Export 6 results:
Filters: Author is Li Zhuang  [Clear All Filters]
Guo Z, McDirmid S, Yang M, Zhuang L, Zhang P, Luo Y, Bergan T, Musuvathi M, Zhang Z, Zhou L.  2013.  Failure Recovery: When the Cure Is Worse Than the Disease. 14th Workshop on Hot Topics in Operating Systems (HotOS {XIV}).
Lin K, Chu D, Mickens J, Zhuang L, Zhao F, Qiu J.  2012.  Gibraltar: Exposing Hardware Devices to Web Pages Using AJAX. 3rd {USENIX} Conference on Web Application Development (WebApps 12). :75--87.
Popa RAda, Lorch JR, Molnar D, Wang HJ, Zhuang L.  2011.  Enabling Security in Cloud Storage SLAs with CloudProof. 2011 {USENIX} Annual Technical Conference ({USENIX} {ATC} 11).
Gunda PKumar, Ravindranath L, Thekkath CA, Yu Y, Zhuang L.  2010.  Nectar: Automatic Management of Data and Computation in Datacenters. 9th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 10).
Zhuang L, Dunagan J, Simon DR, Wang HJ, Osipkov I, Hulten G, Tygar J.D..  2008.  Characterizing Botnets from Email Spam Records. First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 08).
Zhuang L, Zhou F, Zhao BY, Rowstron A.  2005.  Cashmere: Resilient Anonymous Routing . 2nd Symposium on Networked Systems Design & Implementation ({NSDI} 05).