-
1
-
-
21644455102
-
-
AGUILERA, M. K., MOGUL, J. C., WIENER, J. L., REYNOLDS, P., AND MUTHITACHAROEN, A. Performance debugging for distributed systems of black boxes. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (Bolton Landing, NY, October 2003), pp. 74-89.
-
AGUILERA, M. K., MOGUL, J. C., WIENER, J. L., REYNOLDS, P., AND MUTHITACHAROEN, A. Performance debugging for distributed systems of black boxes. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (Bolton Landing, NY, October 2003), pp. 74-89.
-
-
-
-
3
-
-
77952259672
-
Causeway: Operating system support for controlling and analyzing the execution of distributed programs
-
Santa Fe, NM, June
-
CHANDA, A., ELMELEEGY, K., COX, A. L., AND ZWAENEPOEL, W. Causeway: Operating system support for controlling and analyzing the execution of distributed programs. In Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS-X) (Santa Fe, NM, June 2005).
-
(2005)
Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS-X)
-
-
CHANDA, A.1
ELMELEEGY, K.2
COX, A.L.3
ZWAENEPOEL, W.4
-
4
-
-
84885599987
-
Capturing, indexing, clustering, and retrieving system history
-
Brighton, United Kingdom, October
-
COHEN, I., ZHANG, S., GOLDSZMIDT, M., SYMONS, J., KELLY, T., AND FOX, A. Capturing, indexing, clustering, and retrieving system history. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (Brighton, United Kingdom, October 2005), pp. 105-118.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles
, pp. 105-118
-
-
COHEN, I.1
ZHANG, S.2
GOLDSZMIDT, M.3
SYMONS, J.4
KELLY, T.5
FOX, A.6
-
5
-
-
35448971003
-
Improved error reporting for software that uses black-box components
-
San Diego, CA
-
HA, J., ROSSBACH, C. J., DAVIS, J. V., ROY, I., RAMADAN, H. E., PORTER, D. E., CHEN, D. L., AND WITCHEL, E. Improved error reporting for software that uses black-box components. In Proceedings of the Conference on Programming Language Design and Implementation 2007 (San Diego, CA, 2007).
-
(2007)
Proceedings of the Conference on Programming Language Design and Implementation 2007
-
-
HA, J.1
ROSSBACH, C.J.2
DAVIS, J.V.3
ROY, I.4
RAMADAN, H.E.5
PORTER, D.E.6
CHEN, D.L.7
WITCHEL, E.8
-
6
-
-
0035701548
-
Research issues in no-futz computing
-
Schloss Elmau, Germany, May
-
HOLLAND, D. A., JOSEPHSON, W., MAGOUTIS, K., SELTZER, M., STEIN, C., AND LIM, A. Research issues in no-futz computing. In Proceedings of the 8th Workshop on Hot Topics in Operating Systems (HotOS-VIII) (Schloss Elmau, Germany, May 2001), pp. 106-110.
-
(2001)
Proceedings of the 8th Workshop on Hot Topics in Operating Systems (HotOS-VIII)
, pp. 106-110
-
-
HOLLAND, D.A.1
JOSEPHSON, W.2
MAGOUTIS, K.3
SELTZER, M.4
STEIN, C.5
LIM, A.6
-
7
-
-
85180415640
-
Privacy-preserving friends troubleshooting network
-
San Diego, CA, February
-
HUANG, Q., WANG, H. J., AND BORISOV, N. Privacy-preserving friends troubleshooting network. In Proceedings of the 12th Network and Distributed System Security Symposium (San Diego, CA, February 2005), pp. 245-257.
-
(2005)
Proceedings of the 12th Network and Distributed System Security Symposium
, pp. 245-257
-
-
HUANG, Q.1
WANG, H.J.2
BORISOV, N.3
-
8
-
-
85013259545
-
Time Warp operating system
-
Austin, TX, November
-
JEFFERSON, D., BECKMAN, B., WIELAND, F., BLUME, L., DILORETO, M., P.HONTALAS, LAROCHE, P., STURDEVANT, K., TUPMAN, J., WARREN, V., WEIDEL, J., YOUNGER, H., AND BELLENOT, S. Time Warp operating system. In Proceedings of the 11th ACM Symposium on Operating Systems Principles (Austin, TX, November 1987), pp. 77-93.
-
(1987)
Proceedings of the 11th ACM Symposium on Operating Systems Principles
, pp. 77-93
-
-
JEFFERSON, D.1
BECKMAN, B.2
WIELAND, F.3
BLUME, L.4
DILORETO, M.5
HONTALAS, P.6
LAROCHE, P.7
STURDEVANT, K.8
TUPMAN, J.9
WARREN, V.10
WEIDEL, J.11
YOUNGER, H.12
BELLENOT, S.13
-
9
-
-
84885639914
-
Detecting past and present intrusions through vulnerability-specific predicates
-
Brighton, United Kingdom, October
-
JOSHI, A., KING, S. T., DUNLAP, G. W., AND CHEN, P. M. Detecting past and present intrusions through vulnerability-specific predicates. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (Brighton, United Kingdom, October 2005), pp. 91-104.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles
, pp. 91-104
-
-
JOSHI, A.1
KING, S.T.2
DUNLAP, G.W.3
CHEN, P.M.4
-
10
-
-
0037253062
-
The vision of autonomic computing
-
KEPHART, J., AND CHESS, D. M. The vision of autonomic computing. Computer 36, 1 (2003), 45-52.
