Wei-Peng Yang A flexible remote user authentication scheme using Smart Cards . . . . . . . . 46--52 Arun Kumar and Neeran Karnik and Girish Chafle Context sensitivity in role-based access control . . . . . . . . . . . . . . . . 53--66 Laurent Amanton and Mohamed Na\"\imi The concept of causal-phase ordering for overlapped broadcasts . . . . . . . 67--81 C. K. Yeo and B. S. Lee and M. H. Er A peering architecture for ubiquitous IP multicast streaming . . . . . . . . . . 82--95
Hong Han and Xian Liang Lu and Jun Lu and Chen Bo and Ren Li Yong Data mining aided signature discovery in network-based intrusion detection system 7--13 Her-Tyan Yeh and Hung-Min Sun Simple authenticated key agreement protocol resistant to password guessing attacks . . . . . . . . . . . . . . . . 14--22 Cheng-Chi Lee and Li-Hua Li and Min-Shiang Hwang A remote user authentication scheme using hash functions . . . . . . . . . . 23--29 Niklas Borselius and Chris J. Mitchell and Aaron Wilson On the value of threshold signatures . . 30--35 Chao Jin and Weimin Zheng and Feng Zhou and Yinghui Wu A distributed persistent object store for scalable service . . . . . . . . . . 36--49 Lu Jun and Lu Xianliang and Luo Guangchun and Han Hong and Zhou Xu STFS: a novel file system for efficient small writes . . . . . . . . . . . . . . 50--54 Nian-Min Yao and Ming-Yang Zheng and Jiu-Bin Ju Pipeline: a new architecture of high performance servers . . . . . . . . . . 55--64
Deborah Estrin Keynote address: Sensor network research: emerging challenges for architecture, systems, and languages . . 1--4 Ravi Rajwar and James R. Goodman Transactional lock-free execution of lock-based programs . . . . . . . . . . 5--17 José F. Martínez and Josep Torrellas Speculative synchronization: applying thread-level speculation to explicitly parallel applications . . . . . . . . . 18--29 Kevin M. Lepak and Mikko H. Lipasti Temporally silent stores . . . . . . . . 30--41 Timothy Sherwood and Erez Perelman and Greg Hamerly and Brad Calder Automatically characterizing large scale program behavior . . . . . . . . . . . . 45--57 Kazunori Ogata and Hideaki Komatsu and Toshio Nakatani Bytecode fetch optimization for a Java interpreter . . . . . . . . . . . . . . 58--67 Tao Li and Lizy Kurian John and Anand Sivasubramaniam and N. Vijaykrishnan and Juan Rubio Understanding and improving operating system effects in control flow prediction . . . . . . . . . . . . . . . 68--80 Philip Levis and David Culler Maté: a tiny virtual machine for sensor networks . . . . . . . . . . . . . . . . 85--95 Philo Juang and Hidekazu Oki and Yong Wang and Margaret Martonosi and Li Shiuan Peh and Daniel Rubenstein Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet . . . . . . . 96--107 Darko Kirovski and Milenko Drini\'c and Miodrag Potkonjak Enabling trusted software integrity . . 108--120 Heng Zeng and Carla S. Ellis and Alvin R. Lebeck and Amin Vahdat ECOSystem: managing energy as a first class operating system resource . . . . 123--132 Raksit Ashok and Saurabh Chheda and Csaba Andras Moritz Cool-Mem: combining statically speculative memory accessing with selective address translation for energy efficiency . . . . . . . . . . . . . . . 133--143 Ruchira Sasanka and Christopher J. Hughes and Sarita V. Adve Joint local and global hardware adaptations for energy . . . . . . . . . 144--155 Dongkeun Kim and Donald Yeung Design and evaluation of compiler algorithms for pre-execution . . . . . . 159--170 Antonia Zhai and Christopher B. Colohan and J. Gregory Steffan and Todd C. Mowry Compiler optimization of scalar value communication between speculative threads . . . . . . . . . . . . . . . . 171--183 Jeffrey Oplinger and Monica S. Lam Enhancing software reliability with speculative threads . . . . . . . . . . 184--196 J. Adam Butts and Guri Sohi Dynamic dead-instruction detection and elimination . . . . . . . . . . . . . . 199--210 Changkyu Kim and Doug Burger and Stephen W. Keckler An adaptive, non-uniform cache structure for wire-delay dominated on-chip caches 211--222 Shubhendu S. Mukherjee and Federico Silla and Peter Bannon and Joel Emer and Steve Lang and David Webb A comparative study of arbitration algorithms for the Alpha 21364 pipelined router . . . . . . . . . . . . . . . . . 223--234 Hyong-youb Kim and Vijay S. Pai and Scott Rixner Increasing Web server throughput with network interface data caching . . . . . 239--250 Eddie Kohler and Robert Morris and Benjie Chen Programming language optimizations for modular router configurations . . . . . 251--263 Muthian Sivathanu and Andrea C. Arpaci-Dusseau and Remzi H. Arpaci-Dusseau Evolving RPC for active storage . . . . 264--276 Robert Cooksey and Stephan Jourdan and Dirk Grunwald A stateless, content-directed data prefetching mechanism . . . . . . . . . 279--290 Michael I. Gordon and William Thies and Michal Karczmarek and Jasper Lin and Ali S. Meli and Andrew A. Lamb and Chris Leger and Jeremy Wong and Henry Hoffmann and David Maze and Saman Amarasinghe A stream compiler for communication-exposed architectures . . 291--303 Emmett Witchel and Josh Cates and Krste Asanovi\'c Mondrian memory protection . . . . . . . 304--316
Atul Adya and William J. Bolosky and Miguel Castro and Gerald Cermak and Ronnie Chaiken and John R. Douceur and Jon Howell and Jacob R. Lorch and Marvin Theimer and Roger P. Wattenhofer Farsite: federated, available, and reliable storage for an incompletely trusted environment . . . . . . . . . . 1--14 Yasushi Saito and Christos Karamanolis and Magnus Karlsson and Mallik Mahalingam Taming aggressive replication in the Pangaea wide-area file system . . . . . 15--30 Athicha Muthitacharoen and Robert Morris and Thomer M. Gil and Benjie Chen Ivy: a read/write peer-to-peer file system . . . . . . . . . . . . . . . . . 31--44 Xiaohu Qie and Ruoming Pang and Larry Peterson Defensive programming: using an annotation toolkit to build DoS-resistant software . . . . . . . . . 45--60 Sanjeev Kumar and Kai Li Using model checking to debug device firmware . . . . . . . . . . . . . . . . 61--74 Madanlal Musuvathi and David Y. W. Park and Andy Chou and Dawson R. Engler and David L. Dill CMC: a pragmatic approach to model checking real code . . . . . . . . . . . 75--88 Juan Navarro and Sitararn Iyer and Peter Druschel and Alan Cox Practical, transparent operating system support for superpages . . . . . . . . . 89--104 Krisztián Flautner and Trevor Mudge Vertigo: automatic performance-setting for Linux . . . . . . . . . . . . . . . 105--116 Andreas Weissel and Björn Beutel and Frank Bellosa Cooperative I/O: a novel I/O semantics for energy-aware applications . . . . . 117--129 Samuel Madden and Michael J. Franklin and Joseph M. Hellerstein and Wei Hong TAG: a Tiny AGgregation service for ad-hoc sensor networks . . . . . . . . . 131--146 Jeremy Elson and Lewis Girod and Deborah Estrin Fine-grained network time synchronization using reference broadcasts . . . . . . . . . . . . . . . 147--163 Ashvin Goel and Luca Abeni and Charles Krasic and Jim Snow and Jonathan Walpole Supporting time-sensitive applications on a commodity OS . . . . . . . . . . . 165--180 Carl A. Waldspurger Memory resource management in VMware ESX server . . . . . . . . . . . . . . . . . 181--194 Andrew Whitaker and Marianne Shaw and Steven D. Gribble Scale and performance in the Denali isolation kernel . . . . . . . . . . . . 195--209 George W. Dunlap and Samuel T. King and Sukru Cinar and Murtaza A. Basrai and Peter M. Chen ReVirt: enabling intrusion analysis through virtual-machine logging and replay . . . . . . . . . . . . . . . . . 211--224 Kai Shen and Hong Tang and Tao Yang and Lingkun Chu Integrated resource management for cluster-based Internet services . . . . 225--238 Bhuvan Urgaonkar and Prashant Shenoy and Timothy Roscoe Resource overbooking and application profiling in shared hosting platforms 239--254 Brian White and Jay Lepreau and Leigh Stoller and Robert Ricci and Shashi Guruprasad and Mac Newbold and Mike Hibler and Chad Barb and Abhijeet Joglekar An integrated experimental environment for distributed systems and networks . . 255--270 Amin Vahdat and Ken Yocum and Kevin Walsh and Priya Mahadevan and Dejan Kosti\'c and Jeff Chase and David Becker Scalability and accuracy in a large-scale network emulator . . . . . . 271--284 Landon P. Cox and Christopher D. Murray and Brian D. Noble Pastiche: making backup cheap and easy 285--298 Miguel Castro and Peter Druschel and Ayalvadi Ganesh and Antony Rowstron and Dan S. Wallach Secure routing for structured peer-to-peer overlay networks . . . . . 299--314 Stefan Saroiu and Krishna P. Gummadi and Richard J. Dunn and Steven D. Gribble and Henry M. Levy An analysis of Internet content delivery systems . . . . . . . . . . . . . . . . 315--327 Arun Venkataramani and Ravi Kokku and Mike Dahlin TCP Nice: a mechanism for background transfers . . . . . . . . . . . . . . . 329--343 Limin Wang and Vivek Pai and Larry Peterson The effectiveness of request redirection on CDN robustness . . . . . . . . . . . 345--360 Steven Osman and Dinesh Subhraveti and Gong Su and Jason Nieh The design and implementation of Zap: a system for migrating computing environments . . . . . . . . . . . . . . 361--376 Constantine P. Sapuntzakis and Ramesh Chandra and Ben Pfaff and Jim Chow and Monica S. Lam and Mendel Rosenblum Optimizing the migration of virtual computers . . . . . . . . . . . . . . . 377--390 Chris Hawblitzel and Thorsten von Eicken Luna: a flexible Java protection system 391--403
Luo Guangchun and Zhang Jun and Lu Xianliang and Lu Jun Active block layout: a high performance disk layout mechanism . . . . . . . . . 5--13 Jing Liu and Mingyang Zheng and Jiubin Ju Offering different services by server clusters . . . . . . . . . . . . . . . . 14--22 Youhui Zhang and Weimin Zheng User-level communication based cooperative caching . . . . . . . . . . 23--33 Patricia Pascal and Thierry Monteil PAPER: influence of deterministic customers in time sharing scheduler . . 34--45 Luo Guangchun and Lu Xianliang and Li Jiong and Zhang Jun MADIDS: a novel distributed IDS based on mobile agent . . . . . . . . . . . . . . 46--53 Gertrude Neuman Levine Defining deadlock . . . . . . . . . . . 54--64
Chih-Wei Lin and Jau-Ji Shen and Min-Shiang Hwang Security enhancement for Optimal Strong-Password Authentication protocol 7--12 Sung-Woon Lee and Woo-Hun Kim and Hyun-Sung Kim and Kee-Young Yoo Parallizable simple authenticated key agreement protocol . . . . . . . . . . . 13--18 Qingsong Wei and Xianliang Lu and Xu Zhou DFTS: a novel distributed high fault-tolerance storage mechanism . . . 19--24 Luo Guangchun and Zhang Jun and Lu Xianliang and Lu Jun HCCM: a novel cache consistence mechanism . . . . . . . . . . . . . . . 25--36 Kun Yang and Xin Guo and Alex Galis and Bo Yang and Dayou Liu Towards efficient resource on-demand in Grid Computing . . . . . . . . . . . . . 37--43 Ruben Pinilla and Marisa Gil JVM: platform independent vs. performance dependent . . . . . . . . . 44--56
Gertrude Neuman Levine Defining deadlock with fungible resources . . . . . . . . . . . . . . . 5--11 Chih-Wei Lin and Jau-Ji Shen and Min-Shiang Hwang Security enhancement for Optimal Strong-Password Authentication Protocol 12--16 Sung-Woon Lee and Woo-Hun Kim and Hyun-Sung Kim and Kee-Young Yoo Parallizable simple authenticated key agreement protocol . . . . . . . . . . . 17--22 Lei Luo and Ming-Yuan Zhu Partitioning based operating system: a formal model . . . . . . . . . . . . . . 23--35 K. W. Tse and W. K. Lam and P. K. Lun Reservation aware operating system for grid economy . . . . . . . . . . . . . . 36--42 S. C. Wang and K. Q. Yan and C. F. Cheng Asynchronous consensus protocol for the unreliable un-fully connected network 43--54 Qingsong Wei and Xianliang Lu and Liyong Ren and Xu Zhou A novel disk queue to reduce disk I/O of messaging system . . . . . . . . . . . . 55--60
Christophe Rippert Protection in flexible operating system architectures . . . . . . . . . . . . . 8--18 Wei-Chi Ku and Chien-Ming Chen and Hui-Lung Lee Weaknesses of Lee--Li--Hwang's hash-based password authentication scheme . . . . . . . . . . . . . . . . . 19--25 Wei-Chi Ku and Hao-Chuan Tsai and Shuai-Min Chen Two simple attacks on Lin--Shen--Hwang's strong-password authentication protocol 26--31 Hyun-Sung Kim and Sung-Woon Lee and Kee-Young Yoo ID-based password authentication scheme using smart cards and fingerprints . . . 32--41 Min-Shiang Hwang and Chao-Chen Yang and Cheng-Yeh Shiu An authentication scheme for mobile satellite communication systems . . . . 42--47 Ruben Pinilla and Marisa Gil ULT: a Java threads model for platform independent execution . . . . . . . . . 48--62 Ren Liyong and Chen Bo and Wu Jing A novel packet-pair-based inferring bandwidth congestion control mechanism for layered multicast . . . . . . . . . 63--69 S. C. Wang and K. Q. Yan and C. F. Cheng Reaching agreement on an unknown network with partial graphic information . . . . 70--89 Carlos Baquero and Nuno Lopes Towards peer-to-peer content indexing 90--96
Winfried E. Kühnhauser Root Kits: an operating systems viewpoint . . . . . . . . . . . . . . . 12--23 Sung-Woon Lee and Hyun-Sung Kim and Kee-Young Yoo Cryptanalysis of a user authentication scheme using hash functions . . . . . . 24--28 Wei-Chi Ku A hash-based strong-password authentication scheme without using Smart Cards . . . . . . . . . . . . . . 29--34 Yuqing Zhang and Xiuying Liu An approach to the formal verification of the three-principal cryptographic protocols . . . . . . . . . . . . . . . 35--42 Bu-Sung Lee and Wing-Keong Woo and Chai-Kiat Yeo and Teck-Meng Lim and Bee-Hwa Lim and Yuxiong He and Jie Song Secure communications between bandwidth brokers . . . . . . . . . . . . . . . . 43--57 B. Gupta and Z. Liu and Z. Liang On designing direct dependency: based fast recovery algorithms for distributed systems . . . . . . . . . . . . . . . . 58--73 M. Bencha\"\iba and A. Bouabdallah and N. Badache and M. Ahmed-Nacer Distributed mutual exclusion algorithms in mobile ad hoc networks: an overview 74--89 Qingsong Wei and Bo Chen and Xianliang Lu and Liyong Ren and Xu Zhou The research of the distributed stripped storage spatial model . . . . . . . . . 90--96
Jeanna Neefe Matthews The case for repeated research in operating systems . . . . . . . . . . . 5--7 Melekam Tsegaye and Richard Foss A comparison of the Linux and Windows device driver architectures . . . . . . 8--33 Yuqing Zhang and Xiuying Liu Running-mode analysis of the Security Socket Layer protocol . . . . . . . . . 34--40 S. C. Wang and K. Q. Yan Revisiting fault diagnosis agreement in a new territory . . . . . . . . . . . . 41--61 Eun-Jun Yoon and Eun-Kyung Ryu and Kee-Young Yoo A secure user authentication scheme using hash functions . . . . . . . . . . 62--68 Jung-Seuk Lee and Jun-Cheol Jeon and Kee-Young Yoo A security scheme for protecting security policies in firewall . . . . . 69--72 Michael Scott Cryptanalysis of an ID-based password authentication scheme using Smart Cards and fingerprints . . . . . . . . . . . . 73--75 Min-Hui Lin and Chin-Chen Chang A secure one-time password authentication scheme with low-computation for mobile communications . . . . . . . . . . . . . 76--84 Narn-Yih Lee and Chien-Nan Wu Improved authentication key exchange protocol without using one-way hash function . . . . . . . . . . . . . . . . 85--92 Cheng-Chi Lee and Min-Shiang Hwang and I-En Liao A server assisted authentication protocol for detecting error vectors . . 93--96
René Serral and Marisa Gil A Linux networking study . . . . . . . . 1--11 Yibei Ling and Wai Chen Measuring cache freshness by additive age . . . . . . . . . . . . . . . . . . 12--17 Zhou Xu and Lu Xialiang and Hou Mengshu DCFS: distributed cooperative fault-tolerance storage mechanism . . . 18--25 ZhouXu and Lu Xianliang and Hou Mengshu and Wu Jin A dynamic distributed replica management mechanism based on accessing frequency detecting . . . . . . . . . . . . . . . 26--34 Bi-Hui Chen Improvement of authenticated multiple-key agreement protocol . . . . 35--41 Kuo-Qin Yan and Shu-Ching Wang and Mao-Lun Chiang New application of reliable agreement: underlying an unsecured business environment . . . . . . . . . . . . . . 42--57 Tian-Fu Lee and Tzonelih Hwang Improved conference key distribution protocol based on a symmetric balanced incomplete block design . . . . . . . . 58--64 Ya-Fan Chang and Chin-Chen Chang and Chia-Lin Kao An improvement on a deniable authentication protocol . . . . . . . . 65--74 Min-Shiang Hwang and Li-Hua Li and Cheng-Chi Lee A key authentication scheme with non-repudiation . . . . . . . . . . . . 75--78 Ya-Fen Chang and Chin-Chen Chang A secure and efficient strong-password authentication protocol . . . . . . . . 79--90 Chou-Chen Yang and Ren-Ching Wang An improvement of security enhancement for the timestamp-based password authentication scheme using Smart Cards 91--96
Tim Leschke Achieving speed and flexibility by separating management from protection: embracing the Exokernel operating system 5--19 Nicolas Bouillot and Eric Gressier-Soudan Consistency models for distributed interactive multimedia applications . . 20--32 Mordechai Geva and Yair Wiseman A common framework for inter-process communication on a cluster . . . . . . . 33--44 Guo Yuan-bo and Ma Jian-feng An intrusion-tolerant authorization and authentication scheme in distributed environments . . . . . . . . . . . . . . 45--51 Chin-Chen Chang and Iuon-Chang Lin An improvement of delegated multisignature scheme with document decomposition . . . . . . . . . . . . . 52--57 Chin-Chen Chang and Yeu-Pong Lai A convertible group signature scheme . . 58--65 Li-Hua Li and Chi-Yu Liu and Min-Shiang Hwang Cryptanalysis of an efficient secure group signature scheme . . . . . . . . . 66--69 Narn-Yih Lee and Ming-Feng Lee Comments on multiparty key exchange scheme . . . . . . . . . . . . . . . . . 70--73 Horng-Twu Liaw and Shiou-Wei Fan and Wei-Chen Wu A simple password authentication using a polynomial . . . . . . . . . . . . . . . 74--79 Ya-Fen Chang and Chin-Chen Chang and Jui-Yi Kuo A secure one-time password authentication scheme using Smart Cards without limiting login times . . . . . . 80--90 Chin-Chen Chang and Iuon-Chang Lin Remarks on fingerprint-based remote user authentication scheme using Smart Cards 91--96
