-
3
-
-
84860571490
-
-
University of oregon route views project §8.1
-
University of oregon route views project. http://www.routeviews.org/, 2000. §8.1
-
(2000)
-
-
-
4
-
-
79953080446
-
Efficient system-enforced deterministic parallelism
-
§3.2
-
A. Aviram, S.-C. Weng, S. Hu, and B. Ford. Efficient system-enforced deterministic parallelism. In OSDI, pages 1-16, 2010. §3.2
-
(2010)
OSDI
, pp. 1-16
-
-
Aviram, A.1
Weng, S.-C.2
Hu, S.3
Ford, B.4
-
5
-
-
79953100435
-
Deterministic process groups in dOS
-
§3.2
-
T. Bergan, N. Hunt, L. Ceze, and S. D. Gribble. Deterministic process groups in dOS. In OSDI, pages 1-16, 2010. §3.2
-
(2010)
OSDI
, pp. 1-16
-
-
Bergan, T.1
Hunt, N.2
Ceze, L.3
Gribble, S.D.4
-
7
-
-
33846686361
-
Deconstructing transactions: The subtleties of atomicity
-
Jun §2
-
C. Blundell, E. C. Lewis, and M. M. K. Martin. Deconstructing transactions: The subtleties of atomicity. In WDDD. Jun 2005. §2
-
(2005)
WDDD
-
-
Blundell, C.1
Lewis, E.C.2
Martin, M.M.K.3
-
8
-
-
0022144724
-
Asynchronous consensus and broadcast protocols
-
§3.1
-
G. Bracha and S. Toueg. Asynchronous consensus and broadcast protocols. JACM, 32(4):824-840, 1985. §3.1
-
(1985)
JACM
, vol.32
, Issue.4
, pp. 824-840
-
-
Bracha, G.1
Toueg, S.2
-
9
-
-
0034187325
-
A benchmark suite for high performance java
-
§8.1
-
J. Bull, L. Smith, M. Westhead, D. Henty, and R. Davey. A benchmark suite for high performance java. Concurrency - Practice and Experience, 12(6):375-388, 2000. §8.1
-
(2000)
Concurrency - Practice and Experience
, vol.12
, Issue.6
, pp. 375-388
-
-
Bull, J.1
Smith, L.2
Westhead, M.3
Henty, D.4
Davey, R.5
-
10
-
-
70449672735
-
Exploiting unix file-system races via algorithmic complexity attacks
-
§3
-
X. Cai, Y. Gui, and R. Johnson. Exploiting unix file-system races via algorithmic complexity attacks. In Oakland, pages 27-41, 2009. §3
-
(2009)
Oakland
, pp. 27-41
-
-
Cai, X.1
Gui, Y.2
Johnson, R.3
-
11
-
-
0345757358
-
Practical byzantine fault tolerance and proactive recovery
-
DOI 10.1145/571637.571640
-
M. Castro and B. Liskov. Practical byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems (TOCS), 20(4):398-461, Nov. 2002. §9 (Pubitemid 135702591)
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.4
, pp. 398-461
-
-
Castro, M.1
Liskov, B.2
-
12
-
-
72249084310
-
Upright cluster services
-
§1, §3.1
-
A. Clement, M. Kapritsos, S. Lee, Y. Wang, L. Alvisi, M. Dahlin, and T. Riché. Upright cluster services. In SOSP, pages 277-290, 2009. §1, §3.1
-
(2009)
SOSP
, pp. 277-290
-
-
Clement, A.1
Kapritsos, M.2
Lee, S.3
Wang, Y.4
Alvisi, L.5
Dahlin, M.6
Riché, T.7
-
13
-
-
21644483570
-
Internet message access protocol - Version 4rev1
-
(Proposed Standard), March Obsoletes by RFC 2060. §1, §4
-
M. Crispin. INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1. RFC 3501 (Proposed Standard), March 2003. Obsoletes by RFC 2060. §1, §4
-
(2003)
RFC 3501
-
-
Crispin, M.1
-
15
-
-
84860567431
-
-
§4.1, §8.2
-
Dovecot maildir and racing. http://www.dovecot.org/list/dovecot/2006- March/011811.html. §4.1, §8.2
-
Dovecot Maildir and Racing
-
-
-
17
-
-
83455207846
-
A transactional flash file system for microcontrollers
-
§9
-
E. Gal and S. Toledo. A transactional flash file system for microcontrollers. In USENIX, pages 89-104, 2005. §9
