Last update:
Wed Sep 10 10:01:09 MDT 2025
Daniel G. Bobrow and
Jerry D. Burchfiel and
Daniel L. Murphy and
Raymond S. Tomlinson TENEX: a paged time sharing system for
the PDP-10 . . . . . . . . . . . . . . . 1--10
Barbara H. Liskov The design of the Venus Operating System 11--16
R. Stockton Gaines An operating system based on the concept
of a supervisory computer . . . . . . . 17--23
Sam Howry A multiprogramming system for process
control . . . . . . . . . . . . . . . . 24--30
Peter A. Alsberg Extensible data features in the
operating system language OSL/2 . . . . 31--34
R. J. Feiertag and
E. I. Organick The Multics input/output system . . . . 35--38
Michael D. Schroeder and
Jerome H. Saltzer A hardware architecture for implementing
protection rings . . . . . . . . . . . . 42--54
R. M. Needham Handling difficult faults in operating
systems . . . . . . . . . . . . . . . . 55--57
Jeffrey L. Gertz Storage reallocation in hierarchical
associative memories . . . . . . . . . . 58--63
Richard C. Holt Some deadlock properties of computer
systems . . . . . . . . . . . . . . . . 64--71
Rafael O. Fontao A concurrent algorithm for avoiding
deadlocks in multiprocess multiple
resource systems . . . . . . . . . . . . 72--79
A. Nico Habermann Synchronization of communicating
processes . . . . . . . . . . . . . . . 80--85
Gilles Kahn An approach to systems correctness . . . 86--94
William B. Easton Process synchronization without
long-term interlock . . . . . . . . . . 95--100
Per Brinch Hansen Short-term scheduling in
multiprogramming systems . . . . . . . . 101--105
R. C. Varney Process selection in a hierarchical
operating system . . . . . . . . . . . . 106--108
Forest Baskett The dependence of computer system queues
upon processing time distribution and
central processor scheduling . . . . . . 109--113
Toby J. Teorey and
Tad B. Pinkerton A comparative analysis of disk
scheduling policies . . . . . . . . . . 114--121
E. G. Coffman and
Thomas A. Ryan A study of storage partitioning using a
mathematical model of locality . . . . . 122--129
Peter J. Denning and
Stuart C. Schwartz Properties of the working-set model . . 130--140
Mark L. Greenberg An algorithm for drum storage management
in time-sharing systems . . . . . . . . 141--148
J. Winograd and
S. J. Morganstein and
R. Herman Simulation studies of a virtual memory,
time-shared, demand paging operating
system . . . . . . . . . . . . . . . . . 149--155
Juan Rodriguez-Rosell Experimental data on how program
behavior affects the choice of scheduler
parameters . . . . . . . . . . . . . . . 156--163
Marc Fogel and
Joseph Winograd EINSTEIN: an internal driver in a
time-sharing environment . . . . . . . . 6--14
Peter C. Poole When is a test not a test? . . . . . . . 4--5
William W. Collier Asynchronous interactions on shared data 6--15
John M. Chambers A user-controlled synchronization method 16--25
David H. Abernathy and
John S. Mancino and
Charls R. Pearson and
Dona C. Swiger Survey of design goals for operating
systems . . . . . . . . . . . . . . . . 29--48
M. D. Schroeder A brief report on the SIGPLAN/SIGOPS
interface meeting . . . . . . . . . . . 4--9
David C. M. Wood An example in synchronization of
cooperating processes: theory and
practice . . . . . . . . . . . . . . . . 10--18
David H. Abernathy and
John S. Mancino and
Charls R. Pearson and
Dona C. Swiger Survey of design goals for operating
systems . . . . . . . . . . . . . . . . 19--34
P. G. Sorenson Interprocess communication in real-time
systems . . . . . . . . . . . . . . . . 1--7
Michale J. Spier and
Thomas N. Hastings and
David N. Cutler An experimental implementation of the
kernel/domain architecture . . . . . . . 8--21
C. J. Stephenson On the structure and control of commands 22--26
Dennis M. Ritchie and
Ken Thompson The UNIX time-sharing system . . . . . . 27--27
Paul Day and
John Hines ARGOS: An operating system for a
computer utility supporting interactive
instrument control . . . . . . . . . . . 28--37
W. Walther Multiprocessor self diagnosis, surgery,
and recovery in air terminal traffic
control . . . . . . . . . . . . . . . . 38--44
Liba Svobodova Online system performance measurements
with software and hybrid monitors . . . 45--53
Samuel H. Fuller Summary of minimal-total-processing-time
drum and disk scheduling disciplines . . 54--57
Lee J. Scheffier Optimal folding of a paging drum in a
three level memory system . . . . . . . 58--65
Donald D. Chamberlin and
Samuel H. Fulier and
Leonard Y. Liu A page allocation strategy for
multiprogramming systems . . . . . . . . 66--72
Peter J. Denning and
Jeffrey R. Spirn Dynamic storage partitioning . . . . . . 73--79
Arvind and
R. Y. Kain and
E. Sadeh On reference string generation processes 80--87
Clarence A. Ellis On the probability of deadlock in
computer systems . . . . . . . . . . . . 88--95
J. D. Ullman Polynomial complete scheduling problems 96--101
J. Eruno and
E. G. Coffman, Jr. and
R. Sethi Scheduling independent tasks to reduce
mean finishing-time (extended abstract) 102--103
M. R. Garey and
R. L. Grehem Bounds on scheduling with limited
resources . . . . . . . . . . . . . . . 104--111
K. L. Krause and
V. Y. Shen and
H. D. Schwetman A task-scheduling algorithm for a
multiprogramming computer system . . . . 112--118
Jerome H. Saltzer Protection and control of information
sharing in Multics . . . . . . . . . . . 119--119
R. S. Fabry The case for capability based computers
(Extended Abstract) . . . . . . . . . . 120--120
Gerald J. Popek and
Robert P. Goldberg Formal requirements for virtualizable
third generation architectures . . . . . 121--121
S. Rao Kosaraju Limitations of Dijkstra's Semaphore
Primitives and Petri nets . . . . . . . 122--126
Peter J. Denning Is it not time to define ``structured
programming''? . . . . . . . . . . . . . 6--7
Marc H. Fogel The VMOS paging algorithm: a practical
implementation of the working set model 8--17
Butler W. Lampson Protection . . . . . . . . . . . . . . . 18--24
David H. Abernathy and
John S. Mancino and
Charls R. Pearson and
Dona C. Swiger Survey of design goals for operating
systems . . . . . . . . . . . . . . . . 25--35
Marvin V. Zelkowitz It is not time to define ``structured
programming'' . . . . . . . . . . . . . 7--8
Michael J. Spier A critical look at the state of our
science . . . . . . . . . . . . . . . . 9--15
Clinton R. Foulk Yet another attempt to define
``structured programming'' . . . . . . . 4--5
Gary J. Nutt An implementation of a computer
simulation system . . . . . . . . . . . 6--7
Jerome H. Saltzer Ongoing research and development on
information protection . . . . . . . . . 8--24
Peter J. Denning Is ``structured programming'' any longer
the right term? . . . . . . . . . . . . 4--6
Gary D. Knott A proposal for certain process
management and intercommunication
primitives . . . . . . . . . . . . . . . 7--44
Michael J. Spier and
Richard L. Hill and
Timothy J. Stein and
Daniel Bricklin The TYPESET-10 Message Exchange
Facility: a case study in systemic
design . . . . . . . . . . . . . . . . . 10--18
Gary D. Knott A proposal for certain process
management and intercommunication
primitives . . . . . . . . . . . . . . . 19--41
Petr Beckmann Book review . . . . . . . . . . . . . . 8--9
National Bureau of Standards and
National Science Foundation A preliminary prospectus for a software
engineering handbook . . . . . . . . . . 10--13
Anonymous Aims and scope for IEEE Transactions on
Software Engineering . . . . . . . . . . 14--15
Philip H. Enslow OSCL (1) activity in Europe . . . . . . 16--17
Butler Lampson Synchronization: Introduction by the
session chairman . . . . . . . . . . . . 1--2
Gerald Belpaire Synchronization: Is a synthesis of the
problems possible? . . . . . . . . . . . 3--10
Raymond S. Tomlinson Selecting sequence numbers . . . . . . . 11--23
Yogen K. Dalal More on selecting sequence numbers . . . 25--36
Robert C. Chen Representation of process
synchronization . . . . . . . . . . . . 37--42
Vinton Cerf Formalisms for interprocess
communication . . . . . . . . . . . . . 43--44
Gregor V. Bochmann Communication protocols and error
recovery procedures . . . . . . . . . . 45--50
Philip M. Merlin and
David J. Farber Recoverability of modular systems . . . 51--56
R. Stockton Gaines Protection . . . . . . . . . . . . . . . 57--58
Gerald J. Popek On data secure computer networks . . . . 59--62
T. C. Chen Interprocess communication systems . . . 63--63
Eric Manning and
R. W. Peebles Segment transfer protocols for a
homogeneous computer network . . . . . . 65--73
Wesley Chu Performance . . . . . . . . . . . . . . 75--75
John M. McQuillan and
David C. Walden Some considerations for a high
performance message-based interprocess
communication system . . . . . . . . . . 77--86
André A. S. Danthine and
Joseph Bremer Communication protocols in a network
context . . . . . . . . . . . . . . . . 87--92
Holger Opderbeck On the efficiency of control procedures
for computer communication networks . . 93--96
R. R. Brown and
J. L. Elshoff and
M. R. Ward The GM multiple console time sharing
system . . . . . . . . . . . . . . . . . 7--17
R. R. Brown MCTS customer task environment . . . . . 18--42
Richard Y. Kain How to evaluate page replacement
algorithms . . . . . . . . . . . . . . . 1--5
E. Sadeh An analysis of the performance of the
page fault frequency (PFF) replacement
algorithm . . . . . . . . . . . . . . . 6--13
Michael A. Harrison and
Walter L. Ruzzo and
Jeffrey D. Ullman On protection in operating systems . . . 14--24
Michael D. Schroeder Engineering a security kernel for
Multics . . . . . . . . . . . . . . . . 25--32
D. L. Bayer and
H. Lycklama MERT --- a multi-environment real-time
operating system . . . . . . . . . . . . 33--42
Philippe A. Janson Dynamic linking and environment
initialization in a multi-domain process 43--50
J. L. Pruitt and
W. W. Case Architecture of a real time operating
system . . . . . . . . . . . . . . . . . 51--59
Gregory L. Chesson The network Unix system . . . . . . . . 60--66
E. A. Akkoyunlu and
K. Ekanadham and
R. V. Huber Some constraints and tradeoffs in the
design of network communications . . . . 67--74
B. P. Cosell and
P. R. Johnson and
J. H. Malman and
R. E. Schantz and
J. Sussman and
R. H. Thomas and
D. C. Walden An operational system for computer
resource sharing . . . . . . . . . . . . 75--81
J. D. Bagley and
E. R. Floto and
S. C. Hsieh and
V. Watson Sharing data and services in a virtual
machine system . . . . . . . . . . . . . 82--88
Gerald Belpaire and
Nai-Ting Hsu Formal properties of recursive Virtual
Machine architectures . . . . . . . . . 89--96
Gerald J. Popek and
Charles S. Kline The PDP-11 virtual machine architecture:
A case study . . . . . . . . . . . . . . 97--105
David L. Russell and
Thomas H. Bredt Error resynchronization in
producer-consumer systems . . . . . . . 106--113
Bruce W. Arden and
Alan D. Berenbaum A multi-microprocessor computer system
architecture . . . . . . . . . . . . . . 114--121
W. Wulf and
R. Levin and
C. Pierson Overview of the Hydra Operating System
development . . . . . . . . . . . . . . 122--131
R. Levin and
E. Cohen and
W. Corwin and
F. Pollack and
W. Wulf Policy/mechanism separation in Hydra . . 132--140
Ellis Cohen and
David Jefferson Protection in the Hydra Operating System 141--160
Robert E. Brundage and
Alan P. Batson Computational processor demands of
Algol-60 programs . . . . . . . . . . . 161--168
K. M. Chandy and
P. F. Reynolds Scheduling partially ordered tasks with
probabilistic execution times . . . . . 169--177
Shui Lam and
Ravi Sethi Analysis of a level algorithm for
preemptive scheduling . . . . . . . . . 178--186
E. G. Coffman, Jr. and
I. Mitrani Selecting a scheduling rule that meets
pre-specified response time demands . . 187--191
Steven B. Lipner A comment on the confinement problem . . 192--196
Anita K. Jones and
Richard J. Lipton The enforcement of security policies for
computation . . . . . . . . . . . . . . 197--206
Peter J. Denning and
Kevin C. Kahn A study of program locality and lifetime
functions . . . . . . . . . . . . . . . 207--216
A. K. Agrawala and
R. M. Bryant Models of memory scheduling . . . . . . 217--222
James L. Peterson Referee coordination for the fifth
Symposium on Operating Systems
Principles . . . . . . . . . . . . . . . 7--16
R. R. Brown and
J. L. Elshoff and
M. R. Ward The GM multiple console time sharing
system . . . . . . . . . . . . . . . . . 17--17
James L. Elshoff and
Mitchel R. Ward The MCTS operating system . . . . . . . 18--38
Ralph R. Brown MCTS nucleus: philosophy and praxis . . 39--60
Mitchel R. Ward A simple approach to operating system
generation and initialization . . . . . 61--71
G. Yuval An operating non-system . . . . . . . . 9--10
E. H. Sibley Economic justification of an OSCL/OSRL 7--15
Philip M. Mills Control functions for a multiprocessor
architecture . . . . . . . . . . . . . . 26--40
Allen L. Ambler and
Donald I. Good and
James C. Browne and
Wilhelm F. Burger and
Richard M. Cohen and
Charles G. Hoch and
Robert E. Wells Gypsy: A language for specification and
implementation of verifiable programs 1--10
G. J. Popek and
J. J. Horning and
B. W. Lampson and
J. G. Mitchell and
R. L. London Notes on the design of Euclid . . . . . 11--18
Charles N. Fischer and
Richard J. LeBlanc Efficient implementation and
optimization of run-time checking in
PASCAL . . . . . . . . . . . . . . . . . 19--24
Allen L. Ambler and
Charles G. Hoch A study of protection in programming
languages . . . . . . . . . . . . . . . 25--40
Daniel P. Friedman and
David S. Wise Aspects of applicative programming for
file systems (preliminary version) . . . 41--55
Robert G. Herriot Towards the ideal programming language 56--62
Jhon V. Guttag and
Ellis Horowitz and
David R. Musser Some extensions to algebraic
specifications . . . . . . . . . . . . . 63--67
Normand Buckle Restricted data types, specification and
enforcement of invariant properties of
variables . . . . . . . . . . . . . . . 68--76
Patrick Causot and
Radhia Cousot Static determination of dynamic
properties of generalized type unions 77--94
P. M. Melliar-Smith and
B. Randell Software reliability: The role of
programmed exception handling . . . . . 95--100
M. Donald MacLaren Exception handling in PL/I . . . . . . . 101--104
Tom Love An experimental investigation of the
effect of program structure on program
understanding . . . . . . . . . . . . . 105--113
Gregory R. Andrews and
James R. McGraw Language features for process
interaction . . . . . . . . . . . . . . 114--127
D. B. Lomet Process structuring, synchronization,
and recovery using atomic actions . . . 128--137
Charles M. Geschke and
James H. Morris, Jr. and
Edwin H. Satterthwaite Early experience with Mesa . . . . . . . 138--138
Mary Shaw and
Wm A. Wulf and
Ralph L. London Abstraction and verification in Alphard:
Defining and specifying iteration and
generators . . . . . . . . . . . . . . . 139--139
Barbara Liskov and
Alan Snyder and
Russell Atkinson and
Craig Schaffert Abstraction mechanisms in CLU . . . . . 140--140
J. D. Gannon An experimental evaluation of data types
on programming reliability . . . . . . . 141--141
N. Wirth Towards a discipline of real-time
programming . . . . . . . . . . . . . . 142--142
Andrew Lister The problem of nested monitor calls . . 5--7
A. J. Payne A formalised technique for expressing
system exercisers . . . . . . . . . . . 8--12
A. J. Gerber Process synchronization by counter
variables . . . . . . . . . . . . . . . 6--17
Bruce K. Haddon Nested monitor calls . . . . . . . . . . 18--23
R. M. Needham and
R. D. H. Walker The Cambridge CAP computer and its
protection system . . . . . . . . . . . 1--10
R. M. Needham and
A. D. Birrell The CAP filing system . . . . . . . . . 11--16
R. M. Needham The CAP project --- an interim
evaluation . . . . . . . . . . . . . . . 17--22
Forest Baskett and
John H. Howard and
John T. Montague Task communication in DEMOS . . . . . . 23--31
Michael L. Powell The DEMOS file system . . . . . . . . . 33--42
Michael D. Schroeder and
David D. Clark and
Jerome H. Saltzer The Multics kernel design project . . . 43--56
R. J. Feiertag and
K. N. Levitt and
L. Robinson Proving multilevel security of a system
design . . . . . . . . . . . . . . . . . 57--65
Clarence A. Ellis Consistency and correctness of duplicate
database systems . . . . . . . . . . . . 67--84
Warren A. Montgomery Measurements of sharing in Multics . . . 85--90
David P. Reed and
Rajendra K. Kanodia Synchronization with eventcounts and
sequencers (extended abstract) . . . . . 91--91
Gene Mcdaniel Metric (extended abstract): A kernel
instrumentation system for distributed
environments . . . . . . . . . . . . . . 93--99
L. Casey and
N. Shelness A domain structure for distributed
computer systems . . . . . . . . . . . . 101--108
J. Y. Babonneau and
M. S. Achard and
G. Morisset and
M. B. Mounajjed Automatic and general solution to the
adaptation of programs in a paging
environment . . . . . . . . . . . . . . 109--116
Takashi Masuda Effect of program localities on memory
management strategies . . . . . . . . . 117--124
Dominique Potier Analysis of demand paging policies with
swapped working sets . . . . . . . . . . 125--131
Ellis Choen Information transmission in
computational systems . . . . . . . . . 133--139
Lawrence Snyder On the synthesis and analysis of
protection systems . . . . . . . . . . . 141--150
David L. Russell Process backup in producer-consumer
systems . . . . . . . . . . . . . . . . 151--157
Arvind and
Kim P. Gostelow and
Wil Plouffe Indeterminacy, monitors, and dataflow 159--169
David R. Cheriton and
Michael A. Malcolm and
Lawrence S. Melen and
Gary R. Sager Thoth, a portable real-time operating
system (extended abstract) . . . . . . . 171--171
Klaus-Peter Löhr Beyond concurrent Pascal . . . . . . . . 173--180
David L. Parnas The non-problem of nested monitor calls 12--18
Horst Wettstein The problem of nested monitor calls
revisited . . . . . . . . . . . . . . . 19--23
A. J. Herbert A new protection architecture for the
Cambridge capability computer . . . . . 24--28
D. C. Gilbert Modeling spin locks with queuing
networks . . . . . . . . . . . . . . . . 29--42
Jerome H. Saltzer Research problems of decentralized
systems with largely autonomous nodes 43--52
C. Mohan Survey of recent operating systems
research, designs and implementations 53--89
Bjarne Stroustrup On unifying module interfaces . . . . . 90--98
Anonymous Errata . . . . . . . . . . . . . . . . . 11--11
Jerome H. Saltzer On digital signatures . . . . . . . . . 12--14
F. B. Schneider and
A. J. Bernstein Scheduling in Concurrent Pascal . . . . 15--20
M. Joseph and
V. R. Prasad More on nested monitor calls . . . . . . 21--25
Douglas Cook The cost of using the CAP computer's
protection facilities . . . . . . . . . 26--30
A. D. Birrell and
R. M. Needham An asynchronous garbage collector for
the CAP filing system . . . . . . . . . 31--33
Dorothy E. Denning A note from your secretary-treasurer . . 2--4
R. Stockton Gaines and
Norman Z. Shapiro Some security principles and their
application to computer security . . . . 19--28
A. D. Birrell and
R. M. Needham Character streams . . . . . . . . . . . 29--31
Richard Miller UNIX: a portable operating system? . . . 32--37
Greg Rose Performance evaluation under Unix and a
study of PDP-11 instruction usage . . . 38--45
J. Lions An operating system case study . . . . . 46--53
Jason Gait Easy entry: the password encryption
problem . . . . . . . . . . . . . . . . 54--60
Janusz Górski A modular representation of the access
control system . . . . . . . . . . . . . 61--77
Dennis Heimbigner Writing device drivers in Concurrent
Pascal . . . . . . . . . . . . . . . . . 16--33
K. Ekanadham and
A. J. Bernstein Some new transitions in hierarchical
level structures . . . . . . . . . . . . 34--38
Alan Jay Smith Bibliography on paging and related
topics . . . . . . . . . . . . . . . . . 39--56
Roger M. Needham Adding capability access to conventional
file servers . . . . . . . . . . . . . . 3--4
J. L. Keedy On structuring operating systems with
monitors . . . . . . . . . . . . . . . . 5--9
K. Hopper and
H. J. Kugler and
C. Unger Abstract machines modelling network
control systems . . . . . . . . . . . . 10--24
Hugh C. Lauer and
Roger M. Needham On the duality of operating system
structures . . . . . . . . . . . . . . . 3--19
Mike Blasgen and
Jim Gray and
Mike Mitoma and
Tom Price The convoy phenomenon . . . . . . . . . 20--25
Andrew S. Tanenbaum A method for implementing paged,
segmented virtual memories on
microprogrammable computers . . . . . . 26--32
Glen Newton Deadlock prevention, detection, and
resolution: an annotated bibliography 33--44
Dorothy E. Denning A note from your secretary-treasurer . . 1--2
Henrik Maegaard and
Aksel Andreasen REPOS: An operating system for the
PDP-11 . . . . . . . . . . . . . . . . . 6--11
Jeffrey A. Barnett Garbage collection versus swapping . . . 12--17
B. Hebbard and
P. Grosso and
T. Baldridge and
C. Chan and
D. Fishman and
P. Goshgarian and
T. Hilton and
J. Hoshen and
K. Hoult and
G. Huntley and
M. Stolarchuk and
L. Warner A penetration analysis of the Michigan
Terminal System . . . . . . . . . . . . 7--20
Maurice V. Wilkes and
Roger M. Needham The Cambridge Model Distributed System 21--29
Peter J. Denning and
T. Don Dennis On minimizing contention at semaphores 9--16
M. V. Wilkes A new hardware capability architecture 17--20
Trevor Turton The management of operating system state
data . . . . . . . . . . . . . . . . . . 21--24
N. Natarajan Atomic actions and timestamps . . . . . 25--27
Andrew Klossner A parallel between operating system and
human government . . . . . . . . . . . . 28--31
Dorothy E. Denning A note from your secretary-treasurer . . 2--4
Neta Amit and
Micha Hofri A simple semaphore-queue management for
multiprocessing systems . . . . . . . . 13--15
N. D. Francis Simulation of operating systems: a
functional flowchart . . . . . . . . . . 16--21
Charles Hoch and
J. C. Browne An implementation of capabilities on the
PDP-11/45 . . . . . . . . . . . . . . . 22--32
Anita K. Jones Capability architecture revisited . . . 33--35
Dan Oestreicher and
J. I. Strauss A set of efficient semaphoring
instructions . . . . . . . . . . . . . . 36--45
W. David Sincoskie and
David J. Farber SODS/OS: a distributed operating system
for the IBM Series/1 . . . . . . . . . . 46--54
H. Sturgis and
J. Mitchell and
J. Israel Issues in the design and use of a
distributed file system . . . . . . . . 55--69
Sun Zhongxiu and
Xie Li and
Fei Xianglin and
Yi Wenguo and
Tan Yaoming An introduction to DJS200/XT1 . . . . . 70--74
G. J. Myers and
B. R. S. Buckingham A hardware implementation of
capability-based addressing . . . . . . 13--25
Jeremy Dion The Cambridge File Server . . . . . . . 26--35
N. H. Garnett and
R. M. Needham An asynchronous garbage collector for
the Cambridge File Server . . . . . . . 36--40
Carl Dellar Removing backing store administration
from the CAP operating system . . . . . 41--49
H. Wettstein and
G. Merbeth The concept of asynchronization . . . . 50--70
Peter J. Denning and
Harold S. Stone An exchange of views on operating
systems courses . . . . . . . . . . . . 71--82
A. L. Wilkinson and
D. H. Anderson and
D. P. Chang and
Lee Hock Hin and
A. J. Mayo and
I. T. Viney and
R. Williams and
W. Wright A penetration analysis of a Burroughs
Large System . . . . . . . . . . . . . . 14--25
Brett D. Fleisch An architecture for pup services on a
distributed operating system . . . . . . 26--44
Johannes Madsen A computer system supporting data
abstraction . . . . . . . . . . . . . . 45--72
Bruce Light Hillsberg Generic terminal support . . . . . . . . 10--15
K. Lunn and
K. H. Bennett An algorithm for resource location in a
loosely linked distributed computer
system . . . . . . . . . . . . . . . . . 16--20
Barton Miller and
David Presotto XOS: an operating system for the X-tree
architecture . . . . . . . . . . . . . . 21--32
D. C. Lindsay On binding layers of software . . . . . 33--37
Johannes Madsen A computer system supporting data
abstraction . . . . . . . . . . . . . . 38--78
Liba Svobodova Performance monitoring in computer
systems: a structured approach . . . . . 39--50
Andrew S. Tanenbaum and
Sape J. Mullender An overview of the Amoeba distributed
operating system . . . . . . . . . . . . 51--64
Gregory R. Andrews A note from your secretary-treasurer . . 1--2
P. A. Janson Using type-extension to organize
virtual-memory mechanisms . . . . . . . 6--38
John Sanguinetti The use of the monitor call instruction
to implement domain switching in the IBM
370 architecture . . . . . . . . . . . . 55--61
Jean Bacon An approach to distributed software
systems . . . . . . . . . . . . . . . . 62--74
Kirk A. Bailey and
Lee Boynton and
Paul E. McKenney and
Gary J. Oliver and
Dave Regan User defined files . . . . . . . . . . . 75--84
Arthur Bernstein and
Paul K. Harter, Jr. Proving real-time properties of programs
with temporal logic . . . . . . . . . . 1--11
J. M. Rushby Design and verification of secure
systems . . . . . . . . . . . . . . . . 12--21
Joel F. Bartlett A NonStop kernel . . . . . . . . . . . . 22--29
Hugh C. Lauer Observations on the development of an
operating system . . . . . . . . . . . . 30--36
M. Fridrich and
W. Older The Felix File Server . . . . . . . . . 37--44
James G. Mitchell and
Jeremy Dion A comparison of two network-based file
servers . . . . . . . . . . . . . . . . 45--46
Liba Svobodova A reliable object-oriented data
repository for a distributed computer
system . . . . . . . . . . . . . . . . . 47--58
A. J. Herbert and
R. M. Needham Sequencing computation steps in a
network . . . . . . . . . . . . . . . . 59--63
Richard F. Rashid and
George G. Robertson Accent: A communication oriented network
operating system kernel . . . . . . . . 64--75
Alfred Z. Spector Performing remote operations efficiently
on a local computer network . . . . . . 76--77
Özalp Babao\uglu and
William Joy Converting a swap-based system to do
paging in an architecture lacking
page-referenced bits . . . . . . . . . . 78--86
Richard W. Carr and
John L. Hennessy WSCLOCK---a simple and effective
algorithm for virtual memory management 87--95
M. Satyanarayanan A study of file sizes and functional
lifetimes . . . . . . . . . . . . . . . 96--108
Matt Bishop Hierarchical Take-Grant Protection
systems . . . . . . . . . . . . . . . . 109--122
David K. Gifford Cryptographic sealing for information
secrecy and authentication . . . . . . . 123--124
George W. Cox and
William M. Corwin and
Konrad K. Lai and
Fred J. Pollack A unified model and implementation for
interprocess communication in a
multiprocessor environment . . . . . . . 125--126
Kevin C. Kahn and
William M. Corwin and
T. Don Dennis and
Herman D'Hooge and
David E. Hubka and
Linda A. Hutchins and
John T. Montague and
Fred J. Pollack iMAX: A multiprocessor operating system
for an object-based computer . . . . . . 127--136
Fred J. Pollack and
Kevin C. Kahn and
Roy M. Wilkinson The iMAX-432 object filing system . . . 137--147
Edward D. Lazowska and
Henry M. Levy and
Guy T. Almes and
Michael J. Fischer and
Robert J. Fowler and
Stephen C. Vestal The architecture of the Eden system . . 148--159
G. W. R. Luderer and
H. Che and
J. P. Haggerty and
P. A. Kirslis and
W. T. Marshall A distributed UNIX system based on a
virtual circuit switch . . . . . . . . . 160--168
G. Popek and
B. Walker and
J. Chow and
D. Edwards and
C. Kline and
G. Rudisin and
G. Thiel LOCUS a network transparent, high
reliability distributed system . . . . . 169--177
Andrew D. Birrell and
Roy Levin and
Roger M. Needham and
Michael D. Schroeder Grapevine: An exercise in distributed
computing . . . . . . . . . . . . . . . 178--179
Norman Meyrowitz and
Margaret Moser BRUWIN: An adaptable design strategy for
window manager/virtual terminal systems 180--189
R. C. Holt Tunis: a Unix look-alike written in
concurrent Euclid (abstract) . . . . . . 4--5
S. P. Rana Triple-handed dining philosophers . . . 6--9
Richard M. Weatherly and
James F. Leathrum Efficient semaphore management using
read/modify/write memory cycles . . . . 10--13
S. Tucker Taft An object-based virtual operating system
for the Ada programming support
environment . . . . . . . . . . . . . . 14--25
D. M. Nessett Identifier protection in a distributed
operating system . . . . . . . . . . . . 26--31
James D. Mooney USIM: a user interface manager . . . . . 32--40
H. S. M. Kruijer Processor management in a concurrent
Pascal kernel . . . . . . . . . . . . . 7--17
J. M. Adams and
A. P. Black On proof rules for monitors . . . . . . 18--27
Krishna Kant and
Abraham Silberschatz On the generalized critical region
construct . . . . . . . . . . . . . . . 4--16
John H. Howard Reply to \em ``On Proof Rules for
Monitors'' . . . . . . . . . . . . . . . 8--9
J. R. Metzner Structuring operating systems literature
for the graduate course . . . . . . . . 10--25
Irving L. Traiger Virtual memory management for database
systems . . . . . . . . . . . . . . . . 26--48
C. Gray Girling Object representation on a heterogeneous
network . . . . . . . . . . . . . . . . 49--59
M. E. Harper Mutual exclusion within both software-
and hardware-driven kernel primitives 60--68
Gregory R. Andrews Report to the SIGOPS membership . . . . 2--3
Staff Review of \em ``Probability and
statistics with reliability, queueing
and computer science applications'' by
Kishor S. Trivedi. Prentice-Hall,
Englewood-Cliffs, 1982 . . . . . . . . . 9--9
Pearl Brereton Detection and resolution of
inconsistencies among distributed
replicates of files . . . . . . . . . . 10--15
R. M. Needham and
A. J. Herbert and
J. G. Mitchell How to connect stable memory to a
computer . . . . . . . . . . . . . . . . 16--16
Sandra A. Mamrak and
Dennis Leinbaugh and
Toby S. Berk A progress report on the Desperanto
research project: software support for
distributed processing . . . . . . . . . 17--29
Peter Peinl and
Andreas Reuter Synchronizing multiple database
processes in a tightly coupled
multiprocessor environment . . . . . . . 30--37
William M. Waite Reviews of ``\em Medusa, A Distributed
Operating System by John K.
Ousterhout'', Harold S. Stone, Series
Editor. UMI Research Pres, University
Microfilms International, Ann Arbor,
Michigan, 1981 . . . . . . . . . . . . . 9--10
William M. Waite Reviews of ``\em Probability and
Statistics with Reliability, Queueing
and Computer Science Applications by
Kishor S. Trivedi'', Prentice-Hall,
Englewood-Cliffs, 1982 . . . . . . . . . 10--10
Krishna Kant Efficient local checkpointing for
software fault tolerance . . . . . . . . 11--13
Brett D. Fleisch Operating systems: a perspective on
future trends . . . . . . . . . . . . . 14--17
Alfred Z. Spector and
Peter M. Schwarz Transactions: a construct for reliable
distributed computing . . . . . . . . . 18--35
Bruce K. Haddon Review of \em ``Technical aspects of
data communication'': (second edition)
by John E. McNamara. Digital Press,
Educational Services, Digital Equipment
Corporation, Bedford, Massachusetts,
1982 . . . . . . . . . . . . . . . . . . 7--7
J. L. Tuggle Review of ``Planning for future market
events using data processing support by
Jerome Svigals.'' Macmillan Inc. 1983 8--8
Jeffrey A. Barnett and
Alvin S. Cooperband Priority is a limited property . . . . . 9--9
Ian H. Witten and
Graham M. Birtwistle and
John Cleary and
David R. Hill and
Danny Levinson and
Greg Lomow and
Radford Neal and
Murray Peterson and
Brian W. Unger and
Brian Wyvill Jade: a distributed software prototyping
environment . . . . . . . . . . . . . . 10--23
H. Schmutz and
P. Silberbusch Working sets and near-optimality . . . . 24--29
Sun Zhongxiu and
Zhang Du and
Yan Peigen ZCZOS: a distributed operating system
for a LSI-11 microcomputer network . . . 30--34
Per Brinch Hansen Using personal computers in operating
system courses . . . . . . . . . . . . . 41--44
Dieter Zöbel The Deadlock problem: a classifying
bibliography . . . . . . . . . . . . . . 6--15
Bruce G. Lindsay and
Laura M. Haas and
Paul F. Wilms and
Robert A. Yost Computation & communication in R: a
distributed database manager . . . . . . 1--2
Andrew D. Birrell and
Bruce Jay Nelson Implementing Remote procedure calls . . 3--3
Andrew P. Black An asymmetric stream communication
system . . . . . . . . . . . . . . . . . 4--10
Daniel H. Craft Resource management in a decentralized
system . . . . . . . . . . . . . . . . . 11--19
Loretta Guarino Reid and
Philip L. Karlton A file system supporting cooperation
between programs . . . . . . . . . . . . 20--29
C. J. Stephenson New methods for dynamic storage
allocation (Fast Fits) . . . . . . . . . 30--32
Butler W. Lampson Hints for computer system design . . . . 33--48
Bruce Walker and
Gerald Popek and
Robert English and
Charles Kline and
Greg Thiel The LOCUS distributed operating system 49--70
Erik T. Mueller and
Johanna D. Moore and
Gerald J. Popek A nested transaction mechanism for LOCUS 71--89
Anita Borg and
Jim Baumbach and
Sam Glazer A message system supporting fault
tolerance . . . . . . . . . . . . . . . 90--99
Michael L. Powell and
David L. Presotto Publishing: a reliable broadcast
communication mechanism . . . . . . . . 100--109
Michael L. Powell and
Barton P. Miller Process migration in DEMOS/MP . . . . . 110--119
M. F. Richardson and
R. M. Needham The TRIPOS filing machine, a front end
to a file server . . . . . . . . . . . . 120--128
David R. Cheriton and
Willy Zwaenepoel The distributed V kernel and its
performance for diskless workstations 129--140
Michael D. Schroeder and
Andrew D. Birrell and
Roger M. Needham Experience with Grapevine (Summary): the
growth of a distributed system . . . . . 141--142
Jonathan M. Silverman Reflections on the verification of the
security of an operating system kernel 143--154
Krishna M. Kavi and
K. Krishnamohan Architecture quality . . . . . . . . . . 11--19
Kenneth Owen Data communications: IFIP's
international ``network'' of experts . . 20--26
J. W. Atwood Use of Tunis in an operating systems
design course . . . . . . . . . . . . . 6--7
Michael Stonebraker Virtual memory transaction management 8--16
Bruce K. Haddon Book review of ``Security, IFIP/Sec'83:
proceedings of the first security
conference'' North-Holland Publishing
Co. 1983 . . . . . . . . . . . . . . . . 14--14
John R. Sopka National parallel processing research
council executive committee charter . . 25--27
Francis C. M. Lau Two-part names and process termination 28--30
Richard LeRoy Routh A proposal for an architectural approach
which apparently solves all known
software-based internal computer
security problems . . . . . . . . . . . 31--39
Swamy Kutti Why a distributed kernel? . . . . . . . 5--11
David R. Cheriton An experiment using registers for fast
message-based interprocess communication 12--20
David C. M. Wood Review of ``VAX/VMS Internals and Data
Structures by Lawrence J. Kenah and
Simon F. Bate'', Digital Press,
Educational Services, Digital Equipment
Corporation, Bedford, Massachusetts
(1984), ISBN 0-932376-52-5. . . . . . . 5--5
Michael Stonebraker and
Deborah DuBourdieux and
William Edwards Problems in supporting data base
transactions in an operating system
transaction manager . . . . . . . . . . 6--14
Anna Hac Distributed file systems --- a survey 15--18
William E. Weihl Data-dependent concurrency control and
recovery . . . . . . . . . . . . . . . . 19--31
J. E. Allchin and
M. S. McKendry Synchronization and recovery of actions 32--45
Arun Lakhotia Implication and equivalence I/O . . . . 46--52
Kamaljit Singh On improvements to password security . . 53--60
Kevin C. Kahn Financial report to the SIGOPS
membership . . . . . . . . . . . . . . . 2--2
C. Mohan and
B. Lindsay Efficient commit protocols for the tree
of processes model of distributed
transactions . . . . . . . . . . . . . . 40--52
Nissim Francez and
Brent Hailpern Script: a communication abstraction
mechanism . . . . . . . . . . . . . . . 53--67
C. K. Yuen On programs, tasks and processes . . . . 7--8
Keith Loepere Resolving covert channels within a B2
class secure system . . . . . . . . . . 9--28
C. Mohan and
R. Strong and
S. Finkelstein Method for distributed transaction
commit and recovery using Byzantine
Agreement within clusters of processors 29--43
Keith Marzullo and
Susan Owicki Maintaining the time in a distributed
system . . . . . . . . . . . . . . . . . 44--54
Lindsey L. Spratt The transaction resolution journal:
extending the before journal . . . . . . 55--62
Bruce K. Haddon Review of \em ``Information systems
design methodologies: a feature
analysis''. Edited by T. W. Olle, H. G.
