You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group


    Wedge: Splitting Applications into Reduced-Privilege CompartmentsNSDI '08Andrea Bittau, Petr Marchenko, Mark Handley, Brad Karp
    Maelstrom: Transparent Error Correction for Lambda NetworksNSDI '08Einar Vollset
    Swift: A Fast Dynamic Packet FilterNSDI '08Zhenyu Wu, Mengjun Xie, Haining Wang
    Uncovering Performance Differences Among Backbone ISPs with NetdiffNSDI '08Ratul Mahajan, Ming Zhang, Lindsey Poole, Vivek Pai
    Effective Diagnosis of Routing Disruptions from End SystemsNSDI '08Ying Zhang, Z. Morley Mao
    CSAMP: A System for Network-Wide Flow MonitoringNSDI '08Vyas Sekar, Michael K. Reiter, Walter Willinger, Hui Zhang, Ramana Rao Kompella
    Studying Black Holes in the Internet with HubbleNSDI '08Ethan Katz-Bassett, Harsha V. Madhyastha, John P. John, David Wetherall, homas Anderson
    Nysiad: Practical Protocol Transformation to Tolerate Byzantine FailuresNSDI '08Chi Ho, Robbert van Renesse, Mark Bickford, Danny Dolev
    BFT Protocols Under FireNSDI '08Atul Singh, Tathagata Das, Petros Maniatis, Timothy Roscoe
    Beyond Pilots: Keeping Rural Wireless Networks AliveNSDI '08Sonesh Surana, Rabin Patra, Sergiu Nedevschi, Manuel Ramos, Lakshminarayanan Subramanian, Yahel Ben-David, Eric Brewer
    UsenetDHT: A Low-Overhead Design for UsenetNSDI '08Emil Sit, Robert Morris, M. Frans Kaashoek
    San Fermín: Aggregating Large Data Sets Using a Binomial Swap ForestNSDI '08Justin Cappos, John H. Hartman
    Harnessing Exposed Terminals in Wireless NetworksNSDI '08Mythili Vutukuru, Kyle Jamieson, Hari Balakrishnan
    Designing High Performance Enterprise Wi-Fi NetworksNSDI '08Rohan Murty, Jitendra Padhye, Ranveer Chandra, Alec Wolman, Brian Zill
    FatVAP: Aggregating AP Backhaul Capacity to Maximize ThroughputNSDI '08Srikanth Kandula, Kate Ching-Ju Lin, Tural Badirkhanli, Dina Katabi
    Efficiency Through Eavesdropping: Link-layer Packet CachingNSDI '08Mikhail Afanasyev, David G. Andersen, Alex C. Snoeren
    One Hop Reputations for Peer to Peer File Sharing WorkloadsNSDI '08Michael Piatek, Tomas Isdal, Arvind Krishnamurthy, Thomas Anderson
    Ostra: Leveraging Trust to Thwart Unwanted CommunicationNSDI '08Alan Mislove, Ansley Post, Peter Druschel, Krishna P. Gummadi
    Detecting In-Flight Page Changes with Web TripwiresNSDI '08Charles Reis, Steven D. Gribble, Tadayoshi Kohno, Nicholas C. Weaver
    Xen and the Art of Virtualization RevisitedNSDI '08Ian Pratt
    Remus: High Availability via Asynchronous Virtual Machine ReplicationNSDI '08Brendan Cully, Geoffrey Lefebvre, Dutch Meyer, Mike Feeley, Norm Hutchinson, Andrew Warfield
    Work-in-Progress SessionLEET '08
    Conducting Cybersecurity Research Legally and EthicallyLEET '08Aaron J. Burstein
    Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm WormLEET '08Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freiling
    The Heisenbot Uncertainty Problem: Challenges in Separating Bots from ChaffLEET '08Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage