 | BASIL: Automated IO Load Balancing Across Storage Devices | FAST '10 | Ajay Gulati, Chethan Kumar, Irfan Ahmad, Karan Kumar |
 | Discovery of Application Workloads from Network File Traces | FAST '10 | Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. Gopinath, Thirumale Niranjan, Sai Susarla |
 | Provenance for the Cloud | FAST '10 | Kiran-Kumar Muniswamy-Reddy, Peter Macko, Margo Seltzer |
 | I/O Deduplication: Utilizing Content Similarity to Improve I/O Performance | FAST '10 | Ricardo Koller, Raju Rangaswami |
 | HydraFS: A High-Throughput File System for the HYDRAstor Content-Addressable Storage System | FAST '10 | Cristian Ungureanu, Benjamin Atkin, Akshat Aranya, Salil Gokhale, Stephen Rago, Grzegorz Całkowski, Cezary Dubnicki, Aniruddha Bohra |
 | Bimodal Content Defined Chunking for Backup Streams | FAST '10 | Erik Kruus, Cristian Ungureanu |
 | Evaluating Performance and Energy in File System Server Workloads | FAST '10 | Priya Sehgal |
 | SRCMap: Energy Proportional Storage Using Dynamic Consolidation | FAST '10 | Akshat Verma, Luis Useche |
 | Membrane: Operating System Support for Restartable File Systems | FAST '10 | Swaminathan Sundararaman, Sriram Subramanian, Michael M. Swift |
 | Opening Remarks, Best Paper Awards, and 2009 SAGE Outstanding Achievement Award | LISA '09 | Adam Moskowitz |
 | Two-Person Control Administration: Preventing Administation Faults through Duplication | LISA '09 | Shaya Potter, Steven M. Bellovin, Jason Nieh |
 | The Water Fountain vs. the Fire Hose: An Examination and Comparison of Two Large Enterprise Mail Service Migrations | LISA '09 | Craig Stacey, Max Trefonides, Tim Kendall, Brian Finley |
 | How to Build a PB Sized Disk Storage System | LISA '09 | Raymond L. Paden |
 | Eucalyptus: An Open Source Infrastructure for Cloud Computing | LISA '09 | Rich Wolski |
 | The Advanced Persistent Threat | LISA '09 | Michael K. Daly |
 | Google Wave | LISA '09 | Daniel Berlin, Joe Gregorio |
 | Cosmic Computing: Supporting the Science of the Planck Space Based Telescope | LISA '09 | Shane Canon |
 | Crossbow Virtual Wire: Network in a Box | LISA '09 | Sunay Tripathi, Nicolas Droux, Kais Belgaied, Shrikrishna Khare |
 | EVA: A Framework for Network Analysis and Risk Assessment | LISA '09 | Melissa Danforth |
 | An Analysis of Network Configuration Artifacts | LISA '09 | David Plonka, Andres Jaan Tack |
 | Searching for Truth, or at Least Data: How to Be an Empiricist Skeptic | LISA '09 | Elizabeth D. Zwicky |
 | Secure Passwords Through Enhanced Hashing | LISA '09 | Benjamin Strahs, Chuan Yue, Haining Wang |
 | SEEdit: SELinux Security Policy Configuration System with Higher Level Language | LISA '09 | Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Tabata |
 | An SSH-based Toolkit for User-based Network Services | LISA '09 | Joyita Sikder, Manigandan Radhakrishnan, Jon A. Solworth |
 | Delay/Disruption Tolerant Networking | LISA '09 | Keith Scott |