Abstract is missing.
- DAMYSUS: streamlined BFT consensus leveraging trusted componentsJérémie Decouchant, David Kozhaya, Vincent Rahli, Jiangshan Yu. 1-16 [doi]
- State machine replication scalability made simpleChrysoula Stathakopoulou, Matej Pavlovic, Marko Vukolic. 17-33 [doi]
- Narwhal and Tusk: a DAG-based mempool and efficient BFT consensusGeorge Danezis, Lefteris Kokoris-Kogias, Alberto Sonnino, Alexander Spiegelman. 34-50 [doi]
- Building an efficient key-value store in a flexible address spaceChen Chen, Wenshao Zhong, Xingbo Wu. 51-68 [doi]
- Rolis: a software approach to efficiently replicating multi-core transactionsWeihai Shen, Ansh Khanna, Sebastian Angel, Siddhartha Sen 0001, Shuai Mu 0001. 69-84 [doi]
- Tebis: index shipping for efficient replication in LSM key-value storesMichalis Vardoulakis, Giorgos Saloustros, Pilar González-Férez, Angelos Bilas. 85-98 [doi]
- Sharing is caring: secure and efficient shared memory support for MVEEsJonas Vinck, Bert Abrath, Bart Coppens 0001, Alexios Voulimeneas, Bjorn De Sutter, Stijn Volckaert. 99-116 [doi]
- Hardening binaries against more memory errorsGregory J. Duck, Yuntong Zhang 0002, Roland H. C. Yap. 117-131 [doi]
- PKRU-safe: automatically locking down the heap between safe and unsafe languagesPaul Kirth, Mitchel Dickerson, Stephen Crane, Per Larsen, Adrian Dabrowski, David Gens, Yeoul Na, Stijn Volckaert, Michael Franz. 132-148 [doi]
- KASLR in the age of MicroVMsBenjamin Holmes, Jason Waterman, Dan Williams. 149-165 [doi]
- Nyx-net: network fuzzing with incremental snapshotsSergej Schumilo, Cornelius Aschermann, Andrea Jemmett, Ali Abbasi 0002, Thorsten Holz. 166-180 [doi]
- DeepRest: deep resource estimation for interactive microservicesKa Ho Chow, Umesh Deshpande, Sangeetha Seshadri, Ling Liu 0001. 181-198 [doi]
- Unicorn: reasoning about configurable system performance through the lens of causalityMd Shahriar Iqbal, Rahul Krishna, Mohammad Ali Javidian, Baishakhi Ray, Pooyan Jamshidi. 199-217 [doi]
- Multi-objective congestion controlYiqing Ma, Han Tian, Xudong Liao, Junxue Zhang, Weiyan Wang, Kai Chen 0005, Xin Jin. 218-235 [doi]
- Hybrid anomaly detection and prioritization for network logs at cloud scaleDavid Ohana, Bruno Wassermann, Nicolas Dupuis, Elliot K. Kolodner, Eran Raichstein, Michal Malka. 236-250 [doi]
- Performance evolution of mitigating transient execution attacksJonathan Behrens, Adam Belay, M. Frans Kaashoek. 251-265 [doi]
- You shall not (by)pass!: practical, secure, and fast PKU-based sandboxingAlexios Voulimeneas, Jonas Vinck, Ruben Mechelinck, Stijn Volckaert. 266-282 [doi]
- Verified programs can party: optimizing kernel extensions via post-verification mergingHsuan-Chi Kuo, Kai-Hsun Chen, Yicheng Lu, Dan Williams, Sibin Mohan, Tianyin Xu. 283-299 [doi]
- Minimum viable device drivers for ARM trustzoneLiwei Guo, Felix Xiaozhu Lin. 300-316 [doi]
- OPEC: operation-based security isolation for bare-metal embedded systemsXia Zhou, Jiaqi Li, Wenlong Zhang, Yajin Zhou, Wenbo Shen, Kui Ren 0001. 317-333 [doi]
- LiteReconfig: cost and content aware reconfiguration of video object detection systems for mobile GPUsRan Xu, Jayoung Lee, Pengcheng Wang, Saurabh Bagchi, Yin Li 0003, Somali Chaterji. 334-351 [doi]
- Slashing the disaggregation tax in heterogeneous data centers with FractOSLluís Vilanova, Lina Maudlej, Shai Bergman, Till Miemietz, Matthias Hille, Nils Asmussen, Michael Roitzsch, Hermann Härtig, Mark Silberstein. 352-367 [doi]
- OS scheduling with nest: keeping tasks close together on warm coresJulia Lawall, Himadri Chhaya-Shailesh, Jean-Pierre Lozi, Baptiste Lepers, Willy Zwaenepoel, Gilles Muller. 368-383 [doi]
