Table of contents for issues of ACM Transactions on Computer Systems

Last update: Thu Jan 4 10:34:09 MST 2018                Valid HTML 3.2!

Volume 1, Number 1, February, 1983
Volume 1, Number 2, May, 1983
Volume 1, Number 3, August, 1983
Volume 1, Number 4, November, 1983
Volume 2, Number 1, November, 1984
Volume 2, Number 2, May, 1984
Volume 2, Number 3, August, 1984
Volume 2, Number 4, November, 1984
Volume 3, Number 1, February, 1985
Volume 3, Number 2, May, 1985
Volume 3, Number 3, August, 1985
Volume 3, Number 4, November, 1985
Volume 4, Number 1, February, 1986
Volume 4, Number 2, May, 1986
Volume 4, Number 3, August, 1986
Volume 4, Number 4, November, 1986
Volume 5, Number 1, February, 1987
Volume 5, Number 2, May, 1987
Volume 5, Number 3, August, 1987
Volume 5, Number 4, November, 1987
Volume 6, Number 1, February, 1988
Volume 6, Number 2, May, 1988
Volume 6, Number 3, August, 1988
Volume 6, Number 4, November, 1988
Volume 7, Number 1, February, 1989
Volume 7, Number 2, May, 1989
Volume 7, Number 3, August, 1989
Volume 7, Number 4, November, 1989
Volume 8, Number 1, February, 1990
Volume 8, Number 2, May, 1990
Volume 8, Number 3, August, 1990
Volume 8, Number 4, November, 1990
Volume 9, Number 1, February, 1991
Volume 9, Number 2, May, 1991
Volume 9, Number 3, August, 1991
Volume 9, Number 4, November, 1991
Volume 10, Number 1, February, 1992
Volume 10, Number 2, May, 1992
Volume 10, Number 3, August, 1992
Volume 10, Number 4, November, 1992
Volume 11, Number 1, February, 1993
Volume 11, Number 2, May, 1993
Volume 11, Number 3, August, 1993
Volume 11, Number 4, November, 1993
Volume 12, Number 1, February, 1994
Volume 12, Number 2, May, 1994
Volume 12, Number 3, August, 1994
Volume 12, Number 4, November, 1994
Volume 13, Number 1, February, 1995
Volume 13, Number 2, May, 1995
Volume 13, Number 3, August, 1995
Volume 13, Number 4, November, 1995
Volume 14, Number 1, February, 1996
Volume 14, Number 2, May, 1996
Volume 14, Number 3, August, 1996
Volume 14, Number 4, November, 1996
Volume 15, Number 1, February, 1997
Volume 15, Number 2, May, 1997
Volume 15, Number 3, August, 1997
Volume 15, Number 4, November, 1997
Volume 16, Number 1, February, 1998
Volume 16, Number 2, May, 1998
Volume 16, Number 3, August, 1998
Volume 16, Number 4, November, 1998
Volume 17, Number 1, February, 1999
Volume 17, Number 2, May, 1999
Volume 17, Number 3, August, 1999
Volume 17, Number 4, November, 1999
Volume 18, Number 1, February, 2000
Volume 18, Number 2, May, 2000
Volume 18, Number 3, 2000
Volume 18, Number 4, 2000
Volume 19, Number 1, 2001
Volume 19, Number 2, 2001
Volume 19, Number 3, 2001
Volume 19, Number 4, November, 2001
Volume 20, Number 1, February, 2002
Volume 20, Number 2, May, 2002
Volume 20, Number 3, August, 2002
Volume 20, Number 4, November, 2002
Volume 21, Number 1, February, 2003
Volume 21, Number 2, May, 2003
Volume 21, Number 3, August, 2003
Volume 21, Number 4, November, 2003
Volume 22, Number 1, February, 2004
Volume 22, Number 2, May, 2004
Volume 22, Number 3, August, 2004
Volume 22, Number 4, November, 2004
Volume 23, Number 1, February, 2005
Volume 23, Number 2, May, 2005
Volume 23, Number 3, August, 2005
Volume 23, Number 4, November, 2005
Volume 24, Number 1, February, 2006
Volume 24, Number 2, May, 2006
Volume 24, Number 3, August, 2006
Volume 24, Number 4, November, 2006
Volume 25, Number 1, February, 2007
Volume 25, Number 2, May, 2007
Volume 25, Number 3, August, 2007
Volume 25, Number 4, December, 2007
Volume 26, Number 1, February, 2008
Volume 26, Number 2, June, 2008
Volume 26, Number 3, September, 2008
Volume 26, Number 4, December, 2008
Volume 27, Number 1, February, 2009
Volume 27, Number 2, May, 2009
Volume 27, Number 3, November, 2009
Volume 27, Number 4, December, 2009
Volume 28, Number 1, March, 2010
Volume 28, Number 2, July, 2010
Volume 28, Number 3, September, 2010
Volume 28, Number 4, December, 2010
Volume 29, Number 1, February, 2011
Volume 29, Number 2, May, 2011
Volume 29, Number 3, August, 2011
Volume 29, Number 4, December, 2011
Volume 30, Number 1, February, 2012
Volume 30, Number 2, April, 2012
Volume 30, Number 3, August, 2012
Volume 30, Number 4, November, 2012
Volume 31, Number 1, February, 2013
Volume 31, Number 2, May, 2013
Volume 31, Number 3, August, 2013
Volume 31, Number 4, December, 2013
Volume 32, Number 1, February, 2014
Volume 32, Number 2, June, 2014
Volume 32, Number 3, September, 2014
Volume 32, Number 4, January, 2015
Volume 33, Number 1, March, 2015
Volume 33, Number 2, June, 2015
Volume 33, Number 3, September, 2015
Volume 33, Number 4, January, 2016
Volume 34, Number 1, April, 2016
Volume 34, Number 2, May, 2016
Volume 34, Number 3, September, 2016
Volume 34, Number 4, January, 2017
Volume 35, Number 1, July, 2017
Volume 35, Number 2, October, 2017
Volume 35, Number 3, December, 2017


ACM Transactions on Computer Systems
Volume 1, Number 1, February, 1983

                 Anita K. Jones   Editor's Introduction  . . . . . . . . . 1--2
                  David P. Reed   Implementing Atomic Actions on
                                  Decentralized Data . . . . . . . . . . . 3--23
               Douglas W. Clark   Cache Performance in the VAX-11/780  . . 24--37
                     Adi Shamir   On the Generation of Cryptographically
                                  Strong Pseudorandom Sequences  . . . . . 38--44
              George W. Cox and   
          William M. Corwin and   
              Konrad K. Lai and   
                Fred J. Pollack   Interprocess Communication, and
                                  Processor Dispatching on the Intel 432   45--66
               Charles H. Sauer   Computational Algorithms for
                                  State-Dependent Queueing Networks  . . . 67--92
                      Anonymous   Information for Authors  . . . . . . . . 93--95

ACM Transactions on Computer Systems
Volume 1, Number 2, May, 1983

           Herbert D. Schwetman   Preface to the Special Issue . . . . . . 97--98
             Derek L. Eager and   
              Kenneth C. Sevcik   Performance Bound Hierarchies for
                                  Queueing Networks  . . . . . . . . . . . 99--115
         Subhash C. Agrawal and   
               Jeffrey P. Buzen   The Aggregate Server Method for
                                  Analyzing Serialization Delays in
                                  Computer Systems . . . . . . . . . . . . 116--143
             K. Mani Chandy and   
              Laura M. Haas and   
                  Jayadev Misra   Distributed Deadlock Detection . . . . . 144--156
          Peter R. Cappello and   
              Kenneth Steiglitz   A VLSI Layout for a Pipelined Dadda
                                  Multiplier . . . . . . . . . . . . . . . 157--174
                    Manuel Blum   How to Exchange (Secret) Keys  . . . . . 175--193

ACM Transactions on Computer Systems
Volume 1, Number 3, August, 1983

            Tsutomu Hoshino and   
               Toshio Kawai and   
         Tomonori Shirakawa and   
          Junichi Higashino and   
              Akira Yamaoka and   
               Hachidai Ito and   
               Takashi Sato and   
                   Kazuo Sawada   PACS: a Parallel Microprocessor Array
                                  for Scientific Calculations  . . . . . . 195--221
     Richard D. Schlichting and   
              Fred B. Schneider   Fail-Stop Processors: An Approach to
                                  Designing Fault-Tolerant Computing
                                  Systems  . . . . . . . . . . . . . . . . 222--238
               Selim G. Akl and   
                Peter D. Taylor   Cryptographic Solution to a Problem of
                                  Access Control in a Hierarchy  . . . . . 239--248
                R. K. Bauer and   
               T. A. Berson and   
                 R. J. Feiertag   A Key Distribution Protocol Using Event
                                  Markers  . . . . . . . . . . . . . . . . 249--255
            Richard A. Kemmerer   Shared Resource Matrix Methodology: An
                                  Approach to Identifying Storage and
                                  Timing Channels  . . . . . . . . . . . . 256--277

ACM Transactions on Computer Systems
Volume 1, Number 4, November, 1983

                 Anita K. Jones   Preface to Special Issue . . . . . . . . 279--280
            William D. Strecker   Transient Behavior of Cache Memories . . 281--293
          Hiroshi Kobayashi and   
                    Mario Gerla   Optimal Routing in Closed Queueing
                                  Networks . . . . . . . . . . . . . . . . 294--310
                  Lansing Sloan   Mechanisms that Enforce Bounds on Packet
                                  Lifetimes  . . . . . . . . . . . . . . . 311--330
           A. Udaya Shankar and   
                   Simon S. Lam   An HDLC Protocol Specification and Its
                                  Verifications Using Image Protocols  . . 331--368
               Charles H. Sauer   Corrigendum: Computational Algorithms
                                  for State-Dependent Queuing Networks . . 369--369
                      Anonymous   Index  . . . . . . . . . . . . . . . . . 370--371


ACM Transactions on Computer Systems
Volume 2, Number 1, November, 1984

                 Anita K. Jones   Preface to Special Issue . . . . . . . . 1--1
       Michael D. Schroeder and   
          Andrew D. Birrell and   
               Roger M. Needham   Experience with Grapevine: The Growth of
                                  a Distributed System . . . . . . . . . . 3--23
           Bruce G. Lindsay and   
              Laura M. Haas and   
                   C. Mohan and   
              Paul F. Wilms and   
                 Robert A. Yost   Computation and Communication in R: a
                                  Distributed Database Manager . . . . . . 24--38
          Andrew D. Birrell and   
               Bruce Jay Nelson   Implementing Remote Procedure Calls  . . 39--59
         Simon Y. Berkovich and   
             Colleen Roe Wilson   A Computer Communication Technique Using
                                  Content-Induced Transaction Overlap  . . 60--77
                   Hisao Kameda   Optimality of a Central Processor
                                  Scheduling Policy for Processing a Job
                                  Stream . . . . . . . . . . . . . . . . . 78--90

ACM Transactions on Computer Systems
Volume 2, Number 2, May, 1984

                 Alan Jay Smith   Preface to Special Issue . . . . . . . . 91--92
        Marco Ajmone Marsan and   
               Gianni Conte and   
               Gianfranco Balbo   A Class of Generalized Stochastic Petri
                                  Nets for the Performance Evaluation of
                                  Multiprocessor Systems . . . . . . . . . 93--122
           Asser N. Tantawi and   
             Manfred Ruschitzka   Performance Analysis of Checkpointing
                                  Strategies . . . . . . . . . . . . . . . 123--144
              Fred B. Schneider   Byzantine Generals in Action:
                                  Implementing Fail-Stop Processors  . . . 145--154
                James W. Stamos   Static Grouping of Small Objects to
                                  Enhance Performance of a Paged Virtual
                                  Memory . . . . . . . . . . . . . . . . . 155--180

ACM Transactions on Computer Systems
Volume 2, Number 3, August, 1984

       Marshall K. McKusick and   
             William N. Joy and   
             Sam J. Leffler and   
                Robert S. Fabry   A Fast File System for UNIX  . . . . . . 181--197
           Carl E. Landwehr and   
     Constance L. Heitmeyer and   
                    John McLean   A Security Model for Military Message
                                  System . . . . . . . . . . . . . . . . . 198--222
           Peter M. Schwarz and   
              Alfred Z. Spector   Synchronizing Shared Abstract Types  . . 223--250
               Jo-Mei Chang and   
                N. F. Maxemchuk   Reliable Broadcast Protocols . . . . . . 251--273
                      Anonymous   Information for Authors  . . . . . . . . 274--276

ACM Transactions on Computer Systems
Volume 2, Number 4, November, 1984

              J. H. Saltzer and   
                 D. P. Reed and   
                    D. D. Clark   End-to-End Arguments in System Design    277--288
                 James E. Smith   Decoupled Access/Execute Computer
                                  Architectures  . . . . . . . . . . . . . 289--308
                Walter F. Tichy   The String-to-String Correction Problem
                                  with Block Moves . . . . . . . . . . . . 309--321
                    Raphael Rom   Ordering Subscribers on Cable Networks   322--334
          Raymond M. Bryant and   
      Anthony E. Krzesinski and   
          M. Seetha Lakshmi and   
                 K. Mani Chandy   The MVA Priority Approximation . . . . . 335--359


ACM Transactions on Computer Systems
Volume 3, Number 1, February, 1985

              Andrew D. Birrell   Secure Communication Using Remote
                                  Procedure Calls  . . . . . . . . . . . . 1--14
                     Dale Skeen   Determining the Last Process to Fail . . 15--30
           Douglas W. Clark and   
                   Joel S. Emer   Performance of the VAX-11/780
                                  Translation Buffer: Simulation and
                                  Measurement  . . . . . . . . . . . . . . 31--62
             K. Mani Chandy and   
                 Leslie Lamport   Distributed Snapshots: Determining
                                  Global States of Distributed Systems . . 63--75

