OSDI¶
All¶
Cited by | Paper title | Year |
---|---|---|
20882 | MapReduce: Simplified Data Processing on Large Clusters. | 2004 |
5200 | Bigtable: A Distributed Storage System for Structured Data (Awarded Best Paper!). | 2006 |
3736 | TAG: A Tiny AGgregation Service for Ad-Hoc Sensor Networks. | 2002 |
3029 | Fine-Grained Network Time Synchronization Using Reference Broadcasts. | 2002 |
2299 | TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. | 2010 |
1640 | KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. | 2008 |
1563 | An Integrated Experimental Environment for Distributed Systems and Networks. | 2002 |
1550 | Memory Resource Management in VMware ESX Server. | 2002 |
1541 | Overcast: Reliable Multicasting with an Overlay Network. | 2000 |
1469 | Improving MapReduce Performance in Heterogeneous Environments. | 2008 |
1393 | Practical Byzantine Fault Tolerance. | 1999 |
1359 | Scheduling for Reduced CPU Energy. | 1994 |
1116 | Ceph: A Scalable, High-Performance Distributed File System. | 2006 |
1095 | Secure Routing for Structured Peer-to-Peer Overlay Networks. | 2002 |
1076 | FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment. | 2002 |
1053 | ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay. | 2002 |
998 | Lottery Scheduling: Flexible Proportional-Share Resource Management. | 1994 |
983 | Onix: A Distributed Control Platform for Large-scale Production Networks. | 2010 |
921 | The Chubby Lock Service for Loosely-Coupled Distributed Systems. | 2006 |
878 | Spanner: Google’s Globally-Distributed Database. | 2012 |
856 | Resource Containers: A New Facility for Resource Management in Server Systems. | 1999 |
790 | Automated Worm Fingerprinting. | 2004 |
785 | An Analysis of Internet Content Delivery Systems. | 2002 |
785 | DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language. | 2008 |
734 | Cooperative Caching: Using Remote Client Memory to Improve File System Performance. | 1994 |
720 | Fidelity and Yield in a Volcano Monitoring Sensor Network. | 2006 |
709 | Safe Kernel Extensions Without Run-Time Checking. | 1996 |
686 | Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions. | 2000 |
685 | PowerGraph: Distributed Graph-Parallel Computation on Natural Graphs. | 2012 |
634 | Using Magpie for Request Extraction and Workload Modelling. | 2004 |
612 | Scalability and Accuracy in a Large-Scale Network Emulator. | 2002 |
596 | Optimizing the Migration of Virtual Computers. | 2002 |
586 | Ivy: A Read/Write Peer-to-Peer File System. | 2002 |
584 | iPlane: An Information Plane for Distributed Services. | 2006 |
580 | Making Information Flow Explicit in HiStar. | 2006 |
560 | A Hierarchical CPU Scheduler for Multimedia Operating Systems. | 1996 |
553 | The Design and Implementation of Zap: A System for Migrating Computing Environments. | 2002 |
536 | Scale and Performance in the Denali Isolation Kernel. | 2002 |
518 | GraphChi: Large-Scale Graph Computation on Just a PC. | 2012 |
515 | Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control. | 2004 |
499 | Reining in the Outliers in Map-Reduce Clusters using Mantri. | 2010 |
486 | Microreboot - A Technique for Cheap Recovery. | 2004 |
477 | Finding and Reproducing Heisenbugs in Concurrent Programs. | 2008 |
476 | Pastiche: Making Backup Cheap and Easy. | 2002 |
464 | Can the Production Network Be the Testbed? | 2010 |
452 | Disk-directed I/O for MIMD Multiprocessors. | 1994 |
449 | CMC: A Pragmatic Approach to Model Checking Real Code. | 2002 |
432 | Secure Untrusted Data Repository (SUNDR). | 2004 |
426 | Large-scale Incremental Processing Using Distributed Transactions and Notifications. | 2010 |
414 | Resource Overbooking and Application Profiling in Shared Hosting Platforms. | 2002 |
412 | Dealing with Disaster: Surviving Misbehaved Kernel Extensions. | 1996 |
406 | Difference Engine: Harnessing Memory Redundancy in Virtual Machines. | 2008 |
384 | Corey: An Operating System for Many Cores. | 2008 |
379 | A Feedback-driven Proportion Allocator for Real-Rate Scheduling. | 1999 |
377 | Availability in Globally Distributed Storage Systems. | 2010 |
375 | Making Paths Explicit in the Scout Operating System. | 1996 |
365 | Finding a Needle in Haystack: Facebook’s Photo Storage. | 2010 |
362 | Policies for Dynamic Clock Scheduling. | 2000 |
359 | Fast and Secure Distributed Read-Only File System. | 2000 |
359 | Enhancing Server Availability and Security Through Failure-Oblivious Computing. | 2004 |
356 | Improving the Reliability of Internet Paths with One-hop Source Routing. | 2004 |
347 | XFI: Software Guards for System Address Spaces. | 2006 |
340 | Lazy Receiver Processing (LRP): A Network Subsystem Architecture for Server Systems. | 1996 |
337 | Storage Alternatives for Mobile Computers. | 1994 |
332 | GraphX: Graph Processing in a Distributed Dataflow Framework. | 2014 |
328 | An Analysis of Linux Scalability to Many Cores. | 2010 |
320 | Using Model Checking to Find Serious File System Errors (Awarded Best Paper!). | 2004 |
316 | CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code. | 2004 |
309 | Scalable, Distributed Data Structures for Internet Service Construction. | 2000 |
308 | Self-Securing Storage: Protecting Data in Compromised Systems. | 2000 |
304 | The Coign Automatic Distributed Partitioning System. | 1999 |
294 | Chain Replication for Supporting High Throughput and Availability. | 2004 |
292 | BAR Gossip. | 2006 |
290 | Unmodified Device Driver Reuse and Improved System Dependability via Virtual Machines. | 2004 |
284 | Design and Evaluation of a Continuous Consistency Model for Replicated Services. | 2000 |
283 | BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML. | 2006 |
282 | Automatic Compiler-Inserted I/O Prefetching for Out-of-Core Applications. | 1996 |
281 | Performance Evaluation of Two Home-Based Lazy Release Consistency Protocols for Shared Virtual Memory Systems. | 1996 |
277 | Experiences Building PlanetLab. | 2006 |
266 | TCP Nice: A Mechanism for Background Transfers. | 2002 |
254 | Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java. | 2000 |
252 | Securing Software by Enforcing Data-flow Integrity. | 2006 |
251 | HQ Replication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance. | 2006 |
