Conferences

Search results

    TitleConferenceSpeaker(s)
    Securely Connecting Wearable Health Devices to External DisplaysHealthTech '14Xiaohui Liang, David Kotz
    An Evaluation of ECG use in Cryptography for Implantable Medical Devices and Body Area NetworksHealthTech '14Michael Rushanan, Denis Foo Kune, Daniel E Holcomb, Colleen M Swanson
    "Dr. Hacker, I Presume?" An Experimentally-based Discussion about Security of Teleoperated Surgical SystemsHealthTech '14Tariq Yusuf, Tamara Bonaci, Tadayoshi Kohno, Howard Jay Chizeck
    Adaptive Information Security in Body Sensor-Actuator NetworksHealthTech '14Krishna K. Venkatasubramanian, Craig A. Shue
    Searching HIE with Differentiated Privacy PreservationHealthTech '14Yuzhe Tang, Ling Liu
    Decision Support for Data Segmentation (DS2): Application to Pull Architectures for HIEHealthTech '14Carl Gunter, Mike Berry, Martin French
    Policy, Expectations and History: Accounting of Disclosures, Patient Expectations, and What We Can Learn from the Early Days of the 1970 Fair Credit Reporting ActHealthTech '14Denise Anthony, Celeste Campos-Castillo, Ahram Lee
    NSF Funding Opportunities for Cybersecurity Education and Workforce Development3GSE '14Victor Piotrowski
    ReClaim: a Privacy-Preserving Decentralized Social NetworkFOCI '14Niels Zeilemaker, Johan Pouwelse
    TRIST: Circumventing Censorship with Transcoding-Resistant Image SteganographyFOCI '14Christopher Connolly, Patrick Lincoln, Ian Mason, Vinod Yegneswaran
    Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful SurveillanceFOCI '14Aaron Segal, Bryan Ford, Joan Feigenbaum
    Symmetric Disclosure: a Fresh Look at k-anonymityFOCI '14EJ Infeld
    An Internet with BRICS Characteristics: Data Sovereignty and the Balkanisation of the InternetFOCI '14Dana Polatin-Reuben, Joss Wright
    Global Network Interference Detection Over the RIPE Atlas NetworkFOCI '14Collin Anderson, Philipp Winter, Roya
    Towards a Comprehensive Picture of the Great Firewall’s DNS CensorshipFOCI '14
    Counting Packets Sent Between Arbitrary Internet HostsFOCI '14Jeffrey Knockel, Jedidiah R. Crandall
    Panel3GSE '14Mark Gondree, Chris Eagle, Portia Pusey, Timothy Leek, Giovanni Vigna, Peter Chapman
    Academic Cloud Computing Research: Five Pitfalls and Five OpportunitiesHotCloud '14Adam Barker, Blesson Varghese, Jonathan Stuart Ward, Ian Sommerville
    Facade: High-Throughput, Deniable Censorship Circumvention Using Web SearchFOCI '14Ben Jones, Sam Burnett, Nick Feamster, Sean Donovan, Sarthak Grover, Sathya Gunasekaran, Karim Habak
    Battling Human Trafficking with Big DataUSENIX Security '14Rolando R. Lopez
    User-Guided Device Driver SynthesisOSDI '14Leonid Ryzhyk, Adam Walker, John Keys, Alexander Legg, Arun Raghunath, Michael Stumm, Mona Vij
    Scaling Distributed Machine Learning with the Parameter ServerOSDI '14Mu Li, David G. Andersen, Jun Woo Park, Alexander J. Smola, Amr Ahmed, Vanja Josifovski, James Long, Eugene J. Shekita, Bor-Yiing Su
    GraphX: Graph Processing in a Distributed Dataflow FrameworkOSDI '14Joseph E. Gonzalez, Reynold S. Xin, Ankur Dave, Daniel Crankshaw, Michael J. Franklin, Ion Stoica
    Nail: A Practical Tool for Parsing and Generating Data FormatsOSDI '14Julian Bangert, Nickolai Zeldovich
    lprof: A Non-intrusive Request Flow Profiler for Distributed SystemsOSDI '14Xu Zhao, Yongle Zhang, David Lion, Muhammad Faizan Ullah, Yu Luo, Ding Yuan, Michael Stumm

Pages