Sol, and C. J. Tully. North-Holland
Publishing Co. 1983 . . . . . . . . . . 4--5
Norman Hardy KeyKOS architecture . . . . . . . . . . 8--25
David R. Cheriton Preliminary thoughts on problem-oriented
shared memory: a decentralized approach
to distributed systems . . . . . . . . . 26--33
Leslie Lamport Solved problems, unsolved problems and
non-problems in concurrency . . . . . . 34--44
Jonathan Kepecs and
Marvin Solomon SODA: a simplified operating system for
distributed applications . . . . . . . . 45--56
Nancy P. Kronenberg and
Henry M. Levy and
William D. Strecker VAXclusters (extended abstract): a
closely-coupled distributed system . . . 1--1
Marvin M. Theimer and
Keith A. Lantz and
David R. Cheriton Preemptable remote execution facilities
for the V-system . . . . . . . . . . . . 2--12
Robert Fitzgerald and
Richard F. Rashid The integration of virtual memory
management and interprocess
communication in accent (abstract only) 13--14
John K. Ousterhout and
Hervé Da Costa and
David Harrison and
John A. Kunze and
Mike Kupfer and
James G. Thompson A trace-driven analysis of the UNIX 4.2
BSD file system . . . . . . . . . . . . 15--24
Michael D. Schroeder and
David K. Gifford and
Roger M. Needham A caching file system for a programmer's
workstation . . . . . . . . . . . . . . 25--34
M. Satyanarayanan and
John H. Howard and
David A. Nichols and
Robert N. Sidebotham and
Alfred Z. Spector and
Michael J. West The ITC distributed file system:
principles and design . . . . . . . . . 35--50
Sape J. Mullender and
Andrew S. Tanenbaum A distributed file service based on
optimistic concurrency control . . . . . 51--62
Eric C. Cooper Replicated distributed programs . . . . 63--78
Kenneth P. Birman Replication and fault-tolerance in the
ISIS system . . . . . . . . . . . . . . 79--86
Dan\vco Dav\vcev and
Walter A. Burkhard Consistency and recovery control for
replicated files . . . . . . . . . . . . 87--96
Mohammad Malkawi and
Janek Patel Compiler directed memory management
policy for numerical programs . . . . . 97--106
Steve Reinhardt A data-flow approach to multitasking on
CRAY X-MP computers . . . . . . . . . . 107--114
Matthew J. Weinstein and
Thomas W. Page, Jr. and
Brian K. Livezey and
Gerald J. Popek Transactions and synchronization in a
distributed operating system . . . . . . 115--126
Alfred Z. Spector and
Dean Daniels and
Daniel Duchamp and
Jeffrey L. Eppinger and
Randy Pausch Distributed transactions for reliable
systems . . . . . . . . . . . . . . . . 127--146
Brian M. Oki and
Barbara H. Liskov and
Robert W. Scheifler Reliable object storage to support
atomic actions . . . . . . . . . . . . . 147--159
Nicholas Carriero and
David Gelernter The S/Net's Linda kernel (extended
abstract) . . . . . . . . . . . . . . . 160--160
David K. Gifford and
Robert W. Baldwin and
Stephen T. Berlin and
John M. Lucassen An architecture for large scale
information systems . . . . . . . . . . 161--170
David D. Clark The structuring of systems using upcalls 171--180
Andrew P. Black Supporting distributed applications:
experience with Eden . . . . . . . . . . 181--193
Anonymous Financial Report . . . . . . . . . . . . 4--4
Harold Lorin An expanded approach to objects . . . . 6--11
P. Singleton and
K. H. Bennett and
O. P. Brereton A single model for files and processes 12--18
M. Ancona and
A. Clematis and
V. Gianuzzi Interfacing user processes and kernel in
high level language . . . . . . . . . . 19--23
Alfred Z. Spector and
Dean Daniels An algorithm for replicated directories 24--43
Eric C. Cooper Replicated procedure call . . . . . . . 44--56
Gene T. J. Wuu and
Arthur J. Bernstein Efficient solutions to the replicated
log and dictionary problems . . . . . . 57--66
Joanne L. Waite Book Review: \em A Handbook of Software
Development and Operating Procedures for
Micro computers by Paul Holliday
(Macmillan Publishing Company 1985) . . 6--7
S. J. Pratt The alchemy model: a model for
homogeneous and heterogeneous
distributed computing system . . . . . . 25--37
Jeffrey A. Brumfield A Guide To Operating Systems Literature 38--42
Keith A. Lantz and
Judy L. Edighoffer and
Bruce L. Hitson Towards a universal directory service 43--53
Sape J. Mullender and
Paul M. B. Vitanyi Distributed match-making for processes
in computer networks . . . . . . . . . . 54--64
Robert Sansom Book Review: \em Computer Security: A
Global Challenge --- Proceedings of the
Second IFIP International Conference on
Computer Security, IFIP/Sec'84, Toronto,
Ontario, Canada, 10--12 September, 1984:
(Elsevier Science Publishing Co. 1984) 9--9
Leslie Lamport and
P. M. Melliar Smith Byzantine clock synchronization . . . . 10--16
David Cheung and
Tiko Kameda Site optimal termination protocols for a
distributed database under network
partitioning . . . . . . . . . . . . . . 17--27
I. Rattan and
L. P. S. Singh On table fragmentation in virtual memory
management . . . . . . . . . . . . . . . 28--30
Maurice Herlihy Comparing how atomicity mechanisms
support replication . . . . . . . . . . 31--39
Du Zhang and
Meiliu Lu Process name resolution in
fault-intolerant CSP programs . . . . . 9--15
Amos O. Olagunju and
Elvis Borders Emulators; prospective instruments for
instruction in systems programming . . . 16--24
Thomas F. Litant Book Review: \em Computer Security: the
Practical Issues in a Troubled World,
(Elsevier Science Publishers, Amsterdam
1985) . . . . . . . . . . . . . . . . . 3--5
R. M. Needham and
M. D. Schroeder Authentication revisited . . . . . . . . 7--7
Dave Otway and
Owen Rees Efficient and timely mutual
authentication . . . . . . . . . . . . . 8--10
John R. Nicol and
Gordon S. Blair and
Jonathan Walpole Operating system design: towards a
holistic approach? . . . . . . . . . . . 11--19
Andrew S. Tanenbaum A UNIX clone with source code for
operating systems courses . . . . . . . 20--29
G. R. Guenther Running 7th edition UNIX programs on a
VAX in compatibility mode . . . . . . . 30--33
I. Rattan Memory management units for
microcomputer operating systems . . . . 34--38
Rogert G. Ruckert and
John D. Dean Launching a successful CPME program in a
multi-vendor environment . . . . . . . . 39--48
Sape Mullender Report on the Second European SIGOPS
Workshop ``Making Distributed Systems
Work'' . . . . . . . . . . . . . . . . . 49--84
Sten F. Andler Financial report . . . . . . . . . . . . 3--4
Martin Turnbull Support for heterogeneity in the global
distributed operating system . . . . . . 11--22
S. J. Pratt Catastrophe theory: its application in
operating system design . . . . . . . . 23--32
Maurice Herlihy Optimistic concurrency control for
abstract data types . . . . . . . . . . 33--44
Robert L. Gordon Window management, graphics, and
operating systems . . . . . . . . . . . 5--8
Roy Campbell and
Garry Johnston and
Vincent Russo Choices (class hierarchical open
interface for custom embedded systems) 9--17
Charles H. Sauer and
Don W. Johnson and
Larry K. Loucks and
Amal A. Shaheen-Gouda and
Todd A. Smith RT PC distributed services overview . . 18--29
Timothy V. Fossum PC-XINU features and installation . . . 30--33
Niklaus Wirth Hardware architectures for programming
languages and programming languages for
hardware architectures . . . . . . . . . 2--8
Bob Beck and
Bob Kasten and
Shreekant Thakkar VLSI assist for a multiprocessor . . . . 10--20
Roberto Bisiani and
Alessandro Forin Architectural support for multilanguage
parallel programming on heterogeneous
systems . . . . . . . . . . . . . . . . 21--30
Richard Rashid and
Avadis Tevanian and
Michael Young and
David Golub and
Robert Baron Machine-independent virtual memory
management for paged uniprocessor and
multiprocessor architectures . . . . . . 31--39
John R. Hayes and
Martin E. Fraeman and
Robert L. Williams and
Thomas Zaremba An architecture for the direct execution
of the Forth programming language . . . 42--49
Peter Steenkiste and
John Hennessy Tags and type checking in LISP: hardware
and software approaches . . . . . . . . 50--59
Jack W. Davidson and
Richard A. Vaughan The effect of instruction set complexity
on program size and memory performance 60--64
Russell R. Atkinson and
Edward M. McCreight The dragon processor . . . . . . . . . . 65--69
James R. Goodman Coherency for multiprocessor virtual
address caches . . . . . . . . . . . . . 72--81
T. A. Cargill and
B. N. Locanthi Cheap hardware support for software
debugging and profiling . . . . . . . . 82--83
C. J. Georgiou and
S. L. Palmer and
P. L. Rosenfeld An experimental coprocessor for
implementing persistent objects on an
IBM 4381 . . . . . . . . . . . . . . . . 84--87
Daniel J. Magenheimer and
Liz Peters and
Karl Pettis and
Dan Zuras Integer multiplication and division on
the HP precision architecture . . . . . 90--99
David W. Wall and
Michael L. Powell The Mahler experience: using an
intermediate language as the machine
description . . . . . . . . . . . . . . 100--104
Shlomo Weiss and
James E. Smith A study of scalar compilation techniques
for pipelined supercomputers . . . . . . 105--109
William R. Bush and
A. Dain Samples and
David Ungar and
Paul N. Hilfinger Compiling Smalltalk-80 to a RISC . . . . 112--116
F. Chow and
S. Correll and
M. Himelstein and
E. Killian and
L. Weber How many addressing modes are enough? 117--121
Henry Massalin Superoptimizer: a look at the smallest
program . . . . . . . . . . . . . . . . 122--126
Kazuo Taki and
Katzuto Nakajima and
Hiroshi Nakashima and
Morihiro Ikeda Performance and architectural evaluation
of the PSI machine . . . . . . . . . . . 128--135
Gaetano Borriello and
Andrew R. Cherenson and
Peter B. Danzig and
Michael N. Nelson RISCs vs. CISCs for Prolog: a case study 136--145
Richard B. Kieburtz A RISC architecture for symbolic
computation . . . . . . . . . . . . . . 146--155
David R. Ditzel and
Hubert R. McLellan and
Alan D. Berenbaum Design tradeoffs to support the C
programming language in the CRISP
microprocessor . . . . . . . . . . . . . 158--163
Charles P. Thacker and
Lawrence C. Stewart Firefly: a multiprocessor workstation 164--172
Douglas W. Clark Pipelining and performance in the VAX
8800 processor . . . . . . . . . . . . . 173--177
Robert P. Colwell and
Robert P. Nix and
John J. O'Donnell and
David B. Papworth and
Paul K. Rodman A VLIW architecture for a trace
scheduling compiler . . . . . . . . . . 180--192
Adam Levinthal and
Pat Hanrahan and
Mike Paquette and
Jim Lawson Parallel computers for graphics
applications . . . . . . . . . . . . . . 193--198
J. E. Smith and
G. E. Dermer and
B. D. Vanderwarn and
S. D. Klinger and
C. M. Rozewski The ZS-1 central processor . . . . . . . 199--204
J. Howard and
M. Kazar and
S. Menees and
D. Nichols and
M. Satyanarayanan and
Robert N. Sidebotham and
M. West Scale and performance in a distributed
file system . . . . . . . . . . . . . . 1--2
M. Nelson and
B. Welch and
J. Ousterhout Caching in the Sprite network file
system . . . . . . . . . . . . . . . . . 3--4
D. Nichols Using idle workstations in a shared
computing environment . . . . . . . . . 5--12
E. Zayas Attacking the process migration
bottleneck . . . . . . . . . . . . . . . 13--24
G. Varghese and
T. Lauck Hashed and hierarchical timing wheels:
data structures for the efficient
implementation of a timer facility . . . 25--38
J. Mogul and
R. Rashid and
M. Accetta The packer filter: an efficient
mechanism for user-level network code 39--51
M. Schwartz and
J. Zahorjan and
D. Notkin A name service for evolving
heterogeneous systems . . . . . . . . . 52--62
M. Young and
A. Tevanian and
R. Rashid and
D. Golub and
J. Eppinger The duality of memory and communication
in the implementation of a
multiprocessor operating system . . . . 63--76
D. Jefferson and
B. Beckman and
F. Wieland and
L. Blume and
M. Diloreto Distributed Simulation and the Time Warp
Operating System . . . . . . . . . . . . 77--93
A. Birrell and
J. Guttag and
J. Horning and
R. Levin Synchronization primitives for a
multiprocessor: a formal specification 94--102
D. Terry and
D. Swinehart Managing stored voice in the Etherphone
system . . . . . . . . . . . . . . . . . 103--104
E. Jul and
H. Levy and
N. Hutchinson and
A. Black Fine-grained mobility in the emerald
system . . . . . . . . . . . . . . . . . 105--106
R. Haskin and
Y. Malachi and
W. Sawdon and
G. Chan Recovery management in QuickSilver . . . 107--108
A. Chang and
M. Mergen 801 Storage: architecture and
programming . . . . . . . . . . . . . . 109--110
B. Liskov and
D. Curtis and
P. Johnson and
R. Scheifer Implementation of Argus . . . . . . . . 111--122
K. Birman and
T. Joseph Exploiting virtual synchrony in
distributed systems . . . . . . . . . . 123--138
R. Finlayson and
D. Cheriton Log files: an extended file service
exploiting write-once storage . . . . . 139--148
A. Birrell and
M. Jones and
E. Wobber A simple and efficient implementation of
a small database . . . . . . . . . . . . 149--154
R. Hagmann Reimplementing the Cedar file system
using logging and group commit . . . . . 155--162
Alan Demers and
Dan Greene and
Carl Houser and
Wes Irish and
John Larson and
Scott Shenker and
Howard Sturgis and
Dan Swinehart and
Doug Terry Epidemic algorithms for replicated
database maintenance . . . . . . . . . . 8--32
R. C. Holt Device management in TURNING PLUS . . . 33--41
Ami Litman The DUNIX distributed operating system 42--51
Dieter Zöbel and
Christoph Koch Resolution techniques and complexity
results with deadlocks: a classifying
and annotated bibliography . . . . . . . 52--72
Neil W. Rickert Non-Byzantine clock synchronization---a
programming experiment . . . . . . . . . 73--78
Daniel A. Cañas and
Laura M. Esquivel Portability and the UNIX operating
system . . . . . . . . . . . . . . . . . 6--23
Zhongxiu Sun and
Xing Xue and
Jianqiang Zhou and
Peigen Yang and
Xihao Xu Developing a heterogeneous distributed
operating system . . . . . . . . . . . . 24--31
David L. Harris An input/output subsystem for the Hawk
operating system kernel . . . . . . . . 32--44
Stephen Russell Single-user capabilities in interprocess
communication . . . . . . . . . . . . . 45--52
Leszek Kotulski Comments on implementation of P and V
primitives with help of binary
semaphores . . . . . . . . . . . . . . . 53--59
S. Haldar and
D. Subramanian An efficient solution to the mutual
exclusion problem using unfair and weak
semaphore . . . . . . . . . . . . . . . 60--66
Carole B. Hogan Protection imperfect: the security of
some computing environments . . . . . . 7--27
Jonathan M. Smith A survey of process migration mechanisms 28--40
Anthony J. Dos Reis A note on Ben-Ari's concurrent
programming system . . . . . . . . . . . 41--42
David Hemmendinger A correct implementation of general
semaphores . . . . . . . . . . . . . . . 42--44
Hank Levy SIGOPS Financial Report August 1, 1988 1--2
Grant R. Guenther Extended control services in operating
system interfaces . . . . . . . . . . . 20--24
Robbert van Renesse and
Hans van Staveren and
Andrew S. Tanenbaum Performance of the world's fastest
distributed operating system . . . . . . 25--34
Codie Wells A Note on ``Protection Imperfect'' . . . 35--35
Norm Hardy and
Norman Hardy The Confused Deputy: (or why
capabilities might have been invented) 36--38
H. Wedekind Ubiquity and need-to-know: two
principles of data distribution . . . . 39--45
Phil Kearns A correct and unrestrictive
implementation of general semaphores . . 46--48
David Hemmendinger Comments on ``A Correct and
Unrestrictive Implementation of General
Semaphores'' . . . . . . . . . . . . . . 7--8
C. Samuel Hsieh Further comments on implementation of
general semaphores . . . . . . . . . . . 9--10
John Ousterhout and
Fred Douglis Beating the I/O bottleneck: a case for
log-structured file systems . . . . . . 11--28
J. Kent Peacock Deadlock avoidance in loosely-coupled
multiprocessors with finite buffer pools 20--24
Bruno Braban and
Peter Schlenk A well structured parallel file system
for PM . . . . . . . . . . . . . . . . . 25--38
Keith Loepere The covert channel limiter revisited . . 39--44
T. F. Leibfried A deadlock detection and recovery
algorithm using the formalism of a
directed graph matrix . . . . . . . . . 45--55
Li Gong On security in capability-based systems 56--60
W. Shih and
J. S. W. Liu and
J. Chung and
D. W. Gillies Scheduling tasks with ready times and
deadlines to minimize average error . . 14--28
H. Tokuda and
C. W. Mercer ARTS: a distributed real-time kernel . . 29--53
J. A. Stankovic and
K. Ramamritham The Spring kernel: a new paradigm for
real-time operating systems . . . . . . 54--71
D. D. Kandlur and
D. L. Kiskis and
K. G. Shin HARTOS: a distributed real-time
operating system . . . . . . . . . . . . 72--89
S. Levi and
S. K. Tripathi and
S. D. Carson and
A. K. Agrawala The MARUTI hard real-time operating
system . . . . . . . . . . . . . . . . . 90--105
P. Gopinath and
K. Schwan CHAOS: why one cannot have only an
operating system for real-time
applications . . . . . . . . . . . . . . 106--125
H. F. Wedde and
G. S. Alijani and
W. G. Brown and
S. Chen and
G. Kang Operating system support for adaptive
distributed real-time systems in DRAGON
SLAYER . . . . . . . . . . . . . . . . . 126--140
A. Damm and
J. Reisinger and
W. Schwabl and
H. Kopetz The real-time operating system of MARS 141--157
V. P. Holmes and
D. L. Harris A designer's perspective of the Hawk
multiprocessor operating system kernel 158--172
Charles R. Landau Security in a secure capability-based
system . . . . . . . . . . . . . . . . . 2--4
M. Frans Kaashoek and
A. S. Tanenbaum and
S. F. Hummel An efficient reliable broadcast protocol 5--19
S. T. Chanson and
G. W. Neufeld and
L. Liang A bibliography on multicast and group
communications . . . . . . . . . . . . . 20--25
Walter G. Piotrowski Are file names enough? . . . . . . . . . 26--27
B. C. Neuman The need for closure in large
distributed systems . . . . . . . . . . 28--30
June Power Distributed system evolution-some
observations . . . . . . . . . . . . . . 31--32
J. H. Emck and
J. H. Voskamp and
A. J. van der Wal EPEP: an operating system designed for
experiment-control . . . . . . . . . . . 33--44
Borko Furht and
J. Parker and
D. Grostick Performance of REAL/IX$^{TM}$-fully
preemptive real time UNIX . . . . . . . 45--52
M. Burrows and
M. Abadi and
R. Needham A logic of authentication . . . . . . . 1--13
T. Lomas and
L. Gong and
J. Saltzer and
R. Needhamn Reducing risks from poorly chosen keys 14--18
W. Bolosky and
R. Fitzgerald and
M. Scott Simple but effective techniques for NUMA
memory management . . . . . . . . . . . 19--31
A. Cox and
R. Fowler The implementation of a coherent memory
abstraction on a NUMA multiprocessor:
experiences with platinum . . . . . . . 32--44
V. Srinivasan and
J. Mogul Spritely NFS: experiments with
cache-consistency protocols . . . . . . 44--57
D. Edwards and
M. Mckendry Exploiting read-mostly workloads in the
FileNet file system . . . . . . . . . . 58--70
A. Braunstein and
M. Riley and
J. Wilkes Improving the efficiency of UNIX buffer
caches . . . . . . . . . . . . . . . . . 71--82
M. Schroeder and
M. Burrows Performance of Firefly RPC . . . . . . . 83--90
L. Peterson and
N. Hutchinson and
S. O'Malley and
M. Abbott RPC in the x-Kernel: evaluating new
design techniques . . . . . . . . . . . 91--101
B. Bershad and
T. Anderson and
E. Lazowska and
H. Levy Lightweight remote procedure call . . . 102--113
M. Weiser and
A. Demers and
C. Hauser The portable common runtime approach to
interoperability . . . . . . . . . . . . 114--122
E. Abrossimov and
M. Rozier and
M. Shapiro Generic virtual memory management for
operating system kernels . . . . . . . . 123--136
B. Rosenburg Low-synchronization translation
lookaside buffer consistency in
large-scale shared-memory
multiprocessors . . . . . . . . . . . . 137--146
J. Chase and
F. Amador and
E. Lazowska and
H. Levy and
R. Littlefield The Amber system: parallel programming
on a network of multiprocessors . . . . 147--158
A. Tucker and
A. Gupta Process control and scheduling issues
for multiprogrammed shared-memory
multiprocessors . . . . . . . . . . . . 159--166
R. Barkley and
T. Lee A lazy buddy system bounded by two
coalescing delays . . . . . . . . . . . 167--176
D. Duchamp Analysis of transaction management
performance . . . . . . . . . . . . . . 177--190
H. Massalin and
C. Pu Threads and input/output in the
synthesis kernel . . . . . . . . . . . . 191--201
C. Gray and
D. Cheriton Leases: an efficient fault-tolerant
mechanism for distributed file cache
consistency . . . . . . . . . . . . . . 202--210
B. Fleisch and
G. Popek Mirage: a coherent distributed shared
memory design . . . . . . . . . . . . . 211--223
Rajan G. Chandras Distributed message passing operating
systems . . . . . . . . . . . . . . . . 7--17
Micha Hofri Proof of a mutual exclusion
algorithm---a classic example . . . . . 18--22
Peter B. Danzig and
Stephen Melvin High resolution timing with low
resolution clocks and microsecond
resolution timer for Sun workstations 23--26
Özalp Babao\uglu Fault-tolerant computing based on Mach 27--39
Pankaj Jalote and
Satish K. Tripathi Workshop on integrated approach for
fault tolerance-current state and future
requirements . . . . . . . . . . . . . . 40--57
Mark J. Lorence and
M. Satyanarayanan IPwatch: a tool for monitoring network
locality . . . . . . . . . . . . . . . . 58--80
Chuck Koelbel and
Gene Spafford and
George Leach Workshop on experiences with building
distributed and multiprocessor systems 2--6
Christopher Burdorf and
Jed Marti Non-preemptive time warp scheduling
algorithms . . . . . . . . . . . . . . . 7--18
Andy Hopper Pandora --- an experimental system for
multimedia applications . . . . . . . . 19--34
Dan M. Nessett A critique of the Burrows, Abadi and
Needham logic . . . . . . . . . . . . . 35--38
Michael Burrows and
Martín Abadi and
Roger Needham Rejoinder to Nessett . . . . . . . . . . 39--40
Bob Beck AAMP: a multiprocessor approach for
operating system and application
migration . . . . . . . . . . . . . . . 41--55
Roger Oliver Protection in a distributed document
processing system . . . . . . . . . . . 56--65
Joseph W. Seigh A distributed solution to the
reader--writer problem . . . . . . . . . 66--68
Hank Levy New SIGOPS dues structure . . . . . . . 1--1
Luis-Felipe Cabrera Technical summary of the second IEEE
workshop on workstation operating
systems . . . . . . . . . . . . . . . . 7--21
Vadim G. Antonov A regular architecture for operating
system . . . . . . . . . . . . . . . . . 22--39
Ming-Chit Tam and
Jonathan M. Smith and
David J. Farber A taxonomy-based comparison of several
distributed shared memory systems . . . 40--67
B. H. Tay and
A. L. Ananda A survey of remote procedure calls . . . 68--79
Andrzej Goscinski and
Mirion Bearman Resource management in large distributed
systems . . . . . . . . . . . . . . . . 7--25
Chen Jun and
Xie Li and
Sun Zhong-xiu A model for intelligent task scheduling
in a large distributed system . . . . . 26--33
Zhao Hong and
Wayne McCoy An associated object model for
distributed systems . . . . . . . . . . 34--51
Frank W. Miller Predictive deadline multi-processing . . 52--63
Don Davis and
Ralph Swick Network security via private-key
certificates . . . . . . . . . . . . . . 64--67
H. Ghosh and
S. Sreedhar A comparative study of two simple
network file access models . . . . . . . 68--77
Tai-Kuo Woo A note on Lamport's mutual exclusion
algorithm . . . . . . . . . . . . . . . 78--80
S. Haldar and
D. K. Subramanian Fairness in processor scheduling in time
sharing systems . . . . . . . . . . . . 4--18
Özalp Babao\uglu Report on the fourth ACM SIGOPS European
workshop fault tolerance support in
distributed systems . . . . . . . . . . 19--43
Keith Marzullo and
Mark Wood Making real-time reactive systems
reliable . . . . . . . . . . . . . . . . 45--48
Rivka Ladin and
Barbara Liskov and
Liuba Shrira Lazy replication: exploiting the
semantics of distributed services
(extended abstract) . . . . . . . . . . 49--55
John Wilkes and
Raymie Stata Specifying data availability in
multi-device file systems . . . . . . . 56--59
Barbara Liskov and
Robert Gruber and
Paul Johnson and
Liuba Shrira A replicated Unix file system (extended
abstract) . . . . . . . . . . . . . . . 60--64
Dean Daniels and
Roger Haskin and
Jon Reinke and
Wayne Sawdon Shared logging services for
fault-tolerant distributed computing . . 65--68
M. Banâtre and
Ph. Joubert and
Ch. Morin and
G. Muller and
B. Rochat and
P. Sanchez Stable transactional memories and fault
tolerant architectures . . . . . . . . . 68--72
Andrew P. Black Understanding transactions in the
operating system context . . . . . . . . 73--76
James Jay Kistler and
M. Satyanarayanan Transparent disconnected operation for
fault-tolerance . . . . . . . . . . . . 77--80
Jerome H. Saltzer Fault-tolerance in very large archival
systems . . . . . . . . . . . . . . . . 81--82
Andrew Birrell Position paper for SIGOPS workshop on
fault tolerance support in distributed
systems . . . . . . . . . . . . . . . . 83--84
Maria D. Maggio and
David W. Krumme A flexible system call interface for
interprocessor communication in a
distributed memory multicomputer . . . . 4--21
Yasuhiko Yokote and
Fumio Teraoka and
Atsushi Mitsuzawa and
Nobuhisa Fujinami and
Mario Tokoro The muse object architecture: a new
operating system structuring concept . . 22--46
Michel Raynal A simple taxonomy for distributed mutual
exclusion algorithms . . . . . . . . . . 47--50
Jochen Liedtke and
Ulrich Bartling and
Uwe Beyer and
Dietmar Heinrichs and
Rudolf Ruland and
Gyula Szalay Two years of experience with a
$\mu$-kernel based OS . . . . . . . . . 51--62
Jonathan D. Moffett and
Morris S. Sloman Content-dependent access control . . . . 63--70
M. Frans Kaashoek and
Andrew S. Tanenbaum Fault tolerance using group
communication . . . . . . . . . . . . . 71--74
Pat Stephenson and
Kenneth Birman Fast causal multicast . . . . . . . . . 75--79
G. Le Lann and
G. Bres Reliable atomic broadcast in distributed
systems with omission faults . . . . . . 80--86
Pascale Minet and
Emmanuelle Anceaume Atomic broadcast in one phase . . . . . 87--90
David F. Bacon Transparent recovery in distributed
systems (position paper) . . . . . . . . 91--94
Mary Baker and
John Ousterhout Availability in the Sprite distributed
file system . . . . . . . . . . . . . . 95--98
David B. Johnson and
Willy Zwaenepoel Transparent optimistic rollback recovery 99--102
Kenneth Birman and
Robert Cooper The ISIS project: real experience with a
fault tolerant programming system . . . 103--107
Liam Casey Lessons from Norstar's distributed call
processing system . . . . . . . . . . . 108--111
Gita Gopal and
Nancy D. Griffeth Software fault tolerance in
telecommunications systems . . . . . . . 112--116
Flaviu Cristian Fault-Tolerance in the Advanced
Automation System . . . . . . . . . . . 117--121
Daniel L. McCue and
Santosh K. Shrivastava Structuring fault-tolerant object
systems for portability . . . . . . . . 118--121
David Powell and
Marc Chér\`eque and
David Drackley Fault-tolerance in Delta-4 . . . . . . . 122--125
J. Nehmer and
T. Becker A fault tolerance approach for
distributed ISDN control systems . . . . 126--129
Brendan Tangney and
Vinny Cahill and
Chris Horn and
Dominic Herity and
Alan Judge and
Gradimir Starovic and
Mark Sheppard Some ideas on support for fault
tolerance in COMANDOS, an object
oriented distributed system . . . . . . 130--135
Andrew Wolfe and
John P. Shen A variable instruction stream extension
to the VLIW architecture . . . . . . . . 2--14
Manolis Katevenis and
Nestoras Tzartzanis Reducing the branch penalty by
rearranging instructions in a
double-width memory . . . . . . . . . . 15--27
Roland L. Lee and
Alex Y. Kwok and
Fayé A. Briggs The floating-point performance of a
superscalar SPARC processor . . . . . . 28--37
David Callahan and
Ken Kennedy and
Allan Porterfield Software prefetching . . . . . . . . . . 40--52
Gurindar S. Sohi and
Manoj Franklin High-bandwidth data memory systems for
superscalar processors . . . . . . . . . 53--62
Monica D. Lam and
Edward E. Rothberg and
Michael E. Wolf The cache performance and optimizations
of blocked algorithms . . . . . . . . . 63--74
Jeffrey C. Mogul and
Anita Borg The effect of context switches on cache
performance . . . . . . . . . . . . . . 75--84
David Keppel A portable interface for on-the-fly
instruction space modification . . . . . 86--95
Andrew W. Appel and
Kai Li Virtual memory primitives for user
programs . . . . . . . . . . . . . . . . 96--107
Thomas E. Anderson and
Henry M. Levy and
Brian N. Bershad and
Edward D. Lazowska The interaction of architecture and
operating system design . . . . . . . . 108--120
David G. Bradlee and
Susan J. Eggers and
Robert R. Henry Integrating register allocation and
instruction scheduling for RISCs . . . . 122--131
Manuel E. Benitez and
Jack W. Davidson Code generation for streaming: an
access/execute mechanism . . . . . . . . 132--141
Rajive Bagrodia and
Sharad Mathur Efficient implementation of high-level
parallel programs . . . . . . . . . . . 142--151
William Mangione-Smith and
Santosh G. Abraham and
Edward S. Davidson Vector register design for polycyclic
vector scheduling . . . . . . . . . . . 154--163
David E. Culler and
Anurag Sah and
Klaus E. Schauser and
Thorsten von Eicken and
John Wawrzynek Fine-grain parallelism with minimal
hardware support: a compiler-controlled
threaded abstract machine . . . . . . . 164--175
David W. Wall Limits of instruction-level parallelism 176--188
Edward K. Lee and
Randy H. Katz Performance consequences of parity
placement in disk arrays . . . . . . . . 190--199
Vincent Cate and
Thomas Gross Combining the concepts of compression
and caching for a two-level filesystem 200--211
William J. Bolosky and
Michael L. Scott and
Robert P. Fitzgerald and
Robert J. Fowler and
Alan L. Cox NUMA policies and their relation to
memory architecture . . . . . . . . . . 212--221
David Chaiken and
John Kubiatowicz and
Anant Agarwal LimitLESS directories: A scalable cache
coherence scheme . . . . . . . . . . . . 224--234
Sang L. Min and
Jong-Deok Choi An efficient cache-based access anomaly
detection scheme . . . . . . . . . . . . 235--244
Kourosh Gharachorloo and
Anoop Gupta and
John Hennessy Performance evaluation of memory
consistency models for shared-memory
multiprocessors . . . . . . . . . . . . 245--257
Eric Freudenthal and
Allan Gottlieb Process coordination with
fetch-and-increment . . . . . . . . . . 260--268
John M. Mellor-Crummey and
Michael L. Scott Synchronization without contention . . . 269--278
Douglas Johnson The case for a read barrier . . . . . . 279--287
Robert F. Cmelik and
Shing I. Kong and
David R. Ditzel and
Edmund J. Kelly An analysis of MIPS and SPARC
instruction set utilization on the SPEC
benchmarks . . . . . . . . . . . . . . . 290--302
C. Brian Hall and
Kevin O'Brien Performance characteristics of
architectural features of the IBM RISC
System/6000 . . . . . . . . . . . . . . 303--309
Dileep Bhandarkar and
Douglas W. Clark Performance from architecture: comparing
a RISC and a CISC with similar hardware
organization . . . . . . . . . . . . . . 310--319
David B. Wagner and
Carl Ponder Book Review: \em The Art of Computer
Systems Performance Analysis by Raj
Jain: (John Wiley and Sons, Inc., New
York 1991) . . . . . . . . . . . . . . . 7--9
Garbriel Broner and
Patrick Powell Intelligent I/O rule-based input/output
processing for operating systems . . . . 10--26
Neil Dunstan Semaphores for fair scheduling monitor
conditions . . . . . . . . . . . . . . . 27--31
G. Aguirre and
M. Errecalde and
R. Guerrero and
C. Kavka and
G. Leguizamon and
M. Printista and
R. Gallard Experiencing Minix as a didactical aid
for operating systems courses . . . . . 32--39
Allison J. Mull and
P. Tobin Maginnis Evolutionary steps toward a distributed
operating system: theory and
implementation . . . . . . . . . . . . . 4--13
Mark Hayter and
Derek McAuley The desk area network . . . . . . . . . 14--21
Jorge Buenabadd Chávez XINIX time-sharing operating system . . 22--34
Karsten Schwan and
Hongyi Zhou and
Ahmed Gheith Real-time threads . . . . . . . . . . . 35--46
Jean Bacon and
Ken Moody and
Sue Thomson and
Tim Wilson A multi-service storage architecture . . 47--65
Dan Oestreicher A simple reliable globally-ordered
broadcast service . . . . . . . . . . . 66--76
Kwok-yan Lam An implementation for small databases
with high availability . . . . . . . . . 77--77
Mendel Rosenblum and
John K. Ousterhout The design and implementation of a
log-structured file system . . . . . . . 1--15
David K. Gifford and
Pierre Jouvelot and
Mark A. Sheldon and
James W. O'Toole, Jr. Semantic file systems . . . . . . . . . 16--25
Raj Vaswani and
John Zahorjan The implications of cache affinity on
processor scheduling for
multiprogrammed, shared memory
multiprocessors . . . . . . . . . . . . 26--40
Anna R. Karlin and
Kai Li and
Mark S. Manasse and
Susan Owicki Empirical studies of competitive
spinning for a shared-memory
multiprocessor . . . . . . . . . . . . . 41--55
Keith Muller and
Joseph Pasquale A high performance multi-structured file
system design . . . . . . . . . . . . . 56--67
Ramesh Govindan and
David P. Anderson Scheduling and IPC mechanisms for
continuous media . . . . . . . . . . . . 68--80
P. Venkat Rangan and
Harrick M. Vin Designing file systems for digital video
and audio . . . . . . . . . . . . . . . 81--94
Thomas E. Anderson and
Brian N. Bershad and
Edward D. Lazowska and
Henry M. Levy Scheduler activations: effective kernel
support for the user-level management of
parallelism . . . . . . . . . . . . . . 95--109
Brian D. Marsh and
Michael L. Scott and
Thomas J. LeBlanc and
Evangelos P. Markatos First-class user-level threads . . . . . 110--121
Richard P. Draves and
Brian N. Bershad and
Richard F. Rashid and
Randall W. Dean Using continuations to implement thread
management and communication in
operating systems . . . . . . . . . . . 122--136
Richard P. LaRowe, Jr. and
Carla Schlatter Ellis and
Laurence S. Kaplan The robustness of NUMA memory management 137--151
John B. Carter and
John K. Bennett and
Willy Zwaenepoel Implementation and performance of Munin 152--164
Butler Lampson and
Martín Abadi and
Michael Burrows and
Edward Wobber Authentication in distributed systems:
theory and practice . . . . . . . . . . 165--182
Thomas L. Rodeheffer and
Michael D. Schroeder Automatic reconfiguration in Autonet . . 183--197
Mary G. Baker and
John H. Hartman and
Michael D. Kupfer and
Ken W. Shirriff and
John K. Ousterhout Measurements of a distributed file
system . . . . . . . . . . . . . . . . . 198--212
James J. Kistler and
M. Satyanarayanan Disconnected operation in the Coda file
system . . . . . . . . . . . . . . . . . 213--225
Barbara Liskov and
Sanjay Ghemawat and
Robert Gruber and
Paul Johnson and
Liuba Shrira Replication in the Harp file system . . 226--238
Frank Schmuck and
Jim Wylie Experience with transactions in
QuickSilver . . . . . . . . . . . . . . 239--253
Edward D. Lazowska 13th ACM Symposium on Operating Systems
Principles: panel session presentations 3--17
Barton P. Miller and
Charles McDowell Summary of ACM/ONR workshop on parallel
and distributed debugging . . . . . . . 18--31
Mahmoud Dasser TOMP a total ordering multicast protocol 32--40
Michel Raynal About logical clocks for distributed
systems . . . . . . . . . . . . . . . . 41--48
Li Gong A security risk of depending on
synchronized clocks . . . . . . . . . . 49--53
Karsten Schwan and
Hongyi Zhou Multiprocessor real-time threads . . . . 54--65
Zhao Hong and
Huatian Li A mechanism of process group for
application reliability in distributed
systems . . . . . . . . . . . . . . . . 66--77
S. Halder and
K. Vidyasankar Counterexamples to a one writer
multireader atomic variable construction
of Burns and Peterson . . . . . . . . . 78--87
Edward D. Lazowska 13th ACM Symposium on Operating Systems
Principles: ``Work in Progress'';
abstracts . . . . . . . . . . . . . . . 7--7
Henry Massalin and
Calton Pu A Lock-Free Multiprocessor OS Kernel . . 8--8
Jeff Chase and
Miche Baker-Harvey and
Hank Levy and
Ed Lazowska Opal: A Single Address Space System for
64-bit Architectures . . . . . . . . . . 9--9
Daniel Duchamp Systems Software for Wireless Mobile
Computing . . . . . . . . . . . . . . . 10--10
John Wilkes and
Chia Chao and
Robert English and
David Jacobson and
Bart Sears and
Carl Staelin and
Alex Stepanov DataMesh parallel storage servers . . . 11--11
Maurice Herlihy A Methodology for Implementing Highly
Concurrent Data Objects . . . . . . . . 12--12
Rick LaRowe Operating Systems Research Related to
the Galactica Net Architecture . . . . . 13--13
Joseph Pasquale Project Sequoia 2000 . . . . . . . . . . 14--14
Cheryl A. Wiecek VMS on Mach . . . . . . . . . . . . . . 15--15
Kevin Jeffay Network and Operating System Support for
Digital Audio and Video . . . . . . . . 16--16
B. Clifford Neuman The Virtual System Project . . . . . . . 17--17
Bruce K. Hillyer and
Bethany S. Robinson The BBFS Filesystem Model . . . . . . . 18--18
Kieran Harty and
David R. Cheriton Application-Controlled Physical Memory
using External Page-Cache Management . . 19--19
Michael Wayne Young Episode: Lazy Transactions for
Filesystem Meta-Data Updates . . . . . . 20--20
Michael B. Jones A Toolkit for Interposing User Code at
the System Interface . . . . . . . . . . 21--21
Peter Druschel Modularity and Protection are
Orthogonal, or ``Why $\mu$-kernel
Architectures are Flawed'' . . . . . . . 22--22
Keith Marzullo and
Mark D. Wood A Toolkit for Building Reactive Systems
or A Minute on Meta . . . . . . . . . . 23--23
William E. Weihl Prelude: Tools for Building Portable
Parallel Programs . . . . . . . . . . . 24--24
Sharon E. Perl Performance Assertion Checking . . . . . 25--25
Richard G. Guy and
John S. Heidemann and
Thomas W. Page, Jr. The Ficus Replicated File System . . . . 26--26
Michael Reiter Integrating Security in a Group Oriented
Distributed System . . . . . . . . . . . 27--27
Jonathan Walpole and
Richard Staehli Supporting Access to Stored Multimedia
Data in Large Distributed Systems Work
in Progress . . . . . . . . . . . . . . 28--28
M. Frans Kaashoek and
Robbert van Renesse and
Hans van Staveren and
Andrew S. Tanenbaum FLIP; an Internetwork Protocol for
Supporting Distributed Systems . . . . . 29--29
Ross Finlayson Structuring and Communication in the
Vanguard OS Kernel . . . . . . . . . . . 30--30
Robbert van Rennesse Design and Implementation of a Multicast
Transport Service . . . . . . . . . . . 31--31
Ralf Guido Herrtwich Summary of the Second International
Workshop on Network and Operating System
Support for Digital Audio and Video . . 32--59
Rex E. Gantenbein An annotated bibliography of dependable
distributed computing . . . . . . . . . 60--81
Cui-Qing Yang Distributed computing in a NUMP
(Non-Uniform Message-Passing)
environment . . . . . . . . . . . . . . 82--91
A. L. Ananda and
B. H. Tay and
E. K. Koh A survey of asynchronous remote
procedure calls . . . . . . . . . . . . 92--109
Henry Massalin and
Calton Pu A Lock-Free Multiprocessor OS Kernel . . 108--108
Sadegh Davari and
Lui Sha Sources of unbounded priority inversions
in real-time systems and a comparative
study of possible solutions . . . . . . 110--120
R. Ananthanarayanan and
Sathis Menon and
Ajay Mohindra and
Umakishore Ramachandran Experiences in integrating distributed
shared memory with virtual memory
management . . . . . . . . . . . . . . . 4--26
G. O'Shea Redundant rights in protection systems 27--30
Ralph C. Hilzer, Jr. Synchronization of the producer/consumer
problem using semaphores, monitors, and
the Ada rendezvous . . . . . . . . . . . 31--39
Frank W. Miller The performance of a mixed priority
real-time scheduling algorithm . . . . . 5--13
Jon Inouye and
Ravindranath Konuru and
Jonathan Walpole and
Bart Sears The effects of virtually addressed
caches on virtual memory design and
performance . . . . . . . . . . . . . . 14--29
Uwe M. Borghoff Design of optimal distributed file
systems: a framework for research . . . 30--61
Jiannong Cao and
K. C. Wang An abstract model of rollback recovery
control in distributed systems . . . . . 62--76
G. Florin C. Toinard A new way to design causally and totally
ordered multicast protocols . . . . . . 77--83
A. Kehne and
J. Schönwälder and
H. Langendörfer A nonce-based protocol for multiple
authentications . . . . . . . . . . . . 84--89
James D. Mooney The CTRON approach to operating system
support for software portability . . . . 90--97
Michael Kifer and
Scott A. Smolka OSP: an environment for operating system
projects . . . . . . . . . . . . . . . . 98--100
Bruce K. Haddon Book Review: \em Global Software:
Developing Applications for the
International Market by Dave Taylor:
(Springer-Verlag, New York 1992) . . . . 5--6
Alberto Bartoli and
Sape J. Mullender and
Martijn van der Valk Wide-address spaces: exploring the
design space . . . . . . . . . . . . . . 11--17
David Mosberger Memory consistency models . . . . . . . 18--26
Djemal H. Abawajy Orphan problems and remedies in
distributed systems . . . . . . . . . . 27--32
Marie Rose Low and
Bruce Christianson Fine grained object protection in UNIX 33--50
Ted Hills Structured interrupts . . . . . . . . . 51--68
Ian M. Leslie and
Derek McAuley and
Sape J. Mullender Pegasus---operating system support for
distributed multimedia systems . . . . . 69--78
R. Guerrero and
L. Leguizamon and
R. Gallard Implementation and evaluation of
alternative process schedulers in MINIX 79--100
K. C. Wong Determining the shortest process
migration paths for program compilation
using a dynamic programming approach . . 1--6
Darrell D. E. Long A note on bit-mapped free sector
management . . . . . . . . . . . . . . . 7--9
B. Clifford Neuman and
Stuart G. Stubblebine A note on the use of timestamps as
nonces . . . . . . . . . . . . . . . . . 10--14
B. R. Badrinath and
Arup Acharya and
Tomasz Imieli\'nski Impact of mobility on distributed
computations . . . . . . . . . . . . . . 15--20
R. Hugo Patterson and
Garth A. Gibson and
M. Satyanarayanan A status report on research in
transparent informed prefetching . . . . 21--34
C. Kavka and
M. Printista and
R. Gallard Extending device management in Minix . . 35--43
Robbert van Renesse Causal controversy at Le Mont St.-Michel 44--53
C. Bryce and
D. Hagimont and
P. Joubert and
C. Morin and
G. Muller and
B. Rochat Models and paradigms for distributed
systems structuring: summary of sessions 56--60
Jeff Chase and
Valérie Issarnay and
Hank Levy Distribution in a single address space
operating system . . . . . . . . . . . . 61--65
Calton Pu Relaxing the limitations of serializable
transactions in distributed systems . . 66--71
Rob Pike and
Dave Presotto and
Ken Thompson and
Howard Trickey and
Phil Winterbottom The use of name spaces in Plan 9 . . . . 72--76
Jerome H. Saltzer Needed: a systematic structuring
paradigm for distributed data . . . . . 77--81
Carlos Almeida and
Brad Glade and
Keith Marzullo High availability in a real-time system 82--87
Fred Douglis On the role of compression in
distributed systems . . . . . . . . . . 88--93
Larry L. Peterson Life on the OS/network boundary . . . . 94--98
Robert Stroud Transparency and reflection in
distributed systems . . . . . . . . . . 99--103
John Wilkes DataMesh, house-building, and
distributed systems technology . . . . . 104--108
A. K. Yeo and
A. L. Ananda and
E. K. Koh A taxonomy of issues in name systems
design and implementation . . . . . . . 4--18
R. Gopalakrishnan and