247 | Tornado: Maximizing Locality and Concurrency in a Shared Memory Multiprocessor Operating System. | 1999 |
246 | Scout: A Communications-Oriented Operating System (Abstract). | 1994 |
245 | SPORC: Group Collaboration using Untrusted Cloud Resources. | 2010 |
243 | Automatic Misconfiguration Troubleshooting with PeerPressure. | 2004 |
240 | Interposed Request Routing for Scalable Network Storage. | 2000 |
239 | Depot: Cloud Storage with Minimal Trust. | 2010 |
236 | Microkernels Meet Recursive Virtual Machines. | 1996 |
234 | PathFinder: A Pattern-Based Packet Classifier. | 1994 |
233 | The Turtles Project: Design and Implementation of Nested Virtualization. | 2010 |
227 | Fine-Grained Dynamic Instrumentation of Commodity Operating System Kernels. | 1999 |
223 | Proactive Recovery in a Byzantine-Fault-Tolerant System. | 2000 |
222 | Middleboxes No Longer Considered Harmful. | 2004 |
221 | Boxwood: Abstractions as the Foundation for Storage Infrastructure. | 2004 |
220 | Vertigo: Automatic Performance-Setting for Linux. | 2002 |
217 | Efficient System-Enforced Deterministic Parallelism. | 2010 |
215 | IO-Lite: A Unified I/O Buffering and Caching System. | 1999 |
214 | Automatic I/O Hint Generation Through Speculative Execution. | 1999 |
209 | COMET: Code Offload by Migrating Execution Transparently. | 2012 |
208 | A Caching Model of Operating System Kernel Functionality. | 1994 |
206 | Defending Against Denial of Service Attacks in Scout. | 1999 |
206 | How to Build a Trusted Database System on Untrusted Storage. | 2000 |
205 | CPU Inheritance Scheduling. | 1996 |
205 | The Effectiveness of Request Redirection on CDN Robustness. | 2002 |
204 | Integrated Resource Management for Cluster-based Internet Services. | 2002 |
203 | Taming Aggressive Replication in the Pangaea Wide-Area File System. | 2002 |
198 | Implementation and Performance of Application-Controlled File Caching. | 1994 |
193 | The Synergy Between Non-Blocking Synchronization and Operating System Structure. | 1996 |
193 | A Low-Overhead, High-Performance Unified Buffer Management Scheme That Exploits Sequential and Looping References. | 2000 |
190 | Scaling Distributed Machine Learning with the Parameter Server. | 2014 |
188 | Configuration Debugging as Search: Finding the Needle in the Haystack. | 2004 |
187 | Shielding Applications from an Untrusted Cloud with Haven. | 2014 |
183 | “Towards Higher Disk Head Utilization: Extracting “”Free”” Bandwidth from Busy Disk Drives. “ | 2000 |
181 | SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques. | 2006 |
178 | Quanto: Tracking Energy in Networked Embedded Systems. | 2008 |
176 | Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable. | 2006 |
174 | Practical, Transparent Operating System Support for Superpages. | 2002 |
173 | PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services. | 2004 |
172 | mClock: Handling Throughput Variability for Hypervisor IO Scheduling. | 2010 |
171 | Integrating Content-Based Access Mechanisms with Hierarchical File Systems. | 1999 |
171 | Piccolo: Building Fast, Distributed Programs with Partitioned Tables. | 2010 |
169 | A Trace-Driven Comparison of Algorithms for Parallel Prefetching and Caching. | 1996 |
168 | Knit: Component Composition for Systems Software. | 2000 |
164 | FlexSC: Flexible System Call Scheduling with Exception-Less System Calls. | 2010 |
160 | Virtual Log Based File Systems for a Programmable Disk. | 1999 |
160 | Cooperative I/O: A Novel I/O Semantics for Energy-Aware Applications. | 2002 |
159 | An Implementation of the Hamlyn Sender-Managed Interface Architecture. | 1996 |
158 | R2: An Application-Level Kernel for Record and Replay. | 2008 |
157 | Efficient Cooperative Caching Using Hints. | 1996 |
155 | Metadata Update Performance in File Systems. | 1994 |
155 | Making Geo-Replicated Systems Fast as Possible, Consistent when Necessary. | 2012 |
153 | Using Latency to Evaluate Interactive System Performance. | 1996 |
153 | Deterministic Process Groups in dOS. | 2010 |
152 | Devil: An IDL for Hardware Programming. | 2000 |
152 | Deadlock Immunity: Enabling Systems to Defend Against Deadlocks. | 2008 |
152 | Performance Isolation and Fairness for Multi-Tenant Cloud Storage. | 2012 |
150 | Mencius: Building Efficient Replicated State Machine for WANs. | 2008 |
148 | CoDNS: Improving DNS Performance and Reliability via Cooperative Lookups. | 2004 |
145 | Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions. | 2008 |
140 | Self-Paging in the Nemesis Operating System. | 1999 |
139 | EXPLODE: A Lightweight, General System for Finding Serious Storage System Errors. | 2006 |
139 | Project Adam: Building an Efficient and Scalable Deep Learning Training System. | 2014 |
136 | Persistent Personal Names for Globally Connected Mobile Devices. | 2006 |
136 | Arrakis: The Operating System is the Control Plane. | 2014 |
135 | Software Write Detection for a Distributed Shared Memory. | 1994 |
135 | Nectar: Automatic Management of Data and Computation in Datacenters. | 2010 |
133 | From Uncertainty to Belief: Inferring the Specification Within. | 2006 |
131 | Logical vs. Physical File System Backup. | 1999 |
131 | Understanding and Dealing with Operator Mistakes in Internet Services. | 2004 |
130 | Gadara: Dynamic Deadlock Avoidance for Multithreaded Programs. | 2008 |
130 | AppInsight: Mobile App Performance Monitoring in the Wild. | 2012 |
128 | Surplus Fair Scheduling: A Proportional-Share CPU Scheduling Algorithm for Symmetric Multiprocessors. | 2000 |
126 | The Design and Evaluation of a Shared Object System for Distributed Memory Machines. | 1994 |
126 | System Support for Bandwidth Management and Content Adaptation in Internet Applications. | 2000 |
126 | Effective Data-Race Detection for the Kernel. | 2010 |
124 | Code-Pointer Integrity. | 2014 |
123 | Distributed Filaments: Efficient Fine-Grain Parallelism on a Cluster of Workstations. | 1994 |
122 | Digging for Data Structures. | 2008 |
120 | Effects of Buffering Semantics on I/O Performance. | 1996 |
120 | Automating Configuration Troubleshooting with Dynamic Information Flow Analysis. | 2010 |
120 | IX: A Protected Dataplane Operating System for High Throughput and Low Latency. | 2014 |
119 | Energy-Efficiency and Storage Flexibility in the Blue File System. | 2004 |
117 | FFPF: Fairly Fast Packet Filters. | 2004 |
