Abstract is missing.
- Fireflies: scalable support for intrusion-tolerant network overlaysHåvard D. Johansen, André Allavena, Robbert van Renesse. 3-13 [doi]
- Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generationGeorgios Portokalidis, Asia Slowinska, Herbert Bos. 15-27 [doi]
- Practical taint-based protection using demand emulationAlex Ho, Michael A. Fetterman, Christopher Clark, Andrew Warfield, Steven Hand. 29-41 [doi]
- Solving the starting problem: device drivers as self-describing artifactsMichael F. Spear, Tom Roeder, Orion Hodson, Galen C. Hunt, Steven Levi. 45-57 [doi]
- Understanding collateral evolution in Linux device driversYoann Padioleau, Julia L. Lawall, Gilles Muller. 59-71 [doi]
- Thorough static analysis of device driversThomas Ball, Ella Bounimova, Byron Cook, Vladimir Levin, Jakob Lichtenberg, Con McGarvey, Bohus Ondrusek, Sriram K. Rajamani, Abdullah Ustuner. 73-85 [doi]
- Database replication policies for dynamic content applicationsGokul Soundararajan, Cristiana Amza, Ashvin Goel. 89-102 [doi]
- The SMART way to migrate replicated stateful servicesJacob R. Lorch, Atul Adya, William J. Bolosky, Ronnie Chaiken, John R. Douceur, Jon Howell. 103-115 [doi]
- Tashkent: uniting durability with transaction ordering for high-performance scalable database replicationSameh Elnikety, Steven G. Dropsho, Fernando Pedone. 117-130 [doi]
- K42: building a complete operating systemOrran Krieger, Marc A. Auslander, Bryan S. Rosenburg, Robert W. Wisniewski, Jimi Xenidis, Dilma Da Silva, Michal Ostrowski, Jonathan Appavoo, Maria A. Butrico, Mark F. Mergen, Amos Waterland, Volkmar Uhlig. 133-145 [doi]
- Experiences in building and operating ePOST, a reliable peer-to-peer applicationAlan Mislove, Ansley Post, Andreas Haeberlen, Peter Druschel. 147-159 [doi]
- Reducing TCB complexity for security-sensitive applications: three case studiesLenin Singaravelu, Calton Pu, Hermann Härtig, Christian Helmuth. 161-174 [doi]
- Language support for fast and reliable message-based communication in singularity OSManuel Fähndrich, Mark Aiken, Chris Hawblitzel, Orion Hodson, Galen C. Hunt, James R. Larus, Steven Levi. 177-190 [doi]
- A quantitative analysis of aspects in the eCos kernelDaniel Lohmann, Fabian Scheler, Reinhard Tartler, Olaf Spinczyk, Wolfgang Schröder-Preikschat. 191-204 [doi]
- Context-specific middleware specialization techniques for optimizing software product-line architecturesArvind S. Krishna, Aniruddha S. Gokhale, Douglas C. Schmidt. 205-218 [doi]
- A fresh look at the reliability of long-term digital storageMary Baker, Mehul A. Shah, David S. H. Rosenthal, Mema Roussopoulos, Petros Maniatis, Thomas J. Giuli, Prashanth P. Bungale. 221-234 [doi]
- On the road to recovery: restoring data after disastersKimberly Keeton, Dirk Beyer 0002, Ernesto Brau, Arif Merchant, Cipriano A. Santos, Alex Zhang. 235-248 [doi]
- RIMAC: a novel redundancy-based hierarchical cache architecture for energy efficient, high performance storage systemsXiaoyu Yao, Jun Wang. 249-262 [doi]
- Evaluating network processing efficiency with processor partitioning and asynchronous I/OTim Brecht, G. John Janakiraman, Brian Lynn, Vikram A. Saletore, Yoshio Turner. 265-278 [doi]
- TCP offload through connection handoffHyong-youb Kim, Scott Rixner. 279-290 [doi]
- Emergent (mis)behavior vs. complex software systemsJeffrey C. Mogul. 293-304 [doi]
- Predictive log-synchronizationOri Shalev, Nir Shavit. 305-315 [doi]
- Ferret: a toolkit for content-based similarity search of feature-rich dataQin Lv, William Josephson, Zhe Wang, Moses Charikar, Kai Li. 317-330 [doi]
- Understanding user behavior in large-scale video-on-demand systemsHongliang Yu, Dongdong Zheng, Ben Y. Zhao, Weimin Zheng. 333-344 [doi]
- URICA: Usage-awaRe Interactive Content Adaptation for mobile devicesIqbal Mohomed, Jim Chengming Cai, Eyal de Lara. 345-358 [doi]
- Peer sharing behaviour in the eDonkey network, and implications for the design of server-less file sharing systemsSidath B. Handurukande, Anne-Marie Kermarrec, Fabrice Le Fessant, Laurent Massoulié, Simon Patarin. 359-371 [doi]
- Automated known problem diagnosis with event tracesChun Yuan, Ni Lao, Ji-Rong Wen, Jiwei Li, Zheng Zhang, Yi-Min Wang, Wei-Ying Ma. 375-388 [doi]
- Using queries for distributed monitoring and forensicsAtul Singh, Petros Maniatis, Timothy Roscoe, Peter Druschel. 389-402 [doi]
- Balancing power consumption in multiprocessor systemsAndreas Merkel, Frank Bellosa. 403-414 [doi]