default search action
20th SOSP 2005: Brighton, UK
- Andrew Herbert, Kenneth P. Birman:
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, SOSP 2005, Brighton, UK, October 23-26, 2005. ACM 2005, ISBN 1-59593-079-5
Opening Session and Keynote Speech
- Kenneth P. Birman:
Opening remarks. - Andrew S. Tanenbaum:
Keynote speech.
Integrity and isolation
- Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla:
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. 1-16 - Petros Efstathopoulos, Maxwell N. Krohn, Steve Vandebogart, Cliff Frey, David Ziegler, Eddie Kohler, David Mazières, M. Frans Kaashoek, Robert Tappan Morris:
Labels and event processes in the Asbestos operating system. 17-30 - Emmett Witchel, Junghwan Rhee, Krste Asanovic:
Mondrix: memory isolation for linux using mondriaan memory protection. 31-44
Distributed systems
- Amitanand S. Aiyer, Lorenzo Alvisi, Allen Clement, Michael Dahlin, Jean-Philippe Martin, Carl Porth:
BAR fault tolerance for cooperative services. 45-58 - Michael Abd-El-Malek, Gregory R. Ganger, Garth R. Goodson, Michael K. Reiter, Jay J. Wylie:
Fault-scalable Byzantine fault-tolerant services. 59-74 - Boon Thau Loo, Tyson Condie, Joseph M. Hellerstein, Petros Maniatis, Timothy Roscoe, Ion Stoica:
Implementing declarative overlays. 75-90
History and context
- Ashlesha Joshi, Samuel T. King, George W. Dunlap, Peter M. Chen:
Detecting past and present intrusions through vulnerability-specific predicates. 91-104 - Ira Cohen, Steve Zhang, Moisés Goldszmidt, Julie Symons, Terence Kelly, Armando Fox:
Capturing, indexing, clustering, and retrieving system history. 105-118 - Craig A. N. Soules, Gregory R. Ganger:
Connections: using context to enhance file search. 119-132
Containment
- Manuel Costa, Jon Crowcroft, Miguel Castro, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham:
Vigilante: end-to-end containment of internet worms. 133-147 - Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage:
Scalability, fidelity, and containment in the potemkin virtual honeyfarm. 148-162 - Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li, Eyal de Lara:
The taser intrusion recovery system. 163-176
Filesystems
- Qingbo Zhu, Zhifeng Chen, Lin Tan, Yuanyuan Zhou, Kimberly Keeton, John Wilkes:
Hibernator: helping disk arrays sleep through the winter. 177-190 - Edmund B. Nightingale, Peter M. Chen, Jason Flinn:
Speculative execution in a distributed file system. 191-205 - Vijayan Prabhakaran, Lakshmi N. Bairavasundaram, Nitin Agrawal, Haryadi S. Gunawi, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau:
IRON file systems. 206-220
Bugs
- Yuan Yu, Tom Rodeheffer, Wei Chen:
RaceTrack: efficient detection of data race conditions via adaptive tracking. 221-234 - Feng Qin, Joseph A. Tucek, Jagadeesan Sundaresan, Yuanyuan Zhou:
Rx: treating bugs as allergies - a safe method to survive software failures. 235-248
Optimization
- Lars Eggert, Joseph D. Touch:
Idletime scheduling with preemption intervals. 249-262 - Hai Huang, Wanda Hung, Kang G. Shin:
FS2: dynamic data replication in free disk space for improving disk performance and energy consumption. 263-276 - Ricardo A. Baratto, Leonard N. Kim, Jason Nieh:
THINC: a virtual display architecture for thin-client computing. 277-290
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.