Biblio

Export 12491 results:
2014
Alspaugh S., Chen B, Lin J, Ganapathi A, Hearst M, Katz R.  2014.  Analyzing Log Analysis: An Empirical Study of User Log Mining. 28th Large Installation System Administration Conference (LISA14). :62--77.
Boutin E, Ekanayake J, Lin W, Shi B, Zhou J, Qian Z, Wu M, Zhou L.  2014.  Apollo: Scalable and Coordinated Scheduling for Cloud-Scale Computing. 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). :285--300.
Xu Y, Dunn AM, Hofmann OS, Lee MZ, Mehdi SAkbar, Witchel E.  2014.  Application-Defined Decentralized Access Control. 2014 USENIX Annual Technical Conference (USENIX ATC 14). :395--407.
Haque SMTaiabul, Scielzo S, Wright M.  2014.  Applying Psychometrics to Measure User Comfort when Constructing a Strong Password. 10th Symposium On Usable Privacy and Security (SOUPS 2014). :231--242.
Ainy E, Davidson, S B., Deutch D, Milo T.  2014.  Approximated Provenance for Complex Applications. 6th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2014).
Malvoni K, Designer S, Knezovic J.  2014.  Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
Pusey P, Tobey, Sr. D, Soule R.  2014.  An Argument for Game Balance: Improving Student Engagement by Matching Difficulty Level with Learner Readiness. 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14).
Peter S, Li J, Zhang I, Ports DRK, Woos D, Krishnamurthy A, Anderson T, Roscoe T.  2014.  Arrakis: The Operating System is the Control Plane. 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). :1--16.
Heuser S, Nadkarni A, Enck W, Sadeghi A-R.  2014.  ASM: A Programmable Interface for Extending Android Security. 23rd USENIX Security Symposium (USENIX Security 14). :1005-1019.
Li C, Shilane P, Douglis F, Sawyer D, Shim H.  2014.  Assert(!Defined(Sequential I/O)). 6th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 14).
Kaplan D, Kedmi S, Hay R, Dayan A.  2014.  Attacking the Linux PRNG On Android: Weaknesses in Seeding of Entropic Pools and Low Boot-Time Entropy. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
Chalupar G, Peherstorfer S, Poll E, de Ruiter J.  2014.  Automated Reverse Engineering using Lego®. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
Zohar E, Cassuto Y.  2014.  Automatic and Dynamic Configuration of Data Compression for Web Servers. 28th Large Installation System Administration Conference (LISA14). :106--117.
Harris C.  2014.  Automatic Generation of Formal Verification Properties from English Language. 2014 Workshop on Supporting Diversity in Systems Research (Diversity 14).
Liu Y, Gunasekaran R, Ma X, Vazhkudai SS.  2014.  Automatic Identification of Application I/O Signatures from Noisy Server-Side Traces. 12th USENIX Conference on File and Storage Technologies (FAST 14). :213--228.
Soska K, Christin N.  2014.  Automatically Detecting Vulnerable Websites Before They Turn Malicious. 23rd USENIX Security Symposium (USENIX Security 14). :625--640.
Li C, Leitão J, Clement A, Preguiça N, Rodrigues R, Vafeiadis V.  2014.  Automating the Choice of Consistency Levels in Replicated Systems. 2014 USENIX Annual Technical Conference (USENIX ATC 14). :281--292.
Rader E.  2014.  Awareness of Behavioral Tracking and Information Privacy Concern in Facebook and Google. 10th Symposium On Usable Privacy and Security (SOUPS 2014). :51--67.
Wang H, Varman P.  2014.  Balancing Fairness and Efficiency in Tiered Storage Systems with Bottleneck-Aware Allocation. 12th USENIX Conference on File and Storage Technologies (FAST 14). :229--242.
Kirat D, Vigna G, Kruegel C.  2014.  BareCloud: Bare-metal Analysis-based Evasive Malware Detection. 23rd USENIX Security Symposium (USENIX Security 14). :287--301.
Tripp O, Rubin J.  2014.  A Bayesian Approach to Privacy Enforcement in Smartphones. 23rd USENIX Security Symposium (USENIX Security 14). :175--190.
Rosoff H, Cui J, John R.  2014.  Behavioral Experiments Exploring Victims’ Response to Cyber-based Financial Fraud and Identity Theft Scenario Simulations. 10th Symposium On Usable Privacy and Security (SOUPS 2014). :175--186.
Raghuram J, Kesidis G, Griffin C, Levitt K, Miller DJ, Rowe J, Scaglione A.  2014.  A Bidding Game for Generators in the Presence of Flexible Demand. 9th International Workshop on Feedback Computing (Feedback Computing 14).
Birke R, Bjoerkqvist M, Chen LY, Smirni E, Engbersen T.  2014.  (Big)Data in a Virtualized World: Volume, Velocity, and Variety in Cloud Datacenters. 12th USENIX Conference on File and Storage Technologies (FAST 14). :177--189.
Sundaresan S, Burnett S, Feamster N, de Donato W.  2014.  BISmark: A Testbed for Deploying Measurements and Applications in Broadband Access Networks. 2014 USENIX Annual Technical Conference (USENIX ATC 14). :383--394.

Pages