default search action
EuroSys 2006: Leuven, Belgium
- Yolande Berbers, Willy Zwaenepoel:
Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006. ACM 2006, ISBN 1-59593-322-0
Security and protection
- Håvard D. Johansen, André Allavena, Robbert van Renesse:
Fireflies: scalable support for intrusion-tolerant network overlays. 3-13 - Georgios Portokalidis, Asia Slowinska, Herbert Bos:
Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. 15-27 - Alex Ho, Michael A. Fetterman, Christopher Clark, Andrew Warfield, Steven Hand:
Practical taint-based protection using demand emulation. 29-41
Device drivers
- Michael F. Spear, Tom Roeder, Orion Hodson, Galen C. Hunt, Steven Levi:
Solving the starting problem: device drivers as self-describing artifacts. 45-57 - Yoann Padioleau, Julia L. Lawall, Gilles Muller:
Understanding collateral evolution in Linux device drivers. 59-71 - Thomas Ball, Ella Bounimova, Byron Cook, Vladimir Levin, Jakob Lichtenberg, Con McGarvey, Bohus Ondrusek, Sriram K. Rajamani, Abdullah Ustuner:
Thorough static analysis of device drivers. 73-85
Replication
- Gokul Soundararajan, Cristiana Amza, Ashvin Goel:
Database replication policies for dynamic content applications. 89-102 - Jacob R. Lorch, Atul Adya, William J. Bolosky, Ronnie Chaiken, John R. Douceur, Jon Howell:
The SMART way to migrate replicated stateful services. 103-115 - Sameh Elnikety, Steven G. Dropsho, Fernando Pedone:
Tashkent: uniting durability with transaction ordering for high-performance scalable database replication. 117-130
Experience papers
- Orran Krieger, Marc A. Auslander, Bryan S. Rosenburg, Robert W. Wisniewski, Jimi Xenidis, Dilma Da Silva, Michal Ostrowski, Jonathan Appavoo, Maria A. Butrico, Mark F. Mergen, Amos Waterland, Volkmar Uhlig:
K42: building a complete operating system. 133-145 - Alan Mislove, Ansley Post, Andreas Haeberlen, Peter Druschel:
Experiences in building and operating ePOST, a reliable peer-to-peer application. 147-159 - Lenin Singaravelu, Calton Pu, Hermann Härtig, Christian Helmuth:
Reducing TCB complexity for security-sensitive applications: three case studies. 161-174
System design methodologies
- Manuel Fähndrich, Mark Aiken, Chris Hawblitzel, Orion Hodson, Galen C. Hunt, James R. Larus, Steven Levi:
Language support for fast and reliable message-based communication in singularity OS. 177-190 - Daniel Lohmann, Fabian Scheler, Reinhard Tartler, Olaf Spinczyk, Wolfgang Schröder-Preikschat:
A quantitative analysis of aspects in the eCos kernel. 191-204 - Arvind S. Krishna, Aniruddha S. Gokhale, Douglas C. Schmidt:
Context-specific middleware specialization techniques for optimizing software product-line architectures. 205-218
Storage
- Mary Baker, Mehul A. Shah, David S. H. Rosenthal, Mema Roussopoulos, Petros Maniatis, Thomas J. Giuli, Prashanth P. Bungale:
A fresh look at the reliability of long-term digital storage. 221-234 - Kimberly Keeton, Dirk Beyer, Ernesto Brau, Arif Merchant, Cipriano A. Santos, Alex Zhang:
On the road to recovery: restoring data after disasters. 235-248 - Xiaoyu Yao, Jun Wang:
RIMAC: a novel redundancy-based hierarchical cache architecture for energy efficient, high performance storage systems. 249-262
Network and I/O processing
- Tim Brecht, G. John Janakiraman, Brian Lynn, Vikram A. Saletore, Yoshio Turner:
Evaluating network processing efficiency with processor partitioning and asynchronous I/O. 265-278 - Hyong-youb Kim, Scott Rixner:
TCP offload through connection handoff. 279-290
New ideas and other unusual papers
- Jeffrey C. Mogul:
Emergent (mis)behavior vs. complex software systems. 293-304 - Ori Shalev, Nir Shavit:
Predictive log-synchronization. 305-315 - Qin Lv, William Josephson, Zhe Wang, Moses Charikar, Kai Li:
Ferret: a toolkit for content-based similarity search of feature-rich data. 317-330
User studies
- Hongliang Yu, Dongdong Zheng, Ben Y. Zhao, Weimin Zheng:
Understanding user behavior in large-scale video-on-demand systems. 333-344 - Iqbal Mohomed, Jim Chengming Cai, Eyal de Lara:
URICA: Usage-awaRe Interactive Content Adaptation for mobile devices. 345-358 - Sidath B. Handurukande, Anne-Marie Kermarrec, Fabrice Le Fessant, Laurent Massoulié, Simon Patarin:
Peer sharing behaviour in the eDonkey network, and implications for the design of server-less file sharing systems. 359-371
Management
- Chun Yuan, Ni Lao, Ji-Rong Wen, Jiwei Li, Zheng Zhang, Yi-Min Wang, Wei-Ying Ma:
Automated known problem diagnosis with event traces. 375-388 - Atul Singh, Petros Maniatis, Timothy Roscoe, Peter Druschel:
Using queries for distributed monitoring and forensics. 389-402 - Andreas Merkel, Frank Bellosa:
Balancing power consumption in multiprocessor systems. 403-414
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.