Conferences

Search results

    TitleConferenceSpeaker(s)
    Designing High Performance Enterprise Wi-Fi NetworksNSDI '08Rohan Murty, Jitendra Padhye, Ranveer Chandra, Alec Wolman, Brian Zill
    FatVAP: Aggregating AP Backhaul Capacity to Maximize ThroughputNSDI '08Srikanth Kandula, Kate Ching-Ju Lin, Tural Badirkhanli, Dina Katabi
    Efficiency Through Eavesdropping: Link-layer Packet CachingNSDI '08Mikhail Afanasyev, David G. Andersen, Alex C. Snoeren
    One Hop Reputations for Peer to Peer File Sharing WorkloadsNSDI '08Michael Piatek, Tomas Isdal, Arvind Krishnamurthy, Thomas Anderson
    Ostra: Leveraging Trust to Thwart Unwanted CommunicationNSDI '08Alan Mislove, Ansley Post, Peter Druschel, Krishna P. Gummadi
    Detecting In-Flight Page Changes with Web TripwiresNSDI '08Charles Reis, Steven D. Gribble, Tadayoshi Kohno, Nicholas C. Weaver
    Xen and the Art of Virtualization RevisitedNSDI '08Ian Pratt
    Remus: High Availability via Asynchronous Virtual Machine ReplicationNSDI '08Brendan Cully, Geoffrey Lefebvre, Dutch Meyer, Mike Feeley, Norm Hutchinson, Andrew Warfield
    Work-in-Progress SessionLEET '08
    Conducting Cybersecurity Research Legally and EthicallyLEET '08Aaron J. Burstein
    Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm WormLEET '08Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freiling
    The Heisenbot Uncertainty Problem: Challenges in Separating Bots from ChaffLEET '08Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage
    Ghost Turns Zombie: Exploring the Life Cycle of Web-based MalwareLEET '08Michalis Polychronakis, Panayiotis Mavrommatis
    Designing and Implementing Malicious HardwareLEET '08Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou
    Catching Instant Messaging Worms with Change-Point Detection TechniquesLEET '08Guanhua Yan, Zhen Xiao, Stephan Eidenbenz
    Exploiting Machine Learning to Subvert Your Spam FilterLEET '08Blaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I.P. Rubinstein, Udam Saini, Charles Sutton, Kai Xia
    On the Spam Campaign TrailLEET '08Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage
    Characterizing Botnets from Email Spam RecordsLEET '08Li Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, Geoff Hulten, J.D. Tygar
    Peeking into Spammer Behavior from a Unique Vantage PointLEET '08Abhinav Pathak, Y. Charlie Hu, Z. Morley Mao
    Behind Phishing: An Examination of Phisher Modi OperandiLEET '08D. Kevin McGrath, Minaxi Gupta
    Towards Tamper-evident Storage on Patterned MediaFAST '08Pieter H. Hartel, Leon Abelmann, Mohammed G. Khatib
    SWEEPER: An Efficient Disaster Recovery Point Identification MechanismFAST '08Akshat Verma, Ramani Routray, Rohit Jain
    Using Utility to Provision Storage SystemsFAST '08John D. Strunk, Eno Thereska, Christos Faloutsos
    BPLRU: A Buffer Management Scheme for Improving Random Writes in Flash StorageFAST '08Hyojun Kim, Seongjun Ahn
    Write Off-Loading: Practical Power Management for Enterprise StorageFAST '08Dushyanth Narayanan, Austin Donnelly, Antony Rowstron

Pages