Some links go to the ACM Digital Library; you may need to use the Harvard VPN to get access to the papers via those links. Alternate links will be provided on request.
M 1/27 | Overview |
W 1/29 | Early monolithic kernels |
M 2/3 | Microkernels |
W 2/5 | Kernels and Rust |
M 2/10 | Unusual OS presentations |
W 2/12 | Device drivers |
W 2/19 | Kernel bypass |
M 2/24 | Advanced drivers: synthesis, GPUs, enclaves |
W 2/26 | Virtual machines |
M 3/3 | Binary translation |
W 3/5 | Evil extensions |
M 3/10 | Extension applications |
W 3/12 | Reproduction discussion |
M 3/24 | Hardware and system security |
W 3/26 | Secure application architecture |
M 3/31 | Reproduction post-mortem and project discussion |
W 4/2 | Performance debugging |
M 4/7 | Distributed tracing |
W 4/9 | Scalable AI scheduling |
M 4/14 | LLM/DNN training and serving |
W 4/16 | CPU scheduling |
M 4/21 | Network device interfaces |
W 4/23 | Block device interfaces |