default search action
USENIX Annual Technical Conference 2010: Boston, MA, USA
- Paul Barham, Timothy Roscoe:
Proceedings of the 2010 USENIX Annual Technical Conference, USENIX ATC 2010, Boston, MA, USA, June 23-25, 2010. USENIX Association 2010 - Paul Dan Marinescu, Radu Banabic:
An Extensible Technique for High-Precision Testing of Recovery Code. - Jian-Guang Lou, Qiang Fu, Shengqi Yang, Ye Xu, Jiang Li:
Mining Invariants from Console Logs for System Problem Detection. - Aaron Carroll, Gernot Heiser:
An Analysis of Power Consumption in a Smartphone. - Yuvraj Agarwal, Stefan Savage, Rajesh Gupta:
SleepServer: A Software-Only Approach for Reducing the Energy Consumption of PCs within Enterprise Environments. - Joshua Reich, Michel Goraczko, Aman Kansal:
Sleepless in Seattle No Longer. - Sunghwan Ihm, KyoungSoo Park, Vivek S. Pai:
Wide-area Network Acceleration for the Developing World. - Xiao Zhang, Sandhya Dwarkadas, Rongrong Zhong:
An Evaluation of Per-Chip Nonuniform Frequency Scaling on Multicores. - Cheng Huang, Nic Holt, Angela Wang, Albert G. Greenberg, Jin Li, Keith W. Ross:
A DNS Reflection Method for Global Traffic Management. - Shafeeq Sinnamohideen, Raja R. Sambasivan, James Hendricks, Likun Liu, Gregory R. Ganger:
A Transparently-Scalable Metadata Service for the Ursa Minor Storage System. - Mohit Saxena, Michael M. Swift:
FlashVM: Virtual Memory Management on Flash. - Rohan Murty, Jitendra Padhye, Alec Wolman, Matt Welsh:
Dyson: An Architecture for Extensible Wireless LANs. - Biplob K. Debnath, Sudipta Sengupta, Jin Li:
ChunkStash: Speeding Up Inline Storage Deduplication Using Flash Memory. - Italo Dacosta, Patrick Traynor:
Proxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP Networks. - Patrick Hunt, Mahadev Konar, Flavio Paiva Junqueira, Benjamin C. Reed:
ZooKeeper: Wait-free Coordination for Internet-scale Systems. - Volodymyr Kuznetsov, Vitaly Chipounov, George Candea:
Testing Closed-Source Binary Device Drivers with DDT. - Xin Li, Michael C. Huang, Kai Shen, Lingkun Chu:
A Realistic Evaluation of Memory Hardware Errors and Software System Susceptibility. - John R. Douceur, Jeremy Elson, Jon Howell, Jacob R. Lorch:
The Utility Coprocessor: Massively Parallel Computation from the Coffee Shop. - Shaya Potter, Jason Nieh:
Apiary: Easy-to-Use Desktop Application Fault Containment on Commodity Operating Systems. - Silas Boyd-Wickizer, Nickolai Zeldovich:
Tolerating Malicious Device Drivers in Linux. - John McCullough, John Dunagan, Alec Wolman, Alex C. Snoeren:
Stout: An Adaptive Interface to Scalable Cloud Storage. - Leah Shalev, Julian Satran, Eran Borovik, Muli Ben-Yehuda:
IsoStack - Highly Efficient Network Processing on Dedicated Cores. - Matteo Migliavacca, Ioannis Papagiannis, David M. Eyers, Brian Shand, Jean Bacon, Peter R. Pietzuch:
DEFCON: High-Performance Event Processing with Information Security. - Vytautas Valancius, Nick Feamster, Jennifer Rexford, Akihiro Nakao:
Wide-Area Route Control for Distributed Services. - Tathagata Das, Pradeep Padala, Venkata N. Padmanabhan, Ramachandran Ramjee, Kang G. Shin:
LiteGreen: Saving Energy in Networked Desktops Using Virtualization.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.