117 | Ad Hoc Synchronization Considered Harmful. | 2010 |
117 | X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software. | 2012 |
114 | Program-Counter-Based Pattern Classification in Buffer Caching. | 2004 |
112 | Dynamic Binding for an Extensible System. | 1996 |
112 | FlightPath: Obedience vs. Choice in Cooperative Services. | 2008 |
110 | Studies of Windows NT Performance Using Dynamic Execution Traces. | 1996 |
110 | Trading Capacity for Performance in a Disk Array. | 2000 |
107 | Transactional Flash. | 2008 |
107 | Device Driver Safety Through a Reference Validation Mechanism. | 2008 |
106 | Stable Deterministic Multithreading through Schedule Memoization. | 2010 |
106 | Flat Datacenter Storage. | 2012 |
105 | Dune: Safe User-level Access to Privileged CPU Features. | 2012 |
103 | MultiView and Millipage - Fine-Grain Sharing in Page-Based DSMs. | 1999 |
102 | Software Prefetching and Caching for Translation Lookaside Buffers. | 1994 |
101 | Performance Issues in Parallelized Network Protocols. | 1994 |
101 | Leveraging Legacy Code to Deploy Desktop Applications on the Web. | 2008 |
99 | CRAMM: Virtual Memory Support for Garbage-Collected Applications. | 2006 |
97 | Hails: Protecting Data Privacy in Untrusted Web Applications. | 2012 |
95 | Accountable Virtual Machines. | 2010 |
93 | Online Data-Race Detection via Coherency Guarantees. | 1996 |
93 | A Modular Network Layer for Sensornets. | 2006 |
93 | Everest: Scaling Down Peak Loads Through I/O Off-Loading. | 2008 |
89 | TensorFlow: A System for Large-Scale Machine Learning. | 2016 |
88 | Trust and Protection in the Illinois Browser Operating System. | 2010 |
87 | Stasis: Flexible Transactional Storage. | 2006 |
85 | Apollo: Scalable and Coordinated Scheduling for Cloud-Scale Computing. | 2014 |
84 | EnsemBlue: Integrating Distributed Storage and Consumer Electronics. | 2006 |
83 | HiPEC: High Performance External Virtual Memory Caching. | 1994 |
83 | Automated Concurrency-Bug Fixing. | 2012 |
81 | Dissent in Numbers: Making Strong Anonymity Scale. | 2012 |
80 | Hardware Enforcement of Application Security Policies Using Tagged Memory. | 2008 |
79 | Life or Death at Block-Level. | 2004 |
79 | CleanOS: Limiting Mobile Data Exposure with Idle Eviction. | 2012 |
79 | f4: Facebook’s Warm BLOB Storage System. | 2014 |
78 | The Design of a Multicast-Based Distributed File System. | 1999 |
77 | MegaPipe: A New Programming Interface for Scalable Network I/O. | 2012 |
77 | All about Eve: Execute-Verify Replication for Multi-Core Servers. | 2012 |
76 | Operating System Management of MEMS-based Storage Devices. | 2000 |
76 | Redline: First Class Support for Interactivity in Commodity Operating Systems. | 2008 |
75 | Supporting Time-Sensitive Applications on a Commodity OS. | 2002 |
75 | CuriOS: Improving Reliability through Operating System Structure. | 2008 |
74 | Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant Software. | 2002 |
72 | Intrusion Recovery Using Selective Re-execution. | 2010 |
71 | Taming the Memory Hogs: Using Compiler-Inserted Releases to Manage Physical Memory Intelligently. | 2000 |
71 | Exploring Failure Transparency and the Limits of Generic Recovery. | 2000 |
71 | Improving Integer Security for Systems with KINT. | 2012 |
70 | Lightweight Logging for Lazy Release Consistent Distributed Shared Memory. | 1996 |
69 | End-to-End Authorization. | 2000 |
69 | Static Checking of Dynamically-Varying Security Policies in Database-Backed Applications. | 2010 |
67 | Ironclad Apps: End-to-End Security via Automated Full-System Verification. | 2014 |
66 | Garbage Collection and DSM Consistency. | 1994 |
66 | Dynamic Page Mapping Policies for Cache Conflict Resolution on Standard Hardware. | 1994 |
66 | Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management. | 2006 |
65 | Comet: An active distributed key-value store. | 2010 |
64 | Integrating Coherency and Recoverability in Distributed Systems. | 1994 |
64 | Operating System Profiling via Latency Analysis. | 2006 |
64 | Binary Translation Using Peephole Superoptimizers. | 2008 |
63 | Lightweight, High-Resolution Monitoring for Troubleshooting Production Systems. | 2008 |
62 | Type-Safe Disks. | 2006 |
62 | Transactional Consistency and Automatic Management in an Application Data Cache. | 2010 |
60 | Distributed Directory Service in the Farsite File System. | 2006 |
57 | Bypassing Races in Live Applications with Execution Filters. | 2010 |
56 | Be Conservative: Enhancing Failure Diagnosis with Proactive Logging. | 2012 |
52 | SQCK: A Declarative File System Checker. | 2008 |
51 | Performance-Driven Processor Allocation. | 2000 |
51 | SymDrive: Testing Drivers without Devices. | 2012 |
49 | Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems. | 2014 |
48 | Network Imprecision: A New Consistency Metric for Scalable Monitoring. | 2008 |
47 | FUSE: Lightweight Guaranteed Distributed Failure Notification. | 2004 |
47 | Building Extensible Networks with Rule-Based Forwarding. | 2010 |
47 | Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels. | 2012 |
46 | Extracting More Concurrency from Distributed Transactions. | 2014 |
45 | End-to-end Performance Isolation Through Virtual Datacenters. | 2014 |
43 | Protecting Users by Confining JavaScript with COWL. | 2014 |
42 | All File Systems Are Not Created Equal: On the Complexity of Crafting Crash-Consistent Applications. | 2014 |
41 | A Comparison of Windows Driver Model Latency Performance on Windows NT and Windows 98. | 1999 |
38 | The Mystery Machine: End-to-end Performance Analysis of Large-scale Internet Services. | 2014 |
38 | The Power of Choice in Data-Aware Cluster Scheduling. | 2014 |
38 | Characterizing Storage Workloads with Counter Stacks. | 2014 |
37 | Phase Reconciliation for Contended In-Memory Transactions. | 2014 |
36 | Fast Databases with Fast Durability and Recovery Through Multicore Parallelism. | 2014 |
35 | Message-Driven Relaxed Consistency in a Software Distributed Shared Memory. | 1994 |
35 | Luna: A Flexible Java Protection System. | 2002 |
34 | DJoin: Differentially Private Join Queries over Distributed Databases. | 2012 |
34 | GPUnet: Networking Abstractions for GPU Programs. | 2014 |
33 | Experiences with Locking in a NUMA Multiprocessor Operating System Kernel. | 1994 |
