ACM European Conference on Computer Systems, EuroSys 2017


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

MiniCrypt: Reconciling Encryption and Compression for Big Data Stores

Wenting Zheng, Frank H. Li, Raluca Ada Popa, Ion Stoica, Rachit Agarwal

MiniCrypt: Reconciling Encryption and Compression for Big Data Stores

Details
Discussion Comments: 0
Verification: Authors have not verified information

kR^X: Comprehensive Kernel Protection against Just-In-Time Code Reuse

Marios Pomonis, Theofilos Petsios, Angelos D. Keromytis, Michalis Polychronakis, Vasileios P. Kemerlis

kR^X: Comprehensive Kernel Protection against Just-In-Time Code Reuse

Details
Discussion Comments: 0
Verification: Authors have not verified information

Saturn: a Distributed Metadata Service for Causal Consistency

Manuel Bravo, Luís E. T. Rodrigues, Peter Van Roy

Saturn: a Distributed Metadata Service for Causal Consistency

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

A Characterization of State Spill in Modern Operating Systems

Kevin Boos, Emilio Del Vecchio, Lin Zhong

A Characterization of State Spill in Modern Operating Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Abstracting Multi-Core Topologies with MCTOP

Georgios Chatzopoulos, Rachid Guerraoui, Tim Harris, Vasileios Trigonakis

Abstracting Multi-Core Topologies with MCTOP

Details
Discussion Comments: 0
Verification: Authors have not verified information

No Need to Hide: Protecting Safe Regions on Commodity Hardware

Koen Koning, Xi Chen, Herbert Bos, Cristiano Giuffrida, Elias Athanasopoulos

No Need to Hide: Protecting Safe Regions on Commodity Hardware

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

An Empirical Study on the Correctness of Formally Verified Distributed Systems

Pedro Fonseca, Kaiyuan Zhang, Xi Wang, Arvind Krishnamurthy

An Empirical Study on the Correctness of Formally Verified Distributed Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Unwritten Contract of Solid State Drives

Jun He, Sudarsun Kannan, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau

The Unwritten Contract of Solid State Drives

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Eleos: ExitLess OS Services for SGX Enclaves

Meni Orenbach, Pavel Lifshits, Marina Minkin, Mark Silberstein

Eleos: ExitLess OS Services for SGX Enclaves

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Taming Parallelism in a Multi-Variant Execution Environment

Stijn Volckaert, Bart Coppens, Bjorn De Sutter, Koen De Bosschere, Per Larsen, Michael Franz

Taming Parallelism in a Multi-Variant Execution Environment

Details
Discussion Comments: 0
Verification: Authors have not verified information

Exploiting Spot and Burstable Instances for Improving the Cost-efficacy of In-Memory Caches on the Public Cloud

Cheng Wang, Bhuvan Urgaonkar, Aayush Gupta, George Kesidis, Qianlin Liang

Exploiting Spot and Burstable Instances for Improving the Cost-efficacy of In-Memory Caches on the Public Cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

Direct Inter-Process Communication (dIPC): Repurposing the CODOMs Architecture to Accelerate IPC

Lluís Vilanova, Marc Jordà, Nacho Navarro, Yoav Etsion, Mateo Valero

Direct Inter-Process Communication (dIPC): Repurposing the CODOMs Architecture to Accelerate IPC

Details
Discussion Comments: 0
Verification: Authors have not verified information

CloudTalk: Enabling Distributed Application Optimisations in Public Clouds

Alexandru Agache, Mihai Ionescu, Costin Raiciu

CloudTalk: Enabling Distributed Application Optimisations in Public Clouds

Details
Discussion Comments: 0
Verification: Authors have not verified information

GfxDoctor: A Holistic Graphics Energy Profiler for Mobile Devices

Ning Ding, Y. Charlie Hu

GfxDoctor: A Holistic Graphics Energy Profiler for Mobile Devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Malthusian Locks

Dave Dice

Malthusian Locks

Details
Discussion Comments: 0
Verification: Author has not verified information

Mosaic: Processing a Trillion-Edge Graph on a Single Machine

Steffen Maass, Changwoo Min, Sanidhya Kashyap, Woon-Hak Kang, Mohan Kumar, Taesoo Kim

Mosaic: Processing a Trillion-Edge Graph on a Single Machine

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

SyncPerf: Categorizing, Detecting, and Diagnosing Synchronization Performance Bugs

Mohammad Mejbah Ul Alam, Tongping Liu, Guangming Zeng, Abdullah Muzahid

SyncPerf: Categorizing, Detecting, and Diagnosing Synchronization Performance Bugs

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

DStress: Efficient Differentially Private Computations on Distributed Data

Antonis Papadimitriou, Arjun Narayan, Andreas Haeberlen

DStress: Efficient Differentially Private Computations on Distributed Data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Proteus: agile ML elasticity through tiered reliability in dynamic resource markets

Aaron Harlap, Alexey Tumanov, Andrew Chung, Gregory R. Ganger, Phillip B. Gibbons

Proteus: agile ML elasticity through tiered reliability in dynamic resource markets

Details
Discussion Comments: 0
Verification: Authors have not verified information

One Primitive to Diagnose Them All: Architectural Support for Internet Diagnostics

Ang Chen, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo

One Primitive to Diagnose Them All: Architectural Support for Internet Diagnostics

Details
Discussion Comments: 0
Verification: Authors have not verified information

Forkscan: Conservative Memory Reclamation for Modern Operating Systems

Dan Alistarh, William M. Leiserson, Alexander Matveev, Nir Shavit

Forkscan: Conservative Memory Reclamation for Modern Operating Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Statistical Analysis of Latency Through Semantic Profiling

