| 2005 | A need for componentized transport protocols. Tyson Condie, Joseph M. Hellerstein, Petros Maniatis, Sean C. Rhea, Timothy Roscoe |
| 2005 | A virtual machine monitor for utilizing non-dedicated clusters. Kenji Kaneda, Yoshihiro Oyama, Akinori Yonezawa |
| 2005 | A virtual machine monitor for utilizing non-dedicated clusters. Kenji Kaneda, Yoshihiro Oyama, Akinori Yonezawa |
| 2005 | An infrastructure for the development of kernel network services proof of concept: fast UDP. Edgar A. León, Michal Ostrowski |
| 2005 | Analysis of malicious abstract sensor faults in adaptive measurement-based overlay networks. AAron Walters, Cristina Nita-Rotaru |
| 2005 | Anemone: adaptive network memory engine. Michael R. Hines, Mark Lewandowski, Kartik Gopalan |
| 2005 | Architecting a secure internet. Saikat Guha, Paul Francis |
| 2005 | Are P2P concepts worth pursuing? |
| 2005 | BAR fault tolerance for cooperative services. Amitanand S. Aiyer, Lorenzo Alvisi, Allen Clement, Michael Dahlin, Jean-Philippe Martin, Carl Porth |
| 2005 | Capturing, indexing, clustering, and retrieving system history. Ira Cohen, Steve Zhang, Moisés Goldszmidt, Julie Symons, Terence Kelly, Armando Fox |
| 2005 | CobWeb: a proactive analysis-driven approach to content distribution. Yee Jiun Song, Venugopalan Ramasubramanian, Emin Gün Sirer |
| 2005 | Connections: using context to enhance file search. Craig A. N. Soules, Gregory R. Ganger |
| 2005 | DDVS: distributed dynamic voltage scaling. Timothy Durnan, Christian Poellabauer |
| 2005 | Daphne: performance debugging using model-driven anomaly characterization. Christopher Stewart, Kai Shen |
| 2005 | Detecting past and present intrusions through vulnerability-specific predicates. Ashlesha Joshi, Samuel T. King, George W. Dunlap, Peter M. Chen |
| 2005 | Distributed operating system for resource discovery and allocation in federated clusters. Emmanuel Jeanvoine |
| 2005 | Efficient file storage using content-based indexing. João Barreto, Paulo Ferreira |
| 2005 | Experiences with Pip: finding unexpected behavior in distributed systems. Patrick Reynolds, Janet L. Wiener, Jeffrey C. Mogul, Mehul A. Shah, Charles Killian, Amin Vahdat |
| 2005 | ExtraVirt: detecting and recovering from transient processor faults. Dominic G. Lucchetti, Steven K. Reinhardt, Peter M. Chen |
| 2005 | FS2: dynamic data replication in free disk space for improving disk performance and energy consumption. Hai Huang, Wanda Hung, Kang G. Shin |
| 2005 | Fault-scalable Byzantine fault-tolerant services. Michael Abd-El-Malek, Gregory R. Ganger, Garth R. Goodson, Michael K. Reiter, Jay J. Wylie |
| 2005 | Hibernator: helping disk arrays sleep through the winter. Qingbo Zhu, Zhifeng Chen, Lin Tan, Yuanyuan Zhou, Kimberly Keeton, John Wilkes |
| 2005 | INSIGHT: a distributed monitoring system for tracking continuous queries. Navendu Jain, Praveen Yalagandula, Mike Dahlin, Yin Zhang |
| 2005 | IRON file systems. Vijayan Prabhakaran, Lakshmi N. Bairavasundaram, Nitin Agrawal, Haryadi S. Gunawi, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau |
| 2005 | Idletime scheduling with preemption intervals. Lars Eggert, Joseph D. Touch |
| 2005 | Implementing declarative overlays. Boon Thau Loo, Tyson Condie, Joseph M. Hellerstein, Petros Maniatis, Timothy Roscoe, Ion Stoica |
| 2005 | Improving dynamic update for operating systems. Andrew Baumann, Jonathan Appavoo |
| 2005 | Improving the energy efficiency of high-performance server systems. Matthew E. Tolentino, Kirk W. Cameron |
| 2005 | Kairos: a macro-programming system for wireless sensor networks. Ramakrishna Gummadi, Nupur Kothari, Ramesh Govindan, Todd D. Millstein |
| 2005 | Keynote speech. Andrew S. Tanenbaum |
| 2005 | LLSS: toward system support for plugging privacy leaks. Aydan R. Yumerefendi, Landon P. Cox |
| 2005 | Labels and event processes in the Asbestos operating system. Petros Efstathopoulos, Maxwell N. Krohn, Steve Vandebogart, Cliff Frey, David Ziegler, Eddie Kohler, David Mazières, M. Frans Kaashoek, Robert Morris |
| 2005 | MON: management overlay networks for distributed systems. Jin Liang, Steven Y. Ko, Indranil Gupta, Klara Nahrstedt |
| 2005 | Making enterprise storage more search-friendly. Shankar Pasupathy, Garth R. Goodson, Vijayan Prabhakaran |
| 2005 | Model-based validation for dealing with operator mistakes. Kiran Nagaraja, Andrew Tjang, Fábio Oliveira, Ricardo Bianchini, Richard P. Martin, Thu D. Nguyen |
