![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
11th ACM SIGOPS European Workshop 2004: Leuven, Belgium
- Yolande Berbers, Miguel Castro:
Proceedings of the 11st ACM SIGOPS European Workshop, Leuven, Belgium, September 19-22, 2004. ACM 2004
Sensor networks
- Geoffrey Mainland, Laura Kang, Sébastien Lahaie, David C. Parkes, Matt Welsh:
Using virtual markets to program global behavior in sensor networks. 1 - Kay Römer
, Christian Frank, Pedro José Marrón
, Christian Becker
:
Generic role assignment for wireless sensor networks. 2 - Philip Alexander Levis, David E. Culler:
The firecracker protocol. 3
Storage systems
- Kimberly Keeton
, Dirk Beyer, Jeffrey S. Chase, Arif Merchant
, Cipriano A. Santos, John Wilkes:
Lessons and challenges in automating data dependability. 4 - Barbara Liskov, Rodrigo Rodrigues
:
Transactional file systems can be fast. 5 - Fred Douglis
, John Palmer, Elizabeth S. Richards, David Tao, William H. Tetzlaff, John M. Tracey, Jian Yin:
Position: short object lifetimes require a delete-optimized storage system. 6
Resource management
- David Bartholomew Stewart, Richard Mortier
:
Virtual private machines: user-centric performance. 7 - Josep M. Blanquer, Antoni Batchelli, Klaus E. Schauser, Richard Wolski:
QoS for internet services: done right. 8 - Alexandra Fedorova, Christopher Small
, Daniel Nussbaum, Margo I. Seltzer:
Chip multithreading systems need a new operating system scheduler. 9
Security
- Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum:
Data lifetime is a systems problem. 10 - James Hendricks, Leendert van Doorn:
Secure bootstrap is not enough: shoring up the trusted computing base. 11 - Petros Maniatis, Thomas J. Giuli, Mema Roussopoulos, David S. H. Rosenthal, Mary Baker:
Impeding attrition attacks in P2P systems. 12
Miscellaneous
- John Wilkes, Jeffrey C. Mogul, Jaap Suermondt:
Utilification. 13 - Gregor Schiele, Christian Becker
, Kurt Rothermel:
Energy-efficient cluster-based service discovery for Ubiquitous Computing. 14 - Gilles Muller, Julia L. Lawall, Jean-Marc Menaud, Mario Südholt:
Constructing component-based extension interfaces in legacy systems code. 15
Manageability
- Andrew Whitaker, Richard S. Cox, Steven D. Gribble
:
Using time travel to diagnose computer problems. 16 - Rebecca Isaacs, Paul Barham, James R. Bulpin, Richard Mortier
, Dushyanth Narayanan:
Request extraction in Magpie: events, schemas and temporal joins. 17 - Aaron B. Brown, Joseph L. Hellerstein:
An approach to benchmarking configuration complexity. 18
Overlay networks
- Emin Gün Sirer, Sharad Goel, Mark Robson, Dogan Engin:
Eluding carnivores: file sharing with strong anonymity. 19 - Sidath B. Handurukande, Anne-Marie Kermarrec, Fabrice Le Fessant, Laurent Massoulié:
Exploiting semantic clustering in the eDonkey P2P network. 20 - Atul Singh, Miguel Castro, Peter Druschel, Antony I. T. Rowstron:
Defending against eclipse attacks on overlay networks. 21
Microkernels and virtual machines
- Michael Hohmuth, Michael Peter, Hermann Härtig, Jonathan S. Shapiro:
Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors. 22 - Jacob Gorm Hansen, Eric Jul:
Self-migration of operating systems. 23 - Joshua LeVasseur, Volkmar Uhlig:
A sledgehammer approach to reuse of legacy device drivers. 24 - Frank Bellosa:
When physical is not real enough. 25 - Sara Bouchenak, Fabienne Boyer, Emmanuel Cecchet, Sébastien Jean, Alan Schmitt, Jean-Bernard Stefani:
A component-based approach to distributed system management: a use case with self-manageable J2EE clusters. 26 - Jonathan Ledlie, Jeffrey Shneidman, Matt Welsh, Mema Roussopoulos, Margo I. Seltzer:
Open problems in data collection networks. 27 - Geoffrey Lefebvre, Michael J. Feeley:
Separating durability and availability in self-managed storage. 28 - Dong Li, Jun Wang
:
EERAID: energy efficient redundant and inexpensive disk array. 29 - Alan Mislove, Gaurav Oberoi, Ansley Post, Charles Reis, Peter Druschel, Dan S. Wallach:
AP3: cooperative, decentralized anonymous communication. 30 - James O'Brien, Marc Shapiro:
Undo for anyone, anywhere, anytime. 31 - Frédéric Ogel, Bertil Folliot, Gaël Thomas:
A step towards ubiquitous computing: an efficient flexible micro-ORB. 32 - Swaminathan Sivasubramanian, Guillaume Pierre, Maarten van Steen
:
Scalable strong consistency for web applications. 33 - Olaf Spinczyk, Daniel Lohmann
:
Using AOP to develop architectural-neutral operating system components. 34 - Godfrey Tan, John V. Guttag:
Long-term time-share guarantees are necessary for wireless LANs. 35 - Chad Yoshikawa, Brent N. Chun, Amin Vahdat, Fred S. Annexstein, Kenneth A. Berman:
The lonely NATed node. 36 - Aydan R. Yumerefendi, Jeffrey S. Chase:
Trust but verify: accountability for network services. 37
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.