EuroSys 2010    April 13–16, 2010, Paris, France

Table of Contents

Foreword
Christine Morin (INRIA)
Gilles Muller (INRIA/LIP6)

EuroSys 2010 Conference Organization

Session 1: Storage Systems

Using Transparent Compression to Improve SSD-Based I/O Caches (Page 1)
Thanos Makatos (Institute of Computer Science & University of Crete)
Yannis Klonatos (Institute of Computer Science & University of Crete)
Manolis Marazakis (Institute of Computer Science & University of Crete)
Michail D. Flouris (Institute of Computer Science & University of Crete)
Angelos Bilas (Institute of Computer Science & University of Crete)

Differential RAID: Rethinking RAID for SSD Reliability (Page 15)
Mahesh Balakrishnan (Microsoft Research Silicon Valley)
Asim Kadav (University of Wisconsin)
Vijayan Prabhakaran (Microsoft Research Silicon Valley)
Dahlia Malkhi (Microsoft Research Silicon Valley)

Session 2: Transactional Memory

Evaluation of AMD's Advanced Synchronization Facility Within a Complete Transactional Memory Stack (Page 27)
Dave Christie (Advanced Micro Devices, Inc.)
Jae-Woong Chung (Advanced Micro Devices, Inc.)
Stephan Diestelhorst (Advanced Micro Devices, Inc.)

 (Page 27)
Michael Hohmuth (Advanced Micro Devices, Inc.)
Martin Pohlack (Advanced Micro Devices, Inc.)
Christof Fetzer (Technische Universität Dresden)
Martin Nowack (Technische Universität Dresden)
Torvald Riegel (Technische Universität Dresden)
Pascal Felber (Université de Neuchâtel)
Patrick Marlier (Université de Neuchâtel)
Etienne Rivière (Université de Neuchâtel)

Transactional Memory Support for Scalable and Transparent Parallelization of Multiplayer Games (Page 41)
Daniel Lupei (University of Toronto)
Bogdan Simion (University of Toronto)
Don Pinto (University of Toronto)
Matthew Misler (University of Toronto)
Mihai Burcea (University of Toronto)
William Krick (University of Toronto)
Cristiana Amza (University of Toronto)

Session 3: Real-Time Systems

Self-Tuning Schedulers for Legacy Real-Time Applications (Page 55)
Tommaso Cucinotta (Scuola Superiore Sant'Anna)
Fabio Checconi (Scuola Superiore Sant'Anna)
Luca Abeni (University of Trento)
Luigi Palopoli (University of Trento)

High-Level Programming of Embedded Hard Real-Time Devices (Page 69)
Filip Pizlo (Fiji Systems Inc.)
Lukasz Ziarek (Fiji Systems Inc.)
Ethan Blanton (Fiji Systems Inc.)
Petr Maj (Purdue University)
Jan Vitek (Purdue University)

(Return to Top)

Session 4: Systems Management

Barricade: Defending Systems Against Operator Mistakes (Page 83)
Fábio Oliveira (Rutgers University)
Andrew Tjang (Rutgers University)
Ricardo Bianchini (Rutgers University)
Richard P. Martin (Rutgers University)
Thu D. Nguyen (Rutgers University)

Splitter: A Proxy-Based Approach for Post-Migration Testing of Web Applications (Page 97)
Xiaoning Ding (The Ohio State University)
Hai Huang (IBM T.J. Watson Research Center)
Yaoping Ruan (IBM T.J. Watson Research Center)
Anees Shaikh (IBM T.J. Watson Research Center)
Brian Peterson (IBM T.J. Watson Research Center)
Xiaodong Zhang (The Ohio State University)

Fingerprinting the Datacenter: Automated Classification of Performance Crises (Page 111)
Peter Bodík (University of California, Berkeley)
Moises Goldszmidt (Microsoft Research)
Armando Fox (University of California, Berkeley)
Dawn B. Woodard (Cornell University)
Hans Andersen (Microsoft)

Session 5: Scheduling

Bias Scheduling in Heterogeneous Multi-Core Architectures (Page 125)
David Koufaty (Intel Laboratories)
Dheeraj Reddy (Intel Laboratories)
Scott Hahn (Intel Laboratories)

A Comprehensive Scheduler for Asymmetric Multicore Systems (Page 139)
Juan Carlos Saez (Complutense University of Madrid)
Manuel Prieto (Complutense University of Madrid)
Alexandra Fedorova (Simon Fraser University)
Sergey Blagodurov (Simon Fraser University)

