


default search action
4th OSDI 2000: San Diego, California, USA
- Michael B. Jones, M. Frans Kaashoek:

4th Symposium on Operating System Design and Implementation (OSDI 2000), San Diego, California, USA, October 23-25, 2000. USENIX Association 2000, ISBN 1-880446-16-2
Monday, October 23, 2000
Applying Language Technology to Systems
- Dawson R. Engler, Benjamin Chelf, Andy Chou, Seth Hallem:

Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions. 1-16 - Fabrice Mérillon, Laurent Réveillère, Charles Consel, Renaud Marlet, Gilles Muller:

Devil: An IDL for Hardware Programming. 17-30 - Angela Demke Brown, Todd C. Mowry:

Taming the Memory Hogs: Using Compiler-Inserted Releases to Manage Physical Memory Intelligently. 31-44
Scheduling
- Abhishek Chandra, Micah Adler, Pawan Goyal, Prashant J. Shenoy:

Surplus Fair Scheduling: A Proportional-Share CPU Scheduling Algorithm for Symmetric Multiprocessors. 45-58 - Julita Corbalán, Xavier Martorell, Jesús Labarta:

Performance-Driven Processor Allocation. 59-73 - Dirk Grunwald, Philip Alexander Levis, Keith I. Farkas, Charles B. Morrey III, Michael Neufeld:

Policies for Dynamic Clock Scheduling. 73-86
Storage Management
- Christopher R. Lumb, Jiri Schindler, Gregory R. Ganger, David Nagle, Erik Riedel:

Towards Higher Disk Head Utilization: Extracting "Free" Bandwidth from Busy Disk Drives. 87-102 - Rodney Van Meter, Minxi Gao:

Latency Management in Storage Systems. 103-118 - Jong Min Kim, Jongmoo Choi, Jesung Kim, Sam H. Noh, Sang Lyul Min, Yookun Cho, Chong-Sang Kim:

A Low-Overhead, High-Performance Unified Buffer Management Scheme That Exploits Sequential and Looping References. 119-134
Tuesday, October 24, 2000
Security
- Umesh Maheshwari, Radek Vingralek, William Shapiro:

How to Build a Trusted Database System on Untrusted Storage. 135-150 - Jon Howell, David Kotz:

End-to-End Authorization. 151-164 - John D. Strunk, Garth R. Goodson, Michael L. Scheinholtz, Craig A. N. Soules, Gregory R. Ganger:

Self-Securing Storage: Protecting Data in Compromised Systems. 165-180 - Kevin Fu, M. Frans Kaashoek, David Mazières:

Fast and Secure Distributed Read-Only File System. 181-196
Networking
- John Jannotti, David K. Gifford, Kirk L. Johnson, M. Frans Kaashoek, James W. O'Toole Jr.:

Overcast: Reliable Multicasting with an Overlay Network. 197-212 - David G. Andersen, Deepak Bansal, Dorothy Curtis, Srinivasan Seshan, Hari Balakrishnan:

System Support for Bandwidth Management and Content Adaptation in Internet Applications. 213-226
Storage Devices
- John Linwood Griffin, Steven W. Schlosser, Gregory R. Ganger, David Nagle:

Operating System Management of MEMS-based Storage Devices. 227-242 - Xiang Yu, Benjamin Gum, Yuqun Chen, Randolph Y. Wang, Kai Li, Arvind Krishnamurthy, Thomas E. Anderson:

Trading Capacity for Performance in a Disk Array. 243-258 - Darrell C. Anderson, Jeffrey S. Chase, Amin Vahdat:

Interposed Request Routing for Scalable Network Storage. 259-272
Wednesday, October 25, 2000
Reliability
- Miguel Castro, Barbara Liskov:

Proactive Recovery in a Byzantine-Fault-Tolerant System. 273-288 - David E. Lowell, Subhachandra Chandra, Peter M. Chen:

Exploring Failure Transparency and the Limits of Generic Recovery. 289-304 - Haifeng Yu, Amin Vahdat:

Design and Evaluation of a Continuous Consistency Model for Replicated Services. 305-318
System Architecture
- Steven D. Gribble

, Eric A. Brewer, Joseph M. Hellerstein, David E. Culler:
Scalable, Distributed Data Structures for Internet Service Construction. 319-332 - Godmar Back, Wilson C. Hsieh, Jay Lepreau:

Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java. 333-346 - Alastair Reid, Matthew Flatt, Leigh Stoller, Jay Lepreau, Eric Eide:

Knit: Component Composition for Systems Software. 347-360

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














