Abstract is missing.
- Debugging Operating Systems with Time-Traveling Virtual Machines (Awarded General Track Best Paper Award!)Samuel T. King, George W. Dunlap, Peter M. Chen. 1-15 [doi]
- Using Valgrind to Detect Undefined Value Errors with Bit-PrecisionJulian Seward, Nicholas Nethercote. 17-30 [doi]
- Pulse: A Dynamic Deadlock Detection Mechanism Using Speculative ExecutionTong Li, Carla Schlatter Ellis, Alvin R. Lebeck, Daniel J. Sorin. 31-44 [doi]
- Surviving Internet CatastrophesFlavio Paiva Junqueira, Ranjita Bhagwan, Alejandro Hevia, Keith Marzullo, Geoffrey M. Voelker. 45-60 [doi]
- Making Scheduling Cool : Temperature-Aware Workload Placement in Data CentersJustin D. Moore, Jeffrey S. Chase, Parthasarathy Ranganathan, Ratnesh K. Sharma. 61-75 [doi]
- CHAMELEON: A Self-Evolving, Fully-Adaptive Resource Arbitrator for Storage SystemsSandeep Uttamchandani, Li Yin, Guillermo A. Alvarez, John Palmer, Gul A. Agha. 75-88 [doi]
- A Transactional Flash File System for MicrocontrollersEran Gal, Sivan Toledo. 89-104 [doi]
- Analysis and Evolution of Journaling File SystemsVijayan Prabhakaran, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau. 105-120 [doi]
- Comparison-Based File Server VerificationYuen-Lin Tan, Terrence Wong, John D. Strunk, Gregory R. Ganger. 121-133 [doi]
- Active Internet Traffic Filtering: Real-Time Response to Denial-of-Service AttacksKaterina J. Argyraki, David R. Cheriton. 135-148 [doi]
- Building a Reactive Immune System for Software ServicesStelios Sidiroglou, Michael E. Locasto, Stephen W. Boyd, Angelos D. Keromytis. 149-161 [doi]
- Attrition Defenses for a Peer-to-Peer Digital Preservation SystemThomas J. Giuli, Petros Maniatis, Mary Baker, David S. H. Rosenthal, Mema Roussopoulos. 163-178 [doi]
- Peer-to-Peer Communication Across Network Address TranslatorsBryan Ford, Pyda Srisuresh, Dan Kegel. 179-192 [doi]
- Maintaining High-Bandwidth Under Dynamic Network ConditionsDejan Kostic, Ryan Braud, Charles Edwin Killian, Erik Vandekieft, James W. Anderson, Alex C. Snoeren, Amin Vahdat. 193-208 [doi]
- Server Network Scalability and TCP OffloadDouglas Freimuth, Elbert C. Hu, Jason D. LaVoie, Ronald Mraz, Erich M. Nahum, Prashant Pradhan, John M. Tracey. 209-222 [doi]
- A Portable Kernel Abstraction for Low-Overhead Ephemeral Mapping ManagementKhaled Elmeleegy, Anupam Chanda, Alan L. Cox, Willy Zwaenepoel. 223-236 [doi]
- Adaptive Main Memory CompressionIrina Chihaia Tuduce, Thomas R. Gross. 237-250 [doi]
- Drive-Thru: Fast, Accurate Evaluation of Storage Power ManagementDaniel Peek, Jason Flinn. 251-264 [doi]
- Itanium - A System Implementor s Tale(Awarded General Track Best Student Paper Award!)Charles Gray, Matthew Chapman, Peter Chubb, David Mosberger, Gernot Heiser. 265-278 [doi]
- Providing Dynamic Update in an Operating SystemAndrew Baumann, Gernot Heiser, Jonathan Appavoo, Dilma Da Silva, Orran Krieger, Robert W. Wisniewski, Jeremy Kerr. 279-291 [doi]
- SARC: Sequential Prefetching in Adaptive Replacement CacheBinny S. Gill, Dharmendra S. Modha. 293-308 [doi]
- SLINKY: Static Linking ReloadedChristian S. Collberg, John H. Hartman, Sridivya Babu, Sharath K. Udupa. 309-322 [doi]
- CLOCK-Pro: An Effective Improvement of the CLOCK ReplacementSong Jiang, Feng Chen, Xiaodong Zhang. 323-336 [doi]
- Group Ratio Round-Robin: O(1) Proportional Share Scheduling for Uniprocessor and Multiprocessor SystemsBogdan Caprita, Wong Chun Chan, Jason Nieh, Clifford Stein, Haoqiang Zheng. 337-352 [doi]
- A Hierarchical Semantic Overlay Approach to P2P Similarity SearchDuc A. Tran. 355-358 [doi]
- A Parts-of-File File SystemYoann Padioleau, Olivier Ridoux. 359-362 [doi]
- BINDER: An Extrusion-Based Break-In Detector for Personal ComputersWeidong Cui, Randy H. Katz, Wai-tian Tan. 363-366 [doi]
- Proper: Privileged Operations in a Virtualised System EnvironmentSteve Muir, Larry L. Peterson, Marc E. Fiuczynski, Justin Cappos, John H. Hartman. 367-370 [doi]
- AMP: Program Context Specific Buffer CachingFeng Zhou, J. Robert von Behren, Eric A. Brewer. 371-374 [doi]
- Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing SystemsZhenkai Liang, R. Sekar, Daniel C. DuVarney. 375-378 [doi]
- Facilitating the Development of Soft DevicesAndrew Warfield, Steven Hand, Keir Fraser, Tim Deegan. 379-382 [doi]
- Implementing Transparent Shared Memory on Clusters Using Virtual MachinesMatthew Chapman, Gernot Heiser. 383-386 [doi]
- Measuring CPU Overhead for I/O Processing in the Xen Virtual Machine MonitorLudmila Cherkasova, Rob Gardner. 387-390 [doi]
- Fast Transparent Migration for Virtual MachinesMichael Nelson, Beng-Hong Lim, Greg Hutchins. 391-394 [doi]
- Performance of Multithreaded Chip Multiprocessors and Implications for Operating System DesignAlexandra Fedorova, Margo I. Seltzer, Christopher Small, Daniel Nussbaum. 395-398 [doi]
- Hyper-Threading Aware Process Scheduling HeuristicsJames R. Bulpin, Ian Pratt. 399-402 [doi]