USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 12491 results:
Analyzing Log Analysis: An Empirical Study of User Log Mining. 28th Large Installation System Administration Conference (LISA14). :62--77.
.
2014. Apollo: Scalable and Coordinated Scheduling for Cloud-Scale Computing. 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). :285--300.
.
2014. Application-Defined Decentralized Access Control. 2014 USENIX Annual Technical Conference (USENIX ATC 14). :395--407.
.
2014. Applying Psychometrics to Measure User Comfort when Constructing a Strong Password. 10th Symposium On Usable Privacy and Security (SOUPS 2014). :231--242.
.
2014. Approximated Provenance for Complex Applications. 6th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2014).
.
2014. Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
.
2014. An Argument for Game Balance: Improving Student Engagement by Matching Difficulty Level with Learner Readiness. 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14).
.
2014. Arrakis: The Operating System is the Control Plane. 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). :1--16.
.
2014. ASM: A Programmable Interface for Extending Android Security. 23rd USENIX Security Symposium (USENIX Security 14). :1005-1019.
.
2014. Assert(!Defined(Sequential I/O)). 6th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 14).
.
2014. Attacking the Linux PRNG On Android: Weaknesses in Seeding of Entropic Pools and Low Boot-Time Entropy. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
.
2014. Automated Reverse Engineering using Lego®. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
.
2014. Automatic and Dynamic Configuration of Data Compression for Web Servers. 28th Large Installation System Administration Conference (LISA14). :106--117.
.
2014. Automatic Generation of Formal Verification Properties from English Language. 2014 Workshop on Supporting Diversity in Systems Research (Diversity 14).
.
2014. Automatic Identification of Application I/O Signatures from Noisy Server-Side Traces. 12th USENIX Conference on File and Storage Technologies (FAST 14). :213--228.
.
2014. Automatically Detecting Vulnerable Websites Before They Turn Malicious. 23rd USENIX Security Symposium (USENIX Security 14). :625--640.
.
2014. Automating the Choice of Consistency Levels in Replicated Systems. 2014 USENIX Annual Technical Conference (USENIX ATC 14). :281--292.
.
2014. Awareness of Behavioral Tracking and Information Privacy Concern in Facebook and Google. 10th Symposium On Usable Privacy and Security (SOUPS 2014). :51--67.
.
2014. Balancing Fairness and Efficiency in Tiered Storage Systems with Bottleneck-Aware Allocation. 12th USENIX Conference on File and Storage Technologies (FAST 14). :229--242.
.
2014. BareCloud: Bare-metal Analysis-based Evasive Malware Detection. 23rd USENIX Security Symposium (USENIX Security 14). :287--301.
.
2014. A Bayesian Approach to Privacy Enforcement in Smartphones. 23rd USENIX Security Symposium (USENIX Security 14). :175--190.
.
2014. Behavioral Experiments Exploring Victims’ Response to Cyber-based Financial Fraud and Identity Theft Scenario Simulations. 10th Symposium On Usable Privacy and Security (SOUPS 2014). :175--186.
.
2014. A Bidding Game for Generators in the Presence of Flexible Demand. 9th International Workshop on Feedback Computing (Feedback Computing 14).
.
2014. (Big)Data in a Virtualized World: Volume, Velocity, and Variety in Cloud Datacenters. 12th USENIX Conference on File and Storage Technologies (FAST 14). :177--189.
.
2014. BISmark: A Testbed for Deploying Measurements and Applications in Broadband Access Networks. 2014 USENIX Annual Technical Conference (USENIX ATC 14). :383--394.
.
2014.