Biblio

Export 12149 results:
2013
Knauth T, Fetzer C.  2013.  dsync: Efficient Block-wise Synchronization of Multi-Gigabyte Binary Data. 27th Large Installation System Administration Conference (LISA 13). :45--58.
Keelveedhi S, Bellare M, Ristenpart T.  2013.  DupLESS: Server-Aided Encryption for Deduplicated Storage. 22nd USENIX Security Symposium (USENIX Security 13). :179--194.
Chakrabarti DR, Boehm H-J..  2013.  Durability Semantics for Lock-based Multithreaded Programs. 5th USENIX Workshop on Hot Topics in Parallelism (HotPar 13).
Shin DIn, Yu YJin, Kim HS, Choi JWoo, Jung DYung, Yeom HY.  2013.  Dynamic Interval Polling and Pipelined Post I/O Processing for Low-Latency Storage Class Memory. 5th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 13).
Payer M, Bluntschli B, Gross TR.  2013.  DynSec: On-the-fly Code Rewriting and Repair. 5th Workshop on Hot Topics in Software Upgrades (HotSWUp 13).
Ma X, Huang P, Jin X, Wang P, Park S, Shen D, Zhou Y, Saul LK, Voelker GM.  2013.  eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). :57--70.
Octeau D, McDaniel P, Jha S, Bartel A, Bodden E, Klein J, Le Traon Y.  2013.  Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis. 22nd USENIX Security Symposium (USENIX Security 13). :543--558.
Ananthanarayanan G, Ghodsi A, Shenker S, Stoica I.  2013.  Effective Straggler Mitigation: Attack of the Clones. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). :185--198.
Bessani A, Santos M, Felix J, Neves N, Correia M.  2013.  On the Efficiency of Durable State Machine Replication. 2013 USENIX Annual Technical Conference (USENIX ATC 13). :169--180.
Har’El N, Gordon A, Landau A, Ben-Yehuda M, Traeger A, Ladelsky R.  2013.  Efficient and Scalable Paravirtual I/O System. 2013 USENIX Annual Technical Conference (USENIX ATC 13). :231--242.
Smaldone S, Wallace G, Hsu W.  2013.  Efficiently Storing Virtual Machine Backups. 5th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 13).
Herbst NRoman, Kounev S, Reussner R.  2013.  Elasticity in Cloud Computing: What It Is, and What It Is Not. 10th International Conference on Autonomic Computing (ICAC 13). :23--27.
Tan S, Shapiro R, Smith SW.  2013.  Electronic Prescription for Controlled Substances: A Cybersecurity Perspective. 2013 USENIX Workshop on Health Information Technologies (HealthTech 13).
Howell J, Parno B, Douceur JR.  2013.  Embassies: Radically Refactoring the Web. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). :529--545.
Finifter M, Akhawe D, Wagner D.  2013.  An Empirical Study of Vulnerability Rewards Programs. 22nd USENIX Security Symposium (USENIX Security 13). :273--288.
Jana S, Molnar D, Moshchuk A, Dunn A, Livshits B, Wang HJ, Ofek E.  2013.  Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers. 22nd USENIX Security Symposium (USENIX Security 13). :415--430.
Menychtas K, Shen K, Scott ML.  2013.  Enabling OS Research by Inferring Interactions in the Black-Box GPU Stack. 2013 USENIX Annual Technical Conference (USENIX ATC 13). :291--296.
Liu J, Panda A, Singla A, Godfrey B, Schapira M, Shenker S.  2013.  Ensuring Connectivity via Data Plane Mechanisms. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). :113--126.
Johns M, Lekies S, Stock B.  2013.  Eradicating DNS Rebinding with the Extended Same-origin Policy. 22nd USENIX Security Symposium (USENIX Security 13). :621--636.
Rajagopalan S, Williams D, Jamjoom H, Warfield A.  2013.  Escape Capsule: Explicit State Is Robust and Scalable. 14th Workshop on Hot Topics in Operating Systems (HotOS XIV).
Xie F, Condict M, Shete S.  2013.  Estimating Duplication by Content-based Sampling. 2013 USENIX Annual Technical Conference (USENIX ATC 13). :181--186.
Nelms T, Perdisci R, Ahamad M.  2013.  ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates. 22nd USENIX Security Symposium (USENIX Security 13). :589--604.
Heimerl K, Ali K, Blumenstock J, Gawalt B, Brewer E.  2013.  Expanding Rural Cellular Networks with Virtual Coverage. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). :283--296.
Oluwafemi T, Kohno T, Gupta S, Patel S.  2013.  Experimental Security Analyses of Non-Networked Compact Fluorescent Lamps: A Case Study of Home Automation Security. LASER 2013 (LASER 2013). :13--24.
Wang R, Zhou Y, Chen S, Qadeer S, Evans D, Gurevich Y.  2013.  Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization. 22nd USENIX Security Symposium (USENIX Security 13). :399--314.

Pages