OSDI

All

Cited by Paper title Year
20882 MapReduce: Simplified Data Processing on Large Clusters. 2004
5200 Bigtable: A Distributed Storage System for Structured Data (Awarded Best Paper!). 2006
3736 TAG: A Tiny AGgregation Service for Ad-Hoc Sensor Networks. 2002
3029 Fine-Grained Network Time Synchronization Using Reference Broadcasts. 2002
2299 TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. 2010
1640 KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. 2008
1563 An Integrated Experimental Environment for Distributed Systems and Networks. 2002
1550 Memory Resource Management in VMware ESX Server. 2002
1541 Overcast: Reliable Multicasting with an Overlay Network. 2000
1469 Improving MapReduce Performance in Heterogeneous Environments. 2008
1393 Practical Byzantine Fault Tolerance. 1999
1359 Scheduling for Reduced CPU Energy. 1994
1116 Ceph: A Scalable, High-Performance Distributed File System. 2006
1095 Secure Routing for Structured Peer-to-Peer Overlay Networks. 2002
1076 FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment. 2002
1053 ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay. 2002
998 Lottery Scheduling: Flexible Proportional-Share Resource Management. 1994
983 Onix: A Distributed Control Platform for Large-scale Production Networks. 2010
921 The Chubby Lock Service for Loosely-Coupled Distributed Systems. 2006
878 Spanner: Google’s Globally-Distributed Database. 2012
856 Resource Containers: A New Facility for Resource Management in Server Systems. 1999
790 Automated Worm Fingerprinting. 2004
785 An Analysis of Internet Content Delivery Systems. 2002
785 DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language. 2008
734 Cooperative Caching: Using Remote Client Memory to Improve File System Performance. 1994
720 Fidelity and Yield in a Volcano Monitoring Sensor Network. 2006
709 Safe Kernel Extensions Without Run-Time Checking. 1996
686 Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions. 2000
685 PowerGraph: Distributed Graph-Parallel Computation on Natural Graphs. 2012
634 Using Magpie for Request Extraction and Workload Modelling. 2004
612 Scalability and Accuracy in a Large-Scale Network Emulator. 2002
596 Optimizing the Migration of Virtual Computers. 2002
586 Ivy: A Read/Write Peer-to-Peer File System. 2002
584 iPlane: An Information Plane for Distributed Services. 2006
580 Making Information Flow Explicit in HiStar. 2006
560 A Hierarchical CPU Scheduler for Multimedia Operating Systems. 1996
553 The Design and Implementation of Zap: A System for Migrating Computing Environments. 2002
536 Scale and Performance in the Denali Isolation Kernel. 2002
518 GraphChi: Large-Scale Graph Computation on Just a PC. 2012
515 Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control. 2004
499 Reining in the Outliers in Map-Reduce Clusters using Mantri. 2010
486 Microreboot - A Technique for Cheap Recovery. 2004
477 Finding and Reproducing Heisenbugs in Concurrent Programs. 2008
476 Pastiche: Making Backup Cheap and Easy. 2002
464 Can the Production Network Be the Testbed? 2010
452 Disk-directed I/O for MIMD Multiprocessors. 1994
449 CMC: A Pragmatic Approach to Model Checking Real Code. 2002
432 Secure Untrusted Data Repository (SUNDR). 2004
426 Large-scale Incremental Processing Using Distributed Transactions and Notifications. 2010
414 Resource Overbooking and Application Profiling in Shared Hosting Platforms. 2002
412 Dealing with Disaster: Surviving Misbehaved Kernel Extensions. 1996
406 Difference Engine: Harnessing Memory Redundancy in Virtual Machines. 2008
384 Corey: An Operating System for Many Cores. 2008
379 A Feedback-driven Proportion Allocator for Real-Rate Scheduling. 1999
377 Availability in Globally Distributed Storage Systems. 2010
375 Making Paths Explicit in the Scout Operating System. 1996
365 Finding a Needle in Haystack: Facebook’s Photo Storage. 2010
362 Policies for Dynamic Clock Scheduling. 2000
359 Fast and Secure Distributed Read-Only File System. 2000
359 Enhancing Server Availability and Security Through Failure-Oblivious Computing. 2004
356 Improving the Reliability of Internet Paths with One-hop Source Routing. 2004
347 XFI: Software Guards for System Address Spaces. 2006
340 Lazy Receiver Processing (LRP): A Network Subsystem Architecture for Server Systems. 1996
337 Storage Alternatives for Mobile Computers. 1994
332 GraphX: Graph Processing in a Distributed Dataflow Framework. 2014
328 An Analysis of Linux Scalability to Many Cores. 2010
320 Using Model Checking to Find Serious File System Errors (Awarded Best Paper!). 2004
316 CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code. 2004
309 Scalable, Distributed Data Structures for Internet Service Construction. 2000
308 Self-Securing Storage: Protecting Data in Compromised Systems. 2000
304 The Coign Automatic Distributed Partitioning System. 1999
294 Chain Replication for Supporting High Throughput and Availability. 2004
292 BAR Gossip. 2006
290 Unmodified Device Driver Reuse and Improved System Dependability via Virtual Machines. 2004
284 Design and Evaluation of a Continuous Consistency Model for Replicated Services. 2000
283 BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML. 2006
282 Automatic Compiler-Inserted I/O Prefetching for Out-of-Core Applications. 1996
281 Performance Evaluation of Two Home-Based Lazy Release Consistency Protocols for Shared Virtual Memory Systems. 1996
277 Experiences Building PlanetLab. 2006
266 TCP Nice: A Mechanism for Background Transfers. 2002
254 Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java. 2000
252 Securing Software by Enforcing Data-flow Integrity. 2006
251 HQ Replication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance. 2006
247 Tornado: Maximizing Locality and Concurrency in a Shared Memory Multiprocessor Operating System. 1999
246 Scout: A Communications-Oriented Operating System (Abstract). 1994
245 SPORC: Group Collaboration using Untrusted Cloud Resources. 2010
243 Automatic Misconfiguration Troubleshooting with PeerPressure. 2004
