Abstract is missing.
- Checking System Rules Using System-Specific, Programmer-Written Compiler ExtensionsDawson R. Engler, Benjamin Chelf, Andy Chou, Seth Hallem. 1-16
- Devil: An IDL for Hardware ProgrammingFabrice Mérillon, Laurent Réveillère, Charles Consel, Renaud Marlet, Gilles Muller. 17-30
- Taming the Memory Hogs: Using Compiler-Inserted Releases to Manage Physical Memory IntelligentlyAngela Demke Brown, Todd C. Mowry. 31-44
- Surplus Fair Scheduling: A Proportional-Share CPU Scheduling Algorithm for Symmetric MultiprocessorsAbhishek Chandra, Micah Adler, Pawan Goyal, Prashant J. Shenoy. 45-58
- Performance-Driven Processor AllocationJulita Corbalán, Xavier Martorell, Jesús Labarta. 59-73
- Policies for Dynamic Clock SchedulingDirk Grunwald, Philip Levis, Keith I. Farkas, Charles B. Morrey III, Michael Neufeld. 73-86
- Towards Higher Disk Head Utilization: Extracting Free Bandwidth from Busy Disk DrivesChristopher R. Lumb, Jiri Schindler, Gregory R. Ganger, David Nagle, Erik Riedel. 87-102
- Latency Management in Storage SystemsRodney Van Meter, Minxi Gao. 103-118
- A Low-Overhead, High-Performance Unified Buffer Management Scheme That Exploits Sequential and Looping ReferencesJong-Min Kim, Jongmoo Choi, Jesung Kim, Sam H. Noh, Sang Lyul Min, Yookun Cho, Chong-Sang Kim. 119-134
- How to Build a Trusted Database System on Untrusted StorageUmesh Maheshwari, Radek Vingralek, William Shapiro. 135-150
- End-to-End AuthorizationJon Howell, David Kotz. 151-164
- Self-Securing Storage: Protecting Data in Compromised SystemsJohn D. Strunk, Garth R. Goodson, Michael L. Scheinholtz, Craig A. N. Soules, Gregory R. Ganger. 165-180
- Fast and Secure Distributed Read-Only File SystemKevin Fu, M. Frans Kaashoek, David Mazières. 181-196
- Overcast: Reliable Multicasting with an Overlay NetworkJohn Jannotti, David K. Gifford, Kirk L. Johnson, M. Frans Kaashoek, James O Toole Jr.. 197-212
- System Support for Bandwidth Management and Content Adaptation in Internet ApplicationsDavid G. Andersen, Deepak Bansal, Dorothy Curtis, Srinivasan Seshan, Hari Balakrishnan. 213-226
- Operating System Management of MEMS-based Storage DevicesJohn Linwood Griffin, Steven W. Schlosser, Gregory R. Ganger, David Nagle. 227-242
- Trading Capacity for Performance in a Disk ArrayXiang Yu, Benjamin Gum, Yuqun Chen, Randolph Y. Wang, Kai Li, Arvind Krishnamurthy, Thomas E. Anderson. 243-258
- Interposed Request Routing for Scalable Network StorageDarrell C. Anderson, Jeffrey S. Chase, Amin Vahdat. 259-272
- Proactive Recovery in a Byzantine-Fault-Tolerant SystemMiguel Castro, Barbara Liskov. 273-288
- Exploring Failure Transparency and the Limits of Generic RecoveryDavid E. Lowell, Subhachandra Chandra, Peter M. Chen. 289-304
- Design and Evaluation of a Continuous Consistency Model for Replicated ServicesHaifeng Yu, Amin Vahdat. 305-318
- Scalable, Distributed Data Structures for Internet Service ConstructionSteven D. Gribble, Eric A. Brewer, Joseph M. Hellerstein, David E. Culler. 319-332
- Processes in KaffeOS: Isolation, Resource Management, and Sharing in JavaGodmar Back, Wilson C. Hsieh, Jay Lepreau. 333-346
- Knit: Component Composition for Systems SoftwareAlastair Reid, Matthew Flatt, Leigh Stoller, Jay Lepreau, Eric Eide. 347-360