EuroSys

All

Cited by Paper title Year
2483 Dryad: distributed data-parallel programs from sequential building blocks. 2007
1314 CloneCloud: elastic execution between mobile device and cloud. 2011
1148 Delay scheduling: a simple technique for achieving locality and fairness in cluster scheduling. 2010
880 User interactions in social networks and their implications. 2009
703 Understanding user behavior in large-scale video-on-demand systems. 2006
656 Adaptive control of virtualized resources in utility computing environments. 2007
638 Flicker: an execution infrastructure for tcb minimization. 2008
613 Container-based operating system virtualization: a scalable high-performance alternative to hypervisors. 2007
546 Where is the energy spent inside my app?: fine grained energy accounting on smartphones with Eprof. 2012
541 DepSky: dependable and secure storage in a cloud-of-clouds. 2011
515 Automated control of multiple virtualized resources. 2009
461 Q-clouds: managing performance interference effects for QoS-aware clouds. 2010
432 SnowFlock: rapid virtual machine cloning for cloud computing. 2009
421 Thorough static analysis of device drivers. 2006
348 BlinkDB: queries with bounded errors and bounded response times on very large data. 2013
337 Migrating server storage to SSDs: analysis of tradeoffs. 2009
331 Omega: flexible scalable schedulers for large compute clusters. 2013
325 Language support for fast and reliable message-based communication in singularity OS. 2006
321 Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. 2006
308 NOVA: a microhypervisor-based secure virtualization architecture. 2010
302 Fine-grained power modeling for smartphones using system call tracing. 2011
280 Thread clustering: sharing-aware scheduling on SMP-CMP-SMT multiprocessors. 2007
274 Large-scale cluster management at Google with Borg. 2015
252 STMBench7: a benchmark for software transactional memory. 2007
232 GreenHadoop: leveraging green energy in data-processing frameworks. 2012
226 Bias scheduling in heterogeneous multi-core architectures. 2010
225 Scarlett: coping with skewed content popularity in mapreduce clusters. 2011
211 Towards practical page coloring-based multicore cache management. 2009
208 System software for persistent memory. 2014
202 Koala: a platform for OS-level power management. 2009
199 Practical taint-based protection using demand emulation. 2006
195 Execution synthesis: a technique for automated software debugging. 2010
189 Exploiting nonstationarity for performance prediction. 2007
185 Emergent (mis)behavior vs. complex software systems. 2006
176 Mizan: a system for dynamic load balancing in large-scale graph processing. 2013
174 Balancing power consumption in multiprocessor systems. 2006
174 Automated known problem diagnosis with event traces. 2006
171 A fresh look at the reliability of long-term digital storage. 2006
171 Parallel symbolic execution for automated real-world software testing. 2011
169 Resource-conscious scheduling for energy efficiency on multicore processors. 2010
169 Documenting and automating collateral evolutions in linux device drivers. 2008
168 Reducing TCB complexity for security-sensitive applications: three case studies. 2006
163 “Defeating return-oriented rootkits with “”Return-Less”” kernels. “ 2010
162 Peer sharing behaviour in the eDonkey network and implications for the design of server-less file sharing systems. 2006
157 Ksplice: automatic rebootless kernel updates. 2009
156 Energy efficiency for large-scale MapReduce workloads with significant interactive analysis. 2012
156 Fingerprinting the datacenter: automated classification of performance crises. 2010
155 Parallax: virtual disks for virtual machines. 2008
153 Cache craftiness for fast multicore key-value storage. 2012
153 Jockey: guaranteed job latency in data parallel clusters. 2012
150 MDCC: multi-data center consistency. 2013
144 Isolating web programs in modern browser architectures. 2009
144 Cycles cells and platters: an empirical analysisof hardware failures on a million consumer PCs. 2011
142 FlashTier: a lightweight consistent and durable storage cache. 2012
139 K42: building a complete operating system. 2006
139 A comprehensive scheduler for asymmetric multicore systems. 2010
136 The next 700 BFT protocols. 2010
135 Differential RAID: rethinking RAID for SSD reliability. 2010
135 Statistical profiling-based techniques for effective power provisioning in data centers. 2009
130 Kineograph: taking the pulse of a fast-changing and connected world. 2012
128 CPI2: CPU performance isolation for shared compute clusters. 2013
127 Energy management in mobile devices with the cinder operating system. 2011
126 Pointless tainting?: evaluating the practicality of pointer tainting. 2009
126 TimeStream: reliable stream computation in the cloud. 2013
126 Sierra: practical power-proportionality for data center storage. 2011
124 Evaluation of AMD’s advanced synchronization facility within a complete transactional memory stack. 2010
124 A quantitative analysis of aspects in the eCos kernel. 2006
122 Boom analytics: exploring data-centric declarative programming for the cloud. 2010
120 The Xen-Blanket: virtualize once run everywhere. 2012
112 Feature consistency in compile-time-configurable system software: facing the linux 10000 feature problem. 2011
111 Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space. 2009
106 A virtual machine for sensor networks. 2007
105 Dingo: taming device drivers. 2009
103 Concierge: a service platform for resource-constrained devices. 2007
102 PowerLyra: differentiated graph computation and partitioning on skewed graphs. 2015
101 Multi-aspect profiling of kernel rootkit behavior. 2009
100 Dr. multicast: Rx for data center communication scalability. 2010
99 Efficient guaranteed disk request scheduling with fahrrad. 2008
98 DepSpace: a byzantine fault-tolerant coordination service. 2008
98 RIMAC: a novel redundancy-based hierarchical cache architecture for energy efficient high performance storage systems. 2006
97 Choosy: max-min fair sharing for datacenter jobs with constraints. 2013
93 Enabling scalability and performance in a large scale CMP environment. 2007
92 Fireflies: scalable support for intrusion-tolerant network overlays. 2006
92 Improving network connection locality on multicore systems. 2012
92 Dynamic and adaptive updates of non-quiescent subsystems in commodity operating system kernels. 2007
