


default search action
20th SOSP 2005: Brighton, UK
- Andrew Herbert, Kenneth P. Birman:

Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, SOSP 2005, Brighton, UK, October 23-26, 2005. ACM 2005, ISBN 1-59593-079-5
Opening Session and Keynote Speech
- Kenneth P. Birman:

Opening remarks. - Andrew S. Tanenbaum:

Keynote speech.
Integrity and isolation
- Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla:

Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. 1-16 - Petros Efstathopoulos, Maxwell N. Krohn, Steve Vandebogart, Cliff Frey, David Ziegler, Eddie Kohler, David Mazières, M. Frans Kaashoek, Robert Morris:

Labels and event processes in the Asbestos operating system. 17-30 - Emmett Witchel

, Junghwan Rhee, Krste Asanovic:
Mondrix: memory isolation for linux using mondriaan memory protection. 31-44
Distributed systems
- Amitanand S. Aiyer, Lorenzo Alvisi, Allen Clement, Michael Dahlin, Jean-Philippe Martin, Carl Porth:

BAR fault tolerance for cooperative services. 45-58 - Michael Abd-El-Malek, Gregory R. Ganger, Garth R. Goodson, Michael K. Reiter, Jay J. Wylie:

Fault-scalable Byzantine fault-tolerant services. 59-74 - Boon Thau Loo

, Tyson Condie, Joseph M. Hellerstein, Petros Maniatis, Timothy Roscoe, Ion Stoica:
Implementing declarative overlays. 75-90
History and context
- Ashlesha Joshi, Samuel T. King, George W. Dunlap, Peter M. Chen:

Detecting past and present intrusions through vulnerability-specific predicates. 91-104 - Ira Cohen, Steve Zhang, Moisés Goldszmidt, Julie Symons, Terence Kelly, Armando Fox:

Capturing, indexing, clustering, and retrieving system history. 105-118 - Craig A. N. Soules, Gregory R. Ganger:

Connections: using context to enhance file search. 119-132
Containment
- Manuel Costa, Jon Crowcroft, Miguel Castro, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham:

Vigilante: end-to-end containment of internet worms. 133-147 - Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage:

Scalability, fidelity, and containment in the potemkin virtual honeyfarm. 148-162 - Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li, Eyal de Lara:

The taser intrusion recovery system. 163-176
Filesystems
- Qingbo Zhu, Zhifeng Chen, Lin Tan, Yuanyuan Zhou, Kimberly Keeton

, John Wilkes:
Hibernator: helping disk arrays sleep through the winter. 177-190 - Edmund B. Nightingale, Peter M. Chen, Jason Flinn:

Speculative execution in a distributed file system. 191-205 - Vijayan Prabhakaran, Lakshmi N. Bairavasundaram, Nitin Agrawal, Haryadi S. Gunawi, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau:

IRON file systems. 206-220
Bugs
- Yuan Yu, Tom Rodeheffer, Wei Chen:

RaceTrack: efficient detection of data race conditions via adaptive tracking. 221-234 - Feng Qin, Joseph A. Tucek, Jagadeesan Sundaresan, Yuanyuan Zhou:

Rx: treating bugs as allergies - a safe method to survive software failures. 235-248
Optimization
- Lars Eggert, Joseph D. Touch:

Idletime scheduling with preemption intervals. 249-262 - Hai Huang, Wanda Hung, Kang G. Shin:

FS2: dynamic data replication in free disk space for improving disk performance and energy consumption. 263-276 - Ricardo A. Baratto, Leonard N. Kim, Jason Nieh

:
THINC: a virtual display architecture for thin-client computing. 277-290
Panel Session
- Peer to peer: still useless?

- Are P2P concepts worth pursuing?

- P2p: still worthless?

- Jon Crowcroft:

Peerlessness is next to godlessness.
Poster session
- AAron Walters, Cristina Nita-Rotaru:

Analysis of malicious abstract sensor faults in adaptive measurement-based overlay networks. 1-2 - Michael R. Hines, Mark Lewandowski, Kartik Gopalan

:
Anemone: adaptive network memory engine. 1 - Christopher Stewart

, Kai Shen:
Daphne: performance debugging using model-driven anomaly characterization. 1-2 - David Oppenheimer, Brent N. Chun, David A. Patterson, Alex C. Snoeren, Amin Vahdat:

Service placement in shared wide-area platforms. 1 - Edgar A. León

, Michal Ostrowski:
An infrastructure for the development of kernel network services proof of concept: fast UDP. 1-2 - Emmanuel Jeanvoine:

Distributed operating system for resource discovery and allocation in federated clusters. 1-2 - Hiroo Ishikawa, Tatsuo Nakajima, Shuichi Oikawa, Toshio Hirotsu:

Proactive operating system recovery. 1-2 - Jin Liang, Steven Y. Ko, Indranil Gupta, Klara Nahrstedt:

MON: management overlay networks for distributed systems. 1-2 - Kenji Kise, Takahiro Katagiri, Hiroki Honda, Toshitsugu Yuba:

Towards scalable and simple software-DSM systems. 1-13 - Kiran Nagaraja, Andrew Tjang, Fábio Oliveira, Ricardo Bianchini, Richard P. Martin, Thu D. Nguyen:

Model-based validation for dealing with operator mistakes. 1-2 - Lin Gu, John A. Stankovic:

t-kernel: a naturalizing OS kernel for low-power cost-effective computers. 1-2 - Rebekah Leslie, Mark P. Jones:

