Abstract. Large product lines have complex build systems, which obscure mapping of features to code. We extract this mapping out of the build systems of two operating systems kerne...
Thorsten Berger, Steven She, Rafael Lotufo, Krzysz...
We describe a technique called lookaside caching that combines the strengths of distributed file systems and portable storage devices, while negating their weaknesses. In spite of...
Niraj Tolia, Jan Harkes, Michael Kozuch, Mahadev S...
The current World Wide Web is essentially a network of documents, a continuously evolving information universe. But the potential of internetworking goes far beyond information ac...
Abstract. The availability of reliable models of computer virus propagation would prove useful in a number of ways, in order both to predict future threats, and to develop new cont...
The need to continue to work in a mobile environment raises the problem of data availability in the presence of disconnections. Our approach aiming at solving this problem is to m...