90 Comparing the performance of web server architectures. 2007
90 Tashkent: uniting durability with transaction ordering for high-performance scalable database replication. 2006
88 Tashkent+: memory-aware load balancing and update filtering in replicated databases. 2007
85 Reconciling high server utilization and sub-millisecond quality-of-service. 2014
84 Automatic configuration of internet services. 2007
83 Is co-scheduling too expensive for SMP VMs? 2011
83 Sealing OS processes to improve dependability and safety. 2007
82 The SMART way to migrate replicated stateful services. 2006
81 Locating cache performance bottlenecks using data profiling. 2010
79 Database engines on multicores why parallelize when you can distribute? 2011
77 Sweeper: a lightweight end-to-end system for defending against fast worms. 2007
77 Understanding collateral evolution in Linux device drivers. 2006
76 TrustLite: a security architecture for tiny embedded devices. 2014
75 CheapBFT: resource-efficient byzantine fault tolerance. 2012
75 Using transparent compression to improve SSD-based I/O caches. 2010
75 Controlled systematic and efficient code replacement for running java programs. 2008
73 ChainReaction: a causal+ consistent datastore based on chain replication. 2013
72 Using queries for distributed monitoring and forensics. 2006
72 Towards cinematic internet video-on-demand. 2008
71 ZZ and the art of practical BFT execution. 2011
71 Presto: distributed machine learning and graph processing with sparse matrices. 2013
69 Whodunit: transactional profiling for multi-tier applications. 2007
69 Jettison: efficient idle desktop consolidation with partial VM migration. 2012
67 Manageable fine-grained information flow. 2008
65 Reverse engineering of binary device drivers with RevNIC. 2010
65 Otherworld: giving applications a chance to survive OS kernel crashes. 2010
65 Competitive prefetching for concurrent sequential I/O. 2007
63 Experiences in building and operating ePOST a reliable peer-to-peer application. 2006
62 Resolving the conflict between generality and plausibility in verified computation. 2013
61 Aerie: flexible file-system interfaces to storage-class memory. 2014
60 Database replication policies for dynamic content applications. 2006
59 Sprint: a middleware for high-performance transaction processing. 2007
59 Delta-FTL: improving SSD lifetime via exploiting content locality. 2012
59 High-level programming of embedded hard real-time devices. 2010
59 Chronos: a graph engine for temporal graph analysis. 2014
58 Symbolic crosschecking of floating-point and SIMD code. 2011
58 TCP offload through connection handoff. 2006
57 HadoopToSQL: a mapReduce query optimizer. 2010
57 Application-level isolation and recovery with solitude. 2008
56 Macroprogramming heterogeneous sensor networks using cosmos. 2007
56 Application level ballooning for efficient server consolidation. 2013
55 VPFS: building a virtual private file system with a small trusted computing base. 2008
55 Kaleidoscope: cloud micro-elasticity via VM state coloring. 2011
53 Experiences with open overlays: a middleware approach to network heterogeneity. 2008
52 On the road to recovery: restoring data after disasters. 2006
52 GreenFS: making enterprise computers greener by protecting them better. 2008
52 Kivati: fast detection and prevention of atomicity violations. 2010
52 Privacy-preserving browser-side scripting with BFlow. 2009
52 Finding complex concurrency bugs in large multi-threaded applications. 2011
51 Task activity vectors: a new metric for temperature-aware scheduling. 2008
51 Itrustpage: a user-assisted anti-phishing tool. 2008
50 BorderPatrol: isolating events for black-box tracing. 2008
50 “Melange: creating a “”functional”” internet. “ 2007
50 RadixVM: scalable address spaces for multithreaded applications. 2013
49 Caching in video CDNs: building strong lines of defense. 2014
49 Canal: scaling social network-based Sybil tolerance schemes. 2012
48 Using restricted transactional memory to build a scalable in-memory database. 2014
48 Isolating commodity hosted hypervisors with HyperLock. 2012
48 Keypad: an auditing file system for theft-prone devices. 2011
48 Maygh: building a CDN from client web browsers. 2013
47 Antiquity: exploiting a secure log for wide-area distributed storage. 2007
47 Ferret: a toolkit for content-based similarity search of feature-rich data. 2006
47 hFS: a hybrid file system prototype for improving small file and metadata performance. 2007
47 A compiler-level intermediate representation based binary analysis and rewriting system. 2013
47 Solving the starting problem: device drivers as self-describing artifacts. 2006
47 A case for scaling applications to many-core with OS clustering. 2011
46 MadLINQ: large-scale distributed matrix computation for the cloud. 2012
46 Efficient middleware for byzantine fault tolerant database replication. 2011
46 MeT: workload aware elasticity for NoSQL. 2013
45 IFDB: decentralized information flow control for databases. 2013
44 LazyBase: trading freshness for performance in a scalable database. 2012
44 Algorithmic improvements for fast concurrent Cuckoo hashing. 2014
43 Practical TDMA for datacenter ethernet. 2012
43 Samurai: protecting critical data in unsafe languages. 2008
43 Discrete control for safe execution of IT automation workflows. 2007
42 WCMP: weighted cost multipathing for improved fairness in data centers. 2014
42 SpotCheck: designing a derivative IaaS cloud on the spot market. 2015
41 An efficient design and implementation of LSM-tree based key-value store on open-channel SSD. 2014
39 Prefetching mobile ads: can advertising systems afford it? 2013
39 Efficiently effectively detecting mobile app bugs with AppDoctor. 2014
39 Replication degree customization for high availability. 2008
39 Increasing performance in byzantine fault-tolerant systems with on-demand replica consistency. 2011
38 Hypnos: understanding and treating sleep conflicts in smartphones. 2013
38 xCalls: safe I/O in memory transactions. 2009
38 Putting consistency back into eventual consistency. 2015
37 Failure-atomic msync(): a simple and efficient mechanism for preserving the integrity of durable data. 2013
37 Transactional memory support for scalable and transparent parallelization of multiplayer games. 2010
37 A runtime system for software lock elision. 2009
36 Musketeer: all for one, one for all in data processing systems 2015