ACM Transactions on Computer Systems
Volume 3, Number 2, May, 1985

          David R. Cheriton and   
               Willy Zwaenepoel   Distributed Process Groups in the V
                                  Kernel . . . . . . . . . . . . . . . . . 77--107
                    S. Even and   
                   O. Goldreich   On the Power of Cascade Ciphers  . . . . 108--116
       Krishnan Padmanabhan and   
               Duncan H. Lawrie   Performance Analysis of Redundant-Path
                                  Networks for Multiprocessor Systems  . . 117--144
                 Mamoru Maekawa   A $\sqrt{N}$ Algorithm for Mutual
                                  Exclusion in Decentralized Systems . . . 145--159

ACM Transactions on Computer Systems
Volume 3, Number 3, August, 1985

                 Alan Jay Smith   Disk Cache --- Miss Ratio Analysis and
                                  Design Considerations  . . . . . . . . . 161--203
            Robert E. Strom and   
                  Shaula Yemini   Optimistic Recovery in Distributed
                                  Systems  . . . . . . . . . . . . . . . . 204--226
                  Y. C. Tay and   
                     Rajan Suri   Error Bounds for Performance Prediction
                                  in Queuing Networks  . . . . . . . . . . 227--254

ACM Transactions on Computer Systems
Volume 3, Number 4, November, 1985

              Mark R. Brown and   
           Karen N. Kolling and   
                 Edward A. Taft   The Alpine File System . . . . . . . . . 261--293
             Renato De Mori and   
            Régis Cardin   A Recursive Algorithm for Binary
                                  Multiplication and its Implementation    294--314
             Ching-Hua Chow and   
           Mohamed G. Gouda and   
                   Simon S. Lam   A Discipline for Constructing Multiphase
                                  Communication Protocols  . . . . . . . . 315--343
              Ichiro Suzuki and   
                   Tadao Kasami   A Distributed Mutual Exclusion Algorithm 344--349


ACM Transactions on Computer Systems
Volume 4, Number 1, February, 1986

                Connie U. Smith   Independent General Principles for
                                  Constructing Responsive Software Systems 1--31
                Maurice Herlihy   A Quorum-Consensus Replication Method
                                  for Abstract Data Types  . . . . . . . . 32--53
           Thomas A. Joseph and   
              Kenneth P. Birman   Low Cost Management of Replicated Data
                                  in Fault-Tolerant Distributed Systems    54--70
                   Hisao Kameda   Effects of Job Loading Policies for
                                  Multiprogramming Systems in Processing a
                                  Job Stream . . . . . . . . . . . . . . . 71--106

ACM Transactions on Computer Systems
Volume 4, Number 2, May, 1986

          Nicholas Carriero and   
                David Gelernter   The S/Net's Linda kernel . . . . . . . . 110--129
        Nancy P. Kronenberg and   
              Henry M. Levy and   
            William D. Strecker   VAXclusters: a Closely-Coupled
                                  Distributed System . . . . . . . . . . . 130--146
          Robert Fitzgerald and   
              Richard F. Rashid   The Integration of Virtual Memory
                                  Management and Interprocess
                                  Communication in Accent  . . . . . . . . 147--177
                K. P. Hoyme and   
               S. C. Bruell and   
              P. V. Afshari and   
                     R. Y. Kain   A Tree-Structured Mean Value Analysis
                                  Algorithm  . . . . . . . . . . . . . . . 178--185

ACM Transactions on Computer Systems
Volume 4, Number 3, August, 1986

             Daniel Barbara and   
Héctor García-Molina   The Vulnerability of Vote Assignments    187--213
                 R. K. Iyer and   
             D. J. Rossetti and   
                    M. C. Hsueh   Measurement and Modeling of Computer
                                  Reliability as Affected by System
                                  Activity . . . . . . . . . . . . . . . . 214--237
         Edward D. Lazowska and   
              John Zahorjan and   
          David R. Cheriton and   
               Willy Zwaenepoel   File Access Performance of Diskless
                                  Workstations . . . . . . . . . . . . . . 238--268

ACM Transactions on Computer Systems
Volume 4, Number 4, November, 1986

            James Archibald and   
                 Jean-Loup Baer   Cache Coherence Protocols: Evaluation
                                  Using a Multiprocessor Simulation Model  273--298
           Douglas E. Comer and   
              Larry L. Peterson   Conversation-Based Mail  . . . . . . . . 299--319
                    D. Z. Badal   The Distributed Deadlock Detection
                                  Algorithm  . . . . . . . . . . . . . . . 320--337
           Michael J. Carey and   
              Waleed A. Muhanna   The Performance of Multiversion
                                  Concurrency Control Algorithms . . . . . 338--378


ACM Transactions on Computer Systems
Volume 5, Number 1, February, 1987

                 Leslie Lamport   A Fast Mutual Exclusion Algorithm  . . . 1--11
              David R. Cheriton   UIO: a Uniform I/O System Interface for
                                  Distributed Systems  . . . . . . . . . . 12--46
          Kenneth P. Birman and   
               Thomas A. Joseph   Reliable Communication in the Presence
                                  of Failures  . . . . . . . . . . . . . . 47--76
               Robert Geist and   
                 Stephen Daniel   A Continuum of Disk Scheduling
                                  Algorithms . . . . . . . . . . . . . . . 77--92
                 Alan Jay Smith   Remark on ``Disk Cache --- Miss Ratio
                                  Analysis and Design Consideration''  . . 93--93

ACM Transactions on Computer Systems
Volume 5, Number 2, May, 1987

          Richard W. Watson and   
                Sandy A. Mamrak   Gaining Efficiency in Transport Services
                                  by Appropriate Design and Implementation
                                  Choices  . . . . . . . . . . . . . . . . 97--120
              Jeffrey Joyce and   
                 Greg Lomow and   
               Konrad Slind and   
                    Brian Unger   Monitoring Distributed Systems . . . . . 121--150
          Janice I. Glasgow and   
               Glenn H. MacEwen   The Development and Proof of a Formal
                                  Specification for a Multilevel Secure
                                  System . . . . . . . . . . . . . . . . . 151--184

ACM Transactions on Computer Systems
Volume 5, Number 3, August, 1987

             Karsten Schwan and   
                 Tom Bihari and   
             Bruce W. Weide and   
                 Gregor Taulbee   High-Performance Operating System
                                  Primitives for Robotics and Real-Time
                                  Control Systems  . . . . . . . . . . . . 189--231
            Paul K. Harter, Jr.   Response Times in Level-Structured
                                  Systems  . . . . . . . . . . . . . . . . 232--248
                Maurice Herlihy   Concurrency Versus Availability:
                                  Atomicity Mechanisms for Replicated Data 249--274
               W. Worth Kirkman   An Optimized Contention Protocol for
                                  Broadband Networks . . . . . . . . . . . 275--283
             Beverly A. Sanders   The Information Structure of Distributed
                                  Mutual Exclusion Algorithms  . . . . . . 284--299

ACM Transactions on Computer Systems
Volume 5, Number 4, November, 1987

         Dominique Thiebaut and   
                Harold S. Stone   Footprints in the Cache  . . . . . . . . 305--329
              Joseph R. Falcone   A Programmable Interface Language for
                                  Heterogeneous Distributed Systems  . . . 330--351
              Philip D. L. Koch   Disk File Allocation Based on the Buddy
                                  System . . . . . . . . . . . . . . . . . 352--370
              Amir Herzberg and   
              Shlomit S. Pinter   Public Protection of Software  . . . . . 371--393
          Özalp Babao\uglu   On the Reliability of Consensus-Based
                                  Fault-Tolerant Distributed Computing
                                  Systems  . . . . . . . . . . . . . . . . 394--416


ACM Transactions on Computer Systems
Volume 6, Number 1, February, 1988

                 Anita K. Jones   Preface: Special Issue on Operating
                                  Systems Principles . . . . . . . . . . . 1--2
           Douglas B. Terry and   
            Daniel C. Swinehart   Managing Stored Voice in the Etherphone
                                  System . . . . . . . . . . . . . . . . . 3--27
               Albert Chang and   
                 Mark F. Mergen   801 Storage: Architecture and
                                  Programming  . . . . . . . . . . . . . . 28--50
             John H. Howard and   
           Michael L. Kazar and   
           Sherri G. Menees and   
           David A. Nichols and   
          M. Satyanarayanan and   
       Robert N. Sidebotham and   
                Michael J. West   Scale and Performance in a Distributed
                                  File System  . . . . . . . . . . . . . . 51--81
               Roger Haskin and   
               Yoni Malachi and   
               Wayne Sawdon and   
                   Gregory Chan   Recovery Management in QuickSilver . . . 82--108
                   Eric Jul and   
                 Henry Levy and   
          Norman Hutchinson and   
                   Andrew Black   Fine-Grained Mobility in the Emerald
                                  System . . . . . . . . . . . . . . . . . 109--133
          Michael N. Nelson and   
             Brent B. Welch and   
             John K. Ousterhout   Caching in the Sprite Network File
                                  System . . . . . . . . . . . . . . . . . 134--154

ACM Transactions on Computer Systems
Volume 6, Number 2, May, 1988

              Richard Snodgrass   A Relational Approach to Monitoring
                                  Complex Systems  . . . . . . . . . . . . 157--196
          Ravinderpal S. Sandhu   The NTree: a Two Dimension Partial Order
                                  for Protection Groups  . . . . . . . . . 197--222

ACM Transactions on Computer Systems
Volume 6, Number 3, August, 1988

            Thomas R. Gross and   
           John L. Hennessy and   
       Steven A. Przybylski and   
              Christopher Rowen   Measurement and Evaluation of the MIPS
                                  Architecture and Processor . . . . . . . 229--257
           David K. Gifford and   
                 Nathan Glasser   Remote Pipes and Procedures for
                                  Efficient Distributed Communication  . . 258--283
            Dale M. Johnson and   
               F. Javier Thayer   Stating Security Requirements with
                                  Tolerable Sets . . . . . . . . . . . . . 284--295
          Robert P. Colwell and   
        Edward F. Gehringer and   
              E. Douglas Jensen   Performance Effects of Architectural
                                  Complexity in the Intel 432  . . . . . . 296--339

ACM Transactions on Computer Systems
Volume 6, Number 4, November, 1988

              Larry L. Peterson   The Profile Naming Service . . . . . . . 341--364
               M. Stella Atkins   Experiments in SR with Different Upcall
                                  Program Structures . . . . . . . . . . . 365--392
              Anant Agarwal and   
              John Hennessy and   
                  Mark Horowitz   Cache Performance of Operating System
                                  and Multiprogramming Workloads . . . . . 393--431
               Tatsuaki Okamoto   A Digital Multisignature Scheme using
                                  Bijective Public-Key Cryptosystems . . . 432--441


ACM Transactions on Computer Systems
Volume 7, Number 1, February, 1989

                 Anita Borg and   
              Wolfgang Blau and   
          Wolfgang Graetsch and   
         Ferdinand Herrmann and   
                Wolfgang Oberle   Fault Tolerance under UNIX . . . . . . . 1--24
          Frank M. Pittelli and   
Héctor García-Molina   Reliable Scheduling in a TMR Database
                                  System . . . . . . . . . . . . . . . . . 25--60
                  Kerry Raymond   A Tree-Based Algorithm for Distributed
                                  Mutual Exclusion . . . . . . . . . . . . 61--77
          James G. Thompson and   
                 Alan Jay Smith   Efficient (Stack) Algorithms for
                                  Analysis of Write-Back and Sector
                                  Memories . . . . . . . . . . . . . . . . 78--117

ACM Transactions on Computer Systems
Volume 7, Number 2, May, 1989

                Anoop Gupta and   
              Charles Forgy and   
                   Allen Newell   High-speed Implementations of Rule-Based
                                  Systems  . . . . . . . . . . . . . . . . 119--146
          David R. Cheriton and   
                Timothy P. Mann   Decentralizing a Global Naming Service
                                  for Improved Performance and Fault
                                  Tolerance  . . . . . . . . . . . . . . . 147--183
              Anant Agarwal and   
              Mark Horowitz and   
                  John Hennessy   An Analytical Cache Model  . . . . . . . 184--215

ACM Transactions on Computer Systems
Volume 7, Number 3, August, 1989

          Larry L. Peterson and   
           Nick C. Buchholz and   
         Richard D. Schlichting   Preserving and Using Context Information
                                  in Interprocess Communication  . . . . . 217--246
              M. Satyanarayanan   Integrating Security in a Large
                                  Distributed System . . . . . . . . . . . 247--280
               A. Udaya Shankar   Verified Data Transfer Protocols with
                                  Variable Flow Control  . . . . . . . . . 281--316

ACM Transactions on Computer Systems
Volume 7, Number 4, November, 1989

                     Kai Li and   
                     Paul Hudak   Memory Coherence in Shared Virtual
                                  Memory Systems . . . . . . . . . . . . . 321--359
                     Tony P. Ng   Using Histories to Implement Atomic
                                  Objects  . . . . . . . . . . . . . . . . 360--393
             Daniel Barbara and   
Héctor García-Molina and   
             Annemarie Spauster   Increasing Availability under Mutual
                                  Exclusion Constraints with Dynamic Vote
                                  Reassignment . . . . . . . . . . . . . . 394--426


ACM Transactions on Computer Systems
Volume 8, Number 1, February, 1990

       Michael D. Schroeder and   
                Michael Burrows   Performance of the Firefly RPC . . . . . 1--17
            Michael Burrows and   
               Martin Abadi and   
                  Roger Needham   A Logic of Authentication  . . . . . . . 18--36
           Brian N. Bershad and   
         Thomas E. Anderson and   
         Edward D. Lazowska and   
                  Henry M. Levy   Lightweight Remote Procedure Call  . . . 37--55
          David P. Anderson and   
                    Ron Kuivila   A System for Computer Music Performance  56--82