240 Interposed Request Routing for Scalable Network Storage. 2000
239 Depot: Cloud Storage with Minimal Trust. 2010
236 Microkernels Meet Recursive Virtual Machines. 1996
234 PathFinder: A Pattern-Based Packet Classifier. 1994
233 The Turtles Project: Design and Implementation of Nested Virtualization. 2010
227 Fine-Grained Dynamic Instrumentation of Commodity Operating System Kernels. 1999
223 Proactive Recovery in a Byzantine-Fault-Tolerant System. 2000
222 Middleboxes No Longer Considered Harmful. 2004
221 Boxwood: Abstractions as the Foundation for Storage Infrastructure. 2004
220 Vertigo: Automatic Performance-Setting for Linux. 2002
217 Efficient System-Enforced Deterministic Parallelism. 2010
215 IO-Lite: A Unified I/O Buffering and Caching System. 1999
214 Automatic I/O Hint Generation Through Speculative Execution. 1999
209 COMET: Code Offload by Migrating Execution Transparently. 2012
208 A Caching Model of Operating System Kernel Functionality. 1994
206 Defending Against Denial of Service Attacks in Scout. 1999
206 How to Build a Trusted Database System on Untrusted Storage. 2000
205 CPU Inheritance Scheduling. 1996
205 The Effectiveness of Request Redirection on CDN Robustness. 2002
204 Integrated Resource Management for Cluster-based Internet Services. 2002
203 Taming Aggressive Replication in the Pangaea Wide-Area File System. 2002
198 Implementation and Performance of Application-Controlled File Caching. 1994
193 The Synergy Between Non-Blocking Synchronization and Operating System Structure. 1996
193 A Low-Overhead, High-Performance Unified Buffer Management Scheme That Exploits Sequential and Looping References. 2000
190 Scaling Distributed Machine Learning with the Parameter Server. 2014
188 Configuration Debugging as Search: Finding the Needle in the Haystack. 2004
187 Shielding Applications from an Untrusted Cloud with Haven. 2014
183 “Towards Higher Disk Head Utilization: Extracting “”Free”” Bandwidth from Busy Disk Drives. “ 2000
181 SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques. 2006
178 Quanto: Tracking Energy in Networked Embedded Systems. 2008
176 Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable. 2006
174 Practical, Transparent Operating System Support for Superpages. 2002
173 PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services. 2004
172 mClock: Handling Throughput Variability for Hypervisor IO Scheduling. 2010
171 Integrating Content-Based Access Mechanisms with Hierarchical File Systems. 1999
171 Piccolo: Building Fast, Distributed Programs with Partitioned Tables. 2010
169 A Trace-Driven Comparison of Algorithms for Parallel Prefetching and Caching. 1996
168 Knit: Component Composition for Systems Software. 2000
164 FlexSC: Flexible System Call Scheduling with Exception-Less System Calls. 2010
160 Virtual Log Based File Systems for a Programmable Disk. 1999
160 Cooperative I/O: A Novel I/O Semantics for Energy-Aware Applications. 2002
159 An Implementation of the Hamlyn Sender-Managed Interface Architecture. 1996
158 R2: An Application-Level Kernel for Record and Replay. 2008
157 Efficient Cooperative Caching Using Hints. 1996
155 Metadata Update Performance in File Systems. 1994
155 Making Geo-Replicated Systems Fast as Possible, Consistent when Necessary. 2012
153 Using Latency to Evaluate Interactive System Performance. 1996
153 Deterministic Process Groups in dOS. 2010
152 Devil: An IDL for Hardware Programming. 2000
152 Deadlock Immunity: Enabling Systems to Defend Against Deadlocks. 2008
152 Performance Isolation and Fairness for Multi-Tenant Cloud Storage. 2012
150 Mencius: Building Efficient Replicated State Machine for WANs. 2008
148 CoDNS: Improving DNS Performance and Reliability via Cooperative Lookups. 2004
145 Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions. 2008
140 Self-Paging in the Nemesis Operating System. 1999
139 EXPLODE: A Lightweight, General System for Finding Serious Storage System Errors. 2006
139 Project Adam: Building an Efficient and Scalable Deep Learning Training System. 2014
136 Persistent Personal Names for Globally Connected Mobile Devices. 2006
136 Arrakis: The Operating System is the Control Plane. 2014
135 Software Write Detection for a Distributed Shared Memory. 1994
135 Nectar: Automatic Management of Data and Computation in Datacenters. 2010
133 From Uncertainty to Belief: Inferring the Specification Within. 2006
131 Logical vs. Physical File System Backup. 1999
131 Understanding and Dealing with Operator Mistakes in Internet Services. 2004
130 Gadara: Dynamic Deadlock Avoidance for Multithreaded Programs. 2008
130 AppInsight: Mobile App Performance Monitoring in the Wild. 2012
128 Surplus Fair Scheduling: A Proportional-Share CPU Scheduling Algorithm for Symmetric Multiprocessors. 2000
126 The Design and Evaluation of a Shared Object System for Distributed Memory Machines. 1994
126 System Support for Bandwidth Management and Content Adaptation in Internet Applications. 2000
126 Effective Data-Race Detection for the Kernel. 2010
124 Code-Pointer Integrity. 2014
123 Distributed Filaments: Efficient Fine-Grain Parallelism on a Cluster of Workstations. 1994
122 Digging for Data Structures. 2008
120 Effects of Buffering Semantics on I/O Performance. 1996
120 Automating Configuration Troubleshooting with Dynamic Information Flow Analysis. 2010
120 IX: A Protected Dataplane Operating System for High Throughput and Low Latency. 2014
119 Energy-Efficiency and Storage Flexibility in the Blue File System. 2004
117 FFPF: Fairly Fast Packet Filters. 2004
117 Ad Hoc Synchronization Considered Harmful. 2010
117 X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software. 2012
114 Program-Counter-Based Pattern Classification in Buffer Caching. 2004
112 Dynamic Binding for an Extensible System. 1996
112 FlightPath: Obedience vs. Choice in Cooperative Services. 2008
110 Studies of Windows NT Performance Using Dynamic Execution Traces. 1996
110 Trading Capacity for Performance in a Disk Array. 2000
