Abstract is missing.
- Building and Running an Open-Source Community: The FreeBSD ProjectMarshall K. McKusick.
- Python Programming LanguageGuido van Rossum.
- LiveJournal s Backend TechnologiesBrad Fitzpatrick. [doi]
- MapReduce and Other Building Blocks for Large-Scale Distributed Systems at GoogleJeffrey Dean. [doi]
- Perfect Data in an Imperfect WorldDaniel V. Klein. [doi]
- VMware Virtual Infrastructure Tools and TechniquesJohn Arrasjid, Shridhar Deuskar, Irfan Ahmad.
- Life Is Not a State-Machine: The Long Road from Research to ProductionWerner Vogels. [doi]
- DatacentersCary Roberts.
- UNIX/Linux and Active Directory InteroperabilityGerald Carter.
- Second LifeRob Lanphier, Mark Lentczner. [doi]
- Warehouse-scale ComputersLuiz André Barroso. [doi]
- The Impact of Virtualization on Computing SystemsMendel Rosenblum. [doi]
- Advanced PerlTom Christiansen.
- Programming LanguagesStephen C. Johnson.
- Security Is BrokenRik Farrow.
- Human ComputationLuis von Ahn. [doi]
- Exploiting Online GamesGary McGraw. [doi]
- Live Malware Attack!Paul Ducklin. [doi]
- Specializing General-Purpose Computing: A New Approach to Designing Clusters for High-Performance Technical ComputingG. Winfield Treese. [doi]
- Wireless NetworksRudi van Drunen.
- Crossing the Digital Divide: The Latest Efforts from One Laptop per ChildMary Lou Jepsen. [doi]
- Energy Management for Hypervisor-Based Virtual MachinesJan Stoess, Christian Lang, Frank Bellosa. 1-14 [doi]
- Xenprobus, a Lightweight User-Space Probing Framework for Xen Virtual MachineAnh-Quynh Nguyen, Kuniyasu Suzaki. 15-28 [doi]
- Virtual Machine Memory Access Tracing with Hypervisor Exclusive CachePin Lu, Kai Shen. 29-43 [doi]
- Hyperion: High Volume Stream Archival for Retrospective QueryingPeter Desnoyers, Prashant J. Shenoy. 45-58 [doi]
- Load Shedding in Network Monitoring ApplicationsPere Barlet-Ros, Gianluca Iannaccone, Josep Sanjuàs-Cuxart, Diego Amores-López, Josep Solé-Pareta. 59-72 [doi]
- Configuration Management at Massive Scale: System Design and ExperienceWilliam Enck, Patrick Drew McDaniel, Subhabrata Sen, Panagiotis Sebos, Sylke Spoerel, Albert G. Greenberg, Sanjay G. Rao, William Aiello. 73-86 [doi]
- Events Can Make SenseMaxwell N. Krohn, Eddie Kohler, M. Frans Kaashoek. 87-100 [doi]
- MapJAX: Data Structure Abstractions for Asynchronous Web ApplicationsDaniel S. Myers, Jennifer N. Carlisle, James A. Cowling, Barbara Liskov. 101-114 [doi]
- Sprockets: Safe Extensions for Distributed File SystemsDaniel Peek, Edmund B. Nightingale, Brett D. Higgins, Puspesh Kumar, Jason Flinn. 115-128 [doi]
- SafeStore: A Durable and Practical Storage SystemRamakrishna Kotla, Lorenzo Alvisi, Michael Dahlin. 129-142 [doi]
- POTSHARDS: Secure Long-Term Storage Without EncryptionMark W. Storer, Kevin M. Greenan, Ethan L. Miller, Kaladhar Voruganti. 142-156 [doi]
- Dandelion: Cooperative Content Distribution with Robust IncentivesMichael Sirivianos, Jong Han Park, Xiaowei Yang, Stanislaw Jarecki. 157-170 [doi]
- Using Provenance to Aid in Personal File SearchSam Shah, Craig A. N. Soules, Gregory R. Ganger, Brian D. Noble. 171-184 [doi]
- Supporting Practical Content-Addressable Caching with CZIP CompressionKyoungSoo Park, Sunghwan Ihm, Mic Bowman, Vivek S. Pai. 185-198 [doi]
- Implementation and Performance Evaluation of Fuzzy File Block MatchingBo Han, Peter J. Keleher. 199-204 [doi]
- From Trusted to Secure: Building and Executing Applications That Enforce System SecurityBoniface Hicks, Sandra Rueda, Trent Jaeger, Patrick Drew McDaniel. 205-218 [doi]
- From STEM to SEAD: Speculative Execution for Automated DefenseMichael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis. 219-232 [doi]
- Dynamic Spyware AnalysisManuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, Dawn Xiaodong Song. 233-246 [doi]
- Evaluating Block-level Optimization Through the IO PathAlma Riska, James Larkby-Lahet, Erik Riedel. 247-260 [doi]
- DiskSeen: Exploiting Disk Layout and Access History to Enhance I/O PrefetchXiaoning Ding, Song Jiang, Feng Chen, Kei Davis, Xiaodong Zhang. 261-274 [doi]
- A Memory Soft Error Measurement on Production SystemsXin Li, Kai Shen, Michael C. Huang, Lingkun Chu. 275-280 [doi]
- Addressing Email Loss with SureMail: Measurement, Design, and EvaluationSharad Agarwal, Venkata N. Padmanabhan, Dilip Antony Joseph. 281-294 [doi]
- Wresting Control from BGP: Scalable Fine-Grained Route ControlPatrick Verkaik, Dan Pei, Tom Scholl, Aman Shaikh, Alex C. Snoeren, Jacobus E. van der Merwe. 295-308 [doi]
- A Comparison of Structured and Unstructured P2P Approaches to Heterogeneous Random Peer SelectionVivek Vishnumurthy, Paul Francis. 309-322 [doi]
- Transparent Checkpoint-Restart of Multiple Processes on Commodity Operating SystemsOren Laadan, Jason Nieh. 323-336 [doi]
- Reboots Are for Hardware: Challenges and Solutions to Updating an Operating System on the FlyAndrew Baumann, Jonathan Appavoo, Robert W. Wisniewski, Dilma Da Silva, Orran Krieger, Gernot Heiser. 337-350 [doi]
- Exploring Recovery from Operating System LockupsFrancis M. David, Jeffrey C. Carlyle, Roy H. Campbell. 351-356 [doi]
- Supporting Multiple OSes with OS SwitchingJun Sun 0002, Dong Zhou, Steve Longerbeam. 357-362 [doi]
- Cool Job Allocation: Measuring the Power Savings of Placing Jobs at Cooling-Efficient Locations in the Data CenterCullen Bash, George Forman. 363-368 [doi]
- Passwords for Everyone: Secure Mnemonic-based Accessible AuthenticationUmut Topkara, Mercan Topkara, Mikhail J. Atallah. 369-374 [doi]
- Virtually Shared Displays and User Input DevicesGrant Wallace, Kai Li. 375-380 [doi]