EuroSys A

26 papers

YearTitle / Authors
2009A runtime system for software lock elision.
Amitabha Roy, Steven Hand, Tim Harris
2009Automated control of multiple virtualized resources.
Pradeep Padala, Kai-Yuan Hou, Kang G. Shin, Xiaoyun Zhu, Mustafa Uysal, Zhikui Wang, Sharad Singhal, Arif Merchant
2009Dingo: taming device drivers.
Leonid Ryzhyk, Peter Chubb, Ihor Kuz, Gernot Heiser
2009Effective and efficient compromise recovery for weakly consistent replication.
Prince Mahajan, Ramakrishna Kotla, Catherine C. Marshall, Venugopalan Ramasubramanian, Thomas L. Rodeheffer, Douglas B. Terry, Ted Wobber
2009Fair and timely scheduling via cooperative polling.
Charles Krasic, Mayukh Saubhasik, Anirban Sinha, Ashvin Goel
2009First-aid: surviving and preventing memory management bugs during production runs.
Qi Gao, Wenbin Zhang, Yan Tang, Feng Qin
2009Improving the responsiveness of internet services with automatic cache placement.
Alexander Rasmussen, Emre Kiciman, V. Benjamin Livshits, Madanlal Musuvathi
2009Isolating web programs in modern browser architectures.
Charles Reis, Steven D. Gribble
2009Koala: a platform for OS-level power management.
David C. Snowdon, Etienne Le Sueur, Stefan M. Petters, Gernot Heiser
2009Ksplice: automatic rebootless kernel updates.
Jeff Arnold, M. Frans Kaashoek
2009Memory resource allocation for file system prefetching: from a supply chain management perspective.
Zhe Zhang, Amit Kulkarni, Xiaosong Ma, Yuanyuan Zhou
2009Migrating server storage to SSDs: analysis of tradeoffs.
Dushyanth Narayanan, Eno Thereska, Austin Donnelly, Sameh Elnikety, Antony I. T. Rowstron
2009Multi-aspect profiling of kernel rootkit behavior.
Ryan D. Riley, Xuxian Jiang, Dongyan Xu
2009Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space.
Babak Salamat, Todd Jackson, Andreas Gal, Michael Franz
2009Pointless tainting?: evaluating the practicality of pointer tainting.
Asia Slowinska, Herbert Bos
2009Predicting replicated database scalability from standalone database profiling.
Sameh Elnikety, Steven G. Dropsho, Emmanuel Cecchet, Willy Zwaenepoel
2009Privacy-preserving browser-side scripting with BFlow.
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robert Morris
2009Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009
Wolfgang Schröder-Preikschat, John Wilkes, Rebecca Isaacs
2009SCAN-Lite: enterprise-wide analysis on the cheap.
Craig A. N. Soules, Kimberly Keeton, Charles B. Morrey III
2009SnowFlock: rapid virtual machine cloning for cloud computing.
Horacio Andrés Lagar-Cavilla, Joseph Andrew Whitney, Adin Matthew Scannell, Philip Patchin, Stephen M. Rumble, Eyal de Lara, Michael Brudno, Mahadev Satyanarayanan
2009Statistical profiling-based techniques for effective power provisioning in data centers.
Sriram Govindan, Jeonghwan Choi, Bhuvan Urgaonkar, Anand Sivasubramaniam, Andrea Baldini
2009Towards practical page coloring-based multicore cache management.
Xiao Zhang, Sandhya Dwarkadas, Kai Shen
2009Tralfamadore: unifying source code and execution experience.
Geoffrey Lefebvre, Brendan Cully, Michael J. Feeley, Norman C. Hutchinson, Andrew Warfield
2009Transparent checkpoints of closed distributed systems in Emulab.
Anton Burtsev, Prashanth Radhakrishnan, Mike Hibler, Jay Lepreau
2009User interactions in social networks and their implications.
Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P. N. Puttaswamy, Ben Y. Zhao
2009xCalls: safe I/O in memory transactions.
Haris Volos, Andres Jaan Tack, Neelam Goyal, Michael M. Swift, Adam Welc