From touch at ISI.EDU Wed Sep 14 16:03:05 2005 From: touch at ISI.EDU (Joe Touch) Date: Wed, 14 Sep 2005 16:03:05 -0700 Subject: [sigcomm] SOSP registration now open Message-ID: <4328AC29.3000705@isi.edu> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 20th ACM Symposium on Operating Systems Principles October 23-26, 2005 The Grand Hotel, Brighton, United Kingdom Registration now open: http://www.sosp-20.com/registration.htm Early registration deadline: Sept. 23rd 2005 General chair Andrew Herbert, Microsoft Research aherbert at microsoft.com, +44 1223 479818 Program chair Ken Birman, Cornell University ken at cs.cornell.edu, +1 (607)-255-9199 Sponsored by ACM SIGOPS Program Monday 24 October 2005 Keynote Address: Andy Tannenbaum, Vrije Universiteit Session 1: Integrity and Isolation * Pioneer: Verifying Integrity and Guaranteeing Execution of Code on Legacy Platforms. A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, P. Khosla * Labeling Virtual Memory in the Asbestos Operating System. P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, M. Osborne, D. Ziegler, E. Kohler, D. Mazieres, M. F. Kaashoek, R.T. Morris * Mondrix: Memory Isolation for Linux using Mondriaan Memory Protection. E. Witchel, J. Rhee, K. Asanovic Session 2: Distributed Systems * BAR Fault Tolerance for Cooperative Services. A. S. Aiyer, L. Alvisi, A.Clement, M. Dahlin, J.-P. Martin, and C. Porth * Fault-scalable Byzantine Fault-Tolerant Services. M. Abd-El-Malek, G. Ganger, G. Goodson, M. Reiter, J. Wylie * Implementing Declarative Overlays. B. Thau Loo, T. Condie, J. Hellerstein, P. Maniatis, T. Roscoe, I. Stoica Session 3: History and Context * Detecting Past and Present Intrusions Through Vulnerability-Specific Predicates. P. Chen, A. Joshi, S. King, G. Dunlap * Capturing, Indexing, Clustering, and Retrieving System History. I. Cohen, M. Goldszmidt, S. Zhang, T. Kelly, A Fox, J. Symons * Connections: Using Context to Enhance File Search. C. Soules, G. Ganger Tuesday 25 October 2005 Session 4: Containment * Vigilante: End-to-End Containment of Internet Worms. M. Costa, J Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang and P. Barham * Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm. M. Vrable, J. Ma, J. Chen, D. Moore, E. Vandekieft, A. Snoeren, G. Voelker, S. Savage * Selective Recovery. A. Goel, E. De Lara, K. Po, K. Farhadi, J. Li, T. Liu Panel: Peer-to-Peer: Still Useless? Session 5: Filesystems * Hibernator: Helping Disk Arrays Sleep Through the Winter. Q. Zhu, Z. Chen, L. Tan, Y. Zhou, K. Keeton, J. Wilkes * Speculative Execution in a Distributed File System. E. B. Nightingale, P. Chen, J. Flinn * IRON File Systems. V. Prabhakaran, N. Agrawal, L. N. Bairavasundaram, H. S. Gunawi, A. C. Arpaci-Dusseau, R. H. Arpaci-Dusseau Work-in-Progress Session Wednesday 26 October 2005 Session 6: Bugs * RaceTrack: Efficient Detection of Data Race Conditions via Adaptive Tracking. Y. Yu, T. Rodeheffer, W.Chen * Rx: Treating Bugs As Allergies -- A Safe Method for Surviving Software Failures. F. Qin, J. Tucek, J. Sundaresan, Y. Zhou Session 7: Optimization * Idletime Scheduling with Preemption Intervals. L. Eggert, J. Touch * Zero-Cost Disk Performance Booster and Energy Saver. H. Huang, W. Hung, K. Shin * THINC: A Remote Display Architecture for Thin-Client Computing. R. Baratto, L. Kim, J.Nieh -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFDKKwpE5f5cImnZrsRApEsAJ951RYqVUFKKlhPgar0+APKFFYEOACg3G8+ cjBXVSk7nELW1ygKzV2Cs4g= =cr5l -----END PGP SIGNATURE-----