Abstract is missing.
- Separating agreement from execution for byzantine fault tolerant services [doi]
- Upgrading transport protocols using untrusted mobile codeParveen Patel, Andrew Whitaker, David Wetherall, Jay Lepreau, Tim Stack. 1-14 [doi]
- Model-carrying code: a practical approach for safe execution of untrusted applicationsR. Sekar, V. N. Venkatakrishnan, Samik Basu, Sandeep Bhatkar, Daniel C. DuVarney. 15-28 [doi]
- The Google file systemSanjay Ghemawat, Howard Gobioff, Shun-Tak Leung. 29-43 [doi]
- Preserving peer replicas by rate-limited sampled votingPetros Maniatis, David S. H. Rosenthal, Mema Roussopoulos, Mary Baker, Thomas J. Giuli, Yanto Muliadi. 44-59 [doi]
- Decentralized user authentication in a global file systemMichael Kaminsky, George Savvides, David Mazières, M. Frans Kaashoek. 60-73 [doi]
- Performance debugging for distributed systems of black boxesMarcos Kawazoe Aguilera, Jeffrey C. Mogul, Janet L. Wiener, Patrick Reynolds, Athicha Muthitacharoen. 74-89 [doi]
- Transforming policies into mechanisms with infokernelAndrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Nathan C. Burnett, Timothy E. Denehy, Thomas J. Engle, Haryadi S. Gunawi, James A. Nugent, Florentina I. Popovici. 90-105 [doi]
- User-level internet path diagnosisRatul Mahajan, Neil T. Spring, David Wetherall, Thomas E. Anderson. 106-119 [doi]
- Samsara: honor among thieves in peer-to-peer storageLandon P. Cox, Brian D. Noble. 120-132 [doi]
- SHARP: an architecture for secure resource peeringYun Fu, Jeffrey S. Chase, Brent N. Chun, Stephen Schwab, Amin Vahdat. 133-148 [doi]
- Energy-efficient soft real-time CPU scheduling for mobile multimedia systemsWanghong Yuan, Klara Nahrstedt. 149-163 [doi]
- Xen and the art of virtualizationPaul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Timothy L. Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, Andrew Warfield. 164-177 [doi]
- Implementing an untrusted operating system on trusted hardwareDavid Lie, Chandramohan A. Thekkath, Mark Horowitz. 178-192 [doi]
- Terra: a virtual machine-based platform for trusted computingTal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh. 193-206 [doi]
- Improving the reliability of commodity operating systemsMichael M. Swift, Brian N. Bershad, Henry M. Levy. 207-222 [doi]
- Backtracking intrusionsSamuel T. King, Peter M. Chen. 223-236 [doi]
- RacerX: effective, static detection of race conditions and deadlocksDawson R. Engler, Ken Ashcraft. 237-252 [doi]
- Separating agreement from execution for byzantine fault tolerant servicesJian Yin, Jean-Philippe Martin, Arun Venkataramani, Lorenzo Alvisi, Michael Dahlin. 253-267 [doi]
- Capriccio: scalable threads for internet servicesJ. Robert von Behren, Jeremy Condit, Feng Zhou, George C. Necula, Eric A. Brewer. 268-281 [doi]
- Bullet: high bandwidth data dissemination using an overlay meshDejan Kostic, Adolfo Rodriguez, Jeannie R. Albrecht, Amin Vahdat. 282-297 [doi]
- SplitStream: high-bandwidth multicast in cooperative environmentsMiguel Castro, Peter Druschel, Anne-Marie Kermarrec, Animesh Nandi, Antony I. T. Rowstron, Atul Singh. 298-313 [doi]
- Measurement, modeling, and analysis of a peer-to-peer file-sharing workloadP. Krishna Gummadi, Richard J. Dunn, Stefan Saroiu, Steven D. Gribble, Henry M. Levy, John Zahorjan. 314-329 [doi]