


default search action
EuroSys 2006: Leuven, Belgium
- Yolande Berbers, Willy Zwaenepoel:

Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006. ACM 2006, ISBN 1-59593-322-0
Security and protection
- Håvard D. Johansen, André Allavena, Robbert van Renesse:

Fireflies: scalable support for intrusion-tolerant network overlays. 3-13 - Georgios Portokalidis

, Asia Slowinska, Herbert Bos
:
Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. 15-27 - Alex Ho, Michael A. Fetterman, Christopher Clark, Andrew Warfield, Steven Hand:

Practical taint-based protection using demand emulation. 29-41
Device drivers
- Michael F. Spear

, Tom Roeder, Orion Hodson, Galen C. Hunt, Steven Levi:
Solving the starting problem: device drivers as self-describing artifacts. 45-57 - Yoann Padioleau, Julia L. Lawall, Gilles Muller:

Understanding collateral evolution in Linux device drivers. 59-71 - Thomas Ball, Ella Bounimova, Byron Cook, Vladimir Levin, Jakob Lichtenberg, Con McGarvey, Bohus Ondrusek, Sriram K. Rajamani, Abdullah Ustuner:

Thorough static analysis of device drivers. 73-85
Replication
- Gokul Soundararajan, Cristiana Amza, Ashvin Goel:

Database replication policies for dynamic content applications. 89-102 - Jacob R. Lorch, Atul Adya, William J. Bolosky, Ronnie Chaiken, John R. Douceur, Jon Howell:

The SMART way to migrate replicated stateful services. 103-115 - Sameh Elnikety, Steven G. Dropsho, Fernando Pedone

:
Tashkent: uniting durability with transaction ordering for high-performance scalable database replication. 117-130
Experience papers
- Orran Krieger, Marc A. Auslander, Bryan S. Rosenburg, Robert W. Wisniewski, Jimi Xenidis, Dilma Da Silva, Michal Ostrowski, Jonathan Appavoo, Maria A. Butrico, Mark F. Mergen, Amos Waterland, Volkmar Uhlig:

K42: building a complete operating system. 133-145 - Alan Mislove, Ansley Post, Andreas Haeberlen

, Peter Druschel:
Experiences in building and operating ePOST, a reliable peer-to-peer application. 147-159 - Lenin Singaravelu, Calton Pu, Hermann Härtig, Christian Helmuth:

Reducing TCB complexity for security-sensitive applications: three case studies. 161-174
System design methodologies
- Manuel Fähndrich, Mark Aiken, Chris Hawblitzel, Orion Hodson, Galen C. Hunt, James R. Larus, Steven Levi:

Language support for fast and reliable message-based communication in singularity OS. 177-190 - Daniel Lohmann, Fabian Scheler, Reinhard Tartler, Olaf Spinczyk, Wolfgang Schröder-Preikschat

:
A quantitative analysis of aspects in the eCos kernel. 191-204 - Arvind S. Krishna, Aniruddha S. Gokhale

, Douglas C. Schmidt:
Context-specific middleware specialization techniques for optimizing software product-line architectures. 205-218
Storage
- Mary Baker, Mehul A. Shah, David S. H. Rosenthal, Mema Roussopoulos, Petros Maniatis, Thomas J. Giuli, Prashanth P. Bungale:

A fresh look at the reliability of long-term digital storage. 221-234 - Kimberly Keeton

, Dirk Beyer, Ernesto Brau, Arif Merchant
, Cipriano A. Santos, Alex Zhang:
On the road to recovery: restoring data after disasters. 235-248 - Xiaoyu Yao, Jun Wang

:
RIMAC: a novel redundancy-based hierarchical cache architecture for energy efficient, high performance storage systems. 249-262
Network and I/O processing
- Tim Brecht, G. John Janakiraman, Brian Lynn, Vikram A. Saletore, Yoshio Turner:

Evaluating network processing efficiency with processor partitioning and asynchronous I/O. 265-278 - Hyong-youb Kim, Scott Rixner:

TCP offload through connection handoff. 279-290
New ideas and other unusual papers
- Jeffrey C. Mogul:

Emergent (mis)behavior vs. complex software systems. 293-304 - Ori Shalev, Nir Shavit:

Predictive log-synchronization. 305-315 - Qin Lv, William Josephson, Zhe Wang, Moses Charikar

, Kai Li:
Ferret: a toolkit for content-based similarity search of feature-rich data. 317-330
User studies
- Hongliang Yu, Dongdong Zheng, Ben Y. Zhao, Weimin Zheng:

Understanding user behavior in large-scale video-on-demand systems. 333-344 - Iqbal Mohomed, Jim Chengming Cai, Eyal de Lara:

URICA: Usage-awaRe Interactive Content Adaptation for mobile devices. 345-358 - Sidath B. Handurukande, Anne-Marie Kermarrec, Fabrice Le Fessant, Laurent Massoulié, Simon Patarin:

Peer sharing behaviour in the eDonkey network, and implications for the design of server-less file sharing systems. 359-371
Management
- Chun Yuan, Ni Lao, Ji-Rong Wen, Jiwei Li, Zheng Zhang, Yi-Min Wang, Wei-Ying Ma

:
Automated known problem diagnosis with event traces. 375-388 - Atul Singh, Petros Maniatis, Timothy Roscoe, Peter Druschel:

Using queries for distributed monitoring and forensics. 389-402 - Andreas Merkel, Frank Bellosa:

Balancing power consumption in multiprocessor systems. 403-414

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