Lance Hammond and Brian D. Carlstrom and Vicky Wong and Ben Hertzberg and Mike Chen and Christos Kozyrakis and Kunle Olukotun Programming with transactional coherence and consistency (TCC) . . . . . . . . . 1--13 Mihai Budiu and Girish Venkataramani and Tiberiu Chelcea and Seth Copen Goldstein Spatial computation . . . . . . . . . . 14--26 Virantha Ekanayake and Clinton Kelly IV and Rajit Manohar An ultra low-power processor for sensor networks . . . . . . . . . . . . . . . . 27--36 Christopher R. Lumb and Richard Golding D-SPTF: decentralized request distribution in brick-based storage systems . . . . . . . . . . . . . . . . 37--47 Yasushi Saito and Svend Fròlund and Alistair Veitch and Arif Merchant and Susan Spence FAB: building distributed enterprise disk arrays from commodity components 48--58 Timothy E. Denehy and John Bent and Florentina I. Popovici and Andrea C. Arpaci-Dusseau and Remzi H. Arpaci-Dusseau Deconstructing storage arrays . . . . . 59--71 Xiaotong Zhuang and Tao Zhang and Santosh Pande HIDE: an infrastructure for efficiently protecting information leakage on the address bus . . . . . . . . . . . . . . 72--84 G. Edward Suh and Jae W. Lee and David Zhang and Srinivas Devadas Secure program execution via dynamic information flow tracking . . . . . . . 85--96 Jaehyuk Huh and Jichuan Chang and Doug Burger and Gurindar S. Sohi Coherence decoupling: making use of incoherence . . . . . . . . . . . . . . 97--106 Srikanth T. Srinivasan and Ravi Rajwar and Haitham Akkary and Amit Gandhi and Mike Upton Continual flow pipelines . . . . . . . . 107--119 Rajagopalan Desikan and Simha Sethumadhavan and Doug Burger and Stephen W. Keckler Scalable selective re-execution for EDGE architectures . . . . . . . . . . . . . 120--132 John Regehr and Alastair Reid HOIST: a system for automatically deriving static analyzers for embedded systems . . . . . . . . . . . . . . . . 133--143 Perry H. Wang and Jamison D. Collins and Hong Wang and Dongkeun Kim and Bill Greene and Kai-Ming Chan and Aamir B. Yunus and Terry Sych and Stephen F. Moore and John P. Shen Helper threads via virtual multithreading on an experimental Itanium-2 processor-based platform . . . 144--155 Matthias Hauswirth and Trishul M. Chilimbi Low-overhead memory leak detection using adaptive statistical profiling . . . . . 156--164 Xipeng Shen and Yutao Zhong and Chen Ding Locality phase prediction . . . . . . . 165--176 Pin Zhou and Vivek Pandey and Jagadeesan Sundaresan and Anand Raghuraman and Yuanyuan Zhou and Sanjeev Kumar Dynamic tracking of page miss ratio curve for memory management . . . . . . 177--188 Rodric M. Rabbah and Hariharan Sandanagobalane and Mongkol Ekpanyapong and Weng-Fai Wong Compiler orchestrated prefetching via speculation and predication . . . . . . 189--198 Chen-Yong Cher and Antony L. Hosking and T. N. Vijaykumar Software prefetching for mark-sweep garbage collection: hardware analysis and software redesign . . . . . . . . . 199--210 David E. Lowell and Yasushi Saito and Eileen J. Samberg Devirtualizable virtual machines enabling general, single-node, online maintenance . . . . . . . . . . . . . . 211--223 Jared C. Smolens and Brian T. Gold and Jangwoo Kim and Babak Falsafi and James C. Hoe and Andreas G. Nowatzyk Fingerprinting: bounding soft-error detection latency and bandwidth . . . . 224--234 Greg Bronevetsky and Daniel Marques and Keshav Pingali and Peter Szwed and Martin Schulz Application-level checkpointing for shared memory programs . . . . . . . . . 235--247 Qiang Wu and Philo Juang and Margaret Martonosi and Douglas W. Clark Formal online methods for voltage/frequency control in multiple clock domain microprocessors . . . . . . 248--259 Mohamed Gomaa and Michael D. Powell and T. N. Vijaykumar Heat-and-run: leveraging SMT and CMP to manage power density through the operating system . . . . . . . . . . . . 260--270 Xiaodong Li and Zhenmin Li and Francis David and Pin Zhou and Yuanyuan Zhou and Sarita Adve and Sanjeev Kumar Performance directed energy management for main memory and disks . . . . . . . 271--283
Shihyu Chou and Eric Jui-Lin Lu and Yi-Hui Chen X-RDR: a role-based delegation processor for Web-based information systems . . . 4--21 Jia Song Segment-based proxy caching for distributed cooperative media content servers . . . . . . . . . . . . . . . . 22--33 Zhan Chuan and Lu Xianliang and Hou Mengshu and Zhou Xu A LVQ-based neural network anti-spam email approach . . . . . . . . . . . . . 34--39 Manik Lal Das and Ashutosh Saxena and Ved P. Gulati and Deepak B. Phatak Hierarchical key management scheme using polynomial interpolation . . . . . . . . 40--47 Ting-Yi Chang and Min-Shiang Hwang and Wei-Pang Yang A new multi-stage secret sharing scheme using one-way function . . . . . . . . . 48--55 Hou Mengshu and Lu Xianliang and Zhou Xu and Zhan Chuan A trust model of P2P system based on confirmation theory . . . . . . . . . . 56--62 Zhou Xu and Lu Xianliang and Hou Mengshu and Zhan Chuan A speed-based adaptive dynamic parallel downloading technique . . . . . . . . . 63--69 Ya-Fen Chang and Chin-Chen Chang An efficient authentication protocol for mobile satellite communication systems 70--84 Wei-Chi Ku and Min-Hung Chiang and Shen-Tien Chang Weaknesses of Yoon--Ryu--Yoo's hash-based password authentication scheme . . . . . . . . . . . . . . . . . 85--89 Wei-Chi Ku and Shuai-Min Chen Cryptanalysis of a flexible remote user authentication scheme using Smart Cards 90--96
Edsger W. Dijkstra My recollections of operating system design . . . . . . . . . . . . . . . . . 4--40 Cliff Jones and David Lomet and Alexander Romanovsky and Gerhard Weikum and Alan Fekete and Marie-Claude Gaudel and Henry F. Korth and Rogerio de Lemos and Eliot Moss and Ravi Rajwar and Krithi Ramamritham and Brian Randell and Luis Rodrigues The atomic manifesto: a story in four quarks . . . . . . . . . . . . . . . . . 41--46 Gertrude Neuman Levine The classification of deadlock prevention and avoidance is erroneous 47--50 Rushikesh K. Joshi and Subash Rajaa Modeling VP operation: the Diwali Festival Problem . . . . . . . . . . . . 51--53 Marisa Gil and Ruben Pinilla Thread coloring: a scheduler proposal from user to hardware threads . . . . . 54--70 Robert Steinke and Micah Clark and Elihu McMahon A new pattern for flexible worker threads with in-place consumption message queues . . . . . . . . . . . . . 71--73 Yair Wiseman ARC based superpaging . . . . . . . . . 74--78 Catherine Dodge and Cynthia Irvine and Thuy Nguyen A study of initialization in Linux and OpenBSD . . . . . . . . . . . . . . . . 79--93 Kuo-Feng Hwang and I-En Liao Two attacks on a user friendly remote authentication scheme with Smart Cards 94--96
Yair Wiseman and Karsten Schwan and Patrick Widener Efficient end to end data exchange using configurable compression . . . . . . . . 4--23 Zhiqiang Lin and Chao Wang and Bing Mao and Li Xie A policy flexible architecture for secure operating system . . . . . . . . 24--33 Jorge Herrerías Guerrero and Roberto Gómez Cárdenas An example of communication between security tools: IPTables --- Snort . . . 34--43 Guangchun Luo and Xianliang Lu and Ting Yang The research on consistency of space/time of IDS . . . . . . . . . . . 44--51 Yan Tang and Tao Wang and Xiaoming Li The design and implementation of LilyTask in shared memory . . . . . . . 52--63 A. Vijay Srinivas and D. Janakiram A model for characterizing the scalability of distributed systems . . . 64--71 Youhui Zhang and Dongsheng Wong and Weimin Zheng User-level checkpoint and recovery for LAM/MPI . . . . . . . . . . . . . . . . 72--81 Kuo-Qin Yan and Shu-Ching Wang The bounds of faulty components on consensus with dual failure modes . . . 82--89 Yi-Hwa Chen and Jinn-Ke Jan Enhancement of digital signature with message recovery using self-certified public keys and its variants . . . . . . 90--96
Keith Loepere Stackable thread mechanisms . . . . . . 4--17 Joseph M. Gwinn Quality-of-Service versus Realtime . . . 18--22 Vijay Shivshanker Gupta Trust and accountability issues in scalable invalidation-based Web cache consistency . . . . . . . . . . . . . . 23--36 Mais Nijim and Tao Xie and Xiao Qin Performance analysis of an admission controller for CPU- and I/O-intensive applications in self-managing computer systems . . . . . . . . . . . . . . . . 37--45 Chien-Fu Cheng and Shu-Ching Wang and Tyne Liang Multi-agent schema of Mobile IP protocol for mobile environment . . . . . . . . . 46--65 Chih-Hung Wang and Yan-Sheng Kuo An efficient contract signing protocol using the aggregate signature scheme to protect signers' privacy and promote reliability . . . . . . . . . . . . . . 66--79 S. C. Wang and M. L. Chiang and K. Q. Yan and K. F. Jea Streets of consensus under unknown unreliable network . . . . . . . . . . . 80--96
Arvind Seshadri and Mark Luk and Elaine Shi and Adrian Perrig and Leendert van Doorn and Pradeep Khosla Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems . . . . . . . . . . . . . 1--16 Petros Efstathopoulos and Maxwell Krohn and Steve VanDeBogart and Cliff Frey and David Ziegler and Eddie Kohler and David Mazi\`eres and Frans Kaashoek and Robert Morris Labels and event processes in the asbestos operating system . . . . . . . 17--30 Emmett Witchel and Junghwan Rhee and Krste Asanovi\'c Mondrix: memory isolation for Linux using Mondrian memory protection . . . . 31--44 Amitanand S. Aiyer and Lorenzo Alvisi and Allen Clement and Mike Dahlin and Jean-Philippe Martin and Carl Porth BAR fault tolerance for cooperative services . . . . . . . . . . . . . . . . 45--58 Michael Abd-El-Malek and Gregory R. Ganger and Garth R. Goodson and Michael K. Reiter and Jay J. Wylie Fault-scalable Byzantine fault-tolerant services . . . . . . . . . . . . . . . . 59--74 Boon Thau Loo and Tyson Condie and Joseph M. Hellerstein and Petros Maniatis and Timothy Roscoe and Ion Stoica Implementing declarative overlays . . . 75--90 Ashlesha Joshi and Samuel T. King and George W. Dunlap and Peter M. Chen Detecting past and present intrusions through vulnerability-specific predicates . . . . . . . . . . . . . . . 91--104 Ira Cohen and Steve Zhang and Moises Goldszmidt and Julie Symons and Terence Kelly and Armando Fox Capturing, indexing, clustering, and retrieving system history . . . . . . . 105--118 Craig A. N. Soules and Gregory R. Ganger Connections: using context to enhance file search . . . . . . . . . . . . . . 119--132 Manuel Costa and Jon Crowcroft and Miguel Castro and Antony Rowstron and Lidong Zhou and Lintao Zhang and Paul Barham Vigilante: end-to-end containment of Internet worms . . . . . . . . . . . . . 133--147 Michael Vrable and Justin Ma and Jay Chen and David Moore and Erik Vandekieft and Alex C. Snoeren and Geoffrey M. Voelker and Stefan Savage Scalability, fidelity, and containment in the Potemkin Virtual Honeyfarm . . . 148--162 Ashvin Goel and Kenneth Po and Kamran Farhadi and Zheng Li and Eyal de Lara The Taser intrusion recovery system . . 163--176 Qingbo Zhu and Zhifeng Chen and Lin Tan and Yuanyuan Zhou and Kimberly Keeton and John Wilkes Hibernator: helping disk arrays sleep through the winter . . . . . . . . . . . 177--190 Edmund B. Nightingale and Peter M. Chen and Jason Flinn Speculative execution in a distributed file system . . . . . . . . . . . . . . 191--205 Vijayan Prabhakaran and Lakshmi N. Bairavasundaram and Nitin Agrawal and Haryadi S. Gunawi and Andrea C. Arpaci-Dusseau and Remzi H. Arpaci-Dusseau IRON file systems . . . . . . . . . . . 206--220 Yuan Yu and Tom Rodeheffer and Wei Chen RaceTrack: efficient detection of data race conditions via adaptive tracking 221--234 Feng Qin and Joseph Tucek and Jagadeesan Sundaresan and Yuanyuan Zhou Rx: treating bugs as allergies---a safe method to survive software failures . . 235--248 Lars Eggert and Joseph D. Touch Idletime scheduling with preemption intervals . . . . . . . . . . . . . . . 249--262 Hai Huang and Wanda Hung and Kang G. Shin FS2: dynamic data replication in free disk space for improving disk performance and energy consumption . . . 263--276 Ricardo A. Baratto and Leonard N. Kim and Jason Nieh THINC: a virtual display architecture for thin-client computing . . . . . . . 277--290
Jeanna N. Matthews Operating systems review: looking back and looking forward . . . . . . . . . . 1--2 Marc E. Fiuczynski PlanetLab: overview, history, and future directions . . . . . . . . . . . . . . . 6--10 Larry Peterson and Timothy Roscoe The design principles of PlanetLab . . . 11--16 Neil Spring and Larry Peterson and Andy Bavier and Vivek Pai Using PlanetLab for network research: myths, realities, and best practices . . 17--24 Robert Ricci and David Oppenheimer and Jay Lepreau and Amin Vahdat Lessons from resource allocators for large-scale multiuser testbeds . . . . . 25--32 Jeannie Albrecht and Christopher Tuttle and Alex C. Snoeren and Amin Vahdat PlanetLab application management using plush . . . . . . . . . . . . . . . . . 33--40 Harsha V. Madhyastha and Arun Venkataramani and Arvind Krishnamurthy and Thomas Anderson Oasis: an overlay-aware network stack 41--48 Akihiro Nakao and Larry Peterson and Andy Bavier Scalable routing overlay networks . . . 49--61 Bernard Wong and Emin Gün Sirer ClosestNode.com: an open access, scalable, shared geocast service for distributed systems . . . . . . . . . . 62--64 KyoungSoo Park and Vivek S. Pai CoMon: a mostly-scalable monitoring system for PlanetLab . . . . . . . . . . 65--74 Steve Muir and Larry Peterson and Marc Fiuczynski and Justin Cappos and John Hartman Privileged operations in the PlanetLab virtualised environment . . . . . . . . 75--88 Mark Huang and Andy Bavier and Larry Peterson PlanetFlow: maintaining accountability for network services . . . . . . . . . . 89--94 Gernot Heiser and Volkmar Uhlig and Joshua LeVasseur Are virtual-machine monitors microkernels done right? . . . . . . . . 95--99 Andrew S. Tanenbaum and Jorrit N. Herder and Herbert Bos File size distribution on UNIX systems: then and now . . . . . . . . . . . . . . 100--104
Patrick G. Bridges and Arthur B. MacCabe and Orran Krieger System software for high end computing 6--7 Mark F. Mergen and Volkmar Uhlig and Orran Krieger and Jimi Xenidis Virtualization for high-performance computing . . . . . . . . . . . . . . . 8--11 Eric Van Hensbergen P.R.O.S.E.: partitioned reliable operating system environment . . . . . . 12--15 Jean-Charles Tournier and Patrick G. Bridges and Arthur B. MacCabe and Patrick M. Widener and Zaid Abudayyeh and Ron Brightwell and Rolf Riesen and Trammel Hudson Towards a framework for dedicated operating systems development in high-end computing systems . . . . . . . 16--21 Ronald G. Minnich and Matthew J. Sottile and Sung-Eun Choi and Erik Hendriks and Jim McKie Right-weight kernels: an off-the-shelf alternative to custom light-weight kernels . . . . . . . . . . . . . . . . 22--28 Pete Beckman and Kamil Iskra and Kazutomo Yoshii and Susan Coghlan Operating system issues for petascale systems . . . . . . . . . . . . . . . . 29--33 Dilma Da Silva and Orran Krieger and Robert W. Wisniewski and Amos Waterland and David Tam and Andrew Baumann K42: an infrastructure for operating system research . . . . . . . . . . . . 34--42 Sayantan Chakravorty and Celso L. Mendes and Laxmikant V. Kalé and Terry Jones and Andrew Tauferner and Todd Inglett and José Moreira HPC-Colony: services and interfaces for very large systems . . . . . . . . . . . 43--49 Hong Ong and Jeffrey Vetter and R. Scott Studham and Collin McCurdy and Bruce Walker and Alan Cox Kernel-level single system image for petascale computing . . . . . . . . . . 50--54 Fabrizio Petrini and Jarek Nieplocha and Vinod Tipparaju SFT: scalable fault tolerance . . . . . 55--62 Christian Engelmann and Stephen L. Scott and David E. Bernholdt and Narasimha R. Gottumukkala and Chokchai Leangsuksun and Jyothish Varma and Chao Wang and Frank Mueller and Aniruddha G. Shet and P. Sadayappan MOLAR: adaptive runtime support for high-end computing operating and runtime systems . . . . . . . . . . . . . . . . 63--72 Lawrence Rauchwerger and Nancy M. Amato SmartApps: middle-ware for adaptive applications on reconfigurable platforms 73--82 Patricia J. Teller and Seetharami R. Seelam Insights into providing dynamic adaptation of operating system policies 83--89 Gengbin Zheng and Chao Huang and Laxmikant V. Kalé Performance evaluation of automatic checkpoint-based fault tolerance for AMPI and Charm++ . . . . . . . . . . . . 90--99 Jason Nieh and Chris Vaill Experiences teaching operating systems using virtual platforms and Linux . . . 100--104 Felix C. Freiling and Hagen Völzer Illustrating the impossibility of crash-tolerant consensus in asynchronous systems . . . . . . . . . . . . . . . . 105--109 Oded Koren A study of the Linux kernel evolution 110--112
Emin Gün Sirer Introduction . . . . . . . . . . . . . . 8--8 Özalp Babao\uglu and Márk Jelasity and Anne-Marie Kermarrec and Alberto Montresor and Maarten van Steen Managing clouds: a case for a fresh look at large unreliable dynamic networks . . 9--13 Jay A. Patel and Indranil Gupta Bridging the gap: augmenting centralized systems with P2P technologies . . . . . 14--17 Jolyon Clulow and Tyler Moore Suicide for the common good: a new strategy for credential revocation in self-organizing systems . . . . . . . . 18--21 Ruchir Bindal and Pei Cao Can self-organizing P2P file distribution provide QoS guarantees? . . 22--30 Fred Douglis and Michael Branson and Kirsten Hildrum and Bin Rong and Fan Ye Multi-site cooperative data stream analysis . . . . . . . . . . . . . . . . 31--37 Evan Hoke and Jimeng Sun and John D. Strunk and Gregory R. Ganger and Christos Faloutsos InteMon: continuous mining of sensor data in large-scale self-infrastructures 38--44 Minor Gordon Small-scale peer-to-peer overlays . . . 45--48 Ming Zhong and Kai Shen Random walk based node sampling in self-organizing networks . . . . . . . . 49--55 David Hales and Özalp Babao\uglu Towards automatic social bootstrapping of peer-to-peer protocols . . . . . . . 56--60 Jacomo Corbo and Antoni Calvó-Armengol and David Parkes A study of Nash equilibrium in contribution games for peer-to-peer networks . . . . . . . . . . . . . . . . 61--66 Panayotis Antoniadis and Costas Courcoubetis Enforcing efficient resource provisioning in peer-to-peer file sharing systems . . . . . . . . . . . . 67--72 Öznur Özkasap and Zülküf Genç and Emre Atsan Epidemic-based approaches for reliable multicast in mobile ad hoc networks . . 73--79 Jorrit N. Herder and Herbert Bos and Ben Gras and Philip Homburg and Andrew S. Tanenbaum MINIX 3: a Highly Reliable, Self-Repairing Operating System . . . . 80--89 Gilles Muller and Yoann Padioleau and Julia L. Lawall and René Rydhof Hansen Semantic patches considered helpful . . 90--92 Úlfar Erlingsson and John MacCormick Ad hoc extensibility and access control 93--101 Ryusuke Konishi and Yoshiji Amagai and Koji Sato and Hisashi Hifumi and Seiji Kihara and Satoshi Moriai The Linux implementation of a log-structured file system . . . . . . . 102--107 Stefan Bosse VAMNET: the functional approach to distributed programming . . . . . . . . 108--114
Håvard Johansen and André Allavena and Robbert van Renesse Fireflies: Scalable support for intrusion-tolerant network overlays . . 3--13 Georgios Portokalidis and Asia Slowinska and Herbert Bos Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation . . . . . . . . . . . . . . . 15--27 Alex Ho and Michael Fetterman and Christopher Clark and Andrew Warfield and Steven Hand Practical taint-based protection using demand emulation . . . . . . . . . . . . 29--41 Michael F. Spear and Tom Roeder and Orion Hodson and Galen C. Hunt and Steven Levi Solving the starting problem: device drivers as self-describing artifacts . . 45--57 Yoann Padioleau and Julia L. Lawall and Gilles Muller Understanding collateral evolution in Linux device drivers . . . . . . . . . . 59--71 Thomas Ball and Ella Bounimova and Byron Cook and Vladimir Levin and Jakob Lichtenberg and Con McGarvey and Bohus Ondrusek and Sriram K. Rajamani and Abdullah Ustuner Thorough static analysis of device drivers . . . . . . . . . . . . . . . . 73--85 Gokul Soundararajan and Cristiana Amza and Ashvin Goel Database replication policies for dynamic content applications . . . . . . 89--102 Jacob R. Lorch and Atul Adya and William J. Bolosky and Ronnie Chaiken and John R. Douceur and Jon Howell The SMART way to migrate replicated stateful services . . . . . . . . . . . 103--115 Sameh Elnikety and Steven Dropsho and Fernando Pedone Tashkent: uniting durability with transaction ordering for high-performance scalable database replication . . . . . . . . . . . . . . 117--130 Orran Krieger and Marc Auslander and Bryan Rosenburg and Robert W. Wisniewski and Jimi Xenidis and Dilma Da Silva and Michal Ostrowski and Jonathan Appavoo and Maria Butrico and Mark Mergen and Amos Waterland and Volkmar Uhlig K42: building a complete operating system . . . . . . . . . . . . . . . . . 133--145 Alan Mislove and Ansley Post and Andreas Haeberlen and Peter Druschel Experiences in building and operating ePOST, a reliable peer-to-peer application . . . . . . . . . . . . . . 147--159 Lenin Singaravelu and Calton Pu and Hermann Härtig and Christian Helmuth Reducing TCB complexity for security-sensitive applications: three case studies . . . . . . . . . . . . . . 161--174 Manuel Fähndrich and Mark Aiken and Chris Hawblitzel and Orion Hodson and Galen Hunt and James R. Larus and Steven Levi Language support for fast and reliable message-based communication in singularity OS . . . . . . . . . . . . . 177--190 Daniel Lohmann and Fabian Scheler and Reinhard Tartler and Olaf Spinczyk and Wolfgang Schröder-Preikschat A quantitative analysis of aspects in the eCos kernel . . . . . . . . . . . . 191--204 Arvind S. Krishna and Aniruddha S. Gokhale and Douglas C. Schmidt Context-specific middleware specialization techniques for optimizing software product-line architectures . . 205--218 Mary Baker and Mehul Shah and David S. H. Rosenthal and Mema Roussopoulos and Petros Maniatis and TJ Giuli and Prashanth Bungale A fresh look at the reliability of long-term digital storage . . . . . . . 221--234 Kimberly Keeton and Dirk Beyer and Ernesto Brau and Arif Merchant and Cipriano Santos and Alex Zhang On the road to recovery: restoring data after disasters . . . . . . . . . . . . 235--248 Xiaoyu Yao and Jun Wang RIMAC: a novel redundancy-based hierarchical cache architecture for energy efficient, high performance storage systems . . . . . . . . . . . . 249--262 Tim Brecht and G. (John) Janakiraman and Brian Lynn and Vikram Saletore and Yoshio Turner Evaluating network processing efficiency with processor partitioning and asynchronous I/O . . . . . . . . . . . . 265--278 Hyong-youb Kim and Scott Rixner TCP offload through connection handoff 279--290 Jeffrey C. Mogul Emergent (mis)behavior vs. complex software systems . . . . . . . . . . . . 293--304 Ori Shalev and Nir Shavit Predictive log-synchronization . . . . . 305--315 Qin Lv and William Josephson and Zhe Wang and Moses Charikar and Kai Li Ferret: a toolkit for content-based similarity search of feature-rich data 317--330 Hongliang Yu and Dongdong Zheng and Ben Y. Zhao and Weimin Zheng Understanding user behavior in large-scale video-on-demand systems . . 333--344 Iqbal Mohomed and Jim Chengming Cai and Eyal de Lara URICA: Usage-awaRe Interactive Content Adaptation for mobile devices . . . . . 345--358 S. B. Handurukande and A.-M. Kermarrec and F. Le Fessant and L. Massoulié and S. Patarin Peer sharing behaviour in the eDonkey network, and implications for the design of server-less file sharing systems . . 359--371 Chun Yuan and Ni Lao and Ji-Rong Wen and Jiwei Li and Zheng Zhang and Yi-Min Wang and Wei-Ying Ma Automated known problem diagnosis with event traces . . . . . . . . . . . . . . 375--388 Atul Singh and Petros Maniatis and Timothy Roscoe and Peter Druschel Using queries for distributed monitoring and forensics . . . . . . . . . . . . . 389--402 Andreas Merkel and Frank Bellosa Balancing power consumption in multiprocessor systems . . . . . . . . . 403--414