36 JIT instrumentation: a novel approach to dynamically instrument operating systems. 2007
35 Callisto: co-scheduling parallel runtime systems. 2014
35 Self-tuning schedulers for legacy real-time applications. 2010
34 Barricade: defending systems against operator mistakes. 2010
34 A critique of snapshot isolation. 2012
33 Latency and bandwidth-minimizing failure detectors. 2007
32 Evaluating network processing efficiency with processor partitioning and asynchronous I/O. 2006
32 GeePS: scalable deep learning on distributed GPUs with a GPU-specialized parameter server. 2016
32 Policy-based access control for weakly consistent replication. 2010
31 Composing OS extensions safely and efficiently with Bascule. 2013
31 Context-specific middleware specialization techniques for optimizing software product-line architectures. 2006
31 SRM-buffer: an OS buffer management technique to prevent last level cache from thrashing in multicores. 2011
31 TM2C: a software transactional memory for many-cores. 2012
30 Secure file system versioning at the block level. 2007
29 Striking a new balance between program instrumentation and debugging time. 2011
29 Memory resource allocation for file system prefetching: from a supply chain management perspective. 2009
28 Process-level power estimation in VM-based systems. 2015
28 URICA: Usage-awaRe Interactive Content Adaptation for mobile devices. 2006
28 Guaranteeing deadlines for inter-datacenter transfers. 2015
28 Cooperation and security isolation of library OSes for multi-process applications. 2014
27 First-aid: surviving and preventing memory management bugs during production runs. 2009
27 Adaptive parallelism for web search. 2013
27 The Linux scheduler: a decade of wasted cores. 2016
26 Popcorn: bridging the programmability gap in heterogeneous-ISA platforms. 2015
26 Predictive log-synchronization. 2006
26 Authorizing applications in singularity. 2007
26 Fine grained kernel logging with KLogger: experience and insights. 2007
26 StackTrack: an automated transactional approach to concurrent memory reclamation. 2014
26 STM in the small: trading generality for performance in software transactional memory. 2012
26 Predicting replicated database scalability from standalone database profiling. 2009
25 Data tiering in heterogeneous memory systems. 2016
25 Rex: replication at the speed of multi-core. 2014
25 Eudaemon: involuntary and on-demand emulation against zero-day exploits. 2008
25 NBA (network balancing act): a high-performance packet processing framework for heterogeneous processors. 2015
25 Conversion: multi-version concurrency control for main memory segments. 2013
25 Transparent checkpoints of closed distributed systems in Emulab. 2009
24 Tralfamadore: unifying source code and execution experience. 2009
24 BWS: balanced work stealing for time-sharing multicores. 2012
23 Fair and timely scheduling via cooperative polling. 2009
23 Hang analysis: fighting responsiveness bugs. 2008
23 Improving interrupt response time in a verifiable protected microkernel. 2012
22 Switchblade: enforcing dynamic personalized system call models. 2008
22 Fast black-box testing of system recovery code. 2012
21 Efficient queue management for cluster scheduling. 2016
21 Frugal storage for cloud file systems. 2012
20 Operating system support for application-specific speculation. 2011
20 A high performance file system for non-volatile main memory. 2016
19 Delusional boot: securing hypervisors without massive re-engineering. 2012
19 Removing the memory limitations of sensor networks with flash-based virtual memory. 2007
18 Scheduling large jobs by abstraction refinement. 2011
18 Effective and efficient compromise recovery for weakly consistent replication. 2009
18 CYRUS: towards client-defined cloud storage. 2015
18 An efficient page-level FTL to optimize address translation in flash memory. 2015
17 MALT: distributed data-parallelism for existing ML applications. 2015
17 An aggressive worn-out flash block management scheme to alleviate SSD performance degradation. 2014
17 Fast and general distributed transactions using RDMA and HTM. 2016
17 Flint: batch-interactive data-intensive processing on transient servers. 2016
17 30 seconds is not enough!: a study of operating system timer usage. 2008
16 hClock: hierarchical QoS for packet scheduling in a hypervisor. 2013
16 pVM: persistent virtual memory for efficient capacity scaling and object storage. 2016
16 Splitter: a proxy-based approach for post-migration testing of web applications. 2010
16 GD-Wheel: a cost-aware replacement policy for key-value stores. 2015
16 ?PnP: plug and play peripherals for the internet of things. 2015
16 From application requests to virtual IOPs: provisioned key-value storage with Libra. 2014
16 DynMR: dynamic MapReduce with ReduceTask interleaving and MapTask backfilling. 2014
15 Enforcing appropriate process execution for exploiting idle resources from outside operating systems. 2008
15 TetriSched: global rescheduling with adaptive plan-ahead in dynamic heterogeneous clusters. 2016
14 Synapse: a microservices architecture for heterogeneous-database web applications. 2015
14 In-Net: in-network processing for the masses. 2015
14 Flux: multi-surface computing in Android. 2015
14 Simba: tunable end-to-end data consistency for mobile apps. 2015
14 An in-memory object caching framework with adaptive load balancing. 2015
14 RapiLog: reducing system complexity through verification. 2013
13 Snapshots in a flash with ioSnap. 2014
13 Archiving cold data in warehouses with clustered network coding. 2014
13 DIBS: just-in-time congestion mitigation for data centers. 2014
13 Scalable testing of file system checkers. 2012
13 Optimus: a dynamic rewriting framework for data-parallel execution plans. 2013
13 Scaling concurrent log-structured data stores. 2015
12 HAFT: hardware-assisted fault tolerance. 2016
12 Process firewalls: protecting processes during resource access. 2013
11 Augustus: scalable and robust storage for cloud applications. 2013
11 Application-assisted live migration of virtual machines with Java applications. 2015
11 Partial-parallel-repair (PPR): a distributed technique for repairing erasure coded storage. 2016
10 STRADS: a distributed framework for scheduled model parallel machine learning. 2016
10 Type-aware transactions for faster concurrent code. 2016
10 Refuse to crash with Re-FUSE. 2011
10 Protectit: trusted distributed services operating on sensitive data. 2008
10 Improving server applications with system transactions. 2012
