


default search action
EuroSys 2008: Glasgow, Scotland, UK
- Joseph S. Sventek, Steven Hand:

Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008. ACM 2008, ISBN 978-1-60558-013-5
Scheduling
- Andreas Merkel, Frank Bellosa:

Task activity vectors: a new metric for temperature-aware scheduling. 1-12 - Anna Povzner, Tim Kaldewey, Scott A. Brandt, Richard A. Golding, Theodore M. Wong, Carlos Maltzahn:

Efficient guaranteed disk request scheduling with fahrrad. 13-25 - Yoshihisa Abe, Hiroshi Yamada, Kenji Kono:

Enforcing appropriate process execution for exploiting idle resources from outside operating systems. 27-40
Distributed storage
- Dutch T. Meyer, Gitika Aggarwal, Brendan Cully

, Geoffrey Lefebvre, Michael J. Feeley, Norman C. Hutchinson, Andrew Warfield:
Parallax: virtual disks for virtual machines. 41-54 - Ming Zhong, Kai Shen, Joel I. Seiferas:

Replication degree customization for high availability. 55-68 - Nikolai Joukov, Josef Sipek:

GreenFS: making enterprise computers greener by protecting them better. 69-80
File Systems
- Carsten Weinhold, Hermann Härtig:

VPFS: building a virtual private file system with a small trusted computing base. 81-93 - Shvetank Jain, Fareha Shafique, Vladan Djeric, Ashvin Goel:

Application-level isolation and recovery with solitude. 95-107
Experiences
- Bin Cheng, Lex Stein, Hai Jin, Zheng Zhang:

Towards cinematic internet video-on-demand. 109-122 - Paul Grace

, Danny Hughes, Barry Porter
, Gordon S. Blair
, Geoff Coulson, François Taïani
:
Experiences with open overlays: a middleware approach to network heterogeneity. 123-136
Distributed Systems
- Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ahamad:

Protectit: trusted distributed services operating on sensitive data. 137-147 - Shan He, Renan G. Cattelan

, Darko Kirovski:
Modeling viral economies for digital media. 149-162 - Alysson Neves Bessani

, Eduardo Adílio Pelinson Alchieri, Miguel Correia
, Joni da Silva Fraga:
DepSpace: a byzantine fault-tolerant coordination service. 163-176
Tools & Mesasurement
- Xi Wang, Zhenyu Guo, Xuezheng Liu, Zhilei Xu, Haoxiang Lin

, Xiaoge Wang, Zheng Zhang:
Hang analysis: fighting responsiveness bugs. 177-190 - Eric Koskinen, John Jannotti:

BorderPatrol: isolating events for black-box tracing. 191-203 - Simon Peter, Andrew Baumann, Timothy Roscoe, Paul Barham, Rebecca Isaacs:

30 seconds is not enough!: a study of operating system timer usage. 205-218
Software Techniques
- Karthik Pattabiraman, Vinod Grover, Benjamin G. Zorn:

Samurai: protecting critical data in unsafe languages. 219-232 - Angela Nicoara, Gustavo Alonso, Timothy Roscoe:

Controlled, systematic, and efficient code replacement for running java programs. 233-246 - Yoann Padioleau, Julia Lawall, René Rydhof Hansen

, Gilles Muller:
Documenting and automating collateral evolutions in linux device drivers. 247-260
Interest Security
- Troy Ronda, Stefan Saroiu, Alec Wolman:

Itrustpage: a user-assisted anti-phishing tool. 261-272 - Christof Fetzer, Martin Süßkraut:

Switchblade: enforcing dynamic personalized system call models. 273-286 - Georgios Portokalidis

, Herbert Bos
:
Eudaemon: involuntary and on-demand emulation against zero-day exploits. 287-299
OS Security
- Petros Efstathopoulos, Eddie Kohler:

Manageable fine-grained information flow. 301-313 - Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Hiroshi Isozaki:

Flicker: an execution infrastructure for tcb minimization. 315-328

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