ACM Transactions on Computer Systems
Volume 8, Number 2, May, 1990

         Stephen E. Deering and   
              David R. Cheriton   Multicast Routing in Datagram
                                  Internetworks and Extended LANs  . . . . 85--110
             Karsten Schwan and   
                         Win Bo   ``Topologies'' --- Distributed Objects
                                  on Multicomputers  . . . . . . . . . . . 111--157
         K. K. Ramakrishnan and   
                        R. Jain   A Binary Feedback Scheme for Congestion
                                  Avoidance in Computer Networks . . . . . 158--181

ACM Transactions on Computer Systems
Volume 8, Number 3, August, 1990

            Glenn S. Benson and   
            Ian F. Akyildiz and   
               William F. Aelbe   A Formal Protection Model of Security in
                                  Centralized, Parallel, and Distributed
                                  Systems  . . . . . . . . . . . . . . . . 183--213
                Richard P. King   Disk Arm Movement in Anticipation of
                                  Future Requests  . . . . . . . . . . . . 214--229
           Chad L. Mitchell and   
               Michael J. Flynn   The Effects of Processor Architecture on
                                  Instruction Memory Traffic . . . . . . . 230--250

ACM Transactions on Computer Systems
Volume 8, Number 4, November, 1990

          Reinhard Gotzhein and   
            Gregor von Bochmann   Deriving Protocol Specifications from
                                  Service Specifications Including
                                  Parameters . . . . . . . . . . . . . . . 255--283
                 Keith Marzullo   Tolerating Failures of Continuous-Valued
                                  Sensors  . . . . . . . . . . . . . . . . 284--304
                 Leslie Lamport   Concurrent Reading and Writing of Clocks 305--310
       German S. Goldszmidt and   
                  Shaula Yemini   High-level Language Debugging for
                                  Concurrent Programs  . . . . . . . . . . 311--336


ACM Transactions on Computer Systems
Volume 9, Number 1, February, 1991

          Divyakant Agrawal and   
                  Amr El Abbadi   An Efficient and Fault-Tolerant Solution
                                  for Distributed Mutual Exclusion . . . . 1--20
     John M. Mellor-Crummey and   
               Michael L. Scott   Algorithms for Scalable Synchronization
                                  on Shared-Memory Multiprocessors . . . . 21--65
              Miquel Huguet and   
              Tomás Lang   Architectural Support for Reduced
                                  Register Saving/Restoring in
                                  Single-Window Register Files . . . . . . 66--97

ACM Transactions on Computer Systems
Volume 9, Number 2, May, 1991

                    Lixia Zhang   VirtualClock: a New Traffic Control
                                  Algorithm for Packet-Switched Networks   101--124
             Barbara Liskov and   
               Liuba Shrira and   
                John Wroclawski   Efficient At-Most-Once Messages Based on
                                  Synchronized Clocks  . . . . . . . . . . 125--142
           Thomas E. Bihari and   
                 Karsten Schwan   Dynamic Adaptation of Real-Time Software 143--174
           Brian N. Bershad and   
         Thomas E. Anderson and   
         Edward D. Lazowska and   
                  Henry M. Levy   User-level Interprocess Communication
                                  for Shared Memory Multiprocessors  . . . 175--198

ACM Transactions on Computer Systems
Volume 9, Number 3, August, 1991

        Albert G. Greenberg and   
       Boris D. Lubachevsky and   
                    Isi Mitrani   Algorithms for Unboundedly Parallel
                                  Simulations  . . . . . . . . . . . . . . 201--221
              Wen-Hann Wang and   
                 Jean-Loup Baer   Efficient Trace-Driven Simulation
                                  Methods for Cache Performance Analysis   222--241
Héctor García-Molina and   
             Annemarie Spauster   Ordered and Reliable Multicast
                                  Communication  . . . . . . . . . . . . . 242--271
       André Schiper and   
             Kenneth Birman and   
                 Pat Stephenson   Lightweight Causal and Atomic Group
                                  Multicast  . . . . . . . . . . . . . . . 272--314

ACM Transactions on Computer Systems
Volume 9, Number 4, November, 1991

     Richard P. Larowe, Jr. and   
          Carla Schlatter Ellis   Experimental Comparison of Memory
                                  Management Policies for NUMA
                                  Multiprocessors  . . . . . . . . . . . . 319--363
                  Phil Karn and   
                Craig Partridge   Improving Round-Trip Time Estimates in
                                  Reliable Transport Protocols . . . . . . 364--373
           Dilip D. Kandlur and   
                   Kang G. Shin   Reliable Broadcast Algorithms for HARTS  374--398
            Mustaque Ahamad and   
           Mostafa H. Ammar and   
                Shun Yan Cheung   Multidimensional Voting  . . . . . . . . 399--431


ACM Transactions on Computer Systems
Volume 10, Number 1, February, 1992

           James J. Kistler and   
              M. Satyanarayanan   Disconnected Operation in the Coda File
                                  System . . . . . . . . . . . . . . . . . 3--25
           Mendel Rosenblum and   
             John K. Ousterhout   The Design and Implementation of a
                                  Log-Structured File System . . . . . . . 26--52
         Thomas E. Anderson and   
           Brian N. Bershad and   
         Edward D. Lazowska and   
                  Henry M. Levy   Scheduler Activations: Effective Kernel
                                  Support for the User-Level Management of
                                  Parallelism  . . . . . . . . . . . . . . 53--79

ACM Transactions on Computer Systems
Volume 10, Number 2, May, 1992

               Jeffrey C. Mogul   Network Locality at the Scale of
                                  Processes  . . . . . . . . . . . . . . . 81--109
           Sean W. O'Malley and   
              Larry L. Peterson   A Dynamic Network Architecture . . . . . 110--143
    Parameswaran Ramanathan and   
                   Kang G. Shin   Delivery of Time-Critical Messages using
                                  a Multiple Copy Approach . . . . . . . . 144--166

ACM Transactions on Computer Systems
Volume 10, Number 3, August, 1992

       William Tsun-Yuk Hsu and   
                  Pen-Chung Yew   An Effective Synchronization Network for
                                  Hot-Spot Accesses  . . . . . . . . . . . 167--189
               M. S. Atkins and   
                    M. Y. Coady   Adaptable Concurrency Control for Atomic
                                  Data Types . . . . . . . . . . . . . . . 190--225
             Janice Glasgow and   
              Glenn Macewen and   
             Prakash Panangaden   A Logic for Reasoning about Security . . 226--264

ACM Transactions on Computer Systems
Volume 10, Number 4, November, 1992

             Butler Lampson and   
        Martín Abadi and   
            Michael Burrows and   
                  Edward Wobber   Authentication in Distributed Systems:
                                  Theory and Practice  . . . . . . . . . . 265--310
          David P. Anderson and   
            Yoshitomo Osawa and   
                Ramesh Govindan   A File System for Continuous Media . . . 311--337
              R. E. Kessler and   
                   Mark D. Hill   Page Placement Algorithms for Large
                                  Real-Indexed Caches  . . . . . . . . . . 338--359
                Rivka Ladin and   
             Barbara Liskov and   
               Liuba Shrira and   
                Sanjay Ghemawat   Providing High Availability Using Lazy
                                  Replication  . . . . . . . . . . . . . . 360--391


ACM Transactions on Computer Systems
Volume 11, Number 1, February, 1993

             Derek L. Eager and   
                  John Jahorjan   Chores: Enhanced Run-Time Support for
                                  Shared-Memory Parallel Computing . . . . 1--32
               Ahmed Gheith and   
                 Karsten Schwan   CHAOS$^{\rm arc}$: Kernel Support for
                                  Multiweight Objects, Invocations, and
                                  Atomicity in Real-Time Multiprocessor
                                  Applications . . . . . . . . . . . . . . 33--72
          M. Frans Kaashoek and   
        Robbert van Renesse and   
          Hans van Staveren and   
            Andrew S. Tanenbaum   FLIP: An Internetwork Protocol for
                                  Supporting Distributed Systems . . . . . 73--106

ACM Transactions on Computer Systems
Volume 11, Number 2, May, 1993

      Ganesh Gopalakrishnan and   
               Richard Fujimoto   Design and Verification of the Rollback
                                  Chip using HOP: a Case Study of Formal
                                  Methods Applied to Hardware Design . . . 109--145
               Cathy McCann and   
                Raj Vaswani and   
                  John Zahorjan   A Dynamic Processor Allocation Policy
                                  for Multiprogrammed Shared-Memory
                                  Multiprocessors  . . . . . . . . . . . . 146--178
   Chandramohan A. Thekkath and   
                  Henry M. Levy   Limits to Low-Latency Communication on
                                  High-Speed Networks  . . . . . . . . . . 179--203

ACM Transactions on Computer Systems
Volume 11, Number 3, August, 1993

                Paul Ammann and   
                 Sushil Jajodia   Distributed Timestamp Generation in
                                  Planar Lattice Networks  . . . . . . . . 205--225
              David P. Anderson   Metascheduling for Continuous Media  . . 226--252
              Beng-Hong Lim and   
                  Anant Agarwal   Waiting Algorithms for Synchronization
                                  in Large-Scale Multiprocessors . . . . . 253--294

ACM Transactions on Computer Systems
Volume 11, Number 4, November, 1993

               Mark D. Hill and   
             James R. Larus and   
        Steven K. Reinhardt and   
                  David A. Wood   Cooperative Shared Memory: Software and
                                  Hardware for Scalable Multiprocessors    300--318
         Thomas E. Anderson and   
            Susan S. Owicki and   
              James B. Saxe and   
             Charles P. Thacker   High-speed Switch Scheduling for
                                  Local-Area Networks  . . . . . . . . . . 319--352
                     Wei Li and   
                 Keshav Pingali   Access Normalization: Loop Restructuring
                                  for NUMA Computers . . . . . . . . . . . 353--375
            Scott A. Mahlke and   
            William Y. Chen and   
         Roger A. Bringmann and   
            Richard E. Hank and   
             Wen-Mei W. Hwu and   
         B. Ramakrishna Rau and   
          Michael S. Schlansker   Sentinel Scheduling: a Model for
                                  Compiler-Controlled Speculative
                                  Execution  . . . . . . . . . . . . . . . 376--408


ACM Transactions on Computer Systems
Volume 12, Number 1, February, 1994

              Edward Wobber and   
        Martín Abadi and   
            Michael Burrows and   
                 Butler Lampson   Authentication in the Taos Operating
                                  System . . . . . . . . . . . . . . . . . 3--32
          M. Satyanarayanan and   
          Henry H. Mashburn and   
               Puneet Kumar and   
            David C. Steere and   
               James J. Kistler   Lightweight Recoverable Virtual Memory   33--57
          John S. Heidemann and   
                Gerald J. Popek   File-system Development with Stackable
                                  Layers . . . . . . . . . . . . . . . . . 58--89

ACM Transactions on Computer Systems
Volume 12, Number 2, May, 1994

               Hagit Attiya and   
              Jennifer L. Welch   Sequential Consistency versus
                                  Linearizability  . . . . . . . . . . . . 91--122
               Timothy Mann and   
             Andrew Birrell and   
                Andy Hisgen and   
             Charles Jerian and   
                   Garret Swart   A Coherent Distributed File Cache with
                                  Directory Write-Behind . . . . . . . . . 123--164

ACM Transactions on Computer Systems
Volume 12, Number 3, August, 1994

              Richard Uhlig and   
                David Nagle and   
                Tim Stanley and   
               Trevor Mudge and   
            Stuart Sechrest and   
                  Richard Brown   Design Tradeoffs for Software-Managed
                                  TLBs . . . . . . . . . . . . . . . . . . 175--205
           Daniel Stodolsky and   
               Mark Holland and   
   William V. Courtright II and   
                Garth A. Gibson   Parity Logging Disk Arrays . . . . . . . 206--235
                    Pei Cao and   
              Swee Boon Lin and   
    Shivakumar Venkataraman and   
                    John Wilkes   The TickerTAIP Parallel RAID
                                  Architecture . . . . . . . . . . . . . . 236--269

ACM Transactions on Computer Systems
Volume 12, Number 4, November, 1994

           Jeffrey S. Chase and   
              Henry M. Levy and   
          Michael J. Feeley and   
             Edward D. Lazowska   Sharing and Protection in a
                                  Single-Address-Space Operating System    271--307
              Peter M. Chen and   
             David A. Patterson   A New Approach to I/O Performance
                                  Evaluation: Self-Scaling I/O Benchmarks,
                                  Predicted I/O Performance  . . . . . . . 308--339
          Michael K. Reiter and   
          Kenneth P. Birman and   
            Robbert van Renesse   A Security Architecture for
                                  Fault-Tolerant Systems . . . . . . . . . 340--371


ACM Transactions on Computer Systems
Volume 13, Number 1, February, 1995

                 Peter C. Bates   Debugging Heterogeneous Distributed
                                  Systems Using Event-Based Models of
                                  Behavior . . . . . . . . . . . . . . . . 1--31
           Rabin A. Sugumar and   
             Santosh G. Abraham   Set-Associative Cache Simulation Using
                                  Generalized Binomial Trees . . . . . . . 32--56
            Dean M. Tullsen and   
                Susan J. Eggers   Effective Cache Prefetching on Bus-Based
                                  Multiprocessors  . . . . . . . . . . . . 57--88

