Abstract is missing.
- High Availability, Scalable Storage, Dynamic Peer Networks: Pick TwoCharles Blake, Rodrigo Rodrigues. 1-6
- One Hop Lookups for Peer-to-Peer OverlaysAnjali Gupta, Barbara Liskov, Rodrigo Rodrigues. 7-12
- An Analysis of Compare-by-hashVal Henson. 13-18
- Why Events Are a Bad Idea (for High-Concurrency Servers)J. Robert von Behren, Jeremy Condit, Eric A. Brewer. 19-24
- TCP Offload Is a Dumb Idea Whose Time Has ComeJeffrey C. Mogul. 25-30
- TCP Meets Mobile CodeParveen Patel, David Wetherall, Jay Lepreau, Andrew Whitaker. 31-36
- Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc NetworksY. Charlie Hu, Saumitra M. Das, Himabindu Pucha. 37-42
- Scheduling and Simulation: How to Upgrade Distributed SystemsSameer Ajmani, Barbara Liskov, Liuba Shrira. 43-48
- Development Tools for Distributed ApplicationsMukesh Agrawal, Srinivasan Seshan. 49-54
- Virtual Appliances in the Collective: A Road to Hassle-Free ComputingConstantine P. Sapuntzakis, Monica S. Lam. 55-60
- POST: A Secure, Resilient, Cooperative Messaging SystemAlan Mislove, Ansley Post, Charles Reis, Paul Willmann, Peter Druschel, Dan S. Wallach, Xavier Bonnaire, Pierre Sens, Jean-Michel Busca, Luciana Bezerra Arantes. 61-66
- Crash-Only SoftwareGeorge Candea, Armando Fox. 67-72
- The Phoenix Recovery System: Rebuilding from the Ashes of an Internet CatastropheFlavio Paiva Junqueira, Ranjita Bhagwan, Keith Marzullo, Stefan Savage, Geoffrey M. Voelker. 73-78
- Using Runtime Paths for MacroanalysisMike Y. Chen, Emre Kiciman, Anthony Accardi, Armando Fox, Eric A. Brewer. 79-84
- Magpie: Online Modelling and Performance-aware SystemsPaul Barham, Rebecca Isaacs, Richard Mortier, Dushyanth Narayanan. 85-90
- Using Computers to Diagnose Computer ProblemsJoshua Redstone, Michael M. Swift, Brian N. Bershad. 91-86
- Using Performance Reflection in Systems SoftwareRobert J. Fowler, Alan L. Cox, Sameh Elnikety, Willy Zwaenepoel. 97-102
- Cassyopia: Compiler Assisted System OptimizationMohan Rajagopalan, Saumya K. Debray, Matti A. Hiltunen, Richard D. Schlichting. 103-108
- Cosy: Develop in User-Land, Run in Kernel-ModeAmit Purohit, Charles P. Wright, Joseph Spadavecchia, Erez Zadok. 109-114
- Why Can t I Find My Files? New Methods for Automating Attribute AssignmentCraig A. N. Soules, Gregory R. Ganger. 115-120
- Secure Data Replication over Untrusted HostsBogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum. 121-126
- Palimpsest: Soft-Capacity Storage for Planetary-Scale ServicesTimothy Roscoe, Steven Hand. 127-132
- Certifying Program Execution with Secure ProcessorsBenjie Chen, Robert Morris. 133-138
- Hardware Works, Software Doesn t: Enforcing Modularity with Mondriaan Memory ProtectionEmmett Witchel, Krste Asanovic. 139-144
- Flexible OS Support and Applications for Trusted ComputingTal Garfinkel, Mendel Rosenblum, Dan Boneh. 145-150
- Sensing User Intention and Context for Energy ManagementAngela B. Dalton, Carla Schlatter Ellis. 151-156
- Access Control to Information in Pervasive Computing EnvironmentsUrs Hengartner, Peter Steenkiste. 157-162
- Privacy-Aware Location Sensor NetworksMarco Gruteser, Graham Schelle, Ashish Jain, Richard Han, Dirk Grunwald. 163-168
- FAB: Enterprise Storage Systems on a ShoestringSvend Frølund, Arif Merchant, Yasushi Saito, Susan Spence, Alistair C. Veitch. 169-174
- The Case for a Session State Storage LayerBenjamin C. Ling, Armando Fox. 175-180
- Towards a Semantic-Aware File StoreZhichen Xu, Magnus Karlsson, Chunqiang Tang, Christos T. Karamanolis. 181-187