Andreas D. Bovopoulos A protocol processing architecture for
networked multimedia computers . . . . . 19--33
Prasad Raja and
Guevara Noubir Static and dynamic polling mechanisms
for Fieldbus networks . . . . . . . . . 34--45
P. Krishna Reddy and
S. Bhalla A non-blocking transaction data flow
graph based approach for replicated data 46--54
Zhonghua Yang and
T. Anthony Marsland Annotated bibliography on global states
and times in distributed systems . . . . 55--74
Xingwei Wang and
Hong Zhao and
Jiakeng Zhu GRPC: a communication cooperation
mechanism in distributed systems . . . . 75--86
Jiubin Ju and
Gaochao Xu and
Jie Tao Parallel computing using idle
workstations . . . . . . . . . . . . . . 87--96
Christophe Haro and
Christian Proust A multitasking executive for operating
systems courses . . . . . . . . . . . . 97--107
Barton P. Miller and
Charles McDowell Summary of ACM/ONR workshop on parallel
and distributed debugging . . . . . . . 8--23
Paul Syverson On key distribution protocols for
repeated authentication . . . . . . . . 24--30
Armin Liebl Authentication in distributed systems: a
bibliography . . . . . . . . . . . . . . 31--41
Claudio Calvelli and
Vijay Varadharajan Authentication and revocation in SPM
extended abstract . . . . . . . . . . . 42--57
Alexander B. Romanovsky Fault tolerance: synchronization of
redundancy . . . . . . . . . . . . . . . 58--66
Mohamed Naimi Distributed algorithm for K-entries to
critical section based on the directed
graphs . . . . . . . . . . . . . . . . . 67--75
P. Ciancarini and
N. Guerrini Linda meets Minix . . . . . . . . . . . 76--92
Yousef A. Khalidi and
Michael N. Nelson Extensible file systems in spring . . . 1--14
Wiebren de Jonge and
M. Frans Kaashoek and
Wilson C. Hsieh The Logical Disk: a new approach to
improving file systems . . . . . . . . . 15--28
John H. Hartman and
John K. Ousterhout The Zebra striped network file system 29--43
David R. Cheriton and
Dale Skeen Understanding the limitations of
causally and totally ordered
communication . . . . . . . . . . . . . 44--57
Brian Oki and
Manfred Pfluegl and
Alex Siegel and
Dale Skeen The Information Bus: an architecture for
extensible distributed systems . . . . . 58--68
Graham Hamilton and
Michael L. Powell and
James G. Mitchell Subcontract: a flexible base for
distributed programming . . . . . . . . 69--79
Michael B. Jones Interposition agents: transparently
interposing user code at the system
interface . . . . . . . . . . . . . . . 80--93
Carl Hauser and
Christian Jacobi and
Marvin Theimer and
Brent Welch and
Mark Weiser Using threads in interactive systems: a
case study . . . . . . . . . . . . . . . 94--105
Antony L. Hosking and
J. Eliot B. Moss Protection traps and alternatives for
memory management of an object-oriented
language . . . . . . . . . . . . . . . . 106--119
J. Bradley Chen and
Brian N. Bershad The impact of operating system structure
on memory system performance . . . . . . 120--133
Sharon E. Perl and
William E. Weihl Performance assertion checking . . . . . 134--145
M. Satyanarayanan and
Henry H. Mashburn and
Puneet Kumar and
David C. Steere and
James J. Kistler Lightweight recoverable virtual memory 146--160
James O'Toole and
Scott Nettles and
David Gifford Concurrent compacting garbage collection
of a persistent heap . . . . . . . . . . 161--174
Jochen Liedtke Improving IPC by kernel design . . . . . 175--188
Peter Druschel and
Larry L. Peterson Fbufs: a high-bandwidth cross-domain
transfer facility . . . . . . . . . . . 189--202
Robert Wahbe and
Steven Lucco and
Thomas E. Anderson and
Susan L. Graham Efficient software-based fault isolation 203--216
Andrew Birrell and
Greg Nelson and
Susan Owicki and
Edward Wobber Network objects . . . . . . . . . . . . 217--230
Alan Jones and
Andrew Hopper Handling audio and video streams in a
distributed environment . . . . . . . . 231--243
Chris Maeda and
Brian N. Bershad Protocol service decomposition for
high-performance networking . . . . . . 244--255
Edward Wobber and
Martín Abadi and
Michael Burrows and
Butler Lampson Authentication in the Taos operating
system . . . . . . . . . . . . . . . . . 256--269
Mike Spreitzer and
Marvin Theimer Providing location information in a
ubiquitous computing environment (panel
session) . . . . . . . . . . . . . . . . 270--283
Gary J. Nutt Book Review: \em Coloured Petri Nets:
Basic Concepts, Analysis Methods and
Practical Use (volume 1) by Kurt Jensen:
(Springer-Verlag, 1992) . . . . . . . . 1--2
Dinesh C. Kulkarni and
Arindam Banerji and
David L. Cohn Operating systems and cost management 5--10
Ken Birman A response to Cheriton and Skeen's
criticism of causal and totally ordered
communication . . . . . . . . . . . . . 11--21
Robbert van Renesse Why bother with CATOCS? . . . . . . . . 22--27
Robert Cooper Experience with causally and totally
ordered communication support: a
cautionary tale . . . . . . . . . . . . 28--31
Bodhisattwa Mukherjee and
Greg Eisenhauer and
Kaushik Ghosh A machine independent interface for
lightweight threads . . . . . . . . . . 33--47
Bill Mahoney An ``open'' oriented file system . . . . 48--54
L. Mummert and
M. Satyanarayanan Variable granularity cache coherence . . 55--60
Jochen Liedtke A short note on implementing ``new''
machine instructions by software for
efficient test of page accessibility . . 61--65
K. Benmohammed-Mahieddine and
P. M. Dew A periodic symmetrically-initiated load
balancing algorithm for distributed
systems . . . . . . . . . . . . . . . . 66--79
Abdelmadjid Bouabdallah On mutual exclusion in faulty
distributed systems . . . . . . . . . . 80--87
Chris Zimmermann Making distributed multimedia systems
secure: the switchboard approach . . . . 88--100
William M. Waite Book Review: \em Programming with MOTIF
by Keith D. Gregory: (Springer-Verlag,
New York 1992) . . . . . . . . . . . . . 100--100
Todd Valentic Book Review: \em High-Speed Windows
Applications: Multitasking Design
Methods by Bruce E. Krell: (Bantam
Books, New York 1993) . . . . . . . . . 4--5
Michael Lightner Book Review: \em \TeX in Practice,
Volumes 1--4 by Stephan von
Bechtolsheim: (Springer-Verlag, New York
1993) . . . . . . . . . . . . . . . . . 6--8
Maurice Wilkes Operating systems in a changing world 9--21
G. S. Blair and
A. Campbell and
G. Coulson and
N. Davies and
F. Garcia and
D. Shepherd Summary of the 4th International
Workshop on Network and Operating System
Support for Digital Audio and Video
(NOSSDAV'93) . . . . . . . . . . . . . . 22--33
G. Aguirre and
M. Errecalde and
S. Esquivel and
G. Leguizamon and
R. Gallard Design features of high level layers in
LAHNOS, a local area heterogeneous
network operating system . . . . . . . . 34--50
Lars C. Wolf and
R. G. Herrtwich The system architecture of the
Heidelberg transport system . . . . . . 51--64
Eddy Fromentin and
Michel Raynal Local states in distributed
computations: a few relations and
formulas . . . . . . . . . . . . . . . . 65--72
Michael K. Gschwind FTP access as a user-defined file system 73--80
Qi Lu and
M. Satyanarayanan Isolation-only transactions for mobile
computing . . . . . . . . . . . . . . . 81--87
Pradeep Hatkanagalekar A note on structured interrupts . . . . 88--91
Joe Gwinn Some measurements of timeline gaps in
VAX/VMS . . . . . . . . . . . . . . . . 92--96
Jean Bacon and
Richard Hayton and
Sai Lai Lo and
Ken Moody Extensible access control for a
hierarchy of servers . . . . . . . . . . 4--15
Ulf Carlsen Optimal privacy and authentication on a
portable communications system . . . . . 16--23
Thomas Y. C. Woo and
Simon S. Lam A lesson on authentication protocol
design . . . . . . . . . . . . . . . . . 24--37
Jochen Liedtke A short note on implementing thread
exclusiveness and address space locking 38--42
Joel M. Crichlow Combining optimism and pessimism to
produce high availability in distributed
transaction processing . . . . . . . . . 43--64
Silvano Maffeis Design and implementation of a
configurable mixed-media file system . . 4--10
Santosh K. Shrivastava To CATOCS or not to CATOCS, that is the
\ldots . . . . . . . . . . . . . . . . . 11--14
Jang Seung-Ju and
Kim Gil-Yong Spin-block synchronization algorithm in
the shared memory multiprocessor system 15--30
Ted Hills Response to a note on structured
interrupts . . . . . . . . . . . . . . . 31--33
Antônio Marinho Pilla Barcellos and
Valdir Rossi Belmonte Filho and
João Frederico Lacava Schramm and
Cláudio Fernando Resin Geyer The HetNOS network operating system: a
tool for writing distributed
applications . . . . . . . . . . . . . . 34--47
Timothy Roscoe Linkage in the Nemesis single address
space operating system . . . . . . . . . 48--55
Diomidis Spinellis Trace: a tool for logging operating
system call transactions . . . . . . . . 56--63
Mark Nuttall A brief survey of systems providing
process or object migration facilities 64--80
Chandramohan A. Thekkath and
Henry M. Levy and
Edward D. Lazowska Separating data and control transfer in
distributed operating systems . . . . . 2--11
Rohit Chandra and
Scott Devine and
Ben Verghese and
Anoop Gupta and
Mendel Rosenblum Scheduling and page migration for
multiprocessor compute servers . . . . . 12--24
Beng-Hong Lim and
Anant Agarwal Reactive synchronization algorithms for
multiprocessors . . . . . . . . . . . . 25--35
John Heinlein and
Kourosh Gharachorloo and
Scott Dresser and
Anoop Gupta Integration of message passing and
shared memory in the Stanford FLASH
multiprocessor . . . . . . . . . . . . . 38--50
Vijay Karamcheti and
Andrew A. Chien Software overhead in messaging layers:
where does the time go? . . . . . . . . 51--60
Satish Chandra and
James R. Larus and
Anne Rogers Where is time spent in message-passing
and shared-memory programs? . . . . . . 61--73
William J. Schmidt and
Kelvin D. Nilsen Performance of a hardware-assisted
real-time garbage collector . . . . . . 76--85
Michael Wu and
Willy Zwaenepoel eNVy: a non-volatile, main memory
storage system . . . . . . . . . . . . . 86--97
Michael Upton and
Thomas Huff and
Trevor Mudge and
Richard Brown Resource allocation in a high clock rate
microprocessor . . . . . . . . . . . . . 98--109
Chandramohan A. Thekkath and
Henry M. Levy Hardware and software support for
efficient exception handling . . . . . . 110--119
Pramod V. Argade and
David K. Charles and
Craig Taylor A technique for monitoring run-time
dynamics of an operating system and a
microprocessor executing user
applications . . . . . . . . . . . . . . 122--131
Richard Uhlig and
David Nagle and
Trevor Mudge and
Stuart Sechrest Trap-driven simulation with Tapeworm II 132--144
Ann Marie Grizzaffi Maynard and
Colette M. Donnelly and
Bret R. Olszewski Contrasting characteristics and cache
performance of technical and multi-user
commercial workloads . . . . . . . . . . 145--156
Brian N. Bershad and
Dennis Lee and
Theodore H. Romer and
J. Bradley Chen Avoiding conflict misses dynamically in
large direct-mapped caches . . . . . . . 158--170
Madhusudhan Talluri and
Mark D. Hill Surpassing the TLB performance of
superpages with less operating system
support . . . . . . . . . . . . . . . . 171--182
David M. Gallagher and
William Y. Chen and
Scott A. Mahlke and
John C. Gyllenhaal and
Wen-mei W. Hwu Dynamic memory disambiguation using the
memory conflict buffer . . . . . . . . . 183--193
Kenichi Hayashi and
Tsunehisa Doi and
Takeshi Horie and
Yoichi Koyanagi and
Osamu Shiraki and
Nobutaka Imamura and
Toshiyuki Shimizu and
Hiroaki Ishihata and
Tatsuya Shindo AP1000+: architectural support of
PUT/GET interface for parallelizing
compiler . . . . . . . . . . . . . . . . 196--207
James R. Larus and
Brad Richards and
Guhan Viswanathan LCM: memory system support for parallel
language implementation . . . . . . . . 208--218
Steven Cameron Woo and
Jaswinder Pal Singh and
John L. Hennessy The performance advantages of
integrating block data transfer in
cache-coherent multiprocessors . . . . . 219--229
Cliff Young and
Michael D. Smith Improving the accuracy of static branch
prediction using branch correlation . . 232--241
Brad Calder and
Dirk Grunwald Reducing branch costs via branch
alignment . . . . . . . . . . . . . . . 242--251
Steve Carr and
Kathryn S. McKinley and
Chau-Wen Tseng Compiler optimizations for improving
data locality . . . . . . . . . . . . . 252--262
Dawson R. Engler and
Todd A. Proebsting DCG: an efficient, retargetable dynamic
code generation system . . . . . . . . . 263--272
Mark Heinrich and
Jeffrey Kuskin and
David Ofelt and
John Heinlein and
Joel Baxter and
Jaswinder Pal Singh and
Richard Simoni and
Kourosh Gharachorloo and
David Nakahira and
Mark Horowitz and
Anoop Gupta and
Mendel Rosenblum and
John Hennessy The performance impact of flexibility in
the Stanford FLASH multiprocessor . . . 274--285
Jonas Skeppstedt and
Per Stenström Simple compiler algorithms to reduce
ownership overhead in cache coherence
protocols . . . . . . . . . . . . . . . 286--296
Ioannis Schoinas and
Babak Falsafi and
Alvin R. Lebeck and
Steven K. Reinhardt and
James R. Larus and
David A. Wood Fine-grain access control for
distributed shared memory . . . . . . . 297--306
James Laudon and
Anoop Gupta and
Mark Horowitz Interleaving: a multithreading technique
targeting multiprocessors and
workstations . . . . . . . . . . . . . . 308--318
Nicholas P. Carter and
Stephen W. Keckler and
William J. Dally Hardware support for fast
capability-based addressing . . . . . . 319--327
Radhika Thekkath and
Susan J. Eggers The effectiveness of multiple hardware
contexts . . . . . . . . . . . . . . . . 328--337
Michael Lightner Book Review: \em \TeX in Practice,
Stephan von Bechtolsheim . . . . . . . . 2--6
Jiubin Ju and
Gaochao Xu and
Kun Yang An intelligent dynamic load balancer for
workstation clusters . . . . . . . . . . 7--16
M. Cena and
M. L. Crespo and
R. Gallard Transparent remote execution in LAHNOS
by means of a neural network device . . 17--28
Li Xie and
Xing Du and
Jun Chen and
Yuhua Zheng and
Zhongxiu Sun An introduction to intelligent operating
system KZ2 . . . . . . . . . . . . . . . 29--46
Marc Shapiro Summary of the Sixth SIGOPS European
Workshop on ``Matching Operating Systems
to Application Needs'' . . . . . . . . . 47--51
M. Satyanarayanan and
Brian Noble and
Puneet Kumar and
Morgan Price Application-aware adaptation for mobile
computing . . . . . . . . . . . . . . . 52--55
Pierre Paradinas and
Jean-Jacques Vandewalle New directions for integrated circuit
cards operating systems . . . . . . . . 56--61
Özalp Babao\uglu and
André Schiper On group communication in large-scale
distributed systems . . . . . . . . . . 62--67
Dawson Dean and
Richard Zippel Matching data storage to application
needs . . . . . . . . . . . . . . . . . 68--73
Brian N. Bershad and
Craig Chambers and
Susan Eggers and
Chris Maeda and
Dylan McNamee and
Przemys\law Pardyak and
Stefan Savage and
Emin Gün Sirer SPIN---an extensible microkernel for
application-specific operating system
services . . . . . . . . . . . . . . . . 74--77
Dawson R. Engler and
M. Frans Kaashoek and
James W. O'Toole, Jr. The operating system kernel as a secure
programmable machine . . . . . . . . . . 78--82
David R. Cheriton and
Kenneth J. Duda A caching model of operating system
kernel functionality . . . . . . . . . . 83--86
Jochen Liedtke Address space sparsity and fine
granularity . . . . . . . . . . . . . . 87--90
Andrew P. Black and
Jonathan Walpole Objects to the rescue! or httpd: the
next generation operating system . . . . 91--95
Basim Kadhim Book Review: \em Linux: Unleashing the
Workstation in Your PC, Stefan Strobel
and Thomas Uhl . . . . . . . . . . . . . 2--3
M. Satyanarayanan Workshop on mobile computing systems and
applications, December 1994: digest of
proceedings . . . . . . . . . . . . . . 4--12
Timothy Roscoe CLANGER: an interpreted systems
programming language . . . . . . . . . . 13--20
Steve Kleiman and
Joe Eykholt Interrupts as threads . . . . . . . . . 21--26
William F. Klostermeyer and
Kankanahalli Srinivas Reducing disk power consumption in a
portable computer . . . . . . . . . . . 27--32
Tomas Smolik An object-oriented file system---an
example of using the class hierarchy
framework concept . . . . . . . . . . . 33--53
Wolfgang Lux Adaptable object migration: concept and
implementation . . . . . . . . . . . . . 54--69
Harald Schrimpf Migration of processes, files, and
virtual devices in the MDX operating
system . . . . . . . . . . . . . . . . . 70--81
S. Esquivel and
G. Leguizamon and
R. Gallard A quasi-optimal cluster allocation
strategy for parallel program execution
in distributed systems using genetic
algorithms . . . . . . . . . . . . . . . 82--96
William M. Waite Book Review: \em Building in Big
Brother: The Cryptographic Policy
Debate, Lance J. Hoffman . . . . . . . . 2--2
Jim Alves-Foss and
Salvador Barbosa Assessing computer security
vulnerability . . . . . . . . . . . . . 3--13
I.-Lung Kao and
Randy Chow An efficient and secure authentication
protocol using uncertified keys . . . . 14--21
Michael Steiner and
Gene Tsudik and
Michael Waidner Refinement and extension of encrypted
key exchange . . . . . . . . . . . . . . 22--30
Jochen Liedtke A short note a small virtually-addressed
control blocks . . . . . . . . . . . . . 31--34
Michael Harry and
Juan Miguel del Rosario and
Alok Choudhary The design of VIP-FS: a virtual,
parallel file system for high
performance parallel and distributed
computing . . . . . . . . . . . . . . . 35--48
Pierre Castori Semaphores revisited with MMS . . . . . 49--63
Maria Consuelo Franky DGDBM: programming support for
distributed transactions over replicated
files . . . . . . . . . . . . . . . . . 64--74
Gabriel A. Wainer Implementing real-time services in MINIX 75--84
A. B. Romanovsky Software diversity as a way to
well-structured concurrent software . . 85--90
Xiaohua Jia and
Mamoru Maekawa Operating system kernel automatic
construction . . . . . . . . . . . . . . 91--96
Sally Blackman Book Review: \em The WEB Empowerment
Book, Ralph Abraham, Frank Jas, and
Willard Russell . . . . . . . . . . . . 2--2
Basim Kadhim Book Review: \em Linux Universe, Stefan
Strobel and Thomas Uhl . . . . . . . . . 3--3
W. H. Cheung and
Anthony H. S. Loong Exploring issues of operating systems
structuring: from microkernel to
extensible systems . . . . . . . . . . . 4--16
Geoff Coulson and
Gordon Blair Architectural principles and techniques
for distributed multimedia application
support in operating systems . . . . . . 17--24
S. Petri and
H. Langendörfer Load balancing and fault tolerance in
workstation clusters migrating groups of
communicating processes . . . . . . . . 25--36
Ing-Jye Shyu and
Shiuh-Pyng Shieh Virtual address translation for
wide-address architectures . . . . . . . 37--46
Gregory F. Welch A survey of power management techniques
in mobile computing operating systems 47--56
K. R. Mayes and
S. Quick and
B. C. Warboys User-level threads on a general hardware
interface . . . . . . . . . . . . . . . 57--62
Shuichi Oikawa and
Hideyuki Tokuda Reflection of developing user-level
real-time thread packages . . . . . . . 63--76
Yun Ding and
Patrick Horster Undetectable on-line password guessing
attacks . . . . . . . . . . . . . . . . 77--86
Ping Hu and
Bruce Christianson Is your computing environment secure?:
security problems with interrupt
handling mechanisms . . . . . . . . . . 87--96
T. C. Bressoud and
F. B. Schneider Hypervisor-based fault tolerance . . . . 1--11
J. Chapin and
M. Rosenblum and
S. Devine and
T. Lahiri and
D. Teodosiu and
A. Gupta Hive: fault containment for
shared-memory multiprocessors . . . . . 12--25
D. R. Cheriton and
K. J. Duda Logged virtual memory . . . . . . . . . 26--38
T. von Eicken and
A. Basu and
V. Buch and
W. Vogels U-Net: a user-level network interface
for parallel and distributed computing
(includes URL) . . . . . . . . . . . . . 40--53
M. N. Nelson and
M. Linton and
S. Owicki A highly available scalable ITV system 54--67
B. Steensgaard and
E. Jul Object and native code thread mobility
among heterogeneous computers (includes
sources) . . . . . . . . . . . . . . . . 68--77
R. H. Patterson and
G. A. Gibson and
E. Ginting and
D. Stodolsky and
J. Zelenka Informed prefetching and caching . . . . 79--95
J. Wilkes and
R. Golding and
C. Staelin and
T. Sullivan The HP AutoRAID hierarchical storage
system . . . . . . . . . . . . . . . . . 96--108
T. E. Anderson and
M. D. Dahlin and
J. M. Neefe and
D. A. Patterson and
D. S. Roselli and
R. Y. Wang Serverless network file systems . . . . 109--126
J. Heidemann and
G. Popek Performance of cache coherence in
stackable filing . . . . . . . . . . . . 127--141
L. B. Mummert and
M. R. Ebling and
M. Satyanarayanan Exploiting weak connectivity for mobile
file access . . . . . . . . . . . . . . 143--155
A. D. Joseph and
A. F. de Lespinasse and
J. A. Tauber and
D. K. Gifford and
M. F. Kaashoek Rover: a toolkit for mobile information
access . . . . . . . . . . . . . . . . . 156--171
D. B. Terry and
M. M. Theimer and
Karin Petersen and
A. J. Demers and
M. J. Spreitzer and
C. H. Hauser Managing update conflicts in Bayou, a
weakly connected replicated storage
system . . . . . . . . . . . . . . . . . 172--182
M. Talluri and
M. D. Hill and
Y. A. Khalidi A new page table for 64-bit address
spaces . . . . . . . . . . . . . . . . . 184--200
M. J. Feeley and
W. E. Morgan and
E. P. Pighin and
A. R. Karlin and
H. M. Levy and
C. A. Thekkath Implementing global memory management in
a workstation cluster . . . . . . . . . 201--212
K. L. Johnson and
M. F. Kaashoek and
D. A. Wallach CRL: high-performance all-software
distributed shared memory . . . . . . . 213--226
Mary Baker Going threadbare (panel session): sense
or sedition? a debate on the threads
abstraction . . . . . . . . . . . . . . 227--227
Eric W. Anderson The performance of the Container
Shipping I/O system . . . . . . . . . . 229--229
Liana L. Fong and
Mark S. Squillante Time-function scheduling: a general
approach to controllable resource . . . 230--230
R. Gopalakrishnan and
Guru M. Parulkar A real-time upcall facility for protocol
processing with QoS guarantees . . . . . 231--231
Bryan Ford and
Mike Hibler and
Jay Lepreau Using annotated interface definitions to
optimize RPC . . . . . . . . . . . . . . 232--232
Jason Nieh and
Monica S. Lam SMART: a processor scheduler for
multimedia applications . . . . . . . . 233--233
James S. Gwertzman and
Margo Seltzer Autonomous replication across wide-area
internetworks . . . . . . . . . . . . . 234--234
Sanjay Ghemawat and
M. Frans Kaashoek and
Barbara Liskov Using a modified object buffer to
improve the write performance of an
object-oriented database . . . . . . . . 235--235
Mor Harchol-Balter and
Allen B. Downey Exploiting process lifetime
distributions for dynamic load balancing 236--236
J. Liedtke On micro-kernel construction . . . . . . 237--250
D. R. Engler and
M. F. Kaashoek and
J. O'Toole, Jr. Exokernel: an operating system
architecture for application-level
resource management . . . . . . . . . . 251--266
B. N. Bershad and
S. Savage and
P. Pardyak and
E. G. Sirer and
M. E. Fiuczynski and
D. Becker and
C. Chambers and
S. Eggers Extensibility safety and performance in
the SPIN operating system . . . . . . . 267--283
M. Rosenblum and
E. Bugnion and
S. A. Herrod and
E. Witchel and
A. Gupta The impact of architectural trends on
operating system performance . . . . . . 285--298
J. B. Chen and
Y. Endo and
K. Chan and
D. Mazieres and
A. Dias and
M. Seltzer and
M. D. Smith The measured performance of personal
computer operating systems . . . . . . . 299--313
C. Pu and
T. Autrey and
A. Black and
C. Consel and
C. Cowan and
J. Inouye and
L. Kethana and
J. Walpole and
K. Zhang Optimistic incremental specialization:
streamlining a commercial operating
system . . . . . . . . . . . . . . . . . 314--321
James G. Mitchell JavaOS: back to the future . . . . . . . 1--1
Todd C. Mowry and
Angela K. Demke and
Orran Krieger Automatic compiler-inserted I/O
prefetching for out-of-core applications 3--17
Tracy Kimbrel and
Andrew Tomkins and
R. Hugo Patterson and
Brian Bershad and
Pei Cao and
Edward W. Felten and
Garth A. Gibson and
Anna R. Karlin and
Kai Li A trace-driven comparison of algorithms
for parallel prefetching and caching . . 19--34
Prasenjit Sarkar and
John Hartman Efficient cooperative caching using
hints . . . . . . . . . . . . . . . . . 35--46
Dejan Perkovic and
Peter J. Keleher Online data-race detection via coherency
guarantees . . . . . . . . . . . . . . . 47--57
Manuel Costa and
Paulo Guedes and
Manuel Sequeira and
Nuno Neves and
Miguel Castro Lightweight logging for lazy release
consistent distributed shared memory . . 59--73
Yuanyuan Zhou and
Liviu Iftode and
Kai Li Performance evaluation of two home-based
lazy release consistency protocols for
shared virtual memory systems . . . . . 75--88
David Tennenhouse Active networks (abstract) . . . . . . . 89--89
Bryan Ford and
Sai Susarla CPU inheritance scheduling . . . . . . . 91--105
Pawan Goyal and
Xingang Guo and
Harrick M. Vin A hierarchical CPU scheduler for
multimedia operating systems . . . . . . 107--121
Michael Greenwald and
David Cheriton The synergy between non-blocking
synchronization and operating system
structure . . . . . . . . . . . . . . . 123--136
Bryan Ford and
Mike Hibler and
Jay Lepreau and
Patrick Tullmann and
Godmar Back and
Stephen Clawson Microkernels meet recursive virtual
machines . . . . . . . . . . . . . . . . 137--151
David Mosberger and
Larry L. Peterson Making paths explicit in the Scout
operating system . . . . . . . . . . . . 153--167
Sharon E. Perl and
Richard L. Sites Studies of Windows NT performance using
dynamic execution traces . . . . . . . . 169--183
Yasuhiro Endo and
Zheng Wang and
J. Bradley Chen and
Margo Seltzer Using latency to evaluate interactive
system performance . . . . . . . . . . . 185--199
Przemys\law Pardyak and
Brian N. Bershad Dynamic binding for an extensible system 201--212
Margo I. Seltzer and
Yasuhiro Endo and
Christopher Small and
Keith A. Smith Dealing with disaster: surviving
misbehaved kernel extensions . . . . . . 213--227
George C. Necula and
Peter Lee Safe kernel extensions without run-time
checking . . . . . . . . . . . . . . . . 229--243
Greg Buzzard and
David Jacobson and
Milon Mackey and
Scott Marovich and
John Wilkes An implementation of the Hamlyn
sender-managed interface architecture 245--259
Peter Druschel and
Gaurav Banga Lazy receiver processing (LRP): a
network subsystem architecture for
server systems . . . . . . . . . . . . . 261--275
José Carlos Brustoloni and
Peter Steenkiste Effects of buffering semantics on I/O
performance . . . . . . . . . . . . . . 277--291
Marco de Vivo Book Review: \em Distributed Operating
Systems by Andrew S. Tanenbaum . . . . . 3--3
Jochen Liedtke and
Kevin Elphinstone Guarded page tables on Mips R4600 or an
exercise in architecture-dependent micro
optimization . . . . . . . . . . . . . . 4--15
A. W. Moore and
A. J. McGregor and
J. W. Breen A comparison of system monitoring
methods, passive network monitoring and
kernel instrumentation . . . . . . . . . 16--38
M. H. Samadzadeh and
B. S. Koshy A display and analysis tool for
process-resource graphs . . . . . . . . 39--62
Rodney Van Meter A brief survey of current work on
network attached peripherals (extended
abstract) . . . . . . . . . . . . . . . 63--70
M. Rasit Eskicio\uglu A comprehensive bibliography of
distributed shared memory . . . . . . . 71--96
Zhonghua Yang and
Keith Duddy CORBA: a platform for distributed object
computing . . . . . . . . . . . . . . . 4--31
Shiuh-Pyng Shieh and
Wen-Her Yang An authentication and key distribution
system for open network systems . . . . 32--41
Yun Ding and
Patrick Horster Why the Kuperee authentication system
fails . . . . . . . . . . . . . . . . . 42--51
Ye-In Chang A dynamic request set based algorithm
for mutual exclusion in distributed
systems . . . . . . . . . . . . . . . . 52--62
David Kotz and
Nils Nieuwejaar Flexibility and performance of parallel
file systems . . . . . . . . . . . . . . 63--73
J. Carretero and
F. Pérez and
P. de Miguel and
F. García and
L. Alonso ParFiSys: a parallel file system for MPP 74--80
Roger Butenuth and
Wolfgang Burke and
Hans-Ulrich Heiß Cosy: an operating system for highly
parallel computers . . . . . . . . . . . 81--91
Jochen Liedtke A short note on cheap fine-grained time
measurement . . . . . . . . . . . . . . 92--94
Paul F. Syverson A new look at an old protocol . . . . . 1--4
K. C. Tai and
Richard H. Carver VP: a new operation for semaphores . . . 5--11
Benjamin Reed and
Darrell D. E. Long Analysis of caching algorithms for
distributed file systems . . . . . . . . 12--21
Jiubin Ju and
Yong Wang Scheduling PVM tasks . . . . . . . . . . 22--31
Vijay Varadharajan and
Phillip Allen Joint actions based authorization
schemes . . . . . . . . . . . . . . . . 32--45
Mohamed Naimi Distributed mutual exclusion on
hypercubes . . . . . . . . . . . . . . . 46--51
Rajmohan Panadiwal and
Andrzej M. Goscinski A high performance and adaptive commit
protocol for a distributed environment 52--58
H. Mountassir Decidability of a class of dual
communicating finite state machines . . 59--66
Wen-Jiin Tsai and
Suh-Yin Lee Real-time scheduling of multimedia data
retrieval to minimize buffer requirement 67--80
Ji Hua and
Xie Li A distributed computing model based on
multiserver . . . . . . . . . . . . . . 3--11
Chris J. Mitchell and
Liqun Chen Comments on the S/KEY user
authentication scheme . . . . . . . . . 12--16
Jongwoon Lee and
Sungyoung Lee and
Hyungill Kim Scheduling soft aperiodic tasks in
adaptable fixed-priority systems . . . . 17--28
John T. Robinson Analysis of steady-state segment storage
utilizations in a log-structured file
system with least-utilized segment
cleaning . . . . . . . . . . . . . . . . 29--32
T. Cornilleau and
E. Gressier-Soudan A combined-consistency approach:
sequential & causal-consistency . . . . . 33--44
Kunle Olukotun and
Basem A. Nayfeh and
Lance Hammond and
Ken Wilson and
Kunyung Chang The case for a single-chip
multiprocessor . . . . . . . . . . . . . 2--11
Vijay S. Pai and
Parthasarathy Ranganathan and
Sarita V. Adve and
Tracy Harton An evaluation of memory consistency
models for shared-memory systems with
ILP processors . . . . . . . . . . . . . 12--23
Steven L. Scott Synchronization and communication in the
T3E multiprocessor . . . . . . . . . . . 26--36
Arvind Krishnamurthy and
Klaus E. Schauser and
Chris J. Scheiman and
Randolph Y. Wang and
David E. Culler and
Katherine Yelick Evaluation of architectural support for
global address-based communication in
large-scale parallel machines . . . . . 37--48
Dirk Grunwald and
Richard Neves Whole-program optimization for time and
space efficient threads . . . . . . . . 50--59
James Philbin and
Jan Edler and
Otto J. Anshus and
Craig C. Douglas and
Kai Li Thread scheduling for cache locality . . 60--71
Peter M. Chen and
Wee Teck Ng and
Subhachandra Chandra and
Christopher Aycock and
Gurushankar Rajamani and
David Lowell The Rio file cache: surviving operating
system crashes . . . . . . . . . . . . . 74--83
Edward K. Lee and
Chandramohan A. Thekkath Petal: distributed virtual disks . . . . 84--92
Kathryn S. McKinley and
Olivier Temam A quantitative analysis of loop nest
locality . . . . . . . . . . . . . . . . 94--104
Andrew S. Huang and
John Paul Shen The intrinsic bandwidth requirements of
ordinary programs . . . . . . . . . . . 105--114
André Seznec and
Stéphan Jourdan and
Pascal Sainrat and
Pierre Michaud Multiple-block ahead branch predictors 116--127
I-Cheng K. Chen and
John T. Coffey and
Trevor N. Mudge Analysis of branch prediction via data
compression . . . . . . . . . . . . . . 128--137
Mikko H. Lipasti and
Christopher B. Wilkerson and
John Paul Shen Value locality and load value prediction 138--147
Theodore H. Romer and
Dennis Lee and
Geoffrey M. Voelker and
Alec Wolman and
Wayne A. Wong and
Jean-Loup Baer and
Brian N. Bershad and
Henry M. Levy The structure and performance of
interpreters . . . . . . . . . . . . . . 150--159
Armando Fox and
Steven D. Gribble and
Eric A. Brewer and
Elan Amir Adapting to network and client
variability via on-demand dynamic
distillation . . . . . . . . . . . . . . 160--170
Daniel J. Scales and
Kourosh Gharachorloo and
Chandramohan A. Thekkath Shasta: a low overhead, software-only
approach for supporting fine-grain
shared memory . . . . . . . . . . . . . 174--185
Sandhya Dwarkadas and
Alan L. Cox and
Willy Zwaenepoel An integrated compile-time/run-time
software distributed shared memory
system . . . . . . . . . . . . . . . . . 186--197
R. Bianchini and
L. I. Kontothanassis and
R. Pinto and
M. De Maria and
M. Abud and
C. L. Amorim Hiding communication latency and
coherence overhead in software DSMs . . 198--209
Andrew Erlichson and
Neal Nuckolls and
Greg Chesson and
John Hennessy SoftFLASH: analyzing the performance of
clustered distributed virtual shared
memory . . . . . . . . . . . . . . . . . 210--220
Chi-Keung Luk and
Todd C. Mowry Compiler-based prefetching for recursive
data structures . . . . . . . . . . . . 222--233
Mazen A. R. Saghir and
Paul Chow and
Corinna G. Lee Exploiting dual data-memory banks in
digital signal processors . . . . . . . 234--243
Edouard Bugnion and
Jennifer M. Anderson and
Todd C. Mowry and
Mendel Rosenblum and
Monica S. Lam Compiler-directed page coloring for
multiprocessors . . . . . . . . . . . . 244--255
Hervé A. Jamrozik and
Michael J. Feeley and
Geoffrey M. Voelker and
James Evans II and
Anna R. Karlin and
Henry M. Levy and
Mary K. Vernon Reducing network latency using subpages
in a global memory environment . . . . . 258--267
Jih-Kwon Peir and
Windsor W. Hsu and
Honesty Young and
Shauchi Ong Improving cache performance with
balanced tag and data paths . . . . . . 268--278
Ben Verghese and
Scott Devine and
Anoop Gupta and
Mendel Rosenblum Operating system support for improving
data locality on CC-NUMA compute servers 279--289
John T. Robinson and
Murthy V. Devarakonda Note on a problem with Reed and Long's
FBR results . . . . . . . . . . . . . . 3--4
Andrew S. Tanenbaum Report on the Seventh ACM SIGOPS
European Workshop: Systems Support for
Worldwide Applications . . . . . . . . . 5--17
M. Satyanarayanan and
Mirjana Spasojevic AFS and the Web: competitors or
collaborators? . . . . . . . . . . . . . 18--23
Dane Dwyer and
Vaduvur Bharghavan A mobility-aware file system for
partially connected operation . . . . . 24--30
Michael Richmond and
Michael Hitchens A new process migration algorithm . . . 31--42
Weiping Zhu and
Piotr Socko and
Bartek Kiepuszewski Migration impact on load balancing---an
experience on Amoeba . . . . . . . . . . 43--53
Alexander B. Romanovsky Conversational group service . . . . . . 54--63
Vijay Varadharajan Extending the Schematic Protection Model
II: revocation . . . . . . . . . . . . . 64--77
Sherali Zeadally An evaluation of the real-time
performances of SVR4.0 and SVR4.2 . . . 78--87
Marie Rose Low and
James A. Malcolm A joint authorisation scheme . . . . . . 88--96
W. M. Waite Book Review: \em PostScript &
Acrobat/PDF, Thomas Merz . . . . . . . . 1--1
W. M. Waite Book Reviews: Robert Slade's \em Guide
to Computer Viruses . . . . . . . . . . 1--1
W. M. Waite Book Reviews: \em The Web Publisher's
Illustrated Quick Reference, Ralph
Grabowski . . . . . . . . . . . . . . . 2--2
Arne Helme and
Tage Stabell-Kulò Security functions for a file repository 3--8
Tage Stabell-Kulò Security and log structured file systems 9--10
Özalp Babao\uglu and
Renzo Davoli and
Alberto Montresor Group membership and view synchrony in
partitionable asynchronous distributed
systems: specifications . . . . . . . . 11--22
Qun Li and
Hua Ji and
Li Xie Group consistency model which separates
the intra-group consistency maintenance
from the inter-group consistency
maintenance in large scale DSM systems 23--35
Luigi Rizzo A very fast algorithm for RAM
compression . . . . . . . . . . . . . . 36--45
D. Arredondo and
M. Errecalde and
F. Piccoli and
M. Printista and
R. Gallard and
s. Flores Load distribution and balancing support
in a workstation-based distributed
system . . . . . . . . . . . . . . . . . 46--59
Jonathan Karges and
Otto Ritter and
Sándor Suhai Design and implementation of a parallel
pipe . . . . . . . . . . . . . . . . . . 60--94
Keok Auyong and
Chye-Lin Chee Authentication services for computer
networks and electronic messaging
systems . . . . . . . . . . . . . . . . 3--15
Liqun Chen and
Dieter Gollmann and
Chris J. Mitchell Authentication using minimally trusted
servers . . . . . . . . . . . . . . . . 16--28
Ye-In Chang and
Yao-Jen Chang A fault-tolerant dynamic triangular mesh
protocol for distributed mutual
exclusion . . . . . . . . . . . . . . . 29--44
Jianmin Hou and
Xuandong Li and
Xiaocong Fan and
Guoliang Zheng A message-based real-time model by
object-oriented technique . . . . . . . 45--51
Carsten Vogt Visualizing UNIX synchronization
operations . . . . . . . . . . . . . . . 52--64
Vincent P. Heuring Book Review: \em Essential Java Fast,
John Cowell . . . . . . . . . . . . . . 2--2
Evangelos P. Markatos Visualizing working sets . . . . . . . . 3--11
Shouhuai Xu and
Gendu Zhang and
Hong Zhu On the properties of cryptographic
protocols and the weaknesses of the
BAN-like logics . . . . . . . . . . . . 12--23
Pascal Ledru Adaptive parallelism: an early
experiment with Java remote method
invocation . . . . . . . . . . . . . . . 24--29
Qun Li and
Jie Jing and
Li Xie BFXM: a parallel file system model based
on the mechanism of distributed shared
memory . . . . . . . . . . . . . . . . . 30--40
Weisong Shi and
Weiwu Hu and
Zhimin Tang An interaction of coherence protocols
and memory consistency models in DSM
systems . . . . . . . . . . . . . . . . 41--54
Santiago Rodríquez and
Antonio Pérez and
Rafael Méndez A new checkpoint mechanism for real time
operating systems . . . . . . . . . . . 55--62
A. Romanovsky and
A. F. Zorzo On distribution of coordinated atomic
actions . . . . . . . . . . . . . . . . 63--71
Carl Ponder Organizing UNIX directories as lattices 72--77
Yanxiang He and
Donald H. Cooley and
Jianping Zhang A model for a distributed OS automatic
generation system . . . . . . . . . . . 78--84
Yanxiang He and
Jianping Zhang and
Donald H. Cooley and
Li Chen Semantics subsystem in distributed OS
formalization generating system . . . . 85--92
Jennifer M. Anderson and
Lance M. Berc and
Jeffrey Dean and
Sanjay Ghemawat and
Monika R. Henzinger and
Shun-Tak A. Leung and
Richard L. Sites and
Mark T. Vandevoorde and
Carl A. Waldspurger and
William E. Weihl Continuous profiling: where have all the
cycles gone? . . . . . . . . . . . . . . 1--14
Xiaolan Zhang and
Zheng Wang and
Nicholas Gloy and
J. Bradley Chen and
Michael D. Smith System support for automatic profiling
and optimization . . . . . . . . . . . . 15--26
Stefan Savage and
Michael Burrows and
Greg Nelson and
Patrick Sobalvarro and
Thomas Anderson Eraser: a dynamic data race detector for
multi-threaded programs . . . . . . . . 27--37
Bryan Ford and
Godmar Back and
Greg Benson and
Jay Lepreau and
Albert Lin and
Olin Shivers The Flux OSKit: a substrate for kernel
and language research . . . . . . . . . 38--51
M. Frans Kaashoek and
Dawson R. Engler and
Gregory R. Ganger and
Hector M. Briceño and
Russell Hunt and
David Mazi\`eres and
Thomas Pinckney and
Robert Grimm and
John Jannotti and
Kenneth Mackenzie Application performance and flexibility
on exokernel systems . . . . . . . . . . 52--65
Hermann Härtig and
Michael Hohmuth and
Jochen Liedtke and
Sebastian Schönberg The performance of $\mu$-kernel-based
systems . . . . . . . . . . . . . . . . 66--77
Armando Fox and
Steven D. Gribble and
Yatin Chawathe and
Eric A. Brewer and
Paul Gauthier Cluster-based scalable network services 78--91
David E. Lowell and
Peter M. Chen Free transactions with Rio Vista . . . . 92--101
Miguel Castro and
Atul Adya and
Barbara Liskov and
Andrew C. Meyers HAC: hybrid adaptive caching for
distributed storage systems . . . . . . 102--115
Dan S. Wallach and
Dirk Balfanz and
Drew Dean and
Edward W. Felten Extensible security architectures for
Java . . . . . . . . . . . . . . . . . . 116--128
Andrew C. Myers and
Barbara Liskov A decentralized model for information
flow control . . . . . . . . . . . . . . 129--142
Edouard Bugnion and
Scott Devine and
Mendel Rosenblum Disco: running commodity operating
systems on scalable multiprocessors . . 143--156
Daniel J. Scales and
Kourosh Gharachorloo Towards transparent and efficient
software distributed shared memory . . . 157--169
Robert Stets and
Sandhya Dwarkadas and
Nikolaos Hardavellas and
Galen Hunt and
Leonidas Kontothanassis and
Srinivasan Parthasarathy and
Michael Scott Cashmere-2L: software coherent shared
memory on a clustered remote-write
network . . . . . . . . . . . . . . . . 170--183
Jason Nieh and
Monica S. Lam The design, implementation and
evaluation of SMART: a scheduler for
multimedia applications . . . . . . . . 184--197
Michael B. Jones and
Daniela Ro\csu and
Marcel-Cãtãlin Ro\csu CPU reservations and time constraints:
efficient, predictable scheduling of
independent activities . . . . . . . . . 198--211
William J. Bolosky and
Robert P. Fitzgerald and
John R. Douceur Distributed schedule management in the
Tiger video fileserver . . . . . . . . . 212--223
Chandramohan A. Thekkath and
Timothy Mann and
Edward K. Lee Frangipani: a scalable distributed file
system . . . . . . . . . . . . . . . . . 224--237
Jeanna Neefe Matthews and
Drew Roselli and
Adam M. Costello and
Randolph Y. Wang and
Thomas E. Anderson Improving the performance of
log-structured file systems with
adaptive methods . . . . . . . . . . . . 238--251
David C. Steere Exploiting the non-determinism and
asynchrony of set iterators to reduce
aggregate file I/O latency . . . . . . . 252--263
Geoffrey H. Kuenning and
Gerald J. Popek Automated hoarding for mobile computers 264--275
Brian D. Noble and
M. Satyanarayanan and
Dushyanth Narayanan and
James Eric Tilton and
Jason Flinn and
Kevin R. Walker Agile application-aware adaptation for
mobility . . . . . . . . . . . . . . . . 276--287
Karin Petersen and
Mike J. Spreitzer and
Douglas B. Terry and
Marvin M. Theimer and
Alan J. Demers Flexible update propagation for weakly
consistent replication . . . . . . . . . 288--301
Edward A. Feustel and
Terry Mayfield The DGSA: unmet information security
challenges for operating system
designers . . . . . . . . . . . . . . . 3--22
Birgit Pfitzmann and
Michael Waidner How to break fraud-detectable key
recovery . . . . . . . . . . . . . . . . 23--28
Theodore Faber Optimizing throughout in a
workstation-based network file system
over a high bandwidth local area network 29--40
Özalp Babao\uglu and
Renzo Davoli and
Alberto Montresor and
Roberto Segala System support for partition-aware
network applications . . . . . . . . . . 41--56
Yanxiang He and
Donald H. Cooley and
Jianping Zhang Planning management of multiagent-based
distributed open: computing environment
model . . . . . . . . . . . . . . . . . 57--64
W. M. Waite Is operating systems review obsolete? 1--1
Gunter Haring and
Christoph Lindemann and
Martin Reiser International workshop performance
evaluation . . . . . . . . . . . . . . . 2--3
Marco de Vivo and
Gabriela O. de Vivo and
Germinal Isern Internet security attacks at the basic
levels . . . . . . . . . . . . . . . . . 4--15
Stefanos Gritzalis and
George Aggelis Security issues surrounding programming
languages for mobile code: JAVA vs.
