default search action
Operating Systems Review, Volume 44, 2010
Volume 44, Number 1, January 2010
- Jeanna Neefe Matthews:
Workshop proceedings and other publications in Operating System Review. 1
- Jacob Strauss, Chris Lesniewski-Laas, Justin Mazzola Paluska, Bryan Ford, Robert Tappan Morris, M. Frans Kaashoek:
Device transparency: a new model for mobile storage. 5-9 - Samer Al-Kiswany, Abdullah Gharaibeh, Matei Ripeanu:
The case for a versatile storage system. 10-14 - Kimberly Keeton, Charles B. Morrey III, Craig A. N. Soules, Alistair C. Veitch:
LazyBase: freshness vs. performance in information management. 15-19 - David Boutcher, Abhishek Chandra:
Does virtualization make disk scheduling passé? 20-24 - Swaminathan Sundararaman, Sriram Subramanian, Abhishek Rajimwale, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Michael M. Swift:
Why panic()?: improving reliability with restartable file systems. 25-29 - Saeed Ghanbari, Gokul Soundararajan, Cristiana Amza:
SelfTalk for Dena: query language and runtime support for evaluating system behavior. 30-34 - Jorge Guerra, Wendy Belluomini, Joseph S. Glider, Karan Gupta, Himabindu Pucha:
Energy proportionality for storage: impact and feasibility. 35-39 - Eric Anderson, Joseph A. Tucek:
Efficiency matters! 40-45 - Paul T. Stanton, Benjamin McKeown, Randal C. Burns, Giuseppe Ateniese:
FastAD: an authenticated directory for billions of objects. 45-49 - Peter Desnoyers:
Empirical evaluation of NAND flash memory performance. 50-54 - Asim Kadav, Mahesh Balakrishnan, Vijayan Prabhakaran, Dahlia Malkhi:
Differential RAID: rethinking RAID for SSD reliability. 55-59
- Jacob Leverich, Christos Kozyrakis:
On the energy (in)efficiency of Hadoop clusters. 61-65 - Aman Kansal, Jie Liu, Abhishek Singh, Ripal Nathuji, Tarek F. Abdelzaher:
Semantic-less coordination of power management and application performance. 66-70 - Alexander S. Szalay, Gordon C. Bell, H. Howie Huang, Andreas Terzis, Alainna White:
Low-power amdahl-balanced blades for data intensive computing. 71-75 - Byung-Gon Chun, Gianluca Iannaccone, Giuseppe Iannaccone, Randy H. Katz, Gunho Lee, Luca Niccolini:
An energy case for hybrid datacenters. 76-80
- Kenny Qili Zhu, Kathleen Fisher, David Walker:
Incremental learning of system log formats. 85-90 - Jian-Guang Lou, Qiang Fu, Yi Wang, Jiang Li:
Mining dependency in distributed systems through unstructured logs analysis. 91-96 - Wim De Pauw, Steve Heisig:
Visual and algorithmic tooling for system trace analysis: a case study. 97-102
- Lourival A. de Góis, Walter da Cunha Borelli:
Optimization of procedures for discovery and information of idle resources in distributed systems. 103-109 - Jacinto C. A. Cansado, João H. S. Pereira, Edson T. Midorikawa:
Considering the frequency dimension into on demand adaptive algorithms. 110-115
Volume 44, Number 2, April 2010
- Paolo Romano, Luís E. T. Rodrigues, Nuno Carvalho, João P. Cachopo:
Cloud-TM: harnessing the cloud with distributed transactional memories. 1-6 - Krzysztof Ostrowski, Ken Birman:
Storing and accessing live mashup content in the cloud. 7-11 - Eric Van Hensbergen, Noah Paul Evans, Phillip Stanley-Marbell:
A unified execution model for cloud computing. 12-17
- Kunwadee Sripanidkulchai, Sambit Sahu, Yaoping Ruan, Anees Shaikh, Chitra Dorai:
Are clouds ready for large distributed applications? 18-23 - Michael Siegenthaler, Hakim Weatherspoon:
Cloudifying source code repositories: how much does it cost? 24-28
- Mihai Letia, Nuno M. Preguiça, Marc Shapiro:
Consistency without concurrency control in large, dynamic systems. 29-34 - Avinash Lakshman, Prashant Malik:
Cassandra: a decentralized structured storage system. 35-40 - George Porter:
Decoupling storage and computation in Hadoop with SuperDataNodes. 41-46
- Moisés Goldszmidt, Mihai Budiu, Yue Zhang, Michael Pechuk:
Toward automatic policy refinement in repair services for large distributed systems. 47-51 - Andreas Haeberlen:
A case for the accountable cloud. 52-57 - Paul D. Ezhilchelvan, Santosh K. Shrivastava:
Learning from the past for resolving dilemmas of asynchrony. 58-63