Resource-Conscious Scheduling for Energy Efficiency on Multicore Processors (Page 153)
Andreas Merkel (Karlsruhe Institute of Technology)
Jan Stoess (Karlsruhe Institute of Technology)
Frank Bellosa (Karlsruhe Institute of Technology)

(Return to Top)

Session 6: Kernel

Reverse Engineering of Binary Device Drivers with RevNIC (Page 167)
Vitaly Chipounov (École Polytechnique Fédérale de Lausanne)
George Candea (École Polytechnique Fédérale de Lausanne)

Otherworld — Giving Applications a Chance to Survive OS Kernel Crashes (Page 181)
Alex Depoutovitch (University of Toronto)
Michael Stumm (University of Toronto)

Defeating Return-Oriented Rootkits with "Return-Less" Kernels (Page 195)
Jinku Li (North Carolina State University)
Zhi Wang (North Carolina State University)
Xuxian Jiang (North Carolina State University)
Michael Grace (North Carolina State University)
Sina Bahram (North Carolina State University)

NOVA: A Microhypervisor-Based Secure Virtualization Architecture (Page 209)
Udo Steinberg (Technische Universität Dresden)
Bernhard Kauer (Technische Universität Dresden)

Session 7: Cloud

BOOM Analytics: Exploring Data-Centric, Declarative Programming for the Cloud (Page 223)
Peter Alvaro (University of California, Berkeley)
Tyson Condie (University of California, Berkeley)
Neil Conway (University of California, Berkeley)
Khaled Elmeleegy (Yahoo! Research)
Joseph M. Hellerstein (University of California, Berkeley)
Russell Sears (University of California, Berkeley)

Q-Clouds: Managing Performance Interference Effects for QoS-Aware Clouds (Page 237)
Ripal Nathuji (Microsoft Research)
Aman Kansal (Microsoft Research)
Alireza Ghaffarkhah (University of New Mexico)

HadoopToSQL: A MapReduce Query Optimizer (Page 251)
Ming-Yee Iu (École Polytechnique Fédérale de Lausanne)
Willy Zwaenepoel (École Polytechnique Fédérale de Lausanne)

Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster Scheduling (Page 265)
Matei Zaharia (University of California, Berkeley)
Dhruba Borthakur (Facebook Inc.)
Joydeep Sen Sarma (Facebook Inc.)
Khaled Elmeleegy (Yahoo! Research)
Scott Shenker (University of California, Berkeley)
Ion Stoica (University of California, Berkeley)

(Return to Top)

Session 8: Security

Residue Objects: A Challenge to Web Browser Security (Page 279)
Shuo Chen (Microsoft Research)
Hong Chen (Purdue University)

 (Page 279)
Manuel Caballero (Microsoft Corporation)

Policy-Based Access Control for Weakly Consistent Replication (Page 293)
Ted Wobber (Microsoft Research, Silicon Valley)
Thomas L. Rodeheffer (Microsoft Research, Silicon Valley)
Douglas B. Terry (Microsoft Research, Silicon Valley)

Session 9: Bugs and Profiling

Kivati: Fast Detection and Prevention of Atomicity Violations (Page 307)
Lee Chew (University of Toronto)
David Lie (University of Toronto)

Execution Synthesis: A Technique for Automated Software Debugging (Page 321)
Cristian Zamfir (École Polytechnique Fédérale de Lausanne)
George Candea (École Polytechnique Fédérale de Lausanne)

Locating Cache Performance Bottlenecks Using Data Profiling (Page 335)
Aleksey Pesterev (Massachusetts Institute of Technology)
Nickolai Zeldovich (Massachusetts Institute of Technology)
Robert T. Morris (Massachusetts Institute of Technology)

(Return to Top)

Session 10: Multicast

Dr. Multicast: Rx for Data Center Communication Scalability (Page 349)
Ymir Vigfusson (IBM Research, Israel)
Hussam Abu-Libdeh (Cornell University)
Mahesh Balakrishnan (Microsoft Research)
Ken Birman (Cornell University)
Robert Burgess (Cornell University)
Gregory Chockler (IBM Research)
Haoyuan Li (Cornell University)
Yoav Tock (IBM Research, Israel)

The Next 700 BFT Protocols (Page 363)
Rachid Guerraoui (École Polytechnique Fédérale de Lausanne)
Nikola Knežević (École Polytechnique Fédérale de Lausanne)
Vivien Quéma (CNRS)
Marko Vukolić (IBM Research, Zurich)