10 ConfValley: a systematic configuration validation framework for cloud services. 2015
9 TinMan: eliminating confidential mobile data exposure with security oriented offloading. 2015
9 Maxoid: transparently confining mobile applications with custom views of state. 2015
9 Optimizing distributed actor systems for dynamic interactive services. 2016
9 Improving the responsiveness of internet services with automatic cache placement. 2009
9 Taming uncertainty in distributed systems with help from the network. 2015
9 Hare: a file system for non-cache-coherent multicores. 2015
9 Flash storage disaggregation. 2016
8 Kronos: the design and implementation of an event ordering service. 2014
8 Extensible distributed coordination. 2015
8 SCAN-Lite: enterprise-wide analysis on the cheap. 2009
8 Picocenter: supporting long-lived mostly-idle applications in cloud environments. 2016
8 Whose cache line is it anyway?: operating system support for live detection and repair of false sharing. 2013
8 Verifiable differential privacy. 2015
8 Relational access to Unix kernel data structures. 2014
7 Modeling viral economies for digital media. 2008
7 A study of modern Linux API usage and compatibility: what to support when you’re supporting. 2016
7 On the capacity of thermal covert channels in multicores. 2016
7 Residue objects: a challenge to web browser security. 2010
7 PSLO: enforcing theXthpercentile latency and throughput SLOs for consolidated VM storage. 2016
7 Juggler: a practical reordering resilient network stack for datacenters. 2016
6 T-Rex: a dynamic race detection tool for C/C++ transactional memory applications. 2014
5 Guardat: enforcing data policies at the storage layer. 2015
5 SGXBOUNDS: Memory Safety for Shielded Execution. 2017
5 Hardware read-write lock elision. 2016
5 TAQ: enhancing fairness and performance predictability in small packet regimes. 2014
5 POSIX abstractions in modern operating systems: the old, the new, and the missing 2016
5 Practical techniques to obviate setuid-to-root binaries. 2014
4 Hold ‘em or fold ‘em?: aggregation queries under performance variations. 2016
4 Deriving and comparing deduplication techniques using a model-based classification. 2015
4 Visigoth fault tolerance. 2015
4 High-performance determinism with total store order consistency. 2015
4 Mosaic: Processing a Trillion-Edge Graph on a Single Machine. 2017
3 Hybrids on Steroids: SGX-Based High Performance BFT. 2017
3 Pado: A Data Processing Engine for Harnessing Transient Resources in Datacenters. 2017
3 Yoda: a highly available layer-7 load balancer. 2016
3 zExpander: a key-value cache with both high performance and fewer misses. 2016
3 Oasis: energy proportionality with hybrid server consolidation. 2016
3 Proteus: agile ML elasticity through tiered reliability in dynamic resource markets. 2017
3 Increasing large-scale data center capacity by statistical power control. 2016
3 Sinter: low-bandwidth remote access for the visually-impaired. 2016
3 TESLA: temporally enhanced system logic assertions. 2014
3 Crayon: saving power through shape and color approximation on next-generation displays. 2016
2 vScale: automatic and efficient processor scaling for SMP virtual machines. 2016
2 Node.fz: Fuzzing the Server-Side Event-Driven Architecture. 2017
2 DangSan: Scalable Use-after-free Detection. 2017
2 Eleos: ExitLess OS Services for SGX Enclaves. 2017
2 Practical condition synchronization for transactional memory. 2016
2 Saturn: a Distributed Metadata Service for Causal Consistency. 2017
2 Application-specific quantum for multi-core platform scheduler. 2016
2 Malthusian Locks. 2017
1 TFC: token flow control in data center networks. 2016
1 Parallel sections: scaling system-level data-structures. 2016
1 Taming Parallelism in a Multi-Variant Execution Environment. 2017
1 kR^X: Comprehensive Kernel Protection against Just-In-Time Code Reuse. 2017
1 Statistical Analysis of Latency Through Semantic Profiling. 2017
1 MiniCrypt: Reconciling Encryption and Compression for Big Data Stores. 2017
1 An Empirical Study on the Correctness of Formally Verified Distributed Systems. 2017
1 Exploiting Spot and Burstable Instances for Improving the Cost-efficacy of In-Memory Caches on the Public Cloud. 2017
1 The lock holder and the lock waiter pre-emption problems: nip them in the bud using informed spinlocks (I-Spinlock). 2017
1 No Need to Hide: Protecting Safe Regions on Commodity Hardware. 2017
1 FloDB: Unlocking Memory in Persistent Key-Value Stores. 2017
1 Shared address translation revisited. 2016
1 Atomic In-place Updates for Non-volatile Main Memories with Kamino-Tx. 2017
1 Online Reconstruction of Structural Information from Datacenter Logs. 2017
0 COCONUT: Seamless Scale-out of Network Elements. 2017
0 One Primitive to Diagnose Them All: Architectural Support for Internet Diagnostics. 2017
0 DStress: Efficient Differentially Private Computations on Distributed Data. 2017
0 ROS: A Rack-based Optical Storage System with Inline Accessibility for Long-Term Data Preservation. 2017
0 Rein: Taming Tail Latency in Key-Value Stores via Multiget Scheduling. 2017
0 GfxDoctor: A Holistic Graphics Energy Profiler for Mobile Devices. 2017
0 A Characterization of State Spill in Modern Operating Systems. 2017
0 BB: booting booster for consumer electronics with modern OS. 2016
0 Exploiting variability for energy optimization of parallel programs. 2016
0 RFP: When RPC is Faster than Server-Bypass with RDMA. 2017
0 Design and Evaluation of an RDMA-aware Data Shuffling Operator for Parallel Database Systems. 2017
0 The Unwritten Contract of Solid State Drives. 2017
0 Abstracting Multi-Core Topologies with MCTOP. 2017
0 NVthreads: Practical Persistence for Multi-threaded Applications. 2017
0 SyncPerf: Categorizing, Detecting, and Diagnosing Synchronization Performance Bugs. 2017
0 High-Throughput Subset Matching on Commodity GPU-Based Systems. 2017
0 Direct Inter-Process Communication (dIPC): Repurposing the CODOMs Architecture to Accelerate IPC. 2017
0 Malacology: A Programmable Storage System. 2017
0 Pandia: comprehensive contention-sensitive thread placement. 2017
0 An interface to implement NUMA policies in the Xen hypervisor. 2017
0 Forkscan: Conservative Memory Reclamation for Modern Operating Systems. 2017
0 NChecker: saving mobile app developers from network disruptions. 2016
0 CloudTalk: Enabling Distributed Application Optimisations in Public Clouds. 2017