Mendel Rosenblum Impact of virtualization on computer architecture and operating systems . . . 1--1 Keith Adams and Ole Agesen A comparison of software and hardware techniques for x86 virtualization . . . 2--13 Stephen T. Jones and Andrea C. Arpaci-Dusseau and Remzi H. Arpaci-Dusseau Geiger: monitoring the buffer cache in a virtual machine environment . . . . . . 14--24 Jedidiah R. Crandall and Gary Wassermann and Daniela A. S. de Oliveira and Zhendong Su and S. Felix Wu and Frederic T. Chong Temporal search: detecting hidden malware timebombs with virtual machines 25--36 Shan Lu and Joseph Tucek and Feng Qin and Yuanyuan Zhou AVIO: detecting atomicity violations via access interleaving invariants . . . . . 37--48 Min Xu and Mark D. Hill and Rastislav Bodik A regulated transitive reduction (RTR) for longer memory race recording . . . . 49--60 Michael D. Bond and Kathryn S. McKinley Bell: bit-encoding online memory leak detection . . . . . . . . . . . . . . . 61--72 Smitha Shyam and Kypros Constantinides and Sujay Phadke and Valeria Bertacco and Todd Austin Ultra low-cost defect protection for microprocessor pipelines . . . . . . . . 73--82 Vimal K. Reddy and Eric Rotenberg and Sailashri Parthasarathy Understanding prediction-based partial redundant threading for low-overhead, high-coverage fault tolerance . . . . . 83--94 Angshuman Parashar and Anand Sivasubramaniam and Sudhanva Gurumurthi SlicK: slice-based locality exploitation for efficient redundant multithreading 95--105 Taliver Heath and Ana Paula Centeno and Pradeep George and Luiz Ramos and Yogesh Jaluria Mercury and Freon: temperature emulation and management for server systems . . . 106--116 Taeho Kgil and Shaun D'Souza and Ali Saidi and Nathan Binkert and Ronald Dreslinski and Trevor Mudge and Steven Reinhardt and Krisztian Flautner PicoServer: using $3$D stacking technology to enable a compact energy efficient chip multiprocessor . . . . . 117--128 Katherine E. Coons and Xia Chen and Doug Burger and Kathryn S. McKinley and Sundeep K. Kushwaha A spatial path scheduling algorithm for EDGE architectures . . . . . . . . . . . 129--140 Martha Mercaldi and Steven Swanson and Andrew Petersen and Andrew Putnam and Andrew Schwerin and Mark Oskin and Susan J. Eggers Instruction scheduling for a tiled dataflow architecture . . . . . . . . . 141--150 Michael I. Gordon and William Thies and Saman Amarasinghe Exploiting coarse-grained task, data, and pipeline parallelism in stream programs . . . . . . . . . . . . . . . . 151--162 Mahim Mishra and Timothy J. Callahan and Tiberiu Chelcea and Girish Venkataramani and Seth C. Goldstein and Mihai Budiu Tartan: evaluating spatial computation for whole program execution . . . . . . 163--174 Stijn Eyerman and Lieven Eeckhout and Tejas Karkhanis and James E. Smith A performance counter architecture for computing accurate CPI components . . . 175--184 Benjamin C. Lee and David M. Brooks Accurate and efficient regression modeling for microarchitectural performance and power prediction . . . . 185--194 Engin Ïpek and Sally A. McKee and Rich Caruana and Bronis R. de Supinski and Martin Schulz Efficiently exploring architectural design spaces via predictive modeling 195--206 Mazen Kharbutli and Xiaowei Jiang and Yan Solihin and Guru Venkataramani and Milos Prvulovic Comprehensively and efficiently protecting the heap . . . . . . . . . . 207--218 Trishul M. Chilimbi and Vinod Ganapathy HeapMD: identifying heap-based bugs using anomaly detection . . . . . . . . 219--228 Satish Narayanasamy and Cristiano Pereira and Brad Calder Recording shared memory dependencies using strata . . . . . . . . . . . . . . 229--240 Jaidev P. Patwardhan and Vijeta Johri and Chris Dwyer and Alvin R. Lebeck A defect tolerant self-organizing nanoscale SIMD architecture . . . . . . 241--251 Ethan Schuchman and T. N. Vijaykumar A program transformation and architecture support for quantum uncomputation . . . . . . . . . . . . . 252--263 Shashidhar Mysore and Banit Agrawal and Navin Srivastava and Sheng-Chih Lin and Kaustav Banerjee and Tim Sherwood Introspective $3$D chips . . . . . . . . 264--273 Jason F. Cantin and Mikko H. Lipasti and James E. Smith Stealth prefetching . . . . . . . . . . 274--282 Koushik Chakraborty and Philip M. Wells and Gurindar S. Sohi Computation spreading: employing hardware migration to specialize CMP cores on-the-fly . . . . . . . . . . . . 283--292 Jason E. Miller and Anant Agarwal Software-based instruction caching for embedded processors . . . . . . . . . . 293--302 Xin Li and Marian Boldt and Reinhard von Hanxleden Mapping Esterel onto a multi-threaded embedded processor . . . . . . . . . . . 303--314 Nathan L. Binkert and Ali G. Saidi and Steven K. Reinhardt Integrated network interfaces for high-bandwidth TCP/IP . . . . . . . . . 315--324 David Tarditi and Sidd Puri and Jose Oglesby Accelerator: using data parallelism to program GPUs for general-purpose uses 325--335 Peter Damron and Alexandra Fedorova and Yossi Lev Hybrid transactional memory . . . . . . 336--346 Weihaw Chuang and Satish Narayanasamy and Ganesh Venkatesh and Jack Sampson and Michael Van Biesbrouck and Gilles Pokam and Brad Calder and Osvaldo Colavin Unbounded page-based transactional memory . . . . . . . . . . . . . . . . . 347--358 Michelle J. Moravan and Jayaram Bobba and Kevin E. Moore and Luke Yen and Mark D. Hill and Ben Liblit and Michael M. Swift and David A. Wood Supporting nested transactional memory in logTM . . . . . . . . . . . . . . . . 359--370 JaeWoong Chung and Chi Cao Minh and Austen McDonald and Travis Skare and Hassan Chafi and Brian D. Carlstrom and Christos Kozyrakis and Kunle Olukotun Tradeoffs in transactional memory virtualization . . . . . . . . . . . . . 371--381 Motohiro Kawahito and Hideaki Komatsu and Takao Moriyama and Hiroshi Inoue and Toshio Nakatani A new idiom recognition framework for exploiting hardware-assist instructions 382--393 Sorav Bansal and Alex Aiken Automatic generation of peephole superoptimizers . . . . . . . . . . . . 394--403 Armando Solar-Lezama and Liviu Tancau and Rastislav Bodik and Sanjit Seshia and Vijay Saraswat Combinatorial sketching for finite programs . . . . . . . . . . . . . . . . 404--415 Jeff Da Silva and J. Gregory Steffan A probabilistic pointer analysis for speculative optimizations . . . . . . . 416--425
Jeanna N. Matthews Operating systems review: year in review 1--2 Brett D. Fleisch Program director's column: can nuggets make a difference? . . . . . . . . . . . 3--4 Erik Riedel Introduction . . . . . . . . . . . . . . 5--6 Yuhui Deng and Frank Wang A heterogeneous storage grid enabled by grid service . . . . . . . . . . . . . . 7--13 Sudharshan Vazhkudai and Xiaosong Ma Recovering transient data: automated on-demand data reconstruction and offloading for supercomputers . . . . . 14--18 Michael Factor and Dalit Naor and Simona Rabinovici-Cohen and Leeat Ramati and Petra Reshef and Julian Satran The need for preservation aware storage: a position paper . . . . . . . . . . . . 19--23 Martin Jambor and Tomas Hruby and Jan Taus and Kuba Krchak and Viliam Holub Implementation of a Linux log-structured file system with a garbage collector . . 24--32 Sudhanva Gurumurthi Should disks be speed demons or brainiacs? . . . . . . . . . . . . . . . 33--36 John A. Chandy and Sumit Narayan Reliability tradeoffs in personal storage systems . . . . . . . . . . . . 37--41 Simson L. Garfinkel Complete delete vs. time machine computing . . . . . . . . . . . . . . . 42--44 Jeffrey Choi Robinson and Jim Alves-Foss A high assurance MLS file server . . . . 45--53 Remzi H. Arpaci-Dusseau CS 736 project highlights from U. Wisconsin: how students spend their days and nights in a winter wonderland . . . 54--55 Himani Apte and Meenali Rungta Adding parity to the Linux \tt ext3 file system . . . . . . . . . . . . . . . . . 56--65 Pratap Ramamurthy and Ramanathan Palaniappan Performance-directed energy management using \em BOS . . . . . . . . . . . . . 66--77 Barton P. Miller and Gregory Cooksey and Fredrick Moore An empirical study of the robustness of MacOS applications using random testing 78--86 Wolfgang Emmerich and Mikio Aoyama and Joe Sventek The impact of research on middleware technology . . . . . . . . . . . . . . . 89--112
Michael D. Schroeder Systems work at Microsoft Research . . . 1--2 Roy Levin A perspective on computing research management . . . . . . . . . . . . . . . 3--9 Andrew Herbert What happened to Pastry . . . . . . . . 10--16 William J. Bolosky and John R. Douceur and Jon Howell The Farsite project: a retrospective . . 17--26 Zheng Zhang and Qiao Lian and Shiding Lin and Wei Chen and Yu Chen and Chao Jin BitVault: a highly reliable distributed data retention platform . . . . . . . . 27--36 Galen C. Hunt and James R. Larus Singularity: rethinking the software stack . . . . . . . . . . . . . . . . . 37--49 Jeremy Elson and Jon Howell and John R. Douceur MapCruncher: integrating the world's geographic information . . . . . . . . . 50--59 Michael Isard Autopilot: automatic data center management . . . . . . . . . . . . . . . 60--67 Dahlia Malkhi and Lev Novik and Chris Purcell P2P replica synchronization with vector sets . . . . . . . . . . . . . . . . . . 68--74 Anmol Sheth and Chandramohan A. Thekkath and Prakshep Mehta and Kalyan Tejaswi and Chandresh Parekh and Trilok N. Singh and Uday B. Desai Senslide: a distributed landslide prediction system . . . . . . . . . . . 75--87 Andrew Birrell and Michael Isard and Chuck Thacker and Ted Wobber A design for high-performance flash disks . . . . . . . . . . . . . . . . . 88--93
Marek Olszewski and Keir Mierle and Adam Czajkowski and Angela Demke Brown JIT instrumentation: a novel approach to dynamically instrument operating systems 3--16 Anupam Chanda and Alan L. Cox and Willy Zwaenepoel Whodunit: transactional profiling for multi-tier applications . . . . . . . . 17--30 Christopher Stewart and Terence Kelly and Alex Zhang Exploiting nonstationarity for performance prediction . . . . . . . . . 31--44 David Tam and Reza Azimi and Michael Stumm Thread clustering: sharing-aware scheduling on SMP--CMP--SMT multiprocessors . . . . . . . . . . . . 47--58 Michael Isard and Mihai Budiu and Yuan Yu and Andrew Birrell and Dennis Fetterly Dryad: distributed data-parallel programs from sequential building blocks 59--72 Bratin Saha and Ali-Reza Adl-Tabatabai and Anwar Ghuloum and Mohan Rajagopalan and Richard L. Hudson and Leaf Petersen and Vijay Menon and Brian Murphy and Tatiana Shpeisman and Eric Sprangle and Anwar Rohillah and Doug Carmean and Jesse Fang Enabling scalability and performance in a large scale CMP environment . . . . . 73--86 Kelvin C. W. So and Emin Gün Sirer Latency and bandwidth-minimizing failure detectors . . . . . . . . . . . . . . . 89--99 Anil Madhavapeddy and Alex Ho and Tim Deegan and David Scott and Ripduman Sohan Melange: creating a `functional' Internet . . . . . . . . . . . . . . . . 101--114 Joseph Tucek and James Newsome and Shan Lu and Chengdu Huang and Spiros Xanthos and David Brumley and Yuanyuan Zhou and Dawn Song Sweeper: a lightweight end-to-end system for defending against fast worms . . . . 115--128 Andreas Lachenmann and Pedro José Marrón and Matthias Gauger and Daniel Minder and Olga Saukh and Kurt Rothermel Removing the memory limitations of sensor networks with flash-based virtual memory . . . . . . . . . . . . . . . . . 131--144 René Müller and Gustavo Alonso and Donald Kossmann A virtual machine for sensor networks 145--158 Asad Awan and Suresh Jagannathan and Ananth Grama Macroprogramming heterogeneous sensor networks using cosmos . . . . . . . . . 159--172 Zhihui Zhang and Kanad Ghose hFS: a hybrid file system prototype for improving small file and metadata performance . . . . . . . . . . . . . . 175--187 Chuanpeng Li and Kai Shen and Athanasios E. Papathanasiou Competitive prefetching for concurrent sequential I/O . . . . . . . . . . . . . 189--202 Jake Wires and Michael J. Feeley Secure file system versioning at the block level . . . . . . . . . . . . . . 203--215 Wei Zheng and Ricardo Bianchini and Thu D. Nguyen Automatic configuration of Internet services . . . . . . . . . . . . . . . . 219--229 David Pariag and Tim Brecht and Ashif Harji and Peter Buhr and Amol Shukla and David R. Cheriton Comparing the performance of Web server architectures . . . . . . . . . . . . . 231--243 Jan S. Rellermeyer and Gustavo Alonso Concierge: a service platform for resource-constrained devices . . . . . . 245--258 Yoav Etsion and Dan Tsafrir and Scott Kirkpatrick and Dror G. Feitelson Fine grained kernel logging with KLogger: experience and insights . . . . 259--272 Stephen Soltesz and Herbert Pötzl and Marc E. Fiuczynski and Andy Bavier and Larry Peterson Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors . . . . . . . . . . . . . . 275--287 Pradeep Padala and Kang G. Shin and Xiaoyun Zhu and Mustafa Uysal and Zhikui Wang and Sharad Singhal and Arif Merchant and Kenneth Salem Adaptive control of virtualized resources in utility computing environments . . . . . . . . . . . . . . 289--302 Yin Wang and Terence Kelly and Stéphane Lafortune Discrete control for safe execution of IT automation workflows . . . . . . . . 305--314 Rachid Guerraoui and Michal Kapalka and Jan Vitek STMBench7: a benchmark for software transactional memory . . . . . . . . . . 315--324 Kristis Makris and Kyung Dong Ryu Dynamic and adaptive updates of non-quiescent subsystems in commodity operating system kernels . . . . . . . . 327--340 Galen Hunt and Mark Aiken and Manuel Fähndrich and Chris Hawblitzel and Orion Hodson and James Larus and Steven Levi and Bjarne Steensgaard and David Tarditi and Ted Wobber Sealing OS processes to improve dependability and safety . . . . . . . . 341--354 Ted Wobber and Aydan Yumerefendi and Martín Abadi and Andrew Birrell and Daniel R. Simon Authorizing applications in singularity 355--368 Hakim Weatherspoon and Patrick Eaton and Byung-Gon Chun and John Kubiatowicz Antiquity: exploiting a secure log for wide-area distributed storage . . . . . 371--384 Lásaro Camargos and Fernando Pedone and Marcin Wieloch Sprint: a middleware for high-performance transaction processing 385--398 Sameh Elnikety and Steven Dropsho and Willy Zwaenepoel Tashkent+: memory-aware load balancing and update filtering in replicated databases . . . . . . . . . . . . . . . 399--412
Michael Hohmuth Introduction . . . . . . . . . . . . . . 1--2 Gernot Heiser and Kevin Elphinstone and Ihor Kuz and Gerwin Klein and Stefan M. Petters Towards trustworthy computing systems: taking microkernels to the next level 3--11 Bryan D. Payne and Reiner Sailer and Ramón Cáceres and Ron Perez and Wenke Lee A layered approach to simplified access control in virtualized systems . . . . . 12--19 Jacob Gorm Hansen and Eske Christiansen and Eric Jul Evil twins: two models for TCB reduction in HPC clusters . . . . . . . . . . . . 20--29 Neal H. Walfield and Marcus Brinkmann A critique of the GNU Hurd multi-server operating system . . . . . . . . . . . . 30--39 Norman Feske A case study on the cost and benefit of dynamic RPC marshalling for low-level system components . . . . . . . . . . . 40--48 Volkmar Uhlig The mechanics of in-kernel synchronization for a scalable microkernel . . . . . . . . . . . . . . 49--58 Jan Stoess Towards effective user-controlled scheduling for microkernel-based systems 59--68 Dohun Kim and Jugwan Eom and Chanik Park L4oprof: a performance-monitoring-unit-based software-profiling framework for the L4 microkernel . . . . . . . . . . . . . . 69--76 Micha Hofri Service transparency considered harmful: letter to the editor . . . . . . . . . . 77--77 Yuhui Deng Author response . . . . . . . . . . . . 78--78 Yuhui Deng and Frank Wang Opportunities and challenges of storage Grid enabled by Grid service . . . . . . 79--82 Hung-Yu Chien and Chen-Wei Huang Security of ultra-lightweight RFID authentication protocols and its improvements . . . . . . . . . . . . . . 83--86
Anne-Marie Kermarrec and Maarten van Steen Gossiping in distributed systems . . . . 2--7 Ken Birman The promise, and limitations, of gossip protocols . . . . . . . . . . . . . . . 8--13 Lorenzo Alvisi and Jeroen Doumen and Rachid Guerraoui and Boris Koldehofe and Harry Li and Robbert van Renesse and Gilles Tredan How robust are gossip-based communication protocols? . . . . . . . . 14--18 Yaacov Fernandess and Antonio Fernández and Maxime Monod A generic theoretical framework for modeling gossip-based algorithms . . . . 19--27 Rena Bakhshi and Francois Bonnet and Wan Fokkink and Boudewijn Haverkort Formal analysis techniques for gossiping protocols . . . . . . . . . . . . . . . 28--36 Patrick Eugster and Pascal Felber and Fabrice Le Fessant The `art' of programming gossip-based systems . . . . . . . . . . . . . . . . 37--42 Étienne Rivi\`ere and Roberto Baldoni and Harry Li and José Pereira Compositional gossip: a conceptual architecture for designing gossip-based applications . . . . . . . . . . . . . . 43--50 Paolo Costa and Vincent Gramoli and Márk Jelasity and Gian Paolo Jesi and Erwan Le Merrer and Alberto Montresor and Leonardo Querzoni Exploring the interdisciplinary connections of gossip-based systems . . 51--60 Ali Ghodsi and Seif Haridi and Hakim Weatherspoon Exploiting the synergy between gossiping and structured overlays . . . . . . . . 61--66 Roy Friedman and Daniela Gavidia and Luis Rodrigues and Aline Carneiro Viana and Spyros Voulgaris Gossiping on MANETs: the beauty and the beast . . . . . . . . . . . . . . . . . 67--74 Hakim Weatherspoon and Hugo Miranda and Konrad Iwanicki and Ali Ghodsi and Yann Busnel Gossiping over storage systems is practical . . . . . . . . . . . . . . . 75--81 Jin Liang and Indranil Gupta and Klara Nahrstedt Reliable on-demand management operations for large-scale distributed applications 82--88