- Vita Bortnikov, Gregory V. Chockler, Alexey Roytman, Mike Spreitzer:
Bulletin board: a scalable and robust eventually consistent shared memory over a peer-to-peer overlay. 64-70 - Ymir Vigfusson, Ken Birman, Qi Huang, Deepak P. Nataraj:
Optimizing information flow in the gossip objects platform. 71-76
- Pierre-Marc Fournier, Michel R. Dagenais:
Analyzing blocking to debug performance problems on multi-core systems. 77-87 - Michael Dalton, Hari Kannan, Christos Kozyrakis:
Tainting is not pointless. 88-92
Volume 44, Number 3, July 2010
- Erik Nygren, Ramesh K. Sitaraman, Joel Wein:
Networked systems research at Akamai. 1 - Erik Nygren, Ramesh K. Sitaraman, Jennifer Sun:
The Akamai network: a platform for high-performance internet applications. 2-19 - Thomas Repantis, Jeff Cohen, Scott Smith, Joel Wein:
Scaling a monitoring infrastructure for the Akamai network. 20-26 - David Belson:
Akamai state of the internet report, Q4 2009. 27-37
- Sara Bouchenak, Éric Rutten:
Summary of the 5th international workshop on feedback control implementation and design in computing systems and networks (FeBID 2010). 38-40 - Zhikui Wang, Niraj Tolia, Cullen E. Bash:
Opportunities and challenges to unify workload, power, and cooling management in data centers. 41-46 - Jean Arnaud:
Automated control of internet services. 47-52 - Anne-Marie Alt, Daniel Simon:
Control strategies for H.264 video decoding under resources constraints. 53-58 - Luc Malrait:
QoS-oriented control of server systems. 59-64
- Shlomi Dolev, Reuven Yagel:
Stabilizing trust and reputation for self-stabilizing efficient hosts in spite of byzantine guests. 65-74 - Benjamin Poirier, Robert Roy, Michel R. Dagenais:
Accurate offline synchronization of distributed traces using kernel-level events. 75-87 - Asia Slowinska, Herbert Bos:
Pointer tainting still pointless: (but we all see the point of tainting). 88-92 - Paul E. McKenney, Maged M. Michael, Josh Triplett, Jonathan Walpole:
Why the grass may not be greener on the other side: a comparison of locking vs. transactional memory. 93-101 - Josh Triplett, Paul E. McKenney, Jonathan Walpole:
Scalable concurrent hash tables via relativistic programming. 102-109 - Wenjin Hu, Tao Yang, Jeanna N. Matthews:
The good, the bad and the ugly of consumer cloud storage. 110-115
Volume 44, Number 4, December 2010
- Stephen Alan Herrod:
Systems research and development at VMware. 1-2
- Ole Agesen, Alex Garthwaite, Jeffrey Sheldon, Pratap Subrahmanyam:
The evolution of an x86 virtual machine monitor. 3-18 - Richard West, Puneet Zaroo, Carl A. Waldspurger, Xiao Zhang:
Online cache modeling for commodity multicore processors. 19-29 - Daniel J. Scales, Mike Nelson, Ganesh Venkitachalam:
The design of a practical system for fault-tolerant virtual machines. 30-39 - Richard McDougall, Jennifer Anderson:
Virtualization performance: perspectives and challenges ahead. 40-56
- Satyam B. Vaghani:
Virtual machine file system. 57-70 - Jacob Gorm Hansen, Eric Jul:
Scalable virtual machine storage using local disks. 71-79
- Shudong Zhou:
Virtual networking. 80-85 - Debashis Basak, Rohit Toshniwal, Serge Maskalik, Allwyn Sequeira:
Virtualizing networking and security in the cloud. 86-94
- Vijayaraghavan Soundararajan, Kinshuk Govil:
Challenges in building scalable virtualized datacenter management. 95-102 - Orran Krieger, Phil McGachey, Arkady Kanevsky:
Enabling a marketplace of clouds: VMware's vCloud director. 103-114 - René W. Schmidt, Steffen Grarup:
vApp: a standards-based container for cloud providers. 115-123
- Kenneth C. Barr, Prashanth P. Bungale, Stephen Deasy, Viktor Gyuris, Perry Hung, Craig Newell, Harvey Tuch, Bruno Zoppis:
The VMware mobile virtualization platform: is that a hypervisor in your pocket? 124-135 - Joshua E. Simons, Jeffrey Buell:
Virtualizing high performance computing. 136-145
- Tudor Dumitras, Iulian Neamtiu, Eli Tilevich:
Report on the second ACM workshop on hot topics in software upgrades (HotSWUp'09): http://www.hotswup.org/2009/. 146-152
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.