Abstract is missing.
- xOS: The End Of The Process-Thread Duo ReignAlain Tchana, Dorian Goepp, Stella Bitchebe, Renaud Lachaize. 1-8 [doi]
- First steps in verifying the seL4 Core PlatformMathieu Paturel, Isitha Subasinghe, Gernot Heiser. 9-15 [doi]
- Towards OS Heterogeneity Aware Cluster Management for HPCZhida An, Ding Li, Yao Guo 0001, Guijin Gao, Yuxin Ren, Ning Jia, Xinwei Hu. 16-23 [doi]
- ZapRAID: Toward High-Performance RAID for ZNS SSDs via Zone AppendQiuping Wang, Patrick P. C. Lee. 24-29 [doi]
- Capybara: μSecond-Scale Live TCP MigrationInho Choi, Nimish Wadekar, Raj Joshi, Joshua Fried, Dan R. K. Ports, Irene Zhang, Jialin Li 0001. 30-36 [doi]
- Improving Throughput-oriented Generative Inference with CPUsDaon Park, Sungbin Jo, Bernhard Egger. 37-42 [doi]
- Cost-Efficient Serverless Inference Serving with Joint Batching and Multi-ProcessingShen Cai, Zhi Zhou, Kongyange Zhao, Xu Chen. 43-49 [doi]
- Liquid: Mix-and-Match Multiple Image Formats to Balance DNN Training PipelineWoohyeon Baek, Jonghyun Bae, Donghyun Lee, Hyunwoong Bae, Yeonhong Park, Jae W. Lee. 50-57 [doi]
- Reducing Attack Surface with Container Transplantation for Lightweight SandboxingYuki Nakata, Shintaro Suzuki, Katsuya Matsubara. 58-64 [doi]
- Family Classification based on Tree Representations for MalwareYang Xu, Zhuotai Chen. 65-71 [doi]
- Trusted Heterogeneous Disaggregated ArchitecturesAtsushi Koshiba, Felix Gust, Julian Pritzi, Anjo Vahldiek-Oberwagner, Nuno Santos 0001, Pramod Bhatotia. 72-79 [doi]
- Quantifying the Security Profile of Linux ApplicationsG. C. Androutsopoulos, Giorgos Kappes, Stergios V. Anastasiadis. 80-86 [doi]
- Understanding the Security of Linux eBPF SubsystemMohamed Husain Noor Mohamed, Xiaoguang Wang 0003, Binoy Ravindran. 87-92 [doi]