107 Transactional Flash. 2008
107 Device Driver Safety Through a Reference Validation Mechanism. 2008
106 Stable Deterministic Multithreading through Schedule Memoization. 2010
106 Flat Datacenter Storage. 2012
105 Dune: Safe User-level Access to Privileged CPU Features. 2012
103 MultiView and Millipage - Fine-Grain Sharing in Page-Based DSMs. 1999
102 Software Prefetching and Caching for Translation Lookaside Buffers. 1994
101 Performance Issues in Parallelized Network Protocols. 1994
101 Leveraging Legacy Code to Deploy Desktop Applications on the Web. 2008
99 CRAMM: Virtual Memory Support for Garbage-Collected Applications. 2006
97 Hails: Protecting Data Privacy in Untrusted Web Applications. 2012
95 Accountable Virtual Machines. 2010
93 Online Data-Race Detection via Coherency Guarantees. 1996
93 A Modular Network Layer for Sensornets. 2006
93 Everest: Scaling Down Peak Loads Through I/O Off-Loading. 2008
89 TensorFlow: A System for Large-Scale Machine Learning. 2016
88 Trust and Protection in the Illinois Browser Operating System. 2010
87 Stasis: Flexible Transactional Storage. 2006
85 Apollo: Scalable and Coordinated Scheduling for Cloud-Scale Computing. 2014
84 EnsemBlue: Integrating Distributed Storage and Consumer Electronics. 2006
83 HiPEC: High Performance External Virtual Memory Caching. 1994
83 Automated Concurrency-Bug Fixing. 2012
81 Dissent in Numbers: Making Strong Anonymity Scale. 2012
80 Hardware Enforcement of Application Security Policies Using Tagged Memory. 2008
79 Life or Death at Block-Level. 2004
79 CleanOS: Limiting Mobile Data Exposure with Idle Eviction. 2012
79 f4: Facebook’s Warm BLOB Storage System. 2014
78 The Design of a Multicast-Based Distributed File System. 1999
77 MegaPipe: A New Programming Interface for Scalable Network I/O. 2012
77 All about Eve: Execute-Verify Replication for Multi-Core Servers. 2012
76 Operating System Management of MEMS-based Storage Devices. 2000
76 Redline: First Class Support for Interactivity in Commodity Operating Systems. 2008
75 Supporting Time-Sensitive Applications on a Commodity OS. 2002
75 CuriOS: Improving Reliability through Operating System Structure. 2008
74 Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant Software. 2002
72 Intrusion Recovery Using Selective Re-execution. 2010
71 Taming the Memory Hogs: Using Compiler-Inserted Releases to Manage Physical Memory Intelligently. 2000
71 Exploring Failure Transparency and the Limits of Generic Recovery. 2000
71 Improving Integer Security for Systems with KINT. 2012
70 Lightweight Logging for Lazy Release Consistent Distributed Shared Memory. 1996
69 End-to-End Authorization. 2000
69 Static Checking of Dynamically-Varying Security Policies in Database-Backed Applications. 2010
67 Ironclad Apps: End-to-End Security via Automated Full-System Verification. 2014
66 Garbage Collection and DSM Consistency. 1994
66 Dynamic Page Mapping Policies for Cache Conflict Resolution on Standard Hardware. 1994
66 Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management. 2006
65 Comet: An active distributed key-value store. 2010
64 Integrating Coherency and Recoverability in Distributed Systems. 1994
64 Operating System Profiling via Latency Analysis. 2006
64 Binary Translation Using Peephole Superoptimizers. 2008
63 Lightweight, High-Resolution Monitoring for Troubleshooting Production Systems. 2008
62 Type-Safe Disks. 2006
62 Transactional Consistency and Automatic Management in an Application Data Cache. 2010
60 Distributed Directory Service in the Farsite File System. 2006
57 Bypassing Races in Live Applications with Execution Filters. 2010
56 Be Conservative: Enhancing Failure Diagnosis with Proactive Logging. 2012
52 SQCK: A Declarative File System Checker. 2008
51 Performance-Driven Processor Allocation. 2000
51 SymDrive: Testing Drivers without Devices. 2012
49 Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems. 2014
48 Network Imprecision: A New Consistency Metric for Scalable Monitoring. 2008
47 FUSE: Lightweight Guaranteed Distributed Failure Notification. 2004
47 Building Extensible Networks with Rule-Based Forwarding. 2010
47 Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels. 2012
46 Extracting More Concurrency from Distributed Transactions. 2014
45 End-to-end Performance Isolation Through Virtual Datacenters. 2014
43 Protecting Users by Confining JavaScript with COWL. 2014
42 All File Systems Are Not Created Equal: On the Complexity of Crafting Crash-Consistent Applications. 2014
41 A Comparison of Windows Driver Model Latency Performance on Windows NT and Windows 98. 1999
38 The Mystery Machine: End-to-end Performance Analysis of Large-scale Internet Services. 2014
38 The Power of Choice in Data-Aware Cluster Scheduling. 2014
38 Characterizing Storage Workloads with Counter Stacks. 2014
37 Phase Reconciliation for Contended In-Memory Transactions. 2014
36 Fast Databases with Fast Durability and Recovery Through Multicore Parallelism. 2014
35 Message-Driven Relaxed Consistency in a Software Distributed Shared Memory. 1994
35 Luna: A Flexible Java Protection System. 2002
34 DJoin: Differentially Private Join Queries over Distributed Databases. 2012
34 GPUnet: Networking Abstractions for GPU Programs. 2014
33 Experiences with Locking in a NUMA Multiprocessor Operating System Kernel. 1994
32 Experiences from a Decade of TinyOS Development. 2012
32 lprof: A Non-intrusive Request Flow Profiler for Distributed Systems. 2014
31 Active Networks (Abstract). 1996
28 Using Model Checking to Debug Device Firmware. 2002
28 Virtualize Everything but Time. 2010
28 A Self-Configurable Geo-Replicated Cloud Storage System. 2014
27 Eidetic Systems. 2014
26 Torturing Databases for Fun and Profit. 2014
26 SAMC: Semantic-Aware Model Checking for Fast Discovery of Deep Bugs in Cloud Systems. 2014
26 Decoupling Cores, Kernels, and Operating Systems. 2014
26 SCONE: Secure Linux Containers with Intel SGX. 2016
25 ksniffer: Determining the Remote Client Perceived Response Time from Live Packet Streams. 2004