Safe-Tcl . . . . . . . . . . . . . . . . 16--32
Shouhuai Xu and
Gendu Zhang and
Hong Zhu On the security of three-party
cryptographic protocols . . . . . . . . 7--20
Amjad Mahmood Task allocation in distributed computing
systems . . . . . . . . . . . . . . . . 21--29
Sung-Il Kang and
Heung-Kyu Lee Analysis and solution of non-preemptive
policies for scheduling readers and
writers . . . . . . . . . . . . . . . . 30--50
George Dimitoglou Deadlocks and methods for their
detection, prevention and recovery in
modern operating systems . . . . . . . . 51--54
Sanglu Lu and
Xie Li A scalable loading balancing system for
NOWs . . . . . . . . . . . . . . . . . . 55--63
Zhonghua Yang and
Chengzheng Sun CORBA for hard real time applications:
some critical issues . . . . . . . . . . 64--71
Rajesh Bordawekar A case for compositional file systems
(extended abstract) . . . . . . . . . . 72--80
Geoffrey M. Voelker Report on the
SIGMETRICS'98/PERFORMANCE'98 Joint
International Conference on Measurement
and Modeling of Computer Systems . . . . 3--8
Ross Anderson and
Francesco Bergadano and
Bruno Crispo and
Jong-Hyeon Lee and
Charalampos Manifavas and
Roger Needham A new family of authentication protocols 9--20
Chris J. Mitchell and
Chan Yeob Yeun Fixing a problem in the Helsinki
protocol . . . . . . . . . . . . . . . . 21--24
D. Patiyoot and
S. J. Shepherd Techniques for authentication protocols
and key distribution on wireless ATM
networks . . . . . . . . . . . . . . . . 25--32
Marc Joye and
Sung-Ming Yen ID-based secret-key cryptography . . . . 33--39
Bernhard Wagner Controlling CGI programs . . . . . . . . 40--46
Winfried E. Kühnhauser A classification of interdomain actions 47--61
Stein J. Ryan Synchronization in portable device
drivers . . . . . . . . . . . . . . . . 62--69
Xiaohui Wei and
Jiubin Ju SFT: a consistent checkpointing
algorithm with shorter freezing time . . 70--76
Steven Robbins Introducing empirical investigation in
undergraduate operating systems . . . . 77--80
Keith D. Cooper and
Timothy J. Harvey Compiler-controlled memory . . . . . . . 2--11
Matthew L. Seidl and
Benjamin G. Zorn Segregating heap objects by reference
behavior and lifetime . . . . . . . . . 12--23
Michelle Mills Strout and
Larry Carter and
Jeanne Ferrante and
Beth Simon Schedule-independent storage mapping for
loops . . . . . . . . . . . . . . . . . 24--33
Avinash Sodani and
Gurindar S. Sohi An empirical analysis of instruction
repetition . . . . . . . . . . . . . . . 35--45
Walter Lee and
Rajeev Barua and
Matthew Frank and
Devabhaktuni Srikrishna and
Jonathan Babb and
Vivek Sarkar and
Saman Amarasinghe Space-time scheduling of
instruction-level parallelism on a raw
machine . . . . . . . . . . . . . . . . 46--57
Lance Hammond and
Mark Willey and
Kunle Olukotun Data speculation support for a chip
multiprocessor . . . . . . . . . . . . . 58--69
Rodney Van Meter and
Gregory G. Finn and
Steve Hotz VISA: Netstation's virtual Internet SCSI
adapter . . . . . . . . . . . . . . . . 71--80
Anurag Acharya and
Mustafa Uysal and
Joel Saltz Active disks: programming model,
algorithms and evaluation . . . . . . . 81--91
Garth A. Gibson and
David F. Nagle and
Khalil Amiri and
Jeff Butler and
Fay W. Chang and
Howard Gobioff and
Charles Hardin and
Erik Riedel and
David Rochberg and
Jim Zelenka A cost-effective, high-bandwidth storage
architecture . . . . . . . . . . . . . . 92--103
Philip Machanick and
Pierre Salverda and
Lance Pompe Hardware-software trade-offs in a direct
Rambus implementation of the RAMpage
memory hierarchy . . . . . . . . . . . . 105--114
Amir Roth and
Andreas Moshovos and
Gurindar S. Sohi Dependence based prefetching for linked
data structures . . . . . . . . . . . . 115--126
Boris Weissman Performance counters and state sharing
annotations: a unified approach to
thread locality . . . . . . . . . . . . 127--138
Brad Calder and
Chandra Krintz and
Simmi John and
Todd Austin Cache-conscious data placement . . . . . 139--149
Bich C. Le An out-of-order execution technique for
runtime binary translators . . . . . . . 151--158
Chandra Krintz and
Brad Calder and
Han Bok Lee and
Benjamin G. Zorn Overlapping execution with transfer
using non-strict execution for mobile
programs . . . . . . . . . . . . . . . . 159--169
Jared Stark and
Marius Evers and
Yale N. Patt Variable length path branch prediction 170--179
Ben Verghese and
Anoop Gupta and
Mendel Rosenblum Performance isolation: sharing and
isolation in shared-memory
multiprocessors . . . . . . . . . . . . 181--192
Yuqun Chen and
Angelos Bilas and
Stefanos N. Damianakis and
Cezary Dubnicki and
Kai Li UTLB: a mechanism for address
translation on network interfaces . . . 193--204
Vivek S. Pai and
Mohit Aron and
Gaurov Banga and
Michael Svendsen and
Peter Druschel and
Willy Zwaenepoel and
Erich Nahum Locality-aware request distribution in
cluster-based network servers . . . . . 205--216
Olivier Temam Investigating optimal local memory
performance . . . . . . . . . . . . . . 218--227
Somnath Ghosh and
Margaret Martonosi and
Sharad Malik Precise miss analysis for program
transformations with caches of arbitrary
associativity . . . . . . . . . . . . . 228--239
Jih-Kwon Peir and
Yongjoon Lee and
Windsor W. Hsu Capturing dynamic memory reference
behavior with adaptive cache topology 240--250
Daniel Citron and
Dror Feitelson and
Larry Rudolph Accelerating multi-media processing by
implementing memoing in multiplication
and division units . . . . . . . . . . . 252--261
Chao-Ying Fu and
Matthew D. Jennings and
Sergei Y. Larin and
Thomas M. Conte Value speculation scheduling for high
performance processors . . . . . . . . . 262--271
Narayan Ranganathan and
Manoj Franklin An empirical study of decentralized ILP
execution models . . . . . . . . . . . . 272--281
Eric Schnarr and
James R. Larus Fast out-of-order processor simulation
using memoization . . . . . . . . . . . 283--294
Bruce L. Jacob and
Trevor N. Mudge A look at several memory management
units, TLB-refill mechanisms, and page
table organizations . . . . . . . . . . 295--306
Parthasarathy Ranganathan and
Kourosh Gharachorloo and
Sarita V. Adve and
Luiz André Barroso Performance of database workloads on
shared-memory systems with out-of-order
processors . . . . . . . . . . . . . . . 307--318
Jean Bacon Report on the Eighth ACM SIGOPS European
Workshop . . . . . . . . . . . . . . . . 6--17
Stein J. Ryan Synchronization in portable device
drivers . . . . . . . . . . . . . . . . 18--25
Wei Xiao-Hui and
Ju Jiu-Bin SCR algorithm: saving/restoring states
of file systems . . . . . . . . . . . . 26--33
Yan Gu and
B. S. Lee and
Wentong Cai Evaluation of Java thread performance on
two different multithreaded kernels . . 34--46
Taekyoung Kwon and
Jooseok Song Clarifying straight replays and forced
delays . . . . . . . . . . . . . . . . . 47--52
Winfried E. Kühnhauser A comment on S. Kang's and H. Lee's
paper on ``Analysis and solution of
non-preemptive policies for scheduling
readers and writers'' (OSR 32(2)) . . . 4--4
Pei Dan and
Wang Dongsheng and
Zhang Youhui and
Shen Meiming Quasi-asynchronous migration: a novel
migration protocol for PVM tasks . . . . 5--14
Andrew T. Campbell and
Irene Katzela and
Kazuho Miki and
John Vicente Open Signaling for ATM, INTERNET and
Mobile Networks (OPENSIG'98) . . . . . . 15--28
Danai Patiyoot and
S. J. Shepherd WASS: wireless ATM security system . . . 29--35
Danai Patiyoot and
S. J. Shepherd Cryptographic security techniques for
wireless networks . . . . . . . . . . . 36--50
Udo Halfmann and
Winfried E. Kühnhauser Embedding security policies into a
distributed computing environment . . . 51--64
Siaw-Lynn Ng Comments on ``On the Security of
Three-Party Cryptographic Protocols'' by
Xu, Zhang, Zhu . . . . . . . . . . . . . 5--6
David Kotz and
Robert S. Gray Mobile agents and the future of the
Internet . . . . . . . . . . . . . . . . 7--13
M. Satyanarayanan and
Jason Flinn and
Kevin R. Walker Visual proxy: exploiting OS
customizations without application
source code . . . . . . . . . . . . . . 14--18
Jong-Hyeon Lee The big brother ballot . . . . . . . . . 19--25
D. Patiyoot and
S. J. Shepherd Modelling and evaluation of security
induced delay in wireless ATM networks 26--31
Hai Jin On-the-fly reconstruction of the failed
disk in RAID . . . . . . . . . . . . . . 32--42
Sung-Il Kang and
Kihyun Pyun and
Heung-Kyu Lee Performance evaluation of non-preemptive
policies for scheduling readers and
writers . . . . . . . . . . . . . . . . 43--61
M. Satyanarayanan Digest of proceedings, Seventh IEEE
Workshop on Hot Topics in Operating
Systems, March 29--30, 1999, Rio Rico,
AZ . . . . . . . . . . . . . . . . . . . 4--21
Danai Patiyoot and
S. J. Shepard Security issues in ATM networks . . . . 22--35
D. Patiyoot and
S. J. Shepherd WASS: a security services for wireless
ATM networks . . . . . . . . . . . . . . 36--41
John A. Bull and
David J. Otway A nested mutual authentication protocol 42--47
Yuqing Zhang and
Jihong Li and
Guozhen Xiao An approach to the formal verification
of the two-party cryptographic protocols 48--51
D. G. Waddington and
D. Hutchison Resource partitioning in general purpose
operating systems: experimental results
in Windows NT . . . . . . . . . . . . . 52--74
C. Toinard and
G. Florin and
C. Carrez A formal method to prove ordering
properties of multicast systems . . . . 75--75
Carlos Baquero and
Francisco Moura Using structural characteristics for
autonomous operation . . . . . . . . . . 90--96
Yasushi Saito and
Brian N. Bershad and
Henry M. Levy Manageability, availability and
performance in Porcupine: a highly
scalable, cluster-based mail service . . 1--15
Alec Wolman and
M. Voelker and
Nitin Sharma and
Neal Cardwell and
Anna Karlin and
Henry M. Levy On the scale and performance of
cooperative Web proxy caching . . . . . 16--31
Brian K. Schmidt and
Monica S. Lam and
J. Duane Northcutt The interactive performance of SLIM: a
stateless, thin-client architecture . . 32--47
Jason Flinn and
M. Satyanarayanan Energy-aware adaptation for mobile
applications . . . . . . . . . . . . . . 48--63
David Wetherall Active network vision and reality:
lessons from a capsule-based system . . 64--79
Xiaoming Liu and
Christoph Kreitz and
Robbert van Renesse and
Jason Hickey and
Mark Hayden and
Kenneth Birman and
Robert Constable Building reliable, high-performance
communication systems from components 80--92
Werner Vogels File system usage in Windows NT 4.0 . . 93--109
Douglas S. Santry and
Michael J. Feeley and
Norman C. Hutchinson and
Alistair C. Veitch and
Ross W. Carton and
Jacob Ofir Deciding when to forget in the Elephant
file system . . . . . . . . . . . . . . 110--123
David Mazi\`eres and
Michael Kaminsky and
M. Frans Kaashoek and
Emmett Witchel Separating key management from file
system security . . . . . . . . . . . . 124--139
Tzi-cker Chiueh and
Ganesh Venkitachalam and
Prashant Pradhan Integrating segmentation and paging
protection for safe, efficient and
transparent software extensions . . . . 140--153
Kinshuk Govil and
Dan Teodosiu and
Yongqiang Huang and
Mendel Rosenblum Cellular Disco: resource management
using virtual clusters on shared-memory
multiprocessors . . . . . . . . . . . . 154--169
Jonathan S. Shapiro and
Jonathan M. Smith and
David J. Farber EROS: a fast capability system . . . . . 170--185
William Adjie-Winoto and
Elliot Schwartz and
Hari Balakrishnan and
Jeremy Lilley The design and implementation of an
intentional naming system . . . . . . . 186--201
Emin Gün Sirer and
Robert Grimm and
Arthur J. Gregory and
Brian N. Bershad Design and implementation of a
distributed virtual machine for
networked computers . . . . . . . . . . 202--216
Robert Morris and
Eddie Kohler and
John Jannotti and
M. Frans Kaashoek The Click modular router . . . . . . . . 217--231
Mohit Aron and
Peter Druschel Soft timers: efficient microsecond
software timer support for network
processing . . . . . . . . . . . . . . . 232--246
John R. Douceur and
William J. Bolosky Progress-based regulation of
low-importance processes . . . . . . . . 247--260
Kenneth J. Duda and
David R. Cheriton Borrowed-virtual-time (BVT) scheduling:
supporting latency-sensitive threads in
a general-purpose scheduler . . . . . . 261--276
Khawar M. Zuberi and
Padmanabhan Pillai and
Kang G. Shin EMERALDS: a small-memory real-time
microkernel . . . . . . . . . . . . . . 277--299
Tyrone Nicholas and
Jerzy A. Barchanski Overview of TOS: a distributed
educational operating system in Java . . 2--10
Rohit Dube Scalable hierarchical coarse-grained
timers . . . . . . . . . . . . . . . . . 11--20
Yang Kun and
Guo Xin and
Liu Dayou Security in mobile agent system:
problems and approaches . . . . . . . . 21--28
Jay Lepreau and
Eric Eide Session summaries from the 17th
Symposium on Operating Systems Principle
(SOSP'99) . . . . . . . . . . . . . . . 4--5
Mark Theimer and
M. Satyanarayanan and
Maria Ebling and
Mary Baker and
Frans Kaashoek and
Jay Lepreau and
Andrew Black and
Carla Ellis Tribute to Mark Weiser (summary only) 6--7
Jerry Saltzer Copying with complexity (invited talk)
(summary only) . . . . . . . . . . . . . 7--8
Butler Lampson Computer systems research (invited talk)
(summary only): past and future . . . . 8--9
Yasushi Saito and
Brian N. Bershad and
Henry M. Levy Manageability, availability and
performance in Porcupine: a highly
scalable, cluster-based mail service
(summary only) . . . . . . . . . . . . . 9--11
Alec Wolman and
Geoffrey M. Voelker and
Nitin Sharma and
Neal Cardwell and
Anna Karlin and
Henry M. Levy On the scale and performance of
cooperative Web proxy caching . . . . . 11--12
Brian K. Schimdt and
Monica S. Lam and
J. Duane Northcut The interactive performance of SLIM: a
stateless, thin-client architecture . . 12--13
Jason Flinn and
M. Satyanarayanan Energy-aware adaptation for mobile
applications . . . . . . . . . . . . . . 13--14
David Wetherall Active network vision and reality:
lessons from a capsule-based system . . 15--16
Xiaoming Liu and
Christoph Kreitz and
Robbert van Renesse and
Jason Hickey and
Mark Hayden and
Kenneth Birman and
Robert Constable Building reliable, high-performance
communication systems from components 16--17
Werner Vogels File system usage in Windows NT 4.0 . . 17--18
Douglas S. Santry and
Michael J. Feeley and
Norman C. Hutchinson and
Alistair C. Veitch and
Ross W. Carton and
Jacob Ofir Deciding when to forget in the Elephant
file system . . . . . . . . . . . . . . 18--19
David Mazi\`eres and
Michael Kaminsky and
M. Frans Kaashoek and
Emmett Witchel Separating key management from file
system security . . . . . . . . . . . . 19--20
Tzi-Cker Chiueh and
Ganesh Venkitachalam and
Prashant Pradhan Integrating segmentation and paging
protection for safe, efficient and
transparent software extensions . . . . 20--20
Kingshuk Govil and
Dan Teodosiu and
Yongqiang Huang and
Mendel Rosenblum Cellular disco: resource management
using virtual clusters on shared-memory
multiprocessors . . . . . . . . . . . . 21--21
Jonathan S. Shapiro and
Jonathan M. Smith and
David J. Farber EROS: a fast capability system . . . . . 21--22
William Adjie-Winoto and
Elliot Schwartz and
Hari Balakrishnan and
Jeremy Lilley The design and implementation of an
intentional naming system . . . . . . . 22--22
Emin Gün Sirer and
Robert Grimm and
Arthur J. Gregory and
Brian N. Bershad Design and implementation of a
distributed virtual machine for
networked computers . . . . . . . . . . 23--23
Robert Morris and
Eddie Kohler and
John Jannotti and
M. Frans Kaashoek The click modular router . . . . . . . . 24--25
Mohit Aron and
Peter Druschel Soft timers: efficient microsecond
software timer support for network
processing . . . . . . . . . . . . . . . 25--26
John R. Douceur and
William J. Bolosky Process-based regulation of
low-importance processes . . . . . . . . 26--27
Kenneth J. Duda and
David R. Cheriton Borrowed-virtual-time (BVT) scheduling:
supporting latency-sensitive threads in
a general-purpose scheduler . . . . . . 27--28
Khawar M. Zuberi and
Padmanabhan Pillai and
Kang G. Shin EMERALDS: a small-memory real-time
microkernel . . . . . . . . . . . . . . 28--29
Marc Shapiro Lessons learned from a wide area sharing
platform . . . . . . . . . . . . . . . . 29--29
William J. Bolosky and
John R. Doucher and
Marvin Theimer Mutually-distrusting cooperative file
systems . . . . . . . . . . . . . . . . 29--30
Greg Ganger and
Steve Schlosser and
John Griffin and
David Nagle Incorporating MEMS-based storage into
computer systems . . . . . . . . . . . . 30--30
Jay Lepreau and
Chris Alfeld and
David Andersen and
Kristin Wright A highly configurable emulation facility
for distributed systems and networks . . 30--30
Umakishore Ramachandran System infrastructure for ubiquitous
presence . . . . . . . . . . . . . . . . 31--31
John Regehr and
John A. Stankovic Hierarchical schedulers, performance
guarantee, and resource management . . . 31--31
Matthew Flatt and
Alastair Reid and
Jay Lepreau CpU: practical components for systems
software . . . . . . . . . . . . . . . . 32--32
Michael L. Scott and
Sandhya Dwarkadas and
Srinivasan Parthasarathy and
Rajeev Balasubramonian and
DeQing Chen and
Grigorios Magklis and
Athanasios Papathanasiou and
Eduardo Pinheiro and
Umit Rencuzogullari and
Chunquiang Tang Interweave: object caching meets
software distributed shared memory . . . 32--32
Eyal de Lara and
Dan Wallach and
Willy Zwaenepoel Puppeteer: component-based adaptation
for mobile computing . . . . . . . . . . 33--33
Chenyang Lu and
John A. Stankovic and
Tarek Abdelzaher and
Sang H. Son and
Gang Tao Feedback control real-time scheduling:
support for performance guarantees in
unpredictable environments . . . . . . . 33--33
Yasushi Shinjo and
Calton Pu Developing correct and efficient
multithreaded programs with
thread-specific data and a partial
evaluator . . . . . . . . . . . . . . . 33--33
Haifeng Yu TACT: tunable availability and
consistency tradeoffs for replicated
Internet services . . . . . . . . . . . 33--33
Aaron Brown Towards benchmarks for maintainability,
availability and growth/evolution . . . 34--34
David Cheriton TRIAD . . . . . . . . . . . . . . . . . 34--34
Pål Halvorsen Network level framing: speeding up a
multimedia storage server . . . . . . . 34--34
Tatyana Ryutov and
Clifford Neuman Representation and evaluation of
security policies . . . . . . . . . . . 34--34
Emmanuel Cecchet Distributed shared memory for large
computing clusters based on
memory-mapped networks (poster session) 35--35
Fay Chang and
Garth Gibson Automatic generation of I/O prefetching
hints through speculative execution
(poster session) . . . . . . . . . . . . 35--35
Han Kilicote PASIS: perpetually available and secure
information systems (poster session) . . 35--35
Khalil Amiri and
David Petrou and
Greg Ganger and
Garth Gibson Automatic function placement in
distributed storage systems . . . . . . 36--36
Surendar Chandra and
Carla Schlatter Ellis and
Amin Vahdat Differentiated QoS through quality aware
transformation of Web content . . . . . 36--36
Pål Halvorsen and
Thomas Plagemann and
Vera Goebel The INSTANCE project: operating system
enhancements to support multimedia
servers . . . . . . . . . . . . . . . . 36--36
Joon Suan Ong and
Yvonne Coady and
Michael J. Feeley Integrating virtual memory with
user-level network communication . . . . 36--37
Anurag Acharya and
Maximilian Ibel and
Matthias Koelsch and
Michael Schmitt RENS: a framework for rapidly evolvable
network services . . . . . . . . . . . . 37--37
Donald Miller and
Alan Skousen The Sombrero distributed single address
space operating system . . . . . . . . . 37--37
Yasushi Negishi Tuplink: a communication system for PDAs
and micro-devices . . . . . . . . . . . 37--37
Steven D. Gribble and
Eric A. Brewer and
David Culler and
Joseph M. Hellerstein Persistent distributed data structures
to simplify cluster-based Internet
services . . . . . . . . . . . . . . . . 37--38
Eric Jul and
Povl Koch and
Jòrgen S. Hansen and
Michael Svendsen and
Kim Henriksen and
Kenn Nielsen and
Mads Dydensborg High-performance cluster-based Internet
servers . . . . . . . . . . . . . . . . 38--38
Erez Zadok and
Jason Nieh FIST: a language for stackable file
systems . . . . . . . . . . . . . . . . 38--38
Jon Howell and
David Kotz Restricted delegation: seamlessly
spanning administrative boundaries . . . 38--39
Ian McDonald Distributed, flexible memory management
in an operating system supporting
quality of service . . . . . . . . . . . 39--39
Rolf Neugebauer A Unix-like personality supporting
quality-of-service . . . . . . . . . . . 39--39
Prashant Pradhan and
Anindya Neogi Suez: high-performance real-time IP
router . . . . . . . . . . . . . . . . . 39--39
Eyal de Lara and
Dan Wallach and
Willy Zwaenepoel Puppeteer: component-based adaptation
for mobile computing (poster session) 40--40
Chenyang Lu and
John A. Stankovic and
Tarek Abdelzaher and
Sang H. Son and
Gang Tao Feedback control real-time scheduling:
support for performance guarantees in
unpredictable environments (poster
session) . . . . . . . . . . . . . . . . 40--40
Yasushi Shinjo Developing correct and efficient
multithreaded programs with
thread-specific data and a partial
evaluator . . . . . . . . . . . . . . . 40--40
Haifeng Yu TACT: tunable availability and
consistency tradeoffs for replicated
Internet services (poster session) . . . 40--40
Aaron Brown Towards benchmarks for maintainability,
availability and growth/evolution(MAGE) 41--41
David Cheriton TRIAD . . . . . . . . . . . . . . . . . 41--41
Pål Halvorsen Network level farming: speeding up a
multimedia storage server . . . . . . . 41--41
Tatyana Ryutov and
Clifford Neuman Representation and evaluation of
security policies (poster session) . . . 41--41
Yibei Ling and
Tracy Mullen and
Xiaola Lin Analysis of optimal thread pool size . . 42--55
Marc Lacoste Towards a secure platform for
distributed mobile object computing . . 56--73
Sanglu Lu and
Li Xie Scalable scheduling on a network of
workstations . . . . . . . . . . . . . . 74--83
Chen Ximing and
Lu Xianliang Runtime incremental concentrated
scheduling on NOW(NRICS) . . . . . . . . 84--96
John A. Trono and
William E. Taylor Further comments on \em ``A Correct and
Unrestrictive Implementation of General
Semaphores'' . . . . . . . . . . . . . . 5--10
Baowen Xu Tagged semaphores . . . . . . . . . . . 11--15
Pengjun Pei and
Guohua Cui and
Kun Peng On a session key compromise problem in
[KC95] protocol . . . . . . . . . . . . 16--18
Yongxing Sun and
Xinmei Wang An approach to finding the attacks on
the cryptographic protocols . . . . . . 19--28
Li Ji and
Li Tianning and
Chen Guihai and
Xie Li and
C. L. Wang Strategies optimization and integration
in DSM . . . . . . . . . . . . . . . . . 29--39
K. A. Iskra and
F. van der Linden and
Z. W. Hendrikse and
B. J. Overeinder and
G. D. van Albada and
P. M. A. Sloot The implementation of dynamite: an
environment for migrating PVM tasks . . 40--55
Chris J. Mitchell Making serial number based
authentication robust against loss of
state . . . . . . . . . . . . . . . . . 56--59
A. Bouabdallah and
C. Laforest A distributed token-based algorithm for
the dynamic resource allocation problem 60--68
G. Alan Creak and
Robert Sheehan A top-down operating systems course . . 69--80
John A. Trono Comments on \em ``Tagged semaphores'' 7--11
Chun-Li Lin and
Hung-Min Sun and
Tzonelih Hwang Three-party encrypted key exchange:
attacks and a solution . . . . . . . . . 12--20
D. M. Beder and
A. Romanovsky and
B. Randell and
C. R. Snow and
R. J. Stroud An application of fault tolerance
patterns and coordinated atomic actions
to a problem in railway scheduling . . . 21--31
M. Satyanarayanan Caching trust rather than content . . . 32--33
J. M. Sierra and
S. J. Shepherd New phase 1 exchange mode for IKE
framework . . . . . . . . . . . . . . . 34--40
Gerco Ballintijn and
Maarten van Steen Characterizing Internet performance to
support wide-area application
development . . . . . . . . . . . . . . 41--47
Michael Sonntag and
Rudolf Hörmanseder Mobile agent security based on payment 48--55
Laurence Duchien and
Gérard Florin and
Lionel Seinturier Partial order relations in distributed
object environments . . . . . . . . . . 56--75
Henri Bal and
Raoul Bhoedjang and
Rutger Hofman and
Ceriel Jacobs and
Thilo Kielmann and
Jason Maassen and
Rob van Nieuwpoort and
John Romein and
Luc Renambot and
Tim Rühl and
Ronald Veldema and
Kees Verstoep and
Aline Baggio and
Gerco Ballintijn and
Ihor Kuz and
Guillaume Pierre and
Maarten van Steen and
Andy Tanenbaum and
Gerben Doornbos and
Desmond Germans and
Hans Spoelder and
Evert-Jan Baerends and
Stan van Gisbergen and
Hamideh Afsermanesh and
Dick van Albada and
Adam Belloum and
David Dubbeldam and
Zeger Hendrikse and
Bob Hertzberger and
Alfons Hoekstra and
Kamil Iskra and
Drona Kandhai and
Dennis Koelma and
Frank van der Linden and
Benno Overeinder and
Peter Sloot and
Piero Spinnato and
Dick Epema and
Arjan van Gemund and
Pieter Jonker and
Andrei Radulescu and
Cees van Reeuwijk and
Henk Sips and
Peter Knijnenburg and
Michael Lew and
Floris Sluiter and
Lex Wolters and
Hans Blom and
Cees de Laat and
Aad van der Steen The distributed ASCI Supercomputer
project . . . . . . . . . . . . . . . . 76--96
Steven W. Schlosser and
John Linwood Griffin and
David F. Nagle and
Gregory R. Ganger Designing computer systems with
MEMS-based storage . . . . . . . . . . . 1--12
Kourosh Gharachorloo and
Madhu Sharma and
Simon Steely and
Stephen Van Doren Architecture and design of AlphaServer
GS320 . . . . . . . . . . . . . . . . . 13--24
Milo M. K. Martin and
Daniel J. Sorin and
Anatassia Ailamaki and
Alaa R. Alameldeen and
Ross M. Dickson and
Carl J. Mauer and
Kevin E. Moore and
Manoj Plakal and
Mark D. Hill and
David A. Wood Timestamp snooping: an approach for
extending SMPs . . . . . . . . . . . . . 25--36
Ashwini Nanda and
Kwok-Ken Mak and
Krishnan Sugarvanam and
Ramendra K. Sahoo and
Vijayaraghavan Soundarararjan and
T. Basil Smith MemorIES3: a programmable, real-time
hardware emulation tool for
multiprocessor server design . . . . . . 37--48
Jeff Gibson and
Robert Kunz and
David Ofelt and
Mark Horowitz and
John Hennessy and
Mark Heinrich FLASH vs. (Simulated) FLASH: closing the
simulation loop . . . . . . . . . . . . 49--58
Andy Chou and
Benjamin Chelf and
Dawson Engler and
Mark Heinrich Using meta-level compilation to check
FLASH protocol code . . . . . . . . . . 59--70
Raoul A. F. Bhoedjang and
Kees Verstoep and
Tim Rühl and
Henri E. Bal and
Rutger F. H. Hofman Evaluating design alternatives for
reliable communication on high-speed
networks . . . . . . . . . . . . . . . . 71--81
Peter Mattson and
William J. Dally and
Scott Rixner and
Ujval J. Kapasi and
John D. Owens Communication scheduling . . . . . . . . 82--92
Jason Hill and
Robert Szewczyk and
Alec Woo and
Seth Hollar and
David Culler and
Kristofer Pister System architecture directions for
networked sensors . . . . . . . . . . . 93--104
Alvin R. Lebeck and
Xiaobo Fan and
Heng Zeng and
Carla Ellis Power aware page allocation . . . . . . 105--116
Emery D. Berger and
Kathryn S. McKinley and
Robert D. Blumofe and
Paul R. Wilson Hoard: a scalable memory allocator for
multithreaded applications . . . . . . . 117--128
Kristián Flautner and
Rich Uhlig and
Steve Reinhardt and
Trevor Mudge Thread-level parallelism and interactive
performance of desktop applications . . 129--138
Motohiro Kawahito and
Hideaki Komatsu and
Toshio Nakatani Effective null pointer check elimination
utilizing hardware trap . . . . . . . . 139--149
Youtao Zhang and
Jun Yang and
Rajiv Gupta Frequent value locality and
value-centric data cache design . . . . 150--159
M. Burrows and
U. Erlingson and
S-T. A. Leung and
M. T. Vandevoorde and
C. A. Waldspurger and
K. Walker and
W. E. Weihl Efficient and flexible value sampling 160--167
David Lie Chandramohan Thekkath and
Mark Mitchell and
Patrick Lincoln and
Dan Boneh and
John Mitchell and
Mark Horowitz Architectural support for copy and
tamper resistant software . . . . . . . 168--177
Jerome Burke and
John McDonald and
Todd Austin Architectural support for fast
symmetric-key cryptography . . . . . . . 178--189
John Kubiatowicz and
David Bindel and
Yan Chen and
Steven Czerwinski and
Patrick Eaton and
Dennis Geels and
Ramakrishna Gummadi and
Sean Rhea and
Hakim Weatherspoon and
Chris Wells and
Ben Zhao OceanStore: an architecture for
global-scale persistent storage . . . . 190--201
Evelyn Duesterwald and
Vasanth Bala Software profiling for hot path
prediction: less is more . . . . . . . . 202--211
Rumi Zahir and
Jonathan Ross and
Dale Morris and
Drew Hess OS and compiler considerations in the
design of the IA-64 architecture . . . . 212--221
Daniel A. Connors and
Hillery C. Hunter and
Ben-Chung Cheng and
Wen-mei W. Hwu Hardware support for dynamic activation
of compiler-directed computation reuse 222--233
Allan Snavely and
Dean M. Tullsen Symbiotic jobscheduling for a
simultaneous multithreaded processor . . 234--244
Joshua A. Redstone and
Susan J. Eggers and
Henry M. Levy An analysis of operating system behavior
on a simultaneous multithreaded
architecture . . . . . . . . . . . . . . 245--256
Karthik Sundaramoorthy and
Zach Purser and
Eric Rotenburg Slipstream processors: improving both
performance and fault tolerance . . . . 257--268
Dongyao Ji and
Yuming Wang Comments on \em ``An approach to the
formal verification of the two-party
cryptographic protocols'' by Zhang, Li
and Xiao . . . . . . . . . . . . . . . . 6--7
Bruce K. Haddon IEEE storage system standards . . . . . 8--16
Ming-Yuan Zhu and
Lei Luo and
Guang-Zhe Xiong A provably correct operating system:
$\delta$-core . . . . . . . . . . . . . 17--33
D. Janaki Ram and
M. Uma Mahesh and
N. S. K. Chandra Sekhar and
Chitra Babu Causal consistency in mobile environment 34--40
Chun-Li Lin and
Hung-Min Sun and
Tzonelih Hwang Efficient and practical DHEKE protocols 41--47
Daniel P. Bovet and
Marco Cesati A real bottom-up operating systems
course . . . . . . . . . . . . . . . . . 48--60
Herman Chung-Hwa Rao and
Yih-Farn Chen and
Ming-Feng Chen A proxy-based personal Web archiving
service . . . . . . . . . . . . . . . . 61--72
Alberto Montresor and
Renzo Davoli and
Özalp Babao\uglu Middleware for dependable network
services in partitionable distributed
systems . . . . . . . . . . . . . . . . 73--96
Maurice Herlihy and
Srikanta Tirthapura and
Roger Wattenhofer Ordered Multicast and Distributed Swap 85--96
Greg Eisenhauer and
Fabián E. Bustamante and
Karsten Schwan A middleware toolkit for
client-initiated service specialization 7--20
Ahmed Al-Theneyan and
Piyush Mehrotra and
Mohammed Zubair Enhancing Jini for use across
non-multicastable networks . . . . . . . 21--30
Radu Litiu and
Atul Prakash DACIA: a mobile component framework for
building adaptive distributed
applications . . . . . . . . . . . . . . 31--42
Yuqing Zhang and
Chunling Wang and
Jianping Wu and
Xing Li Using SMV for cryptographic protocol
analysis: a case study . . . . . . . . . 43--50
Z. Huang and
C. Sun and
M. Purvis and
S. Cranefield View-based consistency and false sharing
effect in distributed shared memory . . 51--60
Athena Vakali and
Evimaria Terzi Multimedia data storage and
representation issues on tertiary
storage subsystems: an overview . . . . 61--77
Youhui Zhang and
Dongsheng Wang and
Weimin Zheng Transparent checkpointing and rollback
recovery mechanism for Windows NT
applications . . . . . . . . . . . . . . 78--85
M. Bozyigit and
M. Wasiq User-level process checkpoint and
restore for migration . . . . . . . . . 86--96
Jason Crampton and
George Loizou Authorisation and antichains . . . . . . 6--15
Alok Shriram and
Anuraag Sarangi and
Avinash S. ICHU model for processor allocation in
distributed operating systems . . . . . 16--21
Ming-Yuan Zhu and
Lei Luo and
Guang-Ze Xiong The minimal model of operating systems 22--29
Bu-Sung Lee and
Wen-Tong Cai and
Stephen J. Turner and
Jit-Beng Koh Comparison of network protocol and
architecture for distributed virtual
simulation environment . . . . . . . . . 30--42
Vijay Gupta A distributed backoff algorithm to
support real-time traffic on Ethernet 43--66
B. Gupta and
S. K. Banerjee A Roll-Forward Recovery Scheme for
Solving the Problem of Coasting Forward
for Distributed Systems . . . . . . . . 55--66
Jun Wen and
Xiang-liang Lu Realize network subsystem QoS guarantee 67--71
G. Saunders and
M. Hitchens and
V. Varadharajan Role-based access control and the access
control matrix . . . . . . . . . . . . . 6--20
Dan Oestreicher Experience with a commercial Java
implementation of group communication
using reliable multicast . . . . . . . . 21--31
Chang-Seop Park and
Dong-Hoon Lee Secure and efficient key management for
dynamic multicast groups . . . . . . . . 32--38
Yuhong Li and
Lars Wolf Collection of network information in
active networks . . . . . . . . . . . . 39--49
Constantinos Dovrolis and
Brad Thayer and
Parameswaran Ramanathan HIP: hybrid interrupt-polling for the
network interface . . . . . . . . . . . 50--60
Sukanya Suranauwarat and
Hideo Taniguchi The design, implementation and initial
evaluation of an advanced
knowledge-based process scheduler . . . 61--81
Tao Huang and
Teng Xu and
Xianliang Lu A high resolution disk I/O trace system 82--87
Stefan Ludwig and
Winfried Kalfa File system encryption with integrated
user management . . . . . . . . . . . . 88--93
Gu Dawu and
Wang Yi On the techniques of enhancing the
security of block ciphers . . . . . . . 94--96
Steve Zdancewic and
Lantian Zheng and
Nathaniel Nystrom and
Andrew C. Myers Untrusted hosts and confidentiality:
secure program partitioning . . . . . . 1--14
Rodrigo Rodrigues and
Miguel Castro and
Barbara Liskov BASE: using abstraction to improve fault
tolerance . . . . . . . . . . . . . . . 15--28
Haifeng Yu and
Amin Vahdat The costs and limits of availability for
replicated services . . . . . . . . . . 29--42
Andrea C. Arpaci-Dusseau and
Remzi H. Arpaci-Dusseau Information and control in gray-box
systems . . . . . . . . . . . . . . . . 43--56
Dawson Engler and
David Yu Chen and
Seth Hallem and
Andy Chou and
Benjamin Chelf Bugs as deviant behavior: a general
approach to inferring errors in systems
code . . . . . . . . . . . . . . . . . . 57--72
Andy Chou and
Junfeng Yang and
Benjamin Chelf and
Seth Hallem and
Dawson Engler An empirical study of operating systems
errors . . . . . . . . . . . . . . . . . 73--88
Padmanabhan Pillai and
Kang G. Shin Real-time dynamic voltage scaling for
low-power embedded operating systems . . 89--102
Jeffrey S. Chase and
Darrell C. Anderson and
Prachi N. Thakar and
Amin M. Vahdat and
Ronald P. Doyle Managing energy and server resources in
hosting centers . . . . . . . . . . . . 103--116
Sitaram Iyer and
Peter Druschel Anticipatory scheduling: a disk
scheduling framework to overcome
deceptive idleness in synchronous I/O 117--130
David Andersen and
Hari Balakrishnan and
Frans Kaashoek and
Robert Morris Resilient overlay networks . . . . . . . 131--145
John Heidemann and
Fabio Silva and
Chalermek Intanagonwiwat and
Ramesh Govindan and
Deborah Estrin and
Deepak Ganesan Building efficient wireless sensor
networks with low-level naming . . . . . 146--159
Alex C. Snoeren and
Kenneth Conley and
David K. Gifford Mesh-based content routing using XML . . 160--173
Athicha Muthitacharoen and
Benjie Chen and
David Mazi\`eres A low-bandwidth network file system . . 174--187
Antony Rowstron and
Peter Druschel Storage management and caching in PAST,
a large-scale, persistent peer-to-peer
storage utility . . . . . . . . . . . . 188--201
Frank Dabek and
M. Frans Kaashoek and
David Karger and
Robert Morris and
Ion Stoica Wide-area cooperative storage with CFS 202--215
Tammo Spalink and
Scott Karlin and
Larry Peterson and
Yitzchak Gottlieb Building a robust software-based router
using network processors . . . . . . . . 216--229
Matt Welsh and
David Culler and
Eric Brewer SEDA: an architecture for
well-conditioned, scalable Internet
services . . . . . . . . . . . . . . . . 230--243
Stuart Eichert and
Osman N. Ertugay and
Dan Nessett and
Suresh Vobbilisetty Commercially viable active networking 8--22
D. Patiyoot Migration /evolution of security towards
wireless ATM . . . . . . . . . . . . . . 23--30
Danai Patiyoot Security issues for wireless ATM
networks . . . . . . . . . . . . . . . . 31--57
Stephen D. Wolthusen Access and use control using externally
controlled reference monitors . . . . . 58--69
Yun Mao and
Youhui Zhang and
Dongsheng Wang and
Weimin Zheng LND: a reliable multi-tier storage
device in NOW . . . . . . . . . . . . . 70--80
Jun Wen and
Xianliang Lu The design of QoS guarantee network
subsystem . . . . . . . . . . . . . . . 81--87
Yanxiang He and
Zhuomin Du and
Xuhui Li and
Donald H. Cooley and
Jing He A field-based collaboration strategy in
MADCE . . . . . . . . . . . . . . . . . 88--96
Rimon Barr and
John C. Bicket and
Daniel S. Dantas and
Bowei Du and
T. W. Danny Kim and
Bing Zhou and
Emin Gün Sirer On the need for system-level support for
ad hoc and sensor networks . . . . . . . 1--5
Niklas Borselius and
Chris J. Mitchell and
Aaron Wilson A pragmatic alternative to undetachable
signatures . . . . . . . . . . . . . . . 6--11
Zhang Youhui and
Wang Dongsheng A checkpoint-based high availability
run-time system for Windows NT clusters 12--18
Daniel G. Waddington and
Ramesh Viswanathan Interaction points: exploiting operating
system mechanisms for inter-component
communications . . . . . . . . . . . . . 19--35
T. M. Ong and
T. M. Lim and
B. S. Lee and
C. K. Yeo Unicorn: voluntary computing over
Internet . . . . . . . . . . . . . . . . 36--51
Bi Peng and
Xie Fei and
Yang Guangwen and
Wang Dingxing A multi-protocol cross-domain
communication model for metacomputing
systems . . . . . . . . . . . . . . . . 52--63
Felix Rauch and
Thomas M. Stricker Comments on \em ``Transparent User-Level
Process Checkpoint and Restore for
Migration'' by Bozyigit and Wasiq . . . 8--9
Lu Jun and
Lu Xianliang and
Han Hong and
Wei Qingsong A cooperative asynchronous write
mechanism for NAS . . . . . . . . . . . 25--32
Yutaka Wada and
Zixue Cheng An efficient distributed method for
allocating resources based on an
unobstructed squeezing technique . . . . 33--45
Cheng-Chi Lee and
Min-Shiang Hwang and
Wei-Peng Yang A flexible remote user authentication
scheme using Smart Cards . . . . . . . . 46--52
Arun Kumar and
Neeran Karnik and
Girish Chafle Context sensitivity in role-based access
control . . . . . . . . . . . . . . . . 53--66
Laurent Amanton and
Mohamed Na\"\imi The concept of causal-phase ordering
for overlapped broadcasts . . . . . . . 67--81
C. K. Yeo and
B. S. Lee and
M. H. Er A peering architecture for ubiquitous IP
multicast streaming . . . . . . . . . . 82--95
Hong Han and
Xian Liang Lu and
Jun Lu and
Chen Bo and
Ren Li Yong Data mining aided signature discovery in
network-based intrusion detection system 7--13
Her-Tyan Yeh and
Hung-Min Sun Simple authenticated key agreement
protocol resistant to password guessing
attacks . . . . . . . . . . . . . . . . 14--22
Cheng-Chi Lee and
Li-Hua Li and
Min-Shiang Hwang A remote user authentication scheme
using hash functions . . . . . . . . . . 23--29
Niklas Borselius and
Chris J. Mitchell and
Aaron Wilson On the value of threshold signatures . . 30--35
Chao Jin and
Weimin Zheng and
Feng Zhou and
Yinghui Wu A distributed persistent object store
for scalable service . . . . . . . . . . 36--49
Lu Jun and
Lu Xianliang and
Luo Guangchun and
Han Hong and
Zhou Xu STFS: a novel file system for efficient
small writes . . . . . . . . . . . . . . 50--54
Nian-Min Yao and
Ming-Yang Zheng and
Jiu-Bin Ju Pipeline: a new architecture of high
performance servers . . . . . . . . . . 55--64
Deborah Estrin Keynote address: Sensor network
research: emerging challenges for
architecture, systems, and languages . . 1--4
Ravi Rajwar and
James R. Goodman Transactional lock-free execution of
lock-based programs . . . . . . . . . . 5--17
José F. Martínez and
Josep Torrellas Speculative synchronization: applying
thread-level speculation to explicitly
parallel applications . . . . . . . . . 18--29
Kevin M. Lepak and
Mikko H. Lipasti Temporally silent stores . . . . . . . . 30--41
Timothy Sherwood and
Erez Perelman and
Greg Hamerly and
Brad Calder Automatically characterizing large scale
program behavior . . . . . . . . . . . . 45--57
Kazunori Ogata and
Hideaki Komatsu and
Toshio Nakatani Bytecode fetch optimization for a Java
interpreter . . . . . . . . . . . . . . 58--67
Tao Li and
Lizy Kurian John and
Anand Sivasubramaniam and
N. Vijaykrishnan and
Juan Rubio Understanding and improving operating
system effects in control flow
prediction . . . . . . . . . . . . . . . 68--80
Philip Levis and
David Culler Maté: a tiny virtual machine for sensor
networks . . . . . . . . . . . . . . . . 85--95
Philo Juang and
Hidekazu Oki and
Yong Wang and
Margaret Martonosi and
Li Shiuan Peh and
Daniel Rubenstein Energy-efficient computing for wildlife
tracking: design tradeoffs and early
experiences with ZebraNet . . . . . . . 96--107
Darko Kirovski and
Milenko Drini\'c and
Miodrag Potkonjak Enabling trusted software integrity . . 108--120
Heng Zeng and
Carla S. Ellis and
Alvin R. Lebeck and
Amin Vahdat ECOSystem: managing energy as a first
class operating system resource . . . . 123--132
Raksit Ashok and
Saurabh Chheda and
Csaba Andras Moritz Cool-Mem: combining statically
speculative memory accessing with
selective address translation for energy
efficiency . . . . . . . . . . . . . . . 133--143
Ruchira Sasanka and
Christopher J. Hughes and
Sarita V. Adve Joint local and global hardware
adaptations for energy . . . . . . . . . 144--155
Dongkeun Kim and
Donald Yeung Design and evaluation of compiler
algorithms for pre-execution . . . . . . 159--170
Antonia Zhai and
Christopher B. Colohan and
J. Gregory Steffan and
Todd C. Mowry Compiler optimization of scalar value
communication between speculative
threads . . . . . . . . . . . . . . . . 171--183
Jeffrey Oplinger and
Monica S. Lam Enhancing software reliability with
speculative threads . . . . . . . . . . 184--196
J. Adam Butts and
Guri Sohi Dynamic dead-instruction detection and
elimination . . . . . . . . . . . . . . 199--210
Changkyu Kim and
Doug Burger and
Stephen W. Keckler An adaptive, non-uniform cache structure
for wire-delay dominated on-chip caches 211--222
Shubhendu S. Mukherjee and
Federico Silla and
Peter Bannon and
Joel Emer and
Steve Lang and
David Webb A comparative study of arbitration
algorithms for the Alpha 21364 pipelined
router . . . . . . . . . . . . . . . . . 223--234
Hyong-youb Kim and
Vijay S. Pai and
Scott Rixner Increasing Web server throughput with
network interface data caching . . . . . 239--250
Eddie Kohler and
Robert Morris and
Benjie Chen Programming language optimizations for
modular router configurations . . . . . 251--263
Muthian Sivathanu and
Andrea C. Arpaci-Dusseau and
Remzi H. Arpaci-Dusseau Evolving RPC for active storage . . . . 264--276
Robert Cooksey and
Stephan Jourdan and
Dirk Grunwald A stateless, content-directed data
prefetching mechanism . . . . . . . . . 279--290
Michael I. Gordon and
William Thies and
Michal Karczmarek and
Jasper Lin and
Ali S. Meli and
Andrew A. Lamb and
Chris Leger and
Jeremy Wong and
Henry Hoffmann and
David Maze and
Saman Amarasinghe A stream compiler for
communication-exposed architectures . . 291--303
Emmett Witchel and
Josh Cates and
Krste Asanovi\'c Mondrian memory protection . . . . . . . 304--316
Atul Adya and
William J. Bolosky and
Miguel Castro and
Gerald Cermak and
Ronnie Chaiken and
John R. Douceur and
Jon Howell and
Jacob R. Lorch and
Marvin Theimer and
Roger P. Wattenhofer Farsite: federated, available, and
reliable storage for an incompletely
trusted environment . . . . . . . . . . 1--14
Yasushi Saito and
Christos Karamanolis and
Magnus Karlsson and
Mallik Mahalingam Taming aggressive replication in the
Pangaea wide-area file system . . . . . 15--30
Athicha Muthitacharoen and
Robert Morris and
Thomer M. Gil and
Benjie Chen Ivy: a read/write peer-to-peer file
system . . . . . . . . . . . . . . . . . 31--44
Xiaohu Qie and
Ruoming Pang and
Larry Peterson Defensive programming: using an
annotation toolkit to build
DoS-resistant software . . . . . . . . . 45--60
Sanjeev Kumar and
Kai Li Using model checking to debug device
firmware . . . . . . . . . . . . . . . . 61--74
Madanlal Musuvathi and
David Y. W. Park and
Andy Chou and
Dawson R. Engler and
David L. Dill CMC: a pragmatic approach to model
checking real code . . . . . . . . . . . 75--88
Juan Navarro and
Sitararn Iyer and
Peter Druschel and
Alan Cox Practical, transparent operating system
support for superpages . . . . . . . . . 89--104
Krisztián Flautner and
Trevor Mudge Vertigo: automatic performance-setting
for Linux . . . . . . . . . . . . . . . 105--116
Andreas Weissel and
Björn Beutel and
Frank Bellosa Cooperative I/O: a novel I/O semantics
for energy-aware applications . . . . . 117--129
Samuel Madden and
Michael J. Franklin and
Joseph M. Hellerstein and
Wei Hong TAG: a Tiny AGgregation service for
ad-hoc sensor networks . . . . . . . . . 131--146
Jeremy Elson and
Lewis Girod and
Deborah Estrin Fine-grained network time
synchronization using reference
broadcasts . . . . . . . . . . . . . . . 147--163
Ashvin Goel and
Luca Abeni and
Charles Krasic and
Jim Snow and
Jonathan Walpole Supporting time-sensitive applications
on a commodity OS . . . . . . . . . . . 165--180
Carl A. Waldspurger Memory resource management in VMware ESX
server . . . . . . . . . . . . . . . . . 181--194
Andrew Whitaker and
Marianne Shaw and
Steven D. Gribble Scale and performance in the Denali
isolation kernel . . . . . . . . . . . . 195--209
George W. Dunlap and
Samuel T. King and
Sukru Cinar and
Murtaza A. Basrai and
Peter M. Chen ReVirt: enabling intrusion analysis
through virtual-machine logging and
replay . . . . . . . . . . . . . . . . . 211--224
Kai Shen and
Hong Tang and
Tao Yang and
Lingkun Chu Integrated resource management for
cluster-based Internet services . . . . 225--238
Bhuvan Urgaonkar and
Prashant Shenoy and
Timothy Roscoe Resource overbooking and application
profiling in shared hosting platforms 239--254
Brian White and
Jay Lepreau and
Leigh Stoller and
Robert Ricci and
Shashi Guruprasad and
Mac Newbold and
Mike Hibler and
Chad Barb and
Abhijeet Joglekar An integrated experimental environment
for distributed systems and networks . . 255--270
Amin Vahdat and
Ken Yocum and
Kevin Walsh and
Priya Mahadevan and
Dejan Kosti\'c and
Jeff Chase and
David Becker Scalability and accuracy in a
large-scale network emulator . . . . . . 271--284
Landon P. Cox and
Christopher D. Murray and
Brian D. Noble Pastiche: making backup cheap and easy 285--298
Miguel Castro and
Peter Druschel and
Ayalvadi Ganesh and
Antony Rowstron and
Dan S. Wallach Secure routing for structured
peer-to-peer overlay networks . . . . . 299--314
Stefan Saroiu and
Krishna P. Gummadi and
Richard J. Dunn and
Steven D. Gribble and
Henry M. Levy An analysis of Internet content delivery
systems . . . . . . . . . . . . . . . . 315--327
Arun Venkataramani and
Ravi Kokku and
Mike Dahlin TCP Nice: a mechanism for background
transfers . . . . . . . . . . . . . . . 329--343
Limin Wang and
Vivek Pai and
Larry Peterson The effectiveness of request redirection
on CDN robustness . . . . . . . . . . . 345--360
Steven Osman and
Dinesh Subhraveti and
Gong Su and
Jason Nieh The design and implementation of Zap: a
system for migrating computing
environments . . . . . . . . . . . . . . 361--376
Constantine P. Sapuntzakis and
Ramesh Chandra and
Ben Pfaff and
Jim Chow and
Monica S. Lam and
Mendel Rosenblum Optimizing the migration of virtual
computers . . . . . . . . . . . . . . . 377--390
Chris Hawblitzel and
Thorsten von Eicken Luna: a flexible Java protection system 391--403
Luo Guangchun and
Zhang Jun and
Lu Xianliang and
Lu Jun Active block layout: a high performance
disk layout mechanism . . . . . . . . . 5--13
Jing Liu and
Mingyang Zheng and
Jiubin Ju Offering different services by server
clusters . . . . . . . . . . . . . . . . 14--22
Youhui Zhang and
Weimin Zheng User-level communication based
cooperative caching . . . . . . . . . . 23--33
Patricia Pascal and
Thierry Monteil PAPER: influence of deterministic
customers in time sharing scheduler . . 34--45
Luo Guangchun and
Lu Xianliang and
Li Jiong and
Zhang Jun MADIDS: a novel distributed IDS based on
mobile agent . . . . . . . . . . . . . . 46--53
Gertrude Neuman Levine Defining deadlock . . . . . . . . . . . 54--64
Chih-Wei Lin and
Jau-Ji Shen and
Min-Shiang Hwang Security enhancement for Optimal
Strong-Password Authentication protocol 7--12
Sung-Woon Lee and
Woo-Hun Kim and
Hyun-Sung Kim and
Kee-Young Yoo Parallizable simple authenticated key
agreement protocol . . . . . . . . . . . 13--18
Qingsong Wei and
Xianliang Lu and
Xu Zhou DFTS: a novel distributed high
fault-tolerance storage mechanism . . . 19--24
Luo Guangchun and
Zhang Jun and
Lu Xianliang and
Lu Jun HCCM: a novel cache consistence
mechanism . . . . . . . . . . . . . . . 25--36
Kun Yang and
Xin Guo and
Alex Galis and
Bo Yang and
Dayou Liu Towards efficient resource on-demand in
Grid Computing . . . . . . . . . . . . . 37--43
Ruben Pinilla and
Marisa Gil JVM: platform independent vs.
