Abstract is missing.
- Using virtual markets to program global behavior in sensor networksGeoffrey Mainland, Laura Kang, Sébastien Lahaie, David C. Parkes, Matt Welsh. 1 [doi]
- Generic role assignment for wireless sensor networksKay Römer, Christian Frank, Pedro José Marrón, Christian Becker. 2 [doi]
- The firecracker protocolPhilip Levis, David E. Culler. 3 [doi]
- Lessons and challenges in automating data dependabilityKimberly Keeton, Dirk Beyer 0002, Jeffrey S. Chase, Arif Merchant, Cipriano A. Santos, John Wilkes. 4 [doi]
- Transactional file systems can be fastBarbara Liskov, Rodrigo Rodrigues. 5 [doi]
- Position: short object lifetimes require a delete-optimized storage systemFred Douglis, John Palmer, Elizabeth S. Richards, David Tao, William H. Tetzlaff, John M. Tracey, Jian Yin. 6 [doi]
- Virtual private machines: user-centric performanceDavid Bartholomew Stewart, Richard Mortier. 7 [doi]
- QoS for internet services: done rightJosep M. Blanquer, Antoni Batchelli, Klaus E. Schauser, Richard Wolski. 8 [doi]
- Chip multithreading systems need a new operating system schedulerAlexandra Fedorova, Christopher Small, Daniel Nussbaum, Margo I. Seltzer. 9 [doi]
- Data lifetime is a systems problemTal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum. 10 [doi]
- Secure bootstrap is not enough: shoring up the trusted computing baseJames Hendricks, Leendert van Doorn. 11 [doi]
- Impeding attrition attacks in P2P systemsPetros Maniatis, Thomas J. Giuli, Mema Roussopoulos, David S. H. Rosenthal, Mary Baker. 12 [doi]
- UtilificationJohn Wilkes, Jeffrey C. Mogul, Jaap Suermondt. 13 [doi]
- Energy-efficient cluster-based service discovery for Ubiquitous ComputingGregor Schiele, Christian Becker, Kurt Rothermel. 14 [doi]
- Constructing component-based extension interfaces in legacy systems codeGilles Muller, Julia L. Lawall, Jean-Marc Menaud, Mario Südholt. 15 [doi]
- Using time travel to diagnose computer problemsAndrew Whitaker, Richard S. Cox, Steven D. Gribble. 16 [doi]
- Request extraction in Magpie: events, schemas and temporal joinsRebecca Isaacs, Paul Barham, James R. Bulpin, Richard Mortier, Dushyanth Narayanan. 17 [doi]
- An approach to benchmarking configuration complexityAaron B. Brown, Joseph L. Hellerstein. 18 [doi]
- Eluding carnivores: file sharing with strong anonymityEmin Gün Sirer, Sharad Goel, Mark Robson, Dogan Engin. 19 [doi]
- Exploiting semantic clustering in the eDonkey P2P networkSidath B. Handurukande, Anne-Marie Kermarrec, Fabrice Le Fessant, Laurent Massoulié. 20 [doi]
- Defending against eclipse attacks on overlay networksAtul Singh, Miguel Castro, Peter Druschel, Antony I. T. Rowstron. 21 [doi]
- Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitorsMichael Hohmuth, Michael Peter, Hermann Härtig, Jonathan S. Shapiro. 22 [doi]
- Self-migration of operating systemsJacob Gorm Hansen, Eric Jul. 23 [doi]
- A sledgehammer approach to reuse of legacy device driversJoshua LeVasseur, Volkmar Uhlig. 24 [doi]
- When physical is not real enoughFrank Bellosa. 25 [doi]
- A component-based approach to distributed system management: a use case with self-manageable J2EE clustersSara Bouchenak, Fabienne Boyer, Emmanuel Cecchet, Sébastien Jean, Alan Schmitt, Jean-Bernard Stefani. 26 [doi]
- Open problems in data collection networksJonathan Ledlie, Jeffrey Shneidman, Matt Welsh, Mema Roussopoulos, Margo I. Seltzer. 27 [doi]
- Separating durability and availability in self-managed storageGeoffrey Lefebvre, Michael J. Feeley. 28 [doi]
- EERAID: energy efficient redundant and inexpensive disk arrayDong Li, Jun Wang. 29 [doi]
- AP3: cooperative, decentralized anonymous communicationAlan Mislove, Gaurav Oberoi, Ansley Post, Charles Reis, Peter Druschel, Dan S. Wallach. 30 [doi]
- Undo for anyone, anywhere, anytimeJames O Brien, Marc Shapiro. 31 [doi]
- A step towards ubiquitous computing: an efficient flexible micro-ORBFrédéric Ogel, Bertil Folliot, Gaël Thomas. 32 [doi]
- Scalable strong consistency for web applicationsSwaminathan Sivasubramanian, Guillaume Pierre, Maarten van Steen. 33 [doi]
- Using AOP to develop architectural-neutral operating system componentsOlaf Spinczyk, Daniel Lohmann. 34 [doi]
- Long-term time-share guarantees are necessary for wireless LANsGodfrey Tan, John V. Guttag. 35 [doi]
- The lonely NATed nodeChad Yoshikawa, Brent N. Chun, Amin Vahdat, Fred S. Annexstein, Kenneth A. Berman. 36 [doi]
- Trust but verify: accountability for network servicesAydan R. Yumerefendi, Jeffrey S. Chase. 37 [doi]