-
(2003)
Computer
, vol.36
, Issue.1
, pp. 45-52
-
-
KEPHART, J.1
CHESS, D.M.2
-
11
-
-
21644490164
-
Backtracking intrusions
-
Bolton Landing, NY, October
-
KING, S. T., AND CHEN, P. M. Backtracking intrusions. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (Bolton Landing, NY, October 2003), pp. 223-236.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles
, pp. 223-236
-
-
KING, S.T.1
CHEN, P.M.2
-
12
-
-
84887095037
-
-
LI, T., ELLIS, C. S., LEBECK, A. R., AND SORIN, D. J. Pulse: A dynamic deadlock detection mechanism using speculative execution. In Proceedings of the 2005 USENIX Technical Conference (31-44, April 2005).
-
LI, T., ELLIS, C. S., LEBECK, A. R., AND SORIN, D. J. Pulse: A dynamic deadlock detection mechanism using speculative execution. In Proceedings of the 2005 USENIX Technical Conference (31-44, April 2005).
-
-
-
-
13
-
-
79955976064
-
Exploiting weak connectivity in mobile file access
-
Copper Mountain, CO, Dec
-
MUMMERT, L., EBLING, M., AND SATYANARAYANAN, M. Exploiting weak connectivity in mobile file access. In Proceedings of the 15th ACM Symposium on Operating Systems Principles (Copper Mountain, CO, Dec. 1995).
-
(1995)
Proceedings of the 15th ACM Symposium on Operating Systems Principles
-
-
MUMMERT, L.1
EBLING, M.2
SATYANARAYANAN, M.3
-
14
-
-
85076227002
-
Provenance-aware storage systems
-
Boston, MA, May/June
-
MUNISWAMY-REDDY, K.-K., HOLLAND, D. A., BRAUN, U., AND SELTZER, M. Provenance-aware storage systems. In Proceedings of the 2006 USENIX Annual Technical Conference (Boston, MA, May/June 2006), pp. 43-56.
-
(2006)
Proceedings of the 2006 USENIX Annual Technical Conference
, pp. 43-56
-
-
MUNISWAMY-REDDY, K.-K.1
HOLLAND, D.A.2
BRAUN, U.3
SELTZER, M.4
-
15
-
-
84885629677
-
Speculative execution in a distributed file system
-
Brighton, United Kingdom, October
-
NIGHTINGALE, E. B., CHEN, P. M., AND FLINN, J. Speculative execution in a distributed file system. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (Brighton, United Kingdom, October 2005), pp. 191-205.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles
, pp. 191-205
-
-
NIGHTINGALE, E.B.1
CHEN, P.M.2
FLINN, J.3
-
16
-
-
84885578759
-
Treating bugs as allergies - a safe method to survive software failures
-
Brighton, United Kingdom, October
-
QIN, F., TUCEK, J., SUNDARESAN, J., AND ZHOU, Y. Rx: Treating bugs as allergies - a safe method to survive software failures. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (Brighton, United Kingdom, October 2005), pp. 235-248.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles
, pp. 235-248
-
-
QIN, F.1
TUCEK, J.2
SUNDARESAN, J.3
ZHOU, Y.R.4
-
17
-
-
33845653247
-
Slingshot: Deploying stateful services in wireless hotspots
-
Seattle, WA, June
-
SU, Y.-Y., AND FLINN, J. Slingshot: Deploying stateful services in wireless hotspots. In Proceedings of the 3rd International Conference on Mobile Systems, Applications and Services (Seattle, WA, June 2005), pp. 79-92.
-
(2005)
Proceedings of the 3rd International Conference on Mobile Systems, Applications and Services
, pp. 79-92
-
-
SU, Y.-Y.1
FLINN, J.2
-
18
-
-
85077048913
-
Automatic misconfiguration troubleshooting with PeerPressure
-
San Francisco, CA, December
-
WANG, H. J., PLATT, J. C., CHEN, Y., ZHANG, R., AND WANG, Y.-M. Automatic misconfiguration troubleshooting with PeerPressure. In Proceedings of the 6th Symposium on Operating Systems Design and Implementation (San Francisco, CA, December 2004), pp. 245-257.
-
(2004)
Proceedings of the 6th Symposium on Operating Systems Design and Implementation
, pp. 245-257
-
-
WANG, H.J.1
PLATT, J.C.2
CHEN, Y.3
ZHANG, R.4
WANG, Y.-M.5
-
19
-
-
77952114571
-
TRIDER: A black-box, state-based approach to change and configuration management and support
-
October
-
WANG, Y.-M., VERBOWSKI, C., DUNAGAN, J., CHEN, Y., WANG, H. J., YUAN, C., AND ZHANG, Z. STRIDER: A black-box, state-based approach to change and configuration management and support. In Proceedings of Usenix Large Installation Systems Administration Conference (October 2003), pp. 159-172.
-
(2003)
Proceedings of Usenix Large Installation Systems Administration Conference
, pp. 159-172
-
-
WANG, Y.-M.1
VERBOWSKI, C.2
DUNAGAN, J.3
CHEN, Y.4
WANG, H.J.5
YUAN, C.6
ZHANG, Z.S.7
-
20
-
-
34548028878
-
Configuration debugging as search: Finding the needle in the haystack
-
San Francisco, CA, December
-
WHITAKER, A., COX, R. S., AND GRIBBLE, S. D. Configuration debugging as search: Finding the needle in the haystack. In Proceedings of the 6th Symposium on Operating Systems Design and Implementation (San Francisco, CA, December 2004), pp. 77-90.
-
(2004)
Proceedings of the 6th Symposium on Operating Systems Design and Implementation
, pp. 77-90
-
-
WHITAKER, A.1
COX, R.S.2
GRIBBLE, S.D.3
|