performance dependent . . . . . . . . . 44--56
Gertrude Neuman Levine Defining deadlock with fungible
resources . . . . . . . . . . . . . . . 5--11
Chih-Wei Lin and
Jau-Ji Shen and
Min-Shiang Hwang Security enhancement for Optimal
Strong-Password Authentication Protocol 12--16
Sung-Woon Lee and
Woo-Hun Kim and
Hyun-Sung Kim and
Kee-Young Yoo Parallizable simple authenticated key
agreement protocol . . . . . . . . . . . 17--22
Lei Luo and
Ming-Yuan Zhu Partitioning based operating system: a
formal model . . . . . . . . . . . . . . 23--35
K. W. Tse and
W. K. Lam and
P. K. Lun Reservation aware operating system for
grid economy . . . . . . . . . . . . . . 36--42
S. C. Wang and
K. Q. Yan and
C. F. Cheng Asynchronous consensus protocol for the
unreliable un-fully connected network 43--54
Qingsong Wei and
Xianliang Lu and
Liyong Ren and
Xu Zhou A novel disk queue to reduce disk I/O of
messaging system . . . . . . . . . . . . 55--60
Christophe Rippert Protection in flexible operating system
architectures . . . . . . . . . . . . . 8--18
Wei-Chi Ku and
Chien-Ming Chen and
Hui-Lung Lee Weaknesses of Lee--Li--Hwang's
hash-based password authentication
scheme . . . . . . . . . . . . . . . . . 19--25
Wei-Chi Ku and
Hao-Chuan Tsai and
Shuai-Min Chen Two simple attacks on Lin--Shen--Hwang's
strong-password authentication protocol 26--31
Hyun-Sung Kim and
Sung-Woon Lee and
Kee-Young Yoo ID-based password authentication scheme
using smart cards and fingerprints . . . 32--41
Min-Shiang Hwang and
Chao-Chen Yang and
Cheng-Yeh Shiu An authentication scheme for mobile
satellite communication systems . . . . 42--47
Ruben Pinilla and
Marisa Gil ULT: a Java threads model for platform
independent execution . . . . . . . . . 48--62
Ren Liyong and
Chen Bo and
Wu Jing A novel packet-pair-based inferring
bandwidth congestion control mechanism
for layered multicast . . . . . . . . . 63--69
S. C. Wang and
K. Q. Yan and
C. F. Cheng Reaching agreement on an unknown network
with partial graphic information . . . . 70--89
Carlos Baquero and
Nuno Lopes Towards peer-to-peer content indexing 90--96
Winfried E. Kühnhauser Root Kits: an operating systems
viewpoint . . . . . . . . . . . . . . . 12--23
Sung-Woon Lee and
Hyun-Sung Kim and
Kee-Young Yoo Cryptanalysis of a user authentication
scheme using hash functions . . . . . . 24--28
Wei-Chi Ku A hash-based strong-password
authentication scheme without using
Smart Cards . . . . . . . . . . . . . . 29--34
Yuqing Zhang and
Xiuying Liu An approach to the formal verification
of the three-principal cryptographic
protocols . . . . . . . . . . . . . . . 35--42
Bu-Sung Lee and
Wing-Keong Woo and
Chai-Kiat Yeo and
Teck-Meng Lim and
Bee-Hwa Lim and
Yuxiong He and
Jie Song Secure communications between bandwidth
brokers . . . . . . . . . . . . . . . . 43--57
B. Gupta and
Z. Liu and
Z. Liang On designing direct dependency: based
fast recovery algorithms for distributed
systems . . . . . . . . . . . . . . . . 58--73
M. Bencha\"\iba and
A. Bouabdallah and
N. Badache and
M. Ahmed-Nacer Distributed mutual exclusion algorithms
in mobile ad hoc networks: an overview 74--89
Qingsong Wei and
Bo Chen and
Xianliang Lu and
Liyong Ren and
Xu Zhou The research of the distributed stripped
storage spatial model . . . . . . . . . 90--96
Jeanna Neefe Matthews The case for repeated research in
operating systems . . . . . . . . . . . 5--7
Melekam Tsegaye and
Richard Foss A comparison of the Linux and Windows
device driver architectures . . . . . . 8--33
Yuqing Zhang and
Xiuying Liu Running-mode analysis of the Security
Socket Layer protocol . . . . . . . . . 34--40
S. C. Wang and
K. Q. Yan Revisiting fault diagnosis agreement in
a new territory . . . . . . . . . . . . 41--61
Eun-Jun Yoon and
Eun-Kyung Ryu and
Kee-Young Yoo A secure user authentication scheme
using hash functions . . . . . . . . . . 62--68
Jung-Seuk Lee and
Jun-Cheol Jeon and
Kee-Young Yoo A security scheme for protecting
security policies in firewall . . . . . 69--72
Michael Scott Cryptanalysis of an ID-based password
authentication scheme using Smart Cards
and fingerprints . . . . . . . . . . . . 73--75
Min-Hui Lin and
Chin-Chen Chang A secure one-time password
authentication scheme with
low-computation for mobile
communications . . . . . . . . . . . . . 76--84
Narn-Yih Lee and
Chien-Nan Wu Improved authentication key exchange
protocol without using one-way hash
function . . . . . . . . . . . . . . . . 85--92
Cheng-Chi Lee and
Min-Shiang Hwang and
I-En Liao A server assisted authentication
protocol for detecting error vectors . . 93--96
René Serral and
Marisa Gil A Linux networking study . . . . . . . . 1--11
Yibei Ling and
Wai Chen Measuring cache freshness by additive
age . . . . . . . . . . . . . . . . . . 12--17
Zhou Xu and
Lu Xialiang and
Hou Mengshu DCFS: distributed cooperative
fault-tolerance storage mechanism . . . 18--25
ZhouXu and
Lu Xianliang and
Hou Mengshu and
Wu Jin A dynamic distributed replica management
mechanism based on accessing frequency
detecting . . . . . . . . . . . . . . . 26--34
Bi-Hui Chen Improvement of authenticated
multiple-key agreement protocol . . . . 35--41
Kuo-Qin Yan and
Shu-Ching Wang and
Mao-Lun Chiang New application of reliable agreement:
underlying an unsecured business
environment . . . . . . . . . . . . . . 42--57
Tian-Fu Lee and
Tzonelih Hwang Improved conference key distribution
protocol based on a symmetric balanced
incomplete block design . . . . . . . . 58--64
Ya-Fan Chang and
Chin-Chen Chang and
Chia-Lin Kao An improvement on a deniable
authentication protocol . . . . . . . . 65--74
Min-Shiang Hwang and
Li-Hua Li and
Cheng-Chi Lee A key authentication scheme with
non-repudiation . . . . . . . . . . . . 75--78
Ya-Fen Chang and
Chin-Chen Chang A secure and efficient strong-password
authentication protocol . . . . . . . . 79--90
Chou-Chen Yang and
Ren-Ching Wang An improvement of security enhancement
for the timestamp-based password
authentication scheme using Smart Cards 91--96
Tim Leschke Achieving speed and flexibility by
separating management from protection:
embracing the Exokernel operating system 5--19
Nicolas Bouillot and
Eric Gressier-Soudan Consistency models for distributed
interactive multimedia applications . . 20--32
Mordechai Geva and
Yair Wiseman A common framework for inter-process
communication on a cluster . . . . . . . 33--44
Guo Yuan-bo and
Ma Jian-feng An intrusion-tolerant authorization and
authentication scheme in distributed
environments . . . . . . . . . . . . . . 45--51
Chin-Chen Chang and
Iuon-Chang Lin An improvement of delegated
multisignature scheme with document
decomposition . . . . . . . . . . . . . 52--57
Chin-Chen Chang and
Yeu-Pong Lai A convertible group signature scheme . . 58--65
Li-Hua Li and
Chi-Yu Liu and
Min-Shiang Hwang Cryptanalysis of an efficient secure
group signature scheme . . . . . . . . . 66--69
Narn-Yih Lee and
Ming-Feng Lee Comments on multiparty key exchange
scheme . . . . . . . . . . . . . . . . . 70--73
Horng-Twu Liaw and
Shiou-Wei Fan and
Wei-Chen Wu A simple password authentication using a
polynomial . . . . . . . . . . . . . . . 74--79
Ya-Fen Chang and
Chin-Chen Chang and
Jui-Yi Kuo A secure one-time password
authentication scheme using Smart Cards
without limiting login times . . . . . . 80--90
Chin-Chen Chang and
Iuon-Chang Lin Remarks on fingerprint-based remote user
authentication scheme using Smart Cards 91--96
Lance Hammond and
Brian D. Carlstrom and
Vicky Wong and
Ben Hertzberg and
Mike Chen and
Christos Kozyrakis and
Kunle Olukotun Programming with transactional coherence
and consistency (TCC) . . . . . . . . . 1--13
Mihai Budiu and
Girish Venkataramani and
Tiberiu Chelcea and
Seth Copen Goldstein Spatial computation . . . . . . . . . . 14--26
Virantha Ekanayake and
Clinton Kelly IV and
Rajit Manohar An ultra low-power processor for sensor
networks . . . . . . . . . . . . . . . . 27--36
Christopher R. Lumb and
Richard Golding D-SPTF: decentralized request
distribution in brick-based storage
systems . . . . . . . . . . . . . . . . 37--47
Yasushi Saito and
Svend Fròlund and
Alistair Veitch and
Arif Merchant and
Susan Spence FAB: building distributed enterprise
disk arrays from commodity components 48--58
Timothy E. Denehy and
John Bent and
Florentina I. Popovici and
Andrea C. Arpaci-Dusseau and
Remzi H. Arpaci-Dusseau Deconstructing storage arrays . . . . . 59--71
Xiaotong Zhuang and
Tao Zhang and
Santosh Pande HIDE: an infrastructure for efficiently
protecting information leakage on the
address bus . . . . . . . . . . . . . . 72--84
G. Edward Suh and
Jae W. Lee and
David Zhang and
Srinivas Devadas Secure program execution via dynamic
information flow tracking . . . . . . . 85--96
Jaehyuk Huh and
Jichuan Chang and
Doug Burger and
Gurindar S. Sohi Coherence decoupling: making use of
incoherence . . . . . . . . . . . . . . 97--106
Srikanth T. Srinivasan and
Ravi Rajwar and
Haitham Akkary and
Amit Gandhi and
Mike Upton Continual flow pipelines . . . . . . . . 107--119
Rajagopalan Desikan and
Simha Sethumadhavan and
Doug Burger and
Stephen W. Keckler Scalable selective re-execution for EDGE
architectures . . . . . . . . . . . . . 120--132
John Regehr and
Alastair Reid HOIST: a system for automatically
deriving static analyzers for embedded
systems . . . . . . . . . . . . . . . . 133--143
Perry H. Wang and
Jamison D. Collins and
Hong Wang and
Dongkeun Kim and
Bill Greene and
Kai-Ming Chan and
Aamir B. Yunus and
Terry Sych and
Stephen F. Moore and
John P. Shen Helper threads via virtual
multithreading on an experimental
Itanium-2 processor-based platform . . . 144--155
Matthias Hauswirth and
Trishul M. Chilimbi Low-overhead memory leak detection using
adaptive statistical profiling . . . . . 156--164
Xipeng Shen and
Yutao Zhong and
Chen Ding Locality phase prediction . . . . . . . 165--176
Pin Zhou and
Vivek Pandey and
Jagadeesan Sundaresan and
Anand Raghuraman and
Yuanyuan Zhou and
Sanjeev Kumar Dynamic tracking of page miss ratio
curve for memory management . . . . . . 177--188
Rodric M. Rabbah and
Hariharan Sandanagobalane and
Mongkol Ekpanyapong and
Weng-Fai Wong Compiler orchestrated prefetching via
speculation and predication . . . . . . 189--198
Chen-Yong Cher and
Antony L. Hosking and
T. N. Vijaykumar Software prefetching for mark-sweep
garbage collection: hardware analysis
and software redesign . . . . . . . . . 199--210
David E. Lowell and
Yasushi Saito and
Eileen J. Samberg Devirtualizable virtual machines
enabling general, single-node, online
maintenance . . . . . . . . . . . . . . 211--223
Jared C. Smolens and
Brian T. Gold and
Jangwoo Kim and
Babak Falsafi and
James C. Hoe and
Andreas G. Nowatzyk Fingerprinting: bounding soft-error
detection latency and bandwidth . . . . 224--234
Greg Bronevetsky and
Daniel Marques and
Keshav Pingali and
Peter Szwed and
Martin Schulz Application-level checkpointing for
shared memory programs . . . . . . . . . 235--247
Qiang Wu and
Philo Juang and
Margaret Martonosi and
Douglas W. Clark Formal online methods for
voltage/frequency control in multiple
clock domain microprocessors . . . . . . 248--259
Mohamed Gomaa and
Michael D. Powell and
T. N. Vijaykumar Heat-and-run: leveraging SMT and CMP to
manage power density through the
operating system . . . . . . . . . . . . 260--270
Xiaodong Li and
Zhenmin Li and
Francis David and
Pin Zhou and
Yuanyuan Zhou and
Sarita Adve and
Sanjeev Kumar Performance directed energy management
for main memory and disks . . . . . . . 271--283
Shihyu Chou and
Eric Jui-Lin Lu and
Yi-Hui Chen X-RDR: a role-based delegation processor
for Web-based information systems . . . 4--21
Jia Song Segment-based proxy caching for
distributed cooperative media content
servers . . . . . . . . . . . . . . . . 22--33
Zhan Chuan and
Lu Xianliang and
Hou Mengshu and
Zhou Xu A LVQ-based neural network anti-spam
email approach . . . . . . . . . . . . . 34--39
Manik Lal Das and
Ashutosh Saxena and
Ved P. Gulati and
Deepak B. Phatak Hierarchical key management scheme using
polynomial interpolation . . . . . . . . 40--47
Ting-Yi Chang and
Min-Shiang Hwang and
Wei-Pang Yang A new multi-stage secret sharing scheme
using one-way function . . . . . . . . . 48--55
Hou Mengshu and
Lu Xianliang and
Zhou Xu and
Zhan Chuan A trust model of P2P system based on
confirmation theory . . . . . . . . . . 56--62
Zhou Xu and
Lu Xianliang and
Hou Mengshu and
Zhan Chuan A speed-based adaptive dynamic parallel
downloading technique . . . . . . . . . 63--69
Ya-Fen Chang and
Chin-Chen Chang An efficient authentication protocol for
mobile satellite communication systems 70--84
Wei-Chi Ku and
Min-Hung Chiang and
Shen-Tien Chang Weaknesses of Yoon--Ryu--Yoo's
hash-based password authentication
scheme . . . . . . . . . . . . . . . . . 85--89
Wei-Chi Ku and
Shuai-Min Chen Cryptanalysis of a flexible remote user
authentication scheme using Smart Cards 90--96
Edsger W. Dijkstra My recollections of operating system
design . . . . . . . . . . . . . . . . . 4--40
Cliff Jones and
David Lomet and
Alexander Romanovsky and
Gerhard Weikum and
Alan Fekete and
Marie-Claude Gaudel and
Henry F. Korth and
Rogerio de Lemos and
Eliot Moss and
Ravi Rajwar and
Krithi Ramamritham and
Brian Randell and
Luis Rodrigues The atomic manifesto: a story in four
quarks . . . . . . . . . . . . . . . . . 41--46
Gertrude Neuman Levine The classification of deadlock
prevention and avoidance is erroneous 47--50
Rushikesh K. Joshi and
Subash Rajaa Modeling VP operation: the Diwali
Festival Problem . . . . . . . . . . . . 51--53
Marisa Gil and
Ruben Pinilla Thread coloring: a scheduler proposal
from user to hardware threads . . . . . 54--70
Robert Steinke and
Micah Clark and
Elihu McMahon A new pattern for flexible worker
threads with in-place consumption
message queues . . . . . . . . . . . . . 71--73
Yair Wiseman ARC based superpaging . . . . . . . . . 74--78
Catherine Dodge and
Cynthia Irvine and
Thuy Nguyen A study of initialization in Linux and
OpenBSD . . . . . . . . . . . . . . . . 79--93
Kuo-Feng Hwang and
I-En Liao Two attacks on a user friendly remote
authentication scheme with Smart Cards 94--96
Yair Wiseman and
Karsten Schwan and
Patrick Widener Efficient end to end data exchange using
configurable compression . . . . . . . . 4--23
Zhiqiang Lin and
Chao Wang and
Bing Mao and
Li Xie A policy flexible architecture for
secure operating system . . . . . . . . 24--33
Jorge Herrerías Guerrero and
Roberto Gómez Cárdenas An example of communication between
security tools: IPTables --- Snort . . . 34--43
Guangchun Luo and
Xianliang Lu and
Ting Yang The research on consistency of
space/time of IDS . . . . . . . . . . . 44--51
Yan Tang and
Tao Wang and
Xiaoming Li The design and implementation of
LilyTask in shared memory . . . . . . . 52--63
A. Vijay Srinivas and
D. Janakiram A model for characterizing the
scalability of distributed systems . . . 64--71
Youhui Zhang and
Dongsheng Wong and
Weimin Zheng User-level checkpoint and recovery for
LAM/MPI . . . . . . . . . . . . . . . . 72--81
Kuo-Qin Yan and
Shu-Ching Wang The bounds of faulty components on
consensus with dual failure modes . . . 82--89
Yi-Hwa Chen and
Jinn-Ke Jan Enhancement of digital signature with
message recovery using self-certified
public keys and its variants . . . . . . 90--96
Keith Loepere Stackable thread mechanisms . . . . . . 4--17
Joseph M. Gwinn Quality-of-Service versus Realtime . . . 18--22
Vijay Shivshanker Gupta Trust and accountability issues in
scalable invalidation-based Web cache
consistency . . . . . . . . . . . . . . 23--36
Mais Nijim and
Tao Xie and
Xiao Qin Performance analysis of an admission
controller for CPU- and I/O-intensive
applications in self-managing computer
systems . . . . . . . . . . . . . . . . 37--45
Chien-Fu Cheng and
Shu-Ching Wang and
Tyne Liang Multi-agent schema of Mobile IP protocol
for mobile environment . . . . . . . . . 46--65
Chih-Hung Wang and
Yan-Sheng Kuo An efficient contract signing protocol
using the aggregate signature scheme to
protect signers' privacy and promote
reliability . . . . . . . . . . . . . . 66--79
S. C. Wang and
M. L. Chiang and
K. Q. Yan and
K. F. Jea Streets of consensus under unknown
unreliable network . . . . . . . . . . . 80--96
Arvind Seshadri and
Mark Luk and
Elaine Shi and
Adrian Perrig and
Leendert van Doorn and
Pradeep Khosla Pioneer: verifying code integrity and
enforcing untampered code execution on
legacy systems . . . . . . . . . . . . . 1--16
Petros Efstathopoulos and
Maxwell Krohn and
Steve VanDeBogart and
Cliff Frey and
David Ziegler and
Eddie Kohler and
David Mazi\`eres and
Frans Kaashoek and
Robert Morris Labels and event processes in the
asbestos operating system . . . . . . . 17--30
Emmett Witchel and
Junghwan Rhee and
Krste Asanovi\'c Mondrix: memory isolation for Linux
using Mondrian memory protection . . . . 31--44
Amitanand S. Aiyer and
Lorenzo Alvisi and
Allen Clement and
Mike Dahlin and
Jean-Philippe Martin and
Carl Porth BAR fault tolerance for cooperative
services . . . . . . . . . . . . . . . . 45--58
Michael Abd-El-Malek and
Gregory R. Ganger and
Garth R. Goodson and
Michael K. Reiter and
Jay J. Wylie Fault-scalable Byzantine fault-tolerant
services . . . . . . . . . . . . . . . . 59--74
Boon Thau Loo and
Tyson Condie and
Joseph M. Hellerstein and
Petros Maniatis and
Timothy Roscoe and
Ion Stoica Implementing declarative overlays . . . 75--90
Ashlesha Joshi and
Samuel T. King and
George W. Dunlap and
Peter M. Chen Detecting past and present intrusions
through vulnerability-specific
predicates . . . . . . . . . . . . . . . 91--104
Ira Cohen and
Steve Zhang and
Moises Goldszmidt and
Julie Symons and
Terence Kelly and
Armando Fox Capturing, indexing, clustering, and
retrieving system history . . . . . . . 105--118
Craig A. N. Soules and
Gregory R. Ganger Connections: using context to enhance
file search . . . . . . . . . . . . . . 119--132
Manuel Costa and
Jon Crowcroft and
Miguel Castro and
Antony Rowstron and
Lidong Zhou and
Lintao Zhang and
Paul Barham Vigilante: end-to-end containment of
Internet worms . . . . . . . . . . . . . 133--147
Michael Vrable and
Justin Ma and
Jay Chen and
David Moore and
Erik Vandekieft and
Alex C. Snoeren and
Geoffrey M. Voelker and
Stefan Savage Scalability, fidelity, and containment
in the Potemkin Virtual Honeyfarm . . . 148--162
Ashvin Goel and
Kenneth Po and
Kamran Farhadi and
Zheng Li and
Eyal de Lara The Taser intrusion recovery system . . 163--176
Qingbo Zhu and
Zhifeng Chen and
Lin Tan and
Yuanyuan Zhou and
Kimberly Keeton and
John Wilkes Hibernator: helping disk arrays sleep
through the winter . . . . . . . . . . . 177--190
Edmund B. Nightingale and
Peter M. Chen and
Jason Flinn Speculative execution in a distributed
file system . . . . . . . . . . . . . . 191--205
Vijayan Prabhakaran and
Lakshmi N. Bairavasundaram and
Nitin Agrawal and
Haryadi S. Gunawi and
Andrea C. Arpaci-Dusseau and
Remzi H. Arpaci-Dusseau IRON file systems . . . . . . . . . . . 206--220
Yuan Yu and
Tom Rodeheffer and
Wei Chen RaceTrack: efficient detection of data
race conditions via adaptive tracking 221--234
Feng Qin and
Joseph Tucek and
Jagadeesan Sundaresan and
Yuanyuan Zhou Rx: treating bugs as allergies---a safe
method to survive software failures . . 235--248
Lars Eggert and
Joseph D. Touch Idletime scheduling with preemption
intervals . . . . . . . . . . . . . . . 249--262
Hai Huang and
Wanda Hung and
Kang G. Shin FS2: dynamic data replication in free
disk space for improving disk
performance and energy consumption . . . 263--276
Ricardo A. Baratto and
Leonard N. Kim and
Jason Nieh THINC: a virtual display architecture
for thin-client computing . . . . . . . 277--290
Jeanna N. Matthews Operating systems review: looking back
and looking forward . . . . . . . . . . 1--2
Marc E. Fiuczynski PlanetLab: overview, history, and future
directions . . . . . . . . . . . . . . . 6--10
Larry Peterson and
Timothy Roscoe The design principles of PlanetLab . . . 11--16
Neil Spring and
Larry Peterson and
Andy Bavier and
Vivek Pai Using PlanetLab for network research:
myths, realities, and best practices . . 17--24
Robert Ricci and
David Oppenheimer and
Jay Lepreau and
Amin Vahdat Lessons from resource allocators for
large-scale multiuser testbeds . . . . . 25--32
Jeannie Albrecht and
Christopher Tuttle and
Alex C. Snoeren and
Amin Vahdat PlanetLab application management using
plush . . . . . . . . . . . . . . . . . 33--40
Harsha V. Madhyastha and
Arun Venkataramani and
Arvind Krishnamurthy and
Thomas Anderson Oasis: an overlay-aware network stack 41--48
Akihiro Nakao and
Larry Peterson and
Andy Bavier Scalable routing overlay networks . . . 49--61
Bernard Wong and
Emin Gün Sirer ClosestNode.com: an open access,
scalable, shared geocast service for
distributed systems . . . . . . . . . . 62--64
KyoungSoo Park and
Vivek S. Pai CoMon: a mostly-scalable monitoring
system for PlanetLab . . . . . . . . . . 65--74
Steve Muir and
Larry Peterson and
Marc Fiuczynski and
Justin Cappos and
John Hartman Privileged operations in the PlanetLab
virtualised environment . . . . . . . . 75--88
Mark Huang and
Andy Bavier and
Larry Peterson PlanetFlow: maintaining accountability
for network services . . . . . . . . . . 89--94
Gernot Heiser and
Volkmar Uhlig and
Joshua LeVasseur Are virtual-machine monitors
microkernels done right? . . . . . . . . 95--99
Andrew S. Tanenbaum and
Jorrit N. Herder and
Herbert Bos File size distribution on UNIX systems:
then and now . . . . . . . . . . . . . . 100--104
Patrick G. Bridges and
Arthur B. MacCabe and
Orran Krieger System software for high end computing 6--7
Mark F. Mergen and
Volkmar Uhlig and
Orran Krieger and
Jimi Xenidis Virtualization for high-performance
computing . . . . . . . . . . . . . . . 8--11
Eric Van Hensbergen P.R.O.S.E.: partitioned reliable
operating system environment . . . . . . 12--15
Jean-Charles Tournier and
Patrick G. Bridges and
Arthur B. MacCabe and
Patrick M. Widener and
Zaid Abudayyeh and
Ron Brightwell and
Rolf Riesen and
Trammel Hudson Towards a framework for dedicated
operating systems development in
high-end computing systems . . . . . . . 16--21
Ronald G. Minnich and
Matthew J. Sottile and
Sung-Eun Choi and
Erik Hendriks and
Jim McKie Right-weight kernels: an off-the-shelf
alternative to custom light-weight
kernels . . . . . . . . . . . . . . . . 22--28
Pete Beckman and
Kamil Iskra and
Kazutomo Yoshii and
Susan Coghlan Operating system issues for petascale
systems . . . . . . . . . . . . . . . . 29--33
Dilma Da Silva and
Orran Krieger and
Robert W. Wisniewski and
Amos Waterland and
David Tam and
Andrew Baumann K42: an infrastructure for operating
system research . . . . . . . . . . . . 34--42
Sayantan Chakravorty and
Celso L. Mendes and
Laxmikant V. Kalé and
Terry Jones and
Andrew Tauferner and
Todd Inglett and
José Moreira HPC-Colony: services and interfaces for
very large systems . . . . . . . . . . . 43--49
Hong Ong and
Jeffrey Vetter and
R. Scott Studham and
Collin McCurdy and
Bruce Walker and
Alan Cox Kernel-level single system image for
petascale computing . . . . . . . . . . 50--54
Fabrizio Petrini and
Jarek Nieplocha and
Vinod Tipparaju SFT: scalable fault tolerance . . . . . 55--62
Christian Engelmann and
Stephen L. Scott and
David E. Bernholdt and
Narasimha R. Gottumukkala and
Chokchai Leangsuksun and
Jyothish Varma and
Chao Wang and
Frank Mueller and
Aniruddha G. Shet and
P. Sadayappan MOLAR: adaptive runtime support for
high-end computing operating and runtime
systems . . . . . . . . . . . . . . . . 63--72
Lawrence Rauchwerger and
Nancy M. Amato SmartApps: middle-ware for adaptive
applications on reconfigurable platforms 73--82
Patricia J. Teller and
Seetharami R. Seelam Insights into providing dynamic
adaptation of operating system policies 83--89
Gengbin Zheng and
Chao Huang and
Laxmikant V. Kalé Performance evaluation of automatic
checkpoint-based fault tolerance for
AMPI and Charm++ . . . . . . . . . . . . 90--99
Jason Nieh and
Chris Vaill Experiences teaching operating systems
using virtual platforms and Linux . . . 100--104
Felix C. Freiling and
Hagen Völzer Illustrating the impossibility of
crash-tolerant consensus in asynchronous
systems . . . . . . . . . . . . . . . . 105--109
Oded Koren A study of the Linux kernel evolution 110--112
Emin Gün Sirer Introduction . . . . . . . . . . . . . . 8--8
Özalp Babao\uglu and
Márk Jelasity and
Anne-Marie Kermarrec and
Alberto Montresor and
Maarten van Steen Managing clouds: a case for a fresh look
at large unreliable dynamic networks . . 9--13
Jay A. Patel and
Indranil Gupta Bridging the gap: augmenting centralized
systems with P2P technologies . . . . . 14--17
Jolyon Clulow and
Tyler Moore Suicide for the common good: a new
strategy for credential revocation in
self-organizing systems . . . . . . . . 18--21
Ruchir Bindal and
Pei Cao Can self-organizing P2P file
distribution provide QoS guarantees? . . 22--30
Fred Douglis and
Michael Branson and
Kirsten Hildrum and
Bin Rong and
Fan Ye Multi-site cooperative data stream
analysis . . . . . . . . . . . . . . . . 31--37
Evan Hoke and
Jimeng Sun and
John D. Strunk and
Gregory R. Ganger and
Christos Faloutsos InteMon: continuous mining of sensor
data in large-scale self-infrastructures 38--44
Minor Gordon Small-scale peer-to-peer overlays . . . 45--48
Ming Zhong and
Kai Shen Random walk based node sampling in
self-organizing networks . . . . . . . . 49--55
David Hales and
Özalp Babao\uglu Towards automatic social bootstrapping
of peer-to-peer protocols . . . . . . . 56--60
Jacomo Corbo and
Antoni Calvó-Armengol and
David Parkes A study of Nash equilibrium in
contribution games for peer-to-peer
networks . . . . . . . . . . . . . . . . 61--66
Panayotis Antoniadis and
Costas Courcoubetis Enforcing efficient resource
provisioning in peer-to-peer file
sharing systems . . . . . . . . . . . . 67--72
Öznur Özkasap and
Zülküf Genç and
Emre Atsan Epidemic-based approaches for reliable
multicast in mobile ad hoc networks . . 73--79
Jorrit N. Herder and
Herbert Bos and
Ben Gras and
Philip Homburg and
Andrew S. Tanenbaum MINIX 3: a Highly Reliable,
Self-Repairing Operating System . . . . 80--89
Gilles Muller and
Yoann Padioleau and
Julia L. Lawall and
René Rydhof Hansen Semantic patches considered helpful . . 90--92
Úlfar Erlingsson and
John MacCormick Ad hoc extensibility and access control 93--101
Ryusuke Konishi and
Yoshiji Amagai and
Koji Sato and
Hisashi Hifumi and
Seiji Kihara and
Satoshi Moriai The Linux implementation of a
log-structured file system . . . . . . . 102--107
Stefan Bosse VAMNET: the functional approach to
distributed programming . . . . . . . . 108--114
Håvard Johansen and
André Allavena and
Robbert van Renesse Fireflies: Scalable support for
intrusion-tolerant network overlays . . 3--13
Georgios Portokalidis and
Asia Slowinska and
Herbert Bos Argos: an emulator for fingerprinting
zero-day attacks for advertised
honeypots with automatic signature
generation . . . . . . . . . . . . . . . 15--27
Alex Ho and
Michael Fetterman and
Christopher Clark and
Andrew Warfield and
Steven Hand Practical taint-based protection using
demand emulation . . . . . . . . . . . . 29--41
Michael F. Spear and
Tom Roeder and
Orion Hodson and
Galen C. Hunt and
Steven Levi Solving the starting problem: device
drivers as self-describing artifacts . . 45--57
Yoann Padioleau and
Julia L. Lawall and
Gilles Muller Understanding collateral evolution in
Linux device drivers . . . . . . . . . . 59--71
Thomas Ball and
Ella Bounimova and
Byron Cook and
Vladimir Levin and
Jakob Lichtenberg and
Con McGarvey and
Bohus Ondrusek and
Sriram K. Rajamani and
Abdullah Ustuner Thorough static analysis of device
drivers . . . . . . . . . . . . . . . . 73--85
Gokul Soundararajan and
Cristiana Amza and
Ashvin Goel Database replication policies for
dynamic content applications . . . . . . 89--102
Jacob R. Lorch and
Atul Adya and
William J. Bolosky and
Ronnie Chaiken and
John R. Douceur and
Jon Howell The SMART way to migrate replicated
stateful services . . . . . . . . . . . 103--115
Sameh Elnikety and
Steven Dropsho and
Fernando Pedone Tashkent: uniting durability with
transaction ordering for
high-performance scalable database
replication . . . . . . . . . . . . . . 117--130
Orran Krieger and
Marc Auslander and
Bryan Rosenburg and
Robert W. Wisniewski and
Jimi Xenidis and
Dilma Da Silva and
Michal Ostrowski and
Jonathan Appavoo and
Maria Butrico and
Mark Mergen and
Amos Waterland and
Volkmar Uhlig K42: building a complete operating
system . . . . . . . . . . . . . . . . . 133--145
Alan Mislove and
Ansley Post and
Andreas Haeberlen and
Peter Druschel Experiences in building and operating
ePOST, a reliable peer-to-peer
application . . . . . . . . . . . . . . 147--159
Lenin Singaravelu and
Calton Pu and
Hermann Härtig and
Christian Helmuth Reducing TCB complexity for
security-sensitive applications: three
case studies . . . . . . . . . . . . . . 161--174
Manuel Fähndrich and
Mark Aiken and
Chris Hawblitzel and
Orion Hodson and
Galen Hunt and
James R. Larus and
Steven Levi Language support for fast and reliable
message-based communication in
singularity OS . . . . . . . . . . . . . 177--190
Daniel Lohmann and
Fabian Scheler and
Reinhard Tartler and
Olaf Spinczyk and
Wolfgang Schröder-Preikschat A quantitative analysis of aspects in
the eCos kernel . . . . . . . . . . . . 191--204
Arvind S. Krishna and
Aniruddha S. Gokhale and
Douglas C. Schmidt Context-specific middleware
specialization techniques for optimizing
software product-line architectures . . 205--218
Mary Baker and
Mehul Shah and
David S. H. Rosenthal and
Mema Roussopoulos and
Petros Maniatis and
TJ Giuli and
Prashanth Bungale A fresh look at the reliability of
long-term digital storage . . . . . . . 221--234
Kimberly Keeton and
Dirk Beyer and
Ernesto Brau and
Arif Merchant and
Cipriano Santos and
Alex Zhang On the road to recovery: restoring data
after disasters . . . . . . . . . . . . 235--248
Xiaoyu Yao and
Jun Wang RIMAC: a novel redundancy-based
hierarchical cache architecture for
energy efficient, high performance
storage systems . . . . . . . . . . . . 249--262
Tim Brecht and
G. (John) Janakiraman and
Brian Lynn and
Vikram Saletore and
Yoshio Turner Evaluating network processing efficiency
with processor partitioning and
asynchronous I/O . . . . . . . . . . . . 265--278
Hyong-youb Kim and
Scott Rixner TCP offload through connection handoff 279--290
Jeffrey C. Mogul Emergent (mis)behavior vs. complex
software systems . . . . . . . . . . . . 293--304
Ori Shalev and
Nir Shavit Predictive log-synchronization . . . . . 305--315
Qin Lv and
William Josephson and
Zhe Wang and
Moses Charikar and
Kai Li Ferret: a toolkit for content-based
similarity search of feature-rich data 317--330
Hongliang Yu and
Dongdong Zheng and
Ben Y. Zhao and
Weimin Zheng Understanding user behavior in
large-scale video-on-demand systems . . 333--344
Iqbal Mohomed and
Jim Chengming Cai and
Eyal de Lara URICA: Usage-awaRe Interactive Content
Adaptation for mobile devices . . . . . 345--358
S. B. Handurukande and
A.-M. Kermarrec and
F. Le Fessant and
L. Massoulié and
S. Patarin Peer sharing behaviour in the eDonkey
network, and implications for the design
of server-less file sharing systems . . 359--371
Chun Yuan and
Ni Lao and
Ji-Rong Wen and
Jiwei Li and
Zheng Zhang and
Yi-Min Wang and
Wei-Ying Ma Automated known problem diagnosis with
event traces . . . . . . . . . . . . . . 375--388
Atul Singh and
Petros Maniatis and
Timothy Roscoe and
Peter Druschel Using queries for distributed monitoring
and forensics . . . . . . . . . . . . . 389--402
Andreas Merkel and
Frank Bellosa Balancing power consumption in
multiprocessor systems . . . . . . . . . 403--414
Mendel Rosenblum Impact of virtualization on computer
architecture and operating systems . . . 1--1
Keith Adams and
Ole Agesen A comparison of software and hardware
techniques for x86 virtualization . . . 2--13
Stephen T. Jones and
Andrea C. Arpaci-Dusseau and
Remzi H. Arpaci-Dusseau Geiger: monitoring the buffer cache in a
virtual machine environment . . . . . . 14--24
Jedidiah R. Crandall and
Gary Wassermann and
Daniela A. S. de Oliveira and
Zhendong Su and
S. Felix Wu and
Frederic T. Chong Temporal search: detecting hidden
malware timebombs with virtual machines 25--36
Shan Lu and
Joseph Tucek and
Feng Qin and
Yuanyuan Zhou AVIO: detecting atomicity violations via
access interleaving invariants . . . . . 37--48
Min Xu and
Mark D. Hill and
Rastislav Bodik A regulated transitive reduction (RTR)
for longer memory race recording . . . . 49--60
Michael D. Bond and
Kathryn S. McKinley Bell: bit-encoding online memory leak
detection . . . . . . . . . . . . . . . 61--72
Smitha Shyam and
Kypros Constantinides and
Sujay Phadke and
Valeria Bertacco and
Todd Austin Ultra low-cost defect protection for
microprocessor pipelines . . . . . . . . 73--82
Vimal K. Reddy and
Eric Rotenberg and
Sailashri Parthasarathy Understanding prediction-based partial
redundant threading for low-overhead,
high-coverage fault tolerance . . . . . 83--94
Angshuman Parashar and
Anand Sivasubramaniam and
Sudhanva Gurumurthi SlicK: slice-based locality exploitation
for efficient redundant multithreading 95--105
Taliver Heath and
Ana Paula Centeno and
Pradeep George and
Luiz Ramos and
Yogesh Jaluria Mercury and Freon: temperature emulation
and management for server systems . . . 106--116
Taeho Kgil and
Shaun D'Souza and
Ali Saidi and
Nathan Binkert and
Ronald Dreslinski and
Trevor Mudge and
Steven Reinhardt and
Krisztian Flautner PicoServer: using $3$D stacking
technology to enable a compact energy
efficient chip multiprocessor . . . . . 117--128
Katherine E. Coons and
Xia Chen and
Doug Burger and
Kathryn S. McKinley and
Sundeep K. Kushwaha A spatial path scheduling algorithm for
EDGE architectures . . . . . . . . . . . 129--140
Martha Mercaldi and
Steven Swanson and
Andrew Petersen and
Andrew Putnam and
Andrew Schwerin and
Mark Oskin and
Susan J. Eggers Instruction scheduling for a tiled
dataflow architecture . . . . . . . . . 141--150
Michael I. Gordon and
William Thies and
Saman Amarasinghe Exploiting coarse-grained task, data,
and pipeline parallelism in stream
programs . . . . . . . . . . . . . . . . 151--162
Mahim Mishra and
Timothy J. Callahan and
Tiberiu Chelcea and
Girish Venkataramani and
Seth C. Goldstein and
Mihai Budiu Tartan: evaluating spatial computation
for whole program execution . . . . . . 163--174
Stijn Eyerman and
Lieven Eeckhout and
Tejas Karkhanis and
James E. Smith A performance counter architecture for
computing accurate CPI components . . . 175--184
Benjamin C. Lee and
David M. Brooks Accurate and efficient regression
modeling for microarchitectural
performance and power prediction . . . . 185--194
Engin Ïpek and
Sally A. McKee and
Rich Caruana and
Bronis R. de Supinski and
Martin Schulz Efficiently exploring architectural
design spaces via predictive modeling 195--206
Mazen Kharbutli and
Xiaowei Jiang and
Yan Solihin and
Guru Venkataramani and
Milos Prvulovic Comprehensively and efficiently
protecting the heap . . . . . . . . . . 207--218
Trishul M. Chilimbi and
Vinod Ganapathy HeapMD: identifying heap-based bugs
using anomaly detection . . . . . . . . 219--228
Satish Narayanasamy and
Cristiano Pereira and
Brad Calder Recording shared memory dependencies
using strata . . . . . . . . . . . . . . 229--240
Jaidev P. Patwardhan and
Vijeta Johri and
Chris Dwyer and
Alvin R. Lebeck A defect tolerant self-organizing
nanoscale SIMD architecture . . . . . . 241--251
Ethan Schuchman and
T. N. Vijaykumar A program transformation and
architecture support for quantum
uncomputation . . . . . . . . . . . . . 252--263
Shashidhar Mysore and
Banit Agrawal and
Navin Srivastava and
Sheng-Chih Lin and
Kaustav Banerjee and
Tim Sherwood Introspective $3$D chips . . . . . . . . 264--273
Jason F. Cantin and
Mikko H. Lipasti and
James E. Smith Stealth prefetching . . . . . . . . . . 274--282
Koushik Chakraborty and
Philip M. Wells and
Gurindar S. Sohi Computation spreading: employing
hardware migration to specialize CMP
cores on-the-fly . . . . . . . . . . . . 283--292
Jason E. Miller and
Anant Agarwal Software-based instruction caching for
embedded processors . . . . . . . . . . 293--302
Xin Li and
Marian Boldt and
Reinhard von Hanxleden Mapping Esterel onto a multi-threaded
embedded processor . . . . . . . . . . . 303--314
Nathan L. Binkert and
Ali G. Saidi and
Steven K. Reinhardt Integrated network interfaces for
high-bandwidth TCP/IP . . . . . . . . . 315--324
David Tarditi and
Sidd Puri and
Jose Oglesby Accelerator: using data parallelism to
program GPUs for general-purpose uses 325--335
Peter Damron and
Alexandra Fedorova and
Yossi Lev Hybrid transactional memory . . . . . . 336--346
Weihaw Chuang and
Satish Narayanasamy and
Ganesh Venkatesh and
Jack Sampson and
Michael Van Biesbrouck and
Gilles Pokam and
Brad Calder and
Osvaldo Colavin Unbounded page-based transactional
memory . . . . . . . . . . . . . . . . . 347--358
Michelle J. Moravan and
Jayaram Bobba and
Kevin E. Moore and
Luke Yen and
Mark D. Hill and
Ben Liblit and
Michael M. Swift and
David A. Wood Supporting nested transactional memory
in logTM . . . . . . . . . . . . . . . . 359--370
JaeWoong Chung and
Chi Cao Minh and
Austen McDonald and
Travis Skare and
Hassan Chafi and
Brian D. Carlstrom and
Christos Kozyrakis and
Kunle Olukotun Tradeoffs in transactional memory
virtualization . . . . . . . . . . . . . 371--381
Motohiro Kawahito and
Hideaki Komatsu and
Takao Moriyama and
Hiroshi Inoue and
Toshio Nakatani A new idiom recognition framework for
exploiting hardware-assist instructions 382--393
Sorav Bansal and
Alex Aiken Automatic generation of peephole
superoptimizers . . . . . . . . . . . . 394--403
Armando Solar-Lezama and
Liviu Tancau and
Rastislav Bodik and
Sanjit Seshia and
Vijay Saraswat Combinatorial sketching for finite
programs . . . . . . . . . . . . . . . . 404--415
Jeff Da Silva and
J. Gregory Steffan A probabilistic pointer analysis for
speculative optimizations . . . . . . . 416--425
Jeanna N. Matthews Operating systems review: year in review 1--2
Brett D. Fleisch Program director's column: can nuggets
make a difference? . . . . . . . . . . . 3--4
Erik Riedel Introduction . . . . . . . . . . . . . . 5--6
Yuhui Deng and
Frank Wang A heterogeneous storage grid enabled by
grid service . . . . . . . . . . . . . . 7--13
Sudharshan Vazhkudai and
Xiaosong Ma Recovering transient data: automated
on-demand data reconstruction and
offloading for supercomputers . . . . . 14--18
Michael Factor and
Dalit Naor and
Simona Rabinovici-Cohen and
Leeat Ramati and
Petra Reshef and
Julian Satran The need for preservation aware storage:
a position paper . . . . . . . . . . . . 19--23
Martin Jambor and
Tomas Hruby and
Jan Taus and
Kuba Krchak and
Viliam Holub Implementation of a Linux log-structured
file system with a garbage collector . . 24--32
Sudhanva Gurumurthi Should disks be speed demons or
brainiacs? . . . . . . . . . . . . . . . 33--36
John A. Chandy and
Sumit Narayan Reliability tradeoffs in personal
storage systems . . . . . . . . . . . . 37--41
Simson L. Garfinkel Complete delete vs. time machine
computing . . . . . . . . . . . . . . . 42--44
Jeffrey Choi Robinson and
Jim Alves-Foss A high assurance MLS file server . . . . 45--53
Remzi H. Arpaci-Dusseau CS 736 project highlights from U.
