default search action
EuroSys 2009: Nuremberg, Germany
- Wolfgang Schröder-Preikschat, John Wilkes, Rebecca Isaacs:
Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009. ACM 2009, ISBN 978-1-60558-482-9
Cloud computing
- Horacio Andrés Lagar-Cavilla, Joseph Andrew Whitney, Adin Matthew Scannell, Philip Patchin, Stephen M. Rumble, Eyal de Lara, Michael Brudno, Mahadev Satyanarayanan:
SnowFlock: rapid virtual machine cloning for cloud computing. 1-12 - Pradeep Padala, Kai-Yuan Hou, Kang G. Shin, Xiaoyun Zhu, Mustafa Uysal, Zhikui Wang, Sharad Singhal, Arif Merchant:
Automated control of multiple virtualized resources. 13-26 - Alexander Rasmussen, Emre Kiciman, V. Benjamin Livshits, Madanlal Musuvathi:
Improving the responsiveness of internet services with automatic cache placement. 27-32
Defending against bad things
- Babak Salamat, Todd Jackson, Andreas Gal, Michael Franz:
Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space. 33-46 - Ryan D. Riley, Xuxian Jiang, Dongyan Xu:
Multi-aspect profiling of kernel rootkit behavior. 47-60 - Asia Slowinska, Herbert Bos:
Pointless tainting?: evaluating the practicality of pointer tainting. 61-74
OS mechanisms
- Zhe Zhang, Amit Kulkarni, Xiaosong Ma, Yuanyuan Zhou:
Memory resource allocation for file system prefetching: from a supply chain management perspective. 75-88 - Xiao Zhang, Sandhya Dwarkadas, Kai Shen:
Towards practical page coloring-based multicore cache management. 89-102 - Charles Krasic, Mayukh Saubhasik, Anirban Sinha, Ashvin Goel:
Fair and timely scheduling via cooperative polling. 103-116
Handling data
- Craig A. N. Soules, Kimberly Keeton, Charles B. Morrey III:
SCAN-Lite: enterprise-wide analysis on the cheap. 117-130 - Prince Mahajan, Ramakrishna Kotla, Catherine C. Marshall, Venugopalan Ramasubramanian, Thomas L. Rodeheffer, Douglas B. Terry, Ted Wobber:
Effective and efficient compromise recovery for weakly consistent replication. 131-144 - Dushyanth Narayanan, Eno Thereska, Austin Donnelly, Sameh Elnikety, Antony I. T. Rowstron:
Migrating server storage to SSDs: analysis of tradeoffs. 145-158
Real, running systems
- Qi Gao, Wenbin Zhang, Yan Tang, Feng Qin:
First-aid: surviving and preventing memory management bugs during production runs. 159-172 - Anton Burtsev, Prashanth Radhakrishnan, Mike Hibler, Jay Lepreau:
Transparent checkpoints of closed distributed systems in Emulab. 173-186 - Jeff Arnold, M. Frans Kaashoek:
Ksplice: automatic rebootless kernel updates. 187-198
Promises for the future
- Geoffrey Lefebvre, Brendan Cully, Michael J. Feeley, Norman C. Hutchinson, Andrew Warfield:
Tralfamadore: unifying source code and execution experience. 199-204
Clients and the web
- Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P. N. Puttaswamy, Ben Y. Zhao:
User interactions in social networks and their implications. 205-218 - Charles Reis, Steven D. Gribble:
Isolating web programs in modern browser architectures. 219-232 - Alexander Yip, Neha Narula, Maxwell N. Krohn, Robert Morris:
Privacy-preserving browser-side scripting with BFlow. 233-246
Helping programmers
- Haris Volos, Andres Jaan Tack, Neelam Goyal, Michael M. Swift, Adam Welc:
xCalls: safe I/O in memory transactions. 247-260 - Amitabha Roy, Steven Hand, Tim Harris:
A runtime system for software lock elision. 261-274 - Leonid Ryzhyk, Peter Chubb, Ihor Kuz, Gernot Heiser:
Dingo: taming device drivers. 275-288
Power and provisioning
- David C. Snowdon, Etienne Le Sueur, Stefan M. Petters, Gernot Heiser:
Koala: a platform for OS-level power management. 289-302 - Sameh Elnikety, Steven G. Dropsho, Emmanuel Cecchet, Willy Zwaenepoel:
Predicting replicated database scalability from standalone database profiling. 303-316 - Sriram Govindan, Jeonghwan Choi, Bhuvan Urgaonkar, Anand Sivasubramaniam, Andrea Baldini:
Statistical profiling-based techniques for effective power provisioning in data centers. 317-330
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.