Jiamin Huang, Barzan Mozafari, Thomas F. Wenisch

Statistical Analysis of Latency Through Semantic Profiling

Details
Discussion Comments: 0
Verification: Authors have not verified information

An interface to implement NUMA policies in the Xen hypervisor

Gauthier Voron, Gaël Thomas, Vivien Quéma, Pierre Sens

An interface to implement NUMA policies in the Xen hypervisor

Details
Discussion Comments: 0
Verification: Authors have not verified information

DangSan: Scalable Use-after-free Detection

Erik van der Kouwe, Vinod Nigade, Cristiano Giuffrida

DangSan: Scalable Use-after-free Detection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Node.fz: Fuzzing the Server-Side Event-Driven Architecture

James C. Davis, Arun Thekumparampil, Dongyoon Lee

Node.fz: Fuzzing the Server-Side Event-Driven Architecture

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

High-Throughput Subset Matching on Commodity GPU-Based Systems

Daniele Rogora, Michele Papalini, Koorosh Khazaei, Alessandro Margara, Antonio Carzaniga, Gianpaolo Cugola

High-Throughput Subset Matching on Commodity GPU-Based Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Atomic In-place Updates for Non-volatile Main Memories with Kamino-Tx

Amirsaman Memaripour, Anirudh Badam, Amar Phanishayee, Yanqi Zhou, Ramnatthan Alagappan, Karin Strauss, Steven Swanson

Atomic In-place Updates for Non-volatile Main Memories with Kamino-Tx

Details
Discussion Comments: 0
Verification: Authors have not verified information

COCONUT: Seamless Scale-out of Network Elements

Soudeh Ghorbani, Philip Brighten Godfrey

COCONUT: Seamless Scale-out of Network Elements

Details
Discussion Comments: 0
Verification: Authors have not verified information

Pado: A Data Processing Engine for Harnessing Transient Resources in Datacenters

Youngseok Yang, Geon-Woo Kim, Won Wook Song, Yunseong Lee, Andrew Chung, Zhengping Qian, Brian Cho, Byung-Gon Chun

Pado: A Data Processing Engine for Harnessing Transient Resources in Datacenters

Details
Discussion Comments: 0
Verification: Authors have not verified information

Online Reconstruction of Structural Information from Datacenter Logs

Zaheer Chothia, John Liagouris, Desislava C. Dimitrova, Timothy Roscoe

Online Reconstruction of Structural Information from Datacenter Logs

Details
Discussion Comments: 0
Verification: Authors have not verified information

The lock holder and the lock waiter pre-emption problems: nip them in the bud using informed spinlocks (I-Spinlock)

Boris Teabe, Vlad Nitu, Alain Tchana, Daniel Hagimont

The lock holder and the lock waiter pre-emption problems: nip them in the bud using informed spinlocks (I-Spinlock)

Details
Discussion Comments: 0
Verification: Authors have not verified information

Hybrids on Steroids: SGX-Based High Performance BFT

Johannes Behl, Tobias Distler, Rüdiger Kapitza

Hybrids on Steroids: SGX-Based High Performance BFT

Details
Discussion Comments: 0
Verification: Authors have not verified information

RFP: When RPC is Faster than Server-Bypass with RDMA

Maomeng Su, Mingxing Zhang, Kang Chen, Zhenyu Guo, Yongwei Wu

RFP: When RPC is Faster than Server-Bypass with RDMA

Details
Discussion Comments: 0
Verification: Authors have not verified information

ROS: A Rack-based Optical Storage System with Inline Accessibility for Long-Term Data Preservation

Wenrui Yan, Jie Yao, Qiang Cao, Changsheng Xie, Hong Jiang

ROS: A Rack-based Optical Storage System with Inline Accessibility for Long-Term Data Preservation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Pandia: comprehensive contention-sensitive thread placement

Daniel Goodman, Georgios Varisteas, Tim Harris

Pandia: comprehensive contention-sensitive thread placement

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

FloDB: Unlocking Memory in Persistent Key-Value Stores

Oana Balmau, Rachid Guerraoui, Vasileios Trigonakis, Igor Zablotchi

FloDB: Unlocking Memory in Persistent Key-Value Stores

Details
Discussion Comments: 0
Verification: Authors have not verified information

Malacology: A Programmable Storage System

Michael A. Sevilla, Noah Watkins, Ivo Jimenez, Peter Alvaro, Shel Finkelstein, Jeff LeFevre, Carlos Maltzahn

Malacology: A Programmable Storage System

Details
Discussion Comments: 0
Verification: Authors have not verified information

Design and Evaluation of an RDMA-aware Data Shuffling Operator for Parallel Database Systems

Feilong Liu, Lingyan Yin, Spyros Blanas

Design and Evaluation of an RDMA-aware Data Shuffling Operator for Parallel Database Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Rein: Taming Tail Latency in Key-Value Stores via Multiget Scheduling

Waleed Reda, Marco Canini, P. Lalith Suresh, Dejan Kostic, Sean Braithwaite

Rein: Taming Tail Latency in Key-Value Stores via Multiget Scheduling

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

SGXBOUNDS: Memory Safety for Shielded Execution

Dmitrii Kuvaiskii, Oleksii Oleksenko, Sergei Arnautov, Bohdan Trach, Pramod Bhatotia, Pascal Felber, Christof Fetzer

SGXBOUNDS: Memory Safety for Shielded Execution

Details
Author Comments: Please send an email to Dmitrii Kuvaiskii for instructions and support on how to build and run applications with SGXBounds. Currently, the official repo provides no information on the build system (due to non-disclosure agreement).
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

NVthreads: Practical Persistence for Multi-threaded Applications

Terry Ching-Hsiang Hsu, Helge Brügner, Indrajit Roy, Kimberly Keeton, Patrick Eugster

NVthreads: Practical Persistence for Multi-threaded Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information