default search action
20th SOSP 2005: Brighton, UK
- Andrew Herbert, Kenneth P. Birman:
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, SOSP 2005, Brighton, UK, October 23-26, 2005. ACM 2005, ISBN 1-59593-079-5
Opening Session and Keynote Speech
- Kenneth P. Birman:
Opening remarks. - Andrew S. Tanenbaum:
Keynote speech.
Integrity and isolation
- Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla:
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. 1-16 - Petros Efstathopoulos, Maxwell N. Krohn, Steve Vandebogart, Cliff Frey, David Ziegler, Eddie Kohler, David Mazières, M. Frans Kaashoek, Robert Morris:
Labels and event processes in the Asbestos operating system. 17-30 - Emmett Witchel, Junghwan Rhee, Krste Asanovic:
Mondrix: memory isolation for linux using mondriaan memory protection. 31-44
Distributed systems
- Amitanand S. Aiyer, Lorenzo Alvisi, Allen Clement, Michael Dahlin, Jean-Philippe Martin, Carl Porth:
BAR fault tolerance for cooperative services. 45-58 - Michael Abd-El-Malek, Gregory R. Ganger, Garth R. Goodson, Michael K. Reiter, Jay J. Wylie:
Fault-scalable Byzantine fault-tolerant services. 59-74 - Boon Thau Loo, Tyson Condie, Joseph M. Hellerstein, Petros Maniatis, Timothy Roscoe, Ion Stoica:
Implementing declarative overlays. 75-90
History and context
- Ashlesha Joshi, Samuel T. King, George W. Dunlap, Peter M. Chen:
Detecting past and present intrusions through vulnerability-specific predicates. 91-104 - Ira Cohen, Steve Zhang, Moisés Goldszmidt, Julie Symons, Terence Kelly, Armando Fox:
Capturing, indexing, clustering, and retrieving system history. 105-118 - Craig A. N. Soules, Gregory R. Ganger:
Connections: using context to enhance file search. 119-132
Containment
- Manuel Costa, Jon Crowcroft, Miguel Castro, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham:
Vigilante: end-to-end containment of internet worms. 133-147 - Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage:
Scalability, fidelity, and containment in the potemkin virtual honeyfarm. 148-162 - Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li, Eyal de Lara:
The taser intrusion recovery system. 163-176
Filesystems
- Qingbo Zhu, Zhifeng Chen, Lin Tan, Yuanyuan Zhou, Kimberly Keeton, John Wilkes:
Hibernator: helping disk arrays sleep through the winter. 177-190 - Edmund B. Nightingale, Peter M. Chen, Jason Flinn:
Speculative execution in a distributed file system. 191-205 - Vijayan Prabhakaran, Lakshmi N. Bairavasundaram, Nitin Agrawal, Haryadi S. Gunawi, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau:
IRON file systems. 206-220
Bugs
- Yuan Yu, Tom Rodeheffer, Wei Chen:
RaceTrack: efficient detection of data race conditions via adaptive tracking. 221-234 - Feng Qin, Joseph A. Tucek, Jagadeesan Sundaresan, Yuanyuan Zhou:
Rx: treating bugs as allergies - a safe method to survive software failures. 235-248
Optimization
- Lars Eggert, Joseph D. Touch:
Idletime scheduling with preemption intervals. 249-262 - Hai Huang, Wanda Hung, Kang G. Shin:
FS2: dynamic data replication in free disk space for improving disk performance and energy consumption. 263-276 - Ricardo A. Baratto, Leonard N. Kim, Jason Nieh:
THINC: a virtual display architecture for thin-client computing. 277-290
Panel Session
- Peer to peer: still useless?
- Are P2P concepts worth pursuing?
- P2p: still worthless?
- Jon Crowcroft:
Peerlessness is next to godlessness.
