


default search action
Operating Systems Review, Volume 44, 2010
Volume 44, Number 1, January 2010
- Jeanna Neefe Matthews

:
Workshop proceedings and other publications in Operating System Review. 1
- Jacob Strauss, Chris Lesniewski-Laas, Justin Mazzola Paluska, Bryan Ford

, Robert Morris, M. Frans Kaashoek:
Device transparency: a new model for mobile storage. 5-9 - Samer Al-Kiswany, Abdullah Gharaibeh, Matei Ripeanu:

The case for a versatile storage system. 10-14 - Kimberly Keeton

, Charles B. Morrey III, Craig A. N. Soules, Alistair C. Veitch:
LazyBase: freshness vs. performance in information management. 15-19 - David Boutcher, Abhishek Chandra:

Does virtualization make disk scheduling passé? 20-24 - Swaminathan Sundararaman, Sriram Subramanian

, Abhishek Rajimwale, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Michael M. Swift:
Why panic()?: improving reliability with restartable file systems. 25-29 - Saeed Ghanbari, Gokul Soundararajan, Cristiana Amza:

SelfTalk for Dena: query language and runtime support for evaluating system behavior. 30-34 - Jorge Guerra, Wendy Belluomini, Joseph S. Glider, Karan Gupta, Himabindu Pucha:

Energy proportionality for storage: impact and feasibility. 35-39 - Eric Anderson, Joseph A. Tucek:

Efficiency matters! 40-45 - Paul T. Stanton, Benjamin McKeown, Randal C. Burns

, Giuseppe Ateniese
:
FastAD: an authenticated directory for billions of objects. 45-49 - Peter Desnoyers:

Empirical evaluation of NAND flash memory performance. 50-54 - Asim Kadav, Mahesh Balakrishnan, Vijayan Prabhakaran, Dahlia Malkhi:

Differential RAID: rethinking RAID for SSD reliability. 55-59
- Jacob Leverich, Christos Kozyrakis:

On the energy (in)efficiency of Hadoop clusters. 61-65 - Aman Kansal, Jie Liu, Abhishek Singh, Ripal Nathuji, Tarek F. Abdelzaher:

Semantic-less coordination of power management and application performance. 66-70 - Alexander S. Szalay, Gordon C. Bell, H. Howie Huang

, Andreas Terzis, Alainna White:
Low-power amdahl-balanced blades for data intensive computing. 71-75 - Byung-Gon Chun, Gianluca Iannaccone, Giuseppe Iannaccone

, Randy H. Katz, Gunho Lee, Luca Niccolini:
An energy case for hybrid datacenters. 76-80
- Kenny Qili Zhu, Kathleen Fisher, David Walker

:
Incremental learning of system log formats. 85-90 - Jian-Guang Lou, Qiang Fu, Yi Wang, Jiang Li:

Mining dependency in distributed systems through unstructured logs analysis. 91-96 - Wim De Pauw, Steve Heisig:

Visual and algorithmic tooling for system trace analysis: a case study. 97-102
- Lourival A. de Góis, Walter da Cunha Borelli:

Optimization of procedures for discovery and information of idle resources in distributed systems. 103-109 - Jacinto C. A. Cansado, João H. S. Pereira, Edson T. Midorikawa:

Considering the frequency dimension into on demand adaptive algorithms. 110-115
Volume 44, Number 2, April 2010
- Paolo Romano

, Luís E. T. Rodrigues, Nuno Carvalho, João P. Cachopo
:
Cloud-TM: harnessing the cloud with distributed transactional memories. 1-6 - Krzysztof Ostrowski, Ken Birman

:
Storing and accessing live mashup content in the cloud. 7-11 - Eric Van Hensbergen

, Noah Paul Evans, Phillip Stanley-Marbell
:
A unified execution model for cloud computing. 12-17
- Kunwadee Sripanidkulchai, Sambit Sahu, Yaoping Ruan, Anees Shaikh, Chitra Dorai:

Are clouds ready for large distributed applications? 18-23 - Michael Siegenthaler, Hakim Weatherspoon:

Cloudifying source code repositories: how much does it cost? 24-28
- Mihai Letia, Nuno M. Preguiça

, Marc Shapiro:
Consistency without concurrency control in large, dynamic systems. 29-34 - Avinash Lakshman, Prashant Malik:

Cassandra: a decentralized structured storage system. 35-40 - George Porter:

Decoupling storage and computation in Hadoop with SuperDataNodes. 41-46
- Moisés Goldszmidt, Mihai Budiu, Yue Zhang, Michael Pechuk:

Toward automatic policy refinement in repair services for large distributed systems. 47-51 - Andreas Haeberlen

