Abstract is missing.
- VoIP SecurityHeison Chak.
- Hacking Perl²David N. Blank-Edelman.
- Hackers and FoundersPaul Graham. [doi]
- Deploying a Sensor Network on an Active VolcanoMatt Welsh. [doi]
- Computers, Developers, and The LawDan Appelman.
- Panel: Is University Systems Teaching and Research Relevant to Industry?Gernot Heiser. [doi]
- Privacy & CryptographySteven M. Bellovin.
- Permissive Action Links, Nuclear Weapons, and the History of Public Key CryptographySteven M. Bellovin. [doi]
- RRDTool: Logging and GraphingJohn Sellens.
- Surviving Spam MailGray Watson.
- PlanetLab: Evolution vs. Intelligent Design in Planetary-Scale InfrastructureLarry L. Peterson. [doi]
- Success, Failure, and Alternative Solutions for Network SecurityPeiter Zatko. [doi]
- Sure, You Can Archive Data, But Will You Be Able to Retrieve It in 20 Years?Evan Marcus.
- Architectures and Algorithms for Biomolecular SimulationCliff Young. [doi]
- Opening Remarks [doi]
- Gold and Fool s Gold: Successes, Failures, and Futures in Computer Systems ResearchButler W. Lampson. [doi]
- An Introduction to Software RadioEric Blossom. [doi]
- Algorithms and Data Structures for the 21st CenturyStephen C. Johnson.
- Security Is BrokenRik Farrow.
- Panel: Open Source Software Business ModelsStephen R. Walli. [doi]
- High Capacity and High Performance Storage on a Limited BudgetJacob Farmer.
- Routing Without Tears, Bridging Without DangerRadia J. Perlman. [doi]
- Antfarm: Tracking Processes in a Virtual Machine EnvironmentStephen T. Jones, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau. 1-14 [doi]
- Optimizing Network Virtualization in Xen (awarded best paper)Aravind Menon, Alan L. Cox, Willy Zwaenepoel. 15-28 [doi]
- High Performance VMM-Bypass I/O in Virtual MachinesJiuxing Liu, Wei Huang, Bülent Abali, Dhabaleswar K. Panda. 29-42 [doi]
- Provenance-Aware Storage SystemsKiran-Kumar Muniswamy-Reddy, David A. Holland, Uri Braun, Margo I. Seltzer. 43-56 [doi]
- Thresher: An Efficient Storage Manager for Copy-on-write SnapshotsLiuba Shrira, Hao Xu. 57-70 [doi]
- Design Tradeoffs in Applying Content Addressable Storage to Enterprise-scale Systems Based on Virtual MachinesPartho Nath, Michael Kozuch, David R. O Hallaron, Jan Harkes, Mahadev Satyanarayanan, Niraj Tolia, Matt Toups. 71-84 [doi]
- Compare-by-Hash: A Reasoned AnalysisJohn Black. 85-90 [doi]
- An Evaluation of Network Stack Parallelization Strategies in Modern Operating SystemsPaul Willmann, Scott Rixner, Alan L. Cox. 91-96 [doi]
- Disk Drive Level Workload CharacterizationAlma Riska, Erik Riedel. 97-102 [doi]
- Towards a Resilient Operating System for Wireless Sensor NetworksHyoseung Kim, Hojung Cha. 103-108 [doi]
- Transparent Contribution of MemoryJames Cipar, Mark D. Corner, Emery D. Berger. 109-114 [doi]
- Implementation and Evaluation of Moderate Parallelism in the BIND9 DNS ServerTatuya Jinmei, Paul Vixie. 115-128 [doi]
- Flux: A Language for Programming High-Performance ServersBrendan Burns, Kevin Grimaldi, Alexander Kostadinov, Emery D. Berger, Mark D. Corner. 129-142 [doi]
- Understanding and Addressing Blocking-Induced Network Server LatencyYaoping Ruan, Vivek S. Pai. 143-156 [doi]
