Abstract is missing.
- Opening remarksKenneth P. Birman. [doi]
- Keynote speechAndrew S. Tanenbaum. [doi]
- P2p: still worthless? [doi]
- Peer to peer: still useless? [doi]
- Are P2P concepts worth pursuing? [doi]
- Peerlessness is next to godlessnessJon Crowcroft. [doi]
- t-kernel: a naturalizing OS kernel for low-power cost-effective computersLin Gu 0001, John A. Stankovic. 1-2 [doi]
- Distributed operating system for resource discovery and allocation in federated clustersEmmanuel Jeanvoine. 1-2 [doi]
- Model-based validation for dealing with operator mistakesKiran Nagaraja, Andrew Tjang, Fábio Oliveira, Ricardo Bianchini, Richard P. Martin, Thu D. Nguyen. 1-2 [doi]
- A need for componentized transport protocolsTyson Condie, Joseph M. Hellerstein, Petros Maniatis, Sean Rhea, Timothy Roscoe. 1-2 [doi]
- To infinity and beyond: time warped network emulationDiwaker Gupta, Kenneth Yocum, Marvin McNett, Alex C. Snoeren, Amin Vahdat, Geoffrey M. Voelker. 1-2 [doi]
- Recovery oriented programmingOlga Brukman, Shlomi Dolev, Marcelo Sihman. 1 [doi]
- Self-stabilizing operating systemsShlomi Dolev, Reuven Yagel. 1-2 [doi]
- Supporting arbitrary queries in peer-to-peer networks using hybrid routingVivek Sawant, Jasleen Kaur. 1-2 [doi]
- Towards scalable and simple software-DSM systemsKenji Kise, Takahiro Katagiri, Hiroki Honda, Toshitsugu Yuba. 1-13 [doi]
- LLSS: toward system support for plugging privacy leaksAydan R. Yumerefendi, Landon P. Cox. 1 [doi]
- MON: management overlay networks for distributed systemsJin Liang, Steven Y. Ko, Indranil Gupta, Klara Nahrstedt. 1-2 [doi]
- Turning flash crowds into smart mobs with real-time stochastic detection and adaptive cooperative cachingJay A. Patel, Charles M. Yang, Indranil Gupta. 1 [doi]
- UIA: a user information architecture for personal devicesBryan Ford, Jacob Strauss, Chris Lesniewski-Laas, M. Frans Kaashoek, Robert Morris 0005, Sean C. Rhea. 1-2 [doi]
- Pre-virtualization: uniting two worldsJoshua LeVasseur, Volkmar Uhlig, Ben Leslie, Matthew Chapman, Gernot Heiser. 1-2 [doi]
- Efficient file storage using content-based indexingJoão Barreto, Paulo Ferreira. 1-9 [doi]
- INSIGHT: a distributed monitoring system for tracking continuous queriesNavendu Jain, Praveen Yalagandula, Mike Dahlin, Yin Zhang. 1 [doi]
- Pioneer: verifying code integrity and enforcing untampered code execution on legacy systemsArvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla. 1-16 [doi]
- The KudOS architecture for file systemsAndrew de los Reyes, Christopher Frost 0001, Eddie Kohler, Mike Mammarella, Lei Zhang. 1-2 [doi]
- Kairos: a macro-programming system for wireless sensor networksRamakrishna Gummadi, Nupur Kothari, Ramesh Govindan, Todd D. Millstein. 1-2 [doi]
- What the protocol stack missed: the transfer serviceNiraj Tolia, David G. Andersen, Michael Kaminsky, Swapnil V. Patil. 1-2 [doi]
- Sending more for less bandwidth and power: a systems approach to network codingWenjun Hu, Sachin Katti, Hariharan Rahul, Dina Katabi, Jon Crowcroft. 1-2 [doi]
- Analysis of malicious abstract sensor faults in adaptive measurement-based overlay networksAaron Walters, Cristina Nita-Rotaru. 1-2 [doi]
- Improving the energy efficiency of high-performance server systemsMatthew E. Tolentino, Kirk W. Cameron. 1 [doi]
- Transaction mix performance models: methods and application to performance anomaly detectionTerence Kelly. 1-3 [doi]
- Service placement in shared wide-area platformsDavid Oppenheimer, Brent N. Chun, David A. Patterson 0001, Alex C. Snoeren, Amin Vahdat. 1 [doi]
- Nexus: a new operating system for trustworthy computingAlan Shieh, Dan Williams 0001, Emin Gün Sirer, Fred B. Schneider. 1-2 [doi]
- Architecting a secure internetSaikat Guha 0002, Paul Francis. 1 [doi]
- Using model checker and replay facility to debug complex distributed systemXuezheng Liu, Aimin Pan, Wei Lin, Zheng Zhang 0001. 1 [doi]
- Proactive operating system recoveryHiroo Ishikawa, Tatsuo Nakajima, Shuichi Oikawa, Toshio Hirotsu. 1-2 [doi]
- A virtual machine monitor for utilizing non-dedicated clustersKenji Kaneda, Yoshihiro Oyama, Akinori Yonezawa. 1-2 [doi]
- Anemone: adaptive network memory engineMichael R. Hines, Mark Lewandowski, Kartik Gopalan. 1 [doi]
- Making enterprise storage more search-friendlyShankar Pasupathy, Garth R. Goodson, Vijayan Prabhakaran. 1-2 [doi]
- The case for an object-based peer-to-peer reputation systemKevin Walsh 0001, Emin Gün Sirer. 1-2 [doi]
- Versatile, portable, and efficient OS profiling via latency analysisNikolai Joukov, Rakesh Iyer, Avishay Traeger, Charles P. Wright, Erez Zadok. 1-14 [doi]