32 | Experiences from a Decade of TinyOS Development. | 2012 |
32 | lprof: A Non-intrusive Request Flow Profiler for Distributed Systems. | 2014 |
31 | Active Networks (Abstract). | 1996 |
28 | Using Model Checking to Debug Device Firmware. | 2002 |
28 | Virtualize Everything but Time. | 2010 |
28 | A Self-Configurable Geo-Replicated Cloud Storage System. | 2014 |
27 | Eidetic Systems. | 2014 |
26 | Torturing Databases for Fun and Profit. | 2014 |
26 | SAMC: Semantic-Aware Model Checking for Fast Discovery of Deep Bugs in Cloud Systems. | 2014 |
26 | Decoupling Cores, Kernels, and Operating Systems. | 2014 |
26 | SCONE: Secure Linux Containers with Intel SGX. | 2016 |
25 | ksniffer: Determining the Remote Client Perceived Response Time from Live Packet Streams. | 2004 |
25 | StarTrack Next Generation: A Scalable Infrastructure for Track-Based Applications. | 2010 |
25 | Salt: Combining ACID and BASE in a Distributed Database. | 2014 |
25 | Customizable and Extensible Deployment for Mobile/Cloud Applications. | 2014 |
24 | Some Issues in the Design of an Extensible Operating System (Panel Statement). | 1994 |
24 | Deploying Safe User-Level Network Services with icTCP. | 2004 |
23 | Avoiding File System Micromanagement with Range Writes. | 2008 |
23 | Willow: A User-Programmable SSD. | 2014 |
21 | Pelican: A Building Block for Exascale Cold Data Storage. | 2014 |
20 | Recovering Device Drivers (Awarded Best Paper!). | 2004 |
20 | Spotting Code Optimizations in Data-Parallel Pipelines through PeriSCOPE. | 2012 |
20 | Pasture: Secure Offline Data Access Using Commodity Trusted Hardware. | 2012 |
20 | Detecting Covert Timing Channels with Time-Deterministic Replay. | 2014 |
20 | Heading Off Correlated Failures through Independence-as-a-Service. | 2014 |
19 | Optimizing the Idle Task and Other MMU Tricks. | 1999 |
19 | Pebbles: Fine-Grained Data Management Abstractions for Modern Operating Systems. | 2014 |
18 | Tapeworm: High-Level Abstractions of Shared Accesses. | 1999 |
18 | Latency Management in Storage Systems. | 2000 |
18 | Efficient Patch-based Auditing for Web Application Vulnerabilities. | 2012 |
18 | Jitk: A Trustworthy In-Kernel Interpreter Infrastructure. | 2014 |
17 | Enabling Configuration-Independent Automation by Non-Expert Users. | 2010 |
14 | Opportunistic Log: Efficient Installation Reads in a Reliable Storage Server. | 1994 |
14 | User-Guided Device Driver Synthesis. | 2014 |
14 | Pydron: Semi-Automatic Parallelization for Multi-Core and the Cloud. | 2014 |
13 | ETI Resource Distributor: Guaranteed Resource Allocation and Scheduling in Multimedia Systems. | 1999 |
13 | Connection Handoff Policies for TCP Offload Network Interfaces. | 2006 |
12 | SKI: Exposing Kernel Concurrency Bugs through Systematic Schedule Exploration. | 2014 |
12 | SHILL: A Secure Shell Scripting Language. | 2014 |
11 | Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data. | 2016 |
10 | Nail: A Practical Tool for Parsing and Generating Data Formats. | 2014 |
8 | JavaOS: Back to the Future (Abstract). | 1996 |
8 | Physical Disentanglement in a Container-Based File System. | 2014 |
8 | Gemini: A Computation-Centric Distributed Graph Processing System. | 2016 |
8 | FaSST: Fast, Scalable and Simple Distributed Transactions with Two-Sided (RDMA) Datagram RPCs. | 2016 |
7 | Low and High Risk Operating System Architectures (Panel Statement). | 1994 |
7 | Rethink the Sync (Awarded Best Paper!). | 2006 |
6 | Yak: A High-Performance Big-Data-Friendly Garbage Collector. | 2016 |
6 | GRAPHENE: Packing and Dependency-Aware Scheduling for Data-Parallel Clusters. | 2016 |
6 | Firmament: Fast, Centralized Cluster Scheduling at Scale. | 2016 |
6 | Morpheus: Towards Automated SLOs for Enterprise Clusters. | 2016 |
6 | Shuffler: Fast and Deployable Continuous Code Re-Randomization. | 2016 |
5 | The Exokernel Approach to Operating System Extensibility (Panel Statement). | 1994 |
5 | XFT: Practical Fault Tolerance beyond Crashes. | 2016 |
5 | Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata. | 2016 |
5 | Push-Button Verification of File Systems via Crash Refinement. | 2016 |
5 | NetBricks: Taking the V out of NFV. | 2016 |
5 | CLARINET: WAN-Aware Optimization for Analytics Queries. | 2016 |
4 | Identifying Information Disclosure in Web Applications with Retroactive Auditing. | 2014 |
4 | Altruistic Scheduling in Multi-Resource Clusters. | 2016 |
4 | Unobservable Communication over Fully Untrusted Infrastructure. | 2016 |
4 | Network Requirements for Resource Disaggregation. | 2016 |
4 | CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels. | 2016 |
3 | Exploring the Hidden Dimension in Graph Processing. | 2016 |
3 | Coordinated and Efficient Huge Page Management with Ingens. | 2016 |
3 | Big Data Analytics over Encrypted Datasets with Seabed. | 2016 |
3 | Just Say NO to Paxos Overhead: Replacing Consensus with Network Ordering. | 2016 |
3 | Early Detection of Configuration Errors to Reduce Failure Damage. | 2016 |
3 | Fast and Concurrent RDF Queries with RDMA-Based Distributed Graph Exploration. | 2016 |
2 | REX: A Development Platform and Online Learning Approach for Runtime Emergent Software Systems. | 2016 |
2 | Incremental Consistency Guarantees for Replicated Objects. | 2016 |
2 | Efficient Network Reachability Analysis Using a Succinct Control Plane Representation. | 2016 |
2 | JetStream: Cluster-Scale Parallelization of Information Flow Queries. | 2016 |
2 | Don’t Get Caught in the Cold, Warm-up Your JVM: Understand and Eliminate JVM Warm-up Overhead in Data-Parallel Systems. | 2016 |
2 | Intermittent Computation without Hardware Support or Programmer Intervention. | 2016 |
2 | Machine-Aware Atomic Broadcast Trees for Multicores. | 2016 |
2 | The SNOW Theorem and Latency-Optimal Read-Only Transactions. | 2016 |
2 | Consolidating Concurrency Control and Consensus for Commits under Conflicts. | 2016 |
2 | To Waffinity and Beyond: A Scalable Architecture for Incremental Parallelization of File System Code. | 2016 |
1 | Kraken: Leveraging Live Traffic Tests to Identify and Resolve Resource Utilization Bottlenecks in Large Scale Web Services. | 2016 |
1 | Slicer: Auto-Sharding for Datacenter Applications. | 2016 |
1 | Diamond: Automating Data Management and Storage for Wide-Area, Reactive Applications. | 2016 |
