


default search action
EuroSys 2009: Nuremberg, Germany
- Wolfgang Schröder-Preikschat, John Wilkes, Rebecca Isaacs:

Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009. ACM 2009, ISBN 978-1-60558-482-9
Cloud computing
- Horacio Andrés Lagar-Cavilla, Joseph Andrew Whitney, Adin Matthew Scannell, Philip Patchin, Stephen M. Rumble, Eyal de Lara, Michael Brudno, Mahadev Satyanarayanan

:
SnowFlock: rapid virtual machine cloning for cloud computing. 1-12 - Pradeep Padala, Kai-Yuan Hou, Kang G. Shin, Xiaoyun Zhu, Mustafa Uysal, Zhikui Wang, Sharad Singhal, Arif Merchant

:
Automated control of multiple virtualized resources. 13-26 - Alexander Rasmussen, Emre Kiciman, V. Benjamin Livshits, Madanlal Musuvathi:

Improving the responsiveness of internet services with automatic cache placement. 27-32
Defending against bad things
- Babak Salamat, Todd Jackson, Andreas Gal, Michael Franz:

Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space. 33-46 - Ryan D. Riley

, Xuxian Jiang, Dongyan Xu:
Multi-aspect profiling of kernel rootkit behavior. 47-60 - Asia Slowinska, Herbert Bos

:
Pointless tainting?: evaluating the practicality of pointer tainting. 61-74
OS mechanisms
- Zhe Zhang, Amit Kulkarni, Xiaosong Ma, Yuanyuan Zhou:

Memory resource allocation for file system prefetching: from a supply chain management perspective. 75-88 - Xiao Zhang, Sandhya Dwarkadas

, Kai Shen:
Towards practical page coloring-based multicore cache management. 89-102 - Charles Krasic, Mayukh Saubhasik, Anirban Sinha, Ashvin Goel:

Fair and timely scheduling via cooperative polling. 103-116
Handling data
- Craig A. N. Soules, Kimberly Keeton

, Charles B. Morrey III:
SCAN-Lite: enterprise-wide analysis on the cheap. 117-130 - Prince Mahajan, Ramakrishna Kotla, Catherine C. Marshall, Venugopalan Ramasubramanian, Thomas L. Rodeheffer, Douglas B. Terry, Ted Wobber:

Effective and efficient compromise recovery for weakly consistent replication. 131-144 - Dushyanth Narayanan, Eno Thereska, Austin Donnelly, Sameh Elnikety, Antony I. T. Rowstron:

Migrating server storage to SSDs: analysis of tradeoffs. 145-158
Real, running systems
- Qi Gao, Wenbin Zhang, Yan Tang, Feng Qin:

First-aid: surviving and preventing memory management bugs during production runs. 159-172 - Anton Burtsev

, Prashanth Radhakrishnan, Mike Hibler, Jay Lepreau:
Transparent checkpoints of closed distributed systems in Emulab. 173-186 - Jeff Arnold, M. Frans Kaashoek:

Ksplice: automatic rebootless kernel updates. 187-198
Promises for the future
- Geoffrey Lefebvre, Brendan Cully

, Michael J. Feeley, Norman C. Hutchinson, Andrew Warfield:
Tralfamadore: unifying source code and execution experience. 199-204
Clients and the web
- Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P. N. Puttaswamy, Ben Y. Zhao:

User interactions in social networks and their implications. 205-218 - Charles Reis, Steven D. Gribble

:
Isolating web programs in modern browser architectures. 219-232 - Alexander Yip, Neha Narula, Maxwell N. Krohn, Robert Morris:

Privacy-preserving browser-side scripting with BFlow. 233-246
Helping programmers
- Haris Volos, Andres Jaan Tack, Neelam Goyal, Michael M. Swift, Adam Welc:

xCalls: safe I/O in memory transactions. 247-260 - Amitabha Roy, Steven Hand, Tim Harris:

A runtime system for software lock elision. 261-274 - Leonid Ryzhyk, Peter Chubb, Ihor Kuz, Gernot Heiser:

Dingo: taming device drivers. 275-288
Power and provisioning
- David C. Snowdon, Etienne Le Sueur, Stefan M. Petters

, Gernot Heiser:
Koala: a platform for OS-level power management. 289-302 - Sameh Elnikety, Steven G. Dropsho, Emmanuel Cecchet, Willy Zwaenepoel:

Predicting replicated database scalability from standalone database profiling. 303-316 - Sriram Govindan, Jeonghwan Choi, Bhuvan Urgaonkar, Anand Sivasubramaniam, Andrea Baldini:

Statistical profiling-based techniques for effective power provisioning in data centers. 317-330

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