25 StarTrack Next Generation: A Scalable Infrastructure for Track-Based Applications. 2010
25 Salt: Combining ACID and BASE in a Distributed Database. 2014
25 Customizable and Extensible Deployment for Mobile/Cloud Applications. 2014
24 Some Issues in the Design of an Extensible Operating System (Panel Statement). 1994
24 Deploying Safe User-Level Network Services with icTCP. 2004
23 Avoiding File System Micromanagement with Range Writes. 2008
23 Willow: A User-Programmable SSD. 2014
21 Pelican: A Building Block for Exascale Cold Data Storage. 2014
20 Recovering Device Drivers (Awarded Best Paper!). 2004
20 Spotting Code Optimizations in Data-Parallel Pipelines through PeriSCOPE. 2012
20 Pasture: Secure Offline Data Access Using Commodity Trusted Hardware. 2012
20 Detecting Covert Timing Channels with Time-Deterministic Replay. 2014
20 Heading Off Correlated Failures through Independence-as-a-Service. 2014
19 Optimizing the Idle Task and Other MMU Tricks. 1999
19 Pebbles: Fine-Grained Data Management Abstractions for Modern Operating Systems. 2014
18 Tapeworm: High-Level Abstractions of Shared Accesses. 1999
18 Latency Management in Storage Systems. 2000
18 Efficient Patch-based Auditing for Web Application Vulnerabilities. 2012
18 Jitk: A Trustworthy In-Kernel Interpreter Infrastructure. 2014
17 Enabling Configuration-Independent Automation by Non-Expert Users. 2010
14 Opportunistic Log: Efficient Installation Reads in a Reliable Storage Server. 1994
14 User-Guided Device Driver Synthesis. 2014
14 Pydron: Semi-Automatic Parallelization for Multi-Core and the Cloud. 2014
13 ETI Resource Distributor: Guaranteed Resource Allocation and Scheduling in Multimedia Systems. 1999
13 Connection Handoff Policies for TCP Offload Network Interfaces. 2006
12 SKI: Exposing Kernel Concurrency Bugs through Systematic Schedule Exploration. 2014
12 SHILL: A Secure Shell Scripting Language. 2014
11 Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data. 2016
10 Nail: A Practical Tool for Parsing and Generating Data Formats. 2014
8 JavaOS: Back to the Future (Abstract). 1996
8 Physical Disentanglement in a Container-Based File System. 2014
8 Gemini: A Computation-Centric Distributed Graph Processing System. 2016
8 FaSST: Fast, Scalable and Simple Distributed Transactions with Two-Sided (RDMA) Datagram RPCs. 2016
7 Low and High Risk Operating System Architectures (Panel Statement). 1994
7 Rethink the Sync (Awarded Best Paper!). 2006
6 Yak: A High-Performance Big-Data-Friendly Garbage Collector. 2016
6 GRAPHENE: Packing and Dependency-Aware Scheduling for Data-Parallel Clusters. 2016
6 Firmament: Fast, Centralized Cluster Scheduling at Scale. 2016
6 Morpheus: Towards Automated SLOs for Enterprise Clusters. 2016
6 Shuffler: Fast and Deployable Continuous Code Re-Randomization. 2016
5 The Exokernel Approach to Operating System Extensibility (Panel Statement). 1994
5 XFT: Practical Fault Tolerance beyond Crashes. 2016
5 Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata. 2016
5 Push-Button Verification of File Systems via Crash Refinement. 2016
5 NetBricks: Taking the V out of NFV. 2016
5 CLARINET: WAN-Aware Optimization for Analytics Queries. 2016
4 Identifying Information Disclosure in Web Applications with Retroactive Auditing. 2014
4 Altruistic Scheduling in Multi-Resource Clusters. 2016
4 Unobservable Communication over Fully Untrusted Infrastructure. 2016
4 Network Requirements for Resource Disaggregation. 2016
4 CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels. 2016
3 Exploring the Hidden Dimension in Graph Processing. 2016
3 Coordinated and Efficient Huge Page Management with Ingens. 2016
3 Big Data Analytics over Encrypted Datasets with Seabed. 2016
3 Just Say NO to Paxos Overhead: Replacing Consensus with Network Ordering. 2016
3 Early Detection of Configuration Errors to Reduce Failure Damage. 2016
3 Fast and Concurrent RDF Queries with RDMA-Based Distributed Graph Exploration. 2016
2 REX: A Development Platform and Online Learning Approach for Runtime Emergent Software Systems. 2016
2 Incremental Consistency Guarantees for Replicated Objects. 2016
2 Efficient Network Reachability Analysis Using a Succinct Control Plane Representation. 2016
2 JetStream: Cluster-Scale Parallelization of Information Flow Queries. 2016
2 Don’t Get Caught in the Cold, Warm-up Your JVM: Understand and Eliminate JVM Warm-up Overhead in Data-Parallel Systems. 2016
2 Intermittent Computation without Hardware Support or Programmer Intervention. 2016
2 Machine-Aware Atomic Broadcast Trees for Multicores. 2016
2 The SNOW Theorem and Latency-Optimal Read-Only Transactions. 2016
2 Consolidating Concurrency Control and Consensus for Commits under Conflicts. 2016
2 To Waffinity and Beyond: A Scalable Architecture for Incremental Parallelization of File System Code. 2016
1 Kraken: Leveraging Live Traffic Tests to Identify and Resolve Resource Utilization Bottlenecks in Large Scale Web Services. 2016
1 Slicer: Auto-Sharding for Datacenter Applications. 2016
1 Diamond: Automating Data Management and Storage for Wide-Area, Reactive Applications. 2016
1 Simplifying Datacenter Network Debugging with PathDump. 2016
1 History-Based Harvesting of Spare Cycles and Storage in Large-Scale Datacenters. 2016
1 EC-Cache: Load-Balanced, Low-Latency Cluster Caching with Online Erasure Coding. 2016
0 Panel: Radical Operating Systems Structures for Extensibility. 1994
0 High-Performance Microkernel Systems (Panel Statement). 1994
0 Interface and Execution Models in the Fluke Kernel. 1999
0 Non-Intrusive Performance Profiling for Entire Software Stacks Based on the Flow Reconstruction Principle. 2016
0 Light-Weight Contexts: An OS Abstraction for Safety and Performance. 2016
0 DQBarge: Improving Data-Quality Tradeoffs in Large-Scale Internet Services. 2016
0 EbbRT: A Framework for Building Per-Application Library Operating Systems. 2016
0 Realizing the Fault-Tolerance Promise of Cloud Storage Using Locks with Intent. 2016
0 Correlated Crash Vulnerabilities. 2016