-
(2005)
USENIX
, pp. 89-104
-
-
Gal, E.1
Toledo, S.2
-
18
-
-
79955968568
-
Efficient middleware for byzantine fault tolerant database replication
-
ACM §3.2, §9
-
R. Garcia, R. Rodrigues, and N. Preguiça. Efficient middleware for byzantine fault tolerant database replication. In EuroSys, pages 107-122. ACM, 2011. §3.2, §9
-
(2011)
EuroSys
, pp. 107-122
-
-
Garcia, R.1
Rodrigues, R.2
Preguiça, N.3
-
20
-
-
0000761412
-
Granularity of locks and degrees of consistency in a shared data base
-
§2
-
J. N. Gray, R. A. Lorie, G. R. Putzolu, and I. L. Traiger. Granularity of locks and degrees of consistency in a shared data base. Modeling in Data Base Management Systems, pages 364-394, 1976. §2
-
(1976)
Modeling in Data Base Management Systems
, pp. 364-394
-
-
Gray, J.N.1
Lorie, R.A.2
Putzolu, G.R.3
Traiger, I.L.4
-
22
-
-
84860557334
-
-
Oakland, Oakland, CA, May §5.4
-
S. Jana, D. E. Porter, and V. Shmatikov. TxBox: Building secure, efcient sandboxes with system transactions. In Oakland, Oakland, CA, May 2011. §5.4
-
(2011)
TxBox: Building Secure, Efcient Sandboxes with System Transactions
-
-
Jana, S.1
Porter, D.E.2
Shmatikov, V.3
-
23
-
-
41149091269
-
Zyzzyva: Speculative byzantine fault tolerance
-
DOI 10.1145/1294261.1294267, SOSP'07: Proceedings of the 21st ACM Symposium on Operating Systems Principles
-
R. Kotla, L. Alvisi, M. Dahlin, A. Clement, and E. Wong. Zyzzyva: Speculative byzantine fault tolerance. SOSP, pages 45-58, 2007. §3.1, §9 (Pubitemid 351429388)
-
(2007)
Operating Systems Review (ACM)
, pp. 45-58
-
-
Kotla, R.1
Alvisi, L.2
Dahlin, M.3
Clement, A.4
Wong, E.5
-
24
-
-
4544373717
-
High throughput byzantine fault tolerance
-
IEEE §3.2, §9
-
R. Kotla and M. Dahlin. High throughput Byzantine fault tolerance. In DSN, pages 575-584. IEEE, 2003. §3.2, §9
-
(2003)
DSN
, pp. 575-584
-
-
Kotla, R.1
Dahlin, M.2
-
25
-
-
33750570667
-
Lower bounds for asynchronous consensus
-
DOI 10.1007/s00446-006-0155-x
-
L. Lamport. Lower bounds for asynchronous consensus. Distributed Computing, 19(2):104-125, 2006. §3.1 (Pubitemid 44673723)
-
(2006)
Distributed Computing
, vol.19
, Issue.2
, pp. 104-125
-
-
Lamport, L.1
-
26
-
-
84976699318
-
The byzantine generals problem
-
§3
-
L. Lamport, R. Shostak, and M. Pease. The byzantine generals problem. TOPLAS, 4(3):382-401, 1982. §3
-
(1982)
TOPLAS
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
27
-
-
32344436210
-
Graphs over time: Densification laws, shrinking diameters and possible explanations
-
DOI 10.1145/1081870.1081893, KDD-2005 - Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
J. Leskovec, J. Kleinberg, and C. Faloutsos. Graphs over time: densification laws, shrinking diameters and possible explanations. In SIGKDD, pages 177-187. ACM, 2005. §8.1 (Pubitemid 43218279)
-
(2005)
Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 177-187
-
-
Leskovec, J.1
Kleinberg, J.2
Faloutsos, C.3
-
28
-
-
33846552560
-
Supporting nested transactional memory in LogTM
-
§9
-
M. J. Moravan, J. Bobba, K. E. Moore, L. Yen, M. D. Hill, B. Liblit, M. M. Swift, and D. A. Wood. Supporting nested transactional memory in LogTM. In ASPLOS, pages 359-370, 2006. §9
-
(2006)
ASPLOS
, pp. 359-370
-
