| 2009 | A runtime system for software lock elision. Amitabha Roy, Steven Hand, Tim Harris |
| 2009 | Automated control of multiple virtualized resources. Pradeep Padala, Kai-Yuan Hou, Kang G. Shin, Xiaoyun Zhu, Mustafa Uysal, Zhikui Wang, Sharad Singhal, Arif Merchant |
| 2009 | Dingo: taming device drivers. Leonid Ryzhyk, Peter Chubb, Ihor Kuz, Gernot Heiser |
| 2009 | Effective and efficient compromise recovery for weakly consistent replication. Prince Mahajan, Ramakrishna Kotla, Catherine C. Marshall, Venugopalan Ramasubramanian, Thomas L. Rodeheffer, Douglas B. Terry, Ted Wobber |
| 2009 | Fair and timely scheduling via cooperative polling. Charles Krasic, Mayukh Saubhasik, Anirban Sinha, Ashvin Goel |
| 2009 | First-aid: surviving and preventing memory management bugs during production runs. Qi Gao, Wenbin Zhang, Yan Tang, Feng Qin |
| 2009 | Improving the responsiveness of internet services with automatic cache placement. Alexander Rasmussen, Emre Kiciman, V. Benjamin Livshits, Madanlal Musuvathi |
| 2009 | Isolating web programs in modern browser architectures. Charles Reis, Steven D. Gribble |
| 2009 | Koala: a platform for OS-level power management. David C. Snowdon, Etienne Le Sueur, Stefan M. Petters, Gernot Heiser |
| 2009 | Ksplice: automatic rebootless kernel updates. Jeff Arnold, M. Frans Kaashoek |
| 2009 | Memory resource allocation for file system prefetching: from a supply chain management perspective. Zhe Zhang, Amit Kulkarni, Xiaosong Ma, Yuanyuan Zhou |
| 2009 | Migrating server storage to SSDs: analysis of tradeoffs. Dushyanth Narayanan, Eno Thereska, Austin Donnelly, Sameh Elnikety, Antony I. T. Rowstron |
| 2009 | Multi-aspect profiling of kernel rootkit behavior. Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
| 2009 | Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space. Babak Salamat, Todd Jackson, Andreas Gal, Michael Franz |
| 2009 | Pointless tainting?: evaluating the practicality of pointer tainting. Asia Slowinska, Herbert Bos |
| 2009 | Predicting replicated database scalability from standalone database profiling. Sameh Elnikety, Steven G. Dropsho, Emmanuel Cecchet, Willy Zwaenepoel |
| 2009 | Privacy-preserving browser-side scripting with BFlow. Alexander Yip, Neha Narula, Maxwell N. Krohn, Robert Morris |
| 2009 | Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009 Wolfgang Schröder-Preikschat, John Wilkes, Rebecca Isaacs |
| 2009 | SCAN-Lite: enterprise-wide analysis on the cheap. Craig A. N. Soules, Kimberly Keeton, Charles B. Morrey III |
| 2009 | SnowFlock: rapid virtual machine cloning for cloud computing. Horacio Andrés Lagar-Cavilla, Joseph Andrew Whitney, Adin Matthew Scannell, Philip Patchin, Stephen M. Rumble, Eyal de Lara, Michael Brudno, Mahadev Satyanarayanan |
| 2009 | Statistical profiling-based techniques for effective power provisioning in data centers. Sriram Govindan, Jeonghwan Choi, Bhuvan Urgaonkar, Anand Sivasubramaniam, Andrea Baldini |
| 2009 | Towards practical page coloring-based multicore cache management. Xiao Zhang, Sandhya Dwarkadas, Kai Shen |
| 2009 | Tralfamadore: unifying source code and execution experience. Geoffrey Lefebvre, Brendan Cully, Michael J. Feeley, Norman C. Hutchinson, Andrew Warfield |
| 2009 | Transparent checkpoints of closed distributed systems in Emulab. Anton Burtsev, Prashanth Radhakrishnan, Mike Hibler, Jay Lepreau |
| 2009 | User interactions in social networks and their implications. Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P. N. Puttaswamy, Ben Y. Zhao |
| 2009 | xCalls: safe I/O in memory transactions. Haris Volos, Andres Jaan Tack, Neelam Goyal, Michael M. Swift, Adam Welc |