| Title/Authors | Title | Research Artifacts
									 
										[?]  A research
											artifact is any by-product of a research project that is not
											directly included in the published research paper. In Computer
											Science research this is often source code and data sets, but
											it could also be media, documentation, inputs to proof
											assistants, shell-scripts to run experiments, etc. 
									 
								 | 
								Details | 
|---|
| 
									 ZygOS: Achieving Low Tail Latency for Microsecond-scale Networked Tasks George Prekas, Marios Kogias, Edouard Bugnion  | 
								
								
									 ZygOS: Achieving Low Tail Latency for Microsecond-scale Networked Tasks Details | 
								
									 Author Comments:
									 
									
									Discussion Comments:
										0
									 
									
										Sharing:
										Research produced artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							|
| 
									 MittOS: Supporting Millisecond Tail Tolerance with Fast Rejecting SLO-Aware OS Interface Mingzhe Hao, Huaicheng Li, Michael Hao Tong, Chrisma Pakha, Riza O. Suminto, Cesar A. Stuardo, Andrew A. Chien, Haryadi S. Gunawi  | 
								
								
									 MittOS: Supporting Millisecond Tail Tolerance with Fast Rejecting SLO-Aware OS Interface Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Canopy: An End-to-End Performance Tracing And Analysis System Jonathan Kaldor, Jonathan Mace, Michal Bejda, Edison Gao, Wiktor Kuropatwa, Joe O'Neill, Kian Win Ong, Bill Schaller, Pingjia Shan, Brendan Viscomi, Vinod Venkataraman, Kaushik Veeraraghavan, Yee Jiun Song  | 
								
								
									 Canopy: An End-to-End Performance Tracing And Analysis System Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 The Efficient Server Audit Problem, Deduplicated Re-execution, and the Web Cheng Tan, Lingfan Yu, Joshua B. Leners, Michael Walfish  | 
								
								
									 The Efficient Server Audit Problem, Deduplicated Re-execution, and the Web Details | 
								
									 Author Comments:
									 
									Discussion Comments:
										0
									 
									
										Sharing:
										Research produced artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							|
| 
									 Low-Latency Analytics on Colossal Data Streams with SummaryStore Nitin Agrawal, Ashish Vulimiri  | 
								
								
									 Low-Latency Analytics on Colossal Data Streams with SummaryStore Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Secure Page Fusion with VUsion: https: //www.vusec.net/projects/VUsion Marco Oliverio, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida  | 
								
								
									 Secure Page Fusion with VUsion: https: //www.vusec.net/projects/VUsion Details | 
								
									 Author Comments:
									 
									Discussion Comments:
										0
									 
									
										Sharing:
										Research produced artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							|
| 
									 My VM is Lighter (and Safer) than your Container Filipe Manco, Costin Lupu, Florian Schmidt, Jose Mendes, Simon Kuenzer, Sumit Sati, Kenichi Yasukata, Costin Raiciu, Felipe Huici  | 
								
								
									 My VM is Lighter (and Safer) than your Container Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									 Lazy Diagnosis of In-Production Concurrency Bugs Baris Kasikci, Weidong Cui, Xinyang Ge, Ben Niu  | 
								
								
									 Lazy Diagnosis of In-Production Concurrency Bugs Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Sub-millisecond Stateful Stream Querying over Fast-evolving Linked Data Yunhao Zhang, Rong Chen, Haibo Chen  | 
								
								
									 Sub-millisecond Stateful Stream Querying over Fast-evolving Linked Data Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									 Hyperkernel: Push-Button Verification of an OS Kernel Luke Nelson, Helgi Sigurbjarnarson, Kaiyuan Zhang, Dylan Johnson, James Bornholt, Emina Torlak, Xi Wang  | 
								
								
									 Hyperkernel: Push-Button Verification of an OS Kernel Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									 Rocksteady: Fast Migration for Low-latency In-memory Storage Chinmay Kulkarni, Aniraj Kesavan, Tian Zhang, Robert Ricci, Ryan Stutsman  | 
								
								
									 Rocksteady: Fast Migration for Low-latency In-memory Storage Details | 
								
									 Author Comments:
									 
