default search action
EuroSys 2008: Glasgow, Scotland, UK
- Joseph S. Sventek, Steven Hand:
Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008. ACM 2008, ISBN 978-1-60558-013-5
Scheduling
- Andreas Merkel, Frank Bellosa:
Task activity vectors: a new metric for temperature-aware scheduling. 1-12 - Anna Povzner, Tim Kaldewey, Scott A. Brandt, Richard A. Golding, Theodore M. Wong, Carlos Maltzahn:
Efficient guaranteed disk request scheduling with fahrrad. 13-25 - Yoshihisa Abe, Hiroshi Yamada, Kenji Kono:
Enforcing appropriate process execution for exploiting idle resources from outside operating systems. 27-40
Distributed storage
- Dutch T. Meyer, Gitika Aggarwal, Brendan Cully, Geoffrey Lefebvre, Michael J. Feeley, Norman C. Hutchinson, Andrew Warfield:
Parallax: virtual disks for virtual machines. 41-54 - Ming Zhong, Kai Shen, Joel I. Seiferas:
Replication degree customization for high availability. 55-68 - Nikolai Joukov, Josef Sipek:
GreenFS: making enterprise computers greener by protecting them better. 69-80
File Systems
- Carsten Weinhold, Hermann Härtig:
VPFS: building a virtual private file system with a small trusted computing base. 81-93 - Shvetank Jain, Fareha Shafique, Vladan Djeric, Ashvin Goel:
Application-level isolation and recovery with solitude. 95-107
Experiences
- Bin Cheng, Lex Stein, Hai Jin, Zheng Zhang:
Towards cinematic internet video-on-demand. 109-122 - Paul Grace, Danny Hughes, Barry Porter, Gordon S. Blair, Geoff Coulson, François Taïani:
Experiences with open overlays: a middleware approach to network heterogeneity. 123-136
Distributed Systems
- Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ahamad:
Protectit: trusted distributed services operating on sensitive data. 137-147 - Shan He, Renan G. Cattelan, Darko Kirovski:
Modeling viral economies for digital media. 149-162 - Alysson Neves Bessani, Eduardo Adílio Pelinson Alchieri, Miguel Correia, Joni da Silva Fraga:
DepSpace: a byzantine fault-tolerant coordination service. 163-176
Tools & Mesasurement
- Xi Wang, Zhenyu Guo, Xuezheng Liu, Zhilei Xu, Haoxiang Lin, Xiaoge Wang, Zheng Zhang:
Hang analysis: fighting responsiveness bugs. 177-190 - Eric Koskinen, John Jannotti:
BorderPatrol: isolating events for black-box tracing. 191-203 - Simon Peter, Andrew Baumann, Timothy Roscoe, Paul Barham, Rebecca Isaacs:
30 seconds is not enough!: a study of operating system timer usage. 205-218
Software Techniques
- Karthik Pattabiraman, Vinod Grover, Benjamin G. Zorn:
Samurai: protecting critical data in unsafe languages. 219-232 - Angela Nicoara, Gustavo Alonso, Timothy Roscoe:
Controlled, systematic, and efficient code replacement for running java programs. 233-246 - Yoann Padioleau, Julia Lawall, René Rydhof Hansen, Gilles Muller:
Documenting and automating collateral evolutions in linux device drivers. 247-260
Interest Security
- Troy Ronda, Stefan Saroiu, Alec Wolman:
Itrustpage: a user-assisted anti-phishing tool. 261-272 - Christof Fetzer, Martin Süßkraut:
Switchblade: enforcing dynamic personalized system call models. 273-286 - Georgios Portokalidis, Herbert Bos:
Eudaemon: involuntary and on-demand emulation against zero-day exploits. 287-299
OS Security
- Petros Efstathopoulos, Eddie Kohler:
Manageable fine-grained information flow. 301-313 - Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Hiroshi Isozaki:
Flicker: an execution infrastructure for tcb minimization. 315-328
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.