:
A case for the accountable cloud. 52-57 - Paul D. Ezhilchelvan

, Santosh K. Shrivastava:
Learning from the past for resolving dilemmas of asynchrony. 58-63
- Vita Bortnikov, Gregory V. Chockler

, Alexey Roytman, Mike Spreitzer:
Bulletin board: a scalable and robust eventually consistent shared memory over a peer-to-peer overlay. 64-70 - Ymir Vigfusson, Ken Birman

, Qi Huang, Deepak P. Nataraj:
Optimizing information flow in the gossip objects platform. 71-76
- Pierre-Marc Fournier, Michel R. Dagenais:

Analyzing blocking to debug performance problems on multi-core systems. 77-87 - Michael Dalton, Hari Kannan, Christos Kozyrakis:

Tainting is not pointless. 88-92
Volume 44, Number 3, July 2010
- Erik Nygren, Ramesh K. Sitaraman

, Joel Wein:
Networked systems research at Akamai. 1 - Erik Nygren, Ramesh K. Sitaraman

, Jennifer Sun:
The Akamai network: a platform for high-performance internet applications. 2-19 - Thomas Repantis, Jeff Cohen, Scott Smith, Joel Wein:

Scaling a monitoring infrastructure for the Akamai network. 20-26 - David Belson:

Akamai state of the internet report, Q4 2009. 27-37
- Sara Bouchenak, Éric Rutten:

Summary of the 5th international workshop on feedback control implementation and design in computing systems and networks (FeBID 2010). 38-40 - Zhikui Wang, Niraj Tolia, Cullen E. Bash

:
Opportunities and challenges to unify workload, power, and cooling management in data centers. 41-46 - Jean Arnaud:

Automated control of internet services. 47-52 - Anne-Marie Alt, Daniel Simon:

Control strategies for H.264 video decoding under resources constraints. 53-58 - Luc Malrait:

QoS-oriented control of server systems. 59-64
- Shlomi Dolev

, Reuven Yagel:
Stabilizing trust and reputation for self-stabilizing efficient hosts in spite of byzantine guests. 65-74 - Benjamin Poirier, Robert Roy, Michel R. Dagenais:

Accurate offline synchronization of distributed traces using kernel-level events. 75-87 - Asia Slowinska, Herbert Bos

:
Pointer tainting still pointless: (but we all see the point of tainting). 88-92 - Paul E. McKenney, Maged M. Michael, Josh Triplett, Jonathan Walpole:

Why the grass may not be greener on the other side: a comparison of locking vs. transactional memory. 93-101 - Josh Triplett, Paul E. McKenney, Jonathan Walpole:

Scalable concurrent hash tables via relativistic programming. 102-109 - Wenjin Hu, Tao Yang, Jeanna N. Matthews

:
The good, the bad and the ugly of consumer cloud storage. 110-115
Volume 44, Number 4, December 2010
- Stephen Alan Herrod:

Systems research and development at VMware. 1-2
- Ole Agesen, Alex Garthwaite, Jeffrey Sheldon, Pratap Subrahmanyam:

The evolution of an x86 virtual machine monitor. 3-18 - Richard West, Puneet Zaroo, Carl A. Waldspurger, Xiao Zhang:

Online cache modeling for commodity multicore processors. 19-29 - Daniel J. Scales, Mike Nelson, Ganesh Venkitachalam:

The design of a practical system for fault-tolerant virtual machines. 30-39 - Richard McDougall, Jennifer Anderson:

Virtualization performance: perspectives and challenges ahead. 40-56
- Satyam B. Vaghani:

Virtual machine file system. 57-70 - Jacob Gorm Hansen, Eric Jul

:
Scalable virtual machine storage using local disks. 71-79
- Shudong Zhou:

Virtual networking. 80-85 - Debashis Basak, Rohit Toshniwal, Serge Maskalik, Allwyn Sequeira:

Virtualizing networking and security in the cloud. 86-94
- Vijayaraghavan Soundararajan, Kinshuk Govil:

Challenges in building scalable virtualized datacenter management. 95-102 - Orran Krieger, Phil McGachey, Arkady Kanevsky:

Enabling a marketplace of clouds: VMware's vCloud director. 103-114 - René W. Schmidt, Steffen Grarup:

vApp: a standards-based container for cloud providers. 115-123
- Kenneth C. Barr

, Prashanth P. Bungale, Stephen Deasy, Viktor Gyuris, Perry Hung, Craig Newell
, Harvey Tuch, Bruno Zoppis:
The VMware mobile virtualization platform: is that a hypervisor in your pocket? 124-135 - Joshua E. Simons, Jeffrey Buell:

Virtualizing high performance computing. 136-145
- Tudor Dumitras, Iulian Neamtiu, Eli Tilevich

:
Report on the second ACM workshop on hot topics in software upgrades (HotSWUp'09): http://www.hotswup.org/2009/. 146-152

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