ACM Transactions on Computer Systems
Volume 13, Number 2, May, 1995

         Sedat Akyürek and   
                  Kenneth Salem   Adaptive Block Rearrangement . . . . . . 89--121
      Saied Hosseini-Khayat and   
          Andreas D. Bovopoulos   A Simple and Efficient Bus Management
                                  Scheme That Supports Continuous Streams  122--140
        Jaswinder Pal Singh and   
           John L. Hennessy and   
                    Anoop Gupta   Implications of Hierarchical $N$-Body
                                  Methods for Multiprocessor Architectures 141--202

ACM Transactions on Computer Systems
Volume 13, Number 3, August, 1995

             John B. Carter and   
            John K. Bennett and   
               Willy Zwaenepoel   Techniques for Reducing
                                  Consistency-Related Communication in
                                  Distributed Shared-Memory Systems  . . . 205--243
                 Amer Diwan and   
              David Tarditi and   
                     Eliot Moss   Memory System Performance of Programs
                                  with Intensive Heap Allocation . . . . . 244--273
            John H. Hartman and   
             John K. Ousterhout   The Zebra Striped Network File System    274--310

ACM Transactions on Computer Systems
Volume 13, Number 4, November, 1995

                    Y. Amir and   
                L. E. Moser and   
        P. M. Melliar-Smith and   
              D. A. Agarwal and   
                   P. Ciarfella   The Totem Single-Ring Ordering and
                                  Membership Protocol  . . . . . . . . . . 311--342
            Maurice Herlihy and   
              Beng-Hong Lim and   
                     Nir Shavit   Scalable Concurrent Counting . . . . . . 343--364
             Dino Mandrioli and   
             Sandro Morasca and   
                Angelo Morzenti   Generating Test Cases for Real-Time
                                  Systems from Logic Specifications  . . . 365--398


ACM Transactions on Computer Systems
Volume 14, Number 1, February, 1996

            J. Bradley Chen and   
              Yasuhiro Endo and   
                   Kee Chan and   
           David Mazi\`eres and   
               Antonio Dias and   
              Margo Seltzer and   
               Michael D. Smith   The Measured Performance of Personal
                                  Computer Operating Systems . . . . . . . 3--40
         Thomas E. Anderson and   
          Michael D. Dahlin and   
            Jeanna M. Neefe and   
         David A. Patterson and   
            Drew S. Roselli and   
               Randolph Y. Wang   Serverless Network File Systems  . . . . 41--79
         Thomas C. Bressoud and   
              Fred B. Schneider   Hypervisor-Based Fault Tolerance . . . . 80--107
                John Wilkes and   
            Richard Golding and   
               Carl Staelin and   
                   Tim Sullivan   The HP AutoRAID Hierarchical Storage
                                  System . . . . . . . . . . . . . . . . . 108--136

ACM Transactions on Computer Systems
Volume 14, Number 2, May, 1996

         Andrew S. Grimshaw and   
            Jon B. Weissman and   
             W. Timothy Strayer   Portable Run-Time Support for Dynamic
                                  Object-Oriented Parallel Processing  . . 139--170
            Darren R. Hardy and   
            Michael F. Schwartz   Customized Information Extraction as a
                                  Basis for Resource Discovery . . . . . . 171--199
         Mirjana Spasojevic and   
              M. Satyanarayanan   An Empirical Study of a Wide-Area
                                  Distributed File System  . . . . . . . . 200--222

ACM Transactions on Computer Systems
Volume 14, Number 3, August, 1996

           Peter F. Corbett and   
              Dror G. Feitelson   The Vesta Parallel File System . . . . . 225--264
            Flaviu Cristian and   
                 Bob Dancey and   
                       Jon Dehn   Fault-tolerance in Air Traffic Control
                                  Systems  . . . . . . . . . . . . . . . . 265--286
         Murthy Devarakonda and   
                  Bill Kish and   
                  Ajay Mohindra   Recovery in the Calypso File System  . . 287--310

ACM Transactions on Computer Systems
Volume 14, Number 4, November, 1996

                    Pei Cao and   
           Edward W. Felten and   
             Anna R. Karlin and   
                         Kai Li   Implementation and Performance of
                                  Integrated Application-Controlled File
                                  Caching, Prefetching, and Disk
                                  Scheduling . . . . . . . . . . . . . . . 311--343
         Rafael H. Saavedra and   
                  Alan J. Smith   Analysis of Benchmark Characteristics
                                  and Benchmark Performance Prediction . . 344--384
                 Nir Shavit and   
                   Asaph Zemach   Diffracting Trees  . . . . . . . . . . . 385--428
                      Anonymous   Author Index . . . . . . . . . . . . . . 429--430


ACM Transactions on Computer Systems
Volume 15, Number 1, February, 1997

              Kenneth P. Birman   Editorial: Electronic Publication of
                                  TOCS . . . . . . . . . . . . . . . . . . 1--1
 Leonidas I. Kontothanassis and   
       Robert W. Wisniewski and   
               Michael L. Scott   Scheduler-Conscious Synchronization  . . 3--40
                     David Kotz   Disk-Directed I/O for MIMD
                                  Multiprocessors  . . . . . . . . . . . . 41--74
               Peter Steenkiste   A High-Speed Network Interface for
                                  Distributed-Memory Systems: Architecture
                                  and Applications . . . . . . . . . . . . 75--109

ACM Transactions on Computer Systems
Volume 15, Number 2, May, 1997

              David P. Anderson   Device Reservation in Audio/Video
                                  Editing Systems  . . . . . . . . . . . . 111--133
          James H. Anderson and   
        Srikanth Ramamurthy and   
                   Kevin Jeffay   Real-time Computing with Lock-Free
                                  Shared Objects . . . . . . . . . . . . . 134--165
              Ausif Mahmood and   
            Donald J. Lynch and   
               Roger B. Shaffer   Optimally Adaptive, Minimum-Distance,
                                  Circuit-Switched Routing in Hypercubes   166--193
           Birgit Pfitzmann and   
                Michael Waidner   Strong Loss Tolerance of Electronic Coin
                                  Systems  . . . . . . . . . . . . . . . . 194--213

ACM Transactions on Computer Systems
Volume 15, Number 3, August, 1997

           Jeffrey C. Mogul and   
             K. K. Ramakrishnan   Eliminating Receive Livelock in an
                                  Interrupt-Driven Kernel  . . . . . . . . 217--252
         Mor Harchol-Balter and   
                Allen B. Downey   Exploiting Process Lifetime
                                  Distributions for Dynamic Load Balancing 253--285
              Orran Krieger and   
                  Michael Stumm   HFS: a Performance-Oriented Flexible
                                  File System Based on Building-Block
                                  Compositions . . . . . . . . . . . . . . 286--321
                 Jack L. Lo and   
               Joel S. Emer and   
              Henry M. Levy and   
           Rebecca L. Stamm and   
                Dean M. Tullsen   Converting Thread-Level Parallelism to
                                  Instruction-Level Parallelism via
                                  Simultaneous Multithreading  . . . . . . 322--354

ACM Transactions on Computer Systems
Volume 15, Number 4, November, 1997

                  Henry M. Levy   Guest Editorial  . . . . . . . . . . . . 355--356
       Jennifer M. Anderson and   
              Lance M. Berc and   
               Jeffrey Dean and   
            Sanjay Ghemawat and   
        Monika R. Henzinger and   
          Shun-Tak A. Leung and   
           Richard L. Sites and   
        Mark T. Vandevoorde and   
        Carl A. Waldspurger and   
               William E. Weihl   Continuous Profiling: Where Have All the
                                  Cycles Gone? . . . . . . . . . . . . . . 357--390
              Stefan Savage and   
            Michael Burrows and   
                Greg Nelson and   
         Patrick Sobalvarro and   
                Thomas Anderson   Eraser: a Dynamic Data Race Detector for
                                  Multithreaded Programs . . . . . . . . . 391--411
            Edouard Bugnion and   
               Scott Devine and   
              Kinshuk Govil and   
               Mendel Rosenblum   Disco: Running Commodity Operating
                                  Systems on Scalable Multiprocessors  . . 412--447


ACM Transactions on Computer Systems
Volume 16, Number 1, February, 1998

               Henri E. Bal and   
            Raoul Bhoedjang and   
              Rutger Hofman and   
              Ceriel Jacobs and   
            Koen Langendoen and   
              Tim Rühl and   
              M. Frans Kaashoek   Performance Evaluation of the Orca
                                  Shared-Object System . . . . . . . . . . 1--40
                 M. D. Derk and   
                L. S. DeBrunner   Reconfiguration for Fault Tolerance
                                  Using Graph Grammars . . . . . . . . . . 41--54
                  Todd C. Mowry   Tolerating Latency in Multiprocessors
                                  through Compiler-Inserted Prefetching    55--92

ACM Transactions on Computer Systems
Volume 16, Number 2, May, 1998

              D. A. Agarwal and   
                L. E. Moser and   
        P. M. Melliar-Smith and   
                   R. K. Budhia   The Totem Multiple-Ring Ordering and
                                  Topology Maintenance Protocol  . . . . . 93--132
                 Leslie Lamport   The Part-Time Parliament . . . . . . . . 133--169
              Mark Horowitz and   
        Margaret Martonoisi and   
              Todd C. Mowry and   
               Michael D. Smith   Informing Memory Operations: Memory
                                  Performance Feedback Mechanisms and
                                  Their Applications . . . . . . . . . . . 170--205

ACM Transactions on Computer Systems
Volume 16, Number 3, August, 1998

       Albert D. Alexandrov and   
            Maximilian Ibel and   
          Klaus E. Schauser and   
              Chris J. Scheiman   Ufo: a Personal Global File System Based
                                  on User-Level Extensions to the
                                  Operating System . . . . . . . . . . . . 207--233
              Freddy Gabbay and   
                  Avi Mendelson   Using Value Prediction to Increase the
                                  Power of Speculative Execution Hardware  234--270
         Ben H. H. Juurlink and   
           Harry A. G. Wijshoff   A Quantitative Comparison of Parallel
                                  Computation Models . . . . . . . . . . . 271--318

ACM Transactions on Computer Systems
Volume 16, Number 4, November, 1998

             Nina T. Bhatti and   
          Matti A. Hiltunen and   
     Richard D. Schlichting and   
                     Wanda Chiu   Coyote: a system for constructing
                                  fine-grain configurable communication
                                  services . . . . . . . . . . . . . . . . 321--366
                 D. H. J. Epema   Decay-usage scheduling in
                                  multiprocessors  . . . . . . . . . . . . 367--415


ACM Transactions on Computer Systems
Volume 17, Number 1, February, 1999

              V. Srinivasan and   
                    G. Varghese   Fast address lookups using controlled
                                  prefix expansion . . . . . . . . . . . . 1--40

ACM Transactions on Computer Systems
Volume 17, Number 2, May, 1999

          Kenneth P. Birman and   
                Mark Hayden and   
              Oznur Ozkasap and   
                  Zhen Xiao and   
                Mihai Budiu and   
                   Yaron Minsky   Bimodal multicast  . . . . . . . . . . . 41--88
             Pedro C. Diniz and   
               Martin C. Rinard   Eliminating synchronization overhead in
                                  automatically parallelized programs
                                  using dynamic feedback . . . . . . . . . 89--132
             Michiel Ronsse and   
              Koen De Bosschere   RecPlay: a fully integrated practical
                                  record/replay system . . . . . . . . . . 133--152

ACM Transactions on Computer Systems
Volume 17, Number 3, August, 1999

            Laurent Amsaleg and   
        Michael J. Franklin and   
                 Olivier Gruber   Garbage collection for a client-server
                                  persistent object store  . . . . . . . . 153--201
        Mukund Raghavachari and   
                    Anne Rogers   Ace: a language for parallel programming
                                  with customizable protocols  . . . . . . 202--248

ACM Transactions on Computer Systems
Volume 17, Number 4, November, 1999

              Adiseshu Hari and   
            George Varghese and   
                  Guru Parulkar   An architecture for packet-striping
                                  protocols  . . . . . . . . . . . . . . . 249--287
        Kathryn S. McKinley and   
                  Olivier Temam   Quantifying loop nest locality using
                                  SPEC'95 and the Perfect benchmarks . . . 288--336
               Martin C. Rinard   Effective fine-grain synchronization for
                                  automatically parallelized programs
                                  using optimistic synchronization
                                  primitives . . . . . . . . . . . . . . . 337--371


ACM Transactions on Computer Systems
Volume 18, Number 1, February, 2000

               Peter J. Keleher   A high-level abstraction of shared
                                  accesses . . . . . . . . . . . . . . . . 1--36
               Vivek S. Pai and   
             Peter Druschel and   
               Willy Zwaenepoel   IO-Lite: a unified I/O buffering and
                                  caching system . . . . . . . . . . . . . 37--66
           Beverly Schwartz and   
           Alden W. Jackson and   
         W. Timothy Strayer and   
                 Wenyi Zhou and   
         R. Dennis Rockwell and   
               Craig Partbridge   Smart packets: applying active networks
                                  to network management  . . . . . . . . . 67--88

ACM Transactions on Computer Systems
Volume 18, Number 2, May, 2000

               David Brooks and   
             Margaret Martonosi   Value-based clock gating and operation
                                  packing: dynamic strategies for
                                  improving processor power and
                                  performance  . . . . . . . . . . . . . . 89--126
          Gregory R. Ganger and   
     Marshall Kirk McKusick and   
         Craig A. N. Soules and   
                   Yale N. Patt   Soft updates: a solution to the metadata
                                  update problem in file systems . . . . . 127--153
               Donald Yeung and   
           John Kubiatowicz and   
                  Anant Agarwal   Multigrain shared memory . . . . . . . . 154--196