Helen J. Wang and Xiaofeng Fan and Jon Howell and Collin Jackson Protection and communication abstractions for Web browsers in MashupOS . . . . . . . . . . . . . . . . 1--16 Emre Kiciman and Benjamin Livshits AjaxScope: a platform for remotely monitoring the client-side behavior of Web 2.0 applications . . . . . . . . . . 17--30 Stephen Chong and Jed Liu and Andrew C. Myers and Xin Qi and K. Vikram and Lantian Zheng and Xin Zheng Secure Web application via automatic partitioning . . . . . . . . . . . . . . 31--44 Ramakrishna Kotla and Lorenzo Alvisi and Mike Dahlin and Allen Clement and Edmund Wong Zyzzyva: speculative Byzantine fault tolerance . . . . . . . . . . . . . . . 45--58 Ben Vandiver and Hari Balakrishnan and Barbara Liskov and Sam Madden Tolerating Byzantine faults in transaction processing systems using commit barrier scheduling . . . . . . . 59--72 James Hendricks and Gregory R. Ganger and Michael K. Reiter Low-overhead Byzantine fault-tolerant storage . . . . . . . . . . . . . . . . 73--86 Christopher J. Rossbach and Owen S. Hofmann and Donald E. Porter and Hany E. Ramadan and Bhandari Aditya and Emmett Witchel TxLinux: using and managing hardware transactional memory in an operating system . . . . . . . . . . . . . . . . . 87--102 Shan Lu and Soyeon Park and Chongfeng Hu and Xiao Ma and Weihang Jiang and Zhenmin Li and Raluca A. Popa and Yuanyuan Zhou MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs . . . . . . . . . . . . 103--116 Manuel Costa and Miguel Castro and Lidong Zhou and Lintao Zhang and Marcus Peinado Bouncer: securing software by blocking bad input . . . . . . . . . . . . . . . 117--130 Joseph Tucek and Shan Lu and Chengdu Huang and Spiros Xanthos and Yuanyuan Zhou Triage: diagnosing production run failures at the user's site . . . . . . 131--144 Lin Tan and Ding Yuan and Gopal Krishna and Yuanyuan Zhou /*icomment: bugs or bad comments?*/ . . 145--158 Marcos K. Aguilera and Arif Merchant and Mehul Shah and Alistair Veitch and Christos Karamanolis Sinfonia: a new paradigm for building scalable distributed systems . . . . . . 159--174 Andreas Haeberlen and Petr Kouznetsov and Peter Druschel PeerReview: practical accountability for distributed systems . . . . . . . . . . 175--188 Byung-Gon Chun and Petros Maniatis and Scott Shenker and John Kubiatowicz Attested append-only memory: making adversaries stick to their word . . . . 189--204 Giuseppe DeCandia and Deniz Hastorun and Madan Jampani and Gunavardhan Kakulapati and Avinash Lakshman and Alex Pilchin and Swaminathan Sivasubramanian and Peter Vosshall and Werner Vogels Dynamo: Amazon's highly available key-value store . . . . . . . . . . . . 205--220 Olivier Crameri and Nikola Knezevic and Dejan Kostic and Ricardo Bianchini and Willy Zwaenepoel Staged deployment in Mirage, an integrated software upgrade testing and distribution system . . . . . . . . . . 221--236 Ya-Yunn Su and Mona Attariyan and Jason Flinn AutoBash: improving configuration management with operating system causality analysis . . . . . . . . . . . 237--250 Kevin Klues and Vlado Handziski and Chenyang Lu and Adam Wolisz and David Culler and David Gay and Philip Levis Integrating concurrency control and energy management in device drivers . . 251--264 Ripal Nathuji and Karsten Schwan VirtualPower: coordinated power management in virtualized enterprise systems . . . . . . . . . . . . . . . . 265--278 Oren Laadan and Ricardo A. Baratto and Dan B. Phung and Shaya Potter and Jason Nieh DejaView: a personal virtual computer recorder . . . . . . . . . . . . . . . . 279--292 Haryadi S. Gunawi and Vijayan Prabhakaran and Swetha Krishnan and Andrea C. Arpaci-Dusseau and Remzi H. Arpaci-Dusseau Improving file system reliability with I/O shepherding . . . . . . . . . . . . 293--306 Christopher Frost and Mike Mammarella and Eddie Kohler and Andrew de los Reyes and Shant Hovsepian and Andrew Matsuoka and Lei Zhang Generalized file system dependencies . . 307--320 Maxwell Krohn and Alexander Yip and Micah Brodsky and Natan Cliffer and M. Frans Kaashoek and Eddie Kohler and Robert Morris Information flow control for standard OS abstractions . . . . . . . . . . . . . . 321--334 Arvind Seshadri and Mark Luk and Ning Qu and Adrian Perrig SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes . . . . . . . . . . . . . 335--350 John Criswell and Andrew Lenharth and Dinakar Dhurjati and Vikram Adve Secure virtual architecture: a safe execution environment for commodity operating systems . . . . . . . . . . . 351--366
Dilma Da Silva and Robert W. Wisniewski Introduction . . . . . . . . . . . . . . 1--1 Muli Ben-Yehuda and Eric Van Hensbergen Open source as a foundation for systems research . . . . . . . . . . . . . . . . 2--4 Robert W. Wisniewski and Dilma da Silva and Marc Auslander and Orran Krieger and Michal Ostrowski and Bryan Rosenburg K42: lessons for the OS community . . . 5--12 Joefon Jann and R. Sarma Burugula and Niteesh Dubey and Pratap Pattnaik End-to-end performance of commercial applications in the face of changing hardware . . . . . . . . . . . . . . . . 13--20 Yaoping Ruan and Vivek S. Pai and Erich Nahum and John M. Tracey Do commodity SMT processors need more OS research? . . . . . . . . . . . . . . . 21--25 Dan Pelleg and Muli Ben-Yehuda and Rick Harper and Lisa Spainhower and Tokunbo Adeshiyan Vigilant: out-of-band detection of failures in virtual machines . . . . . . 26--31 David C. Toll and Paul A. Karger and Elaine R. Palmer and Suzanne K. McIntosh and Sam Weber The Caernarvon secure embedded operating system . . . . . . . . . . . . . . . . . 32--39 Stefan Berger and Ramón Cáceres and Dimitrios Pendarakis and Reiner Sailer and Enriquillo Valdez and Ronald Perez and Wayne Schildhauer and Deepa Srinivasan TVDc: managing security in the trusted virtual datacenter . . . . . . . . . . . 40--47 R. Ananthanarayanan and M. Eshel and R. Haskin and M. Naik and F. Schmuck and R. Tewari Panache: a parallel WAN cache for clustered filesystems . . . . . . . . . 48--53 Mohammad Banikazemi and Jim Hafner and Wendy Belluomini and KK Rao and Dan Poff and Bulent Abali Flipstone: managing storage with fail-in-place and deferred maintenance service models . . . . . . . . . . . . . 54--62 Norman Bobroff and Gargi Dasgupta and Liana Fong and Yanbin Liu and Balaji Viswanathan and Fabio Benedetti and Jonathan Wagner A distributed job scheduling and flow management system . . . . . . . . . . . 63--70 Kun Wang and Yu Zhang and Huayong Wang and Xiaowei Shen Parallelization of IBM Mambo system simulator in functional modes . . . . . 71--76 Jonathan Appavoo and Volkmar Uhlig and Amos Waterland Project Kittyhawk: building a global-scale computer: Blue Gene/P as a generic computing platform . . . . . . . 77--84 Eric Van Hensbergen and Charles Forsyth and Jim McKie and Ron Minnich Holistic aggregate resource environment 85--91 David Choffnes and Mark Astley and Michael J. Ward Migration policies for multi-core fair-share scheduling . . . . . . . . . 92--93 Ma\lgorzata Steinder and Ian Whalley and David Chess Server virtualization in autonomic management of heterogeneous workloads 94--95 Liana Fong and Ma\lgorzata Steinder Duality of virtualization: simplification and complexity . . . . . 96--97 Tiancheng Liu and Ying Li and Andrew Schofield and Matt Hogstrom and Kewei Sun and Ying Chen Partition-based heap memory management in an application server . . . . . . . . 98--98 Arup Acharya and Xiping Wang and Charles Wright SIP message classification: design and performance . . . . . . . . . . . . . . 100--101 Yi Ge and Chen Wang and Xiaowei Shen and Honesty Young A database scale-out solution for emerging write-intensive commercial workloads . . . . . . . . . . . . . . . 102--103 Karan Gupta and Prasenjit Sarkar and Lesley Mbogo MIRAGE: storage provisioning in large data centers using balanced component utilizations . . . . . . . . . . . . . . 104--105 Maria Butrico and Dilma Da Silva and Orran Krieger and Michal Ostrowski and Bryan Rosenburg and Dan Tsafrir and Eric Van Hensbergen and Robert W. Wisniewski and Jimi Xenidis Specialized execution environments . . . 106--107 Sheetal Agarwal and Dipanjan Chakraborty and Swati Challa and Nandakishore Kambhatla and Arun Kumar and Sougata Mukherjea and Amit Anil Nanavati and Nitendra Rajput \em Pyr.mea.IT: permeating IT towards the base of the pyramid . . . . . . . . 108--109 Muli Ben-Yehuda 1st Annual Haifa Systems and Storage Conference (SYSTOR 2007): a message from the organizers . . . . . . . . . . . . . 110--110 Kfir Karmon and Liran Liss and Assaf Schuster GWiQ-P: an efficient decentralized Grid-wide quota enforcement protocol . . 111--118 Sorin Faibish and Stephen Fridella and Peter Bixby and Uday Gupta Storage virtualization using a block-device file system . . . . . . . . 119--126 Paula Ta-Shma and Guy Laden and Muli Ben-Yehuda and Michael Factor Virtual machine time travel using continuous data protection and checkpointing . . . . . . . . . . . . . 127--134
Erik Winfree Toward molecular programming with DNA 1--1 Xiaoxin Chen and Tal Garfinkel and E. Christopher Lewis and Pratap Subrahmanyam and Carl A. Waldspurger and Dan Boneh and Jeffrey Dwoskin and Dan R. K. Ports Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems . . . . . . 2--13 Jonathan M. McCune and Bryan Parno and Adrian Perrig and Michael K. Reiter and Arvind Seshadri How low can you go?: recommendations for hardware-supported minimal TCB code execution . . . . . . . . . . . . . . . 14--25 Ravi Bhargava and Benjamin Serebrin and Francesco Spadini and Srilatha Manne Accelerating two-dimensional page walks for virtualized systems . . . . . . . . 26--35 Benjamin C. Lee and David Brooks Efficiency trends and limits from comprehensive microarchitectural adaptivity . . . . . . . . . . . . . . . 36--47 Ramya Raghavendra and Parthasarathy Ranganathan and Vanish Talwar and Zhikui Wang and Xiaoyun Zhu No `power' struggles: coordinated multi-level power management for the data center . . . . . . . . . . . . . . 48--59 Chinnakrishnan S. Ballapuram and Ahmad Sharif and Hsien-Hsin S. Lee Exploiting access semantics and program behavior to reduce snoop power in chip multiprocessors . . . . . . . . . . . . 60--69 Arindam Mallik and Jack Cosgrove and Robert P. Dick and Gokhan Memik and Peter Dinda PICSEL: measuring user-perceived performance to control dynamic frequency scaling . . . . . . . . . . . . . . . . 70--79 Jose A. Joao and Onur Mutlu and Hyesoon Kim and Rishi Agarwal and Yale N. Patt Improving the performance of object-oriented languages with dynamic predication of indirect jumps . . . . . 80--90 Michal Wegiel and Chandra Krintz The Mapping Collector: virtual memory support for generational, parallel, and concurrent compaction . . . . . . . . . 91--102 Joe Devietti and Colin Blundell and Milo M. K. Martin and Steve Zdancewic Hardbound: architectural support for spatial safety of the C programming language . . . . . . . . . . . . . . . . 103--114 Vitaliy B. Lvin and Gene Novark and Emery D. Berger and Benjamin G. Zorn Archipelago: trading address space for reliability and security . . . . . . . . 115--124 Bumyong Choi and Leo Porter and Dean M. Tullsen Accurate branch prediction for short threads . . . . . . . . . . . . . . . . 125--134 Shekhar Srikantaiah and Mahmut Kandemir and Mary Jane Irwin Adaptive set pinning: managing shared caches in chip multiprocessors . . . . . 135--144 James Tuck and Wonsun Ahn and Luis Ceze and Josep Torrellas SoftSig: software-exposed hardware signatures for code analysis and optimization . . . . . . . . . . . . . . 145--156 Ioana Burcea and Stephen Somogyi and Andreas Moshovos and Babak Falsafi Predictor virtualization . . . . . . . . 157--167 Vinod Ganapathy and Matthew J. Renzelmann and Arini Balakrishnan and Michael M. Swift and Somesh Jha The design and implementation of microdrivers . . . . . . . . . . . . . . 168--178 Yaron Weinsberg and Danny Dolev and Tal Anker and Muli Ben-Yehuda and Pete Wyckoff Tapping into the fountain of CPUs: on operating system support for programmable devices . . . . . . . . . . 179--188 Kai Shen and Ming Zhong and Sandhya Dwarkadas and Chuanpeng Li and Christopher Stewart and Xiao Zhang Hardware counter driven on-the-fly request signatures . . . . . . . . . . . 189--200 Luk Van Ertvelde and Lieven Eeckhout Dispersing proprietary applications as benchmarks through code mutation . . . . 201--210 Shashidhar Mysore and Bita Mazloom and Banit Agrawal and Timothy Sherwood Understanding and visualizing full systems with data flow tomography . . . 211--221 Guilherme Ottoni and David I. August Communication optimizations for global multi-threaded instruction scheduling 222--232 Milind Kulkarni and Keshav Pingali and Ganesh Ramanarayanan and Bruce Walter and Kavita Bala and L. Paul Chew Optimistic parallelism benefits from data partitioning . . . . . . . . . . . 233--243 Russ Cox and Tom Bergan and Austin T. Clements and Frans Kaashoek and Eddie Kohler Xoc, an extension-oriented compiler for systems programming . . . . . . . . . . 244--254 Philip M. Wells and Koushik Chakraborty and Gurindar S. Sohi Adapting to intermittent faults in multicore systems . . . . . . . . . . . 255--264 Man-Lap Li and Pradeep Ramachandran and Swarup Kumar Sahoo and Sarita V. Adve and Vikram S. Adve and Yuanyuan Zhou Understanding the propagation of hard errors to software and implications for resilient system design . . . . . . . . 265--276 M. Aater Suleman and Moinuddin K. Qureshi and Yale N. Patt Feedback-driven threading: power-efficient and high-performance execution of multi-threaded workloads on CMPs . . . . . . . . . . . . . . . . . . 277--286 Michael D. Linderman and Jamison D. Collins and Hong Wang and Teresa H. Meng Merge: a programming model for heterogeneous multi-core systems . . . . 287--296 Jayanth Gummaraju and Joel Coburn and Yoshio Turner and Mendel Rosenblum Streamware: programming general-purpose multicore processors using streams . . . 297--307 Edmund B. Nightingale and Daniel Peek and Peter M. Chen and Jason Flinn Parallelizing security checks on commodity hardware . . . . . . . . . . . 308--318 Miguel Castro and Manuel Costa and Jean-Philippe Martin Better bug reporting with better privacy 319--328 Shan Lu and Soyeon Park and Eunsoo Seo and Yuanyuan Zhou Learning from mistakes: a comprehensive study on real world concurrency bug characteristics . . . . . . . . . . . . 329--339
Ewa Huebner and Frans Henskens The role of operating systems in computer forensics . . . . . . . . . . . 1--3 Ying Xia and Kevin Fairbanks and Henry Owen A program behavior matching architecture for probabilistic file system forensics 4--13 Eugene Libster and Jesse D. Kornblum A proposal for an integrated memory acquisition mechanism . . . . . . . . . 14--20 Ashvin Goel and Kamran Farhadi and Kenneth Po and Wu-chang Feng Reconstructing system state for intrusion analysis . . . . . . . . . . . 21--28 J. Todd McDonald and Yong C. Kim and Alec Yasinsac Software issues in digital forensics . . 29--40 Steena D. S. Monteiro and Robert F. Erbacher An authentication and validation mechanism for analyzing syslogs forensically . . . . . . . . . . . . . . 41--50 Federico Maggi and Stefano Zanero and Vincenzo Iozzo Seeing the invisible: forensic uses of anomaly detection and machine learning 51--58 Doug Wampler and James H. Graham A normality based method for detecting kernel rootkits . . . . . . . . . . . . 59--64 Iain Sutherland and Jon Evans and Theodore Tryfonas and Andrew Blyth Acquiring volatile operating system data tools and techniques . . . . . . . . . . 65--73 Brian Hay and Kara Nance Forensics examination of volatile system data using virtual introspection . . . . 74--82 Jason Franklin and Mark Luk and Jonathan M. McCune and Arvind Seshadri and Adrian Perrig and Leendert van Doorn Remote detection of virtual machine monitors with fuzzy benchmarking . . . . 83--92 Eoghan Casey and Gerasimos J. Stellatos The impact of full disk encryption on digital forensics . . . . . . . . . . . 93--98 John McHugh and Ron McLeod and Vagishwari Nagaonkar Passive network forensics: behavioural classification of network hosts based on connection patterns . . . . . . . . . . 99--111 Sean Peisert and Matt Bishop and Keith Marzullo Computer forensics in forensis . . . . . 112--122 Thomas C. Bressoud and M. Frans Kaashoek Chairs' report on Twenty-First ACM Symposium on Operating Systems Principles . . . . . . . . . . . . . . . 123--126 Rebecca Isaacs Report on the 2007 SOSP shadow program committee . . . . . . . . . . . . . . . 127--131 Jeffrey C. Mogul Policies for the SIGOPS Hall of Fame Award . . . . . . . . . . . . . . . . . 132--135 Thomas C. Bressoud Session scribe notes for Twenty-First ACM Symposium on Operating Systems Principles . . . . . . . . . . . . . . . 136--151
Andreas Merkel and Frank Bellosa Task activity vectors: a new metric for temperature-aware scheduling . . . . . . 1--12 Anna Povzner and Tim Kaldewey and Scott Brandt and Richard Golding and Theodore M. Wong and Carlos Maltzahn Efficient guaranteed disk request scheduling with Fahrrad . . . . . . . . 13--25 Yoshihisa Abe and Hiroshi Yamada and Kenji Kono Enforcing appropriate process execution for exploiting idle resources from outside operating systems . . . . . . . 27--40 Dut h T. Meyer and Gitika Aggarwal and Brendan Cully and Geoffrey Lefebvre and Michael J. Feeley and Norman C. Hutchinson and Andrew Warfield Parallax: virtual disks for virtual machines . . . . . . . . . . . . . . . . 41--54 Ming Zhong and Kai Shen and Joel Seiferas Replication degree customization for high availability . . . . . . . . . . . 55--68 Nikolai Joukov and Josef Sipek GreenFS: making enterprise computers greener by protecting them better . . . 69--80 Carsten Weinhold and Hermann Härtig VPFS: building a virtual private file system with a small trusted computing base . . . . . . . . . . . . . . . . . . 81--93 Shvetank Jain and Fareha Shafique and Vladan Djeric and Ashvin Goel Application-level isolation and recovery with solitude . . . . . . . . . . . . . 95--107 Bin Cheng and Lex Stein and Hai Jin and Zheng Zhang Towards cinematic Internet video-on-demand . . . . . . . . . . . . 109--122 Paul Grace and Danny Hughes and Barry Porter and Gordon S. Blair and Geoff Coulson and Francois Taiani Experiences with open overlays: a middleware approach to network heterogeneity . . . . . . . . . . . . . 123--136 Jiantao Kong and Karsten Schwan and Min Lee and Mustaque Ahamad Protectit: trusted distributed services operating on sensitive data . . . . . . 137--147 Shan He and Renan G. Cattelan and Darko Kirovski Modeling viral economies for digital media . . . . . . . . . . . . . . . . . 149--162 Alysson Neves Bessani and Eduardo Pelison Alchieri and Miguel Correia and Joni Silva Fraga DepSpace: a Byzantine fault-tolerant coordination service . . . . . . . . . . 163--176 Xi Wang and Zhenyu Guo and Xuezheng Liu and Zhilei Xu and Haoxiang Lin and Xiaoge Wang and Zheng Zhang Hang analysis: fighting responsiveness bugs . . . . . . . . . . . . . . . . . . 177--190 Eric Koskinen and John Jannotti BorderPatrol: isolating events for black-box tracing . . . . . . . . . . . 191--203 Simon Peter and Andrew Baumann and Timothy Roscoe and Paul Barham and Rebecca Isaacs 30 seconds is not enough!: a study of operating system timer usage . . . . . . 205--218 Karthik Pattabiraman and Vinod Grover and Benjamin G. Zorn Samurai: protecting critical data in unsafe languages . . . . . . . . . . . . 219--232 Angela Nicoara and Gustavo Alonso and Timothy Roscoe Controlled, systematic, and efficient code replacement for running Java programs . . . . . . . . . . . . . . . . 233--246 Yoann Padioleau and Julia Lawall and René Rydhof Hansen and Gilles Muller Documenting and automating collateral evolutions in Linux device drivers . . . 247--260 Troy Ronda and Stefan Saroiu and Alec Wolman Itrustpage: a user-assisted anti-phishing tool . . . . . . . . . . . 261--272 Christof Fetzer and Martin Süßkraut Switchblade: enforcing dynamic personalized system call models . . . . 273--286 Georgios Portokalidis and Herbert Bos Eudaemon: involuntary and on-demand emulation against zero-day exploits . . 287--299 Petros Efstathopoulos and Eddie Kohler Manageable fine-grained information flow 301--313 Jonathan M. McCune and Bryan J. Parno and Adrian Perrig and Michael K. Reiter and Hiroshi Isozaki Flicker: an execution infrastructure for TCB minimization . . . . . . . . . . . . 315--328