1 | Simplifying Datacenter Network Debugging with PathDump. | 2016 |
1 | History-Based Harvesting of Spare Cycles and Storage in Large-Scale Datacenters. | 2016 |
1 | EC-Cache: Load-Balanced, Low-Latency Cluster Caching with Online Erasure Coding. | 2016 |
0 | Panel: Radical Operating Systems Structures for Extensibility. | 1994 |
0 | High-Performance Microkernel Systems (Panel Statement). | 1994 |
0 | Interface and Execution Models in the Fluke Kernel. | 1999 |
0 | Non-Intrusive Performance Profiling for Entire Software Stacks Based on the Flow Reconstruction Principle. | 2016 |
0 | Light-Weight Contexts: An OS Abstraction for Safety and Performance. | 2016 |
0 | DQBarge: Improving Data-Quality Tradeoffs in Large-Scale Internet Services. | 2016 |
0 | EbbRT: A Framework for Building Per-Application Library Operating Systems. | 2016 |
0 | Realizing the Fault-Tolerance Promise of Cloud Storage Using Locks with Intent. | 2016 |
0 | Correlated Crash Vulnerabilities. | 2016 |
2016¶
Cited by | Paper title |
---|---|
89 | TensorFlow: A System for Large-Scale Machine Learning. |
26 | SCONE: Secure Linux Containers with Intel SGX. |
11 | Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data. |
8 | Gemini: A Computation-Centric Distributed Graph Processing System. |
8 | FaSST: Fast, Scalable and Simple Distributed Transactions with Two-Sided (RDMA) Datagram RPCs. |
6 | Yak: A High-Performance Big-Data-Friendly Garbage Collector. |
6 | GRAPHENE: Packing and Dependency-Aware Scheduling for Data-Parallel Clusters. |
6 | Firmament: Fast, Centralized Cluster Scheduling at Scale. |
6 | Morpheus: Towards Automated SLOs for Enterprise Clusters. |
6 | Shuffler: Fast and Deployable Continuous Code Re-Randomization. |
5 | XFT: Practical Fault Tolerance beyond Crashes. |
5 | Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata. |
5 | Push-Button Verification of File Systems via Crash Refinement. |
5 | NetBricks: Taking the V out of NFV. |
5 | CLARINET: WAN-Aware Optimization for Analytics Queries. |
4 | Altruistic Scheduling in Multi-Resource Clusters. |
4 | Unobservable Communication over Fully Untrusted Infrastructure. |
4 | Network Requirements for Resource Disaggregation. |
4 | CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels. |
3 | Exploring the Hidden Dimension in Graph Processing. |
3 | Coordinated and Efficient Huge Page Management with Ingens. |
3 | Big Data Analytics over Encrypted Datasets with Seabed. |
3 | Just Say NO to Paxos Overhead: Replacing Consensus with Network Ordering. |
3 | Early Detection of Configuration Errors to Reduce Failure Damage. |
3 | Fast and Concurrent RDF Queries with RDMA-Based Distributed Graph Exploration. |
2 | REX: A Development Platform and Online Learning Approach for Runtime Emergent Software Systems. |
2 | Incremental Consistency Guarantees for Replicated Objects. |
2 | Efficient Network Reachability Analysis Using a Succinct Control Plane Representation. |
2 | JetStream: Cluster-Scale Parallelization of Information Flow Queries. |
2 | Don’t Get Caught in the Cold, Warm-up Your JVM: Understand and Eliminate JVM Warm-up Overhead in Data-Parallel Systems. |
2 | Intermittent Computation without Hardware Support or Programmer Intervention. |
2 | Machine-Aware Atomic Broadcast Trees for Multicores. |
2 | The SNOW Theorem and Latency-Optimal Read-Only Transactions. |
2 | Consolidating Concurrency Control and Consensus for Commits under Conflicts. |
2 | To Waffinity and Beyond: A Scalable Architecture for Incremental Parallelization of File System Code. |
1 | Kraken: Leveraging Live Traffic Tests to Identify and Resolve Resource Utilization Bottlenecks in Large Scale Web Services. |
1 | Slicer: Auto-Sharding for Datacenter Applications. |
1 | Diamond: Automating Data Management and Storage for Wide-Area, Reactive Applications. |
1 | Simplifying Datacenter Network Debugging with PathDump. |
1 | History-Based Harvesting of Spare Cycles and Storage in Large-Scale Datacenters. |
1 | EC-Cache: Load-Balanced, Low-Latency Cluster Caching with Online Erasure Coding. |
0 | Non-Intrusive Performance Profiling for Entire Software Stacks Based on the Flow Reconstruction Principle. |
0 | Light-Weight Contexts: An OS Abstraction for Safety and Performance. |
0 | DQBarge: Improving Data-Quality Tradeoffs in Large-Scale Internet Services. |
0 | EbbRT: A Framework for Building Per-Application Library Operating Systems. |
0 | Realizing the Fault-Tolerance Promise of Cloud Storage Using Locks with Intent. |
0 | Correlated Crash Vulnerabilities. |
2014¶
Cited by | Paper title |
---|---|
332 | GraphX: Graph Processing in a Distributed Dataflow Framework. |
190 | Scaling Distributed Machine Learning with the Parameter Server. |
187 | Shielding Applications from an Untrusted Cloud with Haven. |
139 | Project Adam: Building an Efficient and Scalable Deep Learning Training System. |
136 | Arrakis: The Operating System is the Control Plane. |
124 | Code-Pointer Integrity. |
120 | IX: A Protected Dataplane Operating System for High Throughput and Low Latency. |
85 | Apollo: Scalable and Coordinated Scheduling for Cloud-Scale Computing. |
79 | f4: Facebook’s Warm BLOB Storage System. |
67 | Ironclad Apps: End-to-End Security via Automated Full-System Verification. |
49 | Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems. |
46 | Extracting More Concurrency from Distributed Transactions. |
45 | End-to-end Performance Isolation Through Virtual Datacenters. |
43 | Protecting Users by Confining JavaScript with COWL. |
42 | All File Systems Are Not Created Equal: On the Complexity of Crafting Crash-Consistent Applications. |
38 | The Mystery Machine: End-to-end Performance Analysis of Large-scale Internet Services. |
38 | The Power of Choice in Data-Aware Cluster Scheduling. |
38 | Characterizing Storage Workloads with Counter Stacks. |
37 | Phase Reconciliation for Contended In-Memory Transactions. |
36 | Fast Databases with Fast Durability and Recovery Through Multicore Parallelism. |
34 | GPUnet: Networking Abstractions for GPU Programs. |
32 | lprof: A Non-intrusive Request Flow Profiler for Distributed Systems. |
28 | A Self-Configurable Geo-Replicated Cloud Storage System. |
27 | Eidetic Systems. |
26 | Torturing Databases for Fun and Profit. |