2017

Cited by Paper title
5 SGXBOUNDS: Memory Safety for Shielded Execution.
4 Mosaic: Processing a Trillion-Edge Graph on a Single Machine.
3 Hybrids on Steroids: SGX-Based High Performance BFT.
3 Pado: A Data Processing Engine for Harnessing Transient Resources in Datacenters.
3 Proteus: agile ML elasticity through tiered reliability in dynamic resource markets.
2 Node.fz: Fuzzing the Server-Side Event-Driven Architecture.
2 DangSan: Scalable Use-after-free Detection.
2 Eleos: ExitLess OS Services for SGX Enclaves.
2 Saturn: a Distributed Metadata Service for Causal Consistency.
2 Malthusian Locks.
1 Taming Parallelism in a Multi-Variant Execution Environment.
1 kR^X: Comprehensive Kernel Protection against Just-In-Time Code Reuse.
1 Statistical Analysis of Latency Through Semantic Profiling.
1 MiniCrypt: Reconciling Encryption and Compression for Big Data Stores.
1 An Empirical Study on the Correctness of Formally Verified Distributed Systems.
1 Exploiting Spot and Burstable Instances for Improving the Cost-efficacy of In-Memory Caches on the Public Cloud.
1 The lock holder and the lock waiter pre-emption problems: nip them in the bud using informed spinlocks (I-Spinlock).
1 No Need to Hide: Protecting Safe Regions on Commodity Hardware.
1 FloDB: Unlocking Memory in Persistent Key-Value Stores.
1 Atomic In-place Updates for Non-volatile Main Memories with Kamino-Tx.
1 Online Reconstruction of Structural Information from Datacenter Logs.
0 COCONUT: Seamless Scale-out of Network Elements.
0 One Primitive to Diagnose Them All: Architectural Support for Internet Diagnostics.
0 DStress: Efficient Differentially Private Computations on Distributed Data.
0 ROS: A Rack-based Optical Storage System with Inline Accessibility for Long-Term Data Preservation.
0 Rein: Taming Tail Latency in Key-Value Stores via Multiget Scheduling.
0 GfxDoctor: A Holistic Graphics Energy Profiler for Mobile Devices.
0 A Characterization of State Spill in Modern Operating Systems.
0 RFP: When RPC is Faster than Server-Bypass with RDMA.
0 Design and Evaluation of an RDMA-aware Data Shuffling Operator for Parallel Database Systems.
0 The Unwritten Contract of Solid State Drives.
0 Abstracting Multi-Core Topologies with MCTOP.
0 NVthreads: Practical Persistence for Multi-threaded Applications.
0 SyncPerf: Categorizing, Detecting, and Diagnosing Synchronization Performance Bugs.
0 High-Throughput Subset Matching on Commodity GPU-Based Systems.
0 Direct Inter-Process Communication (dIPC): Repurposing the CODOMs Architecture to Accelerate IPC.
0 Malacology: A Programmable Storage System.
0 Pandia: comprehensive contention-sensitive thread placement.
0 An interface to implement NUMA policies in the Xen hypervisor.
0 Forkscan: Conservative Memory Reclamation for Modern Operating Systems.
0 CloudTalk: Enabling Distributed Application Optimisations in Public Clouds.

2016

Cited by Paper title
32 GeePS: scalable deep learning on distributed GPUs with a GPU-specialized parameter server.
27 The Linux scheduler: a decade of wasted cores.
25 Data tiering in heterogeneous memory systems.
21 Efficient queue management for cluster scheduling.
20 A high performance file system for non-volatile main memory.
17 Fast and general distributed transactions using RDMA and HTM.
17 Flint: batch-interactive data-intensive processing on transient servers.
16 pVM: persistent virtual memory for efficient capacity scaling and object storage.
15 TetriSched: global rescheduling with adaptive plan-ahead in dynamic heterogeneous clusters.
12 HAFT: hardware-assisted fault tolerance.
11 Partial-parallel-repair (PPR): a distributed technique for repairing erasure coded storage.
10 STRADS: a distributed framework for scheduled model parallel machine learning.
10 Type-aware transactions for faster concurrent code.
9 Optimizing distributed actor systems for dynamic interactive services.
9 Flash storage disaggregation.
8 Picocenter: supporting long-lived mostly-idle applications in cloud environments.
7 A study of modern Linux API usage and compatibility: what to support when you’re supporting.
7 On the capacity of thermal covert channels in multicores.
7 PSLO: enforcing theXthpercentile latency and throughput SLOs for consolidated VM storage.
7 Juggler: a practical reordering resilient network stack for datacenters.
5 Hardware read-write lock elision.
5 POSIX abstractions in modern operating systems: the old, the new, and the missing
4 Hold ‘em or fold ‘em?: aggregation queries under performance variations.
3 Yoda: a highly available layer-7 load balancer.
3 zExpander: a key-value cache with both high performance and fewer misses.
3 Oasis: energy proportionality with hybrid server consolidation.
3 Increasing large-scale data center capacity by statistical power control.
3 Sinter: low-bandwidth remote access for the visually-impaired.
3 Crayon: saving power through shape and color approximation on next-generation displays.
2 vScale: automatic and efficient processor scaling for SMP virtual machines.
2 Practical condition synchronization for transactional memory.
2 Application-specific quantum for multi-core platform scheduler.
1 TFC: token flow control in data center networks.
1 Parallel sections: scaling system-level data-structures.
1 Shared address translation revisited.
0 BB: booting booster for consumer electronics with modern OS.
0 Exploiting variability for energy optimization of parallel programs.
0 NChecker: saving mobile app developers from network disruptions.