Muli Ben-Yehuda and Eric Van Hensbergen and Marc Fiuczynski Minding the gap: R&D in the Linux kernel 1--3 Paul E. McKenney and Jonathan Walpole Introducing technology into the Linux kernel: a case study . . . . . . . . . . 4--17 Helge Bahmann and Konrad Froitzheim Extending futex for kernel to user notification . . . . . . . . . . . . . . 18--26 Ashwin Ganti Plan 9 authentication in Linux . . . . . 27--33 Chee Siang Wong and Ian Tan and Rosalind Deena Kumari and Fun Wey Towards achieving fairness in the Linux scheduler . . . . . . . . . . . . . . . 34--43 Silviu S. Craciunas and Christoph M. Kirsch and Harald Röck I/O resource management through system call scheduling . . . . . . . . . . . . 44--54 Willem de Bruijn and Herbert Bos PipesFS: fast Linux I/O in the Unix tradition . . . . . . . . . . . . . . . 55--63 Sangtae Ha and Injong Rhee and Lisong Xu CUBIC: a new TCP-friendly high-speed TCP variant . . . . . . . . . . . . . . . . 64--74 Fengguang Wu and Hongsheng Xi and Chenfeng Xu On the design of a new Linux readahead framework . . . . . . . . . . . . . . . 75--84 David Boutcher and Abhishek Chandra Practical techniques for purging deleted data using liveness information . . . . 85--94 Rusty Russell \tt virtio: towards a de-facto standard for virtual I/O devices . . . . . . . . 95--103 Sukadev Bhattiprolu and Eric W. Biederman and Serge Hallyn and Daniel Lezcano Virtual servers and checkpoint/restart in mainstream Linux . . . . . . . . . . 104--113
Peter Varman and Jun Wang Storage and I/O virtualization, performance, energy, evaluation and dependability (SPEED08) . . . . . . . . 1--2 Jorge Guerra and Luis Useche and Medha Bhadkamkar and Ricardo Koller and Raju Rangaswami The case for active block layer extensions . . . . . . . . . . . . . . . 3--9 Ajay Gulati and Irfan Ahmad Towards distributed storage resource management using flow control . . . . . 10--16 Ping Ge and Hailong Cai Providing differentiated QoS for peer-to-peer file sharing systems . . . 17--23 Himanshu Raj and Karsten Schwan O2S2: enhanced object-based virtualized storage . . . . . . . . . . . . . . . . 24--29 Shuibing He and Dan Feng Design of an object-based storage device based on I/O processor . . . . . . . . . 30--35 Sungjin Lee and Dongkun Shin and Young-Jin Kim and Jihong Kim LAST: locality-aware sector translation for NAND flash memory-based storage systems . . . . . . . . . . . . . . . . 36--42 Christina M. Patrick and SeungWoo Son and Mahmut Kandemir Comparative evaluation of overlap strategies with study of I/O overlap in MPI-IO . . . . . . . . . . . . . . . . . 43--49 Rômulo Silva de Oliveira and Alexandre Sztajnberg Brazilian workshop on operating systems 50--51 Paul Regnier and George Lima and Luciano Barreto Evaluation of interrupt handling timeliness in real-time Linux operating systems . . . . . . . . . . . . . . . . 52--63 Eduardo M. Colaço and Marcelo Iury S. Oliveira and Alexandro S. Soares and Francisco Brasileiro and Dalton S. Guerrero Using a file working set model to speed up the recovery of Peer-to-Peer backup systems . . . . . . . . . . . . . . . . 64--70 Geovani Ricardo Wiedenhoft and Lucas Francisco Wanner and Giovani Gracioli and Antônio Augusto Fröhlich Power management in the EPOS system . . 71--80 Edson T. Midorikawa and Ricardo L. Piantola and Hugo H. Cassettari On adaptive replacement based on LRU with working area restriction algorithm 81--92 Steven Robbins A three pronged approach to teaching undergraduate operating systems . . . . 93--100 Roelof Hamberg and Frits Vaandrager Using model checkers in an introductory course on operating systems . . . . . . 101--111
Gary Grider and James Nunez and John Bent and Steve Poole and Rob Ross and Evan Felix Coordinating government funding of file system and I/O research through the high end computing university research activity . . . . . . . . . . . . . . . . 2--7 Jeffrey C. Mogul and Jay J. Wylie Computer systems research at HP Labs . . 8--9 John Wilkes Traveling to Rome: a retrospective on the journey . . . . . . . . . . . . . . 10--15 Patrick Goldsack and Julio Guijarro and Steve Loughran and Alistair Coles and Andrew Farrell and Antonio Lain and Paul Murray and Peter Toft The SmartFrog configuration management framework . . . . . . . . . . . . . . . 16--25 Jack Brassil and Rick McGeer and Raj Rajagopalan and Puneet Sharma and Praveen Yalagandula and Sujata Banerjee and David P. Reed and Sung-Ju Lee The CHART system: a high-performance, fair transport architecture based on explicit-rate signaling . . . . . . . . 26--35 Chris I. Dalton and David Plaquin and Wolfgang Weidner and Dirk Kuhlmann and Boris Balacheff and Richard Brown Trusted virtual platforms: a key enabler for converged client devices . . . . . . 36--43 Adrian Baldwin and Chris Dalton and Simon Shiu and Krzysztof Kostienko and Qasim Rajpoot Providing secure services for a virtual infrastructure . . . . . . . . . . . . . 44--51 Eduardo Argollo and Ayose Falcón and Paolo Faraboschi and Matteo Monchiero and Daniel Ortega COTSon: infrastructure for full system simulation . . . . . . . . . . . . . . . 52--61 Xiaoyun Zhu and Mustafa Uysal and Zhikui Wang and Sharad Singhal and Arif Merchant and Pradeep Padala and Kang Shin What does control theory bring to systems research? . . . . . . . . . . . 62--69 Eric Anderson and Martin Arlitt and Charles B. Morrey III and Alistair Veitch DataSeries: an efficient, flexible data format for structured serial data . . . 70--75 Anna Povzner and Kimberly Keeton and Arif Merchant and Charles B. Morrey III and Mustafa Uysal and Marcos K. Aguilera Autograph: automatically extracting workflow file signatures . . . . . . . . 76--83 George Forman and Kave Eshghi and Jaap Suermondt Efficient detection of large-scale redundancy in enterprise file systems 84--91 Umeshwar Dayal and Harumi Kuno and Janet L. Wiener and Kevin Wilkinson and Archana Ganapathi and Stefan Krompass Managing operational business intelligence workloads . . . . . . . . . 92--98
Kim Hazelwood and Mohamed Zahran Challenges and opportunities at all levels: interactions among operating systems, compilers, and multicore processors . . . . . . . . . . . . . . . 3--4 Philip M. Wells and Koushik Chakraborty and Gurindar S. Sohi Dynamic heterogeneity and the need for multicore virtualization . . . . . . . . 5--14 Vijay Nagarajan and Rajiv Gupta Runtime monitoring on multicores via OASES . . . . . . . . . . . . . . . . . 15--24 M. Mustafa Rafique and Benjamin Rose and Ali R. Butt and Dimitrios S. Nikolopoulos Supporting MapReduce on large-scale asymmetric multi-core clusters . . . . . 25--34 Richard Strong and Jayaram Mudigonda and Jeffrey C. Mogul and Nathan Binkert and Dean Tullsen Fast switching of threads between cores 35--45 Stanislav Bratanov and Roman Belenov and Nikita Manovich Virtual machines: a whole new world for performance analysis . . . . . . . . . . 46--55 Reza Azimi and David K. Tam and Livio Soares and Michael Stumm Enhancing operating system support for multicore processors by using hardware performance monitoring . . . . . . . . . 56--65 Daniel Shelepov and Alexandra Fedorova and Sergey Blagodurov and Juan Carlos Saez Alcaide and Nestor Perez and Viren Kumar and Stacey Jeffery and Zhi Feng Huang HASS: a scheduler for heterogeneous multicore systems . . . . . . . . . . . 66--75 David Wentzlaff and Anant Agarwal Factored operating systems (fos): the case for a scalable operating system for multicores . . . . . . . . . . . . . . . 76--85 Miquel Moreto and Francisco J. Cazorla and Alex Ramirez and Rizos Sakellariou and Mateo Valero FlexDCP: a QoS framework for CMP architectures . . . . . . . . . . . . . 86--96 Thomas Karcher and Christoph Schaefer and Victor Pankratius Auto-tuning support for manycore applications: perspectives for operating systems and compilers . . . . . . . . . 96--97 K. Kunal and K. George and M. Gautam and V. Kamakoti HTM design spaces: complete decoupling from caches and achieving highly concurrent transactions . . . . . . . . 98--99 David A. Penry Multicore diversity: a software developer's nightmare . . . . . . . . . 100--101 Dong Hyuk Woo and Hsien-Hsin S. Lee PROPHET: goal-oriented provisioning for highly tunable multicore processors in cloud computing . . . . . . . . . . . . 102--103 David Nellans and Rajeev Balasubramonian and Erik Brunvand OS execution on multi-cores: is out-sourcing worthwhile? . . . . . . . . 104--105 Jeffrey C. Mogul WOWCS: the Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems . . . . . . . . . . . . 106--107 Thomas Anderson Conference reviewing considered harmful 108--116 John R. Douceur Paper rating vs. paper ranking . . . . . 117--121
Gabriel Kliot and Erez Petrank and Bjarne Steensgaard A lock-free, concurrent, and incremental stack scanning mechanism for garbage collectors . . . . . . . . . . . . . . . 3--13 Michael R. Hines and Umesh Deshpande and Kartik Gopalan Post-copy live migration of virtual machines . . . . . . . . . . . . . . . . 14--26 Timothy Wood and Gabriel Tarasuk-Levin and Prashant Shenoy and Peter Desnoyers and Emmanuel Cecchet and Mark D. Corner Memory buddies: exploiting page sharing for smart colocation in virtualized data centers . . . . . . . . . . . . . . . . 27--36 Weiming Zhao and Zhenlin Wang and Yingwei Luo Dynamic memory balancing for virtual machines . . . . . . . . . . . . . . . . 37--47 Xipeng Shen and Feng Mao and Kai Tian and Eddy Zheng Zhang The study and handling of program inputs in the selection of garbage collectors 48--61 Huacai Chen and Hai Jin and Zhiyuan Shao and Kan Hu and Ke Yu and Kun Tian ClientVisor: leverage COTS OS functionalities for power management in virtualized desktop environment . . . . 62--71 Micah Dowty and Jeremy Sugerman GPU virtualization on VMware's hosted I/O architecture . . . . . . . . . . . . 73--82 Lei Xia and Jack Lange and Peter Dinda and Chang Bae Investigating virtual passthrough I/O on commodity devices . . . . . . . . . . . 83--94 Asim Kadav and Michael M. Swift Live migration of direct-access devices 95--104 Viren Kumar and Alexandra Fedorova Towards better performance per watt in virtual environments on asymmetric single-ISA multi-core systems . . . . . 105--109
Hakim Weatherspoon and Doug Terry and Gregory Chockler Summary of the 3rd ACM SIGOPS Workshop on Large-Scale Distributed Systems and Middleware (LADIS 2009) . . . . . . . . 3--4 Liviu Ciortea and Cristian Zamfir and Stefan Bucur and Vitaly Chipounov and George Candea Cloud9: a software testing service . . . 5--10 Kiran-Kumar Muniswamy-Reddy and Margo Seltzer Provenance as first class cloud data . . 11--16 Boon Thau Loo and Stefan Saroiu 5th International Workshop on Networking Meets Databases (NetDB 2009) . . . . . . 17--18 Yun Mao On the declarativity of declarative networking . . . . . . . . . . . . . . . 19--24 Peter Alvaro and Tyson Condie and Neil Conway and Joseph M. Hellerstein and Russell Sears I do declare: consensus in a logic language . . . . . . . . . . . . . . . . 25--30 Eric Eide and Gilles Muller and Olaf Spinczyk PLOS 2009: Fifth Workshop on Programming Languages and Operating Systems . . . . 31--34 Pierre-Evariste Dagand and Andrew Baumann and Timothy Roscoe Filet-o-fish: practical and dependable domain-specific languages for OS development . . . . . . . . . . . . . . 35--39 Lonnie Princehouse and Ken Birman Code-partitioning gossip . . . . . . . . 40--44 Frederick R. M. Barnes and Carl G. Ritson Checking process-oriented operating system behaviour using CSP and refinement . . . . . . . . . . . . . . . 45--49 Walid Dabbous and Maximilian Ott Overview of the ROADS'09 workshop . . . 50--53 Thierry Rakotoarivelo and Maximilian Ott and Guillaume Jourjon and Ivan Seskar OMF: a control and management framework for networking testbeds . . . . . . . . 54--59 Mathieu Lacage and Martin Ferrari and Mads Hansen and Thierry Turletti and Walid Dabbous NEPI: using independent simulators, emulators, and testbeds for easy experimentation . . . . . . . . . . . . 60--65 Nikola Kne\vzevi\'c and Simon Schubert and Dejan Kosti\'c Towards a cost-effective networking testbed . . . . . . . . . . . . . . . . 66--71 Tapan Parikh and Vivek Pai NSDR 2009 3rd Workshop on Networked Systems for Developing Regions . . . . . 72--72 Michael Paik and Lakshminarayanan Subramanian Signet: low-cost auditable transactions using SIMs and mobile phones . . . . . . 73--78 William B. Lober and Stephen Wagner and Christina Quiles Development and implementation of a loosely coupled, multi-site, networked and replicated electronic medical record in Haiti . . . . . . . . . . . . . . . . 79--83 Jonathan Ledlie and Billy Odero and Einat Minkov and Imre Kiss and Joseph Polifroni Crowd translator: on building localized speech recognizers through micropayments 84--89 James Mickens and Dilma da Silva SOSP diversity workshop . . . . . . . . 90--91 John Ousterhout and Parag Agrawal and David Erickson and Christos Kozyrakis and Jacob Leverich and David Mazi\`eres and Subhasish Mitra and Aravind Narayanan and Guru Parulkar and Mendel Rosenblum and Stephen M. Rumble and Eric Stratmann and Ryan Stutsman The case for RAMClouds: scalable high-performance storage entirely in DRAM . . . . . . . . . . . . . . . . . . 92--105
Jeanna Neefe Matthews Workshop proceedings and other publications in Operating System Review . . . . . . . . . . . . . . . . . 1--1 Jacob Strauss and Chris Lesniewski-Laas and Justin Mazzola Paluska and Bryan Ford and Robert Morris and Frans Kaashoek Device transparency: a new model for mobile storage . . . . . . . . . . . . . 5--9 Samer Al-Kiswany and Abdullah Gharaibeh and Matei Ripeanu The case for a versatile storage system 10--14 Kimberly Keeton and Charles B. Morrey III and Craig A. N. Soules and Alistair Veitch LazyBase: freshness vs. performance in information management . . . . . . . . . 15--19 David Boutcher and Abhishek Chandra Does virtualization make disk scheduling passé? . . . . . . . . . . . . . . . . . 20--24 Swaminathan Sundararaman and Sriram Subramanian and Abhishek Rajimwale and Andrea C. Arpaci-Dusseau and Remzi H. Arpaci-Dusseau and Michael M. Swift Why panic()?: improving reliability with restartable file systems . . . . . . . . 25--29 Saeed Ghanbari and Gokul Soundararajan and Cristiana Amza SelfTalk for Dena: query language and runtime support for evaluating system behavior . . . . . . . . . . . . . . . . 30--34 Jorge Guerra and Wendy Belluomini and Joseph Glider and Karan Gupta and Himabindu Pucha Energy proportionality for storage: impact and feasibility . . . . . . . . . 35--39 Eric Anderson and Joseph Tucek Efficiency matters! . . . . . . . . . . 40--45 Paul T. Stanton and Benjamin McKeown and Randal Burns and Giuseppe Ateniese FastAD: an authenticated directory for billions of objects . . . . . . . . . . 45--49 Peter Desnoyers Empirical evaluation of NAND flash memory performance . . . . . . . . . . . 50--54 Asim Kadav and Mahesh Balakrishnan and Vijayan Prabhakaran and Dahlia Malkhi Differential RAID: rethinking RAID for SSD reliability . . . . . . . . . . . . 55--59 Jacob Leverich and Christos Kozyrakis On the energy (in)efficiency of Hadoop clusters . . . . . . . . . . . . . . . . 61--65 Aman Kansal and Jie Liu and Abhishek Singh and Ripal Nathuji and Tarek Abdelzaher Semantic-less coordination of power management and application performance 66--70 Alexander S. Szalay and Gordon C. Bell and H. Howie Huang and Andreas Terzis and Alainna White Low-power Amdahl-balanced blades for data intensive computing . . . . . . . . 71--75 Byung-Gon Chun and Gianluca Iannaccone and Giuseppe Iannaccone and Randy Katz and Gunho Lee and Luca Niccolini An energy case for hybrid datacenters 76--80 Kenny Q. Zhu and Kathleen Fisher and David Walker Incremental learning of system log formats . . . . . . . . . . . . . . . . 85--90 Jian-Guang Lou and Qiang Fu and Yi Wang and Jiang Li Mining dependency in distributed systems through unstructured logs analysis . . . 91--96 Wim De Pauw and Stephen Heisig Visual and algorithmic tooling for system trace analysis: a case study . . 97--102 Lourival A. de Gois and Walter C. da Borelli Optimization of procedures for discovery and information of idle resources in distributed systems . . . . . . . . . . 103--109 Jacinto C. A. Cansado and João H. S. Pereira and Edson T. Midorikawa Considering the frequency dimension into on demand adaptive algorithms . . . . . 110--115
Paolo Romano and Luis Rodrigues and Nuno Carvalho and João Cachopo Cloud-TM: harnessing the cloud with distributed transactional memories . . . 1--6 Krzysztof Ostrowski and Ken Birman Storing and accessing live mashup content in the cloud . . . . . . . . . . 7--11 Eric Van Hensbergen and Noah Paul Evans and Phillip Stanley-Marbell A unified execution model for cloud computing . . . . . . . . . . . . . . . 12--17 Kunwadee Sripanidkulchai and Sambit Sahu and Yaoping Ruan and Anees Shaikh and Chitra Dorai Are clouds ready for large distributed applications? . . . . . . . . . . . . . 18--23 Michael Siegenthaler and Hakim Weatherspoon Cloudifying source code repositories: how much does it cost? . . . . . . . . . 24--28 Mihai Letia and Nuno Preguiça and Marc Shapiro Consistency without concurrency control in large, dynamic systems . . . . . . . 29--34 Avinash Lakshman and Prashant Malik Cassandra: a decentralized structured storage system . . . . . . . . . . . . . 35--40 George Porter Decoupling storage and computation in Hadoop with SuperDataNodes . . . . . . . 41--46 Moises Goldszmidt and Mihai Budiu and Yue Zhang and Michael Pechuk Toward automatic policy refinement in repair services for large distributed systems . . . . . . . . . . . . . . . . 47--51 Andreas Haeberlen A case for the accountable cloud . . . . 52--57 Paul Ezhilchelvan and Santosh Shrivastava Learning from the past for resolving dilemmas of asynchrony . . . . . . . . . 58--63 Vita Bortnikov and Gregory Chockler and Alexey Roytman and Mike Spreitzer Bulletin board: a scalable and robust eventually consistent shared memory over a peer-to-peer overlay . . . . . . . . . 64--70 Ymir Vigfusson and Ken Birman and Qi Huang and Deepak P. Nataraj Optimizing information flow in the gossip objects platform . . . . . . . . 71--76 Pierre-Marc Fournier and Michel R. Dagenais Analyzing blocking to debug performance problems on multi-core systems . . . . . 77--87 Michael Dalton and Hari Kannan and Christos Kozyrakis Tainting is not pointless . . . . . . . 88--92
Erik Nygren and Ramesh K. Sitaraman and Joel Wein Networked systems research at Akamai . . 1--1 Erik Nygren and Ramesh K. Sitaraman and Jennifer Sun The Akamai network: a platform for high-performance Internet applications 2--19 Thomas Repantis and Jeff Cohen and Scott Smith and Joel Wein Scaling a monitoring infrastructure for the Akamai network . . . . . . . . . . . 20--26 David Belson Akamai State of the Internet Report, Q4 2009 . . . . . . . . . . . . . . . . . . 27--37 Sara Bouchenak and Eric Rutten Summary of the 5th International Workshop on Feedback Control Implementation and Design in Computing Systems and Networks (FeBID 2010) . . . 38--40 Zhikui Wang and Niraj Tolia and Cullen Bash Opportunities and challenges to unify workload, power, and cooling management in data centers . . . . . . . . . . . . 41--46 Jean Arnaud Automated control of Internet services 47--52 Anne-Marie Alt and Daniel Simon Control strategies for H.264 video decoding under resources constraints . . 53--58 Luc Malrait QoS-oriented control of server systems 59--64 Shlomi Dolev and Reuven Yagel Stabilizing trust and reputation for self-stabilizing efficient hosts in spite of Byzantine guests . . . . . . . 65--74 Benjamin Poirier and Robert Roy and Michel Dagenais Accurate offline synchronization of distributed traces using kernel-level events . . . . . . . . . . . . . . . . . 75--87 Asia Slowinska and Herbert Bos Pointer tainting still pointless: (but we all see the point of tainting) . . . 88--92 Paul E. McKenney and Maged M. Michael and Josh Triplett and Jonathan Walpole Why the grass may not be greener on the other side: a comparison of locking vs. transactional memory . . . . . . . . . . 93--101 Josh Triplett and Paul E. McKenney and Jonathan Walpole Scalable concurrent hash tables via relativistic programming . . . . . . . . 102--109 Wenjin Hu and Tao Yang and Jeanna N. Matthews The good, the bad and the ugly of consumer cloud storage . . . . . . . . . 110--115
