Biblio

Export 12436 results:
2014
Cao G, Ravindran AA.  2014.  Energy Efficient Soft Real-Time Computing through Cross-Layer Predictive Control. 9th International Workshop on Feedback Computing (Feedback Computing 14).
Li J, Badam A, Chandra R, Swanson S, Worthington B, Zhang Q.  2014.  On the Energy Overhead of Mobile Storage Systems. 12th USENIX Conference on File and Storage Technologies (FAST 14). :105--118.
Tice C, Roeder T, Collingbourne P, Checkoway S, Erlingsson Ú, Lozano L, Pike G.  2014.  Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. 23rd USENIX Security Symposium (USENIX Security 14). :941--955.
Fayazbakhsh SKaveh, Chiang L, Sekar V, Yu M, Mogul JC.  2014.  Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags. 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14). :543--546.
Marvasti MA, Poghosyan AV, Harutyunyan AN, Grigoryan NM.  2014.  An Enterprise Dynamic Thresholding System. 11th International Conference on Autonomic Computing (ICAC 14). :129--135.
Li L, Hu P, Peng C, Shen G, Zhao F.  2014.  Epsilon: A Visible Light Based Positioning System. 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14). :331--343.
Mittal S, Vetter JS.  2014.  EqualChance: Addressing Intra-set Write Variation to Increase Lifetime of Non-volatile Caches. 2nd Workshop on Interactions of NVM/Flash with Operating Systems and Workloads (INFLOW 14).
Miyamae T, Nakao T, Shiozawa K.  2014.  Erasure Code with Shingled Local Parity Groups for Efficient Recovery from Multiple Disk Failures. 10th Workshop on Hot Topics in System Dependability (HotDep 14).
Skourtis D, Achlioptas D, Watkins N, Maltzahn C, Brandt S.  2014.  Erasure Coding & Read/Write Separation in Flash Storage. 2nd Workshop on Interactions of NVM/Flash with Operating Systems and Workloads (INFLOW 14).
Perešíni P, Kuzniar M, Canini M, Kostić D.  2014.  ESPRES: Easy Scheduling and Prioritization for SDN. Open Networking Summit 2014 (ONS 2014).
Kim H, Seshadri S, Dickey CL, Chiu L.  2014.  Evaluating Phase Change Memory for Enterprise Storage Systems: A Study of Caching and Tiering Approaches. 12th USENIX Conference on File and Storage Technologies (FAST 14). :33--45.
M. Krishnan N, Prakash N., Lalitha V., Sasidharan B, P. Kumar V, Narayanamurthy S, Kumar R, Nandi S.  2014.  Evaluation of Codes with Inherent Double Replication for Hadoop. 6th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 14).
Hao F, Kreeger MN, Randell B, Clarke D, Shahandashti SF, Lee PHyun-Jeen.  2014.  Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting. 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 14).
Hao F, Kreeger MN, Randell B, Clarke D, Shahandashti SF, Lee PHyun-Jeen.  2014.  Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting. USENIX Journal of Election Technology and Systems (JETS). :1--25.
Wang Y, Kapritsos M, Schmidt L, Alvisi L, Dahlin M.  2014.  Exalt: Empowering Researchers to Evaluate Large-Scale Storage Systems. 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14). :129--141.
Kührer M, Hupperich T, Rossow C, Holz T.  2014.  Exit from Hell? Reducing the Impact of Amplification DDoS Attacks 23rd USENIX Security Symposium (USENIX Security 14). :111--125.
Laing S, Locasto ME, Aycock J.  2014.  An Experience Report on Extracting and Viewing Memory Events via Wireshark. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
Cui H, Cipar J, Ho Q, Kim JKyu, Lee S, Kumar A, Wei J, Dai W, Ganger GR, Gibbons PB et al..  2014.  Exploiting Bounded Staleness to Speed Up Big Data Analytics. 2014 USENIX Annual Technical Conference (USENIX ATC 14). :37--48.
Islam MA, Ahmed K, Ren S, Quan G.  2014.  Exploiting Temporal Diversity of Water Efficiency to Make Data Center Less "Thirsty". 11th International Conference on Autonomic Computing (ICAC 14). :145--152.
Wang C, Schwan K, Laub B, Kesavan M, Gavrilovska A.  2014.  Exploring Graph Analytics for Cloud Troubleshooting. 11th International Conference on Autonomic Computing (ICAC 14). :65--71.
Chen J, Paik M, McCabe K.  2014.  Exploring Internet Security Perceptions and Practices in Urban Ghana. 10th Symposium On Usable Privacy and Security (SOUPS 2014). :129--142.
Fayazbakhsh SKaveh, Chiang L, Sekar V, Yu M, Mogul JC.  2014.  Extending SDN to Handle Dynamic Middlebox Actions via FlowTags. Open Networking Summit 2014 (ONS 2014).
Mu S, Cui Y, Zhang Y, Lloyd W, Li J.  2014.  Extracting More Concurrency from Distributed Transactions. 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). :479--494.
Muralidhar S, Lloyd W, Roy S, Hill C, Lin E, Liu W, Pan S, Shankar S, Sivakumar V, Tang L et al..  2014.  f4: Facebook's Warm BLOB Storage System. 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). :383--398.
Jones B, Burnett S, Feamster N, Donovan S, Grover S, Gunasekaran S, Habak K.  2014.  Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search. 4th USENIX Workshop on Free and Open Communications on the Internet (FOCI 14).

Pages