| 2005 | Mondrix: memory isolation for linux using mondriaan memory protection. Emmett Witchel, Junghwan Rhee, Krste Asanovic |
| 2005 | Nexus: a new operating system for trustworthy computing. Alan Shieh, Dan Williams, Emin Gün Sirer, Fred B. Schneider |
| 2005 | OS support for multi-gigabit networking. Willem de Bruijn, Herbert Bos |
| 2005 | Opening remarks. Kenneth P. Birman |
| 2005 | Operating system construction in Haskell. Rebekah Leslie, Mark P. Jones |
| 2005 | P2p: still worthless? |
| 2005 | Peer to peer: still useless? |
| 2005 | Peerlessness is next to godlessness. Jon Crowcroft |
| 2005 | PersiFS: a versioned file system with an efficient representation. Dan R. K. Ports, Austin T. Clements, Erik D. Demaine |
| 2005 | Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla |
| 2005 | Pre-virtualization: uniting two worlds. Joshua LeVasseur, Volkmar Uhlig, Ben Leslie, Matthew Chapman, Gernot Heiser |
| 2005 | Proactive operating system recovery. Hiroo Ishikawa, Tatsuo Nakajima, Shuichi Oikawa, Toshio Hirotsu |
| 2005 | Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, SOSP 2005, Brighton, UK, October 23-26, 2005 Andrew Herbert, Kenneth P. Birman |
| 2005 | RaceTrack: efficient detection of data race conditions via adaptive tracking. Yuan Yu, Tom Rodeheffer, Wei Chen |
| 2005 | Recovery oriented programming. Olga Brukman, Shlomi Dolev, Marcelo Sihman |
| 2005 | Rx: treating bugs as allergies - a safe method to survive software failures. Feng Qin, Joseph A. Tucek, Jagadeesan Sundaresan, Yuanyuan Zhou |
| 2005 | Scalability, fidelity, and containment in the potemkin virtual honeyfarm. Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage |
| 2005 | Scalable querying and tracking of sensor networks from mobile platforms. Stefan Pleisch, Ken Birman |
| 2005 | Self-stabilizing operating systems. Shlomi Dolev, Reuven Yagel |
| 2005 | Sending more for less bandwidth and power: a systems approach to network coding. Wenjun Hu, Sachin Katti, Hariharan Rahul, Dina Katabi, Jon Crowcroft |
| 2005 | Sensor networks for high-resolution monitoring of volcanic activity. Matt Welsh, Geoff Werner-Allen, Konrad Lorincz, Omar Marcillo, Jeff Johnson, Mario Ruiz, Jonathan Lees |
| 2005 | Service placement in shared wide-area platforms. David Oppenheimer, Brent N. Chun, David A. Patterson, Alex C. Snoeren, Amin Vahdat |
| 2005 | Speculative execution in a distributed file system. Edmund B. Nightingale, Peter M. Chen, Jason Flinn |
| 2005 | Supporting arbitrary queries in peer-to-peer networks using hybrid routing. Vivek Sawant, Jasleen Kaur |
| 2005 | THINC: a virtual display architecture for thin-client computing. Ricardo A. Baratto, Leonard N. Kim, Jason Nieh |
| 2005 | The KudOS architecture for file systems. Andrew de los Reyes, Christopher Frost, Eddie Kohler, Mike Mammarella, Lei Zhang |
| 2005 | The case for an object-based peer-to-peer reputation system. Kevin Walsh, Emin Gün Sirer |
| 2005 | The case for judicious resource management. Christian Poellabauer, Timothy Durnan |
| 2005 | The taser intrusion recovery system. Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li, Eyal de Lara |
| 2005 | To infinity and beyond: time warped network emulation. Diwaker Gupta, Kenneth Yocum, Marvin McNett, Alex C. Snoeren, Amin Vahdat, Geoffrey M. Voelker |
| 2005 | Towards scalable and simple software-DSM systems. Kenji Kise, Takahiro Katagiri, Hiroki Honda, Toshitsugu Yuba |
| 2005 | Transaction mix performance models: methods and application to performance anomaly detection. Terence Kelly |
| 2005 | Turning flash crowds into smart mobs with real-time stochastic detection and adaptive cooperative caching. Jay A. Patel, Charles M. Yang, Indranil Gupta |
| 2005 | UIA: a user information architecture for personal devices. Bryan Ford, Jacob Strauss, Chris Lesniewski-Laas, M. Frans Kaashoek, Robert Morris, Sean C. Rhea |
| 2005 | Using model checker and replay facility to debug complex distributed system. Xuezheng Liu, Aimin Pan, Wei Lin, Zheng Zhang |
| 2005 | Versatile, portable, and efficient OS profiling via latency analysis. Nikolai Joukov, Rakesh Iyer, Avishay Traeger, Charles P. Wright, Erez Zadok |
| 2005 | Vigilante: end-to-end containment of internet worms. Manuel Costa, Jon Crowcroft, Miguel Castro, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham |
| 2005 | What the protocol stack missed: the transfer service. Niraj Tolia, David G. Andersen, Michael Kaminsky, Swapnil V. Patil |
| 2005 | t-kernel: a naturalizing OS kernel for low-power cost-effective computers. Lin Gu, John A. Stankovic |