-
Moravan, M.J.1
Bobba, J.2
Moore, K.E.3
Yen, L.4
Hill, M.D.5
Liblit, B.6
Swift, M.M.7
Wood, D.A.8
-
29
-
-
0012359238
-
Post office protocol - Version 3
-
(Standard), May Obsoletes by RFC 1725. §4
-
J. Myers. Post Office Protocol - Version 3. RFC 1939 (Standard), May 1996. Obsoletes by RFC 1725. §4
-
(1996)
RFC 1939
-
-
Myers, J.1
-
30
-
-
33845395054
-
Speculative execution in a distributed file system
-
DOI 10.1145/1095809.1095829
-
E. B. Nightingale, P. M. Chen, and J. Flinn. Speculative execution in a distributed file system. In SOSP, pages 191-205, 2005. §9 (Pubitemid 44892213)
-
(2005)
Operating Systems Review (ACM)
, vol.39
, Issue.5
, pp. 191-205
-
-
Nightingale, E.B.1
Chen, P.M.2
Flinn, J.3
-
31
-
-
77957797161
-
Parallelizing security checks on commodity hardware
-
DOI 10.1145/1346281.1346321, ASPLOS XIII - Thirteenth International Conference on Architectural Support for Programming Languages and Operating Systems
-
E. B. Nightingale, D. Peek, P. M. Chen, and J. Flinn. Parallelizing security checks on commodity hardware. In ASPLOS, pages 308-318, 2008. §9 (Pubitemid 351585416)
-
(2008)
International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS
, pp. 308-318
-
-
Nightingale, E.B.1
Peek, D.2
Chen, P.M.3
Flinn, J.4
-
32
-
-
41149089633
-
Rethink the sync
-
§9
-
E. B. Nightingale, K. Veeraraghavan, P. M. Chen, and J. Flinn. Rethink the sync. In OSDI, pages 1-14, 2006. §9
-
(2006)
OSDI
, pp. 1-14
-
-
Nightingale, E.B.1
Veeraraghavan, K.2
Chen, P.M.3
Flinn, J.4
-
33
-
-
80051977949
-
-
PhD thesis, The University of Texas at Austin, December §2
-
D. E. Porter. Operating System Transactions. PhD thesis, The University of Texas at Austin, December 2010. §2
-
(2010)
Operating System Transactions
-
-
Porter, D.E.1
-
34
-
-
72249089012
-
Operating systems transactions
-
ACM §1, §1, §2, §2, §8.2, §9
-
D. E. Porter, O. S. Hofmann, C. J. Rossbach, A. Benn, and E. Witchel. Operating systems transactions. In SOSP, pages 161-176. ACM, 2009. §1, §1, §2, §2, §8.2, §9
-
(2009)
SOSP
, pp. 161-176
-
-
Porter, D.E.1
Hofmann, O.S.2
Rossbach, C.J.3
Benn, A.4
Witchel, E.5
-
35
-
-
34248216920
-
Eliminating synchronization-related atomic operations with biased locking and bulk rebiasing
-
DOI 10.1145/1167473.1167496, Proceedings of the 21st Annual ACM SIGPLAN Conference on Object-oriented Programming Systems, Languages, and Applications, OOPSLA 2006
-
K. Russell and D. Detlefs. Eliminating synchronization-related atomic operations with biased locking and bulk rebiasing. ACM SIGPLAN Notices, 41(10):263-272, 2006. §7.1 (Pubitemid 46726086)
-
(2006)
Proceedings of the Conference on Object-Oriented Programming Systems, Languages, and Applications, OOPSLA
, vol.2006
, pp. 263-272
-
-
Russell, K.1
Detlefs, D.2
-
37
-
-
84883295282
-
Experience with transactions in QuickSilver
-
ACM §9
-
F. Schmuck and J. Wylie. Experience with transactions in QuickSilver. In SOSP, pages 239-253. ACM, 1991. §9
-
(1991)
SOSP
, pp. 239-253
-
-
Schmuck, F.1
Wylie, J.2
-
38
-
-
0025564050
-
Implementing fault-tolerant services using the state machine approach: A tutorial
-
§3
-
F. B. Schneider. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Comput. Surv., 22(4):299-319, 1990. §3
-
(1990)
ACM Comput. Surv.