- Reval: A Tool for Real-time Evaluation of DDoS Mitigation StrategiesRangarajan Vasudevan, Zhuoqing Morley Mao, Oliver Spatscheck, Jacobus E. van der Merwe. 157-170 [doi]
- LADS: Large-scale Automated DDoS Detection SystemVyas Sekar, Nick G. Duffield, Oliver Spatscheck, Jacobus E. van der Merwe, Hui Zhang. 171-184 [doi]
- Bump in the Ether: A Framework for Securing Sensitive User InputJonathan M. McCune, Adrian Perrig, Michael K. Reiter. 185-198 [doi]
- Sharing Networked Resources with Brokered LeasesDavid E. Irwin, Jeffrey S. Chase, Laura E. Grit, Aydan R. Yumerefendi, David Becker, Ken Yocum. 199-212 [doi]
- Understanding and Validating Database System AdministrationFábio Oliveira, Kiran Nagaraja, Rekha Bachwani, Ricardo Bianchini, Richard P. Martin, Thu D. Nguyen. 213-228 [doi]
- SMART: An Integrated Multi-Action Advisor for Storage SystemsLi Yin, Sandeep Uttamchandani, Madhukar R. Korupolu, Kaladhar Voruganti, Randy H. Katz. 229-242 [doi]
- sMonitor: A Non-Intrusive Client-Perceived End-to-End Performance Monitor of Secured Internet ServicesJianbin Wei, Cheng-Zhong Xu. 243-248 [doi]
- Privacy Analysis for Data Sharing in *nix SystemsAameek Singh, Ling Liu, Mustaque Ahamad. 249-254 [doi]
- Securing Web Service by Automatic Robot DetectionKyoungSoo Park, Vivek S. Pai, Kang-Won Lee, Seraphin B. Calo. 255-260 [doi]
- Cutting through the Confusion: A Measurement Study of Homograph AttacksTobias Holgers, David E. Watson, Steven D. Gribble. 261-266 [doi]
- Stealth Probing: Efficient Data-Plane Security for IP RoutingIoannis C. Avramopoulos, Jennifer Rexford. 267-272 [doi]
- Service Placement in a Shared Wide-Area PlatformDavid L. Oppenheimer, Brent N. Chun, David A. Patterson, Alex C. Snoeren, Amin Vahdat. 273-288 [doi]
- Replay Debugging for Distributed Applications (Awarded Best Paper!)Dennis Geels, Gautam Altekar, Scott Shenker, Ion Stoica. 289-300 [doi]
- Loose Synchronization for Large-Scale Networked SystemsJeannie R. Albrecht, Christopher Tuttle, Alex C. Snoeren, Amin Vahdat. 301-314 [doi]
- System- and Application-level Support for Runtime Hardware Reconfiguration on SoC PlatformsDimitris Syrivelis, Spyros Lalis. 315-327 [doi]
- Resilient Connections for SSH and TLSTeemu Koponen, Pasi Eronen, Mikko Särelä. 329-340 [doi]
- Structured and Unstructured Overlays under the Microscope: A Measurement-based View of Two P2P Systems That People UseYi Qiao, Fabián E. Bustamante. 341-355 [doi]
- Reclaiming Network-wide Visibility Using Ubiquitous Endsystem MonitorsEvan Cooke, Richard Mortier, Austin Donnelly, Paul Barham, Rebecca Isaacs. 357-362 [doi]
- Integrated Scientific Workflow Management for the Emulab Network TestbedEric Eide, Leigh Stoller, Tim Stack, Juliana Freire, Jay Lepreau. 363-368 [doi]
- How DNS Misnaming Distorts Internet Topology MappingMing Zhang, Yaoping Ruan, Vivek S. Pai, Jennifer Rexford. 369-374 [doi]
- Efficient Query Subscription Processing for Prospective Search EnginesUtku Irmak, Svilen Mihaylov, Torsten Suel, Samrat Ganguly, Rauf Izmailov. 375-380 [doi]
- IP Only ServerMuli Ben-Yehuda, Oleg Goldshmidt, Elliot K. Kolodner, Zorik Machulsky, Vadim Makhervaks, Julian Satran, Marc Segal, Leah Shalev, Ilan Shimony. 381-386 [doi]