Sciweavers

Share
EUROSYS
2006
ACM
9 years 9 months ago
Context-specific middleware specialization techniques for optimizing software product-line architectures
Product-line architectures (PLA)s are an emerging paradigm for developing software families for distributed real-time and embedded (DRE) systems by customizing reusable artifacts,...
Arvind S. Krishna, Aniruddha S. Gokhale, Douglas C...
EUROSYS
2006
ACM
9 years 9 months ago
TCP offload through connection handoff
This paper presents a connection handoff interface between the operating system and the network interface. Using this interface, the operating system can offload a subset of TCP c...
Hyong-youb Kim, Scott Rixner
EUROSYS
2006
ACM
9 years 9 months ago
Fireflies: scalable support for intrusion-tolerant network overlays
This paper describes and evaluates Fireflies, a scalable protocol for supporting intrusion-tolerant network overlays.1 While such a protocol cannot distinguish Byzantine nodes fro...
Håvard D. Johansen, André Allavena, R...
EUROSYS
2006
ACM
9 years 11 months ago
Understanding collateral evolution in Linux device drivers
Yoann Padioleau, Julia L. Lawall, Gilles Muller
EUROSYS
2006
ACM
9 years 11 months ago
K42: building a complete operating system
K42 is one of the few recent research projects that is examining operating system design structure issues in the context of new whole-system design. K42 is open source and was des...
Orran Krieger, Marc A. Auslander, Bryan S. Rosenbu...
EUROSYS
2006
ACM
9 years 11 months ago
A fresh look at the reliability of long-term digital storage
Mary Baker, Mehul A. Shah, David S. H. Rosenthal, ...
EUROSYS
2006
ACM
10 years 2 months ago
Practical taint-based protection using demand emulation
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...
EUROSYS
2006
ACM
10 years 2 months ago
On the road to recovery: restoring data after disasters
—Restoring data operations after a disaster is a daunting task: how should recovery be performed to minimize data loss and application downtime? Administrators are under consider...
Kimberly Keeton, Dirk Beyer 0002, Ernesto Brau, Ar...
EUROSYS
2006
ACM
10 years 2 months ago
Understanding user behavior in large-scale video-on-demand systems
Video-on-demand over IP (VOD) is one of the best-known examples of “next-generation” Internet applications cited as a goal by networking and multimedia researchers. Without em...
Hongliang Yu, Dongdong Zheng, Ben Y. Zhao, Weimin ...
books