You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group

Multimedia

    TitleConferenceSpeaker(s)
    SpyProxy: Execution-based Detection of Malicious Web ContentUSENIX Security '07Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy
    The Human Factor in Online FraudUSENIX Security '07Markus Jakobsson
    How the iPod Shuffled the World as We Know ItUSENIX Security '07Steven Levy
    Crossing the Digital Divide: The Latest Efforts from One Laptop per ChildUSENIX ATC '07Mary Lou Jepsen
    Short Paper: Supporting Multiple OSes with OS Switching USENIX ATC '07Jun Sun, Dong Zhou, Steve Longerbeam
    Short Paper: Cool Job Allocation: Measuring the Power Savings of Placing Jobs at Cooling-Efficient Locations in the Data CenterUSENIX ATC '07Cullen Bash, George Forman
    Short Paper: Passwords for Everyone: Secure Mnemonic-based Accessible Authentication USENIX ATC '07Umut Topkara, Mercan Topkara, Mikhail J. Atallah
    Short Paper: Virtually Shared Displays and User Input DevicesUSENIX ATC '07Grant Wallace, Kai Li
    Warehouse-scale ComputersUSENIX ATC '07Luiz André Barroso
    Transparent Checkpoint-Restart of Multiple Processes on Commodity Operating Systems USENIX ATC '07Oren Laadan, Jason Nieh
    Reboots Are for Hardware: Challenges and Solutions to Updating an Operating System on the FlyUSENIX ATC '07Andrew Baumann, Jonathan Appavoo, Robert W. Wisniewski, Dilma Da Silva, Orran Krieger, Gernot Heiser
    Short Paper: Exploring Recovery from Operating System Lockups USENIX ATC '07Francis M. David, Jeffrey C. Carlyle, Roy H. Campbell
    Human ComputationUSENIX ATC '07Luis von Ahn
    Addressing Email Loss with SureMail: Measurement, Design, and Evaluation USENIX ATC '07Sharad Agarwal, Venkata N. Padmanabhan, Dilip A. Joseph
    Wresting Control from BGP: Scalable Fine-Grained Route Control USENIX ATC '07Patrick Verkaik, Dan Pei, Tom Scholl, Aman Shaikh, Alex C. Snoeren, Jacobus E. van der Merwe
    A Comparison of Structured and Unstructured P2P Approaches to Heterogeneous Random Peer Selection USENIX ATC '07Vivek Vishnumurthy, Paul Francis
    Perfect Data in an Imperfect WorldUSENIX ATC '07Daniel V. Klein
    Evaluating Block-level Optimization Through the IO Path USENIX ATC '07Alma Riska
    DiskSeen: Exploiting Disk Layout and Access History to Enhance I/O Prefetch USENIX ATC '07Xiaoning Ding, Song Jiang, Feng Chen, Kei Davis, Xiaodong Zhang
    Short Paper: A Memory Soft Error Measurement on Production Systems USENIX ATC '07Xin Li, Kai Shen, Michael C. Huang, Lingkun Chu
    MapReduce and Other Building Blocks for Large-Scale Distributed Systems at GoogleUSENIX ATC '07Jeffrey Dean
    From Trusted to Secure: Building and Executing Applications That Enforce System SecurityUSENIX ATC '07Boniface Hicks, Sandra Rueda, Trent Jaeger
    From STEM to SEAD: Speculative Execution for Automated Defense USENIX ATC '07Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis
    Dynamic Spyware AnalysisUSENIX ATC '07Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, Dawn Song
    LiveJournal's Backend TechnologiesUSENIX ATC '07Brad Fitzpatrick