default search action
19th SOSP 2003: The Sagamore, Bolton Landing (Lake George), New York, USA
- Michael L. Scott, Larry L. Peterson:
Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, SOSP 2003, Bolton Landing, NY, USA, October 19-22, 2003. ACM 2003, ISBN 1-58113-757-5
Safely executing untrusted code
- Parveen Patel, Andrew Whitaker, David Wetherall, Jay Lepreau, Tim Stack:
Upgrading transport protocols using untrusted mobile code. 1-14 - R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sandeep Bhatkar, Daniel C. DuVarney:
Model-carrying code: a practical approach for safe execution of untrusted applications. 15-28
File and storage systems
- Sanjay Ghemawat, Howard Gobioff, Shun-Tak Leung:
The Google file system. 29-43 - Petros Maniatis, David S. H. Rosenthal, Mema Roussopoulos, Mary Baker, Thomas J. Giuli, Yanto Muliadi:
Preserving peer replicas by rate-limited sampled voting. 44-59 - Michael Kaminsky, George Savvides, David Mazières, M. Frans Kaashoek:
Decentralized user authentication in a global file system. 60-73
Probing the black box
- Marcos Kawazoe Aguilera, Jeffrey C. Mogul, Janet L. Wiener, Patrick Reynolds, Athicha Muthitacharoen:
Performance debugging for distributed systems of black boxes. 74-89 - Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Nathan C. Burnett, Timothy E. Denehy, Thomas J. Engle, Haryadi S. Gunawi, James A. Nugent, Florentina I. Popovici:
Transforming policies into mechanisms with infokernel. 90-105 - Ratul Mahajan, Neil T. Spring, David Wetherall, Thomas E. Anderson:
User-level internet path diagnosis. 106-119
Scheduling and resource allocation
- Landon P. Cox, Brian D. Noble:
Samsara: honor among thieves in peer-to-peer storage. 120-132 - Yun Fu, Jeffrey S. Chase, Brent N. Chun, Stephen Schwab, Amin Vahdat:
SHARP: an architecture for secure resource peering. 133-148 - Wanghong Yuan, Klara Nahrstedt:
Energy-efficient soft real-time CPU scheduling for mobile multimedia systems. 149-163
Virtual machine monitors
- Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, Andrew Warfield:
Xen and the art of virtualization. 164-177 - David Lie, Chandramohan A. Thekkath, Mark Horowitz:
Implementing an untrusted operating system on trusted hardware. 178-192 - Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh:
Terra: a virtual machine-based platform for trusted computing. 193-206
Making operating systems more robust
- Michael M. Swift, Brian N. Bershad, Henry M. Levy:
Improving the reliability of commodity operating systems. 207-222 - Samuel T. King, Peter M. Chen:
Backtracking intrusions. 223-236 - Dawson R. Engler, Ken Ashcraft:
RacerX: effective, static detection of race conditions and deadlocks. 237-252
Revising old friends
- Jian Yin, Jean-Philippe Martin, Arun Venkataramani, Lorenzo Alvisi, Michael Dahlin:
Separating agreement from execution for byzantine fault tolerant services. 253-267 - J. Robert von Behren, Jeremy Condit, Feng Zhou, George C. Necula, Eric A. Brewer:
Capriccio: scalable threads for internet services. 268-281
Overlay & peer-to-peer networks
- Dejan Kostic, Adolfo Rodriguez, Jeannie R. Albrecht, Amin Vahdat:
Bullet: high bandwidth data dissemination using an overlay mesh. 282-297 - Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, Animesh Nandi, Antony I. T. Rowstron, Atul Singh:
SplitStream: high-bandwidth multicast in cooperative environments. 298-313 - P. Krishna Gummadi, Richard J. Dunn, Stefan Saroiu, Steven D. Gribble, Henry M. Levy, John Zahorjan:
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. 314-329
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.