Abstract is missing.
- SnowFlock: rapid virtual machine cloning for cloud computingHoracio Andrés Lagar-Cavilla, Joseph Andrew Whitney, Adin Matthew Scannell, Philip Patchin, Stephen M. Rumble, Eyal de Lara, Michael Brudno, Mahadev Satyanarayanan. 1-12 [doi]
- Automated control of multiple virtualized resourcesPradeep Padala, Kai-Yuan Hou, Kang G. Shin, Xiaoyun Zhu, Mustafa Uysal, Zhikui Wang, Sharad Singhal, Arif Merchant. 13-26 [doi]
- Improving the responsiveness of internet services with automatic cache placementAlexander Rasmussen, Emre Kiciman, V. Benjamin Livshits, Madanlal Musuvathi. 27-32 [doi]
- Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-spaceBabak Salamat, Todd Jackson, Andreas Gal, Michael Franz. 33-46 [doi]
- Multi-aspect profiling of kernel rootkit behaviorRyan Riley, Xuxian Jiang, Dongyan Xu. 47-60 [doi]
- Pointless tainting?: evaluating the practicality of pointer taintingAsia Slowinska, Herbert Bos. 61-74 [doi]
- Memory resource allocation for file system prefetching: from a supply chain management perspectiveZhe Zhang, Amit Kulkarni, Xiaosong Ma, Yuanyuan Zhou. 75-88 [doi]
- Towards practical page coloring-based multicore cache managementXiao Zhang, Sandhya Dwarkadas, Kai Shen. 89-102 [doi]
- Fair and timely scheduling via cooperative pollingCharles Krasic, Mayukh Saubhasik, Anirban Sinha, Ashvin Goel. 103-116 [doi]
- SCAN-Lite: enterprise-wide analysis on the cheapCraig A. N. Soules, Kimberly Keeton, Charles B. Morrey III. 117-130 [doi]
- Effective and efficient compromise recovery for weakly consistent replicationPrince Mahajan, Ramakrishna Kotla, Catherine C. Marshall, Venugopalan Ramasubramanian, Thomas L. Rodeheffer, Douglas B. Terry, Ted Wobber. 131-144 [doi]
- Migrating server storage to SSDs: analysis of tradeoffsDushyanth Narayanan, Eno Thereska, Austin Donnelly, Sameh Elnikety, Antony I. T. Rowstron. 145-158 [doi]
- First-aid: surviving and preventing memory management bugs during production runsQi Gao, Wenbin Zhang, Yan Tang, Feng Qin. 159-172 [doi]
- Transparent checkpoints of closed distributed systems in EmulabAnton Burtsev, Prashanth Radhakrishnan, Mike Hibler, Jay Lepreau. 173-186 [doi]
- Ksplice: automatic rebootless kernel updatesJeff Arnold, M. Frans Kaashoek. 187-198 [doi]
- Tralfamadore: unifying source code and execution experienceGeoffrey Lefebvre, Brendan Cully, Michael J. Feeley, Norman C. Hutchinson, Andrew Warfield. 199-204 [doi]
- User interactions in social networks and their implicationsChristo Wilson, Bryce Boe, Alessandra Sala, Krishna Puttaswamy, Ben Y. Zhao. 205-218 [doi]
- Isolating web programs in modern browser architecturesCharles Reis, Steven D. Gribble. 219-232 [doi]
- Privacy-preserving browser-side scripting with BFlowAlexander Yip, Neha Narula, Maxwell N. Krohn, Robert Morris. 233-246 [doi]
- xCalls: safe I/O in memory transactionsHaris Volos, Andres Jaan Tack, Neelam Goyal, Michael M. Swift, Adam Welc. 247-260 [doi]
- A runtime system for software lock elisionAmitabha Roy 0002, Steven Hand, Timothy L. Harris. 261-274 [doi]
- Dingo: taming device driversLeonid Ryzhyk, Peter Chubb, Ihor Kuz, Gernot Heiser. 275-288 [doi]
- Koala: a platform for OS-level power managementDavid C. Snowdon, Etienne Le Sueur, Stefan M. Petters, Gernot Heiser. 289-302 [doi]
- Predicting replicated database scalability from standalone database profilingSameh Elnikety, Steven G. Dropsho, Emmanuel Cecchet, Willy Zwaenepoel. 303-316 [doi]
- Statistical profiling-based techniques for effective power provisioning in data centersSriram Govindan, Jeonghwan Choi, Bhuvan Urgaonkar, Anand Sivasubramaniam, Andrea Baldini. 317-330 [doi]