default search action
USENIX Annual Technical Conference 2007: Santa Clara, CA, USA
- Jeff Chase, Srinivasan Seshan:
Proceedings of the 2007 USENIX Annual Technical Conference, USENIX ATC 2007, Santa Clara, CA, USA, June 17-22, 2007. USENIX 2007
Keynote Address
- Mendel Rosenblum:
The Impact of Virtualization on Computing Systems.
Tricks with Virtual Machines
- Jan Stoess, Christian Lang, Frank Bellosa:
Energy Management for Hypervisor-Based Virtual Machines. 1-14 - Anh-Quynh Nguyen, Kuniyasu Suzaki:
Xenprobus, a Lightweight User-Space Probing Framework for Xen Virtual Machine. 15-28 - Pin Lu, Kai Shen:
Virtual Machine Memory Access Tracing with Hypervisor Exclusive Cache. 29-43
Network Monitoring and Management
- Peter Desnoyers, Prashant J. Shenoy:
Hyperion: High Volume Stream Archival for Retrospective Querying. 45-58 - Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanjuàs-Cuxart, Diego Amores-López, Josep Solé-Pareta:
Load Shedding in Network Monitoring Applications. 59-72 - William Enck, Patrick D. McDaniel, Subhabrata Sen, Panagiotis Sebos, Sylke Spoerel, Albert G. Greenberg, Sanjay G. Rao, William Aiello:
Configuration Management at Massive Scale: System Design and Experience. 73-86
Programming Abstractions for Network Services
- Maxwell N. Krohn, Eddie Kohler, M. Frans Kaashoek:
Events Can Make Sense. 87-100 - Daniel S. Myers, Jennifer N. Carlisle, James A. Cowling, Barbara Liskov:
MapJAX: Data Structure Abstractions for Asynchronous Web Applications. 101-114 - Daniel Peek, Edmund B. Nightingale, Brett D. Higgins, Puspesh Kumar, Jason Flinn:
Sprockets: Safe Extensions for Distributed File Systems. 115-128
Distributed Storage
- Ramakrishna Kotla, Lorenzo Alvisi, Michael Dahlin:
SafeStore: A Durable and Practical Storage System. 129-142 - Mark W. Storer, Kevin M. Greenan, Ethan L. Miller, Kaladhar Voruganti:
POTSHARDS: Secure Long-Term Storage Without Encryption. 142-156 - Michael Sirivianos, Jong Han Park, Xiaowei Yang, Stanislaw Jarecki:
Dandelion: Cooperative Content Distribution with Robust Incentives. 157-170
Data and Indexing
- Sam Shah, Craig A. N. Soules, Gregory R. Ganger, Brian D. Noble:
Using Provenance to Aid in Personal File Search. 171-184 - KyoungSoo Park, Sunghwan Ihm, Mic Bowman, Vivek S. Pai:
Supporting Practical Content-Addressable Caching with CZIP Compression. 185-198 - Bo Han, Peter J. Keleher:
Implementation and Performance Evaluation of Fuzzy File Block Matching. 199-204
System Security
- Boniface Hicks, Sandra Julieta Rueda, Trent Jaeger, Patrick D. McDaniel:
From Trusted to Secure: Building and Executing Applications That Enforce System Security. 205-218 - Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis:
From STEM to SEAD: Speculative Execution for Automated Defense. 219-232 - Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, Dawn Xiaodong Song:
Dynamic Spyware Analysis. 233-246
Close to the Hardware
- Alma Riska, James Larkby-Lahet, Erik Riedel:
Evaluating Block-level Optimization Through the IO Path. 247-260 - Xiaoning Ding, Song Jiang, Feng Chen, Kei Davis, Xiaodong Zhang:
DiskSeen: Exploiting Disk Layout and Access History to Enhance I/O Prefetch. 261-274 - Xin Li, Kai Shen, Michael C. Huang, Lingkun Chu:
A Memory Soft Error Measurement on Production Systems. 275-280
Networked Systems
- Sharad Agarwal, Venkata N. Padmanabhan, Dilip Antony Joseph:
Addressing Email Loss with SureMail: Measurement, Design, and Evaluation. 281-294 - Patrick Verkaik, Dan Pei, Tom Scholl, Aman Shaikh, Alex C. Snoeren, Jacobus E. van der Merwe:
Wresting Control from BGP: Scalable Fine-Grained Route Control. 295-308 - Vivek Vishnumurthy, Paul Francis:
A Comparison of Structured and Unstructured P2P Approaches to Heterogeneous Random Peer Selection. 309-322
Kernels
- Oren Laadan, Jason Nieh:
Transparent Checkpoint-Restart of Multiple Processes on Commodity Operating Systems. 323-336 - Andrew Baumann, Jonathan Appavoo, Robert W. Wisniewski, Dilma Da Silva, Orran Krieger, Gernot Heiser:
Reboots Are for Hardware: Challenges and Solutions to Updating an Operating System on the Fly. 337-350 - Francis M. David, Jeffrey C. Carlyle, Roy H. Campbell:
Exploring Recovery from Operating System Lockups. 351-356
Short Papers
- Jun Sun, Dong Zhou, Steve Longerbeam:
Supporting Multiple OSes with OS Switching. 357-362 - Cullen E. Bash, George Forman:
Cool Job Allocation: Measuring the Power Savings of Placing Jobs at Cooling-Efficient Locations in the Data Center. 363-368 - Umut Topkara, Mercan Topkara, Mikhail J. Atallah:
Passwords for Everyone: Secure Mnemonic-based Accessible Authentication. 369-374 - Grant Wallace, Kai Li:
Virtually Shared Displays and User Input Devices. 375-380
Invited Talks
- Werner Vogels:
Life Is Not a State-Machine: The Long Road from Research to Production. - Gary McGraw:
Exploiting Online Games. - Rob Lanphier, Mark Lentczner:
Second Life. - G. Winfield Treese:
Specializing General-Purpose Computing: A New Approach to Designing Clusters for High-Performance Technical Computing. - Paul Ducklin:
Live Malware Attack! - Brad Fitzpatrick:
LiveJournal's Backend Technologies. - Jeffrey Dean:
MapReduce and Other Building Blocks for Large-Scale Distributed Systems at Google. - Daniel V. Klein:
Perfect Data in an Imperfect World. - Luis von Ahn:
Human Computation. - Luiz André Barroso:
Warehouse-scale Computers.
The Guru is in
- Guido van Rossum:
Python Programming Language. USENIX ATC 2007 - Tom Christiansen:
Advanced Perl. USENIX ATC 2007 - Stephen C. Johnson:
Programming Languages. USENIX ATC 2007 - Marshall K. McKusick:
Building and Running an Open-Source Community: The FreeBSD Project. USENIX ATC 2007 - Cary Roberts:
Datacenters. USENIX ATC 2007 - Rudi van Drunen:
Wireless Networks. USENIX ATC 2007 - John Arrasjid, Shridhar Deuskar, Irfan Ahmad:
VMware Virtual Infrastructure Tools and Techniques. USENIX ATC 2007 - Rik Farrow:
Security Is Broken. USENIX ATC 2007 - Gerald Carter:
UNIX/Linux and Active Directory Interoperability. USENIX ATC 2007
Plenary Closing Session
- Mary Lou Jepsen:
Crossing the Digital Divide: The Latest Efforts from One Laptop per Child.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.