									Discussion Comments:
										0
									 
									
										Sharing:
										Research produced artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							|
| 
									 Optimizing Big-Data Queries Using Program Synthesis Matthias Schlaipfer, Kaushik Rajan, Akash Lal, Malavika Samak  | 
								
								
									 Optimizing Big-Data Queries Using Program Synthesis Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 ffwd: delegation is (much) faster than you think Sepideh Roghanchi, Jakob Eriksson, Nilanjana Basu  | 
								
								
									 ffwd: delegation is (much) faster than you think Details | 
								
									 Author Comments:
									 
									Discussion Comments:
										0
									 
									
										Sharing:
										Research produced artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							|
| 
									
									 Xu Zhao, Kirk Rodrigues, Yu Luo, Michael Stumm, Ding Yuan, Yuanyuan Zhou  | 
								
								Details | 
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Multiprogramming a 64kB Computer Safely and Efficiently Amit Levy, Bradford Campbell, Branden Ghena, Daniel B. Giffin, Pat Pannuto, Prabal Dutta, Philip Levis  | 
								
								
									 Multiprogramming a 64kB Computer Safely and Efficiently Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									 NetCache: Balancing Key-Value Stores with Fast In-Network Caching Xin Jin, Xiaozhou Li, Haoyu Zhang, Robert Soulé, Jeongkeun Lee, Nate Foster, Changhoon Kim, Ion Stoica  | 
								
								
									 NetCache: Balancing Key-Value Stores with Fast In-Network Caching Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 DeepXplore: Automated Whitebox Testing of Deep Learning Systems Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana  | 
								
								
									 DeepXplore: Automated Whitebox Testing of Deep Learning Systems Details | 
								
									 Author Comments:
									 
									Discussion Comments:
										0
									 
									
										Sharing:
										Research produced artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							|
| 
									 PebblesDB: Building Key-Value Stores using Fragmented Log-Structured Merge Trees Pandian Raju, Rohan Kadekodi, Vijay Chidambaram, Ittai Abraham  | 
								
								
									 PebblesDB: Building Key-Value Stores using Fragmented Log-Structured Merge Trees Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									
									 Eli Cortez, Anand Bonde, Alexandre Muzio, Mark Russinovich, Marcus Fontoura, Ricardo Bianchini  | 
								
								Details | 
									 Author Comments:
									 
									Discussion Comments:
										0
									 
									
										Sharing:
										Research produced artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							|
| 
									 WatchIT: Who Watches Your IT Guy? Noam Shalev, Idit Keidar, Yaron Weinsberg, Yosef Moatti, Elad Ben-Yehuda  | 
								
								
									 WatchIT: Who Watches Your IT Guy? Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 KV-Direct: High-Performance In-Memory Key-Value Store with Programmable NIC Bojie Li, Zhenyuan Ruan, Wencong Xiao, Yuanwei Lu, Yongqiang Xiong, Andrew Putnam, Enhong Chen, Lintao Zhang  | 
								
								
									 KV-Direct: High-Performance In-Memory Key-Value Store with Programmable NIC Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Prochlo: Strong Privacy for Analytics in the Crowd Andrea Bittau, Úlfar Erlingsson, Petros Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree Kode, Julien Tinnés, Bernhard Seefeld  | 
								
								
									 Prochlo: Strong Privacy for Analytics in the Crowd Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									 SVE: Distributed Video Processing at Facebook Scale Qi Huang, Petchean Ang, Peter Knowles, Tomasz Nykiel, Iaroslav Tverdokhlib, Amit Yajurvedi, Paul Dapolito IV, Xifan Yan, Maxim Bykov, Chuen Liang, Mohit Talwar, Abhishek Mathur, Sachin Kulkarni, Matthew Burke, Wyatt Lloyd  | 
								
								
									 SVE: Distributed Video Processing at Facebook Scale Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Scaling a file system to many cores using an operation log Srivatsa S. Bhat, Rasha Eqbal, Austin T. Clements, M. Frans Kaashoek, Nickolai Zeldovich  | 
								
								
									 Scaling a file system to many cores using an operation log Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									 Monotasks: Architecting for Performance Clarity in Data Analytics Frameworks Kay Ousterhout, Christopher Canel, Sylvia Ratnasamy, Scott Shenker  | 
								