Stephen Alan Herrod Systems research and development at VMware . . . . . . . . . . . . . . . . . 1--2 Ole Agesen and Alex Garthwaite and Jeffrey Sheldon and Pratap Subrahmanyam The evolution of an x86 virtual machine monitor . . . . . . . . . . . . . . . . 3--18 Richard West and Puneet Zaroo and Carl A. Waldspurger and Xiao Zhang Online cache modeling for commodity multicore processors . . . . . . . . . . 19--29 Daniel J. Scales and Mike Nelson and Ganesh Venkitachalam The design of a practical system for fault-tolerant virtual machines . . . . 30--39 Richard McDougall and Jennifer Anderson Virtualization performance: perspectives and challenges ahead . . . . . . . . . . 40--56 Satyam B. Vaghani Virtual machine file system . . . . . . 57--70 Jacob Gorm Hansen and Eric Jul Scalable virtual machine storage using local disks . . . . . . . . . . . . . . 71--79 Shudong Zhou Virtual networking . . . . . . . . . . . 80--85 Debashis Basak and Rohit Toshniwal and Serge Maskalik and Allwyn Sequeira Virtualizing networking and security in the cloud . . . . . . . . . . . . . . . 86--94 Vijayaraghavan Soundararajan and Kinshuk Govil Challenges in building scalable virtualized datacenter management . . . 95--102 Orran Krieger and Phil McGachey and Arkady Kanevsky Enabling a marketplace of clouds: VMware's vCloud director . . . . . . . . 103--114 René W. Schmidt and Steffen Grarup vApp: a standards-based container for cloud providers . . . . . . . . . . . . 115--123 Ken Barr and Prashanth Bungale and Stephen Deasy and Viktor Gyuris and Perry Hung and Craig Newell and Harvey Tuch and Bruno Zoppis The VMware mobile virtualization platform: is that a hypervisor in your pocket? . . . . . . . . . . . . . . . . 124--135 Joshua E. Simons and Jeffrey Buell Virtualizing high performance computing 136--145 Tudor Dumitra\cs and Iulian Neamtiu and Eli Tilevich Report on the Second ACM Workshop on Hot Topics in Software Upgrades (HotSWUp'09) 146--152
Justin Rattner Research at Intel . . . . . . . . . . . 1--2 Vishakha Gupta and Rob Knauerhase and Karsten Schwan Attaining system performance points: revisiting the end-to-end argument in system design for heterogeneous many-core systems . . . . . . . . . . . 3--10 Gautham N. Chinya and Jamison D. Collins and Perry H. Wang and Hong Jiang and Guei-Yuan Lueh and Thomas A. Piazza and Hong Wang Bothnia: a dual-personality extension to the Intel integrated graphics driver . . 11--20 Dheeraj Reddy and David Koufaty and Paul Brett and Scott Hahn Bridging functional heterogeneity in multicore architectures . . . . . . . . 21--33 Vijay Vasudevan and David G. Andersen and Michael Kaminsky and Jason Franklin and Michael A. Kozuch and Iulian Moraru and Padmanabhan Pillai and Lawrence Tan Challenges and opportunities for efficient computing with FAWN . . . . . 34--44 Michael P. Mesnier and Jason B. Akers Differentiated storage services . . . . 45--53 Arun Raghunath and John Keys and Mona Vij Direct data flows . . . . . . . . . . . 54--61 Sadagopan Srinivasan and Li Zhao and Ramesh Illikkal and Ravishankar Iyer Efficient interaction between OS and architecture in heterogeneous platforms 62--72 Rob F. van der Wijngaart and Timothy G. Mattson and Werner Haas Light-weight communications on Intel's single-chip cloud computer processor . . 73--83 Shimin Chen and Phillip B. Gibbons and Michael Kozuch and Todd C. Mowry Log-based architectures: using multicore to help software behave correctly . . . 84--91 Shoumeng Yan and Xiaocheng Zhou and Ying Gao and Hu Chen and Gansha Wu and Sai Luo and Bratin Saha Optimizing a shared virtual memory system for a heterogeneous CPU-accelerator platform . . . . . . . . 92--100 Yuan Dong and Haiyang Zhu and Jinzhan Peng and Fang Wang and Michael P. Mesnier and Dawei Wang and Sun C. Chan RFS: a network file system for mobile devices and the cloud . . . . . . . . . 101--111 Kevin Fall and Gianluca Iannaccone and Maziar Manesh and Sylvia Ratnasamy and Katerina Argyraki and Mihai Dobrescu and Norbert Egi RouteBricks: enabling general purpose network infrastructure . . . . . . . . . 112--125 Petros Maniatis and Byung-Gon Chun Small trusted primitives for dependable systems . . . . . . . . . . . . . . . . 126--141 David (Yu) Zhu and Jaeyeon Jung and Dawn Song and Tadayoshi Kohno and David Wetherall TaintEraser: protecting sensitive data leaks using application-level taint tracking . . . . . . . . . . . . . . . . 142--154 Dilma da Silva and Luciano Barreto and Paulo César A. Pereira VII Brazilian Workshop on Operating Systems . . . . . . . . . . . . . . . . 155--155 Luciano Barreto and Aline Andrade and Adolfo Duran and Caique Lima and Ademilson Lima Abstract specification and formalization of an operating system kernel in Z . . . 156--160
Elzbieta Krepska and Thilo Kielmann and Wan Fokkin and Henri Bal HipG: parallel processing of large-scale graphs . . . . . . . . . . . . . . . . . 3--13 Ankur Narang and Abhinav Srivastava and Naga Praveen Kumar Katta and Rudrapatna K. Shyamasundar Performance driven multi-objective distributed scheduling for parallel computations . . . . . . . . . . . . . . 14--27 Yuval Lubowich and Gadi Taubenfeld On the performance of distributed lock-based synchronization? . . . . . . 28--37 Fatemeh Azmandian and Micha Moffie and Malak Alshawabkeh and Jennifer Dy and Javed Aslam and David Kaeli Virtual machine monitor-based lightweight intrusion detection . . . . 38--53 André Schiper and Zarko Milosevic and Omid Shahmirzadi Student mini-kernel project based on an FPGA board . . . . . . . . . . . . . . . 54--58
Eric Eide and Gilles Muller and Wolfgang Schröder-Preikschat and Olaf Spinczyk Summary of PLOS 2011: the Sixth Workshop on Programming Languages and Operating Systems . . . . . . . . . . . . . . . . 1--4 Suman Saha and Julia Lawall and Gilles Muller Finding resource-release omission faults in Linux . . . . . . . . . . . . . . . . 5--9 Reinhard Tartler and Daniel Lohmann and Christian Dietrich and Christoph Egger and Julio Sincero Configuration coverage in the analysis of large-scale system software . . . . . 10--14 Lokesh Gidra and Gaël Thomas and Julien Sopena and Marc Shapiro Assessing the scalability of garbage collectors on many cores . . . . . . . . 15--19 Peter Bodík Overview of the workshop on managing large-scale systems via the analysis of system logs and the application of machine learning techniques . . . . . . 20--22 Soila P. Kavulya and Kaustubh Joshi and Matti Hiltunen and Scott Daniels and Rajeev Gandhi and Priya Narasimhan Practical experiences with chronics discovery in large telecommunications systems . . . . . . . . . . . . . . . . 23--30 Sumit Basu and John Dunagan and Kevin Duh and Kiran-Kumar Muniswamy-Reddy BLR-D: applying bilinear logistic regression to factored diagnosis problems . . . . . . . . . . . . . . . . 31--38 Ivan Beschastnikh and Yuriy Brun and Michael D. Ernst and Arvind Krishnamurthy and Thomas E. Anderson Mining temporal invariants from partially ordered logs . . . . . . . . . 39--46 Prabal Dutta and Ricardo Bianchini Workshop on power aware computing and systems (HotPower'11) . . . . . . . . . 47--47 Jie Chen and Ron C. Chiang and H. Howie Huang and Guru Venkataramani Energy-aware writes to non-volatile main memory . . . . . . . . . . . . . . . . . 48--52 Baris Aksanli and Jagannathan Venkatesh and Liuyi Zhang and Tajana Rosing Utilizing green energy prediction to schedule mixed batch and service jobs in data centers . . . . . . . . . . . . . . 53--57 Timo Hönig and Christopher Eibel and Rüdiger Kapitza and Wolfgang Schröder-Preikschat SEEP: exploiting symbolic execution for energy-aware programming . . . . . . . . 58--62 Lakshminarayanan Subramanian Overview of the 3rd ACM SOSP Workshop on Networking, Systems and Applications on Mobile Handhelds . . . . . . . . . . . . 63--64 Umar Javed and Dongsu Han and Ramon Caceres and Jeffrey Pang and Srinivasan Seshan and Alexander Varshavsky Predicting handoffs in 3G networks . . . 65--70 Mehedi Bakht and Matt Trower and Robin Kravets Searchlight: helping mobile devices find their neighbors . . . . . . . . . . . . 71--76 H. Andrés Lagar-Cavilla and Kaustubh Joshi and Alexander Varshavsky and Jeffrey Bickford and Darwin Parra Traffic backfilling: subsidizing lunch for delay-tolerant applications in UMTS networks . . . . . . . . . . . . . . . . 77--81 Karthik Raghavan and V. Kamakoti ROSY: recovering processor and memory systems from hard errors . . . . . . . . 82--84
Luis Rodrigues and Divy Agrawal and Ymir Vigfusson and Gregory Chockler Summary of the 5th Workshop on Large-Scale Distributed Systems and Middleware (LADIS 2011) . . . . . . . . 1--3 Junichi Tatemura and Oliver Po and Hakan Hacgümüs Microsharding: a declarative approach to support elastic OLTP workloads . . . . . 4--11 Florin Rusu and Alin Dobra GLADE: a scalable framework for efficient analytics . . . . . . . . . . 12--18 Viet-Trung Tran and Bogdan Nicolae and Gabriel Antoniu Towards scalable array-oriented active storage: the pyramid approach . . . . . 19--25 Joel Wolf and Andrey Balmin and Deepak Rajan and Kirsten Hildrum and Rohit Khandekar and Sujay Parekh and Kun-Lung Wu and Rares Vernica CIRCUMFLEX: a scheduling optimizer for MapReduce workloads with shared scans 26--32 Siddhartha Sen and Michael J. Freedman Commensal cuckoo: secure group partitioning for large-scale services 33--39 Guy Laden and Roie Melamed and Ymir Vigfusson Adaptive and dynamic funnel replication in clouds . . . . . . . . . . . . . . . 40--46 Dahlia Malkhi and Mahesh Balakrishnan and John D. Davis and Vijayan Prabhakaran and Ted Wobber From Paxos to CORFU: a flash-speed shared log . . . . . . . . . . . . . . . 47--51 Antonio Augusto Fröhlich and Leandro Buss Becker and George Lima and Stefan Petters and Dilma M. da Silva and Edna N. Silva Barros Brazilian Symposium on Computing System Engineering . . . . . . . . . . . . . . 52--52 Elder Vicente and Rivalino Matias and Lúcio Borges and Autran Macêdo Evaluation of compound system calls in the Linux kernel . . . . . . . . . . . . 53--63 Tiago Rogerio Muck and Antonio Augusto Frohlich and Michael Gernoth and Wolfgang Schroder-Preikschat Implementing OS components in hardware using AOP . . . . . . . . . . . . . . . 64--72 Marco A. Wehrmeister and Joao G. Packer and Luis M. Ceron Support for early verification of embedded real-time systems through UML models simulation . . . . . . . . . . . 73--81 Ríad Nassiffe and Eduardo Camponogara and George Lima Optimizing quality of service in real-time systems under energy constraints . . . . . . . . . . . . . . 82--92 Christopher M. Hayden and Iulian Neamtiu Report on the Third Workshop on Hot Topics in Software Upgrades (HotSWUp'11) 93--99
Daniel Hagimont and Noel De Palma A simulator to assess energy saving strategies and policies in HPC workloads 2--9 Frederico Alvares de Oliveira, Jr. and Thomas Ledoux Self-management of cloud applications and infrastructure for energy optimization . . . . . . . . . . . . . . 10--18 Ibrahim Takouna and Wesam Dawoud and Christoph Meinel Energy efficient scheduling of HPC-jobs on virtualize clusters using host and VM dynamic configuration . . . . . . . . . 19--27 Christine Mayap Kamga and Giang Son Tran and Laurent Broto Extended scheduler for efficient frequency scaling in virtualized systems 28--35 Adil Bouti and Jörg Keller Securing cloud-based computations against malicious providers . . . . . . 38--42 Alysson Bessani and Rüdiger Kapitza and Dana Petcu and Paolo Romano and Spyridon V. Gogouvitis and Dimosthenis Kyriazis and Roberto G. Cascella A look to the old-world\_sky: EU-funded dependability cloud computing research 43--56 Salman A. Baset Cloud SLAs: present and future . . . . . 57--66 Augusto Born de Oliveira and Ahmad Saif Ur Rehman and Sebastian Fischmeister mTags: augmenting microkernel messages with lightweight metadata . . . . . . . 67--79 Adam J. Aviv and Vin Mannino and Thanat Owlarn and Seth Shannin and Kevin Xu and Boon Thau Loo Experiences in teaching an educational user-level operating systems implementation project . . . . . . . . . 80--86 Maria Couceiro and Paolo Romano Where does transactional memory research stand and what challenges lie ahead?: WTM 2012, EuroTM Workshop on Transactional Memory . . . . . . . . . . 87--92
Scott Dawkins and Kaladhar Voruganti and John D. Strunk Systems research and innovation in data ONTAP . . . . . . . . . . . . . . . . . 1--3 Daniel Ellard and Craig Everhart and Theresa Raj Glitz: cross-vendor federated file systems . . . . . . . . . . . . . . . . 4--10 Tim Bisson and Yuvraj Patel and Shankar Pasupathy Designing a fast file system crawler with incremental differencing . . . . . 11--19 Jayanta Basak and Kushal Wadhwani and Kaladhar Voruganti and Srinivasan Narayanamurthy and Vipul Mathur and Siddhartha Nandi Model building for dynamic multi-tenant provider environments . . . . . . . . . 20--31 Lakshmi N. Bairavasundaram and Gokul Soundararajan and Vipul Mathur and Kaladhar Voruganti and Kiran Srinivasan Responding rapidly to service level violations using virtual appliances . . 32--40 Atul Goel and Peter Corbett RAID triple parity . . . . . . . . . . . 41--49 John D. Strunk Hybrid aggregates: combining SSDs and HDDs in a single storage pool . . . . . 50--56 Giridhar Appaji Nag Yasa and P. C. Nagesh Space savings and design considerations in variable length deduplication . . . . 57--64 Mathieu Desnoyers and Michel R. Dagenais Lockless multi-core high-throughput buffering scheme for kernel tracing . . 65--81
Dahlia Malkhi and Robbert van Renesse Workshop report on LADIS 2012 . . . . . 1--2 Paolo Costa Bridging the gap between applications and networks in data centers . . . . . . 3--8 Flavio P. Junqueira and Ivan Kelly and Benjamin Reed Durability with BookKeeper . . . . . . . 9--15 David Shue and Michael J. Freedman and Anees Shaikh Fairness and isolation in multi-tenant storage as optimization decomposition 16--21 Denisa Ghita and Katerina Argyraki and Patrick Thiran Toward accurate and practical network tomography . . . . . . . . . . . . . . . 22--26 Mateus Krepsky Ludwich and Antônio Augusto Fröhlich On the formal verification of component-based embedded operating systems . . . . . . . . . . . . . . . . 28--34 Alírio Santos de Sá and Allan Edgard Silva Freitas and Raimundo José de Araújo Macêdo Adaptive request batching for Byzantine replication . . . . . . . . . . . . . . 35--42 Naser Ezzati-Jivan and Michel R. Dagenais A framework to compute statistics of system parameters from very large trace files . . . . . . . . . . . . . . . . . 43--54 Karla Saur and Iulian Neamtiu Report on the Fourth Workshop on Hot Topics in Software Upgrades (HotSWUp 2012) . . . . . . . . . . . . . . . . . 55--62
Alexander Shraer and Rüdiger Kapitza Dagstuhl seminar report: security and dependability for federated cloud platforms, 2012 . . . . . . . . . . . . 4--5 Sara Bouchenak and Gregory Chockler and Hana Chockler and Gabriela Gheorghe and Nuno Santos and Alexander Shraer Verifying cloud services: present and future . . . . . . . . . . . . . . . . . 6--19 Miguel Correia and Neeraj Mittal Dependability issues in cloud computing: extended papers from the 1st International Workshop on Dependability Issues in Cloud Computing --- DISCCO . . 20--22 Steve Jiekak and Anne-Marie Kermarrec and Nicolas Le Scouarnec and Gilles Straub and Alexandre Van Kempen Regenerating codes: a system perspective 23--32 Sara Arbab Yazd and Subbarayan Venkatesan and Neeraj Mittal Boosting energy efficiency with mirrored data block replication policy and energy scheduler . . . . . . . . . . . . . . . 33--40 Moussa Taifi Banking on decoupling: budget-driven sustainability for HPC applications on auction-based clouds . . . . . . . . . . 41--50 Mathieu Desnoyers and Paul E. McKenney and Michel R. Dagenais Multi-core systems modeling for formal verification of parallel algorithms . . 51--65 Ashif S. Harji and Peter A. Buhr and Tim Brecht Our troubles with Linux Kernel upgrades and why you should care . . . . . . . . 66--72
Editors An energy-efficient self-provisioning approach for cloud resources management 2--9 Naga Pavan Kumar Gorti and Arun K. Somani Reliability aware dynamic voltage and frequency scaling for improved microprocessor lifetime . . . . . . . . 10--17 Soguy M. K. Gueye and Noel De Palma and Eric Rutten and Alain Tchana Coordinating multiple administration loops using discrete control . . . . . . 18--25 Sou Koyano and Shingo Ata and Hisashi Iwamoto and Yuji Yano and Yasuto Kuroda and Kazunari Inoue and Ikuo Oka A study on micro level traffic prediction for energy-aware routers . . 26--33 Christine Mayap Kamga CPU frequency emulation based on DVFS 34--41 Adel Noureddine and Romain Rouvoy and Lionel Seinturier A review of energy measurement approaches . . . . . . . . . . . . . . . 42--49 Chengwel Wang and Soila P. Kavulya and Jiaqi Tan and Liting Hu and Mahendra Kutare and Mike Kasick and Karsten Schwan and Priya Narasimhan and Rajeev Gandhi Performance troubleshooting in data centers: an annotated bibliography? . . 50--62
Julius Leite and Raphael Guerra and Rivalino Matias, Jr. and Antônio Augusto Fröhlich Brazilian Symposium on Computer System Engineering, November 4--8 2013, Niterói, Brazil . . . . . . . . . . . . . . . . . 1--1 Ricardo J. Pfitscher and Mauricio A. Pillon and Rafael R. Obelheiro Customer-oriented diagnosis of memory provisioning for IaaS clouds . . . . . . 2--10 Allan Edgard Silva Freitas and Raimundo José de Araújo Macêdo A performance evaluation tool for hybrid and dynamic distributed systems . . . . 11--18 Christian Cachin and Robbert van Renesse Workshop Report: HotDep 2013 --- The 9th Workshop on Hot Topics in Dependable Systems . . . . . . . . . . . . . . . . 19--20 Dirk Vogt and Cristiano Giuffrida and Herbert Bos and Andrew S. Tanenbaum Techniques for efficient in-memory checkpointing . . . . . . . . . . . . . 21--25 Thanumalayan Sankaranarayana Pillai and Vijay Chidambaram and Joo-Young Hwang and Andrea C. Arpaci-Dusseau and Remzi H. Arpaci-Dusseau Towards efficient, portable application-level consistency . . . . . 26--31 Kushagra Vaid and Lin Zhong Fuel, fans, and cores --- an introduction to selected papers from HotPower 2013 . . . . . . . . . . . . . 32--33 Hiroshi Endo and Hiroyoshi Kodama and Hiroyuki Fukuda and Toshio Sugimoto and Takashi Horie and Masao Kondo Cooperative control architecture of fan-less servers and fresh-air cooling in container servers for low power operation . . . . . . . . . . . . . . . 34--38 Ana Carolina Riekstin and Sean James and Aman Kansal and Jie Liu and Eric Peterson No more electrical infrastructure: towards fuel cell powered data centers 39--43 Aaron Carroll and Gernot Heiser Mobile multicores: use them or waste them . . . . . . . . . . . . . . . . . . 44--48 Marius Eriksen Your server as a function . . . . . . . 51--57 Gabriele Keller and Toby Murray and Sidney Amani and Liam O'Connor and Zilin Chen and Leonid Ryzhyk and Gerwin Klein and Gernot Heiser File systems deserve verification too! 58--64 Anton Burtsev and Nikhil Mishrikoti and Eric Eide and Robert Ricci Weir: a streaming language for performance analysis . . . . . . . . . . 65--70 Meenakshi Sundaram Bhaskaran and Jian Xu and Steven Swanson Bankshot: caching slow storage in fast non-volatile memory . . . . . . . . . . 73--81 Hyojun Kim and Sangeetha Seshadri and Clement L. Dickey and Lawrence Chiu Phase change memory in enterprise storage systems: silver bullet or snake oil? . . . . . . . . . . . . . . . . . . 82--89 Yongseok Oh and Jongmoo Choi and Donghee Lee and Sam H. Noh Improving performance and lifetime of the SSD RAID-based host cache through a log-structured approach . . . . . . . . 90--97 Robbert van Renesse The story behind the first SIGOPS Dennis M. Ritchie Doctoral Dissertation Award 98--102 Christopher Stewart and Vishakha Gupta The Workshop on Diversity in Systems Research 2013 . . . . . . . . . . . . . 103--106 Sidney Amani and Peter Chubb and Alastair F. Donaldson and Alexander Legg and Keng Chai Ong and Leonid Ryzhyk and Yanjin Zhu Automatic verification of active device drivers . . . . . . . . . . . . . . . . 106--118
Miguel Correia and Neeraj Mittal Cloud Computing Dependability: Report and Extended Papers of the Second International Workshop on Dependability Issues in Cloud Computing . . . . . . . 1--2 Nicola Nostro and Andrea Ceccarelli and Andrea Bondavalli and Francesco Brancati Insider Threat Assessment: a Model-Based Methodology . . . . . . . . . . . . . . 3--12 Alysson Bessani and Leucio A. Cutillo and Gianluca Ramunno and Norbert Schirmer and Paolo Smiraglia The TClouds Platform: From the Concept to the Implementation of Benchmark Scenarios . . . . . . . . . . . . . . . 13--22 William Tetzlaff SOSP Professional Travel Scholarship: Reflections by Recipient William Tetzlaff . . . . . . . . . . . . . . . . 23--23 Cary Gray SOSP Professional Travel Scholarship: Reflections by Recipient Cary Gray . . . 24--24 Artur Baruchi SOSP Professional Travel Scholarship: Reflections by Recipient Artur Baruchi 25--25 Doug Terry A Report on the First TRIOS Conference 26--34
