default search action
EuroSys 2014: Amsterdam, The Netherlands
- Dick C. A. Bulterman, Herbert Bos, Antony I. T. Rowstron, Peter Druschel:
Ninth Eurosys Conference 2014, EuroSys 2014, Amsterdam, The Netherlands, April 13-16, 2014. ACM 2014, ISBN 978-1-4503-2704-6
Data center computing
- Wentao Han, Youshan Miao, Kaiwei Li, Ming Wu, Fan Yang, Lidong Zhou, Vijayan Prabhakaran, Wenguang Chen, Enhong Chen:
Chronos: a graph engine for temporal graph analysis. 1:1-1:14 - Jian Tan, Alicia Chin, Zane Zhenhua Hu, Yonggang Hu, Shicong Meng, Xiaoqiao Meng, Li Zhang:
DynMR: dynamic MapReduce with ReduceTask interleaving and MapTask backfilling. 2:1-2:14 - Robert Escriva, Ayush Dubey, Bernard Wong, Emin Gün Sirer:
Kronos: the design and implementation of an event ordering service. 3:1-3:14 - Jacob Leverich, Christos Kozyrakis:
Reconciling high server utilization and sub-millisecond quality-of-service. 4:1-4:14
Networking
- Junlan Zhou, Malveeka Tewari, Min Zhu, Abdul Kabbani, Leon Poutievski, Arjun Singh, Amin Vahdat:
WCMP: weighted cost multipathing for improved fairness in data centers. 5:1-5:14 - Kyriakos Zarifis, Rui Miao, Matt Calder, Ethan Katz-Bassett, Minlan Yu, Jitendra Padhye:
DIBS: just-in-time congestion mitigation for data centers. 6:1-6:14 - Jay Chen, Lakshmi Subramanian, Janardhan R. Iyengar, Bryan Ford:
TAQ: enhancing fairness and performance predictability in small packet regimes. 7:1-7:14
Security
- Bhushan Jain, Chia-Che Tsai, Jitin John, Donald E. Porter:
Practical techniques to obviate setuid-to-root binaries. 8:1-8:14 - Chia-Che Tsai, Kumar Saurabh Arora, Nehal Bandi, Bhushan Jain, William Jannen, Jitin John, Harry A. Kalodner, Vrushali Kulkarni, Daniela Oliveira, Donald E. Porter:
Cooperation and security isolation of library OSes for multi-process applications. 9:1-9:14 - Patrick Koeberl, Steffen Schulz, Ahmad-Reza Sadeghi, Vijay Varadharajan:
TrustLite: a security architecture for tiny embedded devices. 10:1-10:14
Misc
- Zhenyu Guo, Chuntao Hong, Mao Yang, Dong Zhou, Lidong Zhou, Li Zhuang:
Rex: replication at the speed of multi-core. 11:1-11:14 - Marios Fragkoulis, Diomidis Spinellis, Panos Louridas, Angelos Bilas:
Relational access to Unix kernel data structures. 12:1-12:14 - Kianoosh Mokhtarian, Hans-Arno Jacobsen:
Caching in video CDNs: building strong lines of defense. 13:1-13:13
Storage I
- Haris Volos, Sanketh Nalli, Sankaralingam Panneerselvam, Venkatanathan Varadarajan, Prashant Saxena, Michael M. Swift:
Aerie: flexible file-system interfaces to storage-class memory. 14:1-14:14 - Dulloor Subramanya Rao, Sanjay Kumar, Anil S. Keshavamurthy, Philip Lantz, Dheeraj Reddy, Rajesh Sankaran, Jeff Jackson:
System software for persistent memory. 15:1-15:15 - Peng Wang, Guangyu Sun, Song Jiang, Jian Ouyang, Shiding Lin, Chen Zhang, Jason Cong:
An efficient design and implementation of LSM-tree based key-value store on open-channel SSD. 16:1-16:14 - David Shue, Michael J. Freedman:
From application requests to virtual IOPs: provisioned key-value storage with Libra. 17:1-17:14
Reliability
- Gang Hu, Xinhao Yuan, Yang Tang, Junfeng Yang:
Efficiently, effectively detecting mobile app bugs with AppDoctor. 18:1-18:15 - Jonathan Anderson, Robert N. M. Watson, David Chisnall, Khilan Gudka, Ilias Marinos, Brooks Davis:
TESLA: temporally enhanced system logic assertions. 19:1-19:14 - Gokcen Kestor, Osman S. Unsal, Adrián Cristal, Serdar Tasiran:
T-Rex: a dynamic race detection tool for C/C++ transactional memory applications. 20:1-20:12
Storage II
- Fabien André, Anne-Marie Kermarrec, Erwan Le Merrer, Nicolas Le Scouarnec, Gilles Straub, Alexandre van Kempen:
Archiving cold data in warehouses with clustered network coding. 21:1-21:14 - Ping Huang, Guanying Wu, Xubin He, Weijun Xiao:
An aggressive worn-out flash block management scheme to alleviate SSD performance degradation. 22:1-22:14 - Sriram Subramanian, Swaminathan Sundararaman, Nisha Talagala, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau:
Snapshots in a flash with ioSnap. 23:1-23:14
Concurrency
- Tim Harris, Martin Maas, Virendra J. Marathe:
Callisto: co-scheduling parallel runtime systems. 24:1-24:14 - Dan Alistarh, Patrick Eugster, Maurice Herlihy, Alexander Matveev, Nir Shavit:
StackTrack: an automated transactional approach to concurrent memory reclamation. 25:1-25:14 - Zhaoguo Wang, Hao Qian, Jinyang Li, Haibo Chen:
Using restricted transactional memory to build a scalable in-memory database. 26:1-26:15 - Xiaozhou Li, David G. Andersen, Michael Kaminsky, Michael J. Freedman:
Algorithmic improvements for fast concurrent Cuckoo hashing. 27:1-27:14
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.