Abstract is missing.
- PipeDream: generalized pipeline parallelism for DNN trainingDeepak Narayanan, Aaron Harlap, Amar Phanishayee, Vivek Seshadri, Nikhil R. Devanur, Gregory R. Ganger, Phillip B. Gibbons, Matei Zaharia. 1-15 [doi]
- A generic communication scheduler for distributed DNN training accelerationYanghua Peng, Yibo Zhu, Yangrui Chen, Yixin Bao, Bairen Yi, Chang Lan, Chuan Wu, Chuanxiong Guo. 16-29 [doi]
- Parity models: erasure-coded resilience for prediction serving systemsJack Kosaian, K. V. Rashmi, Shivaram Venkataraman. 30-46 [doi]
- TASO: optimizing deep learning computation with automatic generation of graph substitutionsZhihao Jia, Oded Padon, James J. Thomas, Todd Warszawski, Matei Zaharia, Alex Aiken. 47-62 [doi]
- Teechain: a secure payment network with asynchronous blockchain accessJoshua Lind, Oded Naor, Ittay Eyal, Florian Kelbert, Emin Gün Sirer, Peter R. Pietzuch. 63-79 [doi]
- Fast and secure global payments with StellarMarta Lokhava, Giuliano Losa, David Mazières, Graydon Hoare, Nicolas Barry, Eli Gafni, Jonathan Jove, Rafal Malinowsky, Jed McCaleb. 80-96 [doi]
- Notary: a device for secure transaction approvalAnish Athalye, Adam Belay, M. Frans Kaashoek, Robert Tappan Morris, Nickolai Zeldovich. 97-113 [doi]
- CrashTuner: detecting crash-recovery bugs in cloud systems via meta-info analysisJie Lu, Chen Liu, Lian Li 0002, Xiaobing Feng 0002, Feng Tan, Jun Yang, Liang You. 114-130 [doi]
- The inflection point hypothesis: a principled debugging approach for locating the root cause of a failureYongle Zhang, Kirk Rodrigues, Yu Luo, Michael Stumm, Ding Yuan. 131-146 [doi]
- Finding semantic bugs in file systems with an extensible fuzzing frameworkSeulbae Kim, Meng Xu, Sanidhya Kashyap, Jungyeon Yoon, Wen Xu, Taesoo Kim. 147-161 [doi]
- Efficient scalable thread-safety-violation detection: finding thousands of concurrency bugs during testingGuangpu Li, Shan Lu, Madanlal Musuvathi, Suman Nath, Rohan Padhye. 162-180 [doi]
- Privacy accounting and quality control in the sage differentially private ML platformMathias Lécuyer, Riley Spahn, Kiran Vodrahalli, Roxana Geambasu, Daniel Hsu 0001. 181-195 [doi]
- Honeycrisp: large-scale differentially private aggregation without a trusted coreEdo Roth, Daniel Noble, Brett Hemenway Falk, Andreas Haeberlen. 196-210 [doi]
- Yodel: strong metadata security for voice callsDavid Lazar, Yossi Gilad, Nickolai Zeldovich. 211-224 [doi]
- Scaling symbolic evaluation for automated verification of systems code with ServalLuke Nelson, James Bornholt, Ronghui Gu, Andrew Baumann, Emina Torlak, Xi Wang. 225-242 [doi]
- Verifying concurrent, crash-safe systems with PerennialTej Chajed, Joseph Tassarotti, M. Frans Kaashoek, Nickolai Zeldovich. 243-258 [doi]
- Using concurrent relational logic with helpers for verifying the AtomFS file systemMo Zou, Haoran Ding, Dong Du, Ming Fu, Ronghui Gu, Haibo Chen. 259-274 [doi]
- Verifying software network functions with no verification expertiseArseniy Zaostrovnykh, Solal Pirelli, Rishabh R. Iyer, Matteo Rizzo, Luis Pedrosa, Katerina J. Argyraki, George Candea. 275-290 [doi]
- Optimizing data-intensive computations in existing libraries with split annotationsShoumik Palkar, Matei Zaharia. 291-305 [doi]
- Niijima: sound and automated computation consolidation for efficient multilingual data-parallel pipelinesGuoqing Harry Xu, Margus Veanes, Michael Barnett 0001, Madan Musuvathi, Todd Mytkowicz, Ben Zorn, Huan He, Haibo Lin. 306-321 [doi]
