


default search action
USENIX Annual Technical Conference 2003: San Antonio, Texas, USA
- Proceedings of the General Track: 2003 USENIX Annual Technical Conference, June 9-14, 2003, San Antonio, Texas, USA. USENIX 2003, ISBN 1-931971-10-2
Administration Magic
- Aaron B. Brown, David A. Patterson:
Undo for Operators: Building an Undoable E-mail Store. 1-14 - Godfrey Tan, Massimiliano Poletto, John V. Guttag, M. Frans Kaashoek:
Role Classification of Hosts Within Enterprise Networks Based on Connection Patterns. 15-28 - Mark Lillibridge, Sameh Elnikety, Andrew Birrell, Michael Burrows, Michael Isard:
A Cooperative Internet Backup Scheme. 29-41
Power
- Heng Zeng, Carla Schlatter Ellis, Alvin R. Lebeck, Amin Vahdat:
Currentcy: A Unifying Abstraction for Expressing Energy Management Policies. 43-56 - Hai Huang, Padmanabhan Pillai, Kang G. Shin:
Design and Implementation of Power-Aware Virtual Memory. 57-70
Get Virtual
- Samuel T. King, George W. Dunlap, Peter M. Chen:
Operating System Support for Virtual Machines. 71-84 - Grzegorz Czajkowski, Laurent Daynès, Ben L. Titzer:
A Multi-User Virtual Machine. 85-98
Needles and Haystacks
- Yoann Padioleau, Olivier Ridoux:
A Logic File System. 99-112 - Fred Douglis, Arun Iyengar:
Application-specific Delta-encoding via Resemblance Detection. 113-126 - Niraj Tolia, Michael Kozuch, Mahadev Satyanarayanan, Brad Karp, Thomas C. Bressoud, Adrian Perrig:
Opportunistic Use of Content Addressable Storage for Distributed File Systems. 127-140
Change Is Constant
- Craig A. N. Soules, Jonathan Appavoo, Kevin Hui, Robert W. Wisniewski, Dilma Da Silva, Gregory R. Ganger, Orran Krieger, Michael Stumm, Marc A. Auslander, Michal Ostrowski, Bryan S. Rosenburg, Jimi Xenidis:
System Support for Online Reconfiguration. 141-154 - Victor C. Zandy, Barton P. Miller:
Checkpoints of GUI-based Applications. 155-165 - Mema Roussopoulos, Mary Baker:
CUP: Controlled Update Propagation in Peer-to-Peer Networks. 167-180
Security Mechanisms
- Angelos D. Keromytis, Jason L. Wright, Theo de Raadt:
The Design of the {OpenBSD} Cryptographic Framework. 181-196 - Charles P. Wright, Michael C. Martino, Erez Zadok:
NCryptfs: A Secure and Convenient Cryptographic File System. 197-210 - Manish Prasad, Tzi-cker Chiueh:
A Binary Rewriting Defense Against Stack based Buffer Overflow Attacks. 211-224
Fast Servers
- Marcel-Catalin Rosu, Daniela Rosu:
Kernel Support for Faster Web Proxies. 225-238 - Nickolai Zeldovich, Alexander Yip, Frank Dabek, Robert T. Morris, David Mazières, M. Frans Kaashoek:
Multiprocessor Support for Event-Driven Programs. 239-252
Big Data
- Minwen Ji, Alistair C. Veitch, John Wilkes:
Seneca: remote mirroring done write. 253-268 - Zhifeng Chen, Yuanyuan Zhou, Kai Li:
Eviction-based Cache Placement for Storage Caches. 269-281 - Mike Hibler, Leigh Stoller, Jay Lepreau, Robert Ricci, Chad Barb:
Fast, Scalable Disk Imaging with Frisbee. 283-296
I/O Guessing Games
- Florentina I. Popovici, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau:
Robust, Portable I/O Scheduling with the Disk Mimic. 297-310 - James A. Nugent, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau:
Controlling Your PLACE in the File System with Gray-box Techniques. 311-323 - Keir Faser, Fay Chang:
Operating System I/O Speculation: How Two Invocations Are Faster Than One. 325-338

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.