Poster session
- AAron Walters, Cristina Nita-Rotaru:
Analysis of malicious abstract sensor faults in adaptive measurement-based overlay networks. 1-2 - Michael R. Hines, Mark Lewandowski, Kartik Gopalan:
Anemone: adaptive network memory engine. 1 - Christopher Stewart, Kai Shen:
Daphne: performance debugging using model-driven anomaly characterization. 1-2 - David Oppenheimer, Brent N. Chun, David A. Patterson, Alex C. Snoeren, Amin Vahdat:
Service placement in shared wide-area platforms. 1 - Edgar A. León, Michal Ostrowski:
An infrastructure for the development of kernel network services proof of concept: fast UDP. 1-2 - Emmanuel Jeanvoine:
Distributed operating system for resource discovery and allocation in federated clusters. 1-2 - Hiroo Ishikawa, Tatsuo Nakajima, Shuichi Oikawa, Toshio Hirotsu:
Proactive operating system recovery. 1-2 - Jin Liang, Steven Y. Ko, Indranil Gupta, Klara Nahrstedt:
MON: management overlay networks for distributed systems. 1-2 - Kenji Kise, Takahiro Katagiri, Hiroki Honda, Toshitsugu Yuba:
Towards scalable and simple software-DSM systems. 1-13 - Kiran Nagaraja, Andrew Tjang, Fábio Oliveira, Ricardo Bianchini, Richard P. Martin, Thu D. Nguyen:
Model-based validation for dealing with operator mistakes. 1-2 - Lin Gu, John A. Stankovic:
t-kernel: a naturalizing OS kernel for low-power cost-effective computers. 1-2 - Rebekah Leslie, Mark P. Jones:
Operating system construction in Haskell. 1-2 - Shlomi Dolev, Reuven Yagel:
Self-stabilizing operating systems. 1-2 - Terence Kelly:
Transaction mix performance models: methods and application to performance anomaly detection. 1-3 - Vivek Sawant, Jasleen Kaur:
Supporting arbitrary queries in peer-to-peer networks using hybrid routing. 1-2 - Kevin Walsh, Emin Gün Sirer:
The case for an object-based peer-to-peer reputation system. 1-2 - Olga Brukman, Shlomi Dolev, Marcelo Sihman:
Recovery oriented programming. 1 - Yee Jiun Song, Venugopalan Ramasubramanian, Emin Gün Sirer:
CobWeb: a proactive analysis-driven approach to content distribution. 1-3 - Bryan Ford, Jacob Strauss, Chris Lesniewski-Laas, M. Frans Kaashoek, Robert Morris, Sean C. Rhea:
UIA: a user information architecture for personal devices. 1-2 - João Barreto, Paulo Ferreira:
Efficient file storage using content-based indexing. 1-9 - Dan R. K. Ports, Austin T. Clements, Erik D. Demaine:
PersiFS: a versioned file system with an efficient representation. 1-2 - Willem de Bruijn, Herbert Bos:
OS support for multi-gigabit networking. 1-2 - Ramakrishna Gummadi, Nupur Kothari, Ramesh Govindan, Todd D. Millstein:
Kairos: a macro-programming system for wireless sensor networks. 1-2 - Patrick Reynolds, Janet L. Wiener, Jeffrey C. Mogul, Mehul A. Shah, Charles Killian, Amin Vahdat:
Experiences with Pip: finding unexpected behavior in distributed systems. 1-2 - Stefan Pleisch, Ken Birman:
Scalable querying and tracking of sensor networks from mobile platforms. 1-2 - Xuezheng Liu, Aimin Pan, Wei Lin, Zheng Zhang:
Using model checker and replay facility to debug complex distributed system. 1 - Joshua LeVasseur, Volkmar Uhlig, Ben Leslie, Matthew Chapman, Gernot Heiser:
Pre-virtualization: uniting two worlds. 1-2 - Diwaker Gupta, Kenneth Yocum, Marvin McNett, Alex C. Snoeren, Amin Vahdat, Geoffrey M. Voelker:
To infinity and beyond: time warped network emulation. 1-2 - Shankar Pasupathy, Garth R. Goodson, Vijayan Prabhakaran:
Making enterprise storage more search-friendly. 1-2 - Nikolai Joukov, Rakesh Iyer, Avishay Traeger, Charles P. Wright, Erez Zadok:
Versatile, portable, and efficient OS profiling via latency analysis. 1-14 - Christian Poellabauer, Timothy Durnan:
The case for judicious resource management. 1-2
Work in progress session
- Matt Welsh, Geoff Werner-Allen, Konrad Lorincz, Omar Marcillo, Jeff Johnson, Mario Ruiz, Jonathan Lees:
Sensor networks for high-resolution monitoring of volcanic activity. 1 - Aydan R. Yumerefendi, Landon P. Cox:
LLSS: toward system support for plugging privacy leaks. 1 - Alan Shieh, Dan Williams, Emin Gün Sirer, Fred B. Schneider:
Nexus: a new operating system for trustworthy computing. 1-2 - Saikat Guha, Paul Francis:
Architecting a secure internet. 1 - Niraj Tolia, David G. Andersen, Michael Kaminsky, Swapnil V. Patil:
What the protocol stack missed: the transfer service. 1-2 - Wenjun Hu, Sachin Katti, Hariharan Rahul, Dina Katabi, Jon Crowcroft:
Sending more for less bandwidth and power: a systems approach to network coding. 1-2 - Tyson Condie, Joseph M. Hellerstein, Petros Maniatis, Sean C. Rhea, Timothy Roscoe:
A need for componentized transport protocols. 1-2 - Kenji Kaneda, Yoshihiro Oyama, Akinori Yonezawa:
A virtual machine monitor for utilizing non-dedicated clusters. 1-2 - Timothy Durnan, Christian Poellabauer:
DDVS: distributed dynamic voltage scaling. 1 - Matthew E. Tolentino, Kirk W. Cameron:
Improving the energy efficiency of high-performance server systems. 1 - Dominic G. Lucchetti, Steven K. Reinhardt, Peter M. Chen:
ExtraVirt: detecting and recovering from transient processor faults. 1-2 - Andrew Baumann, Jonathan Appavoo:
Improving dynamic update for operating systems. 1-2 - Jay A. Patel, Charles M. Yang, Indranil Gupta:
Turning flash crowds into smart mobs with real-time stochastic detection and adaptive cooperative caching. 1 - Andrew de los Reyes, Christopher Frost, Eddie Kohler, Mike Mammarella, Lei Zhang:
The KudOS architecture for file systems. 1-2 - Kenji Kaneda, Yoshihiro Oyama, Akinori Yonezawa:
A virtual machine monitor for utilizing non-dedicated clusters. 1-2 - Navendu Jain, Praveen Yalagandula, Mike Dahlin, Yin Zhang:
INSIGHT: a distributed monitoring system for tracking continuous queries. 1
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.