- Nexus: a GPU cluster engine for accelerating DNN-based video analysisHaichen Shen, Lequn Chen, Yuchen Jin, Liangyu Zhao, Bingyu Kong, Matthai Philipose, Arvind Krishnamurthy, Ravi Sundaram. 322-337 [doi]
- Lineage stash: fault tolerance off the critical pathStephanie Wang, John Liagouris, Robert Nishihara, Philipp Moritz, Ujval Misra, Alexey Tumanov, Ion Stoica. 338-352 [doi]
- File systems unfit as distributed storage backends: lessons from 10 years of Ceph evolutionAbutalib Aghayev, Sage Weil, Michael Kuchnik, Mark Nelson, Gregory R. Ganger, George Amvrosiadis. 353-369 [doi]
- I4: incremental inference of inductive invariants for verification of distributed protocolsHaojun Ma, Aman Goel, Jean-Baptiste Jeannin, Manos Kapritsos, Baris Kasikci, Karem A. Sakallah. 370-384 [doi]
- Aegean: replication beyond the client-server modelRemzi Can Aksoy, Manos Kapritsos. 385-398 [doi]
- Snap: a microkernel approach to host networkingMichael Marty, Marc de Kruijf, Jacob Adriaens, Christopher Alfeld, Sean Bauer, Carlo Contavalli, Michael Dalton, Nandita Dukkipati, William C. Evans, Steve Gribble, Nicholas Kidd, Roman Kononov, Gautam Kumar, Carl Mauer, Emily Musick, Lena Olson, Erik Rubow, Michael Ryan, Kevin Springborn, Paul Turner, Valas Valancius, Xi Wang, Amin Vahdat. 399-413 [doi]
- Risk based planning of network changes in evolving data centersOmid Alipourfard, Jiaqi Gao, Jérémie Koenig, Chris Harshaw, Amin Vahdat, Minlan Yu. 414-429 [doi]
- Taiji: managing global user traffic for large-scale internet services at the edgeDavid Chou, Tianyin Xu, Kaushik Veeraraghavan, Andrew Newell, Sonia Margulis, Lin Xiao, Pol Mauri Ruiz, Justin Meza, Kiryong Ha, Shruti Padmanabha, Kevin Cole, Dmitri Perelman. 430-446 [doi]
- KVell: the design and implementation of a fast persistent key-value storeBaptiste Lepers, Oana Balmau, Karan Gupta, Willy Zwaenepoel. 447-461 [doi]
- Recipe: converting concurrent DRAM indexes to persistent-memory indexesSe Kwon Lee, Jayashree Mohan, Sanidhya Kashyap, Taesoo Kim, Vijay Chidambaram. 462-477 [doi]
- Performance and protection in the ZoFS user-space NVM file systemMingkai Dong, Heng Bu, Jifei Yi, Benchao Dong, Haibo Chen. 478-493 [doi]
- SplitFS: reducing software overhead in file systems for persistent memoryRohan Kadekodi, Se Kwon Lee, Sanidhya Kashyap, Taesoo Kim, Aasheesh Kolli, Vijay Chidambaram. 494-508 [doi]
- AutoMine: harmonizing high-level abstraction and high performance for graph miningDaniel Mawhirter, Bo Wu 0002. 509-523 [doi]
- KnightKing: a fast distributed graph random walk engineKe Yang, Mingxing Zhang, Kang Chen, Xiaosong Ma, Yang Bai, Yong Jiang. 524-537 [doi]
- Gerenuk: thin computation over big native data using speculative program transformationChristian Navasca, Cheng Cai, Khanh Nguyen, Brian Demsky, Shan Lu, Miryung Kim, Guoqing Harry Xu. 538-553 [doi]
- An analysis of performance evolution of Linux's core operationsXiang (Jenny) Ren, Kirk Rodrigues, Luyuan Chen, Camilo Vega, Michael Stumm, Ding Yuan. 554-569 [doi]
- ShortCut: accelerating mostly-deterministic code regionsXianzheng Dou, Peter M. Chen, Jason Flinn. 570-585 [doi]
- Scalable and practical locking with shufflingSanidhya Kashyap, Irina Calciu, Xiaohe Cheng, Changwoo Min, Taesoo Kim. 586-599 [doi]