OSDI 2000 | Policies for Dynamic Clock Scheduling | Dirk Grunwald, Philip Levis, Keith I. Farkas, Charles B. Morrey III, Michael Neufeld |
OSDI 2000 | Towards Higher Disk Head Utilization: Extracting "Free" Bandwidth from Busy Disk Drives | Christopher R. Lumb, Jiri Schindler, Gregory R. Ganger, Erik Riedel, David F. Nagle |
OSDI 2000 | Latency Management in Storage Systems | Rodney Van Meter, Minxi Gao |
OSDI 2000 | A Low-Overhead, High-Performance Unified Buffer Management Scheme That Exploits Sequential and Looping References | Jong Min Kim, Jongmoo Choi, Jesung Kim, Sam H. Noh, Sang Lyul Min, Yookun Cho, Chong Sang Kim |
OSDI 2000 | How to Build a Trusted Database System on Untrusted Storage | Umesh Maheshwari, Radek Vingralek, Bill Shapiro STAR Lab |
OSDI 2000 | End-to-End Authorization | Jon Howell, David Kotz |
OSDI 2000 | Design and Implementation of a Self-Securing Storage Device | John D. Strunk, Garth R. Goodson, Michael L. Scheinholtz, Craig A. N. Soules |
OSDI 2000 | Fast and Secure Distributed Read-Only File System | Kevin Fu, M. Frans Kaashoek, David Mazières |
OSDI 2000 | Overcast: Reliable Multicasting with an Overlay Network | John Jannotti, David K. Gifford, Kirk L. Johnson, M. Frans Kaashoek, James W. O'Toole, Jr. |
OSDI 2000 | System Support for Bandwidth Management and Content Adaptation in Internet Applications | David Andersen, Deepak Bansal, Dorothy Curtis, Srinivasan Seshan, Hari Balakrishnan |
OSDI 2000 | Operating System Management of MEMS-based Storage Devices | John Linwood Griffin, Steven W. Schlosser |
OSDI 2000 | Trading Capacity for Performance in a Disk Array | Xiang Yu, Benjamin Gum, Yuqun Chen, Randolph Y. Wang, Kai Li, Arvind Krishnamurthy, Thomas E. Anderson |
OSDI 2000 | Interposed Request Routing for Scalable Network Storage | Darrell Anderson, Jeff Chase, Amin Vahdat |
OSDI 2000 | Proactive Recovery in a Byzantine-Fault-Tolerant System | Miguel Castro, Barbara Liskov |
OSDI 2000 | Exploring Failure Transparency and the Limits of Generic Recovery | David E. Lowell, Subhachandra Chandra, Peter Chen |
OSDI 2000 | Design and Evaluation of a Continuous Consistency Model for Replicated Services | Haifeng Yu |
OSDI 2000 | Scalable, Distributed Data Structures for Internet Service Construction | Steven D. Gribble, Eric A. Brewer, Joseph M. Hellerstein |
OSDI 2000 | Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java | Godmar Back, Wilson H. Hsieh, Jay Lepreau |
OSDI 2000 | CpU: Component Composition for Systems Software | Alastair Reid, Matthew Flatt, Leigh Stoller, Eric Eide |
LISA-NT 2000 | Providing Secure Access to Information Using the Internet | John Holmwood, Kevin Reichert, Blaine Feniak |
LISA-NT 2000 | System Security Administration for NT | Harlan Carvey |
LISA-NT 2000 | On Designing a Database for Integrated User Management: Pitfalls and Possibilities | Amy LaMeyer, Shankaranarayanan Ganesan, Jesper M. Johansson |
LISA-NT 2000 | Remote Windows NT Administration Using Windows CE Handheld Devices | Craig Stacey |
LISA-NT 2000 | Kerberos Interoperability Issues | Paul B. Hill |
LISA-NT 2000 | NT5 and Samba Integration Issues | Luke K. C. Leighton |