Biblio

Export 12148 results:
2024
[Anonymous].  2024.  Autothrottle: A Practical Bi-Level Approach to Resource Management for SLO-Targeted Microservices. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).
Wong DLin-Kit, Wu H, Molder C, Gunasekar S, Lu J, Khandkar S, Sharma A, Berger DS, Beckmann N, Ganger GR.  2024.  Baleen: ML Admission & Prefetching for Flash Caches. 22nd USENIX Conference on File and Storage Technologies (FAST 24). :347--371.
[Anonymous].  2024.  Batch PIR and Labeled PSI with Oblivious Ciphertext Compression. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  BBQ: A Fast and Scalable Integer Priority Queue for Hardware Packet Scheduling. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).
[Anonymous].  2024.  The Bedrock of Byzantine Fault Tolerance: A Unified Platform for BFT Protocols Analysis, Implementation, and Experimentation. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).
[Anonymous].  2024.  "Belt and suspenders" or "just red tape"?: Investigating Early Artifacts and User Perceptions of IoT App Security Certification 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  BFMSense: WiFi Sensing Using Beamforming Feedback Matrix. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).
[Anonymous].  2024.  Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).
[Anonymous].  2024.  CacheWarp: Software-based Fault Injection using Selective State Reset. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  CAMP: Compiler and Allocator-based Heap Memory Protection. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  Can Virtual Reality Protect Users from Keystroke Inference Attacks? 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  Can't Be Late: Optimizing Spot Instance Savings under Deadlines. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).
[Anonymous].  2024.  CAPA: An Architecture For Operating Cluster Networks With High Availability. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).
[Anonymous].  2024.  Cascade: CPU Fuzzing via Intricate Program Generation. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  CASSINI: Network-Aware Job Scheduling in Machine Learning Clusters. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).
[Anonymous].  2024.  Catch Me If You Can: Laser Tethering with Highly Mobile Targets. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).
[Anonymous].  2024.  The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  Characterization of Large Language Model Development in the Datacenter. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).
[Anonymous].  2024.  CHISEL: An optical slice of the wide-area network. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).
[Anonymous].  2024.  Closed-Form Bounds for DP-SGD against Record-level Inference. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  Cloudcast: High-Throughput, Cost-Aware Overlay Multicast in the Cloud. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).
[Anonymous].  2024.  Cloud-LoRa: Enabling Cloud Radio Access LoRa Networks Using Reinforcement Learning Based Bandwidth-Adaptive Compression. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).
[Anonymous].  2024.  Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24).
[Anonymous].  2024.  Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection. 33rd USENIX Security Symposium (USENIX Security 24).
Zhang C, Xu C, Hu H, Xu J.  2024.  COLE: A Column-based Learned Storage for Blockchain Systems. 22nd USENIX Conference on File and Storage Technologies (FAST 24). :329--345.

Pages