The SCEAS System
Navigation Menu

Conferences in DBLP

EuroSys (eurosys)
2008 (conf/eurosys/2008)


  1. Task activity vectors: a new metric for temperature-aware scheduling. [Citation Graph (, )][DBLP]


  2. Efficient guaranteed disk request scheduling with fahrrad. [Citation Graph (, )][DBLP]


  3. Enforcing appropriate process execution for exploiting idle resources from outside operating systems. [Citation Graph (, )][DBLP]


  4. Parallax: virtual disks for virtual machines. [Citation Graph (, )][DBLP]


  5. Replication degree customization for high availability. [Citation Graph (, )][DBLP]


  6. GreenFS: making enterprise computers greener by protecting them better. [Citation Graph (, )][DBLP]


  7. VPFS: building a virtual private file system with a small trusted computing base. [Citation Graph (, )][DBLP]


  8. Application-level isolation and recovery with solitude. [Citation Graph (, )][DBLP]


  9. Towards cinematic internet video-on-demand. [Citation Graph (, )][DBLP]


  10. Experiences with open overlays: a middleware approach to network heterogeneity. [Citation Graph (, )][DBLP]


  11. Protectit: trusted distributed services operating on sensitive data. [Citation Graph (, )][DBLP]


  12. Modeling viral economies for digital media. [Citation Graph (, )][DBLP]


  13. DepSpace: a byzantine fault-tolerant coordination service. [Citation Graph (, )][DBLP]


  14. Hang analysis: fighting responsiveness bugs. [Citation Graph (, )][DBLP]


  15. BorderPatrol: isolating events for black-box tracing. [Citation Graph (, )][DBLP]


  16. 30 seconds is not enough!: a study of operating system timer usage. [Citation Graph (, )][DBLP]


  17. Samurai: protecting critical data in unsafe languages. [Citation Graph (, )][DBLP]


  18. Controlled, systematic, and efficient code replacement for running java programs. [Citation Graph (, )][DBLP]


  19. Documenting and automating collateral evolutions in linux device drivers. [Citation Graph (, )][DBLP]


  20. Itrustpage: a user-assisted anti-phishing tool. [Citation Graph (, )][DBLP]


  21. Switchblade: enforcing dynamic personalized system call models. [Citation Graph (, )][DBLP]


  22. Eudaemon: involuntary and on-demand emulation against zero-day exploits. [Citation Graph (, )][DBLP]


  23. Manageable fine-grained information flow. [Citation Graph (, )][DBLP]


  24. Flicker: an execution infrastructure for tcb minimization. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002