default search action
USENIX Annual Technical Conference 2016: Denver, CO, USA
- Ajay Gulati, Hakim Weatherspoon:
Proceedings of the 2016 USENIX Annual Technical Conference, USENIX ATC 2016, Denver, CO, USA, June 22-24, 2016. USENIX Association 2016
Best of the Rest I
- Jun Yuan, Yang Zhan, William Jannen, Prashant Pandey, Amogh Akshintala, Kanchan Chandnani, Pooja Deo, Zardosht Kasheff, Leif Walsh, Michael A. Bender, Martin Farach-Colton, Rob Johnson, Bradley C. Kuszmaul, Donald E. Porter:
Optimizing Every Operation in a Write-optimized File System. - Jonathan Mace, Ryan Roelke, Rodrigo Fonseca:
Pivot Tracing: Dynamic Causal Monitoring for Distributed Systems. - Ioannis Manousakis, Sriram Sankar, Gregg McKnight, Thu D. Nguyen, Ricardo Bianchini:
Environmental Conditions and Disk Reliability in Free-cooled Datacenters.
Best of the Rest II
- Haogang Chen, Daniel Ziegler, Tej Chajed, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich:
Using Crash Hoare Logic for Certifying the FSCQ File System. - Charlie Curtsinger, Emery D. Berger:
COZ: Finding Code that Counts with Causal Profiling. - Mathy Vanhoef, Frank Piessens:
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS. - David A. Ramos, Dawson R. Engler:
Under-Constrained Symbolic Execution: Correctness Checking for Real Code.
Best of the Rest III
- Bryce Kellogg, Vamsi Talla, Shyamnath Gollakota, Joshua R. Smith:
Passive Wi-Fi: Bringing Low Power to Wi-Fi Transmissions. - Arpit Gupta, Robert MacDavid, Rüdiger Birkner, Marco Canini, Nick Feamster, Jennifer Rexford, Laurent Vanbever:
An Industrial-Scale Software Defined Internet Exchange Point. - Yue Qiao, Ouyang Zhang, Wenjie Zhou, Kannan Srinivasan, Anish Arora:
PhyCloak: Obfuscating Sensing from Communication Signals. - Jidong Xiao, Lei Lu, Hai Huang, Haining Wang:
Hyperprobe: Towards Virtual Machine Extrospection.
Datacenter Networking
- Abdul Alim, Richard G. Clegg, Luo Mai, Lukas Rupprecht, Eric Seckler, Paolo Costa, Peter R. Pietzuch, Alexander L. Wolf, Nik Sultana, Jon Crowcroft, Anil Madhavapeddy, Andrew W. Moore, Richard Mortier, Masoud Koleini, Luis Oviedo, Matteo Migliavacca, Derek McAuley:
FLICK: Developing and Running Application-Specific Network Services. 1-14 - Ethan J. Jackson, Melvin Walls, Aurojit Panda, Justin Pettit, Ben Pfaff, Jarno Rajahalme, Teemu Koponen, Scott Shenker:
SoftFlow: A Middlebox Architecture for Open vSwitch. 15-28 - Guo Chen, Yuanwei Lu, Yuan Meng, Bojie Li, Kun Tan, Dan Pei, Peng Cheng, Layong Luo, Yongqiang Xiong, Xiaoliang Wang, Youjian Zhao:
Fast and Cautious: Leveraging Multi-path Diversity for Transport Loss Recovery in Data Centers. 29-42 - Kenichi Yasukata, Michio Honda, Douglas Santry, Lars Eggert:
StackMap: Low-Latency Networking with the OS Stack and Dedicated NICs. 43-56
File and Key-Value Systems
- Ankita Kejriwal, Arjun Gopalan, Ashish Gupta, Zhihao Jia, Stephen Yang, John K. Ousterhout:
SLIK: Scalable Low-Latency Indexes for a Key-Value Store. 57-70 - Changwoo Min, Sanidhya Kashyap, Steffen Maass, Taesoo Kim:
Understanding Manycore Scalability of File Systems. 71-85 - Jiacheng Zhang, Jiwu Shu, Youyou Lu:
ParaFS: A Log-Structured File System to Exploit the Internal Parallelism of Flash Devices. 87-100 - Wen Xia, Yukun Zhou, Hong Jiang, Dan Feng, Yu Hua, Yuchong Hu, Qing Liu, Yucheng Zhang:
FastCDC: a Fast and Efficient Content-Defined Chunking Approach for Data Deduplication. 101-114
Mobile and Apps
- Abhilash Jindal, Y. Charlie Hu, Samuel P. Midkiff, Prahlad Joshi:
Unsafe Time Handling in Smartphones. 115-127 - Meng Zhu, Kai Shen:
Energy Discounted Computing on Multicore Smartphones. 129-141 - Chenguang Shen, Rayman Preet Singh, Amar Phanishayee, Aman Kansal, Ratul Mahajan:
Beam: Ending Monolithic Applications for Connected Devices. 143-157 - Jamshed Vesuna, Colin Scott, Michael Buettner, Michael Piatek, Arvind Krishnamurthy, Scott Shenker:
Caching Doesn't Improve Mobile Web Performance (Much). 159-165
Systems and Network Security
- Stijn Volckaert, Bart Coppens, Alexios Voulimeneas, Andrei Homescu, Per Larsen, Bjorn De Sutter, Michael Franz:
Secure and Efficient Application Monitoring and Replication. 167-179 - Muneeb Ali, Jude C. Nelson, Ryan Shea, Michael J. Freedman:
Blockstack: A Global Naming and Storage System Secured by Blockchains. 181-194 - Will Scott, Thomas E. Anderson, Tadayoshi Kohno, Arvind Krishnamurthy:
Satellite: Joint Analysis of CDNs and Network-Level Interference. 195-208 - Julian Lettner, Benjamin Kollenda, Andrei Homescu, Per Larsen, Felix Schuster, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Michael Franz:
Subversive-C: Abusing and Protecting Dynamic Message Dispatch. 209-221
Cloud, Coordination, and Consensus
- Ricardo Padilha, Enrique Fynn, Robert Soulé, Fernando Pedone:
Callinicos: Robust Transactional Storage for Distributed Data Structures. 223-235 - Parisa Jalili Marandi, Christos Gkantsidis, Flavio Junqueira, Dushyanth Narayanan:
Filo: Consolidated Consensus as a Cloud Service. 237-249 - Kfir Lev-Ari, Edward Bortnikov, Idit Keidar, Alexander Shraer:
Modular Composition of Coordination Services. 251-264 - Rong Shi, Yang Wang:
Cheap and Available State Machine Replication. 265-279
Architectural Interaction
- Alex D. Breslow, Dong Ping Zhang, Joseph L. Greathouse, Nuwan Jayasena, Dean M. Tullsen:
Horton Tables: Fast Hash Tables for In-Memory Data-Intensive Computing. 281-294 - Liran Funaro, Orna Agmon Ben-Yehuda, Assaf Schuster:
Ginseng: Market-Driven LLC Allocation. 295-308 - Xi Yang, Stephen M. Blackburn, Kathryn S. McKinley:
Elfen Scheduling: Fine-Grain Principled Borrowing from Latency-Critical Workloads Using Simultaneous Multithreading. 309-322 - Sharanyan Srikanthan, Sandhya Dwarkadas, Kai Shen:
Coherence Stalls or Latency Tolerance: Informed CPU Scheduling for Socket and Core Sharing. 323-336
Caching and Indexing
- Amy Tai, Michael Wei, Michael J. Freedman, Ittai Abraham, Dahlia Malkhi:
Replex: A Scalable, Highly Available Multi-Index Data Store. 337-350 - Xiameng Hu, Xiaolin Wang, Lan Zhou, Yingwei Luo, Chen Ding, Zhenlin Wang:
Kinetic Modeling of Data Eviction in Cache. 351-364 - Yingjun Wu, Kian-Lee Tan:
