Sciweavers

EUROSYS
2006
ACM
13 years 8 months ago
Context-specific middleware specialization techniques for optimizing software product-line architectures
Product-line architectures (PLA)s are an emerging paradigm for developing software families for distributed real-time and embedded (DRE) systems by customizing reusable artifacts,...
Arvind S. Krishna, Aniruddha S. Gokhale, Douglas C...
EUROSYS
2006
ACM
13 years 8 months ago
TCP offload through connection handoff
This paper presents a connection handoff interface between the operating system and the network interface. Using this interface, the operating system can offload a subset of TCP c...
Hyong-youb Kim, Scott Rixner
EUROSYS
2006
ACM
13 years 8 months ago
Fireflies: scalable support for intrusion-tolerant network overlays
This paper describes and evaluates Fireflies, a scalable protocol for supporting intrusion-tolerant network overlays.1 While such a protocol cannot distinguish Byzantine nodes fro...
Håvard D. Johansen, André Allavena, R...
EUROSYS
2006
ACM
13 years 11 months ago
Understanding collateral evolution in Linux device drivers
Yoann Padioleau, Julia L. Lawall, Gilles Muller
EUROSYS
2006
ACM
13 years 11 months ago
K42: building a complete operating system
K42 is one of the few recent research projects that is examining operating system design structure issues in the context of new whole-system design. K42 is open source and was des...
Orran Krieger, Marc A. Auslander, Bryan S. Rosenbu...
EUROSYS
2006
ACM
13 years 11 months ago
A fresh look at the reliability of long-term digital storage
Mary Baker, Mehul A. Shah, David S. H. Rosenthal, ...
EUROSYS
2006
ACM
14 years 2 months ago
Practical taint-based protection using demand emulation
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...
EUROSYS
2006
ACM
14 years 2 months ago
On the road to recovery: restoring data after disasters
—Restoring data operations after a disaster is a daunting task: how should recovery be performed to minimize data loss and application downtime? Administrators are under consider...
Kimberly Keeton, Dirk Beyer 0002, Ernesto Brau, Ar...
EUROSYS
2006
ACM
14 years 2 months ago
Understanding user behavior in large-scale video-on-demand systems
Video-on-demand over IP (VOD) is one of the best-known examples of “next-generation” Internet applications cited as a goal by networking and multimedia researchers. Without em...
Hongliang Yu, Dongdong Zheng, Ben Y. Zhao, Weimin ...