


default search action
EuroSys 2014: Amsterdam, The Netherlands
- Dick C. A. Bulterman, Herbert Bos, Antony I. T. Rowstron, Peter Druschel:

Ninth Eurosys Conference 2014, EuroSys 2014, Amsterdam, The Netherlands, April 13-16, 2014. ACM 2014, ISBN 978-1-4503-2704-6
Data center computing
- Wentao Han, Youshan Miao, Kaiwei Li, Ming Wu, Fan Yang, Lidong Zhou, Vijayan Prabhakaran, Wenguang Chen, Enhong Chen:

Chronos: a graph engine for temporal graph analysis. 1:1-1:14 - Jian Tan, Alicia Chin, Zane Zhenhua Hu, Yonggang Hu, Shicong Meng, Xiaoqiao Meng, Li Zhang:

DynMR: dynamic MapReduce with ReduceTask interleaving and MapTask backfilling. 2:1-2:14 - Robert Escriva, Ayush Dubey, Bernard Wong, Emin Gün Sirer:

Kronos: the design and implementation of an event ordering service. 3:1-3:14 - Jacob Leverich, Christos Kozyrakis:

Reconciling high server utilization and sub-millisecond quality-of-service. 4:1-4:14
Networking
- Junlan Zhou, Malveeka Tewari, Min Zhu, Abdul Kabbani, Leon Poutievski, Arjun Singh, Amin Vahdat:

WCMP: weighted cost multipathing for improved fairness in data centers. 5:1-5:14 - Kyriakos Zarifis, Rui Miao, Matt Calder, Ethan Katz-Bassett, Minlan Yu, Jitendra Padhye:

DIBS: just-in-time congestion mitigation for data centers. 6:1-6:14 - Jay Chen, Lakshmi Subramanian, Janardhan R. Iyengar, Bryan Ford

:
TAQ: enhancing fairness and performance predictability in small packet regimes. 7:1-7:14
Security
- Bhushan Jain, Chia-Che Tsai

, Jitin John, Donald E. Porter:
Practical techniques to obviate setuid-to-root binaries. 8:1-8:14 - Chia-Che Tsai

, Kumar Saurabh Arora, Nehal Bandi, Bhushan Jain, William Jannen, Jitin John, Harry A. Kalodner, Vrushali Kulkarni, Daniela Oliveira, Donald E. Porter:
Cooperation and security isolation of library OSes for multi-process applications. 9:1-9:14 - Patrick Koeberl, Steffen Schulz, Ahmad-Reza Sadeghi, Vijay Varadharajan

:
TrustLite: a security architecture for tiny embedded devices. 10:1-10:14
Misc
- Zhenyu Guo, Chuntao Hong, Mao Yang, Dong Zhou, Lidong Zhou, Li Zhuang:

Rex: replication at the speed of multi-core. 11:1-11:14 - Marios Fragkoulis, Diomidis Spinellis

, Panos Louridas, Angelos Bilas
:
Relational access to Unix kernel data structures. 12:1-12:14 - Kianoosh Mokhtarian, Hans-Arno Jacobsen:

Caching in video CDNs: building strong lines of defense. 13:1-13:13
Storage I
- Haris Volos, Sanketh Nalli, Sankaralingam Panneerselvam, Venkatanathan Varadarajan, Prashant Saxena, Michael M. Swift:

Aerie: flexible file-system interfaces to storage-class memory. 14:1-14:14 - Dulloor Subramanya Rao, Sanjay Kumar, Anil S. Keshavamurthy, Philip Lantz, Dheeraj Reddy, Rajesh Sankaran, Jeff Jackson:

System software for persistent memory. 15:1-15:15 - Peng Wang, Guangyu Sun, Song Jiang, Jian Ouyang, Shiding Lin, Chen Zhang

, Jason Cong:
An efficient design and implementation of LSM-tree based key-value store on open-channel SSD. 16:1-16:14 - David Shue, Michael J. Freedman:

From application requests to virtual IOPs: provisioned key-value storage with Libra. 17:1-17:14
Reliability
- Gang Hu, Xinhao Yuan, Yang Tang, Junfeng Yang:

Efficiently, effectively detecting mobile app bugs with AppDoctor. 18:1-18:15 - Jonathan Anderson

, Robert N. M. Watson, David Chisnall
, Khilan Gudka, Ilias Marinos, Brooks Davis:
TESLA: temporally enhanced system logic assertions. 19:1-19:14 - Gokcen Kestor

, Osman S. Unsal
, Adrián Cristal
, Serdar Tasiran:
T-Rex: a dynamic race detection tool for C/C++ transactional memory applications. 20:1-20:12
Storage II
- Fabien André, Anne-Marie Kermarrec, Erwan Le Merrer, Nicolas Le Scouarnec, Gilles Straub, Alexandre van Kempen

:
Archiving cold data in warehouses with clustered network coding. 21:1-21:14 - Ping Huang, Guanying Wu, Xubin He, Weijun Xiao:

An aggressive worn-out flash block management scheme to alleviate SSD performance degradation. 22:1-22:14 - Sriram Subramanian

, Swaminathan Sundararaman, Nisha Talagala, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau:
Snapshots in a flash with ioSnap. 23:1-23:14
Concurrency
- Tim Harris, Martin Maas, Virendra J. Marathe:

Callisto: co-scheduling parallel runtime systems. 24:1-24:14 - Dan Alistarh, Patrick Eugster, Maurice Herlihy, Alexander Matveev, Nir Shavit:

StackTrack: an automated transactional approach to concurrent memory reclamation. 25:1-25:14 - Zhaoguo Wang, Hao Qian, Jinyang Li, Haibo Chen:

Using restricted transactional memory to build a scalable in-memory database. 26:1-26:15 - Xiaozhou Li, David G. Andersen, Michael Kaminsky, Michael J. Freedman:

Algorithmic improvements for fast concurrent Cuckoo hashing. 27:1-27:14

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














