USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 12149 results:
dsync: Efficient Block-wise Synchronization of Multi-Gigabyte Binary Data. 27th Large Installation System Administration Conference (LISA 13). :45--58.
.
2013. DupLESS: Server-Aided Encryption for Deduplicated Storage. 22nd USENIX Security Symposium (USENIX Security 13). :179--194.
.
2013. Durability Semantics for Lock-based Multithreaded Programs. 5th USENIX Workshop on Hot Topics in Parallelism (HotPar 13).
.
2013. Dynamic Interval Polling and Pipelined Post I/O Processing for Low-Latency Storage Class Memory. 5th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 13).
.
2013. DynSec: On-the-fly Code Rewriting and Repair. 5th Workshop on Hot Topics in Software Upgrades (HotSWUp 13).
.
2013. eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). :57--70.
.
2013. Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis. 22nd USENIX Security Symposium (USENIX Security 13). :543--558.
.
2013. Effective Straggler Mitigation: Attack of the Clones. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). :185--198.
.
2013. On the Efficiency of Durable State Machine Replication. 2013 USENIX Annual Technical Conference (USENIX ATC 13). :169--180.
.
2013. Efficient and Scalable Paravirtual I/O System. 2013 USENIX Annual Technical Conference (USENIX ATC 13). :231--242.
.
2013. Efficiently Storing Virtual Machine Backups. 5th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 13).
.
2013. Elasticity in Cloud Computing: What It Is, and What It Is Not. 10th International Conference on Autonomic Computing (ICAC 13). :23--27.
.
2013. Electronic Prescription for Controlled Substances: A Cybersecurity Perspective. 2013 USENIX Workshop on Health Information Technologies (HealthTech 13).
.
2013. Embassies: Radically Refactoring the Web. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). :529--545.
.
2013. An Empirical Study of Vulnerability Rewards Programs. 22nd USENIX Security Symposium (USENIX Security 13). :273--288.
.
2013. Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers. 22nd USENIX Security Symposium (USENIX Security 13). :415--430.
.
2013. Enabling OS Research by Inferring Interactions in the Black-Box GPU Stack. 2013 USENIX Annual Technical Conference (USENIX ATC 13). :291--296.
.
2013. Ensuring Connectivity via Data Plane Mechanisms. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). :113--126.
.
2013. Eradicating DNS Rebinding with the Extended Same-origin Policy. 22nd USENIX Security Symposium (USENIX Security 13). :621--636.
.
2013. Escape Capsule: Explicit State Is Robust and Scalable. 14th Workshop on Hot Topics in Operating Systems (HotOS XIV).
.
2013. Estimating Duplication by Content-based Sampling. 2013 USENIX Annual Technical Conference (USENIX ATC 13). :181--186.
.
2013. ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates. 22nd USENIX Security Symposium (USENIX Security 13). :589--604.
.
2013. Expanding Rural Cellular Networks with Virtual Coverage. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). :283--296.
.
2013. Experimental Security Analyses of Non-Networked Compact Fluorescent Lamps: A Case Study of Home Automation Security. LASER 2013 (LASER 2013). :13--24.
.
2013. Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization. 22nd USENIX Security Symposium (USENIX Security 13). :399--314.
.
2013.