


default search action
ACM Transactions on Computer Systems, Volume 36
Volume 36, Number 1, February 2018
- Rachid Guerraoui

, Hugo Guiroux, Renaud Lachaize, Vivien Quéma, Vasileios Trigonakis:
Lock-Unlock: Is That All? A Pragmatic Analysis of Locking in Software Systems. 1:1-1:149 - Boyan Zhao

, Rui Hou, Jianbo Dong, Michael C. Huang
, Sally A. McKee, Qianlong Zhang, Yueji Liu, Ye Li, Lixin Zhang, Dan Meng:
Venice: An Effective Resource Sharing Architecture for Data Center Servers. 2:1-2:26 - Xuanhua Shi, Zhixiang Ke, Yongluan Zhou

, Hai Jin, Lu Lu, Xiong Zhang, Ligang He, Zhenyu Hu, Fei Wang:
Deca: A Garbage Collection Optimizer for In-Memory Data Processing. 3:1-3:47
Volume 36, Number 2, May 2018
- Sagar Jha, Jonathan Behrens, Theo Gkountouvas, Mae Milano

, Weijia Song, Edward Tremel
, Robbert van Renesse, Sydney Zink, Kenneth P. Birman
:
Derecho: Fast State Machine Replication for Cloud Services. 4:1-4:49 - Shai Bergman, Tanya Brokhman, Tzachi Cohen, Mark Silberstein:

SPIN: Seamless Operating System Integration of Peer-to-Peer DMA Between SSDs and GPUs. 5:1-5:26 - Stanko Novakovic, Alexandros Daglis, Dmitrii Ustiugov, Edouard Bugnion, Babak Falsafi, Boris Grot:

Mitigating Load Imbalance in Distributed Data Serving with Rack-Scale Memory Pooling. 6:1-6:37
Volume 36, Number 3, August 2018
- Xabier Iturbe

, Balaji Venu
, Emre Ozer, Jean-Luc Poupat, Gregoire Gimenez
, Hans-Ulrich Zurek:
The Arm Triple Core Lock-Step (TCLS) Processor. 7:1-7:30 - Sam Ainsworth

, Timothy M. Jones
:
Software Prefetching for Indirect Memory Accesses: A Microarchitectural Perspective. 8:1-8:34 - Yunji Chen

, Huiying Lan
, Zidong Du, Shaoli Liu, Jinhua Tao, Dong Han, Tao Luo, Qi Guo, Ling Li, Yuan Xie, Tianshi Chen:
An Instruction Set Architecture for Machine Learning. 9:1-9:35
Volume 36, Number 4, November 2018
- Jia-Ju Bai, Julia Lawall, Shi-Min Hu

:
Effective Detection of Sleep-in-atomic-context Bugs in the Linux Kernel. 10:1-10:30 - Dahlia Malkhi, Dan Tsafrir:

Introduction to the Special Issue on the Award Papers of USENIX ATC 2019. 11:1-11:2 - Oana Balmau, Florin Dinu, Willy Zwaenepoel, Karan Gupta, Ravishankar Chandhiramoorthi, Diego Didona:

SILK+ Preventing Latency Spikes in Log-Structured Merge Key-Value Stores Running Heterogeneous Workloads. 12:1-12:27 - Tanakorn Leesatapornwongsa, Aritra Sengupta, Masoud Saeida Ardekani, Gustavo Petri, Cesar A. Stuardo:

Transactuations: Where Transactions Meet the Physical World. 13:1-13:31 - Tom Spink

, Harry Wagstaff, Björn Franke:
A Retargetable System-level DBT Hypervisor. 14:1-14:24 - Sagar Jha:

Corrigendum to "Derecho: Fast State Machine Replication for Cloud Services" by Jha et al., ACM Transactions on Computer Systems (TOCS) Volume 36, Issue 2, Article No. 4. 15:1

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














