Biblio

Export 12149 results:
2013
Lee J, Lee M, Popa L, Turner Y, Banerjee S, Sharma P, Stephenson B.  2013.  CloudMirror: Application-Aware Bandwidth Reservations in the Cloud. 5th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 13).
Best MJ, Jacobsen D, Vining N, Fedorova A.  2013.  Collection-focused Parallelism. 5th USENIX Workshop on Hot Topics in Parallelism (HotPar 13).
Monsanto C, Reich J, Foster N, Rexford J, Walker D.  2013.  Composing Software Defined Networks. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). :1--13.
Strzelczak P, Adamczyk E, Herman-Izycka U, Sakowicz J, Slusarczyk L, Wrona J, Dubnicki C.  2013.  Concurrent Deletion in a Distributed Content-Addressable Storage System with Global Deduplication. 11th USENIX Conference on File and Storage Technologies (FAST 13). :161--174.
Harris T, Lev Y, Luchangco V, Marathe VJ, Moir M.  2013.  Constrained Data-Driven Parallelism. 5th USENIX Workshop on Hot Topics in Parallelism (HotPar 13).
Zhang M, Sekar R..  2013.  Control Flow Integrity for COTS Binaries. 22nd USENIX Security Symposium (USENIX Security 13). :337--352.
Ding G.  2013.  A Control Theoretic Approach to Analyzing Peer-to-Peer Searching. 8th International Workshop on Feedback Computing (Feedback Computing 13).
Cidon A, Rumble S, Stutsman R, Katti S, Ousterhout J, Rosenblum M.  2013.  Copysets: Reducing the Frequency of Data Loss in Cloud Storage. 2013 USENIX Annual Technical Conference (USENIX ATC 13). :37--48.
Campello D, Crespo C, Verma A, Rangaswami R, Jayachandran P.  2013.  Coriolis: Scalable VM Clustering in Clouds. 10th International Conference on Autonomic Computing (ICAC 13). :101--105.
Munir S, Stankovic JA, Liang C-JMike, Lin S.  2013.  Cyber Physical System Challenges for Human-in-the-Loop Control. 8th International Workshop on Feedback Computing (Feedback Computing 13).
Sánchez MA, Otto JS, Bischof ZS, Choffnes DR, Bustamante FE, Krishnamurthy B, Willinger W.  2013.  Dasu: Pushing Experiments to the Internet’s Edge. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). :487--499.
Moore S, Gehani A.  2013.  Declaratively Processing Provenance Metadata. 5th USENIX Workshop on the Theory and Practice of Provenance (TaPP 13).
Novaković D, Vasić N, Novaković S, Kostić D, Bianchini R.  2013.  DeepDive: Transparently Identifying and Managing Performance Interference in Virtualized Environments. 2013 USENIX Annual Technical Conference (USENIX ATC 13). :219--230.
Lin C-C, Jalaparti V, Caesar M, Van der Merwe J.  2013.  DEFINED: Deterministic Execution for Interactive Control-Plane Debugging. 2013 USENIX Annual Technical Conference (USENIX ATC 13). :347--358.
Wang XSophia, Balasubramanian A, Krishnamurthy A, Wetherall D.  2013.  Demystifying Page Load Performance with WProf. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). :473--485.
Yang J, Cui H, Wu J.  2013.  Determinism Is Overrated: What Really Makes Multithreaded Programs Hard to Get Right and What Can Be Done About It. 5th USENIX Workshop on Hot Topics in Parallelism (HotPar 13).
Yue C.  2013.  The Devil Is Phishing: Rethinking Web Single Sign-On Systems Security. 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 13).
Roth M, Schmitt J, Kluge F, Ungerer T.  2013.  DHT Broadcast Optimisation with ID Assignment Rules. 2013 Workshop on Embedded Self-Organizing Systems (ESOS 13).
Zhao M, Privat G, Rutten E, Alla H.  2013.  Discrete Control for the Internet of Things and Smart Environments. 8th International Workshop on Feedback Computing (Feedback Computing 13).
Mitropoulos D, Karakoidas V, Louridas P, Gousios G, Spinellis D.  2013.  Dismal Code: Studying the Evolution of Security Bugs. LASER 2013 (LASER 2013). :37--48.
Verdult R, Garcia FD, Ege B.  2013.  Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer. 22nd USENIX Security Symposium (USENIX Security 13).
Baset SA, Tang C, Tak BChul, Wang L.  2013.  Dissecting Open Source Cloud Evolution: An OpenStack Case Study. 5th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 13).
Moon S, Reddy A.LNarasim.  2013.  Don’t Let RAID Raid the Lifetime of Your SSD Array. 5th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 13).
Haller I, Slowinska A, Neugschwandtner M, Bos H.  2013.  Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations. 22nd USENIX Security Symposium (USENIX Security 13). :49--64.
Missier P, Dey S, Belhajjame K, Cuevas-Vicenttin V, Ludäscher B.  2013.  D-PROV: Extending the PROV Provenance Model with Workflow Structure. 5th USENIX Workshop on the Theory and Practice of Provenance (TaPP 13).

Pages