Search results

    NFSv4USENIX ATC '05Spencer Shepler
    Massively Multi-player Games and the Systems That Love ThemUSENIX ATC '05Mark Wirt
    DDoS Defense in Practice and TheoryUSENIX ATC '05Eddie Kohler
    Computer Simulations of Thermal Convection and Magnetic Field Generation in Stars and PlanetsUSENIX ATC '05Gary Glatzmaier
    Von Neumann's Universe: Digital Computing at the Institute for Advanced Study, 1945-1958 USENIX ATC '05George Dyson
    Lessons Learned from Howard Dean's Digital Campaign LISA '04Keri Carpenter, Tom Limoncelli
    System Administration and Sex Therapy: The Gentle Art of DebuggingLISA '04David Blank-Edelman
    What Spammers Are Doing to Get Around Bayesian Filtering & What We Can Expect for the Future LISA '04John Graham-Cumming
    A New Approach to Scripting LISA '04Trey Harris
    Keynote Address Going Digital at CNN LISA '04
    Nuclear Weapons, Permissive Action Links, and the History of Public Key CryptographyUSENIX Security '04Steve Bellovin
    Metrics, Economics, and Shared Risk at the National ScaleUSENIX Security '04Dan Geer
    I Voted? How the Law Increasingly Restricts Independent Security ResearchUSENIX Security '04Cindy Cohn
    The State of the SpamUSENIX ATC '04Eric Allman
    Cheap Hardware + Fault Tolerance = Web SiteUSENIX ATC '04Rob Pike
    Debate: Is an Operating System Monoculture a Threat to Security?USENIX ATC '04Dan Geer, Scott Charney
    Thinking Sensibly About Security in an Uncertain WorldUSENIX ATC '04Bruce Schneier
    Network Complexity: How Do I Manage All of This?USENIX ATC '04Eliot Lear
    Open Source and Proprietary Software: A Blending of CulturesUSENIX ATC '04Alan Nugent Facing a World CrisisLISA 2001William LeFebvre