Sciweavers

HOTOS
2007
IEEE
13 years 7 months ago
Don't Settle for Less Than the Best: Use Optimization to Make Decisions
Many systems design, configuration, runtime and management decisions must be made from a large set of possible alternatives. Ad hoc heuristics have traditionally been used to make...
Kimberly Keeton, Terence Kelly, Arif Merchant, Cip...
HOTOS
2007
IEEE
13 years 7 months ago
Purely Functional System Configuration Management
System configuration management is difficult because systems evolve in an undisciplined way: packages are upgraded, configuration files are edited, and so on. The management of ex...
Eelco Dolstra, Armijn Hemel
HOTOS
2007
IEEE
13 years 7 months ago
Towards a Practical, Verified Kernel
In the paper we examine one of the issues in designing, specifying, implementing and formally verifying a small operating system kernel -- how to provide a productive and iterativ...
Kevin Elphinstone, Gerwin Klein, Philip Derrin, Ti...
HOTOS
2007
IEEE
13 years 7 months ago
Microdrivers: A New Architecture for Device Drivers
Commodity operating systems achieve good performance by running device drivers in-kernel. Unfortunately, this architecture offers poor fault isolation. This paper introduces micro...
Vinod Ganapathy, Arini Balakrishnan, Michael M. Sw...
HOTOS
2007
IEEE
13 years 7 months ago
Auditing to Keep Online Storage Services Honest
A growing number of online service providers offer to store customers' photos, email, file system backups, and other digital assets. Currently, customers cannot make informed...
Mehul A. Shah, Mary Baker, Jeffrey C. Mogul, Ram S...
HOTOS
2007
IEEE
13 years 7 months ago
Hype and Virtue
In this paper, we question whether hypervisors are really acting as a disruptive force in OS research, instead arguing that they have so far changed very little at a technical lev...
Timothy Roscoe, Kevin Elphinstone, Gernot Heiser
HOTOS
2007
IEEE
13 years 7 months ago
End-to-End Web Application Security
Web applications are important, ubiquitous distributed systems whose current security relies primarily on server-side mechanisms. This paper makes the end-toend argument that the ...
Úlfar Erlingsson, V. Benjamin Livshits, Yin...
HOTOS
2007
IEEE
13 years 7 months ago
Is the Optimism in Optimistic Concurrency Warranted?
Optimistic synchronization allows concurrent execution of critical sections while performing dynamic conflict detection and recovery. Optimistic synchronization will increase perf...
Donald E. Porter, Owen S. Hofmann, Emmett Witchel
HOTOS
2007
IEEE
13 years 7 months ago
Beyond Bug-Finding: Sound Program Analysis for Linux
It is time for us to focus on sound analyses for our critical systems software--that is, we must focus on analyses that ensure the absence of defects of particular known types, ra...
Zachary R. Anderson, Eric A. Brewer, Jeremy Condit...
HOTOS
2007
IEEE
13 years 7 months ago
Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era
Today's rich and varied wireless environment, including mobile phones, Wi-Fi-enabled laptops, and Bluetooth headsets, poses threats to our privacy that cannot be addressed wi...
Ben Greenstein, Ramakrishna Gummadi, Jeffrey Pang,...