


default search action
10th ACM SIGOPS European Workshop 2002: Saint-Emilion, France
- Gilles Muller, Eric Jul:

Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002. ACM 2002 
Instrumentation
- Andrew Whitaker, Marianne Shaw, Steven D. Gribble

:
Denali: a scalable isolation kernel. 10-15 - Hermann Härtig:

Security architectures revisited. 16-23 - Brian D. Noble, Mark D. Corner:

The case for transient authentication. 24-29 
Operating systems
- Timothy Roscoe, Richard Mortier

, Paul W. Jardetzky, Steven Hand:
InfoSpect: using a logic language for system health monitoring in distributed systems. 31-37 - Timothy L. Harris:

Dependable software needs pervasive debugging. 38-43 
Theory
- Leslie Lamport, John Matthews, Mark R. Tuttle, Yuan Yu:

Specifying and verifying systems with TLA+. 45-48 - Michael Norrish, Peter Sewell

, Keith Wansbrough:
Rigour is good for you and feasible: reflections on formal treatments of C and UDP sockets. 49-53 - Julia L. Lawall, Gilles Muller, Luciano Porto Barreto:

Capturing OS expertise in an event type system: the Bossa experience. 54-61 
Robust service
- Matt Welsh, David E. Culler:

Overload management as a fundamental service design primitive. 63-69 - Aaron B. Brown, David A. Patterson:

Rewind, repair, replay: three R's to dependability. 70-77 
Security & authentication
- Yvonne Coady, Gregor Kiczales, Joon Suan Ong, Andrew Warfield, Michael J. Feeley:

Brittle systems will break - not bend: can aspect-oriented programming help? 79-86 - Rajesh Krishna Balan, Jason Flinn, Mahadev Satyanarayanan

, Shafeeq Sinnamohideen, Hen-I Yang:
The case for cyber foraging. 87-92 - Kimberly Keeton

, John Wilkes:
Automating data dependability. 93-100 
Operating system's structures
- Michael M. Swift, Steven Martin, Henry M. Levy, Susan J. Eggers:

Nooks: an architecture for reliable device drivers. 102-107 - Sotiris Ioannidis, Steven M. Bellovin, Jonathan M. Smith:

Sub-operating systems: a new approach to application security. 108-115 
Peer-to-peer
- Rodrigo Rodrigues

, Barbara Liskov, Liuba Shrira:
The design of a robust peer-to-peer system. 117-124 - Jonathan Ledlie, Jacob M. Taylor, Laura Serban, Margo I. Seltzer:

Self-organization in peer-to-peer systems. 125-132 - Ayalvadi J. Ganesh, Anne-Marie Kermarrec, Laurent Massoulié:

HiScamp: self-organizing hierarchical membership protocol. 133-139 - Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, Antony I. T. Rowstron:

One ring to rule them all: service discovery and binding in structured peer-to-peer overlay networks. 140-145 
Extended abstracts
- Ren Ohmura, Nobuyuki Yamasaki, Yuichiro Anzai:

A design of the persistent operating system with non-volatile memory. 149-152 - Fabián E. Bustamante, Christian Poellabauer

, Karsten Schwan:
AIMS: robustness through sensible introspection. 153-156 - Gilbert Cabillic, Salam Majoul, Jean-Philippe Lesot, Michel Banâtre:

An approach for a dependable Java embedded environment. 157-160 - Mike Y. Chen, Emre Kiciman, Eric A. Brewer

:
An online evolutionary approach to developing internet services. 161-164 - Michael Hohmuth, Hendrik Tews, Shane G. Stephens:

Applying source-code verification to a microkernel: the VFiasco project. 165-169 - Jeffrey S. Chase, Amin Vahdat, John Wilkes:

Back to the future: dependable computing = dependable services. 170-173 - Patrick Cormery, Le Vinh Quy Ribal, Arnaud Stransky:

Dependency on O.S. in long-term programs: experience report in space programs. 174-177 - Kenji Hisazumi

, Tsuneo Nakanishi, Teruaki Kitasuka, Akira Fukuda:
Design and implementation of the Lambda mu-kernel based operating system for embedded systems. 178-181 - Hakim Weatherspoon, John Kubiatowicz:

Efficient heartbeats and repair of softstate in decentralized object location and routing systems. 182-185 - Frank Dabek, Nickolai Zeldovich, M. Frans Kaashoek, David Mazières, Robert Morris:

Event-driven programming for robust software. 186-189 - Meik Felser, Michael Golm, Christian Wawersich, Jürgen Kleinöder:

Execution time limitation of interrupt handlers in a Java operating system. 190-193 - Katsumi Maruyama, Kazuya Kodama, Soichiro Hidaka, Hiromichi Hashizume:

Extensible distributed operating system for reliable control systems. 194-197 - Shane G. Stephens, Gernot Heiser:

Fault tolerance and avoidance in biomedical systems. 198-200 - Trent Jaeger, Antony Edwards, Xiaolan Zhang:

Gaining and maintaining confidence in operating systems security. 201-204 - Radu Grosu, Erez Zadok, Scott A. Smolka, Rance Cleaveland, Yanhong A. Liu:

High-confidence operating systems. 205-208 - Ludovic Casset, Jean-Louis Lanet:

Increasing smart card dependability. 209-212 - George Candea, Armando Fox:

A utility-centered approach to building dependable infrastructure services. 213-218 - Madanlal Musuvathi, Andy Chou, David L. Dill, Dawson R. Engler:

Model checking system software with CMC. 219-222 - Stéphane Louise, Vincent David, Jean Delcoigne, Christophe Aussaguès:

OASIS project: deterministic real-time for safety critical embedded systems. 223-226 - Arun Venkataramani, Ravi Kokku, Michael Dahlin:

Operating system support for massive replication. 227-230 - Yasushi Saito, Christos T. Karamanolis:

Pangaea: a symbiotic wide-area file system. 231-234 - Dennis Geels, John Kubiatowicz:

Replica management should be a game. 235-238 - Xiaolan Zhang, Leendert van Doorn, Trent Jaeger, Ronald Perez, Reiner Sailer:

Secure coprocessor-based intrusion detection. 239-242 - Christophe Rippert, Jean-Bernard Stefani:

THINK: a secure distributed systems architecture. 243-246 - Sébastien Faucou

, Anne-Marie Déplanche, Yvon Trinquet:
Timing fault detection for safety-critical real-time embedded systems. 247-250 - Vivek Haldar, Michael Franz:

Towards trusted systems from the ground up. 251-254 - David Oppenheimer, David A. Patterson:

Studying and using failure data from large-scale internet services. 255-258 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














