Abstract is missing.
- We Need to Talk About NICsPravin Shinde, Antoine Kaufmann, Timothy Roscoe, Stefan Kaestle. [doi]
- The Case for Tiny Tasks in Compute ClustersKay Ousterhout, Aurojit Panda, Josh Rosen, Shivaram Venkataraman, Reynold Xin, Sylvia Ratnasamy, Scott Shenker, Ion Stoica. [doi]
- The Case for Onloading Continuous High-Datarate Perception to the PhoneSeungyeop Han, Matthai Philipose. [doi]
- The NIC Is the Hypervisor: Bare-Metal Guests in IaaS CloudsJeffrey C. Mogul, Jayaram Mudigonda, Jose Renato Santos, Yoshio Turner. [doi]
- Using Dark Fiber to Displace Diesel GeneratorsAman Kansal, Bhuvan Urgaonkar, Sriram Govindan. [doi]
- Automated Debugging for Arbitrarily Long ExecutionsCristian Zamfir, Baris Kasikci, Johannes Kinder, Edouard Bugnion, George Candea. [doi]
- Lightweight Snapshots and System-level BacktrackingEdouard Bugnion, Vitaly Chipounov, George Candea. [doi]
- Wanted: Systems Abstractions for SDNSapan Bhatia, Andy C. Bavier, Larry L. Peterson. [doi]
- Unified High-Performance I/O: One Stack to Rule Them AllAnimesh Trivedi, Patrick Stuedi, Bernard Metzler, Roman Pletka, Blake G. Fitch, Thomas R. Gross. [doi]
- Arrakis: A Case for the End of the EmpireSimon Peter, Thomas E. Anderson. [doi]
- When Cycles Are Cheap, Some Tables Can Be HugeBin Fan, Dong Zhou, Hyeontaek Lim, Michael Kaminsky, David G. Andersen. [doi]
- Towards Elastic Operating SystemsAmit Gupta, Ehab Ababneh, Richard Han, Eric Keller. [doi]
- Toward Common Patterns for Distributed, Concurrent, Fault-Tolerant CodeRyan Stutsman, John K. Ousterhout. [doi]
- Global Authentication in an Untrustworthy WorldMartín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie. [doi]
- -OVERIFY: Optimizing Programs for Fast VerificationJonas Wagner, Volodymyr Kuznetsov, George Candea. [doi]
- Making Every Bit Count in Wide-Area AnalyticsAriel Rabkin, Matvey Arye, Siddhartha Sen, Vivek Pai, Michael J. Freedman. [doi]
- Large-Scale Computation Not at the Cost of ExpressivenessSangjin Han, Sylvia Ratnasamy. [doi]
- The von Neumann Architecture Is Due for RetirementAleksander Budzynowski, Gernot Heiser. [doi]
- Rethinking Network Stack Design with Memory SnapshotsMichael Chan, Heiner Litz, David R. Cheriton. [doi]
- HAT, Not CAP: Towards Highly Available TransactionsPeter Bailis, Alan Fekete, Ali Ghodsi, Joseph M. Hellerstein, Ion Stoica. [doi]
- QuarkOS: Pushing the Operating Limits of Micro-Powered SensorsPengyu Zhang, Deepak Ganesan, Boyan Lu. [doi]
- Failure Recovery: When the Cure Is Worse Than the DiseaseZhenyu Guo, Sean McDirmid, Mao Yang, Li Zhuang, Pu Zhang, Yingwei Luo, Tom Bergan, Madan Musuvathi, Zheng Zhang, Lidong Zhou. [doi]
- Solving the Straggler Problem with Bounded StalenessJames Cipar, Qirong Ho, Jin Kyu Kim, Seunghak Lee, Gregory R. Ganger, Garth Gibson, Kimberly Keeton, Eric P. Xing. [doi]
- Escape Capsule: Explicit State Is Robust and ScalableShriram Rajagopalan, Dan Williams, Hani Jamjoom, Andrew Warfield. [doi]
- Operating System Support for Augmented Reality ApplicationsLoris D'Antoni, Alan M. Dunn, Suman Jana, Tadayoshi Kohno, Benjamin Livshits, David Molnar, Alexander Moshchuk, Eyal Ofek, Franziska Roesner, T. Scott Saponas, Margus Veanes, Helen J. Wang. [doi]
- Virtualize Storage, Not DisksWilliam Jannen, Chia-che Tsai, Donald E. Porter. [doi]
- Toward Principled Browser SecurityEdward Z. Yang, Deian Stefan, John C. Mitchell, David Mazières, Petr Marchenko, Brad Karp. [doi]