2016

Cited by Paper title
89 TensorFlow: A System for Large-Scale Machine Learning.
26 SCONE: Secure Linux Containers with Intel SGX.
11 Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data.
8 Gemini: A Computation-Centric Distributed Graph Processing System.
8 FaSST: Fast, Scalable and Simple Distributed Transactions with Two-Sided (RDMA) Datagram RPCs.
6 Yak: A High-Performance Big-Data-Friendly Garbage Collector.
6 GRAPHENE: Packing and Dependency-Aware Scheduling for Data-Parallel Clusters.
6 Firmament: Fast, Centralized Cluster Scheduling at Scale.
6 Morpheus: Towards Automated SLOs for Enterprise Clusters.
6 Shuffler: Fast and Deployable Continuous Code Re-Randomization.
5 XFT: Practical Fault Tolerance beyond Crashes.
5 Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata.
5 Push-Button Verification of File Systems via Crash Refinement.
5 NetBricks: Taking the V out of NFV.
5 CLARINET: WAN-Aware Optimization for Analytics Queries.
4 Altruistic Scheduling in Multi-Resource Clusters.
4 Unobservable Communication over Fully Untrusted Infrastructure.
4 Network Requirements for Resource Disaggregation.
4 CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels.
3 Exploring the Hidden Dimension in Graph Processing.
3 Coordinated and Efficient Huge Page Management with Ingens.
3 Big Data Analytics over Encrypted Datasets with Seabed.
3 Just Say NO to Paxos Overhead: Replacing Consensus with Network Ordering.
3 Early Detection of Configuration Errors to Reduce Failure Damage.
3 Fast and Concurrent RDF Queries with RDMA-Based Distributed Graph Exploration.
2 REX: A Development Platform and Online Learning Approach for Runtime Emergent Software Systems.
2 Incremental Consistency Guarantees for Replicated Objects.
2 Efficient Network Reachability Analysis Using a Succinct Control Plane Representation.
2 JetStream: Cluster-Scale Parallelization of Information Flow Queries.
2 Don’t Get Caught in the Cold, Warm-up Your JVM: Understand and Eliminate JVM Warm-up Overhead in Data-Parallel Systems.
2 Intermittent Computation without Hardware Support or Programmer Intervention.
2 Machine-Aware Atomic Broadcast Trees for Multicores.
2 The SNOW Theorem and Latency-Optimal Read-Only Transactions.
2 Consolidating Concurrency Control and Consensus for Commits under Conflicts.
2 To Waffinity and Beyond: A Scalable Architecture for Incremental Parallelization of File System Code.
1 Kraken: Leveraging Live Traffic Tests to Identify and Resolve Resource Utilization Bottlenecks in Large Scale Web Services.
1 Slicer: Auto-Sharding for Datacenter Applications.
1 Diamond: Automating Data Management and Storage for Wide-Area, Reactive Applications.
1 Simplifying Datacenter Network Debugging with PathDump.
1 History-Based Harvesting of Spare Cycles and Storage in Large-Scale Datacenters.
1 EC-Cache: Load-Balanced, Low-Latency Cluster Caching with Online Erasure Coding.
0 Non-Intrusive Performance Profiling for Entire Software Stacks Based on the Flow Reconstruction Principle.
0 Light-Weight Contexts: An OS Abstraction for Safety and Performance.
0 DQBarge: Improving Data-Quality Tradeoffs in Large-Scale Internet Services.
0 EbbRT: A Framework for Building Per-Application Library Operating Systems.
0 Realizing the Fault-Tolerance Promise of Cloud Storage Using Locks with Intent.
0 Correlated Crash Vulnerabilities.