2015

Cited by Paper title
274 Large-scale cluster management at Google with Borg.
102 PowerLyra: differentiated graph computation and partitioning on skewed graphs.
42 SpotCheck: designing a derivative IaaS cloud on the spot market.
38 Putting consistency back into eventual consistency.
36 Musketeer: all for one, one for all in data processing systems
28 Process-level power estimation in VM-based systems.
28 Guaranteeing deadlines for inter-datacenter transfers.
26 Popcorn: bridging the programmability gap in heterogeneous-ISA platforms.
25 NBA (network balancing act): a high-performance packet processing framework for heterogeneous processors.
18 CYRUS: towards client-defined cloud storage.
18 An efficient page-level FTL to optimize address translation in flash memory.
17 MALT: distributed data-parallelism for existing ML applications.
16 GD-Wheel: a cost-aware replacement policy for key-value stores.
16 ?PnP: plug and play peripherals for the internet of things.
14 Synapse: a microservices architecture for heterogeneous-database web applications.
14 In-Net: in-network processing for the masses.
14 Flux: multi-surface computing in Android.
14 Simba: tunable end-to-end data consistency for mobile apps.
14 An in-memory object caching framework with adaptive load balancing.
13 Scaling concurrent log-structured data stores.
11 Application-assisted live migration of virtual machines with Java applications.
10 ConfValley: a systematic configuration validation framework for cloud services.
9 TinMan: eliminating confidential mobile data exposure with security oriented offloading.
9 Maxoid: transparently confining mobile applications with custom views of state.
9 Taming uncertainty in distributed systems with help from the network.
9 Hare: a file system for non-cache-coherent multicores.
8 Extensible distributed coordination.
8 Verifiable differential privacy.
5 Guardat: enforcing data policies at the storage layer.
4 Deriving and comparing deduplication techniques using a model-based classification.
4 Visigoth fault tolerance.
4 High-performance determinism with total store order consistency.

2014

Cited by Paper title
208 System software for persistent memory.
85 Reconciling high server utilization and sub-millisecond quality-of-service.
76 TrustLite: a security architecture for tiny embedded devices.
61 Aerie: flexible file-system interfaces to storage-class memory.
59 Chronos: a graph engine for temporal graph analysis.
49 Caching in video CDNs: building strong lines of defense.
48 Using restricted transactional memory to build a scalable in-memory database.
44 Algorithmic improvements for fast concurrent Cuckoo hashing.
42 WCMP: weighted cost multipathing for improved fairness in data centers.
41 An efficient design and implementation of LSM-tree based key-value store on open-channel SSD.
39 Efficiently effectively detecting mobile app bugs with AppDoctor.
35 Callisto: co-scheduling parallel runtime systems.
28 Cooperation and security isolation of library OSes for multi-process applications.
26 StackTrack: an automated transactional approach to concurrent memory reclamation.
25 Rex: replication at the speed of multi-core.
17 An aggressive worn-out flash block management scheme to alleviate SSD performance degradation.
16 From application requests to virtual IOPs: provisioned key-value storage with Libra.
16 DynMR: dynamic MapReduce with ReduceTask interleaving and MapTask backfilling.
13 Snapshots in a flash with ioSnap.
13 Archiving cold data in warehouses with clustered network coding.
13 DIBS: just-in-time congestion mitigation for data centers.
8 Kronos: the design and implementation of an event ordering service.
8 Relational access to Unix kernel data structures.
6 T-Rex: a dynamic race detection tool for C/C++ transactional memory applications.
5 TAQ: enhancing fairness and performance predictability in small packet regimes.
5 Practical techniques to obviate setuid-to-root binaries.
3 TESLA: temporally enhanced system logic assertions.

2013

Cited by Paper title
348 BlinkDB: queries with bounded errors and bounded response times on very large data.
331 Omega: flexible scalable schedulers for large compute clusters.
176 Mizan: a system for dynamic load balancing in large-scale graph processing.
150 MDCC: multi-data center consistency.
128 CPI2: CPU performance isolation for shared compute clusters.
126 TimeStream: reliable stream computation in the cloud.
97 Choosy: max-min fair sharing for datacenter jobs with constraints.
73 ChainReaction: a causal+ consistent datastore based on chain replication.
71 Presto: distributed machine learning and graph processing with sparse matrices.
62 Resolving the conflict between generality and plausibility in verified computation.
56 Application level ballooning for efficient server consolidation.
50 RadixVM: scalable address spaces for multithreaded applications.
48 Maygh: building a CDN from client web browsers.
47 A compiler-level intermediate representation based binary analysis and rewriting system.
46 MeT: workload aware elasticity for NoSQL.
45 IFDB: decentralized information flow control for databases.
39 Prefetching mobile ads: can advertising systems afford it?
38 Hypnos: understanding and treating sleep conflicts in smartphones.
37 Failure-atomic msync(): a simple and efficient mechanism for preserving the integrity of durable data.
31 Composing OS extensions safely and efficiently with Bascule.
27 Adaptive parallelism for web search.
25 Conversion: multi-version concurrency control for main memory segments.
16 hClock: hierarchical QoS for packet scheduling in a hypervisor.
14 RapiLog: reducing system complexity through verification.
13 Optimus: a dynamic rewriting framework for data-parallel execution plans.
12 Process firewalls: protecting processes during resource access.
11 Augustus: scalable and robust storage for cloud applications.
8 Whose cache line is it anyway?: operating system support for live detection and repair of false sharing.