26 | SAMC: Semantic-Aware Model Checking for Fast Discovery of Deep Bugs in Cloud Systems. |
26 | Decoupling Cores, Kernels, and Operating Systems. |
25 | Salt: Combining ACID and BASE in a Distributed Database. |
25 | Customizable and Extensible Deployment for Mobile/Cloud Applications. |
23 | Willow: A User-Programmable SSD. |
21 | Pelican: A Building Block for Exascale Cold Data Storage. |
20 | Detecting Covert Timing Channels with Time-Deterministic Replay. |
20 | Heading Off Correlated Failures through Independence-as-a-Service. |
19 | Pebbles: Fine-Grained Data Management Abstractions for Modern Operating Systems. |
18 | Jitk: A Trustworthy In-Kernel Interpreter Infrastructure. |
14 | User-Guided Device Driver Synthesis. |
14 | Pydron: Semi-Automatic Parallelization for Multi-Core and the Cloud. |
12 | SKI: Exposing Kernel Concurrency Bugs through Systematic Schedule Exploration. |
12 | SHILL: A Secure Shell Scripting Language. |
10 | Nail: A Practical Tool for Parsing and Generating Data Formats. |
8 | Physical Disentanglement in a Container-Based File System. |
4 | Identifying Information Disclosure in Web Applications with Retroactive Auditing. |
2012¶
Cited by | Paper title |
---|---|
878 | Spanner: Google’s Globally-Distributed Database. |
685 | PowerGraph: Distributed Graph-Parallel Computation on Natural Graphs. |
518 | GraphChi: Large-Scale Graph Computation on Just a PC. |
209 | COMET: Code Offload by Migrating Execution Transparently. |
155 | Making Geo-Replicated Systems Fast as Possible, Consistent when Necessary. |
152 | Performance Isolation and Fairness for Multi-Tenant Cloud Storage. |
130 | AppInsight: Mobile App Performance Monitoring in the Wild. |
117 | X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software. |
106 | Flat Datacenter Storage. |
105 | Dune: Safe User-level Access to Privileged CPU Features. |
97 | Hails: Protecting Data Privacy in Untrusted Web Applications. |
83 | Automated Concurrency-Bug Fixing. |
81 | Dissent in Numbers: Making Strong Anonymity Scale. |
79 | CleanOS: Limiting Mobile Data Exposure with Idle Eviction. |
77 | MegaPipe: A New Programming Interface for Scalable Network I/O. |
77 | All about Eve: Execute-Verify Replication for Multi-Core Servers. |
71 | Improving Integer Security for Systems with KINT. |
56 | Be Conservative: Enhancing Failure Diagnosis with Proactive Logging. |
51 | SymDrive: Testing Drivers without Devices. |
47 | Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels. |
34 | DJoin: Differentially Private Join Queries over Distributed Databases. |
32 | Experiences from a Decade of TinyOS Development. |
20 | Spotting Code Optimizations in Data-Parallel Pipelines through PeriSCOPE. |
20 | Pasture: Secure Offline Data Access Using Commodity Trusted Hardware. |
18 | Efficient Patch-based Auditing for Web Application Vulnerabilities. |
2010¶
Cited by | Paper title |
---|---|
2299 | TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. |
983 | Onix: A Distributed Control Platform for Large-scale Production Networks. |
499 | Reining in the Outliers in Map-Reduce Clusters using Mantri. |
464 | Can the Production Network Be the Testbed? |
426 | Large-scale Incremental Processing Using Distributed Transactions and Notifications. |
377 | Availability in Globally Distributed Storage Systems. |
365 | Finding a Needle in Haystack: Facebook’s Photo Storage. |
328 | An Analysis of Linux Scalability to Many Cores. |
245 | SPORC: Group Collaboration using Untrusted Cloud Resources. |
239 | Depot: Cloud Storage with Minimal Trust. |
233 | The Turtles Project: Design and Implementation of Nested Virtualization. |
217 | Efficient System-Enforced Deterministic Parallelism. |
172 | mClock: Handling Throughput Variability for Hypervisor IO Scheduling. |
171 | Piccolo: Building Fast, Distributed Programs with Partitioned Tables. |
164 | FlexSC: Flexible System Call Scheduling with Exception-Less System Calls. |
153 | Deterministic Process Groups in dOS. |
135 | Nectar: Automatic Management of Data and Computation in Datacenters. |
126 | Effective Data-Race Detection for the Kernel. |
120 | Automating Configuration Troubleshooting with Dynamic Information Flow Analysis. |
117 | Ad Hoc Synchronization Considered Harmful. |
106 | Stable Deterministic Multithreading through Schedule Memoization. |
95 | Accountable Virtual Machines. |
88 | Trust and Protection in the Illinois Browser Operating System. |
72 | Intrusion Recovery Using Selective Re-execution. |
69 | Static Checking of Dynamically-Varying Security Policies in Database-Backed Applications. |
65 | Comet: An active distributed key-value store. |
62 | Transactional Consistency and Automatic Management in an Application Data Cache. |
57 | Bypassing Races in Live Applications with Execution Filters. |
47 | Building Extensible Networks with Rule-Based Forwarding. |
28 | Virtualize Everything but Time. |
25 | StarTrack Next Generation: A Scalable Infrastructure for Track-Based Applications. |
17 | Enabling Configuration-Independent Automation by Non-Expert Users. |
2008¶
Cited by | Paper title |
---|---|
1640 | KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. |
1469 | Improving MapReduce Performance in Heterogeneous Environments. |
785 | DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language. |
477 | Finding and Reproducing Heisenbugs in Concurrent Programs. |
406 | Difference Engine: Harnessing Memory Redundancy in Virtual Machines. |
384 | Corey: An Operating System for Many Cores. |
178 | Quanto: Tracking Energy in Networked Embedded Systems. |
158 | R2: An Application-Level Kernel for Record and Replay. |
152 | Deadlock Immunity: Enabling Systems to Defend Against Deadlocks. |
150 | Mencius: Building Efficient Replicated State Machine for WANs. |
145 | Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions. |
130 | Gadara: Dynamic Deadlock Avoidance for Multithreaded Programs. |
122 | Digging for Data Structures. |
112 | FlightPath: Obedience vs. Choice in Cooperative Services. |
107 | Transactional Flash. |
107 | Device Driver Safety Through a Reference Validation Mechanism. |
101 | Leveraging Legacy Code to Deploy Desktop Applications on the Web. |
93 | Everest: Scaling Down Peak Loads Through I/O Off-Loading. |
80 | Hardware Enforcement of Application Security Policies Using Tagged Memory. |
