Abstract is missing.
- PhyCloak: Obfuscating Sensing from Communication SignalsYue Qiao, Ouyang Zhang, Wenjie Zhou, Kannan Srinivasan, Anish Arora. [doi]
- Environmental Conditions and Disk Reliability in Free-cooled DatacentersIoannis Manousakis, Sriram Sankar, Gregg McKnight, Thu D. Nguyen, Ricardo Bianchini. [doi]
- Pivot Tracing: Dynamic Causal Monitoring for Distributed SystemsJonathan Mace, Ryan Roelke, Rodrigo Fonseca. [doi]
- Hyperprobe: Towards Virtual Machine ExtrospectionJidong Xiao, Lei Lu, Hai Huang, Haining Wang. [doi]
- Using Crash Hoare Logic for Certifying the FSCQ File SystemHaogang Chen, Daniel Ziegler, Tej Chajed, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich. [doi]
- Under-Constrained Symbolic Execution: Correctness Checking for Real CodeDavid A. Ramos, Dawson R. Engler. [doi]
- An Industrial-Scale Software Defined Internet Exchange PointArpit Gupta, Robert MacDavid, Rüdiger Birkner, Marco Canini, Nick Feamster, Jennifer Rexford, Laurent Vanbever. [doi]
- COZ: Finding Code that Counts with Causal ProfilingCharlie Curtsinger, Emery D. Berger. [doi]
- Passive Wi-Fi: Bringing Low Power to Wi-Fi TransmissionsBryce Kellogg, Vamsi Talla, Shyamnath Gollakota, Joshua R. Smith. [doi]
- Optimizing Every Operation in a Write-optimized File SystemJun Yuan, Yang Zhan, William Jannen, Prashant Pandey, Amogh Akshintala, Kanchan Chandnani, Pooja Deo, Zardosht Kasheff, Leif Walsh, Michael A. Bender, Martin Farach-Colton, Rob Johnson, Bradley C. Kuszmaul, Donald E. Porter. [doi]
- All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLSMathy Vanhoef, Frank Piessens. [doi]
- FLICK: Developing and Running Application-Specific Network ServicesAbdul Alim, Richard G. Clegg, Luo Mai, Lukas Rupprecht, Eric Seckler, Paolo Costa, Peter Pietzuch, Alexander L. Wolf, Nik Sultana, Jon Crowcroft, Anil Madhavapeddy, Andrew W. Moore, Richard Mortier, Masoud Koleni, Luis Oviedo, Matteo Migliavacca, Derek McAuley. 1-14 [doi]
- SoftFlow: A Middlebox Architecture for Open vSwitchEthan J. Jackson, Melvin Walls, Aurojit Panda, Justin Pettit, Ben Pfaff, Jarno Rajahalme, Teemu Koponen, Scott Shenker. 15-28 [doi]
- Fast and Cautious: Leveraging Multi-path Diversity for Transport Loss Recovery in Data CentersGuo Chen, Yuanwei Lu, Yuan Meng, Bojie Li, Kun Tan, Dan Pei, Peng Cheng, Layong Luo, Yongqiang Xiong, Xiaoliang Wang, Youjian Zhao. 29-42 [doi]
- StackMap: Low-Latency Networking with the OS Stack and Dedicated NICsKenichi Yasukata, Michio Honda, Douglas Santry, Lars Eggert. 43-56 [doi]
- SLIK: Scalable Low-Latency Indexes for a Key-Value StoreAnkita Kejriwal, Arjun Gopalan, Ashish Gupta, Zhihao Jia, Stephen Yang, John K. Ousterhout. 57-70 [doi]
- Understanding Manycore Scalability of File SystemsChangwoo Min, Sanidhya Kashyap, Steffen Maass, Taesoo Kim. 71-85 [doi]
- ParaFS: A Log-Structured File System to Exploit the Internal Parallelism of Flash DevicesJiacheng Zhang, Jiwu Shu, Youyou Lu. 87-100 [doi]
