You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group

Multimedia

    TitleConferenceSpeaker(s)
    The Heisenbot Uncertainty Problem: Challenges in Separating Bots from ChaffLEET '08Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage
    Ghost Turns Zombie: Exploring the Life Cycle of Web-based MalwareLEET '08Michalis Polychronakis, Panayiotis Mavrommatis
    Designing and Implementing Malicious HardwareLEET '08Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou
    Catching Instant Messaging Worms with Change-Point Detection TechniquesLEET '08Guanhua Yan, Zhen Xiao, Stephan Eidenbenz
    Exploiting Machine Learning to Subvert Your Spam FilterLEET '08Blaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I.P. Rubinstein, Udam Saini, Charles Sutton, Kai Xia
    On the Spam Campaign TrailLEET '08Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage
    Characterizing Botnets from Email Spam RecordsLEET '08Li Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, Geoff Hulten, J.D. Tygar
    Peeking into Spammer Behavior from a Unique Vantage PointLEET '08Abhinav Pathak, Y. Charlie Hu, Z. Morley Mao
    Behind Phishing: An Examination of Phisher Modi OperandiLEET '08D. Kevin McGrath, Minaxi Gupta
    Towards Tamper-evident Storage on Patterned MediaFAST '08Pieter H. Hartel, Leon Abelmann, Mohammed G. Khatib
    SWEEPER: An Efficient Disaster Recovery Point Identification MechanismFAST '08Akshat Verma, Ramani Routray, Rohit Jain
    Using Utility to Provision Storage SystemsFAST '08John D. Strunk, Eno Thereska, Christos Faloutsos
    BPLRU: A Buffer Management Scheme for Improving Random Writes in Flash StorageFAST '08Hyojun Kim, Seongjun Ahn
    Write Off-Loading: Practical Power Management for Enterprise StorageFAST '08Dushyanth Narayanan, Austin Donnelly, Antony Rowstron
    Avoiding the Disk Bottleneck in the Data Domain Deduplication File SystemFAST '08Benjamin Zhu, Kai Li, Hugo Patterson
    Portably Solving File TOCTTOU Races with Hardness AmplificationFAST '08Dan Tsafrir, Tomer Hertz, David Wagner, Dilma Da Silva
    EIO: Error Handling is Occasionally CorrectFAST '08Haryadi S. Gunawi, Cindy Rubio-González, Ben Liblit
    An Analysis of Data Corruption in the Storage StackFAST '08Garth Goodson, Bianca Schroeder
    Enhancing Storage System Availability on Multi-Core Architectures with Recovery-Conscious SchedulingFAST '08Sangeetha Seshadri, Lawrence Chiu, Cornel Constantinescu, Subashini Balachandran, Clem Dickey, Ling Liu, Paul Muench
    Improving I/O Performance of Applications through Compiler-Directed Code RestructuringFAST '08Mahmut Kandemir, Seung Woo Son, Mustafa Karakoy
    Measurement and Analysis of TCP Throughput Collapse in Cluster-based Storage SystemsFAST '08Amar Phanishayee, Elie Krevat, Vijay Vasudevan, David G. Andersen, Garth A. Gibson, Srinivasan Seshan
    The RAID-6 Liberation CodesFAST '08James S. Plank
    Are Disks the Dominant Contributor for Storage Failures? A Comprehensive Study of Storage Subsystem Failure CharacteristicsFAST '08Weihang Jiang, Chongfeng Hu, Yuanyuan Zhou, Arkady Kanevsky
    Parity Lost and Parity RegainedFAST '08Andrew Krioukov, Lakshmi N. Bairavasundaram, Garth R. Goodson, Kiran Srinivasan, Randy Thelen, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
    Sustainable Information Technology EcosystemFAST '08Chandrakant D. Patel