- The case for judicious resource managementChristian Poellabauer, Timothy Durnan. 1-2 [doi]
- PersiFS: a versioned file system with an efficient representationDan R. K. Ports, Austin T. Clements, Erik D. Demaine. 1-2 [doi]
- Scalable querying and tracking of sensor networks from mobile platformsStefan Pleisch, Ken Birman. 1-2 [doi]
- Operating system construction in HaskellRebekah Leslie, Mark P. Jones. 1-2 [doi]
- Experiences with Pip: finding unexpected behavior in distributed systemsPatrick Reynolds, Janet L. Wiener, Jeffrey C. Mogul, Mehul A. Shah, Charles Killian, Amin Vahdat. 1-2 [doi]
- Sensor networks for high-resolution monitoring of volcanic activityMatt Welsh, Geoff Werner Allen, Konrad Lorincz, Omar Marcillo, Jeff Johnson 0001, Mario Ruiz, Jonathan Lees. 1 [doi]
- DDVS: distributed dynamic voltage scalingTimothy Durnan, Christian Poellabauer. 1 [doi]
- An infrastructure for the development of kernel network services proof of concept: fast UDPEdgar A. León, Michal Ostrowski. 1-2 [doi]
- CobWeb: a proactive analysis-driven approach to content distributionYee Jiun Song, Venugopalan Ramasubramanian, Emin Gün Sirer. 1-3 [doi]
- OS support for multi-gigabit networkingWillem de Bruijn, Herbert Bos. 1-2 [doi]
- Improving dynamic update for operating systemsAndrew Baumann, Jonathan Appavoo. 1-2 [doi]
- A virtual machine monitor for utilizing non-dedicated clustersKenji Kaneda, Yoshihiro Oyama, Akinori Yonezawa. 1-2 [doi]
- Daphne: performance debugging using model-driven anomaly characterizationChristopher Stewart, Kai Shen. 1-2 [doi]
- ExtraVirt: detecting and recovering from transient processor faultsDominic G. Lucchetti, Steven K. Reinhardt, Peter M. Chen. 1-2 [doi]
- Labels and event processes in the Asbestos operating systemPetros Efstathopoulos, Maxwell N. Krohn, Steve Vandebogart, Cliff Frey, David Ziegler, Eddie Kohler, David Mazières, M. Frans Kaashoek, Robert Morris. 17-30 [doi]
- Mondrix: memory isolation for linux using mondriaan memory protectionEmmett Witchel, Junghwan Rhee, Krste Asanovic. 31-44 [doi]
- BAR fault tolerance for cooperative servicesAmitanand S. Aiyer, Lorenzo Alvisi, Allen Clement, Michael Dahlin, Jean-Philippe Martin, Carl Porth. 45-58 [doi]
- Fault-scalable Byzantine fault-tolerant servicesMichael Abd-El-Malek, Gregory R. Ganger, Garth R. Goodson, Michael K. Reiter, Jay J. Wylie. 59-74 [doi]
- Implementing declarative overlaysBoon Thau Loo, Tyson Condie, Joseph M. Hellerstein, Petros Maniatis, Timothy Roscoe, Ion Stoica. 75-90 [doi]
- Detecting past and present intrusions through vulnerability-specific predicatesAshlesha Joshi, Samuel T. King, George W. Dunlap, Peter M. Chen. 91-104 [doi]
- Capturing, indexing, clustering, and retrieving system historyIra Cohen, Steve Zhang, Moisés Goldszmidt, Julie Symons, Terence Kelly, Armando Fox. 105-118 [doi]
- Connections: using context to enhance file searchCraig A. N. Soules, Gregory R. Ganger. 119-132 [doi]
- Vigilante: end-to-end containment of internet wormsManuel Costa, Jon Crowcroft, Miguel Castro, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham. 133-147 [doi]
- Scalability, fidelity, and containment in the potemkin virtual honeyfarmMichael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage. 148-162 [doi]
- The taser intrusion recovery systemAshvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li, Eyal de Lara. 163-176 [doi]
- Hibernator: helping disk arrays sleep through the winterQingbo Zhu, Zhifeng Chen, Lin Tan, Yuanyuan Zhou, Kimberly Keeton, John Wilkes. 177-190 [doi]
- Speculative execution in a distributed file systemEdmund B. Nightingale, Peter M. Chen, Jason Flinn. 191-205 [doi]
- IRON file systemsVijayan Prabhakaran, Lakshmi N. Bairavasundaram, Nitin Agrawal, Haryadi S. Gunawi, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau. 206-220 [doi]
- RaceTrack: efficient detection of data race conditions via adaptive trackingYuan Yu, Tom Rodeheffer, Wei Chen. 221-234 [doi]
- Rx: treating bugs as allergies - a safe method to survive software failuresFeng Qin, Joseph Tucek, Jagadeesan Sundaresan, Yuanyuan Zhou. 235-248 [doi]
- Idletime scheduling with preemption intervalsLars Eggert, Joseph D. Touch. 249-262 [doi]
- FS2: dynamic data replication in free disk space for improving disk performance and energy consumptionHai Huang, Wanda Hung, Kang G. Shin. 263-276 [doi]
- THINC: a virtual display architecture for thin-client computingRicardo A. Baratto, Leonard N. Kim, Jason Nieh. 277-290 [doi]