- FastCDC: a Fast and Efficient Content-Defined Chunking Approach for Data DeduplicationWen Xia, Yukun Zhou, Hong Jiang, Dan Feng, Yu Hua, Yuchong Hu, Qing Liu, Yucheng Zhang. 101-114 [doi]
- Unsafe Time Handling in SmartphonesAbhilash Jindal, Y. Charlie Hu, Samuel P. Midkiff, Prahlad Joshi. 115-127 [doi]
- Energy Discounted Computing on Multicore SmartphonesMeng Zhu, Kai Shen. 129-141 [doi]
- Beam: Ending Monolithic Applications for Connected DevicesChenguang Shen, Rayman Preet Singh, Amar Phanishayee, Aman Kansal, Ratul Mahajan. 143-157 [doi]
- Caching Doesn't Improve Mobile Web Performance (Much)Jamshed Vesuna, Colin Scott, Michael Buettner, Michael Piatek, Arvind Krishnamurthy, Scott Shenker. 159-165 [doi]
- Secure and Efficient Application Monitoring and ReplicationStijn Volckaert, Bart Coppens, Alexios Voulimeneas, Andrei Homescu, Per Larsen, Bjorn De Sutter, Michael Franz. 167-179 [doi]
- Blockstack: A Global Naming and Storage System Secured by BlockchainsMuneeb Ali, Jude C. Nelson, Ryan Shea, Michael J. Freedman. 181-194 [doi]
- Satellite: Joint Analysis of CDNs and Network-Level InterferenceWill Scott, Thomas E. Anderson, Tadayoshi Kohno, Arvind Krishnamurthy. 195-208 [doi]
- Subversive-C: Abusing and Protecting Dynamic Message DispatchJulian Lettner, Benjamin Kollenda, Andrei Homescu, Per Larsen, Felix Schuster, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Michael Franz. 209-221 [doi]
- Callinicos: Robust Transactional Storage for Distributed Data StructuresRicardo Padilha, Enrique Fynn, Robert Soulé, Fernando Pedone. 223-235 [doi]
- Filo: Consolidated Consensus as a Cloud ServiceParisa Jalili Marandi, Christos Gkantsidis, Flavio Junqueira, Dushyanth Narayanan. 237-249 [doi]
- Modular Composition of Coordination ServicesKfir Lev-Ari, Edward Bortnikov, Idit Keidar, Alexander Shraer. 251-264 [doi]
- Cheap and Available State Machine ReplicationRong Shi, Yang Wang. 265-279 [doi]
- Horton Tables: Fast Hash Tables for In-Memory Data-Intensive ComputingAlex D. Breslow, Dong Ping Zhang, Joseph L. Greathouse, Nuwan Jayasena, Dean M. Tullsen. 281-294 [doi]
- Ginseng: Market-Driven LLC AllocationLiran Funaro, Orna Agmon Ben-Yehuda, Assaf Schuster. 295-308 [doi]
- Elfen Scheduling: Fine-Grain Principled Borrowing from Latency-Critical Workloads Using Simultaneous MultithreadingXi Yang, Stephen M. Blackburn, Kathryn S. McKinley. 309-322 [doi]
- Coherence Stalls or Latency Tolerance: Informed CPU Scheduling for Socket and Core SharingSharanyan Srikanthan, Sandhya Dwarkadas, Kai Shen. 323-336 [doi]
- Replex: A Scalable, Highly Available Multi-Index Data StoreAmy Tai, Michael Wei, Michael J. Freedman, Ittai Abraham, Dahlia Malkhi. 337-350 [doi]
- Kinetic Modeling of Data Eviction in CacheXiameng Hu, Xiaolin Wang, Lan Zhou, Yingwei Luo, Chen Ding, Zhenlin Wang. 351-364 [doi]
- Scalable In-Memory Transaction Processing with HTMYingjun Wu, Kian-Lee Tan. 365-377 [doi]