Scalable In-Memory Transaction Processing with HTM. 365-377 - Yue Cheng, Fred Douglis, Philip Shilane, Grant Wallace, Peter Desnoyers, Kai Li:
Erasing Belady's Limitations: In Search of Flash Cache Offline Optimality. 379-392
Energy vs. Performance
- Babak Falsafi, Rachid Guerraoui, Javier Picorel, Vasileios Trigonakis:
Unlocking Energy. 393-406 - Peng Liu, Jongwon Yoon, Lance Johnson, Suman Banerjee:
Greening the Video Transcoding Service with Low-Cost Hardware Transcoders. 407-419 - Anne Farrell, Henry Hoffmann:
MEANTIME: Achieving Both Minimal Energy and Timeliness with Approximate Computing. 421-435
Network Design and Usage Studies
- Anuj Kalia, Michael Kaminsky, David G. Andersen:
Design Guidelines for High Performance RDMA Systems. 437-450 - Christopher Mitchell, Kate Montgomery, Lamont Nelson, Siddhartha Sen, Jinyang Li:
Balancing CPU and Network in the Cell Distributed B-Tree Store. 451-464 - Jian Huang, Moinuddin K. Qureshi, Karsten Schwan:
An Evolutionary Study of Linux Memory Management for Fun and Profit. 465-478 - George Amvrosiadis, Medha Bhadkamkar:
Getting Back Up: Understanding How Enterprise Data Backups Fail. 479-492
Data Is Now Big Data
- Mohammadreza Najafi, Mohammad Sadoghi, Hans-Arno Jacobsen:
SplitJoin: A Scalable, Low-latency Stream Join Architecture with Adjustable Ordering Precision. 493-505 - Keval Vora, Guoqing Xu, Rajiv Gupta:
Load the Edges You Need: A Generic I/O Optimization for Disk-based Graph Processing. 507-522 - Xiaoen Ju, Dan Williams, Hani Jamjoom, Kang G. Shin:
Version Traveler: Fast and Memory-Efficient Version Switching in Graph Processing Systems. 523-536 - Anastasios Papagiannis, Giorgos Saloustros, Pilar González-Férez, Angelos Bilas:
Tucana: Design and Implementation of a Fast and Efficient Scale-up Key-value Store. 537-550
Virtualization
- Shiru Ren, Le Tan, Chunqi Li, Zhen Xiao, Weijia Song:
Samsara: Efficient Deterministic Replay in Multiprocessor Environments with Hardware Virtualization Extensions. 551-564 - Yeongpil Cho, Jun-Bum Shin, Donghyun Kwon, MyungJoo Ham, Yuna Kim, Yunheung Paek:
Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices. 565-578 - Mochi Xue, Kun Tian, Yaozu Dong, Jiacheng Ma, Jiajun Wang, Zhengwei Qi, Bingsheng He, Haibing Guan:
gScale: Scaling up GPU Virtualization with Dynamic Sharing of Graphics Memory Space. 579-590 - Wenwen Wang, Pen-Chung Yew, Antonia Zhai, Stephen McCamant:
A General Persistent Code Caching Framework for Dynamic Binary Translation (DBT). 591-603
Operating Systems
- Sanidhya Kashyap, Changwoo Min, Byoungyoung Lee, Taesoo Kim, Pavel Emelyanov:
Instant OS Updates via Userspace Checkpoint-and-Restart. 605-619 - Michael Coughlin, Ali Ismail, Eric Keller:
Apps with Hardware: Enabling Run-time Architectural Customization in Smart Phones. 621-634 - Jia-Ju Bai, Yu-Ping Wang, Jie Yin, Shi-Min Hu:
Testing Error Handling Code in Device Drivers Using Characteristic Fault Injection. 635-647 - Hugo Guiroux, Renaud Lachaize, Vivien Quéma:
Multicore Locks: The Case Is Not Closed Yet. 649-662
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.