Wisconsin: how students spend their days
and nights in a winter wonderland . . . 54--55
Himani Apte and
Meenali Rungta Adding parity to the Linux \tt ext3 file
system . . . . . . . . . . . . . . . . . 56--65
Pratap Ramamurthy and
Ramanathan Palaniappan Performance-directed energy management
using \em BOS . . . . . . . . . . . . . 66--77
Barton P. Miller and
Gregory Cooksey and
Fredrick Moore An empirical study of the robustness of
MacOS applications using random testing 78--86
Wolfgang Emmerich and
Mikio Aoyama and
Joe Sventek The impact of research on middleware
technology . . . . . . . . . . . . . . . 89--112
Michael D. Schroeder Systems work at Microsoft Research . . . 1--2
Roy Levin A perspective on computing research
management . . . . . . . . . . . . . . . 3--9
Andrew Herbert What happened to Pastry . . . . . . . . 10--16
William J. Bolosky and
John R. Douceur and
Jon Howell The Farsite project: a retrospective . . 17--26
Zheng Zhang and
Qiao Lian and
Shiding Lin and
Wei Chen and
Yu Chen and
Chao Jin BitVault: a highly reliable distributed
data retention platform . . . . . . . . 27--36
Galen C. Hunt and
James R. Larus Singularity: rethinking the software
stack . . . . . . . . . . . . . . . . . 37--49
Jeremy Elson and
Jon Howell and
John R. Douceur MapCruncher: integrating the world's
geographic information . . . . . . . . . 50--59
Michael Isard Autopilot: automatic data center
management . . . . . . . . . . . . . . . 60--67
Dahlia Malkhi and
Lev Novik and
Chris Purcell P2P replica synchronization with vector
sets . . . . . . . . . . . . . . . . . . 68--74
Anmol Sheth and
Chandramohan A. Thekkath and
Prakshep Mehta and
Kalyan Tejaswi and
Chandresh Parekh and
Trilok N. Singh and
Uday B. Desai Senslide: a distributed landslide
prediction system . . . . . . . . . . . 75--87
Andrew Birrell and
Michael Isard and
Chuck Thacker and
Ted Wobber A design for high-performance flash
disks . . . . . . . . . . . . . . . . . 88--93
Marek Olszewski and
Keir Mierle and
Adam Czajkowski and
Angela Demke Brown JIT instrumentation: a novel approach to
dynamically instrument operating systems 3--16
Anupam Chanda and
Alan L. Cox and
Willy Zwaenepoel Whodunit: transactional profiling for
multi-tier applications . . . . . . . . 17--30
Christopher Stewart and
Terence Kelly and
Alex Zhang Exploiting nonstationarity for
performance prediction . . . . . . . . . 31--44
David Tam and
Reza Azimi and
Michael Stumm Thread clustering: sharing-aware
scheduling on SMP--CMP--SMT
multiprocessors . . . . . . . . . . . . 47--58
Michael Isard and
Mihai Budiu and
Yuan Yu and
Andrew Birrell and
Dennis Fetterly Dryad: distributed data-parallel
programs from sequential building blocks 59--72
Bratin Saha and
Ali-Reza Adl-Tabatabai and
Anwar Ghuloum and
Mohan Rajagopalan and
Richard L. Hudson and
Leaf Petersen and
Vijay Menon and
Brian Murphy and
Tatiana Shpeisman and
Eric Sprangle and
Anwar Rohillah and
Doug Carmean and
Jesse Fang Enabling scalability and performance in
a large scale CMP environment . . . . . 73--86
Kelvin C. W. So and
Emin Gün Sirer Latency and bandwidth-minimizing failure
detectors . . . . . . . . . . . . . . . 89--99
Anil Madhavapeddy and
Alex Ho and
Tim Deegan and
David Scott and
Ripduman Sohan Melange: creating a `functional'
Internet . . . . . . . . . . . . . . . . 101--114
Joseph Tucek and
James Newsome and
Shan Lu and
Chengdu Huang and
Spiros Xanthos and
David Brumley and
Yuanyuan Zhou and
Dawn Song Sweeper: a lightweight end-to-end system
for defending against fast worms . . . . 115--128
Andreas Lachenmann and
Pedro José Marrón and
Matthias Gauger and
Daniel Minder and
Olga Saukh and
Kurt Rothermel Removing the memory limitations of
sensor networks with flash-based virtual
memory . . . . . . . . . . . . . . . . . 131--144
René Müller and
Gustavo Alonso and
Donald Kossmann A virtual machine for sensor networks 145--158
Asad Awan and
Suresh Jagannathan and
Ananth Grama Macroprogramming heterogeneous sensor
networks using cosmos . . . . . . . . . 159--172
Zhihui Zhang and
Kanad Ghose hFS: a hybrid file system prototype for
improving small file and metadata
performance . . . . . . . . . . . . . . 175--187
Chuanpeng Li and
Kai Shen and
Athanasios E. Papathanasiou Competitive prefetching for concurrent
sequential I/O . . . . . . . . . . . . . 189--202
Jake Wires and
Michael J. Feeley Secure file system versioning at the
block level . . . . . . . . . . . . . . 203--215
Wei Zheng and
Ricardo Bianchini and
Thu D. Nguyen Automatic configuration of Internet
services . . . . . . . . . . . . . . . . 219--229
David Pariag and
Tim Brecht and
Ashif Harji and
Peter Buhr and
Amol Shukla and
David R. Cheriton Comparing the performance of Web server
architectures . . . . . . . . . . . . . 231--243
Jan S. Rellermeyer and
Gustavo Alonso Concierge: a service platform for
resource-constrained devices . . . . . . 245--258
Yoav Etsion and
Dan Tsafrir and
Scott Kirkpatrick and
Dror G. Feitelson Fine grained kernel logging with
KLogger: experience and insights . . . . 259--272
Stephen Soltesz and
Herbert Pötzl and
Marc E. Fiuczynski and
Andy Bavier and
Larry Peterson Container-based operating system
virtualization: a scalable,
high-performance alternative to
hypervisors . . . . . . . . . . . . . . 275--287
Pradeep Padala and
Kang G. Shin and
Xiaoyun Zhu and
Mustafa Uysal and
Zhikui Wang and
Sharad Singhal and
Arif Merchant and
Kenneth Salem Adaptive control of virtualized
resources in utility computing
environments . . . . . . . . . . . . . . 289--302
Yin Wang and
Terence Kelly and
Stéphane Lafortune Discrete control for safe execution of
IT automation workflows . . . . . . . . 305--314
Rachid Guerraoui and
Michal Kapalka and
Jan Vitek STMBench7: a benchmark for software
transactional memory . . . . . . . . . . 315--324
Kristis Makris and
Kyung Dong Ryu Dynamic and adaptive updates of
non-quiescent subsystems in commodity
operating system kernels . . . . . . . . 327--340
Galen Hunt and
Mark Aiken and
Manuel Fähndrich and
Chris Hawblitzel and
Orion Hodson and
James Larus and
Steven Levi and
Bjarne Steensgaard and
David Tarditi and
Ted Wobber Sealing OS processes to improve
dependability and safety . . . . . . . . 341--354
Ted Wobber and
Aydan Yumerefendi and
Martín Abadi and
Andrew Birrell and
Daniel R. Simon Authorizing applications in singularity 355--368
Hakim Weatherspoon and
Patrick Eaton and
Byung-Gon Chun and
John Kubiatowicz Antiquity: exploiting a secure log for
wide-area distributed storage . . . . . 371--384
Lásaro Camargos and
Fernando Pedone and
Marcin Wieloch Sprint: a middleware for
high-performance transaction processing 385--398
Sameh Elnikety and
Steven Dropsho and
Willy Zwaenepoel Tashkent+: memory-aware load balancing
and update filtering in replicated
databases . . . . . . . . . . . . . . . 399--412
Michael Hohmuth Introduction . . . . . . . . . . . . . . 1--2
Gernot Heiser and
Kevin Elphinstone and
Ihor Kuz and
Gerwin Klein and
Stefan M. Petters Towards trustworthy computing systems:
taking microkernels to the next level 3--11
Bryan D. Payne and
Reiner Sailer and
Ramón Cáceres and
Ron Perez and
Wenke Lee A layered approach to simplified access
control in virtualized systems . . . . . 12--19
Jacob Gorm Hansen and
Eske Christiansen and
Eric Jul Evil twins: two models for TCB reduction
in HPC clusters . . . . . . . . . . . . 20--29
Neal H. Walfield and
Marcus Brinkmann A critique of the GNU Hurd multi-server
operating system . . . . . . . . . . . . 30--39
Norman Feske A case study on the cost and benefit of
dynamic RPC marshalling for low-level
system components . . . . . . . . . . . 40--48
Volkmar Uhlig The mechanics of in-kernel
synchronization for a scalable
microkernel . . . . . . . . . . . . . . 49--58
Jan Stoess Towards effective user-controlled
scheduling for microkernel-based systems 59--68
Dohun Kim and
Jugwan Eom and
Chanik Park L4oprof: a
performance-monitoring-unit-based
software-profiling framework for the L4
microkernel . . . . . . . . . . . . . . 69--76
Micha Hofri Service transparency considered harmful:
letter to the editor . . . . . . . . . . 77--77
Yuhui Deng Author response . . . . . . . . . . . . 78--78
Yuhui Deng and
Frank Wang Opportunities and challenges of storage
Grid enabled by Grid service . . . . . . 79--82
Hung-Yu Chien and
Chen-Wei Huang Security of ultra-lightweight RFID
authentication protocols and its
improvements . . . . . . . . . . . . . . 83--86
Anne-Marie Kermarrec and
Maarten van Steen Gossiping in distributed systems . . . . 2--7
Ken Birman The promise, and limitations, of gossip
protocols . . . . . . . . . . . . . . . 8--13
Lorenzo Alvisi and
Jeroen Doumen and
Rachid Guerraoui and
Boris Koldehofe and
Harry Li and
Robbert van Renesse and
Gilles Tredan How robust are gossip-based
communication protocols? . . . . . . . . 14--18
Yaacov Fernandess and
Antonio Fernández and
Maxime Monod A generic theoretical framework for
modeling gossip-based algorithms . . . . 19--27
Rena Bakhshi and
Francois Bonnet and
Wan Fokkink and
Boudewijn Haverkort Formal analysis techniques for gossiping
protocols . . . . . . . . . . . . . . . 28--36
Patrick Eugster and
Pascal Felber and
Fabrice Le Fessant The `art' of programming gossip-based
systems . . . . . . . . . . . . . . . . 37--42
Étienne Rivi\`ere and
Roberto Baldoni and
Harry Li and
José Pereira Compositional gossip: a conceptual
architecture for designing gossip-based
applications . . . . . . . . . . . . . . 43--50
Paolo Costa and
Vincent Gramoli and
Márk Jelasity and
Gian Paolo Jesi and
Erwan Le Merrer and
Alberto Montresor and
Leonardo Querzoni Exploring the interdisciplinary
connections of gossip-based systems . . 51--60
Ali Ghodsi and
Seif Haridi and
Hakim Weatherspoon Exploiting the synergy between gossiping
and structured overlays . . . . . . . . 61--66
Roy Friedman and
Daniela Gavidia and
Luis Rodrigues and
Aline Carneiro Viana and
Spyros Voulgaris Gossiping on MANETs: the beauty and the
beast . . . . . . . . . . . . . . . . . 67--74
Hakim Weatherspoon and
Hugo Miranda and
Konrad Iwanicki and
Ali Ghodsi and
Yann Busnel Gossiping over storage systems is
practical . . . . . . . . . . . . . . . 75--81
Jin Liang and
Indranil Gupta and
Klara Nahrstedt Reliable on-demand management operations
for large-scale distributed applications 82--88
Helen J. Wang and
Xiaofeng Fan and
Jon Howell and
Collin Jackson Protection and communication
abstractions for Web browsers in
MashupOS . . . . . . . . . . . . . . . . 1--16
Emre Kiciman and
Benjamin Livshits AjaxScope: a platform for remotely
monitoring the client-side behavior of
Web 2.0 applications . . . . . . . . . . 17--30
Stephen Chong and
Jed Liu and
Andrew C. Myers and
Xin Qi and
K. Vikram and
Lantian Zheng and
Xin Zheng Secure Web application via automatic
partitioning . . . . . . . . . . . . . . 31--44
Ramakrishna Kotla and
Lorenzo Alvisi and
Mike Dahlin and
Allen Clement and
Edmund Wong Zyzzyva: speculative Byzantine fault
tolerance . . . . . . . . . . . . . . . 45--58
Ben Vandiver and
Hari Balakrishnan and
Barbara Liskov and
Sam Madden Tolerating Byzantine faults in
transaction processing systems using
commit barrier scheduling . . . . . . . 59--72
James Hendricks and
Gregory R. Ganger and
Michael K. Reiter Low-overhead Byzantine fault-tolerant
storage . . . . . . . . . . . . . . . . 73--86
Christopher J. Rossbach and
Owen S. Hofmann and
Donald E. Porter and
Hany E. Ramadan and
Bhandari Aditya and
Emmett Witchel TxLinux: using and managing hardware
transactional memory in an operating
system . . . . . . . . . . . . . . . . . 87--102
Shan Lu and
Soyeon Park and
Chongfeng Hu and
Xiao Ma and
Weihang Jiang and
Zhenmin Li and
Raluca A. Popa and
Yuanyuan Zhou MUVI: automatically inferring
multi-variable access correlations and
detecting related semantic and
concurrency bugs . . . . . . . . . . . . 103--116
Manuel Costa and
Miguel Castro and
Lidong Zhou and
Lintao Zhang and
Marcus Peinado Bouncer: securing software by blocking
bad input . . . . . . . . . . . . . . . 117--130
Joseph Tucek and
Shan Lu and
Chengdu Huang and
Spiros Xanthos and
Yuanyuan Zhou Triage: diagnosing production run
failures at the user's site . . . . . . 131--144
Lin Tan and
Ding Yuan and
Gopal Krishna and
Yuanyuan Zhou /*icomment: bugs or bad comments?*/ . . 145--158
Marcos K. Aguilera and
Arif Merchant and
Mehul Shah and
Alistair Veitch and
Christos Karamanolis Sinfonia: a new paradigm for building
scalable distributed systems . . . . . . 159--174
Andreas Haeberlen and
Petr Kouznetsov and
Peter Druschel PeerReview: practical accountability for
distributed systems . . . . . . . . . . 175--188
Byung-Gon Chun and
Petros Maniatis and
Scott Shenker and
John Kubiatowicz Attested append-only memory: making
adversaries stick to their word . . . . 189--204
Giuseppe DeCandia and
Deniz Hastorun and
Madan Jampani and
Gunavardhan Kakulapati and
Avinash Lakshman and
Alex Pilchin and
Swaminathan Sivasubramanian and
Peter Vosshall and
Werner Vogels Dynamo: Amazon's highly available
key-value store . . . . . . . . . . . . 205--220
Olivier Crameri and
Nikola Knezevic and
Dejan Kostic and
Ricardo Bianchini and
Willy Zwaenepoel Staged deployment in Mirage, an
integrated software upgrade testing and
distribution system . . . . . . . . . . 221--236
Ya-Yunn Su and
Mona Attariyan and
Jason Flinn AutoBash: improving configuration
management with operating system
causality analysis . . . . . . . . . . . 237--250
Kevin Klues and
Vlado Handziski and
Chenyang Lu and
Adam Wolisz and
David Culler and
David Gay and
Philip Levis Integrating concurrency control and
energy management in device drivers . . 251--264
Ripal Nathuji and
Karsten Schwan VirtualPower: coordinated power
management in virtualized enterprise
systems . . . . . . . . . . . . . . . . 265--278
Oren Laadan and
Ricardo A. Baratto and
Dan B. Phung and
Shaya Potter and
Jason Nieh DejaView: a personal virtual computer
recorder . . . . . . . . . . . . . . . . 279--292
Haryadi S. Gunawi and
Vijayan Prabhakaran and
Swetha Krishnan and
Andrea C. Arpaci-Dusseau and
Remzi H. Arpaci-Dusseau Improving file system reliability with
I/O shepherding . . . . . . . . . . . . 293--306
Christopher Frost and
Mike Mammarella and
Eddie Kohler and
Andrew de los Reyes and
Shant Hovsepian and
Andrew Matsuoka and
Lei Zhang Generalized file system dependencies . . 307--320
Maxwell Krohn and
Alexander Yip and
Micah Brodsky and
Natan Cliffer and
M. Frans Kaashoek and
Eddie Kohler and
Robert Morris Information flow control for standard OS
abstractions . . . . . . . . . . . . . . 321--334
Arvind Seshadri and
Mark Luk and
Ning Qu and
Adrian Perrig SecVisor: a tiny hypervisor to provide
lifetime kernel code integrity for
commodity OSes . . . . . . . . . . . . . 335--350
John Criswell and
Andrew Lenharth and
Dinakar Dhurjati and
Vikram Adve Secure virtual architecture: a safe
execution environment for commodity
operating systems . . . . . . . . . . . 351--366
Dilma Da Silva and
Robert W. Wisniewski Introduction . . . . . . . . . . . . . . 1--1
Muli Ben-Yehuda and
Eric Van Hensbergen Open source as a foundation for systems
research . . . . . . . . . . . . . . . . 2--4
Robert W. Wisniewski and
Dilma da Silva and
Marc Auslander and
Orran Krieger and
Michal Ostrowski and
Bryan Rosenburg K42: lessons for the OS community . . . 5--12
Joefon Jann and
R. Sarma Burugula and
Niteesh Dubey and
Pratap Pattnaik End-to-end performance of commercial
applications in the face of changing
hardware . . . . . . . . . . . . . . . . 13--20
Yaoping Ruan and
Vivek S. Pai and
Erich Nahum and
John M. Tracey Do commodity SMT processors need more OS
research? . . . . . . . . . . . . . . . 21--25
Dan Pelleg and
Muli Ben-Yehuda and
Rick Harper and
Lisa Spainhower and
Tokunbo Adeshiyan Vigilant: out-of-band detection of
failures in virtual machines . . . . . . 26--31
David C. Toll and
Paul A. Karger and
Elaine R. Palmer and
Suzanne K. McIntosh and
Sam Weber The Caernarvon secure embedded operating
system . . . . . . . . . . . . . . . . . 32--39
Stefan Berger and
Ramón Cáceres and
Dimitrios Pendarakis and
Reiner Sailer and
Enriquillo Valdez and
Ronald Perez and
Wayne Schildhauer and
Deepa Srinivasan TVDc: managing security in the trusted
virtual datacenter . . . . . . . . . . . 40--47
R. Ananthanarayanan and
M. Eshel and
R. Haskin and
M. Naik and
F. Schmuck and
R. Tewari Panache: a parallel WAN cache for
clustered filesystems . . . . . . . . . 48--53
Mohammad Banikazemi and
Jim Hafner and
Wendy Belluomini and
KK Rao and
Dan Poff and
Bulent Abali Flipstone: managing storage with
fail-in-place and deferred maintenance
service models . . . . . . . . . . . . . 54--62
Norman Bobroff and
Gargi Dasgupta and
Liana Fong and
Yanbin Liu and
Balaji Viswanathan and
Fabio Benedetti and
Jonathan Wagner A distributed job scheduling and flow
management system . . . . . . . . . . . 63--70
Kun Wang and
Yu Zhang and
Huayong Wang and
Xiaowei Shen Parallelization of IBM Mambo system
simulator in functional modes . . . . . 71--76
Jonathan Appavoo and
Volkmar Uhlig and
Amos Waterland Project Kittyhawk: building a
global-scale computer: Blue Gene/P as a
generic computing platform . . . . . . . 77--84
Eric Van Hensbergen and
Charles Forsyth and
Jim McKie and
Ron Minnich Holistic aggregate resource environment 85--91
David Choffnes and
Mark Astley and
Michael J. Ward Migration policies for multi-core
fair-share scheduling . . . . . . . . . 92--93
Ma\lgorzata Steinder and
Ian Whalley and
David Chess Server virtualization in autonomic
management of heterogeneous workloads 94--95
Liana Fong and
Ma\lgorzata Steinder Duality of virtualization:
simplification and complexity . . . . . 96--97
Tiancheng Liu and
Ying Li and
Andrew Schofield and
Matt Hogstrom and
Kewei Sun and
Ying Chen Partition-based heap memory management
in an application server . . . . . . . . 98--98
Arup Acharya and
Xiping Wang and
Charles Wright SIP message classification: design and
performance . . . . . . . . . . . . . . 100--101
Yi Ge and
Chen Wang and
Xiaowei Shen and
Honesty Young A database scale-out solution for
emerging write-intensive commercial
workloads . . . . . . . . . . . . . . . 102--103
Karan Gupta and
Prasenjit Sarkar and
Lesley Mbogo MIRAGE: storage provisioning in large
data centers using balanced component
utilizations . . . . . . . . . . . . . . 104--105
Maria Butrico and
Dilma Da Silva and
Orran Krieger and
Michal Ostrowski and
Bryan Rosenburg and
Dan Tsafrir and
Eric Van Hensbergen and
Robert W. Wisniewski and
Jimi Xenidis Specialized execution environments . . . 106--107
Sheetal Agarwal and
Dipanjan Chakraborty and
Swati Challa and
Nandakishore Kambhatla and
Arun Kumar and
Sougata Mukherjea and
Amit Anil Nanavati and
Nitendra Rajput \em Pyr.mea.IT: permeating IT towards
the base of the pyramid . . . . . . . . 108--109
Muli Ben-Yehuda 1st Annual Haifa Systems and Storage
Conference (SYSTOR 2007): a message from
the organizers . . . . . . . . . . . . . 110--110
Kfir Karmon and
Liran Liss and
Assaf Schuster GWiQ-P: an efficient decentralized
Grid-wide quota enforcement protocol . . 111--118
Sorin Faibish and
Stephen Fridella and
Peter Bixby and
Uday Gupta Storage virtualization using a
block-device file system . . . . . . . . 119--126
Paula Ta-Shma and
Guy Laden and
Muli Ben-Yehuda and
Michael Factor Virtual machine time travel using
continuous data protection and
checkpointing . . . . . . . . . . . . . 127--134
Erik Winfree Toward molecular programming with DNA 1--1
Xiaoxin Chen and
Tal Garfinkel and
E. Christopher Lewis and
Pratap Subrahmanyam and
Carl A. Waldspurger and
Dan Boneh and
Jeffrey Dwoskin and
Dan R. K. Ports Overshadow: a virtualization-based
approach to retrofitting protection in
commodity operating systems . . . . . . 2--13
Jonathan M. McCune and
Bryan Parno and
Adrian Perrig and
Michael K. Reiter and
Arvind Seshadri How low can you go?: recommendations for
hardware-supported minimal TCB code
execution . . . . . . . . . . . . . . . 14--25
Ravi Bhargava and
Benjamin Serebrin and
Francesco Spadini and
Srilatha Manne Accelerating two-dimensional page walks
for virtualized systems . . . . . . . . 26--35
Benjamin C. Lee and
David Brooks Efficiency trends and limits from
comprehensive microarchitectural
adaptivity . . . . . . . . . . . . . . . 36--47
Ramya Raghavendra and
Parthasarathy Ranganathan and
Vanish Talwar and
Zhikui Wang and
Xiaoyun Zhu No `power' struggles: coordinated
multi-level power management for the
data center . . . . . . . . . . . . . . 48--59
Chinnakrishnan S. Ballapuram and
Ahmad Sharif and
Hsien-Hsin S. Lee Exploiting access semantics and program
behavior to reduce snoop power in chip
multiprocessors . . . . . . . . . . . . 60--69
Arindam Mallik and
Jack Cosgrove and
Robert P. Dick and
Gokhan Memik and
Peter Dinda PICSEL: measuring user-perceived
performance to control dynamic frequency
scaling . . . . . . . . . . . . . . . . 70--79
Jose A. Joao and
Onur Mutlu and
Hyesoon Kim and
Rishi Agarwal and
Yale N. Patt Improving the performance of
object-oriented languages with dynamic
predication of indirect jumps . . . . . 80--90
Michal Wegiel and
Chandra Krintz The Mapping Collector: virtual memory
support for generational, parallel, and
concurrent compaction . . . . . . . . . 91--102
Joe Devietti and
Colin Blundell and
Milo M. K. Martin and
Steve Zdancewic Hardbound: architectural support for
spatial safety of the C programming
language . . . . . . . . . . . . . . . . 103--114
Vitaliy B. Lvin and
Gene Novark and
Emery D. Berger and
Benjamin G. Zorn Archipelago: trading address space for
reliability and security . . . . . . . . 115--124
Bumyong Choi and
Leo Porter and
Dean M. Tullsen Accurate branch prediction for short
threads . . . . . . . . . . . . . . . . 125--134
Shekhar Srikantaiah and
Mahmut Kandemir and
Mary Jane Irwin Adaptive set pinning: managing shared
caches in chip multiprocessors . . . . . 135--144
James Tuck and
Wonsun Ahn and
Luis Ceze and
Josep Torrellas SoftSig: software-exposed hardware
signatures for code analysis and
optimization . . . . . . . . . . . . . . 145--156
Ioana Burcea and
Stephen Somogyi and
Andreas Moshovos and
Babak Falsafi Predictor virtualization . . . . . . . . 157--167
Vinod Ganapathy and
Matthew J. Renzelmann and
Arini Balakrishnan and
Michael M. Swift and
Somesh Jha The design and implementation of
microdrivers . . . . . . . . . . . . . . 168--178
Yaron Weinsberg and
Danny Dolev and
Tal Anker and
Muli Ben-Yehuda and
Pete Wyckoff Tapping into the fountain of CPUs: on
operating system support for
programmable devices . . . . . . . . . . 179--188
Kai Shen and
Ming Zhong and
Sandhya Dwarkadas and
Chuanpeng Li and
Christopher Stewart and
Xiao Zhang Hardware counter driven on-the-fly
request signatures . . . . . . . . . . . 189--200
Luk Van Ertvelde and
Lieven Eeckhout Dispersing proprietary applications as
benchmarks through code mutation . . . . 201--210
Shashidhar Mysore and
Bita Mazloom and
Banit Agrawal and
Timothy Sherwood Understanding and visualizing full
systems with data flow tomography . . . 211--221
Guilherme Ottoni and
David I. August Communication optimizations for global
multi-threaded instruction scheduling 222--232
Milind Kulkarni and
Keshav Pingali and
Ganesh Ramanarayanan and
Bruce Walter and
Kavita Bala and
L. Paul Chew Optimistic parallelism benefits from
data partitioning . . . . . . . . . . . 233--243
Russ Cox and
Tom Bergan and
Austin T. Clements and
Frans Kaashoek and
Eddie Kohler Xoc, an extension-oriented compiler for
systems programming . . . . . . . . . . 244--254
Philip M. Wells and
Koushik Chakraborty and
Gurindar S. Sohi Adapting to intermittent faults in
multicore systems . . . . . . . . . . . 255--264
Man-Lap Li and
Pradeep Ramachandran and
Swarup Kumar Sahoo and
Sarita V. Adve and
Vikram S. Adve and
Yuanyuan Zhou Understanding the propagation of hard
errors to software and implications for
resilient system design . . . . . . . . 265--276
M. Aater Suleman and
Moinuddin K. Qureshi and
Yale N. Patt Feedback-driven threading:
power-efficient and high-performance
execution of multi-threaded workloads on
CMPs . . . . . . . . . . . . . . . . . . 277--286
Michael D. Linderman and
Jamison D. Collins and
Hong Wang and
Teresa H. Meng Merge: a programming model for
heterogeneous multi-core systems . . . . 287--296
Jayanth Gummaraju and
Joel Coburn and
Yoshio Turner and
Mendel Rosenblum Streamware: programming general-purpose
multicore processors using streams . . . 297--307
Edmund B. Nightingale and
Daniel Peek and
Peter M. Chen and
Jason Flinn Parallelizing security checks on
commodity hardware . . . . . . . . . . . 308--318
Miguel Castro and
Manuel Costa and
Jean-Philippe Martin Better bug reporting with better privacy 319--328
Shan Lu and
Soyeon Park and
Eunsoo Seo and
Yuanyuan Zhou Learning from mistakes: a comprehensive
study on real world concurrency bug
characteristics . . . . . . . . . . . . 329--339
Ewa Huebner and
Frans Henskens The role of operating systems in
computer forensics . . . . . . . . . . . 1--3
Ying Xia and
Kevin Fairbanks and
Henry Owen A program behavior matching architecture
for probabilistic file system forensics 4--13
Eugene Libster and
Jesse D. Kornblum A proposal for an integrated memory
acquisition mechanism . . . . . . . . . 14--20
Ashvin Goel and
Kamran Farhadi and
Kenneth Po and
Wu-chang Feng Reconstructing system state for
intrusion analysis . . . . . . . . . . . 21--28
J. Todd McDonald and
Yong C. Kim and
Alec Yasinsac Software issues in digital forensics . . 29--40
Steena D. S. Monteiro and
Robert F. Erbacher An authentication and validation
mechanism for analyzing syslogs
forensically . . . . . . . . . . . . . . 41--50
Federico Maggi and
Stefano Zanero and
Vincenzo Iozzo Seeing the invisible: forensic uses of
anomaly detection and machine learning 51--58
Doug Wampler and
James H. Graham A normality based method for detecting
kernel rootkits . . . . . . . . . . . . 59--64
Iain Sutherland and
Jon Evans and
Theodore Tryfonas and
Andrew Blyth Acquiring volatile operating system data
tools and techniques . . . . . . . . . . 65--73
Brian Hay and
Kara Nance Forensics examination of volatile system
data using virtual introspection . . . . 74--82
Jason Franklin and
Mark Luk and
Jonathan M. McCune and
Arvind Seshadri and
Adrian Perrig and
Leendert van Doorn Remote detection of virtual machine
monitors with fuzzy benchmarking . . . . 83--92
Eoghan Casey and
Gerasimos J. Stellatos The impact of full disk encryption on
digital forensics . . . . . . . . . . . 93--98
John McHugh and
Ron McLeod and
Vagishwari Nagaonkar Passive network forensics: behavioural
classification of network hosts based on
connection patterns . . . . . . . . . . 99--111
Sean Peisert and
Matt Bishop and
Keith Marzullo Computer forensics in forensis . . . . . 112--122
Thomas C. Bressoud and
M. Frans Kaashoek Chairs' report on Twenty-First ACM
Symposium on Operating Systems
Principles . . . . . . . . . . . . . . . 123--126
Rebecca Isaacs Report on the 2007 SOSP shadow program
committee . . . . . . . . . . . . . . . 127--131
Jeffrey C. Mogul Policies for the SIGOPS Hall of Fame
Award . . . . . . . . . . . . . . . . . 132--135
Thomas C. Bressoud Session scribe notes for Twenty-First
ACM Symposium on Operating Systems
Principles . . . . . . . . . . . . . . . 136--151
Andreas Merkel and
Frank Bellosa Task activity vectors: a new metric for
temperature-aware scheduling . . . . . . 1--12
Anna Povzner and
Tim Kaldewey and
Scott Brandt and
Richard Golding and
Theodore M. Wong and
Carlos Maltzahn Efficient guaranteed disk request
scheduling with Fahrrad . . . . . . . . 13--25
Yoshihisa Abe and
Hiroshi Yamada and
Kenji Kono Enforcing appropriate process execution
for exploiting idle resources from
outside operating systems . . . . . . . 27--40
Dut h T. Meyer and
Gitika Aggarwal and
Brendan Cully and
Geoffrey Lefebvre and
Michael J. Feeley and
Norman C. Hutchinson and
Andrew Warfield Parallax: virtual disks for virtual
machines . . . . . . . . . . . . . . . . 41--54
Ming Zhong and
Kai Shen and
Joel Seiferas Replication degree customization for
high availability . . . . . . . . . . . 55--68
Nikolai Joukov and
Josef Sipek GreenFS: making enterprise computers
greener by protecting them better . . . 69--80
Carsten Weinhold and
Hermann Härtig VPFS: building a virtual private file
system with a small trusted computing
base . . . . . . . . . . . . . . . . . . 81--93
Shvetank Jain and
Fareha Shafique and
Vladan Djeric and
Ashvin Goel Application-level isolation and recovery
with solitude . . . . . . . . . . . . . 95--107
Bin Cheng and
Lex Stein and
Hai Jin and
Zheng Zhang Towards cinematic Internet
video-on-demand . . . . . . . . . . . . 109--122
Paul Grace and
Danny Hughes and
Barry Porter and
Gordon S. Blair and
Geoff Coulson and
Francois Taiani Experiences with open overlays: a
middleware approach to network
heterogeneity . . . . . . . . . . . . . 123--136
Jiantao Kong and
Karsten Schwan and
Min Lee and
Mustaque Ahamad Protectit: trusted distributed services
operating on sensitive data . . . . . . 137--147
Shan He and
Renan G. Cattelan and
Darko Kirovski Modeling viral economies for digital
media . . . . . . . . . . . . . . . . . 149--162
Alysson Neves Bessani and
Eduardo Pelison Alchieri and
Miguel Correia and
Joni Silva Fraga DepSpace: a Byzantine fault-tolerant
coordination service . . . . . . . . . . 163--176
Xi Wang and
Zhenyu Guo and
Xuezheng Liu and
Zhilei Xu and
Haoxiang Lin and
Xiaoge Wang and
Zheng Zhang Hang analysis: fighting responsiveness
bugs . . . . . . . . . . . . . . . . . . 177--190
Eric Koskinen and
John Jannotti BorderPatrol: isolating events for
black-box tracing . . . . . . . . . . . 191--203
Simon Peter and
Andrew Baumann and
Timothy Roscoe and
Paul Barham and
Rebecca Isaacs 30 seconds is not enough!: a study of
operating system timer usage . . . . . . 205--218
Karthik Pattabiraman and
Vinod Grover and
Benjamin G. Zorn Samurai: protecting critical data in
unsafe languages . . . . . . . . . . . . 219--232
Angela Nicoara and
Gustavo Alonso and
Timothy Roscoe Controlled, systematic, and efficient
code replacement for running Java
programs . . . . . . . . . . . . . . . . 233--246
Yoann Padioleau and
Julia Lawall and
René Rydhof Hansen and
Gilles Muller Documenting and automating collateral
evolutions in Linux device drivers . . . 247--260
Troy Ronda and
Stefan Saroiu and
Alec Wolman Itrustpage: a user-assisted
anti-phishing tool . . . . . . . . . . . 261--272
Christof Fetzer and
Martin Süßkraut Switchblade: enforcing dynamic
personalized system call models . . . . 273--286
Georgios Portokalidis and
Herbert Bos Eudaemon: involuntary and on-demand
emulation against zero-day exploits . . 287--299
Petros Efstathopoulos and
Eddie Kohler Manageable fine-grained information flow 301--313
Jonathan M. McCune and
Bryan J. Parno and
Adrian Perrig and
Michael K. Reiter and
Hiroshi Isozaki Flicker: an execution infrastructure for
TCB minimization . . . . . . . . . . . . 315--328
Muli Ben-Yehuda and
Eric Van Hensbergen and
Marc Fiuczynski Minding the gap: R&D in the Linux kernel 1--3
Paul E. McKenney and
Jonathan Walpole Introducing technology into the Linux
kernel: a case study . . . . . . . . . . 4--17
Helge Bahmann and
Konrad Froitzheim Extending futex for kernel to user
notification . . . . . . . . . . . . . . 18--26
Ashwin Ganti Plan 9 authentication in Linux . . . . . 27--33
Chee Siang Wong and
Ian Tan and
Rosalind Deena Kumari and
Fun Wey Towards achieving fairness in the Linux
scheduler . . . . . . . . . . . . . . . 34--43
Silviu S. Craciunas and
Christoph M. Kirsch and
Harald Röck I/O resource management through system
call scheduling . . . . . . . . . . . . 44--54
Willem de Bruijn and
Herbert Bos PipesFS: fast Linux I/O in the Unix
tradition . . . . . . . . . . . . . . . 55--63
Sangtae Ha and
Injong Rhee and
Lisong Xu CUBIC: a new TCP-friendly high-speed TCP
variant . . . . . . . . . . . . . . . . 64--74
Fengguang Wu and
Hongsheng Xi and
Chenfeng Xu On the design of a new Linux readahead
framework . . . . . . . . . . . . . . . 75--84
David Boutcher and
Abhishek Chandra Practical techniques for purging deleted
data using liveness information . . . . 85--94
Rusty Russell \tt virtio: towards a de-facto standard
for virtual I/O devices . . . . . . . . 95--103
Sukadev Bhattiprolu and
Eric W. Biederman and
Serge Hallyn and
Daniel Lezcano Virtual servers and checkpoint/restart
in mainstream Linux . . . . . . . . . . 104--113
Peter Varman and
Jun Wang Storage and I/O virtualization,
performance, energy, evaluation and
dependability (SPEED08) . . . . . . . . 1--2
Jorge Guerra and
Luis Useche and
Medha Bhadkamkar and
Ricardo Koller and
Raju Rangaswami The case for active block layer
extensions . . . . . . . . . . . . . . . 3--9
Ajay Gulati and
Irfan Ahmad Towards distributed storage resource
management using flow control . . . . . 10--16
Ping Ge and
Hailong Cai Providing differentiated QoS for
peer-to-peer file sharing systems . . . 17--23
Himanshu Raj and
Karsten Schwan O2S2: enhanced object-based virtualized
storage . . . . . . . . . . . . . . . . 24--29
Shuibing He and
Dan Feng Design of an object-based storage device
based on I/O processor . . . . . . . . . 30--35
Sungjin Lee and
Dongkun Shin and
Young-Jin Kim and
Jihong Kim LAST: locality-aware sector translation
for NAND flash memory-based storage
systems . . . . . . . . . . . . . . . . 36--42
Christina M. Patrick and
SeungWoo Son and
Mahmut Kandemir Comparative evaluation of overlap
strategies with study of I/O overlap in
MPI-IO . . . . . . . . . . . . . . . . . 43--49
Rômulo Silva de Oliveira and
Alexandre Sztajnberg Brazilian workshop on operating systems 50--51
Paul Regnier and
George Lima and
Luciano Barreto Evaluation of interrupt handling
timeliness in real-time Linux operating
systems . . . . . . . . . . . . . . . . 52--63
Eduardo M. Colaço and
Marcelo Iury S. Oliveira and
Alexandro S. Soares and
Francisco Brasileiro and
Dalton S. Guerrero Using a file working set model to speed
up the recovery of Peer-to-Peer backup
systems . . . . . . . . . . . . . . . . 64--70
Geovani Ricardo Wiedenhoft and
Lucas Francisco Wanner and
Giovani Gracioli and
Antônio Augusto Fröhlich Power management in the EPOS system . . 71--80
Edson T. Midorikawa and
Ricardo L. Piantola and
Hugo H. Cassettari On adaptive replacement based on LRU
with working area restriction algorithm 81--92
Steven Robbins A three pronged approach to teaching
undergraduate operating systems . . . . 93--100
Roelof Hamberg and
Frits Vaandrager Using model checkers in an introductory
course on operating systems . . . . . . 101--111
Gary Grider and
James Nunez and
John Bent and
Steve Poole and
Rob Ross and
Evan Felix Coordinating government funding of file
system and I/O research through the high
end computing university research
activity . . . . . . . . . . . . . . . . 2--7
Jeffrey C. Mogul and
Jay J. Wylie Computer systems research at HP Labs . . 8--9
John Wilkes Traveling to Rome: a retrospective on
the journey . . . . . . . . . . . . . . 10--15
Patrick Goldsack and
Julio Guijarro and
Steve Loughran and
Alistair Coles and
Andrew Farrell and
Antonio Lain and
Paul Murray and
Peter Toft The SmartFrog configuration management
framework . . . . . . . . . . . . . . . 16--25
Jack Brassil and
Rick McGeer and
Raj Rajagopalan and
Puneet Sharma and
Praveen Yalagandula and
Sujata Banerjee and
David P. Reed and
Sung-Ju Lee The CHART system: a high-performance,
fair transport architecture based on
explicit-rate signaling . . . . . . . . 26--35
Chris I. Dalton and
David Plaquin and
Wolfgang Weidner and
Dirk Kuhlmann and
Boris Balacheff and
Richard Brown Trusted virtual platforms: a key enabler
for converged client devices . . . . . . 36--43
Adrian Baldwin and
Chris Dalton and
Simon Shiu and
Krzysztof Kostienko and
Qasim Rajpoot Providing secure services for a virtual
infrastructure . . . . . . . . . . . . . 44--51
Eduardo Argollo and
Ayose Falcón and
Paolo Faraboschi and
Matteo Monchiero and
Daniel Ortega COTSon: infrastructure for full system
simulation . . . . . . . . . . . . . . . 52--61
Xiaoyun Zhu and
Mustafa Uysal and
Zhikui Wang and
Sharad Singhal and
Arif Merchant and
Pradeep Padala and
Kang Shin What does control theory bring to
systems research? . . . . . . . . . . . 62--69
Eric Anderson and
Martin Arlitt and
Charles B. Morrey III and
Alistair Veitch DataSeries: an efficient, flexible data
format for structured serial data . . . 70--75
Anna Povzner and
Kimberly Keeton and
Arif Merchant and
Charles B. Morrey III and
Mustafa Uysal and
Marcos K. Aguilera Autograph: automatically extracting
workflow file signatures . . . . . . . . 76--83
George Forman and
Kave Eshghi and
Jaap Suermondt Efficient detection of large-scale
redundancy in enterprise file systems 84--91
Umeshwar Dayal and
Harumi Kuno and
Janet L. Wiener and
Kevin Wilkinson and
Archana Ganapathi and
Stefan Krompass Managing operational business
intelligence workloads . . . . . . . . . 92--98
Kim Hazelwood and
Mohamed Zahran Challenges and opportunities at all
levels: interactions among operating
systems, compilers, and multicore
processors . . . . . . . . . . . . . . . 3--4
Philip M. Wells and
Koushik Chakraborty and
Gurindar S. Sohi Dynamic heterogeneity and the need for
multicore virtualization . . . . . . . . 5--14
Vijay Nagarajan and
Rajiv Gupta Runtime monitoring on multicores via
OASES . . . . . . . . . . . . . . . . . 15--24
M. Mustafa Rafique and
Benjamin Rose and
Ali R. Butt and
Dimitrios S. Nikolopoulos Supporting MapReduce on large-scale
asymmetric multi-core clusters . . . . . 25--34
Richard Strong and
Jayaram Mudigonda and
Jeffrey C. Mogul and
Nathan Binkert and
Dean Tullsen Fast switching of threads between cores 35--45
Stanislav Bratanov and
Roman Belenov and
Nikita Manovich Virtual machines: a whole new world for
performance analysis . . . . . . . . . . 46--55
Reza Azimi and
David K. Tam and
Livio Soares and
Michael Stumm Enhancing operating system support for
multicore processors by using hardware
performance monitoring . . . . . . . . . 56--65
Daniel Shelepov and
Alexandra Fedorova and
Sergey Blagodurov and
Juan Carlos Saez Alcaide and
Nestor Perez and
Viren Kumar and
Stacey Jeffery and
Zhi Feng Huang HASS: a scheduler for heterogeneous
multicore systems . . . . . . . . . . . 66--75
David Wentzlaff and
Anant Agarwal Factored operating systems (fos): the
case for a scalable operating system for
multicores . . . . . . . . . . . . . . . 76--85
Miquel Moreto and
Francisco J. Cazorla and
Alex Ramirez and
Rizos Sakellariou and
Mateo Valero FlexDCP: a QoS framework for CMP
architectures . . . . . . . . . . . . . 86--96
Thomas Karcher and
Christoph Schaefer and
Victor Pankratius Auto-tuning support for manycore
applications: perspectives for operating
systems and compilers . . . . . . . . . 96--97
K. Kunal and
K. George and
M. Gautam and
V. Kamakoti HTM design spaces: complete decoupling
from caches and achieving highly
concurrent transactions . . . . . . . . 98--99
David A. Penry Multicore diversity: a software
developer's nightmare . . . . . . . . . 100--101
Dong Hyuk Woo and
Hsien-Hsin S. Lee PROPHET: goal-oriented provisioning for
highly tunable multicore processors in
cloud computing . . . . . . . . . . . . 102--103
David Nellans and
Rajeev Balasubramonian and
Erik Brunvand OS execution on multi-cores: is
out-sourcing worthwhile? . . . . . . . . 104--105
