Abstract is missing.
- Elephant: The File System That Never ForgetsDouglas J. Santry, Michael J. Feeley, Norman C. Hutchinson, Alistair C. Veitch. 2-7 [doi]
- Caching Documents with Active PropertiesEyal de Lara, Karin Petersen, Douglas B. Terry, Anthony LaMarca, James D. Thornton, Michael Salisbury, Paul Dourish, W. Keith Edwards, John Lamping. 8-13 [doi]
- The Case for Efficient File Access Pattern ModelingTom M. Kroeger, Darrell D. E. Long. 14-19 [doi]
- The Box: A Replacement for FilesFrancisco J. Ballesteros, Sergio Arévalo. 24 [doi]
- OS Support for General-Purpose RoutersLarry L. Peterson, Scott Karlin, Kai Li. 38-43 [doi]
- Conductor: A Framework for Distributed AdaptationMark Yarvis, Peter L. Reiher, Gerald J. Popek. 44 [doi]
- An End-System Architecture for Unified Congestion ManagementHariharan Shankar Rahul, Hari Balakrishnan, Srinivasan Seshan. 52-57 [doi]
- The Case for Informed Transport ProtocolsStefan Savage, Neal Cardwell, Thomas E. Anderson. 58-63 [doi]
- Transparent Communication Management in Wireless NetworksDavid Kidston, James P. Black, Thomas Kunz. 64-69 [doi]
- The Case for Better Throughput EstimationBrian Noble, Li Li, Atul Prakash. 70-75 [doi]
- Operating Systems Support for Programmable Cluster-based Internet RoutersPrashant Pradhan, Tzi-cker Chiueh. 76-81 [doi]
- A Case for Buffer ServersDarrell C. Anderson, Ken Yocum, Jeffrey S. Chase. 82 [doi]
- Brittle Metrics in Operating Systems ResearchJeffrey C. Mogul. 90-95 [doi]
- The Problems You re Having May Not Be the Problems You Think You re Having: Results from a Latency Study of Windows NTMichael B. Jones, John Regehr. 96-101 [doi]
- The Case for Application-Specific BenchmarkingMargo I. Seltzer, David Krinsky, Keith A. Smith, Xiaolan Zhang. 102 [doi]
- Intra-Address Space Protection using Segmentation HardwareTzi-cker Chiueh, Ganesh Venkitachalam, Prashant Pradhan. 110-115 [doi]
- Drawing the Red Line in JavaGodmar Back, Wilson C. Hsieh. 116-121 [doi]
- Hey, You Got Your Compiler in My Operating System!Jon Howell, Mark H. Montague. 122 [doi]
- Soft Real Time Scheduling for General Purpose Client-Server SystemsDavid Ingram. 130-135 [doi]
- Xenoservers: Accountable Execution of Untrusted ProgramsDickon Reed, Ian Pratt, Paul Menage, Stephen Early, Neil Stratford. 136-141 [doi]
- An Economic Approach to Adaptive Resource ManagementNeil Stratford, Richard Mortier. 142-147 [doi]
- Tickets and Currencies Revisited: Extensions to Multi-Resouce Lottery SchedulingDavid G. Sullivan, Robert Haas, Margo I. Seltzer. 148-152 [doi]
- How To Schedule Unlimited Memory Pinning of Untrusted Processes Or Provisional Ideas about Service-NeutralityJochen Liedtke, Volkmar Uhlig, Kevin Elphinstone, Trent Jaeger, Yoonho Park. 153 [doi]
- Reliability HierarchiesPeter M. Chen, David E. Lowell. 168-173 [doi]
- Harvest, Yield and Scalable Tolerant SystemsArmando Fox, Eric A. Brewer. 174-178 [doi]
- Command Management System for Next-Generation User InputMitchell Tsai, Peter L. Reiher, Gerald J. Popek. 179-184 [doi]
- Flexible Access Control using IPC RedirectionTrent Jaeger, Kevin Elphinstone, Jochen Liedtke, Vsevolod Panteleenko, Yoonho Park. 191 [doi]