In this paper we present results from a six-month empirical study of the high availability aspectsof the CodaFile System. We reporton the servicefailures experienced by Coda clien...
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DI...
Nickolai Zeldovich, Silas Boyd-Wickizer, David Maz...
The paper presents various transparency issues that have to be considered during development of object-oriented Grid applications based on virtual repositories. Higher-level transp...
Krzysztof Kaczmarski, Piotr Habela, Hanna Kozankie...
Runtime verification permits checking system properties that cannot be fully verified off-line. This is particularly true when the system includes complex third-party components, ...
In the span of only a few years, the Internet has experienced an astronomical increase in the use of specialized content delivery systems, such as content delivery networks and pe...
Stefan Saroiu, P. Krishna Gummadi, Richard J. Dunn...