76 | Redline: First Class Support for Interactivity in Commodity Operating Systems. |
75 | CuriOS: Improving Reliability through Operating System Structure. |
64 | Binary Translation Using Peephole Superoptimizers. |
63 | Lightweight, High-Resolution Monitoring for Troubleshooting Production Systems. |
52 | SQCK: A Declarative File System Checker. |
48 | Network Imprecision: A New Consistency Metric for Scalable Monitoring. |
23 | Avoiding File System Micromanagement with Range Writes. |
2006¶
Cited by | Paper title |
---|---|
5200 | Bigtable: A Distributed Storage System for Structured Data (Awarded Best Paper!). |
1116 | Ceph: A Scalable, High-Performance Distributed File System. |
921 | The Chubby Lock Service for Loosely-Coupled Distributed Systems. |
720 | Fidelity and Yield in a Volcano Monitoring Sensor Network. |
584 | iPlane: An Information Plane for Distributed Services. |
580 | Making Information Flow Explicit in HiStar. |
347 | XFI: Software Guards for System Address Spaces. |
292 | BAR Gossip. |
283 | BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML. |
277 | Experiences Building PlanetLab. |
252 | Securing Software by Enforcing Data-flow Integrity. |
251 | HQ Replication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance. |
181 | SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques. |
176 | Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable. |
139 | EXPLODE: A Lightweight, General System for Finding Serious Storage System Errors. |
136 | Persistent Personal Names for Globally Connected Mobile Devices. |
133 | From Uncertainty to Belief: Inferring the Specification Within. |
99 | CRAMM: Virtual Memory Support for Garbage-Collected Applications. |
93 | A Modular Network Layer for Sensornets. |
87 | Stasis: Flexible Transactional Storage. |
84 | EnsemBlue: Integrating Distributed Storage and Consumer Electronics. |
66 | Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management. |
64 | Operating System Profiling via Latency Analysis. |
62 | Type-Safe Disks. |
60 | Distributed Directory Service in the Farsite File System. |
13 | Connection Handoff Policies for TCP Offload Network Interfaces. |
7 | Rethink the Sync (Awarded Best Paper!). |
2004¶
Cited by | Paper title |
---|---|
20882 | MapReduce: Simplified Data Processing on Large Clusters. |
790 | Automated Worm Fingerprinting. |
634 | Using Magpie for Request Extraction and Workload Modelling. |
515 | Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control. |
486 | Microreboot - A Technique for Cheap Recovery. |
432 | Secure Untrusted Data Repository (SUNDR). |
359 | Enhancing Server Availability and Security Through Failure-Oblivious Computing. |
356 | Improving the Reliability of Internet Paths with One-hop Source Routing. |
320 | Using Model Checking to Find Serious File System Errors (Awarded Best Paper!). |
316 | CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code. |
294 | Chain Replication for Supporting High Throughput and Availability. |
290 | Unmodified Device Driver Reuse and Improved System Dependability via Virtual Machines. |
243 | Automatic Misconfiguration Troubleshooting with PeerPressure. |
222 | Middleboxes No Longer Considered Harmful. |
221 | Boxwood: Abstractions as the Foundation for Storage Infrastructure. |
188 | Configuration Debugging as Search: Finding the Needle in the Haystack. |
173 | PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services. |
148 | CoDNS: Improving DNS Performance and Reliability via Cooperative Lookups. |
131 | Understanding and Dealing with Operator Mistakes in Internet Services. |
119 | Energy-Efficiency and Storage Flexibility in the Blue File System. |
117 | FFPF: Fairly Fast Packet Filters. |
114 | Program-Counter-Based Pattern Classification in Buffer Caching. |
79 | Life or Death at Block-Level. |
47 | FUSE: Lightweight Guaranteed Distributed Failure Notification. |
25 | ksniffer: Determining the Remote Client Perceived Response Time from Live Packet Streams. |
24 | Deploying Safe User-Level Network Services with icTCP. |
20 | Recovering Device Drivers (Awarded Best Paper!). |
2002¶
Cited by | Paper title |
---|---|
3736 | TAG: A Tiny AGgregation Service for Ad-Hoc Sensor Networks. |
3029 | Fine-Grained Network Time Synchronization Using Reference Broadcasts. |
1563 | An Integrated Experimental Environment for Distributed Systems and Networks. |
1550 | Memory Resource Management in VMware ESX Server. |
1095 | Secure Routing for Structured Peer-to-Peer Overlay Networks. |
1076 | FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment. |
1053 | ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay. |
785 | An Analysis of Internet Content Delivery Systems. |
612 | Scalability and Accuracy in a Large-Scale Network Emulator. |
596 | Optimizing the Migration of Virtual Computers. |
586 | Ivy: A Read/Write Peer-to-Peer File System. |
553 | The Design and Implementation of Zap: A System for Migrating Computing Environments. |
536 | Scale and Performance in the Denali Isolation Kernel. |
476 | Pastiche: Making Backup Cheap and Easy. |
449 | CMC: A Pragmatic Approach to Model Checking Real Code. |
414 | Resource Overbooking and Application Profiling in Shared Hosting Platforms. |
266 | TCP Nice: A Mechanism for Background Transfers. |
220 | Vertigo: Automatic Performance-Setting for Linux. |
205 | The Effectiveness of Request Redirection on CDN Robustness. |
204 | Integrated Resource Management for Cluster-based Internet Services. |
203 | Taming Aggressive Replication in the Pangaea Wide-Area File System. |
174 | Practical, Transparent Operating System Support for Superpages. |
160 | Cooperative I/O: A Novel I/O Semantics for Energy-Aware Applications. |
75 | Supporting Time-Sensitive Applications on a Commodity OS. |
74 | Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant Software. |
35 | Luna: A Flexible Java Protection System. |
28 | Using Model Checking to Debug Device Firmware. |
2000¶
Cited by | Paper title |
---|---|
1541 | Overcast: Reliable Multicasting with an Overlay Network. |
686 | Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions. |
362 | Policies for Dynamic Clock Scheduling. |
359 | Fast and Secure Distributed Read-Only File System. |
309 | Scalable, Distributed Data Structures for Internet Service Construction. |
