The SCEAS System
Navigation Menu

Conferences in DBLP

EuroSys (eurosys)
2010 (conf/eurosys/2010)


  1. Using transparent compression to improve SSD-based I/O caches. [Citation Graph (, )][DBLP]


  2. Differential RAID: rethinking RAID for SSD reliability. [Citation Graph (, )][DBLP]


  3. Evaluation of AMD's advanced synchronization facility within a complete transactional memory stack. [Citation Graph (, )][DBLP]


  4. Transactional memory support for scalable and transparent parallelization of multiplayer games. [Citation Graph (, )][DBLP]


  5. Self-tuning schedulers for legacy real-time applications. [Citation Graph (, )][DBLP]


  6. High-level programming of embedded hard real-time devices. [Citation Graph (, )][DBLP]


  7. Barricade: defending systems against operator mistakes. [Citation Graph (, )][DBLP]


  8. Splitter: a proxy-based approach for post-migration testing of web applications. [Citation Graph (, )][DBLP]


  9. Fingerprinting the datacenter: automated classification of performance crises. [Citation Graph (, )][DBLP]


  10. Bias scheduling in heterogeneous multi-core architectures. [Citation Graph (, )][DBLP]


  11. A comprehensive scheduler for asymmetric multicore systems. [Citation Graph (, )][DBLP]


  12. Resource-conscious scheduling for energy efficiency on multicore processors. [Citation Graph (, )][DBLP]


  13. Reverse engineering of binary device drivers with RevNIC. [Citation Graph (, )][DBLP]


  14. Otherworld: giving applications a chance to survive OS kernel crashes. [Citation Graph (, )][DBLP]


  15. Defeating return-oriented rootkits with "Return-Less" kernels. [Citation Graph (, )][DBLP]


  16. NOVA: a microhypervisor-based secure virtualization architecture. [Citation Graph (, )][DBLP]


  17. Boom analytics: exploring data-centric, declarative programming for the cloud. [Citation Graph (, )][DBLP]


  18. Q-clouds: managing performance interference effects for QoS-aware clouds. [Citation Graph (, )][DBLP]


  19. HadoopToSQL: a mapReduce query optimizer. [Citation Graph (, )][DBLP]


  20. Delay scheduling: a simple technique for achieving locality and fairness in cluster scheduling. [Citation Graph (, )][DBLP]


  21. Residue objects: a challenge to web browser security. [Citation Graph (, )][DBLP]


  22. Policy-based access control for weakly consistent replication. [Citation Graph (, )][DBLP]


  23. Kivati: fast detection and prevention of atomicity violations. [Citation Graph (, )][DBLP]


  24. Execution synthesis: a technique for automated software debugging. [Citation Graph (, )][DBLP]


  25. Locating cache performance bottlenecks using data profiling. [Citation Graph (, )][DBLP]


  26. Dr. multicast: Rx for data center communication scalability. [Citation Graph (, )][DBLP]


  27. The next 700 BFT protocols. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002