James C. Corbett, Jeffrey Dean, Michael Epstein, Andrew Fikes, Christopher Frost, JJ Furman, Sanjay Ghemawat, Andrey Gubarev, Christopher Heiser, Peter Hochschild ...
As computers permeate all aspects of our lives, a wide range of computer systems must achieve high dependability, including availability, reliability, and security. Unfortunately, few current computer ...
We know that many of you have been impacted by the economic downturn and, due to the recent tragedy, are reluctant to travel. To encourage your attendance at ALS '01, the USENIX Association and the ...
for about fifteen years, DNS is undergoing its inevitable rototilling, and BIND with it. It's time for the world to learn what to expect from BIND-9 and EDNS. Repetitive Strain Injury (RSI) is an ...
Improper evaluation of systems papers may result in the loss or delay in publication of possibly important research. This paper posits that systems research papers may be evaluated in one or more of ...
Cyber security experiments with potentially malicious software can possibly damage the testbed environment and ``escape'' into the Internet. Due to this security concern, networks used in such ...
Many applications demand availability. Unfortunately, software failures greatly reduce system availability. Previous approaches for surviving software failures suffer from several limitations, ...