2012

Cited by Paper title
546 Where is the energy spent inside my app?: fine grained energy accounting on smartphones with Eprof.
232 GreenHadoop: leveraging green energy in data-processing frameworks.
156 Energy efficiency for large-scale MapReduce workloads with significant interactive analysis.
153 Cache craftiness for fast multicore key-value storage.
153 Jockey: guaranteed job latency in data parallel clusters.
142 FlashTier: a lightweight consistent and durable storage cache.
130 Kineograph: taking the pulse of a fast-changing and connected world.
120 The Xen-Blanket: virtualize once run everywhere.
92 Improving network connection locality on multicore systems.
75 CheapBFT: resource-efficient byzantine fault tolerance.
69 Jettison: efficient idle desktop consolidation with partial VM migration.
59 Delta-FTL: improving SSD lifetime via exploiting content locality.
49 Canal: scaling social network-based Sybil tolerance schemes.
48 Isolating commodity hosted hypervisors with HyperLock.
46 MadLINQ: large-scale distributed matrix computation for the cloud.
44 LazyBase: trading freshness for performance in a scalable database.
43 Practical TDMA for datacenter ethernet.
34 A critique of snapshot isolation.
31 TM2C: a software transactional memory for many-cores.
26 STM in the small: trading generality for performance in software transactional memory.
24 BWS: balanced work stealing for time-sharing multicores.
23 Improving interrupt response time in a verifiable protected microkernel.
22 Fast black-box testing of system recovery code.
21 Frugal storage for cloud file systems.
19 Delusional boot: securing hypervisors without massive re-engineering.
13 Scalable testing of file system checkers.
10 Improving server applications with system transactions.

2011

Cited by Paper title
1314 CloneCloud: elastic execution between mobile device and cloud.
541 DepSky: dependable and secure storage in a cloud-of-clouds.
302 Fine-grained power modeling for smartphones using system call tracing.
225 Scarlett: coping with skewed content popularity in mapreduce clusters.
171 Parallel symbolic execution for automated real-world software testing.
144 Cycles cells and platters: an empirical analysisof hardware failures on a million consumer PCs.
127 Energy management in mobile devices with the cinder operating system.
126 Sierra: practical power-proportionality for data center storage.
112 Feature consistency in compile-time-configurable system software: facing the linux 10000 feature problem.
83 Is co-scheduling too expensive for SMP VMs?
79 Database engines on multicores why parallelize when you can distribute?
71 ZZ and the art of practical BFT execution.
58 Symbolic crosschecking of floating-point and SIMD code.
55 Kaleidoscope: cloud micro-elasticity via VM state coloring.
52 Finding complex concurrency bugs in large multi-threaded applications.
48 Keypad: an auditing file system for theft-prone devices.
47 A case for scaling applications to many-core with OS clustering.
46 Efficient middleware for byzantine fault tolerant database replication.
39 Increasing performance in byzantine fault-tolerant systems with on-demand replica consistency.
31 SRM-buffer: an OS buffer management technique to prevent last level cache from thrashing in multicores.
29 Striking a new balance between program instrumentation and debugging time.
20 Operating system support for application-specific speculation.
18 Scheduling large jobs by abstraction refinement.
10 Refuse to crash with Re-FUSE.

2010

Cited by Paper title
1148 Delay scheduling: a simple technique for achieving locality and fairness in cluster scheduling.
461 Q-clouds: managing performance interference effects for QoS-aware clouds.
308 NOVA: a microhypervisor-based secure virtualization architecture.
226 Bias scheduling in heterogeneous multi-core architectures.
195 Execution synthesis: a technique for automated software debugging.
169 Resource-conscious scheduling for energy efficiency on multicore processors.
163 “Defeating return-oriented rootkits with “”Return-Less”” kernels. “
156 Fingerprinting the datacenter: automated classification of performance crises.
139 A comprehensive scheduler for asymmetric multicore systems.
136 The next 700 BFT protocols.
135 Differential RAID: rethinking RAID for SSD reliability.
124 Evaluation of AMD’s advanced synchronization facility within a complete transactional memory stack.
122 Boom analytics: exploring data-centric declarative programming for the cloud.
100 Dr. multicast: Rx for data center communication scalability.
81 Locating cache performance bottlenecks using data profiling.
75 Using transparent compression to improve SSD-based I/O caches.
65 Reverse engineering of binary device drivers with RevNIC.
65 Otherworld: giving applications a chance to survive OS kernel crashes.
59 High-level programming of embedded hard real-time devices.
57 HadoopToSQL: a mapReduce query optimizer.
52 Kivati: fast detection and prevention of atomicity violations.
37 Transactional memory support for scalable and transparent parallelization of multiplayer games.
35 Self-tuning schedulers for legacy real-time applications.
34 Barricade: defending systems against operator mistakes.
32 Policy-based access control for weakly consistent replication.
16 Splitter: a proxy-based approach for post-migration testing of web applications.
7 Residue objects: a challenge to web browser security.