								
									 Monotasks: Architecting for Performance Clarity in Data Analytics Frameworks Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									 Strata: A Cross Media File System Youngjin Kwon, Henrique Fingler, Tyler Hunt, Simon Peter, Emmett Witchel, Thomas E. Anderson  | 
								
								
									 Strata: A Cross Media File System Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 CrystalNet: Faithfully Emulating Large Production Networks Hongqiang Harry Liu, Yibo Zhu, Jitu Padhye, Jiaxin Cao, Sri Tallapragada, Nuno P. Lopes, Andrey Rybalchenko, Guohan Lu, Lihua Yuan  | 
								
								
									 CrystalNet: Faithfully Emulating Large Production Networks Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Eris: Coordination-Free Consistent Transactions Using In-Network Concurrency Control Jialin Li, Ellis Michael, Dan R. K. Ports  | 
								
								
									 Eris: Coordination-Free Consistent Transactions Using In-Network Concurrency Control Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Komodo: Using verification to disentangle secure-enclave hardware from software Andrew Ferraiuolo, Andrew Baumann, Chris Hawblitzel, Bryan Parno  | 
								
								
									 Komodo: Using verification to disentangle secure-enclave hardware from software Details | 
								
									 Author Comments:
										The same version of the paper can also be found here: https://www.microsoft.com/en-us/research/wp-content/uploads/2017/10/komodo.pdf
									 
									Discussion Comments:
										0
									 
									
										Sharing:
										Research produced artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							|
| 
									 Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich  | 
								
								
									 Algorand: Scaling Byzantine Agreements for Cryptocurrencies Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Stadium: A Distributed Metadata-Private Messaging System Nirvan Tyagi, Yossi Gilad, Derek Leung, Matei Zaharia, Nickolai Zeldovich  | 
								
								
									 Stadium: A Distributed Metadata-Private Messaging System Details | 
								
									 Author Comments:
									 
									Discussion Comments:
										0
									 
									
										Sharing:
										Research produced artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							|
| 
									 Verifying a high-performance crash-safe file system using a tree specification Haogang Chen, Tej Chajed, Alex Konradi, Stephanie Wang, Atalay Mert Ileri, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich  | 
								
								
									 Verifying a high-performance crash-safe file system using a tree specification Details | 
								
									 Author Comments:
									 
									Discussion Comments:
										0
									 
									
										Sharing:
										Research produced artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							|
| 
									 Drizzle: Fast and Adaptable Stream Processing at Scale Shivaram Venkataraman, Aurojit Panda, Kay Ousterhout, Michael Armbrust, Ali Ghodsi, Michael J. Franklin, Benjamin Recht, Ion Stoica  | 
								
								
									 Drizzle: Fast and Adaptable Stream Processing at Scale Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Atom: Horizontally Scaling Strong Anonymity Albert Kwon, Henry Corrigan-Gibbs, Srinivas Devadas, Bryan Ford  | 
								
								
									 Atom: Horizontally Scaling Strong Anonymity Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									 Automatically Repairing Network Control Planes Using an Abstract Representation Aaron Gember-Jacobson, Aditya Akella, Ratul Mahajan, Hongqiang Harry Liu  | 
								
								
									 Automatically Repairing Network Control Planes Using an Abstract Representation Details | 
								
									 Author Comments:
									 
									Discussion Comments:
										0
									 
									
										Sharing:
										Research produced artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							|
| 
									
									 Yongle Zhang, Serguei Makarov, Xiang Ren, David Lion, Ding Yuan  | 
								
								Details | 
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 NOVA-Fortis: A Fault-Tolerant Non-Volatile Main Memory File System Jian Xu, Lu Zhang, Amirsaman Memaripour, Akshatha Gangadharaiah, Amit Borase, Tamires Brito Da Silva, Steven Swanson, Andy Rudoff  | 
								
								
									 NOVA-Fortis: A Fault-Tolerant Non-Volatile Main Memory File System Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									 NEVE: Nested Virtualization Extensions for ARM Jin Tack Lim, Christoffer Dall, Shih-Wei Li, Jason Nieh, Marc Zyngier  | 
								
								
									 NEVE: Nested Virtualization Extensions for ARM Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 LITE Kernel RDMA Support for Datacenter Applications Shin-Yeh Tsai, Yiying Zhang  | 
								
								
									 LITE Kernel RDMA Support for Datacenter Applications Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 |