Eric Eide Foreword: Special Issue on Repeatability and Sharing of Experimental Artifacts 1--2 Dror G. Feitelson From Repeatability to Reproducibility and Corroboration . . . . . . . . . . . 3--11 Heidi Howard and Malte Schwarzkopf and Anil Madhavapeddy and Jon Crowcroft Raft Refloated: Do We Have Consensus? 12--21 Mayank Varia and Benjamin Price and Nicholas Hwang and Ariel Hamlin and Jonathan Herzog and Jill Poland and Michael Reschly and Sophia Yakoubov and Robert K. Cunningham Automated Assessment of Secure Search Systems . . . . . . . . . . . . . . . . 22--30 Abraham N. Aldaco and Charles J. Colbourn and Violet R. Syrotiuk Locating Arrays: a New Experimental Design for Screening Complex Engineered Systems . . . . . . . . . . . . . . . . 31--40 Ali Abedi and Andrew Heard and Tim Brecht Conducting Repeatable Experiments and Fair Comparisons using 802.11n MIMO Networks . . . . . . . . . . . . . . . . 41--50 Christian Dietrich and Daniel Lohmann The dataref versuchung: Saving Time through Better Internal Repeatability 51--60 Luka Stanisic and Arnaud Legrand and Vincent Danjean An Effective Git and Org-Mode Based Workflow for Reproducible Research . . . 61--70 Carl Boettiger An introduction to Docker for reproducible research . . . . . . . . . 71--79 Cristian Ruiz and Salem Harrache and Michael Mercier and Olivier Richard Reconstructable Software Appliances with Kameleon . . . . . . . . . . . . . . . . 80--89 Sarah Edwards and Xuan Liu and Niky Riga Creating Repeatable Computer Science and Networking Experiments on Shared, Public Testbeds . . . . . . . . . . . . . . . . 90--99 Robert Ricci and Gary Wong and Leigh Stoller and Kirk Webb and Jonathon Duerig and Keith Downie and Mike Hibler Apt: a Platform for Repeatable Research in Computer Science . . . . . . . . . . 100--107 Bruce R. Childers and Alex K. Jones and Daniel Mossé A Roadmap and Plan of Action for Community-Supported Empirical Evaluation in Computer Architecture . . . . . . . . 108--117 Gregory Chockler and Flavio Junqueira and Rodrigo Rodrigues and Ymir Vigfusson LADIS'14: 8th Workshop on Large-Scale Distributed Systems and Middleware . . . 118--120 Valter Balegas and Sérgio Duarte and Carla Ferreira and Rodrigo Rodrigues and Nuno Preguiça and Mahsa Najafzadeh and Marc Shapiro Towards Fast Invariant Preservation in Geo-replicated Systems . . . . . . . . . 121--125 João Paiva and Luís Rodrigues On Data Placement in Distributed Systems 126--130 Ken Birman and Márk Jelasity and Robert Kleinberg and Edward Tremel Building a Secure and Privacy-Preserving Smart Grid . . . . . . . . . . . . . . . 131--136 Qin Jia and Zhiming Shen and Weijia Song and Robbert van Renesse and Hakim Weatherspoon Supercloud: Opportunities and Challenges 137--141 Petter Särd and Benoit Hudzia and Steve Walsh and Johan Tordsson and Erik Elmroth Principles and Performance Characteristics of Algorithms for Live VM Migration . . . . . . . . . . . . . . 142--155
Raimundo Barreto and Rafael Obelheiro and Leandro Becker Brazilian Symposium on Computing System Engineering . . . . . . . . . . . . . . 1--2 Giovani Gracioli and Antônio Augusto Fröhlich On the Design and Evaluation of a Real-Time Operating System for Cache-Coherent Multicore Architectures 2--16 Peter Desnoyers and Gokul Kandiraju INFLOW 2015: The Third Workshop on Interactions of NVM/FLash with Operating systems and Workload: INFLOW'15 Message from the Chairs . . . . . . . . . . . . 17--17 Biplob Debnath and Alireza Haghdoost and Asim Kadav and Mohammed G. Khatib and Cristian Ungureanu Revisiting Hash Table Design for Phase Change Memory . . . . . . . . . . . . . 18--26 Ricardo Santana and Raju Rangaswami and Vasily Tarasov and Dean Hildebrand A Fast and Slippery Slope for File Systems . . . . . . . . . . . . . . . . 27--34 Christoph Borchert and Olaf Spinczyk Hardening an L4 Microkernel Against Soft Errors by Aspect-Oriented Programming and Whole-Program Analysis . . . . . . . 37--43 Charles Jacobsen and Muktesh Khole and Sarah Spall and Scotty Bauer and Anton Burtsev Lightweight Capability Domains: Towards Decomposing the Linux Kernel . . . . . . 44--50 Ilya Yanok and Nathaniel Nystrom Tapir: a Language for Verified OS Kernel Probes . . . . . . . . . . . . . . . . . 51--56 Xinhao Yuan and David Williams-King and Junfeng Yang and Simha Sethumadhavan Making Lock-free Data Structures Verifiable with Artificial Transactions 57--63 Sharath K. Bhat and Ajithchandra Saya and Hemedra K. Rawat and Antonio Barbalace and Binoy Ravindran Harnessing Energy Efficiency of Heterogeneous-ISA Platforms . . . . . . 65--69 Mohammad A. Hoque and Sasu Tarkoma Sudden Drop in the Battery Level?: Understanding Smartphone State of Charge Anomaly . . . . . . . . . . . . . . . . 70--74 Qiuyun Wang and Benjamin C. Lee Modeling Communication Costs in Blade Servers . . . . . . . . . . . . . . . . 75--79
Gernot Heiser and Kenji Kono and KyoungSoo Park and Robbert van Renesse Report on the Asia--Pacific Systems Workshop 2015 (APSys'15) . . . . . . . . 1--2 Oliver R. A. Chick and Lucian Carata and James Snee and Nikilesh Balakrishnan and Ripduman Sohan Shadow Kernels: a General Mechanism For Kernel Specialization in Existing Operating Systems . . . . . . . . . . . 3--8 Sanidhya Kashyap and Changwoo Min and Taesoo Kim Opportunistic Spinlocks: Achieving Virtual Machine Scalability in the Clouds . . . . . . . . . . . . . . . . . 9--16 Márcio Oyamada and Antônio Augusto Fröhlich and Leandro Becker 5th Brazilian Symposium on Computing System Engineering . . . . . . . . . . . 17--17 Caio Augusto R. dos Santos and Rivalino Matias, Jr. Exploratory Analysis on Failure Causes in a Mass-Market Operating System . . . 18--30 Saul Delabrida and Thiago D'Angelo and Ricardo A. R. Oliveira and Antonio A. F. Loureiro Building Wearables for Geology: an Operating System Approach . . . . . . . 31--45
Yuanyuan Zhou Programming Uncertain $<$T$>$ hings . . . 1--2 Sergi Abadal and Albert Cabellos-Aparicio and Eduard Alarcon and Josep Torrellas WiSync: an Architecture for Fast Synchronization through On-Chip Wireless Communication . . . . . . . . . . . . . 3--17 Xiaodong Wang and José F. Martínez ReBudget: Trading Off Efficiency vs. Fairness in Market-Based Multicore Resource Allocation via Runtime Budget Reassignment . . . . . . . . . . . . . . 19--32 Haishan Zhu and Mattan Erez Dirigent: Enforcing QoS for Latency-Critical Tasks on Shared Multicore Systems . . . . . . . . . . . 33--47 Yossi Kuperman and Eyal Moscovici and Joel Nider and Razya Ladelsky and Abel Gordon and Dan Tsafrir Paravirtual Remote I/O . . . . . . . . . 49--65 Antoine Kaufmann and SImon Peter and Naveen Kr. Sharma and Thomas Anderson and Arvind Krishnamurthy High Performance Packet Processing with FlexNIC . . . . . . . . . . . . . . . . 67--81 James Bornholt and Antoine Kaufmann and Jialin Li and Arvind Krishnamurthy and Emina Torlak and Xi Wang Specifying and Checking File System Crash-Consistency Models . . . . . . . . 83--98 Aravinda Prasad and K. Gopinath Prudent Memory Reclamation in Procrastination-Based Synchronization 99--112 Anurag Mukkara and Nathan Beckmann and Daniel Sanchez Whirlpool: Improving Dynamic Cache Management with Static Data Classification . . . . . . . . . . . . . 113--127 Myeongjae Jeon and Yuxiong He and Hwanju Kim and Sameh Elnikety and Scott Rixner and Alan L. Cox TPC: Target-Driven Parallelism Combining Prediction and Correction to Reduce Tail Latency in Interactive Services . . . . 129--141 Fraser Brown and Andres Nötzli and Dawson Engler How to Build Static Checking Systems Using Orders of Magnitude Less Code . . 143--157 Tong Zhang and Dongyoon Lee and Changhee Jung TxRace: Efficient Data Race Detection Using Commodity Hardware Transactional Memory . . . . . . . . . . . . . . . . . 159--173 Sidney Amani and Alex Hixon and Zilin Chen and Christine Rizkallah and Peter Chubb and Liam O'Connor and Joel Beeren and Yutaka Nagashima and Japheth Lim and Thomas Sewell and Joseph Tuong and Gabriele Keller and Toby Murray and Gerwin Klein and Gernot Heiser CoGENT: Verifying High-Assurance File System Implementations . . . . . . . . . 175--188 Nils Asmussen and Marcus Völp and Benedikt Nöthen and Hermann Härtig and Gerhard Fettweis M3: a Hardware/Operating-System Co-Design to Tame Heterogeneous Manycores . . . . . . . . . . . . . . . 189--203 Daniyal Liaqat and Silviu Jingoi and Eyal de Lara and Ashvin Goel and Wilson To and Kevin Lee and Italo De Moraes Garcia and Manuel Saldana Sidewinder: an Energy Efficient and Developer Friendly Heterogeneous Architecture for Continuous Mobile Sensing . . . . . . . . . . . . . . . . 205--215 Jonathan Balkind and Michael McKeown and Yaosheng Fu and Tri Nguyen and Yanqi Zhou and Alexey Lavrov and Mohammad Shahrad and Adi Fuchs and Samuel Payne and Xiaohua Liang and Matthew Matl and David Wentzlaff OpenPiton: an Open Source Manycore Research Framework . . . . . . . . . . . 217--232 Daniel Lustig and Geet Sethi and Margaret Martonosi and Abhishek Bhattacharjee COATCheck: Verifying Memory Ordering at the Hardware-OS Interface . . . . . . . 233--247 Alex Markuze and Adam Morrison and Dan Tsafrir True IOMMU Protection from DMA Attacks: When Copy is Faster than Zero Copy . . . 249--262 Amro Awad and Pratyusa Manadhata and Stuart Haber and Yan Solihin and William Horne Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers . . . . . . . . . . . . . . 263--276 Youngjin Kwon and Alan M. Dunn and Michael Z. Lee and Owen S. Hofmann and Yuanzhong Xu and Emmett Witchel Sego: Pervasive Trusted Metadata for Efficiently Verified Untrusted System Services . . . . . . . . . . . . . . . . 277--290 Dan Tsafrir Synopsis of the ASPLOS '16 Wild and Crazy Ideas (WACI) Invited-Speakers Session . . . . . . . . . . . . . . . . 291--294 R. Stanley Williams Brain Inspired Computing . . . . . . . . 295--295 Phitchaya Mangpo Phothilimthana and Aditya Thakur and Rastislav Bodik and Dinakar Dhurjati Scaling up Superoptimization . . . . . . 297--310 Niranjan Hasabnis and R. Sekar Lifting Assembly to Intermediate Representation: a Novel Approach Leveraging Compilers . . . . . . . . . . 311--324 Saurav Muralidharan and Amit Roy and Mary Hall and Michael Garland and Piyush Rai Architecture-Adaptive Code Variant Tuning . . . . . . . . . . . . . . . . . 325--338 Xiaofeng Lin and Yu Chen and Xiaodong Li and Junjie Mao and Jiaquan He and Wei Xu and Yuanchun Shi Scalable Kernel TCP Design and Implementation for Short-Lived Connections . . . . . . . . . . . . . . 339--352 Izzat El Hajj and Alexander Merritt and Gerd Zellweger and Dejan Milojicic and Reto Achermann and Paolo Faraboschi and Wen-mei Hwu and Timothy Roscoe and Karsten Schwan SpaceJMP: Programming with Multiple Virtual Address Spaces . . . . . . . . . 353--368 Felix Xiaozhu Lin and Xu Liu memif: Towards Programming Heterogeneous Memory Asynchronously . . . . . . . . . 369--383 Wook-Hee Kim and Jinwoong Kim and Woongki Baek and Beomseok Nam and Youjip Won NVWAL: Exploiting NVRAM in Write-Ahead Logging . . . . . . . . . . . . . . . . 385--398 Aasheesh Kolli and Steven Pelley and Ali Saidi and Peter M. Chen and Thomas F. Wenisch High-Performance Transactions for Persistent Memories . . . . . . . . . . 399--411 Qing Guo and Karin Strauss and Luis Ceze and Henrique S. Malvar High-Density Image Storage Using Approximate Memory Cells . . . . . . . . 413--426 Joseph Izraelevitz and Terence Kelly and Aasheesh Kolli Failure-Atomic Persistent Memory Updates via JUSTDO Logging . . . . . . . . . . . 427--442 Jaeung Han and Seungheun Jeon and Young-ri Choi and Jaehyuk Huh Interference Management for Distributed Parallel Applications in Consolidated Clusters . . . . . . . . . . . . . . . . 443--456 Martin Maas and Krste Asanovi\'c and Tim Harris and John Kubiatowicz Taurus: a Holistic Language Runtime System for Coordinating Distributed Managed-Language Applications . . . . . 457--471 Christina Delimitrou and Christos Kozyrakis HCloud: Resource-Efficient Provisioning in Shared Cloud Systems . . . . . . . . 473--488 Xiao Yu and Pallavi Joshi and Jianwu Xu and Guoliang Jin and Hui Zhang and Guofei Jiang CloudSeer: Workflow Monitoring of Cloud Infrastructures via Interleaved Logs . . 489--502 Yonghwi Kwon and Dohyeong Kim and William Nick Sumner and Kyungtae Kim and Brendan Saltaformaggio and Xiangyu Zhang and Dongyan Xu LDX: Causality Inference by Lightweight Dual Execution . . . . . . . . . . . . . 503--515 Tanakorn Leesatapornwongsa and Jeffrey F. Lukman and Shan Lu and Haryadi S. Gunawi TaxDC: a Taxonomy of Non-Deterministic Concurrency Bugs in Datacenter Distributed Systems . . . . . . . . . . 517--530 Junjie Mao and Yu Chen and Qixue Xiao and Yuanchun Shi RID: Finding Reference Count Bugs with Inconsistent Path Pair Checking . . . . 531--544 Huazhe Zhang and Henry Hoffmann Maximizing Performance Under a Power Cap: a Comparison of Hardware, Software, and Hybrid Techniques . . . . . . . . . 545--559 Songchun Fan and Seyed Majid Zahedi and Benjamin C. Lee The Computational Sprinting Game . . . . 561--575 Alexei Colin and Graham Harvey and Brandon Lucia and Alanson P. Sample An Energy-interference-free Hardware-Software Debugger for Intermittent Energy-harvesting Systems 577--589 Emmett Witchel Programmer Productivity in a World of Mushy Interfaces: Challenges of the Post-ISA Reality . . . . . . . . . . . . 591--591 Kevin Angstadt and Westley Weimer and Kevin Skadron RAPID Programming of Pattern-Recognition Processors . . . . . . . . . . . . . . . 593--605 Xin Sui and Andrew Lenharth and Donald S. Fussell and Keshav Pingali Proactive Control of Approximate Programs . . . . . . . . . . . . . . . . 607--621 Jongse Park and Emmanuel Amaro and Divya Mahajan and Bradley Thwaites and Hadi Esmaeilzadeh AxGames: Towards Crowdsourcing Quality Target Determination in Approximate Computing . . . . . . . . . . . . . . . 623--636 James Bornholt and Randolph Lopez and Douglas M. Carmean and Luis Ceze and Georg Seelig and Karin Strauss A DNA-Based Archival Storage System . . 637--649 Raghu Prabhakar and David Koeplinger and Kevin J. Brown and HyoukJoong Lee and Christopher De Sa and Christos Kozyrakis and Kunle Olukotun Generating Configurable Hardware from Parallel Patterns . . . . . . . . . . . 651--665 Li-Wen Chang and Hee-Seok Kim and Wen-mei W. Hwu DySel: Lightweight Dynamic Selection for Kernel-based Data-parallel Programming Model . . . . . . . . . . . . . . . . . 667--680 Quan Chen and Hailong Yang and Jason Mars and Lingjia Tang Baymax: QoS Awareness and Increased Utilization for Non-Preemptive Accelerators in Warehouse Scale Computers . . . . . . . . . . . . . . . 681--696 Tony Nowatzki and Karthikeyan Sankaralingam Analyzing Behavior Specialized Acceleration . . . . . . . . . . . . . . 697--711 Man-Ki Yoon and Negin Salajegheh and Yin Chen and Mihai Christodorescu PIFT: Predictive Information-Flow Tracking . . . . . . . . . . . . . . . . 713--725 Ashish Venkat and Sriskanda Shamasunder and Hovav Shacham and Dean M. Tullsen HIPStR: Heterogeneous-ISA Program State Relocation . . . . . . . . . . . . . . . 727--741 Zelalem Birhanu Aweke and Salessawi Ferede Yitbarek and Rui Qiao and Reetuparna Das and Matthew Hicks and Yossi Oren and Todd Austin ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks . . . 743--755 Diego Didona and Nuno Diegues and Anne-Marie Kermarrec and Rachid Guerraoui and Ricardo Neves and Paolo Romano ProteusTM: Abstraction Meets Performance in Transactional Memory . . . . . . . . 757--771 Noam Shalev and Eran Harpaz and Hagar Porat and Idit Keidar and Yaron Weinsberg CSR: Core Surprise Removal in Commodity Operating Systems . . . . . . . . . . . 773--787 Tanmay Gangwani and Adam Morrison and Josep Torrellas CASPAR: Breaking Serialization in Lock-Free Multicore Synchronization . . 789--804
Jean-Thomas Acquaviva Performance and Scalability of Storage Systems, a view from the WOPSSS Workshop 2--2 Anastasios Papagiannis and Giorgos Saloustros and Manolis Marazakis and Angelos Bilas Iris: an optimized I/O stack for low-latency storage devices . . . . . . 3--11 Wolfram Schenck and Salem El Sayed and Maciej Foszczynski and Wilhelm Homberg and Dirk Pleiter Evaluation and Performance Modeling of a Burst Buffer Solution . . . . . . . . . 12--26 Hamza Ouarnoughi and Jalil Boukhobza and Frank Singhoff and Stéphane Rubini Integrating I/Os in Cloudsim for Performance and Energy Estimation . . . 27--36 Salem El Sayed and Matthias Bolten and Dirk Pleiter Using file system counters in modelling parallel I/O architectures . . . . . . . 37--46
David Tennenhouse Research at VMware . . . . . . . . . . . 1--4 Mihai Budiu and Chris Dodd The P416 Programming Language . . . . . 5--14 Xin Xu and Bhavesh Davda A Hypervisor Approach to Enable Live Migration with Passthrough SR-IOV Network Devices . . . . . . . . . . . . 15--23 Irina Calciu and Siddhartha Sen and Mahesh Balakrishnan and Marcos K. Aguilera How to implement any concurrent data structure for modern servers . . . . . . 24--32 Bryan Fink and Eric Knauft and Gene Zhang vSAN: Modern Distributed Storage . . . . 33--37 Timothy Merrifield and H. Reza Taheri Performance Implications of Extended Page Tables on Virtualized x86 Processors . . . . . . . . . . . . . . . 38--47 Abhishek Gupta and Rick Spillane and Wenguang Wang and Maxime Austruy and Vahid Fereydouny and Christos Karamanolis Hybrid Cloud Storage: Bridging the Gap between Compute Clusters and Cloud Storage . . . . . . . . . . . . . . . . 48--53 Nadav Amit and Michael Wei and Cheng-Chun Tu Hypercallbacks . . . . . . . . . . . . . 54--59 Vijayaraghavan Soundararajan and Joshua Schnee Sustainability as a first-class metric for developers and end-users . . . . . . 60--66 Heidi Howard and Dahlia Malkhi and Sasha Spiegelman Revisiting the Paxos Foundations: a Look at Summer Internship Work at VMware Research . . . . . . . . . . . . . . . . 67--71 Cheng-Chun Tu and Joe Stringer and Justin Pettit Building an Extensible Open vSwitch Datapath . . . . . . . . . . . . . . . . 72--77 Medhavi Dhawan and Gurprit Johal and Jim Stabile and Vjekoslav Brajkovic and James Chang and Kapil Goyal and Kevin James and Zeeshan Lokhandwala and Anny Martinez Manzanilla and Roger Michoud and Maithem Munshed and Srinivas Neginhal and Konstantin Spirov and Michael Wei and Scott Fritchie and Chris Rossbach and Ittai Abraham and Dahlia Malkhi Consistent Clustered Applications with Corfu . . . . . . . . . . . . . . . . . 78--82 Youngjin Kwon and Hangchen Yu and Simon Peter and Christopher J. Rossbach and Emmett Witchel Ingens: Huge Page Support for the OS and Hypervisor . . . . . . . . . . . . . . . 83--93 Abhiram Balasubramanian and Marek S. Baranowski and Anton Burtsev and Aurojit Panda and Zvonimir Rakamari and Leonid Ryzhyk System Programming in Rust: Beyond Safety . . . . . . . . . . . . . . . . . 94--99 Alisson Brito, Jr. and Leandro Becker Rivalino Matias 6th Brazilian Symposium on Computing System Engineering . . . . . . . . . . . 100--100 João Gabriel Reis and Antônio Augusto Fröhlich OS Support for Adaptive Components in Self-aware Systems . . . . . . . . . . . 101--112 Cha V. Li and Vinicius Petrucci and Daniel Mossé Exploring Machine Learning for Thread Characterization on Heterogeneous Multiprocessors . . . . . . . . . . . . 113--123
