The SCEAS System
Navigation Menu

Conferences in DBLP

ACM SIGOPS European Workshop (sigopsE)
2002 (conf/sigopsE/2002)


  1. Denali: a scalable isolation kernel. [Citation Graph (, )][DBLP]


  2. Security architectures revisited. [Citation Graph (, )][DBLP]


  3. The case for transient authentication. [Citation Graph (, )][DBLP]


  4. InfoSpect: using a logic language for system health monitoring in distributed systems. [Citation Graph (, )][DBLP]


  5. Dependable software needs pervasive debugging. [Citation Graph (, )][DBLP]


  6. Specifying and verifying systems with TLA+. [Citation Graph (, )][DBLP]


  7. Rigour is good for you and feasible: reflections on formal treatments of C and UDP sockets. [Citation Graph (, )][DBLP]


  8. Capturing OS expertise in an event type system: the Bossa experience. [Citation Graph (, )][DBLP]


  9. Overload management as a fundamental service design primitive. [Citation Graph (, )][DBLP]


  10. Rewind, repair, replay: three R's to dependability. [Citation Graph (, )][DBLP]


  11. Brittle systems will break - not bend: can aspect-oriented programming help? [Citation Graph (, )][DBLP]


  12. The case for cyber foraging. [Citation Graph (, )][DBLP]


  13. Automating data dependability. [Citation Graph (, )][DBLP]


  14. Nooks: an architecture for reliable device drivers. [Citation Graph (, )][DBLP]


  15. Sub-operating systems: a new approach to application security. [Citation Graph (, )][DBLP]


  16. The design of a robust peer-to-peer system. [Citation Graph (, )][DBLP]


  17. Self-organization in peer-to-peer systems. [Citation Graph (, )][DBLP]


  18. HiScamp: self-organizing hierarchical membership protocol. [Citation Graph (, )][DBLP]


  19. One ring to rule them all: service discovery and binding in structured peer-to-peer overlay networks. [Citation Graph (, )][DBLP]


  20. A design of the persistent operating system with non-volatile memory. [Citation Graph (, )][DBLP]


  21. AIMS: robustness through sensible introspection. [Citation Graph (, )][DBLP]


  22. An approach for a dependable Java embedded environment. [Citation Graph (, )][DBLP]


  23. An online evolutionary approach to developing internet services. [Citation Graph (, )][DBLP]


  24. Applying source-code verification to a microkernel: the VFiasco project. [Citation Graph (, )][DBLP]


  25. Back to the future: dependable computing = dependable services. [Citation Graph (, )][DBLP]


  26. Dependency on O.S. in long-term programs: experience report in space programs. [Citation Graph (, )][DBLP]


  27. Design and implementation of the Lambda mu-kernel based operating system for embedded systems. [Citation Graph (, )][DBLP]


  28. Efficient heartbeats and repair of softstate in decentralized object location and routing systems. [Citation Graph (, )][DBLP]


  29. Event-driven programming for robust software. [Citation Graph (, )][DBLP]


  30. Execution time limitation of interrupt handlers in a Java operating system. [Citation Graph (, )][DBLP]


  31. Extensible distributed operating system for reliable control systems. [Citation Graph (, )][DBLP]


  32. Fault tolerance and avoidance in biomedical systems. [Citation Graph (, )][DBLP]


  33. Gaining and maintaining confidence in operating systems security. [Citation Graph (, )][DBLP]


  34. High-confidence operating systems. [Citation Graph (, )][DBLP]


  35. Increasing smart card dependability. [Citation Graph (, )][DBLP]


  36. A utility-centered approach to building dependable infrastructure services. [Citation Graph (, )][DBLP]


  37. Model checking system software with CMC. [Citation Graph (, )][DBLP]


  38. OASIS project: deterministic real-time for safety critical embedded systems. [Citation Graph (, )][DBLP]


  39. Operating system support for massive replication. [Citation Graph (, )][DBLP]


  40. Pangaea: a symbiotic wide-area file system. [Citation Graph (, )][DBLP]


  41. Replica management should be a game. [Citation Graph (, )][DBLP]


  42. Secure coprocessor-based intrusion detection. [Citation Graph (, )][DBLP]


  43. THINK: a secure distributed systems architecture. [Citation Graph (, )][DBLP]


  44. Timing fault detection for safety-critical real-time embedded systems. [Citation Graph (, )][DBLP]


  45. Towards trusted systems from the ground up. [Citation Graph (, )][DBLP]


  46. Studying and using failure data from large-scale internet services. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002