Abstract is missing.
- Denali: a scalable isolation kernelAndrew Whitaker, Marianne Shaw, Steven D. Gribble. 10-15 [doi]
- Security architectures revisitedHermann Härtig. 16-23 [doi]
- The case for transient authenticationBrian D. Noble, Mark D. Corner. 24-29 [doi]
- InfoSpect: using a logic language for system health monitoring in distributed systemsTimothy Roscoe, Richard Mortier, Paul W. Jardetzky, Steven Hand. 31-37 [doi]
- Dependable software needs pervasive debuggingTimothy L. Harris. 38-43 [doi]
- Specifying and verifying systems with TLA+Leslie Lamport, John Matthews, Mark R. Tuttle, Yuan Yu. 45-48 [doi]
- Rigour is good for you ::::and:::: feasible: reflections on formal treatments of C and UDP socketsMichael Norrish, Peter Sewell, Keith Wansbrough. 49-53 [doi]
- Capturing OS expertise in an event type system: the Bossa experienceJulia L. Lawall, Gilles Muller, Luciano Porto Barreto. 54-61 [doi]
- Overload management as a fundamental service design primitiveMatt Welsh, David E. Culler. 63-69 [doi]
- Rewind, repair, replay: three R s to dependabilityAaron B. Brown, David A. Patterson. 70-77 [doi]
- Brittle systems will break - not bend: can aspect-oriented programming help?Yvonne Coady, Gregor Kiczales, Joon Suan Ong, Andrew Warfield, Michael J. Feeley. 79-86 [doi]
- The case for cyber foragingRajesh Krishna Balan, Jason Flinn, Mahadev Satyanarayanan, Shafeeq Sinnamohideen, Hen-I Yang. 87-92 [doi]
- Automating data dependabilityKimberly Keeton, John Wilkes. 93-100 [doi]
- Nooks: an architecture for reliable device driversMichael M. Swift, Steven Martin, Henry M. Levy, Susan J. Eggers. 102-107 [doi]
- Sub-operating systems: a new approach to application securitySotiris Ioannidis, Steven M. Bellovin, Jonathan M. Smith. 108-115 [doi]
- The design of a robust peer-to-peer systemRodrigo Rodrigues, Barbara Liskov, Liuba Shrira. 117-124 [doi]
- Self-organization in peer-to-peer systemsJonathan Ledlie, Jacob M. Taylor, Laura Serban, Margo I. Seltzer. 125-132 [doi]
- HiScamp: self-organizing hierarchical membership protocolAyalvadi J. Ganesh, Anne-Marie Kermarrec, Laurent Massoulié. 133-139 [doi]
- One ring to rule them all: service discovery and binding in structured peer-to-peer overlay networksMiguel Castro, Peter Druschel, Anne-Marie Kermarrec, Antony I. T. Rowstron. 140-145 [doi]
- A design of the persistent operating system with non-volatile memoryRen Ohmura, Nobuyuki Yamasaki, Yuichiro Anzai. 149-152 [doi]
- AIMS: robustness through sensible introspectionFabián E. Bustamante, Christian Poellabauer, Karsten Schwan. 153-156 [doi]
- An approach for a dependable Java embedded environmentGilbert Cabillic, Salam Majoul, Jean-Philippe Lesot, Michel Banâtre. 157-160 [doi]
- An online evolutionary approach to developing internet servicesMike Y. Chen, Emre Kiciman, Eric A. Brewer. 161-164 [doi]
- Applying source-code verification to a microkernel: the VFiasco projectMichael Hohmuth, Hendrik Tews, Shane G. Stephens. 165-169 [doi]
- Back to the future: dependable computing = dependable servicesJeffrey S. Chase, Amin Vahdat, John Wilkes. 170-173 [doi]
- Dependency on O.S. in long-term programs: experience report in space programsPatrick Cormery, Le Vinh Quy Ribal, Arnaud Stransky. 174-177 [doi]
- Design and implementation of the Lambda mu-kernel based operating system for embedded systemsKenji Hisazumi, Tsuneo Nakanishi, Teruaki Kitasuka, Akira Fukuda. 178-181 [doi]
- Efficient heartbeats and repair of softstate in decentralized object location and routing systemsHakim Weatherspoon, John Kubiatowicz. 182-185 [doi]
- Event-driven programming for robust softwareFrank Dabek, Nickolai Zeldovich, M. Frans Kaashoek, David Mazières, Robert Morris. 186-189 [doi]
- Execution time limitation of interrupt handlers in a Java operating systemMeik Felser, Michael Golm, Christian Wawersich, Jürgen Kleinöder. 190-193 [doi]
- Extensible distributed operating system for reliable control systemsKatsumi Maruyama, Kazuya Kodama, Soichiro Hidaka, Hiromichi Hashizume. 194-197 [doi]
- Fault tolerance and avoidance in biomedical systemsShane Stephens, Gernot Heiser. 198-200 [doi]
- Gaining and maintaining confidence in operating systems securityTrent Jaeger, Antony Edwards, Xiaolan Zhang. 201-204 [doi]
- High-confidence operating systemsRadu Grosu, Erez Zadok, Scott A. Smolka, Rance Cleaveland, Yanhong A. Liu. 205-208 [doi]
- Increasing smart card dependabilityLudovic Casset, Jean-Louis Lanet. 209-212 [doi]
- A utility-centered approach to building dependable infrastructure servicesGeorge Candea, Armando Fox. 213-218 [doi]
- Model checking system software with CMCMadanlal Musuvathi, Andy Chou, David L. Dill, Dawson R. Engler. 219-222 [doi]
- OASIS project: deterministic real-time for safety critical embedded systemsStéphane Louise, Vincent David, Jean Delcoigne, Christophe Aussaguès. 223-226 [doi]
- Operating system support for massive replicationArun Venkataramani, Ravi Kokku, Michael Dahlin. 227-230 [doi]
- Pangaea: a symbiotic wide-area file systemYasushi Saito, Christos T. Karamanolis. 231-234 [doi]
- Replica management should be a gameDennis Geels, John Kubiatowicz. 235-238 [doi]
- Secure coprocessor-based intrusion detectionXiaolan Zhang, Leendert van Doorn, Trent Jaeger, Ronald Perez, Reiner Sailer. 239-242 [doi]
- THINK: a secure distributed systems architectureChristophe Rippert, Jean-Bernard Stefani. 243-246 [doi]
- Timing fault detection for safety-critical real-time embedded systemsSébastien Faucou, Anne-Marie Déplanche, Yvon Trinquet. 247-250 [doi]
- Towards trusted systems from the ground upVivek Haldar, Michael Franz. 251-254 [doi]
- Studying and using failure data from large-scale internet servicesDavid L. Oppenheimer, David A. Patterson. 255-258 [doi]