Yunji Chen Big Data Analytics and Intelligence at Alibaba Cloud . . . . . . . . . . . . . 1--1 Hari Cherupalli and Henry Duwe and Weidong Ye and Rakesh Kumar and John Sartori Determining Application-specific Peak Power and Energy Requirements for Ultra-low Power Processors . . . . . . . 3--16 Quan Chen and Hailong Yang and Minyi Guo and Ram Srivatsa Kannan and Jason Mars and Lingjia Tang Prophet: Precise QoS Prediction on Non-Preemptive Accelerators to Improve Utilization in Warehouse-Scale Computers 17--32 Svilen Kanev and Sam Likun Xi and Gu-Yeon Wei and David Brooks Mallacc: Accelerating Memory Allocation 33--45 Shasha Wen and Milind Chabbi and Xu Liu REDSPY: Exploring Value Locality in Software . . . . . . . . . . . . . . . . 47--61 Abhishek Bhattacharjee Translation-Triggered Prefetching . . . 63--76 Channoh Kim and Jaehyeok Kim and Sungmin Kim and Dooyoung Kim and Namho Kim and Gitae Na and Young H. Oh and Hyeon Gyu Cho and Jae W. Lee Typed Architectures: Architectural Support for Lightweight Scripting . . . 77--90 Jihye Seo and Wook-Hee Kim and Woongki Baek and Beomseok Nam and Sam H. Noh Failure-Atomic Slotted Paging for Persistent Memory . . . . . . . . . . . 91--104 Donald Nguyen and Keshav Pingali What Scalable Programs Need from Transactional Memory . . . . . . . . . . 105--118 Caroline Trippel and Yatin A. Manerkar and Daniel Lustig and Michael Pellauer and Margaret Martonosi TriCheck: Memory Model Verification at the Trisection of Software, Hardware, and ISA . . . . . . . . . . . . . . . . 119--133 Sanketh Nalli and Swapnil Haria and Mark D. Hill and Michael M. Swift and Haris Volos and Kimberly Keeton An Analysis of Persistent Memory Use with WHISPER . . . . . . . . . . . . . . 135--148 Tong Zhang and Changhee Jung and Dongyoon Lee ProRace: Practical Data Race Detection for Production Use . . . . . . . . . . . 149--162 Lena E. Olson and Mark D. Hill and David A. Wood Crossing Guard: Mediating Host-Accelerator Coherence Interactions 163--176 Joseph McMahan and Michael Christensen and Lawton Nichols and Jared Roesch and Sung-Yee Guo and Ben Hardekopf and Timothy Sherwood An Architecture Supporting Formal and Compositional Binary Analysis . . . . . 177--191 Chun-Hung Hsiao and Satish Narayanasamy and Essam Muhammad Idris Khan and Cristiano L. Pereira and Gilles A. Pokam AsyncClock: Scalable Inference of Asynchronous Event Causality . . . . . . 193--205 Irina Calciu and Siddhartha Sen and Mahesh Balakrishnan and Marcos K. Aguilera Black-box Concurrent Data Structures for NUMA Architectures . . . . . . . . . . . 207--221 Keval Vora and Chen Tian and Rajiv Gupta and Ziang Hu CoRAL: Confined Recovery in Distributed Asynchronous Graph Processing . . . . . 223--236 Keval Vora and Rajiv Gupta and Guoqing Xu KickStarter: Fast and Accurate Computations on Streaming Graphs via Trimmed Approximations . . . . . . . . . 237--251 Bobby Powers and John Vilk and Emery D. Berger Browsix: Bridging the Gap Between Unix and the Browser . . . . . . . . . . . . 253--266 Samyam Rajbhandari and Yuxiong He and Olatunji Ruwase and Michael Carbin and Trishul Chilimbi Optimizing CNNs on Multicores for Scalability, Performance and Goodput . . 267--280 Kirshanthan Sundararajah and Laith Sakka and Milind Kulkarni Locality Transformations for Nested Recursive Iteration Spaces . . . . . . . 281--295 Ang Li and Shuaiwen Leon Song and Weifeng Liu and Xu Liu and Akash Kumar and Henk Corporaal Locality-Aware CTA Clustering for Modern GPUs . . . . . . . . . . . . . . . . . . 297--311 Berkeley Churchill and Rahul Sharma and JF Bastien and Alex Aiken Sound Loop Superoptimization for Google Native Client . . . . . . . . . . . . . 313--326 Ricardo Bianchini Improving Datacenter Efficiency . . . . 327--327 Mengxing Liu and Mingxing Zhang and Kang Chen and Xuehai Qian and Yongwei Wu and Weimin Zheng and Jinglei Ren DudeTM: Building Durable Transactions with Decoupling for Persistent Memory 329--343 Ana Klimovic and Heiner Litz and Christos Kozyrakis ReFlex: Remote Flash $ \approx $ Local Flash . . . . . . . . . . . . . . . . . 345--359 Djordje Jevdjic and Karin Strauss and Luis Ceze and Henrique S. Malvar Approximate Storage of Compressed and Encrypted Videos . . . . . . . . . . . . 361--373 Nima Elyasi and Mohammad Arjomand and Anand Sivasubramaniam and Mahmut T. Kandemir and Chita R. Das and Myoungsoo Jung Exploiting Intra-Request Slack to Improve SSD Performance . . . . . . . . 375--388 Kai Wang and Aftab Hussain and Zhiqiang Zuo and Guoqing Xu and Ardalan Amiri Sani Graspan: a Single-machine Disk-based Graph System for Interprocedural Static Analyses of Large-scale Systems Code . . 389--404 Ao Ren and Zhe Li and Caiwen Ding and Qinru Qiu and Yanzhi Wang and Ji Li and Xuehai Qian and Bo Yuan SC--DCNN: Highly-Scalable Deep Convolutional Neural Network using Stochastic Computing . . . . . . . . . . 405--418 Jerry Ajay and Chen Song and Aditya Singh Rathore and Chi Zhou and Wenyao Xu $3$DGates: an Instruction-Level Energy Analysis and Optimization of $3$D Printers . . . . . . . . . . . . . . . . 419--433 Guilherme Cox and Abhishek Bhattacharjee Efficient Address Translation for Architectures with Multiple Page Sizes 435--448 Ilya Lesokhin and Haggai Eran and Shachar Raindel and Guy Shapiro and Sagi Grimberg and Liran Liss and Muli Ben-Yehuda and Nadav Amit and Dan Tsafrir Page Fault Support for Network Controllers . . . . . . . . . . . . . . 449--466 Yang Hu and Mingcong Song and Tao Li Towards ``Full Containerization'' in Containerized Network Function Virtualization . . . . . . . . . . . . . 467--481 Bo Wu and Xu Liu and Xiaobo Zhou and Changjun Jiang FLEP: Enabling Flexible and Efficient Preemption on GPUs . . . . . . . . . . . 483--496 Kaiwei Li and Jianfei Chen and Wenguang Chen and Jun Zhu SaberLDA: Sparsity-Aware Learning of Topic Models on GPUs . . . . . . . . . . 497--509 Moein Khazraee and Lu Zhang and Luis Vega and Michael Bedford Taylor Moonwalk: NRE Optimization in ASIC Clouds . . . . . . . . . . . . . . . . . 511--526 Jason Jong Kyu Park and Yongjun Park and Scott Mahlke Dynamic Resource Management for Efficient Utilization of Multitasking GPUs . . . . . . . . . . . . . . . . . . 527--540 Rui Zhang and Natalie Stanley and Christopher Griggs and Andrew Chi and Cynthia Sturton Identifying Security Critical Properties for the Dynamic Verification of a Processor . . . . . . . . . . . . . . . 541--554 Andrew Ferraiuolo and Rui Xu and Danfeng Zhang and Andrew C. Myers and G. Edward Suh Verification of a Practical Hardware Security Architecture Through Static Information Flow Analysis . . . . . . . 555--568 David Chisnall and Brooks Davis and Khilan Gudka and David Brazdil and Alexandre Joannou and Jonathan Woodruff and A. Theodore Markettos and J. Edward Maste and Robert Norton and Stacey Son and Michael Roe and Simon W. Moore and Peter G. Neumann and Ben Laurie and Robert N. M. Watson CHERI JNI: Sinking the Java Security Model into the C . . . . . . . . . . . . 569--583 Xinyang Ge and Weidong Cui and Trent Jaeger GRIFFIN: Guarding Control Flows Using Intel Processor Trace . . . . . . . . . 585--598 Christina Delimitrou and Christos Kozyrakis Bolt: I Know What You Did Last Summer \ldots In The Cloud . . . . . . . . . . 599--613 Yiping Kang and Johann Hauswald and Cao Gao and Austin Rovinski and Trevor Mudge and Jason Mars and Lingjia Tang Neurosurgeon: Collaborative Intelligence Between the Cloud and Mobile Edge . . . 615--629 Neha Agarwal and Thomas F. Wenisch Thermostat: Application-transparent Page Management for Two-tiered Main Memory 631--644 Antonio Barbalace and Robert Lyerly and Christopher Jelesnianski and Anthony Carno and Ho-Ren Chuang and Vincent Legout and Binoy Ravindran Breaking the Boundaries in Heterogeneous-ISA Datacenters . . . . . 645--659 Daniel Lustig and Andrew Wright and Alexandros Papakonstantinou and Olivier Giroux Automated Synthesis of Comprehensive Memory Model Litmus Test Suites . . . . 661--675 Haopeng Liu and Guangpu Li and Jeffrey F. Lukman and Jiaxin Li and Shan Lu and Haryadi S. Gunawi and Chen Tian DCatch: Automatically Detecting Distributed Concurrency Bugs in Cloud Systems . . . . . . . . . . . . . . . . 677--691 Ali José Mashtizadeh and Tal Garfinkel and David Terei and David Mazieres and Mendel Rosenblum Towards Practical Default-On Multi-Core Record/Replay . . . . . . . . . . . . . 693--708 Jian Huang and Michael Allen-Bond and Xuechen Zhang Pallas: Semantic-Aware Checking for Finding Deep Bugs in Fast Path . . . . . 709--722 Jagadish B. Kotra and Narges Shahidi and Zeshan A. Chishti and Mahmut T. Kandemir Hardware-Software Co-design to Mitigate DRAM Refresh Overheads: a Case for Refresh-Aware Process Scheduling . . . . 723--736 Jinchun Kim and Elvira Teran and Paul V. Gratz and Daniel A. Jiménez and Seth H. Pugsley and Chris Wilkerson Kill the Program Counter: Reconstructing Program Behavior in the Processor Cache Hierarchy . . . . . . . . . . . . . . . 737--749 Mingyu Gao and Jing Pu and Xuan Yang and Mark Horowitz and Christos Kozyrakis TETRIS: Scalable and Efficient Neural Network Acceleration with $3$D Memory 751--764 Wonjun Song and Gwangsun Kim and Hyungjoon Jung and Jongwook Chung and Jung Ho Ahn and Jae W. Lee and John Kim History-Based Arbitration for Fairness in Processor-Interconnect of NUMA Servers . . . . . . . . . . . . . . . . 765--777 Pulkit A. Misra and Jeffrey S. Chase and Johannes Gehrke and Alvin R. Lebeck Enabling Lightweight Transactions with Precision Time . . . . . . . . . . . . . 779--794 Ming Liu and Liang Luo and Jacob Nelson and Luis Ceze and Arvind Krishnamurthy and Kishore Atreya IncBricks: Toward In-Network Computation with an In-Network Cache . . . . . . . . 795--809 Ismail Akturk and Ulya R. Karpuzcu AMNESIAC: Amnesic Automatic Computer . . 811--824 Yuxin Bai and Victor W. Lee and Engin Ipek Voltage Regulator Efficiency Aware Power Management . . . . . . . . . . . . . . . 825--838
Hanna Alam and Tianhao Zhang and Mattan Erez and Yoav Etsion Do-It-Yourself Virtual Memory Translation . . . . . . . . . . . . . . 1--12 Sudarsun Kannan and Ada Gavrilovska and Vishal Gupta and Karsten Schwan HeteroOS: OS Design for Heterogeneous Memory Management in Datacenters . . . . 13--26 Rachata Ausavarungnirun and Joshua Landgraf and Vance Miller and Saugata Ghose and Jayneel Gandhi and Christopher J. Rossbach and Onur Mutlu Mosaic: Enabling Application-Transparent Support for Multiple Page Sizes in Throughput Processors . . . . . . . . . 27--44 Christoffer Dall and Shih-Wei Li and Jin Tack Lim and Jason Nieh ARM Virtualization: Performance and Architectural Implications . . . . . . . 45--56 Zi Yan and Ján Veselý and Guilherme Cox and Abhishek Bhattacharjee Hardware Translation Coherence for Virtualized Systems . . . . . . . . . . 57--70 Hung-Wei Tseng and Qianchen Zhao and Yuxiao Zhou and Mark Gahagan and Steven Swanson Morpheus: Exploring the Potential of Near-Data Processing for Creating Application Objects in Heterogeneous Computing . . . . . . . . . . . . . . . 71--83 Sagi Shahar and Shai Bergman and Mark Silberstein ActivePointers: a Case for Software Address Translation on GPUs . . . . . . 84--95 Shaolin Xie and Scott Davidson and Ikuo Magaki and Moein Khazraee and Luis Vega and Lu Zhang and Michael B. Taylor Extreme Datacenter Specialization for Planet-Scale Computing: ASIC Clouds . . 96--108 Mario Drumond and Alexandros Daglis and Nooshin Mirzadeh and Dmitrii Ustiugov and Javier Picorel and Babak Falsafi and Boris Grot and Dionisios Pnevmatikatos Algorithm/Architecture Co-Design for Near-Memory Processing . . . . . . . . . 109--122 Justin Pettit and Ben Pfaff and Joe Stringer and Cheng-Chun Tu and Brenden Blanco and Alex Tessmer Bringing Platform Harmony to VMware NSX 123--128 David E. Ott Software Defined Infrastructure: Rethinking Cybersecurity with a More Capable Toolset . . . . . . . . . . . . 129--133
Sanjay Krishnan and Aaron J. Elmore and Michael Franklin and John Paparrizos and Zechao Shang and Adam Dziedzic and Rui Liu Artificial Intelligence in Resource-Constrained and Shared Environments . . . . . . . . . . . . . . 1--6 Ken Birman and Bharath Hariharan and Christopher De Sa Cloud-Hosted Intelligence for Real-time IoT Applications . . . . . . . . . . . . 7--13 Cody Coleman and Daniel Kang and Deepak Narayanan and Luigi Nardi and Tian Zhao and Jian Zhang and Peter Bailis and Kunle Olukotun and Chris Ré and Matei Zaharia Analysis of DAWNBench, a Time-to-Accuracy Machine Learning Performance Benchmark . . . . . . . . . 14--25 Eunji Jeong and Sungwoo Cho and Gyeong-In Yu and Joo Seong Jeong and Dong-Jin Shin and Taebum Kim and Byung-Gon Chun Speculative Symbolic Graph Execution of Imperative Deep Learning Programs . . . 26--33 Yu Gan and Yanqi Zhang and Kelvin Hu and Dailun Cheng and Yuan He and Meghna Pancholi and Christina Delimitrou Leveraging Deep Learning to Improve Performance Predictability in Cloud Microservices with Seer . . . . . . . . 34--39 Yiying Zhang and Yutong Huang ``Learned'': Operating Systems . . . . . 40--45 David Vengerov and Sesh Jalagam A Machine Learning Approach to Recommending Files in a Collaborative Work Environment . . . . . . . . . . . . 46--51 Luo Mai and Alexandros Koliousis and Guo Li and Andrei-Octavian Brabete and Peter Pietzuch Taming Hyper-parameters in Deep Learning Systems . . . . . . . . . . . . . . . . 52--58 Kexin Pei and Shiqi Wang and Yuchi Tian and Justin Whitehouse and Carl Vondrick and Yinzhi Cao and Baishakhi Ray and Suman Jana and Junfeng Yang Bringing Engineering Rigor to Deep Learning . . . . . . . . . . . . . . . . 59--67 Chieh-Jan Mike Liang and Hui Xue and Mao Yang and Lidong Zhou The Case for Learning-and-System Co-design . . . . . . . . . . . . . . . 68--74 Mathias L`ecuyer and Riley Spahn and Kiran Vodrahalli and Roxana Geambasu and Daniel Hsu Privacy Accounting and Quality Control in the Sage Differentially Private ML Platform . . . . . . . . . . . . . . . . 75--84 Yifan Du and Valérie Issarny and Françoise Sailhan When the Power of the Crowd Meets the Intelligence of the Middleware: The Mobile Phone Sensing Case . . . . . . . 85--90
Gernot Heiser and Toby Murray and Gerwin Klein Towards Provable Timing-Channel Prevention . . . . . . . . . . . . . . . 1--7 Amit Vasudevan and Petros Maniatis and Ruben Martins überSpark: Practical, Provable, End-to-End Guarantees on Commodity Heterogeneous Interconnected Computing Platforms . . . . . . . . . . . . . . . 8--22 Andres Erbsen and Jade Philipoom and Jason Gross and Robert Sloan and Adam Chlipala Simple High-Level Code For Cryptographic Arithmetic: With Proofs, Without Compromises . . . . . . . . . . . . . . 23--30 Luke Nelson and James Bornholt and Arvind Krishnamurthy and Emina Torlak and Xi Wang Noninterference specifications for secure systems . . . . . . . . . . . . . 31--39 Srinath Setty and Sebastian Angel and Jonathan Lee Verifiable state machines: Proofs that untrusted services operate correctly . . 40--46 Paul E. McKenney and Joel Fernandes and Silas Boyd-Wickizer and Jonathan Walpole RCU Usage In the Linux Kernel: Eighteen Years Later . . . . . . . . . . . . . . 47--63 Kostas Ferles and Jacob Van Geffen and Isil Dillig and Yannis Smaragdakis Symbolic Reasoning for Automatic Signal Placement . . . . . . . . . . . . . . . 64--76
Kasra Jamshidi and Keval Vora A Deeper Dive into Pattern-Aware Subgraph Exploration with PEREGRINE . . 1--10 Xiaolin Jiang and Chengshuo Xu and Rajiv Gupta VRGQ: Evaluating a Stream of Iterative Graph Queries via Value Reuse . . . . . 11--20 Daniel Mawhirter and Sam Reinehr and Connor Holmes and Tongping Liu and Bo Wu GraphZero: a High-Performance Subgraph Matching System . . . . . . . . . . . . 21--37 Yiqiu Wang and Shangdi Yu and Laxman Dhulipala and Yan Gu and Julian Shun GeoGraph: a Framework for Graph Processing on Geometric Data . . . . . . 38--46 Loc Hoang and Roshan Dathathri and Gurbinder Gill and Keshav Pingali CuSP: a Customizable Streaming Edge Partitioner for Distributed Graph Analytics . . . . . . . . . . . . . . . 47--60 Benjamin Bowman and H. Howie Huang Towards Next-Generation Cybersecurity with Graph AI . . . . . . . . . . . . . 61--67 Marco Serafini Scalable Graph Neural Network Training: The Case for Sampling . . . . . . . . . 68--76 Rong Chen and Haibo Chen Wukong: a Distributed Framework for Fast and Concurrent Graph Querying . . . . . 77--83 Xiaowei Zhu and Zhisong Fu and Zhenxuan Pan and Jin Jiang and Chuntao Hong and Yongchao Liu and Yang Fang and Wenguang Chen and Changhua He Taking the Pulse of Financial Activities with Online Graph Processing . . . . . . 84--87 Mohammed Islam Naas and François Trahay and Alexis Colin and Pierre Olivier and Stéphane Rubini and Frank Singhoff and Jalil Boukhobza EZIOTracer: Unifying Kernel and User Space I/O Tracing for Data-Intensive Applications . . . . . . . . . . . . . . 88--98 Luis Thomas and Sebastien Gougeaud and Stéphane Rubini and Philippe Deniel and Jalil Boukhobza Predicting file lifetimes for data placement in multi-tiered storage systems for HPC . . . . . . . . . . . . 99--107
Yichen Li and Xu Zhang and Shilin He and Zhuangbin Chen and Yu Kang and Jinyang Liu and Liqun Li and Yingnong Dang and Feng Gao and Zhangwei Xu and Saravan Rajmohan and Qingwei Lin and Dongmei Zhang and Michael R. Lyu An Intelligent Framework for Timely, Accurate, and Comprehensive Cloud Incident Detection . . . . . . . . . . . 1--7 Yuri Shkuro and Benjamin Renard and Atul Singh Positional Paper: Schema-First Application Telemetry . . . . . . . . . 8--17 Yuting Jiang and Yifan Xiong and Lei Qu and Cheng Luo Luo and Chen Tian and Peng Cheng and Yongqiang Xiong Moneo: Monitoring Fine-grained Metrics Nonintrusively in AI Infrastructure . . 18--25 Muhammed Ugur and Cheng Jiang and Alex Erf and Tanvir Ahmed Khan and Baris Kasikci One Profile Fits All: Profile-Guided Linux Kernel Optimizations for Data Center Applications . . . . . . . . . . 26--33 Yu Gan and Mingyu Liang and Sundar Dev and David Lo and Christina Delimitrou Enabling Practical Cloud Performance Debugging with Unsupervised Learning . . 34--41 Mert Toslali and Emre Ates and Darby Huye and Zhaoqi Zhang and Lan Liu and Samantha Puterman and Ayse K. Coskun and Raja R. Sambasivan VAIF: Variance-driven Automated Instrumentation Framework . . . . . . . 42--50 Srinivas Vippagunta and Ken Finnigan and Kishore Pusukuri Pharos: The Observability Platform at Workday . . . . . . . . . . . . . . . . 51--54 Devashish R. Purandare and Daniel Bittman and Ethan L. Miller Analysis and Workload Characterization of the CERN EOS Storage System . . . . . 55--61 Julius Plehn and Anna Fuchs and Michael Kuhn and Jakob Lüttgau and Thomas Ludwig Data-Aware Compression for HPC using Machine Learning . . . . . . . . . . . . 62--69 Louis-Marie Nicolas and Luis Thomas and Yassine Hadjadj-Aoul and Jalil Boukhobza SLRL: a Simple Least Remaining Lifetime File Eviction policy for HPC multi-tier storage systems . . . . . . . . . . . . 70--76
Yiying Zhang Make It Real: an End-to-End Implementation of a Physically Disaggregated Data Center . . . . . . . 1--9 Henrique Fingler and Zhiting Zhu and Esther Yoon and Zhipeng Jia and Emmett Witchel and Christopher J. Rossbach Disaggregated GPU Acceleration for Serverless Applications . . . . . . . . 10--20 Irina Calciu and M. Talha Imran and Ivan Puddu and Sanidhya Kashyap and Hasan Al Maruf and Onur Mutlu and Aasheesh Kolli Using Local Cache Coherence for Disaggregated Memory Systems . . . . . . 21--28 Hasan Al Maruf and Mosharaf Chowdhury Memory Disaggregation: Advances and Open Challenges . . . . . . . . . . . . . . . 29--37 Marcos K. Aguilera and Emmanuel Amaro and Nadav Amit and Erika Hunhoff and Anil Yelam and Gerd Zellweger Memory disaggregation: why now and what are the challenges . . . . . . . . . . . 38--46 Divyanshu Saxena and Tao Ji and Arjun Singhvi and Junaid Khalid and Aditya Akella Navigating Performance--Efficiency Tradeoffs in Serverless Computing: Deduplication to the Rescue! . . . . . . 47--53
Mahesh Balakrishnan Taming Consensus in the Wild (with the Shared Log Abstraction) . . . . . . . . 1--6 Zhipeng Jia and Emmett Witchel The Key Ideas Behind Boki's Shared Logs 7--14 Chenyuan Wu and Haoyun Qin and Mohammad Javad Amiri and Boon Thau Loo and Dahlia Malkhi and Ryan Marcus Towards Truly Adaptive Byzantine Fault-Tolerant Consensus . . . . . . . . 15--22 Pedro Las-Casas and Alok Gautum Kumbhare and Rodrigo Fonseca and Sharad Agarwal LLexus: an AI agent system for incident management . . . . . . . . . . . . . . . 23--36 Luke Logan and Jay Lofstead and Xian-He Sun and Anthony Kougkas An Evaluation of DAOS for Simulation and Deep Learning HPCWorkloads . . . . . . . 37--44 Sebastián Rolón and Oana Balmau Is Bare-metal I/O Performance with User-defined Storage Drives Inside VMs Possible? Benchmarking \tt libvfio-user vs. Common Storage Virtualization Configurations . . . . . . . . . . . . . 45--52 Krijn Doekemeijer and Zebin Ren and Nick Tehrany and Animesh Trivedi ZWAL: Rethinking Write-ahead Logs for ZNS SSDs with Zone Appends . . . . . . . 53--60