Operating system construction in Haskell. 1-2 - Shlomi Dolev, Reuven Yagel:

Self-stabilizing operating systems. 1-2 - Terence Kelly:

Transaction mix performance models: methods and application to performance anomaly detection. 1-3 - Vivek Sawant, Jasleen Kaur:

Supporting arbitrary queries in peer-to-peer networks using hybrid routing. 1-2 - Kevin Walsh, Emin Gün Sirer:

The case for an object-based peer-to-peer reputation system. 1-2 - Olga Brukman, Shlomi Dolev, Marcelo Sihman:

Recovery oriented programming. 1 - Yee Jiun Song, Venugopalan Ramasubramanian, Emin Gün Sirer:

CobWeb: a proactive analysis-driven approach to content distribution. 1-3 - Bryan Ford

, Jacob Strauss, Chris Lesniewski-Laas, M. Frans Kaashoek, Robert Morris, Sean C. Rhea:
UIA: a user information architecture for personal devices. 1-2 - João Barreto

, Paulo Ferreira
:
Efficient file storage using content-based indexing. 1-9 - Dan R. K. Ports, Austin T. Clements, Erik D. Demaine:

PersiFS: a versioned file system with an efficient representation. 1-2 - Willem de Bruijn, Herbert Bos

:
OS support for multi-gigabit networking. 1-2 - Ramakrishna Gummadi, Nupur Kothari, Ramesh Govindan, Todd D. Millstein:

Kairos: a macro-programming system for wireless sensor networks. 1-2 - Patrick Reynolds, Janet L. Wiener, Jeffrey C. Mogul, Mehul A. Shah, Charles Killian, Amin Vahdat:

Experiences with Pip: finding unexpected behavior in distributed systems. 1-2 - Stefan Pleisch, Ken Birman

:
Scalable querying and tracking of sensor networks from mobile platforms. 1-2 - Xuezheng Liu, Aimin Pan, Wei Lin, Zheng Zhang:

Using model checker and replay facility to debug complex distributed system. 1 - Joshua LeVasseur, Volkmar Uhlig, Ben Leslie, Matthew Chapman, Gernot Heiser:

Pre-virtualization: uniting two worlds. 1-2 - Diwaker Gupta, Kenneth Yocum, Marvin McNett, Alex C. Snoeren, Amin Vahdat, Geoffrey M. Voelker:

To infinity and beyond: time warped network emulation. 1-2 - Shankar Pasupathy, Garth R. Goodson, Vijayan Prabhakaran:

Making enterprise storage more search-friendly. 1-2 - Nikolai Joukov, Rakesh Iyer, Avishay Traeger, Charles P. Wright, Erez Zadok:

Versatile, portable, and efficient OS profiling via latency analysis. 1-14 - Christian Poellabauer

, Timothy Durnan:
The case for judicious resource management. 1-2
Work in progress session
- Matt Welsh, Geoff Werner-Allen, Konrad Lorincz, Omar Marcillo, Jeff Johnson, Mario Ruiz

, Jonathan Lees
:
Sensor networks for high-resolution monitoring of volcanic activity. 1 - Aydan R. Yumerefendi, Landon P. Cox:

LLSS: toward system support for plugging privacy leaks. 1 - Alan Shieh, Dan Williams, Emin Gün Sirer, Fred B. Schneider:

Nexus: a new operating system for trustworthy computing. 1-2 - Saikat Guha, Paul Francis:

Architecting a secure internet. 1 - Niraj Tolia, David G. Andersen, Michael Kaminsky, Swapnil V. Patil:

What the protocol stack missed: the transfer service. 1-2 - Wenjun Hu, Sachin Katti, Hariharan Rahul, Dina Katabi, Jon Crowcroft:

Sending more for less bandwidth and power: a systems approach to network coding. 1-2 - Tyson Condie, Joseph M. Hellerstein, Petros Maniatis, Sean C. Rhea, Timothy Roscoe:

A need for componentized transport protocols. 1-2 - Kenji Kaneda, Yoshihiro Oyama, Akinori Yonezawa:

A virtual machine monitor for utilizing non-dedicated clusters. 1-2 - Timothy Durnan, Christian Poellabauer

:
DDVS: distributed dynamic voltage scaling. 1 - Matthew E. Tolentino, Kirk W. Cameron

:
Improving the energy efficiency of high-performance server systems. 1 - Dominic G. Lucchetti, Steven K. Reinhardt, Peter M. Chen:

ExtraVirt: detecting and recovering from transient processor faults. 1-2 - Andrew Baumann, Jonathan Appavoo:

Improving dynamic update for operating systems. 1-2 - Jay A. Patel, Charles M. Yang, Indranil Gupta:

Turning flash crowds into smart mobs with real-time stochastic detection and adaptive cooperative caching. 1 - Andrew de los Reyes, Christopher Frost, Eddie Kohler, Mike Mammarella, Lei Zhang:

The KudOS architecture for file systems. 1-2 - Kenji Kaneda, Yoshihiro Oyama, Akinori Yonezawa:

A virtual machine monitor for utilizing non-dedicated clusters. 1-2 - Navendu Jain, Praveen Yalagandula, Mike Dahlin, Yin Zhang:

INSIGHT: a distributed monitoring system for tracking continuous queries. 1

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














