default search action
10th ACM SIGOPS European Workshop 2002: Saint-Emilion, France
- Gilles Muller, Eric Jul:
Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002. ACM 2002
Instrumentation
- Andrew Whitaker, Marianne Shaw, Steven D. Gribble:
Denali: a scalable isolation kernel. 10-15 - Hermann Härtig:
Security architectures revisited. 16-23 - Brian D. Noble, Mark D. Corner:
The case for transient authentication. 24-29
Operating systems
- Timothy Roscoe, Richard Mortier, Paul W. Jardetzky, Steven Hand:
InfoSpect: using a logic language for system health monitoring in distributed systems. 31-37 - Timothy L. Harris:
Dependable software needs pervasive debugging. 38-43
Theory
- Leslie Lamport, John Matthews, Mark R. Tuttle, Yuan Yu:
Specifying and verifying systems with TLA+. 45-48 - Michael Norrish, Peter Sewell, Keith Wansbrough:
Rigour is good for you and feasible: reflections on formal treatments of C and UDP sockets. 49-53 - Julia L. Lawall, Gilles Muller, Luciano Porto Barreto:
Capturing OS expertise in an event type system: the Bossa experience. 54-61
Robust service
- Matt Welsh, David E. Culler:
Overload management as a fundamental service design primitive. 63-69 - Aaron B. Brown, David A. Patterson:
Rewind, repair, replay: three R's to dependability. 70-77
Security & authentication
- Yvonne Coady, Gregor Kiczales, Joon Suan Ong, Andrew Warfield, Michael J. Feeley:
Brittle systems will break - not bend: can aspect-oriented programming help? 79-86 - Rajesh Krishna Balan, Jason Flinn, Mahadev Satyanarayanan, Shafeeq Sinnamohideen, Hen-I Yang:
The case for cyber foraging. 87-92 - Kimberly Keeton, John Wilkes:
Automating data dependability. 93-100
Operating system's structures
- Michael M. Swift, Steven Martin, Henry M. Levy, Susan J. Eggers:
Nooks: an architecture for reliable device drivers. 102-107 - Sotiris Ioannidis, Steven M. Bellovin, Jonathan M. Smith:
Sub-operating systems: a new approach to application security. 108-115
Peer-to-peer
- Rodrigo Rodrigues, Barbara Liskov, Liuba Shrira:
The design of a robust peer-to-peer system. 117-124 - Jonathan Ledlie, Jacob M. Taylor, Laura Serban, Margo I. Seltzer:
Self-organization in peer-to-peer systems. 125-132 - Ayalvadi J. Ganesh, Anne-Marie Kermarrec, Laurent Massoulié:
HiScamp: self-organizing hierarchical membership protocol. 133-139 - Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, Antony I. T. Rowstron:
One ring to rule them all: service discovery and binding in structured peer-to-peer overlay networks. 140-145
Extended abstracts
- Ren Ohmura, Nobuyuki Yamasaki, Yuichiro Anzai:
A design of the persistent operating system with non-volatile memory. 149-152 - Fabián E. Bustamante, Christian Poellabauer, Karsten Schwan:
AIMS: robustness through sensible introspection. 153-156 - Gilbert Cabillic, Salam Majoul, Jean-Philippe Lesot, Michel Banâtre:
An approach for a dependable Java embedded environment. 157-160 - Mike Y. Chen, Emre Kiciman, Eric A. Brewer:
An online evolutionary approach to developing internet services. 161-164 - Michael Hohmuth, Hendrik Tews, Shane G. Stephens:
Applying source-code verification to a microkernel: the VFiasco project. 165-169 - Jeffrey S. Chase, Amin Vahdat, John Wilkes:
Back to the future: dependable computing = dependable services. 170-173 - Patrick Cormery, Le Vinh Quy Ribal, Arnaud Stransky:
Dependency on O.S. in long-term programs: experience report in space programs. 174-177 - Kenji Hisazumi, Tsuneo Nakanishi, Teruaki Kitasuka, Akira Fukuda:
Design and implementation of the Lambda mu-kernel based operating system for embedded systems. 178-181 - Hakim Weatherspoon, John Kubiatowicz:
Efficient heartbeats and repair of softstate in decentralized object location and routing systems. 182-185 - Frank Dabek, Nickolai Zeldovich, M. Frans Kaashoek, David Mazières, Robert Tappan Morris:
Event-driven programming for robust software. 186-189 - Meik Felser, Michael Golm, Christian Wawersich, Jürgen Kleinöder:
Execution time limitation of interrupt handlers in a Java operating system. 190-193 - Katsumi Maruyama, Kazuya Kodama, Soichiro Hidaka, Hiromichi Hashizume:
Extensible distributed operating system for reliable control systems. 194-197 - Shane G. Stephens, Gernot Heiser:
Fault tolerance and avoidance in biomedical systems. 198-200 - Trent Jaeger, Antony Edwards, Xiaolan Zhang:
Gaining and maintaining confidence in operating systems security. 201-204 - Radu Grosu, Erez Zadok, Scott A. Smolka, Rance Cleaveland, Yanhong A. Liu:
High-confidence operating systems. 205-208 - Ludovic Casset, Jean-Louis Lanet:
Increasing smart card dependability. 209-212 - George Candea, Armando Fox:
A utility-centered approach to building dependable infrastructure services. 213-218 - Madanlal Musuvathi, Andy Chou, David L. Dill, Dawson R. Engler:
Model checking system software with CMC. 219-222 - Stéphane Louise, Vincent David, Jean Delcoigne, Christophe Aussaguès:
OASIS project: deterministic real-time for safety critical embedded systems. 223-226 - Arun Venkataramani, Ravi Kokku, Michael Dahlin:
Operating system support for massive replication. 227-230 - Yasushi Saito, Christos T. Karamanolis:
Pangaea: a symbiotic wide-area file system. 231-234 - Dennis Geels, John Kubiatowicz:
Replica management should be a game. 235-238 - Xiaolan Zhang, Leendert van Doorn, Trent Jaeger, Ronald Perez, Reiner Sailer:
Secure coprocessor-based intrusion detection. 239-242 - Christophe Rippert, Jean-Bernard Stefani:
THINK: a secure distributed systems architecture. 243-246 - Sébastien Faucou, Anne-Marie Déplanche, Yvon Trinquet:
Timing fault detection for safety-critical real-time embedded systems. 247-250 - Vivek Haldar, Michael Franz:
Towards trusted systems from the ground up. 251-254 - David L. Oppenheimer, David A. Patterson:
Studying and using failure data from large-scale internet services. 255-258
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.