http://eurosys2009.informatik.uni-erlangen.de/programme/conference.html

Preliminary Conference Programme

The following is a preliminary list of papers accepted for EuroSys 2009. All of them are still subject to shepherding and final approval. The detailed schedule with sessions and session chairs will be posted here when ready.

SnowFlock: Rapid Virtual Machine Cloning for Cloud Computing
H. Andres Lagar-Cavilla (University of Toronto), Joseph A. Whitney (University of Toronto), Adin Scannell (University of Toronto), Stephen M. Rumble (Stanford University), Philip Patchin (University of Toronto), Eyal de Lara (University of Toronto), Michael Brudno (University of Toronto), M. Satyanarayanan (Carnegie Mellon University)

Memory Resource Allocation for File System Prefetching -- From a Supply Chain Management Perspective
Zhe Zhang (North Carolina State Univerisity), Amit Kulkarni (North Carolina State Univerisity), Xiaosong Ma (North Carolina State Univerisity and Oak Ridge National Lab), Yuanyuan Zhou (University of Illinois at Urbana-Champaign)

Intrusion Detection Using Parallel Execution and Monitoring of Program Variants in User-Space
Babak Salamat (UC Irvine), Todd Jackson (UC Irvine), Andreas Gal (UC Irvine), Michael Franz (UC Irvine)

Koala: A platform for OS-level power management
David Snowdon (NICTA, The University of New South Wales, Intel Corporation), Etienne Le Sueur (NICTA, The University of New South Wales), Stefan Petters (NICTA, The University of New South Wales), Gernot Heiser (NICTA, The University of New South Wales, Open Kernel Labs)

Towards Practical Page Coloring-based Multicore Cache Management
Xiao Zhang (PhD candidate CS Dept. University of Rochester), Sandhya Dwarkadas (Professor CS Dept. University of Rochester), Kai Shen (Associate Professor CS Dept. University of Rochester)

xCalls: Safe I/O in Memory Transactions
Haris Volos (University of Wisconsin - Madison), Neelam Goyal (Oracle), Andres Jaan Tack (University of Wisconsin - Madison), Michael M. Swift (University of Wisconsin - Madison), Adam Welc (Intel Corporation)

Predicting Replicated Database Scalability from Standalone Database Profiling
Sameh Elnikety (Microsoft Research), Steve Dropsho (Google), Emmanuel Cecchet (University of Massachusetts), Willy Zwaenepoel (EPFL)

Multi-Aspect Profiling of Kernel Rootkit Behavior
Ryan Riley (Purdue University), Xuxian Jiang (North Carolina State University), Dongyan Xu (Purdue University)

Understanding User Interactions in Facebook
Christo Wilson (UCSB), Bryce Boe (UCSB), Alessandra Sala (UCSB), Krishna Puttaswamy (UCSB), Ben Y. Zhao (UCSB)

Software Lock Elision
Amitabha Roy (Computer Laboratory, University of Cambridge), Steven Hand (Computer Laboratory, University of Cambridge), Tim Harris (Microsoft Research)

SCAN-Lite: Enterprise-wide analysis on the cheap
Craig Soules (Hewlett Packard Labs), Kim Keeton (Hewlett Packard Labs), Charles B. Morrey III (Hewlett Packard Labs)

Automated Control of Multiple Virtualized Resources
Pradeep Padala (University of Michigan), Kai-Yuan Hou (University of Michigan), Xiaoyun Zhu (HP Labs), Mustafa Uysal (HP Labs), Zhikui Wang (HP Labs), Sharad Singhal (HP Labs), Arif Merchant (HP Labs), Kang G. Shin (University of Michigan)

(Short paper) Tralfamadore: Unifying Source Code and Execution Experience
Geoffrey Lefebvre (UBC), Brendan Cully (UBC), Andrew Warfield (UBC), Norman C. Hutchinson (UBC), Michael J. Feeley (UBC)

Polygraph: Effective and Efficient Compromise Recovery for Weakly Consistent Replication
Prince Mahajan (University of Texas at Austin), Ramakrishna Kotla (Microsoft Research, Silicon Valley), Catherine C. Marshall (Microsoft Research, Silicon Valley), Venugopalan Ramasubramanian (Microsoft Research, Silicon Valley), Thomas L. Rodeheffer (Microsoft Research, Silicon Valley), Douglas B. Terry (Microsoft Research, Silicon Valley), Ted Wobber (Microsoft Research, Silicon Valley)

(Short Paper) Improving the Responsiveness of Interactive Internet Services with Automatic Cache Placement
Alex Rasmussen (UCSD), Emre Kiciman (Microsoft Research), Benjamin Livshits (Microsoft Research), Madanlal Musuvathi (Microsoft Research)

Pointless Tainting? Evaluating the practicality of pointer tainting
Asia Slowinska (Vrije Universiteit Amsterdam), Herbert Bos (Vrije Universiteit Amsterdam)

Dingo: Taming Device Drivers
Leonid Ryzhyk (UNSW, NICTA), Peter Chubb (NICTA), Ihor Kuz (UNSW, NICTA), Gernot Heiser (UNSW, NICTA, Open Kernel Labs)

First-Aid: Surviving and Preventing Memory Management Bugs during Production Runs
Qi Gao (Ohio State University), Wenbin Zhang (Ohio State University), Yan Tang (Ohio State University), Feng Qin (Ohio State University)

Isolating Web Programs in Modern Browser Architectures
Charles Reis (University of Washington and Google), Steven D. Gribble (University of Washington and Google)

Privacy-Preserving Browser-Side Scripting With BFlow
Alexander Yip (MIT), Neha Narula (MIT), Maxwell Krohn (CMU), Robert Morris (MIT)

Transparent Checkpoints of Closed Distributed Systems in Emulab
Anton Burtsev (University of Utah, School of Computing), Prashanth Radhakrishnan (University of Utah, School of Computing), Mike Hibler (University of Utah, School of Computing), Jay Lepreau (University of Utah, School of Computing)

Ksplice: Automatic rebootless kernel updates
Jeff Arnold (MIT), Frans Kaashoek (MIT)

Fair and Timely Scheduling via Cooperative Polling
Charles Krasic (University of British Columbia), Mayukh Saubhasik (University of British Columbia), Anirban Sinha (University of British Columbia), Ashvin Goel (University of Toronto)

Statistical Profiling-based Techniques for Effective Provisioning of Power Infrastructure in Consolidated Data Centers
Sriram Govindan (The Pennsylvania State University), Jeonghwan Choi (The Pennsylvania State University), Bhuvan Urgaonkar (The Pennsylvania State University), Anand Sivasubramaniam (The Pennsylvania State University), Andrea Baldini (Cisco Systems Inc)

Migrating enterprise storage to SSDs: analysis of tradeoffs
Dushyanth Narayanan (Microsoft Research Cambridge, UK), Eno Thereska (Microsoft Research Cambridge, UK), Austin Donnelly (Microsoft Research Cambridge, UK), Sameh Elnikety (Microsoft Research Cambridge, UK), Antony Rowstron (Microsoft Research Cambridge, UK)


Reply via email to