default search action
4th OSDI 2000: San Diego, California, USA
- Michael B. Jones, M. Frans Kaashoek:
4th Symposium on Operating System Design and Implementation (OSDI 2000), San Diego, California, USA, October 23-25, 2000. USENIX Association 2000, ISBN 1-880446-16-2
Monday, October 23, 2000
Applying Language Technology to Systems
- Dawson R. Engler, Benjamin Chelf, Andy Chou, Seth Hallem:
Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions. 1-16 - Fabrice Mérillon, Laurent Réveillère, Charles Consel, Renaud Marlet, Gilles Muller:
Devil: An IDL for Hardware Programming. 17-30 - Angela Demke Brown, Todd C. Mowry:
Taming the Memory Hogs: Using Compiler-Inserted Releases to Manage Physical Memory Intelligently. 31-44
Scheduling
- Abhishek Chandra, Micah Adler, Pawan Goyal, Prashant J. Shenoy:
Surplus Fair Scheduling: A Proportional-Share CPU Scheduling Algorithm for Symmetric Multiprocessors. 45-58 - Julita Corbalán, Xavier Martorell, Jesús Labarta:
Performance-Driven Processor Allocation. 59-73 - Dirk Grunwald, Philip Alexander Levis, Keith I. Farkas, Charles B. Morrey III, Michael Neufeld:
Policies for Dynamic Clock Scheduling. 73-86
Storage Management
- Christopher R. Lumb, Jiri Schindler, Gregory R. Ganger, David Nagle, Erik Riedel:
Towards Higher Disk Head Utilization: Extracting "Free" Bandwidth from Busy Disk Drives. 87-102 - Rodney Van Meter, Minxi Gao:
Latency Management in Storage Systems. 103-118 - Jong Min Kim, Jongmoo Choi, Jesung Kim, Sam H. Noh, Sang Lyul Min, Yookun Cho, Chong-Sang Kim:
A Low-Overhead, High-Performance Unified Buffer Management Scheme That Exploits Sequential and Looping References. 119-134
Tuesday, October 24, 2000
Security
- Umesh Maheshwari, Radek Vingralek, William Shapiro:
How to Build a Trusted Database System on Untrusted Storage. 135-150 - Jon Howell, David Kotz:
End-to-End Authorization. 151-164 - John D. Strunk, Garth R. Goodson, Michael L. Scheinholtz, Craig A. N. Soules, Gregory R. Ganger:
Self-Securing Storage: Protecting Data in Compromised Systems. 165-180 - Kevin Fu, M. Frans Kaashoek, David Mazières:
Fast and Secure Distributed Read-Only File System. 181-196
Networking
- John Jannotti, David K. Gifford, Kirk L. Johnson, M. Frans Kaashoek, James W. O'Toole Jr.:
Overcast: Reliable Multicasting with an Overlay Network. 197-212 - David G. Andersen, Deepak Bansal, Dorothy Curtis, Srinivasan Seshan, Hari Balakrishnan:
System Support for Bandwidth Management and Content Adaptation in Internet Applications. 213-226
Storage Devices
- John Linwood Griffin, Steven W. Schlosser, Gregory R. Ganger, David Nagle:
Operating System Management of MEMS-based Storage Devices. 227-242 - Xiang Yu, Benjamin Gum, Yuqun Chen, Randolph Y. Wang, Kai Li, Arvind Krishnamurthy, Thomas E. Anderson:
Trading Capacity for Performance in a Disk Array. 243-258 - Darrell C. Anderson, Jeffrey S. Chase, Amin Vahdat:
Interposed Request Routing for Scalable Network Storage. 259-272
Wednesday, October 25, 2000
Reliability
- Miguel Castro, Barbara Liskov:
Proactive Recovery in a Byzantine-Fault-Tolerant System. 273-288 - David E. Lowell, Subhachandra Chandra, Peter M. Chen:
Exploring Failure Transparency and the Limits of Generic Recovery. 289-304 - Haifeng Yu, Amin Vahdat:
Design and Evaluation of a Continuous Consistency Model for Replicated Services. 305-318
System Architecture
- Steven D. Gribble, Eric A. Brewer, Joseph M. Hellerstein, David E. Culler:
Scalable, Distributed Data Structures for Internet Service Construction. 319-332 - Godmar Back, Wilson C. Hsieh, Jay Lepreau:
Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java. 333-346 - Alastair Reid, Matthew Flatt, Leigh Stoller, Jay Lepreau, Eric Eide:
Knit: Component Composition for Systems Software. 347-360
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.