Abstract is missing.
- Task activity vectors: a new metric for temperature-aware schedulingAndreas Merkel, Frank Bellosa. 1-12 [doi]
- Efficient guaranteed disk request scheduling with fahrradAnna Povzner, Tim Kaldewey, Scott A. Brandt, Richard A. Golding, Theodore M. Wong, Carlos Maltzahn. 13-25 [doi]
- Enforcing appropriate process execution for exploiting idle resources from outside operating systemsYoshihisa Abe, Hiroshi Yamada, Kenji Kono. 27-40 [doi]
- Parallax: virtual disks for virtual machinesDutch T. Meyer, Gitika Aggarwal, Brendan Cully, Geoffrey Lefebvre, Michael J. Feeley, Norman C. Hutchinson, Andrew Warfield. 41-54 [doi]
- Replication degree customization for high availabilityMing Zhong, Kai Shen, Joel I. Seiferas. 55-68 [doi]
- GreenFS: making enterprise computers greener by protecting them betterNikolai Joukov, Josef Sipek. 69-80 [doi]
- VPFS: building a virtual private file system with a small trusted computing baseCarsten Weinhold, Hermann Härtig. 81-93 [doi]
- Application-level isolation and recovery with solitudeShvetank Jain, Fareha Shafique, Vladan Djeric, Ashvin Goel. 95-107 [doi]
- Towards cinematic internet video-on-demandBin Cheng, Lex Stein, Hai Jin, Zheng Zhang. 109-122 [doi]
- Experiences with open overlays: a middleware approach to network heterogeneityPaul Grace, Danny Hughes, Barry Porter, Gordon S. Blair, Geoff Coulson, François Taïani. 123-136 [doi]
- Protectit: trusted distributed services operating on sensitive dataJiantao Kong, Karsten Schwan, Min Lee, Mustaque Ahamad. 137-147 [doi]
- Modeling viral economies for digital mediaShan He, Renan G. Cattelan, Darko Kirovski. 149-162 [doi]
- DepSpace: a byzantine fault-tolerant coordination serviceAlysson Neves Bessani, Eduardo Adílio Pelinson Alchieri, Miguel Correia, Joni da Silva Fraga. 163-176 [doi]
- Hang analysis: fighting responsiveness bugsXi Wang, Zhenyu Guo, Xuezheng Liu, Zhilei Xu, Haoxiang Lin, Xiaoge Wang, Zheng Zhang. 177-190 [doi]
- BorderPatrol: isolating events for black-box tracingEric Koskinen, John Jannotti. 191-203 [doi]
- 30 seconds is not enough!: a study of operating system timer usageSimon Peter, Andrew Baumann, Timothy Roscoe, Paul Barham, Rebecca Isaacs. 205-218 [doi]
- Samurai: protecting critical data in unsafe languagesKarthik Pattabiraman, Vinod Grover, Benjamin G. Zorn. 219-232 [doi]
- Controlled, systematic, and efficient code replacement for running java programsAngela Nicoara, Gustavo Alonso, Timothy Roscoe. 233-246 [doi]
- Documenting and automating collateral evolutions in linux device driversYoann Padioleau, Julia L. Lawall, René Rydhof Hansen, Gilles Muller. 247-260 [doi]
- Itrustpage: a user-assisted anti-phishing toolTroy Ronda, Stefan Saroiu, Alec Wolman. 261-272 [doi]
- Switchblade: enforcing dynamic personalized system call modelsChristof Fetzer, Martin Süßkraut. 273-286 [doi]
- Eudaemon: involuntary and on-demand emulation against zero-day exploitsGeorgios Portokalidis, Herbert Bos. 287-299 [doi]
- Manageable fine-grained information flowPetros Efstathopoulos, Eddie Kohler. 301-313 [doi]
- Flicker: an execution infrastructure for tcb minimizationJonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Hiroshi Isozaki. 315-328 [doi]