ACM Transactions on Computer Systems
Volume 18, Number 3, 2000

                 Mohit Aron and   
                 Peter Druschel   Soft timers: efficient microsecond
                                  software timer support for network
                                  processing . . . . . . . . . . . . . . . 197--228
             Kingshuk Govil and   
               Dan Teodosiu and   
            Yongqiang Huang and   
               Mendel Rosenblum   Cellular disco: resource management
                                  using virtual clusters on shared-memory
                                  multiprocessors  . . . . . . . . . . . . 229--262
               Eddie Kohler and   
              Robert Morris and   
                Benjie Chen and   
              John Jannotti and   
              M. Frans Kaashoek   The click modular router . . . . . . . . 263--297
              Yasushi Saito and   
           Brian N. Bershad and   
                  Henry M. Levy   Manageability, availability, and
                                  performance in Porcupine: a highly
                                  scalable, cluster-based mail service . . 298--298

ACM Transactions on Computer Systems
Volume 18, Number 4, 2000

            Alex Gontmakher and   
                 Assaf Schuster   Java consistency: nonoperational
                                  characterizations for Java memory
                                  behavior . . . . . . . . . . . . . . . . 333--386
           Prasenjit Sarkar and   
                John H. Hartman   Hint-based cooperative caching . . . . . 387--419


ACM Transactions on Computer Systems
Volume 19, Number 1, 2001

              Angelos Bilas and   
             Dongming Jiang and   
            Jaswinder Pal Singh   Accelerating shared virtual memory via
                                  general-purpose network interface
                                  support  . . . . . . . . . . . . . . . . 1--35
               Robert Grimm and   
               Brian N. Bershad   Separating access control policy,
                                  enforcement, and functionality in
                                  extensible systems . . . . . . . . . . . 36--70
              Chi-Keung Luk and   
                  Todd C. Mowry   Architectural and compiler support for
                                  effective instruction prefetching: a
                                  cooperative approach . . . . . . . . . . 71--109

ACM Transactions on Computer Systems
Volume 19, Number 2, 2001

         Angela Demke Brown and   
              Todd C. Mowry and   
                  Orran Krieger   Compiler-based I/O prefetching for
                                  out-of-core applications . . . . . . . . 111--170
                Alan Fekete and   
                Nancy Lynch and   
                Alex Shvartsman   Specifying and using a partitionable
                                  group communication service  . . . . . . 171--216
              Dylan McNamee and   
           Jonathan Walpole and   
                  Calton Pu and   
              Crispin Cowan and   
             Charles Krasic and   
                Ashvin Goel and   
                Perry Wagle and   
             Charles Consel and   
              Gilles Muller and   
                 Renauld Marlet   Specialization tools and techniques for
                                  systematic optimization of system
                                  software . . . . . . . . . . . . . . . . 217--251
              Avi Mendelson and   
                  Freddy Gabbay   The effect of seance communication on
                                  multiprocessing systems  . . . . . . . . 252--281

ACM Transactions on Computer Systems
Volume 19, Number 3, 2001

    Andrea Carol Arpaci-Dusseau   Implicit coscheduling: coordinated
                                  scheduling with implicit information in
                                  distributed systems  . . . . . . . . . . 283--331
          Antonio Carzaniga and   
         David S. Rosenblum and   
              Alexander L. Wolf   Design and evaluation of a wide-area
                                  event notification service . . . . . . . 332--383
            N. F. Maxemchuk and   
                     D. H. Shur   An Internet multicast system for the
                                  stock market . . . . . . . . . . . . . . 384--412

ACM Transactions on Computer Systems
Volume 19, Number 4, November, 2001

         Jamison D. Collins and   
                Dean M. Tullsen   Runtime identification of cache conflict
                                  misses: The adaptive miss buffer . . . . 413--439
           Marcel Waldvogel and   
            George Varghese and   
                 Jon Turner and   
              Bernhard Plattner   Scalable high-speed prefix matching  . . 440--482
       Guillermo A. Alvarez and   
         Elizabeth Borowsky and   
                   Susie Go and   
          Theodore H. Romer and   
        Ralph Becker-Szendy and   
            Richard Golding and   
              Arif Merchant and   
         Mirjana Spasojevic and   
            Alistair Veitch and   
                    John Wilkes   Minerva: An automated resource
                                  provisioning tool for large-scale
                                  storage systems  . . . . . . . . . . . . 483--518


ACM Transactions on Computer Systems
Volume 20, Number 1, February, 2002

                   Kevin Fu and   
          M. Frans Kaashoek and   
               David Mazi\`eres   Fast and secure distributed read-only
                                  file system  . . . . . . . . . . . . . . 1--24
        Darrell C. Anderson and   
           Jeffrey S. Chase and   
                 Amin M. Vahdat   Interposed request routing for scalable
                                  network storage  . . . . . . . . . . . . 25--48
          Gregory R. Ganger and   
           Dawson R. Engler and   
          M. Frans Kaashoek and   
Héctor M. Briceño and   
               Russell Hunt and   
                Thomas Pinckney   Fast and flexible application-level
                                  networking on exokernel systems  . . . . 49--83

ACM Transactions on Computer Systems
Volume 20, Number 2, May, 2002

              M. Satyanarayanan   The evolution of Coda  . . . . . . . . . 85--124
               Mark Burgess and   
       Hårek Haugerud and   
         Sigmund Straumsnes and   
                   Trond Reitan   Measuring system normality . . . . . . . 125--160
                 Zhigang Hu and   
           Stefanos Kaxiras and   
             Margaret Martonosi   Let caches decay: reducing leakage
                                  energy via exploitation of cache
                                  generational behavior  . . . . . . . . . 161--190

ACM Transactions on Computer Systems
Volume 20, Number 3, August, 2002

                Idit Keidar and   
             Jeremy Sussman and   
             Keith Marzullo and   
                    Danny Dolev   Moshe: a group membership service for
                                  WANs . . . . . . . . . . . . . . . . . . 191--238
                 Haifeng Yu and   
                    Amin Vahdat   Design and evaluation of a conit-based
                                  continuous consistency model for
                                  replicated services  . . . . . . . . . . 239--282
            Steve Zdancewic and   
              Lantian Zheng and   
          Nathaniel Nystrom and   
                Andrew C. Myers   Secure program partitioning  . . . . . . 283--328

ACM Transactions on Computer Systems
Volume 20, Number 4, November, 2002

                Lidong Zhou and   
          Fred B. Schneider and   
            Robbert Van Renesse   COCA: a secure distributed online
                                  certification authority  . . . . . . . . 329--368
   Daniel A. Jiménez and   
                     Calvin Lin   Neural methods for dynamic branch
                                  prediction . . . . . . . . . . . . . . . 369--397
              Miguel Castro and   
                 Barbara Liskov   Practical Byzantine fault tolerance and
                                  proactive recovery . . . . . . . . . . . 398--461


ACM Transactions on Computer Systems
Volume 21, Number 1, February, 2003

              Y. Charlie Hu and   
                  Weimin Yu and   
                   Alan Cox and   
                Dan Wallach and   
               Willy Zwaenepoel   Run-time support for distributed sharing
                                  in safe languages  . . . . . . . . . . . 1--35
        Remzi H. Arpaci-Dusseau   Run-time adaptation in River . . . . . . 36--86
                 Jason Nieh and   
                S. Jae Yang and   
                    Naomi Novik   Measuring thin-client performance using
                                  slow-motion benchmarking . . . . . . . . 87--115

ACM Transactions on Computer Systems
Volume 21, Number 2, May, 2003

                 Jason Nieh and   
                  Monica S. Lam   A SMART scheduler for multimedia
                                  applications . . . . . . . . . . . . . . 117--163
        Robbert Van Renesse and   
          Kenneth P. Birman and   
                  Werner Vogels   Astrolabe: a robust and scalable
                                  technology for distributed system
                                  monitoring, management, and data mining  164--206
         Mor Harchol-Balter and   
           Bianca Schroeder and   
              Nikhil Bansal and   
                 Mukesh Agrawal   Size-based scheduling to improve Web
                                  performance  . . . . . . . . . . . . . . 207--233

ACM Transactions on Computer Systems
Volume 21, Number 3, August, 2003

          Carla Schlatter Ellis   Editorial  . . . . . . . . . . . . . . . 235--235
              Miguel Castro and   
          Rodrigo Rodrigues and   
                 Barbara Liskov   BASE: Using abstraction to improve fault
                                  tolerance  . . . . . . . . . . . . . . . 236--269
             Cristian Estan and   
                George Varghese   New directions in traffic measurement
                                  and accounting: Focusing on the
                                  elephants, ignoring the mice . . . . . . 270--313
             Steven Swanson and   
           Luke K. McDowell and   
           Michael M. Swift and   
            Susan J. Eggers and   
                  Henry M. Levy   An evaluation of speculative instruction
                                  execution on simultaneous multithreaded
                                  processors . . . . . . . . . . . . . . . 314--340

ACM Transactions on Computer Systems
Volume 21, Number 4, November, 2003

             P. Th. Eugster and   
               R. Guerraoui and   
         S. B. Handurukande and   
              P. Kouznetsov and   
                A.-M. Kermarrec   Lightweight probabilistic broadcast  . . 341--374
           Ilija Had\vzi\'c and   
              Jonathan M. Smith   Balancing performance and flexibility
                                  with hardware support for network
                                  architectures  . . . . . . . . . . . . . 375--411
           Murali Annavaram and   
           Jignesh M. Patel and   
             Edward S. Davidson   Call graph prefetching for database
                                  applications . . . . . . . . . . . . . . 412--444


ACM Transactions on Computer Systems
Volume 22, Number 1, February, 2004

               John Reumann and   
                   Kang G. Shin   Stateful distributed interposition . . . 1--48
            David Olshefski and   
                 Jason Nieh and   
                 Dakshi Agrawal   Using Certes to infer client response
                                  time at the Web server . . . . . . . . . 49--93
             Vikram S. Adve and   
                 Mary K. Vernon   Parallel program performance prediction
                                  using deterministic task graph analysis  94--136

ACM Transactions on Computer Systems
Volume 22, Number 2, May, 2004

                Jason Flinn and   
              M. Satyanarayanan   Managing battery lifetime with
                                  energy-aware adaptation  . . . . . . . . 137--179
               Raksit Ashok and   
             Saurabh Chheda and   
            Csaba Andras Moritz   Coupling compiler-enabled and
                                  conventional memory accessing for energy
                                  efficiency . . . . . . . . . . . . . . . 180--213
             Seungryul Choi and   
            Nicholas Kohout and   
              Sumit Pamnani and   
               Dongkeun Kim and   
                   Donald Yeung   A general framework for prefetch
                                  scheduling in linked data structures and
                                  its application to multi-chain
                                  prefetching  . . . . . . . . . . . . . . 214--280

ACM Transactions on Computer Systems
Volume 22, Number 3, August, 2004

              Kees Verstoep and   
      Raoul A. F. Bhoedjang and   
              Tim Rühl and   
               Henri E. Bal and   
            Rutger F. H. Hofman   Cluster communication protocols for
                                  parallel-programming systems . . . . . . 281--325
               Dongkeun Kim and   
                   Donald Yeung   A study of source-level compiler
                                  algorithms for automatic construction of
                                  pre-execution code . . . . . . . . . . . 326--379

ACM Transactions on Computer Systems
Volume 22, Number 4, November, 2004

                Yair Bartal and   
                Alain Mayer and   
               Kobbi Nissim and   
                   Avishai Wool   \em Firmato: a novel firewall management
                                  toolkit  . . . . . . . . . . . . . . . . 381--420
               Robert Grimm and   
                Janet Davis and   
                 Eric Lemar and   
               Adam Macbeth and   
             Steven Swanson and   
            Thomas Anderson and   
              Brian Bershad and   
          Gaetano Borriello and   
             Steven Gribble and   
                David Wetherall   System support for pervasive
                                  applications . . . . . . . . . . . . . . 421--486


ACM Transactions on Computer Systems
Volume 23, Number 1, February, 2005

          Carla Schlatter Ellis   Editorial  . . . . . . . . . . . . . . . 1--1
            Petros Maniatis and   
          Mema Roussopoulos and   
                T. J. Giuli and   
      David S. H. Rosenthal and   
                     Mary Baker   The LOCKSS peer-to-peer digital
                                  preservation system  . . . . . . . . . . 2--50
             Samuel T. King and   
                  Peter M. Chen   Backtracking intrusions  . . . . . . . . 51--76
           Michael M. Swift and   
           Brian N. Bershad and   
                  Henry M. Levy   Improving the reliability of commodity
                                  operating systems  . . . . . . . . . . . 77--110

ACM Transactions on Computer Systems
Volume 23, Number 2, May, 2005

             Ilya Gluhovsky and   
                 Brian O'Krafka   Comprehensive multiprocessor cache miss
                                  rate generation using multivariate
                                  models . . . . . . . . . . . . . . . . . 111--145
            Maurice Herlihy and   
           Victor Luchangco and   
                Paul Martin and   
                      Mark Moir   Nonblocking memory management support
                                  for dynamic-sized data structures  . . . 146--196
       Daniel A. Jiménez   Improved latency and accuracy for neural
                                  branch prediction  . . . . . . . . . . . 197--218

ACM Transactions on Computer Systems
Volume 23, Number 3, August, 2005

       Márk Jelasity and   
          Alberto Montresor and   
                 Ozalp Babaoglu   Gossip-based aggregation in large
                                  dynamic networks . . . . . . . . . . . . 219--252
         J. Gregory Steffan and   
        Christopher Colohan and   
               Antonia Zhai and   
                  Todd C. Mowry   The STAMPede approach to thread-level
                                  speculation  . . . . . . . . . . . . . . 253--300
    Leonidas Kontothanassis and   
               Robert Stets and   
                 Galen Hunt and   
        Umit Rencuzogullari and   
             Gautam Altekar and   
          Sandhya Dwarkadas and   
               Michael L. Scott   Shared memory computing on clusters with
                                  symmetric multiprocessors and system
                                  area networks  . . . . . . . . . . . . . 301--335