- Kite: lightweight critical service domainsA. K. M. Fazla Mehrab, Ruslan Nikolaev 0001, Binoy Ravindran. 384-401 [doi]
- Fleche: an efficient GPU embedding cache for personalized recommendationsMinhui Xie, Youyou Lu, Jiazhen Lin, Qing Wang, Jian Gao, Kai Ren, Jiwu Shu. 402-416 [doi]
- GNNLab: a factored system for sample-based GNN training over GPUsJianbang Yang, Dahai Tang, Xiaoniu Song, Lei Wang, Qiang Yin, Rong Chen, Wenyuan Yu, Jingren Zhou. 417-434 [doi]
- Out-of-order backprop: an effective scheduling technique for deep learningHyungjun Oh, Junyeol Lee, Hyeongju Kim, Jiwon Seo. 435-452 [doi]
- D3: a dynamic deadline-driven approach for building autonomous vehiclesIonel Gog, Sukrit Kalra, Peter Schafhalter, Joseph E. Gonzalez, Ion Stoica. 453-471 [doi]
- Varuna: scalable, low-cost training of massive deep learning modelsSanjith Athlur, Nitika Saran, Muthian Sivathanu, Ramachandran Ramjee, Nipun Kwatra. 472-487 [doi]
- Characterizing the performance of intel optane persistent memory: a close look at its on-DIMM bufferingLingfeng Xiang, Xingsheng Zhao, Jia Rao, Song Jiang, Hong Jiang. 488-505 [doi]
- SafePM: a sanitizer for persistent memoryKartal Kaan Bozdogan, Dimitrios Stavrakakis, Shady Issa, Pramod Bhatotia. 506-524 [doi]
- ResPCT: fast checkpointing in non-volatile memory for multi-threaded applicationsAna Khorguani, Thomas Ropars, Noel De Palma. 525-540 [doi]
- Optimizing the interval-centric distributed computing model for temporal graph algorithmsAnimesh Baranawal, Yogesh Simmhan. 541-558 [doi]
- A new benchmark harness for systematic and robust evaluation of streaming state storesEsmail Asyabi, Yuanli Wang, John Liagouris, Vasiliki Kalavri, Azer Bestavros. 559-574 [doi]
- 2KVS: a portable 2-dimensional parallelizing framework to improve scalability of key-value stores on SSDsZiyi Lu, Qiang Cao, Hong Jiang, Shucheng Wang, Yuanyuan Dong. 575-591 [doi]
- Improving scalability of database systems by reshaping user parallel I/ONing Li, Hong Jiang, Hao Che, Zhijun Wang, Minh Q. Nguyen. 592-609 [doi]
- BetrFS: a compleat file system for commodity SSDsYizheng Jiao, Simon Bertron, Sagar Patel, Luke Zeller, Rory Bennett, Nirjhar Mukherjee, Michael A. Bender, Michael Condict, Alex Conway, Martin Farach-Colton, Xiongzi Ge, William Jannen, Rob Johnson, Donald E. Porter, Jun Yuan. 610-627 [doi]
- Beating the I/O bottleneck: a case for log-structured virtual disksMohammad Hossein Hajkazemi, Vojtech Aschenbrenner, Mania Abdi, Emine Ugur Kaynar, Amin Mossayebzadeh, Orran Krieger, Peter Desnoyers. 628-643 [doi]
- Isolating functions at the hardware limit with virtinesNicholas C. Wanninger, Joshua J. Bowden, Kirtankumar Shetty, Ayush Garg, Kyle C. Hale. 644-662 [doi]
- Fireworks: a fast, efficient, and safe serverless framework using VM-level post-JIT snapshotWonseok Shin, Wook-Hee Kim, Changwoo Min. 663-677 [doi]
- VMSH: hypervisor-agnostic guest overlays for VMsJörg Thalheim, Peter Okelmann, Harshavardhan Unnibhavi, Redha Gouicem, Pramod Bhatotia. 678-696 [doi]
- Jiffy: elastic far-memory for stateful serverless analyticsAnurag Khandelwal, Yupeng Tang, Rachit Agarwal 0001, Aditya Akella, Ion Stoica. 697-713 [doi]
- Memory deduplication for serverless computing with MedesDivyanshu Saxena, Tao Ji, Arjun Singhvi, Junaid Khalid, Aditya Akella. 714-729 [doi]
- FaaSnap: FaaS made fast using snapshot-based VMsLixiang Ao, George Porter, Geoffrey M. Voelker. 730-746 [doi]
- timely software prefetchingSaba Jamilan, Tanvir Ahmed Khan, Grant Ayers, Baris Kasikci, Heiner Litz. 747-764 [doi]