Abstract is missing.
- SILT: a memory-efficient, high-performance key-value storeHyeontaek Lim, Bin Fan, David G. Andersen, Michael Kaminsky. 1-13 [doi]
- Scalable consistency in ScatterLisa Glendenning, Ivan Beschastnikh, Arvind Krishnamurthy, Thomas E. Anderson. 15-28 [doi]
- Fast crash recovery in RAMCloudDiego Ongaro, Stephen M. Rumble, Ryan Stutsman, John K. Ousterhout, Mendel Rosenblum. 29-41 [doi]
- Design implications for enterprise storage systems via multi-dimensional trace analysisYanpei Chen, Kiran Srinivasan, Garth R. Goodson, Randy H. Katz. 43-56 [doi]
- Differentiated storage servicesMichael P. Mesnier, Feng Chen, Tian Luo, Jason B. Akers. 57-70 [doi]
- A file is not a file: understanding the I/O behavior of Apple desktop applicationsTyler Harter, Chris Dragga, Michael Vaughn, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau. 71-83 [doi]
- CryptDB: protecting confidentiality with encrypted query processingRaluca A. Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan. 85-100 [doi]
- Intrusion recovery for database-backed web applicationsRamesh Chandra, Taesoo Kim, Meelap Shah, Neha Narula, Nickolai Zeldovich. 101-114 [doi]
- Software fault isolation with API integrity and multi-principal modulesYandong Mao, Haogang Chen, Dong Zhou, Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek. 115-128 [doi]
- Thialfi: a client notification service for internet-scale applicationsAtul Adya, Gregory Cooper, Daniel Myers, Michael Piatek. 129-142 [doi]
- Windows Azure Storage: a highly available cloud storage service with strong consistencyBrad Calder, Ju Wang, Aaron Ogus, Niranjan Nilakantan, Arild Skjolsvold, Sam McKelvie, Yikang Xu, Shashwat Srivastav, Jiesheng Wu, Huseyin Simitci, Jaidev Haridas, Chakravarthy Uddaraju, Hemal Khatri, Andrew Edwards, Vaman Bedekar, Shane Mainali, Rafay Abbasi, Arpit Agarwal, Mian Fahim ul Haq, Muhammad Ikram ul Haq, Deepali Bhardwaj, Sowmya Dayanand, Anitha Adusumilli, Marvin McNett, Sriram Sankaran, Kavitha Manivannan, Leonidas Rigas. 143-157 [doi]
- An empirical study on configuration errors in commercial and open source systemsZuoning Yin, Xiao Ma, Jing Zheng, Yuanyuan Zhou, Lakshmi N. Bairavasundaram, Shankar Pasupathy. 159-172 [doi]
- Cells: a virtual mobile smartphone architectureJeremy Andrus, Christoffer Dall, Alexander Van't Hof, Oren Laadan, Jason Nieh. 173-187 [doi]
- Breaking up is hard to do: security and functionality in a commodity hypervisorPatrick Colp, Mihir Nanavati, Jun Zhu, William Aiello, George Coker, Tim Deegan, Peter Loscocco, Andrew Warfield. 189-202 [doi]
- CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualizationFengzhe Zhang, Jin Chen, Haibo Chen, Binyu Zang. 203-216 [doi]
- Atlantis: robust, extensible execution environments for web applicationsJames Mickens, Mohan Dhawan. 217-231 [doi]
- PTask: operating system abstractions to manage GPUs as compute devicesChristopher J. Rossbach, Jon Currey, Mark Silberstein, Baishakhi Ray, Emmett Witchel. 233-248 [doi]
- Logical attestation: an authorization architecture for trustworthy computingEmin Gün Sirer, Willem de Bruijn, Patrick Reynolds, Alan Shieh, Kevin Walsh, Dan Williams, Fred B. Schneider. 249-264 [doi]
- Practical software model checking via dynamic interface reductionHuayang Guo, Ming Wu, Lidong Zhou, Gang Hu, Junfeng Yang, Lintao Zhang. 265-278 [doi]
- Detecting failures in distributed systems with the Falcon spy networkJoshua B. Leners, Hao Wu, Wei-Lun Hung, Marcos Kawazoe Aguilera, Michael Walfish. 279-294 [doi]
- Secure network provenanceWenchao Zhou, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, Micah Sherr. 295-310 [doi]
- Fay: extensible distributed tracing from kernels to clustersÚlfar Erlingsson, Marcus Peinado, Simon Peter, Mihai Budiu. 311-326 [doi]
- Dthreads: efficient deterministic multithreadingTongping Liu, Charlie Curtsinger, Emery D. Berger. 327-336 [doi]
- Efficient deterministic multithreading through schedule relaxationHeming Cui, Jingyue Wu, John Gallagher, Huayang Guo, Junfeng Yang. 337-351 [doi]
- Pervasive detection of process races in deployed systemsOren Laadan, Nicolas Viennot, Chia-che Tsai, Chris Blinn, Junfeng Yang, Jason Nieh. 353-367 [doi]
- Detecting and surviving data races using complementary schedulesKaushik Veeraraghavan, Peter M. Chen, Jason Flinn, Satish Narayanasamy. 369-384 [doi]
- Transactional storage for geo-replicated systemsYair Sovran, Russell Power, Marcos K. Aguilera, Jinyang Li. 385-400 [doi]
- Don't settle for eventual: scalable causal consistency for wide-area storage with COPSWyatt Lloyd, Michael J. Freedman, Michael Kaminsky, David G. Andersen. 401-416 [doi]