Jeffrey C. Mogul WOWCS: the Workshop on Organizing
Workshops, Conferences, and Symposia for
Computer Systems . . . . . . . . . . . . 106--107
Thomas Anderson Conference reviewing considered harmful 108--116
John R. Douceur Paper rating vs. paper ranking . . . . . 117--121
Gabriel Kliot and
Erez Petrank and
Bjarne Steensgaard A lock-free, concurrent, and incremental
stack scanning mechanism for garbage
collectors . . . . . . . . . . . . . . . 3--13
Michael R. Hines and
Umesh Deshpande and
Kartik Gopalan Post-copy live migration of virtual
machines . . . . . . . . . . . . . . . . 14--26
Timothy Wood and
Gabriel Tarasuk-Levin and
Prashant Shenoy and
Peter Desnoyers and
Emmanuel Cecchet and
Mark D. Corner Memory buddies: exploiting page sharing
for smart colocation in virtualized data
centers . . . . . . . . . . . . . . . . 27--36
Weiming Zhao and
Zhenlin Wang and
Yingwei Luo Dynamic memory balancing for virtual
machines . . . . . . . . . . . . . . . . 37--47
Xipeng Shen and
Feng Mao and
Kai Tian and
Eddy Zheng Zhang The study and handling of program inputs
in the selection of garbage collectors 48--61
Huacai Chen and
Hai Jin and
Zhiyuan Shao and
Kan Hu and
Ke Yu and
Kun Tian ClientVisor: leverage COTS OS
functionalities for power management in
virtualized desktop environment . . . . 62--71
Micah Dowty and
Jeremy Sugerman GPU virtualization on VMware's hosted
I/O architecture . . . . . . . . . . . . 73--82
Lei Xia and
Jack Lange and
Peter Dinda and
Chang Bae Investigating virtual passthrough I/O on
commodity devices . . . . . . . . . . . 83--94
Asim Kadav and
Michael M. Swift Live migration of direct-access devices 95--104
Viren Kumar and
Alexandra Fedorova Towards better performance per watt in
virtual environments on asymmetric
single-ISA multi-core systems . . . . . 105--109
Hakim Weatherspoon and
Doug Terry and
Gregory Chockler Summary of the 3rd ACM SIGOPS Workshop
on Large-Scale Distributed Systems and
Middleware (LADIS 2009) . . . . . . . . 3--4
Liviu Ciortea and
Cristian Zamfir and
Stefan Bucur and
Vitaly Chipounov and
George Candea Cloud9: a software testing service . . . 5--10
Kiran-Kumar Muniswamy-Reddy and
Margo Seltzer Provenance as first class cloud data . . 11--16
Boon Thau Loo and
Stefan Saroiu 5th International Workshop on Networking
Meets Databases (NetDB 2009) . . . . . . 17--18
Yun Mao On the declarativity of declarative
networking . . . . . . . . . . . . . . . 19--24
Peter Alvaro and
Tyson Condie and
Neil Conway and
Joseph M. Hellerstein and
Russell Sears I do declare: consensus in a logic
language . . . . . . . . . . . . . . . . 25--30
Eric Eide and
Gilles Muller and
Olaf Spinczyk PLOS 2009: Fifth Workshop on Programming
Languages and Operating Systems . . . . 31--34
Pierre-Evariste Dagand and
Andrew Baumann and
Timothy Roscoe Filet-o-fish: practical and dependable
domain-specific languages for OS
development . . . . . . . . . . . . . . 35--39
Lonnie Princehouse and
Ken Birman Code-partitioning gossip . . . . . . . . 40--44
Frederick R. M. Barnes and
Carl G. Ritson Checking process-oriented operating
system behaviour using CSP and
refinement . . . . . . . . . . . . . . . 45--49
Walid Dabbous and
Maximilian Ott Overview of the ROADS'09 workshop . . . 50--53
Thierry Rakotoarivelo and
Maximilian Ott and
Guillaume Jourjon and
Ivan Seskar OMF: a control and management framework
for networking testbeds . . . . . . . . 54--59
Mathieu Lacage and
Martin Ferrari and
Mads Hansen and
Thierry Turletti and
Walid Dabbous NEPI: using independent simulators,
emulators, and testbeds for easy
experimentation . . . . . . . . . . . . 60--65
Nikola Kne\vzevi\'c and
Simon Schubert and
Dejan Kosti\'c Towards a cost-effective networking
testbed . . . . . . . . . . . . . . . . 66--71
Tapan Parikh and
Vivek Pai NSDR 2009 3rd Workshop on Networked
Systems for Developing Regions . . . . . 72--72
Michael Paik and
Lakshminarayanan Subramanian Signet: low-cost auditable transactions
using SIMs and mobile phones . . . . . . 73--78
William B. Lober and
Stephen Wagner and
Christina Quiles Development and implementation of a
loosely coupled, multi-site, networked
and replicated electronic medical record
in Haiti . . . . . . . . . . . . . . . . 79--83
Jonathan Ledlie and
Billy Odero and
Einat Minkov and
Imre Kiss and
Joseph Polifroni Crowd translator: on building localized
speech recognizers through micropayments 84--89
James Mickens and
Dilma da Silva SOSP diversity workshop . . . . . . . . 90--91
John Ousterhout and
Parag Agrawal and
David Erickson and
Christos Kozyrakis and
Jacob Leverich and
David Mazi\`eres and
Subhasish Mitra and
Aravind Narayanan and
Guru Parulkar and
Mendel Rosenblum and
Stephen M. Rumble and
Eric Stratmann and
Ryan Stutsman The case for RAMClouds: scalable
high-performance storage entirely in
DRAM . . . . . . . . . . . . . . . . . . 92--105
Jeanna Neefe Matthews Workshop proceedings and other
publications in Operating System
Review . . . . . . . . . . . . . . . . . 1--1
Jacob Strauss and
Chris Lesniewski-Laas and
Justin Mazzola Paluska and
Bryan Ford and
Robert Morris and
Frans Kaashoek Device transparency: a new model for
mobile storage . . . . . . . . . . . . . 5--9
Samer Al-Kiswany and
Abdullah Gharaibeh and
Matei Ripeanu The case for a versatile storage system 10--14
Kimberly Keeton and
Charles B. Morrey III and
Craig A. N. Soules and
Alistair Veitch LazyBase: freshness vs. performance in
information management . . . . . . . . . 15--19
David Boutcher and
Abhishek Chandra Does virtualization make disk scheduling
passé? . . . . . . . . . . . . . . . . . 20--24
Swaminathan Sundararaman and
Sriram Subramanian and
Abhishek Rajimwale and
Andrea C. Arpaci-Dusseau and
Remzi H. Arpaci-Dusseau and
Michael M. Swift Why panic()?: improving reliability with
restartable file systems . . . . . . . . 25--29
Saeed Ghanbari and
Gokul Soundararajan and
Cristiana Amza SelfTalk for Dena: query language and
runtime support for evaluating system
behavior . . . . . . . . . . . . . . . . 30--34
Jorge Guerra and
Wendy Belluomini and
Joseph Glider and
Karan Gupta and
Himabindu Pucha Energy proportionality for storage:
impact and feasibility . . . . . . . . . 35--39
Eric Anderson and
Joseph Tucek Efficiency matters! . . . . . . . . . . 40--45
Paul T. Stanton and
Benjamin McKeown and
Randal Burns and
Giuseppe Ateniese FastAD: an authenticated directory for
billions of objects . . . . . . . . . . 45--49
Peter Desnoyers Empirical evaluation of NAND flash
memory performance . . . . . . . . . . . 50--54
Asim Kadav and
Mahesh Balakrishnan and
Vijayan Prabhakaran and
Dahlia Malkhi Differential RAID: rethinking RAID for
SSD reliability . . . . . . . . . . . . 55--59
Jacob Leverich and
Christos Kozyrakis On the energy (in)efficiency of Hadoop
clusters . . . . . . . . . . . . . . . . 61--65
Aman Kansal and
Jie Liu and
Abhishek Singh and
Ripal Nathuji and
Tarek Abdelzaher Semantic-less coordination of power
management and application performance 66--70
Alexander S. Szalay and
Gordon C. Bell and
H. Howie Huang and
Andreas Terzis and
Alainna White Low-power Amdahl-balanced blades for
data intensive computing . . . . . . . . 71--75
Byung-Gon Chun and
Gianluca Iannaccone and
Giuseppe Iannaccone and
Randy Katz and
Gunho Lee and
Luca Niccolini An energy case for hybrid datacenters 76--80
Kenny Q. Zhu and
Kathleen Fisher and
David Walker Incremental learning of system log
formats . . . . . . . . . . . . . . . . 85--90
Jian-Guang Lou and
Qiang Fu and
Yi Wang and
Jiang Li Mining dependency in distributed systems
through unstructured logs analysis . . . 91--96
Wim De Pauw and
Stephen Heisig Visual and algorithmic tooling for
system trace analysis: a case study . . 97--102
Lourival A. de Gois and
Walter C. da Borelli Optimization of procedures for discovery
and information of idle resources in
distributed systems . . . . . . . . . . 103--109
Jacinto C. A. Cansado and
João H. S. Pereira and
Edson T. Midorikawa Considering the frequency dimension into
on demand adaptive algorithms . . . . . 110--115
Paolo Romano and
Luis Rodrigues and
Nuno Carvalho and
João Cachopo Cloud-TM: harnessing the cloud with
distributed transactional memories . . . 1--6
Krzysztof Ostrowski and
Ken Birman Storing and accessing live mashup
content in the cloud . . . . . . . . . . 7--11
Eric Van Hensbergen and
Noah Paul Evans and
Phillip Stanley-Marbell A unified execution model for cloud
computing . . . . . . . . . . . . . . . 12--17
Kunwadee Sripanidkulchai and
Sambit Sahu and
Yaoping Ruan and
Anees Shaikh and
Chitra Dorai Are clouds ready for large distributed
applications? . . . . . . . . . . . . . 18--23
Michael Siegenthaler and
Hakim Weatherspoon Cloudifying source code repositories:
how much does it cost? . . . . . . . . . 24--28
Mihai Letia and
Nuno Preguiça and
Marc Shapiro Consistency without concurrency control
in large, dynamic systems . . . . . . . 29--34
Avinash Lakshman and
Prashant Malik Cassandra: a decentralized structured
storage system . . . . . . . . . . . . . 35--40
George Porter Decoupling storage and computation in
Hadoop with SuperDataNodes . . . . . . . 41--46
Moises Goldszmidt and
Mihai Budiu and
Yue Zhang and
Michael Pechuk Toward automatic policy refinement in
repair services for large distributed
systems . . . . . . . . . . . . . . . . 47--51
Andreas Haeberlen A case for the accountable cloud . . . . 52--57
Paul Ezhilchelvan and
Santosh Shrivastava Learning from the past for resolving
dilemmas of asynchrony . . . . . . . . . 58--63
Vita Bortnikov and
Gregory Chockler and
Alexey Roytman and
Mike Spreitzer Bulletin board: a scalable and robust
eventually consistent shared memory over
a peer-to-peer overlay . . . . . . . . . 64--70
Ymir Vigfusson and
Ken Birman and
Qi Huang and
Deepak P. Nataraj Optimizing information flow in the
gossip objects platform . . . . . . . . 71--76
Pierre-Marc Fournier and
Michel R. Dagenais Analyzing blocking to debug performance
problems on multi-core systems . . . . . 77--87
Michael Dalton and
Hari Kannan and
Christos Kozyrakis Tainting is not pointless . . . . . . . 88--92
Erik Nygren and
Ramesh K. Sitaraman and
Joel Wein Networked systems research at Akamai . . 1--1
Erik Nygren and
Ramesh K. Sitaraman and
Jennifer Sun The Akamai network: a platform for
high-performance Internet applications 2--19
Thomas Repantis and
Jeff Cohen and
Scott Smith and
Joel Wein Scaling a monitoring infrastructure for
the Akamai network . . . . . . . . . . . 20--26
David Belson Akamai State of the Internet Report, Q4
2009 . . . . . . . . . . . . . . . . . . 27--37
Sara Bouchenak and
Eric Rutten Summary of the 5th International
Workshop on Feedback Control
Implementation and Design in Computing
Systems and Networks (FeBID 2010) . . . 38--40
Zhikui Wang and
Niraj Tolia and
Cullen Bash Opportunities and challenges to unify
workload, power, and cooling management
in data centers . . . . . . . . . . . . 41--46
Jean Arnaud Automated control of Internet services 47--52
Anne-Marie Alt and
Daniel Simon Control strategies for H.264 video
decoding under resources constraints . . 53--58
Luc Malrait QoS-oriented control of server systems 59--64
Shlomi Dolev and
Reuven Yagel Stabilizing trust and reputation for
self-stabilizing efficient hosts in
spite of Byzantine guests . . . . . . . 65--74
Benjamin Poirier and
Robert Roy and
Michel Dagenais Accurate offline synchronization of
distributed traces using kernel-level
events . . . . . . . . . . . . . . . . . 75--87
Asia Slowinska and
Herbert Bos Pointer tainting still pointless: (but
we all see the point of tainting) . . . 88--92
Paul E. McKenney and
Maged M. Michael and
Josh Triplett and
Jonathan Walpole Why the grass may not be greener on the
other side: a comparison of locking vs.
transactional memory . . . . . . . . . . 93--101
Josh Triplett and
Paul E. McKenney and
Jonathan Walpole Scalable concurrent hash tables via
relativistic programming . . . . . . . . 102--109
Wenjin Hu and
Tao Yang and
Jeanna N. Matthews The good, the bad and the ugly of
consumer cloud storage . . . . . . . . . 110--115
Stephen Alan Herrod Systems research and development at
VMware . . . . . . . . . . . . . . . . . 1--2
Ole Agesen and
Alex Garthwaite and
Jeffrey Sheldon and
Pratap Subrahmanyam The evolution of an x86 virtual machine
monitor . . . . . . . . . . . . . . . . 3--18
Richard West and
Puneet Zaroo and
Carl A. Waldspurger and
Xiao Zhang Online cache modeling for commodity
multicore processors . . . . . . . . . . 19--29
Daniel J. Scales and
Mike Nelson and
Ganesh Venkitachalam The design of a practical system for
fault-tolerant virtual machines . . . . 30--39
Richard McDougall and
Jennifer Anderson Virtualization performance: perspectives
and challenges ahead . . . . . . . . . . 40--56
Satyam B. Vaghani Virtual machine file system . . . . . . 57--70
Jacob Gorm Hansen and
Eric Jul Scalable virtual machine storage using
local disks . . . . . . . . . . . . . . 71--79
Shudong Zhou Virtual networking . . . . . . . . . . . 80--85
Debashis Basak and
Rohit Toshniwal and
Serge Maskalik and
Allwyn Sequeira Virtualizing networking and security in
the cloud . . . . . . . . . . . . . . . 86--94
Vijayaraghavan Soundararajan and
Kinshuk Govil Challenges in building scalable
virtualized datacenter management . . . 95--102
Orran Krieger and
Phil McGachey and
Arkady Kanevsky Enabling a marketplace of clouds:
VMware's vCloud director . . . . . . . . 103--114
René W. Schmidt and
Steffen Grarup vApp: a standards-based container for
cloud providers . . . . . . . . . . . . 115--123
Ken Barr and
Prashanth Bungale and
Stephen Deasy and
Viktor Gyuris and
Perry Hung and
Craig Newell and
Harvey Tuch and
Bruno Zoppis The VMware mobile virtualization
platform: is that a hypervisor in your
pocket? . . . . . . . . . . . . . . . . 124--135
Joshua E. Simons and
Jeffrey Buell Virtualizing high performance computing 136--145
Tudor Dumitra\cs and
Iulian Neamtiu and
Eli Tilevich Report on the Second ACM Workshop on Hot
Topics in Software Upgrades (HotSWUp'09) 146--152
Justin Rattner Research at Intel . . . . . . . . . . . 1--2
Vishakha Gupta and
Rob Knauerhase and
Karsten Schwan Attaining system performance points:
revisiting the end-to-end argument in
system design for heterogeneous
many-core systems . . . . . . . . . . . 3--10
Gautham N. Chinya and
Jamison D. Collins and
Perry H. Wang and
Hong Jiang and
Guei-Yuan Lueh and
Thomas A. Piazza and
Hong Wang Bothnia: a dual-personality extension to
the Intel integrated graphics driver . . 11--20
Dheeraj Reddy and
David Koufaty and
Paul Brett and
Scott Hahn Bridging functional heterogeneity in
multicore architectures . . . . . . . . 21--33
Vijay Vasudevan and
David G. Andersen and
Michael Kaminsky and
Jason Franklin and
Michael A. Kozuch and
Iulian Moraru and
Padmanabhan Pillai and
Lawrence Tan Challenges and opportunities for
efficient computing with FAWN . . . . . 34--44
Michael P. Mesnier and
Jason B. Akers Differentiated storage services . . . . 45--53
Arun Raghunath and
John Keys and
Mona Vij Direct data flows . . . . . . . . . . . 54--61
Sadagopan Srinivasan and
Li Zhao and
Ramesh Illikkal and
Ravishankar Iyer Efficient interaction between OS and
architecture in heterogeneous platforms 62--72
Rob F. van der Wijngaart and
Timothy G. Mattson and
Werner Haas Light-weight communications on Intel's
single-chip cloud computer processor . . 73--83
Shimin Chen and
Phillip B. Gibbons and
Michael Kozuch and
Todd C. Mowry Log-based architectures: using multicore
to help software behave correctly . . . 84--91
Shoumeng Yan and
Xiaocheng Zhou and
Ying Gao and
Hu Chen and
Gansha Wu and
Sai Luo and
Bratin Saha Optimizing a shared virtual memory
system for a heterogeneous
CPU-accelerator platform . . . . . . . . 92--100
Yuan Dong and
Haiyang Zhu and
Jinzhan Peng and
Fang Wang and
Michael P. Mesnier and
Dawei Wang and
Sun C. Chan RFS: a network file system for mobile
devices and the cloud . . . . . . . . . 101--111
Kevin Fall and
Gianluca Iannaccone and
Maziar Manesh and
Sylvia Ratnasamy and
Katerina Argyraki and
Mihai Dobrescu and
Norbert Egi RouteBricks: enabling general purpose
network infrastructure . . . . . . . . . 112--125
Petros Maniatis and
Byung-Gon Chun Small trusted primitives for dependable
systems . . . . . . . . . . . . . . . . 126--141
David (Yu) Zhu and
Jaeyeon Jung and
Dawn Song and
Tadayoshi Kohno and
David Wetherall TaintEraser: protecting sensitive data
leaks using application-level taint
tracking . . . . . . . . . . . . . . . . 142--154
Dilma da Silva and
Luciano Barreto and
Paulo César A. Pereira VII Brazilian Workshop on Operating
Systems . . . . . . . . . . . . . . . . 155--155
Luciano Barreto and
Aline Andrade and
Adolfo Duran and
Caique Lima and
Ademilson Lima Abstract specification and formalization
of an operating system kernel in Z . . . 156--160
Elzbieta Krepska and
Thilo Kielmann and
Wan Fokkin and
Henri Bal HipG: parallel processing of large-scale
graphs . . . . . . . . . . . . . . . . . 3--13
Ankur Narang and
Abhinav Srivastava and
Naga Praveen Kumar Katta and
Rudrapatna K. Shyamasundar Performance driven multi-objective
distributed scheduling for parallel
computations . . . . . . . . . . . . . . 14--27
Yuval Lubowich and
Gadi Taubenfeld On the performance of distributed
lock-based synchronization? . . . . . . 28--37
Fatemeh Azmandian and
Micha Moffie and
Malak Alshawabkeh and
Jennifer Dy and
Javed Aslam and
David Kaeli Virtual machine monitor-based
lightweight intrusion detection . . . . 38--53
André Schiper and
Zarko Milosevic and
Omid Shahmirzadi Student mini-kernel project based on an
FPGA board . . . . . . . . . . . . . . . 54--58
Eric Eide and
Gilles Muller and
Wolfgang Schröder-Preikschat and
Olaf Spinczyk Summary of PLOS 2011: the Sixth Workshop
on Programming Languages and Operating
Systems . . . . . . . . . . . . . . . . 1--4
Suman Saha and
Julia Lawall and
Gilles Muller Finding resource-release omission faults
in Linux . . . . . . . . . . . . . . . . 5--9
Reinhard Tartler and
Daniel Lohmann and
Christian Dietrich and
Christoph Egger and
Julio Sincero Configuration coverage in the analysis
of large-scale system software . . . . . 10--14
Lokesh Gidra and
Gaël Thomas and
Julien Sopena and
Marc Shapiro Assessing the scalability of garbage
collectors on many cores . . . . . . . . 15--19
Peter Bodík Overview of the workshop on managing
large-scale systems via the analysis of
system logs and the application of
machine learning techniques . . . . . . 20--22
Soila P. Kavulya and
Kaustubh Joshi and
Matti Hiltunen and
Scott Daniels and
Rajeev Gandhi and
Priya Narasimhan Practical experiences with chronics
discovery in large telecommunications
systems . . . . . . . . . . . . . . . . 23--30
Sumit Basu and
John Dunagan and
Kevin Duh and
Kiran-Kumar Muniswamy-Reddy BLR-D: applying bilinear logistic
regression to factored diagnosis
problems . . . . . . . . . . . . . . . . 31--38
Ivan Beschastnikh and
Yuriy Brun and
Michael D. Ernst and
Arvind Krishnamurthy and
Thomas E. Anderson Mining temporal invariants from
partially ordered logs . . . . . . . . . 39--46
Prabal Dutta and
Ricardo Bianchini Workshop on power aware computing and
systems (HotPower'11) . . . . . . . . . 47--47
Jie Chen and
Ron C. Chiang and
H. Howie Huang and
Guru Venkataramani Energy-aware writes to non-volatile main
memory . . . . . . . . . . . . . . . . . 48--52
Baris Aksanli and
Jagannathan Venkatesh and
Liuyi Zhang and
Tajana Rosing Utilizing green energy prediction to
schedule mixed batch and service jobs in
data centers . . . . . . . . . . . . . . 53--57
Timo Hönig and
Christopher Eibel and
Rüdiger Kapitza and
Wolfgang Schröder-Preikschat SEEP: exploiting symbolic execution for
energy-aware programming . . . . . . . . 58--62
Lakshminarayanan Subramanian Overview of the 3rd ACM SOSP Workshop on
Networking, Systems and Applications on
Mobile Handhelds . . . . . . . . . . . . 63--64
Umar Javed and
Dongsu Han and
Ramon Caceres and
Jeffrey Pang and
Srinivasan Seshan and
Alexander Varshavsky Predicting handoffs in 3G networks . . . 65--70
Mehedi Bakht and
Matt Trower and
Robin Kravets Searchlight: helping mobile devices find
their neighbors . . . . . . . . . . . . 71--76
H. Andrés Lagar-Cavilla and
Kaustubh Joshi and
Alexander Varshavsky and
Jeffrey Bickford and
Darwin Parra Traffic backfilling: subsidizing lunch
for delay-tolerant applications in UMTS
networks . . . . . . . . . . . . . . . . 77--81
Karthik Raghavan and
V. Kamakoti ROSY: recovering processor and memory
systems from hard errors . . . . . . . . 82--84
Luis Rodrigues and
Divy Agrawal and
Ymir Vigfusson and
Gregory Chockler Summary of the 5th Workshop on
Large-Scale Distributed Systems and
Middleware (LADIS 2011) . . . . . . . . 1--3
Junichi Tatemura and
Oliver Po and
Hakan Hacgümüs Microsharding: a declarative approach to
support elastic OLTP workloads . . . . . 4--11
Florin Rusu and
Alin Dobra GLADE: a scalable framework for
efficient analytics . . . . . . . . . . 12--18
Viet-Trung Tran and
Bogdan Nicolae and
Gabriel Antoniu Towards scalable array-oriented active
storage: the pyramid approach . . . . . 19--25
Joel Wolf and
Andrey Balmin and
Deepak Rajan and
Kirsten Hildrum and
Rohit Khandekar and
Sujay Parekh and
Kun-Lung Wu and
Rares Vernica CIRCUMFLEX: a scheduling optimizer for
MapReduce workloads with shared scans 26--32
Siddhartha Sen and
Michael J. Freedman Commensal cuckoo: secure group
partitioning for large-scale services 33--39
Guy Laden and
Roie Melamed and
Ymir Vigfusson Adaptive and dynamic funnel replication
in clouds . . . . . . . . . . . . . . . 40--46
Dahlia Malkhi and
Mahesh Balakrishnan and
John D. Davis and
Vijayan Prabhakaran and
Ted Wobber From Paxos to CORFU: a flash-speed
shared log . . . . . . . . . . . . . . . 47--51
Antonio Augusto Fröhlich and
Leandro Buss Becker and
George Lima and
Stefan Petters and
Dilma M. da Silva and
Edna N. Silva Barros Brazilian Symposium on Computing System
Engineering . . . . . . . . . . . . . . 52--52
Elder Vicente and
Rivalino Matias and
Lúcio Borges and
Autran Macêdo Evaluation of compound system calls in
the Linux kernel . . . . . . . . . . . . 53--63
Tiago Rogerio Muck and
Antonio Augusto Frohlich and
Michael Gernoth and
Wolfgang Schroder-Preikschat Implementing OS components in hardware
using AOP . . . . . . . . . . . . . . . 64--72
Marco A. Wehrmeister and
Joao G. Packer and
Luis M. Ceron Support for early verification of
embedded real-time systems through UML
models simulation . . . . . . . . . . . 73--81
Ríad Nassiffe and
Eduardo Camponogara and
George Lima Optimizing quality of service in
real-time systems under energy
constraints . . . . . . . . . . . . . . 82--92
Christopher M. Hayden and
Iulian Neamtiu Report on the Third Workshop on Hot
Topics in Software Upgrades (HotSWUp'11) 93--99
Daniel Hagimont and
Noel De Palma A simulator to assess energy saving
strategies and policies in HPC workloads 2--9
Frederico Alvares de Oliveira, Jr. and
Thomas Ledoux Self-management of cloud applications
and infrastructure for energy
optimization . . . . . . . . . . . . . . 10--18
Ibrahim Takouna and
Wesam Dawoud and
Christoph Meinel Energy efficient scheduling of HPC-jobs
on virtualize clusters using host and VM
dynamic configuration . . . . . . . . . 19--27
Christine Mayap Kamga and
Giang Son Tran and
Laurent Broto Extended scheduler for efficient
frequency scaling in virtualized systems 28--35
Adil Bouti and
Jörg Keller Securing cloud-based computations
against malicious providers . . . . . . 38--42
Alysson Bessani and
Rüdiger Kapitza and
Dana Petcu and
Paolo Romano and
Spyridon V. Gogouvitis and
Dimosthenis Kyriazis and
Roberto G. Cascella A look to the old-world\_sky: EU-funded
dependability cloud computing research 43--56
Salman A. Baset Cloud SLAs: present and future . . . . . 57--66
Augusto Born de Oliveira and
Ahmad Saif Ur Rehman and
Sebastian Fischmeister mTags: augmenting microkernel messages
with lightweight metadata . . . . . . . 67--79
Adam J. Aviv and
Vin Mannino and
Thanat Owlarn and
Seth Shannin and
Kevin Xu and
Boon Thau Loo Experiences in teaching an educational
user-level operating systems
implementation project . . . . . . . . . 80--86
Maria Couceiro and
Paolo Romano Where does transactional memory research
stand and what challenges lie ahead?:
WTM 2012, EuroTM Workshop on
Transactional Memory . . . . . . . . . . 87--92
Scott Dawkins and
Kaladhar Voruganti and
John D. Strunk Systems research and innovation in data
ONTAP . . . . . . . . . . . . . . . . . 1--3
Daniel Ellard and
Craig Everhart and
Theresa Raj Glitz: cross-vendor federated file
systems . . . . . . . . . . . . . . . . 4--10
Tim Bisson and
Yuvraj Patel and
Shankar Pasupathy Designing a fast file system crawler
with incremental differencing . . . . . 11--19
Jayanta Basak and
Kushal Wadhwani and
Kaladhar Voruganti and
Srinivasan Narayanamurthy and
Vipul Mathur and
Siddhartha Nandi Model building for dynamic multi-tenant
provider environments . . . . . . . . . 20--31
Lakshmi N. Bairavasundaram and
Gokul Soundararajan and
Vipul Mathur and
Kaladhar Voruganti and
Kiran Srinivasan Responding rapidly to service level
violations using virtual appliances . . 32--40
Atul Goel and
Peter Corbett RAID triple parity . . . . . . . . . . . 41--49
John D. Strunk Hybrid aggregates: combining SSDs and
HDDs in a single storage pool . . . . . 50--56
Giridhar Appaji Nag Yasa and
P. C. Nagesh Space savings and design considerations
in variable length deduplication . . . . 57--64
Mathieu Desnoyers and
Michel R. Dagenais Lockless multi-core high-throughput
buffering scheme for kernel tracing . . 65--81
Dahlia Malkhi and
Robbert van Renesse Workshop report on LADIS 2012 . . . . . 1--2
Paolo Costa Bridging the gap between applications
and networks in data centers . . . . . . 3--8
Flavio P. Junqueira and
Ivan Kelly and
Benjamin Reed Durability with BookKeeper . . . . . . . 9--15
David Shue and
Michael J. Freedman and
Anees Shaikh Fairness and isolation in multi-tenant
storage as optimization decomposition 16--21
Denisa Ghita and
Katerina Argyraki and
Patrick Thiran Toward accurate and practical network
tomography . . . . . . . . . . . . . . . 22--26
Mateus Krepsky Ludwich and
Antônio Augusto Fröhlich On the formal verification of
component-based embedded operating
systems . . . . . . . . . . . . . . . . 28--34
Alírio Santos de Sá and
Allan Edgard Silva Freitas and
Raimundo José de Araújo Macêdo Adaptive request batching for Byzantine
replication . . . . . . . . . . . . . . 35--42
Naser Ezzati-Jivan and
Michel R. Dagenais A framework to compute statistics of
system parameters from very large trace
files . . . . . . . . . . . . . . . . . 43--54
Karla Saur and
Iulian Neamtiu Report on the Fourth Workshop on Hot
Topics in Software Upgrades (HotSWUp
2012) . . . . . . . . . . . . . . . . . 55--62
Alexander Shraer and
Rüdiger Kapitza Dagstuhl seminar report: security and
dependability for federated cloud
platforms, 2012 . . . . . . . . . . . . 4--5
Sara Bouchenak and
Gregory Chockler and
Hana Chockler and
Gabriela Gheorghe and
Nuno Santos and
Alexander Shraer Verifying cloud services: present and
future . . . . . . . . . . . . . . . . . 6--19
Miguel Correia and
Neeraj Mittal Dependability issues in cloud computing:
extended papers from the 1st
International Workshop on Dependability
Issues in Cloud Computing --- DISCCO . . 20--22
Steve Jiekak and
Anne-Marie Kermarrec and
Nicolas Le Scouarnec and
Gilles Straub and
Alexandre Van Kempen Regenerating codes: a system perspective 23--32
Sara Arbab Yazd and
Subbarayan Venkatesan and
Neeraj Mittal Boosting energy efficiency with mirrored
data block replication policy and energy
scheduler . . . . . . . . . . . . . . . 33--40
Moussa Taifi Banking on decoupling: budget-driven
sustainability for HPC applications on
auction-based clouds . . . . . . . . . . 41--50
Mathieu Desnoyers and
Paul E. McKenney and
Michel R. Dagenais Multi-core systems modeling for formal
verification of parallel algorithms . . 51--65
Ashif S. Harji and
Peter A. Buhr and
Tim Brecht Our troubles with Linux Kernel upgrades
and why you should care . . . . . . . . 66--72
Editors An energy-efficient self-provisioning
approach for cloud resources management 2--9
Naga Pavan Kumar Gorti and
Arun K. Somani Reliability aware dynamic voltage and
frequency scaling for improved
microprocessor lifetime . . . . . . . . 10--17
Soguy M. K. Gueye and
Noel De Palma and
Eric Rutten and
Alain Tchana Coordinating multiple administration
loops using discrete control . . . . . . 18--25
Sou Koyano and
Shingo Ata and
Hisashi Iwamoto and
Yuji Yano and
Yasuto Kuroda and
Kazunari Inoue and
Ikuo Oka A study on micro level traffic
prediction for energy-aware routers . . 26--33
Christine Mayap Kamga CPU frequency emulation based on DVFS 34--41
Adel Noureddine and
Romain Rouvoy and
Lionel Seinturier A review of energy measurement
approaches . . . . . . . . . . . . . . . 42--49
Chengwel Wang and
Soila P. Kavulya and
Jiaqi Tan and
Liting Hu and
Mahendra Kutare and
Mike Kasick and
Karsten Schwan and
Priya Narasimhan and
Rajeev Gandhi Performance troubleshooting in data
centers: an annotated bibliography? . . 50--62
Julius Leite and
Raphael Guerra and
Rivalino Matias, Jr. and
Antônio Augusto Fröhlich Brazilian Symposium on Computer System
Engineering, November 4--8 2013, Niterói,
Brazil . . . . . . . . . . . . . . . . . 1--1
Ricardo J. Pfitscher and
Mauricio A. Pillon and
Rafael R. Obelheiro Customer-oriented diagnosis of memory
provisioning for IaaS clouds . . . . . . 2--10
Allan Edgard Silva Freitas and
Raimundo José de Araújo Macêdo A performance evaluation tool for hybrid
and dynamic distributed systems . . . . 11--18
Christian Cachin and
Robbert van Renesse Workshop Report: HotDep 2013 --- The 9th
Workshop on Hot Topics in Dependable
Systems . . . . . . . . . . . . . . . . 19--20
Dirk Vogt and
Cristiano Giuffrida and
Herbert Bos and
Andrew S. Tanenbaum Techniques for efficient in-memory
checkpointing . . . . . . . . . . . . . 21--25
Thanumalayan Sankaranarayana Pillai and
Vijay Chidambaram and
Joo-Young Hwang and
Andrea C. Arpaci-Dusseau and
Remzi H. Arpaci-Dusseau Towards efficient, portable
application-level consistency . . . . . 26--31
Kushagra Vaid and
Lin Zhong Fuel, fans, and cores --- an
introduction to selected papers from
HotPower 2013 . . . . . . . . . . . . . 32--33
Hiroshi Endo and
Hiroyoshi Kodama and
Hiroyuki Fukuda and
Toshio Sugimoto and
Takashi Horie and
Masao Kondo Cooperative control architecture of
fan-less servers and fresh-air cooling
in container servers for low power
operation . . . . . . . . . . . . . . . 34--38
Ana Carolina Riekstin and
Sean James and
Aman Kansal and
Jie Liu and
Eric Peterson No more electrical infrastructure:
towards fuel cell powered data centers 39--43
Aaron Carroll and
Gernot Heiser Mobile multicores: use them or waste
them . . . . . . . . . . . . . . . . . . 44--48
Marius Eriksen Your server as a function . . . . . . . 51--57
Gabriele Keller and
Toby Murray and
Sidney Amani and
Liam O'Connor and
Zilin Chen and
Leonid Ryzhyk and
Gerwin Klein and
Gernot Heiser File systems deserve verification too! 58--64
Anton Burtsev and
Nikhil Mishrikoti and
Eric Eide and
Robert Ricci Weir: a streaming language for
performance analysis . . . . . . . . . . 65--70
Meenakshi Sundaram Bhaskaran and
Jian Xu and
Steven Swanson Bankshot: caching slow storage in fast
non-volatile memory . . . . . . . . . . 73--81
Hyojun Kim and
Sangeetha Seshadri and
Clement L. Dickey and
Lawrence Chiu Phase change memory in enterprise
storage systems: silver bullet or snake
oil? . . . . . . . . . . . . . . . . . . 82--89
Yongseok Oh and
Jongmoo Choi and
Donghee Lee and
Sam H. Noh Improving performance and lifetime of
the SSD RAID-based host cache through a
log-structured approach . . . . . . . . 90--97
Robbert van Renesse The story behind the first SIGOPS Dennis
M. Ritchie Doctoral Dissertation Award 98--102
Christopher Stewart and
Vishakha Gupta The Workshop on Diversity in Systems
Research 2013 . . . . . . . . . . . . . 103--106
Sidney Amani and
Peter Chubb and
Alastair F. Donaldson and
Alexander Legg and
Keng Chai Ong and
Leonid Ryzhyk and
Yanjin Zhu Automatic verification of active device
drivers . . . . . . . . . . . . . . . . 106--118
Miguel Correia and
Neeraj Mittal Cloud Computing Dependability: Report
and Extended Papers of the Second
International Workshop on Dependability
Issues in Cloud Computing . . . . . . . 1--2
Nicola Nostro and
Andrea Ceccarelli and
Andrea Bondavalli and
Francesco Brancati Insider Threat Assessment: a Model-Based
Methodology . . . . . . . . . . . . . . 3--12
Alysson Bessani and
Leucio A. Cutillo and
Gianluca Ramunno and
Norbert Schirmer and
Paolo Smiraglia The TClouds Platform: From the Concept
to the Implementation of Benchmark
Scenarios . . . . . . . . . . . . . . . 13--22
William Tetzlaff SOSP Professional Travel Scholarship:
Reflections by Recipient William
Tetzlaff . . . . . . . . . . . . . . . . 23--23
Cary Gray SOSP Professional Travel Scholarship:
Reflections by Recipient Cary Gray . . . 24--24
Artur Baruchi SOSP Professional Travel Scholarship:
Reflections by Recipient Artur Baruchi 25--25
Doug Terry A Report on the First TRIOS Conference 26--34
Eric Eide Foreword: Special Issue on Repeatability
and Sharing of Experimental Artifacts 1--2
Dror G. Feitelson From Repeatability to Reproducibility
and Corroboration . . . . . . . . . . . 3--11
Heidi Howard and
Malte Schwarzkopf and
Anil Madhavapeddy and
Jon Crowcroft Raft Refloated: Do We Have Consensus? 12--21
Mayank Varia and
Benjamin Price and
Nicholas Hwang and
Ariel Hamlin and
Jonathan Herzog and
Jill Poland and
Michael Reschly and
Sophia Yakoubov and
Robert K. Cunningham Automated Assessment of Secure Search
Systems . . . . . . . . . . . . . . . . 22--30
Abraham N. Aldaco and
Charles J. Colbourn and
Violet R. Syrotiuk Locating Arrays: a New Experimental
Design for Screening Complex Engineered
Systems . . . . . . . . . . . . . . . . 31--40
Ali Abedi and
Andrew Heard and
Tim Brecht Conducting Repeatable Experiments and
Fair Comparisons using 802.11n MIMO
Networks . . . . . . . . . . . . . . . . 41--50
Christian Dietrich and
Daniel Lohmann The dataref versuchung: Saving Time
through Better Internal Repeatability 51--60
Luka Stanisic and
Arnaud Legrand and
Vincent Danjean An Effective Git and Org-Mode Based
Workflow for Reproducible Research . . . 61--70
Carl Boettiger An introduction to Docker for
reproducible research . . . . . . . . . 71--79
Cristian Ruiz and
Salem Harrache and
Michael Mercier and
Olivier Richard Reconstructable Software Appliances with
Kameleon . . . . . . . . . . . . . . . . 80--89
Sarah Edwards and
Xuan Liu and
Niky Riga Creating Repeatable Computer Science and
Networking Experiments on Shared, Public
Testbeds . . . . . . . . . . . . . . . . 90--99
Robert Ricci and
Gary Wong and
Leigh Stoller and
Kirk Webb and
Jonathon Duerig and
Keith Downie and
Mike Hibler Apt: a Platform for Repeatable Research
in Computer Science . . . . . . . . . . 100--107
Bruce R. Childers and
Alex K. Jones and
Daniel Mossé A Roadmap and Plan of Action for
Community-Supported Empirical Evaluation
in Computer Architecture . . . . . . . . 108--117
Gregory Chockler and
Flavio Junqueira and
Rodrigo Rodrigues and
Ymir Vigfusson LADIS'14: 8th Workshop on Large-Scale
Distributed Systems and Middleware . . . 118--120
Valter Balegas and
Sérgio Duarte and
Carla Ferreira and
Rodrigo Rodrigues and
Nuno Preguiça and
Mahsa Najafzadeh and
Marc Shapiro Towards Fast Invariant Preservation in
Geo-replicated Systems . . . . . . . . . 121--125
João Paiva and
Luís Rodrigues On Data Placement in Distributed Systems 126--130
Ken Birman and
Márk Jelasity and
Robert Kleinberg and
Edward Tremel Building a Secure and Privacy-Preserving
Smart Grid . . . . . . . . . . . . . . . 131--136
Qin Jia and
Zhiming Shen and
Weijia Song and
Robbert van Renesse and
Hakim Weatherspoon Supercloud: Opportunities and Challenges 137--141
Petter Särd and
Benoit Hudzia and
Steve Walsh and
Johan Tordsson and
Erik Elmroth Principles and Performance
Characteristics of Algorithms for Live
VM Migration . . . . . . . . . . . . . . 142--155
Raimundo Barreto and
Rafael Obelheiro and
Leandro Becker Brazilian Symposium on Computing System
Engineering . . . . . . . . . . . . . . 1--2
Giovani Gracioli and
Antônio Augusto Fröhlich On the Design and Evaluation of a
Real-Time Operating System for
Cache-Coherent Multicore Architectures 2--16
Peter Desnoyers and
Gokul Kandiraju INFLOW 2015: The Third Workshop on
Interactions of NVM/FLash with Operating
systems and Workload: INFLOW'15 Message
from the Chairs . . . . . . . . . . . . 17--17
Biplob Debnath and
Alireza Haghdoost and
Asim Kadav and
Mohammed G. Khatib and
Cristian Ungureanu Revisiting Hash Table Design for Phase
Change Memory . . . . . . . . . . . . . 18--26
Ricardo Santana and
Raju Rangaswami and
Vasily Tarasov and
Dean Hildebrand A Fast and Slippery Slope for File
Systems . . . . . . . . . . . . . . . . 27--34
Christoph Borchert and
Olaf Spinczyk Hardening an L4 Microkernel Against Soft
Errors by Aspect-Oriented Programming
and Whole-Program Analysis . . . . . . . 37--43
Charles Jacobsen and
Muktesh Khole and
Sarah Spall and
Scotty Bauer and
Anton Burtsev Lightweight Capability Domains: Towards
Decomposing the Linux Kernel . . . . . . 44--50
Ilya Yanok and
Nathaniel Nystrom Tapir: a Language for Verified OS Kernel
Probes . . . . . . . . . . . . . . . . . 51--56
Xinhao Yuan and
David Williams-King and
Junfeng Yang and
Simha Sethumadhavan Making Lock-free Data Structures
Verifiable with Artificial Transactions 57--63
Sharath K. Bhat and
Ajithchandra Saya and
Hemedra K. Rawat and
Antonio Barbalace and
Binoy Ravindran Harnessing Energy Efficiency of
Heterogeneous-ISA Platforms . . . . . . 65--69
Mohammad A. Hoque and
Sasu Tarkoma Sudden Drop in the Battery Level?:
Understanding Smartphone State of Charge
Anomaly . . . . . . . . . . . . . . . . 70--74
Qiuyun Wang and
Benjamin C. Lee Modeling Communication Costs in Blade
Servers . . . . . . . . . . . . . . . . 75--79
Gernot Heiser and
Kenji Kono and
KyoungSoo Park and
Robbert van Renesse Report on the Asia--Pacific Systems
Workshop 2015 (APSys'15) . . . . . . . . 1--2
Oliver R. A. Chick and
Lucian Carata and
James Snee and
Nikilesh Balakrishnan and
Ripduman Sohan Shadow Kernels: a General Mechanism For
Kernel Specialization in Existing
Operating Systems . . . . . . . . . . . 3--8
Sanidhya Kashyap and
Changwoo Min and
Taesoo Kim Opportunistic Spinlocks: Achieving
Virtual Machine Scalability in the
Clouds . . . . . . . . . . . . . . . . . 9--16
Márcio Oyamada and
Antônio Augusto Fröhlich and
Leandro Becker 5th Brazilian Symposium on Computing
System Engineering . . . . . . . . . . . 17--17
Caio Augusto R. dos Santos and
Rivalino Matias, Jr. Exploratory Analysis on Failure Causes
in a Mass-Market Operating System . . . 18--30
Saul Delabrida and
Thiago D'Angelo and
Ricardo A. R. Oliveira and
Antonio A. F. Loureiro Building Wearables for Geology: an
Operating System Approach . . . . . . . 31--45
Yuanyuan Zhou Programming Uncertain $<$T$>$ hings . . . 1--2
Sergi Abadal and
Albert Cabellos-Aparicio and
Eduard Alarcon and
Josep Torrellas WiSync: an Architecture for Fast
Synchronization through On-Chip Wireless
Communication . . . . . . . . . . . . . 3--17
Xiaodong Wang and
José F. Martínez ReBudget: Trading Off Efficiency vs.