308 | Self-Securing Storage: Protecting Data in Compromised Systems. |
284 | Design and Evaluation of a Continuous Consistency Model for Replicated Services. |
254 | Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java. |
240 | Interposed Request Routing for Scalable Network Storage. |
223 | Proactive Recovery in a Byzantine-Fault-Tolerant System. |
206 | How to Build a Trusted Database System on Untrusted Storage. |
193 | A Low-Overhead, High-Performance Unified Buffer Management Scheme That Exploits Sequential and Looping References. |
183 | “Towards Higher Disk Head Utilization: Extracting “”Free”” Bandwidth from Busy Disk Drives. “ |
168 | Knit: Component Composition for Systems Software. |
152 | Devil: An IDL for Hardware Programming. |
128 | Surplus Fair Scheduling: A Proportional-Share CPU Scheduling Algorithm for Symmetric Multiprocessors. |
126 | System Support for Bandwidth Management and Content Adaptation in Internet Applications. |
110 | Trading Capacity for Performance in a Disk Array. |
76 | Operating System Management of MEMS-based Storage Devices. |
71 | Taming the Memory Hogs: Using Compiler-Inserted Releases to Manage Physical Memory Intelligently. |
71 | Exploring Failure Transparency and the Limits of Generic Recovery. |
69 | End-to-End Authorization. |
51 | Performance-Driven Processor Allocation. |
18 | Latency Management in Storage Systems. |
1999¶
Cited by | Paper title |
---|---|
1393 | Practical Byzantine Fault Tolerance. |
856 | Resource Containers: A New Facility for Resource Management in Server Systems. |
379 | A Feedback-driven Proportion Allocator for Real-Rate Scheduling. |
304 | The Coign Automatic Distributed Partitioning System. |
247 | Tornado: Maximizing Locality and Concurrency in a Shared Memory Multiprocessor Operating System. |
227 | Fine-Grained Dynamic Instrumentation of Commodity Operating System Kernels. |
215 | IO-Lite: A Unified I/O Buffering and Caching System. |
214 | Automatic I/O Hint Generation Through Speculative Execution. |
206 | Defending Against Denial of Service Attacks in Scout. |
171 | Integrating Content-Based Access Mechanisms with Hierarchical File Systems. |
160 | Virtual Log Based File Systems for a Programmable Disk. |
140 | Self-Paging in the Nemesis Operating System. |
131 | Logical vs. Physical File System Backup. |
103 | MultiView and Millipage - Fine-Grain Sharing in Page-Based DSMs. |
78 | The Design of a Multicast-Based Distributed File System. |
41 | A Comparison of Windows Driver Model Latency Performance on Windows NT and Windows 98. |
19 | Optimizing the Idle Task and Other MMU Tricks. |
18 | Tapeworm: High-Level Abstractions of Shared Accesses. |
13 | ETI Resource Distributor: Guaranteed Resource Allocation and Scheduling in Multimedia Systems. |
0 | Interface and Execution Models in the Fluke Kernel. |
1996¶
Cited by | Paper title |
---|---|
709 | Safe Kernel Extensions Without Run-Time Checking. |
560 | A Hierarchical CPU Scheduler for Multimedia Operating Systems. |
412 | Dealing with Disaster: Surviving Misbehaved Kernel Extensions. |
375 | Making Paths Explicit in the Scout Operating System. |
340 | Lazy Receiver Processing (LRP): A Network Subsystem Architecture for Server Systems. |
282 | Automatic Compiler-Inserted I/O Prefetching for Out-of-Core Applications. |
281 | Performance Evaluation of Two Home-Based Lazy Release Consistency Protocols for Shared Virtual Memory Systems. |
236 | Microkernels Meet Recursive Virtual Machines. |
205 | CPU Inheritance Scheduling. |
193 | The Synergy Between Non-Blocking Synchronization and Operating System Structure. |
169 | A Trace-Driven Comparison of Algorithms for Parallel Prefetching and Caching. |
159 | An Implementation of the Hamlyn Sender-Managed Interface Architecture. |
157 | Efficient Cooperative Caching Using Hints. |
153 | Using Latency to Evaluate Interactive System Performance. |
120 | Effects of Buffering Semantics on I/O Performance. |
112 | Dynamic Binding for an Extensible System. |
110 | Studies of Windows NT Performance Using Dynamic Execution Traces. |
93 | Online Data-Race Detection via Coherency Guarantees. |
70 | Lightweight Logging for Lazy Release Consistent Distributed Shared Memory. |
31 | Active Networks (Abstract). |
8 | JavaOS: Back to the Future (Abstract). |
1994¶
Cited by | Paper title |
---|---|
1359 | Scheduling for Reduced CPU Energy. |
998 | Lottery Scheduling: Flexible Proportional-Share Resource Management. |
734 | Cooperative Caching: Using Remote Client Memory to Improve File System Performance. |
452 | Disk-directed I/O for MIMD Multiprocessors. |
337 | Storage Alternatives for Mobile Computers. |
246 | Scout: A Communications-Oriented Operating System (Abstract). |
234 | PathFinder: A Pattern-Based Packet Classifier. |
208 | A Caching Model of Operating System Kernel Functionality. |
198 | Implementation and Performance of Application-Controlled File Caching. |
155 | Metadata Update Performance in File Systems. |
135 | Software Write Detection for a Distributed Shared Memory. |
126 | The Design and Evaluation of a Shared Object System for Distributed Memory Machines. |
123 | Distributed Filaments: Efficient Fine-Grain Parallelism on a Cluster of Workstations. |
102 | Software Prefetching and Caching for Translation Lookaside Buffers. |
101 | Performance Issues in Parallelized Network Protocols. |
83 | HiPEC: High Performance External Virtual Memory Caching. |
66 | Garbage Collection and DSM Consistency. |
66 | Dynamic Page Mapping Policies for Cache Conflict Resolution on Standard Hardware. |
64 | Integrating Coherency and Recoverability in Distributed Systems. |
35 | Message-Driven Relaxed Consistency in a Software Distributed Shared Memory. |
33 | Experiences with Locking in a NUMA Multiprocessor Operating System Kernel. |
24 | Some Issues in the Design of an Extensible Operating System (Panel Statement). |
14 | Opportunistic Log: Efficient Installation Reads in a Reliable Storage Server. |
7 | Low and High Risk Operating System Architectures (Panel Statement). |
5 | The Exokernel Approach to Operating System Extensibility (Panel Statement). |
0 | Panel: Radical Operating Systems Structures for Extensibility. |
0 | High-Performance Microkernel Systems (Panel Statement). |