EuroSys 2010 April 13–16, 2010, Paris, France |
|
Table of Contents Foreword EuroSys 2010 Conference Organization Session 1: Storage Systems Using
Transparent Compression to Improve SSD-Based I/O Caches (Page
1) Differential
RAID: Rethinking RAID for SSD Reliability (Page
15) |
|
Session 2: Transactional Memory Evaluation
of AMD's Advanced Synchronization Facility Within a Complete Transactional
Memory Stack (Page
27) (Page
27) Transactional
Memory Support for Scalable and Transparent Parallelization of Multiplayer
Games (Page
41) Session 3: Real-Time Systems Self-Tuning
Schedulers for Legacy Real-Time Applications (Page
55) High-Level
Programming of Embedded Hard Real-Time Devices (Page
69) |
|
(Return to Top) | Session 4: Systems Management Barricade:
Defending Systems Against Operator Mistakes (Page
83) Splitter:
A Proxy-Based Approach for Post-Migration Testing of Web Applications (Page
97) Fingerprinting
the Datacenter: Automated Classification of Performance Crises (Page
111) Session 5: Scheduling Bias
Scheduling in Heterogeneous Multi-Core Architectures (Page
125) A
Comprehensive Scheduler for Asymmetric Multicore Systems (Page
139) Resource-Conscious
Scheduling for Energy Efficiency on Multicore Processors (Page
153) |
(Return to Top) | Session 6: Kernel Reverse
Engineering of Binary Device Drivers with RevNIC (Page
167) Otherworld
— Giving Applications a Chance to Survive OS Kernel Crashes (Page
181) Defeating
Return-Oriented Rootkits with "Return-Less" Kernels (Page
195) NOVA:
A Microhypervisor-Based Secure Virtualization Architecture (Page
209) Session 7: Cloud BOOM
Analytics: Exploring Data-Centric, Declarative Programming for the Cloud (Page
223) Q-Clouds:
Managing Performance Interference Effects for QoS-Aware Clouds (Page
237) HadoopToSQL:
A MapReduce Query Optimizer (Page
251) Delay
Scheduling: A Simple Technique for Achieving Locality and Fairness in
Cluster Scheduling (Page
265) |
(Return to Top) | Session 8: Security Residue
Objects: A Challenge to Web Browser Security (Page
279) (Page
279) Policy-Based
Access Control for Weakly Consistent Replication (Page
293) Session 9: Bugs and Profiling Kivati:
Fast Detection and Prevention of Atomicity Violations (Page
307) Execution
Synthesis: A Technique for Automated Software Debugging (Page
321) Locating
Cache Performance Bottlenecks Using Data Profiling (Page
335) |
(Return to Top) | Session 10: Multicast Dr.
Multicast: Rx for Data Center Communication Scalability (Page
349) The
Next 700 BFT Protocols (Page
363) |