Fairness in Market-Based Multicore
Resource Allocation via Runtime Budget
Reassignment . . . . . . . . . . . . . . 19--32
Haishan Zhu and
Mattan Erez Dirigent: Enforcing QoS for
Latency-Critical Tasks on Shared
Multicore Systems . . . . . . . . . . . 33--47
Yossi Kuperman and
Eyal Moscovici and
Joel Nider and
Razya Ladelsky and
Abel Gordon and
Dan Tsafrir Paravirtual Remote I/O . . . . . . . . . 49--65
Antoine Kaufmann and
SImon Peter and
Naveen Kr. Sharma and
Thomas Anderson and
Arvind Krishnamurthy High Performance Packet Processing with
FlexNIC . . . . . . . . . . . . . . . . 67--81
James Bornholt and
Antoine Kaufmann and
Jialin Li and
Arvind Krishnamurthy and
Emina Torlak and
Xi Wang Specifying and Checking File System
Crash-Consistency Models . . . . . . . . 83--98
Aravinda Prasad and
K. Gopinath Prudent Memory Reclamation in
Procrastination-Based Synchronization 99--112
Anurag Mukkara and
Nathan Beckmann and
Daniel Sanchez Whirlpool: Improving Dynamic Cache
Management with Static Data
Classification . . . . . . . . . . . . . 113--127
Myeongjae Jeon and
Yuxiong He and
Hwanju Kim and
Sameh Elnikety and
Scott Rixner and
Alan L. Cox TPC: Target-Driven Parallelism Combining
Prediction and Correction to Reduce Tail
Latency in Interactive Services . . . . 129--141
Fraser Brown and
Andres Nötzli and
Dawson Engler How to Build Static Checking Systems
Using Orders of Magnitude Less Code . . 143--157
Tong Zhang and
Dongyoon Lee and
Changhee Jung TxRace: Efficient Data Race Detection
Using Commodity Hardware Transactional
Memory . . . . . . . . . . . . . . . . . 159--173
Sidney Amani and
Alex Hixon and
Zilin Chen and
Christine Rizkallah and
Peter Chubb and
Liam O'Connor and
Joel Beeren and
Yutaka Nagashima and
Japheth Lim and
Thomas Sewell and
Joseph Tuong and
Gabriele Keller and
Toby Murray and
Gerwin Klein and
Gernot Heiser CoGENT: Verifying High-Assurance File
System Implementations . . . . . . . . . 175--188
Nils Asmussen and
Marcus Völp and
Benedikt Nöthen and
Hermann Härtig and
Gerhard Fettweis M3: a Hardware/Operating-System
Co-Design to Tame Heterogeneous
Manycores . . . . . . . . . . . . . . . 189--203
Daniyal Liaqat and
Silviu Jingoi and
Eyal de Lara and
Ashvin Goel and
Wilson To and
Kevin Lee and
Italo De Moraes Garcia and
Manuel Saldana Sidewinder: an Energy Efficient and
Developer Friendly Heterogeneous
Architecture for Continuous Mobile
Sensing . . . . . . . . . . . . . . . . 205--215
Jonathan Balkind and
Michael McKeown and
Yaosheng Fu and
Tri Nguyen and
Yanqi Zhou and
Alexey Lavrov and
Mohammad Shahrad and
Adi Fuchs and
Samuel Payne and
Xiaohua Liang and
Matthew Matl and
David Wentzlaff OpenPiton: an Open Source Manycore
Research Framework . . . . . . . . . . . 217--232
Daniel Lustig and
Geet Sethi and
Margaret Martonosi and
Abhishek Bhattacharjee COATCheck: Verifying Memory Ordering at
the Hardware-OS Interface . . . . . . . 233--247
Alex Markuze and
Adam Morrison and
Dan Tsafrir True IOMMU Protection from DMA Attacks:
When Copy is Faster than Zero Copy . . . 249--262
Amro Awad and
Pratyusa Manadhata and
Stuart Haber and
Yan Solihin and
William Horne Silent Shredder: Zero-Cost Shredding for
Secure Non-Volatile Main Memory
Controllers . . . . . . . . . . . . . . 263--276
Youngjin Kwon and
Alan M. Dunn and
Michael Z. Lee and
Owen S. Hofmann and
Yuanzhong Xu and
Emmett Witchel Sego: Pervasive Trusted Metadata for
Efficiently Verified Untrusted System
Services . . . . . . . . . . . . . . . . 277--290
Dan Tsafrir Synopsis of the ASPLOS '16 Wild and
Crazy Ideas (WACI) Invited-Speakers
Session . . . . . . . . . . . . . . . . 291--294
R. Stanley Williams Brain Inspired Computing . . . . . . . . 295--295
Phitchaya Mangpo Phothilimthana and
Aditya Thakur and
Rastislav Bodik and
Dinakar Dhurjati Scaling up Superoptimization . . . . . . 297--310
Niranjan Hasabnis and
R. Sekar Lifting Assembly to Intermediate
Representation: a Novel Approach
Leveraging Compilers . . . . . . . . . . 311--324
Saurav Muralidharan and
Amit Roy and
Mary Hall and
Michael Garland and
Piyush Rai Architecture-Adaptive Code Variant
Tuning . . . . . . . . . . . . . . . . . 325--338
Xiaofeng Lin and
Yu Chen and
Xiaodong Li and
Junjie Mao and
Jiaquan He and
Wei Xu and
Yuanchun Shi Scalable Kernel TCP Design and
Implementation for Short-Lived
Connections . . . . . . . . . . . . . . 339--352
Izzat El Hajj and
Alexander Merritt and
Gerd Zellweger and
Dejan Milojicic and
Reto Achermann and
Paolo Faraboschi and
Wen-mei Hwu and
Timothy Roscoe and
Karsten Schwan SpaceJMP: Programming with Multiple
Virtual Address Spaces . . . . . . . . . 353--368
Felix Xiaozhu Lin and
Xu Liu memif: Towards Programming Heterogeneous
Memory Asynchronously . . . . . . . . . 369--383
Wook-Hee Kim and
Jinwoong Kim and
Woongki Baek and
Beomseok Nam and
Youjip Won NVWAL: Exploiting NVRAM in Write-Ahead
Logging . . . . . . . . . . . . . . . . 385--398
Aasheesh Kolli and
Steven Pelley and
Ali Saidi and
Peter M. Chen and
Thomas F. Wenisch High-Performance Transactions for
Persistent Memories . . . . . . . . . . 399--411
Qing Guo and
Karin Strauss and
Luis Ceze and
Henrique S. Malvar High-Density Image Storage Using
Approximate Memory Cells . . . . . . . . 413--426
Joseph Izraelevitz and
Terence Kelly and
Aasheesh Kolli Failure-Atomic Persistent Memory Updates
via JUSTDO Logging . . . . . . . . . . . 427--442
Jaeung Han and
Seungheun Jeon and
Young-ri Choi and
Jaehyuk Huh Interference Management for Distributed
Parallel Applications in Consolidated
Clusters . . . . . . . . . . . . . . . . 443--456
Martin Maas and
Krste Asanovi\'c and
Tim Harris and
John Kubiatowicz Taurus: a Holistic Language Runtime
System for Coordinating Distributed
Managed-Language Applications . . . . . 457--471
Christina Delimitrou and
Christos Kozyrakis HCloud: Resource-Efficient Provisioning
in Shared Cloud Systems . . . . . . . . 473--488
Xiao Yu and
Pallavi Joshi and
Jianwu Xu and
Guoliang Jin and
Hui Zhang and
Guofei Jiang CloudSeer: Workflow Monitoring of Cloud
Infrastructures via Interleaved Logs . . 489--502
Yonghwi Kwon and
Dohyeong Kim and
William Nick Sumner and
Kyungtae Kim and
Brendan Saltaformaggio and
Xiangyu Zhang and
Dongyan Xu LDX: Causality Inference by Lightweight
Dual Execution . . . . . . . . . . . . . 503--515
Tanakorn Leesatapornwongsa and
Jeffrey F. Lukman and
Shan Lu and
Haryadi S. Gunawi TaxDC: a Taxonomy of Non-Deterministic
Concurrency Bugs in Datacenter
Distributed Systems . . . . . . . . . . 517--530
Junjie Mao and
Yu Chen and
Qixue Xiao and
Yuanchun Shi RID: Finding Reference Count Bugs with
Inconsistent Path Pair Checking . . . . 531--544
Huazhe Zhang and
Henry Hoffmann Maximizing Performance Under a Power
Cap: a Comparison of Hardware, Software,
and Hybrid Techniques . . . . . . . . . 545--559
Songchun Fan and
Seyed Majid Zahedi and
Benjamin C. Lee The Computational Sprinting Game . . . . 561--575
Alexei Colin and
Graham Harvey and
Brandon Lucia and
Alanson P. Sample An Energy-interference-free
Hardware-Software Debugger for
Intermittent Energy-harvesting Systems 577--589
Emmett Witchel Programmer Productivity in a World of
Mushy Interfaces: Challenges of the
Post-ISA Reality . . . . . . . . . . . . 591--591
Kevin Angstadt and
Westley Weimer and
Kevin Skadron RAPID Programming of Pattern-Recognition
Processors . . . . . . . . . . . . . . . 593--605
Xin Sui and
Andrew Lenharth and
Donald S. Fussell and
Keshav Pingali Proactive Control of Approximate
Programs . . . . . . . . . . . . . . . . 607--621
Jongse Park and
Emmanuel Amaro and
Divya Mahajan and
Bradley Thwaites and
Hadi Esmaeilzadeh AxGames: Towards Crowdsourcing Quality
Target Determination in Approximate
Computing . . . . . . . . . . . . . . . 623--636
James Bornholt and
Randolph Lopez and
Douglas M. Carmean and
Luis Ceze and
Georg Seelig and
Karin Strauss A DNA-Based Archival Storage System . . 637--649
Raghu Prabhakar and
David Koeplinger and
Kevin J. Brown and
HyoukJoong Lee and
Christopher De Sa and
Christos Kozyrakis and
Kunle Olukotun Generating Configurable Hardware from
Parallel Patterns . . . . . . . . . . . 651--665
Li-Wen Chang and
Hee-Seok Kim and
Wen-mei W. Hwu DySel: Lightweight Dynamic Selection for
Kernel-based Data-parallel Programming
Model . . . . . . . . . . . . . . . . . 667--680
Quan Chen and
Hailong Yang and
Jason Mars and
Lingjia Tang Baymax: QoS Awareness and Increased
Utilization for Non-Preemptive
Accelerators in Warehouse Scale
Computers . . . . . . . . . . . . . . . 681--696
Tony Nowatzki and
Karthikeyan Sankaralingam Analyzing Behavior Specialized
Acceleration . . . . . . . . . . . . . . 697--711
Man-Ki Yoon and
Negin Salajegheh and
Yin Chen and
Mihai Christodorescu PIFT: Predictive Information-Flow
Tracking . . . . . . . . . . . . . . . . 713--725
Ashish Venkat and
Sriskanda Shamasunder and
Hovav Shacham and
Dean M. Tullsen HIPStR: Heterogeneous-ISA Program State
Relocation . . . . . . . . . . . . . . . 727--741
Zelalem Birhanu Aweke and
Salessawi Ferede Yitbarek and
Rui Qiao and
Reetuparna Das and
Matthew Hicks and
Yossi Oren and
Todd Austin ANVIL: Software-Based Protection Against
Next-Generation Rowhammer Attacks . . . 743--755
Diego Didona and
Nuno Diegues and
Anne-Marie Kermarrec and
Rachid Guerraoui and
Ricardo Neves and
Paolo Romano ProteusTM: Abstraction Meets Performance
in Transactional Memory . . . . . . . . 757--771
Noam Shalev and
Eran Harpaz and
Hagar Porat and
Idit Keidar and
Yaron Weinsberg CSR: Core Surprise Removal in Commodity
Operating Systems . . . . . . . . . . . 773--787
Tanmay Gangwani and
Adam Morrison and
Josep Torrellas CASPAR: Breaking Serialization in
Lock-Free Multicore Synchronization . . 789--804
Jean-Thomas Acquaviva Performance and Scalability of Storage
Systems, a view from the WOPSSS Workshop 2--2
Anastasios Papagiannis and
Giorgos Saloustros and
Manolis Marazakis and
Angelos Bilas Iris: an optimized I/O stack for
low-latency storage devices . . . . . . 3--11
Wolfram Schenck and
Salem El Sayed and
Maciej Foszczynski and
Wilhelm Homberg and
Dirk Pleiter Evaluation and Performance Modeling of a
Burst Buffer Solution . . . . . . . . . 12--26
Hamza Ouarnoughi and
Jalil Boukhobza and
Frank Singhoff and
Stéphane Rubini Integrating I/Os in Cloudsim for
Performance and Energy Estimation . . . 27--36
Salem El Sayed and
Matthias Bolten and
Dirk Pleiter Using file system counters in modelling
parallel I/O architectures . . . . . . . 37--46
David Tennenhouse Research at VMware . . . . . . . . . . . 1--4
Mihai Budiu and
Chris Dodd The P416 Programming Language . . . . . 5--14
Xin Xu and
Bhavesh Davda A Hypervisor Approach to Enable Live
Migration with Passthrough SR-IOV
Network Devices . . . . . . . . . . . . 15--23
Irina Calciu and
Siddhartha Sen and
Mahesh Balakrishnan and
Marcos K. Aguilera How to implement any concurrent data
structure for modern servers . . . . . . 24--32
Bryan Fink and
Eric Knauft and
Gene Zhang vSAN: Modern Distributed Storage . . . . 33--37
Timothy Merrifield and
H. Reza Taheri Performance Implications of Extended
Page Tables on Virtualized x86
Processors . . . . . . . . . . . . . . . 38--47
Abhishek Gupta and
Rick Spillane and
Wenguang Wang and
Maxime Austruy and
Vahid Fereydouny and
Christos Karamanolis Hybrid Cloud Storage: Bridging the Gap
between Compute Clusters and Cloud
Storage . . . . . . . . . . . . . . . . 48--53
Nadav Amit and
Michael Wei and
Cheng-Chun Tu Hypercallbacks . . . . . . . . . . . . . 54--59
Vijayaraghavan Soundararajan and
Joshua Schnee Sustainability as a first-class metric
for developers and end-users . . . . . . 60--66
Heidi Howard and
Dahlia Malkhi and
Sasha Spiegelman Revisiting the Paxos Foundations: a Look
at Summer Internship Work at VMware
Research . . . . . . . . . . . . . . . . 67--71
Cheng-Chun Tu and
Joe Stringer and
Justin Pettit Building an Extensible Open vSwitch
Datapath . . . . . . . . . . . . . . . . 72--77
Medhavi Dhawan and
Gurprit Johal and
Jim Stabile and
Vjekoslav Brajkovic and
James Chang and
Kapil Goyal and
Kevin James and
Zeeshan Lokhandwala and
Anny Martinez Manzanilla and
Roger Michoud and
Maithem Munshed and
Srinivas Neginhal and
Konstantin Spirov and
Michael Wei and
Scott Fritchie and
Chris Rossbach and
Ittai Abraham and
Dahlia Malkhi Consistent Clustered Applications with
Corfu . . . . . . . . . . . . . . . . . 78--82
Youngjin Kwon and
Hangchen Yu and
Simon Peter and
Christopher J. Rossbach and
Emmett Witchel Ingens: Huge Page Support for the OS and
Hypervisor . . . . . . . . . . . . . . . 83--93
Abhiram Balasubramanian and
Marek S. Baranowski and
Anton Burtsev and
Aurojit Panda and
Zvonimir Rakamari and
Leonid Ryzhyk System Programming in Rust: Beyond
Safety . . . . . . . . . . . . . . . . . 94--99
Alisson Brito, Jr. and
Leandro Becker Rivalino Matias 6th Brazilian Symposium on Computing
System Engineering . . . . . . . . . . . 100--100
João Gabriel Reis and
Antônio Augusto Fröhlich OS Support for Adaptive Components in
Self-aware Systems . . . . . . . . . . . 101--112
Cha V. Li and
Vinicius Petrucci and
Daniel Mossé Exploring Machine Learning for Thread
Characterization on Heterogeneous
Multiprocessors . . . . . . . . . . . . 113--123
Yunji Chen Big Data Analytics and Intelligence at
Alibaba Cloud . . . . . . . . . . . . . 1--1
Hari Cherupalli and
Henry Duwe and
Weidong Ye and
Rakesh Kumar and
John Sartori Determining Application-specific Peak
Power and Energy Requirements for
Ultra-low Power Processors . . . . . . . 3--16
Quan Chen and
Hailong Yang and
Minyi Guo and
Ram Srivatsa Kannan and
Jason Mars and
Lingjia Tang Prophet: Precise QoS Prediction on
Non-Preemptive Accelerators to Improve
Utilization in Warehouse-Scale Computers 17--32
Svilen Kanev and
Sam Likun Xi and
Gu-Yeon Wei and
David Brooks Mallacc: Accelerating Memory Allocation 33--45
Shasha Wen and
Milind Chabbi and
Xu Liu REDSPY: Exploring Value Locality in
Software . . . . . . . . . . . . . . . . 47--61
Abhishek Bhattacharjee Translation-Triggered Prefetching . . . 63--76
Channoh Kim and
Jaehyeok Kim and
Sungmin Kim and
Dooyoung Kim and
Namho Kim and
Gitae Na and
Young H. Oh and
Hyeon Gyu Cho and
Jae W. Lee Typed Architectures: Architectural
Support for Lightweight Scripting . . . 77--90
Jihye Seo and
Wook-Hee Kim and
Woongki Baek and
Beomseok Nam and
Sam H. Noh Failure-Atomic Slotted Paging for
Persistent Memory . . . . . . . . . . . 91--104
Donald Nguyen and
Keshav Pingali What Scalable Programs Need from
Transactional Memory . . . . . . . . . . 105--118
Caroline Trippel and
Yatin A. Manerkar and
Daniel Lustig and
Michael Pellauer and
Margaret Martonosi TriCheck: Memory Model Verification at
the Trisection of Software, Hardware,
and ISA . . . . . . . . . . . . . . . . 119--133
Sanketh Nalli and
Swapnil Haria and
Mark D. Hill and
Michael M. Swift and
Haris Volos and
Kimberly Keeton An Analysis of Persistent Memory Use
with WHISPER . . . . . . . . . . . . . . 135--148
Tong Zhang and
Changhee Jung and
Dongyoon Lee ProRace: Practical Data Race Detection
for Production Use . . . . . . . . . . . 149--162
Lena E. Olson and
Mark D. Hill and
David A. Wood Crossing Guard: Mediating
Host-Accelerator Coherence Interactions 163--176
Joseph McMahan and
Michael Christensen and
Lawton Nichols and
Jared Roesch and
Sung-Yee Guo and
Ben Hardekopf and
Timothy Sherwood An Architecture Supporting Formal and
Compositional Binary Analysis . . . . . 177--191
Chun-Hung Hsiao and
Satish Narayanasamy and
Essam Muhammad Idris Khan and
Cristiano L. Pereira and
Gilles A. Pokam AsyncClock: Scalable Inference of
Asynchronous Event Causality . . . . . . 193--205
Irina Calciu and
Siddhartha Sen and
Mahesh Balakrishnan and
Marcos K. Aguilera Black-box Concurrent Data Structures for
NUMA Architectures . . . . . . . . . . . 207--221
Keval Vora and
Chen Tian and
Rajiv Gupta and
Ziang Hu CoRAL: Confined Recovery in Distributed
Asynchronous Graph Processing . . . . . 223--236
Keval Vora and
Rajiv Gupta and
Guoqing Xu KickStarter: Fast and Accurate
Computations on Streaming Graphs via
Trimmed Approximations . . . . . . . . . 237--251
Bobby Powers and
John Vilk and
Emery D. Berger Browsix: Bridging the Gap Between Unix
and the Browser . . . . . . . . . . . . 253--266
Samyam Rajbhandari and
Yuxiong He and
Olatunji Ruwase and
Michael Carbin and
Trishul Chilimbi Optimizing CNNs on Multicores for
Scalability, Performance and Goodput . . 267--280
Kirshanthan Sundararajah and
Laith Sakka and
Milind Kulkarni Locality Transformations for Nested
Recursive Iteration Spaces . . . . . . . 281--295
Ang Li and
Shuaiwen Leon Song and
Weifeng Liu and
Xu Liu and
Akash Kumar and
Henk Corporaal Locality-Aware CTA Clustering for Modern
GPUs . . . . . . . . . . . . . . . . . . 297--311
Berkeley Churchill and
Rahul Sharma and
JF Bastien and
Alex Aiken Sound Loop Superoptimization for Google
Native Client . . . . . . . . . . . . . 313--326
Ricardo Bianchini Improving Datacenter Efficiency . . . . 327--327
Mengxing Liu and
Mingxing Zhang and
Kang Chen and
Xuehai Qian and
Yongwei Wu and
Weimin Zheng and
Jinglei Ren DudeTM: Building Durable Transactions
with Decoupling for Persistent Memory 329--343
Ana Klimovic and
Heiner Litz and
Christos Kozyrakis ReFlex: Remote Flash $ \approx $ Local
Flash . . . . . . . . . . . . . . . . . 345--359
Djordje Jevdjic and
Karin Strauss and
Luis Ceze and
Henrique S. Malvar Approximate Storage of Compressed and
Encrypted Videos . . . . . . . . . . . . 361--373
Nima Elyasi and
Mohammad Arjomand and
Anand Sivasubramaniam and
Mahmut T. Kandemir and
Chita R. Das and
Myoungsoo Jung Exploiting Intra-Request Slack to
Improve SSD Performance . . . . . . . . 375--388
Kai Wang and
Aftab Hussain and
Zhiqiang Zuo and
Guoqing Xu and
Ardalan Amiri Sani Graspan: a Single-machine Disk-based
Graph System for Interprocedural Static
Analyses of Large-scale Systems Code . . 389--404
Ao Ren and
Zhe Li and
Caiwen Ding and
Qinru Qiu and
Yanzhi Wang and
Ji Li and
Xuehai Qian and
Bo Yuan SC--DCNN: Highly-Scalable Deep
Convolutional Neural Network using
Stochastic Computing . . . . . . . . . . 405--418
Jerry Ajay and
Chen Song and
Aditya Singh Rathore and
Chi Zhou and
Wenyao Xu $3$DGates: an Instruction-Level Energy
Analysis and Optimization of $3$D
Printers . . . . . . . . . . . . . . . . 419--433
Guilherme Cox and
Abhishek Bhattacharjee Efficient Address Translation for
Architectures with Multiple Page Sizes 435--448
Ilya Lesokhin and
Haggai Eran and
Shachar Raindel and
Guy Shapiro and
Sagi Grimberg and
Liran Liss and
Muli Ben-Yehuda and
Nadav Amit and
Dan Tsafrir Page Fault Support for Network
Controllers . . . . . . . . . . . . . . 449--466
Yang Hu and
Mingcong Song and
Tao Li Towards ``Full Containerization'' in
Containerized Network Function
Virtualization . . . . . . . . . . . . . 467--481
Bo Wu and
Xu Liu and
Xiaobo Zhou and
Changjun Jiang FLEP: Enabling Flexible and Efficient
Preemption on GPUs . . . . . . . . . . . 483--496
Kaiwei Li and
Jianfei Chen and
Wenguang Chen and
Jun Zhu SaberLDA: Sparsity-Aware Learning of
Topic Models on GPUs . . . . . . . . . . 497--509
Moein Khazraee and
Lu Zhang and
Luis Vega and
Michael Bedford Taylor Moonwalk: NRE Optimization in ASIC
Clouds . . . . . . . . . . . . . . . . . 511--526
Jason Jong Kyu Park and
Yongjun Park and
Scott Mahlke Dynamic Resource Management for
Efficient Utilization of Multitasking
GPUs . . . . . . . . . . . . . . . . . . 527--540
Rui Zhang and
Natalie Stanley and
Christopher Griggs and
Andrew Chi and
Cynthia Sturton Identifying Security Critical Properties
for the Dynamic Verification of a
Processor . . . . . . . . . . . . . . . 541--554
Andrew Ferraiuolo and
Rui Xu and
Danfeng Zhang and
Andrew C. Myers and
G. Edward Suh Verification of a Practical Hardware
Security Architecture Through Static
Information Flow Analysis . . . . . . . 555--568
David Chisnall and
Brooks Davis and
Khilan Gudka and
David Brazdil and
Alexandre Joannou and
Jonathan Woodruff and
A. Theodore Markettos and
J. Edward Maste and
Robert Norton and
Stacey Son and
Michael Roe and
Simon W. Moore and
Peter G. Neumann and
Ben Laurie and
Robert N. M. Watson CHERI JNI: Sinking the Java Security
Model into the C . . . . . . . . . . . . 569--583
Xinyang Ge and
Weidong Cui and
Trent Jaeger GRIFFIN: Guarding Control Flows Using
Intel Processor Trace . . . . . . . . . 585--598
Christina Delimitrou and
Christos Kozyrakis Bolt: I Know What You Did Last Summer
\ldots In The Cloud . . . . . . . . . . 599--613
Yiping Kang and
Johann Hauswald and
Cao Gao and
Austin Rovinski and
Trevor Mudge and
Jason Mars and
Lingjia Tang Neurosurgeon: Collaborative Intelligence
Between the Cloud and Mobile Edge . . . 615--629
Neha Agarwal and
Thomas F. Wenisch Thermostat: Application-transparent Page
Management for Two-tiered Main Memory 631--644
Antonio Barbalace and
Robert Lyerly and
Christopher Jelesnianski and
Anthony Carno and
Ho-Ren Chuang and
Vincent Legout and
Binoy Ravindran Breaking the Boundaries in
Heterogeneous-ISA Datacenters . . . . . 645--659
Daniel Lustig and
Andrew Wright and
Alexandros Papakonstantinou and
Olivier Giroux Automated Synthesis of Comprehensive
Memory Model Litmus Test Suites . . . . 661--675
Haopeng Liu and
Guangpu Li and
Jeffrey F. Lukman and
Jiaxin Li and
Shan Lu and
Haryadi S. Gunawi and
Chen Tian DCatch: Automatically Detecting
Distributed Concurrency Bugs in Cloud
Systems . . . . . . . . . . . . . . . . 677--691
Ali José Mashtizadeh and
Tal Garfinkel and
David Terei and
David Mazieres and
Mendel Rosenblum Towards Practical Default-On Multi-Core
Record/Replay . . . . . . . . . . . . . 693--708
Jian Huang and
Michael Allen-Bond and
Xuechen Zhang Pallas: Semantic-Aware Checking for
Finding Deep Bugs in Fast Path . . . . . 709--722
Jagadish B. Kotra and
Narges Shahidi and
Zeshan A. Chishti and
Mahmut T. Kandemir Hardware-Software Co-design to Mitigate
DRAM Refresh Overheads: a Case for
Refresh-Aware Process Scheduling . . . . 723--736
Jinchun Kim and
Elvira Teran and
Paul V. Gratz and
Daniel A. Jiménez and
Seth H. Pugsley and
Chris Wilkerson Kill the Program Counter: Reconstructing
Program Behavior in the Processor Cache
Hierarchy . . . . . . . . . . . . . . . 737--749
Mingyu Gao and
Jing Pu and
Xuan Yang and
Mark Horowitz and
Christos Kozyrakis TETRIS: Scalable and Efficient Neural
Network Acceleration with $3$D Memory 751--764
Wonjun Song and
Gwangsun Kim and
Hyungjoon Jung and
Jongwook Chung and
Jung Ho Ahn and
Jae W. Lee and
John Kim History-Based Arbitration for Fairness
in Processor-Interconnect of NUMA
Servers . . . . . . . . . . . . . . . . 765--777
Pulkit A. Misra and
Jeffrey S. Chase and
Johannes Gehrke and
Alvin R. Lebeck Enabling Lightweight Transactions with
Precision Time . . . . . . . . . . . . . 779--794
Ming Liu and
Liang Luo and
Jacob Nelson and
Luis Ceze and
Arvind Krishnamurthy and
Kishore Atreya IncBricks: Toward In-Network Computation
with an In-Network Cache . . . . . . . . 795--809
Ismail Akturk and
Ulya R. Karpuzcu AMNESIAC: Amnesic Automatic Computer . . 811--824
Yuxin Bai and
Victor W. Lee and
Engin Ipek Voltage Regulator Efficiency Aware Power
Management . . . . . . . . . . . . . . . 825--838
Hanna Alam and
Tianhao Zhang and
Mattan Erez and
Yoav Etsion Do-It-Yourself Virtual Memory
Translation . . . . . . . . . . . . . . 1--12
Sudarsun Kannan and
Ada Gavrilovska and
Vishal Gupta and
Karsten Schwan HeteroOS: OS Design for Heterogeneous
Memory Management in Datacenters . . . . 13--26
Rachata Ausavarungnirun and
Joshua Landgraf and
Vance Miller and
Saugata Ghose and
Jayneel Gandhi and
Christopher J. Rossbach and
Onur Mutlu Mosaic: Enabling Application-Transparent
Support for Multiple Page Sizes in
Throughput Processors . . . . . . . . . 27--44
Christoffer Dall and
Shih-Wei Li and
Jin Tack Lim and
Jason Nieh ARM Virtualization: Performance and
Architectural Implications . . . . . . . 45--56
Zi Yan and
Ján Veselý and
Guilherme Cox and
Abhishek Bhattacharjee Hardware Translation Coherence for
Virtualized Systems . . . . . . . . . . 57--70
Hung-Wei Tseng and
Qianchen Zhao and
Yuxiao Zhou and
Mark Gahagan and
Steven Swanson Morpheus: Exploring the Potential of
Near-Data Processing for Creating
Application Objects in Heterogeneous
Computing . . . . . . . . . . . . . . . 71--83
Sagi Shahar and
Shai Bergman and
Mark Silberstein ActivePointers: a Case for Software
Address Translation on GPUs . . . . . . 84--95
Shaolin Xie and
Scott Davidson and
Ikuo Magaki and
Moein Khazraee and
Luis Vega and
Lu Zhang and
Michael B. Taylor Extreme Datacenter Specialization for
Planet-Scale Computing: ASIC Clouds . . 96--108
Mario Drumond and
Alexandros Daglis and
Nooshin Mirzadeh and
Dmitrii Ustiugov and
Javier Picorel and
Babak Falsafi and
Boris Grot and
Dionisios Pnevmatikatos Algorithm/Architecture Co-Design for
Near-Memory Processing . . . . . . . . . 109--122
Justin Pettit and
Ben Pfaff and
Joe Stringer and
Cheng-Chun Tu and
Brenden Blanco and
Alex Tessmer Bringing Platform Harmony to VMware NSX 123--128
David E. Ott Software Defined Infrastructure:
Rethinking Cybersecurity with a More
Capable Toolset . . . . . . . . . . . . 129--133
Sanjay Krishnan and
Aaron J. Elmore and
Michael Franklin and
John Paparrizos and
Zechao Shang and
Adam Dziedzic and
Rui Liu Artificial Intelligence in
Resource-Constrained and Shared
Environments . . . . . . . . . . . . . . 1--6
Ken Birman and
Bharath Hariharan and
Christopher De Sa Cloud-Hosted Intelligence for Real-time
IoT Applications . . . . . . . . . . . . 7--13
Cody Coleman and
Daniel Kang and
Deepak Narayanan and
Luigi Nardi and
Tian Zhao and
Jian Zhang and
Peter Bailis and
Kunle Olukotun and
Chris Ré and
Matei Zaharia Analysis of DAWNBench, a
Time-to-Accuracy Machine Learning
Performance Benchmark . . . . . . . . . 14--25
Eunji Jeong and
Sungwoo Cho and
Gyeong-In Yu and
Joo Seong Jeong and
Dong-Jin Shin and
Taebum Kim and
Byung-Gon Chun Speculative Symbolic Graph Execution of
Imperative Deep Learning Programs . . . 26--33
Yu Gan and
Yanqi Zhang and
Kelvin Hu and
Dailun Cheng and
Yuan He and
Meghna Pancholi and
Christina Delimitrou Leveraging Deep Learning to Improve
Performance Predictability in Cloud
Microservices with Seer . . . . . . . . 34--39
Yiying Zhang and
Yutong Huang ``Learned'': Operating Systems . . . . . 40--45
David Vengerov and
Sesh Jalagam A Machine Learning Approach to
Recommending Files in a Collaborative
Work Environment . . . . . . . . . . . . 46--51
Luo Mai and
Alexandros Koliousis and
Guo Li and
Andrei-Octavian Brabete and
Peter Pietzuch Taming Hyper-parameters in Deep Learning
Systems . . . . . . . . . . . . . . . . 52--58
Kexin Pei and
Shiqi Wang and
Yuchi Tian and
Justin Whitehouse and
Carl Vondrick and
Yinzhi Cao and
Baishakhi Ray and
Suman Jana and
Junfeng Yang Bringing Engineering Rigor to Deep
Learning . . . . . . . . . . . . . . . . 59--67
Chieh-Jan Mike Liang and
Hui Xue and
Mao Yang and
Lidong Zhou The Case for Learning-and-System
Co-design . . . . . . . . . . . . . . . 68--74
Mathias L`ecuyer and
Riley Spahn and
Kiran Vodrahalli and
Roxana Geambasu and
Daniel Hsu Privacy Accounting and Quality Control
in the Sage Differentially Private ML
Platform . . . . . . . . . . . . . . . . 75--84
Yifan Du and
Valérie Issarny and
Françoise Sailhan When the Power of the Crowd Meets the
Intelligence of the Middleware: The
Mobile Phone Sensing Case . . . . . . . 85--90
Gernot Heiser and
Toby Murray and
Gerwin Klein Towards Provable Timing-Channel
Prevention . . . . . . . . . . . . . . . 1--7
Amit Vasudevan and
Petros Maniatis and
Ruben Martins überSpark: Practical, Provable,
End-to-End Guarantees on Commodity
Heterogeneous Interconnected Computing
Platforms . . . . . . . . . . . . . . . 8--22
Andres Erbsen and
Jade Philipoom and
Jason Gross and
Robert Sloan and
Adam Chlipala Simple High-Level Code For Cryptographic
Arithmetic: With Proofs, Without
Compromises . . . . . . . . . . . . . . 23--30
Luke Nelson and
James Bornholt and
Arvind Krishnamurthy and
Emina Torlak and
Xi Wang Noninterference specifications for
secure systems . . . . . . . . . . . . . 31--39
Srinath Setty and
Sebastian Angel and
Jonathan Lee Verifiable state machines: Proofs that
untrusted services operate correctly . . 40--46
Paul E. McKenney and
Joel Fernandes and
Silas Boyd-Wickizer and
Jonathan Walpole RCU Usage In the Linux Kernel: Eighteen
Years Later . . . . . . . . . . . . . . 47--63
Kostas Ferles and
Jacob Van Geffen and
Isil Dillig and
Yannis Smaragdakis Symbolic Reasoning for Automatic Signal
Placement . . . . . . . . . . . . . . . 64--76
Kasra Jamshidi and
Keval Vora A Deeper Dive into Pattern-Aware
Subgraph Exploration with PEREGRINE . . 1--10
Xiaolin Jiang and
Chengshuo Xu and
Rajiv Gupta VRGQ: Evaluating a Stream of Iterative
Graph Queries via Value Reuse . . . . . 11--20
Daniel Mawhirter and
Sam Reinehr and
Connor Holmes and
Tongping Liu and
Bo Wu GraphZero: a High-Performance Subgraph
Matching System . . . . . . . . . . . . 21--37
Yiqiu Wang and
Shangdi Yu and
Laxman Dhulipala and
Yan Gu and
Julian Shun GeoGraph: a Framework for Graph
Processing on Geometric Data . . . . . . 38--46
Loc Hoang and
Roshan Dathathri and
Gurbinder Gill and
Keshav Pingali CuSP: a Customizable Streaming Edge
Partitioner for Distributed Graph
Analytics . . . . . . . . . . . . . . . 47--60
Benjamin Bowman and
H. Howie Huang Towards Next-Generation Cybersecurity
with Graph AI . . . . . . . . . . . . . 61--67
Marco Serafini Scalable Graph Neural Network Training:
The Case for Sampling . . . . . . . . . 68--76
Rong Chen and
Haibo Chen Wukong: a Distributed Framework for Fast
and Concurrent Graph Querying . . . . . 77--83
Xiaowei Zhu and
Zhisong Fu and
Zhenxuan Pan and
Jin Jiang and
Chuntao Hong and
Yongchao Liu and
Yang Fang and
Wenguang Chen and
Changhua He Taking the Pulse of Financial Activities
with Online Graph Processing . . . . . . 84--87
Mohammed Islam Naas and
François Trahay and
Alexis Colin and
Pierre Olivier and
Stéphane Rubini and
Frank Singhoff and
Jalil Boukhobza EZIOTracer: Unifying Kernel and User
Space I/O Tracing for Data-Intensive
Applications . . . . . . . . . . . . . . 88--98
Luis Thomas and
Sebastien Gougeaud and
Stéphane Rubini and
Philippe Deniel and
Jalil Boukhobza Predicting file lifetimes for data
placement in multi-tiered storage
systems for HPC . . . . . . . . . . . . 99--107
Yichen Li and
Xu Zhang and
Shilin He and
Zhuangbin Chen and
Yu Kang and
Jinyang Liu and
Liqun Li and
Yingnong Dang and
Feng Gao and
Zhangwei Xu and
Saravan Rajmohan and
Qingwei Lin and
Dongmei Zhang and
Michael R. Lyu An Intelligent Framework for Timely,
Accurate, and Comprehensive Cloud
Incident Detection . . . . . . . . . . . 1--7
Yuri Shkuro and
Benjamin Renard and
Atul Singh Positional Paper: Schema-First
Application Telemetry . . . . . . . . . 8--17
Yuting Jiang and
Yifan Xiong and
Lei Qu and
Cheng Luo Luo and
Chen Tian and
Peng Cheng and
Yongqiang Xiong Moneo: Monitoring Fine-grained Metrics
Nonintrusively in AI Infrastructure . . 18--25
Muhammed Ugur and
Cheng Jiang and
Alex Erf and
Tanvir Ahmed Khan and
Baris Kasikci One Profile Fits All: Profile-Guided
Linux Kernel Optimizations for Data
Center Applications . . . . . . . . . . 26--33
Yu Gan and
Mingyu Liang and
Sundar Dev and
David Lo and
Christina Delimitrou Enabling Practical Cloud Performance
Debugging with Unsupervised Learning . . 34--41
Mert Toslali and
Emre Ates and
Darby Huye and
Zhaoqi Zhang and
Lan Liu and
Samantha Puterman and
Ayse K. Coskun and
Raja R. Sambasivan VAIF: Variance-driven Automated
Instrumentation Framework . . . . . . . 42--50
Srinivas Vippagunta and
Ken Finnigan and
Kishore Pusukuri Pharos: The Observability Platform at
Workday . . . . . . . . . . . . . . . . 51--54
Devashish R. Purandare and
Daniel Bittman and
Ethan L. Miller Analysis and Workload Characterization
of the CERN EOS Storage System . . . . . 55--61
Julius Plehn and
Anna Fuchs and
Michael Kuhn and
Jakob Lüttgau and
Thomas Ludwig Data-Aware Compression for HPC using
Machine Learning . . . . . . . . . . . . 62--69
Louis-Marie Nicolas and
Luis Thomas and
Yassine Hadjadj-Aoul and
Jalil Boukhobza SLRL: a Simple Least Remaining Lifetime
File Eviction policy for HPC multi-tier
storage systems . . . . . . . . . . . . 70--76
Yiying Zhang Make It Real: an End-to-End
Implementation of a Physically
Disaggregated Data Center . . . . . . . 1--9
Henrique Fingler and
Zhiting Zhu and
Esther Yoon and
Zhipeng Jia and
Emmett Witchel and
Christopher J. Rossbach Disaggregated GPU Acceleration for
Serverless Applications . . . . . . . . 10--20
Irina Calciu and
M. Talha Imran and
Ivan Puddu and
Sanidhya Kashyap and
Hasan Al Maruf and
Onur Mutlu and
Aasheesh Kolli Using Local Cache Coherence for
Disaggregated Memory Systems . . . . . . 21--28
Hasan Al Maruf and
Mosharaf Chowdhury Memory Disaggregation: Advances and Open
Challenges . . . . . . . . . . . . . . . 29--37
Marcos K. Aguilera and
Emmanuel Amaro and
Nadav Amit and
Erika Hunhoff and
Anil Yelam and
Gerd Zellweger Memory disaggregation: why now and what
are the challenges . . . . . . . . . . . 38--46
Divyanshu Saxena and
Tao Ji and
Arjun Singhvi and
Junaid Khalid and
Aditya Akella Navigating Performance--Efficiency
Tradeoffs in Serverless Computing:
Deduplication to the Rescue! . . . . . . 47--53
Mahesh Balakrishnan Taming Consensus in the Wild (with the
Shared Log Abstraction) . . . . . . . . 1--6
Zhipeng Jia and
Emmett Witchel The Key Ideas Behind Boki's Shared Logs 7--14
Chenyuan Wu and
Haoyun Qin and
Mohammad Javad Amiri and
Boon Thau Loo and
Dahlia Malkhi and
Ryan Marcus Towards Truly Adaptive Byzantine
Fault-Tolerant Consensus . . . . . . . . 15--22
Pedro Las-Casas and
Alok Gautum Kumbhare and
Rodrigo Fonseca and
Sharad Agarwal LLexus: an AI agent system for incident
management . . . . . . . . . . . . . . . 23--36
Luke Logan and
Jay Lofstead and
Xian-He Sun and
Anthony Kougkas An Evaluation of DAOS for Simulation and
Deep Learning HPCWorkloads . . . . . . . 37--44
Sebastián Rolón and
Oana Balmau Is Bare-metal I/O Performance with
User-defined Storage Drives Inside VMs
Possible? Benchmarking \tt libvfio-user
vs. Common Storage Virtualization
Configurations . . . . . . . . . . . . . 45--52
Krijn Doekemeijer and
Zebin Ren and
Nick Tehrany and
Animesh Trivedi ZWAL: Rethinking Write-ahead Logs for
ZNS SSDs with Zone Appends . . . . . . . 53--60
Zhenning Yang and
Archit Bhatnagar and
Yiming Qiu and
Tongyuan Miao and
Patrick Tser Jern Kon and
Yunming Xiao and
Yibo Huang and
Martin Casado and
Ang Chen Cloud Infrastructure Management in the
Age of AI Agents . . . . . . . . . . . . 1--8
Arney Agrawal and
Nitin Kedia and
Ashish Panwar and
Jayashree Mohan and
Nipun Kwatra and
Bhargav S. Gulavani and
Alexey Tumanov and
Ramachandran Ramjee Efficient LLM Inference via Chunked
Prefills . . . . . . . . . . . . . . . . 9--16
Yuan Wang and
Zhenyuan Yang and
Zhanbo Wang and
Mingyu Li and
Zhilin Wu and
Haibo Chen Towards Large Language Model-Friendly
APls . . . . . . . . . . . . . . . . . . 17--23
Rui Yang and
Rajiv Gupta DREAM: Distributed Regional Efficient
Agent Management with LLMs for Online
Multi-Agent Pathfinding . . . . . . . . 24--33
Payman Behnam and
Alind Khare and
Dhruv Garg and
Alexey Tumanov Toward Weight Sharing Paradigm for
Efficient AI: Training and Inference
Serving . . . . . . . . . . . . . . . . 34--45
Payman Behnam and
Yaosheng Fu and
Ritchie Zhao and
Po-An Tsai and
Zhididng Yu and
Alexey Tumanov EMPIRIC: Exploring Missing Pieces in KV
Cache Compression for Reducing
Computation, Storage, and Latency in
Long-Context LLM Inference . . . . . . . 46--54
Robin Vonk and
Joost Hoozemans and
Zaid AI-Ars GSST: Parallel string decompression at
191 GB/s on GPU . . . . . . . . . . . . 55--61
Shadi Ibrahim and
Jad Darrous Erasure Coding Aware Block Placement for
Data-Intensive Applications . . . . . . 62--69