- Erasing Belady's Limitations: In Search of Flash Cache Offline OptimalityYue Cheng, Fred Douglis, Philip Shilane, Grant Wallace, Peter Desnoyers, Kai Li. 379-392 [doi]
- Unlocking EnergyBabak Falsafi, Rachid Guerraoui, Javier Picorel, Vasileios Trigonakis. 393-406 [doi]
- Greening the Video Transcoding Service with Low-Cost Hardware TranscodersPeng Liu, Jongwon Yoon, Lance Johnson, Suman Banerjee. 407-419 [doi]
- MEANTIME: Achieving Both Minimal Energy and Timeliness with Approximate ComputingAnne Farrell, Henry Hoffmann. 421-435 [doi]
- Design Guidelines for High Performance RDMA SystemsAnuj Kalia, Michael Kaminsky, David G. Andersen. 437-450 [doi]
- Balancing CPU and Network in the Cell Distributed B-Tree StoreChristopher Mitchell, Kate Montgomery, Lamont Nelson, Siddhartha Sen, Jinyang Li. 451-464 [doi]
- An Evolutionary Study of Linux Memory Management for Fun and ProfitJian Huang, Moinuddin K. Qureshi, Karsten Schwan. 465-478 [doi]
- Getting Back Up: Understanding How Enterprise Data Backups FailGeorge Amvrosiadis, Medha Bhadkamkar. 479-492 [doi]
- SplitJoin: A Scalable, Low-latency Stream Join Architecture with Adjustable Ordering PrecisionMohammadreza Najafi, Mohammad Sadoghi, Hans-Arno Jacobsen. 493-505 [doi]
- Load the Edges You Need: A Generic I/O Optimization for Disk-based Graph ProcessingKeval Vora, Guoqing Xu, Rajiv Gupta. 507-522 [doi]
- Version Traveler: Fast and Memory-Efficient Version Switching in Graph Processing SystemsXiaoen Ju, Dan Williams, Hani Jamjoom, Kang G. Shin. 523-536 [doi]
- Tucana: Design and Implementation of a Fast and Efficient Scale-up Key-value StoreAnastasios Papagiannis, Giorgos Saloustros, Pilar González-Férez, Angelos Bilas. 537-550 [doi]
- Samsara: Efficient Deterministic Replay in Multiprocessor Environments with Hardware Virtualization ExtensionsShiru Ren, Le Tan, Chunqi Li, Zhen Xiao, Weijia Song. 551-564 [doi]
- Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile DevicesYeongpil Cho, Jun-Bum Shin, Donghyun Kwon, MyungJoo Ham, Yuna Kim, Yunheung Paek. 565-578 [doi]
- gScale: Scaling up GPU Virtualization with Dynamic Sharing of Graphics Memory SpaceMochi Xue, Kun Tian, Yaozu Dong, Jiacheng Ma, Jiajun Wang, Zhengwei Qi, Bingsheng He, Haibing Guan. 579-590 [doi]
- A General Persistent Code Caching Framework for Dynamic Binary Translation (DBT)Wenwen Wang, Pen-Chung Yew, Antonia Zhai, Stephen McCamant. 591-603 [doi]
- Instant OS Updates via Userspace Checkpoint-and-RestartSanidhya Kashyap, Changwoo Min, Byoungyoung Lee, Taesoo Kim, Pavel Emelyanov. 605-619 [doi]
- Apps with Hardware: Enabling Run-time Architectural Customization in Smart PhonesMichael Coughlin, Ali Ismail, Eric Keller. 621-634 [doi]
- Testing Error Handling Code in Device Drivers Using Characteristic Fault InjectionJia-Ju Bai, Yu-Ping Wang, Jie Yin, Shi-Min Hu. 635-647 [doi]
- Multicore Locks: The Case Is Not Closed YetHugo Guiroux, Renaud Lachaize, Vivien Quéma. 649-662 [doi]