http://eurosys2009.informatik.uni-erlangen.de/programme/conference.html
The
following is a preliminary list of papers accepted for EuroSys 2009.
All of them are still subject to shepherding and final approval. The
detailed schedule with sessions and session chairs will be posted here
when ready.
SnowFlock: Rapid Virtual Machine Cloning for
Cloud Computing
H.
Andres Lagar-Cavilla (University of Toronto), Joseph A. Whitney
(University of Toronto), Adin Scannell (University of Toronto), Stephen
M. Rumble (Stanford University), Philip Patchin (University of
Toronto), Eyal de Lara (University of Toronto), Michael Brudno
(University of Toronto), M. Satyanarayanan (Carnegie Mellon University)
Memory Resource Allocation for File System Prefetching -- From a
Supply Chain Management Perspective
Zhe
Zhang (North Carolina State Univerisity), Amit Kulkarni (North Carolina
State Univerisity), Xiaosong Ma (North Carolina State Univerisity and
Oak Ridge National Lab), Yuanyuan Zhou (University of Illinois at
Urbana-Champaign)
Intrusion Detection Using Parallel Execution and Monitoring of
Program Variants in User-Space
Babak Salamat (UC Irvine), Todd Jackson (UC Irvine), Andreas Gal (UC
Irvine), Michael Franz (UC Irvine)
Koala: A platform for OS-level power management
David
Snowdon (NICTA, The University of New South Wales, Intel Corporation),
Etienne Le Sueur (NICTA, The University of New South Wales), Stefan
Petters (NICTA, The University of New South Wales), Gernot Heiser
(NICTA, The University of New South Wales, Open Kernel Labs)
Towards Practical Page Coloring-based Multicore Cache Management
Xiao
Zhang (PhD candidate CS Dept. University of Rochester), Sandhya
Dwarkadas (Professor CS Dept. University of Rochester), Kai Shen
(Associate Professor CS Dept. University of Rochester)
xCalls: Safe I/O in Memory Transactions
Haris
Volos (University of Wisconsin - Madison), Neelam Goyal (Oracle),
Andres Jaan Tack (University of Wisconsin - Madison), Michael M. Swift
(University of Wisconsin - Madison), Adam Welc (Intel Corporation)
Predicting Replicated Database Scalability from Standalone Database
Profiling
Sameh
Elnikety (Microsoft Research), Steve Dropsho (Google), Emmanuel Cecchet
(University of Massachusetts), Willy Zwaenepoel (EPFL)
Multi-Aspect Profiling of Kernel Rootkit Behavior
Ryan Riley (Purdue University), Xuxian Jiang (North Carolina State
University), Dongyan Xu (Purdue University)
Understanding User Interactions in Facebook
Christo Wilson (UCSB), Bryce Boe (UCSB), Alessandra Sala (UCSB),
Krishna Puttaswamy (UCSB), Ben Y. Zhao (UCSB)
Software Lock Elision
Amitabha
Roy (Computer Laboratory, University of Cambridge), Steven Hand
(Computer Laboratory, University of Cambridge), Tim Harris (Microsoft
Research)
SCAN-Lite: Enterprise-wide analysis on the cheap
Craig Soules (Hewlett Packard Labs), Kim Keeton (Hewlett Packard Labs),
Charles B. Morrey III (Hewlett Packard Labs)
Automated Control of Multiple Virtualized Resources
Pradeep
Padala (University of Michigan), Kai-Yuan Hou (University of Michigan),
Xiaoyun Zhu (HP Labs), Mustafa Uysal (HP Labs), Zhikui Wang (HP Labs),
Sharad Singhal (HP Labs), Arif Merchant (HP Labs), Kang G. Shin
(University of Michigan)
(Short paper) Tralfamadore: Unifying Source Code and Execution
Experience
Geoffrey Lefebvre (UBC), Brendan Cully (UBC), Andrew Warfield (UBC),
Norman C. Hutchinson (UBC), Michael J. Feeley (UBC)
Polygraph: Effective and Efficient Compromise Recovery for Weakly
Consistent Replication
Prince
Mahajan (University of Texas at Austin), Ramakrishna Kotla (Microsoft
Research, Silicon Valley), Catherine C. Marshall (Microsoft Research,
Silicon Valley), Venugopalan Ramasubramanian (Microsoft Research,
Silicon Valley), Thomas L. Rodeheffer (Microsoft Research, Silicon
Valley), Douglas B. Terry (Microsoft Research, Silicon Valley), Ted
Wobber (Microsoft Research, Silicon Valley)
(Short Paper) Improving the Responsiveness of Interactive Internet
Services with Automatic Cache Placement
Alex
Rasmussen (UCSD), Emre Kiciman (Microsoft Research), Benjamin Livshits
(Microsoft Research), Madanlal Musuvathi (Microsoft Research)
Pointless Tainting? Evaluating the practicality of pointer tainting
Asia Slowinska (Vrije Universiteit Amsterdam), Herbert Bos (Vrije
Universiteit Amsterdam)
Dingo: Taming Device Drivers
Leonid Ryzhyk (UNSW, NICTA), Peter Chubb (NICTA), Ihor Kuz (UNSW,
NICTA), Gernot Heiser (UNSW, NICTA, Open Kernel Labs)
First-Aid: Surviving and Preventing Memory Management Bugs during
Production Runs
Qi
Gao (Ohio State University), Wenbin Zhang (Ohio State University), Yan
Tang (Ohio State University), Feng Qin (Ohio State University)
Isolating Web Programs in Modern Browser Architectures
Charles Reis (University of Washington and Google), Steven D. Gribble
(University of Washington and Google)
Privacy-Preserving Browser-Side Scripting With BFlow
Alexander Yip (MIT), Neha Narula (MIT), Maxwell Krohn (CMU), Robert
Morris (MIT)
Transparent Checkpoints of Closed Distributed Systems in Emulab
Anton
Burtsev (University of Utah, School of Computing), Prashanth
Radhakrishnan (University of Utah, School of Computing), Mike Hibler
(University of Utah, School of Computing), Jay Lepreau (University of
Utah, School of Computing)
Ksplice: Automatic rebootless kernel updates
Jeff Arnold (MIT), Frans Kaashoek (MIT)
Fair and Timely Scheduling via Cooperative Polling
Charles
Krasic (University of British Columbia), Mayukh Saubhasik (University
of British Columbia), Anirban Sinha (University of British Columbia),
Ashvin Goel (University of Toronto)
Statistical Profiling-based Techniques for Effective Provisioning of
Power Infrastructure in Consolidated Data Centers
Sriram
Govindan (The Pennsylvania State University), Jeonghwan Choi (The
Pennsylvania State University), Bhuvan Urgaonkar (The Pennsylvania
State University), Anand Sivasubramaniam (The Pennsylvania State
University), Andrea Baldini (Cisco Systems Inc)
Migrating enterprise storage to SSDs: analysis of tradeoffs
Dushyanth
Narayanan (Microsoft Research Cambridge, UK), Eno Thereska (Microsoft
Research Cambridge, UK), Austin Donnelly (Microsoft Research Cambridge,
UK), Sameh Elnikety (Microsoft Research Cambridge, UK), Antony Rowstron
(Microsoft Research Cambridge, UK)