The SCEAS System
Navigation Menu

Conferences in DBLP

USENIX Technical Conference (usenix)
2008 (conf/usenix/2008)

  1. VMwareDecoupling Dynamic Program Analysis from Execution in Virtual Environments. [Citation Graph (, )][DBLP]

  2. Protection Strategies for Direct Access to Virtualized I/O Devices. [Citation Graph (, )][DBLP]

  3. Bridging the Gap between Software and Hardware Techniques for I/O Virtualization. [Citation Graph (, )][DBLP]

  4. Idle Read After Write - IRAW. [Citation Graph (, )][DBLP]

  5. Design Tradeoffs for SSD Performance. [Citation Graph (, )][DBLP]

  6. Context-Aware Mechanisms for Reducing Interactive Delays of Energy Management in Disks. [Citation Graph (, )][DBLP]

  7. Optimizing TCP Receive Performance. [Citation Graph (, )][DBLP]

  8. ConfiDNS: Leveraging Scale and History to Detect Compromise. [Citation Graph (, )][DBLP]

  9. Large-scale Virtualization in the Emulab Network Testbed. [Citation Graph (, )][DBLP]

  10. FlexVol: Flexible, Efficient File Volume Virtualization in WAFL. [Citation Graph (, )][DBLP]

  11. Fast, Inexpensive Content-Addressed Storage in Foundation. [Citation Graph (, )][DBLP]

  12. Adaptive File Transfers for Diverse Environments. [Citation Graph (, )][DBLP]

  13. Handling Flash Crowds from Your Garage. [Citation Graph (, )][DBLP]

  14. Remote Profiling of Resource Constraints of Web Servers Using Mini-Flash Crowds. [Citation Graph (, )][DBLP]

  15. A Dollar from 15 Cents: Cross-Platform Management for Internet Services. [Citation Graph (, )][DBLP]

  16. Measurement and Analysis of Large-Scale Network File System Workloads. [Citation Graph (, )][DBLP]

  17. Evaluating Distributed Systems: Does Background Traffic Matter? [Citation Graph (, )][DBLP]

  18. Cutting Corners: Workbench Automation for Server Benchmarking. [Citation Graph (, )][DBLP]

  19. Power-aware Remote Replication for Enterprise-level Disaster Recovery Systems. [Citation Graph (, )][DBLP]

  20. A Linux Implementation Validation of Track-Aligned Extents and Track-Aligned RAIDs. [Citation Graph (, )][DBLP]

  21. Automatic Optimization of Parallel Dataflow Programs. [Citation Graph (, )][DBLP]

  22. A TCP-layer Name Service for TCP Ports. [Citation Graph (, )][DBLP]

  23. Using Causality to Diagnose Configuration Bugs. [Citation Graph (, )][DBLP]

  24. Diverse Replication for Single-Machine Byzantine-Fault Tolerance. [Citation Graph (, )][DBLP]

  25. Vx32: Lightweight User-level Sandboxing on the x86. [Citation Graph (, )][DBLP]

  26. LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages. [Citation Graph (, )][DBLP]

  27. Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing. [Citation Graph (, )][DBLP]

  28. Spectator: Detection and Containment of JavaScript Worms. [Citation Graph (, )][DBLP]

  29. A Compacting Real-Time Memory Management System. [Citation Graph (, )][DBLP]

  30. Prefetching with Adaptive Cache Culling for Striped Disk Arrays. [Citation Graph (, )][DBLP]

  31. Context-Aware Prefetching at the Storage Server . [Citation Graph (, )][DBLP]

  32. Free Factories: Unified Infrastructure for Data Intensive Web Services. [Citation Graph (, )][DBLP]

  33. Wide-Scale Data Stream Management. [Citation Graph (, )][DBLP]

  34. Experiences with Client-based Speculative Remote Display. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002