2014

Cited by Paper title
332 GraphX: Graph Processing in a Distributed Dataflow Framework.
190 Scaling Distributed Machine Learning with the Parameter Server.
187 Shielding Applications from an Untrusted Cloud with Haven.
139 Project Adam: Building an Efficient and Scalable Deep Learning Training System.
136 Arrakis: The Operating System is the Control Plane.
124 Code-Pointer Integrity.
120 IX: A Protected Dataplane Operating System for High Throughput and Low Latency.
85 Apollo: Scalable and Coordinated Scheduling for Cloud-Scale Computing.
79 f4: Facebook’s Warm BLOB Storage System.
67 Ironclad Apps: End-to-End Security via Automated Full-System Verification.
49 Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems.
46 Extracting More Concurrency from Distributed Transactions.
45 End-to-end Performance Isolation Through Virtual Datacenters.
43 Protecting Users by Confining JavaScript with COWL.
42 All File Systems Are Not Created Equal: On the Complexity of Crafting Crash-Consistent Applications.
38 The Mystery Machine: End-to-end Performance Analysis of Large-scale Internet Services.
38 The Power of Choice in Data-Aware Cluster Scheduling.
38 Characterizing Storage Workloads with Counter Stacks.
37 Phase Reconciliation for Contended In-Memory Transactions.
36 Fast Databases with Fast Durability and Recovery Through Multicore Parallelism.
34 GPUnet: Networking Abstractions for GPU Programs.
32 lprof: A Non-intrusive Request Flow Profiler for Distributed Systems.
28 A Self-Configurable Geo-Replicated Cloud Storage System.
27 Eidetic Systems.
26 Torturing Databases for Fun and Profit.
26 SAMC: Semantic-Aware Model Checking for Fast Discovery of Deep Bugs in Cloud Systems.
26 Decoupling Cores, Kernels, and Operating Systems.
25 Salt: Combining ACID and BASE in a Distributed Database.
25 Customizable and Extensible Deployment for Mobile/Cloud Applications.
23 Willow: A User-Programmable SSD.
21 Pelican: A Building Block for Exascale Cold Data Storage.
20 Detecting Covert Timing Channels with Time-Deterministic Replay.
20 Heading Off Correlated Failures through Independence-as-a-Service.
19 Pebbles: Fine-Grained Data Management Abstractions for Modern Operating Systems.
18 Jitk: A Trustworthy In-Kernel Interpreter Infrastructure.
14 User-Guided Device Driver Synthesis.
14 Pydron: Semi-Automatic Parallelization for Multi-Core and the Cloud.
12 SKI: Exposing Kernel Concurrency Bugs through Systematic Schedule Exploration.
12 SHILL: A Secure Shell Scripting Language.
10 Nail: A Practical Tool for Parsing and Generating Data Formats.
8 Physical Disentanglement in a Container-Based File System.
4 Identifying Information Disclosure in Web Applications with Retroactive Auditing.

2012

Cited by Paper title
878 Spanner: Google’s Globally-Distributed Database.
685 PowerGraph: Distributed Graph-Parallel Computation on Natural Graphs.
518 GraphChi: Large-Scale Graph Computation on Just a PC.
209 COMET: Code Offload by Migrating Execution Transparently.
155 Making Geo-Replicated Systems Fast as Possible, Consistent when Necessary.
152 Performance Isolation and Fairness for Multi-Tenant Cloud Storage.
130 AppInsight: Mobile App Performance Monitoring in the Wild.
117 X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software.
106 Flat Datacenter Storage.
105 Dune: Safe User-level Access to Privileged CPU Features.
97 Hails: Protecting Data Privacy in Untrusted Web Applications.
83 Automated Concurrency-Bug Fixing.
81 Dissent in Numbers: Making Strong Anonymity Scale.
79 CleanOS: Limiting Mobile Data Exposure with Idle Eviction.
77 MegaPipe: A New Programming Interface for Scalable Network I/O.
77 All about Eve: Execute-Verify Replication for Multi-Core Servers.
71 Improving Integer Security for Systems with KINT.
56 Be Conservative: Enhancing Failure Diagnosis with Proactive Logging.
51 SymDrive: Testing Drivers without Devices.
47 Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels.
34 DJoin: Differentially Private Join Queries over Distributed Databases.
32 Experiences from a Decade of TinyOS Development.
20 Spotting Code Optimizations in Data-Parallel Pipelines through PeriSCOPE.
20 Pasture: Secure Offline Data Access Using Commodity Trusted Hardware.
18 Efficient Patch-based Auditing for Web Application Vulnerabilities.

2010

Cited by Paper title
2299 TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.
983 Onix: A Distributed Control Platform for Large-scale Production Networks.
499 Reining in the Outliers in Map-Reduce Clusters using Mantri.
464 Can the Production Network Be the Testbed?
426 Large-scale Incremental Processing Using Distributed Transactions and Notifications.
377 Availability in Globally Distributed Storage Systems.
365 Finding a Needle in Haystack: Facebook’s Photo Storage.
328 An Analysis of Linux Scalability to Many Cores.
245 SPORC: Group Collaboration using Untrusted Cloud Resources.
239 Depot: Cloud Storage with Minimal Trust.
233 The Turtles Project: Design and Implementation of Nested Virtualization.
217 Efficient System-Enforced Deterministic Parallelism.
172 mClock: Handling Throughput Variability for Hypervisor IO Scheduling.
171 Piccolo: Building Fast, Distributed Programs with Partitioned Tables.
164 FlexSC: Flexible System Call Scheduling with Exception-Less System Calls.
153 Deterministic Process Groups in dOS.
135 Nectar: Automatic Management of Data and Computation in Datacenters.
126 Effective Data-Race Detection for the Kernel.
120 Automating Configuration Troubleshooting with Dynamic Information Flow Analysis.
117 Ad Hoc Synchronization Considered Harmful.
106 Stable Deterministic Multithreading through Schedule Memoization.
95 Accountable Virtual Machines.
88 Trust and Protection in the Illinois Browser Operating System.
72 Intrusion Recovery Using Selective Re-execution.
69 Static Checking of Dynamically-Varying Security Policies in Database-Backed Applications.
65 Comet: An active distributed key-value store.
62 Transactional Consistency and Automatic Management in an Application Data Cache.
57 Bypassing Races in Live Applications with Execution Filters.
47 Building Extensible Networks with Rule-Based Forwarding.
28 Virtualize Everything but Time.
25 StarTrack Next Generation: A Scalable Infrastructure for Track-Based Applications.
17 Enabling Configuration-Independent Automation by Non-Expert Users.