, vol.22
, Issue.4
, pp. 299-319
-
-
Schneider, F.B.1
-
39
-
-
0027166418
-
Transaction support in a log-structured file system
-
§9
-
M. I. Seltzer. Transaction support in a log-structured file system. In IDCE, pages 503-510, 1993. §9
-
(1993)
IDCE
, pp. 503-510
-
-
Seltzer, M.I.1
-
40
-
-
85084100576
-
Dealing with disaster: Surviving misbehaved kernel extensions
-
§9
-
M. I. Seltzer, Y. Endo, C. Small, and K. A. Smith. Dealing with disaster: Surviving misbehaved kernel extensions. In OSDI, pages 213-227, 1996. §9
-
(1996)
OSDI
, pp. 213-227
-
-
Seltzer, M.I.1
Endo, Y.2
Small, C.3
Smith, K.A.4
-
41
-
-
0029203481
-
Software transactional memory
-
§2
-
N. Shavit and D. Touitou. Software transactional memory. In PODC, pages 204-213, 1995. §2
-
(1995)
PODC
, pp. 204-213
-
-
Shavit, N.1
Touitou, D.2
-
42
-
-
85094633379
-
BFT protocols under fire
-
§3.2
-
A. Singh, T. Das, P. Maniatis, P. Druschel, and T. Roscoe. BFT protocols under fire. In NSDI, pages 189-204, 2008. §3.2
-
(2008)
NSDI
, pp. 189-204
-
-
Singh, A.1
Das, T.2
Maniatis, P.3
Druschel, P.4
Roscoe, T.5
-
43
-
-
85077321280
-
Enabling transactional file access via lightweight kernel extensions
-
§9
-
R. Spillane, S. Gaikwad, M. Chinni, E. Zadok, and C. P. Wright. Enabling transactional file access via lightweight kernel extensions. In FAST, pages 29-42, 2009. §9
-
(2009)
FAST
, pp. 29-42
-
-
Spillane, R.1
Gaikwad, S.2
Chinni, M.3
Zadok, E.4
Wright, C.P.5
-
44
-
-
70449956042
-
AutoBash: Improving configuration management with operating system causality analysis
-
DOI 10.1145/1294261.1294284, SOSP'07: Proceedings of the 21st ACM Symposium on Operating Systems Principles
-
Y.-Y. Su, M. Attariyan, and J. Flinn. AutoBash: Improving configuration management with operating system causality analysis. In SOSP, pages 237-250, 2007. §9 (Pubitemid 351429379)
-
(2007)
Operating Systems Review (ACM)
, pp. 237-250
-
-
Su, Y.-Y.1
Attariyan, M.2
Flinn, J.3
-
45
-
-
41149146993
-
Tolerating byzantine faults in transaction processing systems using commit barrier scheduling
-
DOI 10.1145/1294261.1294268, SOSP'07: Proceedings of the 21st ACM Symposium on Operating Systems Principles
-
B. Vandiver, H. Balakrishnan, B. Liskov, and S. Madden. Tolerating byzantine faults in transaction processing systems using commit barrier scheduling. In SOSP, pages 59-72. ACM, 2007. §3.2, §9 (Pubitemid 351429369)
-
(2007)
Operating Systems Review (ACM)
, pp. 59-72
-
-
Vandiver, B.1
Balakrishnan, H.2
Liskov, B.3
Madden, S.4
-
46
-
-
0022301718
-
Transactions and synchronization in a distributed operating system
-
§9
-
M. J. Weinstein, J. Thomas W. Page, B. K. Livezey, and G. J. Popek. Transactions and synchronization in a distributed operating system. In SOSP, pages 115-126, 1985. §9
-
(1985)
SOSP
, pp. 115-126
-
-
Weinstein, M.J.1
Thomas, J.2
Page, W.3
Livezey, B.K.4
Popek, G.J.5
-
47
-
-
74049156111
-
Tolerating latency in replicated state machines
-
§9
-
B. Wester, J. Cowling, E. B. Nightingale, P. M. Chen, J. Flinn, and B. Liskov. Tolerating latency in replicated state machines. In NSDI, pages 245-260, 2009. §9
-
(2009)
NSDI
, pp. 245-260
-
-
Wester, B.1
Cowling, J.2
Nightingale, E.B.3
Chen, P.M.4
Flinn, J.5
Liskov, B.6
-
48
-
-
21644446595
-
Separating agreement from execution for Byzantine fault tolerant services
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
J. Yin, J.-P. Martin, A. Venkataramani, L. Alvisi, and M. Dahlin. Separating agreement from execution for byzantine fault tolerant services. In SOSP, pages 253-267, 2003. §3.1 (Pubitemid 40929701)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 253-267
-
-
Yin, J.1
Martin, J.-P.2
Venkataramani, A.3
Alvisi, L.4
Dahlin, M.5
-
50
-
-
57349104427
-
Extending hardware transactional memory to support non-busy waiting and non-transactional actions
-
§9
-
C. Zilles and L. Baugh. Extending hardware transactional memory to support non-busy waiting and non-transactional actions. In TRANSACT. ACM, 2006. §9
-
(2006)
TRANSACT. ACM
-
-
Zilles, C.1
Baugh, L.2
|