default search action
11th ACM SIGOPS European Workshop 2004: Leuven, Belgium
- Yolande Berbers, Miguel Castro:
Proceedings of the 11st ACM SIGOPS European Workshop, Leuven, Belgium, September 19-22, 2004. ACM 2004
Sensor networks
- Geoffrey Mainland, Laura Kang, Sébastien Lahaie, David C. Parkes, Matt Welsh:
Using virtual markets to program global behavior in sensor networks. 1 - Kay Römer, Christian Frank, Pedro José Marrón, Christian Becker:
Generic role assignment for wireless sensor networks. 2 - Philip Alexander Levis, David E. Culler:
The firecracker protocol. 3
Storage systems
- Kimberly Keeton, Dirk Beyer, Jeffrey S. Chase, Arif Merchant, Cipriano A. Santos, John Wilkes:
Lessons and challenges in automating data dependability. 4 - Barbara Liskov, Rodrigo Rodrigues:
Transactional file systems can be fast. 5 - Fred Douglis, John Palmer, Elizabeth S. Richards, David Tao, William H. Tetzlaff, John M. Tracey, Jian Yin:
Position: short object lifetimes require a delete-optimized storage system. 6
Resource management
- David Bartholomew Stewart, Richard Mortier:
Virtual private machines: user-centric performance. 7 - Josep M. Blanquer, Antoni Batchelli, Klaus E. Schauser, Richard Wolski:
QoS for internet services: done right. 8 - Alexandra Fedorova, Christopher Small, Daniel Nussbaum, Margo I. Seltzer:
Chip multithreading systems need a new operating system scheduler. 9
Security
- Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum:
Data lifetime is a systems problem. 10 - James Hendricks, Leendert van Doorn:
Secure bootstrap is not enough: shoring up the trusted computing base. 11 - Petros Maniatis, Thomas J. Giuli, Mema Roussopoulos, David S. H. Rosenthal, Mary Baker:
Impeding attrition attacks in P2P systems. 12
Miscellaneous
- John Wilkes, Jeffrey C. Mogul, Jaap Suermondt:
Utilification. 13 - Gregor Schiele, Christian Becker, Kurt Rothermel:
Energy-efficient cluster-based service discovery for Ubiquitous Computing. 14 - Gilles Muller, Julia L. Lawall, Jean-Marc Menaud, Mario Südholt:
Constructing component-based extension interfaces in legacy systems code. 15
Manageability
- Andrew Whitaker, Richard S. Cox, Steven D. Gribble:
Using time travel to diagnose computer problems. 16 - Rebecca Isaacs, Paul Barham, James R. Bulpin, Richard Mortier, Dushyanth Narayanan:
Request extraction in Magpie: events, schemas and temporal joins. 17 - Aaron B. Brown, Joseph L. Hellerstein:
An approach to benchmarking configuration complexity. 18
Overlay networks
- Emin Gün Sirer, Sharad Goel, Mark Robson, Dogan Engin:
Eluding carnivores: file sharing with strong anonymity. 19 - Sidath B. Handurukande, Anne-Marie Kermarrec, Fabrice Le Fessant, Laurent Massoulié:
Exploiting semantic clustering in the eDonkey P2P network. 20 - Atul Singh, Miguel Castro, Peter Druschel, Antony I. T. Rowstron:
Defending against eclipse attacks on overlay networks. 21
Microkernels and virtual machines
- Michael Hohmuth, Michael Peter, Hermann Härtig, Jonathan S. Shapiro:
Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors. 22 - Jacob Gorm Hansen, Eric Jul:
Self-migration of operating systems. 23 - Joshua LeVasseur, Volkmar Uhlig:
A sledgehammer approach to reuse of legacy device drivers. 24 - Frank Bellosa:
When physical is not real enough. 25 - Sara Bouchenak, Fabienne Boyer, Emmanuel Cecchet, Sébastien Jean, Alan Schmitt, Jean-Bernard Stefani:
A component-based approach to distributed system management: a use case with self-manageable J2EE clusters. 26 - Jonathan Ledlie, Jeffrey Shneidman, Matt Welsh, Mema Roussopoulos, Margo I. Seltzer:
Open problems in data collection networks. 27 - Geoffrey Lefebvre, Michael J. Feeley:
Separating durability and availability in self-managed storage. 28 - Dong Li, Jun Wang:
EERAID: energy efficient redundant and inexpensive disk array. 29 - Alan Mislove, Gaurav Oberoi, Ansley Post, Charles Reis, Peter Druschel, Dan S. Wallach:
AP3: cooperative, decentralized anonymous communication. 30 - James O'Brien, Marc Shapiro:
Undo for anyone, anywhere, anytime. 31 - Frédéric Ogel, Bertil Folliot, Gaël Thomas:
A step towards ubiquitous computing: an efficient flexible micro-ORB. 32 - Swaminathan Sivasubramanian, Guillaume Pierre, Maarten van Steen:
Scalable strong consistency for web applications. 33 - Olaf Spinczyk, Daniel Lohmann:
Using AOP to develop architectural-neutral operating system components. 34 - Godfrey Tan, John V. Guttag:
Long-term time-share guarantees are necessary for wireless LANs. 35 - Chad Yoshikawa, Brent N. Chun, Amin Vahdat, Fred S. Annexstein, Kenneth A. Berman:
The lonely NATed node. 36 - Aydan R. Yumerefendi, Jeffrey S. Chase:
Trust but verify: accountability for network services. 37
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.