2008

Cited by Paper title
1640 KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs.
1469 Improving MapReduce Performance in Heterogeneous Environments.
785 DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language.
477 Finding and Reproducing Heisenbugs in Concurrent Programs.
406 Difference Engine: Harnessing Memory Redundancy in Virtual Machines.
384 Corey: An Operating System for Many Cores.
178 Quanto: Tracking Energy in Networked Embedded Systems.
158 R2: An Application-Level Kernel for Record and Replay.
152 Deadlock Immunity: Enabling Systems to Defend Against Deadlocks.
150 Mencius: Building Efficient Replicated State Machine for WANs.
145 Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions.
130 Gadara: Dynamic Deadlock Avoidance for Multithreaded Programs.
122 Digging for Data Structures.
112 FlightPath: Obedience vs. Choice in Cooperative Services.
107 Transactional Flash.
107 Device Driver Safety Through a Reference Validation Mechanism.
101 Leveraging Legacy Code to Deploy Desktop Applications on the Web.
93 Everest: Scaling Down Peak Loads Through I/O Off-Loading.
80 Hardware Enforcement of Application Security Policies Using Tagged Memory.
76 Redline: First Class Support for Interactivity in Commodity Operating Systems.
75 CuriOS: Improving Reliability through Operating System Structure.
64 Binary Translation Using Peephole Superoptimizers.
63 Lightweight, High-Resolution Monitoring for Troubleshooting Production Systems.
52 SQCK: A Declarative File System Checker.
48 Network Imprecision: A New Consistency Metric for Scalable Monitoring.
23 Avoiding File System Micromanagement with Range Writes.

2006

Cited by Paper title
5200 Bigtable: A Distributed Storage System for Structured Data (Awarded Best Paper!).
1116 Ceph: A Scalable, High-Performance Distributed File System.
921 The Chubby Lock Service for Loosely-Coupled Distributed Systems.
720 Fidelity and Yield in a Volcano Monitoring Sensor Network.
584 iPlane: An Information Plane for Distributed Services.
580 Making Information Flow Explicit in HiStar.
347 XFI: Software Guards for System Address Spaces.
292 BAR Gossip.
283 BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML.
277 Experiences Building PlanetLab.
252 Securing Software by Enforcing Data-flow Integrity.
251 HQ Replication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance.
181 SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques.
176 Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable.
139 EXPLODE: A Lightweight, General System for Finding Serious Storage System Errors.
136 Persistent Personal Names for Globally Connected Mobile Devices.
133 From Uncertainty to Belief: Inferring the Specification Within.
99 CRAMM: Virtual Memory Support for Garbage-Collected Applications.
93 A Modular Network Layer for Sensornets.
87 Stasis: Flexible Transactional Storage.
84 EnsemBlue: Integrating Distributed Storage and Consumer Electronics.
66 Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management.
64 Operating System Profiling via Latency Analysis.
62 Type-Safe Disks.
60 Distributed Directory Service in the Farsite File System.
13 Connection Handoff Policies for TCP Offload Network Interfaces.
7 Rethink the Sync (Awarded Best Paper!).

2004

Cited by Paper title
20882 MapReduce: Simplified Data Processing on Large Clusters.
790 Automated Worm Fingerprinting.
634 Using Magpie for Request Extraction and Workload Modelling.
515 Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control.
486 Microreboot - A Technique for Cheap Recovery.
432 Secure Untrusted Data Repository (SUNDR).
359 Enhancing Server Availability and Security Through Failure-Oblivious Computing.
356 Improving the Reliability of Internet Paths with One-hop Source Routing.
320 Using Model Checking to Find Serious File System Errors (Awarded Best Paper!).
316 CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code.
294 Chain Replication for Supporting High Throughput and Availability.
290 Unmodified Device Driver Reuse and Improved System Dependability via Virtual Machines.
243 Automatic Misconfiguration Troubleshooting with PeerPressure.
222 Middleboxes No Longer Considered Harmful.
221 Boxwood: Abstractions as the Foundation for Storage Infrastructure.
188 Configuration Debugging as Search: Finding the Needle in the Haystack.
173 PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services.
148 CoDNS: Improving DNS Performance and Reliability via Cooperative Lookups.
131 Understanding and Dealing with Operator Mistakes in Internet Services.
119 Energy-Efficiency and Storage Flexibility in the Blue File System.
117 FFPF: Fairly Fast Packet Filters.
114 Program-Counter-Based Pattern Classification in Buffer Caching.
79 Life or Death at Block-Level.
47 FUSE: Lightweight Guaranteed Distributed Failure Notification.
25 ksniffer: Determining the Remote Client Perceived Response Time from Live Packet Streams.
24 Deploying Safe User-Level Network Services with icTCP.
20 Recovering Device Drivers (Awarded Best Paper!).

2002

Cited by Paper title
3736 TAG: A Tiny AGgregation Service for Ad-Hoc Sensor Networks.
3029 Fine-Grained Network Time Synchronization Using Reference Broadcasts.
1563 An Integrated Experimental Environment for Distributed Systems and Networks.
1550 Memory Resource Management in VMware ESX Server.
1095 Secure Routing for Structured Peer-to-Peer Overlay Networks.
1076 FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment.
1053 ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay.
785 An Analysis of Internet Content Delivery Systems.
612 Scalability and Accuracy in a Large-Scale Network Emulator.
596 Optimizing the Migration of Virtual Computers.
586 Ivy: A Read/Write Peer-to-Peer File System.
553 The Design and Implementation of Zap: A System for Migrating Computing Environments.
536 Scale and Performance in the Denali Isolation Kernel.
476 Pastiche: Making Backup Cheap and Easy.
449 CMC: A Pragmatic Approach to Model Checking Real Code.
414 Resource Overbooking and Application Profiling in Shared Hosting Platforms.
266 TCP Nice: A Mechanism for Background Transfers.
220 Vertigo: Automatic Performance-Setting for Linux.
205 The Effectiveness of Request Redirection on CDN Robustness.
204 Integrated Resource Management for Cluster-based Internet Services.
203 Taming Aggressive Replication in the Pangaea Wide-Area File System.
174 Practical, Transparent Operating System Support for Superpages.
160 Cooperative I/O: A Novel I/O Semantics for Energy-Aware Applications.
75 Supporting Time-Sensitive Applications on a Commodity OS.
74 Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant Software.
35 Luna: A Flexible Java Protection System.
28 Using Model Checking to Debug Device Firmware.