2009

Cited by Paper title
880 User interactions in social networks and their implications.
515 Automated control of multiple virtualized resources.
432 SnowFlock: rapid virtual machine cloning for cloud computing.
337 Migrating server storage to SSDs: analysis of tradeoffs.
211 Towards practical page coloring-based multicore cache management.
202 Koala: a platform for OS-level power management.
157 Ksplice: automatic rebootless kernel updates.
144 Isolating web programs in modern browser architectures.
135 Statistical profiling-based techniques for effective power provisioning in data centers.
126 Pointless tainting?: evaluating the practicality of pointer tainting.
111 Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space.
105 Dingo: taming device drivers.
101 Multi-aspect profiling of kernel rootkit behavior.
52 Privacy-preserving browser-side scripting with BFlow.
38 xCalls: safe I/O in memory transactions.
37 A runtime system for software lock elision.
29 Memory resource allocation for file system prefetching: from a supply chain management perspective.
27 First-aid: surviving and preventing memory management bugs during production runs.
26 Predicting replicated database scalability from standalone database profiling.
25 Transparent checkpoints of closed distributed systems in Emulab.
24 Tralfamadore: unifying source code and execution experience.
23 Fair and timely scheduling via cooperative polling.
18 Effective and efficient compromise recovery for weakly consistent replication.
9 Improving the responsiveness of internet services with automatic cache placement.
8 SCAN-Lite: enterprise-wide analysis on the cheap.

2008

Cited by Paper title
638 Flicker: an execution infrastructure for tcb minimization.
169 Documenting and automating collateral evolutions in linux device drivers.
155 Parallax: virtual disks for virtual machines.
99 Efficient guaranteed disk request scheduling with fahrrad.
98 DepSpace: a byzantine fault-tolerant coordination service.
75 Controlled systematic and efficient code replacement for running java programs.
72 Towards cinematic internet video-on-demand.
67 Manageable fine-grained information flow.
57 Application-level isolation and recovery with solitude.
55 VPFS: building a virtual private file system with a small trusted computing base.
53 Experiences with open overlays: a middleware approach to network heterogeneity.
52 GreenFS: making enterprise computers greener by protecting them better.
51 Task activity vectors: a new metric for temperature-aware scheduling.
51 Itrustpage: a user-assisted anti-phishing tool.
50 BorderPatrol: isolating events for black-box tracing.
43 Samurai: protecting critical data in unsafe languages.
39 Replication degree customization for high availability.
25 Eudaemon: involuntary and on-demand emulation against zero-day exploits.
23 Hang analysis: fighting responsiveness bugs.
22 Switchblade: enforcing dynamic personalized system call models.
17 30 seconds is not enough!: a study of operating system timer usage.
15 Enforcing appropriate process execution for exploiting idle resources from outside operating systems.
10 Protectit: trusted distributed services operating on sensitive data.
7 Modeling viral economies for digital media.

2007

Cited by Paper title
2483 Dryad: distributed data-parallel programs from sequential building blocks.
656 Adaptive control of virtualized resources in utility computing environments.
613 Container-based operating system virtualization: a scalable high-performance alternative to hypervisors.
280 Thread clustering: sharing-aware scheduling on SMP-CMP-SMT multiprocessors.
252 STMBench7: a benchmark for software transactional memory.
189 Exploiting nonstationarity for performance prediction.
106 A virtual machine for sensor networks.
103 Concierge: a service platform for resource-constrained devices.
93 Enabling scalability and performance in a large scale CMP environment.
92 Dynamic and adaptive updates of non-quiescent subsystems in commodity operating system kernels.
90 Comparing the performance of web server architectures.
88 Tashkent+: memory-aware load balancing and update filtering in replicated databases.
84 Automatic configuration of internet services.
83 Sealing OS processes to improve dependability and safety.
77 Sweeper: a lightweight end-to-end system for defending against fast worms.
69 Whodunit: transactional profiling for multi-tier applications.
65 Competitive prefetching for concurrent sequential I/O.
59 Sprint: a middleware for high-performance transaction processing.
56 Macroprogramming heterogeneous sensor networks using cosmos.
50 “Melange: creating a “”functional”” internet. “
47 Antiquity: exploiting a secure log for wide-area distributed storage.
47 hFS: a hybrid file system prototype for improving small file and metadata performance.
43 Discrete control for safe execution of IT automation workflows.
36 JIT instrumentation: a novel approach to dynamically instrument operating systems.
33 Latency and bandwidth-minimizing failure detectors.
30 Secure file system versioning at the block level.
26 Authorizing applications in singularity.
26 Fine grained kernel logging with KLogger: experience and insights.
19 Removing the memory limitations of sensor networks with flash-based virtual memory.

2006

Cited by Paper title
703 Understanding user behavior in large-scale video-on-demand systems.
421 Thorough static analysis of device drivers.
325 Language support for fast and reliable message-based communication in singularity OS.
321 Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation.
199 Practical taint-based protection using demand emulation.
185 Emergent (mis)behavior vs. complex software systems.
174 Balancing power consumption in multiprocessor systems.
174 Automated known problem diagnosis with event traces.
171 A fresh look at the reliability of long-term digital storage.
168 Reducing TCB complexity for security-sensitive applications: three case studies.
162 Peer sharing behaviour in the eDonkey network and implications for the design of server-less file sharing systems.
139 K42: building a complete operating system.
124 A quantitative analysis of aspects in the eCos kernel.
98 RIMAC: a novel redundancy-based hierarchical cache architecture for energy efficient high performance storage systems.
92 Fireflies: scalable support for intrusion-tolerant network overlays.
90 Tashkent: uniting durability with transaction ordering for high-performance scalable database replication.
82 The SMART way to migrate replicated stateful services.
77 Understanding collateral evolution in Linux device drivers.
72 Using queries for distributed monitoring and forensics.
63 Experiences in building and operating ePOST a reliable peer-to-peer application.
60 Database replication policies for dynamic content applications.
58 TCP offload through connection handoff.
52 On the road to recovery: restoring data after disasters.
47 Ferret: a toolkit for content-based similarity search of feature-rich data.
47 Solving the starting problem: device drivers as self-describing artifacts.
32 Evaluating network processing efficiency with processor partitioning and asynchronous I/O.
31 Context-specific middleware specialization techniques for optimizing software product-line architectures.
28 URICA: Usage-awaRe Interactive Content Adaptation for mobile devices.
26 Predictive log-synchronization.