Export 6 results:
Filters: Author is Li Zhuang  [Clear All Filters]
Lin K, Chu D, Mickens J, Zhuang L, Zhao F, Qiu J.  2012.  Gibraltar: Exposing Hardware Devices to Web Pages Using AJAX. 3rd USENIX Conference on Web Application Development (WebApps 12). :75--87.
Popa RAda, Lorch JR, Molnar D, Wang HJ, Zhuang L.  2011.  Enabling Security in Cloud Storage SLAs with CloudProof. 2011 USENIX Annual Technical Conference (USENIX ATC 11).
Gunda PKumar, Ravindranath L, Thekkath CA, Yu Y, Zhuang L.  2010.  Nectar: Automatic Management of Data and Computation in Datacenters. 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10).
Zhuang L, Dunagan J, Simon DR, Wang HJ, Osipkov I, Hulten G, Tygar J.D..  2008.  Characterizing Botnets from Email Spam Records. First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 08).
Zhuang L, Zhou F, Zhao BY, Rowstron A.  2005.  Cashmere: Resilient Anonymous Routing . 2nd Symposium on Networked Systems Design & Implementation (NSDI 05).