2000

Cited by Paper title
1541 Overcast: Reliable Multicasting with an Overlay Network.
686 Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions.
362 Policies for Dynamic Clock Scheduling.
359 Fast and Secure Distributed Read-Only File System.
309 Scalable, Distributed Data Structures for Internet Service Construction.
308 Self-Securing Storage: Protecting Data in Compromised Systems.
284 Design and Evaluation of a Continuous Consistency Model for Replicated Services.
254 Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java.
240 Interposed Request Routing for Scalable Network Storage.
223 Proactive Recovery in a Byzantine-Fault-Tolerant System.
206 How to Build a Trusted Database System on Untrusted Storage.
193 A Low-Overhead, High-Performance Unified Buffer Management Scheme That Exploits Sequential and Looping References.
183 “Towards Higher Disk Head Utilization: Extracting “”Free”” Bandwidth from Busy Disk Drives. “
168 Knit: Component Composition for Systems Software.
152 Devil: An IDL for Hardware Programming.
128 Surplus Fair Scheduling: A Proportional-Share CPU Scheduling Algorithm for Symmetric Multiprocessors.
126 System Support for Bandwidth Management and Content Adaptation in Internet Applications.
110 Trading Capacity for Performance in a Disk Array.
76 Operating System Management of MEMS-based Storage Devices.
71 Taming the Memory Hogs: Using Compiler-Inserted Releases to Manage Physical Memory Intelligently.
71 Exploring Failure Transparency and the Limits of Generic Recovery.
69 End-to-End Authorization.
51 Performance-Driven Processor Allocation.
18 Latency Management in Storage Systems.

1999

Cited by Paper title
1393 Practical Byzantine Fault Tolerance.
856 Resource Containers: A New Facility for Resource Management in Server Systems.
379 A Feedback-driven Proportion Allocator for Real-Rate Scheduling.
304 The Coign Automatic Distributed Partitioning System.
247 Tornado: Maximizing Locality and Concurrency in a Shared Memory Multiprocessor Operating System.
227 Fine-Grained Dynamic Instrumentation of Commodity Operating System Kernels.
215 IO-Lite: A Unified I/O Buffering and Caching System.
214 Automatic I/O Hint Generation Through Speculative Execution.
206 Defending Against Denial of Service Attacks in Scout.
171 Integrating Content-Based Access Mechanisms with Hierarchical File Systems.
160 Virtual Log Based File Systems for a Programmable Disk.
140 Self-Paging in the Nemesis Operating System.
131 Logical vs. Physical File System Backup.
103 MultiView and Millipage - Fine-Grain Sharing in Page-Based DSMs.
78 The Design of a Multicast-Based Distributed File System.
41 A Comparison of Windows Driver Model Latency Performance on Windows NT and Windows 98.
19 Optimizing the Idle Task and Other MMU Tricks.
18 Tapeworm: High-Level Abstractions of Shared Accesses.
13 ETI Resource Distributor: Guaranteed Resource Allocation and Scheduling in Multimedia Systems.
0 Interface and Execution Models in the Fluke Kernel.

1996

Cited by Paper title
709 Safe Kernel Extensions Without Run-Time Checking.
560 A Hierarchical CPU Scheduler for Multimedia Operating Systems.
412 Dealing with Disaster: Surviving Misbehaved Kernel Extensions.
375 Making Paths Explicit in the Scout Operating System.
340 Lazy Receiver Processing (LRP): A Network Subsystem Architecture for Server Systems.
282 Automatic Compiler-Inserted I/O Prefetching for Out-of-Core Applications.
281 Performance Evaluation of Two Home-Based Lazy Release Consistency Protocols for Shared Virtual Memory Systems.
236 Microkernels Meet Recursive Virtual Machines.
205 CPU Inheritance Scheduling.
193 The Synergy Between Non-Blocking Synchronization and Operating System Structure.
169 A Trace-Driven Comparison of Algorithms for Parallel Prefetching and Caching.
159 An Implementation of the Hamlyn Sender-Managed Interface Architecture.
157 Efficient Cooperative Caching Using Hints.
153 Using Latency to Evaluate Interactive System Performance.
120 Effects of Buffering Semantics on I/O Performance.
112 Dynamic Binding for an Extensible System.
110 Studies of Windows NT Performance Using Dynamic Execution Traces.
93 Online Data-Race Detection via Coherency Guarantees.
70 Lightweight Logging for Lazy Release Consistent Distributed Shared Memory.
31 Active Networks (Abstract).
8 JavaOS: Back to the Future (Abstract).

1994

Cited by Paper title
1359 Scheduling for Reduced CPU Energy.
998 Lottery Scheduling: Flexible Proportional-Share Resource Management.
734 Cooperative Caching: Using Remote Client Memory to Improve File System Performance.
452 Disk-directed I/O for MIMD Multiprocessors.
337 Storage Alternatives for Mobile Computers.
246 Scout: A Communications-Oriented Operating System (Abstract).
234 PathFinder: A Pattern-Based Packet Classifier.
208 A Caching Model of Operating System Kernel Functionality.
198 Implementation and Performance of Application-Controlled File Caching.
155 Metadata Update Performance in File Systems.
135 Software Write Detection for a Distributed Shared Memory.
126 The Design and Evaluation of a Shared Object System for Distributed Memory Machines.
123 Distributed Filaments: Efficient Fine-Grain Parallelism on a Cluster of Workstations.
102 Software Prefetching and Caching for Translation Lookaside Buffers.
101 Performance Issues in Parallelized Network Protocols.
83 HiPEC: High Performance External Virtual Memory Caching.
66 Garbage Collection and DSM Consistency.
66 Dynamic Page Mapping Policies for Cache Conflict Resolution on Standard Hardware.
64 Integrating Coherency and Recoverability in Distributed Systems.
35 Message-Driven Relaxed Consistency in a Software Distributed Shared Memory.
33 Experiences with Locking in a NUMA Multiprocessor Operating System Kernel.
24 Some Issues in the Design of an Extensible Operating System (Panel Statement).
14 Opportunistic Log: Efficient Installation Reads in a Reliable Storage Server.
7 Low and High Risk Operating System Architectures (Panel Statement).
5 The Exokernel Approach to Operating System Extensibility (Panel Statement).
0 Panel: Radical Operating Systems Structures for Extensibility.
0 High-Performance Microkernel Systems (Panel Statement).