ACM Transactions on Computer Systems
Volume 23, Number 4, November, 2005

              Eric Anderson and   
               Susan Spence and   
            Ram Swaminathan and   
          Mahesh Kallahalla and   
                      Qian Wang   Quickly finding near-optimal storage
                                  designs  . . . . . . . . . . . . . . . . 337--374
Marta Patiño-Martinez and   
Ricardo Jiménez-Peris and   
              Bettina Kemme and   
                 Gustavo Alonso   MIDDLE-R: Consistent database
                                  replication at the middleware level  . . 375--423
             Windsor W. Hsu and   
             Alan Jay Smith and   
               Honesty C. Young   The automatic improvement of locality in
                                  storage systems  . . . . . . . . . . . . 424--473


ACM Transactions on Computer Systems
Volume 24, Number 1, February, 2006

       Angelos D. Keromytis and   
            Jason L. Wright and   
              Theo De Raadt and   
               Matthew Burnside   Cryptography as an operating system
                                  service: a case study  . . . . . . . . . 1--38
            Cristian Coarfa and   
             Peter Druschel and   
                 Dan S. Wallach   Performance analysis of TLS Web servers  39--69
                 Haifeng Yu and   
                    Amin Vahdat   The costs and limits of availability for
                                  replicated services  . . . . . . . . . . 70--113

ACM Transactions on Computer Systems
Volume 24, Number 2, May, 2006

                David Moore and   
            Colleen Shannon and   
           Douglas J. Brown and   
        Geoffrey M. Voelker and   
                  Stefan Savage   Inferring Internet denial-of-service
                                  activity . . . . . . . . . . . . . . . . 115--139
              Philip Holman and   
              James H. Anderson   Locking under Pfair scheduling . . . . . 140--174
              Albert M. Lai and   
                     Jason Nieh   On the performance of wide-area
                                  thin-client computing  . . . . . . . . . 175--209

ACM Transactions on Computer Systems
Volume 24, Number 3, August, 2006

        Manish Vachharajani and   
          Neil Vachharajani and   
             David A. Penry and   
             Jason A. Blome and   
               Sharad Malik and   
                David I. August   The Liberty Simulation Environment: a
                                  deliberate approach to high-level system
                                  modeling . . . . . . . . . . . . . . . . 211--249
            Kenneth C. Barr and   
               Krste Asanovi\'c   Energy-aware lossless data compression   250--291
              Wanghong Yuan and   
                Klara Nahrstedt   Energy-efficient CPU scheduling for
                                  multimedia applications  . . . . . . . . 292--331

ACM Transactions on Computer Systems
Volume 24, Number 4, November, 2006

           Michael M. Swift and   
    Muthukaruppan Annamalai and   
           Brian N. Bershad and   
                  Henry M. Levy   Recovering device drivers  . . . . . . . 333--360
      Edmund B. Nightingale and   
              Peter M. Chen and   
                    Jason Flinn   Speculative execution in a distributed
                                  file system  . . . . . . . . . . . . . . 361--392
               Junfeng Yang and   
                Paul Twohey and   
              Dawson Engler and   
             Madanlal Musuvathi   Using model checking to find serious
                                  file system errors . . . . . . . . . . . 393--423


ACM Transactions on Computer Systems
Volume 25, Number 1, February, 2007

                Lisa Higham and   
           Lillanne Jackson and   
                   Jalal Kawash   Specifying memory consistency of write
                                  buffer multiprocessors . . . . . . . . . 1:1--1:??
             Ilya Gluhovsky and   
             David Vengerov and   
                 Brian O'Krafka   Comprehensive multivariate extrapolation
                                  modeling of multiprocessor cache miss
                                  rates  . . . . . . . . . . . . . . . . . 2:1--2:??
              Michael Behar and   
              Avi Mendelson and   
                Avinoam Kolodny   Trace cache sampling filter  . . . . . . 3:1--3:??

ACM Transactions on Computer Systems
Volume 25, Number 2, May, 2007

             Steven Swanson and   
            Andrew Schwerin and   
            Martha Mercaldi and   
            Andrew Petersen and   
              Andrew Putnam and   
              Ken Michelson and   
                 Mark Oskin and   
                Susan J. Eggers   The WaveScalar architecture  . . . . . . 4:1--4:??
                Keir Fraser and   
                     Tim Harris   Concurrent programming without locks . . 5:1--5:??

ACM Transactions on Computer Systems
Volume 25, Number 3, August, 2007

           Jonathan Appavoo and   
             Dilma Da Silva and   
              Orran Krieger and   
             Marc Auslander and   
           Michal Ostrowski and   
            Bryan Rosenburg and   
             Amos Waterland and   
       Robert W. Wisniewski and   
               Jimi Xenidis and   
              Michael Stumm and   
                   Livio Soares   Experience distributing objects in an
                                  SMMP OS  . . . . . . . . . . . . . . . . 6:1--6:??
                   Feng Qin and   
               Joseph Tucek and   
              Yuanyuan Zhou and   
          Jagadeesan Sundaresan   Rx: Treating bugs as allergies---a safe
                                  method to survive software failures  . . 7:1--7:??
       Márk Jelasity and   
           Spyros Voulgaris and   
           Rachid Guerraoui and   
       Anne-Marie Kermarrec and   
              Maarten van Steen   Gossip-based peer sampling . . . . . . . 8:1--8:??

ACM Transactions on Computer Systems
Volume 25, Number 4, December, 2007

                  Ruibin Xu and   
        Daniel Mossé and   
                    Rami Melhem   Minimizing expected energy consumption
                                  in real-time systems through dynamic
                                  voltage scaling  . . . . . . . . . . . . 9:1--9:??
                Ibrahim Hur and   
                     Calvin Lin   Memory scheduling for modern
                                  microprocessors  . . . . . . . . . . . . 10:1--10:??
          Steve Vandebogart and   
      Petros Efstathopoulos and   
               Eddie Kohler and   
              Maxwell Krohn and   
                 Cliff Frey and   
              David Ziegler and   
             Frans Kaashoek and   
              Robert Morris and   
               David Mazi\`eres   Labels and event processes in the
                                  Asbestos operating system  . . . . . . . 11:1--11:??


ACM Transactions on Computer Systems
Volume 26, Number 1, February, 2008

              Geoff Coulson and   
               Gordon Blair and   
                 Paul Grace and   
     François Taiani and   
              Ackbar Joolia and   
                  Kevin Lee and   
                  Jo Ueyama and   
     Thirunavukkarasu Sivaharan   A generic component model for building
                                  systems software . . . . . . . . . . . . 1:1--1:??
     Christopher B. Colohan and   
        Anastassia Ailamaki and   
         J. Gregory Steffan and   
                  Todd C. Mowry   Incrementally parallelizing database
                                  transactions with thread-level
                                  speculation  . . . . . . . . . . . . . . 2:1--2:??
             Dejan Kosti\'c and   
            Alex C. Snoeren and   
                Amin Vahdat and   
                 Ryan Braud and   
            Charles Killian and   
          James W. Anderson and   
           Jeannie Albrecht and   
           Adolfo Rodriguez and   
                Erik Vandekieft   High-bandwidth data dissemination for
                                  large-scale distributed systems  . . . . 3:1--3:??

ACM Transactions on Computer Systems
Volume 26, Number 2, June, 2008

                  Fay Chang and   
               Jeffrey Dean and   
            Sanjay Ghemawat and   
            Wilson C. Hsieh and   
         Deborah A. Wallach and   
               Mike Burrows and   
             Tushar Chandra and   
               Andrew Fikes and   
               Robert E. Gruber   Bigtable: a distributed storage system
                                  for structured data  . . . . . . . . . . 4:1--4:??
             Ziv Bar-Yossef and   
               Roy Friedman and   
                  Gabriel Kliot   RaWMS --- Random Walk Based Lightweight
                                  Membership Service for Wireless Ad Hoc
                                  Networks . . . . . . . . . . . . . . . . 5:1--5:??

ACM Transactions on Computer Systems
Volume 26, Number 3, September, 2008

      Edmund B. Nightingale and   
      Kaushik Veeraraghavan and   
              Peter M. Chen and   
                    Jason Flinn   Rethink the sync . . . . . . . . . . . . 6:1--6:26
              Kunal Agrawal and   
       Charles E. Leiserson and   
                 Yuxiong He and   
                   Wen Jing Hsu   Adaptive work-stealing with parallelism
                                  feedback . . . . . . . . . . . . . . . . 7:1--7:32
                 Alan Shieh and   
            Andrew C. Myers and   
            Emin Gün Sirer   A stateless approach to
                                  connection-oriented protocols  . . . . . 8:1--8:50

ACM Transactions on Computer Systems
Volume 26, Number 4, December, 2008

               Manuel Costa and   
              Jon Crowcroft and   
              Miguel Castro and   
            Antony Rowstron and   
                Lidong Zhou and   
               Lintao Zhang and   
                    Paul Barham   Vigilante: End-to-end containment of
                                  Internet worm epidemics  . . . . . . . . 9:1--9:??
                    Yi Qiao and   
Fabián E. Bustamante and   
             Peter A. Dinda and   
              Stefan Birrer and   
                        Dong Lu   Improving peer-to-peer performance
                                  through server-side scheduling . . . . . 10:1--10:??


ACM Transactions on Computer Systems
Volume 27, Number 1, February, 2009

             Seungryul Choi and   
                   Donald Yeung   Hill-climbing SMT processor resource
                                  distribution . . . . . . . . . . . . . . 1:1--1:??
                 N. Ntarmos and   
           P. Triantafillou and   
                      G. Weikum   Distributed hash sketches: Scalable,
                                  efficient, and accurate cardinality
                                  estimation for distributed multisets . . 2:1--2:??

ACM Transactions on Computer Systems
Volume 27, Number 2, May, 2009

              Stijn Eyerman and   
            Lieven Eeckhout and   
            Tejas Karkhanis and   
                 James E. Smith   A mechanistic performance model for
                                  superscalar out-of-order processors  . . 3:1--3:??
         Dmitrii Zagorodnov and   
             Keith Marzullo and   
             Lorenzo Alvisi and   
             Thomas C. Bressoud   Practical and low-overhead masking of
                                  failures of TCP-based servers  . . . . . 4:1--4:??

ACM Transactions on Computer Systems
Volume 27, Number 3, November, 2009

         Marcos K. Aguilera and   
              Arif Merchant and   
                 Mehul Shah and   
            Alistair Veitch and   
           Christos Karamanolis   Sinfonia: a new paradigm for building
                                  scalable distributed systems . . . . . . 5:1--5:48
         Ludmila Cherkasova and   
              Kivanc Ozonat and   
                Ningfang Mi and   
               Julie Symons and   
                 Evgenia Smirni   Automated anomaly detection and
                                  performance modeling of enterprise
                                  applications . . . . . . . . . . . . . . 6:1--6:32

ACM Transactions on Computer Systems
Volume 27, Number 4, December, 2009

          Ramakrishna Kotla and   
             Lorenzo Alvisi and   
                Mike Dahlin and   
              Allen Clement and   
                    Edmund Wong   Zyzzyva: Speculative Byzantine fault
                                  tolerance  . . . . . . . . . . . . . . . 7:1--7:39
                Xavier Vera and   
               Jaume Abella and   
           Javier Carretero and   
        Antonio González   Selective replication: a lightweight
                                  technique for soft errors  . . . . . . . 8:1--8:30


ACM Transactions on Computer Systems
Volume 28, Number 1, March, 2010

                  Peter M. Chen   Editorial  . . . . . . . . . . . . . . . 1:1--1:??
            Maysam Yabandeh and   
        Nikola Kne\vzevi\'c and   
             Dejan Kosti\'c and   
                  Viktor Kuncak   Predicting and preventing
                                  inconsistencies in deployed distributed
                                  systems  . . . . . . . . . . . . . . . . 2:1--2:??
            Michael Walfish and   
           Mythili Vutukuru and   
          Hari Balakrishnan and   
               David Karger and   
                  Scott Shenker   DDoS defense by offense  . . . . . . . . 3:1--3:??

ACM Transactions on Computer Systems
Volume 28, Number 2, July, 2010

                 Tom Roeder and   
              Fred B. Schneider   Proactive obfuscation  . . . . . . . . . 4:1--4:??
           Rachid Guerraoui and   
                Ron R. Levy and   
             Bastian Pochon and   
            Vivien Quéma   Throughput optimal total order broadcast
                                  for cluster environments . . . . . . . . 5:1--5:??

ACM Transactions on Computer Systems
Volume 28, Number 3, September, 2010

                  Yair Amir and   
            Claudiu Danilov and   
Raluca Musuãloiu-Elefteri and   
                    Nilo Rivera   The SMesh wireless mesh network  . . . . 6:1--6:??
               Roy Friedman and   
              Gabriel Kliot and   
                      Chen Avin   Probabilistic quorum systems in wireless
                                  Ad Hoc networks  . . . . . . . . . . . . 7:1--7:??

ACM Transactions on Computer Systems
Volume 28, Number 4, December, 2010

          Sergey Blagodurov and   
           Sergey Zhuravlev and   
             Alexandra Fedorova   Contention-Aware Scheduling on Multicore
                                  Systems  . . . . . . . . . . . . . . . . 8:1--8:??
     Alex King Yeung Cheung and   
             Hans-Arno Jacobsen   Load Balancing Content-Based
                                  Publish/Subscribe Systems  . . . . . . . 9:1--9:??


ACM Transactions on Computer Systems
Volume 29, Number 1, February, 2011

              Changhoon Kim and   
             Matthew Caesar and   
               Jennifer Rexford   SEATTLE: a Scalable Ethernet
                                  Architecture for Large Enterprises . . . 1:1--1:35
H. Andrés Lagar-Cavilla and   
          Joseph A. Whitney and   
                 Roy Bryant and   
             Philip Patchin and   
             Michael Brudno and   
               Eyal de Lara and   
          Stephen M. Rumble and   
          M. Satyanarayanan and   
                  Adin Scannell   SnowFlock: Virtual Machine Cloning as a
                                  First-Class Cloud Primitive  . . . . . . 2:1--2:45
              David Meisner and   
              Brian T. Gold and   
              Thomas F. Wenisch   The PowerNap Server Architecture . . . . 3:1--3:24

ACM Transactions on Computer Systems
Volume 29, Number 2, May, 2011

              Diwaker Gupta and   
 Kashi Venkatesh Vishwanath and   
              Marvin McNett and   
                Amin Vahdat and   
                  Ken Yocum and   
               Alex Snoeren and   
            Geoffrey M. Voelker   DieCast: Testing Distributed Systems
                                  with an Accurate Scale Model . . . . . . 4:1--4:??
                Gala Yadgar and   
             Michael Factor and   
                     Kai Li and   
                 Assaf Schuster   Management of Multilevel, Multiclient
                                  Cache Hierarchies with Application Hints 5:1--5:??
           Willem de Bruijn and   
                Herbert Bos and   
                      Henri Bal   Application-Tailored I/O with Streamline 6:1--6:??

ACM Transactions on Computer Systems
Volume 29, Number 3, August, 2011

               Brahim Ayari and   
          Abdelmajid Khelil and   
                    Neeraj Suri   On the design of perturbation-resilient
                                  atomic commit protocols for mobile
                                  transactions . . . . . . . . . . . . . . 7:1--7:??
             Tomas Kalibera and   
                Filip Pizlo and   
          Antony L. Hosking and   
                      Jan Vitek   Scheduling real-time garbage collection
                                  on uniprocessors . . . . . . . . . . . . 8:1--8:??
         Vijay Janapa Reddi and   
            Benjamin C. Lee and   
           Trishul Chilimbi and   
                  Kushagra Vaid   Mobile processors for energy-efficient
                                  web search . . . . . . . . . . . . . . . 9:1--9:??

ACM Transactions on Computer Systems
Volume 29, Number 4, December, 2011

          Mudhakar Srivatsa and   
                   Ling Liu and   
                   Arun Iyengar   EventGuard: a System Architecture for
                                  Securing Publish--Subscribe Networks . . 10:1--10:??
          Paul D. Marinescu and   
                  George Candea   Efficient Testing of Recovery Code Using
                                  Fault Injection  . . . . . . . . . . . . 11:1--11:??
             Prince Mahajan and   
              Srinath Setty and   
                Sangmin Lee and   
              Allen Clement and   
             Lorenzo Alvisi and   
                Mike Dahlin and   
                Michael Walfish   Depot: Cloud Storage with Minimal Trust  12:1--12:??


ACM Transactions on Computer Systems
Volume 30, Number 1, February, 2012

                  Todd C. Mowry   Introduction to Special Issue APLOS 2011 1:1--1:??
           Vitaly Chipounov and   
        Volodymyr Kuznetsov and   
                  George Candea   The S2E Platform: Design,
                                  Implementation, and Applications . . . . 2:1--2:??
      Kaushik Veeraraghavan and   
               Dongyoon Lee and   
            Benjamin Wester and   
             Jessica Ouyang and   
              Peter M. Chen and   
                Jason Flinn and   
            Satish Narayanasamy   DoublePlay: Parallelizing Sequential
                                  Logging and Replay . . . . . . . . . . . 3:1--3:??
                  Ding Yuan and   
                 Jing Zheng and   
                Soyeon Park and   
              Yuanyuan Zhou and   
                  Stefan Savage   Improving Software Diagnosability via
                                  Log Enhancement  . . . . . . . . . . . . 4:1--4:??
      Adrian Schüpbach and   
             Andrew Baumann and   
             Timothy Roscoe and   
                    Simon Peter   A Declarative Language Approach to
                                  Device Configuration . . . . . . . . . . 5:1--5:??

ACM Transactions on Computer Systems
Volume 30, Number 2, April, 2012

           Juan Carlos Saez and   
         Alexandra Fedorova and   
              David Koufaty and   
                  Manuel Prieto   Leveraging Core Specialization via OS
                                  Scheduling to Improve Performance on
                                  Asymmetric Multicore Systems . . . . . . 6:1--6:??
             Eiman Ebrahimi and   
              Chang Joo Lee and   
                 Onur Mutlu and   
                   Yale N. Patt   Fairness via Source Throttling: a
                                  Configurable and High-Performance
                                  Fairness Substrate for Multicore Memory
                                  Systems  . . . . . . . . . . . . . . . . 7:1--7:??
               Mark Gebhart and   
          Daniel R. Johnson and   
               David Tarjan and   
         Stephen W. Keckler and   
           William J. Dally and   
              Erik Lindholm and   
                  Kevin Skadron   A Hierarchical Thread Scheduler and
                                  Register File for Energy-Efficient
                                  Throughput Processors  . . . . . . . . . 8:1--8:??

ACM Transactions on Computer Systems
Volume 30, Number 3, August, 2012

           Christoffer Dall and   
              Jeremy Andrus and   
        Alexander Van't Hof and   
                Oren Laadan and   
                     Jason Nieh   The Design, Implementation, and
                                  Evaluation of Cells: a Virtual
                                  Smartphone Architecture  . . . . . . . . 9:1--9:??
               Tyler Harter and   
               Chris Dragga and   
             Michael Vaughn and   
   Andrea C. Arpaci-Dusseau and   
        Remzi H. Arpaci-Dusseau   A File Is Not a File: Understanding the
                                  I/O Behavior of Apple Desktop
                                  Applications . . . . . . . . . . . . . . 10:1--10:??
          Hadi Esmaeilzadeh and   
                 Emily Blem and   
     Renée St. Amant and   
  Karthikeyan Sankaralingam and   
                    Doug Burger   Power Limitations and Dark Silicon
                                  Challenge the Future of Multicore  . . . 11:1--11:??

ACM Transactions on Computer Systems
Volume 30, Number 4, November, 2012

            Edouard Bugnion and   
               Scott Devine and   
           Mendel Rosenblum and   
            Jeremy Sugerman and   
                 Edward Y. Wang   Bringing Virtualization to the x86
                                  Architecture with the Original VMware
                                  Workstation  . . . . . . . . . . . . . . 12:1--12:51
    Úlfar Erlingsson and   
             Marcus Peinado and   
                Simon Peter and   
                Mihai Budiu and   
             Gloria Mainar-Ruiz   Fay: Extensible Distributed Tracing from
                                  Kernels to Clusters  . . . . . . . . . . 13:1--13:??
              Anshul Gandhi and   
         Mor Harchol-Balter and   
            Ram Raghunathan and   
              Michael A. Kozuch   AutoScale: Dynamic, Robust Capacity
                                  Management for Multi-Tier Data Centers   14:1--14:??
            Michael Ferdman and   
             Almutaz Adileh and   
             Onur Kocberber and   
              Stavros Volos and   
         Mohammad Alisafaee and   
            Djordje Jevdjic and   
               Cansu Kaynak and   
      Adrian Daniel Popescu and   
         Anastasia Ailamaki and   
                  Babak Falsafi   Quantifying the Mismatch between
                                  Emerging Scale-Out Applications and
                                  Modern Processors  . . . . . . . . . . . 15:1--15:??


ACM Transactions on Computer Systems
Volume 31, Number 1, February, 2013

                 Meng-Ju Wu and   
                   Donald Yeung   Efficient Reuse Distance Analysis of
                                  Multicore Scaling for Loop-Based
                                  Parallel Programs  . . . . . . . . . . . 1:1--1:??
            Sriram Govindan and   
                    Di Wang and   
      Anand Sivasubramaniam and   
               Bhuvan Urgaonkar   Aggressive Datacenter Power Provisioning
                                  with Batteries . . . . . . . . . . . . . 2:1--2:??
        Alexander Rasmussen and   
              George Porter and   
             Michael Conley and   
       Harsha V. Madhyastha and   
    Radhika Niranjan Mysore and   
           Alexander Pucher and   
                    Amin Vahdat   TritonSort: a Balanced and
                                  Energy-Efficient Large-Scale Sorting
                                  System . . . . . . . . . . . . . . . . . 3:1--3:??

ACM Transactions on Computer Systems
Volume 31, Number 2, May, 2013

              K. R. Jayaram and   
            Patrick Eugster and   
             Chamikara Jayalath   Parametric Content-Based
                                  Publish/Subscribe  . . . . . . . . . . . 4:1--4:??
           Stephen Smaldone and   
           Benjamin Gilbert and   
                 Jan Harkes and   
               Liviu Iftode and   
         Mahadev Satyanarayanan   Optimizing Storage Performance for
                                  VM-Based Mobile Computing  . . . . . . . 5:1--5:??

ACM Transactions on Computer Systems
Volume 31, Number 3, August, 2013

                 Yunsup Lee and   
            Rimas Avizienis and   
               Alex Bishara and   
                Richard Xia and   
             Derek Lockhart and   
         Christopher Batten and   
               Krste Asanovi\'c   Exploring the Tradeoffs between
                                  Programmability and Efficiency in
                                  Data-Parallel Accelerators . . . . . . . 6:1--6:??
               Sahan Gamage and   
        Ramana Rao Kompella and   
                 Dongyan Xu and   
              Ardalan Kangarlou   Protocol Responsibility Offloading to
                                  Improve TCP Throughput in Virtualized
                                  Environments . . . . . . . . . . . . . . 7:1--7:??
           James C. Corbett and   
               Jeffrey Dean and   
            Michael Epstein and   
               Andrew Fikes and   
          Christopher Frost and   
               J. J. Furman and   
            Sanjay Ghemawat and   
             Andrey Gubarev and   
         Christopher Heiser and   
           Peter Hochschild and   
               Wilson Hsieh and   
          Sebastian Kanthak and   
               Eugene Kogan and   
                  Hongyi Li and   
            Alexander Lloyd and   
              Sergey Melnik and   
               David Mwaura and   
                David Nagle and   
               Sean Quinlan and   
                 Rajesh Rao and   
              Lindsay Rolig and   
              Yasushi Saito and   
           Michal Szymaniak and   
         Christopher Taylor and   
                  Ruth Wang and   
                  Dale Woodford   Spanner: Google's Globally Distributed
                                  Database . . . . . . . . . . . . . . . . 8:1--8:??

ACM Transactions on Computer Systems
Volume 31, Number 4, December, 2013

                  Todd C. Mowry   Editorial  . . . . . . . . . . . . . . . 9:1--9:??
        Mahesh Balakrishnan and   
              Dahlia Malkhi and   
              John D. Davis and   
        Vijayan Prabhakaran and   
                Michael Wei and   
                     Ted Wobber   CORFU: a distributed shared log  . . . . 10:1--10:??
        Mahdi Nazm Bojnordi and   
                     Engin Ipek   A programmable memory controller for the
                                  DDRx interfacing standards . . . . . . . 11:1--11:??
       Christina Delimitrou and   
             Christos Kozyrakis   QoS-Aware scheduling in heterogeneous
                                  datacenters with Paragon . . . . . . . . 12:1--12:??


ACM Transactions on Computer Systems
Volume 32, Number 1, February, 2014

           Mark Silberstein and   
                 Bryan Ford and   
                Idit Keidar and   
                 Emmett Witchel   GPUfs: Integrating a file system with
                                  GPUs . . . . . . . . . . . . . . . . . . 1:1--1:??
               Gerwin Klein and   
             June Andronick and   
          Kevin Elphinstone and   
                Toby Murray and   
              Thomas Sewell and   
             Rafal Kolanski and   
                  Gernot Heiser   Comprehensive formal verification of an
                                  OS microkernel . . . . . . . . . . . . . 2:1--2:??
          Marisabel Guevara and   
             Benjamin Lubin and   
                Benjamin C. Lee   Market mechanisms for managing
                                  datacenters with heterogeneous
                                  microarchitectures . . . . . . . . . . . 3:1--3:??

ACM Transactions on Computer Systems
Volume 32, Number 2, June, 2014

              Nicolas Palix and   
                Gael Thomas and   
                 Suman Saha and   
        Christophe Calv\`es and   
              Gilles Muller and   
                   Julia Lawall   Faults in Linux 2.6  . . . . . . . . . . 4:1--4:??
               William Enck and   
              Peter Gilbert and   
              Seungyeop Han and   
           Vasant Tendulkar and   
             Byung-Gon Chun and   
              Landon P. Cox and   
               Jaeyeon Jung and   
           Patrick McDaniel and   
                 Anmol N. Sheth   TaintDroid: an Information-Flow Tracking
                                  System for Realtime Privacy Monitoring
                                  on Smartphones . . . . . . . . . . . . . 5:1--5:??
               Young Jin Yu and   
               Dong In Shin and   
                 Woong Shin and   
             Nae Young Song and   
               Jae Woo Choi and   
            Hyeong Seog Kim and   
              Hyeonsang Eom and   
                Heon Young Yeom   Optimizing the Block I/O Subsystem for
                                  Fast Storage Devices . . . . . . . . . . 6:1--6:??

ACM Transactions on Computer Systems
Volume 32, Number 3, September, 2014

             Mehrzad Samadi and   
              Janghaeng Lee and   
        D. Anoushe Jamshidi and   
               Scott Mahlke and   
                   Amir Hormati   Scaling Performance via Self-Tuning
                                  Approximation for Graphics Engines . . . 7:1--7:??
                    Lisa Wu and   
       Orestis Polychroniou and   
          Raymond J. Barker and   
              Martha A. Kim and   
                Kenneth A. Ross   Energy Analysis of Hardware and Software
                                  Range Partitioning . . . . . . . . . . . 8:1--8:??
             Adrian Sampson and   
               Jacob Nelson and   
              Karin Strauss and   
                      Luis Ceze   Approximate Storage in Solid-State
                                  Memories . . . . . . . . . . . . . . . . 9:1--9:??

ACM Transactions on Computer Systems
Volume 32, Number 4, January, 2015

         Austin T. Clements and   
          M. Frans Kaashoek and   
         Nickolai Zeldovich and   
           Robert T. Morris and   
                   Eddie Kohler   The Scalable Commutativity Rule:
                                  Designing Scalable Software for
                                  Multicore Processors . . . . . . . . . . 10:1--10:??
           Arun Arvind Nair and   
              Stijn Eyerman and   
                  Jian Chen and   
           Lizy Kurian John and   
                Lieven Eeckhout   Mechanistic Modeling of Architectural
                                  Vulnerability Factor . . . . . . . . . . 11:1--11:??
        Pierre-Louis Aublin and   
           Rachid Guerraoui and   
          Nikola Knezevi\'c and   
        Vivien Quéma and   
                Marko Vukoli\'c   The Next 700 BFT Protocols . . . . . . . 12:1--12:??


ACM Transactions on Computer Systems
Volume 33, Number 1, March, 2015

                    Xi Wang and   
         Nickolai Zeldovich and   
          M. Frans Kaashoek and   
           Armando Solar-Lezama   A Differential Approach to Undefined
                                  Behavior Detection . . . . . . . . . . . 1:1--1:??
                Nilton Bila and   
             Eric J. Wright and   
               Eyal De Lara and   
             Kaustubh Joshi and   
H. Andrés Lagar-Cavilla and   
              Eunbyung Park and   
                Ashvin Goel and   
             Matti Hiltunen and   
         Mahadev Satyanarayanan   Energy-Oriented Partial Desktop Virtual
                                  Machine Migration  . . . . . . . . . . . 2:1--2:??
                 Emily Blem and   
          Jaikrishnan Menon and   
Thiruvengadam Vijayaraghavan and   
      Karthikeyan Sankaralingam   ISA Wars: Understanding the Relevance of
                                  ISA being RISC or CISC to Performance,
                                  Power, and Energy on Modern
                                  Architectures  . . . . . . . . . . . . . 3:1--3:??

ACM Transactions on Computer Systems
Volume 33, Number 2, June, 2015

          Felix Xiaozhu Lin and   
                  Zhen Wang and   
                      Lin Zhong   K2: a Mobile Operating System for
                                  Heterogeneous Coherence Domains  . . . . 4:1--4:??
   Håvard D. Johansen and   
        Robbert Van Renesse and   
             Ymir Vigfusson and   
                   Dag Johansen   Fireflies: a Secure and Scalable
                                  Membership and Gossip Service  . . . . . 5:1--5:??
               Tianshi Chen and   
               Shijin Zhang and   
                 Shaoli Liu and   
                  Zidong Du and   
                    Tao Luo and   
                   Yuan Gao and   
                 Junjie Liu and   
             Dongsheng Wang and   
               Chengyong Wu and   
                Ninghui Sun and   
                 Yunji Chen and   
                  Olivier Temam   A Small-Footprint Accelerator for
                                  Large-Scale Neural Networks  . . . . . . 6:1--6:??

ACM Transactions on Computer Systems
Volume 33, Number 3, September, 2015

            John Ousterhout and   
              Arjun Gopalan and   
               Ashish Gupta and   
            Ankita Kejriwal and   
                 Collin Lee and   
           Behnam Montazeri and   
               Diego Ongaro and   
               Seo Jin Park and   
                  Henry Qin and   
           Mendel Rosenblum and   
             Stephen Rumble and   
              Ryan Stutsman and   
                   Stephen Yang   The RAMCloud Storage System  . . . . . . 7:1--7:??
             Andrew Baumann and   
             Marcus Peinado and   
                     Galen Hunt   Shielding Applications from an Untrusted
                                  Cloud with Haven . . . . . . . . . . . . 8:1--8:??
              Janghaeng Lee and   
             Mehrzad Samadi and   
               Yongjun Park and   
                   Scott Mahlke   SKMD: Single Kernel on Multiple Devices
                                  for Transparent CPU--GPU Collaboration   9:1--9:??
           Michael Pellauer and   
         Angshuman Parashar and   
              Michael Adler and   
               Bushra Ahsan and   
               Randy Allmon and   
                 Neal Crago and   
             Kermin Fleming and   
              Mohit Gambhir and   
               Aamer Jaleel and   
             Tushar Krishna and   
              Daniel Lustig and   
             Stephen Maresh and   
            Vladimir Pavlov and   
              Rachid Rayess and   
               Antonia Zhai and   
                      Joel Emer   Efficient Control and Communication
                                  Paradigms for Coarse-Grained Spatial
                                  Architectures  . . . . . . . . . . . . . 10:1--10:??

ACM Transactions on Computer Systems
Volume 33, Number 4, January, 2016

                Simon Peter and   
                  Jialin Li and   
                Irene Zhang and   
            Dan R. K. Ports and   
                  Doug Woos and   
       Arvind Krishnamurthy and   
            Thomas Anderson and   
                 Timothy Roscoe   Arrakis: The Operating System Is the
                                  Control Plane  . . . . . . . . . . . . . 11:1--11:??
               Rakesh Kumar and   
  Alejandro Martínez and   
        Antonio González   Assisting Static Compiler Vectorization
                                  with a Speculative Dynamic Vectorizer in
                                  an HW/SW Codesigned Environment  . . . . 12:1--12:??
           Jean-Pierre Lozi and   
              Florian David and   
           Gaël Thomas and   
               Julia Lawall and   
                  Gilles Muller   Fast and Portable Locking for Multicore
                                  Architectures  . . . . . . . . . . . . . 13:1--13:??


ACM Transactions on Computer Systems
Volume 34, Number 1, April, 2016

              Gernot Heiser and   
              Kevin Elphinstone   L4 Microkernels: The Lessons from 20
                                  Years of Research and Deployment . . . . 1:1--1:29
            Johann Hauswald and   
      Michael A. Laurenzano and   
                Yunqi Zhang and   
               Hailong Yang and   
                Yiping Kang and   
                   Cheng Li and   
            Austin Rovinski and   
              Arjun Khurana and   
       Ronald G. Dreslinski and   
               Trevor Mudge and   
          Vinicius Petrucci and   
               Lingjia Tang and   
                     Jason Mars   Designing Future Warehouse-Scale
                                  Computers for Sirius, an End-to-End
                                  Voice and Vision Personal Assistant  . . 2:1--2:??
             Michael Badamo and   
              Jeff Casarona and   
                Minshu Zhao and   
                   Donald Yeung   Identifying Power-Efficient Multicore
                                  Cache Hierarchies via Reuse Distance
                                  Analysis . . . . . . . . . . . . . . . . 3:1--3:??

ACM Transactions on Computer Systems
Volume 34, Number 2, May, 2016

              Arthur Perais and   
            André Seznec   EOLE: Combining Static and Dynamic
                                  Scheduling Through Value Prediction to
                                  Reduce Complexity and Increase
                                  Performance  . . . . . . . . . . . . . . 4:1--4:??
                   Sheng Li and   
              Hyeontaek Lim and   
              Victor W. Lee and   
                Jung Ho Ahn and   
                 Anuj Kalia and   
           Michael Kaminsky and   
          David G. Andersen and   
                 Seongil O. and   
                 Sukhan Lee and   
                  Pradeep Dubey   Full-Stack Architecting to Achieve a
                                  Billion-Requests-Per-Second Throughput
                                  on a Single Key--Value Store Server
                                  Platform . . . . . . . . . . . . . . . . 5:1--5:??
                   David Lo and   
                Liqun Cheng and   
           Rama Govindaraju and   
  Parthasarathy Ranganathan and   
             Christos Kozyrakis   Improving Resource Efficiency at Scale
                                  with Heracles  . . . . . . . . . . . . . 6:1--6:??

ACM Transactions on Computer Systems
Volume 34, Number 3, September, 2016

               Sang-Woo Jun and   
                   Ming Liu and   
                Sungjin Lee and   
                Jamey Hicks and   
               John Ankcorn and   
                 Myron King and   
                 Shuotao Xu and   
                         Arvind   BlueDBM: Distributed Flash Storage for
                                  Big Data Analytics . . . . . . . . . . . 7:1--7:??
               Richard West and   
                      Ye Li and   
              Eric Missimer and   
                 Matthew Danish   A Virtualized Separation Kernel for
                                  Mixed-Criticality Systems  . . . . . . . 8:1--8:??
           Mark Silberstein and   
                Sangman Kim and   
                Seonggu Huh and   
                Xinya Zhang and   
                    Yige Hu and   
                 Amir Wated and   
                 Emmett Witchel   GPUnet: Networking Abstractions for GPU
                                  Programs . . . . . . . . . . . . . . . . 9:1--9:??

ACM Transactions on Computer Systems
Volume 34, Number 4, January, 2017

                  Mai Zheng and   
               Joseph Tucek and   
                   Feng Qin and   
           Mark Lillibridge and   
               Bill W. Zhao and   
              Elizabeth S. Yang   Reliability Analysis of SSDs Under Power
                                  Fault  . . . . . . . . . . . . . . . . . 10:1--10:??
                 Adam Belay and   
              George Prekas and   
               Mia Primorac and   
               Ana Klimovic and   
            Samuel Grossman and   
         Christos Kozyrakis and   
                Edouard Bugnion   The IX Operating System: Combining Low
                                  Latency, High Throughput, and Efficiency
                                  in a Protected Dataplane . . . . . . . . 11:1--11:??
         Seyed Majid Zahedi and   
               Songchun Fan and   
                Matthew Faw and   
                Elijah Cole and   
                Benjamin C. Lee   Computational Sprinting: Architecture,
                                  Dynamics, and Strategies . . . . . . . . 12:1--12:??


ACM Transactions on Computer Systems
Volume 35, Number 1, July, 2017

                  Yuhao Zhu and   
             Vijay Janapa Reddi   Optimizing General-Purpose CPUs for
                                  Energy-Efficient Mobile Web Computing    1:1--1:??
             Chang-Hong Hsu and   
                Yunqi Zhang and   
      Michael A. Laurenzano and   
              David Meisner and   
             Thomas Wenisch and   
       Ronald G. Dreslinski and   
                 Jason Mars and   
                   Lingjia Tang   Reining in Long Tails in Warehouse-Scale
                                  Computers with Quick Voltage Boosting
                                  Using Adrenaline . . . . . . . . . . . . 2:1--2:??
                 Haibo Chen and   
                  Rong Chen and   
                 Xingda Wei and   
                 Jiaxin Shi and   
                Yanzhe Chen and   
               Zhaoguo Wang and   
                 Binyu Zang and   
                   Haibing Guan   Fast In-Memory Transaction Processing
                                  Using RDMA and HTM . . . . . . . . . . . 3:1--3:??

ACM Transactions on Computer Systems
Volume 35, Number 2, October, 2017

                Minshu Zhao and   
                   Donald Yeung   Using Multicore Reuse Distance to Study
                                  Coherence Directories  . . . . . . . . . 4:1--4:??
             Byung-Gon Chun and   
               Tyson Condie and   
                Yingda Chen and   
                  Brian Cho and   
               Andrew Chung and   
               Carlo Curino and   
              Chris Douglas and   
          Matteo Interlandi and   
              Beomyeol Jeon and   
            Joo Seong Jeong and   
                 Gyewon Lee and   
               Yunseong Lee and   
              Tony Majestro and   
              Dahlia Malkhi and   
          Sergiy Matusevych and   
              Brandon Myers and   
          Mariia Mykhailova and   
     Shravan Narayanamurthy and   
                Joseph Noor and   
         Raghu Ramakrishnan and   
                 Sriram Rao and   
              Russell Sears and   
              Beysim Sezgin and   
                 Taegeon Um and   
                 Julia Wang and   
              Markus Weimer and   
                 Youngseok Yang   Apache REEF: Retainable Evaluator
                                  Execution Framework  . . . . . . . . . . 5:1--5:??
               Zhiming Shen and   
                    Qin Jia and   
              Gur-Eyal Sela and   
                Weijia Song and   
         Hakim Weatherspoon and   
            Robbert Van Renesse   Supercloud: a Library Cloud for
                                  Exploiting Cloud Diversity . . . . . . . 6:1--6:??

ACM Transactions on Computer Systems
Volume 35, Number 3, December, 2017

               Nuno Diegues and   
               Paolo Romano and   
                Stoyan Garbatov   Seer: Probabilistic Scheduling for
                                  Hardware Transactional Memory  . . . . . 7:1--7:41
             Rajiv Nishtala and   
             Paul Carpenter and   
          Vinicius Petrucci and   
               Xavier Martorell   The Hipster Approach for Improving Cloud
                                  System Efficiency  . . . . . . . . . . . 8:1--8:28
            Hari Cherupalli and   
                 Henry Duwe and   
                 Weidong Ye and   
               Rakesh Kumar and   
                   John Sartori   Determining Application-Specific Peak
                                  Power and Energy Requirements for
                                  Ultra-Low-Power Processors . . . . . . . 9:1--9:33
                 Adam Belay and   
              George Prekas and   
               Mia Primorac and   
               Ana Klimovic and   
            Samuel Grossman and   
         Christos Kozyrakis and   
                Edouard Bugnion   Corrigendum to ``The IX Operating
                                  System: Combining Low Latency, High
                                  Throughput and Efficiency in a Protected
                                  Dataplane''  . . . . . . . . . . . . . . 10:1--10:1